Test Summary

Test Results

Expand All Collapse All
All times are UTC
2020-09-01 12:51:43 INFO
TEST-RUNNER
Test instance AjqfESJcf8JrF4o created
baseUrl
https://www.certification.openid.net/test/AjqfESJcf8JrF4o
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code id_token",
  "request_type": "plain_http_request",
  "response_mode": "form_post",
  "client_registration": "dynamic_client"
}
alias

                                
description
test suite runner for openid-client
planId
l0lJMpv444Mye
config
{
  "description": "test suite runner for openid-client",
  "waitTimeoutSeconds": 2
}
testName
oidcc-client-test-client-secret-basic
2020-09-01 12:51:43 SUCCESS
OIDCCGenerateServerConfiguration
Generated default server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/AjqfESJcf8JrF4o/",
  "authorization_endpoint": "https://www.certification.openid.net/test/AjqfESJcf8JrF4o/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/AjqfESJcf8JrF4o/token",
  "jwks_uri": "https://www.certification.openid.net/test/AjqfESJcf8JrF4o/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/AjqfESJcf8JrF4o/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/AjqfESJcf8JrF4o/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post",
    "client_secret_jwt",
    "private_key_jwt"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2020-09-01 12:51:43
SetTokenEndpointAuthMethodsSupportedToClientSecretBasicOnly
Changed token_endpoint_auth_methods_supported to client_secret_basic only in server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/AjqfESJcf8JrF4o/",
  "authorization_endpoint": "https://www.certification.openid.net/test/AjqfESJcf8JrF4o/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/AjqfESJcf8JrF4o/token",
  "jwks_uri": "https://www.certification.openid.net/test/AjqfESJcf8JrF4o/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/AjqfESJcf8JrF4o/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/AjqfESJcf8JrF4o/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2020-09-01 12:51:43
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "66C02tUPtZC9RSxgqO6E3pBX9_USzp8n0JX8Akl39BaIl_zKze7bjDsbrfdl1-GoDKo-sv8F3EtoEYKvvCvaDz7xI4anM7o5VD0-OIBJql8pa7U_3k6RQ5X-63bhGE8Y8v8aBCf8bK3EystvvKVeFffyRxQauwAHvg25JjjPLFM",
      "kty": "RSA",
      "q": "swxvHAECGM9O9aNEUAD1ElDlut4VLLppkwrhJF2wnyOWzwRIidW6MGj5X6w_TG44bStBg_76cqF2gusoHsNuIsLKX2FS7yu_XRgW_cnbx--tir1i7qFxI9uDvmZxHEFvf2unRBz4JIVOnGGDdJ9dgk6xbQGlhD_pD3M2GwHr6hs",
      "d": "ATy4Y4ZZ3uXY9gYKXAo769CMB-jteDXpkxklQ9e8HgExeEmG_57B7nMlkLna418lMc5pTDBLBW1cBdrjPjhHAxHixvpsvy1_2ECvWxSJkmLv-jd_ITg5x1Q1DuG8LOu189JUOPHHGIOGu8U5hx6vCm2DdBVmTA9Kyheqr2DY2ZWzngtQ5qK4vDz9qkETfCVOGdxKiPTtPP5tuYfr5BZAHjgBngqZcJ_krA4wyrpB9v3hdCodNBiL9pLUY42nTMFA2tBNJcaTkEwzvxKFW8n_AS9E9odtUgGMZuzqihrrB2f7pxcWIaYM8eGMaKKsTA_lQzTjKfsSTUiyrf0oNPKRcQ",
      "e": "AQAB",
      "use": "sig",
      "kid": "1b016cef-b317-4187-9579-88479727be2c",
      "qi": "W2tZfyt8fUyOa9P5vCBp_IfOjmWI6eoGk96HZB9UZ1TbyjUnOaCbINEnbh-0fo5UvLEKWrn0uHXTxpxE6s_L_SpQa_tpn6OYAqa7jfTCkEIFyvSGXPLHkMK8f3PZAwGaogrIlM9CgVwlyjXqkGz2EZ8frFxfORexIxEB2Y-vW48",
      "dp": "oDRpIuyAPNPHTFPq-JELuANuPEHd4qxltrVzXd6z9zqm7qfLAA9qKMM7g6HVFd3wk4PhE3S_eFOw008GyysJnRoPfDceUdZJClSFjIb1Dyiakgfu_-htbgV7CH-QdiW5ceYuuyqwvve6-KMvOpU5DjjB-r_ZmNFhckAEZc90VM8",
      "dq": "AosjrO8qu3V-dqjaGJTa5ma1zMDI5jjDtS4LYrvd_XTA-LHj4eliWruzBzPoNkq-jHZ32MsvfZ9jkpqKmF1IXEAOJeq5BeLGNilYckSC1cVG3tiv5hnvBIZiybqk0rTvQ40g9CvBLquiIUCVYHu_FVHO3XCPjGBoDCsj0qBlXI8",
      "n": "pMzQQfIoMc35sGQaDuDCoID11Mqam8anB6jGPODCd1DltqH4RZi-Bs4OgL0ylulmepd3_KpBalgrTHD2K3UxnJCSJAHwLvUVuYLrEJhGNEwoJTCSEFCmRbdbGm3RgxAQaDYjAQpta4K6832NtS7prx4d-B5gf8lJkONEL6BhAVV_UxbtcfiA02rg7CCskCXG0dXW2zOHy927BZ9zqlqiClFEsASA_XlF-ue0nvzqr4lLBzopkq8rFd4KOMrFSyWmmDALRX30hhwZBVeEf-yfq5mkIasMH0pr2kLny1kKEQ895voc8cxKZlMIknS35Rfcfd82njLdnRQqepsQX46KwQ"
    },
    {
      "kty": "EC",
      "d": "D7gaNDPG8O09HMlEsE5hgleBHqPzzP665ZZRvPEK9tE",
      "use": "sig",
      "crv": "P-256",
      "kid": "41f764b2-d986-4eb0-b263-8d8e8332b8cf",
      "x": "kx5NPkzJLvUUyEbfWj8jD9yIG4fsw4UnWriw9NlHJ44",
      "y": "WdlPKXyKbGHAZ8-7QO_xx-QuDzvGYyDwcdCRLbD4EFA"
    },
    {
      "kty": "EC",
      "d": "bsbrKwT-TMrL5gwaiH5e0wtGdhpWLllIIYper1CyChg",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "98a5234a-272f-436b-a6a0-dd13598b93d5",
      "x": "pnv905F-lM_d-tjLw5N8W9rPPPRF8oMe_CSiw21i6ZU",
      "y": "TUfXXRyoezJUSvlNfwSaoFVKwWnXtavlf9-_8ukvGhI"
    },
    {
      "kty": "OKP",
      "d": "0wrkXXKGBWXaL3AR3VamyfyVfyRsB8LswsigZnJK2GI",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "b32e4914-989a-40ca-8232-f29165dcc093",
      "x": "SlwcEUscli1oSfgLrgSCfwIdxkNL-6qJwVQ5CkpmbM4"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "5tBiDWsJZG4n-BYkKfton0aiThLbDcVVMyNKs0yH246KZ19Arkdeq4rNQi6eZOLy5HChGyshDSawJJTF0680iUnMYMWE3P59QlK3Qj_z2Mt9pmAYsIGeHRgIwpbeFwbJx4ikA0P1hxn5E54_tgTnw7Bk8pc_zdDHxgqD-SrRw60",
      "kty": "RSA",
      "q": "lyZeVnoFH2ojx_YBt8MucxpWegn1GdBHeIh59U26D8cfBknEMM6jzECpXxXT9iSdvcJvn1wnsjKfoZ_W-o3jXmf1ZmfrO63m0nGqidHzQEOQN9ikc006fUilACg-aWi0kI_YxojUD_Kfz5btvYqTObzKMMtbcROeL4s2aclQlZU",
      "d": "g0c_DJQc7Yhs48VlIr_sy6J-wHOEmX3T754_UBxBdbpMqOL4t7khrZ_1XTF1p-sOHHwg7lp8SoaOlcrTFm8xZ8yxXBSOKG5IlWC5dSPcEw-a6BWx2M7jIB92hJbjx1WdFZpgXW_DNSOa8mOFmJtNwHXsZWodkrGdDgoXxKXDz5Mz1Xh7O0xEk1qWZUsZnoOiP10YoE-fD0bIebtxIvznIHNZOoYbkiLT0H_VOTfGrQjU3h2n3fPva2wG4ipxYM2enrjOWca1O0poLICbyPkKvhxwaZq-2kB-2QZlyXYq-z94qs6_s10BPGICnNHhIjM0RvXheG4OzDFforjaWmDYQQ",
      "e": "AQAB",
      "use": "enc",
      "kid": "20927fa3-4494-4c84-9f66-e80a10449ab0",
      "qi": "KZ0opl9o2-PuLoQpjZ5wC_jhBhiTx11_fApKxh8opVFKn8mzx0rDZakK1Bynz6nJT7N7Yx6LVfGNIvLZsfKJS2p6pWufCF83qjSByKFL4duOLo9QqyYg_M_dHXeNZ46hVa2MWYHHKisau66MvZATxmBaKBcpO1c6AhbNgKE1PwA",
      "dp": "fI4bO651RRME0qXwIg-fp8QQNh2KxGWm0o_K8fLspZjIK3yFhQbSmbOvjHVn2H14Ibp91hFyJoyoJTV7g_5aVXPTrK0qQ6-5nJ7Schfc2TMGvU_CQw3Pa1fa8ldDxh1NqjWcfH6h8qQbe3C8ZNdE0p9P-nGQZtqx07c8_KsUw4k",
      "alg": "RSA-OAEP",
      "dq": "kZ-4wi47Y0HaiVu92fMlfGYCrP-M8jrVsQ4kGi-xtGPOwzss1y0vaKlfxSl9lqc-hsWez3V1FV1qqMgb0jgDuEAGkYxLeasZOOWkPbZWWzL87qE-B4x_bpcfyV_8iYgEd0bvvo-zaE4EpHcwRC4PnFAEqTAzwGT7QakpWpBHoGU",
      "n": "iEeB0vQmOJCHpgVS5qLhFTqlGVQfAB-WCmwNnj2LhCCDuByNvbuOrqGH3P4U1QDy8OiE6qbyYRq4BGKWsFIKPzfAtndjXhwxxxsIs5OnypYXa589SgwVaAd89X7CutwfgyLp05cXfX08Ho1fkZP333H3D2MArzzGd2Aozes9gvpq8MiqTgfIgKfrUmcdOs7OhstNAjJ2HfsaMi7QVc0cjTFf9kGCnekPJAXodg0sxgB2PTJkpF2k9NOaeBfQ7Zhdb8WPx87I3OtvSVL9TdKcY3nSgLxlRqDHP5AGUYNB0N898Sr3-HiCPp3YxgYkX_UOLJ8CWrzh_kUUqaoW_gqUsQ"
    },
    {
      "kty": "EC",
      "d": "esYNgX1mcBgNQzGawU-XjHiSBsi6IcEfiFPJOGRMde8",
      "use": "enc",
      "crv": "P-256",
      "kid": "cab75944-1a1e-4014-9edf-61b0448a049f",
      "x": "ncV3GajSvnGj48nWQsOdomONC_Qy6SQjt3OyAX2VmkY",
      "y": "pw6ktUI7EGJDzdyYpN7sEVRoF4ziGQucU0Hh5EQzbgs",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "1b016cef-b317-4187-9579-88479727be2c",
      "n": "pMzQQfIoMc35sGQaDuDCoID11Mqam8anB6jGPODCd1DltqH4RZi-Bs4OgL0ylulmepd3_KpBalgrTHD2K3UxnJCSJAHwLvUVuYLrEJhGNEwoJTCSEFCmRbdbGm3RgxAQaDYjAQpta4K6832NtS7prx4d-B5gf8lJkONEL6BhAVV_UxbtcfiA02rg7CCskCXG0dXW2zOHy927BZ9zqlqiClFEsASA_XlF-ue0nvzqr4lLBzopkq8rFd4KOMrFSyWmmDALRX30hhwZBVeEf-yfq5mkIasMH0pr2kLny1kKEQ895voc8cxKZlMIknS35Rfcfd82njLdnRQqepsQX46KwQ"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "bbfedee8-29a6-4d26-b6ae-79ddee64da14",
      "n": "mMpDedSZynpONxplqaFpvQwM2cfvJu2CgbsvXMBeLhHSX6NCwt-Vz9oIdHkP3ONWuAQoF-3aUeRawdW8PpoSTL06tiMwH0J-fYHoCtTWsR9p1_CWQa2tXf4jMnpjp1_zxFlpi8F_MbR3hTX3FRzITY_-QfTAiTYnoD4VYOEI9j2IfedFPy9NF_6xHLDCC1vYE4qlpd3OMmpbFJokN6e3Lt5oTv3O08pnGlAqSmPbv9Mn6_nOmefmjnyaLrZpyaeW3DKDIOsefquIEp11MjE9FaWi3BKXFI_wD4flzJ6XLCD8TcyPiYIaP0ahHe8J8bZaWgqRRc_T-nTHwreNL45_hw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "41f764b2-d986-4eb0-b263-8d8e8332b8cf",
      "x": "kx5NPkzJLvUUyEbfWj8jD9yIG4fsw4UnWriw9NlHJ44",
      "y": "WdlPKXyKbGHAZ8-7QO_xx-QuDzvGYyDwcdCRLbD4EFA"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "16aecc72-918a-4b63-aa6e-e99567fc2e44",
      "x": "pwjLX87BC13SXhfxVWz4HH2_iszxOXyvpSrE7Tq2J8I",
      "y": "lcNw5bXx1FjVo-su34_W98w_ER34UqPeodeTaI_qrpA"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "98a5234a-272f-436b-a6a0-dd13598b93d5",
      "x": "pnv905F-lM_d-tjLw5N8W9rPPPRF8oMe_CSiw21i6ZU",
      "y": "TUfXXRyoezJUSvlNfwSaoFVKwWnXtavlf9-_8ukvGhI"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "b32e4914-989a-40ca-8232-f29165dcc093",
      "x": "SlwcEUscli1oSfgLrgSCfwIdxkNL-6qJwVQ5CkpmbM4"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "20927fa3-4494-4c84-9f66-e80a10449ab0",
      "alg": "RSA-OAEP",
      "n": "iEeB0vQmOJCHpgVS5qLhFTqlGVQfAB-WCmwNnj2LhCCDuByNvbuOrqGH3P4U1QDy8OiE6qbyYRq4BGKWsFIKPzfAtndjXhwxxxsIs5OnypYXa589SgwVaAd89X7CutwfgyLp05cXfX08Ho1fkZP333H3D2MArzzGd2Aozes9gvpq8MiqTgfIgKfrUmcdOs7OhstNAjJ2HfsaMi7QVc0cjTFf9kGCnekPJAXodg0sxgB2PTJkpF2k9NOaeBfQ7Zhdb8WPx87I3OtvSVL9TdKcY3nSgLxlRqDHP5AGUYNB0N898Sr3-HiCPp3YxgYkX_UOLJ8CWrzh_kUUqaoW_gqUsQ"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "cab75944-1a1e-4014-9edf-61b0448a049f",
      "x": "ncV3GajSvnGj48nWQsOdomONC_Qy6SQjt3OyAX2VmkY",
      "y": "pw6ktUI7EGJDzdyYpN7sEVRoF4ziGQucU0Hh5EQzbgs",
      "alg": "ECDH-ES"
    }
  ]
}
2020-09-01 12:51:43 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2020-09-01 12:51:43 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2020-09-01 12:51:43 SUCCESS
OIDCCLoadUserInfo
Added user information
user_info
{
  "sub": "user-subject-1234531",
  "name": "Demo T. User",
  "given_name": "Demo",
  "family_name": "User",
  "middle_name": "Theresa",
  "nickname": "Dee",
  "preferred_username": "d.tu",
  "gender": "female",
  "birthdate": "2000-02-03",
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "zoneinfo": "America/Los_Angeles",
  "locale": "en-US",
  "phone_number": "+1 555 5550000",
  "phone_number_verified": false,
  "email": "user@example.com",
  "email_verified": false,
  "website": "https://openid.net/",
  "updated_at": "1580000000"
}
2020-09-01 12:51:43 SUCCESS
GetDynamicClientConfiguration
No client details on configuration, created an empty dynamic_client_registration_template object.
2020-09-01 12:51:43
oidcc-client-test-client-secret-basic
Setup Done
2020-09-01 12:51:46 INCOMING
oidcc-client-test-client-secret-basic
Incoming HTTP request to test instance AjqfESJcf8JrF4o
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
.well-known/openid-configuration
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Discovery endpoint
2020-09-01 12:51:46 OUTGOING
oidcc-client-test-client-secret-basic
Response to HTTP request to test instance AjqfESJcf8JrF4o
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "issuer": "https://www.certification.openid.net/test/AjqfESJcf8JrF4o/",
  "authorization_endpoint": "https://www.certification.openid.net/test/AjqfESJcf8JrF4o/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/AjqfESJcf8JrF4o/token",
  "jwks_uri": "https://www.certification.openid.net/test/AjqfESJcf8JrF4o/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/AjqfESJcf8JrF4o/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/AjqfESJcf8JrF4o/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
outgoing_path
.well-known/openid-configuration
2020-09-01 12:51:46 INCOMING
oidcc-client-test-client-secret-basic
Incoming HTTP request to test instance AjqfESJcf8JrF4o
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "content-type": "application/json",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "181",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
register
incoming_body_form_params
incoming_method
POST
incoming_body_json
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ]
}
incoming_query_string_params
{}
incoming_body
{"token_endpoint_auth_method":"client_secret_basic","response_types":["code id_token"],"grant_types":["authorization_code","implicit"],"redirect_uris":["https://rp.example.com/cb"]}
Registration endpoint
2020-09-01 12:51:46 SUCCESS
OIDCCExtractDynamicRegistrationRequest
Extracted dynamic client registration request
request
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ]
}
2020-09-01 12:51:46 INFO
EnsureRegistrationRequestContainsAtLeastOneContact
This application requires that registration requests contain at least one contact.
2020-09-01 12:51:46 SUCCESS
ValidateClientGrantTypes
grant_types match response_types
grant_types
[
  "authorization_code",
  "implicit"
]
response_types
[
  "code id_token"
]
2020-09-01 12:51:46 SUCCESS
OIDCCValidateClientRedirectUris
Valid redirect_uri(s) provided in registration request
redirect_uris
[
  "https://rp.example.com/cb"
]
2020-09-01 12:51:46 SUCCESS
ValidateClientLogoUris
Client does not contain any logo_uri
2020-09-01 12:51:46 SUCCESS
ValidateClientUris
Client does not contain any client_uri
2020-09-01 12:51:46 SUCCESS
ValidateClientPolicyUris
Client does not contain any policy_uri
2020-09-01 12:51:46 SUCCESS
ValidateClientTosUris
Client does not contain any tos_uri
2020-09-01 12:51:46 SUCCESS
ValidateClientSubjectType
A subject_type was not provided
2020-09-01 12:51:46 INFO
ValidateIdTokenSignedResponseAlg
Skipped evaluation due to missing required element: client id_token_signed_response_alg
path
id_token_signed_response_alg
mapped
object
client
2020-09-01 12:51:46 SUCCESS
EnsureIdTokenEncryptedResponseAlgIsSetIfEncIsSet
id_token_encrypted_response_enc is not set
2020-09-01 12:51:46 INFO
ValidateUserinfoSignedResponseAlg
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2020-09-01 12:51:46 SUCCESS
EnsureUserinfoEncryptedResponseAlgIsSetIfEncIsSet
userinfo_encrypted_response_enc is not set
2020-09-01 12:51:46 INFO
ValidateRequestObjectSigningAlg
Skipped evaluation due to missing required element: client request_object_signing_alg
path
request_object_signing_alg
mapped
object
client
2020-09-01 12:51:46 SUCCESS
EnsureRequestObjectEncryptionAlgIsSetIfEncIsSet
request_object_encryption_enc is not set
2020-09-01 12:51:46 INFO
ValidateTokenEndpointAuthSigningAlg
Skipped evaluation due to missing required element: client token_endpoint_auth_signing_alg
path
token_endpoint_auth_signing_alg
mapped
object
client
2020-09-01 12:51:46 SUCCESS
ValidateDefaultMaxAge
default_max_age is not set
2020-09-01 12:51:46 INFO
ValidateRequireAuthTime
Skipped evaluation due to missing required element: client require_auth_time
path
require_auth_time
mapped
object
client
2020-09-01 12:51:46 INFO
ValidateDefaultAcrValues
Skipped evaluation due to missing required element: client default_acr_values
path
default_acr_values
mapped
object
client
2020-09-01 12:51:46 INFO
ValidateInitiateLoginUri
Skipped evaluation due to missing required element: client initiate_login_uri
path
initiate_login_uri
mapped
object
client
2020-09-01 12:51:46 INFO
ValidateRequestUris
Skipped evaluation due to missing required element: client request_uris
path
request_uris
mapped
object
client
2020-09-01 12:51:46 SUCCESS
ValidateClientRegistrationRequestSectorIdentifierUri
A sector_identifier_uri was not provided
2020-09-01 12:51:46 SUCCESS
OIDCCRegisterClient
Registered client
client
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_iEQODsqlAuiusZR33079^(%~("
}
2020-09-01 12:51:46
OIDCCCreateClientSecretForDynamicClient
Set the secret for registered client
client_secret
secret_CCykxIwbupOraoAJHMyGxctWNevORGjPEXnyiRgjIvkjRurJCj8105661118-->]:
2020-09-01 12:51:46 SUCCESS
EnsureTokenEndPointAuthMethodIsClientSecretBasic
token_endpoint_auth_method is 'client_secret_basic' as expected
2020-09-01 12:51:46 SUCCESS
EnsureClientDoesNotHaveBothJwksAndJwksUri
Client does not have both jwks and jwks_uri set
client
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_iEQODsqlAuiusZR33079^(%~(",
  "client_secret": "secret_CCykxIwbupOraoAJHMyGxctWNevORGjPEXnyiRgjIvkjRurJCj8105661118--\u003e]:"
}
2020-09-01 12:51:46 INFO
FetchClientKeys
Skipped evaluation due to missing required element: client jwks_uri
path
jwks_uri
mapped
object
client
2020-09-01 12:51:46 SUCCESS
OIDCCExtractServerSigningAlg
Using the default algorithm for the first key in server jwks
signing_algorithm
RS256
2020-09-01 12:51:46
SetClientIdTokenSignedResponseAlgToServerSigningAlg
Set id_token_signed_response_alg for the registered client
id_token_signed_response_alg
RS256
2020-09-01 12:51:46 OUTGOING
oidcc-client-test-client-secret-basic
Response to HTTP request to test instance AjqfESJcf8JrF4o
outgoing_status_code
201
outgoing_headers
{}
outgoing_body
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_iEQODsqlAuiusZR33079^(%~(",
  "client_secret": "secret_CCykxIwbupOraoAJHMyGxctWNevORGjPEXnyiRgjIvkjRurJCj8105661118--\u003e]:",
  "id_token_signed_response_alg": "RS256"
}
outgoing_path
register
2020-09-01 12:51:47 INCOMING
oidcc-client-test-client-secret-basic
Incoming HTTP request to test instance AjqfESJcf8JrF4o
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "got/9.6.0 (https://github.com/sindresorhus/got)",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
authorize
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "client_id": "client_iEQODsqlAuiusZR33079^(%~(",
  "scope": "openid",
  "response_type": "code id_token",
  "redirect_uri": "https://rp.example.com/cb",
  "state": "YOD6T0njWSKReGFjIUllYD0ejbcGsv1TmR3prFwY0WI",
  "nonce": "0LAWOtP0GlAtMMxsrV-fkKPGWDdpps9DU44UbWqpHX4",
  "response_mode": "form_post"
}
incoming_body
Authorization endpoint
2020-09-01 12:51:47 SUCCESS
EnsureRequestDoesNotContainRequestObject
Request does not contain a request parameter
2020-09-01 12:51:47 SUCCESS
OIDCCEnsureAuthorizationHttpRequestContainsOpenIDScope
Found 'openid' in scope http request parameter
actual
[
  "openid"
]
expected
openid
2020-09-01 12:51:47 SUCCESS
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
effective_authorization_endpoint_request
{
  "client_id": "client_iEQODsqlAuiusZR33079^(%~(",
  "scope": "openid",
  "response_type": "code id_token",
  "redirect_uri": "https://rp.example.com/cb",
  "state": "YOD6T0njWSKReGFjIUllYD0ejbcGsv1TmR3prFwY0WI",
  "nonce": "0LAWOtP0GlAtMMxsrV-fkKPGWDdpps9DU44UbWqpHX4",
  "response_mode": "form_post"
}
2020-09-01 12:51:47 SUCCESS
ExtractRequestedScopes
Requested scopes
scope
openid
2020-09-01 12:51:47 SUCCESS
ExtractNonceFromAuthorizationRequest
Extracted nonce
nonce
0LAWOtP0GlAtMMxsrV-fkKPGWDdpps9DU44UbWqpHX4
2020-09-01 12:51:47 SUCCESS
EnsureResponseTypeIsCodeIdToken
Response type is expected value
expected
code id_token
2020-09-01 12:51:47 SUCCESS
EnsureMatchingClientId
Client ID matched
client_id
client_iEQODsqlAuiusZR33079^(%~(
2020-09-01 12:51:47 SUCCESS
EnsureValidRedirectUriForAuthorizationEndpointRequest
redirect_uri is one of the allowed redirect uris
actual
https://rp.example.com/cb
expected
[
  "https://rp.example.com/cb"
]
2020-09-01 12:51:47 SUCCESS
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
actual
[
  "openid"
]
expected
openid
2020-09-01 12:51:47 SUCCESS
DisallowMaxAgeEqualsZeroAndPromptNone
The client did not send max_age=0 and prompt=none parameters as expected
2020-09-01 12:51:47 SUCCESS
CreateAuthorizationCode
Created authorization code
authorization_code
7k8II0lZjS
2020-09-01 12:51:47 SUCCESS
CalculateCHash
Successful c_hash encoding
c_hash
iYzSxfQoltU1BFfGcorH9Q
2020-09-01 12:51:47 SUCCESS
GenerateIdTokenClaims
Created ID Token Claims
iss
https://www.certification.openid.net/test/AjqfESJcf8JrF4o/
sub
user-subject-1234531
aud
client_iEQODsqlAuiusZR33079^(%~(
nonce
0LAWOtP0GlAtMMxsrV-fkKPGWDdpps9DU44UbWqpHX4
iat
1598964707
exp
1598965007
2020-09-01 12:51:47 SUCCESS
AddCHashToIdTokenClaims
Added c_hash to ID token claims
c_hash
iYzSxfQoltU1BFfGcorH9Q
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/AjqfESJcf8JrF4o/",
  "sub": "user-subject-1234531",
  "aud": "client_iEQODsqlAuiusZR33079^(%~(",
  "nonce": "0LAWOtP0GlAtMMxsrV-fkKPGWDdpps9DU44UbWqpHX4",
  "iat": 1598964707,
  "exp": 1598965007,
  "c_hash": "iYzSxfQoltU1BFfGcorH9Q"
}
2020-09-01 12:51:47 INFO
AddAtHashToIdTokenClaims
Skipped evaluation due to missing required string: at_hash
expected
at_hash
2020-09-01 12:51:47 SUCCESS
OIDCCSignIdToken
Signed the ID token
id_token
eyJraWQiOiIxYjAxNmNlZi1iMzE3LTQxODctOTU3OS04ODQ3OTcyN2JlMmMiLCJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJ1c2VyLXN1YmplY3QtMTIzNDUzMSIsImF1ZCI6ImNsaWVudF9pRVFPRHNxbEF1aXVzWlIzMzA3OV4oJX4oIiwiY19oYXNoIjoiaVl6U3hmUW9sdFUxQkZmR2Nvckg5USIsImlzcyI6Imh0dHBzOlwvXC93d3cuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0XC90ZXN0XC9BanFmRVNKY2Y4SnJGNG9cLyIsImV4cCI6MTU5ODk2NTAwNywibm9uY2UiOiIwTEFXT3RQMEdsQXRNTXhzclYtZmtLUEdXRGRwcHM5RFU0NFViV3FwSFg0IiwiaWF0IjoxNTk4OTY0NzA3fQ.ND3JhwiiSEb5FKd4spdr6NdPDFOAjGhu5H_YZgUKoGSRpNZNPDK_yNeVjmU65PuDqqwRgcNeoWXb3Yxcki4098h1JcxHgB5PcGnEDzJLZ8IB2aqT20-p0BE5cyhVlMv_P46blzarG4bz6HkmEy4-bIUHV5cAt9WfaZdKDdL9FQoW6F2FxLOU7RC6dHFZ3rHJ25OLYIDY8zKs96x26hU-EhXpGMm20msd9tGdJRr9e32x6lC1AajdQ4iGvagvFvzNfOG33uNrwLANY2IPlDiMOXKJe88V15lbwUjz2tbL86sMd-XCfTgyEyCp5w3B0zVuVxwnN3KGL3g69eC4bcygQw
key
{"p":"66C02tUPtZC9RSxgqO6E3pBX9_USzp8n0JX8Akl39BaIl_zKze7bjDsbrfdl1-GoDKo-sv8F3EtoEYKvvCvaDz7xI4anM7o5VD0-OIBJql8pa7U_3k6RQ5X-63bhGE8Y8v8aBCf8bK3EystvvKVeFffyRxQauwAHvg25JjjPLFM","kty":"RSA","q":"swxvHAECGM9O9aNEUAD1ElDlut4VLLppkwrhJF2wnyOWzwRIidW6MGj5X6w_TG44bStBg_76cqF2gusoHsNuIsLKX2FS7yu_XRgW_cnbx--tir1i7qFxI9uDvmZxHEFvf2unRBz4JIVOnGGDdJ9dgk6xbQGlhD_pD3M2GwHr6hs","d":"ATy4Y4ZZ3uXY9gYKXAo769CMB-jteDXpkxklQ9e8HgExeEmG_57B7nMlkLna418lMc5pTDBLBW1cBdrjPjhHAxHixvpsvy1_2ECvWxSJkmLv-jd_ITg5x1Q1DuG8LOu189JUOPHHGIOGu8U5hx6vCm2DdBVmTA9Kyheqr2DY2ZWzngtQ5qK4vDz9qkETfCVOGdxKiPTtPP5tuYfr5BZAHjgBngqZcJ_krA4wyrpB9v3hdCodNBiL9pLUY42nTMFA2tBNJcaTkEwzvxKFW8n_AS9E9odtUgGMZuzqihrrB2f7pxcWIaYM8eGMaKKsTA_lQzTjKfsSTUiyrf0oNPKRcQ","e":"AQAB","use":"sig","kid":"1b016cef-b317-4187-9579-88479727be2c","qi":"W2tZfyt8fUyOa9P5vCBp_IfOjmWI6eoGk96HZB9UZ1TbyjUnOaCbINEnbh-0fo5UvLEKWrn0uHXTxpxE6s_L_SpQa_tpn6OYAqa7jfTCkEIFyvSGXPLHkMK8f3PZAwGaogrIlM9CgVwlyjXqkGz2EZ8frFxfORexIxEB2Y-vW48","dp":"oDRpIuyAPNPHTFPq-JELuANuPEHd4qxltrVzXd6z9zqm7qfLAA9qKMM7g6HVFd3wk4PhE3S_eFOw008GyysJnRoPfDceUdZJClSFjIb1Dyiakgfu_-htbgV7CH-QdiW5ceYuuyqwvve6-KMvOpU5DjjB-r_ZmNFhckAEZc90VM8","dq":"AosjrO8qu3V-dqjaGJTa5ma1zMDI5jjDtS4LYrvd_XTA-LHj4eliWruzBzPoNkq-jHZ32MsvfZ9jkpqKmF1IXEAOJeq5BeLGNilYckSC1cVG3tiv5hnvBIZiybqk0rTvQ40g9CvBLquiIUCVYHu_FVHO3XCPjGBoDCsj0qBlXI8","n":"pMzQQfIoMc35sGQaDuDCoID11Mqam8anB6jGPODCd1DltqH4RZi-Bs4OgL0ylulmepd3_KpBalgrTHD2K3UxnJCSJAHwLvUVuYLrEJhGNEwoJTCSEFCmRbdbGm3RgxAQaDYjAQpta4K6832NtS7prx4d-B5gf8lJkONEL6BhAVV_UxbtcfiA02rg7CCskCXG0dXW2zOHy927BZ9zqlqiClFEsASA_XlF-ue0nvzqr4lLBzopkq8rFd4KOMrFSyWmmDALRX30hhwZBVeEf-yfq5mkIasMH0pr2kLny1kKEQ895voc8cxKZlMIknS35Rfcfd82njLdnRQqepsQX46KwQ"}
algorithm
RS256
2020-09-01 12:51:47 INFO
EncryptIdToken
Skipped evaluation due to missing required element: client id_token_encrypted_response_alg
path
id_token_encrypted_response_alg
mapped
object
client
2020-09-01 12:51:47 SUCCESS
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "YOD6T0njWSKReGFjIUllYD0ejbcGsv1TmR3prFwY0WI"
}
2020-09-01 12:51:47 SUCCESS
AddCodeToAuthorizationEndpointResponseParams
Added code to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "YOD6T0njWSKReGFjIUllYD0ejbcGsv1TmR3prFwY0WI",
  "code": "7k8II0lZjS"
}
2020-09-01 12:51:47 SUCCESS
AddIdTokenToAuthorizationEndpointResponseParams
Added id_token to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "YOD6T0njWSKReGFjIUllYD0ejbcGsv1TmR3prFwY0WI",
  "code": "7k8II0lZjS",
  "id_token": "eyJraWQiOiIxYjAxNmNlZi1iMzE3LTQxODctOTU3OS04ODQ3OTcyN2JlMmMiLCJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJ1c2VyLXN1YmplY3QtMTIzNDUzMSIsImF1ZCI6ImNsaWVudF9pRVFPRHNxbEF1aXVzWlIzMzA3OV4oJX4oIiwiY19oYXNoIjoiaVl6U3hmUW9sdFUxQkZmR2Nvckg5USIsImlzcyI6Imh0dHBzOlwvXC93d3cuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0XC90ZXN0XC9BanFmRVNKY2Y4SnJGNG9cLyIsImV4cCI6MTU5ODk2NTAwNywibm9uY2UiOiIwTEFXT3RQMEdsQXRNTXhzclYtZmtLUEdXRGRwcHM5RFU0NFViV3FwSFg0IiwiaWF0IjoxNTk4OTY0NzA3fQ.ND3JhwiiSEb5FKd4spdr6NdPDFOAjGhu5H_YZgUKoGSRpNZNPDK_yNeVjmU65PuDqqwRgcNeoWXb3Yxcki4098h1JcxHgB5PcGnEDzJLZ8IB2aqT20-p0BE5cyhVlMv_P46blzarG4bz6HkmEy4-bIUHV5cAt9WfaZdKDdL9FQoW6F2FxLOU7RC6dHFZ3rHJ25OLYIDY8zKs96x26hU-EhXpGMm20msd9tGdJRr9e32x6lC1AajdQ4iGvagvFvzNfOG33uNrwLANY2IPlDiMOXKJe88V15lbwUjz2tbL86sMd-XCfTgyEyCp5w3B0zVuVxwnN3KGL3g69eC4bcygQw"
}
2020-09-01 12:51:47 OUTGOING
oidcc-client-test-client-secret-basic
Response to HTTP request to test instance AjqfESJcf8JrF4o
outgoing
ModelAndView [view="formPostResponseMode"; model={formAction=https://rp.example.com/cb, formParameters={"state":"YOD6T0njWSKReGFjIUllYD0ejbcGsv1TmR3prFwY0WI","code":"7k8II0lZjS","id_token":"eyJraWQiOiIxYjAxNmNlZi1iMzE3LTQxODctOTU3OS04ODQ3OTcyN2JlMmMiLCJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJ1c2VyLXN1YmplY3QtMTIzNDUzMSIsImF1ZCI6ImNsaWVudF9pRVFPRHNxbEF1aXVzWlIzMzA3OV4oJX4oIiwiY19oYXNoIjoiaVl6U3hmUW9sdFUxQkZmR2Nvckg5USIsImlzcyI6Imh0dHBzOlwvXC93d3cuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0XC90ZXN0XC9BanFmRVNKY2Y4SnJGNG9cLyIsImV4cCI6MTU5ODk2NTAwNywibm9uY2UiOiIwTEFXT3RQMEdsQXRNTXhzclYtZmtLUEdXRGRwcHM5RFU0NFViV3FwSFg0IiwiaWF0IjoxNTk4OTY0NzA3fQ.ND3JhwiiSEb5FKd4spdr6NdPDFOAjGhu5H_YZgUKoGSRpNZNPDK_yNeVjmU65PuDqqwRgcNeoWXb3Yxcki4098h1JcxHgB5PcGnEDzJLZ8IB2aqT20-p0BE5cyhVlMv_P46blzarG4bz6HkmEy4-bIUHV5cAt9WfaZdKDdL9FQoW6F2FxLOU7RC6dHFZ3rHJ25OLYIDY8zKs96x26hU-EhXpGMm20msd9tGdJRr9e32x6lC1AajdQ4iGvagvFvzNfOG33uNrwLANY2IPlDiMOXKJe88V15lbwUjz2tbL86sMd-XCfTgyEyCp5w3B0zVuVxwnN3KGL3g69eC4bcygQw"}}]
outgoing_path
authorize
2020-09-01 12:51:48 INCOMING
oidcc-client-test-client-secret-basic
Incoming HTTP request to test instance AjqfESJcf8JrF4o
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
jwks
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Jwks endpoint
2020-09-01 12:51:48 OUTGOING
oidcc-client-test-client-secret-basic
Response to HTTP request to test instance AjqfESJcf8JrF4o
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "1b016cef-b317-4187-9579-88479727be2c",
      "n": "pMzQQfIoMc35sGQaDuDCoID11Mqam8anB6jGPODCd1DltqH4RZi-Bs4OgL0ylulmepd3_KpBalgrTHD2K3UxnJCSJAHwLvUVuYLrEJhGNEwoJTCSEFCmRbdbGm3RgxAQaDYjAQpta4K6832NtS7prx4d-B5gf8lJkONEL6BhAVV_UxbtcfiA02rg7CCskCXG0dXW2zOHy927BZ9zqlqiClFEsASA_XlF-ue0nvzqr4lLBzopkq8rFd4KOMrFSyWmmDALRX30hhwZBVeEf-yfq5mkIasMH0pr2kLny1kKEQ895voc8cxKZlMIknS35Rfcfd82njLdnRQqepsQX46KwQ"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "bbfedee8-29a6-4d26-b6ae-79ddee64da14",
      "n": "mMpDedSZynpONxplqaFpvQwM2cfvJu2CgbsvXMBeLhHSX6NCwt-Vz9oIdHkP3ONWuAQoF-3aUeRawdW8PpoSTL06tiMwH0J-fYHoCtTWsR9p1_CWQa2tXf4jMnpjp1_zxFlpi8F_MbR3hTX3FRzITY_-QfTAiTYnoD4VYOEI9j2IfedFPy9NF_6xHLDCC1vYE4qlpd3OMmpbFJokN6e3Lt5oTv3O08pnGlAqSmPbv9Mn6_nOmefmjnyaLrZpyaeW3DKDIOsefquIEp11MjE9FaWi3BKXFI_wD4flzJ6XLCD8TcyPiYIaP0ahHe8J8bZaWgqRRc_T-nTHwreNL45_hw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "41f764b2-d986-4eb0-b263-8d8e8332b8cf",
      "x": "kx5NPkzJLvUUyEbfWj8jD9yIG4fsw4UnWriw9NlHJ44",
      "y": "WdlPKXyKbGHAZ8-7QO_xx-QuDzvGYyDwcdCRLbD4EFA"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "16aecc72-918a-4b63-aa6e-e99567fc2e44",
      "x": "pwjLX87BC13SXhfxVWz4HH2_iszxOXyvpSrE7Tq2J8I",
      "y": "lcNw5bXx1FjVo-su34_W98w_ER34UqPeodeTaI_qrpA"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "98a5234a-272f-436b-a6a0-dd13598b93d5",
      "x": "pnv905F-lM_d-tjLw5N8W9rPPPRF8oMe_CSiw21i6ZU",
      "y": "TUfXXRyoezJUSvlNfwSaoFVKwWnXtavlf9-_8ukvGhI"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "b32e4914-989a-40ca-8232-f29165dcc093",
      "x": "SlwcEUscli1oSfgLrgSCfwIdxkNL-6qJwVQ5CkpmbM4"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "20927fa3-4494-4c84-9f66-e80a10449ab0",
      "alg": "RSA-OAEP",
      "n": "iEeB0vQmOJCHpgVS5qLhFTqlGVQfAB-WCmwNnj2LhCCDuByNvbuOrqGH3P4U1QDy8OiE6qbyYRq4BGKWsFIKPzfAtndjXhwxxxsIs5OnypYXa589SgwVaAd89X7CutwfgyLp05cXfX08Ho1fkZP333H3D2MArzzGd2Aozes9gvpq8MiqTgfIgKfrUmcdOs7OhstNAjJ2HfsaMi7QVc0cjTFf9kGCnekPJAXodg0sxgB2PTJkpF2k9NOaeBfQ7Zhdb8WPx87I3OtvSVL9TdKcY3nSgLxlRqDHP5AGUYNB0N898Sr3-HiCPp3YxgYkX_UOLJ8CWrzh_kUUqaoW_gqUsQ"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "cab75944-1a1e-4014-9edf-61b0448a049f",
      "x": "ncV3GajSvnGj48nWQsOdomONC_Qy6SQjt3OyAX2VmkY",
      "y": "pw6ktUI7EGJDzdyYpN7sEVRoF4ziGQucU0Hh5EQzbgs",
      "alg": "ECDH-ES"
    }
  ]
}
outgoing_path
jwks
2020-09-01 12:51:48 INCOMING
oidcc-client-test-client-secret-basic
Incoming HTTP request to test instance AjqfESJcf8JrF4o
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "authorization": "Basic Y2xpZW50X2lFUU9Ec3FsQXVpdXNaUjMzMDc5JTVFKCUyNX4oOnNlY3JldF9DQ3lreEl3YnVwT3Jhb0FKSE15R3hjdFdOZXZPUkdqUEVYbnlpUmdqSXZralJ1ckpDajgxMDU2NjExMTgtLSUzRSU1RCUzQQ\u003d\u003d",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "content-type": "application/x-www-form-urlencoded",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "92",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
token
incoming_body_form_params
{
  "grant_type": "authorization_code",
  "code": "7k8II0lZjS",
  "redirect_uri": "https://rp.example.com/cb"
}
incoming_method
POST
incoming_body_json
incoming_query_string_params
{}
incoming_body
grant_type=authorization_code&code=7k8II0lZjS&redirect_uri=https%3A%2F%2Frp.example.com%2Fcb
Token endpoint
2020-09-01 12:51:48 SUCCESS
ExtractClientCredentialsFromBasicAuthorizationHeader
Extracted client authentication
client_id
client_iEQODsqlAuiusZR33079^(%~(
client_secret
secret_CCykxIwbupOraoAJHMyGxctWNevORGjPEXnyiRgjIvkjRurJCj8105661118-->]:
method
client_secret_basic
2020-09-01 12:51:48 SUCCESS
ValidateClientIdAndSecret
Client id and secret match
2020-09-01 12:51:48 SUCCESS
ValidateAuthorizationCode
Found authorization code
authorization_code
7k8II0lZjS
2020-09-01 12:51:48 SUCCESS
ValidateRedirectUriForTokenEndpointRequest
redirect_uri is the same as the one used in the authorization request
actual
https://rp.example.com/cb
2020-09-01 12:51:48 SUCCESS
GenerateBearerAccessToken
Generated access token
access_token
knVnpLxNaYgzTbW6H38wnbXy9Py0JCQjap6OvZEYoSLtSOeaEh
2020-09-01 12:51:48 SUCCESS
CalculateAtHash
Successful at_hash encoding
at_hash
AQWS8GZaVW8Rkqqo_vaBxw
2020-09-01 12:51:48 SUCCESS
GenerateIdTokenClaims
Created ID Token Claims
iss
https://www.certification.openid.net/test/AjqfESJcf8JrF4o/
sub
user-subject-1234531
aud
client_iEQODsqlAuiusZR33079^(%~(
nonce
0LAWOtP0GlAtMMxsrV-fkKPGWDdpps9DU44UbWqpHX4
iat
1598964708
exp
1598965008
2020-09-01 12:51:48 SUCCESS
AddAtHashToIdTokenClaims
Added at_hash to ID token claims
at_hash
AQWS8GZaVW8Rkqqo_vaBxw
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/AjqfESJcf8JrF4o/",
  "sub": "user-subject-1234531",
  "aud": "client_iEQODsqlAuiusZR33079^(%~(",
  "nonce": "0LAWOtP0GlAtMMxsrV-fkKPGWDdpps9DU44UbWqpHX4",
  "iat": 1598964708,
  "exp": 1598965008,
  "at_hash": "AQWS8GZaVW8Rkqqo_vaBxw"
}
2020-09-01 12:51:48 SUCCESS
OIDCCSignIdToken
Signed the ID token
id_token
eyJraWQiOiIxYjAxNmNlZi1iMzE3LTQxODctOTU3OS04ODQ3OTcyN2JlMmMiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiQVFXUzhHWmFWVzhSa3Fxb192YUJ4dyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X2lFUU9Ec3FsQXVpdXNaUjMzMDc5XiglfigiLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvQWpxZkVTSmNmOEpyRjRvXC8iLCJleHAiOjE1OTg5NjUwMDgsIm5vbmNlIjoiMExBV090UDBHbEF0TU14c3JWLWZrS1BHV0RkcHBzOURVNDRVYldxcEhYNCIsImlhdCI6MTU5ODk2NDcwOH0.bFn_CYI2NgWRbbDKAFU0PPSoivgY5mIfmZg8kyEskVwXrayGPHdW1VKzWtqaRbWgNO3pkIMIBsmXbYp3b_94DnVPM9uSWmZmKLeHoz2v3cBQ7qfhmeBCOvy--Pv6tHLYum7uR7zoq7lSX0_PL8n1Y5nVEkti_Yvqv5abB9AWyMDgHFpaQxYTgKKDgeuMWo0o7XpC5BrsGGDwzKtuwFYim7zmT_MtYxkocmK9kbmXktGY7sA27a2Y9z8WHNgGexbl_k9GIRHLFQdUWqb4TjAEjDc9WrCM10ghYRs8Yrr7QaTtDWR-TqLwt3LK1sMidaROXbXJNo6MI8LQjnhhx6W6ng
key
{"p":"66C02tUPtZC9RSxgqO6E3pBX9_USzp8n0JX8Akl39BaIl_zKze7bjDsbrfdl1-GoDKo-sv8F3EtoEYKvvCvaDz7xI4anM7o5VD0-OIBJql8pa7U_3k6RQ5X-63bhGE8Y8v8aBCf8bK3EystvvKVeFffyRxQauwAHvg25JjjPLFM","kty":"RSA","q":"swxvHAECGM9O9aNEUAD1ElDlut4VLLppkwrhJF2wnyOWzwRIidW6MGj5X6w_TG44bStBg_76cqF2gusoHsNuIsLKX2FS7yu_XRgW_cnbx--tir1i7qFxI9uDvmZxHEFvf2unRBz4JIVOnGGDdJ9dgk6xbQGlhD_pD3M2GwHr6hs","d":"ATy4Y4ZZ3uXY9gYKXAo769CMB-jteDXpkxklQ9e8HgExeEmG_57B7nMlkLna418lMc5pTDBLBW1cBdrjPjhHAxHixvpsvy1_2ECvWxSJkmLv-jd_ITg5x1Q1DuG8LOu189JUOPHHGIOGu8U5hx6vCm2DdBVmTA9Kyheqr2DY2ZWzngtQ5qK4vDz9qkETfCVOGdxKiPTtPP5tuYfr5BZAHjgBngqZcJ_krA4wyrpB9v3hdCodNBiL9pLUY42nTMFA2tBNJcaTkEwzvxKFW8n_AS9E9odtUgGMZuzqihrrB2f7pxcWIaYM8eGMaKKsTA_lQzTjKfsSTUiyrf0oNPKRcQ","e":"AQAB","use":"sig","kid":"1b016cef-b317-4187-9579-88479727be2c","qi":"W2tZfyt8fUyOa9P5vCBp_IfOjmWI6eoGk96HZB9UZ1TbyjUnOaCbINEnbh-0fo5UvLEKWrn0uHXTxpxE6s_L_SpQa_tpn6OYAqa7jfTCkEIFyvSGXPLHkMK8f3PZAwGaogrIlM9CgVwlyjXqkGz2EZ8frFxfORexIxEB2Y-vW48","dp":"oDRpIuyAPNPHTFPq-JELuANuPEHd4qxltrVzXd6z9zqm7qfLAA9qKMM7g6HVFd3wk4PhE3S_eFOw008GyysJnRoPfDceUdZJClSFjIb1Dyiakgfu_-htbgV7CH-QdiW5ceYuuyqwvve6-KMvOpU5DjjB-r_ZmNFhckAEZc90VM8","dq":"AosjrO8qu3V-dqjaGJTa5ma1zMDI5jjDtS4LYrvd_XTA-LHj4eliWruzBzPoNkq-jHZ32MsvfZ9jkpqKmF1IXEAOJeq5BeLGNilYckSC1cVG3tiv5hnvBIZiybqk0rTvQ40g9CvBLquiIUCVYHu_FVHO3XCPjGBoDCsj0qBlXI8","n":"pMzQQfIoMc35sGQaDuDCoID11Mqam8anB6jGPODCd1DltqH4RZi-Bs4OgL0ylulmepd3_KpBalgrTHD2K3UxnJCSJAHwLvUVuYLrEJhGNEwoJTCSEFCmRbdbGm3RgxAQaDYjAQpta4K6832NtS7prx4d-B5gf8lJkONEL6BhAVV_UxbtcfiA02rg7CCskCXG0dXW2zOHy927BZ9zqlqiClFEsASA_XlF-ue0nvzqr4lLBzopkq8rFd4KOMrFSyWmmDALRX30hhwZBVeEf-yfq5mkIasMH0pr2kLny1kKEQ895voc8cxKZlMIknS35Rfcfd82njLdnRQqepsQX46KwQ"}
algorithm
RS256
2020-09-01 12:51:48 INFO
EncryptIdToken
Skipped evaluation due to missing required element: client id_token_encrypted_response_alg
path
id_token_encrypted_response_alg
mapped
object
client
2020-09-01 12:51:48 SUCCESS
CreateTokenEndpointResponse
Created token endpoint response
access_token
knVnpLxNaYgzTbW6H38wnbXy9Py0JCQjap6OvZEYoSLtSOeaEh
token_type
Bearer
id_token
eyJraWQiOiIxYjAxNmNlZi1iMzE3LTQxODctOTU3OS04ODQ3OTcyN2JlMmMiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiQVFXUzhHWmFWVzhSa3Fxb192YUJ4dyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X2lFUU9Ec3FsQXVpdXNaUjMzMDc5XiglfigiLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvQWpxZkVTSmNmOEpyRjRvXC8iLCJleHAiOjE1OTg5NjUwMDgsIm5vbmNlIjoiMExBV090UDBHbEF0TU14c3JWLWZrS1BHV0RkcHBzOURVNDRVYldxcEhYNCIsImlhdCI6MTU5ODk2NDcwOH0.bFn_CYI2NgWRbbDKAFU0PPSoivgY5mIfmZg8kyEskVwXrayGPHdW1VKzWtqaRbWgNO3pkIMIBsmXbYp3b_94DnVPM9uSWmZmKLeHoz2v3cBQ7qfhmeBCOvy--Pv6tHLYum7uR7zoq7lSX0_PL8n1Y5nVEkti_Yvqv5abB9AWyMDgHFpaQxYTgKKDgeuMWo0o7XpC5BrsGGDwzKtuwFYim7zmT_MtYxkocmK9kbmXktGY7sA27a2Y9z8WHNgGexbl_k9GIRHLFQdUWqb4TjAEjDc9WrCM10ghYRs8Yrr7QaTtDWR-TqLwt3LK1sMidaROXbXJNo6MI8LQjnhhx6W6ng
scope
openid
2020-09-01 12:51:48 OUTGOING
oidcc-client-test-client-secret-basic
Response to HTTP request to test instance AjqfESJcf8JrF4o
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "access_token": "knVnpLxNaYgzTbW6H38wnbXy9Py0JCQjap6OvZEYoSLtSOeaEh",
  "token_type": "Bearer",
  "id_token": "eyJraWQiOiIxYjAxNmNlZi1iMzE3LTQxODctOTU3OS04ODQ3OTcyN2JlMmMiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiQVFXUzhHWmFWVzhSa3Fxb192YUJ4dyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X2lFUU9Ec3FsQXVpdXNaUjMzMDc5XiglfigiLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvQWpxZkVTSmNmOEpyRjRvXC8iLCJleHAiOjE1OTg5NjUwMDgsIm5vbmNlIjoiMExBV090UDBHbEF0TU14c3JWLWZrS1BHV0RkcHBzOURVNDRVYldxcEhYNCIsImlhdCI6MTU5ODk2NDcwOH0.bFn_CYI2NgWRbbDKAFU0PPSoivgY5mIfmZg8kyEskVwXrayGPHdW1VKzWtqaRbWgNO3pkIMIBsmXbYp3b_94DnVPM9uSWmZmKLeHoz2v3cBQ7qfhmeBCOvy--Pv6tHLYum7uR7zoq7lSX0_PL8n1Y5nVEkti_Yvqv5abB9AWyMDgHFpaQxYTgKKDgeuMWo0o7XpC5BrsGGDwzKtuwFYim7zmT_MtYxkocmK9kbmXktGY7sA27a2Y9z8WHNgGexbl_k9GIRHLFQdUWqb4TjAEjDc9WrCM10ghYRs8Yrr7QaTtDWR-TqLwt3LK1sMidaROXbXJNo6MI8LQjnhhx6W6ng",
  "scope": "openid"
}
outgoing_path
token
2020-09-01 12:51:49 INCOMING
oidcc-client-test-client-secret-basic
Incoming HTTP request to test instance AjqfESJcf8JrF4o
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "authorization": "Bearer knVnpLxNaYgzTbW6H38wnbXy9Py0JCQjap6OvZEYoSLtSOeaEh",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
userinfo
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Userinfo endpoint
2020-09-01 12:51:49 SUCCESS
OIDCCExtractBearerAccessTokenFromRequest
Found access token on incoming request
access_token
knVnpLxNaYgzTbW6H38wnbXy9Py0JCQjap6OvZEYoSLtSOeaEh
2020-09-01 12:51:49 SUCCESS
RequireBearerAccessToken
Found access token in request
actual
knVnpLxNaYgzTbW6H38wnbXy9Py0JCQjap6OvZEYoSLtSOeaEh
2020-09-01 12:51:49 SUCCESS
FilterUserInfoForScopes
User info endpoint output
sub
user-subject-1234531
2020-09-01 12:51:49
ClearAccessTokenFromRequest
Condition ran but did not log anything
2020-09-01 12:51:49 INFO
AddIssAndAudToUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2020-09-01 12:51:49 INFO
SignUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2020-09-01 12:51:49 INFO
EncryptUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_encrypted_response_alg
path
userinfo_encrypted_response_alg
mapped
object
client
2020-09-01 12:51:49 OUTGOING
oidcc-client-test-client-secret-basic
Response to HTTP request to test instance AjqfESJcf8JrF4o
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "sub": "user-subject-1234531"
}
outgoing_path
userinfo
2020-09-01 12:51:49 FINISHED
oidcc-client-test-client-secret-basic
Test has run to completion
testmodule_result
PASSED
Test Results