Test Summary

Test Results

Expand All Collapse All
All times are UTC
2021-09-30 07:59:35 INFO
TEST-RUNNER
Test instance IDPxRRJaZNxOCPD created
baseUrl
https://www.certification.openid.net/test/a/idpy
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code",
  "request_type": "plain_http_request",
  "client_registration": "dynamic_client",
  "response_mode": "default"
}
alias
idpy
description
oidcop
planId
Q5bxP9ys6sz13
config
{
  "alias": "idpy",
  "description": "oidcop",
  "server": {
    "discoveryUrl": "https://89.45.234.133:4000/.well-known/openid-configuration",
    "login_hint": "roland@89.45.234.133:4000"
  },
  "client2": {
    "client_name": "Anything"
  }
}
testName
oidcc-client-test-signing-key-rotation-just-before-signing
2021-09-30 07:59:35 SUCCESS
OIDCCGenerateServerConfiguration
Generated default server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/idpy/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/idpy/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/idpy/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/idpy/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/idpy/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/idpy/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post",
    "client_secret_jwt",
    "private_key_jwt"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2021-09-30 07:59:35
SetTokenEndpointAuthMethodsSupportedToClientSecretBasicOnly
Changed token_endpoint_auth_methods_supported to client_secret_basic only in server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/idpy/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/idpy/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/idpy/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/idpy/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/idpy/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/idpy/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2021-09-30 07:59:36
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "8uxqxBkI9nGK33O6lVgvqt5HrkfMaoHCyhk7YAyLVE2zS7VxXCx0eZR_eAZdoTD14Jw2k0PpjqdULTDuka3reyPmIqr6ecz3ld0K-FoilWi6BYrfm7E9NLGfUBUM7PVvNVMruRTk7etv9fLGet9nF0tzL7dy3-WoYIiRjXlxyGc",
      "kty": "RSA",
      "q": "rgC8_6LkcGJcWuMLFzOreSuOMxVYWdwVp8eM5iQF7M7f4HQOuLDpNpP0BJWbDs2x2UWXEDoY91htY200uHAQKqqoyuVWkPbLS4QF8CmItLg7pMFMJLkTRzsz2-mFS55zR6-GWVLg3LVUB7Dl03QLo7YOihcWYRqaZSQGRU5TdxE",
      "d": "Fo3FMAdmLa687p4-yMEhDBQk9iDAxVizu5ZQr0Pe1kfpQuReL_IgSxJPwFfbTatp6lz-hDGnvLfDf8AyMQZWvjvREL2ZUdYb7a5KR9dFYqmosKw_i1GXYTnkA9uM-gO3fofaw9DaLqG8IIxft-VYtR1cGhS4GAYFFnDCypn3W-ihpfPeIIEprmv3Vptfp4FkS9i0tkZA4DVcm8EG4LSNeK_lPUBBd6vWb3V1-vQJ2zF1urdixhu6mcqFtd7fTHwVX-ROpoRe68JQdocc2NqN3KxeGi9B4Mv0Qi6FLxwGA7pnP0z19nrOrvmLYTCVZ5TvcTnfJ8zYmN2V_nCS4CydAQ",
      "e": "AQAB",
      "use": "sig",
      "kid": "ba61e64b-486f-4c2d-b129-df986bc409b2",
      "qi": "up6TYObuqNBS0pDhfdxkHkqpbdbsoQ36burmKBhX6leuJiIB9MWIxq5CnoKtHvCU3uC8fvowVX8H5ElChgKCCRfJZOqsUzxNmOP_PjGgEp-ePng58Rxu70y_lSAbo6RAHPF3ZFCRlu6XR_aIPysELXTZdmONuHhjBKOlyWvOHz4",
      "dp": "o4qoYjacgxVzsfW-onaJONaGmX060GVllxufjo1Da9EXqRuRIsXG8GcZ3dsjQ7argbiJQWGSJnjeQcJUinz1MKS9dY94K3HjKOB0VziPWdj0i3CwE6giFYyTPZ2-YvTlFphUsjiv2sELUiBMoUIvrE4eUPyG-NcrITowC3e8M3c",
      "dq": "lRv62lJb0lbn79a6rVJQ8lA51lrHUJICWLnva1SZYzpQrYanCuxHncaiCL-vlbr9WkSBVJ2EwYmci-SMljUqFXYTmXN4gFeNFRR5BjqBdOSf7-rZdmrHM3ZvVVfDK28IOPkYdzlHirs03DZibJb4Vn1v7jQksGfcwSli2kdpzRE",
      "n": "pR1j6Xt80_ykpJShQh0bJPs5t2mpsny2r4eOr9R6dN5bXJYbk5G8qOk0Agw6uYAaPuHTpshKiMsotUvHwY80-lqTO6wZJjBvwDwqukSNqt48sTavAELhMiNhn3G5sjxwnzWSEFi1LPO5mjWKiAmgNp9DPnqvm0jllu4w00vH46NNnI4k3CoW-SBblcNWJsRfNlxqmaANh-PK51lkqppabUHl2Ku9svckeGe-90-H7-Es2MxsSR6u4QSU-cd4MnDVgYJNuvSLHI_BX-j4EfNRMt4uQnygKNKSv9XmJmmlPTDQj_h04JaVJTu1MhW7OlmJiap1c1579a9ocuaPUBsv1w"
    },
    {
      "kty": "EC",
      "d": "VpObTKORuMNvj_Oy_LNfd0TGZoXG_PddVcqnHK37xMg",
      "use": "sig",
      "crv": "P-256",
      "kid": "0074e59c-c95b-4a35-b9bd-3648a92a97e2",
      "x": "LaWQAlkqkc8EWbjA-TWeb_T9QZM5h3GUlOgrE1fm7dU",
      "y": "E9NhQ33AdUrGinh1YwLE0GTQ_Ncw3v6AjmqtZX0p3Vc"
    },
    {
      "kty": "EC",
      "d": "6XmpfLWbZDPAtigXxK6OvgtdJXu8S5b8Fdg3E5tj7Es",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "929a4804-5110-4adf-9b69-823efcb4a3e4",
      "x": "0yxpVHey7acW1d_OMMqhE8XTkE22udtHPAgngqhqUp8",
      "y": "bCIen5NRV-S00SQ128meAQii9CIvuFXPkUcQHd8NrNs"
    },
    {
      "kty": "OKP",
      "d": "ORMy7w4EMqJsGT4wrEqJ6E0FF26xnqXOvImYUbDXNck",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "ed10607f-0100-4435-8d3a-6bde46909b06",
      "x": "SV-o9e9CBPGv_jNYi47HSRx3nx4DbZ1Un1kzKqY-trg"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "_MlwYt3lrwBBFMMIcg5DM3H2uKXTEHaHwdu9LxKER5lSPd5Avh-UOvzuPRIbOZa7dAFqinqq-EEJhJSiZ6tCs-utZNRws0jryLBvJB8FCcsfPUTgFVhhnE1F_-eaZDtAHn-F52hvzS227mQDXHxawWHC073C2601XtfGZM7C6Fc",
      "kty": "RSA",
      "q": "yopYQD4xp-Bszf49PoiqPNqZAlt3NSFBhCHHrel8zRM4MIR2BT5Zenf1V3CcBK0yr1Oh9kw-GJhhdxfhE22olZ6e_kA68GU0kEpMk6F5DB2xfAwH2-UqM4BRnKwP2V6_UMNdi2J8y72qLCn43rq3ViMUZiXNCK2a71Wzxwj-Gwk",
      "d": "MxXP5owyld0ibeqh5GFYom5ddOISVB3nYOrv-94JE2uCWEXM8OCh7gbFcF--omXw1E7KlLUXYJI5X9DmwQnXYlsd1xXoBGr_6cfN7b85i2EBhorI_SBG-UGrgbZE9bXc7l9DW2sD-gk-IGIQHmeYxrB-9yxK9obJHFMcuicHW8YNpX8AUGjRl9F8T4U7k3UDaR5psOBBWjkh0mIiB1Ool65K_2M4C8TBN2QSzbOoEzJv6wG2tzBu9zHbTDf6q-DDaMb0HMYBn0xUJ0ULLhpkSHNr09FXR2AYame6ZbRY9YMzlarXZbvmZDiZSHJhC6jDQMpabuLTzQiSGUsK3RDEwQ",
      "e": "AQAB",
      "use": "enc",
      "kid": "13202df5-cb8b-4788-bb09-429a74d5dbbc",
      "qi": "ik9-uEtvmajdHBBaX46nfp3T9PVUqgaTZlcej0DKDx6CRkYGFRpDx-Gn7WlKBA3IEW1haTMBU1XSN9A_eSMHBY0WVBltGzL9u4_oQkQutuRfNSCns5kUdeue6yJbqnCJAaBKWsbtiSz2t4cBDV8qxt5aCjzLaJBcxvTdfM7-5uo",
      "dp": "CZyvRVMitLDRyLRR0eRw8bfXpdXIXMvlBZ4RZ4TQutg9pFSbKZ-Rx1xuwqu5lUsB_btADdv0PFRcxEnSkxaUBrtjcH4Tev2-2Xa8AyeazXCH05CW5LjjnUni64Qm_sCyA3bd5Jq4BZlDZ3UuG4ou-UN6YQrKKghAC0cxKAwkpSk",
      "alg": "RSA-OAEP",
      "dq": "ojTltJ2amv4LZXYFin1dCVtwSwkBkVVO6Qk8p7Vks8B-sayD8HMcqg5EOIEBEmW7P9rUzTIGUSBIfl5rbWnXJ-xfHPRHv5rt29kFNv6MuP1W1Se1a5A-mfxcYAMUtltBEOdFlYmMtIbzMGd03rvedGenwJ7pc9fFS4PxdKdpCjE",
      "n": "x_-OaUbKwHBvvp_lzcRfup3xAGvFXuEphFkUG1_O10TnxePRnL5oF59nLqFagSP05rsLIBwUJo_nUXQE7F-OKgBeueTy4kGE4ADaGQlZKm4uukUdqp_2mmeyPg3tOGGrSC9AFj3F9wbK3g2WbR_bhBZaSHnijwtPoX6UHSy9LuKqFKpS94dAYGPPUWoSmIbmJY_0--_VkNnKS6IrnHstMYJWIGCgPUaLQD2YkzVX8IgXbQ2CE0y-_zvrbyXvA4_TcWB29QQwsu1x7lV6Qx3HKjPTLf7OcfXBplKfiPDfXZ_nDA4pdSblI-K_bRH4Q6Nqy9LPWSbXchB12EigEa1YDw"
    },
    {
      "kty": "EC",
      "d": "WoRaxSyV2EIRww9pYvwtAwbKdxi9RvAI-4MbVfye03Q",
      "use": "enc",
      "crv": "P-256",
      "kid": "d5425dd7-f84f-45aa-b811-550a790b7792",
      "x": "HOABwHTQsSj6eX53Y6cI8I3bWzedUnhQyOZN3meAy_8",
      "y": "I2rem7mGFBlD2WaW59_BEV7axUG3wYm1ZpD5Q46AISA",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "ba61e64b-486f-4c2d-b129-df986bc409b2",
      "n": "pR1j6Xt80_ykpJShQh0bJPs5t2mpsny2r4eOr9R6dN5bXJYbk5G8qOk0Agw6uYAaPuHTpshKiMsotUvHwY80-lqTO6wZJjBvwDwqukSNqt48sTavAELhMiNhn3G5sjxwnzWSEFi1LPO5mjWKiAmgNp9DPnqvm0jllu4w00vH46NNnI4k3CoW-SBblcNWJsRfNlxqmaANh-PK51lkqppabUHl2Ku9svckeGe-90-H7-Es2MxsSR6u4QSU-cd4MnDVgYJNuvSLHI_BX-j4EfNRMt4uQnygKNKSv9XmJmmlPTDQj_h04JaVJTu1MhW7OlmJiap1c1579a9ocuaPUBsv1w"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "518836c2-d64a-4bdc-99b6-5338c88fe9e2",
      "n": "pvXirSNWr3FrGIAO8Wow9WfkgCHpaDig9v0g8eFeZxqN3aPX7RVdChvQtLP3ye9trO3xrlvOvOLBTCl7sq4AswZTuIyg0p2WA9awKm61TgwX68cyPDM-oi_FX5hrbD2dG_gtLnRU3OhGiJTEn8YkrQ8SBhKD91wLpOpI1QYkvSX6SP6v4JxwmkBXCzxq_rIsUIc75GeSM0aNZlOH1L90QnvC95f2gmajcH756Ru9pJedeCzmEYCGTeFx76XD2Js4KXIIWFAbvifwzpqe3cE_NVIEE48OcK7KyiUMfLy-K4PwtBNf72keIIZ1Oa-hbpHm3y6pqcogvLvzkKwUOaaJGw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "0074e59c-c95b-4a35-b9bd-3648a92a97e2",
      "x": "LaWQAlkqkc8EWbjA-TWeb_T9QZM5h3GUlOgrE1fm7dU",
      "y": "E9NhQ33AdUrGinh1YwLE0GTQ_Ncw3v6AjmqtZX0p3Vc"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "d1cbe728-4ec5-4d25-b664-d270c959dd34",
      "x": "YVrZXkJCF8vTQXl7rBZgr_WJG_Mhw31FBrAoZyS-El4",
      "y": "dQ_ZeahFgKOLksC9NtXXPLLOkuMAoUkHeRTHPn37Dyc"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "929a4804-5110-4adf-9b69-823efcb4a3e4",
      "x": "0yxpVHey7acW1d_OMMqhE8XTkE22udtHPAgngqhqUp8",
      "y": "bCIen5NRV-S00SQ128meAQii9CIvuFXPkUcQHd8NrNs"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "ed10607f-0100-4435-8d3a-6bde46909b06",
      "x": "SV-o9e9CBPGv_jNYi47HSRx3nx4DbZ1Un1kzKqY-trg"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "13202df5-cb8b-4788-bb09-429a74d5dbbc",
      "alg": "RSA-OAEP",
      "n": "x_-OaUbKwHBvvp_lzcRfup3xAGvFXuEphFkUG1_O10TnxePRnL5oF59nLqFagSP05rsLIBwUJo_nUXQE7F-OKgBeueTy4kGE4ADaGQlZKm4uukUdqp_2mmeyPg3tOGGrSC9AFj3F9wbK3g2WbR_bhBZaSHnijwtPoX6UHSy9LuKqFKpS94dAYGPPUWoSmIbmJY_0--_VkNnKS6IrnHstMYJWIGCgPUaLQD2YkzVX8IgXbQ2CE0y-_zvrbyXvA4_TcWB29QQwsu1x7lV6Qx3HKjPTLf7OcfXBplKfiPDfXZ_nDA4pdSblI-K_bRH4Q6Nqy9LPWSbXchB12EigEa1YDw"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "d5425dd7-f84f-45aa-b811-550a790b7792",
      "x": "HOABwHTQsSj6eX53Y6cI8I3bWzedUnhQyOZN3meAy_8",
      "y": "I2rem7mGFBlD2WaW59_BEV7axUG3wYm1ZpD5Q46AISA",
      "alg": "ECDH-ES"
    }
  ]
}
2021-09-30 07:59:36 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2021-09-30 07:59:36 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2021-09-30 07:59:36 SUCCESS
OIDCCLoadUserInfo
Added user information
user_info
{
  "sub": "user-subject-1234531",
  "name": "Demo T. User",
  "given_name": "Demo",
  "family_name": "User",
  "middle_name": "Theresa",
  "nickname": "Dee",
  "preferred_username": "d.tu",
  "gender": "female",
  "birthdate": "2000-02-03",
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "zoneinfo": "America/Los_Angeles",
  "locale": "en-US",
  "phone_number": "+1 555 5550000",
  "phone_number_verified": false,
  "email": "user@example.com",
  "email_verified": false,
  "website": "https://openid.net/",
  "updated_at": 1580000000
}
2021-09-30 07:59:36
StoreOriginalClientConfiguration
No client details on configuration, created an empty original_client_config object.
2021-09-30 07:59:36
ExtractClientNameFromStoredConfig
Extracted client_name from stored client configuration.
client_name
2021-09-30 07:59:36
oidcc-client-test-signing-key-rotation-just-before-signing
Setup Done
2021-09-30 07:59:41 INCOMING
oidcc-client-test-signing-key-rotation-just-before-signing
Incoming HTTP request to test instance IDPxRRJaZNxOCPD
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "python-requests/2.25.1",
  "accept-encoding": "gzip, deflate",
  "accept": "*/*",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
.well-known/openid-configuration
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Discovery endpoint
2021-09-30 07:59:41 OUTGOING
oidcc-client-test-signing-key-rotation-just-before-signing
Response to HTTP request to test instance IDPxRRJaZNxOCPD
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "issuer": "https://www.certification.openid.net/test/a/idpy/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/idpy/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/idpy/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/idpy/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/idpy/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/idpy/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
outgoing_path
.well-known/openid-configuration
2021-09-30 07:59:42 INCOMING
oidcc-client-test-signing-key-rotation-just-before-signing
Incoming HTTP request to test instance IDPxRRJaZNxOCPD
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "python-requests/2.25.1",
  "accept-encoding": "gzip, deflate",
  "accept": "*/*",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
jwks
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Jwks endpoint
2021-09-30 07:59:42 OUTGOING
oidcc-client-test-signing-key-rotation-just-before-signing
Response to HTTP request to test instance IDPxRRJaZNxOCPD
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "ba61e64b-486f-4c2d-b129-df986bc409b2",
      "n": "pR1j6Xt80_ykpJShQh0bJPs5t2mpsny2r4eOr9R6dN5bXJYbk5G8qOk0Agw6uYAaPuHTpshKiMsotUvHwY80-lqTO6wZJjBvwDwqukSNqt48sTavAELhMiNhn3G5sjxwnzWSEFi1LPO5mjWKiAmgNp9DPnqvm0jllu4w00vH46NNnI4k3CoW-SBblcNWJsRfNlxqmaANh-PK51lkqppabUHl2Ku9svckeGe-90-H7-Es2MxsSR6u4QSU-cd4MnDVgYJNuvSLHI_BX-j4EfNRMt4uQnygKNKSv9XmJmmlPTDQj_h04JaVJTu1MhW7OlmJiap1c1579a9ocuaPUBsv1w"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "518836c2-d64a-4bdc-99b6-5338c88fe9e2",
      "n": "pvXirSNWr3FrGIAO8Wow9WfkgCHpaDig9v0g8eFeZxqN3aPX7RVdChvQtLP3ye9trO3xrlvOvOLBTCl7sq4AswZTuIyg0p2WA9awKm61TgwX68cyPDM-oi_FX5hrbD2dG_gtLnRU3OhGiJTEn8YkrQ8SBhKD91wLpOpI1QYkvSX6SP6v4JxwmkBXCzxq_rIsUIc75GeSM0aNZlOH1L90QnvC95f2gmajcH756Ru9pJedeCzmEYCGTeFx76XD2Js4KXIIWFAbvifwzpqe3cE_NVIEE48OcK7KyiUMfLy-K4PwtBNf72keIIZ1Oa-hbpHm3y6pqcogvLvzkKwUOaaJGw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "0074e59c-c95b-4a35-b9bd-3648a92a97e2",
      "x": "LaWQAlkqkc8EWbjA-TWeb_T9QZM5h3GUlOgrE1fm7dU",
      "y": "E9NhQ33AdUrGinh1YwLE0GTQ_Ncw3v6AjmqtZX0p3Vc"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "d1cbe728-4ec5-4d25-b664-d270c959dd34",
      "x": "YVrZXkJCF8vTQXl7rBZgr_WJG_Mhw31FBrAoZyS-El4",
      "y": "dQ_ZeahFgKOLksC9NtXXPLLOkuMAoUkHeRTHPn37Dyc"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "929a4804-5110-4adf-9b69-823efcb4a3e4",
      "x": "0yxpVHey7acW1d_OMMqhE8XTkE22udtHPAgngqhqUp8",
      "y": "bCIen5NRV-S00SQ128meAQii9CIvuFXPkUcQHd8NrNs"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "ed10607f-0100-4435-8d3a-6bde46909b06",
      "x": "SV-o9e9CBPGv_jNYi47HSRx3nx4DbZ1Un1kzKqY-trg"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "13202df5-cb8b-4788-bb09-429a74d5dbbc",
      "alg": "RSA-OAEP",
      "n": "x_-OaUbKwHBvvp_lzcRfup3xAGvFXuEphFkUG1_O10TnxePRnL5oF59nLqFagSP05rsLIBwUJo_nUXQE7F-OKgBeueTy4kGE4ADaGQlZKm4uukUdqp_2mmeyPg3tOGGrSC9AFj3F9wbK3g2WbR_bhBZaSHnijwtPoX6UHSy9LuKqFKpS94dAYGPPUWoSmIbmJY_0--_VkNnKS6IrnHstMYJWIGCgPUaLQD2YkzVX8IgXbQ2CE0y-_zvrbyXvA4_TcWB29QQwsu1x7lV6Qx3HKjPTLf7OcfXBplKfiPDfXZ_nDA4pdSblI-K_bRH4Q6Nqy9LPWSbXchB12EigEa1YDw"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "d5425dd7-f84f-45aa-b811-550a790b7792",
      "x": "HOABwHTQsSj6eX53Y6cI8I3bWzedUnhQyOZN3meAy_8",
      "y": "I2rem7mGFBlD2WaW59_BEV7axUG3wYm1ZpD5Q46AISA",
      "alg": "ECDH-ES"
    }
  ]
}
outgoing_path
jwks
2021-09-30 07:59:42 INCOMING
oidcc-client-test-signing-key-rotation-just-before-signing
Incoming HTTP request to test instance IDPxRRJaZNxOCPD
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "python-requests/2.25.1",
  "accept-encoding": "gzip, deflate",
  "accept": "*/*",
  "content-type": "application/json",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "703",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
register
incoming_body_form_params
incoming_method
POST
incoming_body_json
{
  "application_type": "web",
  "response_types": [
    "code",
    "id_token"
  ],
  "contacts": [
    "ops@example.com"
  ],
  "token_endpoint_auth_method": "client_secret_basic",
  "redirect_uris": [
    "https://89.45.234.133:8090/authz_cb/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98",
    "https://89.45.234.133:8090/authz_im_cb/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98",
    "https://89.45.234.133:8090/authz_fp_cb/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98",
    "https://89.45.234.133:8090/req_uri/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98"
  ],
  "jwks_uri": "https://89.45.234.133:8090/static/jwks.json",
  "grant_types": [
    "implicit",
    "authorization_code"
  ]
}
incoming_query_string_params
{}
incoming_body
{"application_type": "web", "response_types": ["code", "id_token"], "contacts": ["ops@example.com"], "token_endpoint_auth_method": "client_secret_basic", "redirect_uris": ["https://89.45.234.133:8090/authz_cb/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98", "https://89.45.234.133:8090/authz_im_cb/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98", "https://89.45.234.133:8090/authz_fp_cb/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98", "https://89.45.234.133:8090/req_uri/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98"], "jwks_uri": "https://89.45.234.133:8090/static/jwks.json", "grant_types": ["implicit", "authorization_code"]}
Registration endpoint
2021-09-30 07:59:42 SUCCESS
OIDCCExtractDynamicRegistrationRequest
Extracted dynamic client registration request
request
{
  "application_type": "web",
  "response_types": [
    "code",
    "id_token"
  ],
  "contacts": [
    "ops@example.com"
  ],
  "token_endpoint_auth_method": "client_secret_basic",
  "redirect_uris": [
    "https://89.45.234.133:8090/authz_cb/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98",
    "https://89.45.234.133:8090/authz_im_cb/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98",
    "https://89.45.234.133:8090/authz_fp_cb/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98",
    "https://89.45.234.133:8090/req_uri/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98"
  ],
  "jwks_uri": "https://89.45.234.133:8090/static/jwks.json",
  "grant_types": [
    "implicit",
    "authorization_code"
  ]
}
2021-09-30 07:59:42 SUCCESS
EnsureRegistrationRequestContainsAtLeastOneContact
Registration request contains valid contacts
contacts
[
  "ops@example.com"
]
2021-09-30 07:59:42 SUCCESS
ValidateClientGrantTypes
grant_types match response_types
grant_types
[
  "implicit",
  "authorization_code"
]
response_types
[
  "code",
  "id_token"
]
2021-09-30 07:59:42 SUCCESS
OIDCCValidateClientRedirectUris
Valid redirect_uri(s) provided in registration request
redirect_uris
[
  "https://89.45.234.133:8090/authz_cb/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98",
  "https://89.45.234.133:8090/authz_im_cb/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98",
  "https://89.45.234.133:8090/authz_fp_cb/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98",
  "https://89.45.234.133:8090/req_uri/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98"
]
2021-09-30 07:59:42 SUCCESS
ValidateClientLogoUris
Client does not contain any logo_uri
2021-09-30 07:59:42 SUCCESS
ValidateClientUris
Client does not contain any client_uri
2021-09-30 07:59:42 SUCCESS
ValidateClientPolicyUris
Client does not contain any policy_uri
2021-09-30 07:59:42 SUCCESS
ValidateClientTosUris
Client does not contain any tos_uri
2021-09-30 07:59:42 SUCCESS
ValidateClientSubjectType
A subject_type was not provided
2021-09-30 07:59:42 INFO
ValidateIdTokenSignedResponseAlg
Skipped evaluation due to missing required element: client id_token_signed_response_alg
path
id_token_signed_response_alg
mapped
object
client
2021-09-30 07:59:42 SUCCESS
EnsureIdTokenEncryptedResponseAlgIsSetIfEncIsSet
id_token_encrypted_response_enc is not set
2021-09-30 07:59:42 INFO
ValidateUserinfoSignedResponseAlg
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2021-09-30 07:59:42 SUCCESS
EnsureUserinfoEncryptedResponseAlgIsSetIfEncIsSet
userinfo_encrypted_response_enc is not set
2021-09-30 07:59:42 INFO
ValidateRequestObjectSigningAlg
Skipped evaluation due to missing required element: client request_object_signing_alg
path
request_object_signing_alg
mapped
object
client
2021-09-30 07:59:42 SUCCESS
EnsureRequestObjectEncryptionAlgIsSetIfEncIsSet
request_object_encryption_enc is not set
2021-09-30 07:59:42 INFO
ValidateTokenEndpointAuthSigningAlg
Skipped evaluation due to missing required element: client token_endpoint_auth_signing_alg
path
token_endpoint_auth_signing_alg
mapped
object
client
2021-09-30 07:59:42 SUCCESS
ValidateDefaultMaxAge
default_max_age is not set
2021-09-30 07:59:42 INFO
ValidateRequireAuthTime
Skipped evaluation due to missing required element: client require_auth_time
path
require_auth_time
mapped
object
client
2021-09-30 07:59:42 INFO
ValidateDefaultAcrValues
Skipped evaluation due to missing required element: client default_acr_values
path
default_acr_values
mapped
object
client
2021-09-30 07:59:42 INFO
ValidateInitiateLoginUri
Skipped evaluation due to missing required element: client initiate_login_uri
path
initiate_login_uri
mapped
object
client
2021-09-30 07:59:42 INFO
ValidateRequestUris
Skipped evaluation due to missing required element: client request_uris
path
request_uris
mapped
object
client
2021-09-30 07:59:42 SUCCESS
ValidateClientRegistrationRequestSectorIdentifierUri
A sector_identifier_uri was not provided
2021-09-30 07:59:42 SUCCESS
OIDCCRegisterClient
Registered client
client
{
  "application_type": "web",
  "response_types": [
    "code",
    "id_token"
  ],
  "contacts": [
    "ops@example.com"
  ],
  "token_endpoint_auth_method": "client_secret_basic",
  "redirect_uris": [
    "https://89.45.234.133:8090/authz_cb/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98",
    "https://89.45.234.133:8090/authz_im_cb/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98",
    "https://89.45.234.133:8090/authz_fp_cb/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98",
    "https://89.45.234.133:8090/req_uri/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98"
  ],
  "jwks_uri": "https://89.45.234.133:8090/static/jwks.json",
  "grant_types": [
    "implicit",
    "authorization_code"
  ],
  "client_id": "client_KHJanEtZsFAMnLS21536, ?]."
}
2021-09-30 07:59:42
OIDCCCreateClientSecretForDynamicClient
Set the secret for registered client
client_secret
secret_DxSCYgqthVmHxjhIeOcLbxUBbOPuqOwgOaNfqlijWJMzWVvtOP7392984920#,.{&
2021-09-30 07:59:42 SUCCESS
EnsureTokenEndPointAuthMethodIsClientSecretBasic
token_endpoint_auth_method is 'client_secret_basic' as expected
2021-09-30 07:59:42 SUCCESS
EnsureClientDoesNotHaveBothJwksAndJwksUri
Client does not have both jwks and jwks_uri set
client
{
  "application_type": "web",
  "response_types": [
    "code",
    "id_token"
  ],
  "contacts": [
    "ops@example.com"
  ],
  "token_endpoint_auth_method": "client_secret_basic",
  "redirect_uris": [
    "https://89.45.234.133:8090/authz_cb/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98",
    "https://89.45.234.133:8090/authz_im_cb/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98",
    "https://89.45.234.133:8090/authz_fp_cb/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98",
    "https://89.45.234.133:8090/req_uri/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98"
  ],
  "jwks_uri": "https://89.45.234.133:8090/static/jwks.json",
  "grant_types": [
    "implicit",
    "authorization_code"
  ],
  "client_id": "client_KHJanEtZsFAMnLS21536, ?].",
  "client_secret": "secret_DxSCYgqthVmHxjhIeOcLbxUBbOPuqOwgOaNfqlijWJMzWVvtOP7392984920#,.{\u0026"
}
2021-09-30 07:59:42
FetchClientKeys
Fetching client keys
jwks_uri
https://89.45.234.133:8090/static/jwks.json
2021-09-30 07:59:42
FetchClientKeys
HTTP request
request_uri
https://89.45.234.133:8090/static/jwks.json
request_method
GET
request_headers
{
  "accept": "text/plain, application/json, application/cbor, application/*+json, */*",
  "content-length": "0"
}
request_body

                                
2021-09-30 07:59:43 RESPONSE
FetchClientKeys
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "content-length": "691",
  "content-type": "application/json",
  "last-modified": "Thu, 30 Sep 2021 07:59:41 GMT",
  "cache-control": "public, max-age\u003d43200",
  "expires": "Thu, 30 Sep 2021 19:59:43 GMT",
  "etag": "\"1632988781.5333607-691-625874018\"",
  "date": "Thu, 30 Sep 2021 07:59:43 GMT",
  "server": "Werkzeug/1.0.1 Python/3.8.10"
}
response_body
{"keys": [{"kty": "RSA", "use": "sig", "kid": "ZnM1b012dmhUSjh5X05VOUhpN0pXZVlSSEVjQ2J5dEkyQXEwTWQ2UjdhRQ", "e": "AQAB", "n": "tkih6m_RcAr9RozD7IrHS0KjdLHSjMYuT2uRdtbTEJx1jBV6sDADoP3IskBFlwKssFAfZmtjSLETX7JUyIBkhUfTU0OKdVVrfTslfbUw4_m4OyaJmB6POycCH-zk-we9GnP1rjvfPIaaWLVtNM6r2wC-MTWv4MEL1sp-G0nj63oC53hc83q0pxaJqaDr7fMSZCUswL209DnSSn5aF80teBDUS-wOjLvihFIKSDZf0r3t9ObxYsT4tPbq7hQQc2K9XlYADfr-cmBQtwXg9h1jI31s5p-xI1SWzABQm2ZdCovcGjl9GopHsqtCINU7LCK7noRgwxHPERcJwDOX06IRmw"}, {"kty": "EC", "use": "sig", "kid": "S0p4OFlHMzdtNzFjZlpoWkpKNnVmMHM1RHAyVlFtbXlrUjRhdjVpNXBLWQ", "crv": "P-256", "x": "MEFzjCvTrLMkOcRgdLWYpK4b_xrKOn5XAKJvOhYqZTM", "y": "-T_OakJ08j_rRP4Imn1p3L4rG60cQk72Nh4HX_tDDd0"}]}
2021-09-30 07:59:43
FetchClientKeys
Found JWK set string
jwk_string
{"keys": [{"kty": "RSA", "use": "sig", "kid": "ZnM1b012dmhUSjh5X05VOUhpN0pXZVlSSEVjQ2J5dEkyQXEwTWQ2UjdhRQ", "e": "AQAB", "n": "tkih6m_RcAr9RozD7IrHS0KjdLHSjMYuT2uRdtbTEJx1jBV6sDADoP3IskBFlwKssFAfZmtjSLETX7JUyIBkhUfTU0OKdVVrfTslfbUw4_m4OyaJmB6POycCH-zk-we9GnP1rjvfPIaaWLVtNM6r2wC-MTWv4MEL1sp-G0nj63oC53hc83q0pxaJqaDr7fMSZCUswL209DnSSn5aF80teBDUS-wOjLvihFIKSDZf0r3t9ObxYsT4tPbq7hQQc2K9XlYADfr-cmBQtwXg9h1jI31s5p-xI1SWzABQm2ZdCovcGjl9GopHsqtCINU7LCK7noRgwxHPERcJwDOX06IRmw"}, {"kty": "EC", "use": "sig", "kid": "S0p4OFlHMzdtNzFjZlpoWkpKNnVmMHM1RHAyVlFtbXlrUjRhdjVpNXBLWQ", "crv": "P-256", "x": "MEFzjCvTrLMkOcRgdLWYpK4b_xrKOn5XAKJvOhYqZTM", "y": "-T_OakJ08j_rRP4Imn1p3L4rG60cQk72Nh4HX_tDDd0"}]}
2021-09-30 07:59:43 SUCCESS
FetchClientKeys
Downloaded and added client JWK set to client
client
{
  "application_type": "web",
  "response_types": [
    "code",
    "id_token"
  ],
  "contacts": [
    "ops@example.com"
  ],
  "token_endpoint_auth_method": "client_secret_basic",
  "redirect_uris": [
    "https://89.45.234.133:8090/authz_cb/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98",
    "https://89.45.234.133:8090/authz_im_cb/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98",
    "https://89.45.234.133:8090/authz_fp_cb/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98",
    "https://89.45.234.133:8090/req_uri/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98"
  ],
  "jwks_uri": "https://89.45.234.133:8090/static/jwks.json",
  "grant_types": [
    "implicit",
    "authorization_code"
  ],
  "client_id": "client_KHJanEtZsFAMnLS21536, ?].",
  "client_secret": "secret_DxSCYgqthVmHxjhIeOcLbxUBbOPuqOwgOaNfqlijWJMzWVvtOP7392984920#,.{\u0026",
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "use": "sig",
        "kid": "ZnM1b012dmhUSjh5X05VOUhpN0pXZVlSSEVjQ2J5dEkyQXEwTWQ2UjdhRQ",
        "e": "AQAB",
        "n": "tkih6m_RcAr9RozD7IrHS0KjdLHSjMYuT2uRdtbTEJx1jBV6sDADoP3IskBFlwKssFAfZmtjSLETX7JUyIBkhUfTU0OKdVVrfTslfbUw4_m4OyaJmB6POycCH-zk-we9GnP1rjvfPIaaWLVtNM6r2wC-MTWv4MEL1sp-G0nj63oC53hc83q0pxaJqaDr7fMSZCUswL209DnSSn5aF80teBDUS-wOjLvihFIKSDZf0r3t9ObxYsT4tPbq7hQQc2K9XlYADfr-cmBQtwXg9h1jI31s5p-xI1SWzABQm2ZdCovcGjl9GopHsqtCINU7LCK7noRgwxHPERcJwDOX06IRmw"
      },
      {
        "kty": "EC",
        "use": "sig",
        "kid": "S0p4OFlHMzdtNzFjZlpoWkpKNnVmMHM1RHAyVlFtbXlrUjRhdjVpNXBLWQ",
        "crv": "P-256",
        "x": "MEFzjCvTrLMkOcRgdLWYpK4b_xrKOn5XAKJvOhYqZTM",
        "y": "-T_OakJ08j_rRP4Imn1p3L4rG60cQk72Nh4HX_tDDd0"
      }
    ]
  }
}
2021-09-30 07:59:43 SUCCESS
OIDCCExtractServerSigningAlg
Using the default algorithm for the first key in server jwks
signing_algorithm
RS256
2021-09-30 07:59:43
SetClientIdTokenSignedResponseAlgToServerSigningAlg
Set id_token_signed_response_alg for the registered client
id_token_signed_response_alg
RS256
2021-09-30 07:59:43 OUTGOING
oidcc-client-test-signing-key-rotation-just-before-signing
Response to HTTP request to test instance IDPxRRJaZNxOCPD
outgoing_status_code
201
outgoing_headers
{}
outgoing_body
{
  "application_type": "web",
  "response_types": [
    "code",
    "id_token"
  ],
  "contacts": [
    "ops@example.com"
  ],
  "token_endpoint_auth_method": "client_secret_basic",
  "redirect_uris": [
    "https://89.45.234.133:8090/authz_cb/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98",
    "https://89.45.234.133:8090/authz_im_cb/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98",
    "https://89.45.234.133:8090/authz_fp_cb/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98",
    "https://89.45.234.133:8090/req_uri/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98"
  ],
  "jwks_uri": "https://89.45.234.133:8090/static/jwks.json",
  "grant_types": [
    "implicit",
    "authorization_code"
  ],
  "client_id": "client_KHJanEtZsFAMnLS21536, ?].",
  "client_secret": "secret_DxSCYgqthVmHxjhIeOcLbxUBbOPuqOwgOaNfqlijWJMzWVvtOP7392984920#,.{\u0026",
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "use": "sig",
        "kid": "ZnM1b012dmhUSjh5X05VOUhpN0pXZVlSSEVjQ2J5dEkyQXEwTWQ2UjdhRQ",
        "e": "AQAB",
        "n": "tkih6m_RcAr9RozD7IrHS0KjdLHSjMYuT2uRdtbTEJx1jBV6sDADoP3IskBFlwKssFAfZmtjSLETX7JUyIBkhUfTU0OKdVVrfTslfbUw4_m4OyaJmB6POycCH-zk-we9GnP1rjvfPIaaWLVtNM6r2wC-MTWv4MEL1sp-G0nj63oC53hc83q0pxaJqaDr7fMSZCUswL209DnSSn5aF80teBDUS-wOjLvihFIKSDZf0r3t9ObxYsT4tPbq7hQQc2K9XlYADfr-cmBQtwXg9h1jI31s5p-xI1SWzABQm2ZdCovcGjl9GopHsqtCINU7LCK7noRgwxHPERcJwDOX06IRmw"
      },
      {
        "kty": "EC",
        "use": "sig",
        "kid": "S0p4OFlHMzdtNzFjZlpoWkpKNnVmMHM1RHAyVlFtbXlrUjRhdjVpNXBLWQ",
        "crv": "P-256",
        "x": "MEFzjCvTrLMkOcRgdLWYpK4b_xrKOn5XAKJvOhYqZTM",
        "y": "-T_OakJ08j_rRP4Imn1p3L4rG60cQk72Nh4HX_tDDd0"
      }
    ]
  },
  "id_token_signed_response_alg": "RS256"
}
outgoing_path
register
2021-09-30 07:59:43 INCOMING
oidcc-client-test-signing-key-rotation-just-before-signing
Incoming HTTP request to test instance IDPxRRJaZNxOCPD
incoming_headers
{
  "host": "www.certification.openid.net",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,*/*;q\u003d0.8",
  "cookie": "JSESSIONID\u003dBBC2813D48CA0797C34642834E670B38; __utma\u003d201319536.1325286560.1632909994.1632909994.1632985063.2; __utmc\u003d201319536; __utmz\u003d201319536.1632985063.2.2.utmcsr\u003dt.co|utmccn\u003d(referral)|utmcmd\u003dreferral|utmcct\u003d/",
  "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/14.1.2 Safari/605.1.15",
  "accept-language": "en-us",
  "referer": "https://89.45.234.133:8090/authz_cb/803cf1daca0287855ca0a0eff4eaebcd1ab41a091f4a1179c85c40214cb65a9d?state\u003djy81Iwz8BfsvkerTD6rYUEO55Ph9WCL2\u0026code\u003dh6SWrou4WcWuYOz77gPhhz6LLYZC3PWT",
  "accept-encoding": "gzip, deflate, br",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
authorize
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "redirect_uri": "https://89.45.234.133:8090/authz_cb/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98",
  "scope": "openid profile email address phone",
  "response_type": "code",
  "nonce": "LmPWuQqk8DBYTEtaL0hgmj5o",
  "state": "kp06BvvOoEudHvvOmxe1RtNqFT8uWqW4",
  "client_id": "client_KHJanEtZsFAMnLS21536, ?]."
}
incoming_body
Authorization endpoint
2021-09-30 07:59:43 SUCCESS
EnsureRequestDoesNotContainRequestObject
Request does not contain a request parameter
2021-09-30 07:59:43 SUCCESS
EnsureAuthorizationHttpRequestContainsOpenIDScope
Found 'openid' in scope http request parameter
actual
[
  "openid",
  "profile",
  "email",
  "address",
  "phone"
]
expected
openid
2021-09-30 07:59:43 SUCCESS
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
effective_authorization_endpoint_request
{
  "redirect_uri": "https://89.45.234.133:8090/authz_cb/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98",
  "scope": "openid profile email address phone",
  "response_type": "code",
  "nonce": "LmPWuQqk8DBYTEtaL0hgmj5o",
  "state": "kp06BvvOoEudHvvOmxe1RtNqFT8uWqW4",
  "client_id": "client_KHJanEtZsFAMnLS21536, ?]."
}
2021-09-30 07:59:43 SUCCESS
ExtractRequestedScopes
Requested scopes
scope
openid profile email address phone
2021-09-30 07:59:43 SUCCESS
ExtractNonceFromAuthorizationRequest
Extracted nonce
nonce
LmPWuQqk8DBYTEtaL0hgmj5o
2021-09-30 07:59:43 SUCCESS
EnsureResponseTypeIsCode
Response type is expected value
expected
code
2021-09-30 07:59:43 SUCCESS
EnsureMatchingClientId
Client ID matched
client_id
client_KHJanEtZsFAMnLS21536, ?].
2021-09-30 07:59:43 SUCCESS
EnsureValidRedirectUriForAuthorizationEndpointRequest
redirect_uri is one of the allowed redirect uris
actual
https://89.45.234.133:8090/authz_cb/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98
expected
[
  "https://89.45.234.133:8090/authz_cb/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98",
  "https://89.45.234.133:8090/authz_im_cb/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98",
  "https://89.45.234.133:8090/authz_fp_cb/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98",
  "https://89.45.234.133:8090/req_uri/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98"
]
2021-09-30 07:59:43 SUCCESS
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
actual
[
  "openid",
  "profile",
  "email",
  "address",
  "phone"
]
expected
openid
2021-09-30 07:59:43 SUCCESS
DisallowMaxAgeEqualsZeroAndPromptNone
The client did not send max_age=0 and prompt=none parameters as expected
2021-09-30 07:59:43 SUCCESS
CreateAuthorizationCode
Created authorization code
authorization_code
wpqUX2N5Qh5tNdtaFaslFuBwbkFXhd0T
2021-09-30 07:59:43 SUCCESS
CalculateCHash
Successful c_hash encoding
c_hash
mjrTraZlcWMp4AIpmvuCJQ
2021-09-30 07:59:43 SUCCESS
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
params
{
  "redirect_uri": "https://89.45.234.133:8090/authz_cb/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98",
  "state": "kp06BvvOoEudHvvOmxe1RtNqFT8uWqW4"
}
2021-09-30 07:59:43 SUCCESS
AddCodeToAuthorizationEndpointResponseParams
Added code to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://89.45.234.133:8090/authz_cb/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98",
  "state": "kp06BvvOoEudHvvOmxe1RtNqFT8uWqW4",
  "code": "wpqUX2N5Qh5tNdtaFaslFuBwbkFXhd0T"
}
2021-09-30 07:59:43
SendAuthorizationResponseWithResponseModeQuery
Redirecting back to client
uri
https://89.45.234.133:8090/authz_cb/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98?state=kp06BvvOoEudHvvOmxe1RtNqFT8uWqW4&code=wpqUX2N5Qh5tNdtaFaslFuBwbkFXhd0T
2021-09-30 07:59:43 OUTGOING
oidcc-client-test-signing-key-rotation-just-before-signing
Response to HTTP request to test instance IDPxRRJaZNxOCPD
outgoing
org.springframework.web.servlet.view.RedirectView: [RedirectView]; URL [https://89.45.234.133:8090/authz_cb/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98?state=kp06BvvOoEudHvvOmxe1RtNqFT8uWqW4&code=wpqUX2N5Qh5tNdtaFaslFuBwbkFXhd0T]
outgoing_path
authorize
2021-09-30 07:59:44 INCOMING
oidcc-client-test-signing-key-rotation-just-before-signing
Incoming HTTP request to test instance IDPxRRJaZNxOCPD
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "python-requests/2.25.1",
  "accept-encoding": "gzip, deflate",
  "accept": "*/*",
  "authorization": "Basic Y2xpZW50X0tISmFuRXRac0ZBTW5MUzIxNTM2JTJDKyUzRiU1RC46c2VjcmV0X0R4U0NZZ3F0aFZtSHhqaEllT2NMYnhVQmJPUHVxT3dnT2FOZnFsaWpXSk16V1Z2dE9QNzM5Mjk4NDkyMCUyMyUyQy4lN0IlMjY\u003d",
  "content-type": "application/x-www-form-urlencoded",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "281",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
token
incoming_body_form_params
{
  "grant_type": "authorization_code",
  "redirect_uri": "https://89.45.234.133:8090/authz_cb/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98",
  "client_id": "client_KHJanEtZsFAMnLS21536, ?].",
  "state": "kp06BvvOoEudHvvOmxe1RtNqFT8uWqW4",
  "code": "wpqUX2N5Qh5tNdtaFaslFuBwbkFXhd0T"
}
incoming_method
POST
incoming_body_json
incoming_query_string_params
{}
incoming_body
grant_type=authorization_code&redirect_uri=https%3A%2F%2F89.45.234.133%3A8090%2Fauthz_cb%2F0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98&client_id=client_KHJanEtZsFAMnLS21536%2C+%3F%5D.&state=kp06BvvOoEudHvvOmxe1RtNqFT8uWqW4&code=wpqUX2N5Qh5tNdtaFaslFuBwbkFXhd0T
Token endpoint
2021-09-30 07:59:44 SUCCESS
ExtractClientCredentialsFromBasicAuthorizationHeader
Extracted client authentication
client_id
client_KHJanEtZsFAMnLS21536, ?].
client_secret
secret_DxSCYgqthVmHxjhIeOcLbxUBbOPuqOwgOaNfqlijWJMzWVvtOP7392984920#,.{&
method
client_secret_basic
2021-09-30 07:59:44 SUCCESS
ValidateClientIdAndSecret
Client id and secret match
2021-09-30 07:59:44 SUCCESS
ValidateAuthorizationCode
Found authorization code
authorization_code
wpqUX2N5Qh5tNdtaFaslFuBwbkFXhd0T
2021-09-30 07:59:44 SUCCESS
ValidateRedirectUriForTokenEndpointRequest
redirect_uri is the same as the one used in the authorization request
actual
https://89.45.234.133:8090/authz_cb/0da4719ef30005651d99509763112192dcbdbc497721cd368a1690688d51ac98
2021-09-30 07:59:44 SUCCESS
GenerateBearerAccessToken
Generated access token
access_token
Dhw2NLxfZltaNc6EXnsQhJBOdeAUEkgnMilBNYotDLMFgts0wb
2021-09-30 07:59:44 SUCCESS
CalculateAtHash
Successful at_hash encoding
at_hash
CjDqnFacorrx17YXHZVAQg
2021-09-30 07:59:44 SUCCESS
GenerateIdTokenClaims
Created ID Token Claims
iss
https://www.certification.openid.net/test/a/idpy/
sub
user-subject-1234531
aud
client_KHJanEtZsFAMnLS21536, ?].
nonce
LmPWuQqk8DBYTEtaL0hgmj5o
iat
1632988784
exp
1632989084
2021-09-30 07:59:44 SUCCESS
AddAtHashToIdTokenClaims
Added at_hash to ID token claims
at_hash
CjDqnFacorrx17YXHZVAQg
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/a/idpy/",
  "sub": "user-subject-1234531",
  "aud": "client_KHJanEtZsFAMnLS21536, ?].",
  "nonce": "LmPWuQqk8DBYTEtaL0hgmj5o",
  "iat": 1632988784,
  "exp": 1632989084,
  "at_hash": "CjDqnFacorrx17YXHZVAQg"
}
2021-09-30 07:59:44
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "xEzgzJ8wOW1fsOcqg6ojw3kx6OmhP3hFBEzqv4UDYwo_wYO6Q4du6tS2jlfDZrP3-ITKVsd8DFEs0I8I6dQrMM8_5BBc3bz5vscfq723Fi8eT-CTovpt5GTtGgrzD8MWgSgVGdP2zSYq_PTQfME6gpclGKQQnnmik40T2iwSRUs",
      "kty": "RSA",
      "q": "u3MOJPfQmarXrkrd0ZVBS8eJsd6mV9VLVu1vjg2WUWHtvucdK1v3dvQTz6vW6mAFCMszrB3mhB6ZXxEC0RDgpJN07fzKHUNEp1ln-xuUfdUBhPDj2saUwCKZBLPhblaRQDsLVmKgng5S21EM_QA0Bze-oHnUpV2vahSDdyno7yE",
      "d": "DbSPtZ9Z3G82LLLaWz3SbRCU0sHVRv8NnKY55DVPn4_1PW4zZoFOYk8MHSmmNOR5NtoX5JZHgpUlNTdMsg6_tpeimxX4UGu_kuZxbEvZtg04uZO6l3DvCa8a9HR8RcXCt5qZBBFGMDPk5u8COsXpZaqK_ecsR5ST1nNQnY6ig7_i8Jdrep-YjmqLQBLWnsQ_CqIlga9CPymeUhd8YCnX6DpRZtaxF7J8nfpIFpeka4jDFsWRdbrjxDUIl-iq1wxS1z8VcmkCzXbz6q2woMUqo-BJVu4vcJMsjhl7gmZs5IaY3SPWLZuz88hDunqOAi3nMZJP9hdKoYyjd_8bikNxQQ",
      "e": "AQAB",
      "use": "sig",
      "kid": "22ffa7ff-f8d5-4683-9810-d7a15cd13d3c",
      "qi": "iGc25CzpN7waFiECMjXQy-8kIf_KeFeRFzDtPi05A2fNhTcVO1TcevakA2nP0zHmfEwXv1S_CbuKhuz3cVpT8QViS2Nx7gQUYwWqgali8UeevFXg4r9n7dExoPRznwFma-cAXzA5Tl2BZubsUGxD4vUjP85K8mZKKm9aSUVk1yM",
      "dp": "U7uDTGU-2dAouDny7ZS-ipwAyRwXFw7DSdFRdP5U8oMlrPL2meWET5EKie8vv3hW9uAVuyx-YnahyhipMay5-6j71NmR81evpEwl20kidskEgggGkceG5pyScsBm67tItzEUxx6eMOXuAlafNAfsYFX-keMx35d83LmZ1T9lT78",
      "dq": "oq-NtBn8SpIS1KsXb2F5pTpN0Djr58kvtQcnTYOPVZyHiaruDwandO8LDq8WPJ4PYH1zoErnGP2xoOeTqT1bqppr3m0KQXFzcUbQTwi1zKwEwIuNRgAZc9PTOFiiK3AoajWUdmns-qB12vCyNBZsEWOZJ4_1NXxk1M1u-ApApuE",
      "n": "j7xhlwFUq0i9luwCtSlSVpAIqGZBAcZtCnCZJplKOejYhi77UVj5jW8o2i2cZDtn5445tXKrW4FSpPO_VBTiMLk3yPbr-732MdDm1frBr5R0IcZobkM0a-lpon3MEKI_Y-OtMWBnn7tio_HKkhevhj60rkdKDrN92bPYi0FtMQ8rS9lQ9jZqjGbMJptEeeO4ZhoexQifZAIO77QpbQCIodpoAfiSgRAeiUnGozKMhxydqadq4aFi4sJTtt_3rWub2dV_z46s8CzCCnlI-Om51Hor4YwSVG7htCNVblP-E-Yp11YolLpN5JMgm_0KMVlKvTZ015D8RBj3TrLJjAPzqw"
    },
    {
      "kty": "EC",
      "d": "uZTyHtWqWiRHAqRcKcA0C81xrknXqiYE1HR1204ER5Y",
      "use": "sig",
      "crv": "P-256",
      "kid": "6eb39597-3cf6-49fe-be59-4fdea4ddf121",
      "x": "aWVVmn1-QkDslCoddMhbZXCxf8Ckx2Qsdo91ppuZPNM",
      "y": "IXFOuCgiVbmfRS9ocoQ3KMJyMvjvmvw2v7_1eP7s4mk"
    },
    {
      "kty": "EC",
      "d": "lI95AebOxBiezQqpNPlv_gD5rathWr0-ahqxAXWsmoY",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "b2d74ffb-8593-4143-b66e-39d80b727960",
      "x": "IvOH8Zlo5oa5LO9ReuNT8IRf7F8Q1yMSewdmiKR9M2o",
      "y": "rV5lF9KwpkdvlPVfObHQCkS_CFX_dM687IVLTgMbvmU"
    },
    {
      "kty": "OKP",
      "d": "d87elhthiohjaNg2CU2Ji20IPiyt0ohmc3tj850fMHk",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "ae73faf3-386e-4233-8bd0-38917b561203",
      "x": "blIxqgigmKOuxeIhCjX98i0LibrlsoMgmGwUX3a18vE"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "1EkcK8kIVufcSr1vQPVnO5eeMEuNFUrs8AhUd47U4rhp5J54gzHFkG9SFqeyc4FsBXzywOe1B18YJcWuperoVV8PpzET39nqq9pZTOrXZFjyI8ufMjxAw-eX8D0P8wdxds4yfqQQeq9xw_8q7aCEb5Rt0R3iW0FdNOW4JRa_Fsk",
      "kty": "RSA",
      "q": "nqrbDrGFoyvWQ0dcnIgWueMQ8RxMEiTW-hpXX53DkEuCOSwOt5HhcVWMhtlC8pE31WF7YD9bTR8FPTXxdAQIzkcG_KxwllkJXRtGfaOs1TeL9eUyN00ObdyQYcEl66HjsfL0rAuqfzeyXxNxKGAaAOht37_j8Wzv5R-fD7fh1JM",
      "d": "Ff_f3D57eA2kfJ2S0vJnyxsO3MYnGHu_U5bBk3stQzVh-sv7XWWHCZw-dlljinMI6TVQ2wQ-adu5gIubkoJoeV32XYFsbhPIlX8dnHLZwQew43tzNriCAGaGS4rqE8ENAJ8jwLghuKnim6cSwQtGIJCia9A9Hb9KSnPr8ID8sSkKzr9MK1ARad9jhNecPWiN4AVEgDuHju1gh9Pyz9NJtkQruB-crUhfYeSAclwEfRNerf3pTBWcjxyY2PZrlcShgbm_k10gWbD5tW-dhECFdyq0KJl8IaVpqm9DL4yoesDnxUoqJCppGnwxgfnlevOTWKnWeywgXJDPueSYsEzQ4Q",
      "e": "AQAB",
      "use": "enc",
      "kid": "a958cb0b-cb91-4b2b-bd29-2aaccbff51df",
      "qi": "bWpPaavGli_qUl_nZuC3iq3sFb5xBoAyNn6e5mGej1faFxh3280zSihfrcAD46ptaD3U6f7AVgFBJmou7XQYHhPpi_OBqYLoaIEFuPWybI4m6CC6zw5ywOdDgdRqXwVxbejBIouenyCgZa0WZF9tyV_e4w0LPuexIezGSnRf2Qk",
      "dp": "QUaZ2vzeC5sQKgtGAntzWuesRL12jG2Vndlx37GT1INQTHROKklLrrYMT9sRDGNni-h33Mli6Plcu4Cly28IMfghIA__RH4FowJpIzWzNbAEBO2_7fqJD7RPDBg6p0hKo3WUIUzhpFf-a34y_Q62qnjBq-O8jsLynillDkKIT8E",
      "alg": "RSA-OAEP",
      "dq": "ee2d7MqqgVuciZL7Lia-IBbH3CD8rCy3LvazEf0wXWBJMBoVLSfjcK5nEPFAKxtBJq6Ems_VH4ypAALGC3tWMP4P9nelBURil7PwFXiDxk2rNkjsr-Z9IhuOsDA3Lb34NbUYJGXKnXx1i-5q1LYVBYGXfYv-ZHZsW0xTdUa_OhU",
      "n": "g5LNlnV1AlDAXj5RCAS8hPMCkN4fResoHsr-4lkSstPHv6kM-Ya3Cz5gx2n3lf88yx0oPKxZ2jQg_kwRtgkiVjc4qeIMarjm2ILmPrbVzjnjkpSlFFGA1sFQFhT4WlfztDecMc4P_4YIohPd_N7CjesLRVqGnHDivq9dIW3gLzy9qNYTbo1W9mudHa4Ir9UJEejA0NZkd_a8y3LyIOq4HAdzEaxM3gd14k2LrOPNu1tJfvy2zxqf1BEk4Go90locXkGoDLmUfsU0JFUOKbvpwLcuX4KbLvtDJNnQuiFP3A91nqtV0f3qFZ1ulRhzwBI6YxghrmkrAlaL8zgmBEGJaw"
    },
    {
      "kty": "EC",
      "d": "JWw3ys6oo1Hq4qGFTBKbbuzRTU-Azmqz4qCyvy8T2bw",
      "use": "enc",
      "crv": "P-256",
      "kid": "445631ee-8295-45b1-b5ef-4bb9f1e61072",
      "x": "PXSHMIdzs5FR5WeKxBao5KdQ30X2cyX2OKvpbdyJkLs",
      "y": "_Otvm-9vNm0B__iAxUnIww22yNmaA-J9FX-srjGfFw8",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "22ffa7ff-f8d5-4683-9810-d7a15cd13d3c",
      "n": "j7xhlwFUq0i9luwCtSlSVpAIqGZBAcZtCnCZJplKOejYhi77UVj5jW8o2i2cZDtn5445tXKrW4FSpPO_VBTiMLk3yPbr-732MdDm1frBr5R0IcZobkM0a-lpon3MEKI_Y-OtMWBnn7tio_HKkhevhj60rkdKDrN92bPYi0FtMQ8rS9lQ9jZqjGbMJptEeeO4ZhoexQifZAIO77QpbQCIodpoAfiSgRAeiUnGozKMhxydqadq4aFi4sJTtt_3rWub2dV_z46s8CzCCnlI-Om51Hor4YwSVG7htCNVblP-E-Yp11YolLpN5JMgm_0KMVlKvTZ015D8RBj3TrLJjAPzqw"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "531eef91-bd1a-4e5c-9dcb-2145e7d0fedb",
      "n": "w49sOImMX8PnXNdl6DOsOMqGEIFS7-OSFhRjQvP2o_kHQnuWSIx6h2oH9g5YSkMoykP-yfxW1a7TaDMgvjyVVRcxlIOtnZy4woUoiHbdRqbOVMEgNQMAqEU45nV5AuMSnm7JoDshdJGWXGv5wV4ynV1E-uJ74lIxCEpbL6vTv8-wIgcLWZYrb4bZ9HecwUYtwUEGnX77ALx8pzzRymVegnbXu3TLaMiLS43v9gbG9sLJzX6cUsi2iagcZlwp8jPsILKhyU5G19d-b8mZvldx5EnQryHMp5bd6AHC4WSL_-yXcIOX13lPCnHF_jX4NZd1gjvif_hzVunNQMJTsnU2Sw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "6eb39597-3cf6-49fe-be59-4fdea4ddf121",
      "x": "aWVVmn1-QkDslCoddMhbZXCxf8Ckx2Qsdo91ppuZPNM",
      "y": "IXFOuCgiVbmfRS9ocoQ3KMJyMvjvmvw2v7_1eP7s4mk"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "5732d98d-cf4f-4539-94c4-55c23d378615",
      "x": "gf_0X1S_4jCw2X5-CcWfWN5Ayski4UlwFWVcFnsNjZM",
      "y": "YEgO7p7lu_TnWmkYpBhakOgZxaR-TlPLWz0dwjnWUCU"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "b2d74ffb-8593-4143-b66e-39d80b727960",
      "x": "IvOH8Zlo5oa5LO9ReuNT8IRf7F8Q1yMSewdmiKR9M2o",
      "y": "rV5lF9KwpkdvlPVfObHQCkS_CFX_dM687IVLTgMbvmU"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "ae73faf3-386e-4233-8bd0-38917b561203",
      "x": "blIxqgigmKOuxeIhCjX98i0LibrlsoMgmGwUX3a18vE"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "a958cb0b-cb91-4b2b-bd29-2aaccbff51df",
      "alg": "RSA-OAEP",
      "n": "g5LNlnV1AlDAXj5RCAS8hPMCkN4fResoHsr-4lkSstPHv6kM-Ya3Cz5gx2n3lf88yx0oPKxZ2jQg_kwRtgkiVjc4qeIMarjm2ILmPrbVzjnjkpSlFFGA1sFQFhT4WlfztDecMc4P_4YIohPd_N7CjesLRVqGnHDivq9dIW3gLzy9qNYTbo1W9mudHa4Ir9UJEejA0NZkd_a8y3LyIOq4HAdzEaxM3gd14k2LrOPNu1tJfvy2zxqf1BEk4Go90locXkGoDLmUfsU0JFUOKbvpwLcuX4KbLvtDJNnQuiFP3A91nqtV0f3qFZ1ulRhzwBI6YxghrmkrAlaL8zgmBEGJaw"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "445631ee-8295-45b1-b5ef-4bb9f1e61072",
      "x": "PXSHMIdzs5FR5WeKxBao5KdQ30X2cyX2OKvpbdyJkLs",
      "y": "_Otvm-9vNm0B__iAxUnIww22yNmaA-J9FX-srjGfFw8",
      "alg": "ECDH-ES"
    }
  ]
}
2021-09-30 07:59:44 SUCCESS
OIDCCSignIdToken
Signed the ID token
id_token
eyJraWQiOiIyMmZmYTdmZi1mOGQ1LTQ2ODMtOTgxMC1kN2ExNWNkMTNkM2MiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiQ2pEcW5GYWNvcnJ4MTdZWEhaVkFRZyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X0tISmFuRXRac0ZBTW5MUzIxNTM2LCA_XS4iLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvYVwvaWRweVwvIiwiZXhwIjoxNjMyOTg5MDg0LCJub25jZSI6IkxtUFd1UXFrOERCWVRFdGFMMGhnbWo1byIsImlhdCI6MTYzMjk4ODc4NH0.SAOTq3vLG4U2J5k3aqezzAqMtYMkK5nHpTzQiSKz0O0IxARyJr2gO0NIxrpbjzr5xQVYwjPaqn71tJKVYY1WE3a8oTBkISwfUyERpiiguDIWTvRkGbQll1p2RvhEnkGIz4vDMepCZ9bqRcRHLEltrAxVgUTWZ16xEIAHI8t1xN1G6IFh_xsp8Ngc9H4krEmhpEysL7lw1_VeZqbrpGfWX15UZHc3KEVlq3n787s8NaN-en8CeC3AAHr20ZDlNF7HV6rkAX6NntC_V6o5gdV3AZtGltP7D6dcuSbiNCU7VhH-PSC9FJVmzctKmxQxJaaDHFenMaTT6upgwtQF-qifCg
key
{"p":"xEzgzJ8wOW1fsOcqg6ojw3kx6OmhP3hFBEzqv4UDYwo_wYO6Q4du6tS2jlfDZrP3-ITKVsd8DFEs0I8I6dQrMM8_5BBc3bz5vscfq723Fi8eT-CTovpt5GTtGgrzD8MWgSgVGdP2zSYq_PTQfME6gpclGKQQnnmik40T2iwSRUs","kty":"RSA","q":"u3MOJPfQmarXrkrd0ZVBS8eJsd6mV9VLVu1vjg2WUWHtvucdK1v3dvQTz6vW6mAFCMszrB3mhB6ZXxEC0RDgpJN07fzKHUNEp1ln-xuUfdUBhPDj2saUwCKZBLPhblaRQDsLVmKgng5S21EM_QA0Bze-oHnUpV2vahSDdyno7yE","d":"DbSPtZ9Z3G82LLLaWz3SbRCU0sHVRv8NnKY55DVPn4_1PW4zZoFOYk8MHSmmNOR5NtoX5JZHgpUlNTdMsg6_tpeimxX4UGu_kuZxbEvZtg04uZO6l3DvCa8a9HR8RcXCt5qZBBFGMDPk5u8COsXpZaqK_ecsR5ST1nNQnY6ig7_i8Jdrep-YjmqLQBLWnsQ_CqIlga9CPymeUhd8YCnX6DpRZtaxF7J8nfpIFpeka4jDFsWRdbrjxDUIl-iq1wxS1z8VcmkCzXbz6q2woMUqo-BJVu4vcJMsjhl7gmZs5IaY3SPWLZuz88hDunqOAi3nMZJP9hdKoYyjd_8bikNxQQ","e":"AQAB","use":"sig","kid":"22ffa7ff-f8d5-4683-9810-d7a15cd13d3c","qi":"iGc25CzpN7waFiECMjXQy-8kIf_KeFeRFzDtPi05A2fNhTcVO1TcevakA2nP0zHmfEwXv1S_CbuKhuz3cVpT8QViS2Nx7gQUYwWqgali8UeevFXg4r9n7dExoPRznwFma-cAXzA5Tl2BZubsUGxD4vUjP85K8mZKKm9aSUVk1yM","dp":"U7uDTGU-2dAouDny7ZS-ipwAyRwXFw7DSdFRdP5U8oMlrPL2meWET5EKie8vv3hW9uAVuyx-YnahyhipMay5-6j71NmR81evpEwl20kidskEgggGkceG5pyScsBm67tItzEUxx6eMOXuAlafNAfsYFX-keMx35d83LmZ1T9lT78","dq":"oq-NtBn8SpIS1KsXb2F5pTpN0Djr58kvtQcnTYOPVZyHiaruDwandO8LDq8WPJ4PYH1zoErnGP2xoOeTqT1bqppr3m0KQXFzcUbQTwi1zKwEwIuNRgAZc9PTOFiiK3AoajWUdmns-qB12vCyNBZsEWOZJ4_1NXxk1M1u-ApApuE","n":"j7xhlwFUq0i9luwCtSlSVpAIqGZBAcZtCnCZJplKOejYhi77UVj5jW8o2i2cZDtn5445tXKrW4FSpPO_VBTiMLk3yPbr-732MdDm1frBr5R0IcZobkM0a-lpon3MEKI_Y-OtMWBnn7tio_HKkhevhj60rkdKDrN92bPYi0FtMQ8rS9lQ9jZqjGbMJptEeeO4ZhoexQifZAIO77QpbQCIodpoAfiSgRAeiUnGozKMhxydqadq4aFi4sJTtt_3rWub2dV_z46s8CzCCnlI-Om51Hor4YwSVG7htCNVblP-E-Yp11YolLpN5JMgm_0KMVlKvTZ015D8RBj3TrLJjAPzqw"}
algorithm
RS256
2021-09-30 07:59:44 INFO
EncryptIdToken
Skipped evaluation due to missing required element: client id_token_encrypted_response_alg
path
id_token_encrypted_response_alg
mapped
object
client
2021-09-30 07:59:44 SUCCESS
CreateTokenEndpointResponse
Created token endpoint response
access_token
Dhw2NLxfZltaNc6EXnsQhJBOdeAUEkgnMilBNYotDLMFgts0wb
token_type
Bearer
id_token
eyJraWQiOiIyMmZmYTdmZi1mOGQ1LTQ2ODMtOTgxMC1kN2ExNWNkMTNkM2MiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiQ2pEcW5GYWNvcnJ4MTdZWEhaVkFRZyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X0tISmFuRXRac0ZBTW5MUzIxNTM2LCA_XS4iLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvYVwvaWRweVwvIiwiZXhwIjoxNjMyOTg5MDg0LCJub25jZSI6IkxtUFd1UXFrOERCWVRFdGFMMGhnbWo1byIsImlhdCI6MTYzMjk4ODc4NH0.SAOTq3vLG4U2J5k3aqezzAqMtYMkK5nHpTzQiSKz0O0IxARyJr2gO0NIxrpbjzr5xQVYwjPaqn71tJKVYY1WE3a8oTBkISwfUyERpiiguDIWTvRkGbQll1p2RvhEnkGIz4vDMepCZ9bqRcRHLEltrAxVgUTWZ16xEIAHI8t1xN1G6IFh_xsp8Ngc9H4krEmhpEysL7lw1_VeZqbrpGfWX15UZHc3KEVlq3n787s8NaN-en8CeC3AAHr20ZDlNF7HV6rkAX6NntC_V6o5gdV3AZtGltP7D6dcuSbiNCU7VhH-PSC9FJVmzctKmxQxJaaDHFenMaTT6upgwtQF-qifCg
scope
openid profile email address phone
2021-09-30 07:59:44 OUTGOING
oidcc-client-test-signing-key-rotation-just-before-signing
Response to HTTP request to test instance IDPxRRJaZNxOCPD
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "access_token": "Dhw2NLxfZltaNc6EXnsQhJBOdeAUEkgnMilBNYotDLMFgts0wb",
  "token_type": "Bearer",
  "id_token": "eyJraWQiOiIyMmZmYTdmZi1mOGQ1LTQ2ODMtOTgxMC1kN2ExNWNkMTNkM2MiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiQ2pEcW5GYWNvcnJ4MTdZWEhaVkFRZyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X0tISmFuRXRac0ZBTW5MUzIxNTM2LCA_XS4iLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvYVwvaWRweVwvIiwiZXhwIjoxNjMyOTg5MDg0LCJub25jZSI6IkxtUFd1UXFrOERCWVRFdGFMMGhnbWo1byIsImlhdCI6MTYzMjk4ODc4NH0.SAOTq3vLG4U2J5k3aqezzAqMtYMkK5nHpTzQiSKz0O0IxARyJr2gO0NIxrpbjzr5xQVYwjPaqn71tJKVYY1WE3a8oTBkISwfUyERpiiguDIWTvRkGbQll1p2RvhEnkGIz4vDMepCZ9bqRcRHLEltrAxVgUTWZ16xEIAHI8t1xN1G6IFh_xsp8Ngc9H4krEmhpEysL7lw1_VeZqbrpGfWX15UZHc3KEVlq3n787s8NaN-en8CeC3AAHr20ZDlNF7HV6rkAX6NntC_V6o5gdV3AZtGltP7D6dcuSbiNCU7VhH-PSC9FJVmzctKmxQxJaaDHFenMaTT6upgwtQF-qifCg",
  "scope": "openid profile email address phone"
}
outgoing_path
token
2021-09-30 07:59:45 INCOMING
oidcc-client-test-signing-key-rotation-just-before-signing
Incoming HTTP request to test instance IDPxRRJaZNxOCPD
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "python-requests/2.25.1",
  "accept-encoding": "gzip, deflate",
  "accept": "*/*",
  "if-modified-since": "Thu, 30 Sep 2021 07:59:42 GMT",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
jwks
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Jwks endpoint
2021-09-30 07:59:45 OUTGOING
oidcc-client-test-signing-key-rotation-just-before-signing
Response to HTTP request to test instance IDPxRRJaZNxOCPD
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "22ffa7ff-f8d5-4683-9810-d7a15cd13d3c",
      "n": "j7xhlwFUq0i9luwCtSlSVpAIqGZBAcZtCnCZJplKOejYhi77UVj5jW8o2i2cZDtn5445tXKrW4FSpPO_VBTiMLk3yPbr-732MdDm1frBr5R0IcZobkM0a-lpon3MEKI_Y-OtMWBnn7tio_HKkhevhj60rkdKDrN92bPYi0FtMQ8rS9lQ9jZqjGbMJptEeeO4ZhoexQifZAIO77QpbQCIodpoAfiSgRAeiUnGozKMhxydqadq4aFi4sJTtt_3rWub2dV_z46s8CzCCnlI-Om51Hor4YwSVG7htCNVblP-E-Yp11YolLpN5JMgm_0KMVlKvTZ015D8RBj3TrLJjAPzqw"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "531eef91-bd1a-4e5c-9dcb-2145e7d0fedb",
      "n": "w49sOImMX8PnXNdl6DOsOMqGEIFS7-OSFhRjQvP2o_kHQnuWSIx6h2oH9g5YSkMoykP-yfxW1a7TaDMgvjyVVRcxlIOtnZy4woUoiHbdRqbOVMEgNQMAqEU45nV5AuMSnm7JoDshdJGWXGv5wV4ynV1E-uJ74lIxCEpbL6vTv8-wIgcLWZYrb4bZ9HecwUYtwUEGnX77ALx8pzzRymVegnbXu3TLaMiLS43v9gbG9sLJzX6cUsi2iagcZlwp8jPsILKhyU5G19d-b8mZvldx5EnQryHMp5bd6AHC4WSL_-yXcIOX13lPCnHF_jX4NZd1gjvif_hzVunNQMJTsnU2Sw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "6eb39597-3cf6-49fe-be59-4fdea4ddf121",
      "x": "aWVVmn1-QkDslCoddMhbZXCxf8Ckx2Qsdo91ppuZPNM",
      "y": "IXFOuCgiVbmfRS9ocoQ3KMJyMvjvmvw2v7_1eP7s4mk"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "5732d98d-cf4f-4539-94c4-55c23d378615",
      "x": "gf_0X1S_4jCw2X5-CcWfWN5Ayski4UlwFWVcFnsNjZM",
      "y": "YEgO7p7lu_TnWmkYpBhakOgZxaR-TlPLWz0dwjnWUCU"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "b2d74ffb-8593-4143-b66e-39d80b727960",
      "x": "IvOH8Zlo5oa5LO9ReuNT8IRf7F8Q1yMSewdmiKR9M2o",
      "y": "rV5lF9KwpkdvlPVfObHQCkS_CFX_dM687IVLTgMbvmU"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "ae73faf3-386e-4233-8bd0-38917b561203",
      "x": "blIxqgigmKOuxeIhCjX98i0LibrlsoMgmGwUX3a18vE"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "a958cb0b-cb91-4b2b-bd29-2aaccbff51df",
      "alg": "RSA-OAEP",
      "n": "g5LNlnV1AlDAXj5RCAS8hPMCkN4fResoHsr-4lkSstPHv6kM-Ya3Cz5gx2n3lf88yx0oPKxZ2jQg_kwRtgkiVjc4qeIMarjm2ILmPrbVzjnjkpSlFFGA1sFQFhT4WlfztDecMc4P_4YIohPd_N7CjesLRVqGnHDivq9dIW3gLzy9qNYTbo1W9mudHa4Ir9UJEejA0NZkd_a8y3LyIOq4HAdzEaxM3gd14k2LrOPNu1tJfvy2zxqf1BEk4Go90locXkGoDLmUfsU0JFUOKbvpwLcuX4KbLvtDJNnQuiFP3A91nqtV0f3qFZ1ulRhzwBI6YxghrmkrAlaL8zgmBEGJaw"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "445631ee-8295-45b1-b5ef-4bb9f1e61072",
      "x": "PXSHMIdzs5FR5WeKxBao5KdQ30X2cyX2OKvpbdyJkLs",
      "y": "_Otvm-9vNm0B__iAxUnIww22yNmaA-J9FX-srjGfFw8",
      "alg": "ECDH-ES"
    }
  ]
}
outgoing_path
jwks
2021-09-30 07:59:45 INCOMING
oidcc-client-test-signing-key-rotation-just-before-signing
Incoming HTTP request to test instance IDPxRRJaZNxOCPD
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "python-requests/2.25.1",
  "accept-encoding": "gzip, deflate",
  "accept": "*/*",
  "authorization": "Bearer Dhw2NLxfZltaNc6EXnsQhJBOdeAUEkgnMilBNYotDLMFgts0wb",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
userinfo
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Userinfo endpoint
2021-09-30 07:59:45 SUCCESS
OIDCCExtractBearerAccessTokenFromRequest
Found access token on incoming request
access_token
Dhw2NLxfZltaNc6EXnsQhJBOdeAUEkgnMilBNYotDLMFgts0wb
2021-09-30 07:59:45 SUCCESS
RequireBearerAccessToken
Found access token in request
actual
Dhw2NLxfZltaNc6EXnsQhJBOdeAUEkgnMilBNYotDLMFgts0wb
2021-09-30 07:59:45 SUCCESS
FilterUserInfoForScopes
User info endpoint output
sub
user-subject-1234531
website
https://openid.net/
zoneinfo
America/Los_Angeles
birthdate
2000-02-03
gender
female
preferred_username
d.tu
given_name
Demo
middle_name
Theresa
locale
en-US
updated_at
1580000000
name
Demo T. User
nickname
Dee
family_name
User
email
user@example.com
email_verified
false
address
{
  "street_address": "100 Universal City Plaza",
  "locality": "Hollywood",
  "region": "CA",
  "postal_code": "91608",
  "country": "USA"
}
phone_number_verified
false
phone_number
+1 555 5550000
2021-09-30 07:59:45
ClearAccessTokenFromRequest
Condition ran but did not log anything
2021-09-30 07:59:45 INFO
AddIssAndAudToUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2021-09-30 07:59:45 INFO
SignUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2021-09-30 07:59:45 INFO
EncryptUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_encrypted_response_alg
path
userinfo_encrypted_response_alg
mapped
object
client
2021-09-30 07:59:45 OUTGOING
oidcc-client-test-signing-key-rotation-just-before-signing
Response to HTTP request to test instance IDPxRRJaZNxOCPD
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "sub": "user-subject-1234531",
  "website": "https://openid.net/",
  "zoneinfo": "America/Los_Angeles",
  "birthdate": "2000-02-03",
  "gender": "female",
  "preferred_username": "d.tu",
  "given_name": "Demo",
  "middle_name": "Theresa",
  "locale": "en-US",
  "updated_at": 1580000000,
  "name": "Demo T. User",
  "nickname": "Dee",
  "family_name": "User",
  "email": "user@example.com",
  "email_verified": false,
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "phone_number_verified": false,
  "phone_number": "+1 555 5550000"
}
outgoing_path
userinfo
2021-09-30 07:59:45 FINISHED
oidcc-client-test-signing-key-rotation-just-before-signing
Test has run to completion
testmodule_result
PASSED
2021-09-30 07:59:49
TEST-RUNNER
Alias has now been claimed by another test
alias
idpy
new_test_id
sVztAwKMubkoUKz
Test Results