Test Summary

Test Results

Expand All Collapse All
All times are UTC
2020-09-01 12:49:39 INFO
TEST-RUNNER
Test instance 2OoY6yFgSP7XDk8 created
baseUrl
https://www.certification.openid.net/test/2OoY6yFgSP7XDk8
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code",
  "request_type": "plain_http_request",
  "response_mode": "form_post",
  "client_registration": "dynamic_client"
}
alias

                                
description
test suite runner for openid-client
planId
vvcwgQI1komVg
config
{
  "description": "test suite runner for openid-client",
  "waitTimeoutSeconds": 2
}
testName
oidcc-client-test-idtoken-sig-none
2020-09-01 12:49:39 SUCCESS
OIDCCGenerateServerConfiguration
Generated default server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/2OoY6yFgSP7XDk8/",
  "authorization_endpoint": "https://www.certification.openid.net/test/2OoY6yFgSP7XDk8/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/2OoY6yFgSP7XDk8/token",
  "jwks_uri": "https://www.certification.openid.net/test/2OoY6yFgSP7XDk8/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/2OoY6yFgSP7XDk8/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/2OoY6yFgSP7XDk8/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post",
    "client_secret_jwt",
    "private_key_jwt"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2020-09-01 12:49:39
SetTokenEndpointAuthMethodsSupportedToClientSecretBasicOnly
Changed token_endpoint_auth_methods_supported to client_secret_basic only in server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/2OoY6yFgSP7XDk8/",
  "authorization_endpoint": "https://www.certification.openid.net/test/2OoY6yFgSP7XDk8/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/2OoY6yFgSP7XDk8/token",
  "jwks_uri": "https://www.certification.openid.net/test/2OoY6yFgSP7XDk8/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/2OoY6yFgSP7XDk8/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/2OoY6yFgSP7XDk8/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2020-09-01 12:49:39
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "5S2UMmMr-QCny5mcLdwM9-4DPj0FbjjcncVzYduamRT6ISSd0snfNjrU65b1_LoQiJrXstprh_Ay2EET2sU4_iM4cQG1qexcHoyPe4tDo9INgkZwvyn14J2s8g-DqvJa3TVQsRrXh07K-W-F7Vou4oje9q8nvFn03L6hmkmn_uM",
      "kty": "RSA",
      "q": "1nwSqLj5JN6sDKzvbzVKLtZPbSwL3YQgNjunNpBdD-9xXnj00T3DD3qakIbdySrmf9axkIsfkZofjkccQts7eXA981LD4xxLTwhqH3jwJqBVD5i5-fOYAeehBe-J7mM1M1e4PabYHdp4aHZXdc9i5LEkdgiing7xjZjzMyACnn0",
      "d": "rOUu3rgc3qpVBoNIqviVTKwUc0viR8kPXeCNnGdb00sJKqYIA8yhWWvN2RWL8XgLA4YAwQmLKEb7Gt6ggs57ya0JDlovbIr8lN2xLRwdmlhpcFLiRTkgoXTFZn7JvHoSoCbqyPipZl9Z0IOfyv_b9PlTYwE7uFgUU1ZbMFPwRdfto4cJQldo_YdqDmHApbG1LBRT_7Hqeww28hijNhAOWAiIaZ6hVvYMPENguMXsRd7ZVgKagx5Q6yrDfivOJ00b_Zo_t3bIIiOKVkV7enQKd_fSWohSSQvwLU5E34hfaUK2sQXbSs0pg3fZjaTx-ErIk5J2vLwX_o_11ZnJllVR4Q",
      "e": "AQAB",
      "use": "sig",
      "kid": "0447bc06-9c04-4372-b89c-b6ef1ee37cb6",
      "qi": "19n0PN-Mu19DVoMEskGukYxRC41YaektZVHlLoD3KycNlX3vRh9V0obCsACQ3yphVOvcO1806LsoTQzzMIYv0errvlB-CpqIg4jsrW-O-1X8xTvEGIdL2iqvpEFgUWgLuX53XQt6WSttjP9qEGQQPrGUYdmtLXIqgIuGzuegb4E",
      "dp": "bgjGQLMQ58sCxWSJchNXPqrOb9GIi_VNJ4sn7PItdhZ2Sfd0t0Ipo7X3iO3ASYlkatI9gigQvQH8x4vnZoCO7qYmcUuq110elaRTN7QT09IEnmoHtCEHZsMNyGLeivM14UO57G7A0LxqA_0hxmYoYKfqtXI_l9VxFZOJr7RxrpU",
      "dq": "l3s9emhZng6eGL2yxSov4HB_3Cz1nFeKoIL1D_ZZo72KphxrW7RxJWeD7nsx_LgN30_0TI_VlfHyQ3w5m4ZWtOfu-QEFVEtRbNoWiW_SvJUUPlWxU7UVMJM1CIorMnBizIYxm2lQzZTU4YJjNtNnlvj9NVfX8iW_uC_D4-HBt8k",
      "n": "wAMsqic7ZFhxoJApA3Vj4sjXcdm-qrFWf0Md63ENST1TTIDV9ou1jLulTYclHM4P10LO1iN8i8zcGxyp2f5uo72oANjTc2vZnagMre3BzWRLw4c9EEYhDNjLxB4f8U07TYUWnBUcXfL8i9lo2scP7uD1RxQAdT_TNf61o6WP14HThRfbsESbwDL10TCzOW9IoRHBK6GJ2L7sZPuF3cvHG1H5nLxZ9ZWwNeBU73kce2Oe8dJ-H-lpBVB39TXGJkGRxcbcWLyrEyabGurdE6TUD2HVb1Ms08Oc-kmoTfW8HZNlZyygvje0636cUAUxLOv2YiDCoE684Pp-bPUxBB2O1w"
    },
    {
      "kty": "EC",
      "d": "44m4lwV_i9VzvdiWlDpmMoAJjna5A-DdnPAORvVYPII",
      "use": "sig",
      "crv": "P-256",
      "kid": "412f0318-2c4a-421f-a766-b3f101cb7746",
      "x": "i3iRqlZkv6JnJhZq5zI1u94qlv0nqhKgyR565zSSivU",
      "y": "voCTm2D9XzkpzBhX4C81p0J3jECQ_FONmZNgXOnn-BI"
    },
    {
      "kty": "EC",
      "d": "HVobDEjVWSAnxMVFKFTk8zO7IRySvmPA7MLDpRJ1zv4",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "31fdea76-0d36-48cd-9ed7-958f0dac9774",
      "x": "b8STQcwcn2WMsGfkMbpMDTiPe53vsmD9SJEt7-3R1WQ",
      "y": "RI_dAmtnYsqaOmZbebe9eOsqp-zZvxJQb77GbeYAn18"
    },
    {
      "kty": "OKP",
      "d": "P4-QlL4QwRtWGV8ybH7j9AMuVAGsUxy_w2wjSavF0LY",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "d4c9233d-ac6c-4d98-87ae-217a83a8ceaa",
      "x": "rtmD1dtsaBAhaZuerRBGU1E4vYFLR5mx-uc6o1gNL4s"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "2t0zqQ1Y8XW9DYU6r-0qVYHjV_841PUaa58fE_v8QtHpODoBUrtT4gXMJcygevrdToxBc_n8lOObhcIkvlTGHNh1wfCBc0zSBZDj6pmp49ocKkHinKLjV_VDkdLR0YAg87zSz2FKoRVyz9x0jFAsJ00Y12ui921xULw02EAkis8",
      "kty": "RSA",
      "q": "zsdjOqR7janLiNxDKDdysX2I0NAgYfLGFKEC8QOQkISCJm6lx12Z2FMCQUrBiFc22g9NprDGdlINiIYVDylC9FDt_Lbh47e0PBSks1rcGKtTI9cGVehVtT1gAr5CK-OyjytCw_ocvaRUtCKRJsX1YsSnJvN8yjuVPf1ahsN21Ac",
      "d": "aSFtsTCk0KkqQTwFvCaUv41bC-kQQMbqB1lAM2umg2NqyxiwUbqaM0KJYnw03T7XNYJoRqaMCVprCXOHd2dES_HVh6RRIJoHEwrcz9N5lhlVab7D5rWPg0-9msinkYMySIJ_ByUr7zv-4VS2TtBc3Oxp_Rr8Ev5p7ShzSZhug36ahOAUIugDtWQ0toCash4SmMhSD_lThOi3SucsnXynzLC-7jCF1wOOUf43yyk25dMDd0hvKNk8J7Ki0pgJIeZdECOFWF2VjFtzXByOvGOl0JCZxLrJmgBSQ4hOTCBrSYOqKr7L0Sw9ye9hgiItBJRAjfRCPCKzm01S4mxYlFdjWQ",
      "e": "AQAB",
      "use": "enc",
      "kid": "0bccfae0-ff83-43f7-b3b9-096c769263a2",
      "qi": "WGpzl2fnFkXnOhRMTnn9GgFW06oXfBsCL_Q-Jcm90A2WlsaR2262_l3kYMr6DLYTgkxtCYkd6Hzkf6feDNtQg0piPQqB0MuEq9gEcwVLk__M7fuVGxydHN0IkA5Z5j6roH1GZfKEtBnqQorMolFQZbMHkRnbNx066d3kOmvuLzw",
      "dp": "UXAxwtvGlsJawGcsuT2knQCh2aKMQSGa3STuaX9AFJULFPLwfxpZUicaGY6UwG4MXyftSvxgMf6nZhQhm_jrZtxcpPebE44oMA4D4M2g27nS9R5i9ineMmJ-7AnoLO5iVI-UWbo4DMxwVkwPyg4i_9S-Q5o3n53HpmUBvN3ROx0",
      "alg": "RSA-OAEP",
      "dq": "DsQeSenFCPC_IB7ajNyozBPy2TaDmXsEuiRlWWCvyiIsSSJNpFcCzXfgCVmVSG8x85B0MxsckQZ7AOzSRCrmJRxCYnGM3_4WWNQAju5GGVziqwSH50qYFEE1wfxkLU4tShwEwInz03cQtWxigSpRw6PXa-inWKm4lpypAkajDbE",
      "n": "sMh2Wt7eXWP6chiqGTmcino3k-IuH3HFef-M5fmF5hSPf5iOQ06E599LDuUGieI1Vp9jrVWhmN1cQpGXAJvvDFLFxgaMGT5io6xKUgC3-vl-dqd7FwMuPBVkmzcFGSYwFFCa-XIq1EQ_TXdLXRfJ9oYEIo59wo_G52j6-2MXw6mhyJoMh-J90Zdkuk5cr8Pgxlkx9-X159bOpj_jytb9_S8Av7D-iHHAAYcewVDsEzRkXqENWsYE8wxLu1Zma1aU2ZLCL9xlfoVVwaVuk4yA8XZ3huIUOBQZWTnaWmTD4DnziE8bJ1RJ0BSZgub0F9WCkcnEztjQsGAS8lv1rF03qQ"
    },
    {
      "kty": "EC",
      "d": "-TzWpbpVTqvdV_c4NMDAtgFfOZipIm_X4Eh755pGJm4",
      "use": "enc",
      "crv": "P-256",
      "kid": "812ddea0-989e-4f37-abd0-ff65f62bb2a0",
      "x": "YhAlfgRoVuRS8ahxsRy4jJmq4NuSaFlMKdbuFwDAH70",
      "y": "ve3ZiN4T-b0KlO_F6LpNH4nu-rxDy-C2-VfxDDvOaSA",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "0447bc06-9c04-4372-b89c-b6ef1ee37cb6",
      "n": "wAMsqic7ZFhxoJApA3Vj4sjXcdm-qrFWf0Md63ENST1TTIDV9ou1jLulTYclHM4P10LO1iN8i8zcGxyp2f5uo72oANjTc2vZnagMre3BzWRLw4c9EEYhDNjLxB4f8U07TYUWnBUcXfL8i9lo2scP7uD1RxQAdT_TNf61o6WP14HThRfbsESbwDL10TCzOW9IoRHBK6GJ2L7sZPuF3cvHG1H5nLxZ9ZWwNeBU73kce2Oe8dJ-H-lpBVB39TXGJkGRxcbcWLyrEyabGurdE6TUD2HVb1Ms08Oc-kmoTfW8HZNlZyygvje0636cUAUxLOv2YiDCoE684Pp-bPUxBB2O1w"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "09a3c596-0166-4997-9b59-43688d0b18d8",
      "n": "xo7E5C_NMAPaPWHfJEyeCi4_bcpae8abwfBUScnRqNS4GyS8rcUI5RjxlEDrOzTVgXJhdVg39XANvq4wKQvSBDgSgbfCmlAzAPBWEy21nkL3lyCsZwd-h0ygK5U1zLU006T7StLLkqhU1Gae_hJQkrNsxLUHZMZGWxy2fniApGhDekq8_VYsA-5BqhT2Ugs_ZL1PkBaFv-LbTD3GbdFBOiu67PncLU8OKa9CCXmS5eKdywz7YOA0bmquRRgYqXDYArLMulIdhiG4vMU_B2oydzXWsu724npmD11sZXidOBH9crY4gX9fLx7zuf5tyU7-5iUyz6G1kJs--O87TeNQDw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "412f0318-2c4a-421f-a766-b3f101cb7746",
      "x": "i3iRqlZkv6JnJhZq5zI1u94qlv0nqhKgyR565zSSivU",
      "y": "voCTm2D9XzkpzBhX4C81p0J3jECQ_FONmZNgXOnn-BI"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "cf39a9a8-8a7f-4985-a0d7-034c3d0ef28c",
      "x": "F0EItetuJKeNAMn4_APFF-ly-NMHuAdzsoHczLrIvXA",
      "y": "DRw8mZxZGpKCBv6FxfV2htgZZSTSZdWKhGUv0jCm-oU"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "31fdea76-0d36-48cd-9ed7-958f0dac9774",
      "x": "b8STQcwcn2WMsGfkMbpMDTiPe53vsmD9SJEt7-3R1WQ",
      "y": "RI_dAmtnYsqaOmZbebe9eOsqp-zZvxJQb77GbeYAn18"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "d4c9233d-ac6c-4d98-87ae-217a83a8ceaa",
      "x": "rtmD1dtsaBAhaZuerRBGU1E4vYFLR5mx-uc6o1gNL4s"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "0bccfae0-ff83-43f7-b3b9-096c769263a2",
      "alg": "RSA-OAEP",
      "n": "sMh2Wt7eXWP6chiqGTmcino3k-IuH3HFef-M5fmF5hSPf5iOQ06E599LDuUGieI1Vp9jrVWhmN1cQpGXAJvvDFLFxgaMGT5io6xKUgC3-vl-dqd7FwMuPBVkmzcFGSYwFFCa-XIq1EQ_TXdLXRfJ9oYEIo59wo_G52j6-2MXw6mhyJoMh-J90Zdkuk5cr8Pgxlkx9-X159bOpj_jytb9_S8Av7D-iHHAAYcewVDsEzRkXqENWsYE8wxLu1Zma1aU2ZLCL9xlfoVVwaVuk4yA8XZ3huIUOBQZWTnaWmTD4DnziE8bJ1RJ0BSZgub0F9WCkcnEztjQsGAS8lv1rF03qQ"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "812ddea0-989e-4f37-abd0-ff65f62bb2a0",
      "x": "YhAlfgRoVuRS8ahxsRy4jJmq4NuSaFlMKdbuFwDAH70",
      "y": "ve3ZiN4T-b0KlO_F6LpNH4nu-rxDy-C2-VfxDDvOaSA",
      "alg": "ECDH-ES"
    }
  ]
}
2020-09-01 12:49:39 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2020-09-01 12:49:39 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2020-09-01 12:49:39 SUCCESS
OIDCCLoadUserInfo
Added user information
user_info
{
  "sub": "user-subject-1234531",
  "name": "Demo T. User",
  "given_name": "Demo",
  "family_name": "User",
  "middle_name": "Theresa",
  "nickname": "Dee",
  "preferred_username": "d.tu",
  "gender": "female",
  "birthdate": "2000-02-03",
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "zoneinfo": "America/Los_Angeles",
  "locale": "en-US",
  "phone_number": "+1 555 5550000",
  "phone_number_verified": false,
  "email": "user@example.com",
  "email_verified": false,
  "website": "https://openid.net/",
  "updated_at": "1580000000"
}
2020-09-01 12:49:39 SUCCESS
GetDynamicClientConfiguration
No client details on configuration, created an empty dynamic_client_registration_template object.
2020-09-01 12:49:39
oidcc-client-test-idtoken-sig-none
Setup Done
2020-09-01 12:49:40 INCOMING
oidcc-client-test-idtoken-sig-none
Incoming HTTP request to test instance 2OoY6yFgSP7XDk8
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
.well-known/openid-configuration
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Discovery endpoint
2020-09-01 12:49:40 OUTGOING
oidcc-client-test-idtoken-sig-none
Response to HTTP request to test instance 2OoY6yFgSP7XDk8
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "issuer": "https://www.certification.openid.net/test/2OoY6yFgSP7XDk8/",
  "authorization_endpoint": "https://www.certification.openid.net/test/2OoY6yFgSP7XDk8/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/2OoY6yFgSP7XDk8/token",
  "jwks_uri": "https://www.certification.openid.net/test/2OoY6yFgSP7XDk8/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/2OoY6yFgSP7XDk8/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/2OoY6yFgSP7XDk8/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
outgoing_path
.well-known/openid-configuration
2020-09-01 12:49:40 INCOMING
oidcc-client-test-idtoken-sig-none
Incoming HTTP request to test instance 2OoY6yFgSP7XDk8
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "content-type": "application/json",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "199",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
register
incoming_body_form_params
incoming_method
POST
incoming_body_json
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code"
  ],
  "grant_types": [
    "authorization_code"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "id_token_signed_response_alg": "none"
}
incoming_query_string_params
{}
incoming_body
{"token_endpoint_auth_method":"client_secret_basic","response_types":["code"],"grant_types":["authorization_code"],"redirect_uris":["https://rp.example.com/cb"],"id_token_signed_response_alg":"none"}
Registration endpoint
2020-09-01 12:49:40 SUCCESS
OIDCCExtractDynamicRegistrationRequest
Extracted dynamic client registration request
request
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code"
  ],
  "grant_types": [
    "authorization_code"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "id_token_signed_response_alg": "none"
}
2020-09-01 12:49:40 INFO
EnsureRegistrationRequestContainsAtLeastOneContact
This application requires that registration requests contain at least one contact.
2020-09-01 12:49:40 SUCCESS
ValidateClientGrantTypes
grant_types match response_types
grant_types
[
  "authorization_code"
]
response_types
[
  "code"
]
2020-09-01 12:49:40 SUCCESS
OIDCCValidateClientRedirectUris
Valid redirect_uri(s) provided in registration request
redirect_uris
[
  "https://rp.example.com/cb"
]
2020-09-01 12:49:40 SUCCESS
ValidateClientLogoUris
Client does not contain any logo_uri
2020-09-01 12:49:40 SUCCESS
ValidateClientUris
Client does not contain any client_uri
2020-09-01 12:49:40 SUCCESS
ValidateClientPolicyUris
Client does not contain any policy_uri
2020-09-01 12:49:40 SUCCESS
ValidateClientTosUris
Client does not contain any tos_uri
2020-09-01 12:49:40 SUCCESS
ValidateClientSubjectType
A subject_type was not provided
2020-09-01 12:49:40 SUCCESS
ValidateIdTokenSignedResponseAlg
none algorithm is allowed as only 'code' response type will be used
2020-09-01 12:49:40 SUCCESS
EnsureIdTokenEncryptedResponseAlgIsSetIfEncIsSet
id_token_encrypted_response_enc is not set
2020-09-01 12:49:40 INFO
ValidateUserinfoSignedResponseAlg
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2020-09-01 12:49:40 SUCCESS
EnsureUserinfoEncryptedResponseAlgIsSetIfEncIsSet
userinfo_encrypted_response_enc is not set
2020-09-01 12:49:40 INFO
ValidateRequestObjectSigningAlg
Skipped evaluation due to missing required element: client request_object_signing_alg
path
request_object_signing_alg
mapped
object
client
2020-09-01 12:49:40 SUCCESS
EnsureRequestObjectEncryptionAlgIsSetIfEncIsSet
request_object_encryption_enc is not set
2020-09-01 12:49:40 INFO
ValidateTokenEndpointAuthSigningAlg
Skipped evaluation due to missing required element: client token_endpoint_auth_signing_alg
path
token_endpoint_auth_signing_alg
mapped
object
client
2020-09-01 12:49:40 SUCCESS
ValidateDefaultMaxAge
default_max_age is not set
2020-09-01 12:49:40 INFO
ValidateRequireAuthTime
Skipped evaluation due to missing required element: client require_auth_time
path
require_auth_time
mapped
object
client
2020-09-01 12:49:40 INFO
ValidateDefaultAcrValues
Skipped evaluation due to missing required element: client default_acr_values
path
default_acr_values
mapped
object
client
2020-09-01 12:49:40 INFO
ValidateInitiateLoginUri
Skipped evaluation due to missing required element: client initiate_login_uri
path
initiate_login_uri
mapped
object
client
2020-09-01 12:49:40 INFO
ValidateRequestUris
Skipped evaluation due to missing required element: client request_uris
path
request_uris
mapped
object
client
2020-09-01 12:49:40 SUCCESS
ValidateClientRegistrationRequestSectorIdentifierUri
A sector_identifier_uri was not provided
2020-09-01 12:49:40 SUCCESS
OIDCCRegisterClient
Registered client
client
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code"
  ],
  "grant_types": [
    "authorization_code"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "id_token_signed_response_alg": "none",
  "client_id": "client_narXKeVwgIycLIt06704\"(:\u003d:"
}
2020-09-01 12:49:40
OIDCCCreateClientSecretForDynamicClient
Set the secret for registered client
client_secret
secret_SFXTZUSeHUlRviWyPpKNfyaRYeiaDQYWUfKZoSaNkdMUMVccfD6923830906 # <"
2020-09-01 12:49:40 SUCCESS
EnsureTokenEndPointAuthMethodIsClientSecretBasic
token_endpoint_auth_method is 'client_secret_basic' as expected
2020-09-01 12:49:40
SetClientIdTokenSignedResponseAlgToNone
Set id_token_signed_response_alg to none for the registered client
client
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code"
  ],
  "grant_types": [
    "authorization_code"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "id_token_signed_response_alg": "none",
  "client_id": "client_narXKeVwgIycLIt06704\"(:\u003d:",
  "client_secret": "secret_SFXTZUSeHUlRviWyPpKNfyaRYeiaDQYWUfKZoSaNkdMUMVccfD6923830906 # \u003c\""
}
2020-09-01 12:49:40
SetClientGrantTypesToAuthorizationCodeOnly
Set grant_types to ['authorization_code'] for the registered client
client
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code"
  ],
  "grant_types": [
    "authorization_code"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "id_token_signed_response_alg": "none",
  "client_id": "client_narXKeVwgIycLIt06704\"(:\u003d:",
  "client_secret": "secret_SFXTZUSeHUlRviWyPpKNfyaRYeiaDQYWUfKZoSaNkdMUMVccfD6923830906 # \u003c\""
}
2020-09-01 12:49:40 SUCCESS
EnsureClientDoesNotHaveBothJwksAndJwksUri
Client does not have both jwks and jwks_uri set
client
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code"
  ],
  "grant_types": [
    "authorization_code"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "id_token_signed_response_alg": "none",
  "client_id": "client_narXKeVwgIycLIt06704\"(:\u003d:",
  "client_secret": "secret_SFXTZUSeHUlRviWyPpKNfyaRYeiaDQYWUfKZoSaNkdMUMVccfD6923830906 # \u003c\""
}
2020-09-01 12:49:40 INFO
FetchClientKeys
Skipped evaluation due to missing required element: client jwks_uri
path
jwks_uri
mapped
object
client
2020-09-01 12:49:40
SetServerSigningAlgToNone
Successfully set signing algorithm to none
signing_algorithm
none
2020-09-01 12:49:40
SetClientIdTokenSignedResponseAlgToServerSigningAlg
Set id_token_signed_response_alg for the registered client
id_token_signed_response_alg
none
2020-09-01 12:49:40 OUTGOING
oidcc-client-test-idtoken-sig-none
Response to HTTP request to test instance 2OoY6yFgSP7XDk8
outgoing_status_code
201
outgoing_headers
{}
outgoing_body
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code"
  ],
  "grant_types": [
    "authorization_code"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "id_token_signed_response_alg": "none",
  "client_id": "client_narXKeVwgIycLIt06704\"(:\u003d:",
  "client_secret": "secret_SFXTZUSeHUlRviWyPpKNfyaRYeiaDQYWUfKZoSaNkdMUMVccfD6923830906 # \u003c\""
}
outgoing_path
register
2020-09-01 12:49:41 INCOMING
oidcc-client-test-idtoken-sig-none
Incoming HTTP request to test instance 2OoY6yFgSP7XDk8
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "got/9.6.0 (https://github.com/sindresorhus/got)",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
authorize
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "client_id": "client_narXKeVwgIycLIt06704\"(:\u003d:",
  "scope": "openid",
  "response_type": "code",
  "redirect_uri": "https://rp.example.com/cb",
  "state": "5TRVGvuNjGfiFN1AxM2tRVfHuxfwPGR0VHXW5dc6dZg",
  "response_mode": "form_post"
}
incoming_body
Authorization endpoint
2020-09-01 12:49:41 SUCCESS
EnsureRequestDoesNotContainRequestObject
Request does not contain a request parameter
2020-09-01 12:49:41 SUCCESS
OIDCCEnsureAuthorizationHttpRequestContainsOpenIDScope
Found 'openid' in scope http request parameter
actual
[
  "openid"
]
expected
openid
2020-09-01 12:49:41 SUCCESS
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
effective_authorization_endpoint_request
{
  "client_id": "client_narXKeVwgIycLIt06704\"(:\u003d:",
  "scope": "openid",
  "response_type": "code",
  "redirect_uri": "https://rp.example.com/cb",
  "state": "5TRVGvuNjGfiFN1AxM2tRVfHuxfwPGR0VHXW5dc6dZg",
  "response_mode": "form_post"
}
2020-09-01 12:49:41 SUCCESS
ExtractRequestedScopes
Requested scopes
scope
openid
2020-09-01 12:49:41 INFO
ExtractNonceFromAuthorizationRequest
Couldn't find 'nonce' in authorization endpoint parameters
2020-09-01 12:49:41 SUCCESS
EnsureResponseTypeIsCode
Response type is expected value
expected
code
2020-09-01 12:49:41 SUCCESS
EnsureMatchingClientId
Client ID matched
client_id
client_narXKeVwgIycLIt06704"(:=:
2020-09-01 12:49:41 SUCCESS
EnsureValidRedirectUriForAuthorizationEndpointRequest
redirect_uri is one of the allowed redirect uris
actual
https://rp.example.com/cb
expected
[
  "https://rp.example.com/cb"
]
2020-09-01 12:49:41 SUCCESS
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
actual
[
  "openid"
]
expected
openid
2020-09-01 12:49:41 SUCCESS
DisallowMaxAgeEqualsZeroAndPromptNone
The client did not send max_age=0 and prompt=none parameters as expected
2020-09-01 12:49:41 SUCCESS
CreateAuthorizationCode
Created authorization code
authorization_code
0BwY37tjdi
2020-09-01 12:49:41 SUCCESS
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "5TRVGvuNjGfiFN1AxM2tRVfHuxfwPGR0VHXW5dc6dZg"
}
2020-09-01 12:49:41 SUCCESS
AddCodeToAuthorizationEndpointResponseParams
Added code to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "5TRVGvuNjGfiFN1AxM2tRVfHuxfwPGR0VHXW5dc6dZg",
  "code": "0BwY37tjdi"
}
2020-09-01 12:49:41 OUTGOING
oidcc-client-test-idtoken-sig-none
Response to HTTP request to test instance 2OoY6yFgSP7XDk8
outgoing
ModelAndView [view="formPostResponseMode"; model={formAction=https://rp.example.com/cb, formParameters={"state":"5TRVGvuNjGfiFN1AxM2tRVfHuxfwPGR0VHXW5dc6dZg","code":"0BwY37tjdi"}}]
outgoing_path
authorize
2020-09-01 12:49:41 INCOMING
oidcc-client-test-idtoken-sig-none
Incoming HTTP request to test instance 2OoY6yFgSP7XDk8
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "authorization": "Basic Y2xpZW50X25hclhLZVZ3Z0l5Y0xJdDA2NzA0JTIyKCUzQSUzRCUzQTpzZWNyZXRfU0ZYVFpVU2VIVWxSdmlXeVBwS05meWFSWWVpYURRWVdVZktab1NhTmtkTVVNVmNjZkQ2OTIzODMwOTA2KyUyMyslM0MlMjI\u003d",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "content-type": "application/x-www-form-urlencoded",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "92",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
token
incoming_body_form_params
{
  "grant_type": "authorization_code",
  "code": "0BwY37tjdi",
  "redirect_uri": "https://rp.example.com/cb"
}
incoming_method
POST
incoming_body_json
incoming_query_string_params
{}
incoming_body
grant_type=authorization_code&code=0BwY37tjdi&redirect_uri=https%3A%2F%2Frp.example.com%2Fcb
Token endpoint
2020-09-01 12:49:41 SUCCESS
ExtractClientCredentialsFromBasicAuthorizationHeader
Extracted client authentication
client_id
client_narXKeVwgIycLIt06704"(:=:
client_secret
secret_SFXTZUSeHUlRviWyPpKNfyaRYeiaDQYWUfKZoSaNkdMUMVccfD6923830906 # <"
method
client_secret_basic
2020-09-01 12:49:41 SUCCESS
ValidateClientIdAndSecret
Client id and secret match
2020-09-01 12:49:41 SUCCESS
ValidateAuthorizationCode
Found authorization code
authorization_code
0BwY37tjdi
2020-09-01 12:49:41 SUCCESS
ValidateRedirectUriForTokenEndpointRequest
redirect_uri is the same as the one used in the authorization request
actual
https://rp.example.com/cb
2020-09-01 12:49:41 SUCCESS
GenerateBearerAccessToken
Generated access token
access_token
jQS0YYv6WWfWE1LXxgVgBFzpZFWOXMw8kMxWHRlWa1zptRCfId
2020-09-01 12:49:41 SUCCESS
GenerateIdTokenClaims
Created ID Token Claims
iss
https://www.certification.openid.net/test/2OoY6yFgSP7XDk8/
sub
user-subject-1234531
aud
client_narXKeVwgIycLIt06704"(:=:
iat
1598964581
exp
1598964881
2020-09-01 12:49:41 INFO
AddAtHashToIdTokenClaims
Skipped evaluation due to missing required string: at_hash
expected
at_hash
2020-09-01 12:49:41 SUCCESS
SignIdTokenWithAlgNone
Created id_token with alg none
id_token
eyJhbGciOiJub25lIn0.eyJpc3MiOiJodHRwczovL3d3dy5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXQvdGVzdC8yT29ZNnlGZ1NQN1hEazgvIiwic3ViIjoidXNlci1zdWJqZWN0LTEyMzQ1MzEiLCJhdWQiOiJjbGllbnRfbmFyWEtlVndnSXljTEl0MDY3MDRcIig6PToiLCJpYXQiOjE1OTg5NjQ1ODEsImV4cCI6MTU5ODk2NDg4MX0.
2020-09-01 12:49:41 INFO
EncryptIdToken
Skipped evaluation due to missing required element: client id_token_encrypted_response_alg
path
id_token_encrypted_response_alg
mapped
object
client
2020-09-01 12:49:41 SUCCESS
CreateTokenEndpointResponse
Created token endpoint response
access_token
jQS0YYv6WWfWE1LXxgVgBFzpZFWOXMw8kMxWHRlWa1zptRCfId
token_type
Bearer
id_token
eyJhbGciOiJub25lIn0.eyJpc3MiOiJodHRwczovL3d3dy5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXQvdGVzdC8yT29ZNnlGZ1NQN1hEazgvIiwic3ViIjoidXNlci1zdWJqZWN0LTEyMzQ1MzEiLCJhdWQiOiJjbGllbnRfbmFyWEtlVndnSXljTEl0MDY3MDRcIig6PToiLCJpYXQiOjE1OTg5NjQ1ODEsImV4cCI6MTU5ODk2NDg4MX0.
scope
openid
2020-09-01 12:49:41 OUTGOING
oidcc-client-test-idtoken-sig-none
Response to HTTP request to test instance 2OoY6yFgSP7XDk8
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "access_token": "jQS0YYv6WWfWE1LXxgVgBFzpZFWOXMw8kMxWHRlWa1zptRCfId",
  "token_type": "Bearer",
  "id_token": "eyJhbGciOiJub25lIn0.eyJpc3MiOiJodHRwczovL3d3dy5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXQvdGVzdC8yT29ZNnlGZ1NQN1hEazgvIiwic3ViIjoidXNlci1zdWJqZWN0LTEyMzQ1MzEiLCJhdWQiOiJjbGllbnRfbmFyWEtlVndnSXljTEl0MDY3MDRcIig6PToiLCJpYXQiOjE1OTg5NjQ1ODEsImV4cCI6MTU5ODk2NDg4MX0.",
  "scope": "openid"
}
outgoing_path
token
2020-09-01 12:49:42 INCOMING
oidcc-client-test-idtoken-sig-none
Incoming HTTP request to test instance 2OoY6yFgSP7XDk8
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "authorization": "Bearer jQS0YYv6WWfWE1LXxgVgBFzpZFWOXMw8kMxWHRlWa1zptRCfId",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
userinfo
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Userinfo endpoint
2020-09-01 12:49:42 SUCCESS
OIDCCExtractBearerAccessTokenFromRequest
Found access token on incoming request
access_token
jQS0YYv6WWfWE1LXxgVgBFzpZFWOXMw8kMxWHRlWa1zptRCfId
2020-09-01 12:49:42 SUCCESS
RequireBearerAccessToken
Found access token in request
actual
jQS0YYv6WWfWE1LXxgVgBFzpZFWOXMw8kMxWHRlWa1zptRCfId
2020-09-01 12:49:42 SUCCESS
FilterUserInfoForScopes
User info endpoint output
sub
user-subject-1234531
2020-09-01 12:49:42
ClearAccessTokenFromRequest
Condition ran but did not log anything
2020-09-01 12:49:42 INFO
AddIssAndAudToUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2020-09-01 12:49:42 INFO
SignUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2020-09-01 12:49:42 INFO
EncryptUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_encrypted_response_alg
path
userinfo_encrypted_response_alg
mapped
object
client
2020-09-01 12:49:42 OUTGOING
oidcc-client-test-idtoken-sig-none
Response to HTTP request to test instance 2OoY6yFgSP7XDk8
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "sub": "user-subject-1234531"
}
outgoing_path
userinfo
2020-09-01 12:49:42 FINISHED
oidcc-client-test-idtoken-sig-none
Test has run to completion
testmodule_result
PASSED
Test Results