Test Summary

Test Results

Expand All Collapse All
All times are UTC
2020-09-01 12:53:40 INFO
TEST-RUNNER
Test instance FJR0bVk06ieXEhd created
baseUrl
https://www.certification.openid.net/test/FJR0bVk06ieXEhd
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code id_token token",
  "request_type": "plain_http_request",
  "response_mode": "form_post",
  "client_registration": "dynamic_client"
}
alias

                                
description
test suite runner for openid-client
planId
l0lJMpv444Mye
config
{
  "description": "test suite runner for openid-client",
  "waitTimeoutSeconds": 2
}
testName
oidcc-client-test-missing-iat
2020-09-01 12:53:40 SUCCESS
OIDCCGenerateServerConfiguration
Generated default server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/FJR0bVk06ieXEhd/",
  "authorization_endpoint": "https://www.certification.openid.net/test/FJR0bVk06ieXEhd/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/FJR0bVk06ieXEhd/token",
  "jwks_uri": "https://www.certification.openid.net/test/FJR0bVk06ieXEhd/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/FJR0bVk06ieXEhd/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/FJR0bVk06ieXEhd/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post",
    "client_secret_jwt",
    "private_key_jwt"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2020-09-01 12:53:40
SetTokenEndpointAuthMethodsSupportedToClientSecretBasicOnly
Changed token_endpoint_auth_methods_supported to client_secret_basic only in server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/FJR0bVk06ieXEhd/",
  "authorization_endpoint": "https://www.certification.openid.net/test/FJR0bVk06ieXEhd/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/FJR0bVk06ieXEhd/token",
  "jwks_uri": "https://www.certification.openid.net/test/FJR0bVk06ieXEhd/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/FJR0bVk06ieXEhd/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/FJR0bVk06ieXEhd/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2020-09-01 12:53:40
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "4b2eTU8FCy9RIB5dXDF1DjKWsjU_sn8YDSk1fD44nsPWgX2PEw-8yFvP3gVn4csJHREm8nZKgy0fVmgqZqQ7y477IhG-P9OTARaiYVq0eFo5ik9S6BSHCYWMPxg5B6LKu15N53qCL2FWTjmfSXGhLt-EWqpoXyEyMjyLa4hjJ8M",
      "kty": "RSA",
      "q": "sx1lKBuBigWItq3EhQgTnOtOQDvWgJaUSmn9tvkjZe3VMaMXxREBvXH9Sdvz6068OBKBozacbRfXH-t7HvNBrQ86CJs-MDgGCFe3lMPC_JNwdbYzdnz0cNxwDLNbuYchuej2DhL7Hc6ln8F4q35Y1EmoKv1noDDCMDitB9edbqU",
      "d": "PvVh6DNhOKdMvFNfMWFubGm7SZFw0SAUGcz2GNeQ32DQYPJei2KakIiuNmxJsWsPZ92WSd0By2LnnfpOxy7Jw5BZmFkJoSXqCqzOpHLsWfJuIhoEfyHF0vyGRhiX63zDa5bisA6QEcVKNmQocCBUWYz9JcESvCFUK-3HOfF8I_vg0Y-PSbij1FknDWkizPx0VORooR9XvWU5jRxOrm1H6OVSFDsVZCMrxMw_aizuT4ChDz0z6U_wXeT50i-QKT1QeJlVliWfDjbBKN4hh7rzBXgIlrhyq5SCSfTQ-n9PLiWxo3GPjogtzbKZTxp6lBEcOBDnYdyWW35REBuBKC2jYQ",
      "e": "AQAB",
      "use": "sig",
      "kid": "e2a23a7b-923f-4600-8327-aa01854bbc7e",
      "qi": "LqFkIhW6L5p6Vt-Q5UCOB_KcUKjAn54abd7XPm_gV_wLg5Qtw6I2kWgITndgv1gXhGpnyf1fIaNwuS-awQSRMZ8L0TOSaWpTc9lrGPHz1fiM0TNv6vv4eRbBmtb0HtB-ePcoDA2MhLXG5hco-Y3A4gVt8wwItso4auMXTnXBAYo",
      "dp": "cN9ABQXKztHk7XthURTFo8i1wvuPEvArlYESZkIyS2g-nFassGpBCammoSvwylyb_PWzlK6DCV4JeknxUYsy_tBKT7mxd_aRXYz0ulsBO-BZPwf0u2hwMNmey3mQInpKhi9cIq8F4yz3W3vCYpW3c1l9s1vbfh16HNZbG_SBJ8M",
      "dq": "JFG8llJlhQA0RZ6cr8EAgRwxpNK9XxupfCFb4gNIyz1bspH4muwk5y47BwQDxN4VSmVuRhMnyvM_muhb8d2vnpDs2pvoE0z45C4tOowreJ3I-wV0D_2sb0ozqk-gNNGS5Ci55AazRssFSIyplFStXHaHFBiIL7JTXgXQCDwPX0U",
      "n": "nfGBXipY8Jm1KwA6__eICLQSOFWNfVLgOqZurDYwH9hUXuKizhzUU0mj4G5hvIxV8zEszCx8atIM8aIhBOA4T5eMr_HogLh-2XUYqurNSWfBzGrW0IPAtATLYhnFytDBj8KtjpL-FSQPyyVD-Ld9LTVBwumfd8npANeePP-g4bThJfaSKRqly_ezqYXL9hE--8yy1sPklDZ24Kw9jVHPhixgKUlfqnN_VgNyVyanZZGY3x-8va1fpd9fOyld2mo96yuftwNPHh3pKuypn5alV3MGoj9RUdtBnAdM2MsjXkLZAibxcBavb2jtuR8vhg-7DHP5Wt3-OTA0qNlyqpVqrw"
    },
    {
      "kty": "EC",
      "d": "R4tg-cFDyvC1hlh7uY27I3qg9QyUZ8XeqqEbSXYLQOQ",
      "use": "sig",
      "crv": "P-256",
      "kid": "8c1da44e-4592-4bb8-a1da-cd7828fd480a",
      "x": "IqsM_27JvlLHXL86Uj8VRDz5seeZXzRj56KcFTcebs8",
      "y": "fTs7MBvaAr3kFoJyXs5aBW7ShRHSb2epsYwfnCw-7yk"
    },
    {
      "kty": "EC",
      "d": "dsrv8FsgkMPTG50_KjHeqgrUVmjPabwcz6h24QtV99c",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "89080899-e6f0-45e3-84f9-b713203641eb",
      "x": "OsH-wxYptRxyDc42lKGSyKsg0TQ6W0EXGhTlpzUFC-I",
      "y": "8FY29UePcvCkSg1aah2dCx0BP8PW2BTAwIwZyhcgw60"
    },
    {
      "kty": "OKP",
      "d": "4_BmOLckiAtmLYRbw5ApM43FC5xD8dZiEJUeN65BMnc",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "9a4ba81a-1d84-4ab0-bd42-eb6eb1357fca",
      "x": "mYKPV6yCCAjznD3voZKZXoxqiqTpjjVBA9sXxEn81vU"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "7MtmAF5xGGjQIN7uanlxv9_vC1k0DF728wPQUvCB9UHgI4TewiffpJVUk_0qg-VosquI8CI_iCvkQUoVv0pk_vZfiNB5Ip6MPpEkiQy_i-RflCvZrBQPIIl2xLjayNvH7AZXUtqkwL_woOoehymlvujtpNfXltpQj0ZiQUo5UK0",
      "kty": "RSA",
      "q": "l0GCuFtGHHSP1OSfcNcfQM5HkFNNo_qIMGPeCNVoE_2eoJJvRPf9MaflSMuuqZgjI4z_sJp-wjKg8RmDd88iu8YUtsNBRmFSBOVMorzKzaS63IQ5O7zRF3aG4ayw9a7Lmce1IYFg5t8Sb9ZKe570G7GTH2Y0My1sf0yg2rol2yM",
      "d": "GdtRkyvzbmn34N92VtgzOkyFl8V7ZW831kUbf2hDRI87eAXaAPqovcmKd2Dv4o8eSNNhNMFGuz_Ap3ZaX3OMtsx_CRk2th6Jc5rAqiAOzPn6vNcZeep85NC8HNjIQV3x8kwE761hWW4bY4jW-qwM43sAOHZud1ZlL6jN9uc3Z_ZoiQX5Pk6lQXFtXzFOu6i0lRvD0eFSyy2vHhIf7JKicUazeXtIkpSYEN0u4iom0LNeTQJRJDxGsOM9DLhIW_tYCnbVC9CrSWqD2a84BtjxxMGXJmfbT52vm78zziDVoVt2yGi929RgWV1pJz1Hgx7_gE5OkOsCZca6C6KbGGELgQ",
      "e": "AQAB",
      "use": "enc",
      "kid": "93631b98-7af2-45ce-a37f-d460449c0a3c",
      "qi": "EKsx-ZlXru3yTxdY8jdBghk7UMhufVZYk3XwGJkldZH5QJs_n6Kq5EWfNf43SYme2KIuSvj4cKwOYHLuvOgdwTdnOJGLK-ZjoXG2dtUbtCTL7PMqjIlAB19HQAgjykeQEfM0ebx6FG6wq7zXxdI8HhERCqKFhfllmVpVAC8X7Pk",
      "dp": "OZnIuDJBBJUKe9R-3nuoReptNa9_T7sSC09UL7i9hDGAGmPJ5CTa7Cg_KLiezPLTIxNC_lb2aWNz5MXmwF-Sbcr0tk0wClHS_61C2-uz9I2bCmoYSxmeDGYj8_qbjdyYpztrpoX1KcYG_L22q15gKS50EHNIyDNXAWM3p3Ystwk",
      "alg": "RSA-OAEP",
      "dq": "Xs0clVf_1Y3pKFIy7JKocAHaMMdFfmVkPpAZdgfrt7vaVGHzg5K7CwhkWP_wdTN5sqqJB7ONh0IcRYDsOYeGCZLZIMO4gdg1hAQDyGvz4HhC9juZc6ugkcgkOgX208W-rp_REzL3_TwLXjU9ccXq0gC2aZOxW_I4coEgwHazi2k",
      "n": "i-iRuO43V4hrF9PZ61cf12nY3Lm549FGHl8QqoVMXGAK-ZpAZePMb_wdx21ie8Bwx-XVj8cXQsIG6oE477k9bcOW8fiOW8HEMBworzDi2qXeqiRRhanopqvQRBO42_I0bCx0Pe9zdlm4AMQG1nff3P8QTkJt3EGIac6TcGJfr8_Qd2c_aQ7eoaiknU_tLInn8ohMJwkO9xjjZlrJUJ7wpM2pYQBKYGUCUUoW7-3_DSYGP_yVYLRgSnCGQY4pqav_2NZPMGzHkGR2RymDgNpXdTjKIrHikCLSvwkjdzqpSFES6BQG4wCAWEkfDaaIXzo0iz0becSBACc9oXukiNsGpw"
    },
    {
      "kty": "EC",
      "d": "FIpoMztAdL88BGfh6P_8bSvrc1IyAk-dqdEhSGmdBQM",
      "use": "enc",
      "crv": "P-256",
      "kid": "cdd79241-cab6-4131-926e-e6daf39f2301",
      "x": "cUBo0MSwX9LAYlauFFZTHCw6JJRVLal5akAdjUSMYOU",
      "y": "WTnv30S9tWXi19VEzvziGDQCmiN_glBC4s5khYk5scE",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "e2a23a7b-923f-4600-8327-aa01854bbc7e",
      "n": "nfGBXipY8Jm1KwA6__eICLQSOFWNfVLgOqZurDYwH9hUXuKizhzUU0mj4G5hvIxV8zEszCx8atIM8aIhBOA4T5eMr_HogLh-2XUYqurNSWfBzGrW0IPAtATLYhnFytDBj8KtjpL-FSQPyyVD-Ld9LTVBwumfd8npANeePP-g4bThJfaSKRqly_ezqYXL9hE--8yy1sPklDZ24Kw9jVHPhixgKUlfqnN_VgNyVyanZZGY3x-8va1fpd9fOyld2mo96yuftwNPHh3pKuypn5alV3MGoj9RUdtBnAdM2MsjXkLZAibxcBavb2jtuR8vhg-7DHP5Wt3-OTA0qNlyqpVqrw"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "88cf7f7c-f023-4bfa-8d4d-1e7ae64bf5cd",
      "n": "rmaWwg9CD4tPoCAN3AqAIVCH4dj9TnkUBYjEvMOFcF6QnVecIRFoM7DrY8y8Q4RglAYmRCLSFFc0dqZeOEyXSZ4mkUiZEzSIkJyTRgfv6YqI-vYHoNJiLiBS1Y6tapsVdtrZtrQIlM-FeWiSwBMn-MnsGUbTh9j-Xqa_gwWLhreFhfwHxdYbD7leEDwsKoE9OH8evCnsw4fGi2IsWgZq7kzWWrr05A0IC72L50g1wpSi130YYLuQNVhJNDkE5-vahcrJ3XnFxc8-JnT_g1wTO-g8zyV3vavVbd-hK8rVboEQ-0FfXGPC_oC1mH3kjHStEBgbQWAMp6QjpJ8MgAWvHQ"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "8c1da44e-4592-4bb8-a1da-cd7828fd480a",
      "x": "IqsM_27JvlLHXL86Uj8VRDz5seeZXzRj56KcFTcebs8",
      "y": "fTs7MBvaAr3kFoJyXs5aBW7ShRHSb2epsYwfnCw-7yk"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "b8274ee0-4934-4732-93d2-ed5de3446cc5",
      "x": "ShZ_I0NAjvo1GraUIQTVO8ukJQ8aoqvJuXrqMcSAfzY",
      "y": "3y4OMczP8GedTw0SmImD5OGDwIjmsyrDEXMOj7jwdNQ"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "89080899-e6f0-45e3-84f9-b713203641eb",
      "x": "OsH-wxYptRxyDc42lKGSyKsg0TQ6W0EXGhTlpzUFC-I",
      "y": "8FY29UePcvCkSg1aah2dCx0BP8PW2BTAwIwZyhcgw60"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "9a4ba81a-1d84-4ab0-bd42-eb6eb1357fca",
      "x": "mYKPV6yCCAjznD3voZKZXoxqiqTpjjVBA9sXxEn81vU"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "93631b98-7af2-45ce-a37f-d460449c0a3c",
      "alg": "RSA-OAEP",
      "n": "i-iRuO43V4hrF9PZ61cf12nY3Lm549FGHl8QqoVMXGAK-ZpAZePMb_wdx21ie8Bwx-XVj8cXQsIG6oE477k9bcOW8fiOW8HEMBworzDi2qXeqiRRhanopqvQRBO42_I0bCx0Pe9zdlm4AMQG1nff3P8QTkJt3EGIac6TcGJfr8_Qd2c_aQ7eoaiknU_tLInn8ohMJwkO9xjjZlrJUJ7wpM2pYQBKYGUCUUoW7-3_DSYGP_yVYLRgSnCGQY4pqav_2NZPMGzHkGR2RymDgNpXdTjKIrHikCLSvwkjdzqpSFES6BQG4wCAWEkfDaaIXzo0iz0becSBACc9oXukiNsGpw"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "cdd79241-cab6-4131-926e-e6daf39f2301",
      "x": "cUBo0MSwX9LAYlauFFZTHCw6JJRVLal5akAdjUSMYOU",
      "y": "WTnv30S9tWXi19VEzvziGDQCmiN_glBC4s5khYk5scE",
      "alg": "ECDH-ES"
    }
  ]
}
2020-09-01 12:53:40 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2020-09-01 12:53:40 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2020-09-01 12:53:40 SUCCESS
OIDCCLoadUserInfo
Added user information
user_info
{
  "sub": "user-subject-1234531",
  "name": "Demo T. User",
  "given_name": "Demo",
  "family_name": "User",
  "middle_name": "Theresa",
  "nickname": "Dee",
  "preferred_username": "d.tu",
  "gender": "female",
  "birthdate": "2000-02-03",
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "zoneinfo": "America/Los_Angeles",
  "locale": "en-US",
  "phone_number": "+1 555 5550000",
  "phone_number_verified": false,
  "email": "user@example.com",
  "email_verified": false,
  "website": "https://openid.net/",
  "updated_at": "1580000000"
}
2020-09-01 12:53:40 SUCCESS
GetDynamicClientConfiguration
No client details on configuration, created an empty dynamic_client_registration_template object.
2020-09-01 12:53:40
oidcc-client-test-missing-iat
Setup Done
2020-09-01 12:53:43 INCOMING
oidcc-client-test-missing-iat
Incoming HTTP request to test instance FJR0bVk06ieXEhd
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
.well-known/openid-configuration
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Discovery endpoint
2020-09-01 12:53:43 OUTGOING
oidcc-client-test-missing-iat
Response to HTTP request to test instance FJR0bVk06ieXEhd
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "issuer": "https://www.certification.openid.net/test/FJR0bVk06ieXEhd/",
  "authorization_endpoint": "https://www.certification.openid.net/test/FJR0bVk06ieXEhd/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/FJR0bVk06ieXEhd/token",
  "jwks_uri": "https://www.certification.openid.net/test/FJR0bVk06ieXEhd/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/FJR0bVk06ieXEhd/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/FJR0bVk06ieXEhd/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
outgoing_path
.well-known/openid-configuration
2020-09-01 12:53:43 INCOMING
oidcc-client-test-missing-iat
Incoming HTTP request to test instance FJR0bVk06ieXEhd
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "content-type": "application/json",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "187",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
register
incoming_body_form_params
incoming_method
POST
incoming_body_json
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ]
}
incoming_query_string_params
{}
incoming_body
{"token_endpoint_auth_method":"client_secret_basic","response_types":["code id_token token"],"grant_types":["authorization_code","implicit"],"redirect_uris":["https://rp.example.com/cb"]}
Registration endpoint
2020-09-01 12:53:43 SUCCESS
OIDCCExtractDynamicRegistrationRequest
Extracted dynamic client registration request
request
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ]
}
2020-09-01 12:53:43 INFO
EnsureRegistrationRequestContainsAtLeastOneContact
This application requires that registration requests contain at least one contact.
2020-09-01 12:53:43 SUCCESS
ValidateClientGrantTypes
grant_types match response_types
grant_types
[
  "authorization_code",
  "implicit"
]
response_types
[
  "code id_token token"
]
2020-09-01 12:53:43 SUCCESS
OIDCCValidateClientRedirectUris
Valid redirect_uri(s) provided in registration request
redirect_uris
[
  "https://rp.example.com/cb"
]
2020-09-01 12:53:43 SUCCESS
ValidateClientLogoUris
Client does not contain any logo_uri
2020-09-01 12:53:43 SUCCESS
ValidateClientUris
Client does not contain any client_uri
2020-09-01 12:53:43 SUCCESS
ValidateClientPolicyUris
Client does not contain any policy_uri
2020-09-01 12:53:43 SUCCESS
ValidateClientTosUris
Client does not contain any tos_uri
2020-09-01 12:53:43 SUCCESS
ValidateClientSubjectType
A subject_type was not provided
2020-09-01 12:53:43 INFO
ValidateIdTokenSignedResponseAlg
Skipped evaluation due to missing required element: client id_token_signed_response_alg
path
id_token_signed_response_alg
mapped
object
client
2020-09-01 12:53:43 SUCCESS
EnsureIdTokenEncryptedResponseAlgIsSetIfEncIsSet
id_token_encrypted_response_enc is not set
2020-09-01 12:53:43 INFO
ValidateUserinfoSignedResponseAlg
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2020-09-01 12:53:43 SUCCESS
EnsureUserinfoEncryptedResponseAlgIsSetIfEncIsSet
userinfo_encrypted_response_enc is not set
2020-09-01 12:53:43 INFO
ValidateRequestObjectSigningAlg
Skipped evaluation due to missing required element: client request_object_signing_alg
path
request_object_signing_alg
mapped
object
client
2020-09-01 12:53:43 SUCCESS
EnsureRequestObjectEncryptionAlgIsSetIfEncIsSet
request_object_encryption_enc is not set
2020-09-01 12:53:43 INFO
ValidateTokenEndpointAuthSigningAlg
Skipped evaluation due to missing required element: client token_endpoint_auth_signing_alg
path
token_endpoint_auth_signing_alg
mapped
object
client
2020-09-01 12:53:43 SUCCESS
ValidateDefaultMaxAge
default_max_age is not set
2020-09-01 12:53:43 INFO
ValidateRequireAuthTime
Skipped evaluation due to missing required element: client require_auth_time
path
require_auth_time
mapped
object
client
2020-09-01 12:53:43 INFO
ValidateDefaultAcrValues
Skipped evaluation due to missing required element: client default_acr_values
path
default_acr_values
mapped
object
client
2020-09-01 12:53:43 INFO
ValidateInitiateLoginUri
Skipped evaluation due to missing required element: client initiate_login_uri
path
initiate_login_uri
mapped
object
client
2020-09-01 12:53:43 INFO
ValidateRequestUris
Skipped evaluation due to missing required element: client request_uris
path
request_uris
mapped
object
client
2020-09-01 12:53:43 SUCCESS
ValidateClientRegistrationRequestSectorIdentifierUri
A sector_identifier_uri was not provided
2020-09-01 12:53:43 SUCCESS
OIDCCRegisterClient
Registered client
client
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_qpiTPNBLADNaYPP95043[*#$."
}
2020-09-01 12:53:43
OIDCCCreateClientSecretForDynamicClient
Set the secret for registered client
client_secret
secret_qhdcUBnivgoDVyMzOUnaRtrSTNfVkdRgoiedQmXJIEWbAtnwaV1848475422!(=|/
2020-09-01 12:53:43 SUCCESS
EnsureTokenEndPointAuthMethodIsClientSecretBasic
token_endpoint_auth_method is 'client_secret_basic' as expected
2020-09-01 12:53:43 SUCCESS
EnsureClientDoesNotHaveBothJwksAndJwksUri
Client does not have both jwks and jwks_uri set
client
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_qpiTPNBLADNaYPP95043[*#$.",
  "client_secret": "secret_qhdcUBnivgoDVyMzOUnaRtrSTNfVkdRgoiedQmXJIEWbAtnwaV1848475422!(\u003d|/"
}
2020-09-01 12:53:43 INFO
FetchClientKeys
Skipped evaluation due to missing required element: client jwks_uri
path
jwks_uri
mapped
object
client
2020-09-01 12:53:43 SUCCESS
OIDCCExtractServerSigningAlg
Using the default algorithm for the first key in server jwks
signing_algorithm
RS256
2020-09-01 12:53:43
SetClientIdTokenSignedResponseAlgToServerSigningAlg
Set id_token_signed_response_alg for the registered client
id_token_signed_response_alg
RS256
2020-09-01 12:53:43 OUTGOING
oidcc-client-test-missing-iat
Response to HTTP request to test instance FJR0bVk06ieXEhd
outgoing_status_code
201
outgoing_headers
{}
outgoing_body
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_qpiTPNBLADNaYPP95043[*#$.",
  "client_secret": "secret_qhdcUBnivgoDVyMzOUnaRtrSTNfVkdRgoiedQmXJIEWbAtnwaV1848475422!(\u003d|/",
  "id_token_signed_response_alg": "RS256"
}
outgoing_path
register
2020-09-01 12:53:44 INCOMING
oidcc-client-test-missing-iat
Incoming HTTP request to test instance FJR0bVk06ieXEhd
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "got/9.6.0 (https://github.com/sindresorhus/got)",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
authorize
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "client_id": "client_qpiTPNBLADNaYPP95043[*#$.",
  "scope": "openid",
  "response_type": "code id_token token",
  "redirect_uri": "https://rp.example.com/cb",
  "state": "n0CVuHjlthrwrr5aF-blE_Y7r0cj9KBFsYluSVnzV1s",
  "nonce": "2QCYJIf8eDnVNbd1yKNxfEu1ALO2eh9j6vvvAEebIl8",
  "response_mode": "form_post"
}
incoming_body
Authorization endpoint
2020-09-01 12:53:44 SUCCESS
EnsureRequestDoesNotContainRequestObject
Request does not contain a request parameter
2020-09-01 12:53:44 SUCCESS
OIDCCEnsureAuthorizationHttpRequestContainsOpenIDScope
Found 'openid' in scope http request parameter
actual
[
  "openid"
]
expected
openid
2020-09-01 12:53:44 SUCCESS
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
effective_authorization_endpoint_request
{
  "client_id": "client_qpiTPNBLADNaYPP95043[*#$.",
  "scope": "openid",
  "response_type": "code id_token token",
  "redirect_uri": "https://rp.example.com/cb",
  "state": "n0CVuHjlthrwrr5aF-blE_Y7r0cj9KBFsYluSVnzV1s",
  "nonce": "2QCYJIf8eDnVNbd1yKNxfEu1ALO2eh9j6vvvAEebIl8",
  "response_mode": "form_post"
}
2020-09-01 12:53:44 SUCCESS
ExtractRequestedScopes
Requested scopes
scope
openid
2020-09-01 12:53:44 SUCCESS
ExtractNonceFromAuthorizationRequest
Extracted nonce
nonce
2QCYJIf8eDnVNbd1yKNxfEu1ALO2eh9j6vvvAEebIl8
2020-09-01 12:53:44 SUCCESS
EnsureResponseTypeIsCodeIdTokenToken
Response type is expected value
expected
code id_token token
2020-09-01 12:53:44 SUCCESS
EnsureMatchingClientId
Client ID matched
client_id
client_qpiTPNBLADNaYPP95043[*#$.
2020-09-01 12:53:44 SUCCESS
EnsureValidRedirectUriForAuthorizationEndpointRequest
redirect_uri is one of the allowed redirect uris
actual
https://rp.example.com/cb
expected
[
  "https://rp.example.com/cb"
]
2020-09-01 12:53:44 SUCCESS
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
actual
[
  "openid"
]
expected
openid
2020-09-01 12:53:44 SUCCESS
DisallowMaxAgeEqualsZeroAndPromptNone
The client did not send max_age=0 and prompt=none parameters as expected
2020-09-01 12:53:44 SUCCESS
CreateAuthorizationCode
Created authorization code
authorization_code
2ABhXvcXIL
2020-09-01 12:53:44 SUCCESS
CalculateCHash
Successful c_hash encoding
c_hash
-JmmPg8wUSCRkBozqisAyQ
2020-09-01 12:53:44 SUCCESS
GenerateBearerAccessToken
Generated access token
access_token
41Z7KyGZ6r1AjtwcBBKdgMXsqcyLXINNaASgF9CuBuYdVUtmQ4
2020-09-01 12:53:44 SUCCESS
CalculateAtHash
Successful at_hash encoding
at_hash
MVkVZPh7SRHVnv9XvGs3Ug
2020-09-01 12:53:44 SUCCESS
GenerateIdTokenClaims
Created ID Token Claims
iss
https://www.certification.openid.net/test/FJR0bVk06ieXEhd/
sub
user-subject-1234531
aud
client_qpiTPNBLADNaYPP95043[*#$.
nonce
2QCYJIf8eDnVNbd1yKNxfEu1ALO2eh9j6vvvAEebIl8
iat
1598964824
exp
1598965124
2020-09-01 12:53:44 SUCCESS
RemoveIatFromIdToken
Removed iat from ID token claims
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/FJR0bVk06ieXEhd/",
  "sub": "user-subject-1234531",
  "aud": "client_qpiTPNBLADNaYPP95043[*#$.",
  "nonce": "2QCYJIf8eDnVNbd1yKNxfEu1ALO2eh9j6vvvAEebIl8",
  "exp": 1598965124
}
2020-09-01 12:53:44 SUCCESS
AddCHashToIdTokenClaims
Added c_hash to ID token claims
c_hash
-JmmPg8wUSCRkBozqisAyQ
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/FJR0bVk06ieXEhd/",
  "sub": "user-subject-1234531",
  "aud": "client_qpiTPNBLADNaYPP95043[*#$.",
  "nonce": "2QCYJIf8eDnVNbd1yKNxfEu1ALO2eh9j6vvvAEebIl8",
  "exp": 1598965124,
  "c_hash": "-JmmPg8wUSCRkBozqisAyQ"
}
2020-09-01 12:53:44 SUCCESS
AddAtHashToIdTokenClaims
Added at_hash to ID token claims
at_hash
MVkVZPh7SRHVnv9XvGs3Ug
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/FJR0bVk06ieXEhd/",
  "sub": "user-subject-1234531",
  "aud": "client_qpiTPNBLADNaYPP95043[*#$.",
  "nonce": "2QCYJIf8eDnVNbd1yKNxfEu1ALO2eh9j6vvvAEebIl8",
  "exp": 1598965124,
  "c_hash": "-JmmPg8wUSCRkBozqisAyQ",
  "at_hash": "MVkVZPh7SRHVnv9XvGs3Ug"
}
2020-09-01 12:53:44 SUCCESS
OIDCCSignIdToken
Signed the ID token
id_token
eyJraWQiOiJlMmEyM2E3Yi05MjNmLTQ2MDAtODMyNy1hYTAxODU0YmJjN2UiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiTVZrVlpQaDdTUkhWbnY5WHZHczNVZyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X3FwaVRQTkJMQUROYVlQUDk1MDQzWyojJC4iLCJjX2hhc2giOiItSm1tUGc4d1VTQ1JrQm96cWlzQXlRIiwiaXNzIjoiaHR0cHM6XC9cL3d3dy5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXRcL3Rlc3RcL0ZKUjBiVmswNmllWEVoZFwvIiwiZXhwIjoxNTk4OTY1MTI0LCJub25jZSI6IjJRQ1lKSWY4ZURuVk5iZDF5S054ZkV1MUFMTzJlaDlqNnZ2dkFFZWJJbDgifQ.MeEkYo2PvnKAOBQ55uaJv8ifLSqKrXiQ6I26Uk7yYB4CVwkRC1WHH1yDF9YJRHK0rhav840E7rnp15Ey0A6Nqb0i0ikIoJz5vcylUbj6SHDgiS8kV_zay_PR7jX4Z8S-Zct9OjS-hQSsYzXDIlRzKyFjCX33k3ZYoAiJ6bTBNsQlzIRQAk75eql_Dxgti33eNcVpHc8knCp6-IXTuUid-aCVp0PvEDB-GEo2JlF9npQzsF6niSZzPpUF0ci1NT2Po6Sh1KyBYmHre2y1miHFBff_iACOB5P2l7GdT-bPDrlbcRm6oRYxGMxCs06f_XcgB0LfGWb8LSo9AiW27Gj7yA
key
{"p":"4b2eTU8FCy9RIB5dXDF1DjKWsjU_sn8YDSk1fD44nsPWgX2PEw-8yFvP3gVn4csJHREm8nZKgy0fVmgqZqQ7y477IhG-P9OTARaiYVq0eFo5ik9S6BSHCYWMPxg5B6LKu15N53qCL2FWTjmfSXGhLt-EWqpoXyEyMjyLa4hjJ8M","kty":"RSA","q":"sx1lKBuBigWItq3EhQgTnOtOQDvWgJaUSmn9tvkjZe3VMaMXxREBvXH9Sdvz6068OBKBozacbRfXH-t7HvNBrQ86CJs-MDgGCFe3lMPC_JNwdbYzdnz0cNxwDLNbuYchuej2DhL7Hc6ln8F4q35Y1EmoKv1noDDCMDitB9edbqU","d":"PvVh6DNhOKdMvFNfMWFubGm7SZFw0SAUGcz2GNeQ32DQYPJei2KakIiuNmxJsWsPZ92WSd0By2LnnfpOxy7Jw5BZmFkJoSXqCqzOpHLsWfJuIhoEfyHF0vyGRhiX63zDa5bisA6QEcVKNmQocCBUWYz9JcESvCFUK-3HOfF8I_vg0Y-PSbij1FknDWkizPx0VORooR9XvWU5jRxOrm1H6OVSFDsVZCMrxMw_aizuT4ChDz0z6U_wXeT50i-QKT1QeJlVliWfDjbBKN4hh7rzBXgIlrhyq5SCSfTQ-n9PLiWxo3GPjogtzbKZTxp6lBEcOBDnYdyWW35REBuBKC2jYQ","e":"AQAB","use":"sig","kid":"e2a23a7b-923f-4600-8327-aa01854bbc7e","qi":"LqFkIhW6L5p6Vt-Q5UCOB_KcUKjAn54abd7XPm_gV_wLg5Qtw6I2kWgITndgv1gXhGpnyf1fIaNwuS-awQSRMZ8L0TOSaWpTc9lrGPHz1fiM0TNv6vv4eRbBmtb0HtB-ePcoDA2MhLXG5hco-Y3A4gVt8wwItso4auMXTnXBAYo","dp":"cN9ABQXKztHk7XthURTFo8i1wvuPEvArlYESZkIyS2g-nFassGpBCammoSvwylyb_PWzlK6DCV4JeknxUYsy_tBKT7mxd_aRXYz0ulsBO-BZPwf0u2hwMNmey3mQInpKhi9cIq8F4yz3W3vCYpW3c1l9s1vbfh16HNZbG_SBJ8M","dq":"JFG8llJlhQA0RZ6cr8EAgRwxpNK9XxupfCFb4gNIyz1bspH4muwk5y47BwQDxN4VSmVuRhMnyvM_muhb8d2vnpDs2pvoE0z45C4tOowreJ3I-wV0D_2sb0ozqk-gNNGS5Ci55AazRssFSIyplFStXHaHFBiIL7JTXgXQCDwPX0U","n":"nfGBXipY8Jm1KwA6__eICLQSOFWNfVLgOqZurDYwH9hUXuKizhzUU0mj4G5hvIxV8zEszCx8atIM8aIhBOA4T5eMr_HogLh-2XUYqurNSWfBzGrW0IPAtATLYhnFytDBj8KtjpL-FSQPyyVD-Ld9LTVBwumfd8npANeePP-g4bThJfaSKRqly_ezqYXL9hE--8yy1sPklDZ24Kw9jVHPhixgKUlfqnN_VgNyVyanZZGY3x-8va1fpd9fOyld2mo96yuftwNPHh3pKuypn5alV3MGoj9RUdtBnAdM2MsjXkLZAibxcBavb2jtuR8vhg-7DHP5Wt3-OTA0qNlyqpVqrw"}
algorithm
RS256
2020-09-01 12:53:44 INFO
EncryptIdToken
Skipped evaluation due to missing required element: client id_token_encrypted_response_alg
path
id_token_encrypted_response_alg
mapped
object
client
2020-09-01 12:53:44 SUCCESS
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "n0CVuHjlthrwrr5aF-blE_Y7r0cj9KBFsYluSVnzV1s"
}
2020-09-01 12:53:44 SUCCESS
AddCodeToAuthorizationEndpointResponseParams
Added code to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "n0CVuHjlthrwrr5aF-blE_Y7r0cj9KBFsYluSVnzV1s",
  "code": "2ABhXvcXIL"
}
2020-09-01 12:53:44 SUCCESS
AddIdTokenToAuthorizationEndpointResponseParams
Added id_token to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "n0CVuHjlthrwrr5aF-blE_Y7r0cj9KBFsYluSVnzV1s",
  "code": "2ABhXvcXIL",
  "id_token": "eyJraWQiOiJlMmEyM2E3Yi05MjNmLTQ2MDAtODMyNy1hYTAxODU0YmJjN2UiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiTVZrVlpQaDdTUkhWbnY5WHZHczNVZyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X3FwaVRQTkJMQUROYVlQUDk1MDQzWyojJC4iLCJjX2hhc2giOiItSm1tUGc4d1VTQ1JrQm96cWlzQXlRIiwiaXNzIjoiaHR0cHM6XC9cL3d3dy5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXRcL3Rlc3RcL0ZKUjBiVmswNmllWEVoZFwvIiwiZXhwIjoxNTk4OTY1MTI0LCJub25jZSI6IjJRQ1lKSWY4ZURuVk5iZDF5S054ZkV1MUFMTzJlaDlqNnZ2dkFFZWJJbDgifQ.MeEkYo2PvnKAOBQ55uaJv8ifLSqKrXiQ6I26Uk7yYB4CVwkRC1WHH1yDF9YJRHK0rhav840E7rnp15Ey0A6Nqb0i0ikIoJz5vcylUbj6SHDgiS8kV_zay_PR7jX4Z8S-Zct9OjS-hQSsYzXDIlRzKyFjCX33k3ZYoAiJ6bTBNsQlzIRQAk75eql_Dxgti33eNcVpHc8knCp6-IXTuUid-aCVp0PvEDB-GEo2JlF9npQzsF6niSZzPpUF0ci1NT2Po6Sh1KyBYmHre2y1miHFBff_iACOB5P2l7GdT-bPDrlbcRm6oRYxGMxCs06f_XcgB0LfGWb8LSo9AiW27Gj7yA"
}
2020-09-01 12:53:44
AddTokenToAuthorizationEndpointResponseParams
Added token and token_type to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "n0CVuHjlthrwrr5aF-blE_Y7r0cj9KBFsYluSVnzV1s",
  "code": "2ABhXvcXIL",
  "id_token": "eyJraWQiOiJlMmEyM2E3Yi05MjNmLTQ2MDAtODMyNy1hYTAxODU0YmJjN2UiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiTVZrVlpQaDdTUkhWbnY5WHZHczNVZyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X3FwaVRQTkJMQUROYVlQUDk1MDQzWyojJC4iLCJjX2hhc2giOiItSm1tUGc4d1VTQ1JrQm96cWlzQXlRIiwiaXNzIjoiaHR0cHM6XC9cL3d3dy5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXRcL3Rlc3RcL0ZKUjBiVmswNmllWEVoZFwvIiwiZXhwIjoxNTk4OTY1MTI0LCJub25jZSI6IjJRQ1lKSWY4ZURuVk5iZDF5S054ZkV1MUFMTzJlaDlqNnZ2dkFFZWJJbDgifQ.MeEkYo2PvnKAOBQ55uaJv8ifLSqKrXiQ6I26Uk7yYB4CVwkRC1WHH1yDF9YJRHK0rhav840E7rnp15Ey0A6Nqb0i0ikIoJz5vcylUbj6SHDgiS8kV_zay_PR7jX4Z8S-Zct9OjS-hQSsYzXDIlRzKyFjCX33k3ZYoAiJ6bTBNsQlzIRQAk75eql_Dxgti33eNcVpHc8knCp6-IXTuUid-aCVp0PvEDB-GEo2JlF9npQzsF6niSZzPpUF0ci1NT2Po6Sh1KyBYmHre2y1miHFBff_iACOB5P2l7GdT-bPDrlbcRm6oRYxGMxCs06f_XcgB0LfGWb8LSo9AiW27Gj7yA",
  "access_token": "41Z7KyGZ6r1AjtwcBBKdgMXsqcyLXINNaASgF9CuBuYdVUtmQ4",
  "token_type": "Bearer"
}
2020-09-01 12:53:44 OUTGOING
oidcc-client-test-missing-iat
Response to HTTP request to test instance FJR0bVk06ieXEhd
outgoing
ModelAndView [view="formPostResponseMode"; model={formAction=https://rp.example.com/cb, formParameters={"state":"n0CVuHjlthrwrr5aF-blE_Y7r0cj9KBFsYluSVnzV1s","code":"2ABhXvcXIL","id_token":"eyJraWQiOiJlMmEyM2E3Yi05MjNmLTQ2MDAtODMyNy1hYTAxODU0YmJjN2UiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiTVZrVlpQaDdTUkhWbnY5WHZHczNVZyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X3FwaVRQTkJMQUROYVlQUDk1MDQzWyojJC4iLCJjX2hhc2giOiItSm1tUGc4d1VTQ1JrQm96cWlzQXlRIiwiaXNzIjoiaHR0cHM6XC9cL3d3dy5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXRcL3Rlc3RcL0ZKUjBiVmswNmllWEVoZFwvIiwiZXhwIjoxNTk4OTY1MTI0LCJub25jZSI6IjJRQ1lKSWY4ZURuVk5iZDF5S054ZkV1MUFMTzJlaDlqNnZ2dkFFZWJJbDgifQ.MeEkYo2PvnKAOBQ55uaJv8ifLSqKrXiQ6I26Uk7yYB4CVwkRC1WHH1yDF9YJRHK0rhav840E7rnp15Ey0A6Nqb0i0ikIoJz5vcylUbj6SHDgiS8kV_zay_PR7jX4Z8S-Zct9OjS-hQSsYzXDIlRzKyFjCX33k3ZYoAiJ6bTBNsQlzIRQAk75eql_Dxgti33eNcVpHc8knCp6-IXTuUid-aCVp0PvEDB-GEo2JlF9npQzsF6niSZzPpUF0ci1NT2Po6Sh1KyBYmHre2y1miHFBff_iACOB5P2l7GdT-bPDrlbcRm6oRYxGMxCs06f_XcgB0LfGWb8LSo9AiW27Gj7yA","access_token":"41Z7KyGZ6r1AjtwcBBKdgMXsqcyLXINNaASgF9CuBuYdVUtmQ4","token_type":"Bearer"}}]
outgoing_path
authorize
2020-09-01 12:53:46 FINISHED
oidcc-client-test-missing-iat
Test has run to completion
testmodule_result
PASSED
Test Results