Test Summary

Test Results

Expand All Collapse All
All times are UTC
2020-09-01 12:50:13 INFO
TEST-RUNNER
Test instance D0T2CtaTyzNefez created
baseUrl
https://www.certification.openid.net/test/D0T2CtaTyzNefez
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code id_token",
  "request_type": "plain_http_request",
  "response_mode": "form_post",
  "client_registration": "dynamic_client"
}
alias

                                
description
test suite runner for openid-client
planId
l0lJMpv444Mye
config
{
  "description": "test suite runner for openid-client",
  "waitTimeoutSeconds": 2
}
testName
oidcc-client-test-invalid-iss
2020-09-01 12:50:13 SUCCESS
OIDCCGenerateServerConfiguration
Generated default server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/D0T2CtaTyzNefez/",
  "authorization_endpoint": "https://www.certification.openid.net/test/D0T2CtaTyzNefez/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/D0T2CtaTyzNefez/token",
  "jwks_uri": "https://www.certification.openid.net/test/D0T2CtaTyzNefez/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/D0T2CtaTyzNefez/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/D0T2CtaTyzNefez/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post",
    "client_secret_jwt",
    "private_key_jwt"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2020-09-01 12:50:13
SetTokenEndpointAuthMethodsSupportedToClientSecretBasicOnly
Changed token_endpoint_auth_methods_supported to client_secret_basic only in server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/D0T2CtaTyzNefez/",
  "authorization_endpoint": "https://www.certification.openid.net/test/D0T2CtaTyzNefez/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/D0T2CtaTyzNefez/token",
  "jwks_uri": "https://www.certification.openid.net/test/D0T2CtaTyzNefez/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/D0T2CtaTyzNefez/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/D0T2CtaTyzNefez/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2020-09-01 12:50:14
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "_P_yXqE9VDZrFZ1Nq7BnqZHi9VomyCzDrIsEdzYyaRT5j4E6YllKEABSWRxDRXrnl15SXG5ZCOuj9PtI_m7yx_aamodr7tqU2rpRd1qq6aLcGXxVIScdASZ0k9vYEiygosZ9MF5X5-MIKWgRelx1qmh265HLan1cx4pf0W0wrHs",
      "kty": "RSA",
      "q": "6tgi2PeqRHa7Vko34EhB8WMXiJZnx1ixHIHJXg3U9NVdATxEnjnvjrObGYy1bLxP_URPJXJePTcURXQ_d9v3HEco0tMPFlltsqidXxiF1w4S8OxD1yIrNsVzbJQV02_4Veiii0bknsrUY5B3dWdJDd3yHRsUq_pokBqJN8hHR-s",
      "d": "elZYIZfPUyZCSxTDjPXDedNCDP_cdClzTgarMZdQ4DbdkhhMu1C6lf8X3wkI87px7NXvwM83Ymz0LJxzRS36ZRY9P-AJjp9UhGZXzftqnxELj9GGrPcsltIHdUaApGe1SGiedkHQhgM0T7SU-L84_-kyKdEouGu6AYjknW0f-tY9iJscWTJbDi-74M4TFK1rYsig-7FSGcj700EiHfqfSRFI8MLCpyPrKLFjWV-_IauzgA1fCvwD3m1kJT7rRPfKK4GTmW7T9_n5rhjNWBld2d4jCHdQJGaCqNZxcp4WwbcLQ_kUFq5LORWg5-2s3MIh-tiusi2undntL0g40X1BRQ",
      "e": "AQAB",
      "use": "sig",
      "kid": "b1437c84-d084-490d-a9d5-9a84687d0411",
      "qi": "mtp_t5Q3gt3Cfm1gelXxWDzCVkn_7N2wRHXwopOL0Z65xIt2NaohutuQ_uRhtnB_bNX9xb7UC3cETH3A34Vu16CJT_ZaCMzJySEco-INIfXJshg1nsNULkyRpSvjMoC6d0TtpoMaM95PbvHQLE3HXWFkSOaDDXroXqs9DvnLRbc",
      "dp": "ZkoRMyNbyW2LFB0aZx0WfF-odGxzm6FFp8A5GP3HmebKE7Q658KUCC4pHTApHrFXa0LOZ-KRiuLC0my6kWxIKoLQ9UNlZxfm8Rw9jdURnw6ikIdNX-8RcgKbRaCwFoEGnWlE-kZaoj2PcjZKQr-ZL0G3Ov0iUjbHSUHwBZtw_3s",
      "dq": "b72dfx0AoAjahGlWAtp-vetHVE80W-7Afu7mMGFmdYRb922EvMCWUpD0-Igx_uXvLXPmMMwlOP1PIOj6Ff7MqmDVdNLF9_1fK8X88zWI4VWp_4Z7lQ6F_06d6AjiBbPeNoo1ZQ27VC7wNduUa4FUikuTmvO6t0WzoPVvWuJpwDc",
      "n": "6BeN72oiZHSQorr1u_cj3y0m6kOUscAhnFd76js6qpr_v2xAy681aersVy9vcG_ad58LM_aLpKTzOm_5QOs9XEY9ieYlxPk6TCDYbBm0Wx5Z5bNJ9EpEFrm978FwW_QgOOXmGVThMVhnWvULccbY7qNrbKv5lEwcOp_sIIfcqnfe5fe-qmQ8z5Xv4llEduJMCu-vfzTLUYQIlUNRAlizTkKDJkPpujdzah1GwBX-fSotEepPXLnI-xq4Pj7XYsLvWDXENqN2jBW2r7fPRpdWbK6Llm9P1U-Ifg1LSPQQuar-cTfY_V-yOg36vbp_TeEFi6NJEK82kxrzPTs0qaFx6Q"
    },
    {
      "kty": "EC",
      "d": "G34GDQk2CSTldV8TCTzjslFo0GXMVG__88b8POUMmWY",
      "use": "sig",
      "crv": "P-256",
      "kid": "3d022e0d-2b8f-44fd-8e82-49ad242efdd3",
      "x": "xkTtQGAZzA2YURP-09kO5DwWtXz_Ptjtsaz6nb_BAgQ",
      "y": "WV7HMhbvVzuH7WHW58MgvldGqqaGdROH3FwDACoRLYg"
    },
    {
      "kty": "EC",
      "d": "aPElY0NXRh_TJtyD3-uqiH0lL-P5P2KAO4ME6lEOqL8",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "d94b2fb4-789f-4c1d-bbcf-5c8bb524d8dc",
      "x": "xXmDR4kjSh7ZLckmZ2Enk7A71b-VXKgCqED-oxU4-o8",
      "y": "fMtdSHTOKfpebLHhvKg7aPEwEhfMV6xGXmdv6m24KrA"
    },
    {
      "kty": "OKP",
      "d": "WFeJDOxOpeWDor0ALsTKGC5jN0Cr7SMsHFktohGVWCk",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "cfcaa199-5f10-4f7e-baad-977f202aa7d3",
      "x": "_F-8IAOmaKJpqXsA7OfUGqkejj4CMFgX7ahOD4DBbJE"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "2_5joQW_I81FIMIyrt9WJgPAbor_MxW9EwXBaw-kh-dKDErCtoWHHWzuJ3W21Hisbv-NV0g5P6qz6yLAVqghH-ZStJ56hF2LchfTp24c4hy1vR_mL9h2sW3BvL9e5MT-yARTtMBi-k8dGwKJbgwtRk_4yXsSsNImbqu3MKo-0aU",
      "kty": "RSA",
      "q": "u8wJ3ZVIxN6N9-kyG55XoIjM8cNzsfebhwyTbcFb37fxQ8_19Nmhw4kt7yvXnILh-LdZZn1dw6PM6WrHJSBIYCrlHQ1HK2N8tR9A43J6nzNses01wld4MI8bf9QTTWkzLhOjAUUVEMZ5cvmakKjscsKNoRqyZmC2kFaSDu2evkk",
      "d": "IP_qpyAtpD0o_2NleGU3HOfmTk8_8BYCRwEhr3Bw0J2iTOVtFwpofbybkWHh9Us80DRnvEwx3JcD7LdMRwhJbEcmmO1SUFYqAsVZMqPWpl8cryVsgSSUkVIBAj7f8Y1PYhKyA7dEJ8HWlwheqnXCJNNiP6vJSmB05yt0KsMUVQXB5pC_VCoBuvAaZL9JzqP8m2-kcffskey0XCjfposFu5D7GJM3omlBUh82xNNB42VwmIZ8NPglsHKNhQfa51NO8ikskybdc2jpg0HnOkmjJWTPt99ourbOlA4fSJd3aeD9xw9kTLVq58NxViImxIm3GH5UaQlS3cceAfJRBOQJIQ",
      "e": "AQAB",
      "use": "enc",
      "kid": "6c2389bc-5767-4ef4-a120-bb9222dbbc79",
      "qi": "sldS7tZSBsAkbs3G8IV-chmjW7usVbOQKapI8u7bMNFBIIK2l6BnuBSUWaJTvHMKQwU35kp57uL-tSbow0P3ghbThKH3dQdoVnKUiKZKNUgGA3AhxwlQIq5RyKHPf2TLpBxnw_uuRL74vWFXRg28Ez_UabITVEebbCIYZFXkJ2Q",
      "dp": "q-5lyMun9YAQvahoWfkb5_vYocwp5K_hpANEhbqk-L3PRkoLYQB8d4fRnK9H40goY1uACC3e6B4uHN98-HzP3pFwI88Tq208dT-f3-OT2Tdc5eEPUmdXZBWGa1AZBqva_1E6ZjJRaJT6B0j1RTdpDuGjazuvgNfMx4OWWQdEry0",
      "alg": "RSA-OAEP",
      "dq": "YhJ3IHmii_UxrMLigRva5SIr7SHGHK2TUh6WK14sDZQw8dn7t0ekO8o668k4iyqqucl-bZCQ0-eJzmgN4eyO_3HHPrm9bgJBkRDmQSF6ugMP5r2eEoS9ZpaFpObqwaVrredhW_toud78c7e4KU2eVXwWnIilm-Nr08rx8cvT98k",
      "n": "oWIp-F_pd2Pp2dbx4P1fnPNvKibmBrknWkApRgPdGYyik7zfIe_A4uOK0loxJ9CDCUnLQDQ7FOV5xt31TwB8fHyHyTX9ZTx3wXuJ8WMJJ4UI40pI_Ac3JguLZlU0BphsCPrc6mF2GHOoEPGSSbUqcGSxkFzIZOXB-_7Dxa7fAtDquSbeWTBnw0LHdaaXrOquS9X8ELb9AST9pzmfGE6ZTRoppDZGp0CjSOmdtaJcP8xzolQyWOtdj5KnHipkoicabcsxq4RDPB6ntJ1FtXRdIedJpdaOYEsPgffy_ExGzJr7uuC2D72vhuA3yKrNpRUOBxJEmJeQ8cJ_ACccUFg-DQ"
    },
    {
      "kty": "EC",
      "d": "pxEzroFcXEF7XvqbO1DbyhOMKq5dByPI4LZQx7sNz4U",
      "use": "enc",
      "crv": "P-256",
      "kid": "d69fa14f-e7f5-4f38-bf0e-4511de60cb30",
      "x": "eMaA8JlETnnpTrogtbcHVuXU9_RHS7mTfphshpkckDY",
      "y": "Nmb9FNiURPH--1RqDksKwtAwHXJnmqHc3VGRVB0DfZg",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "b1437c84-d084-490d-a9d5-9a84687d0411",
      "n": "6BeN72oiZHSQorr1u_cj3y0m6kOUscAhnFd76js6qpr_v2xAy681aersVy9vcG_ad58LM_aLpKTzOm_5QOs9XEY9ieYlxPk6TCDYbBm0Wx5Z5bNJ9EpEFrm978FwW_QgOOXmGVThMVhnWvULccbY7qNrbKv5lEwcOp_sIIfcqnfe5fe-qmQ8z5Xv4llEduJMCu-vfzTLUYQIlUNRAlizTkKDJkPpujdzah1GwBX-fSotEepPXLnI-xq4Pj7XYsLvWDXENqN2jBW2r7fPRpdWbK6Llm9P1U-Ifg1LSPQQuar-cTfY_V-yOg36vbp_TeEFi6NJEK82kxrzPTs0qaFx6Q"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "a0b2fce7-6283-4484-81da-87930a67f0f0",
      "n": "zvEU5-32KJZW2B8OA48ThNf8l9pt6heiEHNuOu1Cqwjkh5-payztYOrper7W-GBj4ZE3c3SFDJh301Tb5-VVUCVSgtnliqmG6AjIJ7KpDL8LXIXPTOrM6qOyJ3w2mer0Z4T-u4w9DKF67JQsoNUn5TYifh4qJLbbVcUjovkZWZS8JFZCFWMDYGvqQcaN-MJznCg50Y-t3x2y1asHA66pxI_ZLQ3aLtgLmryXzvShJAFdj2Q85DRXwVnu2gxRvWgh0oVvLOEm0k6Y7HXCUwhhw2Ge9UBgjzitdvv7XvmMyZtaykhAe2pQqUEJallcdQB2pxtqsYBx15iqJEY82nsAfw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "3d022e0d-2b8f-44fd-8e82-49ad242efdd3",
      "x": "xkTtQGAZzA2YURP-09kO5DwWtXz_Ptjtsaz6nb_BAgQ",
      "y": "WV7HMhbvVzuH7WHW58MgvldGqqaGdROH3FwDACoRLYg"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "befad3f8-3027-4fb5-af29-35e32f8c8af4",
      "x": "0Kuhv1L4wW1Et782F0yizzeRT46HprYsW79XhbduPxE",
      "y": "DVcFMEV_wS1wpYczRuY-fznpTPCSLGQjbaHo2Q0ZYrg"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "d94b2fb4-789f-4c1d-bbcf-5c8bb524d8dc",
      "x": "xXmDR4kjSh7ZLckmZ2Enk7A71b-VXKgCqED-oxU4-o8",
      "y": "fMtdSHTOKfpebLHhvKg7aPEwEhfMV6xGXmdv6m24KrA"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "cfcaa199-5f10-4f7e-baad-977f202aa7d3",
      "x": "_F-8IAOmaKJpqXsA7OfUGqkejj4CMFgX7ahOD4DBbJE"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "6c2389bc-5767-4ef4-a120-bb9222dbbc79",
      "alg": "RSA-OAEP",
      "n": "oWIp-F_pd2Pp2dbx4P1fnPNvKibmBrknWkApRgPdGYyik7zfIe_A4uOK0loxJ9CDCUnLQDQ7FOV5xt31TwB8fHyHyTX9ZTx3wXuJ8WMJJ4UI40pI_Ac3JguLZlU0BphsCPrc6mF2GHOoEPGSSbUqcGSxkFzIZOXB-_7Dxa7fAtDquSbeWTBnw0LHdaaXrOquS9X8ELb9AST9pzmfGE6ZTRoppDZGp0CjSOmdtaJcP8xzolQyWOtdj5KnHipkoicabcsxq4RDPB6ntJ1FtXRdIedJpdaOYEsPgffy_ExGzJr7uuC2D72vhuA3yKrNpRUOBxJEmJeQ8cJ_ACccUFg-DQ"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "d69fa14f-e7f5-4f38-bf0e-4511de60cb30",
      "x": "eMaA8JlETnnpTrogtbcHVuXU9_RHS7mTfphshpkckDY",
      "y": "Nmb9FNiURPH--1RqDksKwtAwHXJnmqHc3VGRVB0DfZg",
      "alg": "ECDH-ES"
    }
  ]
}
2020-09-01 12:50:14 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2020-09-01 12:50:14 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2020-09-01 12:50:14 SUCCESS
OIDCCLoadUserInfo
Added user information
user_info
{
  "sub": "user-subject-1234531",
  "name": "Demo T. User",
  "given_name": "Demo",
  "family_name": "User",
  "middle_name": "Theresa",
  "nickname": "Dee",
  "preferred_username": "d.tu",
  "gender": "female",
  "birthdate": "2000-02-03",
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "zoneinfo": "America/Los_Angeles",
  "locale": "en-US",
  "phone_number": "+1 555 5550000",
  "phone_number_verified": false,
  "email": "user@example.com",
  "email_verified": false,
  "website": "https://openid.net/",
  "updated_at": "1580000000"
}
2020-09-01 12:50:14 SUCCESS
GetDynamicClientConfiguration
No client details on configuration, created an empty dynamic_client_registration_template object.
2020-09-01 12:50:14
oidcc-client-test-invalid-iss
Setup Done
2020-09-01 12:50:14 INCOMING
oidcc-client-test-invalid-iss
Incoming HTTP request to test instance D0T2CtaTyzNefez
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
.well-known/openid-configuration
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Discovery endpoint
2020-09-01 12:50:14 OUTGOING
oidcc-client-test-invalid-iss
Response to HTTP request to test instance D0T2CtaTyzNefez
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "issuer": "https://www.certification.openid.net/test/D0T2CtaTyzNefez/",
  "authorization_endpoint": "https://www.certification.openid.net/test/D0T2CtaTyzNefez/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/D0T2CtaTyzNefez/token",
  "jwks_uri": "https://www.certification.openid.net/test/D0T2CtaTyzNefez/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/D0T2CtaTyzNefez/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/D0T2CtaTyzNefez/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
outgoing_path
.well-known/openid-configuration
2020-09-01 12:50:15 INCOMING
oidcc-client-test-invalid-iss
Incoming HTTP request to test instance D0T2CtaTyzNefez
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "content-type": "application/json",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "181",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
register
incoming_body_form_params
incoming_method
POST
incoming_body_json
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ]
}
incoming_query_string_params
{}
incoming_body
{"token_endpoint_auth_method":"client_secret_basic","response_types":["code id_token"],"grant_types":["authorization_code","implicit"],"redirect_uris":["https://rp.example.com/cb"]}
Registration endpoint
2020-09-01 12:50:15 SUCCESS
OIDCCExtractDynamicRegistrationRequest
Extracted dynamic client registration request
request
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ]
}
2020-09-01 12:50:15 INFO
EnsureRegistrationRequestContainsAtLeastOneContact
This application requires that registration requests contain at least one contact.
2020-09-01 12:50:15 SUCCESS
ValidateClientGrantTypes
grant_types match response_types
grant_types
[
  "authorization_code",
  "implicit"
]
response_types
[
  "code id_token"
]
2020-09-01 12:50:15 SUCCESS
OIDCCValidateClientRedirectUris
Valid redirect_uri(s) provided in registration request
redirect_uris
[
  "https://rp.example.com/cb"
]
2020-09-01 12:50:15 SUCCESS
ValidateClientLogoUris
Client does not contain any logo_uri
2020-09-01 12:50:15 SUCCESS
ValidateClientUris
Client does not contain any client_uri
2020-09-01 12:50:15 SUCCESS
ValidateClientPolicyUris
Client does not contain any policy_uri
2020-09-01 12:50:15 SUCCESS
ValidateClientTosUris
Client does not contain any tos_uri
2020-09-01 12:50:15 SUCCESS
ValidateClientSubjectType
A subject_type was not provided
2020-09-01 12:50:15 INFO
ValidateIdTokenSignedResponseAlg
Skipped evaluation due to missing required element: client id_token_signed_response_alg
path
id_token_signed_response_alg
mapped
object
client
2020-09-01 12:50:15 SUCCESS
EnsureIdTokenEncryptedResponseAlgIsSetIfEncIsSet
id_token_encrypted_response_enc is not set
2020-09-01 12:50:15 INFO
ValidateUserinfoSignedResponseAlg
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2020-09-01 12:50:15 SUCCESS
EnsureUserinfoEncryptedResponseAlgIsSetIfEncIsSet
userinfo_encrypted_response_enc is not set
2020-09-01 12:50:15 INFO
ValidateRequestObjectSigningAlg
Skipped evaluation due to missing required element: client request_object_signing_alg
path
request_object_signing_alg
mapped
object
client
2020-09-01 12:50:15 SUCCESS
EnsureRequestObjectEncryptionAlgIsSetIfEncIsSet
request_object_encryption_enc is not set
2020-09-01 12:50:15 INFO
ValidateTokenEndpointAuthSigningAlg
Skipped evaluation due to missing required element: client token_endpoint_auth_signing_alg
path
token_endpoint_auth_signing_alg
mapped
object
client
2020-09-01 12:50:15 SUCCESS
ValidateDefaultMaxAge
default_max_age is not set
2020-09-01 12:50:15 INFO
ValidateRequireAuthTime
Skipped evaluation due to missing required element: client require_auth_time
path
require_auth_time
mapped
object
client
2020-09-01 12:50:15 INFO
ValidateDefaultAcrValues
Skipped evaluation due to missing required element: client default_acr_values
path
default_acr_values
mapped
object
client
2020-09-01 12:50:15 INFO
ValidateInitiateLoginUri
Skipped evaluation due to missing required element: client initiate_login_uri
path
initiate_login_uri
mapped
object
client
2020-09-01 12:50:15 INFO
ValidateRequestUris
Skipped evaluation due to missing required element: client request_uris
path
request_uris
mapped
object
client
2020-09-01 12:50:15 SUCCESS
ValidateClientRegistrationRequestSectorIdentifierUri
A sector_identifier_uri was not provided
2020-09-01 12:50:15 SUCCESS
OIDCCRegisterClient
Registered client
client
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_nbLJuOlJIPRAXTy39267_^]@]"
}
2020-09-01 12:50:15
OIDCCCreateClientSecretForDynamicClient
Set the secret for registered client
client_secret
secret_qhlKiFMMkHLpVQBvlLidMpDllwefogKpCCDTHJQgbZtYTHMZCJ9466596594}"$.{
2020-09-01 12:50:15 SUCCESS
EnsureTokenEndPointAuthMethodIsClientSecretBasic
token_endpoint_auth_method is 'client_secret_basic' as expected
2020-09-01 12:50:15 SUCCESS
EnsureClientDoesNotHaveBothJwksAndJwksUri
Client does not have both jwks and jwks_uri set
client
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_nbLJuOlJIPRAXTy39267_^]@]",
  "client_secret": "secret_qhlKiFMMkHLpVQBvlLidMpDllwefogKpCCDTHJQgbZtYTHMZCJ9466596594}\"$.{"
}
2020-09-01 12:50:15 INFO
FetchClientKeys
Skipped evaluation due to missing required element: client jwks_uri
path
jwks_uri
mapped
object
client
2020-09-01 12:50:15 SUCCESS
OIDCCExtractServerSigningAlg
Using the default algorithm for the first key in server jwks
signing_algorithm
RS256
2020-09-01 12:50:15
SetClientIdTokenSignedResponseAlgToServerSigningAlg
Set id_token_signed_response_alg for the registered client
id_token_signed_response_alg
RS256
2020-09-01 12:50:15 OUTGOING
oidcc-client-test-invalid-iss
Response to HTTP request to test instance D0T2CtaTyzNefez
outgoing_status_code
201
outgoing_headers
{}
outgoing_body
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code id_token"
  ],
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_nbLJuOlJIPRAXTy39267_^]@]",
  "client_secret": "secret_qhlKiFMMkHLpVQBvlLidMpDllwefogKpCCDTHJQgbZtYTHMZCJ9466596594}\"$.{",
  "id_token_signed_response_alg": "RS256"
}
outgoing_path
register
2020-09-01 12:50:15 INCOMING
oidcc-client-test-invalid-iss
Incoming HTTP request to test instance D0T2CtaTyzNefez
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "got/9.6.0 (https://github.com/sindresorhus/got)",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
authorize
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "client_id": "client_nbLJuOlJIPRAXTy39267_^]@]",
  "scope": "openid",
  "response_type": "code id_token",
  "redirect_uri": "https://rp.example.com/cb",
  "state": "sTXXRuT0zNRp9Lki0oTSVxc0IsDO5i47ZOdKALJp80E",
  "nonce": "hAj8EG-Owr1Q8QTTWwOvidmaTqexiNhn9ykG19eiIls",
  "response_mode": "form_post"
}
incoming_body
Authorization endpoint
2020-09-01 12:50:15 SUCCESS
EnsureRequestDoesNotContainRequestObject
Request does not contain a request parameter
2020-09-01 12:50:15 SUCCESS
OIDCCEnsureAuthorizationHttpRequestContainsOpenIDScope
Found 'openid' in scope http request parameter
actual
[
  "openid"
]
expected
openid
2020-09-01 12:50:15 SUCCESS
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
effective_authorization_endpoint_request
{
  "client_id": "client_nbLJuOlJIPRAXTy39267_^]@]",
  "scope": "openid",
  "response_type": "code id_token",
  "redirect_uri": "https://rp.example.com/cb",
  "state": "sTXXRuT0zNRp9Lki0oTSVxc0IsDO5i47ZOdKALJp80E",
  "nonce": "hAj8EG-Owr1Q8QTTWwOvidmaTqexiNhn9ykG19eiIls",
  "response_mode": "form_post"
}
2020-09-01 12:50:15 SUCCESS
ExtractRequestedScopes
Requested scopes
scope
openid
2020-09-01 12:50:15 SUCCESS
ExtractNonceFromAuthorizationRequest
Extracted nonce
nonce
hAj8EG-Owr1Q8QTTWwOvidmaTqexiNhn9ykG19eiIls
2020-09-01 12:50:15 SUCCESS
EnsureResponseTypeIsCodeIdToken
Response type is expected value
expected
code id_token
2020-09-01 12:50:15 SUCCESS
EnsureMatchingClientId
Client ID matched
client_id
client_nbLJuOlJIPRAXTy39267_^]@]
2020-09-01 12:50:15 SUCCESS
EnsureValidRedirectUriForAuthorizationEndpointRequest
redirect_uri is one of the allowed redirect uris
actual
https://rp.example.com/cb
expected
[
  "https://rp.example.com/cb"
]
2020-09-01 12:50:15 SUCCESS
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
actual
[
  "openid"
]
expected
openid
2020-09-01 12:50:15 SUCCESS
DisallowMaxAgeEqualsZeroAndPromptNone
The client did not send max_age=0 and prompt=none parameters as expected
2020-09-01 12:50:15 SUCCESS
CreateAuthorizationCode
Created authorization code
authorization_code
xn1Nkgrcoh
2020-09-01 12:50:15 SUCCESS
CalculateCHash
Successful c_hash encoding
c_hash
hoUbWVaBRWSqt9n13MydUg
2020-09-01 12:50:15 SUCCESS
GenerateIdTokenClaims
Created ID Token Claims
iss
https://www.certification.openid.net/test/D0T2CtaTyzNefez/
sub
user-subject-1234531
aud
client_nbLJuOlJIPRAXTy39267_^]@]
nonce
hAj8EG-Owr1Q8QTTWwOvidmaTqexiNhn9ykG19eiIls
iat
1598964615
exp
1598964915
2020-09-01 12:50:15 SUCCESS
AddInvalidIssValueToIdToken
Added invalid iss to ID token claims
iss
https://www.certification.openid.net/test/D0T2CtaTyzNefez/1
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/D0T2CtaTyzNefez/1",
  "sub": "user-subject-1234531",
  "aud": "client_nbLJuOlJIPRAXTy39267_^]@]",
  "nonce": "hAj8EG-Owr1Q8QTTWwOvidmaTqexiNhn9ykG19eiIls",
  "iat": 1598964615,
  "exp": 1598964915
}
2020-09-01 12:50:15 SUCCESS
AddCHashToIdTokenClaims
Added c_hash to ID token claims
c_hash
hoUbWVaBRWSqt9n13MydUg
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/D0T2CtaTyzNefez/1",
  "sub": "user-subject-1234531",
  "aud": "client_nbLJuOlJIPRAXTy39267_^]@]",
  "nonce": "hAj8EG-Owr1Q8QTTWwOvidmaTqexiNhn9ykG19eiIls",
  "iat": 1598964615,
  "exp": 1598964915,
  "c_hash": "hoUbWVaBRWSqt9n13MydUg"
}
2020-09-01 12:50:15 INFO
AddAtHashToIdTokenClaims
Skipped evaluation due to missing required string: at_hash
expected
at_hash
2020-09-01 12:50:15 SUCCESS
OIDCCSignIdToken
Signed the ID token
id_token
eyJraWQiOiJiMTQzN2M4NC1kMDg0LTQ5MGQtYTlkNS05YTg0Njg3ZDA0MTEiLCJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJ1c2VyLXN1YmplY3QtMTIzNDUzMSIsImF1ZCI6ImNsaWVudF9uYkxKdU9sSklQUkFYVHkzOTI2N19eXUBdIiwiY19oYXNoIjoiaG9VYldWYUJSV1NxdDluMTNNeWRVZyIsImlzcyI6Imh0dHBzOlwvXC93d3cuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0XC90ZXN0XC9EMFQyQ3RhVHl6TmVmZXpcLzEiLCJleHAiOjE1OTg5NjQ5MTUsIm5vbmNlIjoiaEFqOEVHLU93cjFROFFUVFd3T3ZpZG1hVHFleGlOaG45eWtHMTllaUlscyIsImlhdCI6MTU5ODk2NDYxNX0.NpLpWQa9Srrns0lklG_k7RqYGl3zi9PzKNY8Mqxszcaco1k8q7ya_OGvA33WfhoNI2BbrmolT6RivEAfdEh-pd9gRAIpE1DfgNouu56xGkxK30ru91dJBTHr0JGvQS6jP2S3isf68uhQb20UdiKTgpyt09XVYGZz-jIvkNx8xPpb9m7SYkaJdWTFsGmUDAvL1JuoVDU7Zy6iWag0NEqXD7hc2W8tLo8ju-_T3sU8EI2AUIwBednd-Rjdkuq_X-9_sioEgV6xtNNPyYhbgXwVN20rSFymqscvEJxFAe0pVVW3wUkRhNkS8pcIxvupeC38shIsAVCVNMuiOLCXXKEiXQ
key
{"p":"_P_yXqE9VDZrFZ1Nq7BnqZHi9VomyCzDrIsEdzYyaRT5j4E6YllKEABSWRxDRXrnl15SXG5ZCOuj9PtI_m7yx_aamodr7tqU2rpRd1qq6aLcGXxVIScdASZ0k9vYEiygosZ9MF5X5-MIKWgRelx1qmh265HLan1cx4pf0W0wrHs","kty":"RSA","q":"6tgi2PeqRHa7Vko34EhB8WMXiJZnx1ixHIHJXg3U9NVdATxEnjnvjrObGYy1bLxP_URPJXJePTcURXQ_d9v3HEco0tMPFlltsqidXxiF1w4S8OxD1yIrNsVzbJQV02_4Veiii0bknsrUY5B3dWdJDd3yHRsUq_pokBqJN8hHR-s","d":"elZYIZfPUyZCSxTDjPXDedNCDP_cdClzTgarMZdQ4DbdkhhMu1C6lf8X3wkI87px7NXvwM83Ymz0LJxzRS36ZRY9P-AJjp9UhGZXzftqnxELj9GGrPcsltIHdUaApGe1SGiedkHQhgM0T7SU-L84_-kyKdEouGu6AYjknW0f-tY9iJscWTJbDi-74M4TFK1rYsig-7FSGcj700EiHfqfSRFI8MLCpyPrKLFjWV-_IauzgA1fCvwD3m1kJT7rRPfKK4GTmW7T9_n5rhjNWBld2d4jCHdQJGaCqNZxcp4WwbcLQ_kUFq5LORWg5-2s3MIh-tiusi2undntL0g40X1BRQ","e":"AQAB","use":"sig","kid":"b1437c84-d084-490d-a9d5-9a84687d0411","qi":"mtp_t5Q3gt3Cfm1gelXxWDzCVkn_7N2wRHXwopOL0Z65xIt2NaohutuQ_uRhtnB_bNX9xb7UC3cETH3A34Vu16CJT_ZaCMzJySEco-INIfXJshg1nsNULkyRpSvjMoC6d0TtpoMaM95PbvHQLE3HXWFkSOaDDXroXqs9DvnLRbc","dp":"ZkoRMyNbyW2LFB0aZx0WfF-odGxzm6FFp8A5GP3HmebKE7Q658KUCC4pHTApHrFXa0LOZ-KRiuLC0my6kWxIKoLQ9UNlZxfm8Rw9jdURnw6ikIdNX-8RcgKbRaCwFoEGnWlE-kZaoj2PcjZKQr-ZL0G3Ov0iUjbHSUHwBZtw_3s","dq":"b72dfx0AoAjahGlWAtp-vetHVE80W-7Afu7mMGFmdYRb922EvMCWUpD0-Igx_uXvLXPmMMwlOP1PIOj6Ff7MqmDVdNLF9_1fK8X88zWI4VWp_4Z7lQ6F_06d6AjiBbPeNoo1ZQ27VC7wNduUa4FUikuTmvO6t0WzoPVvWuJpwDc","n":"6BeN72oiZHSQorr1u_cj3y0m6kOUscAhnFd76js6qpr_v2xAy681aersVy9vcG_ad58LM_aLpKTzOm_5QOs9XEY9ieYlxPk6TCDYbBm0Wx5Z5bNJ9EpEFrm978FwW_QgOOXmGVThMVhnWvULccbY7qNrbKv5lEwcOp_sIIfcqnfe5fe-qmQ8z5Xv4llEduJMCu-vfzTLUYQIlUNRAlizTkKDJkPpujdzah1GwBX-fSotEepPXLnI-xq4Pj7XYsLvWDXENqN2jBW2r7fPRpdWbK6Llm9P1U-Ifg1LSPQQuar-cTfY_V-yOg36vbp_TeEFi6NJEK82kxrzPTs0qaFx6Q"}
algorithm
RS256
2020-09-01 12:50:15 INFO
EncryptIdToken
Skipped evaluation due to missing required element: client id_token_encrypted_response_alg
path
id_token_encrypted_response_alg
mapped
object
client
2020-09-01 12:50:15 SUCCESS
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "sTXXRuT0zNRp9Lki0oTSVxc0IsDO5i47ZOdKALJp80E"
}
2020-09-01 12:50:15 SUCCESS
AddCodeToAuthorizationEndpointResponseParams
Added code to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "sTXXRuT0zNRp9Lki0oTSVxc0IsDO5i47ZOdKALJp80E",
  "code": "xn1Nkgrcoh"
}
2020-09-01 12:50:15 SUCCESS
AddIdTokenToAuthorizationEndpointResponseParams
Added id_token to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "sTXXRuT0zNRp9Lki0oTSVxc0IsDO5i47ZOdKALJp80E",
  "code": "xn1Nkgrcoh",
  "id_token": "eyJraWQiOiJiMTQzN2M4NC1kMDg0LTQ5MGQtYTlkNS05YTg0Njg3ZDA0MTEiLCJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJ1c2VyLXN1YmplY3QtMTIzNDUzMSIsImF1ZCI6ImNsaWVudF9uYkxKdU9sSklQUkFYVHkzOTI2N19eXUBdIiwiY19oYXNoIjoiaG9VYldWYUJSV1NxdDluMTNNeWRVZyIsImlzcyI6Imh0dHBzOlwvXC93d3cuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0XC90ZXN0XC9EMFQyQ3RhVHl6TmVmZXpcLzEiLCJleHAiOjE1OTg5NjQ5MTUsIm5vbmNlIjoiaEFqOEVHLU93cjFROFFUVFd3T3ZpZG1hVHFleGlOaG45eWtHMTllaUlscyIsImlhdCI6MTU5ODk2NDYxNX0.NpLpWQa9Srrns0lklG_k7RqYGl3zi9PzKNY8Mqxszcaco1k8q7ya_OGvA33WfhoNI2BbrmolT6RivEAfdEh-pd9gRAIpE1DfgNouu56xGkxK30ru91dJBTHr0JGvQS6jP2S3isf68uhQb20UdiKTgpyt09XVYGZz-jIvkNx8xPpb9m7SYkaJdWTFsGmUDAvL1JuoVDU7Zy6iWag0NEqXD7hc2W8tLo8ju-_T3sU8EI2AUIwBednd-Rjdkuq_X-9_sioEgV6xtNNPyYhbgXwVN20rSFymqscvEJxFAe0pVVW3wUkRhNkS8pcIxvupeC38shIsAVCVNMuiOLCXXKEiXQ"
}
2020-09-01 12:50:15 OUTGOING
oidcc-client-test-invalid-iss
Response to HTTP request to test instance D0T2CtaTyzNefez
outgoing
ModelAndView [view="formPostResponseMode"; model={formAction=https://rp.example.com/cb, formParameters={"state":"sTXXRuT0zNRp9Lki0oTSVxc0IsDO5i47ZOdKALJp80E","code":"xn1Nkgrcoh","id_token":"eyJraWQiOiJiMTQzN2M4NC1kMDg0LTQ5MGQtYTlkNS05YTg0Njg3ZDA0MTEiLCJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJ1c2VyLXN1YmplY3QtMTIzNDUzMSIsImF1ZCI6ImNsaWVudF9uYkxKdU9sSklQUkFYVHkzOTI2N19eXUBdIiwiY19oYXNoIjoiaG9VYldWYUJSV1NxdDluMTNNeWRVZyIsImlzcyI6Imh0dHBzOlwvXC93d3cuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0XC90ZXN0XC9EMFQyQ3RhVHl6TmVmZXpcLzEiLCJleHAiOjE1OTg5NjQ5MTUsIm5vbmNlIjoiaEFqOEVHLU93cjFROFFUVFd3T3ZpZG1hVHFleGlOaG45eWtHMTllaUlscyIsImlhdCI6MTU5ODk2NDYxNX0.NpLpWQa9Srrns0lklG_k7RqYGl3zi9PzKNY8Mqxszcaco1k8q7ya_OGvA33WfhoNI2BbrmolT6RivEAfdEh-pd9gRAIpE1DfgNouu56xGkxK30ru91dJBTHr0JGvQS6jP2S3isf68uhQb20UdiKTgpyt09XVYGZz-jIvkNx8xPpb9m7SYkaJdWTFsGmUDAvL1JuoVDU7Zy6iWag0NEqXD7hc2W8tLo8ju-_T3sU8EI2AUIwBednd-Rjdkuq_X-9_sioEgV6xtNNPyYhbgXwVN20rSFymqscvEJxFAe0pVVW3wUkRhNkS8pcIxvupeC38shIsAVCVNMuiOLCXXKEiXQ"}}]
outgoing_path
authorize
2020-09-01 12:50:17 FINISHED
oidcc-client-test-invalid-iss
Test has run to completion
testmodule_result
PASSED
Test Results