Test Summary

Test Results

Expand All Collapse All
All times are UTC
2020-09-01 12:50:34 INFO
TEST-RUNNER
Test instance McT6ftwI0u2itJo created
baseUrl
https://www.certification.openid.net/test/McT6ftwI0u2itJo
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code id_token",
  "request_type": "plain_http_request",
  "response_mode": "form_post",
  "client_registration": "dynamic_client"
}
alias

                                
description
test suite runner for openid-client
planId
l0lJMpv444Mye
config
{
  "description": "test suite runner for openid-client",
  "waitTimeoutSeconds": 2
}
testName
oidcc-client-test-missing-iat
2020-09-01 12:50:34 SUCCESS
OIDCCGenerateServerConfiguration
Generated default server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/McT6ftwI0u2itJo/",
  "authorization_endpoint": "https://www.certification.openid.net/test/McT6ftwI0u2itJo/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/McT6ftwI0u2itJo/token",
  "jwks_uri": "https://www.certification.openid.net/test/McT6ftwI0u2itJo/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/McT6ftwI0u2itJo/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/McT6ftwI0u2itJo/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post",
    "client_secret_jwt",
    "private_key_jwt"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2020-09-01 12:50:34
SetTokenEndpointAuthMethodsSupportedToClientSecretBasicOnly
Changed token_endpoint_auth_methods_supported to client_secret_basic only in server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/McT6ftwI0u2itJo/",
  "authorization_endpoint": "https://www.certification.openid.net/test/McT6ftwI0u2itJo/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/McT6ftwI0u2itJo/token",
  "jwks_uri": "https://www.certification.openid.net/test/McT6ftwI0u2itJo/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/McT6ftwI0u2itJo/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/McT6ftwI0u2itJo/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2020-09-01 12:50:35
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "2JpUb3HRxiX_1ChSSj41G1YD20XWNxC_xOSvTwkXspGT0TIwolsWLDSZA1SvlZEUTwjb0Be8UqdnxRy2vdnohUidzXxuT28lFe2pJy4Ta02pHft-k8x3NaH9qk20GCU1tIexcWwtqYBnW_FNu9HTrOffM5ozRgEmu9wE1JNCqZM",
      "kty": "RSA",
      "q": "tpIMtduGrHRX7luwa-BUZ0C7vKHatsH69BIh6uf2ueYwwIYKqUuPvYk6LpU1U8bkHEQkCtKKX7LNWzj-PCvYYwYsAGytQaA7RiOPii9pBZOHusXD4nrd8LLrgjsKmcY3562dA3GrwL9lySgGKqkHIt3ctgcWEkyHV8TbE7XiKWk",
      "d": "PClJDGMvsO07NyV_zOZ4klsTfKz-EzFaI-5FbRGKAvqPcacsWMU3ZSU7AhC55cFXeBzdCnnctiAMIIi_8rFlr0GY1mDJAEBcZsTE4ZC8q3elIR_Lc4jOU9j9Kr3u3fN2h2hwyIvCI426ZbkM7tubN7IbUcVyp1JHTV0u-6ESZASQvbyA7KnoilmzCIHWeVKU-0MIHQABMD-kM67whybBD-CwpUbAnE95UKWAWIhJnVRNh75kUp-g_u0Z4bjaugY68gXNcBAXdKW7mBqLqz3nvKGY9O8Cc-FMmtR7o5Ctc0ewzFwa_aW-veFcd1ymF0BgRjFKTNeWH1_1OYoS7PGsQQ",
      "e": "AQAB",
      "use": "sig",
      "kid": "d647d320-7a3a-4d9a-9ed6-7701c19aa95a",
      "qi": "FNMJX-nPTpI44EjlHXPPysn7R1qj1K4TrNNg0neYGZYz7ft4LDIhXD0fBCmU0EOumpJ0pi_1esbtympuI5nOGmtee3aDYFdJgsnAD-800fH4YZBulXALsk-KJPAKuo9DHUPiXwTXr_J2EYxmbI9_pvzkc5ah-lrnhUMeGTy5WXU",
      "dp": "XdfvgSFFC55nCpo1nOj6xU8s-JF3UAA3tayGr6120Oz1qAsguxbPsnNPX_wO3rQuoldqNOwzsXPKJ8JbAkIo1aYyiFbCzDORU8DWKp1x2GmbPdw6aPqLI3d9mY1024kzjXXE0SlXVzrEjTcswJUWKrGDKK5ETK4vA_E9PoRWu3U",
      "dq": "VdLiVrsT3A31J__CN3QFOWSc3FfZ0P_vUL0VZLAWs90aHeblLCBxOdBAoZVStEdTBFaj-tJuaf5Luw5XtUGHP0WveaOc7rS8KISe_X68B_sKWyqMovLPUk9JlrbajN85eJeMsAnHi5xt5NoDzBoZWLKjBo7eOUvwc7n-oo1l-8E",
      "n": "mnlKzH1K8ZD96ueOkTa8uoKbLZ7HZNBFig3QiFB4Pf1gXkQaKDcLibHuBQMhALbqT2YnoYxy5qb_kISO8FOxNm82CklpZz14EVfbeZO9r2dklhhHH9tuF-d1EJmsHBtTb7irjyaAS0MZRP_Td4UtFj1AgqKv7hN77KCZqhC_-xnhChcSicDPPZHdvRGV2ugsl40Je4f9RYS6CmMFclpfDek-SqkKSZzcyMP_8hW3xcusxo890aR9yCenhj0GaHTFaBxndxB9KxxR74C0T9I-1iGeC8KtMMh_PKZR9zxwPoa5vIRUd8stOWxms2-3qO-rNaRT2MABwZCYW4BttkYYSw"
    },
    {
      "kty": "EC",
      "d": "ml7oeF-hhvr0N8_kry3PoEIz6z5HwwcTbkc7Gh3cEUk",
      "use": "sig",
      "crv": "P-256",
      "kid": "fa1546ae-7943-4751-8740-480b73659469",
      "x": "Tz-CZjuT15_L6zwhVWRkZJa_LqW6BgUMmzGKtH031pY",
      "y": "q5m7Lhw06CKKLw2WrybgSs6KpN48OUrhHfoGUyza020"
    },
    {
      "kty": "EC",
      "d": "Jt21_BzLYuHjAn921ra_x16OSYolAXBzGaRA7UEjv1k",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "d5813f6a-10b7-4333-8f01-20d7ff9e98b0",
      "x": "N0AAE4nnh73GpMFSyRF0q_yq4C74fMcFVldgXa7z8O4",
      "y": "vI4zOzc2H0APOg0azghwacsnOe0XOmh7ovY7XMLuZgA"
    },
    {
      "kty": "OKP",
      "d": "0Xrr8D5crauN8SVv3_4l3uSJrTktVYE-ItVZNKNUrWQ",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "9a6071c6-5b4b-42ce-bca9-cc46b9f4b5f4",
      "x": "XKEtIYlojjvJIW3REYu-r0HwnWafD4cuyhH3wdPsghM"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "5jzdOlGZldsBvD_5u4FwVIW6-eO8By3GDX1CjCeX6Xj8aDGhB8cMUD6ZTLNH3MrR4jaKlOWxhH9kSwhJq9zZ4Osz2cNP8hWpVB10XE9n1t4S08tdtafXwAPO4hERdYak6tuCIOiwSm8HN87HGejCGGSSC-nUPCOuZhZXGDlifq0",
      "kty": "RSA",
      "q": "sGieI_-zlvQyijDgYh3KJML1vaYnNPYsFXf0NKGlE0uC5qyGMK6sh3WSay4fyqV4B4AG-AGYvgvpVCUmjuwagux74piGLQx5g-MJIJOIPZuqdl4mT_nb6B3s1y2BGqEzYds3mPFSD7UCMqmO34QjZ3MEwLKlMyWvyRgLtCX9N-8",
      "d": "U6raDFyrdYf3gJu6y2wVbNwfGKV-FhnaI8h5DB9J3snGXkJTYx5zqNZZrX3N3NQ_wIINge9zK6vJAN6yLqz5XOe-OXSK8_7jwCJw-5B_cO96daLDRQJY7pzaCw9nu-WFCbWYTti2O5xSkBuv5bcoAypLnlOFImTbS_nK2I789yA2_MR9Jk-MJodXnjK1ozGOH6NmqABxIhzN785z6lezWhGdf8ONOXE1trYAu0wU-NfHE-20sSR6AyRzXMCXx6VobtDBD8E1kfL4nWmwp13xF1by31V5y3UIhV445N7P5dDpdhVLDWEHWojJAcYRomYCju-bjegz9Nop7iziO9cP6Q",
      "e": "AQAB",
      "use": "enc",
      "kid": "03725d7b-7c3b-43f1-95e7-8b995104ef30",
      "qi": "1xpnNUU5Y29GJrKj4RoylmIMw7gLAY1PbtNCWZzzx8br8i6fMOSoqea3ncYw6vYt3VXgw65ZCftMgk7q93LFJ5P_-1-p1mb2sKj1DxzUTGdY0RDND-KMWGqfLx3Wjt5qSppLUweKz6SFwvFrYbRogAeDupEpY5LjmNqMnm60_5E",
      "dp": "D1hfJlPp-KLwKqvY6TZnVjrTi3QyRAg4-w0uMkkxRs5ZhFhKc0pA99g0P3hzgbPC6WDZO7NTcZFMDfQvdNTzcJo8incKDQiEkKal6sEgGqISfys-w6y8JIAcedTJZRvkQgL_WVIo7c0Yng-aFY_938JUOZcMHjYCmatDgsnQVsE",
      "alg": "RSA-OAEP",
      "dq": "UhWsGDYgO8qPRcwubJlN-UMak8-fiL5PjwHNCTx6EntdgraejkKJF1L2-ZZxxpquOlcxZu9fQndKcBQFWBW21Frz3mF4dbfLRzo6ggUELR6k-AUhMK-jyuM51HphC6IcxZj6ytjnhVWFm0tYptrWmoljmcLGqgEMRbdBoubWZ9M",
      "n": "nqfvC-ifH3B0zQaBqf6CkPDK7uLnDpWVJ-wBuQ5vwqLc9PI6N2eUnrx48Yeob9WqL5UVrkawCGgmbvFVioA4AyYagwYsV-wWa_f6l8E1knCKWFFO3Nmbq1WM755dQFsGyWQ2SH6Nb3IBYYR-FLBN0oWpRDEPri4ZnsgAE6C5o9M0mOaOq5XjMJrjWfV0VlfSyz0SFGkINI1kRYhwAlZiZmN_jt3y0T-gAi5lQ0wG9_jJ7T1MVXdGS_mipykUf7xmTamHEz2SqDe8eOOTAx57Zow0LBxd33-sRJjYVytsc0GSn3Ffn0VPqAbOH4gUYE8cXtxGY6jNfd74t_c77iRugw"
    },
    {
      "kty": "EC",
      "d": "fOti5I2TQ4hq2S_JVNCPdC6qffSxStUt6B352N1jD18",
      "use": "enc",
      "crv": "P-256",
      "kid": "33bf994f-09f0-440f-a92e-78a309603068",
      "x": "gdCtn5oK58fMnZ4gDXKyL_sB7-MiOqyO3OZi44FjrA4",
      "y": "FEnOgpPua1mplOSv9qLePRaiJAqI0SqVnHFPuiM5jKw",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "d647d320-7a3a-4d9a-9ed6-7701c19aa95a",
      "n": "mnlKzH1K8ZD96ueOkTa8uoKbLZ7HZNBFig3QiFB4Pf1gXkQaKDcLibHuBQMhALbqT2YnoYxy5qb_kISO8FOxNm82CklpZz14EVfbeZO9r2dklhhHH9tuF-d1EJmsHBtTb7irjyaAS0MZRP_Td4UtFj1AgqKv7hN77KCZqhC_-xnhChcSicDPPZHdvRGV2ugsl40Je4f9RYS6CmMFclpfDek-SqkKSZzcyMP_8hW3xcusxo890aR9yCenhj0GaHTFaBxndxB9KxxR74C0T9I-1iGeC8KtMMh_PKZR9zxwPoa5vIRUd8stOWxms2-3qO-rNaRT2MABwZCYW4BttkYYSw"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "af24db10-869a-4ba2-b4e7-cc17c8fbaf26",
      "n": "nYyy9qBxSot5vBdW1T_sYAmVlOR53YIN_GhgC2ePU2iNgR3S50mrpfHn0DJxNDtKOUjU5rLbQTmFhFOtCtIZh8InauJy2cmxnow9FOtFrVOQPhfof5CHGsaCz4biAq8dbvvXrJ3PCLc8IL-_exk1tfAc5OnVM1w6LxK88CqkTRAJnEY8zwXpI6RA48L412iszWJHIjAK63XLAE4EnBT6PvEYhfsqaLZpIod286cQ62J8SQRpAJ3ZDQM9r10ETpZi3PJ4K2TeQ7dNi9-KPuRbbCcfiOW3bBLkpwZmhF9Ojr-15moCEh0Tb-k5MR5GSJTbKOB1t1fv3MYHrtnPlkbJKQ"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "fa1546ae-7943-4751-8740-480b73659469",
      "x": "Tz-CZjuT15_L6zwhVWRkZJa_LqW6BgUMmzGKtH031pY",
      "y": "q5m7Lhw06CKKLw2WrybgSs6KpN48OUrhHfoGUyza020"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "75b38e62-02b3-4990-aba5-037e06b07afa",
      "x": "tkzKrXHKtsEMUjQ_p1Z_MVggcZe9WzONveIOSirnHw4",
      "y": "I8LBU-k1loW6vCH1ZV8ZoXFZ-1wiQtPOll_uezedP9A"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "d5813f6a-10b7-4333-8f01-20d7ff9e98b0",
      "x": "N0AAE4nnh73GpMFSyRF0q_yq4C74fMcFVldgXa7z8O4",
      "y": "vI4zOzc2H0APOg0azghwacsnOe0XOmh7ovY7XMLuZgA"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "9a6071c6-5b4b-42ce-bca9-cc46b9f4b5f4",
      "x": "XKEtIYlojjvJIW3REYu-r0HwnWafD4cuyhH3wdPsghM"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "03725d7b-7c3b-43f1-95e7-8b995104ef30",
      "alg": "RSA-OAEP",
      "n": "nqfvC-ifH3B0zQaBqf6CkPDK7uLnDpWVJ-wBuQ5vwqLc9PI6N2eUnrx48Yeob9WqL5UVrkawCGgmbvFVioA4AyYagwYsV-wWa_f6l8E1knCKWFFO3Nmbq1WM755dQFsGyWQ2SH6Nb3IBYYR-FLBN0oWpRDEPri4ZnsgAE6C5o9M0mOaOq5XjMJrjWfV0VlfSyz0SFGkINI1kRYhwAlZiZmN_jt3y0T-gAi5lQ0wG9_jJ7T1MVXdGS_mipykUf7xmTamHEz2SqDe8eOOTAx57Zow0LBxd33-sRJjYVytsc0GSn3Ffn0VPqAbOH4gUYE8cXtxGY6jNfd74t_c77iRugw"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "33bf994f-09f0-440f-a92e-78a309603068",
      "x": "gdCtn5oK58fMnZ4gDXKyL_sB7-MiOqyO3OZi44FjrA4",
      "y": "FEnOgpPua1mplOSv9qLePRaiJAqI0SqVnHFPuiM5jKw",
      "alg": "ECDH-ES"
    }
  ]
}
2020-09-01 12:50:35 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2020-09-01 12:50:35 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2020-09-01 12:50:35 SUCCESS
OIDCCLoadUserInfo
Added user information
user_info
{
  "sub": "user-subject-1234531",
  "name": "Demo T. User",
  "given_name": "Demo",
  "family_name": "User",
  "middle_name": "Theresa",
  "nickname": "Dee",
  "preferred_username": "d.tu",
  "gender": "female",
  "birthdate": "2000-02-03",
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "zoneinfo": "America/Los_Angeles",
  "locale": "en-US",
  "phone_number": "+1 555 5550000",
  "phone_number_verified": false,
  "email": "user@example.com",
  "email_verified": false,
  "website": "https://openid.net/",
  "updated_at": "1580000000"
}
2020-09-01 12:50:35 SUCCESS
GetDynamicClientConfiguration
No client details on configuration, created an empty dynamic_client_registration_template object.
2020-09-01 12:50:35
oidcc-client-test-missing-iat
Setup Done
2020-09-01 12:50:37 INCOMING
oidcc-client-test-missing-iat
Incoming HTTP request to test instance McT6ftwI0u2itJo
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
.well-known/openid-configuration
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Discovery endpoint
2020-09-01 12:50:37 OUTGOING
oidcc-client-test-missing-iat
Response to HTTP request to test instance McT6ftwI0u2itJo
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "issuer": "https://www.certification.openid.net/test/McT6ftwI0u2itJo/",
  "authorization_endpoint": "https://www.certification.openid.net/test/McT6ftwI0u2itJo/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/McT6ftwI0u2itJo/token",
  "jwks_uri": "https://www.certification.openid.net/test/McT6ftwI0u2itJo/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/McT6ftwI0u2itJo/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/McT6ftwI0u2itJo/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
outgoing_path
.well-known/openid-configuration
2020-09-01 12:50:38 INCOMING
oidcc-client-test-missing-iat
Incoming HTTP request to test instance McT6ftwI0u2itJo
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "content-type": "application/json",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "181",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
register
incoming_body_form_params
incoming_method
POST
incoming_body_json
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ]
}
incoming_query_string_params
{}
incoming_body
{"token_endpoint_auth_method":"client_secret_basic","response_types":["code id_token"],"grant_types":["authorization_code","implicit"],"redirect_uris":["https://rp.example.com/cb"]}
Registration endpoint
2020-09-01 12:50:38 SUCCESS
OIDCCExtractDynamicRegistrationRequest
Extracted dynamic client registration request
request
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ]
}
2020-09-01 12:50:38 INFO
EnsureRegistrationRequestContainsAtLeastOneContact
This application requires that registration requests contain at least one contact.
2020-09-01 12:50:38 SUCCESS
ValidateClientGrantTypes
grant_types match response_types
grant_types
[
  "authorization_code",
  "implicit"
]
response_types
[
  "code id_token"
]
2020-09-01 12:50:38 SUCCESS
OIDCCValidateClientRedirectUris
Valid redirect_uri(s) provided in registration request
redirect_uris
[
  "https://rp.example.com/cb"
]
2020-09-01 12:50:38 SUCCESS
ValidateClientLogoUris
Client does not contain any logo_uri
2020-09-01 12:50:38 SUCCESS
ValidateClientUris
Client does not contain any client_uri
2020-09-01 12:50:38 SUCCESS
ValidateClientPolicyUris
Client does not contain any policy_uri
2020-09-01 12:50:38 SUCCESS
ValidateClientTosUris
Client does not contain any tos_uri
2020-09-01 12:50:38 SUCCESS
ValidateClientSubjectType
A subject_type was not provided
2020-09-01 12:50:38 INFO
ValidateIdTokenSignedResponseAlg
Skipped evaluation due to missing required element: client id_token_signed_response_alg
path
id_token_signed_response_alg
mapped
object
client
2020-09-01 12:50:38 SUCCESS
EnsureIdTokenEncryptedResponseAlgIsSetIfEncIsSet
id_token_encrypted_response_enc is not set
2020-09-01 12:50:38 INFO
ValidateUserinfoSignedResponseAlg
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2020-09-01 12:50:38 SUCCESS
EnsureUserinfoEncryptedResponseAlgIsSetIfEncIsSet
userinfo_encrypted_response_enc is not set
2020-09-01 12:50:38 INFO
ValidateRequestObjectSigningAlg
Skipped evaluation due to missing required element: client request_object_signing_alg
path
request_object_signing_alg
mapped
object
client
2020-09-01 12:50:38 SUCCESS
EnsureRequestObjectEncryptionAlgIsSetIfEncIsSet
request_object_encryption_enc is not set
2020-09-01 12:50:38 INFO
ValidateTokenEndpointAuthSigningAlg
Skipped evaluation due to missing required element: client token_endpoint_auth_signing_alg
path
token_endpoint_auth_signing_alg
mapped
object
client
2020-09-01 12:50:38 SUCCESS
ValidateDefaultMaxAge
default_max_age is not set
2020-09-01 12:50:38 INFO
ValidateRequireAuthTime
Skipped evaluation due to missing required element: client require_auth_time
path
require_auth_time
mapped
object
client
2020-09-01 12:50:38 INFO
ValidateDefaultAcrValues
Skipped evaluation due to missing required element: client default_acr_values
path
default_acr_values
mapped
object
client
2020-09-01 12:50:38 INFO
ValidateInitiateLoginUri
Skipped evaluation due to missing required element: client initiate_login_uri
path
initiate_login_uri
mapped
object
client
2020-09-01 12:50:38 INFO
ValidateRequestUris
Skipped evaluation due to missing required element: client request_uris
path
request_uris
mapped
object
client
2020-09-01 12:50:38 SUCCESS
ValidateClientRegistrationRequestSectorIdentifierUri
A sector_identifier_uri was not provided
2020-09-01 12:50:38 SUCCESS
OIDCCRegisterClient
Registered client
client
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_vVXwsVMuJxNgNzx43822]\u0027[%("
}
2020-09-01 12:50:38
OIDCCCreateClientSecretForDynamicClient
Set the secret for registered client
client_secret
secret_PXWxnUTTBEllQpmryTxhrQqzhjWKXgrUhVDhhTxDpxokohklQw5647569665( -+_
2020-09-01 12:50:38 SUCCESS
EnsureTokenEndPointAuthMethodIsClientSecretBasic
token_endpoint_auth_method is 'client_secret_basic' as expected
2020-09-01 12:50:38 SUCCESS
EnsureClientDoesNotHaveBothJwksAndJwksUri
Client does not have both jwks and jwks_uri set
client
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_vVXwsVMuJxNgNzx43822]\u0027[%(",
  "client_secret": "secret_PXWxnUTTBEllQpmryTxhrQqzhjWKXgrUhVDhhTxDpxokohklQw5647569665( -+_"
}
2020-09-01 12:50:38 INFO
FetchClientKeys
Skipped evaluation due to missing required element: client jwks_uri
path
jwks_uri
mapped
object
client
2020-09-01 12:50:38 SUCCESS
OIDCCExtractServerSigningAlg
Using the default algorithm for the first key in server jwks
signing_algorithm
RS256
2020-09-01 12:50:38
SetClientIdTokenSignedResponseAlgToServerSigningAlg
Set id_token_signed_response_alg for the registered client
id_token_signed_response_alg
RS256
2020-09-01 12:50:38 OUTGOING
oidcc-client-test-missing-iat
Response to HTTP request to test instance McT6ftwI0u2itJo
outgoing_status_code
201
outgoing_headers
{}
outgoing_body
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_vVXwsVMuJxNgNzx43822]\u0027[%(",
  "client_secret": "secret_PXWxnUTTBEllQpmryTxhrQqzhjWKXgrUhVDhhTxDpxokohklQw5647569665( -+_",
  "id_token_signed_response_alg": "RS256"
}
outgoing_path
register
2020-09-01 12:50:38 INCOMING
oidcc-client-test-missing-iat
Incoming HTTP request to test instance McT6ftwI0u2itJo
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "got/9.6.0 (https://github.com/sindresorhus/got)",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
authorize
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "client_id": "client_vVXwsVMuJxNgNzx43822]\u0027[%(",
  "scope": "openid",
  "response_type": "code id_token",
  "redirect_uri": "https://rp.example.com/cb",
  "state": "tBRjdZtZMjLDO0SSQ-iiKCSMNeg8cVvFUD0uMH-KiBk",
  "nonce": "Rxi6OQxkJcqvLs0NElH36IguwkhI9oBbm4-DnjTBOd0",
  "response_mode": "form_post"
}
incoming_body
Authorization endpoint
2020-09-01 12:50:38 SUCCESS
EnsureRequestDoesNotContainRequestObject
Request does not contain a request parameter
2020-09-01 12:50:38 SUCCESS
OIDCCEnsureAuthorizationHttpRequestContainsOpenIDScope
Found 'openid' in scope http request parameter
actual
[
  "openid"
]
expected
openid
2020-09-01 12:50:38 SUCCESS
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
effective_authorization_endpoint_request
{
  "client_id": "client_vVXwsVMuJxNgNzx43822]\u0027[%(",
  "scope": "openid",
  "response_type": "code id_token",
  "redirect_uri": "https://rp.example.com/cb",
  "state": "tBRjdZtZMjLDO0SSQ-iiKCSMNeg8cVvFUD0uMH-KiBk",
  "nonce": "Rxi6OQxkJcqvLs0NElH36IguwkhI9oBbm4-DnjTBOd0",
  "response_mode": "form_post"
}
2020-09-01 12:50:38 SUCCESS
ExtractRequestedScopes
Requested scopes
scope
openid
2020-09-01 12:50:38 SUCCESS
ExtractNonceFromAuthorizationRequest
Extracted nonce
nonce
Rxi6OQxkJcqvLs0NElH36IguwkhI9oBbm4-DnjTBOd0
2020-09-01 12:50:38 SUCCESS
EnsureResponseTypeIsCodeIdToken
Response type is expected value
expected
code id_token
2020-09-01 12:50:38 SUCCESS
EnsureMatchingClientId
Client ID matched
client_id
client_vVXwsVMuJxNgNzx43822]'[%(
2020-09-01 12:50:38 SUCCESS
EnsureValidRedirectUriForAuthorizationEndpointRequest
redirect_uri is one of the allowed redirect uris
actual
https://rp.example.com/cb
expected
[
  "https://rp.example.com/cb"
]
2020-09-01 12:50:38 SUCCESS
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
actual
[
  "openid"
]
expected
openid
2020-09-01 12:50:38 SUCCESS
DisallowMaxAgeEqualsZeroAndPromptNone
The client did not send max_age=0 and prompt=none parameters as expected
2020-09-01 12:50:38 SUCCESS
CreateAuthorizationCode
Created authorization code
authorization_code
tQt2QJryBQ
2020-09-01 12:50:38 SUCCESS
CalculateCHash
Successful c_hash encoding
c_hash
-AssNF3T0dLm98_iWBa4Jw
2020-09-01 12:50:38 SUCCESS
GenerateIdTokenClaims
Created ID Token Claims
iss
https://www.certification.openid.net/test/McT6ftwI0u2itJo/
sub
user-subject-1234531
aud
client_vVXwsVMuJxNgNzx43822]'[%(
nonce
Rxi6OQxkJcqvLs0NElH36IguwkhI9oBbm4-DnjTBOd0
iat
1598964638
exp
1598964938
2020-09-01 12:50:38 SUCCESS
RemoveIatFromIdToken
Removed iat from ID token claims
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/McT6ftwI0u2itJo/",
  "sub": "user-subject-1234531",
  "aud": "client_vVXwsVMuJxNgNzx43822]\u0027[%(",
  "nonce": "Rxi6OQxkJcqvLs0NElH36IguwkhI9oBbm4-DnjTBOd0",
  "exp": 1598964938
}
2020-09-01 12:50:38 SUCCESS
AddCHashToIdTokenClaims
Added c_hash to ID token claims
c_hash
-AssNF3T0dLm98_iWBa4Jw
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/McT6ftwI0u2itJo/",
  "sub": "user-subject-1234531",
  "aud": "client_vVXwsVMuJxNgNzx43822]\u0027[%(",
  "nonce": "Rxi6OQxkJcqvLs0NElH36IguwkhI9oBbm4-DnjTBOd0",
  "exp": 1598964938,
  "c_hash": "-AssNF3T0dLm98_iWBa4Jw"
}
2020-09-01 12:50:38 INFO
AddAtHashToIdTokenClaims
Skipped evaluation due to missing required string: at_hash
expected
at_hash
2020-09-01 12:50:38 SUCCESS
OIDCCSignIdToken
Signed the ID token
id_token
eyJraWQiOiJkNjQ3ZDMyMC03YTNhLTRkOWEtOWVkNi03NzAxYzE5YWE5NWEiLCJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJ1c2VyLXN1YmplY3QtMTIzNDUzMSIsImF1ZCI6ImNsaWVudF92Vlh3c1ZNdUp4TmdOeng0MzgyMl0nWyUoIiwiY19oYXNoIjoiLUFzc05GM1QwZExtOThfaVdCYTRKdyIsImlzcyI6Imh0dHBzOlwvXC93d3cuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0XC90ZXN0XC9NY1Q2ZnR3STB1Mml0Sm9cLyIsImV4cCI6MTU5ODk2NDkzOCwibm9uY2UiOiJSeGk2T1F4a0pjcXZMczBORWxIMzZJZ3V3a2hJOW9CYm00LURualRCT2QwIn0.EqfoGWMRkFYC3guAQZ6eFNdIqy595WSkwdSRGyUXrr7a7GYtIjO0uywKL_qb0bbgLO0ujQkb59fnWCBrYlVMoLE5Y2i-0OgN5SURcDcRalFMu_a8Hgpzp9pBld5gO4PA-wZeGdZgnVnz5m8v02x3InlwFXNeJx7KLxaZUWcJe6eP8CHl6oBwOEH-siUKcAzDZEssEtNxA_8JAMRkn9ITuVXspxNqFGy2inkM_x6MrSvR0ja7g6JqjRs-oD1znbpdF8A4qTML1tILsWEUqVF30FKDbf0KYjg5dEKNI1QzXDTpiR4Ce0larEp3SOIEjWuHO2aA1XZEtZFuDEUddtFTiw
key
{"p":"2JpUb3HRxiX_1ChSSj41G1YD20XWNxC_xOSvTwkXspGT0TIwolsWLDSZA1SvlZEUTwjb0Be8UqdnxRy2vdnohUidzXxuT28lFe2pJy4Ta02pHft-k8x3NaH9qk20GCU1tIexcWwtqYBnW_FNu9HTrOffM5ozRgEmu9wE1JNCqZM","kty":"RSA","q":"tpIMtduGrHRX7luwa-BUZ0C7vKHatsH69BIh6uf2ueYwwIYKqUuPvYk6LpU1U8bkHEQkCtKKX7LNWzj-PCvYYwYsAGytQaA7RiOPii9pBZOHusXD4nrd8LLrgjsKmcY3562dA3GrwL9lySgGKqkHIt3ctgcWEkyHV8TbE7XiKWk","d":"PClJDGMvsO07NyV_zOZ4klsTfKz-EzFaI-5FbRGKAvqPcacsWMU3ZSU7AhC55cFXeBzdCnnctiAMIIi_8rFlr0GY1mDJAEBcZsTE4ZC8q3elIR_Lc4jOU9j9Kr3u3fN2h2hwyIvCI426ZbkM7tubN7IbUcVyp1JHTV0u-6ESZASQvbyA7KnoilmzCIHWeVKU-0MIHQABMD-kM67whybBD-CwpUbAnE95UKWAWIhJnVRNh75kUp-g_u0Z4bjaugY68gXNcBAXdKW7mBqLqz3nvKGY9O8Cc-FMmtR7o5Ctc0ewzFwa_aW-veFcd1ymF0BgRjFKTNeWH1_1OYoS7PGsQQ","e":"AQAB","use":"sig","kid":"d647d320-7a3a-4d9a-9ed6-7701c19aa95a","qi":"FNMJX-nPTpI44EjlHXPPysn7R1qj1K4TrNNg0neYGZYz7ft4LDIhXD0fBCmU0EOumpJ0pi_1esbtympuI5nOGmtee3aDYFdJgsnAD-800fH4YZBulXALsk-KJPAKuo9DHUPiXwTXr_J2EYxmbI9_pvzkc5ah-lrnhUMeGTy5WXU","dp":"XdfvgSFFC55nCpo1nOj6xU8s-JF3UAA3tayGr6120Oz1qAsguxbPsnNPX_wO3rQuoldqNOwzsXPKJ8JbAkIo1aYyiFbCzDORU8DWKp1x2GmbPdw6aPqLI3d9mY1024kzjXXE0SlXVzrEjTcswJUWKrGDKK5ETK4vA_E9PoRWu3U","dq":"VdLiVrsT3A31J__CN3QFOWSc3FfZ0P_vUL0VZLAWs90aHeblLCBxOdBAoZVStEdTBFaj-tJuaf5Luw5XtUGHP0WveaOc7rS8KISe_X68B_sKWyqMovLPUk9JlrbajN85eJeMsAnHi5xt5NoDzBoZWLKjBo7eOUvwc7n-oo1l-8E","n":"mnlKzH1K8ZD96ueOkTa8uoKbLZ7HZNBFig3QiFB4Pf1gXkQaKDcLibHuBQMhALbqT2YnoYxy5qb_kISO8FOxNm82CklpZz14EVfbeZO9r2dklhhHH9tuF-d1EJmsHBtTb7irjyaAS0MZRP_Td4UtFj1AgqKv7hN77KCZqhC_-xnhChcSicDPPZHdvRGV2ugsl40Je4f9RYS6CmMFclpfDek-SqkKSZzcyMP_8hW3xcusxo890aR9yCenhj0GaHTFaBxndxB9KxxR74C0T9I-1iGeC8KtMMh_PKZR9zxwPoa5vIRUd8stOWxms2-3qO-rNaRT2MABwZCYW4BttkYYSw"}
algorithm
RS256
2020-09-01 12:50:38 INFO
EncryptIdToken
Skipped evaluation due to missing required element: client id_token_encrypted_response_alg
path
id_token_encrypted_response_alg
mapped
object
client
2020-09-01 12:50:38 SUCCESS
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "tBRjdZtZMjLDO0SSQ-iiKCSMNeg8cVvFUD0uMH-KiBk"
}
2020-09-01 12:50:38 SUCCESS
AddCodeToAuthorizationEndpointResponseParams
Added code to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "tBRjdZtZMjLDO0SSQ-iiKCSMNeg8cVvFUD0uMH-KiBk",
  "code": "tQt2QJryBQ"
}
2020-09-01 12:50:38 SUCCESS
AddIdTokenToAuthorizationEndpointResponseParams
Added id_token to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "tBRjdZtZMjLDO0SSQ-iiKCSMNeg8cVvFUD0uMH-KiBk",
  "code": "tQt2QJryBQ",
  "id_token": "eyJraWQiOiJkNjQ3ZDMyMC03YTNhLTRkOWEtOWVkNi03NzAxYzE5YWE5NWEiLCJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJ1c2VyLXN1YmplY3QtMTIzNDUzMSIsImF1ZCI6ImNsaWVudF92Vlh3c1ZNdUp4TmdOeng0MzgyMl0nWyUoIiwiY19oYXNoIjoiLUFzc05GM1QwZExtOThfaVdCYTRKdyIsImlzcyI6Imh0dHBzOlwvXC93d3cuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0XC90ZXN0XC9NY1Q2ZnR3STB1Mml0Sm9cLyIsImV4cCI6MTU5ODk2NDkzOCwibm9uY2UiOiJSeGk2T1F4a0pjcXZMczBORWxIMzZJZ3V3a2hJOW9CYm00LURualRCT2QwIn0.EqfoGWMRkFYC3guAQZ6eFNdIqy595WSkwdSRGyUXrr7a7GYtIjO0uywKL_qb0bbgLO0ujQkb59fnWCBrYlVMoLE5Y2i-0OgN5SURcDcRalFMu_a8Hgpzp9pBld5gO4PA-wZeGdZgnVnz5m8v02x3InlwFXNeJx7KLxaZUWcJe6eP8CHl6oBwOEH-siUKcAzDZEssEtNxA_8JAMRkn9ITuVXspxNqFGy2inkM_x6MrSvR0ja7g6JqjRs-oD1znbpdF8A4qTML1tILsWEUqVF30FKDbf0KYjg5dEKNI1QzXDTpiR4Ce0larEp3SOIEjWuHO2aA1XZEtZFuDEUddtFTiw"
}
2020-09-01 12:50:38 OUTGOING
oidcc-client-test-missing-iat
Response to HTTP request to test instance McT6ftwI0u2itJo
outgoing
ModelAndView [view="formPostResponseMode"; model={formAction=https://rp.example.com/cb, formParameters={"state":"tBRjdZtZMjLDO0SSQ-iiKCSMNeg8cVvFUD0uMH-KiBk","code":"tQt2QJryBQ","id_token":"eyJraWQiOiJkNjQ3ZDMyMC03YTNhLTRkOWEtOWVkNi03NzAxYzE5YWE5NWEiLCJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJ1c2VyLXN1YmplY3QtMTIzNDUzMSIsImF1ZCI6ImNsaWVudF92Vlh3c1ZNdUp4TmdOeng0MzgyMl0nWyUoIiwiY19oYXNoIjoiLUFzc05GM1QwZExtOThfaVdCYTRKdyIsImlzcyI6Imh0dHBzOlwvXC93d3cuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0XC90ZXN0XC9NY1Q2ZnR3STB1Mml0Sm9cLyIsImV4cCI6MTU5ODk2NDkzOCwibm9uY2UiOiJSeGk2T1F4a0pjcXZMczBORWxIMzZJZ3V3a2hJOW9CYm00LURualRCT2QwIn0.EqfoGWMRkFYC3guAQZ6eFNdIqy595WSkwdSRGyUXrr7a7GYtIjO0uywKL_qb0bbgLO0ujQkb59fnWCBrYlVMoLE5Y2i-0OgN5SURcDcRalFMu_a8Hgpzp9pBld5gO4PA-wZeGdZgnVnz5m8v02x3InlwFXNeJx7KLxaZUWcJe6eP8CHl6oBwOEH-siUKcAzDZEssEtNxA_8JAMRkn9ITuVXspxNqFGy2inkM_x6MrSvR0ja7g6JqjRs-oD1znbpdF8A4qTML1tILsWEUqVF30FKDbf0KYjg5dEKNI1QzXDTpiR4Ce0larEp3SOIEjWuHO2aA1XZEtZFuDEUddtFTiw"}}]
outgoing_path
authorize
2020-09-01 12:50:40 FINISHED
oidcc-client-test-missing-iat
Test has run to completion
testmodule_result
PASSED
Test Results