Test Summary

Test Results

Expand All Collapse All
All times are UTC
2020-09-01 12:50:19 INFO
TEST-RUNNER
Test instance SlBuHBXCeeGnZYE created
baseUrl
https://www.certification.openid.net/test/SlBuHBXCeeGnZYE
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code id_token",
  "request_type": "plain_http_request",
  "response_mode": "form_post",
  "client_registration": "dynamic_client"
}
alias

                                
description
test suite runner for openid-client
planId
l0lJMpv444Mye
config
{
  "description": "test suite runner for openid-client",
  "waitTimeoutSeconds": 2
}
testName
oidcc-client-test-missing-sub
2020-09-01 12:50:19 SUCCESS
OIDCCGenerateServerConfiguration
Generated default server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/SlBuHBXCeeGnZYE/",
  "authorization_endpoint": "https://www.certification.openid.net/test/SlBuHBXCeeGnZYE/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/SlBuHBXCeeGnZYE/token",
  "jwks_uri": "https://www.certification.openid.net/test/SlBuHBXCeeGnZYE/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/SlBuHBXCeeGnZYE/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/SlBuHBXCeeGnZYE/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post",
    "client_secret_jwt",
    "private_key_jwt"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2020-09-01 12:50:19
SetTokenEndpointAuthMethodsSupportedToClientSecretBasicOnly
Changed token_endpoint_auth_methods_supported to client_secret_basic only in server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/SlBuHBXCeeGnZYE/",
  "authorization_endpoint": "https://www.certification.openid.net/test/SlBuHBXCeeGnZYE/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/SlBuHBXCeeGnZYE/token",
  "jwks_uri": "https://www.certification.openid.net/test/SlBuHBXCeeGnZYE/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/SlBuHBXCeeGnZYE/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/SlBuHBXCeeGnZYE/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2020-09-01 12:50:20
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "8gwxo35Mncqb-FUR4XPdqTrHd61oDjnuGAVWG7LyRHiZI9r5TndGi3HWtAudc5sMtPlt4djydyqS3IfLHmDo3zinxPkj49iK4gTj-ytaNzPRvF8gEuRcy8yf0WrU_9iBO4mPTl_GxUOIPwq8GirVw6Vz3WFL1ksohXlOoosqwpU",
      "kty": "RSA",
      "q": "yqovDkkbKMv9jcx5TH1QyJSAXGPdb5rfhPJjdEECcpgwfjkDNmOUP7yGQoJs9rtktAhUs_2dg0z81U5GN4kzMvJnOiaD-IGNDchuCL6hIt2ZxGWkTT4qasDZNjP11evm3aq1PyLxLOQz5oOzjSW4APqgKvqhERvWC9iogoEVCjM",
      "d": "gWxpE01GsJbRqqCy3203j-gVhCQEBKsriMQoFAoAxBI5Ly8U-qENFGkfqjHYs4g36y7Y3YByoeNklmp6K2UDuXfKqms5C94up5j7qpWQovVJz9rJy--TVoeN1l-qP4w4pF02WSHTV_d2077K3ucVbkDeOOEtvqBWju-uBaEA9niK0LkfwbavsKSijNH1WTm0ZP-CUM29UsNKi2z_YBOxb_5S6iXmyRBBK88jCqfPSrbJHtX2_9BQmau1kcJDViSc44G4J21X58p3vJ2XjGzHU6-sfez6JlLsHTNXFGeJZuBmFSdXtWP9UqWENEvA5ywCgxSRq3aAF13neMCPWXi7KQ",
      "e": "AQAB",
      "use": "sig",
      "kid": "dac54fb0-bac8-45d5-87d3-17ca1300f918",
      "qi": "6V4Il10ALYFBOUGsKANaAgu6tLADLj9Z1zKOcC_Bmro6K1tvDU_4NQkPTs2pILgkPNsEuU8EuotyNvY68zWM3s90yZwXjT-1xpPyjxtg0pXnNEkksbrrtYBcgArXSw2wXxO6ikvNOoZ8h_BXbcqei7V6galkwwuA56e9qpJUZSA",
      "dp": "FI6QkLAjVatlf7vJ3vn2M284jaN-mOa2n_ekDoouJT6Q0wi_77gVl7Y9Y-EwqCbc92nPuUSxowlMm8o0qAnW_U5UgVgfgjRb50I_Eo_mA5Y1E-iIUtJuRyjD0gdeu7PpleLi9ucPfKV1ptUEkLxel1Uv9_dRd4u-j0d0ND3Zjdk",
      "dq": "NzYRx7SG36BjHQQ9b2ccYOiD56eVJdhtWEyoZ31ma02muFxT0bdjJdH4SZo6kSUQFDPIz5giFykcIAhI_Mw11IVRNfhUL5krkjuuLlewkk0InQaLsjdjWt3azvds27B-npjo86BTT8WDliL_AU7rR-j_RXYt9vk8YNHPZm5ACx0",
      "n": "v56HwbchNodDMYxOlbtA1QKjwEa-LA2Iwi4TNqLCe6FwG1hgVl5k55_Vuzi49aLB9WLd3OcUj88WURyjAj64m3oO8gVgG7WYLQ_QLkYf2J1tYCPdx0AI6yUFdwBJd5XFw9oxTJzwkxkw6rKd1mH7w0PV7jIEnS4s4tvsWBwHj8WwtqerpcuL8PRx8yQZFqJ8PD_59jeeNZjNJyVLHTnu5uov43gEKGXm5qyslagQPHEHC9o_9EALFprwW197FKVZvOOneNf39OYKgRYN8UJaQvdFL6zPDjS12cT0iKPOz-6DzOAhQCOMnWVymGaOuTJ81NEs-UGz3bn_05IKcFeVrw"
    },
    {
      "kty": "EC",
      "d": "mKVAtuZll4hg94VxRdXGgOknciBhfVVOZ97-Pgfq2Xw",
      "use": "sig",
      "crv": "P-256",
      "kid": "d85449ef-4148-47c5-85c3-825b4ce36bdb",
      "x": "wBprgK2Pf1kdqpS9lq39Jp-QhDS1wFJ-2_M6PcV5Pvo",
      "y": "XqMsKDzpwo_HJmRw88au2kyHhvv-He0NDJSPYirdWsE"
    },
    {
      "kty": "EC",
      "d": "LVx85rdfvRpTf5RVq8lrUYNc7TRZPWM1v4MIXzUchcI",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "c3e9b24b-2917-465e-88f7-66ae6f653ed2",
      "x": "IF8__vwDEhcPrN-Ie4VuVC2uY7YsGzFH9cY0QnG_c5A",
      "y": "7NO5_N3iohBBbRWhyqempd_RMnriRNyybFrgMyGkFKo"
    },
    {
      "kty": "OKP",
      "d": "nECa4W2C_zC9WE-f3DY8yoyDYlweQkJ5X9udPJVUjkY",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "cfb616d0-dd40-486f-aa5b-b9d078af5728",
      "x": "AU4pxPT1r1U0_xT787BV895kGDsQAN3QLKTP_YLBwCo"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "__PxV4Drdutw77aH9_RkXAtGNqJPCg0UYZPnmyxP7gBy2JH-LIga37VUqrGVvgcpCHGLkojPjFvoK5IWP6MPMoYqsHUXkIe8dOX9oSJ58xOJzR7ciKqk795aPRUTjvv0QvLrQJCHDaLc9vCqEn4GSrBtMnJtB0LEob6TbyBsBPs",
      "kty": "RSA",
      "q": "1TImDENLFqz1mg4EqPRu7zB0cKG4Qw9gdi-78Cmaicd4CMSdmnQmVGLSeJgFCkjryYZ_v-njAMA752GsZTStO9CeKn0bXNgeQHshF_UqqX8XozRGubi7xKoSfVKlfuoxdtkgHs9vT9fP58Ns2fmhOVxx4nb0a-zdDRnSrn7xy1c",
      "d": "0W3prIxKIYqLu-BWr6gDQaWFgJSz-vr_5_YC30NtR5rh8ORqzxUYDJql3FhJz5_Li41E8z93ZXGoekbIG9kld3BJsAWgumftXE76NBeWNS0VM5l1sZG7umhgoWs4ghD-82ebD9jzjTAa5MVDUTJfXFxzM5f_j_T55SOIP15QkAF4ZkcTLM71Ry4-upYsagQdOCgDTgaaObvqJ0KH6sqM_zRWG6DcQvbavzD6EmaNfj1AlHHGW8vaPQ7t2e7oBS9FoyrTJ0l3LBqUu8vPNUZk0clN1GWzFNegzDqrmJHyclBMd8uqq1d31PfMEY6XQtEWkYx6Q1vD1DUyfiF4RJN35Q",
      "e": "AQAB",
      "use": "enc",
      "kid": "f9849351-e265-4f58-a384-7bfecab82f1e",
      "qi": "QaIJFI4un97kE117BUV9ItCZVAnTzqukz7upQmCHD4jtQPXG-VBpgKD5ybTrYtOaN89c6nivW3rnVGfEP-fzScbSnWXphdr1mubHi0iI7kwyYZIa58l_krm2oLP3z090w2wQgpVwN-SrzjZrzAM3V4Hel-uV5RpHojKNl_E-oO4",
      "dp": "ZCbkDMVZXZMLAgF-eruaeZm_w6kHHHu5ueTR_5n7PLnYNn4J4wru2RJvKsuKOG081Rz47EG0VMuxsTrckdIQJEjzc1CeA-PZDjTgZajD5yWCCk1FJgT_vQxYawZQPObB0WCURRNIhUFxDP9mzQ2bEKawU8kKeIjbwB5-OkGJgvk",
      "alg": "RSA-OAEP",
      "dq": "lDMhGcMpjmC69dUqzhvkhabkOmtgwFUPE_kIpuD0yTP8r_OlLvnwrxZnAmeCkWyxY0x4v3qhTyNSQPy3rz6X8Y2KdTS0cazWErLFBXdqqZpsXwn25CGTfRlQcwehfYDk054JYwGFejYmExDZOQj7Vvl5PRi9vcxQuUurFZuvD08",
      "n": "1SgbfWnlUHmdNpUz5Rpl-8v6eWMg7fdSEQQF01SBgkfc9xNxquVCiEY0d6lanjdASeNKFuTQC2wkm6uEhl48zo2Ybxg0AJ9w5CjREiwRZpckYmrZMHEXHIKfRCOdN3aSWPZ0x8WF2c7WMODFaWosb3pqFIDntEnoaqJdl4EwwWTRR4hv1xknL37bcrV8p91GGxDK_-R1ho2EAS-Bg03xfQdClYUgkcH-2QuaZbgnk_YrtBfA2hEZBNDq7qBw0SIxTj4ct3rq0f_-_bzC8s95YGPafa8VQAhT5Ajv5jlk77ItxuBkm184o1VZSbjWeK51fWJb4aPbY6t1RDI35vO6TQ"
    },
    {
      "kty": "EC",
      "d": "wMTIDZ_UCitmWZkmDIuFzMXl_ofNP7R37sk7ZDshUuY",
      "use": "enc",
      "crv": "P-256",
      "kid": "78e6f23f-508d-4019-8ce5-de1205de0f47",
      "x": "0wZXl4P6ho1QAicycw2TPizveMM5e5PoujxajnS4FLI",
      "y": "kblNn7uPzpi5S0b7PKTGUn_aa3qWv7jslhg1LqRSlp0",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "dac54fb0-bac8-45d5-87d3-17ca1300f918",
      "n": "v56HwbchNodDMYxOlbtA1QKjwEa-LA2Iwi4TNqLCe6FwG1hgVl5k55_Vuzi49aLB9WLd3OcUj88WURyjAj64m3oO8gVgG7WYLQ_QLkYf2J1tYCPdx0AI6yUFdwBJd5XFw9oxTJzwkxkw6rKd1mH7w0PV7jIEnS4s4tvsWBwHj8WwtqerpcuL8PRx8yQZFqJ8PD_59jeeNZjNJyVLHTnu5uov43gEKGXm5qyslagQPHEHC9o_9EALFprwW197FKVZvOOneNf39OYKgRYN8UJaQvdFL6zPDjS12cT0iKPOz-6DzOAhQCOMnWVymGaOuTJ81NEs-UGz3bn_05IKcFeVrw"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "e0a22d77-32b5-4cab-9e56-750dfbb5652e",
      "n": "rS7b9CJB3rQyqffmneZF4SNCX5EDLYLpVPELLrQMKavkysW3YsCu2ypWOJyQrMzdKUBXjaXyEtLiONJYtaFmnQTrXSWAx4S5S7FMHr_i91kd6xTk-fVc6logewzGki0avdJ4nwk59YEpgtjIL3por6ueXqre_oku9OeIEcl5ZNA1k0O-DykDAq9xZWjlRCCajvVsfGC4H7K9BRD94DGvrKtw6KDnPf73f8KR0Baf6Uf2oKscJ7WFaLdXTveVSNbHtUCJd8qD_RxckmR1Z4QlYG598khYjQTbicrgXnC6gscDlU9doBUbj3wTZzLgh7W1ITKjZZsj2xv2kR1Yiqg6xQ"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "d85449ef-4148-47c5-85c3-825b4ce36bdb",
      "x": "wBprgK2Pf1kdqpS9lq39Jp-QhDS1wFJ-2_M6PcV5Pvo",
      "y": "XqMsKDzpwo_HJmRw88au2kyHhvv-He0NDJSPYirdWsE"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "89c9418d-2915-4021-bd48-eb7031c3ff7f",
      "x": "iKAWSuRbGFLAeAAaFN1dZ1sJDB-WQ1fd7CdVoZ2Njw0",
      "y": "VRzxmGvvpnLPp8Lrfaoc-9hpiEjGw8w3o7mADTAxEEk"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "c3e9b24b-2917-465e-88f7-66ae6f653ed2",
      "x": "IF8__vwDEhcPrN-Ie4VuVC2uY7YsGzFH9cY0QnG_c5A",
      "y": "7NO5_N3iohBBbRWhyqempd_RMnriRNyybFrgMyGkFKo"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "cfb616d0-dd40-486f-aa5b-b9d078af5728",
      "x": "AU4pxPT1r1U0_xT787BV895kGDsQAN3QLKTP_YLBwCo"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "f9849351-e265-4f58-a384-7bfecab82f1e",
      "alg": "RSA-OAEP",
      "n": "1SgbfWnlUHmdNpUz5Rpl-8v6eWMg7fdSEQQF01SBgkfc9xNxquVCiEY0d6lanjdASeNKFuTQC2wkm6uEhl48zo2Ybxg0AJ9w5CjREiwRZpckYmrZMHEXHIKfRCOdN3aSWPZ0x8WF2c7WMODFaWosb3pqFIDntEnoaqJdl4EwwWTRR4hv1xknL37bcrV8p91GGxDK_-R1ho2EAS-Bg03xfQdClYUgkcH-2QuaZbgnk_YrtBfA2hEZBNDq7qBw0SIxTj4ct3rq0f_-_bzC8s95YGPafa8VQAhT5Ajv5jlk77ItxuBkm184o1VZSbjWeK51fWJb4aPbY6t1RDI35vO6TQ"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "78e6f23f-508d-4019-8ce5-de1205de0f47",
      "x": "0wZXl4P6ho1QAicycw2TPizveMM5e5PoujxajnS4FLI",
      "y": "kblNn7uPzpi5S0b7PKTGUn_aa3qWv7jslhg1LqRSlp0",
      "alg": "ECDH-ES"
    }
  ]
}
2020-09-01 12:50:20 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2020-09-01 12:50:20 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2020-09-01 12:50:20 SUCCESS
OIDCCLoadUserInfo
Added user information
user_info
{
  "sub": "user-subject-1234531",
  "name": "Demo T. User",
  "given_name": "Demo",
  "family_name": "User",
  "middle_name": "Theresa",
  "nickname": "Dee",
  "preferred_username": "d.tu",
  "gender": "female",
  "birthdate": "2000-02-03",
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "zoneinfo": "America/Los_Angeles",
  "locale": "en-US",
  "phone_number": "+1 555 5550000",
  "phone_number_verified": false,
  "email": "user@example.com",
  "email_verified": false,
  "website": "https://openid.net/",
  "updated_at": "1580000000"
}
2020-09-01 12:50:20 SUCCESS
GetDynamicClientConfiguration
No client details on configuration, created an empty dynamic_client_registration_template object.
2020-09-01 12:50:20
oidcc-client-test-missing-sub
Setup Done
2020-09-01 12:50:23 INCOMING
oidcc-client-test-missing-sub
Incoming HTTP request to test instance SlBuHBXCeeGnZYE
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
.well-known/openid-configuration
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Discovery endpoint
2020-09-01 12:50:23 OUTGOING
oidcc-client-test-missing-sub
Response to HTTP request to test instance SlBuHBXCeeGnZYE
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "issuer": "https://www.certification.openid.net/test/SlBuHBXCeeGnZYE/",
  "authorization_endpoint": "https://www.certification.openid.net/test/SlBuHBXCeeGnZYE/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/SlBuHBXCeeGnZYE/token",
  "jwks_uri": "https://www.certification.openid.net/test/SlBuHBXCeeGnZYE/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/SlBuHBXCeeGnZYE/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/SlBuHBXCeeGnZYE/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
outgoing_path
.well-known/openid-configuration
2020-09-01 12:50:23 INCOMING
oidcc-client-test-missing-sub
Incoming HTTP request to test instance SlBuHBXCeeGnZYE
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "content-type": "application/json",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "181",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
register
incoming_body_form_params
incoming_method
POST
incoming_body_json
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ]
}
incoming_query_string_params
{}
incoming_body
{"token_endpoint_auth_method":"client_secret_basic","response_types":["code id_token"],"grant_types":["authorization_code","implicit"],"redirect_uris":["https://rp.example.com/cb"]}
Registration endpoint
2020-09-01 12:50:23 SUCCESS
OIDCCExtractDynamicRegistrationRequest
Extracted dynamic client registration request
request
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ]
}
2020-09-01 12:50:23 INFO
EnsureRegistrationRequestContainsAtLeastOneContact
This application requires that registration requests contain at least one contact.
2020-09-01 12:50:23 SUCCESS
ValidateClientGrantTypes
grant_types match response_types
grant_types
[
  "authorization_code",
  "implicit"
]
response_types
[
  "code id_token"
]
2020-09-01 12:50:23 SUCCESS
OIDCCValidateClientRedirectUris
Valid redirect_uri(s) provided in registration request
redirect_uris
[
  "https://rp.example.com/cb"
]
2020-09-01 12:50:23 SUCCESS
ValidateClientLogoUris
Client does not contain any logo_uri
2020-09-01 12:50:23 SUCCESS
ValidateClientUris
Client does not contain any client_uri
2020-09-01 12:50:23 SUCCESS
ValidateClientPolicyUris
Client does not contain any policy_uri
2020-09-01 12:50:23 SUCCESS
ValidateClientTosUris
Client does not contain any tos_uri
2020-09-01 12:50:23 SUCCESS
ValidateClientSubjectType
A subject_type was not provided
2020-09-01 12:50:23 INFO
ValidateIdTokenSignedResponseAlg
Skipped evaluation due to missing required element: client id_token_signed_response_alg
path
id_token_signed_response_alg
mapped
object
client
2020-09-01 12:50:23 SUCCESS
EnsureIdTokenEncryptedResponseAlgIsSetIfEncIsSet
id_token_encrypted_response_enc is not set
2020-09-01 12:50:23 INFO
ValidateUserinfoSignedResponseAlg
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2020-09-01 12:50:23 SUCCESS
EnsureUserinfoEncryptedResponseAlgIsSetIfEncIsSet
userinfo_encrypted_response_enc is not set
2020-09-01 12:50:23 INFO
ValidateRequestObjectSigningAlg
Skipped evaluation due to missing required element: client request_object_signing_alg
path
request_object_signing_alg
mapped
object
client
2020-09-01 12:50:23 SUCCESS
EnsureRequestObjectEncryptionAlgIsSetIfEncIsSet
request_object_encryption_enc is not set
2020-09-01 12:50:23 INFO
ValidateTokenEndpointAuthSigningAlg
Skipped evaluation due to missing required element: client token_endpoint_auth_signing_alg
path
token_endpoint_auth_signing_alg
mapped
object
client
2020-09-01 12:50:23 SUCCESS
ValidateDefaultMaxAge
default_max_age is not set
2020-09-01 12:50:23 INFO
ValidateRequireAuthTime
Skipped evaluation due to missing required element: client require_auth_time
path
require_auth_time
mapped
object
client
2020-09-01 12:50:23 INFO
ValidateDefaultAcrValues
Skipped evaluation due to missing required element: client default_acr_values
path
default_acr_values
mapped
object
client
2020-09-01 12:50:23 INFO
ValidateInitiateLoginUri
Skipped evaluation due to missing required element: client initiate_login_uri
path
initiate_login_uri
mapped
object
client
2020-09-01 12:50:23 INFO
ValidateRequestUris
Skipped evaluation due to missing required element: client request_uris
path
request_uris
mapped
object
client
2020-09-01 12:50:23 SUCCESS
ValidateClientRegistrationRequestSectorIdentifierUri
A sector_identifier_uri was not provided
2020-09-01 12:50:23 SUCCESS
OIDCCRegisterClient
Registered client
client
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_FCBvGMKngFAYaCc23278\u003c\u003e _\u003c"
}
2020-09-01 12:50:23
OIDCCCreateClientSecretForDynamicClient
Set the secret for registered client
client_secret
secret_KzeAdczyTENnJdzABfBXCizshVBNyXNQQjsXpcahzIvXWwesTC9506833869^,:>@
2020-09-01 12:50:23 SUCCESS
EnsureTokenEndPointAuthMethodIsClientSecretBasic
token_endpoint_auth_method is 'client_secret_basic' as expected
2020-09-01 12:50:23 SUCCESS
EnsureClientDoesNotHaveBothJwksAndJwksUri
Client does not have both jwks and jwks_uri set
client
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_FCBvGMKngFAYaCc23278\u003c\u003e _\u003c",
  "client_secret": "secret_KzeAdczyTENnJdzABfBXCizshVBNyXNQQjsXpcahzIvXWwesTC9506833869^,:\u003e@"
}
2020-09-01 12:50:23 INFO
FetchClientKeys
Skipped evaluation due to missing required element: client jwks_uri
path
jwks_uri
mapped
object
client
2020-09-01 12:50:23 SUCCESS
OIDCCExtractServerSigningAlg
Using the default algorithm for the first key in server jwks
signing_algorithm
RS256
2020-09-01 12:50:23
SetClientIdTokenSignedResponseAlgToServerSigningAlg
Set id_token_signed_response_alg for the registered client
id_token_signed_response_alg
RS256
2020-09-01 12:50:23 OUTGOING
oidcc-client-test-missing-sub
Response to HTTP request to test instance SlBuHBXCeeGnZYE
outgoing_status_code
201
outgoing_headers
{}
outgoing_body
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_FCBvGMKngFAYaCc23278\u003c\u003e _\u003c",
  "client_secret": "secret_KzeAdczyTENnJdzABfBXCizshVBNyXNQQjsXpcahzIvXWwesTC9506833869^,:\u003e@",
  "id_token_signed_response_alg": "RS256"
}
outgoing_path
register
2020-09-01 12:50:23 INCOMING
oidcc-client-test-missing-sub
Incoming HTTP request to test instance SlBuHBXCeeGnZYE
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "got/9.6.0 (https://github.com/sindresorhus/got)",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
authorize
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "client_id": "client_FCBvGMKngFAYaCc23278\u003c\u003e _\u003c",
  "scope": "openid",
  "response_type": "code id_token",
  "redirect_uri": "https://rp.example.com/cb",
  "state": "NY6_vAPSgFMks1E0Y4X0DficAnVnfqsk3ujQj6qRi_A",
  "nonce": "uZHhC8gTTxL5HRYB0DsRKBZ0Akhmn5Ug7P6PfhC8LBk",
  "response_mode": "form_post"
}
incoming_body
Authorization endpoint
2020-09-01 12:50:24 SUCCESS
EnsureRequestDoesNotContainRequestObject
Request does not contain a request parameter
2020-09-01 12:50:24 SUCCESS
OIDCCEnsureAuthorizationHttpRequestContainsOpenIDScope
Found 'openid' in scope http request parameter
actual
[
  "openid"
]
expected
openid
2020-09-01 12:50:24 SUCCESS
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
effective_authorization_endpoint_request
{
  "client_id": "client_FCBvGMKngFAYaCc23278\u003c\u003e _\u003c",
  "scope": "openid",
  "response_type": "code id_token",
  "redirect_uri": "https://rp.example.com/cb",
  "state": "NY6_vAPSgFMks1E0Y4X0DficAnVnfqsk3ujQj6qRi_A",
  "nonce": "uZHhC8gTTxL5HRYB0DsRKBZ0Akhmn5Ug7P6PfhC8LBk",
  "response_mode": "form_post"
}
2020-09-01 12:50:24 SUCCESS
ExtractRequestedScopes
Requested scopes
scope
openid
2020-09-01 12:50:24 SUCCESS
ExtractNonceFromAuthorizationRequest
Extracted nonce
nonce
uZHhC8gTTxL5HRYB0DsRKBZ0Akhmn5Ug7P6PfhC8LBk
2020-09-01 12:50:24 SUCCESS
EnsureResponseTypeIsCodeIdToken
Response type is expected value
expected
code id_token
2020-09-01 12:50:24 SUCCESS
EnsureMatchingClientId
Client ID matched
client_id
client_FCBvGMKngFAYaCc23278<> _<
2020-09-01 12:50:24 SUCCESS
EnsureValidRedirectUriForAuthorizationEndpointRequest
redirect_uri is one of the allowed redirect uris
actual
https://rp.example.com/cb
expected
[
  "https://rp.example.com/cb"
]
2020-09-01 12:50:24 SUCCESS
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
actual
[
  "openid"
]
expected
openid
2020-09-01 12:50:24 SUCCESS
DisallowMaxAgeEqualsZeroAndPromptNone
The client did not send max_age=0 and prompt=none parameters as expected
2020-09-01 12:50:24 SUCCESS
CreateAuthorizationCode
Created authorization code
authorization_code
UUGevNeYIb
2020-09-01 12:50:24 SUCCESS
CalculateCHash
Successful c_hash encoding
c_hash
N19qORkR02KoL-sPyPpNBA
2020-09-01 12:50:24 SUCCESS
GenerateIdTokenClaims
Created ID Token Claims
iss
https://www.certification.openid.net/test/SlBuHBXCeeGnZYE/
sub
user-subject-1234531
aud
client_FCBvGMKngFAYaCc23278<> _<
nonce
uZHhC8gTTxL5HRYB0DsRKBZ0Akhmn5Ug7P6PfhC8LBk
iat
1598964624
exp
1598964924
2020-09-01 12:50:24
RemoveSubFromIdToken
Removed sub value from ID token claims
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/SlBuHBXCeeGnZYE/",
  "aud": "client_FCBvGMKngFAYaCc23278\u003c\u003e _\u003c",
  "nonce": "uZHhC8gTTxL5HRYB0DsRKBZ0Akhmn5Ug7P6PfhC8LBk",
  "iat": 1598964624,
  "exp": 1598964924
}
2020-09-01 12:50:24 SUCCESS
AddCHashToIdTokenClaims
Added c_hash to ID token claims
c_hash
N19qORkR02KoL-sPyPpNBA
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/SlBuHBXCeeGnZYE/",
  "aud": "client_FCBvGMKngFAYaCc23278\u003c\u003e _\u003c",
  "nonce": "uZHhC8gTTxL5HRYB0DsRKBZ0Akhmn5Ug7P6PfhC8LBk",
  "iat": 1598964624,
  "exp": 1598964924,
  "c_hash": "N19qORkR02KoL-sPyPpNBA"
}
2020-09-01 12:50:24 INFO
AddAtHashToIdTokenClaims
Skipped evaluation due to missing required string: at_hash
expected
at_hash
2020-09-01 12:50:24 SUCCESS
OIDCCSignIdToken
Signed the ID token
id_token
eyJraWQiOiJkYWM1NGZiMC1iYWM4LTQ1ZDUtODdkMy0xN2NhMTMwMGY5MTgiLCJhbGciOiJSUzI1NiJ9.eyJhdWQiOiJjbGllbnRfRkNCdkdNS25nRkFZYUNjMjMyNzg8PiBfPCIsImNfaGFzaCI6Ik4xOXFPUmtSMDJLb0wtc1B5UHBOQkEiLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvU2xCdUhCWENlZUduWllFXC8iLCJleHAiOjE1OTg5NjQ5MjQsIm5vbmNlIjoidVpIaEM4Z1RUeEw1SFJZQjBEc1JLQlowQWtobW41VWc3UDZQZmhDOExCayIsImlhdCI6MTU5ODk2NDYyNH0.b1UtUvECPUXhBSDaHByEPCrKyFVk_Xtqk0GA-Bub96bj3GC5KEJNGEDR3eg5SUKqKaVbmS9lV4gTtIw936Cu19mz2Qd9eCiAm4-EiZmUeJhGe9Im9WLm1EcpJPspfIJapaPkAYAbQhNok51_rceGgMAuW7K4M9wWGrjiZRRgetxu0zKeKs_qLTSfmmWdyUM7ClkEyvx88x5yFFz8fvAZyIeyInZ78xYl8zMW2lO0OfzBy1A5ov2R-j-LjUj22W3jiwsgwWsyON5Z8hZWnXnGuZD42KDfNDmbin1riZzS0bJoMyZHLc7v99tEKhNpIsRlrBgju_D4C1K7RpGG5SPcgQ
key
{"p":"8gwxo35Mncqb-FUR4XPdqTrHd61oDjnuGAVWG7LyRHiZI9r5TndGi3HWtAudc5sMtPlt4djydyqS3IfLHmDo3zinxPkj49iK4gTj-ytaNzPRvF8gEuRcy8yf0WrU_9iBO4mPTl_GxUOIPwq8GirVw6Vz3WFL1ksohXlOoosqwpU","kty":"RSA","q":"yqovDkkbKMv9jcx5TH1QyJSAXGPdb5rfhPJjdEECcpgwfjkDNmOUP7yGQoJs9rtktAhUs_2dg0z81U5GN4kzMvJnOiaD-IGNDchuCL6hIt2ZxGWkTT4qasDZNjP11evm3aq1PyLxLOQz5oOzjSW4APqgKvqhERvWC9iogoEVCjM","d":"gWxpE01GsJbRqqCy3203j-gVhCQEBKsriMQoFAoAxBI5Ly8U-qENFGkfqjHYs4g36y7Y3YByoeNklmp6K2UDuXfKqms5C94up5j7qpWQovVJz9rJy--TVoeN1l-qP4w4pF02WSHTV_d2077K3ucVbkDeOOEtvqBWju-uBaEA9niK0LkfwbavsKSijNH1WTm0ZP-CUM29UsNKi2z_YBOxb_5S6iXmyRBBK88jCqfPSrbJHtX2_9BQmau1kcJDViSc44G4J21X58p3vJ2XjGzHU6-sfez6JlLsHTNXFGeJZuBmFSdXtWP9UqWENEvA5ywCgxSRq3aAF13neMCPWXi7KQ","e":"AQAB","use":"sig","kid":"dac54fb0-bac8-45d5-87d3-17ca1300f918","qi":"6V4Il10ALYFBOUGsKANaAgu6tLADLj9Z1zKOcC_Bmro6K1tvDU_4NQkPTs2pILgkPNsEuU8EuotyNvY68zWM3s90yZwXjT-1xpPyjxtg0pXnNEkksbrrtYBcgArXSw2wXxO6ikvNOoZ8h_BXbcqei7V6galkwwuA56e9qpJUZSA","dp":"FI6QkLAjVatlf7vJ3vn2M284jaN-mOa2n_ekDoouJT6Q0wi_77gVl7Y9Y-EwqCbc92nPuUSxowlMm8o0qAnW_U5UgVgfgjRb50I_Eo_mA5Y1E-iIUtJuRyjD0gdeu7PpleLi9ucPfKV1ptUEkLxel1Uv9_dRd4u-j0d0ND3Zjdk","dq":"NzYRx7SG36BjHQQ9b2ccYOiD56eVJdhtWEyoZ31ma02muFxT0bdjJdH4SZo6kSUQFDPIz5giFykcIAhI_Mw11IVRNfhUL5krkjuuLlewkk0InQaLsjdjWt3azvds27B-npjo86BTT8WDliL_AU7rR-j_RXYt9vk8YNHPZm5ACx0","n":"v56HwbchNodDMYxOlbtA1QKjwEa-LA2Iwi4TNqLCe6FwG1hgVl5k55_Vuzi49aLB9WLd3OcUj88WURyjAj64m3oO8gVgG7WYLQ_QLkYf2J1tYCPdx0AI6yUFdwBJd5XFw9oxTJzwkxkw6rKd1mH7w0PV7jIEnS4s4tvsWBwHj8WwtqerpcuL8PRx8yQZFqJ8PD_59jeeNZjNJyVLHTnu5uov43gEKGXm5qyslagQPHEHC9o_9EALFprwW197FKVZvOOneNf39OYKgRYN8UJaQvdFL6zPDjS12cT0iKPOz-6DzOAhQCOMnWVymGaOuTJ81NEs-UGz3bn_05IKcFeVrw"}
algorithm
RS256
2020-09-01 12:50:24 INFO
EncryptIdToken
Skipped evaluation due to missing required element: client id_token_encrypted_response_alg
path
id_token_encrypted_response_alg
mapped
object
client
2020-09-01 12:50:24 SUCCESS
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "NY6_vAPSgFMks1E0Y4X0DficAnVnfqsk3ujQj6qRi_A"
}
2020-09-01 12:50:24 SUCCESS
AddCodeToAuthorizationEndpointResponseParams
Added code to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "NY6_vAPSgFMks1E0Y4X0DficAnVnfqsk3ujQj6qRi_A",
  "code": "UUGevNeYIb"
}
2020-09-01 12:50:24 SUCCESS
AddIdTokenToAuthorizationEndpointResponseParams
Added id_token to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "NY6_vAPSgFMks1E0Y4X0DficAnVnfqsk3ujQj6qRi_A",
  "code": "UUGevNeYIb",
  "id_token": "eyJraWQiOiJkYWM1NGZiMC1iYWM4LTQ1ZDUtODdkMy0xN2NhMTMwMGY5MTgiLCJhbGciOiJSUzI1NiJ9.eyJhdWQiOiJjbGllbnRfRkNCdkdNS25nRkFZYUNjMjMyNzg8PiBfPCIsImNfaGFzaCI6Ik4xOXFPUmtSMDJLb0wtc1B5UHBOQkEiLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvU2xCdUhCWENlZUduWllFXC8iLCJleHAiOjE1OTg5NjQ5MjQsIm5vbmNlIjoidVpIaEM4Z1RUeEw1SFJZQjBEc1JLQlowQWtobW41VWc3UDZQZmhDOExCayIsImlhdCI6MTU5ODk2NDYyNH0.b1UtUvECPUXhBSDaHByEPCrKyFVk_Xtqk0GA-Bub96bj3GC5KEJNGEDR3eg5SUKqKaVbmS9lV4gTtIw936Cu19mz2Qd9eCiAm4-EiZmUeJhGe9Im9WLm1EcpJPspfIJapaPkAYAbQhNok51_rceGgMAuW7K4M9wWGrjiZRRgetxu0zKeKs_qLTSfmmWdyUM7ClkEyvx88x5yFFz8fvAZyIeyInZ78xYl8zMW2lO0OfzBy1A5ov2R-j-LjUj22W3jiwsgwWsyON5Z8hZWnXnGuZD42KDfNDmbin1riZzS0bJoMyZHLc7v99tEKhNpIsRlrBgju_D4C1K7RpGG5SPcgQ"
}
2020-09-01 12:50:24 OUTGOING
oidcc-client-test-missing-sub
Response to HTTP request to test instance SlBuHBXCeeGnZYE
outgoing
ModelAndView [view="formPostResponseMode"; model={formAction=https://rp.example.com/cb, formParameters={"state":"NY6_vAPSgFMks1E0Y4X0DficAnVnfqsk3ujQj6qRi_A","code":"UUGevNeYIb","id_token":"eyJraWQiOiJkYWM1NGZiMC1iYWM4LTQ1ZDUtODdkMy0xN2NhMTMwMGY5MTgiLCJhbGciOiJSUzI1NiJ9.eyJhdWQiOiJjbGllbnRfRkNCdkdNS25nRkFZYUNjMjMyNzg8PiBfPCIsImNfaGFzaCI6Ik4xOXFPUmtSMDJLb0wtc1B5UHBOQkEiLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvU2xCdUhCWENlZUduWllFXC8iLCJleHAiOjE1OTg5NjQ5MjQsIm5vbmNlIjoidVpIaEM4Z1RUeEw1SFJZQjBEc1JLQlowQWtobW41VWc3UDZQZmhDOExCayIsImlhdCI6MTU5ODk2NDYyNH0.b1UtUvECPUXhBSDaHByEPCrKyFVk_Xtqk0GA-Bub96bj3GC5KEJNGEDR3eg5SUKqKaVbmS9lV4gTtIw936Cu19mz2Qd9eCiAm4-EiZmUeJhGe9Im9WLm1EcpJPspfIJapaPkAYAbQhNok51_rceGgMAuW7K4M9wWGrjiZRRgetxu0zKeKs_qLTSfmmWdyUM7ClkEyvx88x5yFFz8fvAZyIeyInZ78xYl8zMW2lO0OfzBy1A5ov2R-j-LjUj22W3jiwsgwWsyON5Z8hZWnXnGuZD42KDfNDmbin1riZzS0bJoMyZHLc7v99tEKhNpIsRlrBgju_D4C1K7RpGG5SPcgQ"}}]
outgoing_path
authorize
2020-09-01 12:50:26 FINISHED
oidcc-client-test-missing-sub
Test has run to completion
testmodule_result
PASSED
Test Results