Test Name | fapi-rw-id2-par-attempt-to-use-expired-request_uri |
---|---|
Variant | private_key_jwt, pushed, consumerdataright_au, plain_response |
Test ID | p5m1uWScM8ihXkV https://www.certification.openid.net/log-detail.html?public=true&log=p5m1uWScM8ihXkV |
Created | 2021-02-05T04:08:33.494188Z |
Description | conformance suite instructions example using Authlete FAPI-RW with private_key |
Test Version | 4.1.6 |
Test Owner | 8126114 https://gitlab.com |
Plan ID | kZOEPbHs0xM1m https://www.certification.openid.net/plan-detail.html?public=true&plan=kZOEPbHs0xM1m |
Exported From | https://www.certification.openid.net |
Exported By | 8126114 https://gitlab.com |
Suite Version | 4.1.6 |
Exported | 2021-03-03 14:35:55 (UTC) |
Status: FINISHED Result: PASSED |
SUCCESS 66 FAILURE 0 WARNING 0 REVIEW 1 INFO 1 |
2021-02-05 04:08:33 |
INFO
|
TEST-RUNNER
Test instance p5m1uWScM8ihXkV created
|
||||||||||||||
|
2021-02-05 04:08:33 |
SUCCESS
|
CreateRedirectUri
Created redirect URI
|
||
|
2021-02-05 04:08:33 |
|
GetDynamicServerConfiguration
HTTP request
|
||||||||
|
2021-02-05 04:08:34 |
RESPONSE
|
GetDynamicServerConfiguration
HTTP response
|
||||||||
|
2021-02-05 04:08:34 |
|
GetDynamicServerConfiguration
Downloaded server configuration
|
||
|
2021-02-05 04:08:34 |
SUCCESS
|
GetDynamicServerConfiguration
Successfully parsed server configuration
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
2021-02-05 04:08:34 |
SUCCESS
|
CheckServerConfiguration
Found required server configuration keys
|
||
|
2021-02-05 04:08:34 |
SUCCESS
|
ExtractTLSTestValuesFromServerConfiguration
Extracted TLS information from authorization server configuration
|
||||||||
|
2021-02-05 04:08:34 |
|
FetchServerKeys
Fetching server key
|
||
|
2021-02-05 04:08:34 |
|
FetchServerKeys
HTTP request
|
||||||||
|
2021-02-05 04:08:34 |
RESPONSE
|
FetchServerKeys
HTTP response
|
||||||||
|
2021-02-05 04:08:34 |
|
FetchServerKeys
Found JWK set string
|
||
|
2021-02-05 04:08:34 |
SUCCESS
|
FetchServerKeys
Found server JWK set
|
||
|
2021-02-05 04:08:34 |
SUCCESS
|
CheckServerKeysIsValid
Server JWKs is valid
|
||
|
2021-02-05 04:08:34 | SUCCESS |
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
|
|
2021-02-05 04:08:34 | SUCCESS |
CheckForKeyIdInServerJWKs
All keys contain kids
|
|
2021-02-05 04:08:34 | SUCCESS |
EnsureServerJwksDoesNotContainPrivateOrSymmetricKeys
Jwks does not contain any private or symmetric keys
|
|
2021-02-05 04:08:34 | SUCCESS |
FAPIEnsureMinimumServerKeyLength
Validated minimum key lengths for server_jwks
|
||
|
2021-02-05 04:08:34 |
SUCCESS
|
GetStaticClientConfiguration
Found a static client object
|
||||||||
|
2021-02-05 04:08:34 |
SUCCESS
|
ValidateMTLSCertificatesHeader
MTLS certificates header is valid
|
|
2021-02-05 04:08:34 |
SUCCESS
|
ExtractMTLSCertificatesFromConfiguration
Mutual TLS authentication credentials loaded
|
||||||
|
2021-02-05 04:08:34 | SUCCESS |
ValidateClientJWKsPrivatePart
Valid client JWKs: keys are valid JSON, contain the required fields, the private/public exponents match and are correctly encoded using unpadded base64url
|
|
2021-02-05 04:08:34 |
SUCCESS
|
ExtractJWKsFromStaticClientConfiguration
Extracted client JWK
|
||||
|
2021-02-05 04:08:34 | SUCCESS |
CheckForKeyIdInClientJWKs
All keys contain kids
|
|
2021-02-05 04:08:34 | SUCCESS |
CheckDistinctKeyIdValueInClientJWKs
Distinct 'kid' value in all keys of client_jwks
|
||
|
2021-02-05 04:08:34 | SUCCESS |
FAPICheckKeyAlgInClientJWKs
Found a key with alg PS256 or ES256
|
|
2021-02-05 04:08:34 | SUCCESS |
FAPIEnsureMinimumClientKeyLength
Validated minimum key lengths for client_jwks
|
||
|
2021-02-05 04:08:34 |
SUCCESS
|
ValidateMTLSCertificatesAsX509
Mutual TLS authentication cert validated as X.509
|
|
Verify configuration of second client |
2021-02-05 04:08:34 |
SUCCESS
|
GetStaticClient2Configuration
Found a static second client object
|
||||||
|
2021-02-05 04:08:34 |
SUCCESS
|
ValidateMTLSCertificates2Header
MTLS certificates header is valid
|
|
2021-02-05 04:08:34 |
SUCCESS
|
ExtractMTLSCertificates2FromConfiguration
Mutual TLS authentication credentials loaded
|
||||||
|
2021-02-05 04:08:34 | SUCCESS |
ValidateClientJWKsPrivatePart
Valid client JWKs: keys are valid JSON, contain the required fields, the private/public exponents match and are correctly encoded using unpadded base64url
|
|
2021-02-05 04:08:34 |
SUCCESS
|
ExtractJWKsFromStaticClientConfiguration
Extracted client JWK
|
||||
|
2021-02-05 04:08:34 | SUCCESS |
CheckForKeyIdInClientJWKs
All keys contain kids
|
|
2021-02-05 04:08:34 | SUCCESS |
CheckDistinctKeyIdValueInClientJWKs
Distinct 'kid' value in all keys of client_jwks
|
||
|
2021-02-05 04:08:34 | SUCCESS |
FAPICheckKeyAlgInClientJWKs
Found a key with alg PS256 or ES256
|
|
2021-02-05 04:08:34 | SUCCESS |
FAPIEnsureMinimumClientKeyLength
Validated minimum key lengths for client_jwks
|
||
|
2021-02-05 04:08:34 |
SUCCESS
|
ValidateMTLSCertificatesAsX509
Mutual TLS authentication cert validated as X.509
|
|
2021-02-05 04:08:34 |
SUCCESS
|
GetResourceEndpointConfiguration
Found a resource endpoint object
|
||||||
|
2021-02-05 04:08:34 |
SUCCESS
|
SetProtectedResourceUrlToSingleResourceEndpoint
Set protected resource URL
|
||
|
2021-02-05 04:08:34 |
SUCCESS
|
ExtractTLSTestValuesFromResourceConfiguration
Extracted TLS information from resource endpoint
|
||
|
2021-02-05 04:08:34 |
SUCCESS
|
ExtractTLSTestValuesFromOBResourceConfiguration
Extracted TLS information from resource endpoint
|
||||
|
2021-02-05 04:08:34 |
|
fapi-rw-id2-par-attempt-to-use-expired-request_uri
Setup Done
|
|
Make request to authorization endpoint |
2021-02-05 04:08:34 |
SUCCESS
|
CreateAuthorizationEndpointRequestFromClientInformation
Created authorization endpoint request
|
||||||
|
2021-02-05 04:08:34 | SUCCESS |
AddCdrAcrClaimToAuthorizationEndpointRequest
Added acr claim to authorization_endpoint_request
|
||
|
2021-02-05 04:08:34 | SUCCESS |
AddCdrSharingDurationClaimToAuthorizationEndpointRequest
Added sharing_duration claim to authorization_endpoint_request
|
||
|
2021-02-05 04:08:34 |
|
CreateRandomStateValue
Created state value
|
||||
|
2021-02-05 04:08:34 |
SUCCESS
|
AddStateToAuthorizationEndpointRequest
Added state parameter to request
|
||||||||||
|
2021-02-05 04:08:34 |
|
CreateRandomNonceValue
Created nonce value
|
||||
|
2021-02-05 04:08:34 |
SUCCESS
|
AddNonceToAuthorizationEndpointRequest
Added nonce parameter to request
|
||||||||||||
|
2021-02-05 04:08:34 |
SUCCESS
|
SetAuthorizationEndpointRequestResponseTypeToCodeIdtoken
Added response_type parameter to request
|
||||||||||||||
|
2021-02-05 04:08:34 |
SUCCESS
|
ConvertAuthorizationEndpointRequestToRequestObject
Created request object claims
|
||
|
2021-02-05 04:08:34 | SUCCESS |
AddExpToRequestObject
Added exp to request object claims
|
||
|
2021-02-05 04:08:34 | SUCCESS |
AddAudToRequestObject
Added aud to request object claims
|
||
|
2021-02-05 04:08:34 | SUCCESS |
AddIssToRequestObject
Added iss to request object claims
|
||
|
2021-02-05 04:08:34 | SUCCESS |
AddClientIdToRequestObject
Added client_id to request object claims
|
||
|
2021-02-05 04:08:34 |
SUCCESS
|
SignRequestObject
Signed the request object
|
||||||||
|
2021-02-05 04:08:34 |
SUCCESS
|
BuildRequestObjectPostToPAREndpoint
|
||
|
2021-02-05 04:08:34 |
SUCCESS
|
CreateClientAuthenticationAssertionClaims
Created client assertion claims
|
||||||||||||
|
2021-02-05 04:08:34 | SUCCESS |
UpdateClientAuthenticationAssertionClaimsWithISSAud
Updated audience in client assertion claims
|
||||||||||||
|
2021-02-05 04:08:34 |
SUCCESS
|
SignClientAuthenticationAssertion
Signed the client assertion
|
||
|
2021-02-05 04:08:34 |
SUCCESS
|
AddClientAssertionToPAREndpointParameters
Added client assertion to request
|
||
|
2021-02-05 04:08:35 |
|
CallPAREndpoint
HTTP request
|
||||||||||
|
2021-02-05 04:08:35 |
RESPONSE
|
CallPAREndpoint
HTTP response
|
||||||||
|
2021-02-05 04:08:35 | SUCCESS |
CallPAREndpoint
Storing pushed_authorization_endpoint_response_http_status 201
|
|
2021-02-05 04:08:35 | SUCCESS |
CallPAREndpoint
Parsed pushed authorization endpoint response
|
||||
|
2021-02-05 04:08:35 | SUCCESS |
CheckIfPAREndpointResponseError
pushed authorization endpoint correct response.
|
|
2021-02-05 04:08:35 | SUCCESS |
CheckForRequestUriValue
Found valid request_uri
|
||
|
2021-02-05 04:08:35 | SUCCESS |
CheckForPARResponseExpiresIn
Found expires_in
|
||
|
2021-02-05 04:08:35 |
SUCCESS
|
ExtractRequestUriFromPARResponse
Extracted the request_uri: A09E09D815387AB7989DCA5B36E111A73511C5137AEE64DBD5620E96B7F18E74
|
|
2021-02-05 04:08:35 | SUCCESS |
EnsureMinimumRequestUriEntropy
Calculated shannon entropy seems sufficient
|
||||
|
Attempting use of request_uri after expiry and testing if Authorization server returns error in callback |
2021-02-05 04:08:35 |
SUCCESS
|
WaitForExpiry
Pausing for 90 seconds
|
|
2021-02-05 04:10:05 |
SUCCESS
|
WaitForExpiry
Woke up after 90 seconds sleep
|
|
2021-02-05 04:10:05 |
SUCCESS
|
BuildRequestObjectByReferenceRedirectToAuthorizationEndpoint
Sending to authorization endpoint
|
||
|
2021-02-05 04:10:05 |
REDIRECT
|
fapi-rw-id2-par-attempt-to-use-expired-request_uri
Redirecting to authorization endpoint
|
||
|
2021-02-05 04:10:05 | REVIEW |
ExpectInvalidRequestUriErrorPage
If the server does not return an error back to the client, It must show an error page that the request_uri is invalid - upload a screenshot of the error page.
|
||
|
2021-02-05 04:10:14 |
INCOMING
|
fapi-rw-id2-par-attempt-to-use-expired-request_uri
Incoming HTTP request to test instance p5m1uWScM8ihXkV
|
||||||||||||||
|
2021-02-05 04:10:14 |
SUCCESS
|
CreateRandomImplicitSubmitUrl
Created random implicit submission URL
|
||
|
2021-02-05 04:10:14 |
OUTGOING
|
fapi-rw-id2-par-attempt-to-use-expired-request_uri
Response to HTTP request to test instance p5m1uWScM8ihXkV
|
||||
|
2021-02-05 04:10:16 |
INCOMING
|
fapi-rw-id2-par-attempt-to-use-expired-request_uri
Incoming HTTP request to test instance p5m1uWScM8ihXkV
|
||||||||||||||
|
2021-02-05 04:10:16 |
OUTGOING
|
fapi-rw-id2-par-attempt-to-use-expired-request_uri
Response to HTTP request to test instance p5m1uWScM8ihXkV
|
||||||||
|
2021-02-05 04:10:16 |
|
ExtractImplicitHashToCallbackResponse
Extracted response from URL fragment
|
||
|
2021-02-05 04:10:16 |
SUCCESS
|
ExtractImplicitHashToCallbackResponse
Extracted the hash values
|
||||||||
|
2021-02-05 04:10:16 |
REDIRECT-IN
|
fapi-rw-id2-par-attempt-to-use-expired-request_uri
Authorization endpoint response captured
|
||||||||||
|
Verify authorization endpoint response |
2021-02-05 04:10:16 | SUCCESS |
RejectAuthCodeInUrlQuery
Authorization code is not present in URL query returned from authorization endpoint
|
|
2021-02-05 04:10:16 | SUCCESS |
RejectErrorInUrlQuery
'error' is not present in URL query returned from authorization endpoint
|
|
2021-02-05 04:10:16 | SUCCESS |
EnsureInvalidRequestUriError
Authorization endpoint returned expected 'error' of 'invalid_request_uri'
|
||
|
2021-02-05 04:10:16 |
FINISHED
|
fapi-rw-id2-par-attempt-to-use-expired-request_uri
Test has run to completion
|
||
|
2021-02-05 04:10:41 |
|
TEST-RUNNER
Alias has now been claimed by another test
|
||||
|