Test Name | fapi-rw-id2-ensure-signed-request-object-with-RS256-fails |
---|---|
Variant | private_key_jwt, by_value, consumerdataright_au, plain_response |
Test ID | TLRl9Q5JeaKMqH8 https://www.certification.openid.net/log-detail.html?public=true&log=TLRl9Q5JeaKMqH8 |
Created | 2020-11-16T03:28:13.259624Z |
Description | NAB Certification |
Test Version | 4.1.4 |
Test Owner | 110982540743409783525 https://accounts.google.com |
Plan ID | VIzwhROzb2utY https://www.certification.openid.net/plan-detail.html?public=true&plan=VIzwhROzb2utY |
Exported From | https://www.certification.openid.net |
Exported By | 110982540743409783525 https://accounts.google.com |
Suite Version | 4.1.5 |
Exported | 2020-12-06 05:26:37 (UTC) |
Status: FINISHED Result: PASSED |
SUCCESS 55 FAILURE 0 WARNING 0 REVIEW 1 INFO 1 |
2020-11-16 03:28:13 |
INFO
|
TEST-RUNNER
Test instance TLRl9Q5JeaKMqH8 created
|
||||||||||||||
|
2020-11-16 03:28:13 |
SUCCESS
|
CreateRedirectUri
Created redirect URI
|
||
|
2020-11-16 03:28:13 |
|
GetDynamicServerConfiguration
HTTP request
|
||||||||
|
2020-11-16 03:28:13 |
RESPONSE
|
GetDynamicServerConfiguration
HTTP response
|
||||||||
|
2020-11-16 03:28:13 |
|
GetDynamicServerConfiguration
Downloaded server configuration
|
||
|
2020-11-16 03:28:13 |
SUCCESS
|
GetDynamicServerConfiguration
Successfully parsed server configuration
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
2020-11-16 03:28:13 |
SUCCESS
|
CheckServerConfiguration
Found required server configuration keys
|
||
|
2020-11-16 03:28:13 |
SUCCESS
|
ExtractTLSTestValuesFromServerConfiguration
Extracted TLS information from authorization server configuration
|
||||||||
|
2020-11-16 03:28:13 |
|
FetchServerKeys
Fetching server key
|
||
|
2020-11-16 03:28:13 |
|
FetchServerKeys
HTTP request
|
||||||||
|
2020-11-16 03:28:14 |
RESPONSE
|
FetchServerKeys
HTTP response
|
||||||||
|
2020-11-16 03:28:14 |
|
FetchServerKeys
Found JWK set string
|
||
|
2020-11-16 03:28:14 |
SUCCESS
|
FetchServerKeys
Found server JWK set
|
||
|
2020-11-16 03:28:14 |
SUCCESS
|
CheckServerKeysIsValid
Server JWKs is valid
|
||
|
2020-11-16 03:28:14 | SUCCESS |
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
|
|
2020-11-16 03:28:14 | SUCCESS |
CheckForKeyIdInServerJWKs
All keys contain kids
|
|
2020-11-16 03:28:14 | SUCCESS |
EnsureServerJwksDoesNotContainPrivateOrSymmetricKeys
Jwks does not contain any private or symmetric keys
|
|
2020-11-16 03:28:14 | SUCCESS |
FAPIEnsureMinimumServerKeyLength
Validated minimum key lengths for server_jwks
|
||
|
2020-11-16 03:28:14 |
SUCCESS
|
GetStaticClientConfiguration
Found a static client object
|
||||||
|
2020-11-16 03:28:14 |
SUCCESS
|
ValidateMTLSCertificatesHeader
MTLS certificates header is valid
|
|
2020-11-16 03:28:14 |
SUCCESS
|
ExtractMTLSCertificatesFromConfiguration
Mutual TLS authentication credentials loaded
|
||||||
|
2020-11-16 03:28:14 | SUCCESS |
ValidateClientJWKsPrivatePart
Valid client JWKs: keys are valid JSON, contain the required fields, the private/public exponents match and are correctly encoded using unpadded base64url
|
|
2020-11-16 03:28:14 |
SUCCESS
|
ExtractJWKsFromStaticClientConfiguration
Extracted client JWK
|
||||
|
2020-11-16 03:28:14 | SUCCESS |
CheckForKeyIdInClientJWKs
All keys contain kids
|
|
2020-11-16 03:28:14 | SUCCESS |
CheckDistinctKeyIdValueInClientJWKs
Distinct 'kid' value in all keys of client_jwks
|
||
|
2020-11-16 03:28:14 | SUCCESS |
FAPICheckKeyAlgInClientJWKs
Found a key with alg PS256 or ES256
|
|
2020-11-16 03:28:14 | SUCCESS |
FAPIEnsureMinimumClientKeyLength
Validated minimum key lengths for client_jwks
|
||
|
2020-11-16 03:28:14 |
SUCCESS
|
ValidateMTLSCertificatesAsX509
Mutual TLS authentication cert validated as X.509
|
|
Verify configuration of second client |
2020-11-16 03:28:14 |
SUCCESS
|
GetStaticClient2Configuration
Found a static second client object
|
||||||
|
2020-11-16 03:28:14 |
SUCCESS
|
ValidateMTLSCertificates2Header
MTLS certificates header is valid
|
|
2020-11-16 03:28:14 |
SUCCESS
|
ExtractMTLSCertificates2FromConfiguration
Mutual TLS authentication credentials loaded
|
||||||
|
2020-11-16 03:28:14 | SUCCESS |
ValidateClientJWKsPrivatePart
Valid client JWKs: keys are valid JSON, contain the required fields, the private/public exponents match and are correctly encoded using unpadded base64url
|
|
2020-11-16 03:28:14 |
SUCCESS
|
ExtractJWKsFromStaticClientConfiguration
Extracted client JWK
|
||||
|
2020-11-16 03:28:14 | SUCCESS |
CheckForKeyIdInClientJWKs
All keys contain kids
|
|
2020-11-16 03:28:14 | SUCCESS |
CheckDistinctKeyIdValueInClientJWKs
Distinct 'kid' value in all keys of client_jwks
|
||
|
2020-11-16 03:28:14 | SUCCESS |
FAPICheckKeyAlgInClientJWKs
Found a key with alg PS256 or ES256
|
|
2020-11-16 03:28:14 | SUCCESS |
FAPIEnsureMinimumClientKeyLength
Validated minimum key lengths for client_jwks
|
||
|
2020-11-16 03:28:14 |
SUCCESS
|
ValidateMTLSCertificatesAsX509
Mutual TLS authentication cert validated as X.509
|
|
2020-11-16 03:28:14 |
SUCCESS
|
GetResourceEndpointConfiguration
Found a resource endpoint object
|
||||||
|
2020-11-16 03:28:14 |
SUCCESS
|
SetProtectedResourceUrlToSingleResourceEndpoint
Set protected resource URL
|
||
|
2020-11-16 03:28:14 |
SUCCESS
|
ExtractTLSTestValuesFromResourceConfiguration
Extracted TLS information from resource endpoint
|
||
|
2020-11-16 03:28:14 |
SUCCESS
|
ExtractTLSTestValuesFromOBResourceConfiguration
Extracted TLS information from resource endpoint
|
||||
|
2020-11-16 03:28:14 |
|
fapi-rw-id2-ensure-signed-request-object-with-RS256-fails
Setup Done
|
|
Make request to authorization endpoint |
2020-11-16 03:28:14 |
SUCCESS
|
CreateAuthorizationEndpointRequestFromClientInformation
Created authorization endpoint request
|
||||||
|
2020-11-16 03:28:14 | SUCCESS |
AddCdrAcrClaimToAuthorizationEndpointRequest
Added acr claim to authorization_endpoint_request
|
||
|
2020-11-16 03:28:14 | SUCCESS |
AddCdrSharingDurationClaimToAuthorizationEndpointRequest
Added sharing_duration claim to authorization_endpoint_request
|
||
|
2020-11-16 03:28:14 |
|
CreateRandomStateValue
Created state value
|
||||
|
2020-11-16 03:28:14 |
SUCCESS
|
AddStateToAuthorizationEndpointRequest
Added state parameter to request
|
||||||||||
|
2020-11-16 03:28:14 |
|
CreateRandomNonceValue
Created nonce value
|
||||
|
2020-11-16 03:28:14 |
SUCCESS
|
AddNonceToAuthorizationEndpointRequest
Added nonce parameter to request
|
||||||||||||
|
2020-11-16 03:28:14 |
SUCCESS
|
SetAuthorizationEndpointRequestResponseTypeToCodeIdtoken
Added response_type parameter to request
|
||||||||||||||
|
2020-11-16 03:28:14 |
SUCCESS
|
ConvertAuthorizationEndpointRequestToRequestObject
Created request object claims
|
||
|
2020-11-16 03:28:14 |
SUCCESS
|
AddExpToRequestObject
Added exp to request object claims
|
||
|
2020-11-16 03:28:14 | SUCCESS |
ChangeClientJwksAlgToRS256
Added RS256 as algorithm
|
||
|
2020-11-16 03:28:14 |
SUCCESS
|
AddAudToRequestObject
Added aud to request object claims
|
||
|
2020-11-16 03:28:14 |
SUCCESS
|
AddIssToRequestObject
Added iss to request object claims
|
||
|
2020-11-16 03:28:14 |
SUCCESS
|
SignRequestObject
Signed the request object
|
||||||||
|
2020-11-16 03:28:14 |
SUCCESS
|
BuildRequestObjectByValueRedirectToAuthorizationEndpoint
Sending to authorization endpoint
|
||
|
2020-11-16 03:28:14 |
REDIRECT
|
fapi-rw-id2-ensure-signed-request-object-with-RS256-fails
Redirecting to authorization endpoint
|
||
|
2020-11-16 03:28:14 | REVIEW |
ExpectSignedRS256RequestObjectErrorPage
If the server does not return an invalid_request_object error back to the client, it must show an error page saying the request object is invalid as the algorithm in the JWS header of the request object passed by 'request' parameter does not match the registered.
|
||
|
2020-11-16 03:28:22 |
INCOMING
|
fapi-rw-id2-ensure-signed-request-object-with-RS256-fails
Incoming HTTP request to test instance TLRl9Q5JeaKMqH8
|
||||||||||||||
|
2020-11-16 03:28:22 |
SUCCESS
|
CreateRandomImplicitSubmitUrl
Created random implicit submission URL
|
||
|
2020-11-16 03:28:22 |
OUTGOING
|
fapi-rw-id2-ensure-signed-request-object-with-RS256-fails
Response to HTTP request to test instance TLRl9Q5JeaKMqH8
|
||||
|
2020-11-16 03:28:23 |
INCOMING
|
fapi-rw-id2-ensure-signed-request-object-with-RS256-fails
Incoming HTTP request to test instance TLRl9Q5JeaKMqH8
|
||||||||||||||
|
2020-11-16 03:28:23 |
OUTGOING
|
fapi-rw-id2-ensure-signed-request-object-with-RS256-fails
Response to HTTP request to test instance TLRl9Q5JeaKMqH8
|
||||||||
|
2020-11-16 03:28:23 |
|
ExtractImplicitHashToCallbackResponse
Extracted response from URL fragment
|
||
|
2020-11-16 03:28:23 |
SUCCESS
|
ExtractImplicitHashToCallbackResponse
Extracted the hash values
|
||
|
2020-11-16 03:28:23 |
REDIRECT-IN
|
fapi-rw-id2-ensure-signed-request-object-with-RS256-fails
Authorization endpoint response captured
|
||||||||||
|
Verify authorization endpoint response |
2020-11-16 03:28:23 | SUCCESS |
RejectAuthCodeInUrlQuery
Authorization code is not present in URL query returned from authorization endpoint
|
|
2020-11-16 03:28:23 | SUCCESS |
RejectErrorInUrlQuery
'error' is not present in URL query returned from authorization endpoint
|
|
2020-11-16 03:28:23 |
SUCCESS
|
CheckStateInAuthorizationResponse
State is missing from response; this is permitted when the returned error is 'invalid_request_object' and the state was contained in the request object
|
|
2020-11-16 03:28:23 | SUCCESS |
EnsureErrorFromAuthorizationEndpointResponse
Authorization endpoint returned an error
|
||
|
2020-11-16 03:28:23 | SUCCESS |
CheckForUnexpectedParametersInErrorResponseFromAuthorizationEndpoint
error response includes only expected parameters
|
||
|
2020-11-16 03:28:23 | SUCCESS |
EnsureInvalidRequestObjectError
Authorization endpoint returned expected 'error' of 'invalid_request_object'
|
||
|
2020-11-16 03:28:23 |
FINISHED
|
fapi-rw-id2-ensure-signed-request-object-with-RS256-fails
Test has run to completion
|
||
|
2020-11-16 03:28:56 |
|
TEST-RUNNER
Alias has now been claimed by another test
|
||||
|