Test Summary

Test Results

Expand All Collapse All
All times are UTC
2020-09-01 12:50:21 INFO
TEST-RUNNER
Test instance BJsbLsCEcc9ohvX created
baseUrl
https://www.certification.openid.net/test/BJsbLsCEcc9ohvX
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "id_token",
  "request_type": "plain_http_request",
  "response_mode": "form_post",
  "client_registration": "dynamic_client"
}
alias

                                
description
test suite runner for openid-client
planId
2AWaC6uTX8byR
config
{
  "description": "test suite runner for openid-client",
  "waitTimeoutSeconds": 2
}
testName
oidcc-client-test-invalid-aud
2020-09-01 12:50:21 SUCCESS
OIDCCGenerateServerConfiguration
Generated default server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/BJsbLsCEcc9ohvX/",
  "authorization_endpoint": "https://www.certification.openid.net/test/BJsbLsCEcc9ohvX/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/BJsbLsCEcc9ohvX/token",
  "jwks_uri": "https://www.certification.openid.net/test/BJsbLsCEcc9ohvX/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/BJsbLsCEcc9ohvX/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/BJsbLsCEcc9ohvX/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post",
    "client_secret_jwt",
    "private_key_jwt"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2020-09-01 12:50:21
SetTokenEndpointAuthMethodsSupportedToClientSecretBasicOnly
Changed token_endpoint_auth_methods_supported to client_secret_basic only in server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/BJsbLsCEcc9ohvX/",
  "authorization_endpoint": "https://www.certification.openid.net/test/BJsbLsCEcc9ohvX/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/BJsbLsCEcc9ohvX/token",
  "jwks_uri": "https://www.certification.openid.net/test/BJsbLsCEcc9ohvX/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/BJsbLsCEcc9ohvX/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/BJsbLsCEcc9ohvX/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2020-09-01 12:50:21
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "851WV0jeRaoNfunj-py0paKp0TIeDy3ruTCGocCtMKFYDbBeaCIyabJKMTB-oU-8RrbzvaWLw573SGSP3FYWLhTdpf8sA2epueSSshU5XTZx4hANdHCnwCkYwBxjMCpDC3IUY0hp98GntMiRjan3ZIVimd6vDfsnijfkcFA1GuM",
      "kty": "RSA",
      "q": "sYcYFsAHMwT-fbY-LM61eb1YOAxNeC-o_DyfehtniqouuPUVuEMBXpgXYDU4O5RDFW_z6ZuWAgw26YNfml5og9qO6bmNyUC56tSnkfT1DnadvNKaxf6N1G9FiKqVpYJ7NvN65vXJPzJGB_4DPLR9wozN-mHWjbxlTcG3GPGyhKE",
      "d": "ELd_o1uZkW1kQuO9ashkFqBcS7IRYCM-N0qIh2VkhKCIr-9Mqm6iZ8jkoJSkPny_6SwlkZBTsNCjv1wFOKZb1jxrpxdSkK0eEzG-I1etgc9K1-TOUmxnX_rvFXmfVwq6dAwaWtc-uWtjPMTERFNEQzfubfc1TNMO5L96Fwo9hjXYjL5DBqgAMFQuklbx8RBsmYc5yWgfXwYQH6ar60BE4UWrqBzb4NIg2H8bL7ueRCEf6bP11oc6FyKYSfCg3rh7UbTa6HUgU678UcpMXYWQXRO4TlYQJekyiOhwPlY8mnd9TYv5fsQqjKQYgCOsGYYdU8tdfWI8HUUwXspBAXOOQQ",
      "e": "AQAB",
      "use": "sig",
      "kid": "2988e2e5-4ffd-4227-af25-7e0322dc004f",
      "qi": "Bq4qDNM-4_JE4FohTjX-UckYP0sGKOkTlokupuNm7qfDudYMeTj6aE5ebxCoEUEZKNB8VgoGO8nqDFzvYjQGOL6SPhmfzDgwkl38w4JQiOx9fLAZrLjkmGdI18Bj22po8qbdF8e48DVzQYNhSnucpJKCBiK1Qkygzd6qzgA-AZo",
      "dp": "lvtXLIdrwk8vSA3bDlIan2Ed0Bo4iP3TzxVlC1CnxbDpKqq5B97R0bH-y1eb04vgSw9OJqY35chax5ITmuH7oxmpeRyZgY64oQ4pYJdI0x1QHWQHgrfjL3QI899kFdDLdoeAXTve-P8bWi7IDr1dJv6H6ocZhRe4HLChMn5zOzM",
      "dq": "Zx6Fy5E3nVclTHhznStlFpX5jHT4-vsUOZAtQoxwlIdOJHmYaDPjs8K8sVG4nEL-xJEHKYcKl53ot7Nr8QstwolNwk3aIjDKzbFAtPOI9SHJdkkPRjsav27zAPO1gTJNyBmeJlJW17KoIzRVRQnCkyOe8fWq3yGz5nrDlGWwwIE",
      "n": "qPBXl0fDkFJVg_ekrIBUmN4gc4UxoQu8_ceK6YkETbrPvV1OCGuQnbeeKI1bCTywnHvnb0clMRTTbo_zjViQMFQUMTmpEw3iuKkCNsj3BM7g5oY510oqulZqNLBAc1nJjduyvmpAXyQRN7NM0sgqQhcKOFtlkoIuBWIhVoEbnIC1O3AydnFJzLUtAPzcTDQlX5s23P2KaTQyRtluFaTc1M4lLpzTXZVuoFt55yXABh60kh2tbpIvFUdbkvDgl7siSmILsArfwaqAokbxkWICxl5FeaB4fTyf7crta-ulvVOgWbBA_tQC_sU9rFYxA3l9NBZWx0f3hJlX4CGCOBj0ww"
    },
    {
      "kty": "EC",
      "d": "9XcG_bngLZehP7SyVc_WrgC3b_Sh30lhVb6qtILSC68",
      "use": "sig",
      "crv": "P-256",
      "kid": "f06f14c2-4265-452e-bac5-8a9e7230b03f",
      "x": "M5Ufseov4ogXNWPkW8_sVFTaQi09cvzYmuy_3-yhLr8",
      "y": "dsxAT8iA1Mjrd7U74scbAY-Row5g8-PBBEZyDbBgzF8"
    },
    {
      "kty": "EC",
      "d": "uUF_OxgVpERdc1NGlAaf9WxpsmsFzJmpfBthG7xBUEM",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "6c0262af-0d95-4cc4-85c4-0f7c47363282",
      "x": "0cLlE1G0p5DAtAvwgB22txZkv2rRophN4m0p5znOV0c",
      "y": "W83lrT5dtXEH0KDoX7jlGkHVC_n14YnN9R45ePqJK64"
    },
    {
      "kty": "OKP",
      "d": "WdbUvQC5O7SRzdpOA7t0bmSVhLPR_OSE_ReScRkm_yo",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "ade21269-6933-4faa-a433-34ed931904f9",
      "x": "9Oz2jstUwwM2aebLWNfIYONhQxGJITji6OSj9Jmc8gY"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "40ZnraWnvmZp08oueanq2S0L-kqIc2vqo4L98IbRkIFk-2X8NKgFjshJRZs5UfKJPTMJ3P9fv1oBkncKdZbgJn0SklgdLSEmMkBRo1nbXfCA6QU6a5sZxpuZmMqAvamxSY_AD1DDsf_l53B_xS8HvV4b37pzZyZb6x8KabdwSO0",
      "kty": "RSA",
      "q": "pJ3pdk9Tz8BBNwbeidElFXtCdD3QPQ9FE4q_2rngUtJ9TDlCIOeoEuCHHepkgWZMe7VNRUNjMSIYAR8T1SZ6xIx7N3Da4VYEdaIoLUa1UztXuklDclFXfex4wENpP0N-CNRP9yWAcp-DIRLQZ1JRo5U-1nfHaVsqDRW07Oi6cHs",
      "d": "NSh3xa-eeFEJxYBnfKSV29Znz2jsTOpJmTHHRx_JlsWDpkFE5LBkba8jyHeoX7C6ts97abfy-ihrtb-EZijE3Vvvxa8S9E2mmtTCxh8gWXitqdhvBMC-nVqZrIdMVyRWcaKGVsmU8h9-fSabFw6s9wofZvOHn9FXnDnboRWvZ6ZBlsHiS2Z8aV7YIkvwSxX-LZJYxyKC1xiliiHyMDPeSpx3Zl1gEgakKnAlSgFkJfaeM2ktSfvjdpcTxXTlk0ExGlKi7LoZ7donAX_Cr9eUkFJP3tlHOiLtTDv-n170cwcqmNZIh_yHjuEfTW6CmdCp73hV6hn1lzsWEFO7gpamEQ",
      "e": "AQAB",
      "use": "enc",
      "kid": "ec738b09-a761-40ad-8f29-2ebe200f79f8",
      "qi": "PwVfx6VNDggWUBJeyb74k_iOr7mGC06F7ds2jOQY_KaeBPLnPILu-LXKULqOHOK2QUuEvYi-PySL62GNn9yQgCxi9x0cM7o3sgSDpfdLsdA8SS4ROjTQoxQxa-gS1oDjWlwn8vBy8ne0C_kL4iQp6iinVF8LJ4nhe_bO9RKwt7I",
      "dp": "ze4fRzIQWe8F-Mb7cXXKu9mbPsCF_r9LrbilS2l9PUhhLYFtEnEkCAnmilFpkJ0ISRGT4FDser-dKQ7_xSheFcHCMCPy289rgqDQ2Ag1QlsHExyPoKy6oECg3dau7Ctz3kmIJthxWTmbISfIPeytQKKi8wdIRbB2HQbVMpDqBsk",
      "alg": "RSA-OAEP",
      "dq": "CUN5p9a--KnxAY-5ZjgGxjaxfqkb1tPNJ1Rfh4d-QCroMinmtsNSif1onR5bmYyQMUX6mzM3mcQ5ZZbCHvSTZAwjwvLu3k9g4N3HNQUNnylvvmPxD7XUHpn4EZm5in3Z0dVgyp-posmnL21HnQjc3z--0YLcDem7bBEUpWBTXZE",
      "n": "kiVL3PDcBew4K-zPGunA_Ld2xei24ta5ZS15gzNyvj7JHtTMR59cDo7Ct9ktHnJVWZERIZBR-96kjBLAjLILcwZkJjgQtBSmgUrpgA140mme_PN8x77p9t0AWxQXcARFDW8xZIoESuDMb__qqx19bicH5OIFv8pMTsxX1b6rEVBZGfxP-tVHZmLkKvs246oo_OTDIU6uIsaxZEsf6_wqUZKH6mIJLY0uCCNbRqC_jv1qfZYjIeQNklB1HUncbb5H1wM5OqopZhedHsuQOyBB6Z3VFZYjYNBIHAG2HPG9XzsGA5dq8L81ehEaXgvaCDQcdSwTX7Kuf0D-wCk0Bwy53w"
    },
    {
      "kty": "EC",
      "d": "AB-enTIFFWpko1EGJrcdt-6XHb1YDVOhzI6vjeN-PF8",
      "use": "enc",
      "crv": "P-256",
      "kid": "45886d44-33c6-4da7-95fe-61b634188b34",
      "x": "WVttBRXoDwWcJokSj2TMSxFOGd02QVcN1mw4wFbgNWI",
      "y": "w2fHf1ZLFMLU9SY7O7aWInyCOUZIEqueX02j-bNzvxg",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "2988e2e5-4ffd-4227-af25-7e0322dc004f",
      "n": "qPBXl0fDkFJVg_ekrIBUmN4gc4UxoQu8_ceK6YkETbrPvV1OCGuQnbeeKI1bCTywnHvnb0clMRTTbo_zjViQMFQUMTmpEw3iuKkCNsj3BM7g5oY510oqulZqNLBAc1nJjduyvmpAXyQRN7NM0sgqQhcKOFtlkoIuBWIhVoEbnIC1O3AydnFJzLUtAPzcTDQlX5s23P2KaTQyRtluFaTc1M4lLpzTXZVuoFt55yXABh60kh2tbpIvFUdbkvDgl7siSmILsArfwaqAokbxkWICxl5FeaB4fTyf7crta-ulvVOgWbBA_tQC_sU9rFYxA3l9NBZWx0f3hJlX4CGCOBj0ww"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "598422e3-ad26-4801-b12c-b63f8446e687",
      "n": "1haUGZOe1Desl_qOWsQlBtC6gxuJFObW1OWbL5teHwq-DjOJTzqiuvLZg_aFDFaaOmFAbDrPtU_TaFU-sKRzHkPPG-6HEI2jy8ZQrqa5vMCJH25lPjVBdcQCPAB6hu2_lFZHlARocVfKnutEHV1pd2CfofU3aotq80BL75mj5YBXiEizXOGZSm2G44pAqWg5_lWbzoMnuYsKAxyJlWLhCf96Y6i0KiPlLmQRdP8HgBB5nq5ptLIjCgkp0o9C-rtBh5XyE07dvyWNoiQbmjw1cw-PQKTr8_DIm4aEyDJREGJzfLX5oHA9FIBtEwWfZ6Ideb27iRbqAgtjDHnWd6RSRw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "f06f14c2-4265-452e-bac5-8a9e7230b03f",
      "x": "M5Ufseov4ogXNWPkW8_sVFTaQi09cvzYmuy_3-yhLr8",
      "y": "dsxAT8iA1Mjrd7U74scbAY-Row5g8-PBBEZyDbBgzF8"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "6fade43d-f201-4d57-bc61-dd8f0a05680f",
      "x": "YJDXPDLHGwNA_ZnqfuV1StcWyZAlMsoM6L6Tw4U7xKE",
      "y": "l6bQgllJz3AI2zcnUB1ZwPRd3oK6yTK60cH7L0VPL40"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "6c0262af-0d95-4cc4-85c4-0f7c47363282",
      "x": "0cLlE1G0p5DAtAvwgB22txZkv2rRophN4m0p5znOV0c",
      "y": "W83lrT5dtXEH0KDoX7jlGkHVC_n14YnN9R45ePqJK64"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "ade21269-6933-4faa-a433-34ed931904f9",
      "x": "9Oz2jstUwwM2aebLWNfIYONhQxGJITji6OSj9Jmc8gY"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "ec738b09-a761-40ad-8f29-2ebe200f79f8",
      "alg": "RSA-OAEP",
      "n": "kiVL3PDcBew4K-zPGunA_Ld2xei24ta5ZS15gzNyvj7JHtTMR59cDo7Ct9ktHnJVWZERIZBR-96kjBLAjLILcwZkJjgQtBSmgUrpgA140mme_PN8x77p9t0AWxQXcARFDW8xZIoESuDMb__qqx19bicH5OIFv8pMTsxX1b6rEVBZGfxP-tVHZmLkKvs246oo_OTDIU6uIsaxZEsf6_wqUZKH6mIJLY0uCCNbRqC_jv1qfZYjIeQNklB1HUncbb5H1wM5OqopZhedHsuQOyBB6Z3VFZYjYNBIHAG2HPG9XzsGA5dq8L81ehEaXgvaCDQcdSwTX7Kuf0D-wCk0Bwy53w"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "45886d44-33c6-4da7-95fe-61b634188b34",
      "x": "WVttBRXoDwWcJokSj2TMSxFOGd02QVcN1mw4wFbgNWI",
      "y": "w2fHf1ZLFMLU9SY7O7aWInyCOUZIEqueX02j-bNzvxg",
      "alg": "ECDH-ES"
    }
  ]
}
2020-09-01 12:50:21 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2020-09-01 12:50:21 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2020-09-01 12:50:21 SUCCESS
OIDCCLoadUserInfo
Added user information
user_info
{
  "sub": "user-subject-1234531",
  "name": "Demo T. User",
  "given_name": "Demo",
  "family_name": "User",
  "middle_name": "Theresa",
  "nickname": "Dee",
  "preferred_username": "d.tu",
  "gender": "female",
  "birthdate": "2000-02-03",
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "zoneinfo": "America/Los_Angeles",
  "locale": "en-US",
  "phone_number": "+1 555 5550000",
  "phone_number_verified": false,
  "email": "user@example.com",
  "email_verified": false,
  "website": "https://openid.net/",
  "updated_at": "1580000000"
}
2020-09-01 12:50:21 SUCCESS
GetDynamicClientConfiguration
No client details on configuration, created an empty dynamic_client_registration_template object.
2020-09-01 12:50:21
oidcc-client-test-invalid-aud
Setup Done
2020-09-01 12:50:24 INCOMING
oidcc-client-test-invalid-aud
Incoming HTTP request to test instance BJsbLsCEcc9ohvX
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
.well-known/openid-configuration
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Discovery endpoint
2020-09-01 12:50:24 OUTGOING
oidcc-client-test-invalid-aud
Response to HTTP request to test instance BJsbLsCEcc9ohvX
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "issuer": "https://www.certification.openid.net/test/BJsbLsCEcc9ohvX/",
  "authorization_endpoint": "https://www.certification.openid.net/test/BJsbLsCEcc9ohvX/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/BJsbLsCEcc9ohvX/token",
  "jwks_uri": "https://www.certification.openid.net/test/BJsbLsCEcc9ohvX/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/BJsbLsCEcc9ohvX/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/BJsbLsCEcc9ohvX/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
outgoing_path
.well-known/openid-configuration
2020-09-01 12:50:24 INCOMING
oidcc-client-test-invalid-aud
Incoming HTTP request to test instance BJsbLsCEcc9ohvX
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "content-type": "application/json",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "155",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
register
incoming_body_form_params
incoming_method
POST
incoming_body_json
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "id_token"
  ],
  "grant_types": [
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ]
}
incoming_query_string_params
{}
incoming_body
{"token_endpoint_auth_method":"client_secret_basic","response_types":["id_token"],"grant_types":["implicit"],"redirect_uris":["https://rp.example.com/cb"]}
Registration endpoint
2020-09-01 12:50:24 SUCCESS
OIDCCExtractDynamicRegistrationRequest
Extracted dynamic client registration request
request
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "id_token"
  ],
  "grant_types": [
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ]
}
2020-09-01 12:50:24 INFO
EnsureRegistrationRequestContainsAtLeastOneContact
This application requires that registration requests contain at least one contact.
2020-09-01 12:50:24 SUCCESS
ValidateClientGrantTypes
grant_types match response_types
grant_types
[
  "implicit"
]
response_types
[
  "id_token"
]
2020-09-01 12:50:24 SUCCESS
OIDCCValidateClientRedirectUris
Valid redirect_uri(s) provided in registration request
redirect_uris
[
  "https://rp.example.com/cb"
]
2020-09-01 12:50:24 SUCCESS
ValidateClientLogoUris
Client does not contain any logo_uri
2020-09-01 12:50:24 SUCCESS
ValidateClientUris
Client does not contain any client_uri
2020-09-01 12:50:24 SUCCESS
ValidateClientPolicyUris
Client does not contain any policy_uri
2020-09-01 12:50:24 SUCCESS
ValidateClientTosUris
Client does not contain any tos_uri
2020-09-01 12:50:24 SUCCESS
ValidateClientSubjectType
A subject_type was not provided
2020-09-01 12:50:24 INFO
ValidateIdTokenSignedResponseAlg
Skipped evaluation due to missing required element: client id_token_signed_response_alg
path
id_token_signed_response_alg
mapped
object
client
2020-09-01 12:50:24 SUCCESS
EnsureIdTokenEncryptedResponseAlgIsSetIfEncIsSet
id_token_encrypted_response_enc is not set
2020-09-01 12:50:24 INFO
ValidateUserinfoSignedResponseAlg
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2020-09-01 12:50:24 SUCCESS
EnsureUserinfoEncryptedResponseAlgIsSetIfEncIsSet
userinfo_encrypted_response_enc is not set
2020-09-01 12:50:24 INFO
ValidateRequestObjectSigningAlg
Skipped evaluation due to missing required element: client request_object_signing_alg
path
request_object_signing_alg
mapped
object
client
2020-09-01 12:50:24 SUCCESS
EnsureRequestObjectEncryptionAlgIsSetIfEncIsSet
request_object_encryption_enc is not set
2020-09-01 12:50:24 INFO
ValidateTokenEndpointAuthSigningAlg
Skipped evaluation due to missing required element: client token_endpoint_auth_signing_alg
path
token_endpoint_auth_signing_alg
mapped
object
client
2020-09-01 12:50:24 SUCCESS
ValidateDefaultMaxAge
default_max_age is not set
2020-09-01 12:50:24 INFO
ValidateRequireAuthTime
Skipped evaluation due to missing required element: client require_auth_time
path
require_auth_time
mapped
object
client
2020-09-01 12:50:24 INFO
ValidateDefaultAcrValues
Skipped evaluation due to missing required element: client default_acr_values
path
default_acr_values
mapped
object
client
2020-09-01 12:50:24 INFO
ValidateInitiateLoginUri
Skipped evaluation due to missing required element: client initiate_login_uri
path
initiate_login_uri
mapped
object
client
2020-09-01 12:50:24 INFO
ValidateRequestUris
Skipped evaluation due to missing required element: client request_uris
path
request_uris
mapped
object
client
2020-09-01 12:50:24 SUCCESS
ValidateClientRegistrationRequestSectorIdentifierUri
A sector_identifier_uri was not provided
2020-09-01 12:50:24 SUCCESS
OIDCCRegisterClient
Registered client
client
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "id_token"
  ],
  "grant_types": [
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_CBAXBqLCxRtxJog87687}\u003e,:+"
}
2020-09-01 12:50:24
OIDCCCreateClientSecretForDynamicClient
Set the secret for registered client
client_secret
secret_ZRpoRPXJnzVsauESjRdLGkYVyVWTiZQDLaapVEHFJZdZKpGJYe5993734207*:}|+
2020-09-01 12:50:24 SUCCESS
EnsureTokenEndPointAuthMethodIsClientSecretBasic
token_endpoint_auth_method is 'client_secret_basic' as expected
2020-09-01 12:50:24 SUCCESS
EnsureClientDoesNotHaveBothJwksAndJwksUri
Client does not have both jwks and jwks_uri set
client
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "id_token"
  ],
  "grant_types": [
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_CBAXBqLCxRtxJog87687}\u003e,:+",
  "client_secret": "secret_ZRpoRPXJnzVsauESjRdLGkYVyVWTiZQDLaapVEHFJZdZKpGJYe5993734207*:}|+"
}
2020-09-01 12:50:24 INFO
FetchClientKeys
Skipped evaluation due to missing required element: client jwks_uri
path
jwks_uri
mapped
object
client
2020-09-01 12:50:24 SUCCESS
OIDCCExtractServerSigningAlg
Using the default algorithm for the first key in server jwks
signing_algorithm
RS256
2020-09-01 12:50:24
SetClientIdTokenSignedResponseAlgToServerSigningAlg
Set id_token_signed_response_alg for the registered client
id_token_signed_response_alg
RS256
2020-09-01 12:50:24 OUTGOING
oidcc-client-test-invalid-aud
Response to HTTP request to test instance BJsbLsCEcc9ohvX
outgoing_status_code
201
outgoing_headers
{}
outgoing_body
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "id_token"
  ],
  "grant_types": [
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_CBAXBqLCxRtxJog87687}\u003e,:+",
  "client_secret": "secret_ZRpoRPXJnzVsauESjRdLGkYVyVWTiZQDLaapVEHFJZdZKpGJYe5993734207*:}|+",
  "id_token_signed_response_alg": "RS256"
}
outgoing_path
register
2020-09-01 12:50:25 INCOMING
oidcc-client-test-invalid-aud
Incoming HTTP request to test instance BJsbLsCEcc9ohvX
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "got/9.6.0 (https://github.com/sindresorhus/got)",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
authorize
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "client_id": "client_CBAXBqLCxRtxJog87687}\u003e,:+",
  "scope": "openid",
  "response_type": "id_token",
  "redirect_uri": "https://rp.example.com/cb",
  "state": "q0zUL-SVP3m2c7oPYHfkQDiYdE2o2Nm0HihRXfM7hzw",
  "nonce": "KukMibR0Ynw8Cg1GG8rh35ZmFMNacy0j-MxehfU0bVk",
  "response_mode": "form_post"
}
incoming_body
Authorization endpoint
2020-09-01 12:50:25 SUCCESS
EnsureRequestDoesNotContainRequestObject
Request does not contain a request parameter
2020-09-01 12:50:25 SUCCESS
OIDCCEnsureAuthorizationHttpRequestContainsOpenIDScope
Found 'openid' in scope http request parameter
actual
[
  "openid"
]
expected
openid
2020-09-01 12:50:25 SUCCESS
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
effective_authorization_endpoint_request
{
  "client_id": "client_CBAXBqLCxRtxJog87687}\u003e,:+",
  "scope": "openid",
  "response_type": "id_token",
  "redirect_uri": "https://rp.example.com/cb",
  "state": "q0zUL-SVP3m2c7oPYHfkQDiYdE2o2Nm0HihRXfM7hzw",
  "nonce": "KukMibR0Ynw8Cg1GG8rh35ZmFMNacy0j-MxehfU0bVk",
  "response_mode": "form_post"
}
2020-09-01 12:50:25 SUCCESS
ExtractRequestedScopes
Requested scopes
scope
openid
2020-09-01 12:50:25 SUCCESS
ExtractNonceFromAuthorizationRequest
Extracted nonce
nonce
KukMibR0Ynw8Cg1GG8rh35ZmFMNacy0j-MxehfU0bVk
2020-09-01 12:50:25 SUCCESS
EnsureResponseTypeIsIdToken
Response type is expected value
expected
id_token
2020-09-01 12:50:25 SUCCESS
EnsureMatchingClientId
Client ID matched
client_id
client_CBAXBqLCxRtxJog87687}>,:+
2020-09-01 12:50:25 SUCCESS
EnsureValidRedirectUriForAuthorizationEndpointRequest
redirect_uri is one of the allowed redirect uris
actual
https://rp.example.com/cb
expected
[
  "https://rp.example.com/cb"
]
2020-09-01 12:50:25 SUCCESS
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
actual
[
  "openid"
]
expected
openid
2020-09-01 12:50:25 SUCCESS
DisallowMaxAgeEqualsZeroAndPromptNone
The client did not send max_age=0 and prompt=none parameters as expected
2020-09-01 12:50:25 SUCCESS
GenerateIdTokenClaims
Created ID Token Claims
iss
https://www.certification.openid.net/test/BJsbLsCEcc9ohvX/
sub
user-subject-1234531
aud
client_CBAXBqLCxRtxJog87687}>,:+
nonce
KukMibR0Ynw8Cg1GG8rh35ZmFMNacy0j-MxehfU0bVk
iat
1598964625
exp
1598964925
2020-09-01 12:50:25 SUCCESS
AddInvalidAudValueToIdToken
Added invalid aud to ID token claims
aud
client_CBAXBqLCxRtxJog87687}>,:+1
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/BJsbLsCEcc9ohvX/",
  "sub": "user-subject-1234531",
  "aud": "client_CBAXBqLCxRtxJog87687}\u003e,:+1",
  "nonce": "KukMibR0Ynw8Cg1GG8rh35ZmFMNacy0j-MxehfU0bVk",
  "iat": 1598964625,
  "exp": 1598964925
}
2020-09-01 12:50:25 INFO
AddCHashToIdTokenClaims
Skipped evaluation due to missing required string: c_hash
expected
c_hash
2020-09-01 12:50:25 INFO
AddAtHashToIdTokenClaims
Skipped evaluation due to missing required string: at_hash
expected
at_hash
2020-09-01 12:50:25 SUCCESS
OIDCCSignIdToken
Signed the ID token
id_token
eyJraWQiOiIyOTg4ZTJlNS00ZmZkLTQyMjctYWYyNS03ZTAzMjJkYzAwNGYiLCJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJ1c2VyLXN1YmplY3QtMTIzNDUzMSIsImF1ZCI6ImNsaWVudF9DQkFYQnFMQ3hSdHhKb2c4NzY4N30-LDorMSIsImlzcyI6Imh0dHBzOlwvXC93d3cuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0XC90ZXN0XC9CSnNiTHNDRWNjOW9odlhcLyIsImV4cCI6MTU5ODk2NDkyNSwibm9uY2UiOiJLdWtNaWJSMFludzhDZzFHRzhyaDM1Wm1GTU5hY3kwai1NeGVoZlUwYlZrIiwiaWF0IjoxNTk4OTY0NjI1fQ.FdjJq7nBLk_r5YLLEKu3cOYEXqoEXSrFWvg7eq2YmQ5tRL8_V1hFCZfC1sVK9vP7FJgQNGaqh4ceOHme4lgE4wy4oCqbwjqRycybZ9W_9jD_WjKMF4w0WRR4I5DsCT12YmQFWuokH0HBBqjcwVCrknSN1iR9Z3aElzyLkpeRAW64Vg6rGxAZ_tUWwBcQs77ZGPr9x41C8_x3Cymljgx-0nJUQ2OQ0g7lJ53u2To0GeP5X62z_K8npKO9v2kOfQ4FHO2aISS34jJ7QlOaMYQ_C8AlDnxEe4Oak-OI03nReVDA_930eqWJbrc0UzFa1OyEqz3t0SMzH-0qEkrN6Tad3A
key
{"p":"851WV0jeRaoNfunj-py0paKp0TIeDy3ruTCGocCtMKFYDbBeaCIyabJKMTB-oU-8RrbzvaWLw573SGSP3FYWLhTdpf8sA2epueSSshU5XTZx4hANdHCnwCkYwBxjMCpDC3IUY0hp98GntMiRjan3ZIVimd6vDfsnijfkcFA1GuM","kty":"RSA","q":"sYcYFsAHMwT-fbY-LM61eb1YOAxNeC-o_DyfehtniqouuPUVuEMBXpgXYDU4O5RDFW_z6ZuWAgw26YNfml5og9qO6bmNyUC56tSnkfT1DnadvNKaxf6N1G9FiKqVpYJ7NvN65vXJPzJGB_4DPLR9wozN-mHWjbxlTcG3GPGyhKE","d":"ELd_o1uZkW1kQuO9ashkFqBcS7IRYCM-N0qIh2VkhKCIr-9Mqm6iZ8jkoJSkPny_6SwlkZBTsNCjv1wFOKZb1jxrpxdSkK0eEzG-I1etgc9K1-TOUmxnX_rvFXmfVwq6dAwaWtc-uWtjPMTERFNEQzfubfc1TNMO5L96Fwo9hjXYjL5DBqgAMFQuklbx8RBsmYc5yWgfXwYQH6ar60BE4UWrqBzb4NIg2H8bL7ueRCEf6bP11oc6FyKYSfCg3rh7UbTa6HUgU678UcpMXYWQXRO4TlYQJekyiOhwPlY8mnd9TYv5fsQqjKQYgCOsGYYdU8tdfWI8HUUwXspBAXOOQQ","e":"AQAB","use":"sig","kid":"2988e2e5-4ffd-4227-af25-7e0322dc004f","qi":"Bq4qDNM-4_JE4FohTjX-UckYP0sGKOkTlokupuNm7qfDudYMeTj6aE5ebxCoEUEZKNB8VgoGO8nqDFzvYjQGOL6SPhmfzDgwkl38w4JQiOx9fLAZrLjkmGdI18Bj22po8qbdF8e48DVzQYNhSnucpJKCBiK1Qkygzd6qzgA-AZo","dp":"lvtXLIdrwk8vSA3bDlIan2Ed0Bo4iP3TzxVlC1CnxbDpKqq5B97R0bH-y1eb04vgSw9OJqY35chax5ITmuH7oxmpeRyZgY64oQ4pYJdI0x1QHWQHgrfjL3QI899kFdDLdoeAXTve-P8bWi7IDr1dJv6H6ocZhRe4HLChMn5zOzM","dq":"Zx6Fy5E3nVclTHhznStlFpX5jHT4-vsUOZAtQoxwlIdOJHmYaDPjs8K8sVG4nEL-xJEHKYcKl53ot7Nr8QstwolNwk3aIjDKzbFAtPOI9SHJdkkPRjsav27zAPO1gTJNyBmeJlJW17KoIzRVRQnCkyOe8fWq3yGz5nrDlGWwwIE","n":"qPBXl0fDkFJVg_ekrIBUmN4gc4UxoQu8_ceK6YkETbrPvV1OCGuQnbeeKI1bCTywnHvnb0clMRTTbo_zjViQMFQUMTmpEw3iuKkCNsj3BM7g5oY510oqulZqNLBAc1nJjduyvmpAXyQRN7NM0sgqQhcKOFtlkoIuBWIhVoEbnIC1O3AydnFJzLUtAPzcTDQlX5s23P2KaTQyRtluFaTc1M4lLpzTXZVuoFt55yXABh60kh2tbpIvFUdbkvDgl7siSmILsArfwaqAokbxkWICxl5FeaB4fTyf7crta-ulvVOgWbBA_tQC_sU9rFYxA3l9NBZWx0f3hJlX4CGCOBj0ww"}
algorithm
RS256
2020-09-01 12:50:25 INFO
EncryptIdToken
Skipped evaluation due to missing required element: client id_token_encrypted_response_alg
path
id_token_encrypted_response_alg
mapped
object
client
2020-09-01 12:50:25 SUCCESS
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "q0zUL-SVP3m2c7oPYHfkQDiYdE2o2Nm0HihRXfM7hzw"
}
2020-09-01 12:50:25 SUCCESS
AddIdTokenToAuthorizationEndpointResponseParams
Added id_token to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "q0zUL-SVP3m2c7oPYHfkQDiYdE2o2Nm0HihRXfM7hzw",
  "id_token": "eyJraWQiOiIyOTg4ZTJlNS00ZmZkLTQyMjctYWYyNS03ZTAzMjJkYzAwNGYiLCJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJ1c2VyLXN1YmplY3QtMTIzNDUzMSIsImF1ZCI6ImNsaWVudF9DQkFYQnFMQ3hSdHhKb2c4NzY4N30-LDorMSIsImlzcyI6Imh0dHBzOlwvXC93d3cuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0XC90ZXN0XC9CSnNiTHNDRWNjOW9odlhcLyIsImV4cCI6MTU5ODk2NDkyNSwibm9uY2UiOiJLdWtNaWJSMFludzhDZzFHRzhyaDM1Wm1GTU5hY3kwai1NeGVoZlUwYlZrIiwiaWF0IjoxNTk4OTY0NjI1fQ.FdjJq7nBLk_r5YLLEKu3cOYEXqoEXSrFWvg7eq2YmQ5tRL8_V1hFCZfC1sVK9vP7FJgQNGaqh4ceOHme4lgE4wy4oCqbwjqRycybZ9W_9jD_WjKMF4w0WRR4I5DsCT12YmQFWuokH0HBBqjcwVCrknSN1iR9Z3aElzyLkpeRAW64Vg6rGxAZ_tUWwBcQs77ZGPr9x41C8_x3Cymljgx-0nJUQ2OQ0g7lJ53u2To0GeP5X62z_K8npKO9v2kOfQ4FHO2aISS34jJ7QlOaMYQ_C8AlDnxEe4Oak-OI03nReVDA_930eqWJbrc0UzFa1OyEqz3t0SMzH-0qEkrN6Tad3A"
}
2020-09-01 12:50:25 OUTGOING
oidcc-client-test-invalid-aud
Response to HTTP request to test instance BJsbLsCEcc9ohvX
outgoing
ModelAndView [view="formPostResponseMode"; model={formAction=https://rp.example.com/cb, formParameters={"state":"q0zUL-SVP3m2c7oPYHfkQDiYdE2o2Nm0HihRXfM7hzw","id_token":"eyJraWQiOiIyOTg4ZTJlNS00ZmZkLTQyMjctYWYyNS03ZTAzMjJkYzAwNGYiLCJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJ1c2VyLXN1YmplY3QtMTIzNDUzMSIsImF1ZCI6ImNsaWVudF9DQkFYQnFMQ3hSdHhKb2c4NzY4N30-LDorMSIsImlzcyI6Imh0dHBzOlwvXC93d3cuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0XC90ZXN0XC9CSnNiTHNDRWNjOW9odlhcLyIsImV4cCI6MTU5ODk2NDkyNSwibm9uY2UiOiJLdWtNaWJSMFludzhDZzFHRzhyaDM1Wm1GTU5hY3kwai1NeGVoZlUwYlZrIiwiaWF0IjoxNTk4OTY0NjI1fQ.FdjJq7nBLk_r5YLLEKu3cOYEXqoEXSrFWvg7eq2YmQ5tRL8_V1hFCZfC1sVK9vP7FJgQNGaqh4ceOHme4lgE4wy4oCqbwjqRycybZ9W_9jD_WjKMF4w0WRR4I5DsCT12YmQFWuokH0HBBqjcwVCrknSN1iR9Z3aElzyLkpeRAW64Vg6rGxAZ_tUWwBcQs77ZGPr9x41C8_x3Cymljgx-0nJUQ2OQ0g7lJ53u2To0GeP5X62z_K8npKO9v2kOfQ4FHO2aISS34jJ7QlOaMYQ_C8AlDnxEe4Oak-OI03nReVDA_930eqWJbrc0UzFa1OyEqz3t0SMzH-0qEkrN6Tad3A"}}]
outgoing_path
authorize
2020-09-01 12:50:27 FINISHED
oidcc-client-test-invalid-aud
Test has run to completion
testmodule_result
PASSED
Test Results