Test Summary

Test Results

Expand All Collapse All
All times are UTC
2020-09-01 12:55:03 INFO
TEST-RUNNER
Test instance uynqnFD3A00xgnK created
baseUrl
https://www.certification.openid.net/test/uynqnFD3A00xgnK
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code id_token token",
  "request_type": "plain_http_request",
  "response_mode": "form_post",
  "client_registration": "dynamic_client"
}
alias

                                
description
test suite runner for openid-client
planId
l0lJMpv444Mye
config
{
  "description": "test suite runner for openid-client",
  "waitTimeoutSeconds": 2
}
testName
oidcc-client-test-scope-userinfo-claims
2020-09-01 12:55:03 SUCCESS
OIDCCGenerateServerConfiguration
Generated default server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/uynqnFD3A00xgnK/",
  "authorization_endpoint": "https://www.certification.openid.net/test/uynqnFD3A00xgnK/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/uynqnFD3A00xgnK/token",
  "jwks_uri": "https://www.certification.openid.net/test/uynqnFD3A00xgnK/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/uynqnFD3A00xgnK/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/uynqnFD3A00xgnK/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post",
    "client_secret_jwt",
    "private_key_jwt"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2020-09-01 12:55:03
SetTokenEndpointAuthMethodsSupportedToClientSecretBasicOnly
Changed token_endpoint_auth_methods_supported to client_secret_basic only in server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/uynqnFD3A00xgnK/",
  "authorization_endpoint": "https://www.certification.openid.net/test/uynqnFD3A00xgnK/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/uynqnFD3A00xgnK/token",
  "jwks_uri": "https://www.certification.openid.net/test/uynqnFD3A00xgnK/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/uynqnFD3A00xgnK/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/uynqnFD3A00xgnK/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2020-09-01 12:55:04
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "4ROWwn9EyLVoXHp1OEWuS9vE0w1DRJW3LvesbVubnd7C_b9bKUdtlM-Lit7hlUf0oFynzdkJMf6VnNp4nvgho557tnMGYhG1jhuy9Ka0kwtABtBKXFK0QGpQ5bm959EZIaiEPXOuUGWxiJ-yXTMlAwfCQ8ue-tsywwNsfp7zkRM",
      "kty": "RSA",
      "q": "xk7eCGD_Al614mcjfK-spipf5fAPC3tf2dg_Z_Z9DcmkyopmwDlbbguad9fvvaEZv6Hbg2m0QCFYDiiT-OcC9_KvmuZBFFDdyypkLHYofgHqk0uM4cMY4ie9EYZ5rjBHwkoZZ6Er0znKjzJFv1PvMHrz4qH6QiZOyk7cnvOdbsU",
      "d": "J1zuwP48WW8eaTuy06HdL9ri0TJs2tR3b4No5WtxZ8tPFxLE8C5tb8AWA9BlUGdd1McU5tTlPrDW03-LTH0KSZkVySAd0h3nWQusIpMyjCsXD4QRjVw6V_Y8FlckDuNLYYGcyycC-Usvjsuf5vFPFOcQaDPBqmZvZWT7B4BBCTvf5c4B2lq7jxNSXm3SzLGhg2RkinWnmPMvY38gfZ7XqVh6ythN9ZxXZkzZnOE8xXeU7JvUCBXNnP5wgMh7wdz5jncHoaXOlI5nBYPyUbMGQ_lPAv20vwq1wvUyXBcVhK-6HaTm-eVmTc4Tyoe9Go_AxCXnbxo2ZYCbZQqHwsyDYQ",
      "e": "AQAB",
      "use": "sig",
      "kid": "c7901ec3-b408-413c-a7b4-35335cf490f9",
      "qi": "YqR-dr6H2nY102_34BqFh_YlxcrjPZYz8ruZNz0EAbPyzONZpROgF6wQyrn6HnAhofX_Pp24Jg-YQlIhZgA9FUP_dE0x4xzHWBuZLB3SdbQAbj6-Ksiq4Swq3UF6hctxtfK9EOzrtdeTf_KZ7kdYgPPW-2ZNg-xyBWBSX9hesfI",
      "dp": "xehNlfQGbV1lyHs8-x_6JGW36cQts-7ZRgktqnL0oJoxZqGN7PwLlN_x2UglnvfIWAFg45XFihpLP8KycUXJfm9qZIE7yZu8wpoEfy7edLVdtSANYqSuLj3NqFHsdBveN0RQEyDW04a31mRll6HTF5kI7kfrILUBK4ylJ6lojdU",
      "dq": "nmGi52JAiS4HajkhmJXd-CBj0wt1mKACn8Qcb_XnTrm7iaAcDG5C3ZMa3Zhy-yrNm8WzwjMMKSP4ZeZ2uBYYwtrq8XXwiD9FxNuogfIkyO7S4K04aZ8eIpHGaVbTnBEnXr87pw6MJ_lCFDf8iKCKqleorVrcuzRJPT7a6YB8Plk",
      "n": "rlp9yLhS58Sd8EHRV6EPmf0jtnQY3gqyfJ-ZuZ8Wr96fW5gegKWBCovC40BQS4SAqPPHfYFIG4L3s22JCD3Zxg_oOxE266XqqnEs4raot8Z5kvuFHIthK9GP9l3jLOeb3rpqqaALodhthWsuNMHi5thvjOj8cEHHUNdh3kiKBrxCBip1EINKPqlg5IGukM2688RiUkcRRWPcbVfvkDvH95Tohv2nBwTkuiQAh4deg8-lESSVOKrbtxRP2gamlZZx0zQkuKwp84OP4J0c62c0d_JjO2l5aMWsq0wjJqKb9Ar7kkLsjWszzcqaN-d-xgDzJUIDFI53winhk3GL-2vNnw"
    },
    {
      "kty": "EC",
      "d": "-cRJWV8AxDI9oFPMzkd6bkHxHqelx8wOk9JJ939v3Eg",
      "use": "sig",
      "crv": "P-256",
      "kid": "6d4f286d-3a74-495b-ae66-3867a44d5a42",
      "x": "n--nMSNsZ8Ubh1S0q4OmxyDBUkC0ycjFrk82e_J40Dw",
      "y": "clRIAP_u3KBhoHLfCrqcMqARaDkk7PyXLoEs6vZPHu0"
    },
    {
      "kty": "EC",
      "d": "HgN2Zkp-rJaXtzyOE5OyxQrrTzPEDT1AWYR5CawBGQM",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "6677d3ad-ebed-4449-af86-77122e6f8582",
      "x": "hO7K8ipl0t-CF4SVgwHN3HsUyCHZPik1MUlRti1eolA",
      "y": "4X61DGVrCT9fR7HsAtf2GXj-FlsUgP7gZCwqofcvRI8"
    },
    {
      "kty": "OKP",
      "d": "tNR7hoar-98JjFG5l-UHmf38nP8wbBy6yZ95kods4Sk",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "c96dd657-fe41-4dbe-9f91-12fb979e0ab8",
      "x": "oqaIVAsoMbtA5Ne7Y4tLQ2n-yUrO4Slwv0gAlW9UR5c"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "9U3KDUMq3xnbIT7VPc4V43xcmdTvX82sqeV0r6VK8cQme1mWvuXYiRHlMBWXxnGRD_-om5Z_2DQhveqUIDyQSHYFqNCdAYAG_nc8DGeZWfFA8mNCCMfFxVoIKU7L4jbietZ7ApFnZI75WtTmFvjFd9e89Zb3wqG1GjNXiD-OuTc",
      "kty": "RSA",
      "q": "yqOMYgjNYMl-1nGonuuvBrsF4Eihk_-FdwgTzsv4XdOBoPosZwi8xdSRo2gWmVlgWDWGcv9ETkRL0CuUXzJ6J4QceUq4R8Hs_qNN-5cIWqUFu2Vv4O3U2k8cf_5IFuLdPUedlnp4KJ25MqdkhEY4wQ-T43IQW2dz8gXxJ8hKyHk",
      "d": "nG6oHgR9JoTN9PhY5Jo_1cE7t2TZA4RTxaYH2gS4LV1P0RFVtZlmjLOkF9R6DzTTZl_OLhYxeJYT0p_ggXh8n2ASTOz1ZP7nikPZoj8bo_KXMpD5QLoY-xDUURPKWZ5GYr7BJKIxaU6i9G9ZDgo7uyypV8lz6GQBbyxWwj4hlJ43RaiWBVwIR8zcCSlymsFVUwId1qLKbAygsJVVKGRZDpVgvkxT_hbAGhe-O6OuPftWhckb4aI4i-2mIRn_IMq6bT-HCKUve5a5ZCrn74Sq0R1sdTwTNqinpO15KwMwwFto4MUjoZU9DD-cShQ2wp8ilK3c8afuvftRghfWPGiysQ",
      "e": "AQAB",
      "use": "enc",
      "kid": "fdcc39e9-e773-4aab-99ed-0884adf71105",
      "qi": "P-v_DIecH8_dzhQngkkkpBGOnrYi2XerlUTCdVjHsUPMQ_6-PSqLlq0jwBmnU2v4P5eUAeBmgg6wkdYnzT63PX5I26ErnUZsEPT1732gTaOUOWkVFxj7TTr3e_h6PSMgyRtWhNLg5zJewC5UclULynCE4Vh5_Is_GZkHUfj3EhM",
      "dp": "5yTnsVuLODKq80a7tMNOiM8UirfE36d0fZsDOscsOWg1QqIGk9cNFQvRxF90Zr94i3TCMem8icOFz-kMrtuisUTUzF_WsiUrcfh0ktPEAqZ8Jmo1PQTRbMcLTbE8GOrSuiEEREUzAeRfPqHCNf8wQ178ZQZea_3oIsoiPvZ0zD0",
      "alg": "RSA-OAEP",
      "dq": "LC5mgEVtCgpEtlrHqga2_Z-vU0xitlMC9YX0U6VTPJnN7Jw_LCPSjMuhCWC7dKnxAKqC6vXPHcV0RioKSotF6PG8B5IMBdE5a_eNHCq87o6GZmpib0dLnmGbVCjL7Pl_xUmlCVcgdbKV2351wwVQgH91_iQzfspalE1JXCQmcfk",
      "n": "wiwYepgnbH8S5NDE9CuPzdAOAXeNpybHwuC9Ii4txV5YMBCOiwEe6QEOVa1XRxbasi5sRyPfWnyevu0BACBDTC3qGVXHGM1KlOWW3Sqkhurozh-fHUIM_XkUnGB26c-j67gV2rsJ9h5r1mkOddiW8-UfO1rz9dFMM3soirFol6Fq79a3gt2V4vCi4hDa-e9Zm_S7zEctO27sdSSkHVJtFMRA3U_ZtaKtOUR0ssISyTg_SU73_Awkj5D5YmSaE143jxYTgPIiJd3EfvqYpi6XlizpU-K5yOaT_jZJT7KvaiEfl4ddkog6EAptEQErSqiBWaDFGHlMsXbk3q9jDQ6C_w"
    },
    {
      "kty": "EC",
      "d": "nC0x8gGtXZUaIPWS8RW4U6BfRnD4FiYzxZTjCVaKfiQ",
      "use": "enc",
      "crv": "P-256",
      "kid": "94d8ea3d-2b3e-4f7f-931a-422ba1180ba4",
      "x": "dfZlV-Au8-ekNSJJGkCdGBv8TuaQY1c7SzbhwQyXfv8",
      "y": "xYT_Dsyeqb9kBtfPHxHbXvl72D2iXzoMsFj95wUysm4",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "c7901ec3-b408-413c-a7b4-35335cf490f9",
      "n": "rlp9yLhS58Sd8EHRV6EPmf0jtnQY3gqyfJ-ZuZ8Wr96fW5gegKWBCovC40BQS4SAqPPHfYFIG4L3s22JCD3Zxg_oOxE266XqqnEs4raot8Z5kvuFHIthK9GP9l3jLOeb3rpqqaALodhthWsuNMHi5thvjOj8cEHHUNdh3kiKBrxCBip1EINKPqlg5IGukM2688RiUkcRRWPcbVfvkDvH95Tohv2nBwTkuiQAh4deg8-lESSVOKrbtxRP2gamlZZx0zQkuKwp84OP4J0c62c0d_JjO2l5aMWsq0wjJqKb9Ar7kkLsjWszzcqaN-d-xgDzJUIDFI53winhk3GL-2vNnw"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "c7964acb-4ec9-4ea0-a7ea-6f999e43fb9b",
      "n": "ziPdU1EyT3VGznzyOgPglc9qzasd_fkWPgH1HM3NX--sUiRTA_2XdRBEpbi3n9_oJRBHZptrczpXREWmL3nKgMDXbdWuyFyAi3dM9WUW7K70S_uwPZiumnALxgytnySUCH6aBPafunxisBZ7pRlayPHxj7OD5JnOve8VYyCMVQtqDtTJ57jsfPFLO0xMOsyLh_sMYE9TFQUQQikyWq33Io4AfzXfqB6uvWCAfDboxGmJmLeO1VRcDmTwR6clMSs4ATOUo15um4uFtGHT58olAqe9fgvkdtQ_ZwKOJ5zFr5k40__oKCdZ2w-Wp4hDiRqyyWbtuR9QCu4C-n0AMyaxtw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "6d4f286d-3a74-495b-ae66-3867a44d5a42",
      "x": "n--nMSNsZ8Ubh1S0q4OmxyDBUkC0ycjFrk82e_J40Dw",
      "y": "clRIAP_u3KBhoHLfCrqcMqARaDkk7PyXLoEs6vZPHu0"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "27c81af6-6bff-4075-90f6-3fe41a22b972",
      "x": "caGx6jT_SPoX3Wq0IVXG5eggieBfZ5whVs3RTnwhsw8",
      "y": "i3S11UW4m2thgsJXmf2WmsoN5N8k_C9rqeIqrM-2c7M"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "6677d3ad-ebed-4449-af86-77122e6f8582",
      "x": "hO7K8ipl0t-CF4SVgwHN3HsUyCHZPik1MUlRti1eolA",
      "y": "4X61DGVrCT9fR7HsAtf2GXj-FlsUgP7gZCwqofcvRI8"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "c96dd657-fe41-4dbe-9f91-12fb979e0ab8",
      "x": "oqaIVAsoMbtA5Ne7Y4tLQ2n-yUrO4Slwv0gAlW9UR5c"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "fdcc39e9-e773-4aab-99ed-0884adf71105",
      "alg": "RSA-OAEP",
      "n": "wiwYepgnbH8S5NDE9CuPzdAOAXeNpybHwuC9Ii4txV5YMBCOiwEe6QEOVa1XRxbasi5sRyPfWnyevu0BACBDTC3qGVXHGM1KlOWW3Sqkhurozh-fHUIM_XkUnGB26c-j67gV2rsJ9h5r1mkOddiW8-UfO1rz9dFMM3soirFol6Fq79a3gt2V4vCi4hDa-e9Zm_S7zEctO27sdSSkHVJtFMRA3U_ZtaKtOUR0ssISyTg_SU73_Awkj5D5YmSaE143jxYTgPIiJd3EfvqYpi6XlizpU-K5yOaT_jZJT7KvaiEfl4ddkog6EAptEQErSqiBWaDFGHlMsXbk3q9jDQ6C_w"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "94d8ea3d-2b3e-4f7f-931a-422ba1180ba4",
      "x": "dfZlV-Au8-ekNSJJGkCdGBv8TuaQY1c7SzbhwQyXfv8",
      "y": "xYT_Dsyeqb9kBtfPHxHbXvl72D2iXzoMsFj95wUysm4",
      "alg": "ECDH-ES"
    }
  ]
}
2020-09-01 12:55:04 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2020-09-01 12:55:04 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2020-09-01 12:55:04 SUCCESS
OIDCCLoadUserInfo
Added user information
user_info
{
  "sub": "user-subject-1234531",
  "name": "Demo T. User",
  "given_name": "Demo",
  "family_name": "User",
  "middle_name": "Theresa",
  "nickname": "Dee",
  "preferred_username": "d.tu",
  "gender": "female",
  "birthdate": "2000-02-03",
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "zoneinfo": "America/Los_Angeles",
  "locale": "en-US",
  "phone_number": "+1 555 5550000",
  "phone_number_verified": false,
  "email": "user@example.com",
  "email_verified": false,
  "website": "https://openid.net/",
  "updated_at": "1580000000"
}
2020-09-01 12:55:04 SUCCESS
GetDynamicClientConfiguration
No client details on configuration, created an empty dynamic_client_registration_template object.
2020-09-01 12:55:04
oidcc-client-test-scope-userinfo-claims
Setup Done
2020-09-01 12:55:06 INCOMING
oidcc-client-test-scope-userinfo-claims
Incoming HTTP request to test instance uynqnFD3A00xgnK
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
.well-known/openid-configuration
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Discovery endpoint
2020-09-01 12:55:06 OUTGOING
oidcc-client-test-scope-userinfo-claims
Response to HTTP request to test instance uynqnFD3A00xgnK
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "issuer": "https://www.certification.openid.net/test/uynqnFD3A00xgnK/",
  "authorization_endpoint": "https://www.certification.openid.net/test/uynqnFD3A00xgnK/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/uynqnFD3A00xgnK/token",
  "jwks_uri": "https://www.certification.openid.net/test/uynqnFD3A00xgnK/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/uynqnFD3A00xgnK/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/uynqnFD3A00xgnK/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
outgoing_path
.well-known/openid-configuration
2020-09-01 12:55:07 INCOMING
oidcc-client-test-scope-userinfo-claims
Incoming HTTP request to test instance uynqnFD3A00xgnK
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "content-type": "application/json",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "187",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
register
incoming_body_form_params
incoming_method
POST
incoming_body_json
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ]
}
incoming_query_string_params
{}
incoming_body
{"token_endpoint_auth_method":"client_secret_basic","response_types":["code id_token token"],"grant_types":["authorization_code","implicit"],"redirect_uris":["https://rp.example.com/cb"]}
Registration endpoint
2020-09-01 12:55:07 SUCCESS
OIDCCExtractDynamicRegistrationRequest
Extracted dynamic client registration request
request
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ]
}
2020-09-01 12:55:07 INFO
EnsureRegistrationRequestContainsAtLeastOneContact
This application requires that registration requests contain at least one contact.
2020-09-01 12:55:07 SUCCESS
ValidateClientGrantTypes
grant_types match response_types
grant_types
[
  "authorization_code",
  "implicit"
]
response_types
[
  "code id_token token"
]
2020-09-01 12:55:07 SUCCESS
OIDCCValidateClientRedirectUris
Valid redirect_uri(s) provided in registration request
redirect_uris
[
  "https://rp.example.com/cb"
]
2020-09-01 12:55:07 SUCCESS
ValidateClientLogoUris
Client does not contain any logo_uri
2020-09-01 12:55:07 SUCCESS
ValidateClientUris
Client does not contain any client_uri
2020-09-01 12:55:07 SUCCESS
ValidateClientPolicyUris
Client does not contain any policy_uri
2020-09-01 12:55:07 SUCCESS
ValidateClientTosUris
Client does not contain any tos_uri
2020-09-01 12:55:07 SUCCESS
ValidateClientSubjectType
A subject_type was not provided
2020-09-01 12:55:07 INFO
ValidateIdTokenSignedResponseAlg
Skipped evaluation due to missing required element: client id_token_signed_response_alg
path
id_token_signed_response_alg
mapped
object
client
2020-09-01 12:55:07 SUCCESS
EnsureIdTokenEncryptedResponseAlgIsSetIfEncIsSet
id_token_encrypted_response_enc is not set
2020-09-01 12:55:07 INFO
ValidateUserinfoSignedResponseAlg
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2020-09-01 12:55:07 SUCCESS
EnsureUserinfoEncryptedResponseAlgIsSetIfEncIsSet
userinfo_encrypted_response_enc is not set
2020-09-01 12:55:07 INFO
ValidateRequestObjectSigningAlg
Skipped evaluation due to missing required element: client request_object_signing_alg
path
request_object_signing_alg
mapped
object
client
2020-09-01 12:55:07 SUCCESS
EnsureRequestObjectEncryptionAlgIsSetIfEncIsSet
request_object_encryption_enc is not set
2020-09-01 12:55:07 INFO
ValidateTokenEndpointAuthSigningAlg
Skipped evaluation due to missing required element: client token_endpoint_auth_signing_alg
path
token_endpoint_auth_signing_alg
mapped
object
client
2020-09-01 12:55:07 SUCCESS
ValidateDefaultMaxAge
default_max_age is not set
2020-09-01 12:55:07 INFO
ValidateRequireAuthTime
Skipped evaluation due to missing required element: client require_auth_time
path
require_auth_time
mapped
object
client
2020-09-01 12:55:07 INFO
ValidateDefaultAcrValues
Skipped evaluation due to missing required element: client default_acr_values
path
default_acr_values
mapped
object
client
2020-09-01 12:55:07 INFO
ValidateInitiateLoginUri
Skipped evaluation due to missing required element: client initiate_login_uri
path
initiate_login_uri
mapped
object
client
2020-09-01 12:55:07 INFO
ValidateRequestUris
Skipped evaluation due to missing required element: client request_uris
path
request_uris
mapped
object
client
2020-09-01 12:55:07 SUCCESS
ValidateClientRegistrationRequestSectorIdentifierUri
A sector_identifier_uri was not provided
2020-09-01 12:55:07 SUCCESS
OIDCCRegisterClient
Registered client
client
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_mySyRcbYHQwPWAP91353`!}#{"
}
2020-09-01 12:55:07
OIDCCCreateClientSecretForDynamicClient
Set the secret for registered client
client_secret
secret_IgAvqrnkXespOuTxVZpEJppIaDZMeCWWsoxsSQPUAbyBizZlmp8911254569;|"  
2020-09-01 12:55:07 SUCCESS
EnsureTokenEndPointAuthMethodIsClientSecretBasic
token_endpoint_auth_method is 'client_secret_basic' as expected
2020-09-01 12:55:07 SUCCESS
EnsureClientDoesNotHaveBothJwksAndJwksUri
Client does not have both jwks and jwks_uri set
client
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_mySyRcbYHQwPWAP91353`!}#{",
  "client_secret": "secret_IgAvqrnkXespOuTxVZpEJppIaDZMeCWWsoxsSQPUAbyBizZlmp8911254569;|\"  "
}
2020-09-01 12:55:07 INFO
FetchClientKeys
Skipped evaluation due to missing required element: client jwks_uri
path
jwks_uri
mapped
object
client
2020-09-01 12:55:07 SUCCESS
OIDCCExtractServerSigningAlg
Using the default algorithm for the first key in server jwks
signing_algorithm
RS256
2020-09-01 12:55:07
SetClientIdTokenSignedResponseAlgToServerSigningAlg
Set id_token_signed_response_alg for the registered client
id_token_signed_response_alg
RS256
2020-09-01 12:55:07 OUTGOING
oidcc-client-test-scope-userinfo-claims
Response to HTTP request to test instance uynqnFD3A00xgnK
outgoing_status_code
201
outgoing_headers
{}
outgoing_body
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_mySyRcbYHQwPWAP91353`!}#{",
  "client_secret": "secret_IgAvqrnkXespOuTxVZpEJppIaDZMeCWWsoxsSQPUAbyBizZlmp8911254569;|\"  ",
  "id_token_signed_response_alg": "RS256"
}
outgoing_path
register
2020-09-01 12:55:07 INCOMING
oidcc-client-test-scope-userinfo-claims
Incoming HTTP request to test instance uynqnFD3A00xgnK
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "got/9.6.0 (https://github.com/sindresorhus/got)",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
authorize
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "client_id": "client_mySyRcbYHQwPWAP91353`!}#{",
  "scope": "openid email",
  "response_type": "code id_token token",
  "redirect_uri": "https://rp.example.com/cb",
  "state": "tgsn1ML4K3qs3A_ugipfHryXjX3Eo13ciuPBBQfLFYc",
  "nonce": "k-MMCkCLPbzJkXpNEa26lI1ZVuZQPYEzenne-YzDFDM",
  "response_mode": "form_post"
}
incoming_body
Authorization endpoint
2020-09-01 12:55:07 SUCCESS
EnsureRequestDoesNotContainRequestObject
Request does not contain a request parameter
2020-09-01 12:55:07 SUCCESS
OIDCCEnsureAuthorizationHttpRequestContainsOpenIDScope
Found 'openid' in scope http request parameter
actual
[
  "openid",
  "email"
]
expected
openid
2020-09-01 12:55:07 SUCCESS
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
effective_authorization_endpoint_request
{
  "client_id": "client_mySyRcbYHQwPWAP91353`!}#{",
  "scope": "openid email",
  "response_type": "code id_token token",
  "redirect_uri": "https://rp.example.com/cb",
  "state": "tgsn1ML4K3qs3A_ugipfHryXjX3Eo13ciuPBBQfLFYc",
  "nonce": "k-MMCkCLPbzJkXpNEa26lI1ZVuZQPYEzenne-YzDFDM",
  "response_mode": "form_post"
}
2020-09-01 12:55:07 SUCCESS
ExtractRequestedScopes
Requested scopes
scope
openid email
2020-09-01 12:55:07 SUCCESS
ExtractNonceFromAuthorizationRequest
Extracted nonce
nonce
k-MMCkCLPbzJkXpNEa26lI1ZVuZQPYEzenne-YzDFDM
2020-09-01 12:55:07 SUCCESS
EnsureResponseTypeIsCodeIdTokenToken
Response type is expected value
expected
code id_token token
2020-09-01 12:55:07 SUCCESS
EnsureMatchingClientId
Client ID matched
client_id
client_mySyRcbYHQwPWAP91353`!}#{
2020-09-01 12:55:07 SUCCESS
EnsureValidRedirectUriForAuthorizationEndpointRequest
redirect_uri is one of the allowed redirect uris
actual
https://rp.example.com/cb
expected
[
  "https://rp.example.com/cb"
]
2020-09-01 12:55:07 SUCCESS
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
actual
[
  "openid",
  "email"
]
expected
openid
2020-09-01 12:55:07 SUCCESS
DisallowMaxAgeEqualsZeroAndPromptNone
The client did not send max_age=0 and prompt=none parameters as expected
2020-09-01 12:55:07 SUCCESS
EnsureScopeContainsAtLeastOneOfProfileEmailPhoneAddress
Found at least one of profile, email, phone and address scopes in request
actual
[
  "openid",
  "email"
]
2020-09-01 12:55:07 SUCCESS
CreateAuthorizationCode
Created authorization code
authorization_code
HraPbaEiVp
2020-09-01 12:55:07 SUCCESS
CalculateCHash
Successful c_hash encoding
c_hash
REYQF-RuvU8kI-J5LUyc9Q
2020-09-01 12:55:07 SUCCESS
GenerateBearerAccessToken
Generated access token
access_token
ciQl1VpI9rS3hXCmtpBfVwTSJQutyJM6cPIGZirlQ5e13DEZU8
2020-09-01 12:55:07 SUCCESS
CalculateAtHash
Successful at_hash encoding
at_hash
mrFgIizEhEyGo6CAD2PtBw
2020-09-01 12:55:07 SUCCESS
GenerateIdTokenClaims
Created ID Token Claims
iss
https://www.certification.openid.net/test/uynqnFD3A00xgnK/
sub
user-subject-1234531
aud
client_mySyRcbYHQwPWAP91353`!}#{
nonce
k-MMCkCLPbzJkXpNEa26lI1ZVuZQPYEzenne-YzDFDM
iat
1598964907
exp
1598965207
2020-09-01 12:55:07 SUCCESS
AddCHashToIdTokenClaims
Added c_hash to ID token claims
c_hash
REYQF-RuvU8kI-J5LUyc9Q
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/uynqnFD3A00xgnK/",
  "sub": "user-subject-1234531",
  "aud": "client_mySyRcbYHQwPWAP91353`!}#{",
  "nonce": "k-MMCkCLPbzJkXpNEa26lI1ZVuZQPYEzenne-YzDFDM",
  "iat": 1598964907,
  "exp": 1598965207,
  "c_hash": "REYQF-RuvU8kI-J5LUyc9Q"
}
2020-09-01 12:55:07 SUCCESS
AddAtHashToIdTokenClaims
Added at_hash to ID token claims
at_hash
mrFgIizEhEyGo6CAD2PtBw
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/uynqnFD3A00xgnK/",
  "sub": "user-subject-1234531",
  "aud": "client_mySyRcbYHQwPWAP91353`!}#{",
  "nonce": "k-MMCkCLPbzJkXpNEa26lI1ZVuZQPYEzenne-YzDFDM",
  "iat": 1598964907,
  "exp": 1598965207,
  "c_hash": "REYQF-RuvU8kI-J5LUyc9Q",
  "at_hash": "mrFgIizEhEyGo6CAD2PtBw"
}
2020-09-01 12:55:07 SUCCESS
OIDCCSignIdToken
Signed the ID token
id_token
eyJraWQiOiJjNzkwMWVjMy1iNDA4LTQxM2MtYTdiNC0zNTMzNWNmNDkwZjkiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoibXJGZ0lpekVoRXlHbzZDQUQyUHRCdyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X215U3lSY2JZSFF3UFdBUDkxMzUzYCF9I3siLCJjX2hhc2giOiJSRVlRRi1SdXZVOGtJLUo1TFV5YzlRIiwiaXNzIjoiaHR0cHM6XC9cL3d3dy5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXRcL3Rlc3RcL3V5bnFuRkQzQTAweGduS1wvIiwiZXhwIjoxNTk4OTY1MjA3LCJub25jZSI6ImstTU1Da0NMUGJ6SmtYcE5FYTI2bEkxWlZ1WlFQWUV6ZW5uZS1ZekRGRE0iLCJpYXQiOjE1OTg5NjQ5MDd9.M3DSc92ZpS_kBAxR3o405yvY2d0Aw3g3VhephyD4kr31uDga82wtrgpzF5GXwhqXYd2cB049MIYP2Vdz4lZLAWWMs2EFTVcmxZnar7Lgu9m7m9xNKTrfC9srFFJfvSaJ2ZyPQCVz3HemOu6ATixuc4hmKJd-CGKOsapH45mxlln_J9-znzPxtIO8BLIUVUCV0bCYvxmQyPpW4EjSdxAHjWhET6XrqFbao7w-eLSS9SkXNvNlaqMrn1mhtXujW6bJ3C3TxAlfPzS7vvtccIs3B2KiFl8C2IiFU7n7WJ8IsjlbjhqiZ3bLUx62cEoBzWvsh0CoVBCq4OzGYSgicB5irw
key
{"p":"4ROWwn9EyLVoXHp1OEWuS9vE0w1DRJW3LvesbVubnd7C_b9bKUdtlM-Lit7hlUf0oFynzdkJMf6VnNp4nvgho557tnMGYhG1jhuy9Ka0kwtABtBKXFK0QGpQ5bm959EZIaiEPXOuUGWxiJ-yXTMlAwfCQ8ue-tsywwNsfp7zkRM","kty":"RSA","q":"xk7eCGD_Al614mcjfK-spipf5fAPC3tf2dg_Z_Z9DcmkyopmwDlbbguad9fvvaEZv6Hbg2m0QCFYDiiT-OcC9_KvmuZBFFDdyypkLHYofgHqk0uM4cMY4ie9EYZ5rjBHwkoZZ6Er0znKjzJFv1PvMHrz4qH6QiZOyk7cnvOdbsU","d":"J1zuwP48WW8eaTuy06HdL9ri0TJs2tR3b4No5WtxZ8tPFxLE8C5tb8AWA9BlUGdd1McU5tTlPrDW03-LTH0KSZkVySAd0h3nWQusIpMyjCsXD4QRjVw6V_Y8FlckDuNLYYGcyycC-Usvjsuf5vFPFOcQaDPBqmZvZWT7B4BBCTvf5c4B2lq7jxNSXm3SzLGhg2RkinWnmPMvY38gfZ7XqVh6ythN9ZxXZkzZnOE8xXeU7JvUCBXNnP5wgMh7wdz5jncHoaXOlI5nBYPyUbMGQ_lPAv20vwq1wvUyXBcVhK-6HaTm-eVmTc4Tyoe9Go_AxCXnbxo2ZYCbZQqHwsyDYQ","e":"AQAB","use":"sig","kid":"c7901ec3-b408-413c-a7b4-35335cf490f9","qi":"YqR-dr6H2nY102_34BqFh_YlxcrjPZYz8ruZNz0EAbPyzONZpROgF6wQyrn6HnAhofX_Pp24Jg-YQlIhZgA9FUP_dE0x4xzHWBuZLB3SdbQAbj6-Ksiq4Swq3UF6hctxtfK9EOzrtdeTf_KZ7kdYgPPW-2ZNg-xyBWBSX9hesfI","dp":"xehNlfQGbV1lyHs8-x_6JGW36cQts-7ZRgktqnL0oJoxZqGN7PwLlN_x2UglnvfIWAFg45XFihpLP8KycUXJfm9qZIE7yZu8wpoEfy7edLVdtSANYqSuLj3NqFHsdBveN0RQEyDW04a31mRll6HTF5kI7kfrILUBK4ylJ6lojdU","dq":"nmGi52JAiS4HajkhmJXd-CBj0wt1mKACn8Qcb_XnTrm7iaAcDG5C3ZMa3Zhy-yrNm8WzwjMMKSP4ZeZ2uBYYwtrq8XXwiD9FxNuogfIkyO7S4K04aZ8eIpHGaVbTnBEnXr87pw6MJ_lCFDf8iKCKqleorVrcuzRJPT7a6YB8Plk","n":"rlp9yLhS58Sd8EHRV6EPmf0jtnQY3gqyfJ-ZuZ8Wr96fW5gegKWBCovC40BQS4SAqPPHfYFIG4L3s22JCD3Zxg_oOxE266XqqnEs4raot8Z5kvuFHIthK9GP9l3jLOeb3rpqqaALodhthWsuNMHi5thvjOj8cEHHUNdh3kiKBrxCBip1EINKPqlg5IGukM2688RiUkcRRWPcbVfvkDvH95Tohv2nBwTkuiQAh4deg8-lESSVOKrbtxRP2gamlZZx0zQkuKwp84OP4J0c62c0d_JjO2l5aMWsq0wjJqKb9Ar7kkLsjWszzcqaN-d-xgDzJUIDFI53winhk3GL-2vNnw"}
algorithm
RS256
2020-09-01 12:55:07 INFO
EncryptIdToken
Skipped evaluation due to missing required element: client id_token_encrypted_response_alg
path
id_token_encrypted_response_alg
mapped
object
client
2020-09-01 12:55:07 SUCCESS
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "tgsn1ML4K3qs3A_ugipfHryXjX3Eo13ciuPBBQfLFYc"
}
2020-09-01 12:55:07 SUCCESS
AddCodeToAuthorizationEndpointResponseParams
Added code to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "tgsn1ML4K3qs3A_ugipfHryXjX3Eo13ciuPBBQfLFYc",
  "code": "HraPbaEiVp"
}
2020-09-01 12:55:07 SUCCESS
AddIdTokenToAuthorizationEndpointResponseParams
Added id_token to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "tgsn1ML4K3qs3A_ugipfHryXjX3Eo13ciuPBBQfLFYc",
  "code": "HraPbaEiVp",
  "id_token": "eyJraWQiOiJjNzkwMWVjMy1iNDA4LTQxM2MtYTdiNC0zNTMzNWNmNDkwZjkiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoibXJGZ0lpekVoRXlHbzZDQUQyUHRCdyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X215U3lSY2JZSFF3UFdBUDkxMzUzYCF9I3siLCJjX2hhc2giOiJSRVlRRi1SdXZVOGtJLUo1TFV5YzlRIiwiaXNzIjoiaHR0cHM6XC9cL3d3dy5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXRcL3Rlc3RcL3V5bnFuRkQzQTAweGduS1wvIiwiZXhwIjoxNTk4OTY1MjA3LCJub25jZSI6ImstTU1Da0NMUGJ6SmtYcE5FYTI2bEkxWlZ1WlFQWUV6ZW5uZS1ZekRGRE0iLCJpYXQiOjE1OTg5NjQ5MDd9.M3DSc92ZpS_kBAxR3o405yvY2d0Aw3g3VhephyD4kr31uDga82wtrgpzF5GXwhqXYd2cB049MIYP2Vdz4lZLAWWMs2EFTVcmxZnar7Lgu9m7m9xNKTrfC9srFFJfvSaJ2ZyPQCVz3HemOu6ATixuc4hmKJd-CGKOsapH45mxlln_J9-znzPxtIO8BLIUVUCV0bCYvxmQyPpW4EjSdxAHjWhET6XrqFbao7w-eLSS9SkXNvNlaqMrn1mhtXujW6bJ3C3TxAlfPzS7vvtccIs3B2KiFl8C2IiFU7n7WJ8IsjlbjhqiZ3bLUx62cEoBzWvsh0CoVBCq4OzGYSgicB5irw"
}
2020-09-01 12:55:07
AddTokenToAuthorizationEndpointResponseParams
Added token and token_type to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "tgsn1ML4K3qs3A_ugipfHryXjX3Eo13ciuPBBQfLFYc",
  "code": "HraPbaEiVp",
  "id_token": "eyJraWQiOiJjNzkwMWVjMy1iNDA4LTQxM2MtYTdiNC0zNTMzNWNmNDkwZjkiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoibXJGZ0lpekVoRXlHbzZDQUQyUHRCdyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X215U3lSY2JZSFF3UFdBUDkxMzUzYCF9I3siLCJjX2hhc2giOiJSRVlRRi1SdXZVOGtJLUo1TFV5YzlRIiwiaXNzIjoiaHR0cHM6XC9cL3d3dy5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXRcL3Rlc3RcL3V5bnFuRkQzQTAweGduS1wvIiwiZXhwIjoxNTk4OTY1MjA3LCJub25jZSI6ImstTU1Da0NMUGJ6SmtYcE5FYTI2bEkxWlZ1WlFQWUV6ZW5uZS1ZekRGRE0iLCJpYXQiOjE1OTg5NjQ5MDd9.M3DSc92ZpS_kBAxR3o405yvY2d0Aw3g3VhephyD4kr31uDga82wtrgpzF5GXwhqXYd2cB049MIYP2Vdz4lZLAWWMs2EFTVcmxZnar7Lgu9m7m9xNKTrfC9srFFJfvSaJ2ZyPQCVz3HemOu6ATixuc4hmKJd-CGKOsapH45mxlln_J9-znzPxtIO8BLIUVUCV0bCYvxmQyPpW4EjSdxAHjWhET6XrqFbao7w-eLSS9SkXNvNlaqMrn1mhtXujW6bJ3C3TxAlfPzS7vvtccIs3B2KiFl8C2IiFU7n7WJ8IsjlbjhqiZ3bLUx62cEoBzWvsh0CoVBCq4OzGYSgicB5irw",
  "access_token": "ciQl1VpI9rS3hXCmtpBfVwTSJQutyJM6cPIGZirlQ5e13DEZU8",
  "token_type": "Bearer"
}
2020-09-01 12:55:07 OUTGOING
oidcc-client-test-scope-userinfo-claims
Response to HTTP request to test instance uynqnFD3A00xgnK
outgoing
ModelAndView [view="formPostResponseMode"; model={formAction=https://rp.example.com/cb, formParameters={"state":"tgsn1ML4K3qs3A_ugipfHryXjX3Eo13ciuPBBQfLFYc","code":"HraPbaEiVp","id_token":"eyJraWQiOiJjNzkwMWVjMy1iNDA4LTQxM2MtYTdiNC0zNTMzNWNmNDkwZjkiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoibXJGZ0lpekVoRXlHbzZDQUQyUHRCdyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X215U3lSY2JZSFF3UFdBUDkxMzUzYCF9I3siLCJjX2hhc2giOiJSRVlRRi1SdXZVOGtJLUo1TFV5YzlRIiwiaXNzIjoiaHR0cHM6XC9cL3d3dy5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXRcL3Rlc3RcL3V5bnFuRkQzQTAweGduS1wvIiwiZXhwIjoxNTk4OTY1MjA3LCJub25jZSI6ImstTU1Da0NMUGJ6SmtYcE5FYTI2bEkxWlZ1WlFQWUV6ZW5uZS1ZekRGRE0iLCJpYXQiOjE1OTg5NjQ5MDd9.M3DSc92ZpS_kBAxR3o405yvY2d0Aw3g3VhephyD4kr31uDga82wtrgpzF5GXwhqXYd2cB049MIYP2Vdz4lZLAWWMs2EFTVcmxZnar7Lgu9m7m9xNKTrfC9srFFJfvSaJ2ZyPQCVz3HemOu6ATixuc4hmKJd-CGKOsapH45mxlln_J9-znzPxtIO8BLIUVUCV0bCYvxmQyPpW4EjSdxAHjWhET6XrqFbao7w-eLSS9SkXNvNlaqMrn1mhtXujW6bJ3C3TxAlfPzS7vvtccIs3B2KiFl8C2IiFU7n7WJ8IsjlbjhqiZ3bLUx62cEoBzWvsh0CoVBCq4OzGYSgicB5irw","access_token":"ciQl1VpI9rS3hXCmtpBfVwTSJQutyJM6cPIGZirlQ5e13DEZU8","token_type":"Bearer"}}]
outgoing_path
authorize
2020-09-01 12:55:08 INCOMING
oidcc-client-test-scope-userinfo-claims
Incoming HTTP request to test instance uynqnFD3A00xgnK
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
jwks
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Jwks endpoint
2020-09-01 12:55:08 OUTGOING
oidcc-client-test-scope-userinfo-claims
Response to HTTP request to test instance uynqnFD3A00xgnK
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "c7901ec3-b408-413c-a7b4-35335cf490f9",
      "n": "rlp9yLhS58Sd8EHRV6EPmf0jtnQY3gqyfJ-ZuZ8Wr96fW5gegKWBCovC40BQS4SAqPPHfYFIG4L3s22JCD3Zxg_oOxE266XqqnEs4raot8Z5kvuFHIthK9GP9l3jLOeb3rpqqaALodhthWsuNMHi5thvjOj8cEHHUNdh3kiKBrxCBip1EINKPqlg5IGukM2688RiUkcRRWPcbVfvkDvH95Tohv2nBwTkuiQAh4deg8-lESSVOKrbtxRP2gamlZZx0zQkuKwp84OP4J0c62c0d_JjO2l5aMWsq0wjJqKb9Ar7kkLsjWszzcqaN-d-xgDzJUIDFI53winhk3GL-2vNnw"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "c7964acb-4ec9-4ea0-a7ea-6f999e43fb9b",
      "n": "ziPdU1EyT3VGznzyOgPglc9qzasd_fkWPgH1HM3NX--sUiRTA_2XdRBEpbi3n9_oJRBHZptrczpXREWmL3nKgMDXbdWuyFyAi3dM9WUW7K70S_uwPZiumnALxgytnySUCH6aBPafunxisBZ7pRlayPHxj7OD5JnOve8VYyCMVQtqDtTJ57jsfPFLO0xMOsyLh_sMYE9TFQUQQikyWq33Io4AfzXfqB6uvWCAfDboxGmJmLeO1VRcDmTwR6clMSs4ATOUo15um4uFtGHT58olAqe9fgvkdtQ_ZwKOJ5zFr5k40__oKCdZ2w-Wp4hDiRqyyWbtuR9QCu4C-n0AMyaxtw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "6d4f286d-3a74-495b-ae66-3867a44d5a42",
      "x": "n--nMSNsZ8Ubh1S0q4OmxyDBUkC0ycjFrk82e_J40Dw",
      "y": "clRIAP_u3KBhoHLfCrqcMqARaDkk7PyXLoEs6vZPHu0"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "27c81af6-6bff-4075-90f6-3fe41a22b972",
      "x": "caGx6jT_SPoX3Wq0IVXG5eggieBfZ5whVs3RTnwhsw8",
      "y": "i3S11UW4m2thgsJXmf2WmsoN5N8k_C9rqeIqrM-2c7M"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "6677d3ad-ebed-4449-af86-77122e6f8582",
      "x": "hO7K8ipl0t-CF4SVgwHN3HsUyCHZPik1MUlRti1eolA",
      "y": "4X61DGVrCT9fR7HsAtf2GXj-FlsUgP7gZCwqofcvRI8"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "c96dd657-fe41-4dbe-9f91-12fb979e0ab8",
      "x": "oqaIVAsoMbtA5Ne7Y4tLQ2n-yUrO4Slwv0gAlW9UR5c"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "fdcc39e9-e773-4aab-99ed-0884adf71105",
      "alg": "RSA-OAEP",
      "n": "wiwYepgnbH8S5NDE9CuPzdAOAXeNpybHwuC9Ii4txV5YMBCOiwEe6QEOVa1XRxbasi5sRyPfWnyevu0BACBDTC3qGVXHGM1KlOWW3Sqkhurozh-fHUIM_XkUnGB26c-j67gV2rsJ9h5r1mkOddiW8-UfO1rz9dFMM3soirFol6Fq79a3gt2V4vCi4hDa-e9Zm_S7zEctO27sdSSkHVJtFMRA3U_ZtaKtOUR0ssISyTg_SU73_Awkj5D5YmSaE143jxYTgPIiJd3EfvqYpi6XlizpU-K5yOaT_jZJT7KvaiEfl4ddkog6EAptEQErSqiBWaDFGHlMsXbk3q9jDQ6C_w"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "94d8ea3d-2b3e-4f7f-931a-422ba1180ba4",
      "x": "dfZlV-Au8-ekNSJJGkCdGBv8TuaQY1c7SzbhwQyXfv8",
      "y": "xYT_Dsyeqb9kBtfPHxHbXvl72D2iXzoMsFj95wUysm4",
      "alg": "ECDH-ES"
    }
  ]
}
outgoing_path
jwks
2020-09-01 12:55:08 INCOMING
oidcc-client-test-scope-userinfo-claims
Incoming HTTP request to test instance uynqnFD3A00xgnK
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "authorization": "Basic Y2xpZW50X215U3lSY2JZSFF3UFdBUDkxMzUzJTYwISU3RCUyMyU3QjpzZWNyZXRfSWdBdnFybmtYZXNwT3VUeFZacEVKcHBJYURaTWVDV1dzb3hzU1FQVUFieUJpelpsbXA4OTExMjU0NTY5JTNCJTdDJTIyKys\u003d",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "content-type": "application/x-www-form-urlencoded",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "92",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
token
incoming_body_form_params
{
  "grant_type": "authorization_code",
  "code": "HraPbaEiVp",
  "redirect_uri": "https://rp.example.com/cb"
}
incoming_method
POST
incoming_body_json
incoming_query_string_params
{}
incoming_body
grant_type=authorization_code&code=HraPbaEiVp&redirect_uri=https%3A%2F%2Frp.example.com%2Fcb
Token endpoint
2020-09-01 12:55:08 SUCCESS
ExtractClientCredentialsFromBasicAuthorizationHeader
Extracted client authentication
client_id
client_mySyRcbYHQwPWAP91353`!}#{
client_secret
secret_IgAvqrnkXespOuTxVZpEJppIaDZMeCWWsoxsSQPUAbyBizZlmp8911254569;|"  
method
client_secret_basic
2020-09-01 12:55:08 SUCCESS
ValidateClientIdAndSecret
Client id and secret match
2020-09-01 12:55:08 SUCCESS
ValidateAuthorizationCode
Found authorization code
authorization_code
HraPbaEiVp
2020-09-01 12:55:08 SUCCESS
ValidateRedirectUriForTokenEndpointRequest
redirect_uri is the same as the one used in the authorization request
actual
https://rp.example.com/cb
2020-09-01 12:55:08 SUCCESS
GenerateBearerAccessToken
Generated access token
access_token
IRsdFIVrWzboiJBnADdMI7lxMwa0KuUdzaG0gv5eeObwOec0n2
2020-09-01 12:55:08 SUCCESS
CalculateAtHash
Successful at_hash encoding
at_hash
AiYek5Yddf7vZC_atAqHMQ
2020-09-01 12:55:08 SUCCESS
GenerateIdTokenClaims
Created ID Token Claims
iss
https://www.certification.openid.net/test/uynqnFD3A00xgnK/
sub
user-subject-1234531
aud
client_mySyRcbYHQwPWAP91353`!}#{
nonce
k-MMCkCLPbzJkXpNEa26lI1ZVuZQPYEzenne-YzDFDM
iat
1598964908
exp
1598965208
2020-09-01 12:55:08 SUCCESS
AddAtHashToIdTokenClaims
Added at_hash to ID token claims
at_hash
AiYek5Yddf7vZC_atAqHMQ
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/uynqnFD3A00xgnK/",
  "sub": "user-subject-1234531",
  "aud": "client_mySyRcbYHQwPWAP91353`!}#{",
  "nonce": "k-MMCkCLPbzJkXpNEa26lI1ZVuZQPYEzenne-YzDFDM",
  "iat": 1598964908,
  "exp": 1598965208,
  "at_hash": "AiYek5Yddf7vZC_atAqHMQ"
}
2020-09-01 12:55:08 SUCCESS
OIDCCSignIdToken
Signed the ID token
id_token
eyJraWQiOiJjNzkwMWVjMy1iNDA4LTQxM2MtYTdiNC0zNTMzNWNmNDkwZjkiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiQWlZZWs1WWRkZjd2WkNfYXRBcUhNUSIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X215U3lSY2JZSFF3UFdBUDkxMzUzYCF9I3siLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvdXlucW5GRDNBMDB4Z25LXC8iLCJleHAiOjE1OTg5NjUyMDgsIm5vbmNlIjoiay1NTUNrQ0xQYnpKa1hwTkVhMjZsSTFaVnVaUVBZRXplbm5lLVl6REZETSIsImlhdCI6MTU5ODk2NDkwOH0.Eoho8uOo5j-mzGWaejdt4rxr9oXt3yFZSOwgDhE_GNdRNTAE8dAeulcNR08uF8lslq8y1X_sRl-yijjeIfSQPX0xysyFi_8Ei8NiiEju1xOVpVIM4_gtufiiX08qAcPayqJAeTw5dGXuq50xQbzNa85swJDYB9jT6s2zQXzlp642WA5uBmCOvteOQ6GRVCRFuVLr5UuUEULUe3Sk-hMDnrezCw2Jeg4lov8-5HeJjW5v-AKIOjb27SnMJt93oltDtcTG_vP8Lcf4Or9rn2lJE3TA34mUn8J2zn6E5A27g_OlBZ7vkqsp7m7kXV7nXs0tD3chFtj0XmV-iVQMwBjDFg
key
{"p":"4ROWwn9EyLVoXHp1OEWuS9vE0w1DRJW3LvesbVubnd7C_b9bKUdtlM-Lit7hlUf0oFynzdkJMf6VnNp4nvgho557tnMGYhG1jhuy9Ka0kwtABtBKXFK0QGpQ5bm959EZIaiEPXOuUGWxiJ-yXTMlAwfCQ8ue-tsywwNsfp7zkRM","kty":"RSA","q":"xk7eCGD_Al614mcjfK-spipf5fAPC3tf2dg_Z_Z9DcmkyopmwDlbbguad9fvvaEZv6Hbg2m0QCFYDiiT-OcC9_KvmuZBFFDdyypkLHYofgHqk0uM4cMY4ie9EYZ5rjBHwkoZZ6Er0znKjzJFv1PvMHrz4qH6QiZOyk7cnvOdbsU","d":"J1zuwP48WW8eaTuy06HdL9ri0TJs2tR3b4No5WtxZ8tPFxLE8C5tb8AWA9BlUGdd1McU5tTlPrDW03-LTH0KSZkVySAd0h3nWQusIpMyjCsXD4QRjVw6V_Y8FlckDuNLYYGcyycC-Usvjsuf5vFPFOcQaDPBqmZvZWT7B4BBCTvf5c4B2lq7jxNSXm3SzLGhg2RkinWnmPMvY38gfZ7XqVh6ythN9ZxXZkzZnOE8xXeU7JvUCBXNnP5wgMh7wdz5jncHoaXOlI5nBYPyUbMGQ_lPAv20vwq1wvUyXBcVhK-6HaTm-eVmTc4Tyoe9Go_AxCXnbxo2ZYCbZQqHwsyDYQ","e":"AQAB","use":"sig","kid":"c7901ec3-b408-413c-a7b4-35335cf490f9","qi":"YqR-dr6H2nY102_34BqFh_YlxcrjPZYz8ruZNz0EAbPyzONZpROgF6wQyrn6HnAhofX_Pp24Jg-YQlIhZgA9FUP_dE0x4xzHWBuZLB3SdbQAbj6-Ksiq4Swq3UF6hctxtfK9EOzrtdeTf_KZ7kdYgPPW-2ZNg-xyBWBSX9hesfI","dp":"xehNlfQGbV1lyHs8-x_6JGW36cQts-7ZRgktqnL0oJoxZqGN7PwLlN_x2UglnvfIWAFg45XFihpLP8KycUXJfm9qZIE7yZu8wpoEfy7edLVdtSANYqSuLj3NqFHsdBveN0RQEyDW04a31mRll6HTF5kI7kfrILUBK4ylJ6lojdU","dq":"nmGi52JAiS4HajkhmJXd-CBj0wt1mKACn8Qcb_XnTrm7iaAcDG5C3ZMa3Zhy-yrNm8WzwjMMKSP4ZeZ2uBYYwtrq8XXwiD9FxNuogfIkyO7S4K04aZ8eIpHGaVbTnBEnXr87pw6MJ_lCFDf8iKCKqleorVrcuzRJPT7a6YB8Plk","n":"rlp9yLhS58Sd8EHRV6EPmf0jtnQY3gqyfJ-ZuZ8Wr96fW5gegKWBCovC40BQS4SAqPPHfYFIG4L3s22JCD3Zxg_oOxE266XqqnEs4raot8Z5kvuFHIthK9GP9l3jLOeb3rpqqaALodhthWsuNMHi5thvjOj8cEHHUNdh3kiKBrxCBip1EINKPqlg5IGukM2688RiUkcRRWPcbVfvkDvH95Tohv2nBwTkuiQAh4deg8-lESSVOKrbtxRP2gamlZZx0zQkuKwp84OP4J0c62c0d_JjO2l5aMWsq0wjJqKb9Ar7kkLsjWszzcqaN-d-xgDzJUIDFI53winhk3GL-2vNnw"}
algorithm
RS256
2020-09-01 12:55:08 INFO
EncryptIdToken
Skipped evaluation due to missing required element: client id_token_encrypted_response_alg
path
id_token_encrypted_response_alg
mapped
object
client
2020-09-01 12:55:08 SUCCESS
CreateTokenEndpointResponse
Created token endpoint response
access_token
IRsdFIVrWzboiJBnADdMI7lxMwa0KuUdzaG0gv5eeObwOec0n2
token_type
Bearer
id_token
eyJraWQiOiJjNzkwMWVjMy1iNDA4LTQxM2MtYTdiNC0zNTMzNWNmNDkwZjkiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiQWlZZWs1WWRkZjd2WkNfYXRBcUhNUSIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X215U3lSY2JZSFF3UFdBUDkxMzUzYCF9I3siLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvdXlucW5GRDNBMDB4Z25LXC8iLCJleHAiOjE1OTg5NjUyMDgsIm5vbmNlIjoiay1NTUNrQ0xQYnpKa1hwTkVhMjZsSTFaVnVaUVBZRXplbm5lLVl6REZETSIsImlhdCI6MTU5ODk2NDkwOH0.Eoho8uOo5j-mzGWaejdt4rxr9oXt3yFZSOwgDhE_GNdRNTAE8dAeulcNR08uF8lslq8y1X_sRl-yijjeIfSQPX0xysyFi_8Ei8NiiEju1xOVpVIM4_gtufiiX08qAcPayqJAeTw5dGXuq50xQbzNa85swJDYB9jT6s2zQXzlp642WA5uBmCOvteOQ6GRVCRFuVLr5UuUEULUe3Sk-hMDnrezCw2Jeg4lov8-5HeJjW5v-AKIOjb27SnMJt93oltDtcTG_vP8Lcf4Or9rn2lJE3TA34mUn8J2zn6E5A27g_OlBZ7vkqsp7m7kXV7nXs0tD3chFtj0XmV-iVQMwBjDFg
scope
openid email
2020-09-01 12:55:08 OUTGOING
oidcc-client-test-scope-userinfo-claims
Response to HTTP request to test instance uynqnFD3A00xgnK
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "access_token": "IRsdFIVrWzboiJBnADdMI7lxMwa0KuUdzaG0gv5eeObwOec0n2",
  "token_type": "Bearer",
  "id_token": "eyJraWQiOiJjNzkwMWVjMy1iNDA4LTQxM2MtYTdiNC0zNTMzNWNmNDkwZjkiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiQWlZZWs1WWRkZjd2WkNfYXRBcUhNUSIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X215U3lSY2JZSFF3UFdBUDkxMzUzYCF9I3siLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvdXlucW5GRDNBMDB4Z25LXC8iLCJleHAiOjE1OTg5NjUyMDgsIm5vbmNlIjoiay1NTUNrQ0xQYnpKa1hwTkVhMjZsSTFaVnVaUVBZRXplbm5lLVl6REZETSIsImlhdCI6MTU5ODk2NDkwOH0.Eoho8uOo5j-mzGWaejdt4rxr9oXt3yFZSOwgDhE_GNdRNTAE8dAeulcNR08uF8lslq8y1X_sRl-yijjeIfSQPX0xysyFi_8Ei8NiiEju1xOVpVIM4_gtufiiX08qAcPayqJAeTw5dGXuq50xQbzNa85swJDYB9jT6s2zQXzlp642WA5uBmCOvteOQ6GRVCRFuVLr5UuUEULUe3Sk-hMDnrezCw2Jeg4lov8-5HeJjW5v-AKIOjb27SnMJt93oltDtcTG_vP8Lcf4Or9rn2lJE3TA34mUn8J2zn6E5A27g_OlBZ7vkqsp7m7kXV7nXs0tD3chFtj0XmV-iVQMwBjDFg",
  "scope": "openid email"
}
outgoing_path
token
2020-09-01 12:55:09 INCOMING
oidcc-client-test-scope-userinfo-claims
Incoming HTTP request to test instance uynqnFD3A00xgnK
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "authorization": "Bearer IRsdFIVrWzboiJBnADdMI7lxMwa0KuUdzaG0gv5eeObwOec0n2",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
userinfo
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Userinfo endpoint
2020-09-01 12:55:09 SUCCESS
OIDCCExtractBearerAccessTokenFromRequest
Found access token on incoming request
access_token
IRsdFIVrWzboiJBnADdMI7lxMwa0KuUdzaG0gv5eeObwOec0n2
2020-09-01 12:55:09 SUCCESS
RequireBearerAccessToken
Found access token in request
actual
IRsdFIVrWzboiJBnADdMI7lxMwa0KuUdzaG0gv5eeObwOec0n2
2020-09-01 12:55:09 SUCCESS
FilterUserInfoForScopes
User info endpoint output
sub
user-subject-1234531
email
user@example.com
email_verified
false
2020-09-01 12:55:09
ClearAccessTokenFromRequest
Condition ran but did not log anything
2020-09-01 12:55:09 INFO
AddIssAndAudToUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2020-09-01 12:55:09 INFO
SignUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2020-09-01 12:55:09 INFO
EncryptUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_encrypted_response_alg
path
userinfo_encrypted_response_alg
mapped
object
client
2020-09-01 12:55:09 OUTGOING
oidcc-client-test-scope-userinfo-claims
Response to HTTP request to test instance uynqnFD3A00xgnK
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "sub": "user-subject-1234531",
  "email": "user@example.com",
  "email_verified": false
}
outgoing_path
userinfo
2020-09-01 12:55:09 FINISHED
oidcc-client-test-scope-userinfo-claims
Test has run to completion
testmodule_result
PASSED
Test Results