Test Summary

Test Results

Expand All Collapse All
All times are UTC
2020-09-01 12:51:40 INFO
TEST-RUNNER
Test instance ckeeRF8vRtvjVmi created
baseUrl
https://www.certification.openid.net/test/ckeeRF8vRtvjVmi
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "id_token token",
  "request_type": "plain_http_request",
  "response_mode": "form_post",
  "client_registration": "dynamic_client"
}
alias

                                
description
test suite runner for openid-client
planId
2AWaC6uTX8byR
config
{
  "description": "test suite runner for openid-client",
  "waitTimeoutSeconds": 2
}
testName
oidcc-client-test-missing-iat
2020-09-01 12:51:40 SUCCESS
OIDCCGenerateServerConfiguration
Generated default server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/ckeeRF8vRtvjVmi/",
  "authorization_endpoint": "https://www.certification.openid.net/test/ckeeRF8vRtvjVmi/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/ckeeRF8vRtvjVmi/token",
  "jwks_uri": "https://www.certification.openid.net/test/ckeeRF8vRtvjVmi/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/ckeeRF8vRtvjVmi/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/ckeeRF8vRtvjVmi/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post",
    "client_secret_jwt",
    "private_key_jwt"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2020-09-01 12:51:40
SetTokenEndpointAuthMethodsSupportedToClientSecretBasicOnly
Changed token_endpoint_auth_methods_supported to client_secret_basic only in server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/ckeeRF8vRtvjVmi/",
  "authorization_endpoint": "https://www.certification.openid.net/test/ckeeRF8vRtvjVmi/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/ckeeRF8vRtvjVmi/token",
  "jwks_uri": "https://www.certification.openid.net/test/ckeeRF8vRtvjVmi/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/ckeeRF8vRtvjVmi/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/ckeeRF8vRtvjVmi/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2020-09-01 12:51:41
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "6jrYl4nqeaL7oAn3SFc1IUhxKXeC032Be-EDJhaqJJD2EUxbk1jxYDLIeo2c2iioxwuk-a3-gnKoXC_3JXXi8iM5nZ_iZRnqAJ8G4ploeP_ivGZolP4u93NLchmqiHo5y9Wvv3uRg9hOjcn70qGoK3dRphjPxbh-6-s2WENBK10",
      "kty": "RSA",
      "q": "s9lwwOg-GEust1bSunsFjseW4_dJ_GzlbTRW8-IQMJ2DHuUd-FmSMkxlL2Ud1RNb7H3flTVGCiA00fweN_Y3EjBeQl8FV8audZqrpXHUmYgO4giG1TPZl6sEUo7a5uwhdHPKWKtHWIJbYQqiUl4CCIAB8EzH2ej6GPVOxL5_bVk",
      "d": "Z_PgIvDfQr6wS-BHQNp8PFymSclUArdUzTa3X8fgZUM0ayV7y7i17OHxbU4zkraQc7Sdz2_6JkvrUru_XPCjhm1Gyr-hcfh6Il8eeDoOeSg6DE1iG455qPITeMwmOd6R9qX2b87PV1fz--lOoStIZm-e4Zk--dlxDeDy7Ac8FJlT01ZAoW8rSAq4gTGtPn5oib21rPd5J3QkogaHzgjwEVfZ1vvZqBOrJnkSaHzKUR50VPW1U6EYwWaUAP-Yz5A2TEr4UAjwMkALuL5zQv-pUfQzJAdsW7c79B39JGbq1JK3MyH60vvAdtng7zeJQVaHmL_g5KAWajSixdUBI_3OoQ",
      "e": "AQAB",
      "use": "sig",
      "kid": "419e2b7a-81bc-439e-a6a0-297cc153acc4",
      "qi": "HXLvWlaJMVqKflp28LDCCJoUOyxML2t9C60EkVff1bzXDHMOr99aBZdgqTDaLTNQtVps8Xcc_mFJN6V-IDUf7d7nTqmmfy41yxjcQBfINIqVKBBEqfyFy-S-yygzueuxxl1Ctyo_aAwfhvozTuK576WDMomx7S8xDOEo24Jy9aE",
      "dp": "xjms6XpPVEeJWaR1gORE03kCQ8yfjCpP9a20w3w026NOi88qROXlyLrRjV3hW4NDashBAwisNmugbfwt1acRvEfxT6NqrpMixQnQgt6_Wn97vGOSqF0BFGufct2jw8JkvUuHY67ItGLQABDrLBOhRb_B-qZO2A7OYwv5PvMT6QU",
      "dq": "YZzYt7rVSPZ5raBwC0qN_6qQWPZ0r46jDxxjPUcrJle3PON52rsywB36pTiqcmVpdPf0i9U4SHKmeHnwJMt7pGGgJ0HPco6hTa8_DjK0Awh3m3KpS7oylUD6vZxPbxomJkBaSLndpUpLMmZFJ5NiYx6m7redmMX8R-OMdvg1zTE",
      "n": "pI4Yfc1FvZChbZFS29TfBEQPDZt7IX3V_kDX0SZVB3X_D_JKfjTz4lfuIzsZtcy79yblnZunHwKjUhdyubAzGBO4ZWX_LmsielQJt19rt3KxApAG4bxZNfxhDE8RTrniljg9IL-6-0cWMQSPfto5CL_qvI7j4Nzj0WOs80Twjxl4N09WR6Cs1m_nAykqDlxkz66cntJKm1FcnZYROCflwgi-aTj-o_wjWcBglD9qraGXCL317jJN4HfRZk9wQHWLCRv__rcQNNJNKPKSvOG4bhHEYFIyi6QgNV6GAQmOzviUrwQdQ-Tr1C0plgadzbH8zjWtEYKLZOszub4JqkGsVQ"
    },
    {
      "kty": "EC",
      "d": "PQaJU7KC199C7my6HS8S260Ec2gxVczjs7uGyXmszUQ",
      "use": "sig",
      "crv": "P-256",
      "kid": "acbd7f10-396b-4380-be5b-8e25fd87e630",
      "x": "8pWk5iprX-QdCUVmlyN9LE0BRokiuvhrfNGQAmcn-bY",
      "y": "rbKPW4n2ltBqwIC9uC07tD18wrHccFcfbpVP-RB-qOo"
    },
    {
      "kty": "EC",
      "d": "Z3Xg-pG9YGutwkFjDJAGT9Dr7QQ7siI9GCqeJklFpKY",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "dffab408-9848-4913-b1dc-07c07d28a9fd",
      "x": "8m8-e8DrUEJEKGpnlaRostn0uGyspgYUu1UJK6WwO28",
      "y": "Xb6nFq_7bL4jppnFsQdkyzVe0LlMlEqSGfSMNkl9EN4"
    },
    {
      "kty": "OKP",
      "d": "pxuqh8KCKoCH5s5SHYxDEwZmsBgmb6I21PfN1lVy2LI",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "acc85001-a246-40f1-a5eb-8cb44b74c078",
      "x": "swQqTtZwO5IE30XZzv5wnT24fqZm9CIc1LHn4IbEToQ"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "9TykAKX6-iCb6hp5kpOWj8q187Ci3mGoH-JFe9UpCr_wPhS0jLXDoshrz6tsG1QupXaYL83cADFtG6NIdzFrZ76X-S-UYGnn5d3jHLJxkwTj4uI6WOVAB-vs5e82DtRG1SkKHz4lXB-FDPj2wJyvIKiszRmk4EG6K_Q7i_EL70M",
      "kty": "RSA",
      "q": "6E7RWXRiHORu13XkCqxbaLARCUHcmVAcWLoXRe8Keq1-YkZsZIvSV68FkpZcmhv0ddeHa5GvYfwT0Z9MCck6Lf_52iBE4dumkByk6f_lQANDjT_Y-iejxZkwDDVHm3Bez-9WYJ2K-su2i_25vjL9fO0AzN3SePd8llfvrrP1pXM",
      "d": "Nh-Qm50KRmwlUppxldlyhKIZyZ4qAgUcVYVmwgSJ62MD-UI2if1Yb4w5EV8BXKvbci6fwWItBNa_4wrHMFL_Ey_P9wmkmrV4lZg8L6sZSG9AWsQYyyHyCZE4_rkfKxBMZntL-t33AYTMe8XvmhWbBX7NiwL5kNzqItYTawUfxIbHk0DFbZDGOdL_uDd1JgPoBh5TEtmvhOy6ROcupWEpqCpaNddXCn4gOomWUcUVSZ2w-kGEYry2THp3bJwS9wUSd68YDA8JtT9FG0murcsSnfGEmvJ6_UIGS2kiw-pGRpo4H7FQ2b2PedgDUpPT5ubRUYWkmDpt-RneV1LRehbRLQ",
      "e": "AQAB",
      "use": "enc",
      "kid": "44ab80e1-ec36-4533-9958-296f64ce7c83",
      "qi": "EA9ozEpe_Sl4JJH1HoOH9SitpwJvX2uok6VydQtPZRu0iV41nzJtlaAxlarvTJ1cKA3B3Nh_2t0ftBK9LmKPU8_t3iVjnHOf9tO8ppIXk9iTCdq_-l7XcStgeixqUotBD5v83ERuX-PAxoP6JuMSHNH7mDlHbeM_cYFOJPrF2Zs",
      "dp": "mjepNtMqEjOBeOVvQFLZotEqPPX-ZfRpoqtLYMU6iw0Kyi-BHt-LCIoa6jx1vnXg46LBr4Y4bFKot3GmN3Z3gYUk0sot97eB4lb35Gr-6yJvIJV9dbus2Y5uqmYUy5yIcrHdMKqHGfikVfUWTyf5JYONL2mJ-pC6v7tV2voZtDs",
      "alg": "RSA-OAEP",
      "dq": "MdPeEYrmFH5my-4seKGZha3mKY8n6vaE7f8USNrJ66BU8G1ciIB5IHeZAWUg_akrWS9ei5MXBDRWZ-r8G0k_Imi6RbAQNkWvx09tjAdoO7-3eI-OUbG47gQ6ixPOhSeoHn-ejmCcU8joIcTNV1-GgYowVsDpiSrEXVcFQPq2oMM",
      "n": "3op1psIVCBXnRxltjvIMdv3Wp2Ovoe5nDxv_zEWDExRnT20BHIn5CzSL0pR7WFceNjlOM8fCkOaWM4j9bo1s8j_xNIet9wHFfW9yBGOov3VfQmuio8WvNER2RihHotYWbxtT27ub9lwxBy-kxcPqp_9oBo-xbQPrPrC97PXIGfBcPH2qo7C_4YzgfDpNLRL6ImHB2D__3xBpaTLQU7ByMP5tu-wpzhu3PrITf5gXoa-KIHglkXLDIFycXGHnc4Y1iKED2fXoisvN7D_g6YWFXCgOogEsmHZSf3dn0vLZ1uy2IoCpqpy_kHZqmrWL2T4FfYFe5DFv7TGL0id7zbGqGQ"
    },
    {
      "kty": "EC",
      "d": "LHl7qos0Gd0XzTQDWU27H3LEQBERtF4I9a7WM3cIe_g",
      "use": "enc",
      "crv": "P-256",
      "kid": "89898ba6-9e41-4543-8337-e4fde34368a9",
      "x": "NTkQUfxthR621SV3XLVF6AcWAVkRUbjNJt7I6mV5A6Q",
      "y": "mA-Hep6HBQGF5U6J0zKQ8FlLi3sH6NCY382BxwACBUs",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "419e2b7a-81bc-439e-a6a0-297cc153acc4",
      "n": "pI4Yfc1FvZChbZFS29TfBEQPDZt7IX3V_kDX0SZVB3X_D_JKfjTz4lfuIzsZtcy79yblnZunHwKjUhdyubAzGBO4ZWX_LmsielQJt19rt3KxApAG4bxZNfxhDE8RTrniljg9IL-6-0cWMQSPfto5CL_qvI7j4Nzj0WOs80Twjxl4N09WR6Cs1m_nAykqDlxkz66cntJKm1FcnZYROCflwgi-aTj-o_wjWcBglD9qraGXCL317jJN4HfRZk9wQHWLCRv__rcQNNJNKPKSvOG4bhHEYFIyi6QgNV6GAQmOzviUrwQdQ-Tr1C0plgadzbH8zjWtEYKLZOszub4JqkGsVQ"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "e5d28641-5c60-4f6a-a48a-332f8879f107",
      "n": "gvuYP_Yf_I5q_uyAPYDjP9h_jo-lf4jIulVu24HoT4hwJ0lgUvQDEnsLwKN8boRf7g74rMvErCFI55FS8FPLsCwQOlbQncmgUNXiSofkq_RX1IN9xiOErY8D7cn_3q-4s9z5p0vitDnouwIEIcmskTRMl5--oefm6Xi7ear5d4l3TMMvcpNKEGdoCS0cXtwEA3aAq5whUmxb9YHH16w8iJRJtRumjiJsnqQZMFQtLQcevqpI5jUemKmAyurvNGRaNt1k9YzA1VcmQJEv6wCwaAML0vyLbUkCA9agPIx7lUSTewKeZLbs6clR_nD_EUMWXbJ1JOf8AeWIgjZVfivQPw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "acbd7f10-396b-4380-be5b-8e25fd87e630",
      "x": "8pWk5iprX-QdCUVmlyN9LE0BRokiuvhrfNGQAmcn-bY",
      "y": "rbKPW4n2ltBqwIC9uC07tD18wrHccFcfbpVP-RB-qOo"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "0291e56f-510c-4d8a-ae0c-d590ef1afa24",
      "x": "p3WXMENFzm4Ow7Z0r8Hew0M_iAEVDdJ6QPjpkIQYnC4",
      "y": "e9mIbMWUfXtYZfwSWDp6_pr_jcBqnxdOcMbti2tGa70"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "dffab408-9848-4913-b1dc-07c07d28a9fd",
      "x": "8m8-e8DrUEJEKGpnlaRostn0uGyspgYUu1UJK6WwO28",
      "y": "Xb6nFq_7bL4jppnFsQdkyzVe0LlMlEqSGfSMNkl9EN4"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "acc85001-a246-40f1-a5eb-8cb44b74c078",
      "x": "swQqTtZwO5IE30XZzv5wnT24fqZm9CIc1LHn4IbEToQ"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "44ab80e1-ec36-4533-9958-296f64ce7c83",
      "alg": "RSA-OAEP",
      "n": "3op1psIVCBXnRxltjvIMdv3Wp2Ovoe5nDxv_zEWDExRnT20BHIn5CzSL0pR7WFceNjlOM8fCkOaWM4j9bo1s8j_xNIet9wHFfW9yBGOov3VfQmuio8WvNER2RihHotYWbxtT27ub9lwxBy-kxcPqp_9oBo-xbQPrPrC97PXIGfBcPH2qo7C_4YzgfDpNLRL6ImHB2D__3xBpaTLQU7ByMP5tu-wpzhu3PrITf5gXoa-KIHglkXLDIFycXGHnc4Y1iKED2fXoisvN7D_g6YWFXCgOogEsmHZSf3dn0vLZ1uy2IoCpqpy_kHZqmrWL2T4FfYFe5DFv7TGL0id7zbGqGQ"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "89898ba6-9e41-4543-8337-e4fde34368a9",
      "x": "NTkQUfxthR621SV3XLVF6AcWAVkRUbjNJt7I6mV5A6Q",
      "y": "mA-Hep6HBQGF5U6J0zKQ8FlLi3sH6NCY382BxwACBUs",
      "alg": "ECDH-ES"
    }
  ]
}
2020-09-01 12:51:41 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2020-09-01 12:51:41 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2020-09-01 12:51:41 SUCCESS
OIDCCLoadUserInfo
Added user information
user_info
{
  "sub": "user-subject-1234531",
  "name": "Demo T. User",
  "given_name": "Demo",
  "family_name": "User",
  "middle_name": "Theresa",
  "nickname": "Dee",
  "preferred_username": "d.tu",
  "gender": "female",
  "birthdate": "2000-02-03",
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "zoneinfo": "America/Los_Angeles",
  "locale": "en-US",
  "phone_number": "+1 555 5550000",
  "phone_number_verified": false,
  "email": "user@example.com",
  "email_verified": false,
  "website": "https://openid.net/",
  "updated_at": "1580000000"
}
2020-09-01 12:51:41 SUCCESS
GetDynamicClientConfiguration
No client details on configuration, created an empty dynamic_client_registration_template object.
2020-09-01 12:51:41
oidcc-client-test-missing-iat
Setup Done
2020-09-01 12:51:43 INCOMING
oidcc-client-test-missing-iat
Incoming HTTP request to test instance ckeeRF8vRtvjVmi
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
.well-known/openid-configuration
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Discovery endpoint
2020-09-01 12:51:43 OUTGOING
oidcc-client-test-missing-iat
Response to HTTP request to test instance ckeeRF8vRtvjVmi
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "issuer": "https://www.certification.openid.net/test/ckeeRF8vRtvjVmi/",
  "authorization_endpoint": "https://www.certification.openid.net/test/ckeeRF8vRtvjVmi/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/ckeeRF8vRtvjVmi/token",
  "jwks_uri": "https://www.certification.openid.net/test/ckeeRF8vRtvjVmi/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/ckeeRF8vRtvjVmi/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/ckeeRF8vRtvjVmi/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
outgoing_path
.well-known/openid-configuration
2020-09-01 12:51:44 INCOMING
oidcc-client-test-missing-iat
Incoming HTTP request to test instance ckeeRF8vRtvjVmi
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "content-type": "application/json",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "161",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
register
incoming_body_form_params
incoming_method
POST
incoming_body_json
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "id_token token"
  ],
  "grant_types": [
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ]
}
incoming_query_string_params
{}
incoming_body
{"token_endpoint_auth_method":"client_secret_basic","response_types":["id_token token"],"grant_types":["implicit"],"redirect_uris":["https://rp.example.com/cb"]}
Registration endpoint
2020-09-01 12:51:44 SUCCESS
OIDCCExtractDynamicRegistrationRequest
Extracted dynamic client registration request
request
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "id_token token"
  ],
  "grant_types": [
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ]
}
2020-09-01 12:51:44 INFO
EnsureRegistrationRequestContainsAtLeastOneContact
This application requires that registration requests contain at least one contact.
2020-09-01 12:51:44 SUCCESS
ValidateClientGrantTypes
grant_types match response_types
grant_types
[
  "implicit"
]
response_types
[
  "id_token token"
]
2020-09-01 12:51:44 SUCCESS
OIDCCValidateClientRedirectUris
Valid redirect_uri(s) provided in registration request
redirect_uris
[
  "https://rp.example.com/cb"
]
2020-09-01 12:51:44 SUCCESS
ValidateClientLogoUris
Client does not contain any logo_uri
2020-09-01 12:51:44 SUCCESS
ValidateClientUris
Client does not contain any client_uri
2020-09-01 12:51:44 SUCCESS
ValidateClientPolicyUris
Client does not contain any policy_uri
2020-09-01 12:51:44 SUCCESS
ValidateClientTosUris
Client does not contain any tos_uri
2020-09-01 12:51:44 SUCCESS
ValidateClientSubjectType
A subject_type was not provided
2020-09-01 12:51:44 INFO
ValidateIdTokenSignedResponseAlg
Skipped evaluation due to missing required element: client id_token_signed_response_alg
path
id_token_signed_response_alg
mapped
object
client
2020-09-01 12:51:44 SUCCESS
EnsureIdTokenEncryptedResponseAlgIsSetIfEncIsSet
id_token_encrypted_response_enc is not set
2020-09-01 12:51:44 INFO
ValidateUserinfoSignedResponseAlg
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2020-09-01 12:51:44 SUCCESS
EnsureUserinfoEncryptedResponseAlgIsSetIfEncIsSet
userinfo_encrypted_response_enc is not set
2020-09-01 12:51:44 INFO
ValidateRequestObjectSigningAlg
Skipped evaluation due to missing required element: client request_object_signing_alg
path
request_object_signing_alg
mapped
object
client
2020-09-01 12:51:44 SUCCESS
EnsureRequestObjectEncryptionAlgIsSetIfEncIsSet
request_object_encryption_enc is not set
2020-09-01 12:51:44 INFO
ValidateTokenEndpointAuthSigningAlg
Skipped evaluation due to missing required element: client token_endpoint_auth_signing_alg
path
token_endpoint_auth_signing_alg
mapped
object
client
2020-09-01 12:51:44 SUCCESS
ValidateDefaultMaxAge
default_max_age is not set
2020-09-01 12:51:44 INFO
ValidateRequireAuthTime
Skipped evaluation due to missing required element: client require_auth_time
path
require_auth_time
mapped
object
client
2020-09-01 12:51:44 INFO
ValidateDefaultAcrValues
Skipped evaluation due to missing required element: client default_acr_values
path
default_acr_values
mapped
object
client
2020-09-01 12:51:44 INFO
ValidateInitiateLoginUri
Skipped evaluation due to missing required element: client initiate_login_uri
path
initiate_login_uri
mapped
object
client
2020-09-01 12:51:44 INFO
ValidateRequestUris
Skipped evaluation due to missing required element: client request_uris
path
request_uris
mapped
object
client
2020-09-01 12:51:44 SUCCESS
ValidateClientRegistrationRequestSectorIdentifierUri
A sector_identifier_uri was not provided
2020-09-01 12:51:44 SUCCESS
OIDCCRegisterClient
Registered client
client
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "id_token token"
  ],
  "grant_types": [
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_hTVlKmCvMMfGjLc81027+;:~#"
}
2020-09-01 12:51:44
OIDCCCreateClientSecretForDynamicClient
Set the secret for registered client
client_secret
secret_elVCNOvZJcjfpOehxgtKOLJWDCuOERHLmqnenidhYjNdtzwpjG5741431403%'_|}
2020-09-01 12:51:44 SUCCESS
EnsureTokenEndPointAuthMethodIsClientSecretBasic
token_endpoint_auth_method is 'client_secret_basic' as expected
2020-09-01 12:51:44 SUCCESS
EnsureClientDoesNotHaveBothJwksAndJwksUri
Client does not have both jwks and jwks_uri set
client
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "id_token token"
  ],
  "grant_types": [
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_hTVlKmCvMMfGjLc81027+;:~#",
  "client_secret": "secret_elVCNOvZJcjfpOehxgtKOLJWDCuOERHLmqnenidhYjNdtzwpjG5741431403%\u0027_|}"
}
2020-09-01 12:51:44 INFO
FetchClientKeys
Skipped evaluation due to missing required element: client jwks_uri
path
jwks_uri
mapped
object
client
2020-09-01 12:51:44 SUCCESS
OIDCCExtractServerSigningAlg
Using the default algorithm for the first key in server jwks
signing_algorithm
RS256
2020-09-01 12:51:44
SetClientIdTokenSignedResponseAlgToServerSigningAlg
Set id_token_signed_response_alg for the registered client
id_token_signed_response_alg
RS256
2020-09-01 12:51:44 OUTGOING
oidcc-client-test-missing-iat
Response to HTTP request to test instance ckeeRF8vRtvjVmi
outgoing_status_code
201
outgoing_headers
{}
outgoing_body
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "id_token token"
  ],
  "grant_types": [
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_hTVlKmCvMMfGjLc81027+;:~#",
  "client_secret": "secret_elVCNOvZJcjfpOehxgtKOLJWDCuOERHLmqnenidhYjNdtzwpjG5741431403%\u0027_|}",
  "id_token_signed_response_alg": "RS256"
}
outgoing_path
register
2020-09-01 12:51:44 INCOMING
oidcc-client-test-missing-iat
Incoming HTTP request to test instance ckeeRF8vRtvjVmi
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "got/9.6.0 (https://github.com/sindresorhus/got)",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
authorize
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "client_id": "client_hTVlKmCvMMfGjLc81027+;:~#",
  "scope": "openid",
  "response_type": "id_token token",
  "redirect_uri": "https://rp.example.com/cb",
  "state": "SvHbuML4qafJCg05nJGcYEAWMYa4roZcUdQprRuS8WI",
  "nonce": "tC6BePNhZHtl0II8R_nqafLV8173Y8RU2-dBvJxoe1I",
  "response_mode": "form_post"
}
incoming_body
Authorization endpoint
2020-09-01 12:51:44 SUCCESS
EnsureRequestDoesNotContainRequestObject
Request does not contain a request parameter
2020-09-01 12:51:44 SUCCESS
OIDCCEnsureAuthorizationHttpRequestContainsOpenIDScope
Found 'openid' in scope http request parameter
actual
[
  "openid"
]
expected
openid
2020-09-01 12:51:44 SUCCESS
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
effective_authorization_endpoint_request
{
  "client_id": "client_hTVlKmCvMMfGjLc81027+;:~#",
  "scope": "openid",
  "response_type": "id_token token",
  "redirect_uri": "https://rp.example.com/cb",
  "state": "SvHbuML4qafJCg05nJGcYEAWMYa4roZcUdQprRuS8WI",
  "nonce": "tC6BePNhZHtl0II8R_nqafLV8173Y8RU2-dBvJxoe1I",
  "response_mode": "form_post"
}
2020-09-01 12:51:44 SUCCESS
ExtractRequestedScopes
Requested scopes
scope
openid
2020-09-01 12:51:44 SUCCESS
ExtractNonceFromAuthorizationRequest
Extracted nonce
nonce
tC6BePNhZHtl0II8R_nqafLV8173Y8RU2-dBvJxoe1I
2020-09-01 12:51:44 SUCCESS
EnsureResponseTypeIsIdTokenToken
Response type is expected value
expected
id_token token
2020-09-01 12:51:44 SUCCESS
EnsureMatchingClientId
Client ID matched
client_id
client_hTVlKmCvMMfGjLc81027+;:~#
2020-09-01 12:51:44 SUCCESS
EnsureValidRedirectUriForAuthorizationEndpointRequest
redirect_uri is one of the allowed redirect uris
actual
https://rp.example.com/cb
expected
[
  "https://rp.example.com/cb"
]
2020-09-01 12:51:44 SUCCESS
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
actual
[
  "openid"
]
expected
openid
2020-09-01 12:51:44 SUCCESS
DisallowMaxAgeEqualsZeroAndPromptNone
The client did not send max_age=0 and prompt=none parameters as expected
2020-09-01 12:51:44 SUCCESS
GenerateBearerAccessToken
Generated access token
access_token
zk1gJuGAz7CCaesW0wxGXHvqiWqYL4Q3pG2sBvyWsAlHigF3zW
2020-09-01 12:51:44 SUCCESS
CalculateAtHash
Successful at_hash encoding
at_hash
XJfqSlD1RjCsEagJXRiaUw
2020-09-01 12:51:44 SUCCESS
GenerateIdTokenClaims
Created ID Token Claims
iss
https://www.certification.openid.net/test/ckeeRF8vRtvjVmi/
sub
user-subject-1234531
aud
client_hTVlKmCvMMfGjLc81027+;:~#
nonce
tC6BePNhZHtl0II8R_nqafLV8173Y8RU2-dBvJxoe1I
iat
1598964704
exp
1598965004
2020-09-01 12:51:44 SUCCESS
RemoveIatFromIdToken
Removed iat from ID token claims
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/ckeeRF8vRtvjVmi/",
  "sub": "user-subject-1234531",
  "aud": "client_hTVlKmCvMMfGjLc81027+;:~#",
  "nonce": "tC6BePNhZHtl0II8R_nqafLV8173Y8RU2-dBvJxoe1I",
  "exp": 1598965004
}
2020-09-01 12:51:44 INFO
AddCHashToIdTokenClaims
Skipped evaluation due to missing required string: c_hash
expected
c_hash
2020-09-01 12:51:44 SUCCESS
AddAtHashToIdTokenClaims
Added at_hash to ID token claims
at_hash
XJfqSlD1RjCsEagJXRiaUw
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/ckeeRF8vRtvjVmi/",
  "sub": "user-subject-1234531",
  "aud": "client_hTVlKmCvMMfGjLc81027+;:~#",
  "nonce": "tC6BePNhZHtl0II8R_nqafLV8173Y8RU2-dBvJxoe1I",
  "exp": 1598965004,
  "at_hash": "XJfqSlD1RjCsEagJXRiaUw"
}
2020-09-01 12:51:44 SUCCESS
OIDCCSignIdToken
Signed the ID token
id_token
eyJraWQiOiI0MTllMmI3YS04MWJjLTQzOWUtYTZhMC0yOTdjYzE1M2FjYzQiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiWEpmcVNsRDFSakNzRWFnSlhSaWFVdyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X2hUVmxLbUN2TU1mR2pMYzgxMDI3Kzs6fiMiLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvY2tlZVJGOHZSdHZqVm1pXC8iLCJleHAiOjE1OTg5NjUwMDQsIm5vbmNlIjoidEM2QmVQTmhaSHRsMElJOFJfbnFhZkxWODE3M1k4UlUyLWRCdkp4b2UxSSJ9.KyKqcDSCU1iUMACb8pmrW1FI1bubcUL7N5SMJ0mrk9aRBOST4nmWGH76GWUueXtKSol93WUfcnL0oARrhQQN-IbgOEHGloHuYn-wHS8xgMLgxoD-1LOMnzVTifajpcwchMiUH5yZGy8WCNgDhLKn_QBqj7Iw-3GhACTVerzE0e54aqbsQHOtZYjz8fLNk16oK3bSXAaJHspLCPoM02QQCZkUNRQxubuI9KSQqJrTbjVJQF0SVV8Ajg17s5HAzIcPriJKCfBUzWEANlr2mwHyO0Ok9hv_v7fHAjfJqywaYCUA-FEpyGOksyTOJA0csRxhs1mwuVqONRwYev9Fn35o8g
key
{"p":"6jrYl4nqeaL7oAn3SFc1IUhxKXeC032Be-EDJhaqJJD2EUxbk1jxYDLIeo2c2iioxwuk-a3-gnKoXC_3JXXi8iM5nZ_iZRnqAJ8G4ploeP_ivGZolP4u93NLchmqiHo5y9Wvv3uRg9hOjcn70qGoK3dRphjPxbh-6-s2WENBK10","kty":"RSA","q":"s9lwwOg-GEust1bSunsFjseW4_dJ_GzlbTRW8-IQMJ2DHuUd-FmSMkxlL2Ud1RNb7H3flTVGCiA00fweN_Y3EjBeQl8FV8audZqrpXHUmYgO4giG1TPZl6sEUo7a5uwhdHPKWKtHWIJbYQqiUl4CCIAB8EzH2ej6GPVOxL5_bVk","d":"Z_PgIvDfQr6wS-BHQNp8PFymSclUArdUzTa3X8fgZUM0ayV7y7i17OHxbU4zkraQc7Sdz2_6JkvrUru_XPCjhm1Gyr-hcfh6Il8eeDoOeSg6DE1iG455qPITeMwmOd6R9qX2b87PV1fz--lOoStIZm-e4Zk--dlxDeDy7Ac8FJlT01ZAoW8rSAq4gTGtPn5oib21rPd5J3QkogaHzgjwEVfZ1vvZqBOrJnkSaHzKUR50VPW1U6EYwWaUAP-Yz5A2TEr4UAjwMkALuL5zQv-pUfQzJAdsW7c79B39JGbq1JK3MyH60vvAdtng7zeJQVaHmL_g5KAWajSixdUBI_3OoQ","e":"AQAB","use":"sig","kid":"419e2b7a-81bc-439e-a6a0-297cc153acc4","qi":"HXLvWlaJMVqKflp28LDCCJoUOyxML2t9C60EkVff1bzXDHMOr99aBZdgqTDaLTNQtVps8Xcc_mFJN6V-IDUf7d7nTqmmfy41yxjcQBfINIqVKBBEqfyFy-S-yygzueuxxl1Ctyo_aAwfhvozTuK576WDMomx7S8xDOEo24Jy9aE","dp":"xjms6XpPVEeJWaR1gORE03kCQ8yfjCpP9a20w3w026NOi88qROXlyLrRjV3hW4NDashBAwisNmugbfwt1acRvEfxT6NqrpMixQnQgt6_Wn97vGOSqF0BFGufct2jw8JkvUuHY67ItGLQABDrLBOhRb_B-qZO2A7OYwv5PvMT6QU","dq":"YZzYt7rVSPZ5raBwC0qN_6qQWPZ0r46jDxxjPUcrJle3PON52rsywB36pTiqcmVpdPf0i9U4SHKmeHnwJMt7pGGgJ0HPco6hTa8_DjK0Awh3m3KpS7oylUD6vZxPbxomJkBaSLndpUpLMmZFJ5NiYx6m7redmMX8R-OMdvg1zTE","n":"pI4Yfc1FvZChbZFS29TfBEQPDZt7IX3V_kDX0SZVB3X_D_JKfjTz4lfuIzsZtcy79yblnZunHwKjUhdyubAzGBO4ZWX_LmsielQJt19rt3KxApAG4bxZNfxhDE8RTrniljg9IL-6-0cWMQSPfto5CL_qvI7j4Nzj0WOs80Twjxl4N09WR6Cs1m_nAykqDlxkz66cntJKm1FcnZYROCflwgi-aTj-o_wjWcBglD9qraGXCL317jJN4HfRZk9wQHWLCRv__rcQNNJNKPKSvOG4bhHEYFIyi6QgNV6GAQmOzviUrwQdQ-Tr1C0plgadzbH8zjWtEYKLZOszub4JqkGsVQ"}
algorithm
RS256
2020-09-01 12:51:44 INFO
EncryptIdToken
Skipped evaluation due to missing required element: client id_token_encrypted_response_alg
path
id_token_encrypted_response_alg
mapped
object
client
2020-09-01 12:51:44 SUCCESS
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "SvHbuML4qafJCg05nJGcYEAWMYa4roZcUdQprRuS8WI"
}
2020-09-01 12:51:44 SUCCESS
AddIdTokenToAuthorizationEndpointResponseParams
Added id_token to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "SvHbuML4qafJCg05nJGcYEAWMYa4roZcUdQprRuS8WI",
  "id_token": "eyJraWQiOiI0MTllMmI3YS04MWJjLTQzOWUtYTZhMC0yOTdjYzE1M2FjYzQiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiWEpmcVNsRDFSakNzRWFnSlhSaWFVdyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X2hUVmxLbUN2TU1mR2pMYzgxMDI3Kzs6fiMiLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvY2tlZVJGOHZSdHZqVm1pXC8iLCJleHAiOjE1OTg5NjUwMDQsIm5vbmNlIjoidEM2QmVQTmhaSHRsMElJOFJfbnFhZkxWODE3M1k4UlUyLWRCdkp4b2UxSSJ9.KyKqcDSCU1iUMACb8pmrW1FI1bubcUL7N5SMJ0mrk9aRBOST4nmWGH76GWUueXtKSol93WUfcnL0oARrhQQN-IbgOEHGloHuYn-wHS8xgMLgxoD-1LOMnzVTifajpcwchMiUH5yZGy8WCNgDhLKn_QBqj7Iw-3GhACTVerzE0e54aqbsQHOtZYjz8fLNk16oK3bSXAaJHspLCPoM02QQCZkUNRQxubuI9KSQqJrTbjVJQF0SVV8Ajg17s5HAzIcPriJKCfBUzWEANlr2mwHyO0Ok9hv_v7fHAjfJqywaYCUA-FEpyGOksyTOJA0csRxhs1mwuVqONRwYev9Fn35o8g"
}
2020-09-01 12:51:44
AddTokenToAuthorizationEndpointResponseParams
Added token and token_type to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "SvHbuML4qafJCg05nJGcYEAWMYa4roZcUdQprRuS8WI",
  "id_token": "eyJraWQiOiI0MTllMmI3YS04MWJjLTQzOWUtYTZhMC0yOTdjYzE1M2FjYzQiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiWEpmcVNsRDFSakNzRWFnSlhSaWFVdyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X2hUVmxLbUN2TU1mR2pMYzgxMDI3Kzs6fiMiLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvY2tlZVJGOHZSdHZqVm1pXC8iLCJleHAiOjE1OTg5NjUwMDQsIm5vbmNlIjoidEM2QmVQTmhaSHRsMElJOFJfbnFhZkxWODE3M1k4UlUyLWRCdkp4b2UxSSJ9.KyKqcDSCU1iUMACb8pmrW1FI1bubcUL7N5SMJ0mrk9aRBOST4nmWGH76GWUueXtKSol93WUfcnL0oARrhQQN-IbgOEHGloHuYn-wHS8xgMLgxoD-1LOMnzVTifajpcwchMiUH5yZGy8WCNgDhLKn_QBqj7Iw-3GhACTVerzE0e54aqbsQHOtZYjz8fLNk16oK3bSXAaJHspLCPoM02QQCZkUNRQxubuI9KSQqJrTbjVJQF0SVV8Ajg17s5HAzIcPriJKCfBUzWEANlr2mwHyO0Ok9hv_v7fHAjfJqywaYCUA-FEpyGOksyTOJA0csRxhs1mwuVqONRwYev9Fn35o8g",
  "access_token": "zk1gJuGAz7CCaesW0wxGXHvqiWqYL4Q3pG2sBvyWsAlHigF3zW",
  "token_type": "Bearer"
}
2020-09-01 12:51:44 OUTGOING
oidcc-client-test-missing-iat
Response to HTTP request to test instance ckeeRF8vRtvjVmi
outgoing
ModelAndView [view="formPostResponseMode"; model={formAction=https://rp.example.com/cb, formParameters={"state":"SvHbuML4qafJCg05nJGcYEAWMYa4roZcUdQprRuS8WI","id_token":"eyJraWQiOiI0MTllMmI3YS04MWJjLTQzOWUtYTZhMC0yOTdjYzE1M2FjYzQiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiWEpmcVNsRDFSakNzRWFnSlhSaWFVdyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X2hUVmxLbUN2TU1mR2pMYzgxMDI3Kzs6fiMiLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvY2tlZVJGOHZSdHZqVm1pXC8iLCJleHAiOjE1OTg5NjUwMDQsIm5vbmNlIjoidEM2QmVQTmhaSHRsMElJOFJfbnFhZkxWODE3M1k4UlUyLWRCdkp4b2UxSSJ9.KyKqcDSCU1iUMACb8pmrW1FI1bubcUL7N5SMJ0mrk9aRBOST4nmWGH76GWUueXtKSol93WUfcnL0oARrhQQN-IbgOEHGloHuYn-wHS8xgMLgxoD-1LOMnzVTifajpcwchMiUH5yZGy8WCNgDhLKn_QBqj7Iw-3GhACTVerzE0e54aqbsQHOtZYjz8fLNk16oK3bSXAaJHspLCPoM02QQCZkUNRQxubuI9KSQqJrTbjVJQF0SVV8Ajg17s5HAzIcPriJKCfBUzWEANlr2mwHyO0Ok9hv_v7fHAjfJqywaYCUA-FEpyGOksyTOJA0csRxhs1mwuVqONRwYev9Fn35o8g","access_token":"zk1gJuGAz7CCaesW0wxGXHvqiWqYL4Q3pG2sBvyWsAlHigF3zW","token_type":"Bearer"}}]
outgoing_path
authorize
2020-09-01 12:51:46 FINISHED
oidcc-client-test-missing-iat
Test has run to completion
testmodule_result
PASSED
Test Results