Test Summary

Test Results

Expand All Collapse All
All times are UTC
2020-09-01 12:50:15 INFO
TEST-RUNNER
Test instance lO0qYdjjmCUWJoH created
baseUrl
https://www.certification.openid.net/test/lO0qYdjjmCUWJoH
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "id_token",
  "request_type": "plain_http_request",
  "response_mode": "form_post",
  "client_registration": "dynamic_client"
}
alias

                                
description
test suite runner for openid-client
planId
2AWaC6uTX8byR
config
{
  "description": "test suite runner for openid-client",
  "waitTimeoutSeconds": 2
}
testName
oidcc-client-test-missing-sub
2020-09-01 12:50:15 SUCCESS
OIDCCGenerateServerConfiguration
Generated default server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/lO0qYdjjmCUWJoH/",
  "authorization_endpoint": "https://www.certification.openid.net/test/lO0qYdjjmCUWJoH/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/lO0qYdjjmCUWJoH/token",
  "jwks_uri": "https://www.certification.openid.net/test/lO0qYdjjmCUWJoH/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/lO0qYdjjmCUWJoH/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/lO0qYdjjmCUWJoH/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post",
    "client_secret_jwt",
    "private_key_jwt"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2020-09-01 12:50:15
SetTokenEndpointAuthMethodsSupportedToClientSecretBasicOnly
Changed token_endpoint_auth_methods_supported to client_secret_basic only in server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/lO0qYdjjmCUWJoH/",
  "authorization_endpoint": "https://www.certification.openid.net/test/lO0qYdjjmCUWJoH/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/lO0qYdjjmCUWJoH/token",
  "jwks_uri": "https://www.certification.openid.net/test/lO0qYdjjmCUWJoH/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/lO0qYdjjmCUWJoH/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/lO0qYdjjmCUWJoH/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2020-09-01 12:50:15
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "_AUjgoTx2JqSxPbtSJcjIcK2kWUVd2Lz4SsA2d_xi6S1wkOoe7uRdURjtWmYV1wP2rDTfnWl6Cyhd6nCcphoHcCDpurHSHqNuTF_XP0nJXDvQ3J6eOgRpHMKalTnaZ5ShguYl4RPVDc2GnuchTPufswF7m-L9YhbmrlojIC6fP0",
      "kty": "RSA",
      "q": "h_4pZ44Fw04H42fTF6kkXqSeFOMTAZ1Rz7HeHJo86_m9C-aEtl0ePzQhVtFLl4dUGGILKt_IlqxWuvU90476wdHp9U2cH7tvX4uHLK2nZskKWhByi-WJmuHUYUGdjI1E8k8EybWbBROyp2wvhHYt9m06vrQUVmGr_KMKuQFYPK8",
      "d": "IXYB68TINIaJXy3mGN-H9telOiXEIkZapkBLsxGCwX-iBwRY3BXINEI35LA1IzM5AvTKbwD9AoDXpyiFtE8ptZSk7-UgHi2AcT5LXgnd0EVMl9B0XmRb0jagCd77iknNDJQI2gxq8z9HOMxj3KI9oI5bMD45zWBXLVts4vgFdj4RBPZPWfX3JGuOTWHdn8udZDci8GzNt8u3VfFISwu0yskHvOjG_n5Ss_Cu0I_DrvPcvvmIttI88sr0_T7HMhQ-x3eJgL8-2DstQciugVHbcT-PfsE4sfKYh4DXYx-2_K1JYOvDOeojpCtIVQVjq2BEH5-6xu9xlJE99cztc0Dy4Q",
      "e": "AQAB",
      "use": "sig",
      "kid": "80382a7d-db8e-48c0-a9d9-4dfe09c6ffa4",
      "qi": "XmEw0iz2GOVxCdXcHPJ3IT-UtObd6LO9U43AQxzmJvVvTakGpe2anaZroQAy-XR0jiq8DxNpJ9Ut5oPuV30lBNGUlQDpnwE-olmeS7Nfh7-VGnUWtEn5b4QqCG84IWJ4AAZqOh-6qbMd21CL4r_gn3upE3k2RWftDTCJVqMRyOc",
      "dp": "aqJ5_fXmpvHwfCrHB9n7YYOT4D1XMebKrlGV0JpzB9Uvmv0pwwEAcQ_46H-_l-c6RhxfwLhi9LQ9tfY8cmSOWVhl3DCnFcHVSbDp5RywfaUld_JuY849-Mk8dPVr3ULCRDmP3Tx8nHOoDtiSx8HLfhcxw0urer6xk-wzko-9WLk",
      "dq": "DByx-Vwn3T48658aqPfSmm9U-Q1Eaxdk6vevjaKbHHVQxheQ6GEgyYZOFdpsPiG6drV8wyPNTMYqr1oaWJZadRrKGKQB7L2X7M2Ti4In77qmJmFiol0eRWIptUPP0W3fnyk0hvaayPf5KHo1PTn9W_5chhGp4guu8sBeux2Ii1c",
      "n": "heDrldQtKA14bmP7WswwHIA4SrCkKmyafBOJBgU3n4OGUv6vbLFcPe2PdJewyK37uHK8uvlfo_GnunxbOQcIg4GiLEsEvYJSoCT0wKD5eCP1s89tsj4MuxV6WaGvwBFeb2tMbRvlvQS6K_ExtzPcSPR-QknMyzVFiyMbK0ZWHnGID6sBNX8IyPN4z4gYwnSX-B_PmPx-0wiZkgzCSDtXxmyX3oqHixwgCEuTqFUW8ML3zoOCZGs9uQXSmc8E1ruYjNaGqC1jM5UIL9V3wbFtdHlIdt8hvBdQ_l7fJ5pv9MUjbiMqLS8DzsyyKAbwG5NKpiblIckQhlymyZWkqL688w"
    },
    {
      "kty": "EC",
      "d": "2dTjQ7l1xIwLRWFMJpMPgLje23lW8EGlRgfx4VLdIfU",
      "use": "sig",
      "crv": "P-256",
      "kid": "d19f9702-3ab5-44ad-8432-3dcda56c1bec",
      "x": "f3nkIcmJl15qsRSyC3SfUKfM_88DulHsyXsvc2LP7WI",
      "y": "xz4kw7GgJMn82wXGXs4KsaChCSUdU_v6OOMQ3Mf_Fbg"
    },
    {
      "kty": "EC",
      "d": "WDahfLU1PIcUoikS99rcbUD9KLA743qXwaRtSbDPleg",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "9021e8f6-2079-4e37-a983-2282cf8bea67",
      "x": "-DtM0524ETg67i4L2V_Kfxu1S-lrFmzmO7i36GLNMbo",
      "y": "sdLHCPXQ58FcmdYL4MJMJzZ8FCwfF7zJws-ftBCdfQU"
    },
    {
      "kty": "OKP",
      "d": "QlOwoWb1AmpjSyRWVSo3T9EbFmlLf4W3bLx-0TyryiQ",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "2f1d4f91-f63e-4ffa-83b3-b3ae7238e140",
      "x": "KveFLXMNEgMXLhxwGlOoWvfepkWTXOJWrWvQXwOzsmw"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "9kQxj5EHf73weqZ0X1WQZeb4zeodLNiRokgsLDqBViERl_ULLq-iJbd1TvOpQ4-w13REjW032TnvrCPA4vbP5CHGHWS9WV_4bhefSpEhOd9Cd0blOibpUvyQ4xTkL0Wcbqbetuz7fJY4edBLU9G_OgYGpBUzvA9c3f9qpQnZipE",
      "kty": "RSA",
      "q": "rlZik2qTKHMst2RszCgYtf0mIC52pk-qny-Frez1-ecq01tNIfQTNxFnq5fAbQju-5jY8pwkHLFwH8U6H0NalxPMVVqXQNIbvcwX_rukSGTsK6hCPdc-JpFDfXL83fQ2KJrZKE1q5c27sbXQ5HamJvRLfsI60cZzMjv3cUVbW50",
      "d": "FOJKkkAD1-yk8oIPL2t4hERbc10PY7RXfoSrL5brthdI3Jo1Ph41AhaazQ_gdHS_CZDv6fD1_rqeMmqNDbAeh2K_Vuyr0Jm53_aezTQQAuKVePUSQpqhwUFo21Yz7esgDVh4e2CmUStxtlXf6vyqyEk-XODgwHwCIa9r8ksR_2af1G3-jGRRvLv1Hm_9YTDU8-6OPiyGDs36IahB-xbejfDn7sYzrb6Bjis74GHcxjo7ebNn_l_sslGgVzEptDC3gYg3eX3OZ76kGuTtJh2x9kNA3oNTkQrzNNizSC5GaMjXd-lbteBzXW1bFfzL17c8_qCkiXbSrZHzNjQeMgSnwQ",
      "e": "AQAB",
      "use": "enc",
      "kid": "8797e07c-ae7d-4f18-98e3-5e5f36d5d301",
      "qi": "Ll8pql7w_j_wZVQAQKW1FFlF34oEo8Gb8PAzswqKIaWz4cIa5XkjUgSc87ETho5Hcl_f1dPBJOkpW30sEcUUJuN9NnH6PfwAFO3DGnOv8csrw8q_DBmK6CKvgjlL-Sj0OhHQrdV6Zl3yCdYKM7T3WS7baX1mLypUEJvdSjsM1No",
      "dp": "qhNsmvcRU8KMq1f79L82C3pZiHRQE-G5qnbnst_w5NfPu79rKqH3fM7XwF_9HQDGo_XTRk0QjgA6KwtCMj08VBSTK0egkXH7M6UyyJ-0b7BlydR3iRLIfxyYv4t1D8SmhbDPDUxbXq6scExPSaMIyvzQZ0-RPCbr_xFfyH0l9VE",
      "alg": "RSA-OAEP",
      "dq": "jfdanqES5MWljFIDJt0gAlL7UQmFJTmKv8Z7HX7xb2eHwEWBMj0HyLgrq9gPorq7obZ-NFJiNdtoava4teyrQIumwXrb4LU4Uf55K76xsSI-D-8cwi8dNVrlkqqosDXGRJqUa_VfL3OxfK2KRgE4nFAjij2wmFL6S9X5UgwgsSE",
      "n": "p7VzbCV1COSEWW6wxxYc6emYCQzaecPPR66-6wSGyqxOiy9krCJaSdRs5tUKhNpPb3PD_OP8WfwTm0RmBL35xgIHxObViQkUmXii_HuBXObCaKm-LaNZHW3TSqjNqDNhikIerIAptvdWqjGSDGCrzg_UhtySuQlV-NV73bbrh_JPmKje5Ltw_A9bdin4jcJliZNINbYuSyZbvjlKdws0dACAQhORqkUyhVHcIuJWukh8EE-mLI1mYkWPxURwh9kZ8VYgXS_FsJ8hTb5AZHs67r2WeTbHdhfMXGvEN3-jk_Ppj3nQFZwIS7Jv8yTnVhNHIDPu5feDpxfUAkVltTaF7Q"
    },
    {
      "kty": "EC",
      "d": "sESKj4IjWVvqk2aSu6iRdpduM15Ag1pr7EVXSmyuS84",
      "use": "enc",
      "crv": "P-256",
      "kid": "958c31db-faf4-49f9-a49f-dee2b4610b22",
      "x": "U6TDCChTdkJ96J2wZuDyCpOt-cMyViBKX4RSsYC1WBY",
      "y": "Zjf6cQK3vPKlAeaYWxqvcec-FR3kZOlhc50nB3cxD9k",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "80382a7d-db8e-48c0-a9d9-4dfe09c6ffa4",
      "n": "heDrldQtKA14bmP7WswwHIA4SrCkKmyafBOJBgU3n4OGUv6vbLFcPe2PdJewyK37uHK8uvlfo_GnunxbOQcIg4GiLEsEvYJSoCT0wKD5eCP1s89tsj4MuxV6WaGvwBFeb2tMbRvlvQS6K_ExtzPcSPR-QknMyzVFiyMbK0ZWHnGID6sBNX8IyPN4z4gYwnSX-B_PmPx-0wiZkgzCSDtXxmyX3oqHixwgCEuTqFUW8ML3zoOCZGs9uQXSmc8E1ruYjNaGqC1jM5UIL9V3wbFtdHlIdt8hvBdQ_l7fJ5pv9MUjbiMqLS8DzsyyKAbwG5NKpiblIckQhlymyZWkqL688w"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "0843792e-35f4-4b99-b51e-d0a5d50131ff",
      "n": "tcWjrNNLycCJ0P5v47PRiCyyHR_aWO1EHTSX56q5jBW7b3z3Y3TvOnrpFYpNdi5yxRl6ZMmW9-ruHrKmwDjhTBMUf32a0PKMxa-_dfjfTjtNc8Ast23ySA0l2_u9qSrkqdU321UPAWVhcfss85_EibiYOUsJUEQrc1gvUp7mv12drm89Ud_nC6X1dzCxjvu3ENDkZGSrvE08Ubz460MW3_giRmzOHSNq-D6YappskgaxWPTaNueIp9R7jNHmwwe4ZtZgdrKipk_dtiUyMXddbSW9saXWIMkGeNRb30snKxZLXowo0f1z4IWxrDRTv_FMYy2cm-4sU4ODfjiMVqV4yQ"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "d19f9702-3ab5-44ad-8432-3dcda56c1bec",
      "x": "f3nkIcmJl15qsRSyC3SfUKfM_88DulHsyXsvc2LP7WI",
      "y": "xz4kw7GgJMn82wXGXs4KsaChCSUdU_v6OOMQ3Mf_Fbg"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "35843a25-fc6d-4a93-a66b-e81931f44324",
      "x": "ZYWZxuES1Gis_jIaSESXnT_1M0W26YJWtKkgm65NH-o",
      "y": "-bCyMwE5XOXHmE7wCgHVCgbNwHf2ZOBSNDDPFQKry-M"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "9021e8f6-2079-4e37-a983-2282cf8bea67",
      "x": "-DtM0524ETg67i4L2V_Kfxu1S-lrFmzmO7i36GLNMbo",
      "y": "sdLHCPXQ58FcmdYL4MJMJzZ8FCwfF7zJws-ftBCdfQU"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "2f1d4f91-f63e-4ffa-83b3-b3ae7238e140",
      "x": "KveFLXMNEgMXLhxwGlOoWvfepkWTXOJWrWvQXwOzsmw"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "8797e07c-ae7d-4f18-98e3-5e5f36d5d301",
      "alg": "RSA-OAEP",
      "n": "p7VzbCV1COSEWW6wxxYc6emYCQzaecPPR66-6wSGyqxOiy9krCJaSdRs5tUKhNpPb3PD_OP8WfwTm0RmBL35xgIHxObViQkUmXii_HuBXObCaKm-LaNZHW3TSqjNqDNhikIerIAptvdWqjGSDGCrzg_UhtySuQlV-NV73bbrh_JPmKje5Ltw_A9bdin4jcJliZNINbYuSyZbvjlKdws0dACAQhORqkUyhVHcIuJWukh8EE-mLI1mYkWPxURwh9kZ8VYgXS_FsJ8hTb5AZHs67r2WeTbHdhfMXGvEN3-jk_Ppj3nQFZwIS7Jv8yTnVhNHIDPu5feDpxfUAkVltTaF7Q"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "958c31db-faf4-49f9-a49f-dee2b4610b22",
      "x": "U6TDCChTdkJ96J2wZuDyCpOt-cMyViBKX4RSsYC1WBY",
      "y": "Zjf6cQK3vPKlAeaYWxqvcec-FR3kZOlhc50nB3cxD9k",
      "alg": "ECDH-ES"
    }
  ]
}
2020-09-01 12:50:15 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2020-09-01 12:50:15 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2020-09-01 12:50:15 SUCCESS
OIDCCLoadUserInfo
Added user information
user_info
{
  "sub": "user-subject-1234531",
  "name": "Demo T. User",
  "given_name": "Demo",
  "family_name": "User",
  "middle_name": "Theresa",
  "nickname": "Dee",
  "preferred_username": "d.tu",
  "gender": "female",
  "birthdate": "2000-02-03",
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "zoneinfo": "America/Los_Angeles",
  "locale": "en-US",
  "phone_number": "+1 555 5550000",
  "phone_number_verified": false,
  "email": "user@example.com",
  "email_verified": false,
  "website": "https://openid.net/",
  "updated_at": "1580000000"
}
2020-09-01 12:50:15 SUCCESS
GetDynamicClientConfiguration
No client details on configuration, created an empty dynamic_client_registration_template object.
2020-09-01 12:50:15
oidcc-client-test-missing-sub
Setup Done
2020-09-01 12:50:15 INCOMING
oidcc-client-test-missing-sub
Incoming HTTP request to test instance lO0qYdjjmCUWJoH
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
.well-known/openid-configuration
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Discovery endpoint
2020-09-01 12:50:15 OUTGOING
oidcc-client-test-missing-sub
Response to HTTP request to test instance lO0qYdjjmCUWJoH
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "issuer": "https://www.certification.openid.net/test/lO0qYdjjmCUWJoH/",
  "authorization_endpoint": "https://www.certification.openid.net/test/lO0qYdjjmCUWJoH/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/lO0qYdjjmCUWJoH/token",
  "jwks_uri": "https://www.certification.openid.net/test/lO0qYdjjmCUWJoH/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/lO0qYdjjmCUWJoH/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/lO0qYdjjmCUWJoH/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
outgoing_path
.well-known/openid-configuration
2020-09-01 12:50:16 INCOMING
oidcc-client-test-missing-sub
Incoming HTTP request to test instance lO0qYdjjmCUWJoH
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "content-type": "application/json",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "155",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
register
incoming_body_form_params
incoming_method
POST
incoming_body_json
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "id_token"
  ],
  "grant_types": [
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ]
}
incoming_query_string_params
{}
incoming_body
{"token_endpoint_auth_method":"client_secret_basic","response_types":["id_token"],"grant_types":["implicit"],"redirect_uris":["https://rp.example.com/cb"]}
Registration endpoint
2020-09-01 12:50:16 SUCCESS
OIDCCExtractDynamicRegistrationRequest
Extracted dynamic client registration request
request
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "id_token"
  ],
  "grant_types": [
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ]
}
2020-09-01 12:50:16 INFO
EnsureRegistrationRequestContainsAtLeastOneContact
This application requires that registration requests contain at least one contact.
2020-09-01 12:50:16 SUCCESS
ValidateClientGrantTypes
grant_types match response_types
grant_types
[
  "implicit"
]
response_types
[
  "id_token"
]
2020-09-01 12:50:16 SUCCESS
OIDCCValidateClientRedirectUris
Valid redirect_uri(s) provided in registration request
redirect_uris
[
  "https://rp.example.com/cb"
]
2020-09-01 12:50:16 SUCCESS
ValidateClientLogoUris
Client does not contain any logo_uri
2020-09-01 12:50:16 SUCCESS
ValidateClientUris
Client does not contain any client_uri
2020-09-01 12:50:16 SUCCESS
ValidateClientPolicyUris
Client does not contain any policy_uri
2020-09-01 12:50:16 SUCCESS
ValidateClientTosUris
Client does not contain any tos_uri
2020-09-01 12:50:16 SUCCESS
ValidateClientSubjectType
A subject_type was not provided
2020-09-01 12:50:16 INFO
ValidateIdTokenSignedResponseAlg
Skipped evaluation due to missing required element: client id_token_signed_response_alg
path
id_token_signed_response_alg
mapped
object
client
2020-09-01 12:50:16 SUCCESS
EnsureIdTokenEncryptedResponseAlgIsSetIfEncIsSet
id_token_encrypted_response_enc is not set
2020-09-01 12:50:16 INFO
ValidateUserinfoSignedResponseAlg
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2020-09-01 12:50:16 SUCCESS
EnsureUserinfoEncryptedResponseAlgIsSetIfEncIsSet
userinfo_encrypted_response_enc is not set
2020-09-01 12:50:16 INFO
ValidateRequestObjectSigningAlg
Skipped evaluation due to missing required element: client request_object_signing_alg
path
request_object_signing_alg
mapped
object
client
2020-09-01 12:50:16 SUCCESS
EnsureRequestObjectEncryptionAlgIsSetIfEncIsSet
request_object_encryption_enc is not set
2020-09-01 12:50:16 INFO
ValidateTokenEndpointAuthSigningAlg
Skipped evaluation due to missing required element: client token_endpoint_auth_signing_alg
path
token_endpoint_auth_signing_alg
mapped
object
client
2020-09-01 12:50:16 SUCCESS
ValidateDefaultMaxAge
default_max_age is not set
2020-09-01 12:50:16 INFO
ValidateRequireAuthTime
Skipped evaluation due to missing required element: client require_auth_time
path
require_auth_time
mapped
object
client
2020-09-01 12:50:16 INFO
ValidateDefaultAcrValues
Skipped evaluation due to missing required element: client default_acr_values
path
default_acr_values
mapped
object
client
2020-09-01 12:50:16 INFO
ValidateInitiateLoginUri
Skipped evaluation due to missing required element: client initiate_login_uri
path
initiate_login_uri
mapped
object
client
2020-09-01 12:50:16 INFO
ValidateRequestUris
Skipped evaluation due to missing required element: client request_uris
path
request_uris
mapped
object
client
2020-09-01 12:50:16 SUCCESS
ValidateClientRegistrationRequestSectorIdentifierUri
A sector_identifier_uri was not provided
2020-09-01 12:50:16 SUCCESS
OIDCCRegisterClient
Registered client
client
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "id_token"
  ],
  "grant_types": [
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_ThASGZKbRurlKkm17499*,\u0026[*"
}
2020-09-01 12:50:16
OIDCCCreateClientSecretForDynamicClient
Set the secret for registered client
client_secret
secret_sLfeFYHIQFamkdZVoXqTLVcJriEXjEjOMJKuaycSXIcjOpjaQv5539743543)\'%\
2020-09-01 12:50:16 SUCCESS
EnsureTokenEndPointAuthMethodIsClientSecretBasic
token_endpoint_auth_method is 'client_secret_basic' as expected
2020-09-01 12:50:16 SUCCESS
EnsureClientDoesNotHaveBothJwksAndJwksUri
Client does not have both jwks and jwks_uri set
client
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "id_token"
  ],
  "grant_types": [
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_ThASGZKbRurlKkm17499*,\u0026[*",
  "client_secret": "secret_sLfeFYHIQFamkdZVoXqTLVcJriEXjEjOMJKuaycSXIcjOpjaQv5539743543)\\\u0027%\\"
}
2020-09-01 12:50:16 INFO
FetchClientKeys
Skipped evaluation due to missing required element: client jwks_uri
path
jwks_uri
mapped
object
client
2020-09-01 12:50:16 SUCCESS
OIDCCExtractServerSigningAlg
Using the default algorithm for the first key in server jwks
signing_algorithm
RS256
2020-09-01 12:50:16
SetClientIdTokenSignedResponseAlgToServerSigningAlg
Set id_token_signed_response_alg for the registered client
id_token_signed_response_alg
RS256
2020-09-01 12:50:16 OUTGOING
oidcc-client-test-missing-sub
Response to HTTP request to test instance lO0qYdjjmCUWJoH
outgoing_status_code
201
outgoing_headers
{}
outgoing_body
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "id_token"
  ],
  "grant_types": [
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_ThASGZKbRurlKkm17499*,\u0026[*",
  "client_secret": "secret_sLfeFYHIQFamkdZVoXqTLVcJriEXjEjOMJKuaycSXIcjOpjaQv5539743543)\\\u0027%\\",
  "id_token_signed_response_alg": "RS256"
}
outgoing_path
register
2020-09-01 12:50:16 INCOMING
oidcc-client-test-missing-sub
Incoming HTTP request to test instance lO0qYdjjmCUWJoH
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "got/9.6.0 (https://github.com/sindresorhus/got)",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
authorize
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "client_id": "client_ThASGZKbRurlKkm17499*,\u0026[*",
  "scope": "openid",
  "response_type": "id_token",
  "redirect_uri": "https://rp.example.com/cb",
  "state": "piPSlOLo-jEPVTeKbittYxcGBI5cgzYEXzvelNbck5A",
  "nonce": "B08PqTVaxW4HQ33Q-n3dngJjXzF-9G-MwFpg2nSwUw0",
  "response_mode": "form_post"
}
incoming_body
Authorization endpoint
2020-09-01 12:50:16 SUCCESS
EnsureRequestDoesNotContainRequestObject
Request does not contain a request parameter
2020-09-01 12:50:16 SUCCESS
OIDCCEnsureAuthorizationHttpRequestContainsOpenIDScope
Found 'openid' in scope http request parameter
actual
[
  "openid"
]
expected
openid
2020-09-01 12:50:16 SUCCESS
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
effective_authorization_endpoint_request
{
  "client_id": "client_ThASGZKbRurlKkm17499*,\u0026[*",
  "scope": "openid",
  "response_type": "id_token",
  "redirect_uri": "https://rp.example.com/cb",
  "state": "piPSlOLo-jEPVTeKbittYxcGBI5cgzYEXzvelNbck5A",
  "nonce": "B08PqTVaxW4HQ33Q-n3dngJjXzF-9G-MwFpg2nSwUw0",
  "response_mode": "form_post"
}
2020-09-01 12:50:16 SUCCESS
ExtractRequestedScopes
Requested scopes
scope
openid
2020-09-01 12:50:16 SUCCESS
ExtractNonceFromAuthorizationRequest
Extracted nonce
nonce
B08PqTVaxW4HQ33Q-n3dngJjXzF-9G-MwFpg2nSwUw0
2020-09-01 12:50:16 SUCCESS
EnsureResponseTypeIsIdToken
Response type is expected value
expected
id_token
2020-09-01 12:50:16 SUCCESS
EnsureMatchingClientId
Client ID matched
client_id
client_ThASGZKbRurlKkm17499*,&[*
2020-09-01 12:50:16 SUCCESS
EnsureValidRedirectUriForAuthorizationEndpointRequest
redirect_uri is one of the allowed redirect uris
actual
https://rp.example.com/cb
expected
[
  "https://rp.example.com/cb"
]
2020-09-01 12:50:16 SUCCESS
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
actual
[
  "openid"
]
expected
openid
2020-09-01 12:50:16 SUCCESS
DisallowMaxAgeEqualsZeroAndPromptNone
The client did not send max_age=0 and prompt=none parameters as expected
2020-09-01 12:50:16 SUCCESS
GenerateIdTokenClaims
Created ID Token Claims
iss
https://www.certification.openid.net/test/lO0qYdjjmCUWJoH/
sub
user-subject-1234531
aud
client_ThASGZKbRurlKkm17499*,&[*
nonce
B08PqTVaxW4HQ33Q-n3dngJjXzF-9G-MwFpg2nSwUw0
iat
1598964616
exp
1598964916
2020-09-01 12:50:16
RemoveSubFromIdToken
Removed sub value from ID token claims
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/lO0qYdjjmCUWJoH/",
  "aud": "client_ThASGZKbRurlKkm17499*,\u0026[*",
  "nonce": "B08PqTVaxW4HQ33Q-n3dngJjXzF-9G-MwFpg2nSwUw0",
  "iat": 1598964616,
  "exp": 1598964916
}
2020-09-01 12:50:16 INFO
AddCHashToIdTokenClaims
Skipped evaluation due to missing required string: c_hash
expected
c_hash
2020-09-01 12:50:16 INFO
AddAtHashToIdTokenClaims
Skipped evaluation due to missing required string: at_hash
expected
at_hash
2020-09-01 12:50:16 SUCCESS
OIDCCSignIdToken
Signed the ID token
id_token
eyJraWQiOiI4MDM4MmE3ZC1kYjhlLTQ4YzAtYTlkOS00ZGZlMDljNmZmYTQiLCJhbGciOiJSUzI1NiJ9.eyJhdWQiOiJjbGllbnRfVGhBU0daS2JSdXJsS2ttMTc0OTkqLCZbKiIsImlzcyI6Imh0dHBzOlwvXC93d3cuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0XC90ZXN0XC9sTzBxWWRqam1DVVdKb0hcLyIsImV4cCI6MTU5ODk2NDkxNiwibm9uY2UiOiJCMDhQcVRWYXhXNEhRMzNRLW4zZG5nSmpYekYtOUctTXdGcGcyblN3VXcwIiwiaWF0IjoxNTk4OTY0NjE2fQ.BgEs_XYDOJU-BEHQYFxXjhF4J9NUBOzP6mN3Ol9ZZTBajAUtKptFFatlUUqKc6v8cWU7zgRNO2kGKkjFyp89-kU_x4br2EfSdGYp3FYZmjKNwBCXLnupbHoRIwQqzR3In7cVkEZAqw7ZAQVsGpurQEZ_tVEW8erHoOUswUhkGQd359fp2pJqEzz5Gakqzwef-6Z9bAHDvExWW4QK0gYqAqb8fj8LHLVyhkwhgzjUWzq_s1vtHHkiAr8JvtyDTsYzpuZ77AH-N4t52sJN0B-hNz4ItLF239AW7WJVSPl4yC57j4IJiyXef9_r5ZDkJRWbAkeVMg9kmLXXVed7FXInIA
key
{"p":"_AUjgoTx2JqSxPbtSJcjIcK2kWUVd2Lz4SsA2d_xi6S1wkOoe7uRdURjtWmYV1wP2rDTfnWl6Cyhd6nCcphoHcCDpurHSHqNuTF_XP0nJXDvQ3J6eOgRpHMKalTnaZ5ShguYl4RPVDc2GnuchTPufswF7m-L9YhbmrlojIC6fP0","kty":"RSA","q":"h_4pZ44Fw04H42fTF6kkXqSeFOMTAZ1Rz7HeHJo86_m9C-aEtl0ePzQhVtFLl4dUGGILKt_IlqxWuvU90476wdHp9U2cH7tvX4uHLK2nZskKWhByi-WJmuHUYUGdjI1E8k8EybWbBROyp2wvhHYt9m06vrQUVmGr_KMKuQFYPK8","d":"IXYB68TINIaJXy3mGN-H9telOiXEIkZapkBLsxGCwX-iBwRY3BXINEI35LA1IzM5AvTKbwD9AoDXpyiFtE8ptZSk7-UgHi2AcT5LXgnd0EVMl9B0XmRb0jagCd77iknNDJQI2gxq8z9HOMxj3KI9oI5bMD45zWBXLVts4vgFdj4RBPZPWfX3JGuOTWHdn8udZDci8GzNt8u3VfFISwu0yskHvOjG_n5Ss_Cu0I_DrvPcvvmIttI88sr0_T7HMhQ-x3eJgL8-2DstQciugVHbcT-PfsE4sfKYh4DXYx-2_K1JYOvDOeojpCtIVQVjq2BEH5-6xu9xlJE99cztc0Dy4Q","e":"AQAB","use":"sig","kid":"80382a7d-db8e-48c0-a9d9-4dfe09c6ffa4","qi":"XmEw0iz2GOVxCdXcHPJ3IT-UtObd6LO9U43AQxzmJvVvTakGpe2anaZroQAy-XR0jiq8DxNpJ9Ut5oPuV30lBNGUlQDpnwE-olmeS7Nfh7-VGnUWtEn5b4QqCG84IWJ4AAZqOh-6qbMd21CL4r_gn3upE3k2RWftDTCJVqMRyOc","dp":"aqJ5_fXmpvHwfCrHB9n7YYOT4D1XMebKrlGV0JpzB9Uvmv0pwwEAcQ_46H-_l-c6RhxfwLhi9LQ9tfY8cmSOWVhl3DCnFcHVSbDp5RywfaUld_JuY849-Mk8dPVr3ULCRDmP3Tx8nHOoDtiSx8HLfhcxw0urer6xk-wzko-9WLk","dq":"DByx-Vwn3T48658aqPfSmm9U-Q1Eaxdk6vevjaKbHHVQxheQ6GEgyYZOFdpsPiG6drV8wyPNTMYqr1oaWJZadRrKGKQB7L2X7M2Ti4In77qmJmFiol0eRWIptUPP0W3fnyk0hvaayPf5KHo1PTn9W_5chhGp4guu8sBeux2Ii1c","n":"heDrldQtKA14bmP7WswwHIA4SrCkKmyafBOJBgU3n4OGUv6vbLFcPe2PdJewyK37uHK8uvlfo_GnunxbOQcIg4GiLEsEvYJSoCT0wKD5eCP1s89tsj4MuxV6WaGvwBFeb2tMbRvlvQS6K_ExtzPcSPR-QknMyzVFiyMbK0ZWHnGID6sBNX8IyPN4z4gYwnSX-B_PmPx-0wiZkgzCSDtXxmyX3oqHixwgCEuTqFUW8ML3zoOCZGs9uQXSmc8E1ruYjNaGqC1jM5UIL9V3wbFtdHlIdt8hvBdQ_l7fJ5pv9MUjbiMqLS8DzsyyKAbwG5NKpiblIckQhlymyZWkqL688w"}
algorithm
RS256
2020-09-01 12:50:16 INFO
EncryptIdToken
Skipped evaluation due to missing required element: client id_token_encrypted_response_alg
path
id_token_encrypted_response_alg
mapped
object
client
2020-09-01 12:50:16 SUCCESS
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "piPSlOLo-jEPVTeKbittYxcGBI5cgzYEXzvelNbck5A"
}
2020-09-01 12:50:16 SUCCESS
AddIdTokenToAuthorizationEndpointResponseParams
Added id_token to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "piPSlOLo-jEPVTeKbittYxcGBI5cgzYEXzvelNbck5A",
  "id_token": "eyJraWQiOiI4MDM4MmE3ZC1kYjhlLTQ4YzAtYTlkOS00ZGZlMDljNmZmYTQiLCJhbGciOiJSUzI1NiJ9.eyJhdWQiOiJjbGllbnRfVGhBU0daS2JSdXJsS2ttMTc0OTkqLCZbKiIsImlzcyI6Imh0dHBzOlwvXC93d3cuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0XC90ZXN0XC9sTzBxWWRqam1DVVdKb0hcLyIsImV4cCI6MTU5ODk2NDkxNiwibm9uY2UiOiJCMDhQcVRWYXhXNEhRMzNRLW4zZG5nSmpYekYtOUctTXdGcGcyblN3VXcwIiwiaWF0IjoxNTk4OTY0NjE2fQ.BgEs_XYDOJU-BEHQYFxXjhF4J9NUBOzP6mN3Ol9ZZTBajAUtKptFFatlUUqKc6v8cWU7zgRNO2kGKkjFyp89-kU_x4br2EfSdGYp3FYZmjKNwBCXLnupbHoRIwQqzR3In7cVkEZAqw7ZAQVsGpurQEZ_tVEW8erHoOUswUhkGQd359fp2pJqEzz5Gakqzwef-6Z9bAHDvExWW4QK0gYqAqb8fj8LHLVyhkwhgzjUWzq_s1vtHHkiAr8JvtyDTsYzpuZ77AH-N4t52sJN0B-hNz4ItLF239AW7WJVSPl4yC57j4IJiyXef9_r5ZDkJRWbAkeVMg9kmLXXVed7FXInIA"
}
2020-09-01 12:50:16 OUTGOING
oidcc-client-test-missing-sub
Response to HTTP request to test instance lO0qYdjjmCUWJoH
outgoing
ModelAndView [view="formPostResponseMode"; model={formAction=https://rp.example.com/cb, formParameters={"state":"piPSlOLo-jEPVTeKbittYxcGBI5cgzYEXzvelNbck5A","id_token":"eyJraWQiOiI4MDM4MmE3ZC1kYjhlLTQ4YzAtYTlkOS00ZGZlMDljNmZmYTQiLCJhbGciOiJSUzI1NiJ9.eyJhdWQiOiJjbGllbnRfVGhBU0daS2JSdXJsS2ttMTc0OTkqLCZbKiIsImlzcyI6Imh0dHBzOlwvXC93d3cuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0XC90ZXN0XC9sTzBxWWRqam1DVVdKb0hcLyIsImV4cCI6MTU5ODk2NDkxNiwibm9uY2UiOiJCMDhQcVRWYXhXNEhRMzNRLW4zZG5nSmpYekYtOUctTXdGcGcyblN3VXcwIiwiaWF0IjoxNTk4OTY0NjE2fQ.BgEs_XYDOJU-BEHQYFxXjhF4J9NUBOzP6mN3Ol9ZZTBajAUtKptFFatlUUqKc6v8cWU7zgRNO2kGKkjFyp89-kU_x4br2EfSdGYp3FYZmjKNwBCXLnupbHoRIwQqzR3In7cVkEZAqw7ZAQVsGpurQEZ_tVEW8erHoOUswUhkGQd359fp2pJqEzz5Gakqzwef-6Z9bAHDvExWW4QK0gYqAqb8fj8LHLVyhkwhgzjUWzq_s1vtHHkiAr8JvtyDTsYzpuZ77AH-N4t52sJN0B-hNz4ItLF239AW7WJVSPl4yC57j4IJiyXef9_r5ZDkJRWbAkeVMg9kmLXXVed7FXInIA"}}]
outgoing_path
authorize
2020-09-01 12:50:18 FINISHED
oidcc-client-test-missing-sub
Test has run to completion
testmodule_result
PASSED
Test Results