Test Summary

Test Results

Expand All Collapse All
All times are UTC
2020-09-01 12:51:31 INFO
TEST-RUNNER
Test instance FkMB0taLwF0DTL8 created
baseUrl
https://www.certification.openid.net/test/FkMB0taLwF0DTL8
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "id_token token",
  "request_type": "plain_http_request",
  "response_mode": "form_post",
  "client_registration": "dynamic_client"
}
alias

                                
description
test suite runner for openid-client
planId
2AWaC6uTX8byR
config
{
  "description": "test suite runner for openid-client",
  "waitTimeoutSeconds": 2
}
testName
oidcc-client-test-invalid-aud
2020-09-01 12:51:31 SUCCESS
OIDCCGenerateServerConfiguration
Generated default server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/FkMB0taLwF0DTL8/",
  "authorization_endpoint": "https://www.certification.openid.net/test/FkMB0taLwF0DTL8/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/FkMB0taLwF0DTL8/token",
  "jwks_uri": "https://www.certification.openid.net/test/FkMB0taLwF0DTL8/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/FkMB0taLwF0DTL8/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/FkMB0taLwF0DTL8/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post",
    "client_secret_jwt",
    "private_key_jwt"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2020-09-01 12:51:31
SetTokenEndpointAuthMethodsSupportedToClientSecretBasicOnly
Changed token_endpoint_auth_methods_supported to client_secret_basic only in server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/FkMB0taLwF0DTL8/",
  "authorization_endpoint": "https://www.certification.openid.net/test/FkMB0taLwF0DTL8/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/FkMB0taLwF0DTL8/token",
  "jwks_uri": "https://www.certification.openid.net/test/FkMB0taLwF0DTL8/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/FkMB0taLwF0DTL8/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/FkMB0taLwF0DTL8/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2020-09-01 12:51:32
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "-fEvn9OOXe0wljJFCHNROBD3Fd4t_SpawEnNNiHEiFKTFml-vqHYv2lgnTF_TS91V3enXk2O0CVCmuMXieW0lUyhBxAm0boqMAHPG2TuRO98FsSqMkTWDZHxxfRc31U5K7jxq_zW0btqhQ8ml5umbBtmv9u9X1GTQrj8Bz3o_hE",
      "kty": "RSA",
      "q": "2J5nmPEJ-BgjspegfR6Iw31r-dt-fZ9-dc05DQteE7WfkiHy8kugV5mAcmrgE7QnnLiv9RyeOL2Fps3duxSMi4rWnBvIwfmFBMs-3yteaiVCeuv-LtecKCi94TyMuptW5E9NrY4FWPQJT2_UVvR4AzdlTmPrDVI_U7yKsCsovOE",
      "d": "xSoieqfWGF2LpBK0okU_6GU1vUBopOw6ciWOO9v5cFva6a9k0k3YwDU9PNKoA1kSC55bVbbWrrHHafPCxdFQZomPLXud8kpRBJM3A8JfRJefEA-Diw1eFCjnbtM7r1xHmhiTfs3SOCZDC8aHN02HJaQEzL47WhCVtIyLZUBXO6YShemCDesk-qH-koletF98GHLX19pZbcz5TYGJiySA-DMKAC04pHezMITFi3DKL4rAJicDcTW9lutDbNEKbAZXuWdxkFcD9h5OyqS8xySyIeQPJYnVrT5tG0vHEqXU6PmNLZe2SjPCSW6mm2BTA3MUZTA2WxYeRz9AACY7Us4-AQ",
      "e": "AQAB",
      "use": "sig",
      "kid": "c11022f6-78c8-435b-8154-7289328684f5",
      "qi": "IVHZ7FHCgdEzx3qpg7iviXiglH0TClnNxzsc-qlPcVN-r_T8cZZiYmCkzaN8Y6ehthn7IJouwO8HVxsxIJGd8B1JxHjDJEJ-FRXroQFmgB2dCmYVjcmQNUTKk_pchBBMOUeo7CpDqNT9RWZ1bIakzTyVXe9pTkyyuZUAqWC64xg",
      "dp": "r7cKHjji69GmyNEKi0hXHy1-KBeNCWDPcEPyS04uFxDGa4k7G9Y4xUjWLWzw7FijDB0Iw1mPP3ISg0WH9OBStmurAYYvZF6W7i03ZzDr-fbLrE4SwUh3nA6whNSovjHyAXUCIkGc3NH_rw_Zt9grhfE1qUhYuDxnZQ8b0BOMS6E",
      "dq": "pfSNx-V6zsCnsK5rvQ_ElYikTZL0kIe92cB1YeIAnDb8Xnd16l04JYSrnHz22QGfi3kPDUl0imHgYA--PRKcLlga3RSINNvWJfsUWuOd_NI44XWlkfuLXlUAS-wYoOpboqSDDWEOBb1I2LwDQO8gds5c5ba1IMqPS7bZxef62OE",
      "n": "034oL5vYD6tYFgQZ0JoAjTWryCFgqFw2UCfkFVhT4ujfPGrw1-ILpgoWW8DibCIYnYOtNGoG4vGh-3rK7l9vBfqisiokJsR8VutndffxUE5i2-FClAWV_VKOFXBqzpyUALiwDAF-9nyETAw7Ehu9dVjz3VX1nkd5GgRh8ASccKQwH_WU6_P_T5GOcTWlIvVMskdbpMhtswkJfA3yeoerhGmGGnOklz43111_Yr5w4kr_zJBeGsIg879HXFiTJ-u-Anuxd5ozm48l0kLInQ1H9kM1shYid0Qd0_bbNmFQSkyJSfbAmLd9MDvQNsGBLBLAmEzVz1DofK1W0niZEgPI8Q"
    },
    {
      "kty": "EC",
      "d": "XMXCCwbB3Y1wP3eo2Fmog51sRbh4FOqO_MEuFoy8C8w",
      "use": "sig",
      "crv": "P-256",
      "kid": "855da79e-d1ba-41c5-938f-6e59710b89c2",
      "x": "twwiBz_H9uORCapyjKh1J5MDV-G4sQ9PQg1i4v2Rh1Q",
      "y": "8lF-vXP8325dnFY98eg9iZNuqrVa9KdimV1To_Ra-Jw"
    },
    {
      "kty": "EC",
      "d": "QWN3RjvF-U0FWWZroGQErGeIyA6SCAi_8sjcr_ajkns",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "53b5e3d8-179a-4cd7-b07c-e63cd27c5cf9",
      "x": "tY6huT2ZBtG7dm8TpXCyb_q6aFeF5VfsVX15bcV4eE4",
      "y": "ZOZWl4XcYQ1GWf4xQfJjiQoyHB28jmDXPUZOcpfxQrs"
    },
    {
      "kty": "OKP",
      "d": "5D6F2j5_7hN_hrMtznVc2otEnt5V3Cz1SOo7gYw5388",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "d28c4d01-1855-4351-88dc-e799b6c9abbb",
      "x": "JsJ7a05viNsUto7_UUQzvI3r9e3onG70gIHLZjtRhuI"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "2lBeROF1X3I_zuBIvbVXl4z_Bbyz5c62yEQLZItvUT4VfkliCuyGI2pQ7IQ2RUu5OXvOHG2lytDPck_n7cAHGoJWJpRNsub-6KppQx9Tho5qpzMpl-qYuP0Lg5DV_z5meHb8bs8kBiOZcN95dREtE-NPd30luC1dcT8mvFjBbGc",
      "kty": "RSA",
      "q": "m_Hy6Z9i2pKmNxO_kVBR4-rjKDVEGcjfpzyQxr3hDeteFTRNe1dlaJFjDNMZ2AC6NDLRYQ2MBiq8iXCs4pGNdgTBOa5QQqw8ZfL3a8LPrIKkd1AJdqfMqr4I2nScTs3CGKE3xDpTPoksuZHDkiPcrbc5RB9eIheLolsFnoqBFNU",
      "d": "biv81V2VMvKsa9us3hho1DG6zM33p9iLJkXbs_bL128pvLOkHn-XdVRanm4bECPELU3OTfxd2hRVowhfBX9FpPk_MrRScnTn3xXi-MqwO4cP_iisQZFqVx-52kfWA5DCmxCpWnjw9k7-3cVEcOyXEUznqv3VT72LHe_4xNS7mGA2JOjnRSyzkTT9QTss3om9Yw2yM95d1jiir5AkAKBJPP2m79HHQ5xAf00IEWvkgFbLm0XIGGgY8Cg56GwnpFvfHgJcryGaLR2csFlPyo8yckXAKTYA75XsR5wbAmBIwZVriUQp3kUkMpcPHe4-NQySzt_qtFEND54fG3A8ezDV2Q",
      "e": "AQAB",
      "use": "enc",
      "kid": "42ff139c-cdb2-4578-a02b-f8b7d09817a0",
      "qi": "vTHnvgPhfQ7rDO3eplwATKMfcQJe-Zz8DjyTE5UDx8h4kNOxNqm-kDWonQYZAMdJPY2ctaDILwP0k3QBrSzGGA33pElF_8N--AerCiIkYaw2EzfM2pprlDkQBK9XyMw4O1qDnZ_5uWxL6wiPntq86-APn5CiUUbdaRdvHQQuAIo",
      "dp": "FFHutFKX7i5gKg1ON_otEPoaspoB1J4M_U74EH-5-MHilkKWUZX6VkmLBri3pHOL5gHUCWlbSSluZaFyYPrCroD7K9QZ91Dw4Q8bhRfhWmDfJHjqoi0_0dgbvj846-0O9J9-l4HIRJoDqjHiyDa1D2jU-LY5UI9IZ0YNgPJx7nk",
      "alg": "RSA-OAEP",
      "dq": "ZfTqPJRYrU70HU5sETXSVJFdswwgWjta_pw6i7XZTqB0AqkPf3TEeHmVqOzcGL1hAH-5JRsWUXHfknx4jClds6uoKW4uS2kQlBcmbO4RmVhQ7zEE_u72gSt93lYfW-Zq4G-HZmQ7yMcm1qzWkNWhknIYntFjWibKxHt-UQl9G4E",
      "n": "hPz946eJcdGNf-iUGhvv26--SFzHEEhJvU3cfA7hT2TR_lsvgYAbG2iHskwxzXnuREGrvTokTw4hRs67SRAPfFj8ORHrFlUoQz8VmAnjRrqOwJ4GlV_msQuGE1SnEIoqEVuVnzo-YMOllfTuCAyF_quR_Eg4AS7NTg4cb6l4LjHJCys67s1M5yTP_URKaMqpmbSqT2NbPlAmp3ZMs5vtP_ACP1v-8TC-A32AY9dHXReSfSwaQtXSDxF-TcqGPvjW3isaUC3eB_CywBc1H41nWIXc7xU_lrR9i0d0Rj0llgtsRvGfOnE4jkELzZ6Tcl37gM_HYuA1zY56btoeG049sw"
    },
    {
      "kty": "EC",
      "d": "_A9N9nBJDIcGjtRiQX7xgFIYRKZ3eblrD2rMTwjIgeY",
      "use": "enc",
      "crv": "P-256",
      "kid": "24cac815-eb66-4217-8afb-5c78eb1986b7",
      "x": "u6GEnEVTn4NRxwVwBzsq9KGF27yqwg1O5_s0aGq8_Nw",
      "y": "yX3mQOQ8F0fsrFDeaWltwZpAsDLdYORKvMU7I5IOwx4",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "c11022f6-78c8-435b-8154-7289328684f5",
      "n": "034oL5vYD6tYFgQZ0JoAjTWryCFgqFw2UCfkFVhT4ujfPGrw1-ILpgoWW8DibCIYnYOtNGoG4vGh-3rK7l9vBfqisiokJsR8VutndffxUE5i2-FClAWV_VKOFXBqzpyUALiwDAF-9nyETAw7Ehu9dVjz3VX1nkd5GgRh8ASccKQwH_WU6_P_T5GOcTWlIvVMskdbpMhtswkJfA3yeoerhGmGGnOklz43111_Yr5w4kr_zJBeGsIg879HXFiTJ-u-Anuxd5ozm48l0kLInQ1H9kM1shYid0Qd0_bbNmFQSkyJSfbAmLd9MDvQNsGBLBLAmEzVz1DofK1W0niZEgPI8Q"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "98978705-f728-4c84-ac7e-3fa981471c8a",
      "n": "pAMUZMCH1zikpQ3HSJjs7VpjvMw67viH32ftTzj4u0qa47YaQ97ORScM7xoNVmKBYqShXHyfSl2QsbeBJQ39CoG4EU3JRHqZXb_HwE-MaaMloi-ysYOtKltl_gXz-pa9fXk5V1UTxfY0031f_dbQXRWZeOFegp1MxmQVObYUy0WVmoaaw23iqPjPIcQYmn-He6C2DTAyM3zEvGF7sE2I05JV9d5-34oiwxBOUQac4UboGzH6dFV_OrKAxs9fv-lBE27Tp8koY7gPq6BSKln4zOJ-6XuL0WPhx1HxCNYWLiO4n37lKdfO5kWMFpavgYNV7p3SOG6CHop40s7kGaWoKw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "855da79e-d1ba-41c5-938f-6e59710b89c2",
      "x": "twwiBz_H9uORCapyjKh1J5MDV-G4sQ9PQg1i4v2Rh1Q",
      "y": "8lF-vXP8325dnFY98eg9iZNuqrVa9KdimV1To_Ra-Jw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "ee38ccb8-4eae-4baf-b46b-3300aa10bcd8",
      "x": "coJrS-dIyf49ed4gGN3yyG2U8TZc-qXxEZhgDN0-l0Q",
      "y": "CmfmcWWg-_2uIgmuosfxl9tZuu6RadOX4rE-q7eBPQQ"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "53b5e3d8-179a-4cd7-b07c-e63cd27c5cf9",
      "x": "tY6huT2ZBtG7dm8TpXCyb_q6aFeF5VfsVX15bcV4eE4",
      "y": "ZOZWl4XcYQ1GWf4xQfJjiQoyHB28jmDXPUZOcpfxQrs"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "d28c4d01-1855-4351-88dc-e799b6c9abbb",
      "x": "JsJ7a05viNsUto7_UUQzvI3r9e3onG70gIHLZjtRhuI"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "42ff139c-cdb2-4578-a02b-f8b7d09817a0",
      "alg": "RSA-OAEP",
      "n": "hPz946eJcdGNf-iUGhvv26--SFzHEEhJvU3cfA7hT2TR_lsvgYAbG2iHskwxzXnuREGrvTokTw4hRs67SRAPfFj8ORHrFlUoQz8VmAnjRrqOwJ4GlV_msQuGE1SnEIoqEVuVnzo-YMOllfTuCAyF_quR_Eg4AS7NTg4cb6l4LjHJCys67s1M5yTP_URKaMqpmbSqT2NbPlAmp3ZMs5vtP_ACP1v-8TC-A32AY9dHXReSfSwaQtXSDxF-TcqGPvjW3isaUC3eB_CywBc1H41nWIXc7xU_lrR9i0d0Rj0llgtsRvGfOnE4jkELzZ6Tcl37gM_HYuA1zY56btoeG049sw"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "24cac815-eb66-4217-8afb-5c78eb1986b7",
      "x": "u6GEnEVTn4NRxwVwBzsq9KGF27yqwg1O5_s0aGq8_Nw",
      "y": "yX3mQOQ8F0fsrFDeaWltwZpAsDLdYORKvMU7I5IOwx4",
      "alg": "ECDH-ES"
    }
  ]
}
2020-09-01 12:51:32 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2020-09-01 12:51:32 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2020-09-01 12:51:32 SUCCESS
OIDCCLoadUserInfo
Added user information
user_info
{
  "sub": "user-subject-1234531",
  "name": "Demo T. User",
  "given_name": "Demo",
  "family_name": "User",
  "middle_name": "Theresa",
  "nickname": "Dee",
  "preferred_username": "d.tu",
  "gender": "female",
  "birthdate": "2000-02-03",
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "zoneinfo": "America/Los_Angeles",
  "locale": "en-US",
  "phone_number": "+1 555 5550000",
  "phone_number_verified": false,
  "email": "user@example.com",
  "email_verified": false,
  "website": "https://openid.net/",
  "updated_at": "1580000000"
}
2020-09-01 12:51:32 SUCCESS
GetDynamicClientConfiguration
No client details on configuration, created an empty dynamic_client_registration_template object.
2020-09-01 12:51:32
oidcc-client-test-invalid-aud
Setup Done
2020-09-01 12:51:35 INCOMING
oidcc-client-test-invalid-aud
Incoming HTTP request to test instance FkMB0taLwF0DTL8
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
.well-known/openid-configuration
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Discovery endpoint
2020-09-01 12:51:35 OUTGOING
oidcc-client-test-invalid-aud
Response to HTTP request to test instance FkMB0taLwF0DTL8
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "issuer": "https://www.certification.openid.net/test/FkMB0taLwF0DTL8/",
  "authorization_endpoint": "https://www.certification.openid.net/test/FkMB0taLwF0DTL8/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/FkMB0taLwF0DTL8/token",
  "jwks_uri": "https://www.certification.openid.net/test/FkMB0taLwF0DTL8/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/FkMB0taLwF0DTL8/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/FkMB0taLwF0DTL8/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
outgoing_path
.well-known/openid-configuration
2020-09-01 12:51:35 INCOMING
oidcc-client-test-invalid-aud
Incoming HTTP request to test instance FkMB0taLwF0DTL8
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "content-type": "application/json",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "161",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
register
incoming_body_form_params
incoming_method
POST
incoming_body_json
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "id_token token"
  ],
  "grant_types": [
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ]
}
incoming_query_string_params
{}
incoming_body
{"token_endpoint_auth_method":"client_secret_basic","response_types":["id_token token"],"grant_types":["implicit"],"redirect_uris":["https://rp.example.com/cb"]}
Registration endpoint
2020-09-01 12:51:35 SUCCESS
OIDCCExtractDynamicRegistrationRequest
Extracted dynamic client registration request
request
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "id_token token"
  ],
  "grant_types": [
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ]
}
2020-09-01 12:51:35 INFO
EnsureRegistrationRequestContainsAtLeastOneContact
This application requires that registration requests contain at least one contact.
2020-09-01 12:51:35 SUCCESS
ValidateClientGrantTypes
grant_types match response_types
grant_types
[
  "implicit"
]
response_types
[
  "id_token token"
]
2020-09-01 12:51:35 SUCCESS
OIDCCValidateClientRedirectUris
Valid redirect_uri(s) provided in registration request
redirect_uris
[
  "https://rp.example.com/cb"
]
2020-09-01 12:51:35 SUCCESS
ValidateClientLogoUris
Client does not contain any logo_uri
2020-09-01 12:51:35 SUCCESS
ValidateClientUris
Client does not contain any client_uri
2020-09-01 12:51:35 SUCCESS
ValidateClientPolicyUris
Client does not contain any policy_uri
2020-09-01 12:51:35 SUCCESS
ValidateClientTosUris
Client does not contain any tos_uri
2020-09-01 12:51:35 SUCCESS
ValidateClientSubjectType
A subject_type was not provided
2020-09-01 12:51:35 INFO
ValidateIdTokenSignedResponseAlg
Skipped evaluation due to missing required element: client id_token_signed_response_alg
path
id_token_signed_response_alg
mapped
object
client
2020-09-01 12:51:35 SUCCESS
EnsureIdTokenEncryptedResponseAlgIsSetIfEncIsSet
id_token_encrypted_response_enc is not set
2020-09-01 12:51:35 INFO
ValidateUserinfoSignedResponseAlg
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2020-09-01 12:51:35 SUCCESS
EnsureUserinfoEncryptedResponseAlgIsSetIfEncIsSet
userinfo_encrypted_response_enc is not set
2020-09-01 12:51:35 INFO
ValidateRequestObjectSigningAlg
Skipped evaluation due to missing required element: client request_object_signing_alg
path
request_object_signing_alg
mapped
object
client
2020-09-01 12:51:35 SUCCESS
EnsureRequestObjectEncryptionAlgIsSetIfEncIsSet
request_object_encryption_enc is not set
2020-09-01 12:51:35 INFO
ValidateTokenEndpointAuthSigningAlg
Skipped evaluation due to missing required element: client token_endpoint_auth_signing_alg
path
token_endpoint_auth_signing_alg
mapped
object
client
2020-09-01 12:51:35 SUCCESS
ValidateDefaultMaxAge
default_max_age is not set
2020-09-01 12:51:35 INFO
ValidateRequireAuthTime
Skipped evaluation due to missing required element: client require_auth_time
path
require_auth_time
mapped
object
client
2020-09-01 12:51:35 INFO
ValidateDefaultAcrValues
Skipped evaluation due to missing required element: client default_acr_values
path
default_acr_values
mapped
object
client
2020-09-01 12:51:35 INFO
ValidateInitiateLoginUri
Skipped evaluation due to missing required element: client initiate_login_uri
path
initiate_login_uri
mapped
object
client
2020-09-01 12:51:35 INFO
ValidateRequestUris
Skipped evaluation due to missing required element: client request_uris
path
request_uris
mapped
object
client
2020-09-01 12:51:35 SUCCESS
ValidateClientRegistrationRequestSectorIdentifierUri
A sector_identifier_uri was not provided
2020-09-01 12:51:35 SUCCESS
OIDCCRegisterClient
Registered client
client
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "id_token token"
  ],
  "grant_types": [
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_dpdTReZLprFTLBQ04553+[:%_"
}
2020-09-01 12:51:35
OIDCCCreateClientSecretForDynamicClient
Set the secret for registered client
client_secret
secret_hLxTOdONIkHweMoyFzEyFREeKvoevrKeFuhIVVWVJIVpLcpUBS8158346185/"?!\
2020-09-01 12:51:35 SUCCESS
EnsureTokenEndPointAuthMethodIsClientSecretBasic
token_endpoint_auth_method is 'client_secret_basic' as expected
2020-09-01 12:51:35 SUCCESS
EnsureClientDoesNotHaveBothJwksAndJwksUri
Client does not have both jwks and jwks_uri set
client
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "id_token token"
  ],
  "grant_types": [
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_dpdTReZLprFTLBQ04553+[:%_",
  "client_secret": "secret_hLxTOdONIkHweMoyFzEyFREeKvoevrKeFuhIVVWVJIVpLcpUBS8158346185/\"?!\\"
}
2020-09-01 12:51:35 INFO
FetchClientKeys
Skipped evaluation due to missing required element: client jwks_uri
path
jwks_uri
mapped
object
client
2020-09-01 12:51:35 SUCCESS
OIDCCExtractServerSigningAlg
Using the default algorithm for the first key in server jwks
signing_algorithm
RS256
2020-09-01 12:51:35
SetClientIdTokenSignedResponseAlgToServerSigningAlg
Set id_token_signed_response_alg for the registered client
id_token_signed_response_alg
RS256
2020-09-01 12:51:35 OUTGOING
oidcc-client-test-invalid-aud
Response to HTTP request to test instance FkMB0taLwF0DTL8
outgoing_status_code
201
outgoing_headers
{}
outgoing_body
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "id_token token"
  ],
  "grant_types": [
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_dpdTReZLprFTLBQ04553+[:%_",
  "client_secret": "secret_hLxTOdONIkHweMoyFzEyFREeKvoevrKeFuhIVVWVJIVpLcpUBS8158346185/\"?!\\",
  "id_token_signed_response_alg": "RS256"
}
outgoing_path
register
2020-09-01 12:51:36 INCOMING
oidcc-client-test-invalid-aud
Incoming HTTP request to test instance FkMB0taLwF0DTL8
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "got/9.6.0 (https://github.com/sindresorhus/got)",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
authorize
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "client_id": "client_dpdTReZLprFTLBQ04553+[:%_",
  "scope": "openid",
  "response_type": "id_token token",
  "redirect_uri": "https://rp.example.com/cb",
  "state": "vzKfyBgOwJnrGJiY7pXXFyzHv8uxZ7D0qo5oPlH-mnw",
  "nonce": "Kes19QKnnrrIEN_rk8GRxM1IiC7gk0rb02GfguJH7qg",
  "response_mode": "form_post"
}
incoming_body
Authorization endpoint
2020-09-01 12:51:36 SUCCESS
EnsureRequestDoesNotContainRequestObject
Request does not contain a request parameter
2020-09-01 12:51:36 SUCCESS
OIDCCEnsureAuthorizationHttpRequestContainsOpenIDScope
Found 'openid' in scope http request parameter
actual
[
  "openid"
]
expected
openid
2020-09-01 12:51:36 SUCCESS
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
effective_authorization_endpoint_request
{
  "client_id": "client_dpdTReZLprFTLBQ04553+[:%_",
  "scope": "openid",
  "response_type": "id_token token",
  "redirect_uri": "https://rp.example.com/cb",
  "state": "vzKfyBgOwJnrGJiY7pXXFyzHv8uxZ7D0qo5oPlH-mnw",
  "nonce": "Kes19QKnnrrIEN_rk8GRxM1IiC7gk0rb02GfguJH7qg",
  "response_mode": "form_post"
}
2020-09-01 12:51:36 SUCCESS
ExtractRequestedScopes
Requested scopes
scope
openid
2020-09-01 12:51:36 SUCCESS
ExtractNonceFromAuthorizationRequest
Extracted nonce
nonce
Kes19QKnnrrIEN_rk8GRxM1IiC7gk0rb02GfguJH7qg
2020-09-01 12:51:36 SUCCESS
EnsureResponseTypeIsIdTokenToken
Response type is expected value
expected
id_token token
2020-09-01 12:51:36 SUCCESS
EnsureMatchingClientId
Client ID matched
client_id
client_dpdTReZLprFTLBQ04553+[:%_
2020-09-01 12:51:36 SUCCESS
EnsureValidRedirectUriForAuthorizationEndpointRequest
redirect_uri is one of the allowed redirect uris
actual
https://rp.example.com/cb
expected
[
  "https://rp.example.com/cb"
]
2020-09-01 12:51:36 SUCCESS
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
actual
[
  "openid"
]
expected
openid
2020-09-01 12:51:36 SUCCESS
DisallowMaxAgeEqualsZeroAndPromptNone
The client did not send max_age=0 and prompt=none parameters as expected
2020-09-01 12:51:36 SUCCESS
GenerateBearerAccessToken
Generated access token
access_token
sgToL5xzhTjdpscwtcyIHCeLKjNklGdkdqhEW0hMInwlVaDHFl
2020-09-01 12:51:36 SUCCESS
CalculateAtHash
Successful at_hash encoding
at_hash
gnIdxEKcmrnTfipta-jhVw
2020-09-01 12:51:36 SUCCESS
GenerateIdTokenClaims
Created ID Token Claims
iss
https://www.certification.openid.net/test/FkMB0taLwF0DTL8/
sub
user-subject-1234531
aud
client_dpdTReZLprFTLBQ04553+[:%_
nonce
Kes19QKnnrrIEN_rk8GRxM1IiC7gk0rb02GfguJH7qg
iat
1598964696
exp
1598964996
2020-09-01 12:51:36 SUCCESS
AddInvalidAudValueToIdToken
Added invalid aud to ID token claims
aud
client_dpdTReZLprFTLBQ04553+[:%_1
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/FkMB0taLwF0DTL8/",
  "sub": "user-subject-1234531",
  "aud": "client_dpdTReZLprFTLBQ04553+[:%_1",
  "nonce": "Kes19QKnnrrIEN_rk8GRxM1IiC7gk0rb02GfguJH7qg",
  "iat": 1598964696,
  "exp": 1598964996
}
2020-09-01 12:51:36 INFO
AddCHashToIdTokenClaims
Skipped evaluation due to missing required string: c_hash
expected
c_hash
2020-09-01 12:51:36 SUCCESS
AddAtHashToIdTokenClaims
Added at_hash to ID token claims
at_hash
gnIdxEKcmrnTfipta-jhVw
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/FkMB0taLwF0DTL8/",
  "sub": "user-subject-1234531",
  "aud": "client_dpdTReZLprFTLBQ04553+[:%_1",
  "nonce": "Kes19QKnnrrIEN_rk8GRxM1IiC7gk0rb02GfguJH7qg",
  "iat": 1598964696,
  "exp": 1598964996,
  "at_hash": "gnIdxEKcmrnTfipta-jhVw"
}
2020-09-01 12:51:36 SUCCESS
OIDCCSignIdToken
Signed the ID token
id_token
eyJraWQiOiJjMTEwMjJmNi03OGM4LTQzNWItODE1NC03Mjg5MzI4Njg0ZjUiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiZ25JZHhFS2Ntcm5UZmlwdGEtamhWdyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X2RwZFRSZVpMcHJGVExCUTA0NTUzK1s6JV8xIiwiaXNzIjoiaHR0cHM6XC9cL3d3dy5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXRcL3Rlc3RcL0ZrTUIwdGFMd0YwRFRMOFwvIiwiZXhwIjoxNTk4OTY0OTk2LCJub25jZSI6IktlczE5UUtubnJySUVOX3JrOEdSeE0xSWlDN2drMHJiMDJHZmd1Skg3cWciLCJpYXQiOjE1OTg5NjQ2OTZ9.VDsUvhrq2jgJMtW4OIEHBOfGkoMsymX6auTah6Fm_96e9btPKFdgTc0K5MODBXZpS4px3OaEhT74J20vlu4bUsWj5mPpPwdbEjJnNlC8eMn_EK6NUMA3rDXPf5K2dCvXMAPF5YDVsRrpUmZLbX2Kh-z_dEaxftZ6a-JuiWpz03o7Hog4kE53pKCgZdgXDQOo5RBVGIMTYY221GiA3rqlKAQBcDM7FEozfrIG9KOuZt5AJUB3lqyxsqR01uZeEK7lbnY-PSOaaKnXeqXpFBf7Qxnabd5mJEZZqOkrnHPQk7D7QpcL81Bv2TEwiX7FMU93tzoNdJKZ6VVC-La8iDyHWQ
key
{"p":"-fEvn9OOXe0wljJFCHNROBD3Fd4t_SpawEnNNiHEiFKTFml-vqHYv2lgnTF_TS91V3enXk2O0CVCmuMXieW0lUyhBxAm0boqMAHPG2TuRO98FsSqMkTWDZHxxfRc31U5K7jxq_zW0btqhQ8ml5umbBtmv9u9X1GTQrj8Bz3o_hE","kty":"RSA","q":"2J5nmPEJ-BgjspegfR6Iw31r-dt-fZ9-dc05DQteE7WfkiHy8kugV5mAcmrgE7QnnLiv9RyeOL2Fps3duxSMi4rWnBvIwfmFBMs-3yteaiVCeuv-LtecKCi94TyMuptW5E9NrY4FWPQJT2_UVvR4AzdlTmPrDVI_U7yKsCsovOE","d":"xSoieqfWGF2LpBK0okU_6GU1vUBopOw6ciWOO9v5cFva6a9k0k3YwDU9PNKoA1kSC55bVbbWrrHHafPCxdFQZomPLXud8kpRBJM3A8JfRJefEA-Diw1eFCjnbtM7r1xHmhiTfs3SOCZDC8aHN02HJaQEzL47WhCVtIyLZUBXO6YShemCDesk-qH-koletF98GHLX19pZbcz5TYGJiySA-DMKAC04pHezMITFi3DKL4rAJicDcTW9lutDbNEKbAZXuWdxkFcD9h5OyqS8xySyIeQPJYnVrT5tG0vHEqXU6PmNLZe2SjPCSW6mm2BTA3MUZTA2WxYeRz9AACY7Us4-AQ","e":"AQAB","use":"sig","kid":"c11022f6-78c8-435b-8154-7289328684f5","qi":"IVHZ7FHCgdEzx3qpg7iviXiglH0TClnNxzsc-qlPcVN-r_T8cZZiYmCkzaN8Y6ehthn7IJouwO8HVxsxIJGd8B1JxHjDJEJ-FRXroQFmgB2dCmYVjcmQNUTKk_pchBBMOUeo7CpDqNT9RWZ1bIakzTyVXe9pTkyyuZUAqWC64xg","dp":"r7cKHjji69GmyNEKi0hXHy1-KBeNCWDPcEPyS04uFxDGa4k7G9Y4xUjWLWzw7FijDB0Iw1mPP3ISg0WH9OBStmurAYYvZF6W7i03ZzDr-fbLrE4SwUh3nA6whNSovjHyAXUCIkGc3NH_rw_Zt9grhfE1qUhYuDxnZQ8b0BOMS6E","dq":"pfSNx-V6zsCnsK5rvQ_ElYikTZL0kIe92cB1YeIAnDb8Xnd16l04JYSrnHz22QGfi3kPDUl0imHgYA--PRKcLlga3RSINNvWJfsUWuOd_NI44XWlkfuLXlUAS-wYoOpboqSDDWEOBb1I2LwDQO8gds5c5ba1IMqPS7bZxef62OE","n":"034oL5vYD6tYFgQZ0JoAjTWryCFgqFw2UCfkFVhT4ujfPGrw1-ILpgoWW8DibCIYnYOtNGoG4vGh-3rK7l9vBfqisiokJsR8VutndffxUE5i2-FClAWV_VKOFXBqzpyUALiwDAF-9nyETAw7Ehu9dVjz3VX1nkd5GgRh8ASccKQwH_WU6_P_T5GOcTWlIvVMskdbpMhtswkJfA3yeoerhGmGGnOklz43111_Yr5w4kr_zJBeGsIg879HXFiTJ-u-Anuxd5ozm48l0kLInQ1H9kM1shYid0Qd0_bbNmFQSkyJSfbAmLd9MDvQNsGBLBLAmEzVz1DofK1W0niZEgPI8Q"}
algorithm
RS256
2020-09-01 12:51:36 INFO
EncryptIdToken
Skipped evaluation due to missing required element: client id_token_encrypted_response_alg
path
id_token_encrypted_response_alg
mapped
object
client
2020-09-01 12:51:36 SUCCESS
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "vzKfyBgOwJnrGJiY7pXXFyzHv8uxZ7D0qo5oPlH-mnw"
}
2020-09-01 12:51:36 SUCCESS
AddIdTokenToAuthorizationEndpointResponseParams
Added id_token to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "vzKfyBgOwJnrGJiY7pXXFyzHv8uxZ7D0qo5oPlH-mnw",
  "id_token": "eyJraWQiOiJjMTEwMjJmNi03OGM4LTQzNWItODE1NC03Mjg5MzI4Njg0ZjUiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiZ25JZHhFS2Ntcm5UZmlwdGEtamhWdyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X2RwZFRSZVpMcHJGVExCUTA0NTUzK1s6JV8xIiwiaXNzIjoiaHR0cHM6XC9cL3d3dy5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXRcL3Rlc3RcL0ZrTUIwdGFMd0YwRFRMOFwvIiwiZXhwIjoxNTk4OTY0OTk2LCJub25jZSI6IktlczE5UUtubnJySUVOX3JrOEdSeE0xSWlDN2drMHJiMDJHZmd1Skg3cWciLCJpYXQiOjE1OTg5NjQ2OTZ9.VDsUvhrq2jgJMtW4OIEHBOfGkoMsymX6auTah6Fm_96e9btPKFdgTc0K5MODBXZpS4px3OaEhT74J20vlu4bUsWj5mPpPwdbEjJnNlC8eMn_EK6NUMA3rDXPf5K2dCvXMAPF5YDVsRrpUmZLbX2Kh-z_dEaxftZ6a-JuiWpz03o7Hog4kE53pKCgZdgXDQOo5RBVGIMTYY221GiA3rqlKAQBcDM7FEozfrIG9KOuZt5AJUB3lqyxsqR01uZeEK7lbnY-PSOaaKnXeqXpFBf7Qxnabd5mJEZZqOkrnHPQk7D7QpcL81Bv2TEwiX7FMU93tzoNdJKZ6VVC-La8iDyHWQ"
}
2020-09-01 12:51:36
AddTokenToAuthorizationEndpointResponseParams
Added token and token_type to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "vzKfyBgOwJnrGJiY7pXXFyzHv8uxZ7D0qo5oPlH-mnw",
  "id_token": "eyJraWQiOiJjMTEwMjJmNi03OGM4LTQzNWItODE1NC03Mjg5MzI4Njg0ZjUiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiZ25JZHhFS2Ntcm5UZmlwdGEtamhWdyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X2RwZFRSZVpMcHJGVExCUTA0NTUzK1s6JV8xIiwiaXNzIjoiaHR0cHM6XC9cL3d3dy5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXRcL3Rlc3RcL0ZrTUIwdGFMd0YwRFRMOFwvIiwiZXhwIjoxNTk4OTY0OTk2LCJub25jZSI6IktlczE5UUtubnJySUVOX3JrOEdSeE0xSWlDN2drMHJiMDJHZmd1Skg3cWciLCJpYXQiOjE1OTg5NjQ2OTZ9.VDsUvhrq2jgJMtW4OIEHBOfGkoMsymX6auTah6Fm_96e9btPKFdgTc0K5MODBXZpS4px3OaEhT74J20vlu4bUsWj5mPpPwdbEjJnNlC8eMn_EK6NUMA3rDXPf5K2dCvXMAPF5YDVsRrpUmZLbX2Kh-z_dEaxftZ6a-JuiWpz03o7Hog4kE53pKCgZdgXDQOo5RBVGIMTYY221GiA3rqlKAQBcDM7FEozfrIG9KOuZt5AJUB3lqyxsqR01uZeEK7lbnY-PSOaaKnXeqXpFBf7Qxnabd5mJEZZqOkrnHPQk7D7QpcL81Bv2TEwiX7FMU93tzoNdJKZ6VVC-La8iDyHWQ",
  "access_token": "sgToL5xzhTjdpscwtcyIHCeLKjNklGdkdqhEW0hMInwlVaDHFl",
  "token_type": "Bearer"
}
2020-09-01 12:51:36 OUTGOING
oidcc-client-test-invalid-aud
Response to HTTP request to test instance FkMB0taLwF0DTL8
outgoing
ModelAndView [view="formPostResponseMode"; model={formAction=https://rp.example.com/cb, formParameters={"state":"vzKfyBgOwJnrGJiY7pXXFyzHv8uxZ7D0qo5oPlH-mnw","id_token":"eyJraWQiOiJjMTEwMjJmNi03OGM4LTQzNWItODE1NC03Mjg5MzI4Njg0ZjUiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiZ25JZHhFS2Ntcm5UZmlwdGEtamhWdyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X2RwZFRSZVpMcHJGVExCUTA0NTUzK1s6JV8xIiwiaXNzIjoiaHR0cHM6XC9cL3d3dy5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXRcL3Rlc3RcL0ZrTUIwdGFMd0YwRFRMOFwvIiwiZXhwIjoxNTk4OTY0OTk2LCJub25jZSI6IktlczE5UUtubnJySUVOX3JrOEdSeE0xSWlDN2drMHJiMDJHZmd1Skg3cWciLCJpYXQiOjE1OTg5NjQ2OTZ9.VDsUvhrq2jgJMtW4OIEHBOfGkoMsymX6auTah6Fm_96e9btPKFdgTc0K5MODBXZpS4px3OaEhT74J20vlu4bUsWj5mPpPwdbEjJnNlC8eMn_EK6NUMA3rDXPf5K2dCvXMAPF5YDVsRrpUmZLbX2Kh-z_dEaxftZ6a-JuiWpz03o7Hog4kE53pKCgZdgXDQOo5RBVGIMTYY221GiA3rqlKAQBcDM7FEozfrIG9KOuZt5AJUB3lqyxsqR01uZeEK7lbnY-PSOaaKnXeqXpFBf7Qxnabd5mJEZZqOkrnHPQk7D7QpcL81Bv2TEwiX7FMU93tzoNdJKZ6VVC-La8iDyHWQ","access_token":"sgToL5xzhTjdpscwtcyIHCeLKjNklGdkdqhEW0hMInwlVaDHFl","token_type":"Bearer"}}]
outgoing_path
authorize
2020-09-01 12:51:38 FINISHED
oidcc-client-test-invalid-aud
Test has run to completion
testmodule_result
PASSED
Test Results