Test Summary

Test Results

Expand All Collapse All
All times are UTC
2020-09-01 12:53:54 INFO
TEST-RUNNER
Test instance pgFvMBFaoZQvzAN created
baseUrl
https://www.certification.openid.net/test/pgFvMBFaoZQvzAN
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code id_token token",
  "request_type": "plain_http_request",
  "response_mode": "form_post",
  "client_registration": "dynamic_client"
}
alias

                                
description
test suite runner for openid-client
planId
l0lJMpv444Mye
config
{
  "description": "test suite runner for openid-client",
  "waitTimeoutSeconds": 2
}
testName
oidcc-client-test-kid-absent-multiple-jwks
2020-09-01 12:53:54 SUCCESS
OIDCCGenerateServerConfiguration
Generated default server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/pgFvMBFaoZQvzAN/",
  "authorization_endpoint": "https://www.certification.openid.net/test/pgFvMBFaoZQvzAN/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/pgFvMBFaoZQvzAN/token",
  "jwks_uri": "https://www.certification.openid.net/test/pgFvMBFaoZQvzAN/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/pgFvMBFaoZQvzAN/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/pgFvMBFaoZQvzAN/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post",
    "client_secret_jwt",
    "private_key_jwt"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2020-09-01 12:53:54
SetTokenEndpointAuthMethodsSupportedToClientSecretBasicOnly
Changed token_endpoint_auth_methods_supported to client_secret_basic only in server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/pgFvMBFaoZQvzAN/",
  "authorization_endpoint": "https://www.certification.openid.net/test/pgFvMBFaoZQvzAN/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/pgFvMBFaoZQvzAN/token",
  "jwks_uri": "https://www.certification.openid.net/test/pgFvMBFaoZQvzAN/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/pgFvMBFaoZQvzAN/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/pgFvMBFaoZQvzAN/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2020-09-01 12:53:55
OIDCCGenerateServerJWKsMultipleSigningsKeyWithNoKeyIds
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "5wIJPjFDlRucpEUPeJtVhfrtUFAdhnQJPDka5WMNN939tjrcnLclPn8quvusQL71lhIGwU-npNOnvrK1NZ3ohOSqn1r3GPZZRPU-MAnCHTd0hbUimqL-Bhypx6ya0INqFNyhlhUwklzDFYqVbz-aYYp9c7bb72GuQevyhG3YZJU",
      "kty": "RSA",
      "q": "tnC_2Kqme4bYxCbOuBwQ4k1Y6mM49JA_phiG300Rvsd5eQny147MKag4O_wVQ8OSy0HFOiGKCNn_3J67-FaHMiNqHQoI9jMgcLiTm-MjPdrtRRdruUmm73mreAyUmn4k3hn9JHQmMmAQI8aIluI-7JUMrZmCsfFvkqVxBO6EbMk",
      "d": "BZENu3XsWdGfPRJd6sBXvav9o0XFluoSdNT6vW-w5n7tjBxUChEzTtzk9LofoMwuHa39BC2rW6JxVEa7VggcmHsB8OmUFlMPcPPNy3eaqevJ1OIPpCj5L99K42nSG5_WFZUGqsW8eeCq45kMkuS-fprhXXU67ePtbKk0ceBTZsQ0E0aoUU5kZ05qDMNYhhh_tiYIRjQkS_QIothgSjRALKLKZS6IHqcGKbU4qQaAlm7Ep7oOh8tvkhPpCh0WfRzTsuwHuG9JAhSewEjfRi5pSPvXawygX34ryo8ni0LPBKwcF2HoVYEhqXjqVUR_ZahXC5INwcd1uvbtK9gGZaZhAQ",
      "e": "AQAB",
      "use": "sig",
      "qi": "aAjQ8ao9THVo6wCIdtmAqYjA1YwCYTy6WeTIWamN36vdv2TlXNGxlCwkyq9iGX28kUuXRqal-Cv8XmAsaJD8nBTFe46dDKIL7m1wz9xqYUJO4diFbRfQWALCv4OSdQpYv_W1SmsGV-ziENM8TsFwBsSYEQhb-xB2RSdlKMylBuA",
      "dp": "yqaKnThyZRf37lN3IwKBoCtkjBP8ErswbthZs-mU6vGfZIF2jzRLQ-wi_C1UCuh6YNAnhOXv1zSl7zCurv57wDkpROpz4j4aSdgqWdH1q9O-MJ2aYbWiypHSjwvoNAtUwEBcsGCeX4dozDjqptFRCUiIjT5Y6kLyr3nhIjOKpZE",
      "dq": "PEE-y4OJGrEttJMQoTP7y5I6NKdyrytZKjVdjjC5FKZzEyva_aCXA4cgk4ctSsU0HVdqmUlseoHthGMUt-90FXYm3NJspUu7gh8j-U9qW0qMJM6YcIjHzr4DiNG23tOcv5IbzkdiOi8KBZbTk-nDWIXduxRBWx3feLKVgkh4iik",
      "n": "pKEwlErWYbrO3f2SnOku53pgB8mSkCJacZwjZfEFVe37uucQczRgH3IdwuWzoT-kuGMzFKRzrJGrwDzznJYFnRDqRbh9raYYfhB9mvaKzepAxU068Ui0UHWw1RtwdKwYp6Ml3lBRSK5MRrF2wGIfzy1IIC8tpUwqlKLI55kZxbyhFcIcZmS3pY6Eg5iQEwNEFS7xQT-qKUpWoxPOOll2SWOqLryooGobh-Sf5EBRU1MiTwbtyxFCL3Fwk8RtDcXCF8LJ2VVATT6oYf4bS9Hi24Xhxo3Mi2-8XzjXkbeJcb8YVZSHo2KvyDaNNUGulVeJuRTpYZuR5MCAyXC77CnU_Q"
    },
    {
      "kty": "EC",
      "d": "9FqcnDCA_0nRMCvDy6JqPrzPnzU5i0hccUZujLjr01A",
      "use": "sig",
      "crv": "P-256",
      "x": "ADu86-YvJ6GyW7LuN1idrd-VRZAknOyGNSfzDD4UWzQ",
      "y": "WouF0yFepUSkHt2TRrs9v7slH5NEISV5sI2QCcpVcH0"
    },
    {
      "kty": "EC",
      "d": "dhusCzW2_b7Ja445HvOI9CUkytdivqruMuWAl2oYnK0",
      "use": "sig",
      "crv": "secp256k1",
      "x": "QqwO1wAhhfsUX4f4KvySOsSeaWO4lA1TjiRMkIw7Tuk",
      "y": "3eY-qvVYSnyJ1UqAf-44AhTufFA1WqvVGfH_NIm_nVY"
    },
    {
      "kty": "OKP",
      "d": "IoRmF-AzNDw0Wr9eumXd4smZegZE-qJIKUNc-IYBp9s",
      "use": "sig",
      "crv": "Ed25519",
      "x": "20tu5Wcq8P-KWjUYZCtew1LzLjNM4BVWVZowmrWwk6I"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "3QAPP6ABo6j4CT02ZnOqPviD31aX29QVmHYnbpnuDft-TmY4HVgWm57NHP7YlrXBSwODwWxKTQc4lRmRVjVxDAMI0e4Pt1zVG207slhDbWc9TiQuM20KlTptupP37UpB3rEd-0owwOeNn3yDe_uqJLuw5_zMFp_ZouUVLHZx4Mk",
      "kty": "RSA",
      "q": "weefh_PcGnyXIgiIGyKD-5Vqu5_mz51fV0A1jNy1iMTYgk-N-gNZMSaKimKq5XOicKfQhy0-SxlQXWZ8CiJ6srVd9hxwdnpnBPN5ZTmDEgL6P5yeS0EYgNK9y10lRU5EsaRffWZnJ6C8rZNu0OF-osa12jKJCwNSnqcv_hZlIqk",
      "d": "STdTI-lvSlPM0OPXfR-aO1jZzQZyghDbep02pdVcsqtW8AI3yjGeDvr_Ipvsyf6Kp5CXT-0Ldp2y8LiG1wUzfkbmvvDDE6JyruhvoAGVzDGZBpc1UCbe6vCQm3710FANdLSji_ThXUF0uC4tl5vJpxyfGn-x-RB35o9kCFaOIg5yfOANXoKV6ymaW-6E8lAd3hpcb7DDQrtDJEG8on-sDHQtm8Gn7nQD7pmH07TTqao35vufQVueBfsmSnBOrtbuiTah3Dtoye0AvvfZ2M8_BmwhVB4Pgayvr7j_jJBqN7FUZRTJ7GiXozb5y0Y5qw1kclRSsNvQZDsyYVdInLh5QQ",
      "e": "AQAB",
      "use": "enc",
      "qi": "hVIuKXP-FrcagEvZPJ5cvcjsaV-CJBOvgjiPBXcPujAZybhCpgmIptYylsANKXsfmkqgaA2AHLgaAJIkyMsblkZS-tffXiaYQn8wxx6E6F23ka6Zy7arkQ4AM-I0CGcOYCTqfdHojFnLmuxXJPylJyRk_jdWKkHUKq1MorJqNCA",
      "dp": "bQgTfdNmG6VIQd6mUSNtccXP4cbqAvV-dgqM578fuFxEc09xDeEgvkQ5c72zg59GLskcHrhba-dNHhpQHtUc4c05c8Dclh1BsldQ5WswUPBnSX8GIC8C0p7R9gP8hGBnYQPHA-wVY4aZ035trCR8S8UhwUJyOhNBH2Gf8aC6DCk",
      "alg": "RSA-OAEP",
      "dq": "s6EHQMLAHClfOL_-lmSbL-1zOu0evSZktEdfVGcCJPl2OQHJ3NpNPiMeJKTS_EzrJsHPg-p90sRYlq3iKuFWGUe7C8u8w4UQ-p0y0Hs-2Oi5O0Szv7NGJ9ES0dowNMwVBxvm-hxrY2KcZ5A1EHxU_CZpQQGfwvwJBcCLzS6h8kE",
      "n": "p2UARSEQPi-FlVrWiwsvObGCSiUzi0BlRR8Lro03wUVO3JT_tX6PWAozMAMjZFArEKYsY_THC6o-Mo-n-XaK3lfw-iDLO1KfCHeosmlYa-DJ-sTHgd0bsUwvJ6hY8ZyCZU-w_GwuWhCljhZcTmygh4SGfUCC0w4zF9Rw6wJROMQ1dB1cwwwETfCZaUdObgdK0byCNRC_491IOsvWtyqb3qk6kxkZi9Kz1TCPDj_GfN-JRlqZifmdxtO8XgN5JTxEnIe1si_Y3h5dxHpoDOL59bCgLfHrlp_FhslCtQ3u22UjBCsYH5SYbkWBWqS6K3uG9t_MFPAQdsZBJFTCRlUWsQ"
    },
    {
      "kty": "EC",
      "d": "rpPnzNEEWEPJ4OOl-tKXju7_fFWUZHie02T_uPQG8Kk",
      "use": "enc",
      "crv": "P-256",
      "x": "bOt9wd8McSr3BFI7cw-dhkQJ6a-Ga1mO2C9c8nZ3jTE",
      "y": "OEH1eruvoU6Ht-cT3saKF_b5HR3r4LFZIHwtmpHWmB4",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "n": "pKEwlErWYbrO3f2SnOku53pgB8mSkCJacZwjZfEFVe37uucQczRgH3IdwuWzoT-kuGMzFKRzrJGrwDzznJYFnRDqRbh9raYYfhB9mvaKzepAxU068Ui0UHWw1RtwdKwYp6Ml3lBRSK5MRrF2wGIfzy1IIC8tpUwqlKLI55kZxbyhFcIcZmS3pY6Eg5iQEwNEFS7xQT-qKUpWoxPOOll2SWOqLryooGobh-Sf5EBRU1MiTwbtyxFCL3Fwk8RtDcXCF8LJ2VVATT6oYf4bS9Hi24Xhxo3Mi2-8XzjXkbeJcb8YVZSHo2KvyDaNNUGulVeJuRTpYZuR5MCAyXC77CnU_Q"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "n": "1bFnAlFtC_8hUzE-sij7WzsJHRW1_cQ9MT6siv3IEV_50-0o7QQsPfcqqtbzDp99btwdyQOeGVIG26CdVLRLiWkTUC6V6wVOHpo7Hb5SJJeNw8x3Abjc8GLkys_h44pHyhzxKdDFDTCNGV-K_ZZHNrnpA1sIy3ZZPVU5l6-2h96KzmxGBtsiH1WY5aX_8oeq4eL5UEfNZmuCN1iwesEYICfpDtQjdm7yDVSQutfcoD3MO5zT8NATdlhHT2K9TWEw8-iMm_GIs1nen1knra5gB3qWn19jIZgUjVgsk3FABFDe5kZ2mlZI2YhoOBGGFYL6-IYEqbUXKssAUvP-6e75rQ"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "n": "to7-rK6YF6hcTK5aCshCJr9_l7deGTEhIDjQW5RLSVBJg_8JNfaGsN1mlNToDxcytmC3FZn6sKlC-B5pvYsD7x9Lp2KlObgkqRyLhVn7QKXNSqoDA-0cRY1ujL_eiXY_9K_u6BPGUfdCECB1JrtPXYXHDIF7KUFpkjBnN0IhDpcUyRngBcVICir2BX8GN2yTKjWDyN10aMpEiRAPQ4XOoiqqgv2VmuheHVubodgjHmhXgP8N3kYQsNf7_zg64-V20A2iE33XA5vcoXkBK5Lb-39shSno0Dbo7VocQvAHJEdcTIWYdw2mBWHPuhJ9HiF31QbzECVaeJoQjIl9JzXK_Q"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "x": "ADu86-YvJ6GyW7LuN1idrd-VRZAknOyGNSfzDD4UWzQ",
      "y": "WouF0yFepUSkHt2TRrs9v7slH5NEISV5sI2QCcpVcH0"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "x": "PKFSrugvdxWv95WRBomMV2AXTO9uGVYJcHiy7iZZZa0",
      "y": "iA2aXIxoa2CkQXKlFdgS2nxLZnc_aNwhlR6qEdcudyU"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "x": "8pkSNidjFEivyj9yei6HyUlnu24BZ_zvumtPoLJrU-Y",
      "y": "v8n6g2BNgkQrsQzDJWShtvoeaPIthMkAx9lh725Z-y8"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "x": "cwx0rOtY5QNMNB6GGlTTV3ZXCSjqqfkmFA9Rz2yhvWc",
      "y": "F6QKUZfyZK9f9yUxAeEMZLt4qIcCyr0RuNOhlVMkRX8"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "x": "QqwO1wAhhfsUX4f4KvySOsSeaWO4lA1TjiRMkIw7Tuk",
      "y": "3eY-qvVYSnyJ1UqAf-44AhTufFA1WqvVGfH_NIm_nVY"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "x": "byQWD31nw1W0XBY0TSmY0IdbqYga2UjYnfwXJk6_PHE",
      "y": "AUGEhSCH8cmSx-83EwZHg6AsUDss1CNzm4QrbEnhfUE"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "x": "1wxPlRkTTnVw-cU4Od_KOg-arqf55EC2KguUQTBMm28"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "x": "20tu5Wcq8P-KWjUYZCtew1LzLjNM4BVWVZowmrWwk6I"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "x": "oChejbuZglH3YGVydpt3SbtXWTcmafIgWz9gbjC-d_M"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "alg": "RSA-OAEP",
      "n": "p2UARSEQPi-FlVrWiwsvObGCSiUzi0BlRR8Lro03wUVO3JT_tX6PWAozMAMjZFArEKYsY_THC6o-Mo-n-XaK3lfw-iDLO1KfCHeosmlYa-DJ-sTHgd0bsUwvJ6hY8ZyCZU-w_GwuWhCljhZcTmygh4SGfUCC0w4zF9Rw6wJROMQ1dB1cwwwETfCZaUdObgdK0byCNRC_491IOsvWtyqb3qk6kxkZi9Kz1TCPDj_GfN-JRlqZifmdxtO8XgN5JTxEnIe1si_Y3h5dxHpoDOL59bCgLfHrlp_FhslCtQ3u22UjBCsYH5SYbkWBWqS6K3uG9t_MFPAQdsZBJFTCRlUWsQ"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "x": "bOt9wd8McSr3BFI7cw-dhkQJ6a-Ga1mO2C9c8nZ3jTE",
      "y": "OEH1eruvoU6Ht-cT3saKF_b5HR3r4LFZIHwtmpHWmB4",
      "alg": "ECDH-ES"
    }
  ]
}
2020-09-01 12:53:55 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2020-09-01 12:53:55 SUCCESS
OIDCCLoadUserInfo
Added user information
user_info
{
  "sub": "user-subject-1234531",
  "name": "Demo T. User",
  "given_name": "Demo",
  "family_name": "User",
  "middle_name": "Theresa",
  "nickname": "Dee",
  "preferred_username": "d.tu",
  "gender": "female",
  "birthdate": "2000-02-03",
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "zoneinfo": "America/Los_Angeles",
  "locale": "en-US",
  "phone_number": "+1 555 5550000",
  "phone_number_verified": false,
  "email": "user@example.com",
  "email_verified": false,
  "website": "https://openid.net/",
  "updated_at": "1580000000"
}
2020-09-01 12:53:55 SUCCESS
GetDynamicClientConfiguration
No client details on configuration, created an empty dynamic_client_registration_template object.
2020-09-01 12:53:55
oidcc-client-test-kid-absent-multiple-jwks
Setup Done
2020-09-01 12:53:58 INCOMING
oidcc-client-test-kid-absent-multiple-jwks
Incoming HTTP request to test instance pgFvMBFaoZQvzAN
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
.well-known/openid-configuration
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Discovery endpoint
2020-09-01 12:53:58 OUTGOING
oidcc-client-test-kid-absent-multiple-jwks
Response to HTTP request to test instance pgFvMBFaoZQvzAN
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "issuer": "https://www.certification.openid.net/test/pgFvMBFaoZQvzAN/",
  "authorization_endpoint": "https://www.certification.openid.net/test/pgFvMBFaoZQvzAN/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/pgFvMBFaoZQvzAN/token",
  "jwks_uri": "https://www.certification.openid.net/test/pgFvMBFaoZQvzAN/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/pgFvMBFaoZQvzAN/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/pgFvMBFaoZQvzAN/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
outgoing_path
.well-known/openid-configuration
2020-09-01 12:53:58 INCOMING
oidcc-client-test-kid-absent-multiple-jwks
Incoming HTTP request to test instance pgFvMBFaoZQvzAN
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "content-type": "application/json",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "187",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
register
incoming_body_form_params
incoming_method
POST
incoming_body_json
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ]
}
incoming_query_string_params
{}
incoming_body
{"token_endpoint_auth_method":"client_secret_basic","response_types":["code id_token token"],"grant_types":["authorization_code","implicit"],"redirect_uris":["https://rp.example.com/cb"]}
Registration endpoint
2020-09-01 12:53:58 SUCCESS
OIDCCExtractDynamicRegistrationRequest
Extracted dynamic client registration request
request
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ]
}
2020-09-01 12:53:58 INFO
EnsureRegistrationRequestContainsAtLeastOneContact
This application requires that registration requests contain at least one contact.
2020-09-01 12:53:58 SUCCESS
ValidateClientGrantTypes
grant_types match response_types
grant_types
[
  "authorization_code",
  "implicit"
]
response_types
[
  "code id_token token"
]
2020-09-01 12:53:58 SUCCESS
OIDCCValidateClientRedirectUris
Valid redirect_uri(s) provided in registration request
redirect_uris
[
  "https://rp.example.com/cb"
]
2020-09-01 12:53:58 SUCCESS
ValidateClientLogoUris
Client does not contain any logo_uri
2020-09-01 12:53:58 SUCCESS
ValidateClientUris
Client does not contain any client_uri
2020-09-01 12:53:58 SUCCESS
ValidateClientPolicyUris
Client does not contain any policy_uri
2020-09-01 12:53:58 SUCCESS
ValidateClientTosUris
Client does not contain any tos_uri
2020-09-01 12:53:58 SUCCESS
ValidateClientSubjectType
A subject_type was not provided
2020-09-01 12:53:58 INFO
ValidateIdTokenSignedResponseAlg
Skipped evaluation due to missing required element: client id_token_signed_response_alg
path
id_token_signed_response_alg
mapped
object
client
2020-09-01 12:53:58 SUCCESS
EnsureIdTokenEncryptedResponseAlgIsSetIfEncIsSet
id_token_encrypted_response_enc is not set
2020-09-01 12:53:58 INFO
ValidateUserinfoSignedResponseAlg
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2020-09-01 12:53:58 SUCCESS
EnsureUserinfoEncryptedResponseAlgIsSetIfEncIsSet
userinfo_encrypted_response_enc is not set
2020-09-01 12:53:58 INFO
ValidateRequestObjectSigningAlg
Skipped evaluation due to missing required element: client request_object_signing_alg
path
request_object_signing_alg
mapped
object
client
2020-09-01 12:53:58 SUCCESS
EnsureRequestObjectEncryptionAlgIsSetIfEncIsSet
request_object_encryption_enc is not set
2020-09-01 12:53:58 INFO
ValidateTokenEndpointAuthSigningAlg
Skipped evaluation due to missing required element: client token_endpoint_auth_signing_alg
path
token_endpoint_auth_signing_alg
mapped
object
client
2020-09-01 12:53:58 SUCCESS
ValidateDefaultMaxAge
default_max_age is not set
2020-09-01 12:53:58 INFO
ValidateRequireAuthTime
Skipped evaluation due to missing required element: client require_auth_time
path
require_auth_time
mapped
object
client
2020-09-01 12:53:58 INFO
ValidateDefaultAcrValues
Skipped evaluation due to missing required element: client default_acr_values
path
default_acr_values
mapped
object
client
2020-09-01 12:53:58 INFO
ValidateInitiateLoginUri
Skipped evaluation due to missing required element: client initiate_login_uri
path
initiate_login_uri
mapped
object
client
2020-09-01 12:53:58 INFO
ValidateRequestUris
Skipped evaluation due to missing required element: client request_uris
path
request_uris
mapped
object
client
2020-09-01 12:53:58 SUCCESS
ValidateClientRegistrationRequestSectorIdentifierUri
A sector_identifier_uri was not provided
2020-09-01 12:53:58 SUCCESS
OIDCCRegisterClient
Registered client
client
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_YFRponyqsETGQnT23203?%:/("
}
2020-09-01 12:53:58
OIDCCCreateClientSecretForDynamicClient
Set the secret for registered client
client_secret
secret_ZalOqaLQMJXgnabsebgDSiBMIXnbJxpfnbTCZKssmrELOHYdVx3817118304#|`!#
2020-09-01 12:53:58 SUCCESS
EnsureTokenEndPointAuthMethodIsClientSecretBasic
token_endpoint_auth_method is 'client_secret_basic' as expected
2020-09-01 12:53:58 SUCCESS
EnsureClientDoesNotHaveBothJwksAndJwksUri
Client does not have both jwks and jwks_uri set
client
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_YFRponyqsETGQnT23203?%:/(",
  "client_secret": "secret_ZalOqaLQMJXgnabsebgDSiBMIXnbJxpfnbTCZKssmrELOHYdVx3817118304#|`!#"
}
2020-09-01 12:53:58 INFO
FetchClientKeys
Skipped evaluation due to missing required element: client jwks_uri
path
jwks_uri
mapped
object
client
2020-09-01 12:53:58
SetServerSigningAlgToRS256
Successfully set signing algorithm to RS256
2020-09-01 12:53:58
SetClientIdTokenSignedResponseAlgToServerSigningAlg
Set id_token_signed_response_alg for the registered client
id_token_signed_response_alg
RS256
2020-09-01 12:53:58 OUTGOING
oidcc-client-test-kid-absent-multiple-jwks
Response to HTTP request to test instance pgFvMBFaoZQvzAN
outgoing_status_code
201
outgoing_headers
{}
outgoing_body
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_YFRponyqsETGQnT23203?%:/(",
  "client_secret": "secret_ZalOqaLQMJXgnabsebgDSiBMIXnbJxpfnbTCZKssmrELOHYdVx3817118304#|`!#",
  "id_token_signed_response_alg": "RS256"
}
outgoing_path
register
2020-09-01 12:53:59 INCOMING
oidcc-client-test-kid-absent-multiple-jwks
Incoming HTTP request to test instance pgFvMBFaoZQvzAN
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "got/9.6.0 (https://github.com/sindresorhus/got)",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
authorize
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "client_id": "client_YFRponyqsETGQnT23203?%:/(",
  "scope": "openid",
  "response_type": "code id_token token",
  "redirect_uri": "https://rp.example.com/cb",
  "state": "gF4zVSm82YRAzP814Cjegd-Eeq_EM5GDOI-NGQxJneI",
  "nonce": "UUTmo_saUgK1EjwAC98ZZsEo5yelrj50VH8dBOOHYOs",
  "response_mode": "form_post"
}
incoming_body
Authorization endpoint
2020-09-01 12:53:59 SUCCESS
EnsureRequestDoesNotContainRequestObject
Request does not contain a request parameter
2020-09-01 12:53:59 SUCCESS
OIDCCEnsureAuthorizationHttpRequestContainsOpenIDScope
Found 'openid' in scope http request parameter
actual
[
  "openid"
]
expected
openid
2020-09-01 12:53:59 SUCCESS
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
effective_authorization_endpoint_request
{
  "client_id": "client_YFRponyqsETGQnT23203?%:/(",
  "scope": "openid",
  "response_type": "code id_token token",
  "redirect_uri": "https://rp.example.com/cb",
  "state": "gF4zVSm82YRAzP814Cjegd-Eeq_EM5GDOI-NGQxJneI",
  "nonce": "UUTmo_saUgK1EjwAC98ZZsEo5yelrj50VH8dBOOHYOs",
  "response_mode": "form_post"
}
2020-09-01 12:53:59 SUCCESS
ExtractRequestedScopes
Requested scopes
scope
openid
2020-09-01 12:53:59 SUCCESS
ExtractNonceFromAuthorizationRequest
Extracted nonce
nonce
UUTmo_saUgK1EjwAC98ZZsEo5yelrj50VH8dBOOHYOs
2020-09-01 12:53:59 SUCCESS
EnsureResponseTypeIsCodeIdTokenToken
Response type is expected value
expected
code id_token token
2020-09-01 12:53:59 SUCCESS
EnsureMatchingClientId
Client ID matched
client_id
client_YFRponyqsETGQnT23203?%:/(
2020-09-01 12:53:59 SUCCESS
EnsureValidRedirectUriForAuthorizationEndpointRequest
redirect_uri is one of the allowed redirect uris
actual
https://rp.example.com/cb
expected
[
  "https://rp.example.com/cb"
]
2020-09-01 12:53:59 SUCCESS
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
actual
[
  "openid"
]
expected
openid
2020-09-01 12:53:59 SUCCESS
DisallowMaxAgeEqualsZeroAndPromptNone
The client did not send max_age=0 and prompt=none parameters as expected
2020-09-01 12:53:59 SUCCESS
CreateAuthorizationCode
Created authorization code
authorization_code
bOnfnBHVxX
2020-09-01 12:53:59 SUCCESS
CalculateCHash
Successful c_hash encoding
c_hash
AwVUaiNnF8Rs-aQi-NhHew
2020-09-01 12:53:59 SUCCESS
GenerateBearerAccessToken
Generated access token
access_token
6Jz2Nnte0CcMhQ6LatMTsJDFMygWVXO9TVJ4KSIh618zMfQt2a
2020-09-01 12:53:59 SUCCESS
CalculateAtHash
Successful at_hash encoding
at_hash
heyzbGzxjyvtXn4CLLdRPQ
2020-09-01 12:53:59 SUCCESS
GenerateIdTokenClaims
Created ID Token Claims
iss
https://www.certification.openid.net/test/pgFvMBFaoZQvzAN/
sub
user-subject-1234531
aud
client_YFRponyqsETGQnT23203?%:/(
nonce
UUTmo_saUgK1EjwAC98ZZsEo5yelrj50VH8dBOOHYOs
iat
1598964839
exp
1598965139
2020-09-01 12:53:59 SUCCESS
AddCHashToIdTokenClaims
Added c_hash to ID token claims
c_hash
AwVUaiNnF8Rs-aQi-NhHew
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/pgFvMBFaoZQvzAN/",
  "sub": "user-subject-1234531",
  "aud": "client_YFRponyqsETGQnT23203?%:/(",
  "nonce": "UUTmo_saUgK1EjwAC98ZZsEo5yelrj50VH8dBOOHYOs",
  "iat": 1598964839,
  "exp": 1598965139,
  "c_hash": "AwVUaiNnF8Rs-aQi-NhHew"
}
2020-09-01 12:53:59 SUCCESS
AddAtHashToIdTokenClaims
Added at_hash to ID token claims
at_hash
heyzbGzxjyvtXn4CLLdRPQ
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/pgFvMBFaoZQvzAN/",
  "sub": "user-subject-1234531",
  "aud": "client_YFRponyqsETGQnT23203?%:/(",
  "nonce": "UUTmo_saUgK1EjwAC98ZZsEo5yelrj50VH8dBOOHYOs",
  "iat": 1598964839,
  "exp": 1598965139,
  "c_hash": "AwVUaiNnF8Rs-aQi-NhHew",
  "at_hash": "heyzbGzxjyvtXn4CLLdRPQ"
}
2020-09-01 12:53:59 SUCCESS
OIDCCSignIdToken
Signed the ID token
id_token
eyJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiaGV5emJHenhqeXZ0WG40Q0xMZFJQUSIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X1lGUnBvbnlxc0VUR1FuVDIzMjAzPyU6XC8oIiwiY19oYXNoIjoiQXdWVWFpTm5GOFJzLWFRaS1OaEhldyIsImlzcyI6Imh0dHBzOlwvXC93d3cuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0XC90ZXN0XC9wZ0Z2TUJGYW9aUXZ6QU5cLyIsImV4cCI6MTU5ODk2NTEzOSwibm9uY2UiOiJVVVRtb19zYVVnSzFFandBQzk4WlpzRW81eWVscmo1MFZIOGRCT09IWU9zIiwiaWF0IjoxNTk4OTY0ODM5fQ.Brl_RSSu9gWMg6FOTGpYXctB2K5SpF5fBXZLxN7TzGvOOHPPj6ZTt_F5-xRq9EIkHlldx5Hz7tRpumrmi04j2PAERDjjwdahE8FXxqfZqjVuF51L7c0Cf-urRHHfLnScBFJ5stzFEg83qcRavl8_dtd8N9IxCYGRuOCcljzgLJldvALMBK46dflM1dGvkDcUCHYMQdVH-bEa2IDZ2dFaFh3QSEP4-pEC1IuY4lC-80Qa37hQjTFOi9Fo3QivadybcOZTqjIOodEt-R_qLMxUr3MitFWwG_fS1isWlzj-EtCk2EZxvAGAxDxUqRkPKys81PP9awmzzhWvxZsU8NvcXg
key
{"p":"5wIJPjFDlRucpEUPeJtVhfrtUFAdhnQJPDka5WMNN939tjrcnLclPn8quvusQL71lhIGwU-npNOnvrK1NZ3ohOSqn1r3GPZZRPU-MAnCHTd0hbUimqL-Bhypx6ya0INqFNyhlhUwklzDFYqVbz-aYYp9c7bb72GuQevyhG3YZJU","kty":"RSA","q":"tnC_2Kqme4bYxCbOuBwQ4k1Y6mM49JA_phiG300Rvsd5eQny147MKag4O_wVQ8OSy0HFOiGKCNn_3J67-FaHMiNqHQoI9jMgcLiTm-MjPdrtRRdruUmm73mreAyUmn4k3hn9JHQmMmAQI8aIluI-7JUMrZmCsfFvkqVxBO6EbMk","d":"BZENu3XsWdGfPRJd6sBXvav9o0XFluoSdNT6vW-w5n7tjBxUChEzTtzk9LofoMwuHa39BC2rW6JxVEa7VggcmHsB8OmUFlMPcPPNy3eaqevJ1OIPpCj5L99K42nSG5_WFZUGqsW8eeCq45kMkuS-fprhXXU67ePtbKk0ceBTZsQ0E0aoUU5kZ05qDMNYhhh_tiYIRjQkS_QIothgSjRALKLKZS6IHqcGKbU4qQaAlm7Ep7oOh8tvkhPpCh0WfRzTsuwHuG9JAhSewEjfRi5pSPvXawygX34ryo8ni0LPBKwcF2HoVYEhqXjqVUR_ZahXC5INwcd1uvbtK9gGZaZhAQ","e":"AQAB","use":"sig","qi":"aAjQ8ao9THVo6wCIdtmAqYjA1YwCYTy6WeTIWamN36vdv2TlXNGxlCwkyq9iGX28kUuXRqal-Cv8XmAsaJD8nBTFe46dDKIL7m1wz9xqYUJO4diFbRfQWALCv4OSdQpYv_W1SmsGV-ziENM8TsFwBsSYEQhb-xB2RSdlKMylBuA","dp":"yqaKnThyZRf37lN3IwKBoCtkjBP8ErswbthZs-mU6vGfZIF2jzRLQ-wi_C1UCuh6YNAnhOXv1zSl7zCurv57wDkpROpz4j4aSdgqWdH1q9O-MJ2aYbWiypHSjwvoNAtUwEBcsGCeX4dozDjqptFRCUiIjT5Y6kLyr3nhIjOKpZE","dq":"PEE-y4OJGrEttJMQoTP7y5I6NKdyrytZKjVdjjC5FKZzEyva_aCXA4cgk4ctSsU0HVdqmUlseoHthGMUt-90FXYm3NJspUu7gh8j-U9qW0qMJM6YcIjHzr4DiNG23tOcv5IbzkdiOi8KBZbTk-nDWIXduxRBWx3feLKVgkh4iik","n":"pKEwlErWYbrO3f2SnOku53pgB8mSkCJacZwjZfEFVe37uucQczRgH3IdwuWzoT-kuGMzFKRzrJGrwDzznJYFnRDqRbh9raYYfhB9mvaKzepAxU068Ui0UHWw1RtwdKwYp6Ml3lBRSK5MRrF2wGIfzy1IIC8tpUwqlKLI55kZxbyhFcIcZmS3pY6Eg5iQEwNEFS7xQT-qKUpWoxPOOll2SWOqLryooGobh-Sf5EBRU1MiTwbtyxFCL3Fwk8RtDcXCF8LJ2VVATT6oYf4bS9Hi24Xhxo3Mi2-8XzjXkbeJcb8YVZSHo2KvyDaNNUGulVeJuRTpYZuR5MCAyXC77CnU_Q"}
algorithm
RS256
2020-09-01 12:53:59 INFO
EncryptIdToken
Skipped evaluation due to missing required element: client id_token_encrypted_response_alg
path
id_token_encrypted_response_alg
mapped
object
client
2020-09-01 12:53:59 SUCCESS
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "gF4zVSm82YRAzP814Cjegd-Eeq_EM5GDOI-NGQxJneI"
}
2020-09-01 12:53:59 SUCCESS
AddCodeToAuthorizationEndpointResponseParams
Added code to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "gF4zVSm82YRAzP814Cjegd-Eeq_EM5GDOI-NGQxJneI",
  "code": "bOnfnBHVxX"
}
2020-09-01 12:53:59 SUCCESS
AddIdTokenToAuthorizationEndpointResponseParams
Added id_token to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "gF4zVSm82YRAzP814Cjegd-Eeq_EM5GDOI-NGQxJneI",
  "code": "bOnfnBHVxX",
  "id_token": "eyJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiaGV5emJHenhqeXZ0WG40Q0xMZFJQUSIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X1lGUnBvbnlxc0VUR1FuVDIzMjAzPyU6XC8oIiwiY19oYXNoIjoiQXdWVWFpTm5GOFJzLWFRaS1OaEhldyIsImlzcyI6Imh0dHBzOlwvXC93d3cuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0XC90ZXN0XC9wZ0Z2TUJGYW9aUXZ6QU5cLyIsImV4cCI6MTU5ODk2NTEzOSwibm9uY2UiOiJVVVRtb19zYVVnSzFFandBQzk4WlpzRW81eWVscmo1MFZIOGRCT09IWU9zIiwiaWF0IjoxNTk4OTY0ODM5fQ.Brl_RSSu9gWMg6FOTGpYXctB2K5SpF5fBXZLxN7TzGvOOHPPj6ZTt_F5-xRq9EIkHlldx5Hz7tRpumrmi04j2PAERDjjwdahE8FXxqfZqjVuF51L7c0Cf-urRHHfLnScBFJ5stzFEg83qcRavl8_dtd8N9IxCYGRuOCcljzgLJldvALMBK46dflM1dGvkDcUCHYMQdVH-bEa2IDZ2dFaFh3QSEP4-pEC1IuY4lC-80Qa37hQjTFOi9Fo3QivadybcOZTqjIOodEt-R_qLMxUr3MitFWwG_fS1isWlzj-EtCk2EZxvAGAxDxUqRkPKys81PP9awmzzhWvxZsU8NvcXg"
}
2020-09-01 12:53:59
AddTokenToAuthorizationEndpointResponseParams
Added token and token_type to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "gF4zVSm82YRAzP814Cjegd-Eeq_EM5GDOI-NGQxJneI",
  "code": "bOnfnBHVxX",
  "id_token": "eyJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiaGV5emJHenhqeXZ0WG40Q0xMZFJQUSIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X1lGUnBvbnlxc0VUR1FuVDIzMjAzPyU6XC8oIiwiY19oYXNoIjoiQXdWVWFpTm5GOFJzLWFRaS1OaEhldyIsImlzcyI6Imh0dHBzOlwvXC93d3cuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0XC90ZXN0XC9wZ0Z2TUJGYW9aUXZ6QU5cLyIsImV4cCI6MTU5ODk2NTEzOSwibm9uY2UiOiJVVVRtb19zYVVnSzFFandBQzk4WlpzRW81eWVscmo1MFZIOGRCT09IWU9zIiwiaWF0IjoxNTk4OTY0ODM5fQ.Brl_RSSu9gWMg6FOTGpYXctB2K5SpF5fBXZLxN7TzGvOOHPPj6ZTt_F5-xRq9EIkHlldx5Hz7tRpumrmi04j2PAERDjjwdahE8FXxqfZqjVuF51L7c0Cf-urRHHfLnScBFJ5stzFEg83qcRavl8_dtd8N9IxCYGRuOCcljzgLJldvALMBK46dflM1dGvkDcUCHYMQdVH-bEa2IDZ2dFaFh3QSEP4-pEC1IuY4lC-80Qa37hQjTFOi9Fo3QivadybcOZTqjIOodEt-R_qLMxUr3MitFWwG_fS1isWlzj-EtCk2EZxvAGAxDxUqRkPKys81PP9awmzzhWvxZsU8NvcXg",
  "access_token": "6Jz2Nnte0CcMhQ6LatMTsJDFMygWVXO9TVJ4KSIh618zMfQt2a",
  "token_type": "Bearer"
}
2020-09-01 12:53:59 OUTGOING
oidcc-client-test-kid-absent-multiple-jwks
Response to HTTP request to test instance pgFvMBFaoZQvzAN
outgoing
ModelAndView [view="formPostResponseMode"; model={formAction=https://rp.example.com/cb, formParameters={"state":"gF4zVSm82YRAzP814Cjegd-Eeq_EM5GDOI-NGQxJneI","code":"bOnfnBHVxX","id_token":"eyJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiaGV5emJHenhqeXZ0WG40Q0xMZFJQUSIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X1lGUnBvbnlxc0VUR1FuVDIzMjAzPyU6XC8oIiwiY19oYXNoIjoiQXdWVWFpTm5GOFJzLWFRaS1OaEhldyIsImlzcyI6Imh0dHBzOlwvXC93d3cuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0XC90ZXN0XC9wZ0Z2TUJGYW9aUXZ6QU5cLyIsImV4cCI6MTU5ODk2NTEzOSwibm9uY2UiOiJVVVRtb19zYVVnSzFFandBQzk4WlpzRW81eWVscmo1MFZIOGRCT09IWU9zIiwiaWF0IjoxNTk4OTY0ODM5fQ.Brl_RSSu9gWMg6FOTGpYXctB2K5SpF5fBXZLxN7TzGvOOHPPj6ZTt_F5-xRq9EIkHlldx5Hz7tRpumrmi04j2PAERDjjwdahE8FXxqfZqjVuF51L7c0Cf-urRHHfLnScBFJ5stzFEg83qcRavl8_dtd8N9IxCYGRuOCcljzgLJldvALMBK46dflM1dGvkDcUCHYMQdVH-bEa2IDZ2dFaFh3QSEP4-pEC1IuY4lC-80Qa37hQjTFOi9Fo3QivadybcOZTqjIOodEt-R_qLMxUr3MitFWwG_fS1isWlzj-EtCk2EZxvAGAxDxUqRkPKys81PP9awmzzhWvxZsU8NvcXg","access_token":"6Jz2Nnte0CcMhQ6LatMTsJDFMygWVXO9TVJ4KSIh618zMfQt2a","token_type":"Bearer"}}]
outgoing_path
authorize
2020-09-01 12:53:59 INCOMING
oidcc-client-test-kid-absent-multiple-jwks
Incoming HTTP request to test instance pgFvMBFaoZQvzAN
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
jwks
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Jwks endpoint
2020-09-01 12:53:59 OUTGOING
oidcc-client-test-kid-absent-multiple-jwks
Response to HTTP request to test instance pgFvMBFaoZQvzAN
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "n": "pKEwlErWYbrO3f2SnOku53pgB8mSkCJacZwjZfEFVe37uucQczRgH3IdwuWzoT-kuGMzFKRzrJGrwDzznJYFnRDqRbh9raYYfhB9mvaKzepAxU068Ui0UHWw1RtwdKwYp6Ml3lBRSK5MRrF2wGIfzy1IIC8tpUwqlKLI55kZxbyhFcIcZmS3pY6Eg5iQEwNEFS7xQT-qKUpWoxPOOll2SWOqLryooGobh-Sf5EBRU1MiTwbtyxFCL3Fwk8RtDcXCF8LJ2VVATT6oYf4bS9Hi24Xhxo3Mi2-8XzjXkbeJcb8YVZSHo2KvyDaNNUGulVeJuRTpYZuR5MCAyXC77CnU_Q"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "n": "1bFnAlFtC_8hUzE-sij7WzsJHRW1_cQ9MT6siv3IEV_50-0o7QQsPfcqqtbzDp99btwdyQOeGVIG26CdVLRLiWkTUC6V6wVOHpo7Hb5SJJeNw8x3Abjc8GLkys_h44pHyhzxKdDFDTCNGV-K_ZZHNrnpA1sIy3ZZPVU5l6-2h96KzmxGBtsiH1WY5aX_8oeq4eL5UEfNZmuCN1iwesEYICfpDtQjdm7yDVSQutfcoD3MO5zT8NATdlhHT2K9TWEw8-iMm_GIs1nen1knra5gB3qWn19jIZgUjVgsk3FABFDe5kZ2mlZI2YhoOBGGFYL6-IYEqbUXKssAUvP-6e75rQ"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "n": "to7-rK6YF6hcTK5aCshCJr9_l7deGTEhIDjQW5RLSVBJg_8JNfaGsN1mlNToDxcytmC3FZn6sKlC-B5pvYsD7x9Lp2KlObgkqRyLhVn7QKXNSqoDA-0cRY1ujL_eiXY_9K_u6BPGUfdCECB1JrtPXYXHDIF7KUFpkjBnN0IhDpcUyRngBcVICir2BX8GN2yTKjWDyN10aMpEiRAPQ4XOoiqqgv2VmuheHVubodgjHmhXgP8N3kYQsNf7_zg64-V20A2iE33XA5vcoXkBK5Lb-39shSno0Dbo7VocQvAHJEdcTIWYdw2mBWHPuhJ9HiF31QbzECVaeJoQjIl9JzXK_Q"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "x": "ADu86-YvJ6GyW7LuN1idrd-VRZAknOyGNSfzDD4UWzQ",
      "y": "WouF0yFepUSkHt2TRrs9v7slH5NEISV5sI2QCcpVcH0"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "x": "PKFSrugvdxWv95WRBomMV2AXTO9uGVYJcHiy7iZZZa0",
      "y": "iA2aXIxoa2CkQXKlFdgS2nxLZnc_aNwhlR6qEdcudyU"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "x": "8pkSNidjFEivyj9yei6HyUlnu24BZ_zvumtPoLJrU-Y",
      "y": "v8n6g2BNgkQrsQzDJWShtvoeaPIthMkAx9lh725Z-y8"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "x": "cwx0rOtY5QNMNB6GGlTTV3ZXCSjqqfkmFA9Rz2yhvWc",
      "y": "F6QKUZfyZK9f9yUxAeEMZLt4qIcCyr0RuNOhlVMkRX8"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "x": "QqwO1wAhhfsUX4f4KvySOsSeaWO4lA1TjiRMkIw7Tuk",
      "y": "3eY-qvVYSnyJ1UqAf-44AhTufFA1WqvVGfH_NIm_nVY"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "x": "byQWD31nw1W0XBY0TSmY0IdbqYga2UjYnfwXJk6_PHE",
      "y": "AUGEhSCH8cmSx-83EwZHg6AsUDss1CNzm4QrbEnhfUE"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "x": "1wxPlRkTTnVw-cU4Od_KOg-arqf55EC2KguUQTBMm28"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "x": "20tu5Wcq8P-KWjUYZCtew1LzLjNM4BVWVZowmrWwk6I"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "x": "oChejbuZglH3YGVydpt3SbtXWTcmafIgWz9gbjC-d_M"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "alg": "RSA-OAEP",
      "n": "p2UARSEQPi-FlVrWiwsvObGCSiUzi0BlRR8Lro03wUVO3JT_tX6PWAozMAMjZFArEKYsY_THC6o-Mo-n-XaK3lfw-iDLO1KfCHeosmlYa-DJ-sTHgd0bsUwvJ6hY8ZyCZU-w_GwuWhCljhZcTmygh4SGfUCC0w4zF9Rw6wJROMQ1dB1cwwwETfCZaUdObgdK0byCNRC_491IOsvWtyqb3qk6kxkZi9Kz1TCPDj_GfN-JRlqZifmdxtO8XgN5JTxEnIe1si_Y3h5dxHpoDOL59bCgLfHrlp_FhslCtQ3u22UjBCsYH5SYbkWBWqS6K3uG9t_MFPAQdsZBJFTCRlUWsQ"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "x": "bOt9wd8McSr3BFI7cw-dhkQJ6a-Ga1mO2C9c8nZ3jTE",
      "y": "OEH1eruvoU6Ht-cT3saKF_b5HR3r4LFZIHwtmpHWmB4",
      "alg": "ECDH-ES"
    }
  ]
}
outgoing_path
jwks
2020-09-01 12:54:01 FINISHED
oidcc-client-test-kid-absent-multiple-jwks
Test has run to completion
testmodule_result
PASSED
Test Results