Test Name | fapi-ciba-id1-ensure-mtls-holder-of-key-required |
---|---|
Variant | client_auth_type=mtls, ciba_mode=ping, fapi_profile=plain_fapi, client_registration=dynamic_client |
Test ID | acmawWbMze6oTrG https://www.certification.openid.net/log-detail.html?public=true&log=acmawWbMze6oTrG |
Created | 2021-07-31T17:27:16.449595Z |
Description | |
Test Version | 4.1.19 |
Test Owner | 105373019399374514246 https://accounts.google.com |
Plan ID | jr6oeCC2K7E3I https://www.certification.openid.net/plan-detail.html?public=true&plan=jr6oeCC2K7E3I |
Exported From | https://www.certification.openid.net |
Exported By | 105373019399374514246 https://accounts.google.com |
Suite Version | 4.1.21 |
Exported | 2021-08-04 12:23:54 (UTC) |
Status: FINISHED Result: PASSED |
SUCCESS 78 FAILURE 0 WARNING 0 REVIEW 0 INFO 1 |
2021-07-31 17:27:16 |
INFO
|
TEST-RUNNER
Test instance acmawWbMze6oTrG created
|
||||||||||||||
|
2021-07-31 17:27:16 |
SUCCESS
|
CreateCIBANotificationEndpointUri
Created ciba notification endpoint URI
|
||
|
2021-07-31 17:27:16 |
|
GetDynamicServerConfiguration
HTTP request
|
||||||||
|
2021-07-31 17:27:16 |
RESPONSE
|
GetDynamicServerConfiguration
HTTP response
|
||||||||
|
2021-07-31 17:27:16 |
|
GetDynamicServerConfiguration
Downloaded server configuration
|
||
|
2021-07-31 17:27:16 |
SUCCESS
|
GetDynamicServerConfiguration
Successfully parsed server configuration
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
2021-07-31 17:27:16 | SUCCESS |
AddMTLSEndpointAliasesToEnvironment
Added mtls_endpoint_aliases to environment
|
|
2021-07-31 17:27:16 |
SUCCESS
|
CheckCIBAServerConfiguration
Found required server configuration keys
|
||
|
2021-07-31 17:27:16 |
|
FetchServerKeys
Fetching server key
|
||
|
2021-07-31 17:27:16 |
|
FetchServerKeys
HTTP request
|
||||||||
|
2021-07-31 17:27:16 |
RESPONSE
|
FetchServerKeys
HTTP response
|
||||||||
|
2021-07-31 17:27:16 |
|
FetchServerKeys
Found JWK set string
|
||
|
2021-07-31 17:27:16 |
SUCCESS
|
FetchServerKeys
Found server JWK set
|
||
|
2021-07-31 17:27:16 |
SUCCESS
|
CheckServerKeysIsValid
Server JWKs is valid
|
||
|
2021-07-31 17:27:16 | SUCCESS |
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
|
|
2021-07-31 17:27:16 | SUCCESS |
CheckForKeyIdInServerJWKs
All keys contain kids
|
|
2021-07-31 17:27:16 | SUCCESS |
EnsureServerJwksDoesNotContainPrivateOrSymmetricKeys
Jwks does not contain any private or symmetric keys
|
|
2021-07-31 17:27:16 | SUCCESS |
FAPIEnsureMinimumServerKeyLength
Validated minimum key lengths for server_jwks
|
||
|
First client: registering client using dynamic client registration |
2021-07-31 17:27:16 |
|
StoreOriginalClientConfiguration
Created original_client_config object from the client configuration.
|
||||||||||||||||
|
2021-07-31 17:27:16 |
|
ExtractClientNameFromStoredConfig
Extracted client_name from stored client configuration.
|
||
|
2021-07-31 17:27:17 |
SUCCESS
|
GeneratePS256ClientJWKsWithKeyID
Generated client JWKs
|
||||
|
2021-07-31 17:27:17 |
SUCCESS
|
GenerateMTLSCertificateFromJWKs
Generated client MTLS certificate
|
||
|
2021-07-31 17:27:17 |
SUCCESS
|
AddClientX509CertificateClaimToPublicJWKs
Added x5c claim to public JWKs
|
||
|
2021-07-31 17:27:17 |
|
CreateEmptyDynamicRegistrationRequest
Created empty dynamic registration request
|
|
2021-07-31 17:27:17 |
|
AddClientNameToDynamicRegistrationRequest
Added client_name to registration request
|
||
|
2021-07-31 17:27:17 |
|
AddCibaGrantTypeToDynamicRegistrationRequest
Added 'urn:openid:params:grant-type:ciba' to 'grant_types'
|
||
|
2021-07-31 17:27:17 |
|
AddPublicJwksToDynamicRegistrationRequest
Added client public JWKS to dynamic registration request
|
||
|
2021-07-31 17:27:17 |
|
AddCibaUserCodeFalseToDynamicRegistrationRequest
Added CIBA backchannel_user_code_parameter: false to dynamic registration request
|
||
|
2021-07-31 17:27:17 |
|
AddCibaTokenDeliveryModePingToDynamicRegistrationRequest
Added CIBA token delivery mode ping to dynamic registration request
|
||
|
2021-07-31 17:27:17 |
|
AddCIBANotificationEndpointToDynamicRegistrationRequest
Added 'https://www.certification.openid.net/test/a/PingMtlsPlainFapiCibaFapiTests/ciba-notification-endpoint' to dynamic registration request
|
||
|
2021-07-31 17:27:17 |
|
AddCibaRequestSigningPS256ToDynamicRegistrationRequest
Added CIBA request sign alg to dynamic registration request
|
||
|
2021-07-31 17:27:17 |
|
AddIdTokenSigningAlgPS256ToDynamicRegistrationRequest
Added id_token_signed_response_alg to dynamic registration request
|
||
|
2021-07-31 17:27:17 |
|
AddEmptyResponseTypesArrayToDynamicRegistrationRequest
Added empty response_types array to dynamic registration request
|
||
|
2021-07-31 17:27:17 |
|
AddTokenEndpointAuthMethodSelfSignedTlsToDynamicRegistrationRequest
Added self_signed_tls for token endpoint auth method to dynamic registration request
|
||
|
2021-07-31 17:27:17 |
|
AddTLSBoundAccessTokensTrueToDynamicRegistrationRequest
Added tls_client_certificate_bound_access_tokens to dynamic registration request
|
||
|
2021-07-31 17:27:17 |
|
CallDynamicRegistrationEndpoint
HTTP request
|
||||||||||
|
2021-07-31 17:27:17 |
RESPONSE
|
CallDynamicRegistrationEndpoint
HTTP response
|
||||||||
|
2021-07-31 17:27:17 |
|
CallDynamicRegistrationEndpoint
Registration endpoint response
|
||
|
2021-07-31 17:27:17 |
|
CallDynamicRegistrationEndpoint
Parsed registration endpoint response
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
2021-07-31 17:27:17 |
SUCCESS
|
CallDynamicRegistrationEndpoint
Extracted dynamic registration management credentials
|
||||
|
2021-07-31 17:27:17 |
|
CopyScopeFromDynamicRegistrationTemplateToClientConfiguration
Copied scope from original_client_config to client configuration
|
||
|
2021-07-31 17:27:17 | SUCCESS |
CheckForKeyIdInClientJWKs
All keys contain kids
|
|
2021-07-31 17:27:17 | SUCCESS |
CheckDistinctKeyIdValueInClientJWKs
Distinct 'kid' value in all keys of client_jwks
|
||
|
2021-07-31 17:27:17 | SUCCESS |
FAPICheckKeyAlgInClientJWKs
Keys in client JWKS all have permitted 'alg'
|
||
|
2021-07-31 17:27:17 | SUCCESS |
FAPIEnsureMinimumClientKeyLength
Validated minimum key lengths for client_jwks
|
||
|
2021-07-31 17:27:17 |
SUCCESS
|
ValidateMTLSCertificatesAsX509
Mutual TLS authentication cert validated as X.509
|
|
2021-07-31 17:27:17 |
SUCCESS
|
GetResourceEndpointConfiguration
Found a resource endpoint object
|
||||||||
|
2021-07-31 17:27:17 |
SUCCESS
|
SetProtectedResourceUrlToSingleResourceEndpoint
Set protected resource URL
|
||
|
2021-07-31 17:27:17 |
SUCCESS
|
ExtractTLSTestValuesFromResourceConfiguration
Extracted TLS information from resource endpoint
|
||
|
2021-07-31 17:27:17 |
SUCCESS
|
ExtractTLSTestValuesFromOBResourceConfiguration
Extracted TLS information from resource endpoint
|
||||
|
2021-07-31 17:27:17 |
|
fapi-ciba-id1-ensure-mtls-holder-of-key-required
Setup Done
|
|
2021-07-31 17:27:17 |
SUCCESS
|
ExtractTLSTestValuesFromServerConfiguration
Extracted TLS information from authorization server configuration
|
||||||||
|
Authorization endpoint TLS test |
2021-07-31 17:27:17 | SUCCESS |
EnsureTLS12WithFAPICiphers
Server agreed to TLS 1.2
|
||||
|
2021-07-31 17:27:17 | SUCCESS |
DisallowTLS10
Server refused TLS 1.0 handshake
|
||||
|
2021-07-31 17:27:17 | SUCCESS |
DisallowTLS11
Server refused TLS 1.1 handshake
|
||||
|
Token Endpoint TLS test |
2021-07-31 17:27:17 | SUCCESS |
EnsureTLS12WithFAPICiphers
Server agreed to TLS 1.2
|
||||
|
2021-07-31 17:27:17 | SUCCESS |
DisallowTLS10
Server refused TLS 1.0 handshake
|
||||
|
2021-07-31 17:27:17 | SUCCESS |
DisallowTLS11
Server refused TLS 1.1 handshake
|
||||
|
2021-07-31 17:27:17 |
|
DisallowInsecureCipher
Trying to connect with a non-permitted cipher (this is not exhaustive: check the server configuration manually to verify conformance)
|
||||
|
2021-07-31 17:27:17 | SUCCESS |
DisallowInsecureCipher
The TLS handshake was rejected when trying to connect with disallowed ciphers.
|
||||
|
Userinfo Endpoint TLS test |
2021-07-31 17:27:17 | SUCCESS |
EnsureTLS12WithFAPICiphers
Server agreed to TLS 1.2
|
||||
|
2021-07-31 17:27:17 | SUCCESS |
DisallowTLS10
Server refused TLS 1.0 handshake
|
||||
|
2021-07-31 17:27:17 | SUCCESS |
DisallowTLS11
Server refused TLS 1.1 handshake
|
||||
|
2021-07-31 17:27:17 |
|
DisallowInsecureCipher
Trying to connect with a non-permitted cipher (this is not exhaustive: check the server configuration manually to verify conformance)
|
||||
|
2021-07-31 17:27:17 | SUCCESS |
DisallowInsecureCipher
The TLS handshake was rejected when trying to connect with disallowed ciphers.
|
||||
|
Registration Endpoint TLS test |
2021-07-31 17:27:17 | SUCCESS |
EnsureTLS12WithFAPICiphers
Server agreed to TLS 1.2
|
||||
|
2021-07-31 17:27:17 | SUCCESS |
DisallowTLS10
Server refused TLS 1.0 handshake
|
||||
|
2021-07-31 17:27:17 | SUCCESS |
DisallowTLS11
Server refused TLS 1.1 handshake
|
||||
|
2021-07-31 17:27:17 |
|
DisallowInsecureCipher
Trying to connect with a non-permitted cipher (this is not exhaustive: check the server configuration manually to verify conformance)
|
||||
|
2021-07-31 17:27:17 | SUCCESS |
DisallowInsecureCipher
The TLS handshake was rejected when trying to connect with disallowed ciphers.
|
||||
|
Call backchannel authentication endpoint |
2021-07-31 17:27:17 |
SUCCESS
|
CreateEmptyAuthorizationEndpointRequest
Created empty authorization endpoint request
|
|
2021-07-31 17:27:17 | SUCCESS |
AddScopeToAuthorizationEndpointRequest
Added scope of 'openid email' to authorization endpoint request
|
||
|
2021-07-31 17:27:17 | SUCCESS |
AddHintToAuthorizationEndpointRequest
Added hint to authorization endpoint request
|
||
|
2021-07-31 17:27:17 | SUCCESS |
AddBindingMessageToAuthorizationEndpointRequest
Added binding message to authorization endpoint request
|
||
|
2021-07-31 17:27:17 |
|
CreateRandomClientNotificationToken
Created token value
|
||||
|
2021-07-31 17:27:17 | SUCCESS |
AddClientNotificationTokenToAuthorizationEndpointRequest
Added client_notification_token 'QwIswTobCO80L_49rHc/=' to authorization endpoint request
|
||||||||
|
2021-07-31 17:27:17 |
SUCCESS
|
ConvertAuthorizationEndpointRequestToRequestObject
Created request object claims
|
||
|
2021-07-31 17:27:17 | SUCCESS |
AddIatToRequestObject
Added iat to request object claims
|
||
|
2021-07-31 17:27:17 | SUCCESS |
AddExpToRequestObject
Added exp to request object claims
|
||
|
2021-07-31 17:27:17 | SUCCESS |
AddNbfToRequestObject
Added nbf to request object claims
|
||
|
2021-07-31 17:27:17 | SUCCESS |
AddJtiToRequestObject
Added jti to request object claims
|
||
|
2021-07-31 17:27:17 | SUCCESS |
AddAudToRequestObject
Added aud to request object claims
|
||
|
2021-07-31 17:27:17 | SUCCESS |
AddIssToRequestObject
Added iss to request object claims
|
||
|
2021-07-31 17:27:17 | SUCCESS |
SignRequestObject
Signed the request object
|
||||||||
|
2021-07-31 17:27:17 | SUCCESS |
CreateBackchannelAuthenticationEndpointRequest
Created backchannel authentication endpoint request
|
|
2021-07-31 17:27:17 |
|
AddRequestToBackchannelAuthenticationEndpointRequest
|
||
|
2021-07-31 17:27:17 | SUCCESS |
EnsureServerConfigurationSupportsMTLS
Found supported MTLS method
|
||
|
2021-07-31 17:27:17 | SUCCESS |
EnsureServerConfigurationSupportsMTLS
Found supported MTLS method
|
||
|
2021-07-31 17:27:17 |
|
AddClientIdToBackchannelAuthenticationEndpointRequest
|
||||
|
2021-07-31 17:27:17 |
|
CallBackchannelAuthenticationEndpoint
HTTP request
|
||||||||||
|
2021-07-31 17:27:17 |
RESPONSE
|
CallBackchannelAuthenticationEndpoint
HTTP response
|
||||||||
|
2021-07-31 17:27:17 |
|
CallBackchannelAuthenticationEndpoint
Backchannel Authentication endpoint response
|
||
|
2021-07-31 17:27:17 |
SUCCESS
|
CallBackchannelAuthenticationEndpoint
Parsed backchannel authentication endpoint response
|
||||||
|
2021-07-31 17:27:17 | SUCCESS |
CheckBackchannelAuthenticationEndpointHttpStatus200
Backchannel authentication endpoint http status code was 200
|
|
2021-07-31 17:27:17 | SUCCESS |
CheckBackchannelAuthenticationEndpointContentType
Backchannel authentication endpoint Content-Type: header is application/json
|
|
2021-07-31 17:27:17 |
SUCCESS
|
CheckIfBackchannelAuthenticationEndpointResponseError
No error from Backchannel authentication endpoint
|
|
2021-07-31 17:27:17 | SUCCESS |
ValidateAuthenticationRequestId
auth_req_id passed all validation checks
|
|
2021-07-31 17:27:17 | SUCCESS |
EnsureMinimumAuthenticationRequestIdLength
auth_req_id is of sufficient length
|
||||
|
2021-07-31 17:27:17 | SUCCESS |
EnsureMinimumAuthenticationRequestIdEntropy
Calculated shannon entropy seems sufficient
|
||||
|
2021-07-31 17:27:17 | SUCCESS |
EnsureRecommendedAuthenticationRequestIdEntropy
Calculated entropy
|
||||
|
2021-07-31 17:27:17 | SUCCESS |
ValidateAuthenticationRequestIdExpiresIn
expires_in passed all validation checks
|
||
|
2021-07-31 17:27:17 | SUCCESS |
ValidateAuthenticationRequestIdInterval
interval passed all validation checks
|
||
|
2021-07-31 17:27:17 |
SUCCESS
|
RemoveMTLSCertificates
Removed mutual TLS authentication credentials
|
|
2021-07-31 17:27:17 |
SUCCESS
|
CreateTokenEndpointRequestForCIBAGrant
|
||
|
2021-07-31 17:27:17 |
|
AddAuthReqIdToTokenEndpointRequest
|
||||
|
2021-07-31 17:27:17 |
SUCCESS
|
AddClientIdToTokenEndpointRequest
|
||||||
|
2021-07-31 17:27:17 |
|
CallTokenEndpointAllowingTLSFailure
HTTP request
|
||||||||
|
2021-07-31 17:27:18 |
RESPONSE
|
CallTokenEndpointAllowingTLSFailure
HTTP response
|
||||||||
|
2021-07-31 17:27:18 | SUCCESS |
CallTokenEndpointAllowingTLSFailure
Parsed token endpoint response
|
||||||||
|
2021-07-31 17:27:18 | SUCCESS |
CheckTokenEndpointHttpStatus400or401
Token endpoint http status code was 400
|
|
2021-07-31 17:27:18 | SUCCESS |
CheckTokenEndpointReturnedJsonContentType
token_endpoint_response_headers Content-Type: header is application/json
|
|
2021-07-31 17:27:18 | SUCCESS |
CheckTokenEndpointHttpStatusForInvalidRequestOrInvalidClientError
Token endpoint http status code was 400 for error 'invalid_request'
|
|
2021-07-31 17:27:18 | SUCCESS |
CheckErrorFromTokenEndpointResponseErrorInvalidClientOrInvalidRequest
Token endpoint returned an expected error
|
||||
|
2021-07-31 17:27:18 | SUCCESS |
ValidateErrorFromTokenEndpointResponseError
Token endpoint response error returned valid 'error' field
|
||
|
2021-07-31 17:27:18 | SUCCESS |
CheckErrorDescriptionFromTokenEndpointResponseErrorContainsCRLFTAB
token_endpoint_response 'error_description' field does not include CR/LF/TAB
|
||
|
2021-07-31 17:27:18 | SUCCESS |
ValidateErrorDescriptionFromTokenEndpointResponseError
token_endpoint_response error returned valid 'error_description' field
|
||
|
2021-07-31 17:27:18 | SUCCESS |
ValidateErrorUriFromTokenEndpointResponseError
token_endpoint_response did not include optional 'error_uri' field
|
|
2021-07-31 17:27:18 |
|
CallAutomatedCibaApprovalEndpoint
If your server supports automated testing, you can set 'automated_ciba_approval_url' in your configuration to a url like https://cibasim.example.com/action?token={auth_req_id}&type={action} (auth_req_id will be automatically substituted for the current auth_req_id by the conformance suite, action will be allow or deny depending on the test)
|
|
2021-07-31 17:27:25 |
INCOMING
|
fapi-ciba-id1-ensure-mtls-holder-of-key-required
Incoming HTTP request to test instance acmawWbMze6oTrG
|
||||||||||||||
|
2021-07-31 17:27:25 |
OUTGOING
|
fapi-ciba-id1-ensure-mtls-holder-of-key-required
Response to HTTP request to test instance acmawWbMze6oTrG
|
||||||||
|
2021-07-31 17:27:25 |
FINISHED
|
fapi-ciba-id1-ensure-mtls-holder-of-key-required
Test has run to completion
|
||
|
Unregister dynamically registered client |
2021-07-31 17:27:25 |
|
UnregisterDynamicallyRegisteredClient
HTTP request
|
||||||||
|
2021-07-31 17:27:25 |
RESPONSE
|
UnregisterDynamicallyRegisteredClient
HTTP response
|
||||||||
|
2021-07-31 17:27:25 |
SUCCESS
|
UnregisterDynamicallyRegisteredClient
Client successfully unregistered
|
|