Test Summary

Test Results

Expand All Collapse All
All times are UTC
2021-08-01 10:16:45 INFO
TEST-RUNNER
Test instance vMoYcn7L5JlsHp5 created
baseUrl
https://www.certification.openid.net/test/a/BasicStaticOidcTests
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code",
  "server_metadata": "discovery",
  "response_mode": "default",
  "client_registration": "dynamic_client"
}
alias
BasicStaticOidcTests
description
planId
0iCFoR30mbjHz
config
{
  "alias": "BasicStaticOidcTests",
  "server": {
    "discoveryUrl": "https://acp.certification.cloudentity.com:8443/nbflskrlcwqkigrqshjv2ee9c1fa344b4c70a956d3e681c634c7/c4378jtqqhf0d6u6d3ag/.well-known/openid-configuration",
    "login_hint": "peter"
  },
  "client": {
    "client_id": "privatekeyjwtplainfapireadwritefapitests-1",
    "scope": "openid offline_access introspect_tokens revoke_tokens",
    "jwks": {
      "keys": [
        {
          "use": "sig",
          "kty": "RSA",
          "kid": "541355562905452160561865647807960295198149529932",
          "alg": "PS256",
          "n": "zmZsz_Dqa6LybX5XGeUbwXsQyrP7oYIE5qkGek6PsKij8yat-vuEphlm9ELbC4Zwqeqgt1yWEuMHRVsxkqdE4vYacAAPydBH1ndPvTTEgF3wUwqzyMuqqyzRnV578w3cr86DV45wus_txcAGcM7BU7aaPXiUVRp6xF8q1bYXXs_mouLA9ImpluEBm9krmu29EOjImG6Bq2Hw4n8l7ewBYKyTqqS1SJryT4Wc0HsrIQWM0ynW_bnm04JJriop_0_BEvNRgCVeX7B-gH_HisSRpEMPYf3l4PpUH52KvsQBFkCANw5f88GjDBahAZ9rBhNloiMTGRKC9kqGaA9JzAoMiw",
          "e": "AQAB",
          "d": "rRlDeqVOxJS1AlUp0WLPA1YlwApwJ4R2fcgV0a9fXMYiMcMnuE0Gc5LsQEBtml3W0PogbYctqYtTRrxzd83mvP2vMG0s0JFoHhqT-ldt0UZ3Tf20x9rfOI3vAi8CftYKVjs49c5VBqdpfyZLgII1qvKCqrkclb8OZPB3aSI8uVraqhlGZfuQQM3qutkrmxojgshOcV2jugkqo_SUBEdpHJheve5wUx-bnCPkhwLJA0YWmhIjIDxX_uXUSaNGWj3GNsA5N3C9Iqf4ozRy9wzbAnnxQwCLTsbwtagko931hQSj5Azvs4Dy70_wGWmMXdCspGEsNTRuuXHHgsR3jWAFOQ",
          "p": "2ZCViNcxcz1bxoqMDqTm33GYoIBEJu1BqTT-rjiCSUvncn8sdDEL_kpJbuKRXEUkm8Ku4KfPkNSc6lQeXHeopf4RfbYBtXZIvytd1xVW6ZQNMWtwUWyRGYEuPfJLuLQQb4mmoP0RE6Pp0VZN17koR813GLz72kqS7Aw-LsvMBT0",
          "q": "8tzqZRjn7uYw2-q9osjBX_yIYhC9oAu5OJYXYGSZqdQfteW78D7-y2zgGnJcvaYETadUbHdxnfvQPCy-LsQOvw_gtHfhV1JDWdYUe4LpxPZxwbbrtcwsrnnSScthv0HGM4EXyLldGOG7Uy-7wx6BJJRYb2MFU_ZOvX0uDEdcxWc",
          "dp": "SC_5_bJxHOyB9AlqWT2LwR3e53pHoqbcP3lu-32SdSFzRQE_TbosYY5ieSFB29yxPeFFxxLHAyYYfoO0ozesxI7dXNm0DXKWxp9r_n59HPlbu0cLuGiOaGj9X95yE3Hjdi61E_uD3AFqBmRdZbNw0wowdwvVgON3hky1oS9LnX0",
          "dq": "AtPVmsW2dY6ShQzvlkSWE8MB53pgasuYJXOB5Cpnq5V_pQN-s6ZYGxAyb7xjHgYfyLOpBPZDCV7UJs8yi6LWtRy_NfqrUfPwOsyGQoXcqOFho6q4hc5RutpKO3e1tJ9UamcXWsvlrJN8NdS5b-UcBcwAV5OkjTyx3_zkG1p9VwM",
          "qi": "y7nq9MZ8vL7mc4tvdazRFTO9bgirA4Aot6dY-_Z-TB8qZU26TSDX_N7H0Su8njgErE9zck19D6F0qZ83UOS5Qw6mv08tCWEEmzW0MxMrcAN0fo91isdUGDaqBMdm88pxqUQNwwIav6nP8kSXO03bTwt_agWwStRcam7donY012Q",
          "x5c": [
            "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\u003d\u003d"
          ],
          "x5t": "M9LhoXK62kfrvUF9w98eIKQrOvI",
          "x5t#S256": "3roCKURUKKry1PGEiaf-hAjiB4lpZpjHOkqQMeT7NVw"
        }
      ]
    },
    "client_name": "first_client_name",
    "hint_type": "login_hint",
    "hint_value": "peter",
    "client_secret": "n-yzrbS3nd-ZTh_lsqr-UpVDT0ya73N9Cohe0OyFQ54",
    "client_secret_jwt_alg": "HS256"
  },
  "mtls": {
    "cert": "-----BEGIN CERTIFICATE-----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\n6ugADslzBjrIXQ\u003d\u003d\n-----END CERTIFICATE-----",
    "key": "-----BEGIN RSA PRIVATE KEY-----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\nNqoEx2bzynGpRA3DAhq/qc/yRJc7TdtPC39qBbBK1Fxqbt2idjTXZA\u003d\u003d\n-----END RSA PRIVATE KEY-----",
    "ca": "-----BEGIN CERTIFICATE-----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\nHBJjBbnwpN4tNFhczJkbga16hL+vV0I4z61mJG8OkDr25Q\u003d\u003d\n-----END CERTIFICATE-----"
  },
  "client2": {
    "client_id": "privatekeyjwtplainfapireadwritefapitests-2",
    "scope": "openid offline_access introspect_tokens revoke_tokens",
    "jwks": {
      "keys": [
        {
          "use": "sig",
          "kty": "RSA",
          "kid": "24832733911926802192539968450023201125666056437",
          "alg": "PS256",
          "n": "pIKiL6Bhck4U7B6NsWRifSf7kKFLDiAUz8kWrbQcWcOoj8ipVb26jgWEj_DwYNnJDc0YIkhfoz6AOppRBq_BPakt09EFyTeTKO0CSpf7YxfaiWD_iEKcte6jOr-rdsHYEDXoFBuSJOO-XObqs5XcBJ-_XwYNyOKw9cFDcUvIHEadyfvumTSCyR4OUBG-XpTvedPBCLscOwbaqTWcKny0YtXasAPvoL32Uq2JZFvhwscdvtIZAZkvLpBM5QBOMDWXT_eTpITuxebcBa6j2K8wmCbk2iaUmpe8tda4JnrS2njg7Pz_Ksq-zBodTXY3C1Ihggc5n8bYl3XJPar2-nnzQQ",
          "e": "AQAB",
          "d": "A9aMZCIQw_LwaAXadm4KIjNhmiE5OA4ljid54PmXw7xd3WToFnkDtjaIvjb31LqgBzNmwb4AhTV7FmLtSwOktYSR7iQtR2GFjGnjKMxc8BXpYlUiARLUxyXXJxK7tFyXZuFrFbUC9ttdYJt-lEwFwxHbDCN_BNXNHR6yLR2AgLBXf7LjDupeLA9RljbH2pV3RtgoJT7k1EiCQl9WImDXxwWlGPEhRcDyoSd0hi2_iIY4qqn08NyPEAgyvZKFyUtOa2A-t8pCjiM2kCFHwx6nUmpn4BI9z4aaKuHt44wndp9Fh3tNYiK5RO5elaG3ev9t8UYNjBDUr_GXCWN0BQgGMQ",
          "p": "x390j7htx2Bz13sli59jsbG920kZqXHO0whSZWABgvQBNfaxiLzcp2IGtS9BxJUsXORDq4dShjGBpiKgddlZJ2nerj4yi4uNpQaQWP-uAWlNiRnZJCeIJbwvU9Vch7lXJjyArOMhviGCKHnOuFngGImsymsul-TkWxRJjOOwfL0",
          "q": "0xppcP5XCrLr5-IWi-0DuUrxZkRlVB3htnHoUct9V_bhWR1oIcLcDcr3P8IzG_XkORZkTTGx_sfwN5_W_rYc8gt9gXA0MURu3QeEG5DF1xp33ZjFAPrx1q9MhAx3B4Z4mZRiui4xY9exUcADutkkMLNffL9UpwjqVrmfdmXOctU",
          "dp": "dYyMSgMJ7GjQ2S8euF56h8GLdSJllIoSrBZDNqiTO247KGjrwv5FpfsEqM3nmsWrFjEKDo_1-ExDcHkGw2oGNksTgufzMHZSR-LOOyKsjPhXT2mDoOIKPvHbkTIvC2oSB92ulDBhOX7VCrR7MfUDLnIw9jShh66_P0t86x9eZqE",
          "dq": "0nPXQF1e-vyKcB6V6aM8_iF3bUOsXOJ5XcBLIhgiempWF9hYMqgnZty8BuUcvLgzcLIhBlAPqfc7RMjltgJp8ud_lGX-sksN1u4iRrTaduodK16cr7B9HlCekFo449isLDehAQkCFg426U_qqADHsoFwJVY9F1StAg6Fqawu140",
          "qi": "JgSZgU5vOQtEMUtbFch7FDn3efaj8PLhs4GYQ69j_RCkmxAETfe9VyyNm6cltINxdbieH178fRCcriO0YjdCom9-KNMClagU75eMFmALtkBie2iCVHIPazn-h5lDIihMqiA45XkwxqDf7Xe4uGzjttpLwisb5T_f3RKhZb7Idlg",
          "x5c": [
            "MIIEVjCCAz6gAwIBAgIUBFmJzhKGBW05iWnT9Rarw4t+6PUwDQYJKoZIhvcNAQELBQAwVzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1NlYXR0bGUxFDASBgNVBAoTC0Nsb3VkZW50aXR5MQswCQYDVQQLEwJDQTAeFw0yMTAxMjAwOTQ4MDBaFw0yNjAxMTkwOTQ4MDBaMIGQMQswCQYDVQQGEwJVUzEUMBIGA1UECBMLV2FzaGluZ2h0b24xEDAOBgNVBAcTB1NlYXR0bGUxFDASBgNVBAoTC0Nsb3VkZW50aXR5MRYwFAYDVQQLEw1BdXRob3JpemF0aW9uMSswKQYDVQQDEyJjaWQ0LmF1dGhvcml6YXRpb24uY2xvdWRlbnRpdHkuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEApIKiL6Bhck4U7B6NsWRifSf7kKFLDiAUz8kWrbQcWcOoj8ipVb26jgWEj/DwYNnJDc0YIkhfoz6AOppRBq/BPakt09EFyTeTKO0CSpf7YxfaiWD/iEKcte6jOr+rdsHYEDXoFBuSJOO+XObqs5XcBJ+/XwYNyOKw9cFDcUvIHEadyfvumTSCyR4OUBG+XpTvedPBCLscOwbaqTWcKny0YtXasAPvoL32Uq2JZFvhwscdvtIZAZkvLpBM5QBOMDWXT/eTpITuxebcBa6j2K8wmCbk2iaUmpe8tda4JnrS2njg7Pz/Ksq+zBodTXY3C1Ihggc5n8bYl3XJPar2+nnzQQIDAQABo4HfMIHcMA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQUGKtwP1uxWeuqRym3wfYRx5T1p7wwHwYDVR0jBBgwFoAUylkHhGQUSf1DtT8uxH02jqlbo20wXQYDVR0RBFYwVIIJbG9jYWxob3N0giJjaWQ0LmF1dGhvcml6YXRpb24uY2xvdWRlbnRpdHkuY29tgh1hdXRob3JpemF0aW9uLmNsb3VkZW50aXR5LmNvbYcEfwAAATANBgkqhkiG9w0BAQsFAAOCAQEAVRecDpqtqJkAEKVXc0qR3UkFrzY0FJ8osZz37PiQ4FKUbGekJXA19XBMhbaqzosX45fk+5wxDTdPw8w3UR2B31fk2fw0YCjmtAX46NC6r+CSJg9xQV+Qd9AjQIDCueGqh6JvCDNgvoFv5pL6Psk4Nk6gfdofVrsiIVXs/EUCUVlMwq3wVEPvNPU/22YG8nI0s0reI1qP8gIxJWF3ugUdPt2X0M8GWYBj64M8D0nQZLIwZ17n+6rJS2eeWTO4dbccxtoVs/XvLt/8gGoZO3uXndNOCvFKaHj9YGzFViwISJ9oNL1f+z8pcAy40ilhVAkk5MJ3YDIUw8K2AGAxHlA/Mw\u003d\u003d"
          ],
          "x5t": "EfIZfqqOT-ECltjG1lovO6gYDIc",
          "x5t#S256": "g6BTnXs0jf1NNQe7TH_fu21RzRmXNbZcxrlxsc_IOtw"
        }
      ]
    },
    "client_name": "second_client_name",
    "acr_value": "urn:openbanking:psd2:sca",
    "client_secret": "GSi6oi_cMUbpVJDgdu1fjjT6voHlvnzFaatnTU9_xqE",
    "client_secret_jwt_alg": "HS256"
  },
  "mtls2": {
    "cert": "-----BEGIN CERTIFICATE-----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\nw8K2AGAxHlA/Mw\u003d\u003d\n-----END CERTIFICATE-----",
    "key": "-----BEGIN RSA PRIVATE KEY-----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\n/oeZQyIoTKogOOV5MMag3+13uLhs47baS8IrG+U/390SoWW+yHZY\n-----END RSA PRIVATE KEY-----",
    "ca": "-----BEGIN CERTIFICATE-----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\nHBJjBbnwpN4tNFhczJkbga16hL+vV0I4z61mJG8OkDr25Q\u003d\u003d\n-----END CERTIFICATE-----"
  },
  "resource": {
    "resourceUrl": "https://acp.certification.cloudentity.com:8443/mqtteztgyuiqbdua3zaz7c4844abe25c4e4daf3edcc441dc368f/c42qherno7ala81tb80g/resource-server",
    "institution_id": "institution_id",
    "consentUrl": "https://acp.certification.cloudentity.com:8443/vyu1dnaea2fd2ghbgm5r60ccaf720c8b4a419dfad48b61f46bac/c42nnt3no7ala81t9fag/open-banking-brasil/open-banking/consents/v1/consents",
    "brazilCpf": "00000000000"
  },
  "directory": {
    "discoveryUrl": "https://acp.certification.cloudentity.com:8443/hqmgwezk02ct4rwsa8cc11e69c22575e4f05bdf28ce2467edf25/c41c3b8fqdc849mniupg/.well-known/openid-configuration",
    "client_id": "privatekeyjwtdcrfapitests-directory",
    "apibase": "https://acp.certification.cloudentity.com:8443/hqmgwezk02ct4rwsa8cc11e69c22575e4f05bdf28ce2467edf25/c41c3b8fqdc849mniupg/open-banking-brasil/directory/"
  }
}
testName
oidcc-response-type-missing
2021-08-01 10:16:45 SUCCESS
CreateRedirectUri
Created redirect URI
redirect_uri
https://www.certification.openid.net/test/a/BasicStaticOidcTests/callback
2021-08-01 10:16:45
GetDynamicServerConfiguration
HTTP request
request_uri
https://acp.certification.cloudentity.com:8443/nbflskrlcwqkigrqshjv2ee9c1fa344b4c70a956d3e681c634c7/c4378jtqqhf0d6u6d3ag/.well-known/openid-configuration
request_method
GET
request_headers
{
  "accept": "text/plain, application/json, application/cbor, application/*+json, */*",
  "content-length": "0"
}
request_body

                                
2021-08-01 10:16:45 RESPONSE
GetDynamicServerConfiguration
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "content-type": "application/json; charset\u003dutf-8",
  "date": "Sun, 01 Aug 2021 10:16:45 GMT",
  "transfer-encoding": "chunked"
}
response_body
{"issuer":"https://acp.certification.cloudentity.com:8443/nbflskrlcwqkigrqshjv2ee9c1fa344b4c70a956d3e681c634c7/c4378jtqqhf0d6u6d3ag","authorization_endpoint":"https://acp.certification.cloudentity.com:8443/nbflskrlcwqkigrqshjv2ee9c1fa344b4c70a956d3e681c634c7/c4378jtqqhf0d6u6d3ag/oauth2/authorize","token_endpoint":"https://acp.certification.cloudentity.com:8443/nbflskrlcwqkigrqshjv2ee9c1fa344b4c70a956d3e681c634c7/c4378jtqqhf0d6u6d3ag/oauth2/token","jwks_uri":"https://acp.certification.cloudentity.com:8443/nbflskrlcwqkigrqshjv2ee9c1fa344b4c70a956d3e681c634c7/c4378jtqqhf0d6u6d3ag/.well-known/jwks.json","subject_types_supported":["public","pairwise"],"response_types_supported":["id_token","code","code id_token","token","token id_token","token id_token code"],"claims_supported":["sub","acr","amr"],"grant_types_supported":["authorization_code","implicit","client_credentials","password","refresh_token"],"response_modes_supported":["query","fragment"],"userinfo_endpoint":"https://acp.certification.cloudentity.com:8443/nbflskrlcwqkigrqshjv2ee9c1fa344b4c70a956d3e681c634c7/c4378jtqqhf0d6u6d3ag/userinfo","introspection_endpoint":"https://acp.certification.cloudentity.com:8443/nbflskrlcwqkigrqshjv2ee9c1fa344b4c70a956d3e681c634c7/c4378jtqqhf0d6u6d3ag/oauth2/introspect","scopes_supported":["email","phone","address","profile","openid","offline_access","view_consents","manage_consents","introspect_tokens","revoke_tokens","list_clients_with_access","revoke_client_access","dcr_register"],"token_endpoint_auth_methods_supported":["client_secret_basic","client_secret_post","client_secret_jwt","none","private_key_jwt","self_signed_tls_client_auth","tls_client_auth"],"token_endpoint_auth_signing_alg_values_supported":["RS256","ES256","PS256"],"userinfo_signing_alg_values_supported":["none","RS256"],"id_token_signing_alg_values_supported":["RS256"],"request_parameter_supported":true,"request_uri_parameter_supported":true,"request_object_signing_alg_values_supported":["RS256","ES256","PS256"],"require_request_uri_registration":true,"claims_parameter_supported":true,"revocation_endpoint":"https://acp.certification.cloudentity.com:8443/nbflskrlcwqkigrqshjv2ee9c1fa344b4c70a956d3e681c634c7/c4378jtqqhf0d6u6d3ag/oauth2/revoke","registration_endpoint":"https://acp.certification.cloudentity.com:8443/nbflskrlcwqkigrqshjv2ee9c1fa344b4c70a956d3e681c634c7/c4378jtqqhf0d6u6d3ag/oauth2/register","backchannel_logout_supported":false,"backchannel_logout_session_supported":false,"frontchannel_logout_supported":false,"frontchannel_logout_session_supported":false,"code_challenge_methods_supported":["S256"],"tls_client_certificate_bound_access_tokens":true,"backchannel_token_delivery_modes_supported":["poll","ping"],"backchannel_authentication_endpoint":"https://acp.certification.cloudentity.com:8443/nbflskrlcwqkigrqshjv2ee9c1fa344b4c70a956d3e681c634c7/c4378jtqqhf0d6u6d3ag/backchannel/authentication","backchannel_authentication_request_signing_alg_values_supported":["RS256","ES256","PS256"],"backchannel_user_code_parameter_supported":false,"request_object_encryption_alg_values_supported":["RSA-OAEP"],"request_object_encryption_enc_values_supported":["A256GCM"]}
2021-08-01 10:16:45
GetDynamicServerConfiguration
Downloaded server configuration
server_config_string
{"issuer":"https://acp.certification.cloudentity.com:8443/nbflskrlcwqkigrqshjv2ee9c1fa344b4c70a956d3e681c634c7/c4378jtqqhf0d6u6d3ag","authorization_endpoint":"https://acp.certification.cloudentity.com:8443/nbflskrlcwqkigrqshjv2ee9c1fa344b4c70a956d3e681c634c7/c4378jtqqhf0d6u6d3ag/oauth2/authorize","token_endpoint":"https://acp.certification.cloudentity.com:8443/nbflskrlcwqkigrqshjv2ee9c1fa344b4c70a956d3e681c634c7/c4378jtqqhf0d6u6d3ag/oauth2/token","jwks_uri":"https://acp.certification.cloudentity.com:8443/nbflskrlcwqkigrqshjv2ee9c1fa344b4c70a956d3e681c634c7/c4378jtqqhf0d6u6d3ag/.well-known/jwks.json","subject_types_supported":["public","pairwise"],"response_types_supported":["id_token","code","code id_token","token","token id_token","token id_token code"],"claims_supported":["sub","acr","amr"],"grant_types_supported":["authorization_code","implicit","client_credentials","password","refresh_token"],"response_modes_supported":["query","fragment"],"userinfo_endpoint":"https://acp.certification.cloudentity.com:8443/nbflskrlcwqkigrqshjv2ee9c1fa344b4c70a956d3e681c634c7/c4378jtqqhf0d6u6d3ag/userinfo","introspection_endpoint":"https://acp.certification.cloudentity.com:8443/nbflskrlcwqkigrqshjv2ee9c1fa344b4c70a956d3e681c634c7/c4378jtqqhf0d6u6d3ag/oauth2/introspect","scopes_supported":["email","phone","address","profile","openid","offline_access","view_consents","manage_consents","introspect_tokens","revoke_tokens","list_clients_with_access","revoke_client_access","dcr_register"],"token_endpoint_auth_methods_supported":["client_secret_basic","client_secret_post","client_secret_jwt","none","private_key_jwt","self_signed_tls_client_auth","tls_client_auth"],"token_endpoint_auth_signing_alg_values_supported":["RS256","ES256","PS256"],"userinfo_signing_alg_values_supported":["none","RS256"],"id_token_signing_alg_values_supported":["RS256"],"request_parameter_supported":true,"request_uri_parameter_supported":true,"request_object_signing_alg_values_supported":["RS256","ES256","PS256"],"require_request_uri_registration":true,"claims_parameter_supported":true,"revocation_endpoint":"https://acp.certification.cloudentity.com:8443/nbflskrlcwqkigrqshjv2ee9c1fa344b4c70a956d3e681c634c7/c4378jtqqhf0d6u6d3ag/oauth2/revoke","registration_endpoint":"https://acp.certification.cloudentity.com:8443/nbflskrlcwqkigrqshjv2ee9c1fa344b4c70a956d3e681c634c7/c4378jtqqhf0d6u6d3ag/oauth2/register","backchannel_logout_supported":false,"backchannel_logout_session_supported":false,"frontchannel_logout_supported":false,"frontchannel_logout_session_supported":false,"code_challenge_methods_supported":["S256"],"tls_client_certificate_bound_access_tokens":true,"backchannel_token_delivery_modes_supported":["poll","ping"],"backchannel_authentication_endpoint":"https://acp.certification.cloudentity.com:8443/nbflskrlcwqkigrqshjv2ee9c1fa344b4c70a956d3e681c634c7/c4378jtqqhf0d6u6d3ag/backchannel/authentication","backchannel_authentication_request_signing_alg_values_supported":["RS256","ES256","PS256"],"backchannel_user_code_parameter_supported":false,"request_object_encryption_alg_values_supported":["RSA-OAEP"],"request_object_encryption_enc_values_supported":["A256GCM"]}
2021-08-01 10:16:45 SUCCESS
GetDynamicServerConfiguration
Successfully parsed server configuration
issuer
https://acp.certification.cloudentity.com:8443/nbflskrlcwqkigrqshjv2ee9c1fa344b4c70a956d3e681c634c7/c4378jtqqhf0d6u6d3ag
authorization_endpoint
https://acp.certification.cloudentity.com:8443/nbflskrlcwqkigrqshjv2ee9c1fa344b4c70a956d3e681c634c7/c4378jtqqhf0d6u6d3ag/oauth2/authorize
token_endpoint
https://acp.certification.cloudentity.com:8443/nbflskrlcwqkigrqshjv2ee9c1fa344b4c70a956d3e681c634c7/c4378jtqqhf0d6u6d3ag/oauth2/token
jwks_uri
https://acp.certification.cloudentity.com:8443/nbflskrlcwqkigrqshjv2ee9c1fa344b4c70a956d3e681c634c7/c4378jtqqhf0d6u6d3ag/.well-known/jwks.json
subject_types_supported
[
  "public",
  "pairwise"
]
response_types_supported
[
  "id_token",
  "code",
  "code id_token",
  "token",
  "token id_token",
  "token id_token code"
]
claims_supported
[
  "sub",
  "acr",
  "amr"
]
grant_types_supported
[
  "authorization_code",
  "implicit",
  "client_credentials",
  "password",
  "refresh_token"
]
response_modes_supported
[
  "query",
  "fragment"
]
userinfo_endpoint
https://acp.certification.cloudentity.com:8443/nbflskrlcwqkigrqshjv2ee9c1fa344b4c70a956d3e681c634c7/c4378jtqqhf0d6u6d3ag/userinfo
introspection_endpoint
https://acp.certification.cloudentity.com:8443/nbflskrlcwqkigrqshjv2ee9c1fa344b4c70a956d3e681c634c7/c4378jtqqhf0d6u6d3ag/oauth2/introspect
scopes_supported
[
  "email",
  "phone",
  "address",
  "profile",
  "openid",
  "offline_access",
  "view_consents",
  "manage_consents",
  "introspect_tokens",
  "revoke_tokens",
  "list_clients_with_access",
  "revoke_client_access",
  "dcr_register"
]
token_endpoint_auth_methods_supported
[
  "client_secret_basic",
  "client_secret_post",
  "client_secret_jwt",
  "none",
  "private_key_jwt",
  "self_signed_tls_client_auth",
  "tls_client_auth"
]
token_endpoint_auth_signing_alg_values_supported
[
  "RS256",
  "ES256",
  "PS256"
]
userinfo_signing_alg_values_supported
[
  "none",
  "RS256"
]
id_token_signing_alg_values_supported
[
  "RS256"
]
request_parameter_supported
true
request_uri_parameter_supported
true
request_object_signing_alg_values_supported
[
  "RS256",
  "ES256",
  "PS256"
]
require_request_uri_registration
true
claims_parameter_supported
true
revocation_endpoint
https://acp.certification.cloudentity.com:8443/nbflskrlcwqkigrqshjv2ee9c1fa344b4c70a956d3e681c634c7/c4378jtqqhf0d6u6d3ag/oauth2/revoke
registration_endpoint
https://acp.certification.cloudentity.com:8443/nbflskrlcwqkigrqshjv2ee9c1fa344b4c70a956d3e681c634c7/c4378jtqqhf0d6u6d3ag/oauth2/register
backchannel_logout_supported
false
backchannel_logout_session_supported
false
frontchannel_logout_supported
false
frontchannel_logout_session_supported
false
code_challenge_methods_supported
[
  "S256"
]
tls_client_certificate_bound_access_tokens
true
backchannel_token_delivery_modes_supported
[
  "poll",
  "ping"
]
backchannel_authentication_endpoint
https://acp.certification.cloudentity.com:8443/nbflskrlcwqkigrqshjv2ee9c1fa344b4c70a956d3e681c634c7/c4378jtqqhf0d6u6d3ag/backchannel/authentication
backchannel_authentication_request_signing_alg_values_supported
[
  "RS256",
  "ES256",
  "PS256"
]
backchannel_user_code_parameter_supported
false
request_object_encryption_alg_values_supported
[
  "RSA-OAEP"
]
request_object_encryption_enc_values_supported
[
  "A256GCM"
]
2021-08-01 10:16:45 SUCCESS
CheckServerConfiguration
Found required server configuration keys
required
[
  "authorization_endpoint",
  "token_endpoint",
  "issuer"
]
2021-08-01 10:16:45 SUCCESS
ExtractTLSTestValuesFromServerConfiguration
Extracted TLS information from authorization server configuration
registration_endpoint
{
  "testHost": "acp.certification.cloudentity.com",
  "testPort": 8443
}
authorization_endpoint
{
  "testHost": "acp.certification.cloudentity.com",
  "testPort": 8443
}
token_endpoint
{
  "testHost": "acp.certification.cloudentity.com",
  "testPort": 8443
}
userinfo_endpoint
{
  "testHost": "acp.certification.cloudentity.com",
  "testPort": 8443
}
2021-08-01 10:16:45
FetchServerKeys
Fetching server key
jwks_uri
https://acp.certification.cloudentity.com:8443/nbflskrlcwqkigrqshjv2ee9c1fa344b4c70a956d3e681c634c7/c4378jtqqhf0d6u6d3ag/.well-known/jwks.json
2021-08-01 10:16:45
FetchServerKeys
HTTP request
request_uri
https://acp.certification.cloudentity.com:8443/nbflskrlcwqkigrqshjv2ee9c1fa344b4c70a956d3e681c634c7/c4378jtqqhf0d6u6d3ag/.well-known/jwks.json
request_method
GET
request_headers
{
  "accept": "text/plain, application/json, application/cbor, application/*+json, */*",
  "content-length": "0"
}
request_body

                                
2021-08-01 10:16:45 RESPONSE
FetchServerKeys
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "content-type": "application/json; charset\u003dutf-8",
  "date": "Sun, 01 Aug 2021 10:16:45 GMT",
  "transfer-encoding": "chunked"
}
response_body
{"keys":[{"use":"sig","kty":"RSA","kid":"220755893998660571992557009756272336535","alg":"RS256","n":"t7_Hu8ANzO4NPooyZUhNWuA-VGRP4b8OdH_5y2eOYllkmN0XLKhUTrC4ljm9Abz9te2F4ejbT8km538OqlRiZhDFcWV8MICtnBOKFTtArnI365Cs9K_yqiG95XWNyUoYQ2wFKAnM5mYzurEftqXvACOglcirYSz6TAzHLnDzbRXw8TD2mCitWac19ZTE8sRachQ6hMbwil7pbiJfMqliBftW7Gcrnxahwv302foFcr1vqSjyiWLrasyMgBmpY4XkiqRhaX9g_uYnQ8NaygQ9kyIxWCFjM0ZGWpHenEWcRWhD5waiADuGBRLOYydcXrwQWiAGkrEXD-Do04BDzg3DSw","e":"AQAB","x5c":["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"],"x5t":"NDJVtoQOIGmvWSOrv6TB-K38W10","x5t#S256":"cjkO83-zTrumNM64FOeRi9EkvDCvNn1i01EBUecVmgs"},{"use":"enc","kty":"RSA","kid":"c4378jtqqhf0d6u6d3b0","alg":"RSA-OAEP-256","n":"zTJ4Pm9jJ1oYzEwEiul2jNHPeAqLWigLQOdCGlXJHfpSPeGef78XDVtLitvw5hCafwq2O5GIoR9-JXV6MNuqcIc3SUCf7ZmGr1DsC0OYrrsfI_X72qQ4HYf1i2CKUwwuNnPtoDsWUbhc4mco6Ahye1QHiZr5TrS3QhqIzSI5xhAyAuk1hujao4VHc9WKKcKHiz7_3C0rWBoo2yAH0sUDofAFh1a8seI-02SuFxYjgHqbifZTBo-mZmIneYeDp4UCFEIEFiqAJSCbXKF98qeB-sHVtdmYvV1mZbXxABlqVhQqxHyyDuzOanBNlUam1VRI7KTedeMAj9_24brXur9uzQ","e":"AQAB"}]}
2021-08-01 10:16:45
FetchServerKeys
Found JWK set string
jwk_string
{"keys":[{"use":"sig","kty":"RSA","kid":"220755893998660571992557009756272336535","alg":"RS256","n":"t7_Hu8ANzO4NPooyZUhNWuA-VGRP4b8OdH_5y2eOYllkmN0XLKhUTrC4ljm9Abz9te2F4ejbT8km538OqlRiZhDFcWV8MICtnBOKFTtArnI365Cs9K_yqiG95XWNyUoYQ2wFKAnM5mYzurEftqXvACOglcirYSz6TAzHLnDzbRXw8TD2mCitWac19ZTE8sRachQ6hMbwil7pbiJfMqliBftW7Gcrnxahwv302foFcr1vqSjyiWLrasyMgBmpY4XkiqRhaX9g_uYnQ8NaygQ9kyIxWCFjM0ZGWpHenEWcRWhD5waiADuGBRLOYydcXrwQWiAGkrEXD-Do04BDzg3DSw","e":"AQAB","x5c":["MIIDUDCCAjigAwIBAgIRAKYUCeX2Z0xCvG/SXwlqHpcwDQYJKoZIhvcNAQELBQAwLDEUMBIGA1UEChMLQ2xvdWRlbnRpdHkxFDASBgNVBAMTC0Nsb3VkZW50aXR5MB4XDTIxMDgwMTEwMTU0M1oXDTIxMDkwMTEwMTU0M1owLDEUMBIGA1UEChMLQ2xvdWRlbnRpdHkxFDASBgNVBAMTC0Nsb3VkZW50aXR5MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAt7/Hu8ANzO4NPooyZUhNWuA+VGRP4b8OdH/5y2eOYllkmN0XLKhUTrC4ljm9Abz9te2F4ejbT8km538OqlRiZhDFcWV8MICtnBOKFTtArnI365Cs9K/yqiG95XWNyUoYQ2wFKAnM5mYzurEftqXvACOglcirYSz6TAzHLnDzbRXw8TD2mCitWac19ZTE8sRachQ6hMbwil7pbiJfMqliBftW7Gcrnxahwv302foFcr1vqSjyiWLrasyMgBmpY4XkiqRhaX9g/uYnQ8NaygQ9kyIxWCFjM0ZGWpHenEWcRWhD5waiADuGBRLOYydcXrwQWiAGkrEXD+Do04BDzg3DSwIDAQABo20wazAOBgNVHQ8BAf8EBAMCAqQwEwYDVR0lBAwwCgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUt7a1PGAc4aAf150H08+jNlBUGhMwFAYDVR0RBA0wC4IJbG9jYWxob3N0MA0GCSqGSIb3DQEBCwUAA4IBAQAJ/cN7nOp87bvRb+1CqdJdP5TmscPa/1Idbqdznk/f8oIxQ8a6lt/DX8AjROPZIbOwQh1M51SkZqu5rBGLAyWJTiZrPuCuIfWC4kL++vy9MDhY2ImYwiHTMqRfyGlXW/SGDLfdtrbazkdx4Us/GS2VPoU5fHznixG/ac5RuFr1l30RCYxeOYor6hZClhMwmx6aJ5hPmiIvHvXhSF1epfui65M615bo0AqJRNNahUE8/OMm94d0S/luHvm4o7CHbI6txX4mDrGTOC3eRF8HSu0J5cEJnl2bxUJQJr8a53qLd6w42sjkaeYtAxs7uxMjgww7tnFCj2mao90dNsrSb5Uq"],"x5t":"NDJVtoQOIGmvWSOrv6TB-K38W10","x5t#S256":"cjkO83-zTrumNM64FOeRi9EkvDCvNn1i01EBUecVmgs"},{"use":"enc","kty":"RSA","kid":"c4378jtqqhf0d6u6d3b0","alg":"RSA-OAEP-256","n":"zTJ4Pm9jJ1oYzEwEiul2jNHPeAqLWigLQOdCGlXJHfpSPeGef78XDVtLitvw5hCafwq2O5GIoR9-JXV6MNuqcIc3SUCf7ZmGr1DsC0OYrrsfI_X72qQ4HYf1i2CKUwwuNnPtoDsWUbhc4mco6Ahye1QHiZr5TrS3QhqIzSI5xhAyAuk1hujao4VHc9WKKcKHiz7_3C0rWBoo2yAH0sUDofAFh1a8seI-02SuFxYjgHqbifZTBo-mZmIneYeDp4UCFEIEFiqAJSCbXKF98qeB-sHVtdmYvV1mZbXxABlqVhQqxHyyDuzOanBNlUam1VRI7KTedeMAj9_24brXur9uzQ","e":"AQAB"}]}
2021-08-01 10:16:45 SUCCESS
FetchServerKeys
Found server JWK set
server_jwks
{
  "keys": [
    {
      "use": "sig",
      "kty": "RSA",
      "kid": "220755893998660571992557009756272336535",
      "alg": "RS256",
      "n": "t7_Hu8ANzO4NPooyZUhNWuA-VGRP4b8OdH_5y2eOYllkmN0XLKhUTrC4ljm9Abz9te2F4ejbT8km538OqlRiZhDFcWV8MICtnBOKFTtArnI365Cs9K_yqiG95XWNyUoYQ2wFKAnM5mYzurEftqXvACOglcirYSz6TAzHLnDzbRXw8TD2mCitWac19ZTE8sRachQ6hMbwil7pbiJfMqliBftW7Gcrnxahwv302foFcr1vqSjyiWLrasyMgBmpY4XkiqRhaX9g_uYnQ8NaygQ9kyIxWCFjM0ZGWpHenEWcRWhD5waiADuGBRLOYydcXrwQWiAGkrEXD-Do04BDzg3DSw",
      "e": "AQAB",
      "x5c": [
        "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"
      ],
      "x5t": "NDJVtoQOIGmvWSOrv6TB-K38W10",
      "x5t#S256": "cjkO83-zTrumNM64FOeRi9EkvDCvNn1i01EBUecVmgs"
    },
    {
      "use": "enc",
      "kty": "RSA",
      "kid": "c4378jtqqhf0d6u6d3b0",
      "alg": "RSA-OAEP-256",
      "n": "zTJ4Pm9jJ1oYzEwEiul2jNHPeAqLWigLQOdCGlXJHfpSPeGef78XDVtLitvw5hCafwq2O5GIoR9-JXV6MNuqcIc3SUCf7ZmGr1DsC0OYrrsfI_X72qQ4HYf1i2CKUwwuNnPtoDsWUbhc4mco6Ahye1QHiZr5TrS3QhqIzSI5xhAyAuk1hujao4VHc9WKKcKHiz7_3C0rWBoo2yAH0sUDofAFh1a8seI-02SuFxYjgHqbifZTBo-mZmIneYeDp4UCFEIEFiqAJSCbXKF98qeB-sHVtdmYvV1mZbXxABlqVhQqxHyyDuzOanBNlUam1VRI7KTedeMAj9_24brXur9uzQ",
      "e": "AQAB"
    }
  ]
}
2021-08-01 10:16:45 SUCCESS
CheckServerKeysIsValid
Server JWKs is valid
server_jwks
{
  "keys": [
    {
      "use": "sig",
      "kty": "RSA",
      "kid": "220755893998660571992557009756272336535",
      "alg": "RS256",
      "n": "t7_Hu8ANzO4NPooyZUhNWuA-VGRP4b8OdH_5y2eOYllkmN0XLKhUTrC4ljm9Abz9te2F4ejbT8km538OqlRiZhDFcWV8MICtnBOKFTtArnI365Cs9K_yqiG95XWNyUoYQ2wFKAnM5mYzurEftqXvACOglcirYSz6TAzHLnDzbRXw8TD2mCitWac19ZTE8sRachQ6hMbwil7pbiJfMqliBftW7Gcrnxahwv302foFcr1vqSjyiWLrasyMgBmpY4XkiqRhaX9g_uYnQ8NaygQ9kyIxWCFjM0ZGWpHenEWcRWhD5waiADuGBRLOYydcXrwQWiAGkrEXD-Do04BDzg3DSw",
      "e": "AQAB",
      "x5c": [
        "MIIDUDCCAjigAwIBAgIRAKYUCeX2Z0xCvG/SXwlqHpcwDQYJKoZIhvcNAQELBQAwLDEUMBIGA1UEChMLQ2xvdWRlbnRpdHkxFDASBgNVBAMTC0Nsb3VkZW50aXR5MB4XDTIxMDgwMTEwMTU0M1oXDTIxMDkwMTEwMTU0M1owLDEUMBIGA1UEChMLQ2xvdWRlbnRpdHkxFDASBgNVBAMTC0Nsb3VkZW50aXR5MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAt7/Hu8ANzO4NPooyZUhNWuA+VGRP4b8OdH/5y2eOYllkmN0XLKhUTrC4ljm9Abz9te2F4ejbT8km538OqlRiZhDFcWV8MICtnBOKFTtArnI365Cs9K/yqiG95XWNyUoYQ2wFKAnM5mYzurEftqXvACOglcirYSz6TAzHLnDzbRXw8TD2mCitWac19ZTE8sRachQ6hMbwil7pbiJfMqliBftW7Gcrnxahwv302foFcr1vqSjyiWLrasyMgBmpY4XkiqRhaX9g/uYnQ8NaygQ9kyIxWCFjM0ZGWpHenEWcRWhD5waiADuGBRLOYydcXrwQWiAGkrEXD+Do04BDzg3DSwIDAQABo20wazAOBgNVHQ8BAf8EBAMCAqQwEwYDVR0lBAwwCgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUt7a1PGAc4aAf150H08+jNlBUGhMwFAYDVR0RBA0wC4IJbG9jYWxob3N0MA0GCSqGSIb3DQEBCwUAA4IBAQAJ/cN7nOp87bvRb+1CqdJdP5TmscPa/1Idbqdznk/f8oIxQ8a6lt/DX8AjROPZIbOwQh1M51SkZqu5rBGLAyWJTiZrPuCuIfWC4kL++vy9MDhY2ImYwiHTMqRfyGlXW/SGDLfdtrbazkdx4Us/GS2VPoU5fHznixG/ac5RuFr1l30RCYxeOYor6hZClhMwmx6aJ5hPmiIvHvXhSF1epfui65M615bo0AqJRNNahUE8/OMm94d0S/luHvm4o7CHbI6txX4mDrGTOC3eRF8HSu0J5cEJnl2bxUJQJr8a53qLd6w42sjkaeYtAxs7uxMjgww7tnFCj2mao90dNsrSb5Uq"
      ],
      "x5t": "NDJVtoQOIGmvWSOrv6TB-K38W10",
      "x5t#S256": "cjkO83-zTrumNM64FOeRi9EkvDCvNn1i01EBUecVmgs"
    },
    {
      "use": "enc",
      "kty": "RSA",
      "kid": "c4378jtqqhf0d6u6d3b0",
      "alg": "RSA-OAEP-256",
      "n": "zTJ4Pm9jJ1oYzEwEiul2jNHPeAqLWigLQOdCGlXJHfpSPeGef78XDVtLitvw5hCafwq2O5GIoR9-JXV6MNuqcIc3SUCf7ZmGr1DsC0OYrrsfI_X72qQ4HYf1i2CKUwwuNnPtoDsWUbhc4mco6Ahye1QHiZr5TrS3QhqIzSI5xhAyAuk1hujao4VHc9WKKcKHiz7_3C0rWBoo2yAH0sUDofAFh1a8seI-02SuFxYjgHqbifZTBo-mZmIneYeDp4UCFEIEFiqAJSCbXKF98qeB-sHVtdmYvV1mZbXxABlqVhQqxHyyDuzOanBNlUam1VRI7KTedeMAj9_24brXur9uzQ",
      "e": "AQAB"
    }
  ]
}
2021-08-01 10:16:45 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2021-08-01 10:16:45 SUCCESS
CheckForKeyIdInServerJWKs
All keys contain kids
2021-08-01 10:16:45 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2021-08-01 10:16:45 SUCCESS
EnsureServerJwksDoesNotContainPrivateOrSymmetricKeys
Jwks does not contain any private or symmetric keys
2021-08-01 10:16:45
StoreOriginalClientConfiguration
Created original_client_config object from the client configuration.
client_id
privatekeyjwtplainfapireadwritefapitests-1
scope
openid offline_access introspect_tokens revoke_tokens
jwks
{
  "keys": [
    {
      "use": "sig",
      "kty": "RSA",
      "kid": "541355562905452160561865647807960295198149529932",
      "alg": "PS256",
      "n": "zmZsz_Dqa6LybX5XGeUbwXsQyrP7oYIE5qkGek6PsKij8yat-vuEphlm9ELbC4Zwqeqgt1yWEuMHRVsxkqdE4vYacAAPydBH1ndPvTTEgF3wUwqzyMuqqyzRnV578w3cr86DV45wus_txcAGcM7BU7aaPXiUVRp6xF8q1bYXXs_mouLA9ImpluEBm9krmu29EOjImG6Bq2Hw4n8l7ewBYKyTqqS1SJryT4Wc0HsrIQWM0ynW_bnm04JJriop_0_BEvNRgCVeX7B-gH_HisSRpEMPYf3l4PpUH52KvsQBFkCANw5f88GjDBahAZ9rBhNloiMTGRKC9kqGaA9JzAoMiw",
      "e": "AQAB",
      "d": "rRlDeqVOxJS1AlUp0WLPA1YlwApwJ4R2fcgV0a9fXMYiMcMnuE0Gc5LsQEBtml3W0PogbYctqYtTRrxzd83mvP2vMG0s0JFoHhqT-ldt0UZ3Tf20x9rfOI3vAi8CftYKVjs49c5VBqdpfyZLgII1qvKCqrkclb8OZPB3aSI8uVraqhlGZfuQQM3qutkrmxojgshOcV2jugkqo_SUBEdpHJheve5wUx-bnCPkhwLJA0YWmhIjIDxX_uXUSaNGWj3GNsA5N3C9Iqf4ozRy9wzbAnnxQwCLTsbwtagko931hQSj5Azvs4Dy70_wGWmMXdCspGEsNTRuuXHHgsR3jWAFOQ",
      "p": "2ZCViNcxcz1bxoqMDqTm33GYoIBEJu1BqTT-rjiCSUvncn8sdDEL_kpJbuKRXEUkm8Ku4KfPkNSc6lQeXHeopf4RfbYBtXZIvytd1xVW6ZQNMWtwUWyRGYEuPfJLuLQQb4mmoP0RE6Pp0VZN17koR813GLz72kqS7Aw-LsvMBT0",
      "q": "8tzqZRjn7uYw2-q9osjBX_yIYhC9oAu5OJYXYGSZqdQfteW78D7-y2zgGnJcvaYETadUbHdxnfvQPCy-LsQOvw_gtHfhV1JDWdYUe4LpxPZxwbbrtcwsrnnSScthv0HGM4EXyLldGOG7Uy-7wx6BJJRYb2MFU_ZOvX0uDEdcxWc",
      "dp": "SC_5_bJxHOyB9AlqWT2LwR3e53pHoqbcP3lu-32SdSFzRQE_TbosYY5ieSFB29yxPeFFxxLHAyYYfoO0ozesxI7dXNm0DXKWxp9r_n59HPlbu0cLuGiOaGj9X95yE3Hjdi61E_uD3AFqBmRdZbNw0wowdwvVgON3hky1oS9LnX0",
      "dq": "AtPVmsW2dY6ShQzvlkSWE8MB53pgasuYJXOB5Cpnq5V_pQN-s6ZYGxAyb7xjHgYfyLOpBPZDCV7UJs8yi6LWtRy_NfqrUfPwOsyGQoXcqOFho6q4hc5RutpKO3e1tJ9UamcXWsvlrJN8NdS5b-UcBcwAV5OkjTyx3_zkG1p9VwM",
      "qi": "y7nq9MZ8vL7mc4tvdazRFTO9bgirA4Aot6dY-_Z-TB8qZU26TSDX_N7H0Su8njgErE9zck19D6F0qZ83UOS5Qw6mv08tCWEEmzW0MxMrcAN0fo91isdUGDaqBMdm88pxqUQNwwIav6nP8kSXO03bTwt_agWwStRcam7donY012Q",
      "x5c": [
        "MIIEVjCCAz6gAwIBAgIUXtM5FvQ10vJHfx+rK68r1NDTUUwwDQYJKoZIhvcNAQELBQAwVzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1NlYXR0bGUxFDASBgNVBAoTC0Nsb3VkZW50aXR5MQswCQYDVQQLEwJDQTAeFw0yMTAxMjAwOTQ4MDBaFw0yNjAxMTkwOTQ4MDBaMIGQMQswCQYDVQQGEwJVUzEUMBIGA1UECBMLV2FzaGluZ2h0b24xEDAOBgNVBAcTB1NlYXR0bGUxFDASBgNVBAoTC0Nsb3VkZW50aXR5MRYwFAYDVQQLEw1BdXRob3JpemF0aW9uMSswKQYDVQQDEyJjaWQzLmF1dGhvcml6YXRpb24uY2xvdWRlbnRpdHkuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAzmZsz/Dqa6LybX5XGeUbwXsQyrP7oYIE5qkGek6PsKij8yat+vuEphlm9ELbC4Zwqeqgt1yWEuMHRVsxkqdE4vYacAAPydBH1ndPvTTEgF3wUwqzyMuqqyzRnV578w3cr86DV45wus/txcAGcM7BU7aaPXiUVRp6xF8q1bYXXs/mouLA9ImpluEBm9krmu29EOjImG6Bq2Hw4n8l7ewBYKyTqqS1SJryT4Wc0HsrIQWM0ynW/bnm04JJriop/0/BEvNRgCVeX7B+gH/HisSRpEMPYf3l4PpUH52KvsQBFkCANw5f88GjDBahAZ9rBhNloiMTGRKC9kqGaA9JzAoMiwIDAQABo4HfMIHcMA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQU1E1c/gH7BXSa7Fm/uOQ0szc5m8wwHwYDVR0jBBgwFoAUylkHhGQUSf1DtT8uxH02jqlbo20wXQYDVR0RBFYwVIIJbG9jYWxob3N0giJjaWQzLmF1dGhvcml6YXRpb24uY2xvdWRlbnRpdHkuY29tgh1hdXRob3JpemF0aW9uLmNsb3VkZW50aXR5LmNvbYcEfwAAATANBgkqhkiG9w0BAQsFAAOCAQEALoBLfkBn7eWoLzjQ8YGBsCq84wtXaFxmD6kc4kUdNQwUUk1WY5sWtLWrHm9bgtfrImDLyF/YXp+9f4C1V4UNYFrJmDd+8yhWeSFzgTtz5pq95iplor/hb6tm1oLgQps6GT/6gGQZfl+yD73/jHbAvXMPDlagBbjwUigpFVD7iW0lTH25Mco6EV9wkZOH8xW6Qmt0ndlRS+veHHnXUoF10C84rh8Aeu+GNzzjzkBNjP8yYIeUSEk2KeVbqilMV5irq9WyjaovWqSKJVjgeGA8/Kyi0K4b02Q5GJoWWOh967QsAZP9k1WWMhAcbYySs7pNgG/10zEJ6ugADslzBjrIXQ\u003d\u003d"
      ],
      "x5t": "M9LhoXK62kfrvUF9w98eIKQrOvI",
      "x5t#S256": "3roCKURUKKry1PGEiaf-hAjiB4lpZpjHOkqQMeT7NVw"
    }
  ]
}
client_name
first_client_name
hint_type
login_hint
hint_value
peter
client_secret
n-yzrbS3nd-ZTh_lsqr-UpVDT0ya73N9Cohe0OyFQ54
client_secret_jwt_alg
HS256
2021-08-01 10:16:45
ExtractClientNameFromStoredConfig
Extracted client_name from stored client configuration.
client_name
first_client_name
2021-08-01 10:16:45 SUCCESS
GenerateRS256ClientJWKs
Generated client JWKs
client_jwks
{
  "keys": [
    {
      "p": "vwCg4UlZJ8bKFtJ8d7sCoajDroI93z5E9QttJiPlLoBC7oSiuAd2pfeoboQ-8G0D8XiM8PVwsewXbdB-kJf63992qpGtV84CvxAUdXgJzbjcxZzKG7EAJrjDAIyNtyGJPlbwPne3TqfRXGdimGwaGiIkxh2H9T0MzUHEKOlnYkk",
      "kty": "RSA",
      "q": "ubybE3xrkF4dvc4HN881TrM5WRD16EAU7p-s-Q5wbtlj4_W6YqdiW677T_7taEMp3QBjjcNZiyY1ghy7dZhBOXn1tL1rJVqEZcl9GdeWw5xiHP0LvvY3nkJmhtdVp4C6TjwANVXFWnZVb4bi4GhiI46W81QZrEYEH9eW2N8aOfk",
      "d": "ah1ch2FnqvMUfEPEifRAjCiSMaqI-_BV0B8Hd62PvymXjnpQFJep3SkH6M1XrGKcOrzDvE8ZDJ7O_8mCwIg2mQVt6zyJoto7EyFlNMmB01Gg9EAZ-B7bTDnYoJ0iw8ulE6T_bpNyJbbIQouKZfmT27J0-Qw9Y_t2O4LiNOWqzrokHvlWONazSxdhZ5D2RxuuoPzJExRtK9zAjlTYNhRSFt4KryqI25galkyIzRwQHHG_JOncoXKI5Z2qGJe_YuWtugsYMf6igJEzDRCA7KJOijx3TGIha_LN9BU6h7GpbZ6FS9tzfV3g1FBxUXFBCnQLwMgPzVHusNrRlA47CA_uAQ",
      "e": "AQAB",
      "use": "sig",
      "qi": "cFMnSxuPe0_SUNZvE8rNENkAKJmb2OmQxrdCNtBZd1LV3hMUbv6YlwFxXATS4NJW46ZPtvrom2P7fYJDk3L9dXXmv1TyiFcg3rFhVrYeBb1wR6sri7KxeXoj8LNRSfNJyVM45YAaWBBG0eTOjieAtJQMtyTrSG2g0nQheWm88X0",
      "dp": "YvHSZaJ3mxFx0wzLCcNJA7HHXPl_T8yUMFTxABcMPGCZS7JOEQNcxXFcQZQkfqwapNaMPK8I6EKjiHG_fuwcPCko8gdxQtEnvw53arr6aSXgyEYGtP2mVGjWK8ykBUBMNo0W-2VNAmQRIssz2j3175_MaQ0XR0WPAi2VjpQKyHE",
      "alg": "RS256",
      "dq": "ftJunP6Ov7PT4P8l5JCimIs99DflgOEIqerzg9e9I6NiVow56RTbzziKtxOdbVy24AVc9LZXlPDRBnex9Fiy6JkDEZdo6seEsa_DsPqJIiXMxHhwJcMfNPun4Bh2jvoRvEux5LkdGWjFa3KRxaLgp-C754gcQ4pHVKqzgH_N-5k",
      "n": "ipQsbN68MkA7VYnmhearfCYwiMcf5853P6Wvjqft8gJR0vSbUQwH8RQQQGy4Q-DdgI5WPJODlv7gM7VpoFDr4xYdD1tl5iVz7V9qQm6L9iRCy3uve71VjZhzDjC-gUcDdxf4l0GA4iHHuuM2pu60u5gaA4QNd-dSRHGaV3RtzQTKsOWMJbJVzTgLeFQsDRCWMYXVqfYd7iOYEEGeSxaa6vngybl_btJtQh7c4h8mk4o34Jn8btadq0oJyow3DR-Tfd7lZSr1N3ux4TfZfRsYUHIHFtfXtICqXg-Go9FWYvey0y2AIaTO6zo1wp40iIX8QYvGnLHP4tq-Pl54nNraAQ"
    }
  ]
}
public_client_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "alg": "RS256",
      "n": "ipQsbN68MkA7VYnmhearfCYwiMcf5853P6Wvjqft8gJR0vSbUQwH8RQQQGy4Q-DdgI5WPJODlv7gM7VpoFDr4xYdD1tl5iVz7V9qQm6L9iRCy3uve71VjZhzDjC-gUcDdxf4l0GA4iHHuuM2pu60u5gaA4QNd-dSRHGaV3RtzQTKsOWMJbJVzTgLeFQsDRCWMYXVqfYd7iOYEEGeSxaa6vngybl_btJtQh7c4h8mk4o34Jn8btadq0oJyow3DR-Tfd7lZSr1N3ux4TfZfRsYUHIHFtfXtICqXg-Go9FWYvey0y2AIaTO6zo1wp40iIX8QYvGnLHP4tq-Pl54nNraAQ"
    }
  ]
}
2021-08-01 10:16:45 SUCCESS
CheckDistinctKeyIdValueInClientJWKs
Distinct 'kid' value in all keys of client_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2021-08-01 10:16:45
CreateEmptyDynamicRegistrationRequest
Created empty dynamic registration request
2021-08-01 10:16:45
AddClientNameToDynamicRegistrationRequest
Added client_name to registration request
client_name
first_client_name vMoYcn7L5JlsHp5
2021-08-01 10:16:45
AddAuthorizationCodeGrantTypeToDynamicRegistrationRequest
Added 'authorization_code' to 'grant_types'
grant_types
[
  "authorization_code"
]
2021-08-01 10:16:45
AddPublicJwksToDynamicRegistrationRequest
Added client public JWKS to dynamic registration request
dynamic_registration_request
{
  "client_name": "first_client_name vMoYcn7L5JlsHp5",
  "grant_types": [
    "authorization_code"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "ipQsbN68MkA7VYnmhearfCYwiMcf5853P6Wvjqft8gJR0vSbUQwH8RQQQGy4Q-DdgI5WPJODlv7gM7VpoFDr4xYdD1tl5iVz7V9qQm6L9iRCy3uve71VjZhzDjC-gUcDdxf4l0GA4iHHuuM2pu60u5gaA4QNd-dSRHGaV3RtzQTKsOWMJbJVzTgLeFQsDRCWMYXVqfYd7iOYEEGeSxaa6vngybl_btJtQh7c4h8mk4o34Jn8btadq0oJyow3DR-Tfd7lZSr1N3ux4TfZfRsYUHIHFtfXtICqXg-Go9FWYvey0y2AIaTO6zo1wp40iIX8QYvGnLHP4tq-Pl54nNraAQ"
      }
    ]
  }
}
2021-08-01 10:16:45
AddTokenEndpointAuthMethodToDynamicRegistrationRequestFromEnvironment
Added token endpoint auth method to dynamic registration request
dynamic_registration_request
{
  "client_name": "first_client_name vMoYcn7L5JlsHp5",
  "grant_types": [
    "authorization_code"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "ipQsbN68MkA7VYnmhearfCYwiMcf5853P6Wvjqft8gJR0vSbUQwH8RQQQGy4Q-DdgI5WPJODlv7gM7VpoFDr4xYdD1tl5iVz7V9qQm6L9iRCy3uve71VjZhzDjC-gUcDdxf4l0GA4iHHuuM2pu60u5gaA4QNd-dSRHGaV3RtzQTKsOWMJbJVzTgLeFQsDRCWMYXVqfYd7iOYEEGeSxaa6vngybl_btJtQh7c4h8mk4o34Jn8btadq0oJyow3DR-Tfd7lZSr1N3ux4TfZfRsYUHIHFtfXtICqXg-Go9FWYvey0y2AIaTO6zo1wp40iIX8QYvGnLHP4tq-Pl54nNraAQ"
      }
    ]
  },
  "token_endpoint_auth_method": "client_secret_basic"
}
2021-08-01 10:16:45
AddResponseTypesArrayToDynamicRegistrationRequestFromEnvironment
Added response_types array to dynamic registration request
dynamic_registration_request
{
  "client_name": "first_client_name vMoYcn7L5JlsHp5",
  "grant_types": [
    "authorization_code"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "ipQsbN68MkA7VYnmhearfCYwiMcf5853P6Wvjqft8gJR0vSbUQwH8RQQQGy4Q-DdgI5WPJODlv7gM7VpoFDr4xYdD1tl5iVz7V9qQm6L9iRCy3uve71VjZhzDjC-gUcDdxf4l0GA4iHHuuM2pu60u5gaA4QNd-dSRHGaV3RtzQTKsOWMJbJVzTgLeFQsDRCWMYXVqfYd7iOYEEGeSxaa6vngybl_btJtQh7c4h8mk4o34Jn8btadq0oJyow3DR-Tfd7lZSr1N3ux4TfZfRsYUHIHFtfXtICqXg-Go9FWYvey0y2AIaTO6zo1wp40iIX8QYvGnLHP4tq-Pl54nNraAQ"
      }
    ]
  },
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code"
  ]
}
2021-08-01 10:16:45
AddRedirectUriToDynamicRegistrationRequest
Added redirect_uris array to dynamic registration request
dynamic_registration_request
{
  "client_name": "first_client_name vMoYcn7L5JlsHp5",
  "grant_types": [
    "authorization_code"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "ipQsbN68MkA7VYnmhearfCYwiMcf5853P6Wvjqft8gJR0vSbUQwH8RQQQGy4Q-DdgI5WPJODlv7gM7VpoFDr4xYdD1tl5iVz7V9qQm6L9iRCy3uve71VjZhzDjC-gUcDdxf4l0GA4iHHuuM2pu60u5gaA4QNd-dSRHGaV3RtzQTKsOWMJbJVzTgLeFQsDRCWMYXVqfYd7iOYEEGeSxaa6vngybl_btJtQh7c4h8mk4o34Jn8btadq0oJyow3DR-Tfd7lZSr1N3ux4TfZfRsYUHIHFtfXtICqXg-Go9FWYvey0y2AIaTO6zo1wp40iIX8QYvGnLHP4tq-Pl54nNraAQ"
      }
    ]
  },
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code"
  ],
  "redirect_uris": [
    "https://www.certification.openid.net/test/a/BasicStaticOidcTests/callback"
  ]
}
2021-08-01 10:16:45
AddContactsToDynamicRegistrationRequest
Added contacts array to dynamic registration request
dynamic_registration_request
{
  "client_name": "first_client_name vMoYcn7L5JlsHp5",
  "grant_types": [
    "authorization_code"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "ipQsbN68MkA7VYnmhearfCYwiMcf5853P6Wvjqft8gJR0vSbUQwH8RQQQGy4Q-DdgI5WPJODlv7gM7VpoFDr4xYdD1tl5iVz7V9qQm6L9iRCy3uve71VjZhzDjC-gUcDdxf4l0GA4iHHuuM2pu60u5gaA4QNd-dSRHGaV3RtzQTKsOWMJbJVzTgLeFQsDRCWMYXVqfYd7iOYEEGeSxaa6vngybl_btJtQh7c4h8mk4o34Jn8btadq0oJyow3DR-Tfd7lZSr1N3ux4TfZfRsYUHIHFtfXtICqXg-Go9FWYvey0y2AIaTO6zo1wp40iIX8QYvGnLHP4tq-Pl54nNraAQ"
      }
    ]
  },
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code"
  ],
  "redirect_uris": [
    "https://www.certification.openid.net/test/a/BasicStaticOidcTests/callback"
  ],
  "contacts": [
    "certification@oidf.org"
  ]
}
2021-08-01 10:16:45
CallDynamicRegistrationEndpoint
HTTP request
request_uri
https://acp.certification.cloudentity.com:8443/nbflskrlcwqkigrqshjv2ee9c1fa344b4c70a956d3e681c634c7/c4378jtqqhf0d6u6d3ag/oauth2/register
request_method
POST
request_headers
{
  "accept": "application/json",
  "accept-charset": "utf-8",
  "content-type": "application/json",
  "content-length": "715"
}
request_body
{"client_name":"first_client_name vMoYcn7L5JlsHp5","grant_types":["authorization_code"],"jwks":{"keys":[{"kty":"RSA","e":"AQAB","use":"sig","alg":"RS256","n":"ipQsbN68MkA7VYnmhearfCYwiMcf5853P6Wvjqft8gJR0vSbUQwH8RQQQGy4Q-DdgI5WPJODlv7gM7VpoFDr4xYdD1tl5iVz7V9qQm6L9iRCy3uve71VjZhzDjC-gUcDdxf4l0GA4iHHuuM2pu60u5gaA4QNd-dSRHGaV3RtzQTKsOWMJbJVzTgLeFQsDRCWMYXVqfYd7iOYEEGeSxaa6vngybl_btJtQh7c4h8mk4o34Jn8btadq0oJyow3DR-Tfd7lZSr1N3ux4TfZfRsYUHIHFtfXtICqXg-Go9FWYvey0y2AIaTO6zo1wp40iIX8QYvGnLHP4tq-Pl54nNraAQ"}]},"token_endpoint_auth_method":"client_secret_basic","response_types":["code"],"redirect_uris":["https://www.certification.openid.net/test/a/BasicStaticOidcTests/callback"],"contacts":["certification@oidf.org"]}
2021-08-01 10:16:45 RESPONSE
CallDynamicRegistrationEndpoint
HTTP response
response_status_code
201 CREATED
response_status_text
Created
response_headers
{
  "content-type": "application/json; charset\u003dutf-8",
  "date": "Sun, 01 Aug 2021 10:16:45 GMT",
  "transfer-encoding": "chunked"
}
response_body
{"client_name":"first_client_name vMoYcn7L5JlsHp5","description":"","client_uri":"","logo_uri":"","policy_uri":"","tos_uri":"","client_id":"c43793dqqhf0d6u6d4a0","application_type":"web","application_types":["server_web","dcr"],"redirect_uris":["https://www.certification.openid.net/test/a/BasicStaticOidcTests/callback"],"grant_types":["authorization_code"],"response_types":["code"],"scopes":["openid","address","email","phone","profile"],"audience":["c43793dqqhf0d6u6d4a0"],"token_endpoint_auth_method":"client_secret_basic","token_endpoint_auth_signing_alg":"none","jwks":{"keys":[{"use":"sig","kty":"RSA","alg":"RS256","n":"ipQsbN68MkA7VYnmhearfCYwiMcf5853P6Wvjqft8gJR0vSbUQwH8RQQQGy4Q-DdgI5WPJODlv7gM7VpoFDr4xYdD1tl5iVz7V9qQm6L9iRCy3uve71VjZhzDjC-gUcDdxf4l0GA4iHHuuM2pu60u5gaA4QNd-dSRHGaV3RtzQTKsOWMJbJVzTgLeFQsDRCWMYXVqfYd7iOYEEGeSxaa6vngybl_btJtQh7c4h8mk4o34Jn8btadq0oJyow3DR-Tfd7lZSr1N3ux4TfZfRsYUHIHFtfXtICqXg-Go9FWYvey0y2AIaTO6zo1wp40iIX8QYvGnLHP4tq-Pl54nNraAQ","e":"AQAB"}]},"jwks_uri":"","request_object_signing_alg":"any","request_uris":[],"client_id_issued_at":1627813005,"client_secret_expires_at":0,"sector_identifier_uri":"","userinfo_signed_response_alg":"none","id_token_signed_response_alg":"RS256","tls_client_certificate_bound_access_tokens":false,"tls_client_auth_subject_dn":"","tls_client_auth_san_dns":"","tls_client_auth_san_uri":"","tls_client_auth_san_ip":"","tls_client_auth_san_email":"","privacy":{"scopes":null},"subject_type":"public","backchannel_token_delivery_mode":"","backchannel_client_notification_endpoint":"","backchannel_authentication_request_signing_alg":"","backchannel_user_code_parameter":false,"client_secret":"9hOzhzXEQS9iQ5stxQtNqMIJOdr9Td-yhVq-rkEaiiE","hashed_secret":"a8bbf1f0152ebcc476471d412813d4b82025a9e0afa051c0ddea2c93fef1cbd5","software_id":"","software_version":"","software_statement":"","dynamically_registered":true,"registration_access_token":"4JdmNclpUbLeV28aK6eLes9j5rYGA0F_H6Deilx1a0Y.qeSf0UHYFiMRw3fNF0oi-quYQ0X8ep5afsf-qRTMiCs","registration_client_uri":"https://acp.certification.cloudentity.com:8443/nbflskrlcwqkigrqshjv2ee9c1fa344b4c70a956d3e681c634c7/c4378jtqqhf0d6u6d3ag/oauth2/register/c43793dqqhf0d6u6d4a0","registration_access_token_expires_in":1630405005}
2021-08-01 10:16:45
CallDynamicRegistrationEndpoint
Registration endpoint response
dynamic_registration_response
{"client_name":"first_client_name vMoYcn7L5JlsHp5","description":"","client_uri":"","logo_uri":"","policy_uri":"","tos_uri":"","client_id":"c43793dqqhf0d6u6d4a0","application_type":"web","application_types":["server_web","dcr"],"redirect_uris":["https://www.certification.openid.net/test/a/BasicStaticOidcTests/callback"],"grant_types":["authorization_code"],"response_types":["code"],"scopes":["openid","address","email","phone","profile"],"audience":["c43793dqqhf0d6u6d4a0"],"token_endpoint_auth_method":"client_secret_basic","token_endpoint_auth_signing_alg":"none","jwks":{"keys":[{"use":"sig","kty":"RSA","alg":"RS256","n":"ipQsbN68MkA7VYnmhearfCYwiMcf5853P6Wvjqft8gJR0vSbUQwH8RQQQGy4Q-DdgI5WPJODlv7gM7VpoFDr4xYdD1tl5iVz7V9qQm6L9iRCy3uve71VjZhzDjC-gUcDdxf4l0GA4iHHuuM2pu60u5gaA4QNd-dSRHGaV3RtzQTKsOWMJbJVzTgLeFQsDRCWMYXVqfYd7iOYEEGeSxaa6vngybl_btJtQh7c4h8mk4o34Jn8btadq0oJyow3DR-Tfd7lZSr1N3ux4TfZfRsYUHIHFtfXtICqXg-Go9FWYvey0y2AIaTO6zo1wp40iIX8QYvGnLHP4tq-Pl54nNraAQ","e":"AQAB"}]},"jwks_uri":"","request_object_signing_alg":"any","request_uris":[],"client_id_issued_at":1627813005,"client_secret_expires_at":0,"sector_identifier_uri":"","userinfo_signed_response_alg":"none","id_token_signed_response_alg":"RS256","tls_client_certificate_bound_access_tokens":false,"tls_client_auth_subject_dn":"","tls_client_auth_san_dns":"","tls_client_auth_san_uri":"","tls_client_auth_san_ip":"","tls_client_auth_san_email":"","privacy":{"scopes":null},"subject_type":"public","backchannel_token_delivery_mode":"","backchannel_client_notification_endpoint":"","backchannel_authentication_request_signing_alg":"","backchannel_user_code_parameter":false,"client_secret":"9hOzhzXEQS9iQ5stxQtNqMIJOdr9Td-yhVq-rkEaiiE","hashed_secret":"a8bbf1f0152ebcc476471d412813d4b82025a9e0afa051c0ddea2c93fef1cbd5","software_id":"","software_version":"","software_statement":"","dynamically_registered":true,"registration_access_token":"4JdmNclpUbLeV28aK6eLes9j5rYGA0F_H6Deilx1a0Y.qeSf0UHYFiMRw3fNF0oi-quYQ0X8ep5afsf-qRTMiCs","registration_client_uri":"https://acp.certification.cloudentity.com:8443/nbflskrlcwqkigrqshjv2ee9c1fa344b4c70a956d3e681c634c7/c4378jtqqhf0d6u6d3ag/oauth2/register/c43793dqqhf0d6u6d4a0","registration_access_token_expires_in":1630405005}
2021-08-01 10:16:45
CallDynamicRegistrationEndpoint
Parsed registration endpoint response
client_name
first_client_name vMoYcn7L5JlsHp5
description

                                
client_uri

                                
logo_uri

                                
policy_uri

                                
tos_uri

                                
client_id
c43793dqqhf0d6u6d4a0
application_type
web
application_types
[
  "server_web",
  "dcr"
]
redirect_uris
[
  "https://www.certification.openid.net/test/a/BasicStaticOidcTests/callback"
]
grant_types
[
  "authorization_code"
]
response_types
[
  "code"
]
scopes
[
  "openid",
  "address",
  "email",
  "phone",
  "profile"
]
audience
[
  "c43793dqqhf0d6u6d4a0"
]
token_endpoint_auth_method
client_secret_basic
token_endpoint_auth_signing_alg
none
jwks
{
  "keys": [
    {
      "use": "sig",
      "kty": "RSA",
      "alg": "RS256",
      "n": "ipQsbN68MkA7VYnmhearfCYwiMcf5853P6Wvjqft8gJR0vSbUQwH8RQQQGy4Q-DdgI5WPJODlv7gM7VpoFDr4xYdD1tl5iVz7V9qQm6L9iRCy3uve71VjZhzDjC-gUcDdxf4l0GA4iHHuuM2pu60u5gaA4QNd-dSRHGaV3RtzQTKsOWMJbJVzTgLeFQsDRCWMYXVqfYd7iOYEEGeSxaa6vngybl_btJtQh7c4h8mk4o34Jn8btadq0oJyow3DR-Tfd7lZSr1N3ux4TfZfRsYUHIHFtfXtICqXg-Go9FWYvey0y2AIaTO6zo1wp40iIX8QYvGnLHP4tq-Pl54nNraAQ",
      "e": "AQAB"
    }
  ]
}
jwks_uri

                                
request_object_signing_alg
any
request_uris
[]
client_id_issued_at
1627813005
client_secret_expires_at
0
sector_identifier_uri

                                
userinfo_signed_response_alg
none
id_token_signed_response_alg
RS256
tls_client_certificate_bound_access_tokens
false
tls_client_auth_subject_dn

                                
tls_client_auth_san_dns

                                
tls_client_auth_san_uri

                                
tls_client_auth_san_ip

                                
tls_client_auth_san_email

                                
privacy
{}
subject_type
public
backchannel_token_delivery_mode

                                
backchannel_client_notification_endpoint

                                
backchannel_authentication_request_signing_alg

                                
backchannel_user_code_parameter
false
client_secret
9hOzhzXEQS9iQ5stxQtNqMIJOdr9Td-yhVq-rkEaiiE
hashed_secret
a8bbf1f0152ebcc476471d412813d4b82025a9e0afa051c0ddea2c93fef1cbd5
software_id

                                
software_version

                                
software_statement

                                
dynamically_registered
true
registration_access_token
4JdmNclpUbLeV28aK6eLes9j5rYGA0F_H6Deilx1a0Y.qeSf0UHYFiMRw3fNF0oi-quYQ0X8ep5afsf-qRTMiCs
registration_client_uri
https://acp.certification.cloudentity.com:8443/nbflskrlcwqkigrqshjv2ee9c1fa344b4c70a956d3e681c634c7/c4378jtqqhf0d6u6d3ag/oauth2/register/c43793dqqhf0d6u6d4a0
registration_access_token_expires_in
1630405005
2021-08-01 10:16:45 SUCCESS
CallDynamicRegistrationEndpoint
Extracted dynamic registration management credentials
registration_client_uri
https://acp.certification.cloudentity.com:8443/nbflskrlcwqkigrqshjv2ee9c1fa344b4c70a956d3e681c634c7/c4378jtqqhf0d6u6d3ag/oauth2/register/c43793dqqhf0d6u6d4a0
registration_access_token
4JdmNclpUbLeV28aK6eLes9j5rYGA0F_H6Deilx1a0Y.qeSf0UHYFiMRw3fNF0oi-quYQ0X8ep5afsf-qRTMiCs
2021-08-01 10:16:45
SetScopeInClientConfigurationToOpenId
Set scope in client configuration to "openid"
scope
openid
2021-08-01 10:16:45 SUCCESS
EnsureServerConfigurationSupportsClientSecretBasic
Contents of 'token_endpoint_auth_methods_supported' in discovery document matches expectations.
actual
[
  "client_secret_basic",
  "client_secret_post",
  "client_secret_jwt",
  "none",
  "private_key_jwt",
  "self_signed_tls_client_auth",
  "tls_client_auth"
]
expected
[
  "client_secret_basic"
]
minimum_matches_required
1
2021-08-01 10:16:45 SUCCESS
SetProtectedResourceUrlToUserInfoEndpoint
userinfo_endpoint will be used to test access token. The user info is not a mandatory to implement feature in the OpenID Connect specification, but is mandatory for certification.
protected_resource_url
https://acp.certification.cloudentity.com:8443/nbflskrlcwqkigrqshjv2ee9c1fa344b4c70a956d3e681c634c7/c4378jtqqhf0d6u6d3ag/userinfo
2021-08-01 10:16:46
oidcc-response-type-missing
Setup Done
Make request to authorization endpoint
2021-08-01 10:16:46 SUCCESS
CreateAuthorizationEndpointRequestFromClientInformation
Created authorization endpoint request
client_id
c43793dqqhf0d6u6d4a0
redirect_uri
https://www.certification.openid.net/test/a/BasicStaticOidcTests/callback
scope
openid
2021-08-01 10:16:46
CreateRandomStateValue
Created state value
requested_state_length
10
state
rd34WtgZZf
2021-08-01 10:16:46 SUCCESS
AddStateToAuthorizationEndpointRequest
Added state parameter to request
client_id
c43793dqqhf0d6u6d4a0
redirect_uri
https://www.certification.openid.net/test/a/BasicStaticOidcTests/callback
scope
openid
state
rd34WtgZZf
2021-08-01 10:16:46
CreateRandomNonceValue
Created nonce value
requested_nonce_length
10
nonce
ahhbV7hC3p
2021-08-01 10:16:46 SUCCESS
AddNonceToAuthorizationEndpointRequest
Added nonce parameter to request
client_id
c43793dqqhf0d6u6d4a0
redirect_uri
https://www.certification.openid.net/test/a/BasicStaticOidcTests/callback
scope
openid
state
rd34WtgZZf
nonce
ahhbV7hC3p
2021-08-01 10:16:46
SetAuthorizationEndpointRequestResponseTypeFromEnvironment
Miss out the response_type
2021-08-01 10:16:46 SUCCESS
BuildPlainRedirectToAuthorizationEndpoint
Sending to authorization endpoint
redirect_to_authorization_endpoint
https://acp.certification.cloudentity.com:8443/nbflskrlcwqkigrqshjv2ee9c1fa344b4c70a956d3e681c634c7/c4378jtqqhf0d6u6d3ag/oauth2/authorize?client_id=c43793dqqhf0d6u6d4a0&redirect_uri=https://www.certification.openid.net/test/a/BasicStaticOidcTests/callback&scope=openid&state=rd34WtgZZf&nonce=ahhbV7hC3p
2021-08-01 10:16:46 REDIRECT
oidcc-response-type-missing
Redirecting to authorization endpoint
redirect_to
https://acp.certification.cloudentity.com:8443/nbflskrlcwqkigrqshjv2ee9c1fa344b4c70a956d3e681c634c7/c4378jtqqhf0d6u6d3ag/oauth2/authorize?client_id=c43793dqqhf0d6u6d4a0&redirect_uri=https://www.certification.openid.net/test/a/BasicStaticOidcTests/callback&scope=openid&state=rd34WtgZZf&nonce=ahhbV7hC3p
2021-08-01 10:16:46 REVIEW
ExpectResponseTypeMissingErrorPage
Upload a screenshot of the error page showing a missing response type error.
image_no_longer_required
true
2021-08-01 10:16:48 INCOMING
oidcc-response-type-missing
Incoming HTTP request to test instance vMoYcn7L5JlsHp5
incoming_headers
{
  "host": "www.certification.openid.net",
  "upgrade-insecure-requests": "1",
  "user-agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.107 Safari/537.36",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/avif,image/webp,image/apng,*/*;q\u003d0.8,application/signed-exchange;v\u003db3;q\u003d0.9",
  "sec-fetch-site": "cross-site",
  "sec-fetch-mode": "navigate",
  "sec-fetch-user": "?1",
  "sec-fetch-dest": "document",
  "sec-ch-ua": "\"Chromium\";v\u003d\"92\", \" Not A;Brand\";v\u003d\"99\", \"Google Chrome\";v\u003d\"92\"",
  "sec-ch-ua-mobile": "?0",
  "referer": "https://www.certification.openid.net/",
  "accept-encoding": "gzip, deflate, br",
  "accept-language": "pl-PL,pl;q\u003d0.9",
  "cookie": "JSESSIONID\u003d525A1F0567B1C20203BBC23796A4E5BC",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
callback
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "error": "unsupported_response_type",
  "error_description": "The authorization server does not support obtaining a token using this method",
  "error_hint": "The request is missing the \"response_type\"\" parameter.",
  "state": "rd34WtgZZf"
}
incoming_body
2021-08-01 10:16:48 SUCCESS
CreateRandomImplicitSubmitUrl
Created random implicit submission URL
implicit_submit
{
  "path": "implicit/Ms1ImQFNmdfkpbUpDX6v",
  "fullUrl": "https://www.certification.openid.net/test/a/BasicStaticOidcTests/implicit/Ms1ImQFNmdfkpbUpDX6v"
}
2021-08-01 10:16:48 OUTGOING
oidcc-response-type-missing
Response to HTTP request to test instance vMoYcn7L5JlsHp5
outgoing
ModelAndView [view="implicitCallback"; model={implicitSubmitUrl=https://www.certification.openid.net/test/a/BasicStaticOidcTests/implicit/Ms1ImQFNmdfkpbUpDX6v, returnUrl=/log-detail.html?log=vMoYcn7L5JlsHp5}]
outgoing_path
callback
2021-08-01 10:16:49 INCOMING
oidcc-response-type-missing
Incoming HTTP request to test instance vMoYcn7L5JlsHp5
incoming_headers
{
  "host": "www.certification.openid.net",
  "sec-ch-ua": "\"Chromium\";v\u003d\"92\", \" Not A;Brand\";v\u003d\"99\", \"Google Chrome\";v\u003d\"92\"",
  "accept": "*/*",
  "x-requested-with": "XMLHttpRequest",
  "sec-ch-ua-mobile": "?0",
  "user-agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.107 Safari/537.36",
  "content-type": "text/plain",
  "origin": "https://www.certification.openid.net",
  "sec-fetch-site": "same-origin",
  "sec-fetch-mode": "cors",
  "sec-fetch-dest": "empty",
  "referer": "https://www.certification.openid.net/test/a/BasicStaticOidcTests/callback?error\u003dunsupported_response_type\u0026error_description\u003dThe+authorization+server+does+not+support+obtaining+a+token+using+this+method\u0026error_hint\u003dThe+request+is+missing+the+%22response_type%22%22+parameter.\u0026state\u003drd34WtgZZf",
  "accept-encoding": "gzip, deflate, br",
  "accept-language": "pl-PL,pl;q\u003d0.9",
  "cookie": "JSESSIONID\u003d525A1F0567B1C20203BBC23796A4E5BC",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "0",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
implicit/Ms1ImQFNmdfkpbUpDX6v
incoming_body_form_params
incoming_method
POST
incoming_body_json
incoming_query_string_params
{}
incoming_body
2021-08-01 10:16:49 OUTGOING
oidcc-response-type-missing
Response to HTTP request to test instance vMoYcn7L5JlsHp5
outgoing_status_code
204
outgoing_headers
{}
outgoing_body

                                
outgoing_path
implicit/Ms1ImQFNmdfkpbUpDX6v
2021-08-01 10:16:49 SUCCESS
ExtractImplicitHashToCallbackResponse
implicit_hash is empty
2021-08-01 10:16:49 REDIRECT-IN
oidcc-response-type-missing
Authorization endpoint response captured
url_query
{
  "error": "unsupported_response_type",
  "error_description": "The authorization server does not support obtaining a token using this method",
  "error_hint": "The request is missing the \"response_type\"\" parameter.",
  "state": "rd34WtgZZf"
}
headers
{
  "host": "www.certification.openid.net",
  "upgrade-insecure-requests": "1",
  "user-agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.107 Safari/537.36",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/avif,image/webp,image/apng,*/*;q\u003d0.8,application/signed-exchange;v\u003db3;q\u003d0.9",
  "sec-fetch-site": "cross-site",
  "sec-fetch-mode": "navigate",
  "sec-fetch-user": "?1",
  "sec-fetch-dest": "document",
  "sec-ch-ua": "\"Chromium\";v\u003d\"92\", \" Not A;Brand\";v\u003d\"99\", \"Google Chrome\";v\u003d\"92\"",
  "sec-ch-ua-mobile": "?0",
  "referer": "https://www.certification.openid.net/",
  "accept-encoding": "gzip, deflate, br",
  "accept-language": "pl-PL,pl;q\u003d0.9",
  "cookie": "JSESSIONID\u003d525A1F0567B1C20203BBC23796A4E5BC",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
http_method
GET
url_fragment
{}
post_body
Verify authorization endpoint response
2021-08-01 10:16:49 SUCCESS
CheckStateInAuthorizationResponse
State in response correctly returned
state
rd34WtgZZf
2021-08-01 10:16:49
ValidateIssInAuthorizationResponse
No 'iss' value in authorization response.
2021-08-01 10:16:49 SUCCESS
EnsureErrorFromAuthorizationEndpointResponse
Authorization endpoint returned an error
error
unsupported_response_type
error_description
The authorization server does not support obtaining a token using this method
error_hint
The request is missing the "response_type"" parameter.
state
rd34WtgZZf
2021-08-01 10:16:49 SUCCESS
RejectAuthCodeInAuthorizationEndpointResponse
Authorization code is not present in authorization endpoint response
2021-08-01 10:16:49 WARNING
CheckForUnexpectedParametersInErrorResponseFromAuthorizationEndpoint
error response includes unexpected parameters. This may be because the server supports extensions the test suite is unaware of, or the server may be returning values it should not.
error_hint
The request is missing the "response_type"" parameter.
2021-08-01 10:16:49 SUCCESS
CheckErrorDescriptionFromAuthorizationEndpointResponseErrorContainsCRLFTAB
authorization_endpoint_response 'error_description' field does not include CR/LF/TAB
error_description
The authorization server does not support obtaining a token using this method
2021-08-01 10:16:49 SUCCESS
ValidateErrorDescriptionFromAuthorizationEndpointResponseError
authorization_endpoint_response error returned valid 'error_description' field
error_description
The authorization server does not support obtaining a token using this method
2021-08-01 10:16:49 SUCCESS
ValidateErrorUriFromAuthorizationEndpointResponseError
authorization_endpoint_response did not include optional 'error_uri' field
2021-08-01 10:16:49 SUCCESS
CheckErrorFromAuthorizationEndpointErrorInvalidRequestOrUnsupportedResponseType
Authorization endpoint returned expected error
actual
unsupported_response_type
expected
[
  "unsupported_response_type",
  "invalid_request"
]
2021-08-01 10:16:49 FINISHED
oidcc-response-type-missing
Test has run to completion
testmodule_result
WARNING
Unregister dynamically registered client
2021-08-01 10:16:49
UnregisterDynamicallyRegisteredClient
HTTP request
request_uri
https://acp.certification.cloudentity.com:8443/nbflskrlcwqkigrqshjv2ee9c1fa344b4c70a956d3e681c634c7/c4378jtqqhf0d6u6d3ag/oauth2/register/c43793dqqhf0d6u6d4a0
request_method
DELETE
request_headers
{
  "accept": "application/json",
  "accept-charset": "utf-8",
  "authorization": "Bearer 4JdmNclpUbLeV28aK6eLes9j5rYGA0F_H6Deilx1a0Y.qeSf0UHYFiMRw3fNF0oi-quYQ0X8ep5afsf-qRTMiCs",
  "content-length": "0"
}
request_body

                                
2021-08-01 10:16:49 RESPONSE
UnregisterDynamicallyRegisteredClient
HTTP response
response_status_code
204 NO_CONTENT
response_status_text
No Content
response_headers
{
  "content-type": "application/json; charset\u003dutf-8",
  "date": "Sun, 01 Aug 2021 10:16:49 GMT"
}
response_body

                                
2021-08-01 10:16:49 SUCCESS
UnregisterDynamicallyRegisteredClient
Client successfully unregistered
2021-08-01 10:16:56 IMAGE
_image-api
img
2021-08-01 10:17:04
TEST-RUNNER
Alias has now been claimed by another test
alias
BasicStaticOidcTests
new_test_id
2v9hqueKygPUaik
Test Results