Test Summary

Test Results

Expand All Collapse All
All times are UTC
2020-09-01 12:50:40 INFO
TEST-RUNNER
Test instance ITgeH1F04R05u5A created
baseUrl
https://www.certification.openid.net/test/ITgeH1F04R05u5A
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "id_token",
  "request_type": "plain_http_request",
  "response_mode": "form_post",
  "client_registration": "dynamic_client"
}
alias

                                
description
test suite runner for openid-client
planId
2AWaC6uTX8byR
config
{
  "description": "test suite runner for openid-client",
  "waitTimeoutSeconds": 2
}
testName
oidcc-client-test-kid-absent-multiple-jwks
2020-09-01 12:50:40 SUCCESS
OIDCCGenerateServerConfiguration
Generated default server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/ITgeH1F04R05u5A/",
  "authorization_endpoint": "https://www.certification.openid.net/test/ITgeH1F04R05u5A/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/ITgeH1F04R05u5A/token",
  "jwks_uri": "https://www.certification.openid.net/test/ITgeH1F04R05u5A/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/ITgeH1F04R05u5A/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/ITgeH1F04R05u5A/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post",
    "client_secret_jwt",
    "private_key_jwt"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2020-09-01 12:50:40
SetTokenEndpointAuthMethodsSupportedToClientSecretBasicOnly
Changed token_endpoint_auth_methods_supported to client_secret_basic only in server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/ITgeH1F04R05u5A/",
  "authorization_endpoint": "https://www.certification.openid.net/test/ITgeH1F04R05u5A/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/ITgeH1F04R05u5A/token",
  "jwks_uri": "https://www.certification.openid.net/test/ITgeH1F04R05u5A/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/ITgeH1F04R05u5A/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/ITgeH1F04R05u5A/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2020-09-01 12:50:41
OIDCCGenerateServerJWKsMultipleSigningsKeyWithNoKeyIds
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "1_hnJrKiJymGzqtOfDHgmg1iYmjB3x4ZN6q57izU4B9YZVc9-v1nLgDxMaIUdp-VS-H_e90MJYnXldf67BLxb0tVFUBv2h3tXGkzp-KYwvpUae_Kn8ovoxYRYhx_-A6RLyKBPW2opFVk8xixWNOICB6V3lCDVNuMzQGXrKHPIJs",
      "kty": "RSA",
      "q": "pAK9PSv_cMa5-JiMMUbxcZhoEkugqrlRZfEc4_CD8LtWImzJxKw1uErOTgCQWUshToqpMXwviqPItyZSn8aUqr_1pl2WaLvxm_Rt46YBK8ZO3CybWud9bj9GVwlMo7nb2xurYszkDI4dQhOldSOEgbxxz1Jrfzoi5sqrKKXvFBM",
      "d": "hQ0OPV-CakQvyLp5hWVo4jyfitozz2Lja7WkKQPTmlhCXARfwWw4CLyFrx1RcHZCyCU3enTqvUZ4Iy5GFUKSByX7xdZpmHChjir3kzrW6myxUrYLRWpQZ7INRlO74INRjbZnUCw_1NsT_T7xjzCVxsEzO01IKWx4wb5p5zxzO1XsPp5zb6it3aPFqfdvQ26tBlA2R0Bt48AyVmpBPZB3S2cDEBbgU9Ip0ordV2aYTVlA7ZMCcsBd79HohabwzMeuG6-CEmy3DxrX6UTTD09HSisEE-GtXzh37vwjDsmvi-Cfl4wQAlnSd_Qg-YEQCeb3vVnlYm2zU86FiBJPrgz0cQ",
      "e": "AQAB",
      "use": "sig",
      "qi": "VvzO6KCxh4XQaQAJBUTFSWGjChH5tFIYnb97OhoTZw692LarsxKAU-mryDQ4vsQrLLx3GsP0pD-l_22WvwX4JTgqn9LTy5hVmhq-b1wGxumtdf2HIisU-iiVXpXU-NW5pMKLYqEsska30Vxu9YgR9FbJWXMLSu2yl9Ujn3rhuZU",
      "dp": "gQLtM4uwG67NzbU9fCkbX0sxg1HKxiqnq747tVBolb2Dw33bE4y-TxfW_OwyRy5LM_o78NT6BY6TDvrm9JDYUsBwgfJtHqGUAgkCB37v_EEnneTVaKCR1l0_YxldRGQHTF3TUEuqWwh79k_A2Sv7bcY_hn8YBN_l-yzBWymJnpM",
      "dq": "JUXyF-rd3JVtQk_43GIREQ3f6PiDBQmktBQ9ypeohJculhg_KpEwjDeD9zotk_19Dkp49SQR8eITBXySHnmU49FIVIzEV_0OhbDhIHFjpr0kwujoTZp6aQm8RJ96aWMd0gfRxVxnH2tUvuWUHrD5tjpLayCCCaH-uJCqoUxErz0",
      "n": "il1xq5gzpVvD7o7WD7EnXpL-dEiYILhF3TtbO0q26_LK5mcpq1PNEFk7Z3fm98K5AKI6AcXRX_RCAmX7j-sZ5C6dC0Tw_2hoHhQjrNDe9H6HSQDaXZVVfj86Yi3tl1Jn9s2RX1BRYOdJ-24EDfuRaG1MLSx8sCfqerUoE4Y9z0OZWEZoP8iIJ3DOma9UrxEgD2WaF0lCitxNAk55wLxTuLsqaaVhTOhEq_4WqTVDTKa0c0WbtaKkuTw98ffHXjKDakGsVcLVqIf0LIve13-vY1SKkAxbHj3n-lmArb1kk2ghdo5o0FaqwP2OYsO-Kr-n4nqFDFn68RXU3_APiKCHgQ"
    },
    {
      "kty": "EC",
      "d": "8utAmVW11uyecIeAdDEKkwZVZx8b3iLWHZ97Voi5h2c",
      "use": "sig",
      "crv": "P-256",
      "x": "E06FmrbJ_dxMIA0DK5JDeCwvFPIvtjfVoi2_Ld3S2kA",
      "y": "4xZbbp2DyYxZdt2fwNzSonlvEs3LaPd8g3cmkCNtrrQ"
    },
    {
      "kty": "EC",
      "d": "bDGcba6ZiCf59fRygkrPAFuQ25-EDwS8ZIHwgN-hwkA",
      "use": "sig",
      "crv": "secp256k1",
      "x": "OjOgkxMofXxqDe4L4_wjeHNRMsJrQBuFjrMFxQkm6Q0",
      "y": "GebEJYt-BO1UKxzWwnIa3QyYbhhnVBOXCBmSEdV5zGw"
    },
    {
      "kty": "OKP",
      "d": "i37bHZHb8L86Ik17LV3rUPqsQjNbldxyr7hjoopwRr8",
      "use": "sig",
      "crv": "Ed25519",
      "x": "yJB7uApRl-cEFdo1dGnmm5_xUdDXb8XqBBJ2GkQP5h4"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "-9uYnMlfrF0wWlzHnApXwuImKEyL2FZZVucMShovShmg2a4byh7oL7zY7-nlmaY_sFd_ESsN83JUMH5mexbCv_rBJnNYm4sAGlO92xttHIiV7e_tmW2JxSueearSRn7dZpfgTG5vyV13KcysDSxps9c9dHl7Ye4GPMowoL2Mf8s",
      "kty": "RSA",
      "q": "s5M-gxHIOkydqwlu4ictGTVw89rgQSsb8-dYfISWzXiYDbx8HZpEakFDgR_s5_0YXM_n1xMZ5xr0ztDqYCDKROembZRVsiHOvNtBgyC8k7KtpFbM3ofg6Y4PmqWm8dBs6kNevbPlGm51z4jE8-MQO3smHE-uEZHTc2iJaXELa9U",
      "d": "qQppFFFGd9DnBjswa6A5wfqIJbo9aUFR0htdqTBjSbVWumLykySmFusmByPYjwGljPqz_o4I9QEWSODGObpcJCG8kvQMLJHCtfGv9_romsjm5Un2kq0oFVS6YZmKRr2yr_jHqkq58Llz7kAvpKaWOm7AlkeV0MzevkBuRB7rfIbSEJF1cc98O9s9ea6uapILMFJdxNSAyNikShFwjW4IMfugQvRO28ZK65WYK4mhmNScxJZc-ir5mQehS3y9ksIbuP-mUucz-eLjtZpXQM3fVp3vy4Rh5IOtOQPg4ZiSfipU9V891p8xxkO8Q_Pnu3KRzy8GQC1JjWbk0mj6QWCXWQ",
      "e": "AQAB",
      "use": "enc",
      "qi": "2ruj2Hlgg_Iwl_J5hCCcgbOJOeRbNjHAgDBrbK5f6VWlfRDe5BiEFgaPuXRNh7bEQVn0qTNPkan4LyaRjynpgneBRBq3sOnLGzQjGQEoSM3urhMwtN7RP7djCtJFK3X_1uz2PrQr8MlIbmBEg4ywpnnz6ckhru07qsDXTLlyzWk",
      "dp": "IqT_ZjnRHk2nVBbFInLNxbIEG7ED35tpKKoZp6vYa3IBDVCE5BXCTKbGlKHxAmS7CA_RG9R3U9CbQhxxDmeAHJZqsVZWjvbc6cIxMI2iQbWMIjHJ1jwaInQwlX3o9OeInw8vPHRIjkN8G9Taqek9FQ77liUL0tnCI-SQMdxBEmc",
      "alg": "RSA-OAEP",
      "dq": "LQTnERjuJ595j52HzO6hYcaCEMB4pB3YnicLifv7inuHMzpjq1A3gqPl9oM4c1iCORJuPv8s6UFaylaZy4us6eVhVetwKH5NRA97txIH9MdAvQh9x_QssKDKzKxm1Ay6oWhOYiStdRjoNCVHqxTrxt2yyjo3m3QBnNdCS8rpYBk",
      "n": "sKtoTmSpKoIexSsTr1lkOtJQQSIpqeljMIyylhJ2ga_Dxi6_kQ0nmjRRFl4NCOWE7Io0PIK4DwgocN5YLv_4jCJ5r2f_YcmPsJbY5H_63OznqkV9y8izrACSA-kjOpZpmq3KJff5jCUar5quPEZP4cb_Fe19jM_Dfnvr8vk71awq_aOweIfzHs50hzIjKMWo8btMJPMLXYvdYu3xB0mi3ICTtBSQGfdhj10ccRiP8eh0hvT_AC3rWOQ8IY40N5Hpbyp5F4wrWIhmWqKmfMCT0LuYB8TlnAqVf5hLeYMvhvl-2j4mhN7a0Bu0ROmDd_CkYw2MrPEi5-srnNusiAks5w"
    },
    {
      "kty": "EC",
      "d": "ZPENd7FliPw-8VLGy9Bg95V44l6iOMKy4jpeWK3_Uug",
      "use": "enc",
      "crv": "P-256",
      "x": "0d8n-3Gguxwp5TyvVd9Dkowu4e4zcXdkrPMJeb39ivc",
      "y": "d2e7Y89n4zwjKI_A5wQ2mKkXIRt22uUytMW6EG5PvlY",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "n": "p7SPQ4-w3ldy9skXdH-qqMWqgpy-XEF9A4OIjQRgy5wCmkJCL0OcTsEHE1Pwxd3NAWcieEM_m93HN1V-ieFDlP6rAoHEh6nCZDcPXXU4zaWOhOvEvmX0LShLkvRXfKji-WCdhxIkZO2Dz0avkWiAZcGUAhgWQfFfz9iu5UDj5piFQKHfjXf7iTcoL2SWWdZTL3WH4FyMeVDz6JdBkpUSJyd59aT5hCLwiavJ65qCmasHaaz0RDxq9j3cp0ZQ9vsvHn7hOhgbHt1Lx4brILAEb0FrWjGZA4ubTlbFAHqeGF1fDWRjo9OWPTb0IQLzd_0KJpBKHotb0oxrdqlVm3h8tw"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "n": "il1xq5gzpVvD7o7WD7EnXpL-dEiYILhF3TtbO0q26_LK5mcpq1PNEFk7Z3fm98K5AKI6AcXRX_RCAmX7j-sZ5C6dC0Tw_2hoHhQjrNDe9H6HSQDaXZVVfj86Yi3tl1Jn9s2RX1BRYOdJ-24EDfuRaG1MLSx8sCfqerUoE4Y9z0OZWEZoP8iIJ3DOma9UrxEgD2WaF0lCitxNAk55wLxTuLsqaaVhTOhEq_4WqTVDTKa0c0WbtaKkuTw98ffHXjKDakGsVcLVqIf0LIve13-vY1SKkAxbHj3n-lmArb1kk2ghdo5o0FaqwP2OYsO-Kr-n4nqFDFn68RXU3_APiKCHgQ"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "n": "qbXPm8wkyqjEB_mHvZivL6ZaJT9GCI5BtDn1tmXAtbKOAOh1Fq8mL2ePIPN5xHOB9FtjJ6J_ILmdRB8otu4v9wTvEQLkwpsG-NqYTeO6dtF7rhKJVOMf6kKRbLoW8Orkh_kjm23WWKe-ksEn6j1XzK7I15GKFJCSg6rtA6LWMJDn8oEYeN8J2O4UeTfMmVNAOCkDSHIwBaQjWY4HvCgpcBYDoFPqrwe9B8LvPSF7ITG45YNIyHHTAmAqq-Zbujd5I3a9dazt8VGJ2rh65ilv1KoOYlj_AwKx7pzrTpABtOEmdOU3UOl_9HHZLcZ_t2qKAiQnYMIwzPM02LXIdAvR1w"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "x": "CkM_eShQ1Ehx889KSzqMoxwJ7pTSsF-MXiga4UVB9QM",
      "y": "0p1EF0URh1CUy-eIRtKr5bNRaDQ7z_75T0jLuP_Fer4"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "x": "E06FmrbJ_dxMIA0DK5JDeCwvFPIvtjfVoi2_Ld3S2kA",
      "y": "4xZbbp2DyYxZdt2fwNzSonlvEs3LaPd8g3cmkCNtrrQ"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "x": "jbJrVm4OHkBrjNfvGtMqgajJUCHDM3WssuRwFYbFwRM",
      "y": "Soax8e9GzeqiFi0F7N-NXxPYBxNzn7pR8cwnFh8DgoM"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "x": "xcDo_fq6Yhi2SB3FKb6MiNXN2Ly78AhByQL0rHAv9uE",
      "y": "h9bHOuNwfSJMosvmPZAOIldqdP_xgIptguxPQqR-VFg"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "x": "OjOgkxMofXxqDe4L4_wjeHNRMsJrQBuFjrMFxQkm6Q0",
      "y": "GebEJYt-BO1UKxzWwnIa3QyYbhhnVBOXCBmSEdV5zGw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "x": "KeAkXl0Fy9VLRJ2yLmQIIU1Dy14kT8ISKGT8cgkhDWU",
      "y": "hZTUk55Zc11URjjtFnyI6nrA_jRTvcQTfSA7BiNJifk"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "x": "ZSVEo0tvFaLf2cWXCMtg9Qh7i-b50FnsW6l7IrUY7sA"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "x": "yJB7uApRl-cEFdo1dGnmm5_xUdDXb8XqBBJ2GkQP5h4"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "x": "HcymYevyiNMQXtdjLy_oleeSr-vP2zJx8AdxZyF_mO8"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "alg": "RSA-OAEP",
      "n": "sKtoTmSpKoIexSsTr1lkOtJQQSIpqeljMIyylhJ2ga_Dxi6_kQ0nmjRRFl4NCOWE7Io0PIK4DwgocN5YLv_4jCJ5r2f_YcmPsJbY5H_63OznqkV9y8izrACSA-kjOpZpmq3KJff5jCUar5quPEZP4cb_Fe19jM_Dfnvr8vk71awq_aOweIfzHs50hzIjKMWo8btMJPMLXYvdYu3xB0mi3ICTtBSQGfdhj10ccRiP8eh0hvT_AC3rWOQ8IY40N5Hpbyp5F4wrWIhmWqKmfMCT0LuYB8TlnAqVf5hLeYMvhvl-2j4mhN7a0Bu0ROmDd_CkYw2MrPEi5-srnNusiAks5w"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "x": "0d8n-3Gguxwp5TyvVd9Dkowu4e4zcXdkrPMJeb39ivc",
      "y": "d2e7Y89n4zwjKI_A5wQ2mKkXIRt22uUytMW6EG5PvlY",
      "alg": "ECDH-ES"
    }
  ]
}
2020-09-01 12:50:41 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2020-09-01 12:50:41 SUCCESS
OIDCCLoadUserInfo
Added user information
user_info
{
  "sub": "user-subject-1234531",
  "name": "Demo T. User",
  "given_name": "Demo",
  "family_name": "User",
  "middle_name": "Theresa",
  "nickname": "Dee",
  "preferred_username": "d.tu",
  "gender": "female",
  "birthdate": "2000-02-03",
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "zoneinfo": "America/Los_Angeles",
  "locale": "en-US",
  "phone_number": "+1 555 5550000",
  "phone_number_verified": false,
  "email": "user@example.com",
  "email_verified": false,
  "website": "https://openid.net/",
  "updated_at": "1580000000"
}
2020-09-01 12:50:41 SUCCESS
GetDynamicClientConfiguration
No client details on configuration, created an empty dynamic_client_registration_template object.
2020-09-01 12:50:41
oidcc-client-test-kid-absent-multiple-jwks
Setup Done
2020-09-01 12:50:44 INCOMING
oidcc-client-test-kid-absent-multiple-jwks
Incoming HTTP request to test instance ITgeH1F04R05u5A
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
.well-known/openid-configuration
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Discovery endpoint
2020-09-01 12:50:44 OUTGOING
oidcc-client-test-kid-absent-multiple-jwks
Response to HTTP request to test instance ITgeH1F04R05u5A
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "issuer": "https://www.certification.openid.net/test/ITgeH1F04R05u5A/",
  "authorization_endpoint": "https://www.certification.openid.net/test/ITgeH1F04R05u5A/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/ITgeH1F04R05u5A/token",
  "jwks_uri": "https://www.certification.openid.net/test/ITgeH1F04R05u5A/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/ITgeH1F04R05u5A/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/ITgeH1F04R05u5A/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
outgoing_path
.well-known/openid-configuration
2020-09-01 12:50:44 INCOMING
oidcc-client-test-kid-absent-multiple-jwks
Incoming HTTP request to test instance ITgeH1F04R05u5A
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "content-type": "application/json",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "155",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
register
incoming_body_form_params
incoming_method
POST
incoming_body_json
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "id_token"
  ],
  "grant_types": [
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ]
}
incoming_query_string_params
{}
incoming_body
{"token_endpoint_auth_method":"client_secret_basic","response_types":["id_token"],"grant_types":["implicit"],"redirect_uris":["https://rp.example.com/cb"]}
Registration endpoint
2020-09-01 12:50:44 SUCCESS
OIDCCExtractDynamicRegistrationRequest
Extracted dynamic client registration request
request
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "id_token"
  ],
  "grant_types": [
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ]
}
2020-09-01 12:50:44 INFO
EnsureRegistrationRequestContainsAtLeastOneContact
This application requires that registration requests contain at least one contact.
2020-09-01 12:50:44 SUCCESS
ValidateClientGrantTypes
grant_types match response_types
grant_types
[
  "implicit"
]
response_types
[
  "id_token"
]
2020-09-01 12:50:44 SUCCESS
OIDCCValidateClientRedirectUris
Valid redirect_uri(s) provided in registration request
redirect_uris
[
  "https://rp.example.com/cb"
]
2020-09-01 12:50:44 SUCCESS
ValidateClientLogoUris
Client does not contain any logo_uri
2020-09-01 12:50:44 SUCCESS
ValidateClientUris
Client does not contain any client_uri
2020-09-01 12:50:44 SUCCESS
ValidateClientPolicyUris
Client does not contain any policy_uri
2020-09-01 12:50:44 SUCCESS
ValidateClientTosUris
Client does not contain any tos_uri
2020-09-01 12:50:44 SUCCESS
ValidateClientSubjectType
A subject_type was not provided
2020-09-01 12:50:44 INFO
ValidateIdTokenSignedResponseAlg
Skipped evaluation due to missing required element: client id_token_signed_response_alg
path
id_token_signed_response_alg
mapped
object
client
2020-09-01 12:50:44 SUCCESS
EnsureIdTokenEncryptedResponseAlgIsSetIfEncIsSet
id_token_encrypted_response_enc is not set
2020-09-01 12:50:44 INFO
ValidateUserinfoSignedResponseAlg
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2020-09-01 12:50:44 SUCCESS
EnsureUserinfoEncryptedResponseAlgIsSetIfEncIsSet
userinfo_encrypted_response_enc is not set
2020-09-01 12:50:44 INFO
ValidateRequestObjectSigningAlg
Skipped evaluation due to missing required element: client request_object_signing_alg
path
request_object_signing_alg
mapped
object
client
2020-09-01 12:50:44 SUCCESS
EnsureRequestObjectEncryptionAlgIsSetIfEncIsSet
request_object_encryption_enc is not set
2020-09-01 12:50:44 INFO
ValidateTokenEndpointAuthSigningAlg
Skipped evaluation due to missing required element: client token_endpoint_auth_signing_alg
path
token_endpoint_auth_signing_alg
mapped
object
client
2020-09-01 12:50:44 SUCCESS
ValidateDefaultMaxAge
default_max_age is not set
2020-09-01 12:50:44 INFO
ValidateRequireAuthTime
Skipped evaluation due to missing required element: client require_auth_time
path
require_auth_time
mapped
object
client
2020-09-01 12:50:44 INFO
ValidateDefaultAcrValues
Skipped evaluation due to missing required element: client default_acr_values
path
default_acr_values
mapped
object
client
2020-09-01 12:50:44 INFO
ValidateInitiateLoginUri
Skipped evaluation due to missing required element: client initiate_login_uri
path
initiate_login_uri
mapped
object
client
2020-09-01 12:50:44 INFO
ValidateRequestUris
Skipped evaluation due to missing required element: client request_uris
path
request_uris
mapped
object
client
2020-09-01 12:50:44 SUCCESS
ValidateClientRegistrationRequestSectorIdentifierUri
A sector_identifier_uri was not provided
2020-09-01 12:50:44 SUCCESS
OIDCCRegisterClient
Registered client
client
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "id_token"
  ],
  "grant_types": [
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_usSLNsyCurzGqAA09076+\u003e;/."
}
2020-09-01 12:50:44
OIDCCCreateClientSecretForDynamicClient
Set the secret for registered client
client_secret
secret_GCKUMaMataaZZFBKeIGTaxpseUvmTPZoSSbbEakkyoJdiKoEKt1514276635\]"[=
2020-09-01 12:50:44 SUCCESS
EnsureTokenEndPointAuthMethodIsClientSecretBasic
token_endpoint_auth_method is 'client_secret_basic' as expected
2020-09-01 12:50:44 SUCCESS
EnsureClientDoesNotHaveBothJwksAndJwksUri
Client does not have both jwks and jwks_uri set
client
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "id_token"
  ],
  "grant_types": [
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_usSLNsyCurzGqAA09076+\u003e;/.",
  "client_secret": "secret_GCKUMaMataaZZFBKeIGTaxpseUvmTPZoSSbbEakkyoJdiKoEKt1514276635\\]\"[\u003d"
}
2020-09-01 12:50:44 INFO
FetchClientKeys
Skipped evaluation due to missing required element: client jwks_uri
path
jwks_uri
mapped
object
client
2020-09-01 12:50:44
SetServerSigningAlgToRS256
Successfully set signing algorithm to RS256
2020-09-01 12:50:44
SetClientIdTokenSignedResponseAlgToServerSigningAlg
Set id_token_signed_response_alg for the registered client
id_token_signed_response_alg
RS256
2020-09-01 12:50:44 OUTGOING
oidcc-client-test-kid-absent-multiple-jwks
Response to HTTP request to test instance ITgeH1F04R05u5A
outgoing_status_code
201
outgoing_headers
{}
outgoing_body
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "id_token"
  ],
  "grant_types": [
    "implicit"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_usSLNsyCurzGqAA09076+\u003e;/.",
  "client_secret": "secret_GCKUMaMataaZZFBKeIGTaxpseUvmTPZoSSbbEakkyoJdiKoEKt1514276635\\]\"[\u003d",
  "id_token_signed_response_alg": "RS256"
}
outgoing_path
register
2020-09-01 12:50:45 INCOMING
oidcc-client-test-kid-absent-multiple-jwks
Incoming HTTP request to test instance ITgeH1F04R05u5A
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "got/9.6.0 (https://github.com/sindresorhus/got)",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
authorize
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "client_id": "client_usSLNsyCurzGqAA09076+\u003e;/.",
  "scope": "openid",
  "response_type": "id_token",
  "redirect_uri": "https://rp.example.com/cb",
  "state": "tuXQv0eXYXJer6YU84Z89lETBlIoe1XoOX1tkjLzHrw",
  "nonce": "gdOgyVm1aZShYRsORhGsxfiOSrJaIxB-44cU2zPnSrc",
  "response_mode": "form_post"
}
incoming_body
Authorization endpoint
2020-09-01 12:50:45 SUCCESS
EnsureRequestDoesNotContainRequestObject
Request does not contain a request parameter
2020-09-01 12:50:45 SUCCESS
OIDCCEnsureAuthorizationHttpRequestContainsOpenIDScope
Found 'openid' in scope http request parameter
actual
[
  "openid"
]
expected
openid
2020-09-01 12:50:45 SUCCESS
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
effective_authorization_endpoint_request
{
  "client_id": "client_usSLNsyCurzGqAA09076+\u003e;/.",
  "scope": "openid",
  "response_type": "id_token",
  "redirect_uri": "https://rp.example.com/cb",
  "state": "tuXQv0eXYXJer6YU84Z89lETBlIoe1XoOX1tkjLzHrw",
  "nonce": "gdOgyVm1aZShYRsORhGsxfiOSrJaIxB-44cU2zPnSrc",
  "response_mode": "form_post"
}
2020-09-01 12:50:45 SUCCESS
ExtractRequestedScopes
Requested scopes
scope
openid
2020-09-01 12:50:45 SUCCESS
ExtractNonceFromAuthorizationRequest
Extracted nonce
nonce
gdOgyVm1aZShYRsORhGsxfiOSrJaIxB-44cU2zPnSrc
2020-09-01 12:50:45 SUCCESS
EnsureResponseTypeIsIdToken
Response type is expected value
expected
id_token
2020-09-01 12:50:45 SUCCESS
EnsureMatchingClientId
Client ID matched
client_id
client_usSLNsyCurzGqAA09076+>;/.
2020-09-01 12:50:45 SUCCESS
EnsureValidRedirectUriForAuthorizationEndpointRequest
redirect_uri is one of the allowed redirect uris
actual
https://rp.example.com/cb
expected
[
  "https://rp.example.com/cb"
]
2020-09-01 12:50:45 SUCCESS
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
actual
[
  "openid"
]
expected
openid
2020-09-01 12:50:45 SUCCESS
DisallowMaxAgeEqualsZeroAndPromptNone
The client did not send max_age=0 and prompt=none parameters as expected
2020-09-01 12:50:45 SUCCESS
GenerateIdTokenClaims
Created ID Token Claims
iss
https://www.certification.openid.net/test/ITgeH1F04R05u5A/
sub
user-subject-1234531
aud
client_usSLNsyCurzGqAA09076+>;/.
nonce
gdOgyVm1aZShYRsORhGsxfiOSrJaIxB-44cU2zPnSrc
iat
1598964645
exp
1598964945
2020-09-01 12:50:45 INFO
AddCHashToIdTokenClaims
Skipped evaluation due to missing required string: c_hash
expected
c_hash
2020-09-01 12:50:45 INFO
AddAtHashToIdTokenClaims
Skipped evaluation due to missing required string: at_hash
expected
at_hash
2020-09-01 12:50:45 SUCCESS
OIDCCSignIdToken
Signed the ID token
id_token
eyJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJ1c2VyLXN1YmplY3QtMTIzNDUzMSIsImF1ZCI6ImNsaWVudF91c1NMTnN5Q3VyekdxQUEwOTA3Nis-O1wvLiIsImlzcyI6Imh0dHBzOlwvXC93d3cuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0XC90ZXN0XC9JVGdlSDFGMDRSMDV1NUFcLyIsImV4cCI6MTU5ODk2NDk0NSwibm9uY2UiOiJnZE9neVZtMWFaU2hZUnNPUmhHc3hmaU9TckphSXhCLTQ0Y1UyelBuU3JjIiwiaWF0IjoxNTk4OTY0NjQ1fQ.HyobqeD4yCGe_YqNB0m4uSk57yIQfsvibVQ0rFhREYzpUtSWz9kG26E-3qaQjpMRZ9b73I1aXa85HKacGC3NlrXOoWqHiVSrePsMn1tZGV2IIl5S6DedVn_wUmRePlDWEoP5RDsjHd7L8OSla7BCo-wBt5_sUMmCq18aiY88SYnTP0eohdAZyBc8eOHBoG0jngL7odRa3rn4r6orQ412O8cElmX_Bkuh0NJkv-Ev9dkcf-sW1ccFzhZR0Gvw7DMztCLGIIgEb59ST0o8gQgsLPW4t4Amqy5resNEl2rFwJ2trhSx-uK9dHAcV-vaeC1_lXDyjxpSk5jg8-3N9wDMZA
key
{"p":"1_hnJrKiJymGzqtOfDHgmg1iYmjB3x4ZN6q57izU4B9YZVc9-v1nLgDxMaIUdp-VS-H_e90MJYnXldf67BLxb0tVFUBv2h3tXGkzp-KYwvpUae_Kn8ovoxYRYhx_-A6RLyKBPW2opFVk8xixWNOICB6V3lCDVNuMzQGXrKHPIJs","kty":"RSA","q":"pAK9PSv_cMa5-JiMMUbxcZhoEkugqrlRZfEc4_CD8LtWImzJxKw1uErOTgCQWUshToqpMXwviqPItyZSn8aUqr_1pl2WaLvxm_Rt46YBK8ZO3CybWud9bj9GVwlMo7nb2xurYszkDI4dQhOldSOEgbxxz1Jrfzoi5sqrKKXvFBM","d":"hQ0OPV-CakQvyLp5hWVo4jyfitozz2Lja7WkKQPTmlhCXARfwWw4CLyFrx1RcHZCyCU3enTqvUZ4Iy5GFUKSByX7xdZpmHChjir3kzrW6myxUrYLRWpQZ7INRlO74INRjbZnUCw_1NsT_T7xjzCVxsEzO01IKWx4wb5p5zxzO1XsPp5zb6it3aPFqfdvQ26tBlA2R0Bt48AyVmpBPZB3S2cDEBbgU9Ip0ordV2aYTVlA7ZMCcsBd79HohabwzMeuG6-CEmy3DxrX6UTTD09HSisEE-GtXzh37vwjDsmvi-Cfl4wQAlnSd_Qg-YEQCeb3vVnlYm2zU86FiBJPrgz0cQ","e":"AQAB","use":"sig","qi":"VvzO6KCxh4XQaQAJBUTFSWGjChH5tFIYnb97OhoTZw692LarsxKAU-mryDQ4vsQrLLx3GsP0pD-l_22WvwX4JTgqn9LTy5hVmhq-b1wGxumtdf2HIisU-iiVXpXU-NW5pMKLYqEsska30Vxu9YgR9FbJWXMLSu2yl9Ujn3rhuZU","dp":"gQLtM4uwG67NzbU9fCkbX0sxg1HKxiqnq747tVBolb2Dw33bE4y-TxfW_OwyRy5LM_o78NT6BY6TDvrm9JDYUsBwgfJtHqGUAgkCB37v_EEnneTVaKCR1l0_YxldRGQHTF3TUEuqWwh79k_A2Sv7bcY_hn8YBN_l-yzBWymJnpM","dq":"JUXyF-rd3JVtQk_43GIREQ3f6PiDBQmktBQ9ypeohJculhg_KpEwjDeD9zotk_19Dkp49SQR8eITBXySHnmU49FIVIzEV_0OhbDhIHFjpr0kwujoTZp6aQm8RJ96aWMd0gfRxVxnH2tUvuWUHrD5tjpLayCCCaH-uJCqoUxErz0","n":"il1xq5gzpVvD7o7WD7EnXpL-dEiYILhF3TtbO0q26_LK5mcpq1PNEFk7Z3fm98K5AKI6AcXRX_RCAmX7j-sZ5C6dC0Tw_2hoHhQjrNDe9H6HSQDaXZVVfj86Yi3tl1Jn9s2RX1BRYOdJ-24EDfuRaG1MLSx8sCfqerUoE4Y9z0OZWEZoP8iIJ3DOma9UrxEgD2WaF0lCitxNAk55wLxTuLsqaaVhTOhEq_4WqTVDTKa0c0WbtaKkuTw98ffHXjKDakGsVcLVqIf0LIve13-vY1SKkAxbHj3n-lmArb1kk2ghdo5o0FaqwP2OYsO-Kr-n4nqFDFn68RXU3_APiKCHgQ"}
algorithm
RS256
2020-09-01 12:50:45 INFO
EncryptIdToken
Skipped evaluation due to missing required element: client id_token_encrypted_response_alg
path
id_token_encrypted_response_alg
mapped
object
client
2020-09-01 12:50:45 SUCCESS
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "tuXQv0eXYXJer6YU84Z89lETBlIoe1XoOX1tkjLzHrw"
}
2020-09-01 12:50:45 SUCCESS
AddIdTokenToAuthorizationEndpointResponseParams
Added id_token to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "tuXQv0eXYXJer6YU84Z89lETBlIoe1XoOX1tkjLzHrw",
  "id_token": "eyJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJ1c2VyLXN1YmplY3QtMTIzNDUzMSIsImF1ZCI6ImNsaWVudF91c1NMTnN5Q3VyekdxQUEwOTA3Nis-O1wvLiIsImlzcyI6Imh0dHBzOlwvXC93d3cuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0XC90ZXN0XC9JVGdlSDFGMDRSMDV1NUFcLyIsImV4cCI6MTU5ODk2NDk0NSwibm9uY2UiOiJnZE9neVZtMWFaU2hZUnNPUmhHc3hmaU9TckphSXhCLTQ0Y1UyelBuU3JjIiwiaWF0IjoxNTk4OTY0NjQ1fQ.HyobqeD4yCGe_YqNB0m4uSk57yIQfsvibVQ0rFhREYzpUtSWz9kG26E-3qaQjpMRZ9b73I1aXa85HKacGC3NlrXOoWqHiVSrePsMn1tZGV2IIl5S6DedVn_wUmRePlDWEoP5RDsjHd7L8OSla7BCo-wBt5_sUMmCq18aiY88SYnTP0eohdAZyBc8eOHBoG0jngL7odRa3rn4r6orQ412O8cElmX_Bkuh0NJkv-Ev9dkcf-sW1ccFzhZR0Gvw7DMztCLGIIgEb59ST0o8gQgsLPW4t4Amqy5resNEl2rFwJ2trhSx-uK9dHAcV-vaeC1_lXDyjxpSk5jg8-3N9wDMZA"
}
2020-09-01 12:50:45 OUTGOING
oidcc-client-test-kid-absent-multiple-jwks
Response to HTTP request to test instance ITgeH1F04R05u5A
outgoing
ModelAndView [view="formPostResponseMode"; model={formAction=https://rp.example.com/cb, formParameters={"state":"tuXQv0eXYXJer6YU84Z89lETBlIoe1XoOX1tkjLzHrw","id_token":"eyJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJ1c2VyLXN1YmplY3QtMTIzNDUzMSIsImF1ZCI6ImNsaWVudF91c1NMTnN5Q3VyekdxQUEwOTA3Nis-O1wvLiIsImlzcyI6Imh0dHBzOlwvXC93d3cuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0XC90ZXN0XC9JVGdlSDFGMDRSMDV1NUFcLyIsImV4cCI6MTU5ODk2NDk0NSwibm9uY2UiOiJnZE9neVZtMWFaU2hZUnNPUmhHc3hmaU9TckphSXhCLTQ0Y1UyelBuU3JjIiwiaWF0IjoxNTk4OTY0NjQ1fQ.HyobqeD4yCGe_YqNB0m4uSk57yIQfsvibVQ0rFhREYzpUtSWz9kG26E-3qaQjpMRZ9b73I1aXa85HKacGC3NlrXOoWqHiVSrePsMn1tZGV2IIl5S6DedVn_wUmRePlDWEoP5RDsjHd7L8OSla7BCo-wBt5_sUMmCq18aiY88SYnTP0eohdAZyBc8eOHBoG0jngL7odRa3rn4r6orQ412O8cElmX_Bkuh0NJkv-Ev9dkcf-sW1ccFzhZR0Gvw7DMztCLGIIgEb59ST0o8gQgsLPW4t4Amqy5resNEl2rFwJ2trhSx-uK9dHAcV-vaeC1_lXDyjxpSk5jg8-3N9wDMZA"}}]
outgoing_path
authorize
2020-09-01 12:50:45 INCOMING
oidcc-client-test-kid-absent-multiple-jwks
Incoming HTTP request to test instance ITgeH1F04R05u5A
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
jwks
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Jwks endpoint
2020-09-01 12:50:45 OUTGOING
oidcc-client-test-kid-absent-multiple-jwks
Response to HTTP request to test instance ITgeH1F04R05u5A
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "n": "p7SPQ4-w3ldy9skXdH-qqMWqgpy-XEF9A4OIjQRgy5wCmkJCL0OcTsEHE1Pwxd3NAWcieEM_m93HN1V-ieFDlP6rAoHEh6nCZDcPXXU4zaWOhOvEvmX0LShLkvRXfKji-WCdhxIkZO2Dz0avkWiAZcGUAhgWQfFfz9iu5UDj5piFQKHfjXf7iTcoL2SWWdZTL3WH4FyMeVDz6JdBkpUSJyd59aT5hCLwiavJ65qCmasHaaz0RDxq9j3cp0ZQ9vsvHn7hOhgbHt1Lx4brILAEb0FrWjGZA4ubTlbFAHqeGF1fDWRjo9OWPTb0IQLzd_0KJpBKHotb0oxrdqlVm3h8tw"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "n": "il1xq5gzpVvD7o7WD7EnXpL-dEiYILhF3TtbO0q26_LK5mcpq1PNEFk7Z3fm98K5AKI6AcXRX_RCAmX7j-sZ5C6dC0Tw_2hoHhQjrNDe9H6HSQDaXZVVfj86Yi3tl1Jn9s2RX1BRYOdJ-24EDfuRaG1MLSx8sCfqerUoE4Y9z0OZWEZoP8iIJ3DOma9UrxEgD2WaF0lCitxNAk55wLxTuLsqaaVhTOhEq_4WqTVDTKa0c0WbtaKkuTw98ffHXjKDakGsVcLVqIf0LIve13-vY1SKkAxbHj3n-lmArb1kk2ghdo5o0FaqwP2OYsO-Kr-n4nqFDFn68RXU3_APiKCHgQ"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "n": "qbXPm8wkyqjEB_mHvZivL6ZaJT9GCI5BtDn1tmXAtbKOAOh1Fq8mL2ePIPN5xHOB9FtjJ6J_ILmdRB8otu4v9wTvEQLkwpsG-NqYTeO6dtF7rhKJVOMf6kKRbLoW8Orkh_kjm23WWKe-ksEn6j1XzK7I15GKFJCSg6rtA6LWMJDn8oEYeN8J2O4UeTfMmVNAOCkDSHIwBaQjWY4HvCgpcBYDoFPqrwe9B8LvPSF7ITG45YNIyHHTAmAqq-Zbujd5I3a9dazt8VGJ2rh65ilv1KoOYlj_AwKx7pzrTpABtOEmdOU3UOl_9HHZLcZ_t2qKAiQnYMIwzPM02LXIdAvR1w"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "x": "CkM_eShQ1Ehx889KSzqMoxwJ7pTSsF-MXiga4UVB9QM",
      "y": "0p1EF0URh1CUy-eIRtKr5bNRaDQ7z_75T0jLuP_Fer4"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "x": "E06FmrbJ_dxMIA0DK5JDeCwvFPIvtjfVoi2_Ld3S2kA",
      "y": "4xZbbp2DyYxZdt2fwNzSonlvEs3LaPd8g3cmkCNtrrQ"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "x": "jbJrVm4OHkBrjNfvGtMqgajJUCHDM3WssuRwFYbFwRM",
      "y": "Soax8e9GzeqiFi0F7N-NXxPYBxNzn7pR8cwnFh8DgoM"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "x": "xcDo_fq6Yhi2SB3FKb6MiNXN2Ly78AhByQL0rHAv9uE",
      "y": "h9bHOuNwfSJMosvmPZAOIldqdP_xgIptguxPQqR-VFg"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "x": "OjOgkxMofXxqDe4L4_wjeHNRMsJrQBuFjrMFxQkm6Q0",
      "y": "GebEJYt-BO1UKxzWwnIa3QyYbhhnVBOXCBmSEdV5zGw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "x": "KeAkXl0Fy9VLRJ2yLmQIIU1Dy14kT8ISKGT8cgkhDWU",
      "y": "hZTUk55Zc11URjjtFnyI6nrA_jRTvcQTfSA7BiNJifk"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "x": "ZSVEo0tvFaLf2cWXCMtg9Qh7i-b50FnsW6l7IrUY7sA"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "x": "yJB7uApRl-cEFdo1dGnmm5_xUdDXb8XqBBJ2GkQP5h4"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "x": "HcymYevyiNMQXtdjLy_oleeSr-vP2zJx8AdxZyF_mO8"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "alg": "RSA-OAEP",
      "n": "sKtoTmSpKoIexSsTr1lkOtJQQSIpqeljMIyylhJ2ga_Dxi6_kQ0nmjRRFl4NCOWE7Io0PIK4DwgocN5YLv_4jCJ5r2f_YcmPsJbY5H_63OznqkV9y8izrACSA-kjOpZpmq3KJff5jCUar5quPEZP4cb_Fe19jM_Dfnvr8vk71awq_aOweIfzHs50hzIjKMWo8btMJPMLXYvdYu3xB0mi3ICTtBSQGfdhj10ccRiP8eh0hvT_AC3rWOQ8IY40N5Hpbyp5F4wrWIhmWqKmfMCT0LuYB8TlnAqVf5hLeYMvhvl-2j4mhN7a0Bu0ROmDd_CkYw2MrPEi5-srnNusiAks5w"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "x": "0d8n-3Gguxwp5TyvVd9Dkowu4e4zcXdkrPMJeb39ivc",
      "y": "d2e7Y89n4zwjKI_A5wQ2mKkXIRt22uUytMW6EG5PvlY",
      "alg": "ECDH-ES"
    }
  ]
}
outgoing_path
jwks
2020-09-01 12:50:45 FINISHED
oidcc-client-test-kid-absent-multiple-jwks
Test has run to completion
testmodule_result
PASSED
Test Results