Test Summary

Test Results

Expand All Collapse All
All times are UTC
2020-09-01 12:53:27 INFO
TEST-RUNNER
Test instance YZn7B6oax1nc4M6 created
baseUrl
https://www.certification.openid.net/test/YZn7B6oax1nc4M6
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code id_token token",
  "request_type": "plain_http_request",
  "response_mode": "form_post",
  "client_registration": "dynamic_client"
}
alias

                                
description
test suite runner for openid-client
planId
l0lJMpv444Mye
config
{
  "description": "test suite runner for openid-client",
  "waitTimeoutSeconds": 2
}
testName
oidcc-client-test-missing-sub
2020-09-01 12:53:28 SUCCESS
OIDCCGenerateServerConfiguration
Generated default server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/YZn7B6oax1nc4M6/",
  "authorization_endpoint": "https://www.certification.openid.net/test/YZn7B6oax1nc4M6/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/YZn7B6oax1nc4M6/token",
  "jwks_uri": "https://www.certification.openid.net/test/YZn7B6oax1nc4M6/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/YZn7B6oax1nc4M6/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/YZn7B6oax1nc4M6/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post",
    "client_secret_jwt",
    "private_key_jwt"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2020-09-01 12:53:28
SetTokenEndpointAuthMethodsSupportedToClientSecretBasicOnly
Changed token_endpoint_auth_methods_supported to client_secret_basic only in server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/YZn7B6oax1nc4M6/",
  "authorization_endpoint": "https://www.certification.openid.net/test/YZn7B6oax1nc4M6/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/YZn7B6oax1nc4M6/token",
  "jwks_uri": "https://www.certification.openid.net/test/YZn7B6oax1nc4M6/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/YZn7B6oax1nc4M6/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/YZn7B6oax1nc4M6/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2020-09-01 12:53:28
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "2_LqlDTpInev2K_UC00H7ckfs35snNm-UIDt1OmxhZtOK6bSwKsHpB5nOy1eEjW-qRbi72k5SY8rbE0foAkgns5_FTv-CzS6mjYWOG3WrErgOOidARG-Fkssv0egqRdHlByN5SLd2-nM0H3bn9hrbUgwjWmy8Z0QUi-Y9vINw-8",
      "kty": "RSA",
      "q": "obuCtoD5bIdUG1rcaNYS6lRXAAdl2bkvTHkz6Rgfjexlrt1_mqMDRRxamZeIReUE5WKvguj9o70D8zmTzh7dda17CfHx5aI-erMw6XTsWdHjNDGAGWAp398lqBQvOuT1QLp6aAimkp7WrGcYPu6mHHi5SH7wEgqYWSV7Qvgmyus",
      "d": "gqoFgzqG8tYoCioXUsX8xZDrl7m-RZ3srfu8TlUq6VNI5ezkWsfThUyxd7PRvrGOA5wgXJL4dClp28EPg-hoiYd5e5zvmjc4qqVNIOVZfoIyD7jI2WDG3rlwePDZrqGE4yhxbNUvelGhTbbzd3s2A8NGp08brIIBLiJppIqosYaSHWrmZIkkq7FXCZrMkWVDA7jRivPdKrmlT6yqFyk4jLeFLjHNR-kRHDejLyF_hFpdTGh40mCU1RXdw2pmO4utRpCTXjQLNL0u4Z3dj6hFwGqT1kuRMY6gIpO2AXmTzJt2k-hQVKdSsgV9cEorvQSMbhiX6Qk3NxGr5BBmdLOTuQ",
      "e": "AQAB",
      "use": "sig",
      "kid": "909461ac-6f46-421a-937c-658e3558100b",
      "qi": "Irmxt1XnYwNeNg0c4bVEQ0XKMWsx_cKif4pjwufENcJcwvt38LN1rYfVMxlbo76cNsQhnaIpxpB3QdCgXmc0VPW7QYdrF5KjqjUbfL_ZHs1x_nzfBKturh_XGdUQMMYNP6dI28K1LpoHFEBt4FzBZeNqzY1hOJQ7F4BULGkRlM0",
      "dp": "iD9o6pgAFvbXOj5o9vsnvzfIaHMXKu6DQvEq4qpE6oOzH70-blVD7Xlb7z-CN3uNeMcRmsau0w9aEcOQpJ0i1N0LwgagryZhtWdtylTYF3BmhzopD-GCw-KbfH4NWtFt6KTrjRZVIoYo9roQE2uH2HFQijkAvUTTOGX9tnNo7Yc",
      "dq": "dixakBuhJEmljO9RCVESNSI3B5BgPTvwcYJGCdVUiRDoI2M477aYlxDmqj9slRWIBEudTpwLaG6dykSR2RP4YRnHQzcDtvRbjrAL1ylV4TNZPjPFE8WOE0Qrcap98ByHjyoycn2PqKZi2UnjD2i0-yzCxVPq-mO_ebPHYuGLBs0",
      "n": "ivTgRrgrDwR5M3pgnHLRMrp9gY4WJZ7JhdrWtWguc_3IW1j7VnbIh-w4rhhQ1RoZVANOeUNxGH3xnXXhuqBZiXm8VZnW3vhX8QltyP5XCTIkahc3Jn-hnfK4XlHptx4INhd_ekyJSEcIi-CqnDz4viE55NKstXlqGreo5IauRfDoBImBcUQLIdXHieuKy1pnS0hYy-QPdqrIRshx5SaO1wEix78mbi4b1wmC-nDHHAr446iEqSx_NFoOSSmyIA7Mq1ukmG_5yFgIyNzIww6eGMbd5-NkffxGGFNi87E0l5B3a4--Dqlb4zC1RdMLcoRwHgCmXicB5Q9cxOInrLdyZQ"
    },
    {
      "kty": "EC",
      "d": "aYbPS56nhIgJx04KaH-1z0Eg1l-kmxDOByLkX7NwkWk",
      "use": "sig",
      "crv": "P-256",
      "kid": "c4941440-1da8-48a8-872a-eb9b95f19350",
      "x": "BNpM4l2b1OK1MLrABC1uuBDl8MlJt0gzsAsRc8lE6fo",
      "y": "xriePw-e8PExMbRi0l6AseQcRoWuhyDRJhlS2GUW-HU"
    },
    {
      "kty": "EC",
      "d": "QnPzFmpL0tG2avRiFy5o1royaaNJxjWXHC_rR5ovJmU",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "544344e2-545b-44d0-b45d-065f2d65f0ae",
      "x": "3zwNjuz-ojgIBhJ5jQwY95QUD4eCs4UFDwRUSzKfQNE",
      "y": "rkTjyUyLKrtUqktJXIGlHhvTUqYhL1K2uIz2OwR-jIw"
    },
    {
      "kty": "OKP",
      "d": "BRVKXzUIGEXWH06gsxQ4ClZpcS3MqGU-0c4Ua_bkLNo",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "f0a77272-5721-4a2b-b8be-744d2a44757d",
      "x": "5JPzNAClz-MMISb--SPoU_KqhqdlCmX_VmcGnWyyWus"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "18j4ZBRFPNELu1Ev1PC9Sl48Ue2k11IEkY0pfB84UxHOmmC6MkVpFUodluGFT9utwLE-MlpwOctosMbGHs_zu9h7g0lNF3ia66-q8Qg8XJXv0r75JBm0pfWE23KoanMr_p8jIm9ynSF5OZFjiThslCoYU7OPSAkY4NyX0isnQjE",
      "kty": "RSA",
      "q": "tVKM7Uu87sZLGGtYvE5Tnw7GZAq0GISFRi7-MjGQUM7DSfLLx1sAO3vtGy1asv1AYtHyOzHXQ2yAi1YWstIu5nTdIAqr-ZM86eocMm31Gs_vU-C4MvXIY3H1ruYxbjn0y1FDy-4RJB4dlHFsNTwg91MDyVeW9UN2NELFlrVSJFs",
      "d": "RuZ_bL1rgWcc-GK6RSWnqUyvH8mRUp82p8cmxOFDont2xpC3wXB0p4K6oaAmRyjbZgovLAYy-lh5JCdqwuyvGTprsGUSlTV2jK5zDHXziP7rqUvP-PzW14lLlMzOEtpAUGn5MM_ieIgobpmZZXq7W3qjbXZ9-OieUJwv43gMUI7EhHJEjbcG_SajIbEfbIO3or9CmnCkPZkt9qVwvs5z2tbH8kZEQeCV5N7LxjbTHvh3dP3RAFowrnHio9FdHhORHAt7-I4KWKJk0pxA1PbUAI9IG9Eh8rn4FzjpPjUU-c_NtzYkKatcSHB0uK2fuA6Zdiodgt7HGb_8NXE-PnnxwQ",
      "e": "AQAB",
      "use": "enc",
      "kid": "205d691e-8154-4d7b-9fd6-c6ae105db5d9",
      "qi": "BeYkovJwmz5h2ZgilUfMuFAMfXmeqJaTeZsi_U6Ka5xPxoRfNLxeBonUo-NDMCvABQvtCE6NnjxCy2I1mBMdcb-Tppf_mHU3p9gjWRtm5EcgfJXv9WGoh9nU008AZ0oZYnDEVbw2DP0Mq76yhcseFLKu9T6VvPer1YGtyzh5OE0",
      "dp": "qwkmqNzQTHY94ElnqlbvEsVC9oVwxSLDcEL9gN6WHHHe2sqUi0gtFKzcaz1yF2w-ep-CdxLsJUMvRf8oBkA6Jshejh9JtbLoyKtCyS4H-jL2Fos8mvqtD2Zd2js1drq3QmkMxjykEhv4JEMzLA7HMWF0StPmW-iqCYGP7Qw7X-E",
      "alg": "RSA-OAEP",
      "dq": "Mh3I-eWPKOgB5ZP2CMYVcscgqpISyRwHwihG9hSg8NTVQWEsVcOfQtGz7WkRwpsg6q9gpl_WQbqBpQF8cJyLfgMbAzov4mGB2p1sgbvGnUyPt71K7Drm0iWzZE4Xp4G5WWDyvjDk5_iy8E6RO_2Mlw-I4mOlQ9ELoNI7zrX7KDU",
      "n": "mNasyD8fQ4mgtZxbeq-f7h4mIcnzIpQ-xlW1XGgmKNlCa8_SE2-wtllgWa9UsAPLPqUejSOcPQ-S14kpKYrFH4W1WckoN_rYOQgzBOAetYhvOELnMy_GxwcvBVeDX60rQNcbUp04tQd3-003R_8QXwihVm1k9Oxw6ZJvyaMAj5WtRGaGK-HOzHx4FyyBzNOLY70eTCzv4_1RV6SV4aBcrzKLdxfj1efOa3FqCaR9S-rGLNKKD6p47eZQSSeIjjfYx4ytQ7iw6BzcbgRmwHE8C4whYO_Rda3MXZn4OicONFnb5m5V_IGqi4gHMhqbBOZX6UJW_CEv2PixKpfctPVraw"
    },
    {
      "kty": "EC",
      "d": "i3EyTQPi8mestQbV_uhdB8we4-4hLcs230RwEB4MbEM",
      "use": "enc",
      "crv": "P-256",
      "kid": "6148a011-5072-45f4-9b33-bbf84eaa1f22",
      "x": "MSw21CKe3O7QNuepFN6yHarscSFZXncjKr-4zx4kZ3I",
      "y": "Ry6A2pnFHciI9oemT4oBfsSiMaskix_T1TWxYxO3fsg",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "909461ac-6f46-421a-937c-658e3558100b",
      "n": "ivTgRrgrDwR5M3pgnHLRMrp9gY4WJZ7JhdrWtWguc_3IW1j7VnbIh-w4rhhQ1RoZVANOeUNxGH3xnXXhuqBZiXm8VZnW3vhX8QltyP5XCTIkahc3Jn-hnfK4XlHptx4INhd_ekyJSEcIi-CqnDz4viE55NKstXlqGreo5IauRfDoBImBcUQLIdXHieuKy1pnS0hYy-QPdqrIRshx5SaO1wEix78mbi4b1wmC-nDHHAr446iEqSx_NFoOSSmyIA7Mq1ukmG_5yFgIyNzIww6eGMbd5-NkffxGGFNi87E0l5B3a4--Dqlb4zC1RdMLcoRwHgCmXicB5Q9cxOInrLdyZQ"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "d69b83ea-f764-4d2b-ba75-9d8a2415baf6",
      "n": "vPy-bZSf2gn4JuRZnBQ-ofE-fsIp1wuEOCY2kYpsxd9E3oYPua6kPvli9xmcz3Khvxh7BEpk1_iqycBEJUECoHxlOGnVWMxRR16ZG_JMe9kRb15DslyJ20OmmJdT6ZRCAgzEvDVa0lQ1IwvTZsoc4Khvv8EMOgLcnk1cgZS7XcV5JFS_bGlpSohpzFykiWPoln9MNLV85uFAC_CJBorqYmW1QD6LqnX5Jj00mkOFbEpvP1ZkNZwB352iwSauIrJnSEwOuSbbifhW1HKvJT63PMT3LlFNO5JTl1xroDtNQ5V4wN5g0iX7IwnMKkxErjNDVipk12YsUjlzGgKhs7LM9Q"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "c4941440-1da8-48a8-872a-eb9b95f19350",
      "x": "BNpM4l2b1OK1MLrABC1uuBDl8MlJt0gzsAsRc8lE6fo",
      "y": "xriePw-e8PExMbRi0l6AseQcRoWuhyDRJhlS2GUW-HU"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "b0e392f6-ceee-4926-badc-2c5c9e8dd51a",
      "x": "IwCB9UrpnKRtJXv44elB2-lOmmC5AaP5o_do4nGwHnw",
      "y": "VCcajQkkw-P5SMr7UZjhptV8q85CO-H2YmUxVTpu6GM"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "544344e2-545b-44d0-b45d-065f2d65f0ae",
      "x": "3zwNjuz-ojgIBhJ5jQwY95QUD4eCs4UFDwRUSzKfQNE",
      "y": "rkTjyUyLKrtUqktJXIGlHhvTUqYhL1K2uIz2OwR-jIw"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "f0a77272-5721-4a2b-b8be-744d2a44757d",
      "x": "5JPzNAClz-MMISb--SPoU_KqhqdlCmX_VmcGnWyyWus"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "205d691e-8154-4d7b-9fd6-c6ae105db5d9",
      "alg": "RSA-OAEP",
      "n": "mNasyD8fQ4mgtZxbeq-f7h4mIcnzIpQ-xlW1XGgmKNlCa8_SE2-wtllgWa9UsAPLPqUejSOcPQ-S14kpKYrFH4W1WckoN_rYOQgzBOAetYhvOELnMy_GxwcvBVeDX60rQNcbUp04tQd3-003R_8QXwihVm1k9Oxw6ZJvyaMAj5WtRGaGK-HOzHx4FyyBzNOLY70eTCzv4_1RV6SV4aBcrzKLdxfj1efOa3FqCaR9S-rGLNKKD6p47eZQSSeIjjfYx4ytQ7iw6BzcbgRmwHE8C4whYO_Rda3MXZn4OicONFnb5m5V_IGqi4gHMhqbBOZX6UJW_CEv2PixKpfctPVraw"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "6148a011-5072-45f4-9b33-bbf84eaa1f22",
      "x": "MSw21CKe3O7QNuepFN6yHarscSFZXncjKr-4zx4kZ3I",
      "y": "Ry6A2pnFHciI9oemT4oBfsSiMaskix_T1TWxYxO3fsg",
      "alg": "ECDH-ES"
    }
  ]
}
2020-09-01 12:53:28 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2020-09-01 12:53:28 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2020-09-01 12:53:28 SUCCESS
OIDCCLoadUserInfo
Added user information
user_info
{
  "sub": "user-subject-1234531",
  "name": "Demo T. User",
  "given_name": "Demo",
  "family_name": "User",
  "middle_name": "Theresa",
  "nickname": "Dee",
  "preferred_username": "d.tu",
  "gender": "female",
  "birthdate": "2000-02-03",
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "zoneinfo": "America/Los_Angeles",
  "locale": "en-US",
  "phone_number": "+1 555 5550000",
  "phone_number_verified": false,
  "email": "user@example.com",
  "email_verified": false,
  "website": "https://openid.net/",
  "updated_at": "1580000000"
}
2020-09-01 12:53:28 SUCCESS
GetDynamicClientConfiguration
No client details on configuration, created an empty dynamic_client_registration_template object.
2020-09-01 12:53:28
oidcc-client-test-missing-sub
Setup Done
2020-09-01 12:53:28 INCOMING
oidcc-client-test-missing-sub
Incoming HTTP request to test instance YZn7B6oax1nc4M6
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
.well-known/openid-configuration
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Discovery endpoint
2020-09-01 12:53:28 OUTGOING
oidcc-client-test-missing-sub
Response to HTTP request to test instance YZn7B6oax1nc4M6
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "issuer": "https://www.certification.openid.net/test/YZn7B6oax1nc4M6/",
  "authorization_endpoint": "https://www.certification.openid.net/test/YZn7B6oax1nc4M6/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/YZn7B6oax1nc4M6/token",
  "jwks_uri": "https://www.certification.openid.net/test/YZn7B6oax1nc4M6/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/YZn7B6oax1nc4M6/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/YZn7B6oax1nc4M6/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
outgoing_path
.well-known/openid-configuration
2020-09-01 12:53:29 INCOMING
oidcc-client-test-missing-sub
Incoming HTTP request to test instance YZn7B6oax1nc4M6
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "content-type": "application/json",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "187",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
register
incoming_body_form_params
incoming_method
POST
incoming_body_json
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ]
}
incoming_query_string_params
{}
incoming_body
{"token_endpoint_auth_method":"client_secret_basic","response_types":["code id_token token"],"grant_types":["authorization_code","implicit"],"redirect_uris":["https://rp.example.com/cb"]}
Registration endpoint
2020-09-01 12:53:29 SUCCESS
OIDCCExtractDynamicRegistrationRequest
Extracted dynamic client registration request
request
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ]
}
2020-09-01 12:53:29 INFO
EnsureRegistrationRequestContainsAtLeastOneContact
This application requires that registration requests contain at least one contact.
2020-09-01 12:53:29 SUCCESS
ValidateClientGrantTypes
grant_types match response_types
grant_types
[
  "authorization_code",
  "implicit"
]
response_types
[
  "code id_token token"
]
2020-09-01 12:53:29 SUCCESS
OIDCCValidateClientRedirectUris
Valid redirect_uri(s) provided in registration request
redirect_uris
[
  "https://rp.example.com/cb"
]
2020-09-01 12:53:29 SUCCESS
ValidateClientLogoUris
Client does not contain any logo_uri
2020-09-01 12:53:29 SUCCESS
ValidateClientUris
Client does not contain any client_uri
2020-09-01 12:53:29 SUCCESS
ValidateClientPolicyUris
Client does not contain any policy_uri
2020-09-01 12:53:29 SUCCESS
ValidateClientTosUris
Client does not contain any tos_uri
2020-09-01 12:53:29 SUCCESS
ValidateClientSubjectType
A subject_type was not provided
2020-09-01 12:53:29 INFO
ValidateIdTokenSignedResponseAlg
Skipped evaluation due to missing required element: client id_token_signed_response_alg
path
id_token_signed_response_alg
mapped
object
client
2020-09-01 12:53:29 SUCCESS
EnsureIdTokenEncryptedResponseAlgIsSetIfEncIsSet
id_token_encrypted_response_enc is not set
2020-09-01 12:53:29 INFO
ValidateUserinfoSignedResponseAlg
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2020-09-01 12:53:29 SUCCESS
EnsureUserinfoEncryptedResponseAlgIsSetIfEncIsSet
userinfo_encrypted_response_enc is not set
2020-09-01 12:53:29 INFO
ValidateRequestObjectSigningAlg
Skipped evaluation due to missing required element: client request_object_signing_alg
path
request_object_signing_alg
mapped
object
client
2020-09-01 12:53:29 SUCCESS
EnsureRequestObjectEncryptionAlgIsSetIfEncIsSet
request_object_encryption_enc is not set
2020-09-01 12:53:29 INFO
ValidateTokenEndpointAuthSigningAlg
Skipped evaluation due to missing required element: client token_endpoint_auth_signing_alg
path
token_endpoint_auth_signing_alg
mapped
object
client
2020-09-01 12:53:29 SUCCESS
ValidateDefaultMaxAge
default_max_age is not set
2020-09-01 12:53:29 INFO
ValidateRequireAuthTime
Skipped evaluation due to missing required element: client require_auth_time
path
require_auth_time
mapped
object
client
2020-09-01 12:53:29 INFO
ValidateDefaultAcrValues
Skipped evaluation due to missing required element: client default_acr_values
path
default_acr_values
mapped
object
client
2020-09-01 12:53:29 INFO
ValidateInitiateLoginUri
Skipped evaluation due to missing required element: client initiate_login_uri
path
initiate_login_uri
mapped
object
client
2020-09-01 12:53:29 INFO
ValidateRequestUris
Skipped evaluation due to missing required element: client request_uris
path
request_uris
mapped
object
client
2020-09-01 12:53:29 SUCCESS
ValidateClientRegistrationRequestSectorIdentifierUri
A sector_identifier_uri was not provided
2020-09-01 12:53:29 SUCCESS
OIDCCRegisterClient
Registered client
client
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_wfNRidRtmgOLzxa42938\u0027\u0027~\u003c\u0026"
}
2020-09-01 12:53:29
OIDCCCreateClientSecretForDynamicClient
Set the secret for registered client
client_secret
secret_PxgVwXwtTmSBHbUXoDuyWHTXkqHgsMzRqlcvamXMPxnjmmPePF0330747715/ ?-/
2020-09-01 12:53:29 SUCCESS
EnsureTokenEndPointAuthMethodIsClientSecretBasic
token_endpoint_auth_method is 'client_secret_basic' as expected
2020-09-01 12:53:29 SUCCESS
EnsureClientDoesNotHaveBothJwksAndJwksUri
Client does not have both jwks and jwks_uri set
client
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_wfNRidRtmgOLzxa42938\u0027\u0027~\u003c\u0026",
  "client_secret": "secret_PxgVwXwtTmSBHbUXoDuyWHTXkqHgsMzRqlcvamXMPxnjmmPePF0330747715/ ?-/"
}
2020-09-01 12:53:29 INFO
FetchClientKeys
Skipped evaluation due to missing required element: client jwks_uri
path
jwks_uri
mapped
object
client
2020-09-01 12:53:29 SUCCESS
OIDCCExtractServerSigningAlg
Using the default algorithm for the first key in server jwks
signing_algorithm
RS256
2020-09-01 12:53:29
SetClientIdTokenSignedResponseAlgToServerSigningAlg
Set id_token_signed_response_alg for the registered client
id_token_signed_response_alg
RS256
2020-09-01 12:53:29 OUTGOING
oidcc-client-test-missing-sub
Response to HTTP request to test instance YZn7B6oax1nc4M6
outgoing_status_code
201
outgoing_headers
{}
outgoing_body
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_wfNRidRtmgOLzxa42938\u0027\u0027~\u003c\u0026",
  "client_secret": "secret_PxgVwXwtTmSBHbUXoDuyWHTXkqHgsMzRqlcvamXMPxnjmmPePF0330747715/ ?-/",
  "id_token_signed_response_alg": "RS256"
}
outgoing_path
register
2020-09-01 12:53:29 INCOMING
oidcc-client-test-missing-sub
Incoming HTTP request to test instance YZn7B6oax1nc4M6
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "got/9.6.0 (https://github.com/sindresorhus/got)",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
authorize
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "client_id": "client_wfNRidRtmgOLzxa42938\u0027\u0027~\u003c\u0026",
  "scope": "openid",
  "response_type": "code id_token token",
  "redirect_uri": "https://rp.example.com/cb",
  "state": "EP_Xbq1PoSwZKVeDktGHSm9R5d1DJvUHXyMIiWH_qNA",
  "nonce": "l_GvLOXzI4l8dDyE7mSIFzMBf88MPj64ocheQ7ADGiM",
  "response_mode": "form_post"
}
incoming_body
Authorization endpoint
2020-09-01 12:53:29 SUCCESS
EnsureRequestDoesNotContainRequestObject
Request does not contain a request parameter
2020-09-01 12:53:29 SUCCESS
OIDCCEnsureAuthorizationHttpRequestContainsOpenIDScope
Found 'openid' in scope http request parameter
actual
[
  "openid"
]
expected
openid
2020-09-01 12:53:29 SUCCESS
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
effective_authorization_endpoint_request
{
  "client_id": "client_wfNRidRtmgOLzxa42938\u0027\u0027~\u003c\u0026",
  "scope": "openid",
  "response_type": "code id_token token",
  "redirect_uri": "https://rp.example.com/cb",
  "state": "EP_Xbq1PoSwZKVeDktGHSm9R5d1DJvUHXyMIiWH_qNA",
  "nonce": "l_GvLOXzI4l8dDyE7mSIFzMBf88MPj64ocheQ7ADGiM",
  "response_mode": "form_post"
}
2020-09-01 12:53:29 SUCCESS
ExtractRequestedScopes
Requested scopes
scope
openid
2020-09-01 12:53:29 SUCCESS
ExtractNonceFromAuthorizationRequest
Extracted nonce
nonce
l_GvLOXzI4l8dDyE7mSIFzMBf88MPj64ocheQ7ADGiM
2020-09-01 12:53:29 SUCCESS
EnsureResponseTypeIsCodeIdTokenToken
Response type is expected value
expected
code id_token token
2020-09-01 12:53:29 SUCCESS
EnsureMatchingClientId
Client ID matched
client_id
client_wfNRidRtmgOLzxa42938''~<&
2020-09-01 12:53:29 SUCCESS
EnsureValidRedirectUriForAuthorizationEndpointRequest
redirect_uri is one of the allowed redirect uris
actual
https://rp.example.com/cb
expected
[
  "https://rp.example.com/cb"
]
2020-09-01 12:53:29 SUCCESS
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
actual
[
  "openid"
]
expected
openid
2020-09-01 12:53:29 SUCCESS
DisallowMaxAgeEqualsZeroAndPromptNone
The client did not send max_age=0 and prompt=none parameters as expected
2020-09-01 12:53:29 SUCCESS
CreateAuthorizationCode
Created authorization code
authorization_code
7d5eIE5YE6
2020-09-01 12:53:29 SUCCESS
CalculateCHash
Successful c_hash encoding
c_hash
DtWSL3S8KZJlvFJ15jVvzA
2020-09-01 12:53:29 SUCCESS
GenerateBearerAccessToken
Generated access token
access_token
MnG8N3xcvbuhP3APoIQNSCcvAsznuOoAdS3QiPJ8rhqjpJqegu
2020-09-01 12:53:29 SUCCESS
CalculateAtHash
Successful at_hash encoding
at_hash
AcFPkxMLM3nhrQysSkE-cw
2020-09-01 12:53:29 SUCCESS
GenerateIdTokenClaims
Created ID Token Claims
iss
https://www.certification.openid.net/test/YZn7B6oax1nc4M6/
sub
user-subject-1234531
aud
client_wfNRidRtmgOLzxa42938''~<&
nonce
l_GvLOXzI4l8dDyE7mSIFzMBf88MPj64ocheQ7ADGiM
iat
1598964809
exp
1598965109
2020-09-01 12:53:29
RemoveSubFromIdToken
Removed sub value from ID token claims
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/YZn7B6oax1nc4M6/",
  "aud": "client_wfNRidRtmgOLzxa42938\u0027\u0027~\u003c\u0026",
  "nonce": "l_GvLOXzI4l8dDyE7mSIFzMBf88MPj64ocheQ7ADGiM",
  "iat": 1598964809,
  "exp": 1598965109
}
2020-09-01 12:53:29 SUCCESS
AddCHashToIdTokenClaims
Added c_hash to ID token claims
c_hash
DtWSL3S8KZJlvFJ15jVvzA
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/YZn7B6oax1nc4M6/",
  "aud": "client_wfNRidRtmgOLzxa42938\u0027\u0027~\u003c\u0026",
  "nonce": "l_GvLOXzI4l8dDyE7mSIFzMBf88MPj64ocheQ7ADGiM",
  "iat": 1598964809,
  "exp": 1598965109,
  "c_hash": "DtWSL3S8KZJlvFJ15jVvzA"
}
2020-09-01 12:53:29 SUCCESS
AddAtHashToIdTokenClaims
Added at_hash to ID token claims
at_hash
AcFPkxMLM3nhrQysSkE-cw
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/YZn7B6oax1nc4M6/",
  "aud": "client_wfNRidRtmgOLzxa42938\u0027\u0027~\u003c\u0026",
  "nonce": "l_GvLOXzI4l8dDyE7mSIFzMBf88MPj64ocheQ7ADGiM",
  "iat": 1598964809,
  "exp": 1598965109,
  "c_hash": "DtWSL3S8KZJlvFJ15jVvzA",
  "at_hash": "AcFPkxMLM3nhrQysSkE-cw"
}
2020-09-01 12:53:29 SUCCESS
OIDCCSignIdToken
Signed the ID token
id_token
eyJraWQiOiI5MDk0NjFhYy02ZjQ2LTQyMWEtOTM3Yy02NThlMzU1ODEwMGIiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiQWNGUGt4TUxNM25oclF5c1NrRS1jdyIsImF1ZCI6ImNsaWVudF93Zk5SaWRSdG1nT0x6eGE0MjkzOCcnfjwmIiwiY19oYXNoIjoiRHRXU0wzUzhLWkpsdkZKMTVqVnZ6QSIsImlzcyI6Imh0dHBzOlwvXC93d3cuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0XC90ZXN0XC9ZWm43QjZvYXgxbmM0TTZcLyIsImV4cCI6MTU5ODk2NTEwOSwibm9uY2UiOiJsX0d2TE9Yekk0bDhkRHlFN21TSUZ6TUJmODhNUGo2NG9jaGVRN0FER2lNIiwiaWF0IjoxNTk4OTY0ODA5fQ.Ww2agxGA-6A9vIp5HVeHqDx9_gddofkEZj7ICwuSwFuQKQrwzMOGdtDdNLkEWMYB1Lt6Wj_gqa5F65HDbFwVfeGb5_a5RvSa-tzJxFQ_qf2Drr9JKlP0ogGdrqQCtLu0DbBhxSBYcUD2n4H8hmxkZzet7-ByEWoTdOGAU5dExLvlD26lkheLWX7pS9am1FKf_DER4M1fHHTGIsDCBfCu-tQfN5o-uSNpScKOWDutpv8jb7F5tNWMe1mX-pnP_hvKUYxANTIr2BXHWhuoOn3ery27G9WIOdOzBxAsQ2Cag-Q0x5WUfOZEHy0coivmBzcnKuNjs8FCJ6w9eovrME5A_A
key
{"p":"2_LqlDTpInev2K_UC00H7ckfs35snNm-UIDt1OmxhZtOK6bSwKsHpB5nOy1eEjW-qRbi72k5SY8rbE0foAkgns5_FTv-CzS6mjYWOG3WrErgOOidARG-Fkssv0egqRdHlByN5SLd2-nM0H3bn9hrbUgwjWmy8Z0QUi-Y9vINw-8","kty":"RSA","q":"obuCtoD5bIdUG1rcaNYS6lRXAAdl2bkvTHkz6Rgfjexlrt1_mqMDRRxamZeIReUE5WKvguj9o70D8zmTzh7dda17CfHx5aI-erMw6XTsWdHjNDGAGWAp398lqBQvOuT1QLp6aAimkp7WrGcYPu6mHHi5SH7wEgqYWSV7Qvgmyus","d":"gqoFgzqG8tYoCioXUsX8xZDrl7m-RZ3srfu8TlUq6VNI5ezkWsfThUyxd7PRvrGOA5wgXJL4dClp28EPg-hoiYd5e5zvmjc4qqVNIOVZfoIyD7jI2WDG3rlwePDZrqGE4yhxbNUvelGhTbbzd3s2A8NGp08brIIBLiJppIqosYaSHWrmZIkkq7FXCZrMkWVDA7jRivPdKrmlT6yqFyk4jLeFLjHNR-kRHDejLyF_hFpdTGh40mCU1RXdw2pmO4utRpCTXjQLNL0u4Z3dj6hFwGqT1kuRMY6gIpO2AXmTzJt2k-hQVKdSsgV9cEorvQSMbhiX6Qk3NxGr5BBmdLOTuQ","e":"AQAB","use":"sig","kid":"909461ac-6f46-421a-937c-658e3558100b","qi":"Irmxt1XnYwNeNg0c4bVEQ0XKMWsx_cKif4pjwufENcJcwvt38LN1rYfVMxlbo76cNsQhnaIpxpB3QdCgXmc0VPW7QYdrF5KjqjUbfL_ZHs1x_nzfBKturh_XGdUQMMYNP6dI28K1LpoHFEBt4FzBZeNqzY1hOJQ7F4BULGkRlM0","dp":"iD9o6pgAFvbXOj5o9vsnvzfIaHMXKu6DQvEq4qpE6oOzH70-blVD7Xlb7z-CN3uNeMcRmsau0w9aEcOQpJ0i1N0LwgagryZhtWdtylTYF3BmhzopD-GCw-KbfH4NWtFt6KTrjRZVIoYo9roQE2uH2HFQijkAvUTTOGX9tnNo7Yc","dq":"dixakBuhJEmljO9RCVESNSI3B5BgPTvwcYJGCdVUiRDoI2M477aYlxDmqj9slRWIBEudTpwLaG6dykSR2RP4YRnHQzcDtvRbjrAL1ylV4TNZPjPFE8WOE0Qrcap98ByHjyoycn2PqKZi2UnjD2i0-yzCxVPq-mO_ebPHYuGLBs0","n":"ivTgRrgrDwR5M3pgnHLRMrp9gY4WJZ7JhdrWtWguc_3IW1j7VnbIh-w4rhhQ1RoZVANOeUNxGH3xnXXhuqBZiXm8VZnW3vhX8QltyP5XCTIkahc3Jn-hnfK4XlHptx4INhd_ekyJSEcIi-CqnDz4viE55NKstXlqGreo5IauRfDoBImBcUQLIdXHieuKy1pnS0hYy-QPdqrIRshx5SaO1wEix78mbi4b1wmC-nDHHAr446iEqSx_NFoOSSmyIA7Mq1ukmG_5yFgIyNzIww6eGMbd5-NkffxGGFNi87E0l5B3a4--Dqlb4zC1RdMLcoRwHgCmXicB5Q9cxOInrLdyZQ"}
algorithm
RS256
2020-09-01 12:53:29 INFO
EncryptIdToken
Skipped evaluation due to missing required element: client id_token_encrypted_response_alg
path
id_token_encrypted_response_alg
mapped
object
client
2020-09-01 12:53:29 SUCCESS
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "EP_Xbq1PoSwZKVeDktGHSm9R5d1DJvUHXyMIiWH_qNA"
}
2020-09-01 12:53:29 SUCCESS
AddCodeToAuthorizationEndpointResponseParams
Added code to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "EP_Xbq1PoSwZKVeDktGHSm9R5d1DJvUHXyMIiWH_qNA",
  "code": "7d5eIE5YE6"
}
2020-09-01 12:53:29 SUCCESS
AddIdTokenToAuthorizationEndpointResponseParams
Added id_token to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "EP_Xbq1PoSwZKVeDktGHSm9R5d1DJvUHXyMIiWH_qNA",
  "code": "7d5eIE5YE6",
  "id_token": "eyJraWQiOiI5MDk0NjFhYy02ZjQ2LTQyMWEtOTM3Yy02NThlMzU1ODEwMGIiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiQWNGUGt4TUxNM25oclF5c1NrRS1jdyIsImF1ZCI6ImNsaWVudF93Zk5SaWRSdG1nT0x6eGE0MjkzOCcnfjwmIiwiY19oYXNoIjoiRHRXU0wzUzhLWkpsdkZKMTVqVnZ6QSIsImlzcyI6Imh0dHBzOlwvXC93d3cuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0XC90ZXN0XC9ZWm43QjZvYXgxbmM0TTZcLyIsImV4cCI6MTU5ODk2NTEwOSwibm9uY2UiOiJsX0d2TE9Yekk0bDhkRHlFN21TSUZ6TUJmODhNUGo2NG9jaGVRN0FER2lNIiwiaWF0IjoxNTk4OTY0ODA5fQ.Ww2agxGA-6A9vIp5HVeHqDx9_gddofkEZj7ICwuSwFuQKQrwzMOGdtDdNLkEWMYB1Lt6Wj_gqa5F65HDbFwVfeGb5_a5RvSa-tzJxFQ_qf2Drr9JKlP0ogGdrqQCtLu0DbBhxSBYcUD2n4H8hmxkZzet7-ByEWoTdOGAU5dExLvlD26lkheLWX7pS9am1FKf_DER4M1fHHTGIsDCBfCu-tQfN5o-uSNpScKOWDutpv8jb7F5tNWMe1mX-pnP_hvKUYxANTIr2BXHWhuoOn3ery27G9WIOdOzBxAsQ2Cag-Q0x5WUfOZEHy0coivmBzcnKuNjs8FCJ6w9eovrME5A_A"
}
2020-09-01 12:53:29
AddTokenToAuthorizationEndpointResponseParams
Added token and token_type to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "EP_Xbq1PoSwZKVeDktGHSm9R5d1DJvUHXyMIiWH_qNA",
  "code": "7d5eIE5YE6",
  "id_token": "eyJraWQiOiI5MDk0NjFhYy02ZjQ2LTQyMWEtOTM3Yy02NThlMzU1ODEwMGIiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiQWNGUGt4TUxNM25oclF5c1NrRS1jdyIsImF1ZCI6ImNsaWVudF93Zk5SaWRSdG1nT0x6eGE0MjkzOCcnfjwmIiwiY19oYXNoIjoiRHRXU0wzUzhLWkpsdkZKMTVqVnZ6QSIsImlzcyI6Imh0dHBzOlwvXC93d3cuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0XC90ZXN0XC9ZWm43QjZvYXgxbmM0TTZcLyIsImV4cCI6MTU5ODk2NTEwOSwibm9uY2UiOiJsX0d2TE9Yekk0bDhkRHlFN21TSUZ6TUJmODhNUGo2NG9jaGVRN0FER2lNIiwiaWF0IjoxNTk4OTY0ODA5fQ.Ww2agxGA-6A9vIp5HVeHqDx9_gddofkEZj7ICwuSwFuQKQrwzMOGdtDdNLkEWMYB1Lt6Wj_gqa5F65HDbFwVfeGb5_a5RvSa-tzJxFQ_qf2Drr9JKlP0ogGdrqQCtLu0DbBhxSBYcUD2n4H8hmxkZzet7-ByEWoTdOGAU5dExLvlD26lkheLWX7pS9am1FKf_DER4M1fHHTGIsDCBfCu-tQfN5o-uSNpScKOWDutpv8jb7F5tNWMe1mX-pnP_hvKUYxANTIr2BXHWhuoOn3ery27G9WIOdOzBxAsQ2Cag-Q0x5WUfOZEHy0coivmBzcnKuNjs8FCJ6w9eovrME5A_A",
  "access_token": "MnG8N3xcvbuhP3APoIQNSCcvAsznuOoAdS3QiPJ8rhqjpJqegu",
  "token_type": "Bearer"
}
2020-09-01 12:53:29 OUTGOING
oidcc-client-test-missing-sub
Response to HTTP request to test instance YZn7B6oax1nc4M6
outgoing
ModelAndView [view="formPostResponseMode"; model={formAction=https://rp.example.com/cb, formParameters={"state":"EP_Xbq1PoSwZKVeDktGHSm9R5d1DJvUHXyMIiWH_qNA","code":"7d5eIE5YE6","id_token":"eyJraWQiOiI5MDk0NjFhYy02ZjQ2LTQyMWEtOTM3Yy02NThlMzU1ODEwMGIiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiQWNGUGt4TUxNM25oclF5c1NrRS1jdyIsImF1ZCI6ImNsaWVudF93Zk5SaWRSdG1nT0x6eGE0MjkzOCcnfjwmIiwiY19oYXNoIjoiRHRXU0wzUzhLWkpsdkZKMTVqVnZ6QSIsImlzcyI6Imh0dHBzOlwvXC93d3cuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0XC90ZXN0XC9ZWm43QjZvYXgxbmM0TTZcLyIsImV4cCI6MTU5ODk2NTEwOSwibm9uY2UiOiJsX0d2TE9Yekk0bDhkRHlFN21TSUZ6TUJmODhNUGo2NG9jaGVRN0FER2lNIiwiaWF0IjoxNTk4OTY0ODA5fQ.Ww2agxGA-6A9vIp5HVeHqDx9_gddofkEZj7ICwuSwFuQKQrwzMOGdtDdNLkEWMYB1Lt6Wj_gqa5F65HDbFwVfeGb5_a5RvSa-tzJxFQ_qf2Drr9JKlP0ogGdrqQCtLu0DbBhxSBYcUD2n4H8hmxkZzet7-ByEWoTdOGAU5dExLvlD26lkheLWX7pS9am1FKf_DER4M1fHHTGIsDCBfCu-tQfN5o-uSNpScKOWDutpv8jb7F5tNWMe1mX-pnP_hvKUYxANTIr2BXHWhuoOn3ery27G9WIOdOzBxAsQ2Cag-Q0x5WUfOZEHy0coivmBzcnKuNjs8FCJ6w9eovrME5A_A","access_token":"MnG8N3xcvbuhP3APoIQNSCcvAsznuOoAdS3QiPJ8rhqjpJqegu","token_type":"Bearer"}}]
outgoing_path
authorize
2020-09-01 12:53:31 FINISHED
oidcc-client-test-missing-sub
Test has run to completion
testmodule_result
PASSED
Test Results