Test Summary

Test Results

Expand All Collapse All
All times are UTC
2020-09-01 12:11:59 INFO
TEST-RUNNER
Test instance W7VlitSK3hNyxLR created
baseUrl
https://www.certification.openid.net/test/W7VlitSK3hNyxLR
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code",
  "request_type": "plain_http_request",
  "client_registration": "dynamic_client",
  "response_mode": "default"
}
alias

                                
description
test suite runner for openid-client
planId
7n4X1Ncvmepka
config
{
  "description": "test suite runner for openid-client",
  "waitTimeoutSeconds": 2
}
testName
oidcc-client-test-discovery-jwks-uri-keys
2020-09-01 12:11:59 SUCCESS
OIDCCGenerateServerConfiguration
Generated default server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/W7VlitSK3hNyxLR/",
  "authorization_endpoint": "https://www.certification.openid.net/test/W7VlitSK3hNyxLR/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/W7VlitSK3hNyxLR/token",
  "jwks_uri": "https://www.certification.openid.net/test/W7VlitSK3hNyxLR/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/W7VlitSK3hNyxLR/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/W7VlitSK3hNyxLR/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post",
    "client_secret_jwt",
    "private_key_jwt"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2020-09-01 12:11:59
AddRandomJwksUriToServerConfiguration
Added random jwks_uri to server configuration
jwks_uri
https://www.certification.openid.net/test/W7VlitSK3hNyxLR/jwksrzMxUFHcXE
2020-09-01 12:11:59
SetTokenEndpointAuthMethodsSupportedToClientSecretBasicOnly
Changed token_endpoint_auth_methods_supported to client_secret_basic only in server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/W7VlitSK3hNyxLR/",
  "authorization_endpoint": "https://www.certification.openid.net/test/W7VlitSK3hNyxLR/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/W7VlitSK3hNyxLR/token",
  "jwks_uri": "https://www.certification.openid.net/test/W7VlitSK3hNyxLR/jwksrzMxUFHcXE",
  "userinfo_endpoint": "https://www.certification.openid.net/test/W7VlitSK3hNyxLR/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/W7VlitSK3hNyxLR/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2020-09-01 12:11:59
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "7yWDkG64A1b7kJZ0Elx5QK_JGPsS0rX4g8MbGmG3uZxwb3MoxdFHDuTxGmDLK96SIP6BWQZ7C8W33_rUKEyO-Y-xe65XlrA3xd4ag-DLlDHVGHwe_hSdRgq_9__zP_Krop6M-KrcAxst9vsVhKwR9mI7VyjZUkfzaJRw_R_x28c",
      "kty": "RSA",
      "q": "i7Y79dV_7rl5V9DVNeWFPOZ6J95PmZKpOg-VYGt4zneK_d65N3Ttj0ClBgQZUPFS0RA22-QAPzdLN4eI9hLn4uu4IS5P2hgoSCSHKm-QIIc0WILtrKnA97aBNsHteIAdnuMIZkiwXrGohy4gAt5r2FMMIbZOWVLdKArkJUIpmDs",
      "d": "f2vd1fs6vHhCp3g7yzxyng-aQ1oh_WzsWGbHKvfk28J68un7QGNQ1_6Dl30BfwBP4lmYtnNWmQxFpFfKG-S3PycIUWcRtQjbnkBjBwXaZq-fBVqcv5y_Jk2hp8gX6dxETywy5uT_3nC4fFdvW4ItmG7ygSBoxjpaVB96YwSxf-tv1DdU4WIBE4Dsx3V5u3O0laP_2GOPmbUES7yFkf2-v6JFXFDlvGlnDPv0tRasIuoB-M2r1FmY6740oxMrLfrX4L5p6vnCi8FRWZ9YqSJWqKCX6XBnPMqUxB1eeoNLibiifYLVG76iEqP476Nf6NuTpxSSxwhCCRmBFMO11IQqQQ",
      "e": "AQAB",
      "use": "sig",
      "kid": "b10558cf-47bd-49fa-8ab5-7731c3a7086d",
      "qi": "D5xsl71jT2A8YSmzlJDBaoE9sKVXCGlUTlNIG6g2J8i2y5QbUMsW0ZRgtX0IldS-hMNhsbvvzokJ1V3B21StAqcunJsV44aOOpY6dRmSoz-nCHMTMhuO9_c7Wq_EQ0N6qvj3QqdkLmvYc_TdQ3dCOMQLlHW6L04zOcSsEVuYctk",
      "dp": "hb6JMcF6EAQZdOdvysUE2vR0lw_zmvxCHA6Fnd-AjMG879eLufYss1u-q23usn4rY2BynoNNVWwiRZVWCaOnYlLGg9EhExlCV9q7IX4a3Kpx7tubyaVlv8JLUjtGo0DoVG4vkPKdUO9maXZKtoQ1F4IghcJGqAmtS5OZDTdMYAk",
      "dq": "K2fVnx3Snk9fZKoL46_IQlB0uTg3UMYg71nyFb-uC69WLmNo9dLND4mM-56AYwZmrW81LAHdFcbPBpSEN7dN9dE4Jo7l3iNNOISovcVlaMW4vJsIznD687ru0B1V8u8SxM9SR7zjlrfpXP42kc2agd3jUgH6u4OkFBG2KeExXQs",
      "n": "goObHkB3jHaN278Zz_T7DH3z6a0Of3OWhd61v5idC76J2RkWQUpkOvTHj9iqhcz5i4dfxKQwchaHRK3MGQaKzVtAsJ4hyOyrdpsNR-ztzjxTbslGVJpm0mhgv_WACjH9OqQEbfJ0pqLSBlZXIzcGszshaqmN0m7gwQwoNkgqA1KF7oiSNVSSD_PaShqejhlQPKy1qfZU-JD2GJkefAfSAYyzBxK2t8Q4MeO4gBSyTcY8xoIRVMUXqzpnNtsov4Ms_x5fYU9YOP6sv-3_Q5laP3_fhy5HMAD55Ik2Bc5O38ISKK_Bh8Koq8QJ27wnPu86138kOZb3Z7ZLis12eBrO3Q"
    },
    {
      "kty": "EC",
      "d": "kmGMbdAHWCbFy4VzSAPcw_fndjSMWeXg3a4U2M00_5g",
      "use": "sig",
      "crv": "P-256",
      "kid": "ac38d584-0376-42d8-ae61-adae26aae942",
      "x": "F1r9aNDsbEYumddVeeKzaBNl8_UVcG_ux_skXSMIpRw",
      "y": "fGpedFWfD94SBCE3uJWpfj4n4rYKhEjI6-JNmyi0RmM"
    },
    {
      "kty": "EC",
      "d": "ROANXVeiU0umUqxuDt9qCP5P77XSrcL7e0DMB8tBrgc",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "d5a98793-4840-4946-a271-7b2a56f3e944",
      "x": "71DvPXund1TFVpmCiYTdSaiN76mS_7PCuS0uaZ54Spo",
      "y": "6PNh_AHdXY2S8Qm9ZFmCfIZBDk9eSAB7kItWSngyBaI"
    },
    {
      "kty": "OKP",
      "d": "maVl_R3u0bY8qPsEAy5nGFcu6K1ZSEcN50tkI4sV-U4",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "4a6427d4-d8ba-4ed4-8f28-f2e6662d4717",
      "x": "IaHx-P3onIpE1sZkwkBMsq2PF0cBT5nrIL-hlw4AfFQ"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "5M-mzlyQqouoeWcJndVWBTjDb2ixfiIPgS4kWTwb8DXTTzIdXl9yqL7gUeXsPK7j5uPSSXVjxXgf-qlZhDJCMF_3tDTT6Q5IYFw_Z7y0ae2jexnuRNME890SEXqvJpLn7VJCwUQs1Xd4fMOQDUjYlfvHtgEZZZ2Jw-p_uwgh6FM",
      "kty": "RSA",
      "q": "0wJWNMcBGkPDvFeB1CXdhko5v7HYUAJ6P4Z8-C0DY0QSUU9Q_XHQQgBHr_874pbmjsG3gFzPu9p88QDpDYe8Pos0QGfFhmxPz1rNmhxGoGC6ejyfBdAfQH_q-6UddpUXAKINZWZdIgr5Z2ymrpDgBzuhgXlcmfGG53orCNgr0e8",
      "d": "B4LKzrpFMPHh0pwy5UFfcb9dh1xfQCtZERZ6vB3rRNIHVYjraHAFsBM_eBl4ePLvr6gdKIYUr4XDvVG8A65fpJNGIJO1C5pxv4u0oIY772RBJ0yUI5MCORRoDrKggs4ipQ1iQhKgkW5JASFTlPqLOH4Y-pRE8s9dCPZVYt0CcP2ijU7hTtwd3n0dzVbcLOFMVuBCcA9PD68OOiFSGnWuNiyN_3w2E5kIVR8FVoGin0EiFef2gPSi3X3G-y1_9S41gjyfcHz6Gnxsn_GL6emdeieZsuprJ_Xx1I71dZalwXWMr5NXcfFBpooO_WS1rUHymHHrQpXTpFhwSi6ma8_fuQ",
      "e": "AQAB",
      "use": "enc",
      "kid": "7dddccaa-4dd5-4516-af79-1ddcadb5ffb6",
      "qi": "qY9WUshahPqHSVdLhu_3Lpx0AqxB8biIy_jX7Tu6_6naR_FPULJstYPr4o7G0eUhxC5janTT6YK6anQXjQ7CZ0sq-w4K9njxTAMTN2kTjWuFClAhQJM1RHMbujav9X6M9LrfzS6uzbruNBhHwLE5-ygUFzj-hMkXe2BGC4H4KLs",
      "dp": "2_pjdRx7HOu94lHUZgC3fbev9QkjM4_NdjWFTqFCfvNQn2Af6h47ns473aD-OO0vQEihYGxSqoOtwxBTdovXJKju_TqYzQQlQzcM4lAC56BHPs-USmjR5x4QA-v-PkiYX4ppkWNY8zW0Ccb-VDdHuxJgU7PE1fPagheOC6Nq7e8",
      "alg": "RSA-OAEP",
      "dq": "ffELGv0cP1zq2uMv7jubeKecyDmR7k9MP9Y5iLb1Kq5acIVyxZLExl_8aaNhTuDaQ6KDr-21X14M7JuqfhTh2kKjsT0-u_ixugVsaesujFKven3sPD_4JzsyOXhXmYtq60nNzRPHyqXaLky_P7ngvPBueSTCjG-IIWjdfq3nmak",
      "n": "vJk9KFH9kamQn-EnLiA9grpKBtsuJxikbpg1nM2GQHh2cWkK7CGOn8XjsA4uJAl6d6SqVj1SvoYbX629cQf6AwhO2FuS3NX00UIgMbcSAsPUaCOlxwcKzEXykprlQ_AOb9Gi9nl9v-_CvPFbccpE9PKb0wDvPEEc3mSrLShXr_o4AsdSj8xMbA_X0wLdQo4ZKZhJObRJoVASCSJresGfk0cjvwxtdDCqnVoTTsp22d_G9l1MXQESf_2tksRZGb2RrygyUU-77pT14aLdsxLpuDUkE6uCMK_bJ-d5doQp0c9GVy9LecMDED8Jmk_AjijO4rd1hGA-8C0tHx6QVESofQ"
    },
    {
      "kty": "EC",
      "d": "Ec0AvQk6M9cog9V1zsGm5oOoayivvqyO5lPAG3oUQXA",
      "use": "enc",
      "crv": "P-256",
      "kid": "0aaf63d2-29b0-4db1-aa33-39b7f43ce3f8",
      "x": "chExYw9kXHC5OTGIpChWYMFvdVdO_9vhzCmMJ3IuSnU",
      "y": "eDA5fdcy8E77qK324qu2oNu4bP6Zn84x28SfXYMPak8",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "b10558cf-47bd-49fa-8ab5-7731c3a7086d",
      "n": "goObHkB3jHaN278Zz_T7DH3z6a0Of3OWhd61v5idC76J2RkWQUpkOvTHj9iqhcz5i4dfxKQwchaHRK3MGQaKzVtAsJ4hyOyrdpsNR-ztzjxTbslGVJpm0mhgv_WACjH9OqQEbfJ0pqLSBlZXIzcGszshaqmN0m7gwQwoNkgqA1KF7oiSNVSSD_PaShqejhlQPKy1qfZU-JD2GJkefAfSAYyzBxK2t8Q4MeO4gBSyTcY8xoIRVMUXqzpnNtsov4Ms_x5fYU9YOP6sv-3_Q5laP3_fhy5HMAD55Ik2Bc5O38ISKK_Bh8Koq8QJ27wnPu86138kOZb3Z7ZLis12eBrO3Q"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "48086bcf-0f48-4e96-9f45-667a4a92cfa9",
      "n": "n-Rc98D0dDKIEnGBECfkrNBZWPvwaih0wUl7aFPQL00P2qNPuSr6oaapXgieqoFejYBozx5Go7Vq0LpBtV3cA7V_3V70l0mh8EDtTcouPiCcswafBVGTAJBTQ4SAYdZbBvysgg7bRU5X0_D5cJpFBer7NLZd4Xpurot2oLjuLrjGDDC-VCSJPNQZY5nPh7UF5XND0zxhjVfq80RE1PVXIkn9-Ufrr3nNJbu1zupa4HcgOuuU7wIIDZegGgapcIeNzZNYk6vB1REJRWET3FtUsteB52xwJ6h-JM028FhNF-6ikMXBrUyJZU_HmOwmFez4iN2x2EL34mxZ6UPxVwpsWQ"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "ac38d584-0376-42d8-ae61-adae26aae942",
      "x": "F1r9aNDsbEYumddVeeKzaBNl8_UVcG_ux_skXSMIpRw",
      "y": "fGpedFWfD94SBCE3uJWpfj4n4rYKhEjI6-JNmyi0RmM"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "e9ff2520-dcbb-4625-91e0-9bc05402587a",
      "x": "-AN2toxHOSs0LXLDU2uiRR03ytDEKKlz63cSsj_-f1Y",
      "y": "v3G8FQH1KLaZvh8j2hCrCt-9jKA2GMiRxxrzGvmNxsA"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "d5a98793-4840-4946-a271-7b2a56f3e944",
      "x": "71DvPXund1TFVpmCiYTdSaiN76mS_7PCuS0uaZ54Spo",
      "y": "6PNh_AHdXY2S8Qm9ZFmCfIZBDk9eSAB7kItWSngyBaI"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "4a6427d4-d8ba-4ed4-8f28-f2e6662d4717",
      "x": "IaHx-P3onIpE1sZkwkBMsq2PF0cBT5nrIL-hlw4AfFQ"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "7dddccaa-4dd5-4516-af79-1ddcadb5ffb6",
      "alg": "RSA-OAEP",
      "n": "vJk9KFH9kamQn-EnLiA9grpKBtsuJxikbpg1nM2GQHh2cWkK7CGOn8XjsA4uJAl6d6SqVj1SvoYbX629cQf6AwhO2FuS3NX00UIgMbcSAsPUaCOlxwcKzEXykprlQ_AOb9Gi9nl9v-_CvPFbccpE9PKb0wDvPEEc3mSrLShXr_o4AsdSj8xMbA_X0wLdQo4ZKZhJObRJoVASCSJresGfk0cjvwxtdDCqnVoTTsp22d_G9l1MXQESf_2tksRZGb2RrygyUU-77pT14aLdsxLpuDUkE6uCMK_bJ-d5doQp0c9GVy9LecMDED8Jmk_AjijO4rd1hGA-8C0tHx6QVESofQ"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "0aaf63d2-29b0-4db1-aa33-39b7f43ce3f8",
      "x": "chExYw9kXHC5OTGIpChWYMFvdVdO_9vhzCmMJ3IuSnU",
      "y": "eDA5fdcy8E77qK324qu2oNu4bP6Zn84x28SfXYMPak8",
      "alg": "ECDH-ES"
    }
  ]
}
2020-09-01 12:11:59 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2020-09-01 12:11:59 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2020-09-01 12:11:59 SUCCESS
OIDCCLoadUserInfo
Added user information
user_info
{
  "sub": "user-subject-1234531",
  "name": "Demo T. User",
  "given_name": "Demo",
  "family_name": "User",
  "middle_name": "Theresa",
  "nickname": "Dee",
  "preferred_username": "d.tu",
  "gender": "female",
  "birthdate": "2000-02-03",
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "zoneinfo": "America/Los_Angeles",
  "locale": "en-US",
  "phone_number": "+1 555 5550000",
  "phone_number_verified": false,
  "email": "user@example.com",
  "email_verified": false,
  "website": "https://openid.net/",
  "updated_at": "1580000000"
}
2020-09-01 12:11:59 SUCCESS
GetDynamicClientConfiguration
No client details on configuration, created an empty dynamic_client_registration_template object.
2020-09-01 12:11:59
oidcc-client-test-discovery-jwks-uri-keys
Setup Done
2020-09-01 12:12:00 INCOMING
oidcc-client-test-discovery-jwks-uri-keys
Incoming HTTP request to test instance W7VlitSK3hNyxLR
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
.well-known/openid-configuration
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Discovery endpoint
2020-09-01 12:12:00 OUTGOING
oidcc-client-test-discovery-jwks-uri-keys
Response to HTTP request to test instance W7VlitSK3hNyxLR
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "issuer": "https://www.certification.openid.net/test/W7VlitSK3hNyxLR/",
  "authorization_endpoint": "https://www.certification.openid.net/test/W7VlitSK3hNyxLR/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/W7VlitSK3hNyxLR/token",
  "jwks_uri": "https://www.certification.openid.net/test/W7VlitSK3hNyxLR/jwksrzMxUFHcXE",
  "userinfo_endpoint": "https://www.certification.openid.net/test/W7VlitSK3hNyxLR/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/W7VlitSK3hNyxLR/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
outgoing_path
.well-known/openid-configuration
2020-09-01 12:12:01 INCOMING
oidcc-client-test-discovery-jwks-uri-keys
Incoming HTTP request to test instance W7VlitSK3hNyxLR
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
jwksrzMxUFHcXE
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Jwks endpoint
2020-09-01 12:12:01 OUTGOING
oidcc-client-test-discovery-jwks-uri-keys
Response to HTTP request to test instance W7VlitSK3hNyxLR
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "b10558cf-47bd-49fa-8ab5-7731c3a7086d",
      "n": "goObHkB3jHaN278Zz_T7DH3z6a0Of3OWhd61v5idC76J2RkWQUpkOvTHj9iqhcz5i4dfxKQwchaHRK3MGQaKzVtAsJ4hyOyrdpsNR-ztzjxTbslGVJpm0mhgv_WACjH9OqQEbfJ0pqLSBlZXIzcGszshaqmN0m7gwQwoNkgqA1KF7oiSNVSSD_PaShqejhlQPKy1qfZU-JD2GJkefAfSAYyzBxK2t8Q4MeO4gBSyTcY8xoIRVMUXqzpnNtsov4Ms_x5fYU9YOP6sv-3_Q5laP3_fhy5HMAD55Ik2Bc5O38ISKK_Bh8Koq8QJ27wnPu86138kOZb3Z7ZLis12eBrO3Q"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "48086bcf-0f48-4e96-9f45-667a4a92cfa9",
      "n": "n-Rc98D0dDKIEnGBECfkrNBZWPvwaih0wUl7aFPQL00P2qNPuSr6oaapXgieqoFejYBozx5Go7Vq0LpBtV3cA7V_3V70l0mh8EDtTcouPiCcswafBVGTAJBTQ4SAYdZbBvysgg7bRU5X0_D5cJpFBer7NLZd4Xpurot2oLjuLrjGDDC-VCSJPNQZY5nPh7UF5XND0zxhjVfq80RE1PVXIkn9-Ufrr3nNJbu1zupa4HcgOuuU7wIIDZegGgapcIeNzZNYk6vB1REJRWET3FtUsteB52xwJ6h-JM028FhNF-6ikMXBrUyJZU_HmOwmFez4iN2x2EL34mxZ6UPxVwpsWQ"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "ac38d584-0376-42d8-ae61-adae26aae942",
      "x": "F1r9aNDsbEYumddVeeKzaBNl8_UVcG_ux_skXSMIpRw",
      "y": "fGpedFWfD94SBCE3uJWpfj4n4rYKhEjI6-JNmyi0RmM"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "e9ff2520-dcbb-4625-91e0-9bc05402587a",
      "x": "-AN2toxHOSs0LXLDU2uiRR03ytDEKKlz63cSsj_-f1Y",
      "y": "v3G8FQH1KLaZvh8j2hCrCt-9jKA2GMiRxxrzGvmNxsA"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "d5a98793-4840-4946-a271-7b2a56f3e944",
      "x": "71DvPXund1TFVpmCiYTdSaiN76mS_7PCuS0uaZ54Spo",
      "y": "6PNh_AHdXY2S8Qm9ZFmCfIZBDk9eSAB7kItWSngyBaI"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "4a6427d4-d8ba-4ed4-8f28-f2e6662d4717",
      "x": "IaHx-P3onIpE1sZkwkBMsq2PF0cBT5nrIL-hlw4AfFQ"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "7dddccaa-4dd5-4516-af79-1ddcadb5ffb6",
      "alg": "RSA-OAEP",
      "n": "vJk9KFH9kamQn-EnLiA9grpKBtsuJxikbpg1nM2GQHh2cWkK7CGOn8XjsA4uJAl6d6SqVj1SvoYbX629cQf6AwhO2FuS3NX00UIgMbcSAsPUaCOlxwcKzEXykprlQ_AOb9Gi9nl9v-_CvPFbccpE9PKb0wDvPEEc3mSrLShXr_o4AsdSj8xMbA_X0wLdQo4ZKZhJObRJoVASCSJresGfk0cjvwxtdDCqnVoTTsp22d_G9l1MXQESf_2tksRZGb2RrygyUU-77pT14aLdsxLpuDUkE6uCMK_bJ-d5doQp0c9GVy9LecMDED8Jmk_AjijO4rd1hGA-8C0tHx6QVESofQ"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "0aaf63d2-29b0-4db1-aa33-39b7f43ce3f8",
      "x": "chExYw9kXHC5OTGIpChWYMFvdVdO_9vhzCmMJ3IuSnU",
      "y": "eDA5fdcy8E77qK324qu2oNu4bP6Zn84x28SfXYMPak8",
      "alg": "ECDH-ES"
    }
  ]
}
outgoing_path
jwksrzMxUFHcXE
2020-09-01 12:12:01 FINISHED
oidcc-client-test-discovery-jwks-uri-keys
Test has run to completion
testmodule_result
PASSED
Test Results