Test Summary

Test Results

Expand All Collapse All
All times are UTC
2021-10-08 08:44:50 INFO
TEST-RUNNER
Test instance 64p0ZEpifleSGaB created
baseUrl
https://www.certification.openid.net/test/a/idpy
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code token",
  "request_type": "plain_http_request",
  "response_mode": "default",
  "client_registration": "dynamic_client"
}
alias
idpy
description
oidcrp
planId
DzQn2tM8FOnAc
config
{
  "alias": "idpy",
  "description": "oidcrp",
  "server": {
    "discoveryUrl": "https://89.45.234.133:4000/.well-known/openid-configuration",
    "login_hint": "roland@89.45.234.133:4000"
  },
  "client2": {
    "client_name": "Anything"
  }
}
testName
oidcc-client-test-kid-absent-multiple-jwks
2021-10-08 08:44:50 SUCCESS
OIDCCGenerateServerConfiguration
Generated default server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/idpy/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/idpy/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/idpy/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/idpy/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/idpy/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/idpy/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post",
    "client_secret_jwt",
    "private_key_jwt"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2021-10-08 08:44:50
SetTokenEndpointAuthMethodsSupportedToClientSecretBasicOnly
Changed token_endpoint_auth_methods_supported to client_secret_basic only in server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/idpy/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/idpy/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/idpy/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/idpy/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/idpy/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/idpy/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2021-10-08 08:44:50
OIDCCGenerateServerJWKsMultipleSigningsKeyWithNoKeyIds
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "3dr_vZFG5PYXIIc7a5buoPcLgvGkcTH-LL-WNRiZid3CY6DHfxRVXZ1Aux7ARqZMgZ62uREB1vkVDDyqDxc4aZ4_iXItEfG2atFwrXyJHhwqghPO5OvaxAZutG_wRnn3dRySrKZhZpRDZKyMpVxOV9iEE0zWBUhb3VALRGssrq8",
      "kty": "RSA",
      "q": "xTOYO_qq5taCE3PuR68VVakqjs8ysqci-3Gv4qFGdihrydx-0MRtcoQD6Yns8uK-1GCgcRgZH084DtbaxI8vFP_FY9e5oDbSMVoCZVii5laXtnTiVBDtq7aSaur8RkhJEvpCzmGms2s3RwRyptI1_-vRp8ckEcwNThDM7rOnbss",
      "d": "Sj7suVE0FHFUxJoP1bOkK1G4bvnY3rTTKdopBv3mDUfT29Lg8GrvEpWXVXM8cxjwGwaaDU69l4XhUEaatEHilCYcWskB54ddxcuIhz7MBO2ZzqDm2W3Q-tCXPHetPnEW4Fowt6PDQh6PKX_cCDtUB-W2aehvFBtL4VecwFep5KqXqg8yIyKnrQtNuZJhCsYRLCA6IriVFMDsWzpfjqovwBEPQXGVrYYp2NaGOTi7Ph9UMEYfItA0KUgq0h6OIYIw0AbCJL15RE2_2e7HDbsz0klofSqd87FEPxEJa4cXbO7xHvRECoWxTsb_QP0wI3qx4250UgfoG2eUTu6fOeh8oQ",
      "e": "AQAB",
      "use": "sig",
      "qi": "LxoATySL2-TEr7K0EaH3F5jMZTlED7b7E33KRJEx7Dx1ANQizX7kXWSyqrTxqiG2uqDQyOSxRq9607CqiuHVIc1cEfuPKgBrJVbdgH-LJjuWB_O0v0IP8fTTK73xBhZNSKnpaRuRlph0l3LbCtJtN58aot6pIFqng260_wnhPeM",
      "dp": "IKkM3St19F8GKJO_-6bMmoXD_BL20nM5p_zMcCSe9dzfsSsKM3sa1h1AWku8oqn4uVxUKgqG6s7gelyz7GTOuT3CvMlCOVIMOM18eQ3MYdJjr6Ka4riWDCWmRon0JWvvMh5yuVgFHsTU5w0_51gfcG8_glfdagms_He8MOZWPaE",
      "dq": "cKeD3Sfa_9olHvXIdr0HhBMK0-B8BuFCM8CDiQU22oNG6F-FNsAwAg52qbB4Y1yzRWIZ5eGtYFyCGsAU49skO2vOGLaBPYxz0WupGLpk_Q8Uxk_Jh9rP25uF03yAN6pNzICZL4tLjw29210oHjLSVGwkLiOucFhQdXtVhzusd7c",
      "n": "quY9W9Yc930rbWU-79jQlqzPdAtKqyxl12hAv2WcZ7RW7LYZNItApJ5V--xO5H_G7EeLXTqTzRrD_lhJCPXrVpw8t51IJqNUWUb66v2DBMMQS1XctAL4hmFEqsC3ejHS1zmgNIymWxSC_FKgMIwWLvx10YXMnFNwZZjVtF528JTq0DhF9SZUm6QEep_VV8Y18biJCk5BPmOz2LdWBu2UpwYbPdb0s_earT90rdijjOE0nkFdT7nYzeoqoj2wntq_ckghHCZohIYO0uQVwB3cbrSmpX4JSE2By7nFoI6iqWvjWY_Omn9TFDKmlY9P7Zbgj8HEk8Ne0vOPkFhKgKa2xQ"
    },
    {
      "kty": "EC",
      "d": "BpYtz5q7OvuJPm8rHEeC2rR8n3bViAEJ5HOZs6VuyWM",
      "use": "sig",
      "crv": "P-256",
      "x": "l8JQcitOGySLaBKpsmdnIWmHtX39bQF_wSWtAKXP9xw",
      "y": "T8W7Z9KCOfwpCBbwaqevYb9nIz29Gv4Hn1onS6opuu0"
    },
    {
      "kty": "EC",
      "d": "b28R7CeHJq0HwbtPqJwMojaoQ6PzpQ531LET2ZxV-Nc",
      "use": "sig",
      "crv": "secp256k1",
      "x": "5maz4lD0Tn563IVxkwiDxZIIZHIvHnNPeOOkZR4Wa5k",
      "y": "u7XK4a23c8AC3wnp5aIB6JuxZrPQ9-l8tli3-Xn3pFk"
    },
    {
      "kty": "OKP",
      "d": "3UICcQ3FUaal1LvG9q1lrVpPC4dET62T4uhpIn9zvzI",
      "use": "sig",
      "crv": "Ed25519",
      "x": "emmMtxa2NzmmCo1YAqLve_Xq1v8v8mHd2kEsqYk4c9s"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "6JOiWKxrYc8jEkqq14QoccU4VfyWuLpw_BQjehtm5HRS7baMuUAtak19vxUxgrxjnfy_3hOvw_UNa7dbgt8TuK6sqEdChnpW1WhYzTPXHA6Jw-HKVF-G0xs_wk2lZiYtxEjONtTOVceXv0KifqkT3_Xs74VTgJzJmJcIIYlEsvM",
      "kty": "RSA",
      "q": "qX1xPAsrCbnD5kGtBS2TAa1y-xk3_4w4sdCGzuudZiL4QIMB02_FeJI00cvY6aVK0bGzzU9QyOjAn6f0W8ZYOGlnNyN_oB31mcT3xclAz6-OrV_eya5w7rjS_i2eB2fUZaqEarUsUZT-gJtORwRd7pYhCpNc5PohePhjsFl22e8",
      "d": "eIF9KmzwXtJZkpWf9Ujqjpy7dqa2t0R5PBybT6nIJpSxvDk6MrqnUrMdQM9AsgRGjLucxQOzW4Daitm6DiXIMOL_Pk3lvPkTZyOtM4qzYsH0t53Bdfv8wfj5BWmK3b7wT_CR6gwZpovID712-K3ztq5rgtL1JH2ApdpYwTBMzFItwLNZBtjgK8pi-CegoimF1idcd7jJGHcwciJzWvQuXnoO0epvJPw-bsP7Znx9_NyTZ8XUzudNvmBYDKs5PzfJVZGpUsCl22ak_FR2l0QcsIgZ-noABr1T16-v_PxorPdyUtIND4veioQ3WOdqsxwIqBKpCe1lTJGliR2hTXUFnQ",
      "e": "AQAB",
      "use": "enc",
      "qi": "0V3JJTnSiJ-M0UD2rjI-yct6-Sh74QNsd2xFcVO15b3PVHcVg9xcv99PulRy_jgwugRpDPhNqiPvwlMH_VKLeTqtuIgZtNHaSBtL14ZWIIk3HXREUWou_nj1l5Pb1li4FHRdqmZRyCceTV1uCCi7IaugFlJGTJI8Qzh5q-6tQGI",
      "dp": "vCrN-44sJusuhdsRU-Kh0kJtLOx6iSSWyuwENAO9gHI4sgiy3CJ3W_0sEpA0CYEf26-lECi_WPyHijHEASM40n_IQzG8Og76-Bg_WG5ryFBe17NzPkY3T89JC4xEmFulRZxd8vDDq5UbSevAileDM_zFYJhvEaxIUoNHWdK0WU8",
      "alg": "RSA-OAEP",
      "dq": "l4AmuIovFUl0v5xTIT7EmgpFrgez03yurNr9tXZMwqBdkaTI_At70zO1fRaetPLoNxqF4u6UApJypAPIXESmVP56oYHcse41vBahd61Wfo6plXYNue9wySJyj3uNN4drBtlt9cgublolSCYKyVYw9HRD4qUosxCW3QACc_70Swc",
      "n": "mfttIoaHtoBZTzaaUPk-9pPsWd_poPicQFZd8rLWlC05FJL053EjeudOxIfpSSwzdKIQ2AbesuuH4ybIOKkjP0BBA3RnIpQ22IJQr5MGKV1j2WtfrWkqeJGuhgejW4PTfeP86x8RyY1DMiAgsaLGJhMRXG063rI0txOk1g2dw45ceCICbWqAYcIQWDTyXE0wCJMaGJ-1698-5xxDu89nqKQB9OcGrB9TeR92ZHd7LXhPyePsGRD0eYeUPAZSd5EHslCDA8Rsw2BOgjgqjICu_IQT7n119yd7anbn-ekEtr5F-R1VQ7nTrnp1BSlBy13AIfcxLbrKNuUW6iybWdUL3Q"
    },
    {
      "kty": "EC",
      "d": "2pzf4-JV4SZ1n-cM4l0XVpEjgTNPX54RFFmlsTl255c",
      "use": "enc",
      "crv": "P-256",
      "x": "KINM0n9XG6PDxfcPFDQ3tPA1CRETVPGforF_3XigCpc",
      "y": "yrGCv1PJYCcFgRvLxtpdaFdoNo-swdh8rmYfe4aEsGk",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "n": "quY9W9Yc930rbWU-79jQlqzPdAtKqyxl12hAv2WcZ7RW7LYZNItApJ5V--xO5H_G7EeLXTqTzRrD_lhJCPXrVpw8t51IJqNUWUb66v2DBMMQS1XctAL4hmFEqsC3ejHS1zmgNIymWxSC_FKgMIwWLvx10YXMnFNwZZjVtF528JTq0DhF9SZUm6QEep_VV8Y18biJCk5BPmOz2LdWBu2UpwYbPdb0s_earT90rdijjOE0nkFdT7nYzeoqoj2wntq_ckghHCZohIYO0uQVwB3cbrSmpX4JSE2By7nFoI6iqWvjWY_Omn9TFDKmlY9P7Zbgj8HEk8Ne0vOPkFhKgKa2xQ"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "n": "tk2sWvzQPs9Xy2Q0amKEVL_BOHFTSBtiuab_joFuTW2uxEjaQfXc9xCvhpa_PEDP5mKwcn4mUWT4Pns1EFMI0IAI1ybyKa1NGHlfVdgUD3iSxfZuFmDOSy4JCXNaMZqI0zG575rWBAcrv7xNkjgkv9HH9QCujv49YHAfaEUmrbNaxHMmszv4T_Tz60E5TgoDIxU8gxYAyWJtMdoKYjKrdHqUaOQxDZCR5YAKIFJWW1OD34hLyeiijyjsAvo-iUIHxprEkLb7cO9h2NjDmlEcvymqiT3XQuMafguAbFmqhyck2DqaxmmIiU-HeEQ_F-vHm5Ct6i9INKkQr2nqZF_R-Q"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "n": "vayPRtmsEMlpDuYoCNdAOZCN0oQJosVFmEb7RYyGAP3oxQLyb2bKObaLq7YJf4uMcLRYmN9YbkUSCaBPCPJX5dv6GVIOUlNngM2oYT2v23gMqzGNqDQVD87Ole75SpahXh8ImH17evmmB7GZi9yYqPYRufBq0ncqXijGD74gex7Nexllkot7JrK9_jAfzOCCsLqkdqriEt8IjCWlflItz3_MVmYoGKTPgukvFZpeFxR--qB6QXCcBKh5Yk99wiS0WCUu3PvHVyrxFrA1CmDF4RZbtO0zo8LuotM-qLN-mXJ1w1pjjk6fm2YmWczDb1ypUuOV5ZrEuVEoF8bqESoSuQ"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "x": "f5Y6lgLPCSc5SE4UvodeKTF5kJpBdB6jaG2toPbUL_U",
      "y": "_OxAU1ahN_mApb7FAyA_b-m-oDhsvtB2S6Azg1Wuuh4"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "x": "l8JQcitOGySLaBKpsmdnIWmHtX39bQF_wSWtAKXP9xw",
      "y": "T8W7Z9KCOfwpCBbwaqevYb9nIz29Gv4Hn1onS6opuu0"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "x": "XCYoWvQyW-07CllCYYRA7y-i0xzZx05XZYyvo6Knl5M",
      "y": "67QXLy6BqtOUMsTmtQFoGZQ5eVqSCK4iUAIr37IcrmE"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "x": "5maz4lD0Tn563IVxkwiDxZIIZHIvHnNPeOOkZR4Wa5k",
      "y": "u7XK4a23c8AC3wnp5aIB6JuxZrPQ9-l8tli3-Xn3pFk"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "x": "gonsYMaJD-xw4eOndx9RuBQfA3sxMV2pzBfJbQBAkJw",
      "y": "XpmTmQXgGXeKU8A4BAA7x4NGQ2Ucs5MLmeUaieFKPqk"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "x": "-x85ItES9dVTN31p4TsGj0pqai9ehjFOi03v1urPl3E",
      "y": "HOnjLUZp0-pETnGM8L7Opo83WVQcJOaWuWHusCL012Q"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "x": "9nyYM_XcXcKGXKpheHFZf-8KKLx6ljuehgHw0B4zW4M"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "x": "emmMtxa2NzmmCo1YAqLve_Xq1v8v8mHd2kEsqYk4c9s"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "x": "43m5HMhaySGmDHucFJXVAIW6-zj5shRZ51TWQq7-svs"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "alg": "RSA-OAEP",
      "n": "mfttIoaHtoBZTzaaUPk-9pPsWd_poPicQFZd8rLWlC05FJL053EjeudOxIfpSSwzdKIQ2AbesuuH4ybIOKkjP0BBA3RnIpQ22IJQr5MGKV1j2WtfrWkqeJGuhgejW4PTfeP86x8RyY1DMiAgsaLGJhMRXG063rI0txOk1g2dw45ceCICbWqAYcIQWDTyXE0wCJMaGJ-1698-5xxDu89nqKQB9OcGrB9TeR92ZHd7LXhPyePsGRD0eYeUPAZSd5EHslCDA8Rsw2BOgjgqjICu_IQT7n119yd7anbn-ekEtr5F-R1VQ7nTrnp1BSlBy13AIfcxLbrKNuUW6iybWdUL3Q"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "x": "KINM0n9XG6PDxfcPFDQ3tPA1CRETVPGforF_3XigCpc",
      "y": "yrGCv1PJYCcFgRvLxtpdaFdoNo-swdh8rmYfe4aEsGk",
      "alg": "ECDH-ES"
    }
  ]
}
2021-10-08 08:44:50 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2021-10-08 08:44:50 SUCCESS
OIDCCLoadUserInfo
Added user information
user_info
{
  "sub": "user-subject-1234531",
  "name": "Demo T. User",
  "given_name": "Demo",
  "family_name": "User",
  "middle_name": "Theresa",
  "nickname": "Dee",
  "preferred_username": "d.tu",
  "gender": "female",
  "birthdate": "2000-02-03",
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "zoneinfo": "America/Los_Angeles",
  "locale": "en-US",
  "phone_number": "+1 555 5550000",
  "phone_number_verified": false,
  "email": "user@example.com",
  "email_verified": false,
  "website": "https://openid.net/",
  "updated_at": 1580000000
}
2021-10-08 08:44:50
StoreOriginalClientConfiguration
No client details on configuration, created an empty original_client_config object.
2021-10-08 08:44:50
ExtractClientNameFromStoredConfig
Extracted client_name from stored client configuration.
client_name
2021-10-08 08:44:50
oidcc-client-test-kid-absent-multiple-jwks
Setup Done
2021-10-08 08:44:56 INCOMING
oidcc-client-test-kid-absent-multiple-jwks
Incoming HTTP request to test instance 64p0ZEpifleSGaB
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "python-requests/2.25.1",
  "accept-encoding": "gzip, deflate",
  "accept": "*/*",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
.well-known/openid-configuration
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Discovery endpoint
2021-10-08 08:44:56 OUTGOING
oidcc-client-test-kid-absent-multiple-jwks
Response to HTTP request to test instance 64p0ZEpifleSGaB
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "issuer": "https://www.certification.openid.net/test/a/idpy/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/idpy/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/idpy/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/idpy/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/idpy/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/idpy/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
outgoing_path
.well-known/openid-configuration
2021-10-08 08:44:57 INCOMING
oidcc-client-test-kid-absent-multiple-jwks
Incoming HTTP request to test instance 64p0ZEpifleSGaB
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "python-requests/2.25.1",
  "accept-encoding": "gzip, deflate",
  "accept": "*/*",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
jwks
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Jwks endpoint
2021-10-08 08:44:57 OUTGOING
oidcc-client-test-kid-absent-multiple-jwks
Response to HTTP request to test instance 64p0ZEpifleSGaB
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "n": "quY9W9Yc930rbWU-79jQlqzPdAtKqyxl12hAv2WcZ7RW7LYZNItApJ5V--xO5H_G7EeLXTqTzRrD_lhJCPXrVpw8t51IJqNUWUb66v2DBMMQS1XctAL4hmFEqsC3ejHS1zmgNIymWxSC_FKgMIwWLvx10YXMnFNwZZjVtF528JTq0DhF9SZUm6QEep_VV8Y18biJCk5BPmOz2LdWBu2UpwYbPdb0s_earT90rdijjOE0nkFdT7nYzeoqoj2wntq_ckghHCZohIYO0uQVwB3cbrSmpX4JSE2By7nFoI6iqWvjWY_Omn9TFDKmlY9P7Zbgj8HEk8Ne0vOPkFhKgKa2xQ"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "n": "tk2sWvzQPs9Xy2Q0amKEVL_BOHFTSBtiuab_joFuTW2uxEjaQfXc9xCvhpa_PEDP5mKwcn4mUWT4Pns1EFMI0IAI1ybyKa1NGHlfVdgUD3iSxfZuFmDOSy4JCXNaMZqI0zG575rWBAcrv7xNkjgkv9HH9QCujv49YHAfaEUmrbNaxHMmszv4T_Tz60E5TgoDIxU8gxYAyWJtMdoKYjKrdHqUaOQxDZCR5YAKIFJWW1OD34hLyeiijyjsAvo-iUIHxprEkLb7cO9h2NjDmlEcvymqiT3XQuMafguAbFmqhyck2DqaxmmIiU-HeEQ_F-vHm5Ct6i9INKkQr2nqZF_R-Q"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "n": "vayPRtmsEMlpDuYoCNdAOZCN0oQJosVFmEb7RYyGAP3oxQLyb2bKObaLq7YJf4uMcLRYmN9YbkUSCaBPCPJX5dv6GVIOUlNngM2oYT2v23gMqzGNqDQVD87Ole75SpahXh8ImH17evmmB7GZi9yYqPYRufBq0ncqXijGD74gex7Nexllkot7JrK9_jAfzOCCsLqkdqriEt8IjCWlflItz3_MVmYoGKTPgukvFZpeFxR--qB6QXCcBKh5Yk99wiS0WCUu3PvHVyrxFrA1CmDF4RZbtO0zo8LuotM-qLN-mXJ1w1pjjk6fm2YmWczDb1ypUuOV5ZrEuVEoF8bqESoSuQ"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "x": "f5Y6lgLPCSc5SE4UvodeKTF5kJpBdB6jaG2toPbUL_U",
      "y": "_OxAU1ahN_mApb7FAyA_b-m-oDhsvtB2S6Azg1Wuuh4"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "x": "l8JQcitOGySLaBKpsmdnIWmHtX39bQF_wSWtAKXP9xw",
      "y": "T8W7Z9KCOfwpCBbwaqevYb9nIz29Gv4Hn1onS6opuu0"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "x": "XCYoWvQyW-07CllCYYRA7y-i0xzZx05XZYyvo6Knl5M",
      "y": "67QXLy6BqtOUMsTmtQFoGZQ5eVqSCK4iUAIr37IcrmE"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "x": "5maz4lD0Tn563IVxkwiDxZIIZHIvHnNPeOOkZR4Wa5k",
      "y": "u7XK4a23c8AC3wnp5aIB6JuxZrPQ9-l8tli3-Xn3pFk"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "x": "gonsYMaJD-xw4eOndx9RuBQfA3sxMV2pzBfJbQBAkJw",
      "y": "XpmTmQXgGXeKU8A4BAA7x4NGQ2Ucs5MLmeUaieFKPqk"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "x": "-x85ItES9dVTN31p4TsGj0pqai9ehjFOi03v1urPl3E",
      "y": "HOnjLUZp0-pETnGM8L7Opo83WVQcJOaWuWHusCL012Q"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "x": "9nyYM_XcXcKGXKpheHFZf-8KKLx6ljuehgHw0B4zW4M"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "x": "emmMtxa2NzmmCo1YAqLve_Xq1v8v8mHd2kEsqYk4c9s"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "x": "43m5HMhaySGmDHucFJXVAIW6-zj5shRZ51TWQq7-svs"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "alg": "RSA-OAEP",
      "n": "mfttIoaHtoBZTzaaUPk-9pPsWd_poPicQFZd8rLWlC05FJL053EjeudOxIfpSSwzdKIQ2AbesuuH4ybIOKkjP0BBA3RnIpQ22IJQr5MGKV1j2WtfrWkqeJGuhgejW4PTfeP86x8RyY1DMiAgsaLGJhMRXG063rI0txOk1g2dw45ceCICbWqAYcIQWDTyXE0wCJMaGJ-1698-5xxDu89nqKQB9OcGrB9TeR92ZHd7LXhPyePsGRD0eYeUPAZSd5EHslCDA8Rsw2BOgjgqjICu_IQT7n119yd7anbn-ekEtr5F-R1VQ7nTrnp1BSlBy13AIfcxLbrKNuUW6iybWdUL3Q"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "x": "KINM0n9XG6PDxfcPFDQ3tPA1CRETVPGforF_3XigCpc",
      "y": "yrGCv1PJYCcFgRvLxtpdaFdoNo-swdh8rmYfe4aEsGk",
      "alg": "ECDH-ES"
    }
  ]
}
outgoing_path
jwks
2021-10-08 08:44:57 INCOMING
oidcc-client-test-kid-absent-multiple-jwks
Incoming HTTP request to test instance 64p0ZEpifleSGaB
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "python-requests/2.25.1",
  "accept-encoding": "gzip, deflate",
  "accept": "*/*",
  "content-type": "application/json",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "493",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
register
incoming_body_form_params
incoming_method
POST
incoming_body_json
{
  "application_type": "web",
  "response_types": [
    "code",
    "id_token"
  ],
  "contacts": [
    "ops@example.com"
  ],
  "token_endpoint_auth_method": "client_secret_basic",
  "redirect_uris": [
    "https://89.45.234.133:8090/authz_cb/eccb975432ec1bb764071d1a780e3a1717199ff37940f31d902ce3e0adb0eb9f",
    "https://89.45.234.133:8090/authz_im_cb/eccb975432ec1bb764071d1a780e3a1717199ff37940f31d902ce3e0adb0eb9f"
  ],
  "jwks_uri": "https://89.45.234.133:8090/static/jwks.json",
  "grant_types": [
    "authorization_code",
    "implicit"
  ]
}
incoming_query_string_params
{}
incoming_body
{"application_type": "web", "response_types": ["code", "id_token"], "contacts": ["ops@example.com"], "token_endpoint_auth_method": "client_secret_basic", "redirect_uris": ["https://89.45.234.133:8090/authz_cb/eccb975432ec1bb764071d1a780e3a1717199ff37940f31d902ce3e0adb0eb9f", "https://89.45.234.133:8090/authz_im_cb/eccb975432ec1bb764071d1a780e3a1717199ff37940f31d902ce3e0adb0eb9f"], "jwks_uri": "https://89.45.234.133:8090/static/jwks.json", "grant_types": ["authorization_code", "implicit"]}
Registration endpoint
2021-10-08 08:44:57 SUCCESS
OIDCCExtractDynamicRegistrationRequest
Extracted dynamic client registration request
request
{
  "application_type": "web",
  "response_types": [
    "code",
    "id_token"
  ],
  "contacts": [
    "ops@example.com"
  ],
  "token_endpoint_auth_method": "client_secret_basic",
  "redirect_uris": [
    "https://89.45.234.133:8090/authz_cb/eccb975432ec1bb764071d1a780e3a1717199ff37940f31d902ce3e0adb0eb9f",
    "https://89.45.234.133:8090/authz_im_cb/eccb975432ec1bb764071d1a780e3a1717199ff37940f31d902ce3e0adb0eb9f"
  ],
  "jwks_uri": "https://89.45.234.133:8090/static/jwks.json",
  "grant_types": [
    "authorization_code",
    "implicit"
  ]
}
2021-10-08 08:44:57 SUCCESS
EnsureRegistrationRequestContainsAtLeastOneContact
Registration request contains valid contacts
contacts
[
  "ops@example.com"
]
2021-10-08 08:44:57 SUCCESS
ValidateClientGrantTypes
grant_types match response_types
grant_types
[
  "authorization_code",
  "implicit"
]
response_types
[
  "code",
  "id_token"
]
2021-10-08 08:44:57 SUCCESS
OIDCCValidateClientRedirectUris
Valid redirect_uri(s) provided in registration request
redirect_uris
[
  "https://89.45.234.133:8090/authz_cb/eccb975432ec1bb764071d1a780e3a1717199ff37940f31d902ce3e0adb0eb9f",
  "https://89.45.234.133:8090/authz_im_cb/eccb975432ec1bb764071d1a780e3a1717199ff37940f31d902ce3e0adb0eb9f"
]
2021-10-08 08:44:57 SUCCESS
ValidateClientLogoUris
Client does not contain any logo_uri
2021-10-08 08:44:57 SUCCESS
ValidateClientUris
Client does not contain any client_uri
2021-10-08 08:44:57 SUCCESS
ValidateClientPolicyUris
Client does not contain any policy_uri
2021-10-08 08:44:57 SUCCESS
ValidateClientTosUris
Client does not contain any tos_uri
2021-10-08 08:44:57 SUCCESS
ValidateClientSubjectType
A subject_type was not provided
2021-10-08 08:44:57 INFO
ValidateIdTokenSignedResponseAlg
Skipped evaluation due to missing required element: client id_token_signed_response_alg
path
id_token_signed_response_alg
mapped
object
client
2021-10-08 08:44:57 SUCCESS
EnsureIdTokenEncryptedResponseAlgIsSetIfEncIsSet
id_token_encrypted_response_enc is not set
2021-10-08 08:44:57 INFO
ValidateUserinfoSignedResponseAlg
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2021-10-08 08:44:57 SUCCESS
EnsureUserinfoEncryptedResponseAlgIsSetIfEncIsSet
userinfo_encrypted_response_enc is not set
2021-10-08 08:44:57 INFO
ValidateRequestObjectSigningAlg
Skipped evaluation due to missing required element: client request_object_signing_alg
path
request_object_signing_alg
mapped
object
client
2021-10-08 08:44:57 SUCCESS
EnsureRequestObjectEncryptionAlgIsSetIfEncIsSet
request_object_encryption_enc is not set
2021-10-08 08:44:57 INFO
ValidateTokenEndpointAuthSigningAlg
Skipped evaluation due to missing required element: client token_endpoint_auth_signing_alg
path
token_endpoint_auth_signing_alg
mapped
object
client
2021-10-08 08:44:57 SUCCESS
ValidateDefaultMaxAge
default_max_age is not set
2021-10-08 08:44:57 INFO
ValidateRequireAuthTime
Skipped evaluation due to missing required element: client require_auth_time
path
require_auth_time
mapped
object
client
2021-10-08 08:44:57 INFO
ValidateDefaultAcrValues
Skipped evaluation due to missing required element: client default_acr_values
path
default_acr_values
mapped
object
client
2021-10-08 08:44:57 INFO
ValidateInitiateLoginUri
Skipped evaluation due to missing required element: client initiate_login_uri
path
initiate_login_uri
mapped
object
client
2021-10-08 08:44:57 INFO
ValidateRequestUris
Skipped evaluation due to missing required element: client request_uris
path
request_uris
mapped
object
client
2021-10-08 08:44:57 SUCCESS
ValidateClientRegistrationRequestSectorIdentifierUri
A sector_identifier_uri was not provided
2021-10-08 08:44:57 SUCCESS
OIDCCRegisterClient
Registered client
client
{
  "application_type": "web",
  "response_types": [
    "code",
    "id_token"
  ],
  "contacts": [
    "ops@example.com"
  ],
  "token_endpoint_auth_method": "client_secret_basic",
  "redirect_uris": [
    "https://89.45.234.133:8090/authz_cb/eccb975432ec1bb764071d1a780e3a1717199ff37940f31d902ce3e0adb0eb9f",
    "https://89.45.234.133:8090/authz_im_cb/eccb975432ec1bb764071d1a780e3a1717199ff37940f31d902ce3e0adb0eb9f"
  ],
  "jwks_uri": "https://89.45.234.133:8090/static/jwks.json",
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "client_id": "client_knsmEkqMhLGLHtR63429/*~.?"
}
2021-10-08 08:44:57
OIDCCCreateClientSecretForDynamicClient
Set the secret for registered client
client_secret
secret_KJveeaDRpHvgiWNuCAyzAurZUxQCLanwgPnByurdVKIArMhpQT7495957629- - ,
2021-10-08 08:44:57 SUCCESS
EnsureTokenEndPointAuthMethodIsClientSecretBasic
token_endpoint_auth_method is 'client_secret_basic' as expected
2021-10-08 08:44:57 SUCCESS
EnsureClientDoesNotHaveBothJwksAndJwksUri
Client does not have both jwks and jwks_uri set
client
{
  "application_type": "web",
  "response_types": [
    "code",
    "id_token"
  ],
  "contacts": [
    "ops@example.com"
  ],
  "token_endpoint_auth_method": "client_secret_basic",
  "redirect_uris": [
    "https://89.45.234.133:8090/authz_cb/eccb975432ec1bb764071d1a780e3a1717199ff37940f31d902ce3e0adb0eb9f",
    "https://89.45.234.133:8090/authz_im_cb/eccb975432ec1bb764071d1a780e3a1717199ff37940f31d902ce3e0adb0eb9f"
  ],
  "jwks_uri": "https://89.45.234.133:8090/static/jwks.json",
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "client_id": "client_knsmEkqMhLGLHtR63429/*~.?",
  "client_secret": "secret_KJveeaDRpHvgiWNuCAyzAurZUxQCLanwgPnByurdVKIArMhpQT7495957629- - ,"
}
2021-10-08 08:44:57
FetchClientKeys
Fetching client keys
jwks_uri
https://89.45.234.133:8090/static/jwks.json
2021-10-08 08:44:57
FetchClientKeys
HTTP request
request_uri
https://89.45.234.133:8090/static/jwks.json
request_method
GET
request_headers
{
  "accept": "text/plain, application/json, application/cbor, application/*+json, */*",
  "content-length": "0"
}
request_body

                                
2021-10-08 08:44:58 RESPONSE
FetchClientKeys
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "content-length": "691",
  "content-type": "application/json",
  "last-modified": "Fri, 08 Oct 2021 08:44:56 GMT",
  "cache-control": "public, max-age\u003d43200",
  "expires": "Fri, 08 Oct 2021 20:44:58 GMT",
  "etag": "\"1633682696.510315-691-625874018\"",
  "date": "Fri, 08 Oct 2021 08:44:58 GMT",
  "server": "Werkzeug/1.0.1 Python/3.8.10"
}
response_body
{"keys": [{"kty": "RSA", "use": "sig", "kid": "ZnM1b012dmhUSjh5X05VOUhpN0pXZVlSSEVjQ2J5dEkyQXEwTWQ2UjdhRQ", "n": "tkih6m_RcAr9RozD7IrHS0KjdLHSjMYuT2uRdtbTEJx1jBV6sDADoP3IskBFlwKssFAfZmtjSLETX7JUyIBkhUfTU0OKdVVrfTslfbUw4_m4OyaJmB6POycCH-zk-we9GnP1rjvfPIaaWLVtNM6r2wC-MTWv4MEL1sp-G0nj63oC53hc83q0pxaJqaDr7fMSZCUswL209DnSSn5aF80teBDUS-wOjLvihFIKSDZf0r3t9ObxYsT4tPbq7hQQc2K9XlYADfr-cmBQtwXg9h1jI31s5p-xI1SWzABQm2ZdCovcGjl9GopHsqtCINU7LCK7noRgwxHPERcJwDOX06IRmw", "e": "AQAB"}, {"kty": "EC", "use": "sig", "kid": "S0p4OFlHMzdtNzFjZlpoWkpKNnVmMHM1RHAyVlFtbXlrUjRhdjVpNXBLWQ", "crv": "P-256", "x": "MEFzjCvTrLMkOcRgdLWYpK4b_xrKOn5XAKJvOhYqZTM", "y": "-T_OakJ08j_rRP4Imn1p3L4rG60cQk72Nh4HX_tDDd0"}]}
2021-10-08 08:44:58
FetchClientKeys
Found JWK set string
jwk_string
{"keys": [{"kty": "RSA", "use": "sig", "kid": "ZnM1b012dmhUSjh5X05VOUhpN0pXZVlSSEVjQ2J5dEkyQXEwTWQ2UjdhRQ", "n": "tkih6m_RcAr9RozD7IrHS0KjdLHSjMYuT2uRdtbTEJx1jBV6sDADoP3IskBFlwKssFAfZmtjSLETX7JUyIBkhUfTU0OKdVVrfTslfbUw4_m4OyaJmB6POycCH-zk-we9GnP1rjvfPIaaWLVtNM6r2wC-MTWv4MEL1sp-G0nj63oC53hc83q0pxaJqaDr7fMSZCUswL209DnSSn5aF80teBDUS-wOjLvihFIKSDZf0r3t9ObxYsT4tPbq7hQQc2K9XlYADfr-cmBQtwXg9h1jI31s5p-xI1SWzABQm2ZdCovcGjl9GopHsqtCINU7LCK7noRgwxHPERcJwDOX06IRmw", "e": "AQAB"}, {"kty": "EC", "use": "sig", "kid": "S0p4OFlHMzdtNzFjZlpoWkpKNnVmMHM1RHAyVlFtbXlrUjRhdjVpNXBLWQ", "crv": "P-256", "x": "MEFzjCvTrLMkOcRgdLWYpK4b_xrKOn5XAKJvOhYqZTM", "y": "-T_OakJ08j_rRP4Imn1p3L4rG60cQk72Nh4HX_tDDd0"}]}
2021-10-08 08:44:58 SUCCESS
FetchClientKeys
Downloaded and added client JWK set to client
client
{
  "application_type": "web",
  "response_types": [
    "code",
    "id_token"
  ],
  "contacts": [
    "ops@example.com"
  ],
  "token_endpoint_auth_method": "client_secret_basic",
  "redirect_uris": [
    "https://89.45.234.133:8090/authz_cb/eccb975432ec1bb764071d1a780e3a1717199ff37940f31d902ce3e0adb0eb9f",
    "https://89.45.234.133:8090/authz_im_cb/eccb975432ec1bb764071d1a780e3a1717199ff37940f31d902ce3e0adb0eb9f"
  ],
  "jwks_uri": "https://89.45.234.133:8090/static/jwks.json",
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "client_id": "client_knsmEkqMhLGLHtR63429/*~.?",
  "client_secret": "secret_KJveeaDRpHvgiWNuCAyzAurZUxQCLanwgPnByurdVKIArMhpQT7495957629- - ,",
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "use": "sig",
        "kid": "ZnM1b012dmhUSjh5X05VOUhpN0pXZVlSSEVjQ2J5dEkyQXEwTWQ2UjdhRQ",
        "n": "tkih6m_RcAr9RozD7IrHS0KjdLHSjMYuT2uRdtbTEJx1jBV6sDADoP3IskBFlwKssFAfZmtjSLETX7JUyIBkhUfTU0OKdVVrfTslfbUw4_m4OyaJmB6POycCH-zk-we9GnP1rjvfPIaaWLVtNM6r2wC-MTWv4MEL1sp-G0nj63oC53hc83q0pxaJqaDr7fMSZCUswL209DnSSn5aF80teBDUS-wOjLvihFIKSDZf0r3t9ObxYsT4tPbq7hQQc2K9XlYADfr-cmBQtwXg9h1jI31s5p-xI1SWzABQm2ZdCovcGjl9GopHsqtCINU7LCK7noRgwxHPERcJwDOX06IRmw",
        "e": "AQAB"
      },
      {
        "kty": "EC",
        "use": "sig",
        "kid": "S0p4OFlHMzdtNzFjZlpoWkpKNnVmMHM1RHAyVlFtbXlrUjRhdjVpNXBLWQ",
        "crv": "P-256",
        "x": "MEFzjCvTrLMkOcRgdLWYpK4b_xrKOn5XAKJvOhYqZTM",
        "y": "-T_OakJ08j_rRP4Imn1p3L4rG60cQk72Nh4HX_tDDd0"
      }
    ]
  }
}
2021-10-08 08:44:58
SetServerSigningAlgToRS256
Successfully set signing algorithm to RS256
2021-10-08 08:44:58
SetClientIdTokenSignedResponseAlgToServerSigningAlg
Set id_token_signed_response_alg for the registered client
id_token_signed_response_alg
RS256
2021-10-08 08:44:58 OUTGOING
oidcc-client-test-kid-absent-multiple-jwks
Response to HTTP request to test instance 64p0ZEpifleSGaB
outgoing_status_code
201
outgoing_headers
{}
outgoing_body
{
  "application_type": "web",
  "response_types": [
    "code",
    "id_token"
  ],
  "contacts": [
    "ops@example.com"
  ],
  "token_endpoint_auth_method": "client_secret_basic",
  "redirect_uris": [
    "https://89.45.234.133:8090/authz_cb/eccb975432ec1bb764071d1a780e3a1717199ff37940f31d902ce3e0adb0eb9f",
    "https://89.45.234.133:8090/authz_im_cb/eccb975432ec1bb764071d1a780e3a1717199ff37940f31d902ce3e0adb0eb9f"
  ],
  "jwks_uri": "https://89.45.234.133:8090/static/jwks.json",
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "client_id": "client_knsmEkqMhLGLHtR63429/*~.?",
  "client_secret": "secret_KJveeaDRpHvgiWNuCAyzAurZUxQCLanwgPnByurdVKIArMhpQT7495957629- - ,",
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "use": "sig",
        "kid": "ZnM1b012dmhUSjh5X05VOUhpN0pXZVlSSEVjQ2J5dEkyQXEwTWQ2UjdhRQ",
        "n": "tkih6m_RcAr9RozD7IrHS0KjdLHSjMYuT2uRdtbTEJx1jBV6sDADoP3IskBFlwKssFAfZmtjSLETX7JUyIBkhUfTU0OKdVVrfTslfbUw4_m4OyaJmB6POycCH-zk-we9GnP1rjvfPIaaWLVtNM6r2wC-MTWv4MEL1sp-G0nj63oC53hc83q0pxaJqaDr7fMSZCUswL209DnSSn5aF80teBDUS-wOjLvihFIKSDZf0r3t9ObxYsT4tPbq7hQQc2K9XlYADfr-cmBQtwXg9h1jI31s5p-xI1SWzABQm2ZdCovcGjl9GopHsqtCINU7LCK7noRgwxHPERcJwDOX06IRmw",
        "e": "AQAB"
      },
      {
        "kty": "EC",
        "use": "sig",
        "kid": "S0p4OFlHMzdtNzFjZlpoWkpKNnVmMHM1RHAyVlFtbXlrUjRhdjVpNXBLWQ",
        "crv": "P-256",
        "x": "MEFzjCvTrLMkOcRgdLWYpK4b_xrKOn5XAKJvOhYqZTM",
        "y": "-T_OakJ08j_rRP4Imn1p3L4rG60cQk72Nh4HX_tDDd0"
      }
    ]
  },
  "id_token_signed_response_alg": "RS256"
}
outgoing_path
register
2021-10-08 08:44:58 INCOMING
oidcc-client-test-kid-absent-multiple-jwks
Incoming HTTP request to test instance 64p0ZEpifleSGaB
incoming_headers
{
  "host": "www.certification.openid.net",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,*/*;q\u003d0.8",
  "cookie": "JSESSIONID\u003d0E0601437642B0449830803A5B3B74D7; __utma\u003d201319536.1325286560.1632909994.1633446768.1633523692.11; __utmc\u003d201319536; __utmz\u003d201319536.1632985063.2.2.utmcsr\u003dt.co|utmccn\u003d(referral)|utmcmd\u003dreferral|utmcct\u003d/",
  "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/15.0 Safari/605.1.15",
  "accept-language": "en-us",
  "referer": "https://89.45.234.133:8090/",
  "accept-encoding": "gzip, deflate, br",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
authorize
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "redirect_uri": "https://89.45.234.133:8090/authz_im_cb/eccb975432ec1bb764071d1a780e3a1717199ff37940f31d902ce3e0adb0eb9f",
  "scope": "openid profile email address phone",
  "response_type": "code token",
  "nonce": "k2fKsOlc9BjXaAXqu2rT7lCe",
  "state": "06DAC8c8qqjrWNYjnw8VI0eOfmVjqhuK",
  "client_id": "client_knsmEkqMhLGLHtR63429/*~.?"
}
incoming_body
Authorization endpoint
2021-10-08 08:44:58 SUCCESS
EnsureRequestDoesNotContainRequestObject
Request does not contain a request parameter
2021-10-08 08:44:58 SUCCESS
EnsureAuthorizationHttpRequestContainsOpenIDScope
Found 'openid' in scope http request parameter
actual
[
  "openid",
  "profile",
  "email",
  "address",
  "phone"
]
expected
openid
2021-10-08 08:44:58 SUCCESS
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
effective_authorization_endpoint_request
{
  "redirect_uri": "https://89.45.234.133:8090/authz_im_cb/eccb975432ec1bb764071d1a780e3a1717199ff37940f31d902ce3e0adb0eb9f",
  "scope": "openid profile email address phone",
  "response_type": "code token",
  "nonce": "k2fKsOlc9BjXaAXqu2rT7lCe",
  "state": "06DAC8c8qqjrWNYjnw8VI0eOfmVjqhuK",
  "client_id": "client_knsmEkqMhLGLHtR63429/*~.?"
}
2021-10-08 08:44:58 SUCCESS
ExtractRequestedScopes
Requested scopes
scope
openid profile email address phone
2021-10-08 08:44:58 SUCCESS
ExtractNonceFromAuthorizationRequest
Extracted nonce
nonce
k2fKsOlc9BjXaAXqu2rT7lCe
2021-10-08 08:44:58 SUCCESS
EnsureResponseTypeIsCodeToken
Response type is expected value
expected
code token
2021-10-08 08:44:58 SUCCESS
EnsureMatchingClientId
Client ID matched
client_id
client_knsmEkqMhLGLHtR63429/*~.?
2021-10-08 08:44:58 SUCCESS
EnsureValidRedirectUriForAuthorizationEndpointRequest
redirect_uri is one of the allowed redirect uris
actual
https://89.45.234.133:8090/authz_im_cb/eccb975432ec1bb764071d1a780e3a1717199ff37940f31d902ce3e0adb0eb9f
expected
[
  "https://89.45.234.133:8090/authz_cb/eccb975432ec1bb764071d1a780e3a1717199ff37940f31d902ce3e0adb0eb9f",
  "https://89.45.234.133:8090/authz_im_cb/eccb975432ec1bb764071d1a780e3a1717199ff37940f31d902ce3e0adb0eb9f"
]
2021-10-08 08:44:58 SUCCESS
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
actual
[
  "openid",
  "profile",
  "email",
  "address",
  "phone"
]
expected
openid
2021-10-08 08:44:58 SUCCESS
DisallowMaxAgeEqualsZeroAndPromptNone
The client did not send max_age=0 and prompt=none parameters as expected
2021-10-08 08:44:58 SUCCESS
CreateAuthorizationCode
Created authorization code
authorization_code
3Q6O85sP4iB79YlfqvGxUGkCjaZgwd8y
2021-10-08 08:44:58 SUCCESS
CalculateCHash
Successful c_hash encoding
c_hash
h603jHr56hP6YUoPRam08Q
2021-10-08 08:44:58 SUCCESS
GenerateBearerAccessToken
Generated access token
access_token
wPikXNqJynpSTugcCuWosELA9Lofbi0b0KJixhLjDcndEkNCix
2021-10-08 08:44:58 SUCCESS
CalculateAtHash
Successful at_hash encoding
at_hash
E7HGIX2nBvVy30OYViTCGg
2021-10-08 08:44:58 SUCCESS
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
params
{
  "redirect_uri": "https://89.45.234.133:8090/authz_im_cb/eccb975432ec1bb764071d1a780e3a1717199ff37940f31d902ce3e0adb0eb9f",
  "state": "06DAC8c8qqjrWNYjnw8VI0eOfmVjqhuK"
}
2021-10-08 08:44:58 SUCCESS
AddCodeToAuthorizationEndpointResponseParams
Added code to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://89.45.234.133:8090/authz_im_cb/eccb975432ec1bb764071d1a780e3a1717199ff37940f31d902ce3e0adb0eb9f",
  "state": "06DAC8c8qqjrWNYjnw8VI0eOfmVjqhuK",
  "code": "3Q6O85sP4iB79YlfqvGxUGkCjaZgwd8y"
}
2021-10-08 08:44:58
AddTokenToAuthorizationEndpointResponseParams
Added token and token_type to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://89.45.234.133:8090/authz_im_cb/eccb975432ec1bb764071d1a780e3a1717199ff37940f31d902ce3e0adb0eb9f",
  "state": "06DAC8c8qqjrWNYjnw8VI0eOfmVjqhuK",
  "code": "3Q6O85sP4iB79YlfqvGxUGkCjaZgwd8y",
  "access_token": "wPikXNqJynpSTugcCuWosELA9Lofbi0b0KJixhLjDcndEkNCix",
  "token_type": "Bearer"
}
2021-10-08 08:44:58
SendAuthorizationResponseWithResponseModeFragment
Redirecting back to client
uri
https://89.45.234.133:8090/authz_im_cb/eccb975432ec1bb764071d1a780e3a1717199ff37940f31d902ce3e0adb0eb9f#state=06DAC8c8qqjrWNYjnw8VI0eOfmVjqhuK&code=3Q6O85sP4iB79YlfqvGxUGkCjaZgwd8y&access_token=wPikXNqJynpSTugcCuWosELA9Lofbi0b0KJixhLjDcndEkNCix&token_type=Bearer
2021-10-08 08:44:58 OUTGOING
oidcc-client-test-kid-absent-multiple-jwks
Response to HTTP request to test instance 64p0ZEpifleSGaB
outgoing
org.springframework.web.servlet.view.RedirectView: [RedirectView]; URL [https://89.45.234.133:8090/authz_im_cb/eccb975432ec1bb764071d1a780e3a1717199ff37940f31d902ce3e0adb0eb9f#state=06DAC8c8qqjrWNYjnw8VI0eOfmVjqhuK&code=3Q6O85sP4iB79YlfqvGxUGkCjaZgwd8y&access_token=wPikXNqJynpSTugcCuWosELA9Lofbi0b0KJixhLjDcndEkNCix&token_type=Bearer]
outgoing_path
authorize
2021-10-08 08:44:59 INCOMING
oidcc-client-test-kid-absent-multiple-jwks
Incoming HTTP request to test instance 64p0ZEpifleSGaB
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "python-requests/2.25.1",
  "accept-encoding": "gzip, deflate",
  "accept": "*/*",
  "authorization": "Basic Y2xpZW50X2tuc21Fa3FNaExHTEh0UjYzNDI5JTJGJTJBfi4lM0Y6c2VjcmV0X0tKdmVlYURScEh2Z2lXTnVDQXl6QXVyWlV4UUNMYW53Z1BuQnl1cmRWS0lBck1ocFFUNzQ5NTk1NzYyOS0rLSslMkM\u003d",
  "content-type": "application/x-www-form-urlencoded",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "284",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
token
incoming_body_form_params
{
  "grant_type": "authorization_code",
  "redirect_uri": "https://89.45.234.133:8090/authz_im_cb/eccb975432ec1bb764071d1a780e3a1717199ff37940f31d902ce3e0adb0eb9f",
  "client_id": "client_knsmEkqMhLGLHtR63429/*~.?",
  "state": "06DAC8c8qqjrWNYjnw8VI0eOfmVjqhuK",
  "code": "3Q6O85sP4iB79YlfqvGxUGkCjaZgwd8y"
}
incoming_method
POST
incoming_body_json
incoming_query_string_params
{}
incoming_body
grant_type=authorization_code&redirect_uri=https%3A%2F%2F89.45.234.133%3A8090%2Fauthz_im_cb%2Feccb975432ec1bb764071d1a780e3a1717199ff37940f31d902ce3e0adb0eb9f&client_id=client_knsmEkqMhLGLHtR63429%2F*%7E.%3F&state=06DAC8c8qqjrWNYjnw8VI0eOfmVjqhuK&code=3Q6O85sP4iB79YlfqvGxUGkCjaZgwd8y
Token endpoint
2021-10-08 08:44:59 SUCCESS
ExtractClientCredentialsFromBasicAuthorizationHeader
Extracted client authentication
client_id
client_knsmEkqMhLGLHtR63429/*~.?
client_secret
secret_KJveeaDRpHvgiWNuCAyzAurZUxQCLanwgPnByurdVKIArMhpQT7495957629- - ,
method
client_secret_basic
2021-10-08 08:44:59 SUCCESS
ValidateClientIdAndSecret
Client id and secret match
2021-10-08 08:44:59 SUCCESS
ValidateAuthorizationCode
Found authorization code
authorization_code
3Q6O85sP4iB79YlfqvGxUGkCjaZgwd8y
2021-10-08 08:44:59 SUCCESS
ValidateRedirectUriForTokenEndpointRequest
redirect_uri is the same as the one used in the authorization request
actual
https://89.45.234.133:8090/authz_im_cb/eccb975432ec1bb764071d1a780e3a1717199ff37940f31d902ce3e0adb0eb9f
2021-10-08 08:44:59 SUCCESS
GenerateBearerAccessToken
Generated access token
access_token
wdfjoRQo58rtl8maFIIp5Xv5PLkhcy9nLWofHHIjTXyEHyxOWy
2021-10-08 08:44:59 SUCCESS
CalculateAtHash
Successful at_hash encoding
at_hash
vVKh0rQ60xbEvRugTMu3sw
2021-10-08 08:44:59 SUCCESS
GenerateIdTokenClaims
Created ID Token Claims
iss
https://www.certification.openid.net/test/a/idpy/
sub
user-subject-1234531
aud
client_knsmEkqMhLGLHtR63429/*~.?
nonce
k2fKsOlc9BjXaAXqu2rT7lCe
iat
1633682699
exp
1633682999
2021-10-08 08:44:59 SUCCESS
AddAtHashToIdTokenClaims
Added at_hash to ID token claims
at_hash
vVKh0rQ60xbEvRugTMu3sw
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/a/idpy/",
  "sub": "user-subject-1234531",
  "aud": "client_knsmEkqMhLGLHtR63429/*~.?",
  "nonce": "k2fKsOlc9BjXaAXqu2rT7lCe",
  "iat": 1633682699,
  "exp": 1633682999,
  "at_hash": "vVKh0rQ60xbEvRugTMu3sw"
}
2021-10-08 08:44:59 SUCCESS
OIDCCSignIdToken
Signed the ID token
id_token
eyJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoidlZLaDByUTYweGJFdlJ1Z1RNdTNzdyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X2tuc21Fa3FNaExHTEh0UjYzNDI5XC8qfi4_IiwiaXNzIjoiaHR0cHM6XC9cL3d3dy5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXRcL3Rlc3RcL2FcL2lkcHlcLyIsImV4cCI6MTYzMzY4Mjk5OSwibm9uY2UiOiJrMmZLc09sYzlCalhhQVhxdTJyVDdsQ2UiLCJpYXQiOjE2MzM2ODI2OTl9.NVdgMZqP1eLPWWcBeSfUqtDSfEGDVfyqkqbfVnITXUkfYanzs5MMTarREWaEo7PXia4_NiKMWUPy6AI8OBvwFu9V51l9dP110RxildWkHG9Jt8X24y2vuGDINPaqNmLGm0PTk7gJS0q8eZKcXpNX6dT7RJiGeLoxXBrbPF75bhxZ_hgs0rCEQk4-WY-lfPKKcticXKB8urJOHnjMTcsdUOMD1aiS3bL9P0DLnzcd9iNNJq4ycHsOk4RWniKld3m4pZw8NdgHYVo_y7pv8uZraL_VXvfqBbiJQ7FeIF9SdXAbi97ijIrXmE0B412J0g3buv2vpi8WWwnpNO_P5Ts7yQ
key
{"p":"3dr_vZFG5PYXIIc7a5buoPcLgvGkcTH-LL-WNRiZid3CY6DHfxRVXZ1Aux7ARqZMgZ62uREB1vkVDDyqDxc4aZ4_iXItEfG2atFwrXyJHhwqghPO5OvaxAZutG_wRnn3dRySrKZhZpRDZKyMpVxOV9iEE0zWBUhb3VALRGssrq8","kty":"RSA","q":"xTOYO_qq5taCE3PuR68VVakqjs8ysqci-3Gv4qFGdihrydx-0MRtcoQD6Yns8uK-1GCgcRgZH084DtbaxI8vFP_FY9e5oDbSMVoCZVii5laXtnTiVBDtq7aSaur8RkhJEvpCzmGms2s3RwRyptI1_-vRp8ckEcwNThDM7rOnbss","d":"Sj7suVE0FHFUxJoP1bOkK1G4bvnY3rTTKdopBv3mDUfT29Lg8GrvEpWXVXM8cxjwGwaaDU69l4XhUEaatEHilCYcWskB54ddxcuIhz7MBO2ZzqDm2W3Q-tCXPHetPnEW4Fowt6PDQh6PKX_cCDtUB-W2aehvFBtL4VecwFep5KqXqg8yIyKnrQtNuZJhCsYRLCA6IriVFMDsWzpfjqovwBEPQXGVrYYp2NaGOTi7Ph9UMEYfItA0KUgq0h6OIYIw0AbCJL15RE2_2e7HDbsz0klofSqd87FEPxEJa4cXbO7xHvRECoWxTsb_QP0wI3qx4250UgfoG2eUTu6fOeh8oQ","e":"AQAB","use":"sig","qi":"LxoATySL2-TEr7K0EaH3F5jMZTlED7b7E33KRJEx7Dx1ANQizX7kXWSyqrTxqiG2uqDQyOSxRq9607CqiuHVIc1cEfuPKgBrJVbdgH-LJjuWB_O0v0IP8fTTK73xBhZNSKnpaRuRlph0l3LbCtJtN58aot6pIFqng260_wnhPeM","dp":"IKkM3St19F8GKJO_-6bMmoXD_BL20nM5p_zMcCSe9dzfsSsKM3sa1h1AWku8oqn4uVxUKgqG6s7gelyz7GTOuT3CvMlCOVIMOM18eQ3MYdJjr6Ka4riWDCWmRon0JWvvMh5yuVgFHsTU5w0_51gfcG8_glfdagms_He8MOZWPaE","dq":"cKeD3Sfa_9olHvXIdr0HhBMK0-B8BuFCM8CDiQU22oNG6F-FNsAwAg52qbB4Y1yzRWIZ5eGtYFyCGsAU49skO2vOGLaBPYxz0WupGLpk_Q8Uxk_Jh9rP25uF03yAN6pNzICZL4tLjw29210oHjLSVGwkLiOucFhQdXtVhzusd7c","n":"quY9W9Yc930rbWU-79jQlqzPdAtKqyxl12hAv2WcZ7RW7LYZNItApJ5V--xO5H_G7EeLXTqTzRrD_lhJCPXrVpw8t51IJqNUWUb66v2DBMMQS1XctAL4hmFEqsC3ejHS1zmgNIymWxSC_FKgMIwWLvx10YXMnFNwZZjVtF528JTq0DhF9SZUm6QEep_VV8Y18biJCk5BPmOz2LdWBu2UpwYbPdb0s_earT90rdijjOE0nkFdT7nYzeoqoj2wntq_ckghHCZohIYO0uQVwB3cbrSmpX4JSE2By7nFoI6iqWvjWY_Omn9TFDKmlY9P7Zbgj8HEk8Ne0vOPkFhKgKa2xQ"}
algorithm
RS256
2021-10-08 08:44:59 INFO
EncryptIdToken
Skipped evaluation due to missing required element: client id_token_encrypted_response_alg
path
id_token_encrypted_response_alg
mapped
object
client
2021-10-08 08:44:59 SUCCESS
CreateTokenEndpointResponse
Created token endpoint response
access_token
wdfjoRQo58rtl8maFIIp5Xv5PLkhcy9nLWofHHIjTXyEHyxOWy
token_type
Bearer
id_token
eyJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoidlZLaDByUTYweGJFdlJ1Z1RNdTNzdyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X2tuc21Fa3FNaExHTEh0UjYzNDI5XC8qfi4_IiwiaXNzIjoiaHR0cHM6XC9cL3d3dy5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXRcL3Rlc3RcL2FcL2lkcHlcLyIsImV4cCI6MTYzMzY4Mjk5OSwibm9uY2UiOiJrMmZLc09sYzlCalhhQVhxdTJyVDdsQ2UiLCJpYXQiOjE2MzM2ODI2OTl9.NVdgMZqP1eLPWWcBeSfUqtDSfEGDVfyqkqbfVnITXUkfYanzs5MMTarREWaEo7PXia4_NiKMWUPy6AI8OBvwFu9V51l9dP110RxildWkHG9Jt8X24y2vuGDINPaqNmLGm0PTk7gJS0q8eZKcXpNX6dT7RJiGeLoxXBrbPF75bhxZ_hgs0rCEQk4-WY-lfPKKcticXKB8urJOHnjMTcsdUOMD1aiS3bL9P0DLnzcd9iNNJq4ycHsOk4RWniKld3m4pZw8NdgHYVo_y7pv8uZraL_VXvfqBbiJQ7FeIF9SdXAbi97ijIrXmE0B412J0g3buv2vpi8WWwnpNO_P5Ts7yQ
scope
openid profile email address phone
2021-10-08 08:44:59 OUTGOING
oidcc-client-test-kid-absent-multiple-jwks
Response to HTTP request to test instance 64p0ZEpifleSGaB
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "access_token": "wdfjoRQo58rtl8maFIIp5Xv5PLkhcy9nLWofHHIjTXyEHyxOWy",
  "token_type": "Bearer",
  "id_token": "eyJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoidlZLaDByUTYweGJFdlJ1Z1RNdTNzdyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X2tuc21Fa3FNaExHTEh0UjYzNDI5XC8qfi4_IiwiaXNzIjoiaHR0cHM6XC9cL3d3dy5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXRcL3Rlc3RcL2FcL2lkcHlcLyIsImV4cCI6MTYzMzY4Mjk5OSwibm9uY2UiOiJrMmZLc09sYzlCalhhQVhxdTJyVDdsQ2UiLCJpYXQiOjE2MzM2ODI2OTl9.NVdgMZqP1eLPWWcBeSfUqtDSfEGDVfyqkqbfVnITXUkfYanzs5MMTarREWaEo7PXia4_NiKMWUPy6AI8OBvwFu9V51l9dP110RxildWkHG9Jt8X24y2vuGDINPaqNmLGm0PTk7gJS0q8eZKcXpNX6dT7RJiGeLoxXBrbPF75bhxZ_hgs0rCEQk4-WY-lfPKKcticXKB8urJOHnjMTcsdUOMD1aiS3bL9P0DLnzcd9iNNJq4ycHsOk4RWniKld3m4pZw8NdgHYVo_y7pv8uZraL_VXvfqBbiJQ7FeIF9SdXAbi97ijIrXmE0B412J0g3buv2vpi8WWwnpNO_P5Ts7yQ",
  "scope": "openid profile email address phone"
}
outgoing_path
token
2021-10-08 08:44:59 INCOMING
oidcc-client-test-kid-absent-multiple-jwks
Incoming HTTP request to test instance 64p0ZEpifleSGaB
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "python-requests/2.25.1",
  "accept-encoding": "gzip, deflate",
  "accept": "*/*",
  "if-modified-since": "Fri, 08 Oct 2021 08:44:56 GMT",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
jwks
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Jwks endpoint
2021-10-08 08:44:59 OUTGOING
oidcc-client-test-kid-absent-multiple-jwks
Response to HTTP request to test instance 64p0ZEpifleSGaB
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "n": "quY9W9Yc930rbWU-79jQlqzPdAtKqyxl12hAv2WcZ7RW7LYZNItApJ5V--xO5H_G7EeLXTqTzRrD_lhJCPXrVpw8t51IJqNUWUb66v2DBMMQS1XctAL4hmFEqsC3ejHS1zmgNIymWxSC_FKgMIwWLvx10YXMnFNwZZjVtF528JTq0DhF9SZUm6QEep_VV8Y18biJCk5BPmOz2LdWBu2UpwYbPdb0s_earT90rdijjOE0nkFdT7nYzeoqoj2wntq_ckghHCZohIYO0uQVwB3cbrSmpX4JSE2By7nFoI6iqWvjWY_Omn9TFDKmlY9P7Zbgj8HEk8Ne0vOPkFhKgKa2xQ"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "n": "tk2sWvzQPs9Xy2Q0amKEVL_BOHFTSBtiuab_joFuTW2uxEjaQfXc9xCvhpa_PEDP5mKwcn4mUWT4Pns1EFMI0IAI1ybyKa1NGHlfVdgUD3iSxfZuFmDOSy4JCXNaMZqI0zG575rWBAcrv7xNkjgkv9HH9QCujv49YHAfaEUmrbNaxHMmszv4T_Tz60E5TgoDIxU8gxYAyWJtMdoKYjKrdHqUaOQxDZCR5YAKIFJWW1OD34hLyeiijyjsAvo-iUIHxprEkLb7cO9h2NjDmlEcvymqiT3XQuMafguAbFmqhyck2DqaxmmIiU-HeEQ_F-vHm5Ct6i9INKkQr2nqZF_R-Q"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "n": "vayPRtmsEMlpDuYoCNdAOZCN0oQJosVFmEb7RYyGAP3oxQLyb2bKObaLq7YJf4uMcLRYmN9YbkUSCaBPCPJX5dv6GVIOUlNngM2oYT2v23gMqzGNqDQVD87Ole75SpahXh8ImH17evmmB7GZi9yYqPYRufBq0ncqXijGD74gex7Nexllkot7JrK9_jAfzOCCsLqkdqriEt8IjCWlflItz3_MVmYoGKTPgukvFZpeFxR--qB6QXCcBKh5Yk99wiS0WCUu3PvHVyrxFrA1CmDF4RZbtO0zo8LuotM-qLN-mXJ1w1pjjk6fm2YmWczDb1ypUuOV5ZrEuVEoF8bqESoSuQ"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "x": "f5Y6lgLPCSc5SE4UvodeKTF5kJpBdB6jaG2toPbUL_U",
      "y": "_OxAU1ahN_mApb7FAyA_b-m-oDhsvtB2S6Azg1Wuuh4"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "x": "l8JQcitOGySLaBKpsmdnIWmHtX39bQF_wSWtAKXP9xw",
      "y": "T8W7Z9KCOfwpCBbwaqevYb9nIz29Gv4Hn1onS6opuu0"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "x": "XCYoWvQyW-07CllCYYRA7y-i0xzZx05XZYyvo6Knl5M",
      "y": "67QXLy6BqtOUMsTmtQFoGZQ5eVqSCK4iUAIr37IcrmE"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "x": "5maz4lD0Tn563IVxkwiDxZIIZHIvHnNPeOOkZR4Wa5k",
      "y": "u7XK4a23c8AC3wnp5aIB6JuxZrPQ9-l8tli3-Xn3pFk"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "x": "gonsYMaJD-xw4eOndx9RuBQfA3sxMV2pzBfJbQBAkJw",
      "y": "XpmTmQXgGXeKU8A4BAA7x4NGQ2Ucs5MLmeUaieFKPqk"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "x": "-x85ItES9dVTN31p4TsGj0pqai9ehjFOi03v1urPl3E",
      "y": "HOnjLUZp0-pETnGM8L7Opo83WVQcJOaWuWHusCL012Q"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "x": "9nyYM_XcXcKGXKpheHFZf-8KKLx6ljuehgHw0B4zW4M"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "x": "emmMtxa2NzmmCo1YAqLve_Xq1v8v8mHd2kEsqYk4c9s"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "x": "43m5HMhaySGmDHucFJXVAIW6-zj5shRZ51TWQq7-svs"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "alg": "RSA-OAEP",
      "n": "mfttIoaHtoBZTzaaUPk-9pPsWd_poPicQFZd8rLWlC05FJL053EjeudOxIfpSSwzdKIQ2AbesuuH4ybIOKkjP0BBA3RnIpQ22IJQr5MGKV1j2WtfrWkqeJGuhgejW4PTfeP86x8RyY1DMiAgsaLGJhMRXG063rI0txOk1g2dw45ceCICbWqAYcIQWDTyXE0wCJMaGJ-1698-5xxDu89nqKQB9OcGrB9TeR92ZHd7LXhPyePsGRD0eYeUPAZSd5EHslCDA8Rsw2BOgjgqjICu_IQT7n119yd7anbn-ekEtr5F-R1VQ7nTrnp1BSlBy13AIfcxLbrKNuUW6iybWdUL3Q"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "x": "KINM0n9XG6PDxfcPFDQ3tPA1CRETVPGforF_3XigCpc",
      "y": "yrGCv1PJYCcFgRvLxtpdaFdoNo-swdh8rmYfe4aEsGk",
      "alg": "ECDH-ES"
    }
  ]
}
outgoing_path
jwks
2021-10-08 08:45:00 INCOMING
oidcc-client-test-kid-absent-multiple-jwks
Incoming HTTP request to test instance 64p0ZEpifleSGaB
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "python-requests/2.25.1",
  "accept-encoding": "gzip, deflate",
  "accept": "*/*",
  "if-modified-since": "Fri, 08 Oct 2021 08:44:59 GMT",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
jwks
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Jwks endpoint
2021-10-08 08:45:00 OUTGOING
oidcc-client-test-kid-absent-multiple-jwks
Response to HTTP request to test instance 64p0ZEpifleSGaB
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "n": "quY9W9Yc930rbWU-79jQlqzPdAtKqyxl12hAv2WcZ7RW7LYZNItApJ5V--xO5H_G7EeLXTqTzRrD_lhJCPXrVpw8t51IJqNUWUb66v2DBMMQS1XctAL4hmFEqsC3ejHS1zmgNIymWxSC_FKgMIwWLvx10YXMnFNwZZjVtF528JTq0DhF9SZUm6QEep_VV8Y18biJCk5BPmOz2LdWBu2UpwYbPdb0s_earT90rdijjOE0nkFdT7nYzeoqoj2wntq_ckghHCZohIYO0uQVwB3cbrSmpX4JSE2By7nFoI6iqWvjWY_Omn9TFDKmlY9P7Zbgj8HEk8Ne0vOPkFhKgKa2xQ"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "n": "tk2sWvzQPs9Xy2Q0amKEVL_BOHFTSBtiuab_joFuTW2uxEjaQfXc9xCvhpa_PEDP5mKwcn4mUWT4Pns1EFMI0IAI1ybyKa1NGHlfVdgUD3iSxfZuFmDOSy4JCXNaMZqI0zG575rWBAcrv7xNkjgkv9HH9QCujv49YHAfaEUmrbNaxHMmszv4T_Tz60E5TgoDIxU8gxYAyWJtMdoKYjKrdHqUaOQxDZCR5YAKIFJWW1OD34hLyeiijyjsAvo-iUIHxprEkLb7cO9h2NjDmlEcvymqiT3XQuMafguAbFmqhyck2DqaxmmIiU-HeEQ_F-vHm5Ct6i9INKkQr2nqZF_R-Q"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "n": "vayPRtmsEMlpDuYoCNdAOZCN0oQJosVFmEb7RYyGAP3oxQLyb2bKObaLq7YJf4uMcLRYmN9YbkUSCaBPCPJX5dv6GVIOUlNngM2oYT2v23gMqzGNqDQVD87Ole75SpahXh8ImH17evmmB7GZi9yYqPYRufBq0ncqXijGD74gex7Nexllkot7JrK9_jAfzOCCsLqkdqriEt8IjCWlflItz3_MVmYoGKTPgukvFZpeFxR--qB6QXCcBKh5Yk99wiS0WCUu3PvHVyrxFrA1CmDF4RZbtO0zo8LuotM-qLN-mXJ1w1pjjk6fm2YmWczDb1ypUuOV5ZrEuVEoF8bqESoSuQ"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "x": "f5Y6lgLPCSc5SE4UvodeKTF5kJpBdB6jaG2toPbUL_U",
      "y": "_OxAU1ahN_mApb7FAyA_b-m-oDhsvtB2S6Azg1Wuuh4"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "x": "l8JQcitOGySLaBKpsmdnIWmHtX39bQF_wSWtAKXP9xw",
      "y": "T8W7Z9KCOfwpCBbwaqevYb9nIz29Gv4Hn1onS6opuu0"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "x": "XCYoWvQyW-07CllCYYRA7y-i0xzZx05XZYyvo6Knl5M",
      "y": "67QXLy6BqtOUMsTmtQFoGZQ5eVqSCK4iUAIr37IcrmE"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "x": "5maz4lD0Tn563IVxkwiDxZIIZHIvHnNPeOOkZR4Wa5k",
      "y": "u7XK4a23c8AC3wnp5aIB6JuxZrPQ9-l8tli3-Xn3pFk"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "x": "gonsYMaJD-xw4eOndx9RuBQfA3sxMV2pzBfJbQBAkJw",
      "y": "XpmTmQXgGXeKU8A4BAA7x4NGQ2Ucs5MLmeUaieFKPqk"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "x": "-x85ItES9dVTN31p4TsGj0pqai9ehjFOi03v1urPl3E",
      "y": "HOnjLUZp0-pETnGM8L7Opo83WVQcJOaWuWHusCL012Q"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "x": "9nyYM_XcXcKGXKpheHFZf-8KKLx6ljuehgHw0B4zW4M"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "x": "emmMtxa2NzmmCo1YAqLve_Xq1v8v8mHd2kEsqYk4c9s"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "x": "43m5HMhaySGmDHucFJXVAIW6-zj5shRZ51TWQq7-svs"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "alg": "RSA-OAEP",
      "n": "mfttIoaHtoBZTzaaUPk-9pPsWd_poPicQFZd8rLWlC05FJL053EjeudOxIfpSSwzdKIQ2AbesuuH4ybIOKkjP0BBA3RnIpQ22IJQr5MGKV1j2WtfrWkqeJGuhgejW4PTfeP86x8RyY1DMiAgsaLGJhMRXG063rI0txOk1g2dw45ceCICbWqAYcIQWDTyXE0wCJMaGJ-1698-5xxDu89nqKQB9OcGrB9TeR92ZHd7LXhPyePsGRD0eYeUPAZSd5EHslCDA8Rsw2BOgjgqjICu_IQT7n119yd7anbn-ekEtr5F-R1VQ7nTrnp1BSlBy13AIfcxLbrKNuUW6iybWdUL3Q"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "x": "KINM0n9XG6PDxfcPFDQ3tPA1CRETVPGforF_3XigCpc",
      "y": "yrGCv1PJYCcFgRvLxtpdaFdoNo-swdh8rmYfe4aEsGk",
      "alg": "ECDH-ES"
    }
  ]
}
outgoing_path
jwks
2021-10-08 08:45:04 FINISHED
oidcc-client-test-kid-absent-multiple-jwks
Test has run to completion
testmodule_result
PASSED
2021-10-08 08:45:10
TEST-RUNNER
Alias has now been claimed by another test
alias
idpy
new_test_id
USFHuUfFLjBfSw1
Test Results