Test Summary

Test Results

Expand All Collapse All
All times are UTC
2021-09-30 07:12:47 INFO
TEST-RUNNER
Test instance 77W186UEEWEDRza created
baseUrl
https://www.certification.openid.net/test/a/idpy
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code",
  "request_type": "plain_http_request",
  "client_registration": "dynamic_client",
  "response_mode": "default"
}
alias
idpy
description
oidcop
planId
Q5bxP9ys6sz13
config
{
  "alias": "idpy",
  "description": "oidcop",
  "server": {
    "discoveryUrl": "https://89.45.234.133:4000/.well-known/openid-configuration",
    "login_hint": "roland@89.45.234.133:4000"
  },
  "client2": {
    "client_name": "Anything"
  }
}
testName
oidcc-client-test-discovery-issuer-mismatch
2021-09-30 07:12:47 SUCCESS
OIDCCGenerateServerConfiguration
Generated default server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/idpy/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/idpy/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/idpy/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/idpy/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/idpy/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/idpy/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post",
    "client_secret_jwt",
    "private_key_jwt"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2021-09-30 07:12:47
SetTokenEndpointAuthMethodsSupportedToClientSecretBasicOnly
Changed token_endpoint_auth_methods_supported to client_secret_basic only in server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/idpy/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/idpy/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/idpy/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/idpy/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/idpy/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/idpy/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2021-09-30 07:12:47
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "-j9hQGGebZKIiUf19_DR8ZMbeQr2LMIofxWy9oS1A1Ut3wwvcS6gyjcsKpHvcyS9ZAB4VOv25QgTduOcWV3DjCx-PqkLv9f39nEAVj6eS1oQBAP_pNtx7bKpmPqds9gVLM9WpmFPY4lsZjfC42lZzzf6a0o8eyul_2tz9AQLtAs",
      "kty": "RSA",
      "q": "zZ0q9Uz2CNZSVQgUSCkS54mOi15930WR4dXxppQB9ut8EXSrUF-6djD9jWrJ8c5P-UdKEvg5trqyKnI_jahtJXZ46-3lzI8iJYjb6K7rwqaXqLG3WdqfB2sE8_9LFLwxm-Qj0MLcx8QcVhwH6UZ4qBmOjcjHCRH5fSmAukeX0tM",
      "d": "ZKR87OfVaJVGDjMwQ6v6zKIHgbTCyX2D66FRZlGZNdCT5rNRNVbnM0SPXtp6sxJrzS1JdXxLp4zzj8mS8ajKEbdxa8_6li8EjGZpnYTx8FjvbWzRymdf6s0lq0Bmywx3tvjksMgT4ghtL1z9M5c-CRWOFIoqcH_Ht99u83-jKc4cDr_4ehQrcHNrKH4rzB106m_1jZL4Pma9yHJ99PuYQEiodMJk8Rx-qKck7LcWh3bXfAIiAzCNp8XIsXkbLPspWRmYyx95dfIqqo_iU7ZgrrHd4TNdYAgynmDlClhPi_nCUEpvF9HnxR4moQVB4bmu0zAMRCCK_LSV36yOwVPJwQ",
      "e": "AQAB",
      "use": "sig",
      "kid": "36129fc1-8f12-4cae-8819-22e0f5a86571",
      "qi": "G4MkOS7Qf80FKzr_zxIKIm3zVunmb7r2jh1oOgzrCYSjwtMuCjd0YBlLq5M6nrX2K_smIuwtUqt_eDJ7sZDLbczFud8n2cJlabGCWtKyx2B0k73V8E11Q9uQISjvV5iJcaeMhUaOygV-AA-uD2T_Lx2TXDpDon74whDrW1nbcZk",
      "dp": "VmRFDbXlvMwmqMYYC1WvFOgFRv9ax07sLhtuoh5kY1cns-YABuHjDoyHidbBxI19eKWU5TRlEuJ73cJsOondNWoy1y0C6mMDrqeKRzvs5_SarNg4jFBZ_4Z7eF2kze6eOM8Hif70KlfJ_WvosxuurpQTtrB1OsxxzUDqUeaHp8s",
      "dq": "OIEKfyLJMiCDu65etH3lHg_lRlOPT740mtVKdTaTW6HXFIz1Tz8fZL-NzkEcggDqZVy79H6Wjaq8r4F6CZnRdMwb6uoTjqV_AsWbeVQoofNaFhfQhTbZIRa947eykF4vW-HUHdiPB67TAq7tVaPyIG_1hu04FTwFTeoL4CUwidU",
      "n": "yP5jvWJ_sPMCJiQvW_YAsPdLiyRbWj7DSQ8UZ58jYY79z2CrkPnbYhK-P3vkpVw7KQLMOPYl-XOq2Wi-LyXJSYdzezSZEuwc6_1s_v1_2qPCI-sGTBXMd60_-M7WhnQZ_SJKd2zAjAQc5L6Rqojv5rCsE6keieC8KL8GA5vS487mqrb0G0T_PshceI23YbxqVf5EzF__L0mDnQKmpBXRJ9URzzMT1oMRBDrMvKlxa3ryFahtrKqPt_CSKg_s0DGd8t8XZ5PYtVQHewDq9Dj1NBl7Lmw352mZLU-3YH0ExkalVNdzCjfmFYmTgXFz_wvi4vAxRknoEq68Ba9FLtNrEQ"
    },
    {
      "kty": "EC",
      "d": "zWSrnsuLgVhPgHxU7Rw-0drbLX9FyC-Xgc5NNbXe-EE",
      "use": "sig",
      "crv": "P-256",
      "kid": "4ba709d5-e24b-4e8f-ae99-16c13a4ceb68",
      "x": "wOZZk-CAfV9LU59RydH_LTXBIP62clfMW3gX7aCits4",
      "y": "k8FFUeY_3gRT8EmpeFGg63YG9YGuguHc8eT5u-5RvHo"
    },
    {
      "kty": "EC",
      "d": "44lu6oU_t_ID1UxFjs4glXFfxmYwJLvKYsZvebxcKHo",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "a0e50303-b72c-4392-9a5e-a18944a42bd4",
      "x": "8Uio_XqoFyQy1-pQCJnaJLSQsmY99j891dS238N_5H8",
      "y": "bO2WMlDoLsIP-dbKHQaklG3t1XXIw-AZm7KEGHWCD4k"
    },
    {
      "kty": "OKP",
      "d": "BaG2RgV1sC0BQg0bhnp57Y5lex5zYLU3lLgE3d6onrA",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "b137336e-4378-4d65-a43b-b22d23ca7d04",
      "x": "wMxSkISfhNmE1Oot_P4j08JVjBnWxzGY0DeuVQH6euw"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "_UQOdfzb8I4lJDVeb6Gw9EossYVPqWsWIyOMdHp1p7sAUv0iz5uKoTu6dv5Rr6qTdpB3IZ2AIXbSgtT5TRB1jLVKoTVNi7dMV1EWZgMjfVKDAxcE517xJMQlvVlKcm0E-nWteJI6upQ1W6l1WYkLBEv9SLa6oKkuHBf-S-wxXEc",
      "kty": "RSA",
      "q": "v-uZX9rgNI7lFCQwKaWIhgVYiRkud2FHF2TG1yECZDl2y7nBqlJWy_sXB4nJ8sSt3FEomQU-9Px1WJ-vZY589JzgMOxn8aGInm1SLXOZPI-3zlehQIOmXLGsbn3sF7lpe_HGS9GamAGC1QQNe_2LptZuffcwSlkeu-W9F4FYzqU",
      "d": "JXjEJlpCTJQOb2uiOWNvX7qIuYt95wyzHLEAvswZC631FVFunNeu2cgRtG9DDU06KrUZoGR4q2lC4VqkEzxYjNMyE-4RTz3hFXfmnjIeo7H8oPoE6vaDeLWf-oOumnxSXhsXEIf5McdYIIocg2sktXGnxX9zfsaTquS6-AIvIebv2ZEKnS8RebLbKAqroUjDSndrNlhz0IdO4Qx-Tqg59SRP6mfQqxEJRpE-KYUJgRpIy99_jIJ2yIkVqZJ9gmdiT1fzqcUV65sZ3_56jmKVCTwsP8qTbEI920XEFegNjYmwWFuXlY-73D6oxRZ5eprfeh6sohMQ8EKxif2Vnk5BEQ",
      "e": "AQAB",
      "use": "enc",
      "kid": "ae38d42e-23f8-45b7-8837-3e187c4d7a4c",
      "qi": "ZTCF1WIYUEtvunecEW8yQ6chG2tmPjovR-XtLcucUyVpcjmyBs0gvpWYGGKb6RB7f7d0ozCLKya6OfmZSlTtgrQvkHgZgr5bL7TGbVaiqId9AMR0zeCLKK_7pLkVtzUS74od3yd5DuVG4SV0DIK_1_xyi80ceIWIDwPopkdiJ4s",
      "dp": "i6GN53b1O3bi-0eBPUKD8OtEIMtC1ED5_32F3mH1o_fxgc-V9afnkmT_tMMZ_iOpEWEsjRfsoIaGISOSHu7IID-DWcWtby4rpKhMFQn98wYevQFf7r_la0PJGs-zv8pjSELA1Qyp3FwB3vtae3aW4FOU3RYBZrpfdZW02d7qh9k",
      "alg": "RSA-OAEP",
      "dq": "rcOZnVEl2FBclqzhMoPepUFn1NGI4aug20xyP8tyR95Dcdcgwp5EWfFf-4JE51ot9CFDObCnPNbrRC9odfHZrvvufD0_K2ZOtOpUEjTs1AlnqRpsNGY-FQUFExFN1nkYSZExMep4JxKPK2C8-LsqWwchCUnqXhZsnkE2wHZrOsU",
      "n": "vd7b_89m3CR6d6spOpR2BxWBAtCa6LxP1QMn29XguRUdPUnnqQlL6iCbvVtkmR9hf32cly3mlW8pf3TEJObwJjwRt4-uPfmX9Mb1eN6RE9hDMiDQeiZd9feK1FSTsnhbaV245ZPOocHjaro7QBUP4qyeAkfT8htcxzPauZmdWr0DdeXousCDLxj2f0dWk1r6g1odKatCRH0zuxnsTtd_7Z9R_fF7SuaefYdJJVN4b-JlQI5W63cljV1vcIuLaMW1Wc_96GdhklSS11CZGiEkrpgwtspSTD02mCJb5B7ld0ozJiyhdW91GmGOsERhFhfgol1XnfVtoMsoSMTXc3mbww"
    },
    {
      "kty": "EC",
      "d": "7dwn7MfDCBbOejmtAaYEpjaQFWoEA2wkshq4y3Zp5cE",
      "use": "enc",
      "crv": "P-256",
      "kid": "e43411b7-e01f-485f-9d22-af177109473b",
      "x": "-o7HJnQBYMjBN54X2HKZCvUiMXKqAB2tLXiNEf8xj7s",
      "y": "7xiTzCTsyLPT0D1uqokhjrtimwKBYj9Zy9Kq9DNPlvc",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "36129fc1-8f12-4cae-8819-22e0f5a86571",
      "n": "yP5jvWJ_sPMCJiQvW_YAsPdLiyRbWj7DSQ8UZ58jYY79z2CrkPnbYhK-P3vkpVw7KQLMOPYl-XOq2Wi-LyXJSYdzezSZEuwc6_1s_v1_2qPCI-sGTBXMd60_-M7WhnQZ_SJKd2zAjAQc5L6Rqojv5rCsE6keieC8KL8GA5vS487mqrb0G0T_PshceI23YbxqVf5EzF__L0mDnQKmpBXRJ9URzzMT1oMRBDrMvKlxa3ryFahtrKqPt_CSKg_s0DGd8t8XZ5PYtVQHewDq9Dj1NBl7Lmw352mZLU-3YH0ExkalVNdzCjfmFYmTgXFz_wvi4vAxRknoEq68Ba9FLtNrEQ"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "217bc38f-8e67-402d-ad75-ff9e19207574",
      "n": "jOeLLUa3sU_w7vZ-fWXZgKw5SVBYozm4hpmqjv8pbxpu2osdKqnB92UxTVRUsI6Y2n7faP50BEMwSWgdmbAfS30saBiRkOVY0ETGRXWS-5F6NJ_krgHivYbIIG_Vedx63AkBr5QpBtrTBs2udwV-bmLHlb7lmbgzXTgYcutq1Nf-J60Q2GgoEQ5cRcfZXIu3VXiWOb5tF_3V46Bb0bgxWmb49Ds_WNE1HwaBBOvbOH0bQmKP2olz__Rxr5gskqGAG5_7EkSNwOdCOouyOLrHr-b_cLsDIaHaLNQYyBxTN4mo9JPGstoJ8Dv0vEMY6Ns9Ynltguy3TObQGvhIvxJGUw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "4ba709d5-e24b-4e8f-ae99-16c13a4ceb68",
      "x": "wOZZk-CAfV9LU59RydH_LTXBIP62clfMW3gX7aCits4",
      "y": "k8FFUeY_3gRT8EmpeFGg63YG9YGuguHc8eT5u-5RvHo"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "424ac7b9-f6f0-4ed3-b331-d4c0a484d576",
      "x": "uVJj1LpKrKqqdTaRbINQhlYcZ0rVI8I2jD4ch9CzuwQ",
      "y": "0FgDMn_DSeFXdjxIT-aX26wRs8BgeYtwDV6DzUQ2YoQ"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "a0e50303-b72c-4392-9a5e-a18944a42bd4",
      "x": "8Uio_XqoFyQy1-pQCJnaJLSQsmY99j891dS238N_5H8",
      "y": "bO2WMlDoLsIP-dbKHQaklG3t1XXIw-AZm7KEGHWCD4k"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "b137336e-4378-4d65-a43b-b22d23ca7d04",
      "x": "wMxSkISfhNmE1Oot_P4j08JVjBnWxzGY0DeuVQH6euw"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "ae38d42e-23f8-45b7-8837-3e187c4d7a4c",
      "alg": "RSA-OAEP",
      "n": "vd7b_89m3CR6d6spOpR2BxWBAtCa6LxP1QMn29XguRUdPUnnqQlL6iCbvVtkmR9hf32cly3mlW8pf3TEJObwJjwRt4-uPfmX9Mb1eN6RE9hDMiDQeiZd9feK1FSTsnhbaV245ZPOocHjaro7QBUP4qyeAkfT8htcxzPauZmdWr0DdeXousCDLxj2f0dWk1r6g1odKatCRH0zuxnsTtd_7Z9R_fF7SuaefYdJJVN4b-JlQI5W63cljV1vcIuLaMW1Wc_96GdhklSS11CZGiEkrpgwtspSTD02mCJb5B7ld0ozJiyhdW91GmGOsERhFhfgol1XnfVtoMsoSMTXc3mbww"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "e43411b7-e01f-485f-9d22-af177109473b",
      "x": "-o7HJnQBYMjBN54X2HKZCvUiMXKqAB2tLXiNEf8xj7s",
      "y": "7xiTzCTsyLPT0D1uqokhjrtimwKBYj9Zy9Kq9DNPlvc",
      "alg": "ECDH-ES"
    }
  ]
}
2021-09-30 07:12:47 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2021-09-30 07:12:47 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2021-09-30 07:12:47 SUCCESS
OIDCCLoadUserInfo
Added user information
user_info
{
  "sub": "user-subject-1234531",
  "name": "Demo T. User",
  "given_name": "Demo",
  "family_name": "User",
  "middle_name": "Theresa",
  "nickname": "Dee",
  "preferred_username": "d.tu",
  "gender": "female",
  "birthdate": "2000-02-03",
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "zoneinfo": "America/Los_Angeles",
  "locale": "en-US",
  "phone_number": "+1 555 5550000",
  "phone_number_verified": false,
  "email": "user@example.com",
  "email_verified": false,
  "website": "https://openid.net/",
  "updated_at": 1580000000
}
2021-09-30 07:12:47
StoreOriginalClientConfiguration
No client details on configuration, created an empty original_client_config object.
2021-09-30 07:12:47
ExtractClientNameFromStoredConfig
Extracted client_name from stored client configuration.
client_name
2021-09-30 07:12:47
oidcc-client-test-discovery-issuer-mismatch
Setup Done
2021-09-30 07:13:01 INCOMING
oidcc-client-test-discovery-issuer-mismatch
Incoming HTTP request to test instance 77W186UEEWEDRza
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "python-requests/2.25.1",
  "accept-encoding": "gzip, deflate",
  "accept": "*/*",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
.well-known/openid-configuration
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
2021-09-30 07:13:01
ChangeIssuerInServerConfigurationToBeInvalid
Added invalid issuer to server configuration
issuer
https://www.certification.openid.net/test/a/idpy/INVALID
Discovery endpoint
2021-09-30 07:13:01 OUTGOING
oidcc-client-test-discovery-issuer-mismatch
Response to HTTP request to test instance 77W186UEEWEDRza
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "issuer": "https://www.certification.openid.net/test/a/idpy/INVALID",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/idpy/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/idpy/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/idpy/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/idpy/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/idpy/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
outgoing_path
.well-known/openid-configuration
2021-09-30 07:13:06 FINISHED
oidcc-client-test-discovery-issuer-mismatch
Test has run to completion
testmodule_result
PASSED
2021-09-30 07:13:10
TEST-RUNNER
Alias has now been claimed by another test
alias
idpy
new_test_id
kIdldli0uEilFFh
Test Results