Test Summary

Test Results

Expand All Collapse All
All times are UTC
2020-09-01 12:50:28 INFO
TEST-RUNNER
Test instance JFY9b3ZuB1S0ejN created
baseUrl
https://www.certification.openid.net/test/JFY9b3ZuB1S0ejN
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code id_token",
  "request_type": "plain_http_request",
  "response_mode": "form_post",
  "client_registration": "dynamic_client"
}
alias

                                
description
test suite runner for openid-client
planId
l0lJMpv444Mye
config
{
  "description": "test suite runner for openid-client",
  "waitTimeoutSeconds": 2
}
testName
oidcc-client-test-invalid-aud
2020-09-01 12:50:28 SUCCESS
OIDCCGenerateServerConfiguration
Generated default server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/JFY9b3ZuB1S0ejN/",
  "authorization_endpoint": "https://www.certification.openid.net/test/JFY9b3ZuB1S0ejN/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/JFY9b3ZuB1S0ejN/token",
  "jwks_uri": "https://www.certification.openid.net/test/JFY9b3ZuB1S0ejN/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/JFY9b3ZuB1S0ejN/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/JFY9b3ZuB1S0ejN/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post",
    "client_secret_jwt",
    "private_key_jwt"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2020-09-01 12:50:28
SetTokenEndpointAuthMethodsSupportedToClientSecretBasicOnly
Changed token_endpoint_auth_methods_supported to client_secret_basic only in server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/JFY9b3ZuB1S0ejN/",
  "authorization_endpoint": "https://www.certification.openid.net/test/JFY9b3ZuB1S0ejN/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/JFY9b3ZuB1S0ejN/token",
  "jwks_uri": "https://www.certification.openid.net/test/JFY9b3ZuB1S0ejN/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/JFY9b3ZuB1S0ejN/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/JFY9b3ZuB1S0ejN/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2020-09-01 12:50:28
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "v_KhODX1w_gouBXqYXZ1Ca2ycamAl47uKcL3YvhKsiMiGW9aeMVPWUi8SMaUBWryspOimRts2E1vkr8vpmcrMIJwWJ5HcV3iXy25x8L_AlSXfRKCXHkfCXpyt5OOdFbmuW4HogI8_Ze7l6y2xDRAjhioxdl4NflmQVCn5E7cRXk",
      "kty": "RSA",
      "q": "tDR5lmVsztY3UtkLvd38oawEyKoP2LgKFj8SVciMUyXg5itzIoImjvr77i_JI3oRdKtU8_ZsWg4MliFEm1aRw7bvy00NaLF01RQz5ueX-oDGwYoJ36wIQQyhntqWrcRYmaouuh0TlFipmC9eZdAYnhLfSXK0j-I36-SHvLj1N18",
      "d": "BMdsXBFn8mJflLeDGLQ1ytCmkAaTqg2B_32TEBLU7eakhMaq-6nEeZ8XJMb0xz8YgOgsW3d2i2CUICOpwcbk-_rddGrLVWOZm8fZjYRExBywjXaaUpNnxbZJh9ylDCGfU0Uy_cr0E1wvCJ3zsF_SYJhnlPrhpTfI6gvvztFcSF73rLsFa7dWNZYSuaM0Ai8XXjecLB0xtWmV3Q1o1nFVNWJDCbMHCCo6lKehrMHutRTFX0E2GdRkqGuu9likaUMOhlLAOkNkgiVylJzjx5fcu4nO6bjLEJhsJJMDyHz--pzTT841k8kNRrXnRQOMvIPJ9KgqNVrDkc55xFM5btGc4Q",
      "e": "AQAB",
      "use": "sig",
      "kid": "50dc9eb2-7577-4212-8c81-21cbc2c077a5",
      "qi": "Vo5QGHYlRG0pmev6Zh7VHGDafDP_u6JPxu_ZTxnJIZ41-8yPNy0BiX6YY0d5en6Pjvy3xqC02IVwbhYyUX1NwSU61lw60f2icFAUbP-4ooYeKjMZsgSx7_LfpxWB_uOAFRNyNDbPBfYcgX-GzoDI9k9v0wCtNKAxxhrI3_GAtrk",
      "dp": "h9lBrxXJlePZdcfU9RuwY6Qyae1MHHfFKXtaOQp_WyowZQ4BWv5SVV98Gomok1kI4chJSNE3LLNJZvO21q-nypJWzvFeoOaQY0pqdO4WK2ERQizKZIY4qC2oaTKenMowS0aLUmcBIX20__j19VEB60-ai0SJprGXZFygJp6FmQk",
      "dq": "caH9YdcHK85tCHMRMmL-4TvFsHt8jp5OzgRrnWhfBDeIf9u6OHJ1ugeOQX4kiZh51WYMpeIoJQli6nCEAKgwNofu4fXulKwCDjM1H0--yBnYO0a-PysN8Wbzq2YPSffcHtnvqTCYnhzipLKKBg2Y2GTyJDCOp4Rw2vE6nsjK6GU",
      "n": "hx3xzrfGGzQftMz0wkxCKAc4ZiwkSzqJ8H296wE3FH6cUaLDEtuR7ypFyJHz37zTKWEbIOQrmy6NADKR8Jw_DCG7cqoM1M-EPR-7rZeOEWOwuI_9esd-PvUX3xu13riYgX5fTxGn50pCWjpYm-Ml0Qn1jPkAO1qTTvK7KzNdn56BJr1kOWXg4PXVctGjWTQ3F1a_C3zCu4Q1QVmrCtqEJkZp1_6AdqWzIUkl_2Bp8f2Ts29q8sJHbkwpGdbaW9RX_lIQmASJY0UsF3YCNl4JW4CH5E0mbm3VWbS8bAW1nHDLGiW5xl6aTmZKBlx7FkwxTK1DX0co4ApcV_lEC3fG5w"
    },
    {
      "kty": "EC",
      "d": "z9Cc7kqX2-pQDPnQShISIBdmPoBRdmHDap9KRgq0uKg",
      "use": "sig",
      "crv": "P-256",
      "kid": "e9c23ce1-48c0-43fc-9452-42ac935ef7b2",
      "x": "v-BcAFwxCDDlXuRoxs-X1aS8voWtBim_P2gvCEQ4U2U",
      "y": "8q90hUWufd-p-ZcRHDTRbGvhsMON-uGdqvQrOAb7DlQ"
    },
    {
      "kty": "EC",
      "d": "Vk00tdF2teHbvMYtqlZDk8cDEe8GWBhwk2uMo_QvxjA",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "848d33c3-84cc-4ec4-afa5-4bdc17ee5b01",
      "x": "i5hJSJK9oeRGpV-o8WmpxnyeNWWEDOxk7N6rpmQ4008",
      "y": "p-ePrgElKDnGHmxUMP36tRV6yIcOBd5yrlsVZ1WAMCU"
    },
    {
      "kty": "OKP",
      "d": "AwWa_Vof1WoPkAo1Zd1n5vIXTjccsWqu9l3yt7TMfBs",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "2d2bcb3c-cffb-4ea9-be9a-ddb08076e38c",
      "x": "HsNV0pO4IErHTTQaJdjGvNLlrtYz6juSG1KeasliZUQ"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "7bwGnOgH4Rj28XC80ulnoCXtKFkA6LtW6TrYO-tXeUfGEKPPxCBom4CjJ7NpwSA0bbsDgzN2KLELd5tVZ3S9r1bRZtqu4A0XSp3cjmgVq_3t7rg4hxgZ7Bskt3Ienf3lLITYb5vjqXRzdDrGhQa68DBGBqvhcncAhj5GGXiC2bE",
      "kty": "RSA",
      "q": "6GWxL1tmb3ehrzYl608GRA_M_2eVOFOl4twH2mrg1JBrzpBCQm-S8S87q4hnyxim847hZKcZRIqbi7kRuS51m_dtpx6Qqpcl9q6ANokQap-ZiTkOuvt-18MixhTwsC1OQJJFVfU45J9HaJq-iY_fjqQE-SbxtGI-ciTPvEsXiis",
      "d": "pRYmpdPFubJRdgueYx3eo6No4lXRGaN_iXGE4Oj94DDqjGRO8ZTsUqFGpv21X6SE2VQFuJYiAp4rU2akZh5iXsC6CWS6Vw4evxHO0CVXNeGVY5GZgB9DzBMuzQKd4wA6WsW-0DTbUTfOKFbKZ-yb-r9EktUJET3rcOrU6u1OzbNZanyfMOBQEjg9IjPqtw_0uyJirhFCzwJrLl5l7P4sEHKOZO7x06U4mZL3BSqvMIqh03OTh4nkdm2A8IVEpPM_3uLgAt0b5QiBIr6IjqE52vTqnFmureuDDkmKtMQuytqU2VTy9u4jzhfzKNupzGgRSoq3dU-s4YXydGTjimiRgQ",
      "e": "AQAB",
      "use": "enc",
      "kid": "f59534aa-fc84-4e3c-b7c4-a9642b8eb326",
      "qi": "w2vKraM0pccoSzWfMTIiknFXptIE1Qy6h4sTQI6fJ_TTXSdNB8B384rz1MyMFf4qk94cRYvIdV933CVbxke5gLG63EvaqxabewdG2nZTQISkGlPg5PHpO0OBetKGHWTb7j6K-HE-JWICYfm5lwPBsSmo-x8HzlB_Y2bDrve4PrM",
      "dp": "S_0R0A2KlzS3mi0C7heU--ejioYIeFuJSDt66owrBaUfdiomOvZw-WOAwyvh3c1BdOGWGdXVKuSMWcrY3Zy_FNCXVl0IEK2eiEc1PH-gjb041FkmGGhnwMRcVBayGqYRHs3HsMUPXBbQ4JH46oRgNG35tCA0i7XmAQLevT179cE",
      "alg": "RSA-OAEP",
      "dq": "Gixh0TiVB9bMYeRSTvceeInjB5zN5IMfOraXN9Uzrxz411HN9JeGUB2GteHt9qS3INUls2VSZjLKI-lbAqUl38P1GI5LsrrFLswman3zWF7TNu4zJ4HtnjU-9FolZWIk3wbaQj0VBEKgEzriXLHUdscoPDtTm4I5EDfvIYC_jPM",
      "n": "19DVt8knWR6DIyNryC1F7RiOCAqOsZuXZyL7NlfI-mriGlgDN2-JPZKF1UAEZgR5z2Pwn01d5wpN_ql0JYQ4cWvfx0p43CeTEuWefvLnUkKGJNft87-OKYAlv5VZjmFrO1aYH3mS1U4V8DcqF3Gw6C3qErfvsPInlG1ujg3mCI5neP0SQDN41moDDohxrb_2XS-S2ThRD6r2DGzdgiLxnR2VN7FSf9dV23UaUSwo3Z97gYWCvXsVE2HY2pKUZ0UMcfHWoLoxnYAulYwdBnEdpJHk0efIHETB9RkmDfKqbayiCMQVFb5iYwsKl7RWJCUyeDEb-IbkWPGd2afCMTr6uw"
    },
    {
      "kty": "EC",
      "d": "wMpb0FHqNIeRjOyr35AE2dxFNaC5eR6SS3dr25MYVAo",
      "use": "enc",
      "crv": "P-256",
      "kid": "33b083a1-9079-4a31-9f26-11e6a3d6bc88",
      "x": "0VmAffkTSYKMt66YgI1zn6MY-Vng5saBTrP4XXaT6fo",
      "y": "ziYPE42fEcRv-QV3bsuqmX0_P6gZSPMWUdkoVS4l35Q",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "50dc9eb2-7577-4212-8c81-21cbc2c077a5",
      "n": "hx3xzrfGGzQftMz0wkxCKAc4ZiwkSzqJ8H296wE3FH6cUaLDEtuR7ypFyJHz37zTKWEbIOQrmy6NADKR8Jw_DCG7cqoM1M-EPR-7rZeOEWOwuI_9esd-PvUX3xu13riYgX5fTxGn50pCWjpYm-Ml0Qn1jPkAO1qTTvK7KzNdn56BJr1kOWXg4PXVctGjWTQ3F1a_C3zCu4Q1QVmrCtqEJkZp1_6AdqWzIUkl_2Bp8f2Ts29q8sJHbkwpGdbaW9RX_lIQmASJY0UsF3YCNl4JW4CH5E0mbm3VWbS8bAW1nHDLGiW5xl6aTmZKBlx7FkwxTK1DX0co4ApcV_lEC3fG5w"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "fd5085d2-a9bc-45eb-84ee-e7177c4cfbc8",
      "n": "z8MuWajY6yTUAWtjUyWtbzLGdXHMpMYtVpcbZak2XKmv0PrvApWtenfu87AE4LGSeMX2T0vng2IF_RolwsdPSsdRMhm13yc6yZ9LgKA7ujgTuvLnLhHhmMnzjbbPkZ80MCXwsGQC_L4YHG0p8X2pHEBs2nJeJpFQHjoeVL_P3Zkx12-wBgSB_oqI-YVufqjSFvBdk92WkE1tDj5CRXHRwzl7uBRw8GsE_-UctdlGhmoNF0i4Pu-35hRMDXFDzjiGpdvsQ9LAWkLDxi5ljyKIk-Ynr4SzjqRbkYffbQYlBpTIFHnk2DvTpFERGcBq_OjyVBAqcC3IjLxGPIWrMikddQ"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "e9c23ce1-48c0-43fc-9452-42ac935ef7b2",
      "x": "v-BcAFwxCDDlXuRoxs-X1aS8voWtBim_P2gvCEQ4U2U",
      "y": "8q90hUWufd-p-ZcRHDTRbGvhsMON-uGdqvQrOAb7DlQ"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "d10500a2-ec0b-4c19-9de0-071ebfffa9f0",
      "x": "JRZYr2QohTB0jnPbtj05pzRvuOi_mabE-Vs083BRyVY",
      "y": "GW5S_lZGgZ1C-DHmCRDsk7hap7PiGososec9hiP0NQM"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "848d33c3-84cc-4ec4-afa5-4bdc17ee5b01",
      "x": "i5hJSJK9oeRGpV-o8WmpxnyeNWWEDOxk7N6rpmQ4008",
      "y": "p-ePrgElKDnGHmxUMP36tRV6yIcOBd5yrlsVZ1WAMCU"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "2d2bcb3c-cffb-4ea9-be9a-ddb08076e38c",
      "x": "HsNV0pO4IErHTTQaJdjGvNLlrtYz6juSG1KeasliZUQ"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "f59534aa-fc84-4e3c-b7c4-a9642b8eb326",
      "alg": "RSA-OAEP",
      "n": "19DVt8knWR6DIyNryC1F7RiOCAqOsZuXZyL7NlfI-mriGlgDN2-JPZKF1UAEZgR5z2Pwn01d5wpN_ql0JYQ4cWvfx0p43CeTEuWefvLnUkKGJNft87-OKYAlv5VZjmFrO1aYH3mS1U4V8DcqF3Gw6C3qErfvsPInlG1ujg3mCI5neP0SQDN41moDDohxrb_2XS-S2ThRD6r2DGzdgiLxnR2VN7FSf9dV23UaUSwo3Z97gYWCvXsVE2HY2pKUZ0UMcfHWoLoxnYAulYwdBnEdpJHk0efIHETB9RkmDfKqbayiCMQVFb5iYwsKl7RWJCUyeDEb-IbkWPGd2afCMTr6uw"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "33b083a1-9079-4a31-9f26-11e6a3d6bc88",
      "x": "0VmAffkTSYKMt66YgI1zn6MY-Vng5saBTrP4XXaT6fo",
      "y": "ziYPE42fEcRv-QV3bsuqmX0_P6gZSPMWUdkoVS4l35Q",
      "alg": "ECDH-ES"
    }
  ]
}
2020-09-01 12:50:28 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2020-09-01 12:50:28 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2020-09-01 12:50:28 SUCCESS
OIDCCLoadUserInfo
Added user information
user_info
{
  "sub": "user-subject-1234531",
  "name": "Demo T. User",
  "given_name": "Demo",
  "family_name": "User",
  "middle_name": "Theresa",
  "nickname": "Dee",
  "preferred_username": "d.tu",
  "gender": "female",
  "birthdate": "2000-02-03",
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "zoneinfo": "America/Los_Angeles",
  "locale": "en-US",
  "phone_number": "+1 555 5550000",
  "phone_number_verified": false,
  "email": "user@example.com",
  "email_verified": false,
  "website": "https://openid.net/",
  "updated_at": "1580000000"
}
2020-09-01 12:50:28 SUCCESS
GetDynamicClientConfiguration
No client details on configuration, created an empty dynamic_client_registration_template object.
2020-09-01 12:50:28
oidcc-client-test-invalid-aud
Setup Done
2020-09-01 12:50:29 INCOMING
oidcc-client-test-invalid-aud
Incoming HTTP request to test instance JFY9b3ZuB1S0ejN
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
.well-known/openid-configuration
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Discovery endpoint
2020-09-01 12:50:29 OUTGOING
oidcc-client-test-invalid-aud
Response to HTTP request to test instance JFY9b3ZuB1S0ejN
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "issuer": "https://www.certification.openid.net/test/JFY9b3ZuB1S0ejN/",
  "authorization_endpoint": "https://www.certification.openid.net/test/JFY9b3ZuB1S0ejN/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/JFY9b3ZuB1S0ejN/token",
  "jwks_uri": "https://www.certification.openid.net/test/JFY9b3ZuB1S0ejN/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/JFY9b3ZuB1S0ejN/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/JFY9b3ZuB1S0ejN/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
outgoing_path
.well-known/openid-configuration
2020-09-01 12:50:29 INCOMING
oidcc-client-test-invalid-aud
Incoming HTTP request to test instance JFY9b3ZuB1S0ejN
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "content-type": "application/json",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "181",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
register
incoming_body_form_params
incoming_method
POST
incoming_body_json
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ]
}
incoming_query_string_params
{}
incoming_body
{"token_endpoint_auth_method":"client_secret_basic","response_types":["code id_token"],"grant_types":["authorization_code","implicit"],"redirect_uris":["https://rp.example.com/cb"]}
Registration endpoint
2020-09-01 12:50:29 SUCCESS
OIDCCExtractDynamicRegistrationRequest
Extracted dynamic client registration request
request
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ]
}
2020-09-01 12:50:29 INFO
EnsureRegistrationRequestContainsAtLeastOneContact
This application requires that registration requests contain at least one contact.
2020-09-01 12:50:29 SUCCESS
ValidateClientGrantTypes
grant_types match response_types
grant_types
[
  "authorization_code",
  "implicit"
]
response_types
[
  "code id_token"
]
2020-09-01 12:50:29 SUCCESS
OIDCCValidateClientRedirectUris
Valid redirect_uri(s) provided in registration request
redirect_uris
[
  "https://rp.example.com/cb"
]
2020-09-01 12:50:29 SUCCESS
ValidateClientLogoUris
Client does not contain any logo_uri
2020-09-01 12:50:29 SUCCESS
ValidateClientUris
Client does not contain any client_uri
2020-09-01 12:50:29 SUCCESS
ValidateClientPolicyUris
Client does not contain any policy_uri
2020-09-01 12:50:29 SUCCESS
ValidateClientTosUris
Client does not contain any tos_uri
2020-09-01 12:50:29 SUCCESS
ValidateClientSubjectType
A subject_type was not provided
2020-09-01 12:50:29 INFO
ValidateIdTokenSignedResponseAlg
Skipped evaluation due to missing required element: client id_token_signed_response_alg
path
id_token_signed_response_alg
mapped
object
client
2020-09-01 12:50:29 SUCCESS
EnsureIdTokenEncryptedResponseAlgIsSetIfEncIsSet
id_token_encrypted_response_enc is not set
2020-09-01 12:50:29 INFO
ValidateUserinfoSignedResponseAlg
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2020-09-01 12:50:29 SUCCESS
EnsureUserinfoEncryptedResponseAlgIsSetIfEncIsSet
userinfo_encrypted_response_enc is not set
2020-09-01 12:50:29 INFO
ValidateRequestObjectSigningAlg
Skipped evaluation due to missing required element: client request_object_signing_alg
path
request_object_signing_alg
mapped
object
client
2020-09-01 12:50:29 SUCCESS
EnsureRequestObjectEncryptionAlgIsSetIfEncIsSet
request_object_encryption_enc is not set
2020-09-01 12:50:29 INFO
ValidateTokenEndpointAuthSigningAlg
Skipped evaluation due to missing required element: client token_endpoint_auth_signing_alg
path
token_endpoint_auth_signing_alg
mapped
object
client
2020-09-01 12:50:29 SUCCESS
ValidateDefaultMaxAge
default_max_age is not set
2020-09-01 12:50:29 INFO
ValidateRequireAuthTime
Skipped evaluation due to missing required element: client require_auth_time
path
require_auth_time
mapped
object
client
2020-09-01 12:50:29 INFO
ValidateDefaultAcrValues
Skipped evaluation due to missing required element: client default_acr_values
path
default_acr_values
mapped
object
client
2020-09-01 12:50:29 INFO
ValidateInitiateLoginUri
Skipped evaluation due to missing required element: client initiate_login_uri
path
initiate_login_uri
mapped
object
client
2020-09-01 12:50:29 INFO
ValidateRequestUris
Skipped evaluation due to missing required element: client request_uris
path
request_uris
mapped
object
client
2020-09-01 12:50:29 SUCCESS
ValidateClientRegistrationRequestSectorIdentifierUri
A sector_identifier_uri was not provided
2020-09-01 12:50:29 SUCCESS
OIDCCRegisterClient
Registered client
client
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_pQOwyPHUbRvGElA13789~\u0026}!`"
}
2020-09-01 12:50:29
OIDCCCreateClientSecretForDynamicClient
Set the secret for registered client
client_secret
secret_JmNHpJuiEkqXgSKEOQlrjopcQeeJmWpUNvHCvLykzArGkgYlaB2062725881~!!}{
2020-09-01 12:50:29 SUCCESS
EnsureTokenEndPointAuthMethodIsClientSecretBasic
token_endpoint_auth_method is 'client_secret_basic' as expected
2020-09-01 12:50:29 SUCCESS
EnsureClientDoesNotHaveBothJwksAndJwksUri
Client does not have both jwks and jwks_uri set
client
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_pQOwyPHUbRvGElA13789~\u0026}!`",
  "client_secret": "secret_JmNHpJuiEkqXgSKEOQlrjopcQeeJmWpUNvHCvLykzArGkgYlaB2062725881~!!}{"
}
2020-09-01 12:50:29 INFO
FetchClientKeys
Skipped evaluation due to missing required element: client jwks_uri
path
jwks_uri
mapped
object
client
2020-09-01 12:50:29 SUCCESS
OIDCCExtractServerSigningAlg
Using the default algorithm for the first key in server jwks
signing_algorithm
RS256
2020-09-01 12:50:29
SetClientIdTokenSignedResponseAlgToServerSigningAlg
Set id_token_signed_response_alg for the registered client
id_token_signed_response_alg
RS256
2020-09-01 12:50:29 OUTGOING
oidcc-client-test-invalid-aud
Response to HTTP request to test instance JFY9b3ZuB1S0ejN
outgoing_status_code
201
outgoing_headers
{}
outgoing_body
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_pQOwyPHUbRvGElA13789~\u0026}!`",
  "client_secret": "secret_JmNHpJuiEkqXgSKEOQlrjopcQeeJmWpUNvHCvLykzArGkgYlaB2062725881~!!}{",
  "id_token_signed_response_alg": "RS256"
}
outgoing_path
register
2020-09-01 12:50:30 INCOMING
oidcc-client-test-invalid-aud
Incoming HTTP request to test instance JFY9b3ZuB1S0ejN
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "got/9.6.0 (https://github.com/sindresorhus/got)",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
authorize
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "client_id": "client_pQOwyPHUbRvGElA13789~\u0026}!`",
  "scope": "openid",
  "response_type": "code id_token",
  "redirect_uri": "https://rp.example.com/cb",
  "state": "CrFQfOSUmxfmh3YfHSW-N2DdmG8gy6bQzOdd2JIN6LA",
  "nonce": "DAdiCakDfRxZTggXJ5XJLgj9n13dRknykq4d0dJw1oU",
  "response_mode": "form_post"
}
incoming_body
Authorization endpoint
2020-09-01 12:50:30 SUCCESS
EnsureRequestDoesNotContainRequestObject
Request does not contain a request parameter
2020-09-01 12:50:30 SUCCESS
OIDCCEnsureAuthorizationHttpRequestContainsOpenIDScope
Found 'openid' in scope http request parameter
actual
[
  "openid"
]
expected
openid
2020-09-01 12:50:30 SUCCESS
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
effective_authorization_endpoint_request
{
  "client_id": "client_pQOwyPHUbRvGElA13789~\u0026}!`",
  "scope": "openid",
  "response_type": "code id_token",
  "redirect_uri": "https://rp.example.com/cb",
  "state": "CrFQfOSUmxfmh3YfHSW-N2DdmG8gy6bQzOdd2JIN6LA",
  "nonce": "DAdiCakDfRxZTggXJ5XJLgj9n13dRknykq4d0dJw1oU",
  "response_mode": "form_post"
}
2020-09-01 12:50:30 SUCCESS
ExtractRequestedScopes
Requested scopes
scope
openid
2020-09-01 12:50:30 SUCCESS
ExtractNonceFromAuthorizationRequest
Extracted nonce
nonce
DAdiCakDfRxZTggXJ5XJLgj9n13dRknykq4d0dJw1oU
2020-09-01 12:50:30 SUCCESS
EnsureResponseTypeIsCodeIdToken
Response type is expected value
expected
code id_token
2020-09-01 12:50:30 SUCCESS
EnsureMatchingClientId
Client ID matched
client_id
client_pQOwyPHUbRvGElA13789~&}!`
2020-09-01 12:50:30 SUCCESS
EnsureValidRedirectUriForAuthorizationEndpointRequest
redirect_uri is one of the allowed redirect uris
actual
https://rp.example.com/cb
expected
[
  "https://rp.example.com/cb"
]
2020-09-01 12:50:30 SUCCESS
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
actual
[
  "openid"
]
expected
openid
2020-09-01 12:50:30 SUCCESS
DisallowMaxAgeEqualsZeroAndPromptNone
The client did not send max_age=0 and prompt=none parameters as expected
2020-09-01 12:50:30 SUCCESS
CreateAuthorizationCode
Created authorization code
authorization_code
fVTvgJG284
2020-09-01 12:50:30 SUCCESS
CalculateCHash
Successful c_hash encoding
c_hash
nIv3J8uGwJy_bmzJhzd2jQ
2020-09-01 12:50:30 SUCCESS
GenerateIdTokenClaims
Created ID Token Claims
iss
https://www.certification.openid.net/test/JFY9b3ZuB1S0ejN/
sub
user-subject-1234531
aud
client_pQOwyPHUbRvGElA13789~&}!`
nonce
DAdiCakDfRxZTggXJ5XJLgj9n13dRknykq4d0dJw1oU
iat
1598964630
exp
1598964930
2020-09-01 12:50:30 SUCCESS
AddInvalidAudValueToIdToken
Added invalid aud to ID token claims
aud
client_pQOwyPHUbRvGElA13789~&}!`1
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/JFY9b3ZuB1S0ejN/",
  "sub": "user-subject-1234531",
  "aud": "client_pQOwyPHUbRvGElA13789~\u0026}!`1",
  "nonce": "DAdiCakDfRxZTggXJ5XJLgj9n13dRknykq4d0dJw1oU",
  "iat": 1598964630,
  "exp": 1598964930
}
2020-09-01 12:50:30 SUCCESS
AddCHashToIdTokenClaims
Added c_hash to ID token claims
c_hash
nIv3J8uGwJy_bmzJhzd2jQ
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/JFY9b3ZuB1S0ejN/",
  "sub": "user-subject-1234531",
  "aud": "client_pQOwyPHUbRvGElA13789~\u0026}!`1",
  "nonce": "DAdiCakDfRxZTggXJ5XJLgj9n13dRknykq4d0dJw1oU",
  "iat": 1598964630,
  "exp": 1598964930,
  "c_hash": "nIv3J8uGwJy_bmzJhzd2jQ"
}
2020-09-01 12:50:30 INFO
AddAtHashToIdTokenClaims
Skipped evaluation due to missing required string: at_hash
expected
at_hash
2020-09-01 12:50:30 SUCCESS
OIDCCSignIdToken
Signed the ID token
id_token
eyJraWQiOiI1MGRjOWViMi03NTc3LTQyMTItOGM4MS0yMWNiYzJjMDc3YTUiLCJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJ1c2VyLXN1YmplY3QtMTIzNDUzMSIsImF1ZCI6ImNsaWVudF9wUU93eVBIVWJSdkdFbEExMzc4OX4mfSFgMSIsImNfaGFzaCI6Im5JdjNKOHVHd0p5X2JtekpoemQyalEiLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvSkZZOWIzWnVCMVMwZWpOXC8iLCJleHAiOjE1OTg5NjQ5MzAsIm5vbmNlIjoiREFkaUNha0RmUnhaVGdnWEo1WEpMZ2o5bjEzZFJrbnlrcTRkMGRKdzFvVSIsImlhdCI6MTU5ODk2NDYzMH0.C9ID_-kuqYpuZ4txWHfV_6lb1ypjJnCG6JMkeTO3D7YIszooGA8TxfyjpfFTNFWhSKU1XOIo7mfVlloXOYb3a63FkKhreLUGBG9d6OnAEELcrykj_eAbwJMWmmXEnJ_mAKLGwVrbV5e4i8wgBtyn3cmChRuWAmbbl9CVqOvFInZQyV2pAW2hYk5jNwc644zcG6xdfaw34PEavqZwW5FmiQMWOVdMzQH0zUl_2_gvVOlI494IOmZxownlLDWH3O1KPNQ7BAAbEtclHuV1Za-fzVi72i7Z59MAaCV3uJjVUuKIb7fhMlwyR0G4ki40w2TKZ1FX9GJ4sWRWiTTFBYox_A
key
{"p":"v_KhODX1w_gouBXqYXZ1Ca2ycamAl47uKcL3YvhKsiMiGW9aeMVPWUi8SMaUBWryspOimRts2E1vkr8vpmcrMIJwWJ5HcV3iXy25x8L_AlSXfRKCXHkfCXpyt5OOdFbmuW4HogI8_Ze7l6y2xDRAjhioxdl4NflmQVCn5E7cRXk","kty":"RSA","q":"tDR5lmVsztY3UtkLvd38oawEyKoP2LgKFj8SVciMUyXg5itzIoImjvr77i_JI3oRdKtU8_ZsWg4MliFEm1aRw7bvy00NaLF01RQz5ueX-oDGwYoJ36wIQQyhntqWrcRYmaouuh0TlFipmC9eZdAYnhLfSXK0j-I36-SHvLj1N18","d":"BMdsXBFn8mJflLeDGLQ1ytCmkAaTqg2B_32TEBLU7eakhMaq-6nEeZ8XJMb0xz8YgOgsW3d2i2CUICOpwcbk-_rddGrLVWOZm8fZjYRExBywjXaaUpNnxbZJh9ylDCGfU0Uy_cr0E1wvCJ3zsF_SYJhnlPrhpTfI6gvvztFcSF73rLsFa7dWNZYSuaM0Ai8XXjecLB0xtWmV3Q1o1nFVNWJDCbMHCCo6lKehrMHutRTFX0E2GdRkqGuu9likaUMOhlLAOkNkgiVylJzjx5fcu4nO6bjLEJhsJJMDyHz--pzTT841k8kNRrXnRQOMvIPJ9KgqNVrDkc55xFM5btGc4Q","e":"AQAB","use":"sig","kid":"50dc9eb2-7577-4212-8c81-21cbc2c077a5","qi":"Vo5QGHYlRG0pmev6Zh7VHGDafDP_u6JPxu_ZTxnJIZ41-8yPNy0BiX6YY0d5en6Pjvy3xqC02IVwbhYyUX1NwSU61lw60f2icFAUbP-4ooYeKjMZsgSx7_LfpxWB_uOAFRNyNDbPBfYcgX-GzoDI9k9v0wCtNKAxxhrI3_GAtrk","dp":"h9lBrxXJlePZdcfU9RuwY6Qyae1MHHfFKXtaOQp_WyowZQ4BWv5SVV98Gomok1kI4chJSNE3LLNJZvO21q-nypJWzvFeoOaQY0pqdO4WK2ERQizKZIY4qC2oaTKenMowS0aLUmcBIX20__j19VEB60-ai0SJprGXZFygJp6FmQk","dq":"caH9YdcHK85tCHMRMmL-4TvFsHt8jp5OzgRrnWhfBDeIf9u6OHJ1ugeOQX4kiZh51WYMpeIoJQli6nCEAKgwNofu4fXulKwCDjM1H0--yBnYO0a-PysN8Wbzq2YPSffcHtnvqTCYnhzipLKKBg2Y2GTyJDCOp4Rw2vE6nsjK6GU","n":"hx3xzrfGGzQftMz0wkxCKAc4ZiwkSzqJ8H296wE3FH6cUaLDEtuR7ypFyJHz37zTKWEbIOQrmy6NADKR8Jw_DCG7cqoM1M-EPR-7rZeOEWOwuI_9esd-PvUX3xu13riYgX5fTxGn50pCWjpYm-Ml0Qn1jPkAO1qTTvK7KzNdn56BJr1kOWXg4PXVctGjWTQ3F1a_C3zCu4Q1QVmrCtqEJkZp1_6AdqWzIUkl_2Bp8f2Ts29q8sJHbkwpGdbaW9RX_lIQmASJY0UsF3YCNl4JW4CH5E0mbm3VWbS8bAW1nHDLGiW5xl6aTmZKBlx7FkwxTK1DX0co4ApcV_lEC3fG5w"}
algorithm
RS256
2020-09-01 12:50:30 INFO
EncryptIdToken
Skipped evaluation due to missing required element: client id_token_encrypted_response_alg
path
id_token_encrypted_response_alg
mapped
object
client
2020-09-01 12:50:30 SUCCESS
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "CrFQfOSUmxfmh3YfHSW-N2DdmG8gy6bQzOdd2JIN6LA"
}
2020-09-01 12:50:30 SUCCESS
AddCodeToAuthorizationEndpointResponseParams
Added code to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "CrFQfOSUmxfmh3YfHSW-N2DdmG8gy6bQzOdd2JIN6LA",
  "code": "fVTvgJG284"
}
2020-09-01 12:50:30 SUCCESS
AddIdTokenToAuthorizationEndpointResponseParams
Added id_token to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "CrFQfOSUmxfmh3YfHSW-N2DdmG8gy6bQzOdd2JIN6LA",
  "code": "fVTvgJG284",
  "id_token": "eyJraWQiOiI1MGRjOWViMi03NTc3LTQyMTItOGM4MS0yMWNiYzJjMDc3YTUiLCJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJ1c2VyLXN1YmplY3QtMTIzNDUzMSIsImF1ZCI6ImNsaWVudF9wUU93eVBIVWJSdkdFbEExMzc4OX4mfSFgMSIsImNfaGFzaCI6Im5JdjNKOHVHd0p5X2JtekpoemQyalEiLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvSkZZOWIzWnVCMVMwZWpOXC8iLCJleHAiOjE1OTg5NjQ5MzAsIm5vbmNlIjoiREFkaUNha0RmUnhaVGdnWEo1WEpMZ2o5bjEzZFJrbnlrcTRkMGRKdzFvVSIsImlhdCI6MTU5ODk2NDYzMH0.C9ID_-kuqYpuZ4txWHfV_6lb1ypjJnCG6JMkeTO3D7YIszooGA8TxfyjpfFTNFWhSKU1XOIo7mfVlloXOYb3a63FkKhreLUGBG9d6OnAEELcrykj_eAbwJMWmmXEnJ_mAKLGwVrbV5e4i8wgBtyn3cmChRuWAmbbl9CVqOvFInZQyV2pAW2hYk5jNwc644zcG6xdfaw34PEavqZwW5FmiQMWOVdMzQH0zUl_2_gvVOlI494IOmZxownlLDWH3O1KPNQ7BAAbEtclHuV1Za-fzVi72i7Z59MAaCV3uJjVUuKIb7fhMlwyR0G4ki40w2TKZ1FX9GJ4sWRWiTTFBYox_A"
}
2020-09-01 12:50:30 OUTGOING
oidcc-client-test-invalid-aud
Response to HTTP request to test instance JFY9b3ZuB1S0ejN
outgoing
ModelAndView [view="formPostResponseMode"; model={formAction=https://rp.example.com/cb, formParameters={"state":"CrFQfOSUmxfmh3YfHSW-N2DdmG8gy6bQzOdd2JIN6LA","code":"fVTvgJG284","id_token":"eyJraWQiOiI1MGRjOWViMi03NTc3LTQyMTItOGM4MS0yMWNiYzJjMDc3YTUiLCJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJ1c2VyLXN1YmplY3QtMTIzNDUzMSIsImF1ZCI6ImNsaWVudF9wUU93eVBIVWJSdkdFbEExMzc4OX4mfSFgMSIsImNfaGFzaCI6Im5JdjNKOHVHd0p5X2JtekpoemQyalEiLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvSkZZOWIzWnVCMVMwZWpOXC8iLCJleHAiOjE1OTg5NjQ5MzAsIm5vbmNlIjoiREFkaUNha0RmUnhaVGdnWEo1WEpMZ2o5bjEzZFJrbnlrcTRkMGRKdzFvVSIsImlhdCI6MTU5ODk2NDYzMH0.C9ID_-kuqYpuZ4txWHfV_6lb1ypjJnCG6JMkeTO3D7YIszooGA8TxfyjpfFTNFWhSKU1XOIo7mfVlloXOYb3a63FkKhreLUGBG9d6OnAEELcrykj_eAbwJMWmmXEnJ_mAKLGwVrbV5e4i8wgBtyn3cmChRuWAmbbl9CVqOvFInZQyV2pAW2hYk5jNwc644zcG6xdfaw34PEavqZwW5FmiQMWOVdMzQH0zUl_2_gvVOlI494IOmZxownlLDWH3O1KPNQ7BAAbEtclHuV1Za-fzVi72i7Z59MAaCV3uJjVUuKIb7fhMlwyR0G4ki40w2TKZ1FX9GJ4sWRWiTTFBYox_A"}}]
outgoing_path
authorize
2020-09-01 12:50:32 FINISHED
oidcc-client-test-invalid-aud
Test has run to completion
testmodule_result
PASSED
Test Results