Test Summary

Test Results

Expand All Collapse All
All times are UTC
2021-10-08 09:08:42 INFO
TEST-RUNNER
Test instance 5Yw2bodeRAxhVwb created
baseUrl
https://www.certification.openid.net/test/a/idpy
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code token",
  "request_type": "plain_http_request",
  "response_mode": "default",
  "client_registration": "dynamic_client"
}
alias
idpy
description
oidcrp
planId
DzQn2tM8FOnAc
config
{
  "alias": "idpy",
  "description": "oidcrp",
  "server": {
    "discoveryUrl": "https://89.45.234.133:4000/.well-known/openid-configuration",
    "login_hint": "roland@89.45.234.133:4000"
  },
  "client2": {
    "client_name": "Anything"
  }
}
testName
oidcc-client-test-invalid-iss
2021-10-08 09:08:42 SUCCESS
OIDCCGenerateServerConfiguration
Generated default server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/idpy/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/idpy/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/idpy/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/idpy/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/idpy/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/idpy/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post",
    "client_secret_jwt",
    "private_key_jwt"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2021-10-08 09:08:42
SetTokenEndpointAuthMethodsSupportedToClientSecretBasicOnly
Changed token_endpoint_auth_methods_supported to client_secret_basic only in server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/idpy/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/idpy/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/idpy/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/idpy/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/idpy/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/idpy/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2021-10-08 09:08:42
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "7S6YqonS3sNOC4OSszQvMAeRKuSoOfdWNxjfAFXVgVcEyOM5B0pi28phamuVNBWqiYUeK2Op7rUX0E4wsmnwC0n-Pd427F_eU7vUBgVs98raK6PgUm_tGVAUglF6tfq-p9fcroFEKOGyeZfqIGcaqdBQgrd8w7Mkqa01WRgmL7U",
      "kty": "RSA",
      "q": "3TczVf1j9ZOL4CR7d_z2uzD04fY5yvKaLTBXfw7QF-LX6WWzqEXSunbcFgJ2fuB7rde01-WNu2U0FzDHxTKIyiRCRQpQck7vNOYeXfJopEA6kJ5l-sIpavqNJakRjcG1Y_lTYWg_fq4H0aKGJMxjoEVcjCq0oxx5oOvoyU5kCEs",
      "d": "dToso5mI33o4gq1fgV7hj8SRE86DDAiwnIqeSJuZNrYLjY8vF6bdrV3sflfkJ_PNs-47LvbibAWXvbqOg-A-Goj_C_feXKQ6aK6-itFKIBVzrjgDKUngH2PdTzumhzUE2ph5ZfmdpnZbq1MxnBOVwxiznU5i51EldYBkaRdidbrPK0fqJST9PghDs1N6Q5qeOqhbr3OshviZIakHGaworASH6aZotyePliuIv6Api2-DaX1igELW7ghwMfc9sacKDITWTj3IOAEaD0maEmj0bol8PNAs26R85cPz0ihaWHzXIEAAJ1sh-pV18uk2NjQ93Kz8pBx6NzdFKsO7Lse1aQ",
      "e": "AQAB",
      "use": "sig",
      "kid": "e4b4c736-4061-44f2-a04a-941f7ea8507f",
      "qi": "tmk9Oi_EW6KVEBGkQ4aerT2Ye75LDjqNnqQTL6k-WjW2DxhaCOnv8ruVtb7qvLOnVbBrX3Pq5WCm2NUCFS5fE2vefqdirLobJLwG__PjX_RZVNoO7-ZOqoz5cke0M8pX-L5LzH7nOfalbsv_liPGHPBmKEvnG-RhFP0dl_AgrXg",
      "dp": "V2-2GCh29GhLfTMkAaxbOPmRKp7g5X2o6ubgTt9Vtji-KtCZVXa2uxAAmZrPhkP2env4g0ZafwWDoecxTJSBSagdcfFZjgpJi9TSdOXLJg5CH5RqPfnFDm_XH7Op6Sxm3LlXQX2mAuwxP2IhjZB04-VHyOibtgl0mpif8hhU-4E",
      "dq": "t4hFwjEBjsyEP0llWq54cePzN8nWNwfCXH2ACj1a7oZYxh6HyLNtWyCkBmqyrx9F3XxaYMjmJzSW3Cqvg28iyDr-9FLTXZMZqRTG2wD0SlmzfSq9xybxv_zxv-4eTzMIcFJ6GBWqoEp42Ddz_fHJMj55wxznU3CbhKRVNTchjTM",
      "n": "zPReXflE-h0bWB5yW0VN5MrkvxVxfOMtccQEJaER9OPtF_ErxnuGjC1xHf2SeBL_PXiRJYOsZpPh1jTD_jdDaxXtJM9UQf1bfGtFWXwFgA4fIEtL9WhpIHJGNrXFBvTAnRzQLUIuX0UphwQqXVa2NodyC086slffUaT6KEdEvts7LA_M57iosVZgrqdc7JnDyGxORARgtJFxfS3J296UHKy0rSeuPgT3eDC-aiHAmpoB9qsyh4R9Wwqtohxd91JZF3TWRns-ddPPdMSfUM7Y7ITU40KQSVLtLd1x2YIq14a8T1Wc6hOEoksDL_9cV4x-t-FI4uWvsTeX8PhsDWGiBw"
    },
    {
      "kty": "EC",
      "d": "jteypSVqEzwKlY0NG5qpi5bKJ2USm54I6q20TDqlg7o",
      "use": "sig",
      "crv": "P-256",
      "kid": "32f7cf26-8602-4ff3-9ec6-0451c70c29ec",
      "x": "RElZsTrXOF78pFUXEz4XZ7XYPw8LibRhDQ9rJMG2sto",
      "y": "4dMnmkorcD8kJXiwSIWHJpebv72ECqHaSMWlYStr2Gg"
    },
    {
      "kty": "EC",
      "d": "uIS-cpEN8OMYN2_IJjvfR9gezYs92_DyAQXuSw5ql6U",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "b326989a-74dc-40b9-ac96-2690701633d5",
      "x": "DqC6bP1ydvdoUQKQqqmMzrD6YPJnGbXB6ivdehx7fVA",
      "y": "RZI2hDD1k6DLsaDr9PkfUeb1KaZG_7eSIWVDWAxghNc"
    },
    {
      "kty": "OKP",
      "d": "K1Sti7u5h2YipQFm6_JVAWQVb3adyVn54HTxTPqqo7I",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "622358f8-75c6-47ee-ac44-d93aa8a0d689",
      "x": "ANdPRcnlPAW7Uv40bMk1eZPPli932OiwMj5TDqxZctc"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "56X_mEItE78GxSW2WH5ia4hKJ5L5SWpiY8ErZ3kA32SdXqlONnTuAFHIlavGMTsOLewGI_9D0z9JrEowChOShMB3pMAH0GDdx338EKGoUc9t2gQrA4rVzjM7W1tV8LPuQMhe6ZBqfEhb_KTwkQ78PuJllsfouK2V-gH08O1fje8",
      "kty": "RSA",
      "q": "5ULmsBGeLTY-u4HUJcGuTI-KHGr9Wb2XZcRwGeFkmeP3ozSeAVh1dq7QbVs4P_ZIMJTZskYEYSYnbgBQri_o_6h5-wD7qy_BG8f-DQT05urKjsRS3pJl43Ba446pkAKURr2GHMhubYvhMno3FDsqFFxlmUiVenI9E0EEYDMfO6E",
      "d": "CHiAYofPaGxd-TnrsRPJWv_V2OKvYMGRX2xIOP1GerztBg2fmMc1KK4FMd2RM6qZACUQDeJ6auF8Lygs3HcLwHnLydlR9D4Jy72eYf1cjTJ5xPECpEc2YkXMlx_q9mlXSpUeC__vZU328Zgx_6HzZFHn1vbu_49g65UT3i42MvdzPBJDuPxxxhdKYNc3pztPtB8beeyZ7GYlNnJtcOyf1J2GKzkumlCybJ_p5GjLKadfGFMwaaXQiI7YxUkAmHpNpyvMqL3O0zRMv6vd2w0e4XMmJM-5r978iz3quIYSfHxvvRtwnUFyuEeh1wDqmygLJVITOV43G1zWu8hjL9MvAQ",
      "e": "AQAB",
      "use": "enc",
      "kid": "fad1d51e-3ee0-4bee-960f-3de1fcb6bfa8",
      "qi": "VbwrPNqhFX3gQpk11wY3VIyIM6MoADio4tQg_Kh7zdUxmxYbyDd0DiHDhVXxuGjSURSaOiRqpkCZgNPpaHEy_VK6R7VQCOK2FZaS25CJWa6sW5EnN9ZAhADEX2ZmKZYKWlcpMTsA4dmHqTdfqYdeMa0IY0zqEf7shTpzaax4nVo",
      "dp": "kiVdiy79B382gz0WvOAHsfYLaspEMnhG2M6vVpm13jq5OlawfJTq7xKp7Ruxb6_lcz18ZkuO_ADqtyMbCdBtWQmgsjVg-KuUYF7wn4GOEwc-NBT7GkIGQBB8e1e1caXjQ8Xmc47kT8LLHirlh28f34CwPR-kiJcjjtabNUFdTss",
      "alg": "RSA-OAEP",
      "dq": "YbuNYA2Cor93KrQD3jycsyKVu9uYOUNrYQTGzSGao0fdb4Okv-oX2QpY6-VxK0MwLxWlYCwc_dUoBeq4eikOaL5HkcsvfiCTb-Zn1OECDdaVlxr2QM-kA7sH4-4TNsMCts1geLCw8p4o2D3lcQhvvdJNtXSN1G8Svjx_QwtIC0E",
      "n": "z3QHLY4nDcEXHLB-kJiIHG5JijEBeijEBF4ZwojxE9dqSDGFZUpr5kiAkCUHY3j8DZcrhcp012278qQpxXGrxNXuvw3BxpmkVOUIw4Pg3dmikzUmY6tN0nsbo9PPn_swNTqbd5RqHZhSnM77AkqGh_f6udsR10heavQVvZ2xSN7OZQZoBDdtltsq83XgchhFPZlMIGkJzg6a5NsEKTsSFW9j5kd3Rp_--SsL3AKcSOwPpXIVfV0TtuOlNaBHIzvRFUe02h9gHDVE2Vw5GVB92izj_wIj5Knwm8lTz6ua-oU6wYLYfoudFF5LsNRhLtoDZlMVm4lXoMaf4U-zG79YTw"
    },
    {
      "kty": "EC",
      "d": "sRUH2b6JEPIw34yWKWNlMrW0TPhxCo4AAWvZlNw9I7I",
      "use": "enc",
      "crv": "P-256",
      "kid": "8747fc75-fce4-4385-95bd-d5ed5fe9b488",
      "x": "SjdM028VyKEvdxqW511BTvIrZu03c3ifPTAmIZRJ42M",
      "y": "fdwZEJksboOFmf22GiTHrk32tijhOD3ZPja45LFd-k4",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "e4b4c736-4061-44f2-a04a-941f7ea8507f",
      "n": "zPReXflE-h0bWB5yW0VN5MrkvxVxfOMtccQEJaER9OPtF_ErxnuGjC1xHf2SeBL_PXiRJYOsZpPh1jTD_jdDaxXtJM9UQf1bfGtFWXwFgA4fIEtL9WhpIHJGNrXFBvTAnRzQLUIuX0UphwQqXVa2NodyC086slffUaT6KEdEvts7LA_M57iosVZgrqdc7JnDyGxORARgtJFxfS3J296UHKy0rSeuPgT3eDC-aiHAmpoB9qsyh4R9Wwqtohxd91JZF3TWRns-ddPPdMSfUM7Y7ITU40KQSVLtLd1x2YIq14a8T1Wc6hOEoksDL_9cV4x-t-FI4uWvsTeX8PhsDWGiBw"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "c1902576-53b5-47e4-8138-c4c5b64666a8",
      "n": "uxpRie5HUWlKOfEyRt_ngcVrt3VB_-hVQCRJ1CYlQBJkOPn-B3dXXvQRLzUQorfktdTJPj4cgWtT0LPM4s8D3p25A9RcbgqoZNOw6bWIIGpVCq4eIV2sickFSC0HQeVMFmBKzjT1la8so5J4AwSCD2E6geZFeoVlwvEN7bEhsvFMRqCoMAG2hqFbZMBAYXHjvccYWX4crIr3qSGg5crV2nf-egR3VNOtrj3P9h5ZiHQMGEPne5kmY5VM5Fq9h49eU6k3lhNQcz6CFJTLH2fmFjMxCoTVn7quiMhqUfra02-bffKLY6nGV3qKKu0pSbVrqkUtU4eDIhs00DOQdlwRIQ"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "32f7cf26-8602-4ff3-9ec6-0451c70c29ec",
      "x": "RElZsTrXOF78pFUXEz4XZ7XYPw8LibRhDQ9rJMG2sto",
      "y": "4dMnmkorcD8kJXiwSIWHJpebv72ECqHaSMWlYStr2Gg"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "44c86cf0-be89-40fa-aa07-a9ff3b5aaca4",
      "x": "TAdbcktXUiGpZh7WI4PWYYq-L0BvlzoCHJoTxuQD-C4",
      "y": "GCYKtpl2yBaGYC-Ctf3-7f4nshDwwFpU2s_mDvdet9w"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "b326989a-74dc-40b9-ac96-2690701633d5",
      "x": "DqC6bP1ydvdoUQKQqqmMzrD6YPJnGbXB6ivdehx7fVA",
      "y": "RZI2hDD1k6DLsaDr9PkfUeb1KaZG_7eSIWVDWAxghNc"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "622358f8-75c6-47ee-ac44-d93aa8a0d689",
      "x": "ANdPRcnlPAW7Uv40bMk1eZPPli932OiwMj5TDqxZctc"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "fad1d51e-3ee0-4bee-960f-3de1fcb6bfa8",
      "alg": "RSA-OAEP",
      "n": "z3QHLY4nDcEXHLB-kJiIHG5JijEBeijEBF4ZwojxE9dqSDGFZUpr5kiAkCUHY3j8DZcrhcp012278qQpxXGrxNXuvw3BxpmkVOUIw4Pg3dmikzUmY6tN0nsbo9PPn_swNTqbd5RqHZhSnM77AkqGh_f6udsR10heavQVvZ2xSN7OZQZoBDdtltsq83XgchhFPZlMIGkJzg6a5NsEKTsSFW9j5kd3Rp_--SsL3AKcSOwPpXIVfV0TtuOlNaBHIzvRFUe02h9gHDVE2Vw5GVB92izj_wIj5Knwm8lTz6ua-oU6wYLYfoudFF5LsNRhLtoDZlMVm4lXoMaf4U-zG79YTw"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "8747fc75-fce4-4385-95bd-d5ed5fe9b488",
      "x": "SjdM028VyKEvdxqW511BTvIrZu03c3ifPTAmIZRJ42M",
      "y": "fdwZEJksboOFmf22GiTHrk32tijhOD3ZPja45LFd-k4",
      "alg": "ECDH-ES"
    }
  ]
}
2021-10-08 09:08:42 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2021-10-08 09:08:42 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2021-10-08 09:08:42 SUCCESS
OIDCCLoadUserInfo
Added user information
user_info
{
  "sub": "user-subject-1234531",
  "name": "Demo T. User",
  "given_name": "Demo",
  "family_name": "User",
  "middle_name": "Theresa",
  "nickname": "Dee",
  "preferred_username": "d.tu",
  "gender": "female",
  "birthdate": "2000-02-03",
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "zoneinfo": "America/Los_Angeles",
  "locale": "en-US",
  "phone_number": "+1 555 5550000",
  "phone_number_verified": false,
  "email": "user@example.com",
  "email_verified": false,
  "website": "https://openid.net/",
  "updated_at": 1580000000
}
2021-10-08 09:08:42
StoreOriginalClientConfiguration
No client details on configuration, created an empty original_client_config object.
2021-10-08 09:08:42
ExtractClientNameFromStoredConfig
Extracted client_name from stored client configuration.
client_name
2021-10-08 09:08:42
oidcc-client-test-invalid-iss
Setup Done
2021-10-08 09:08:49 INCOMING
oidcc-client-test-invalid-iss
Incoming HTTP request to test instance 5Yw2bodeRAxhVwb
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "python-requests/2.25.1",
  "accept-encoding": "gzip, deflate",
  "accept": "*/*",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
.well-known/openid-configuration
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Discovery endpoint
2021-10-08 09:08:49 OUTGOING
oidcc-client-test-invalid-iss
Response to HTTP request to test instance 5Yw2bodeRAxhVwb
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "issuer": "https://www.certification.openid.net/test/a/idpy/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/idpy/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/idpy/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/idpy/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/idpy/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/idpy/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
outgoing_path
.well-known/openid-configuration
2021-10-08 09:08:49 INCOMING
oidcc-client-test-invalid-iss
Incoming HTTP request to test instance 5Yw2bodeRAxhVwb
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "python-requests/2.25.1",
  "accept-encoding": "gzip, deflate",
  "accept": "*/*",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
jwks
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Jwks endpoint
2021-10-08 09:08:49 OUTGOING
oidcc-client-test-invalid-iss
Response to HTTP request to test instance 5Yw2bodeRAxhVwb
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "e4b4c736-4061-44f2-a04a-941f7ea8507f",
      "n": "zPReXflE-h0bWB5yW0VN5MrkvxVxfOMtccQEJaER9OPtF_ErxnuGjC1xHf2SeBL_PXiRJYOsZpPh1jTD_jdDaxXtJM9UQf1bfGtFWXwFgA4fIEtL9WhpIHJGNrXFBvTAnRzQLUIuX0UphwQqXVa2NodyC086slffUaT6KEdEvts7LA_M57iosVZgrqdc7JnDyGxORARgtJFxfS3J296UHKy0rSeuPgT3eDC-aiHAmpoB9qsyh4R9Wwqtohxd91JZF3TWRns-ddPPdMSfUM7Y7ITU40KQSVLtLd1x2YIq14a8T1Wc6hOEoksDL_9cV4x-t-FI4uWvsTeX8PhsDWGiBw"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "c1902576-53b5-47e4-8138-c4c5b64666a8",
      "n": "uxpRie5HUWlKOfEyRt_ngcVrt3VB_-hVQCRJ1CYlQBJkOPn-B3dXXvQRLzUQorfktdTJPj4cgWtT0LPM4s8D3p25A9RcbgqoZNOw6bWIIGpVCq4eIV2sickFSC0HQeVMFmBKzjT1la8so5J4AwSCD2E6geZFeoVlwvEN7bEhsvFMRqCoMAG2hqFbZMBAYXHjvccYWX4crIr3qSGg5crV2nf-egR3VNOtrj3P9h5ZiHQMGEPne5kmY5VM5Fq9h49eU6k3lhNQcz6CFJTLH2fmFjMxCoTVn7quiMhqUfra02-bffKLY6nGV3qKKu0pSbVrqkUtU4eDIhs00DOQdlwRIQ"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "32f7cf26-8602-4ff3-9ec6-0451c70c29ec",
      "x": "RElZsTrXOF78pFUXEz4XZ7XYPw8LibRhDQ9rJMG2sto",
      "y": "4dMnmkorcD8kJXiwSIWHJpebv72ECqHaSMWlYStr2Gg"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "44c86cf0-be89-40fa-aa07-a9ff3b5aaca4",
      "x": "TAdbcktXUiGpZh7WI4PWYYq-L0BvlzoCHJoTxuQD-C4",
      "y": "GCYKtpl2yBaGYC-Ctf3-7f4nshDwwFpU2s_mDvdet9w"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "b326989a-74dc-40b9-ac96-2690701633d5",
      "x": "DqC6bP1ydvdoUQKQqqmMzrD6YPJnGbXB6ivdehx7fVA",
      "y": "RZI2hDD1k6DLsaDr9PkfUeb1KaZG_7eSIWVDWAxghNc"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "622358f8-75c6-47ee-ac44-d93aa8a0d689",
      "x": "ANdPRcnlPAW7Uv40bMk1eZPPli932OiwMj5TDqxZctc"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "fad1d51e-3ee0-4bee-960f-3de1fcb6bfa8",
      "alg": "RSA-OAEP",
      "n": "z3QHLY4nDcEXHLB-kJiIHG5JijEBeijEBF4ZwojxE9dqSDGFZUpr5kiAkCUHY3j8DZcrhcp012278qQpxXGrxNXuvw3BxpmkVOUIw4Pg3dmikzUmY6tN0nsbo9PPn_swNTqbd5RqHZhSnM77AkqGh_f6udsR10heavQVvZ2xSN7OZQZoBDdtltsq83XgchhFPZlMIGkJzg6a5NsEKTsSFW9j5kd3Rp_--SsL3AKcSOwPpXIVfV0TtuOlNaBHIzvRFUe02h9gHDVE2Vw5GVB92izj_wIj5Knwm8lTz6ua-oU6wYLYfoudFF5LsNRhLtoDZlMVm4lXoMaf4U-zG79YTw"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "8747fc75-fce4-4385-95bd-d5ed5fe9b488",
      "x": "SjdM028VyKEvdxqW511BTvIrZu03c3ifPTAmIZRJ42M",
      "y": "fdwZEJksboOFmf22GiTHrk32tijhOD3ZPja45LFd-k4",
      "alg": "ECDH-ES"
    }
  ]
}
outgoing_path
jwks
2021-10-08 09:08:50 INCOMING
oidcc-client-test-invalid-iss
Incoming HTTP request to test instance 5Yw2bodeRAxhVwb
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "python-requests/2.25.1",
  "accept-encoding": "gzip, deflate",
  "accept": "*/*",
  "content-type": "application/json",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "493",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
register
incoming_body_form_params
incoming_method
POST
incoming_body_json
{
  "application_type": "web",
  "response_types": [
    "code",
    "id_token"
  ],
  "contacts": [
    "ops@example.com"
  ],
  "token_endpoint_auth_method": "client_secret_basic",
  "redirect_uris": [
    "https://89.45.234.133:8090/authz_cb/309c9a82d946630b0b7299f6655926f2e20f811fdd4db09cf1018e6ea9276db2",
    "https://89.45.234.133:8090/authz_im_cb/309c9a82d946630b0b7299f6655926f2e20f811fdd4db09cf1018e6ea9276db2"
  ],
  "jwks_uri": "https://89.45.234.133:8090/static/jwks.json",
  "grant_types": [
    "implicit",
    "authorization_code"
  ]
}
incoming_query_string_params
{}
incoming_body
{"application_type": "web", "response_types": ["code", "id_token"], "contacts": ["ops@example.com"], "token_endpoint_auth_method": "client_secret_basic", "redirect_uris": ["https://89.45.234.133:8090/authz_cb/309c9a82d946630b0b7299f6655926f2e20f811fdd4db09cf1018e6ea9276db2", "https://89.45.234.133:8090/authz_im_cb/309c9a82d946630b0b7299f6655926f2e20f811fdd4db09cf1018e6ea9276db2"], "jwks_uri": "https://89.45.234.133:8090/static/jwks.json", "grant_types": ["implicit", "authorization_code"]}
Registration endpoint
2021-10-08 09:08:50 SUCCESS
OIDCCExtractDynamicRegistrationRequest
Extracted dynamic client registration request
request
{
  "application_type": "web",
  "response_types": [
    "code",
    "id_token"
  ],
  "contacts": [
    "ops@example.com"
  ],
  "token_endpoint_auth_method": "client_secret_basic",
  "redirect_uris": [
    "https://89.45.234.133:8090/authz_cb/309c9a82d946630b0b7299f6655926f2e20f811fdd4db09cf1018e6ea9276db2",
    "https://89.45.234.133:8090/authz_im_cb/309c9a82d946630b0b7299f6655926f2e20f811fdd4db09cf1018e6ea9276db2"
  ],
  "jwks_uri": "https://89.45.234.133:8090/static/jwks.json",
  "grant_types": [
    "implicit",
    "authorization_code"
  ]
}
2021-10-08 09:08:50 SUCCESS
EnsureRegistrationRequestContainsAtLeastOneContact
Registration request contains valid contacts
contacts
[
  "ops@example.com"
]
2021-10-08 09:08:50 SUCCESS
ValidateClientGrantTypes
grant_types match response_types
grant_types
[
  "implicit",
  "authorization_code"
]
response_types
[
  "code",
  "id_token"
]
2021-10-08 09:08:50 SUCCESS
OIDCCValidateClientRedirectUris
Valid redirect_uri(s) provided in registration request
redirect_uris
[
  "https://89.45.234.133:8090/authz_cb/309c9a82d946630b0b7299f6655926f2e20f811fdd4db09cf1018e6ea9276db2",
  "https://89.45.234.133:8090/authz_im_cb/309c9a82d946630b0b7299f6655926f2e20f811fdd4db09cf1018e6ea9276db2"
]
2021-10-08 09:08:50 SUCCESS
ValidateClientLogoUris
Client does not contain any logo_uri
2021-10-08 09:08:50 SUCCESS
ValidateClientUris
Client does not contain any client_uri
2021-10-08 09:08:50 SUCCESS
ValidateClientPolicyUris
Client does not contain any policy_uri
2021-10-08 09:08:50 SUCCESS
ValidateClientTosUris
Client does not contain any tos_uri
2021-10-08 09:08:50 SUCCESS
ValidateClientSubjectType
A subject_type was not provided
2021-10-08 09:08:50 INFO
ValidateIdTokenSignedResponseAlg
Skipped evaluation due to missing required element: client id_token_signed_response_alg
path
id_token_signed_response_alg
mapped
object
client
2021-10-08 09:08:50 SUCCESS
EnsureIdTokenEncryptedResponseAlgIsSetIfEncIsSet
id_token_encrypted_response_enc is not set
2021-10-08 09:08:50 INFO
ValidateUserinfoSignedResponseAlg
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2021-10-08 09:08:50 SUCCESS
EnsureUserinfoEncryptedResponseAlgIsSetIfEncIsSet
userinfo_encrypted_response_enc is not set
2021-10-08 09:08:50 INFO
ValidateRequestObjectSigningAlg
Skipped evaluation due to missing required element: client request_object_signing_alg
path
request_object_signing_alg
mapped
object
client
2021-10-08 09:08:50 SUCCESS
EnsureRequestObjectEncryptionAlgIsSetIfEncIsSet
request_object_encryption_enc is not set
2021-10-08 09:08:50 INFO
ValidateTokenEndpointAuthSigningAlg
Skipped evaluation due to missing required element: client token_endpoint_auth_signing_alg
path
token_endpoint_auth_signing_alg
mapped
object
client
2021-10-08 09:08:50 SUCCESS
ValidateDefaultMaxAge
default_max_age is not set
2021-10-08 09:08:50 INFO
ValidateRequireAuthTime
Skipped evaluation due to missing required element: client require_auth_time
path
require_auth_time
mapped
object
client
2021-10-08 09:08:50 INFO
ValidateDefaultAcrValues
Skipped evaluation due to missing required element: client default_acr_values
path
default_acr_values
mapped
object
client
2021-10-08 09:08:50 INFO
ValidateInitiateLoginUri
Skipped evaluation due to missing required element: client initiate_login_uri
path
initiate_login_uri
mapped
object
client
2021-10-08 09:08:50 INFO
ValidateRequestUris
Skipped evaluation due to missing required element: client request_uris
path
request_uris
mapped
object
client
2021-10-08 09:08:50 SUCCESS
ValidateClientRegistrationRequestSectorIdentifierUri
A sector_identifier_uri was not provided
2021-10-08 09:08:50 SUCCESS
OIDCCRegisterClient
Registered client
client
{
  "application_type": "web",
  "response_types": [
    "code",
    "id_token"
  ],
  "contacts": [
    "ops@example.com"
  ],
  "token_endpoint_auth_method": "client_secret_basic",
  "redirect_uris": [
    "https://89.45.234.133:8090/authz_cb/309c9a82d946630b0b7299f6655926f2e20f811fdd4db09cf1018e6ea9276db2",
    "https://89.45.234.133:8090/authz_im_cb/309c9a82d946630b0b7299f6655926f2e20f811fdd4db09cf1018e6ea9276db2"
  ],
  "jwks_uri": "https://89.45.234.133:8090/static/jwks.json",
  "grant_types": [
    "implicit",
    "authorization_code"
  ],
  "client_id": "client_UmVsQSVVvgMLAon60917|+;.`"
}
2021-10-08 09:08:50
OIDCCCreateClientSecretForDynamicClient
Set the secret for registered client
client_secret
secret_eQcdmQUucfRYvYpqkvGjWMvvkvzLiLvCtskEkTAvvXlykBbIhm7820825485` ).)
2021-10-08 09:08:50 SUCCESS
EnsureTokenEndPointAuthMethodIsClientSecretBasic
token_endpoint_auth_method is 'client_secret_basic' as expected
2021-10-08 09:08:50 SUCCESS
EnsureClientDoesNotHaveBothJwksAndJwksUri
Client does not have both jwks and jwks_uri set
client
{
  "application_type": "web",
  "response_types": [
    "code",
    "id_token"
  ],
  "contacts": [
    "ops@example.com"
  ],
  "token_endpoint_auth_method": "client_secret_basic",
  "redirect_uris": [
    "https://89.45.234.133:8090/authz_cb/309c9a82d946630b0b7299f6655926f2e20f811fdd4db09cf1018e6ea9276db2",
    "https://89.45.234.133:8090/authz_im_cb/309c9a82d946630b0b7299f6655926f2e20f811fdd4db09cf1018e6ea9276db2"
  ],
  "jwks_uri": "https://89.45.234.133:8090/static/jwks.json",
  "grant_types": [
    "implicit",
    "authorization_code"
  ],
  "client_id": "client_UmVsQSVVvgMLAon60917|+;.`",
  "client_secret": "secret_eQcdmQUucfRYvYpqkvGjWMvvkvzLiLvCtskEkTAvvXlykBbIhm7820825485` ).)"
}
2021-10-08 09:08:50
FetchClientKeys
Fetching client keys
jwks_uri
https://89.45.234.133:8090/static/jwks.json
2021-10-08 09:08:50
FetchClientKeys
HTTP request
request_uri
https://89.45.234.133:8090/static/jwks.json
request_method
GET
request_headers
{
  "accept": "text/plain, application/json, application/cbor, application/*+json, */*",
  "content-length": "0"
}
request_body

                                
2021-10-08 09:08:50 RESPONSE
FetchClientKeys
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "content-length": "691",
  "content-type": "application/json",
  "last-modified": "Fri, 08 Oct 2021 09:08:48 GMT",
  "cache-control": "public, max-age\u003d43200",
  "expires": "Fri, 08 Oct 2021 21:08:50 GMT",
  "etag": "\"1633684128.9236407-691-625874018\"",
  "date": "Fri, 08 Oct 2021 09:08:50 GMT",
  "server": "Werkzeug/1.0.1 Python/3.8.10"
}
response_body
{"keys": [{"kty": "RSA", "use": "sig", "kid": "ZnM1b012dmhUSjh5X05VOUhpN0pXZVlSSEVjQ2J5dEkyQXEwTWQ2UjdhRQ", "n": "tkih6m_RcAr9RozD7IrHS0KjdLHSjMYuT2uRdtbTEJx1jBV6sDADoP3IskBFlwKssFAfZmtjSLETX7JUyIBkhUfTU0OKdVVrfTslfbUw4_m4OyaJmB6POycCH-zk-we9GnP1rjvfPIaaWLVtNM6r2wC-MTWv4MEL1sp-G0nj63oC53hc83q0pxaJqaDr7fMSZCUswL209DnSSn5aF80teBDUS-wOjLvihFIKSDZf0r3t9ObxYsT4tPbq7hQQc2K9XlYADfr-cmBQtwXg9h1jI31s5p-xI1SWzABQm2ZdCovcGjl9GopHsqtCINU7LCK7noRgwxHPERcJwDOX06IRmw", "e": "AQAB"}, {"kty": "EC", "use": "sig", "kid": "S0p4OFlHMzdtNzFjZlpoWkpKNnVmMHM1RHAyVlFtbXlrUjRhdjVpNXBLWQ", "crv": "P-256", "x": "MEFzjCvTrLMkOcRgdLWYpK4b_xrKOn5XAKJvOhYqZTM", "y": "-T_OakJ08j_rRP4Imn1p3L4rG60cQk72Nh4HX_tDDd0"}]}
2021-10-08 09:08:50
FetchClientKeys
Found JWK set string
jwk_string
{"keys": [{"kty": "RSA", "use": "sig", "kid": "ZnM1b012dmhUSjh5X05VOUhpN0pXZVlSSEVjQ2J5dEkyQXEwTWQ2UjdhRQ", "n": "tkih6m_RcAr9RozD7IrHS0KjdLHSjMYuT2uRdtbTEJx1jBV6sDADoP3IskBFlwKssFAfZmtjSLETX7JUyIBkhUfTU0OKdVVrfTslfbUw4_m4OyaJmB6POycCH-zk-we9GnP1rjvfPIaaWLVtNM6r2wC-MTWv4MEL1sp-G0nj63oC53hc83q0pxaJqaDr7fMSZCUswL209DnSSn5aF80teBDUS-wOjLvihFIKSDZf0r3t9ObxYsT4tPbq7hQQc2K9XlYADfr-cmBQtwXg9h1jI31s5p-xI1SWzABQm2ZdCovcGjl9GopHsqtCINU7LCK7noRgwxHPERcJwDOX06IRmw", "e": "AQAB"}, {"kty": "EC", "use": "sig", "kid": "S0p4OFlHMzdtNzFjZlpoWkpKNnVmMHM1RHAyVlFtbXlrUjRhdjVpNXBLWQ", "crv": "P-256", "x": "MEFzjCvTrLMkOcRgdLWYpK4b_xrKOn5XAKJvOhYqZTM", "y": "-T_OakJ08j_rRP4Imn1p3L4rG60cQk72Nh4HX_tDDd0"}]}
2021-10-08 09:08:50 SUCCESS
FetchClientKeys
Downloaded and added client JWK set to client
client
{
  "application_type": "web",
  "response_types": [
    "code",
    "id_token"
  ],
  "contacts": [
    "ops@example.com"
  ],
  "token_endpoint_auth_method": "client_secret_basic",
  "redirect_uris": [
    "https://89.45.234.133:8090/authz_cb/309c9a82d946630b0b7299f6655926f2e20f811fdd4db09cf1018e6ea9276db2",
    "https://89.45.234.133:8090/authz_im_cb/309c9a82d946630b0b7299f6655926f2e20f811fdd4db09cf1018e6ea9276db2"
  ],
  "jwks_uri": "https://89.45.234.133:8090/static/jwks.json",
  "grant_types": [
    "implicit",
    "authorization_code"
  ],
  "client_id": "client_UmVsQSVVvgMLAon60917|+;.`",
  "client_secret": "secret_eQcdmQUucfRYvYpqkvGjWMvvkvzLiLvCtskEkTAvvXlykBbIhm7820825485` ).)",
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "use": "sig",
        "kid": "ZnM1b012dmhUSjh5X05VOUhpN0pXZVlSSEVjQ2J5dEkyQXEwTWQ2UjdhRQ",
        "n": "tkih6m_RcAr9RozD7IrHS0KjdLHSjMYuT2uRdtbTEJx1jBV6sDADoP3IskBFlwKssFAfZmtjSLETX7JUyIBkhUfTU0OKdVVrfTslfbUw4_m4OyaJmB6POycCH-zk-we9GnP1rjvfPIaaWLVtNM6r2wC-MTWv4MEL1sp-G0nj63oC53hc83q0pxaJqaDr7fMSZCUswL209DnSSn5aF80teBDUS-wOjLvihFIKSDZf0r3t9ObxYsT4tPbq7hQQc2K9XlYADfr-cmBQtwXg9h1jI31s5p-xI1SWzABQm2ZdCovcGjl9GopHsqtCINU7LCK7noRgwxHPERcJwDOX06IRmw",
        "e": "AQAB"
      },
      {
        "kty": "EC",
        "use": "sig",
        "kid": "S0p4OFlHMzdtNzFjZlpoWkpKNnVmMHM1RHAyVlFtbXlrUjRhdjVpNXBLWQ",
        "crv": "P-256",
        "x": "MEFzjCvTrLMkOcRgdLWYpK4b_xrKOn5XAKJvOhYqZTM",
        "y": "-T_OakJ08j_rRP4Imn1p3L4rG60cQk72Nh4HX_tDDd0"
      }
    ]
  }
}
2021-10-08 09:08:50 SUCCESS
OIDCCExtractServerSigningAlg
Using the default algorithm for the first key in server jwks
signing_algorithm
RS256
2021-10-08 09:08:50
SetClientIdTokenSignedResponseAlgToServerSigningAlg
Set id_token_signed_response_alg for the registered client
id_token_signed_response_alg
RS256
2021-10-08 09:08:50 OUTGOING
oidcc-client-test-invalid-iss
Response to HTTP request to test instance 5Yw2bodeRAxhVwb
outgoing_status_code
201
outgoing_headers
{}
outgoing_body
{
  "application_type": "web",
  "response_types": [
    "code",
    "id_token"
  ],
  "contacts": [
    "ops@example.com"
  ],
  "token_endpoint_auth_method": "client_secret_basic",
  "redirect_uris": [
    "https://89.45.234.133:8090/authz_cb/309c9a82d946630b0b7299f6655926f2e20f811fdd4db09cf1018e6ea9276db2",
    "https://89.45.234.133:8090/authz_im_cb/309c9a82d946630b0b7299f6655926f2e20f811fdd4db09cf1018e6ea9276db2"
  ],
  "jwks_uri": "https://89.45.234.133:8090/static/jwks.json",
  "grant_types": [
    "implicit",
    "authorization_code"
  ],
  "client_id": "client_UmVsQSVVvgMLAon60917|+;.`",
  "client_secret": "secret_eQcdmQUucfRYvYpqkvGjWMvvkvzLiLvCtskEkTAvvXlykBbIhm7820825485` ).)",
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "use": "sig",
        "kid": "ZnM1b012dmhUSjh5X05VOUhpN0pXZVlSSEVjQ2J5dEkyQXEwTWQ2UjdhRQ",
        "n": "tkih6m_RcAr9RozD7IrHS0KjdLHSjMYuT2uRdtbTEJx1jBV6sDADoP3IskBFlwKssFAfZmtjSLETX7JUyIBkhUfTU0OKdVVrfTslfbUw4_m4OyaJmB6POycCH-zk-we9GnP1rjvfPIaaWLVtNM6r2wC-MTWv4MEL1sp-G0nj63oC53hc83q0pxaJqaDr7fMSZCUswL209DnSSn5aF80teBDUS-wOjLvihFIKSDZf0r3t9ObxYsT4tPbq7hQQc2K9XlYADfr-cmBQtwXg9h1jI31s5p-xI1SWzABQm2ZdCovcGjl9GopHsqtCINU7LCK7noRgwxHPERcJwDOX06IRmw",
        "e": "AQAB"
      },
      {
        "kty": "EC",
        "use": "sig",
        "kid": "S0p4OFlHMzdtNzFjZlpoWkpKNnVmMHM1RHAyVlFtbXlrUjRhdjVpNXBLWQ",
        "crv": "P-256",
        "x": "MEFzjCvTrLMkOcRgdLWYpK4b_xrKOn5XAKJvOhYqZTM",
        "y": "-T_OakJ08j_rRP4Imn1p3L4rG60cQk72Nh4HX_tDDd0"
      }
    ]
  },
  "id_token_signed_response_alg": "RS256"
}
outgoing_path
register
2021-10-08 09:08:50 INCOMING
oidcc-client-test-invalid-iss
Incoming HTTP request to test instance 5Yw2bodeRAxhVwb
incoming_headers
{
  "host": "www.certification.openid.net",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,*/*;q\u003d0.8",
  "cookie": "JSESSIONID\u003d0E0601437642B0449830803A5B3B74D7; __utma\u003d201319536.1325286560.1632909994.1633446768.1633523692.11; __utmc\u003d201319536; __utmz\u003d201319536.1632985063.2.2.utmcsr\u003dt.co|utmccn\u003d(referral)|utmcmd\u003dreferral|utmcct\u003d/",
  "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/15.0 Safari/605.1.15",
  "accept-language": "en-us",
  "referer": "https://89.45.234.133:8090/",
  "accept-encoding": "gzip, deflate, br",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
authorize
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "redirect_uri": "https://89.45.234.133:8090/authz_im_cb/309c9a82d946630b0b7299f6655926f2e20f811fdd4db09cf1018e6ea9276db2",
  "scope": "openid profile email address phone",
  "response_type": "code token",
  "nonce": "xk55DMek1ItlhLimi6qSRwDA",
  "state": "mO031IRvIKKG0EcBgaw7sBhzSAHlffwL",
  "client_id": "client_UmVsQSVVvgMLAon60917|+;.`"
}
incoming_body
Authorization endpoint
2021-10-08 09:08:50 SUCCESS
EnsureRequestDoesNotContainRequestObject
Request does not contain a request parameter
2021-10-08 09:08:50 SUCCESS
EnsureAuthorizationHttpRequestContainsOpenIDScope
Found 'openid' in scope http request parameter
actual
[
  "openid",
  "profile",
  "email",
  "address",
  "phone"
]
expected
openid
2021-10-08 09:08:50 SUCCESS
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
effective_authorization_endpoint_request
{
  "redirect_uri": "https://89.45.234.133:8090/authz_im_cb/309c9a82d946630b0b7299f6655926f2e20f811fdd4db09cf1018e6ea9276db2",
  "scope": "openid profile email address phone",
  "response_type": "code token",
  "nonce": "xk55DMek1ItlhLimi6qSRwDA",
  "state": "mO031IRvIKKG0EcBgaw7sBhzSAHlffwL",
  "client_id": "client_UmVsQSVVvgMLAon60917|+;.`"
}
2021-10-08 09:08:50 SUCCESS
ExtractRequestedScopes
Requested scopes
scope
openid profile email address phone
2021-10-08 09:08:50 SUCCESS
ExtractNonceFromAuthorizationRequest
Extracted nonce
nonce
xk55DMek1ItlhLimi6qSRwDA
2021-10-08 09:08:50 SUCCESS
EnsureResponseTypeIsCodeToken
Response type is expected value
expected
code token
2021-10-08 09:08:50 SUCCESS
EnsureMatchingClientId
Client ID matched
client_id
client_UmVsQSVVvgMLAon60917|+;.`
2021-10-08 09:08:50 SUCCESS
EnsureValidRedirectUriForAuthorizationEndpointRequest
redirect_uri is one of the allowed redirect uris
actual
https://89.45.234.133:8090/authz_im_cb/309c9a82d946630b0b7299f6655926f2e20f811fdd4db09cf1018e6ea9276db2
expected
[
  "https://89.45.234.133:8090/authz_cb/309c9a82d946630b0b7299f6655926f2e20f811fdd4db09cf1018e6ea9276db2",
  "https://89.45.234.133:8090/authz_im_cb/309c9a82d946630b0b7299f6655926f2e20f811fdd4db09cf1018e6ea9276db2"
]
2021-10-08 09:08:50 SUCCESS
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
actual
[
  "openid",
  "profile",
  "email",
  "address",
  "phone"
]
expected
openid
2021-10-08 09:08:50 SUCCESS
DisallowMaxAgeEqualsZeroAndPromptNone
The client did not send max_age=0 and prompt=none parameters as expected
2021-10-08 09:08:50 SUCCESS
CreateAuthorizationCode
Created authorization code
authorization_code
ERhPqztmZbpd8f2zXDwHDIm0CEPEIigY
2021-10-08 09:08:50 SUCCESS
CalculateCHash
Successful c_hash encoding
c_hash
F0qJZJREvYfY1N3U6lifbA
2021-10-08 09:08:50 SUCCESS
GenerateBearerAccessToken
Generated access token
access_token
bkG3c5JMdlWkGTCP6dpNBgVZ6U7qonb9kRmxwNG95Y58k3FAZu
2021-10-08 09:08:50 SUCCESS
CalculateAtHash
Successful at_hash encoding
at_hash
S6tyuevqODJALsGfWLb7Qw
2021-10-08 09:08:50 SUCCESS
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
params
{
  "redirect_uri": "https://89.45.234.133:8090/authz_im_cb/309c9a82d946630b0b7299f6655926f2e20f811fdd4db09cf1018e6ea9276db2",
  "state": "mO031IRvIKKG0EcBgaw7sBhzSAHlffwL"
}
2021-10-08 09:08:50 SUCCESS
AddCodeToAuthorizationEndpointResponseParams
Added code to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://89.45.234.133:8090/authz_im_cb/309c9a82d946630b0b7299f6655926f2e20f811fdd4db09cf1018e6ea9276db2",
  "state": "mO031IRvIKKG0EcBgaw7sBhzSAHlffwL",
  "code": "ERhPqztmZbpd8f2zXDwHDIm0CEPEIigY"
}
2021-10-08 09:08:50
AddTokenToAuthorizationEndpointResponseParams
Added token and token_type to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://89.45.234.133:8090/authz_im_cb/309c9a82d946630b0b7299f6655926f2e20f811fdd4db09cf1018e6ea9276db2",
  "state": "mO031IRvIKKG0EcBgaw7sBhzSAHlffwL",
  "code": "ERhPqztmZbpd8f2zXDwHDIm0CEPEIigY",
  "access_token": "bkG3c5JMdlWkGTCP6dpNBgVZ6U7qonb9kRmxwNG95Y58k3FAZu",
  "token_type": "Bearer"
}
2021-10-08 09:08:50
SendAuthorizationResponseWithResponseModeFragment
Redirecting back to client
uri
https://89.45.234.133:8090/authz_im_cb/309c9a82d946630b0b7299f6655926f2e20f811fdd4db09cf1018e6ea9276db2#state=mO031IRvIKKG0EcBgaw7sBhzSAHlffwL&code=ERhPqztmZbpd8f2zXDwHDIm0CEPEIigY&access_token=bkG3c5JMdlWkGTCP6dpNBgVZ6U7qonb9kRmxwNG95Y58k3FAZu&token_type=Bearer
2021-10-08 09:08:50 OUTGOING
oidcc-client-test-invalid-iss
Response to HTTP request to test instance 5Yw2bodeRAxhVwb
outgoing
org.springframework.web.servlet.view.RedirectView: [RedirectView]; URL [https://89.45.234.133:8090/authz_im_cb/309c9a82d946630b0b7299f6655926f2e20f811fdd4db09cf1018e6ea9276db2#state=mO031IRvIKKG0EcBgaw7sBhzSAHlffwL&code=ERhPqztmZbpd8f2zXDwHDIm0CEPEIigY&access_token=bkG3c5JMdlWkGTCP6dpNBgVZ6U7qonb9kRmxwNG95Y58k3FAZu&token_type=Bearer]
outgoing_path
authorize
2021-10-08 09:08:51 INCOMING
oidcc-client-test-invalid-iss
Incoming HTTP request to test instance 5Yw2bodeRAxhVwb
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "python-requests/2.25.1",
  "accept-encoding": "gzip, deflate",
  "accept": "*/*",
  "authorization": "Basic Y2xpZW50X1VtVnNRU1ZWdmdNTEFvbjYwOTE3JTdDJTJCJTNCLiU2MDpzZWNyZXRfZVFjZG1RVXVjZlJZdllwcWt2R2pXTXZ2a3Z6TGlMdkN0c2tFa1RBdnZYbHlrQmJJaG03ODIwODI1NDg1JTYwKyUyOS4lMjk\u003d",
  "content-type": "application/x-www-form-urlencoded",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "286",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
token
incoming_body_form_params
{
  "grant_type": "authorization_code",
  "redirect_uri": "https://89.45.234.133:8090/authz_im_cb/309c9a82d946630b0b7299f6655926f2e20f811fdd4db09cf1018e6ea9276db2",
  "client_id": "client_UmVsQSVVvgMLAon60917|+;.`",
  "state": "mO031IRvIKKG0EcBgaw7sBhzSAHlffwL",
  "code": "ERhPqztmZbpd8f2zXDwHDIm0CEPEIigY"
}
incoming_method
POST
incoming_body_json
incoming_query_string_params
{}
incoming_body
grant_type=authorization_code&redirect_uri=https%3A%2F%2F89.45.234.133%3A8090%2Fauthz_im_cb%2F309c9a82d946630b0b7299f6655926f2e20f811fdd4db09cf1018e6ea9276db2&client_id=client_UmVsQSVVvgMLAon60917%7C%2B%3B.%60&state=mO031IRvIKKG0EcBgaw7sBhzSAHlffwL&code=ERhPqztmZbpd8f2zXDwHDIm0CEPEIigY
Token endpoint
2021-10-08 09:08:51 SUCCESS
ExtractClientCredentialsFromBasicAuthorizationHeader
Extracted client authentication
client_id
client_UmVsQSVVvgMLAon60917|+;.`
client_secret
secret_eQcdmQUucfRYvYpqkvGjWMvvkvzLiLvCtskEkTAvvXlykBbIhm7820825485` ).)
method
client_secret_basic
2021-10-08 09:08:51 SUCCESS
ValidateClientIdAndSecret
Client id and secret match
2021-10-08 09:08:51 SUCCESS
ValidateAuthorizationCode
Found authorization code
authorization_code
ERhPqztmZbpd8f2zXDwHDIm0CEPEIigY
2021-10-08 09:08:51 SUCCESS
ValidateRedirectUriForTokenEndpointRequest
redirect_uri is the same as the one used in the authorization request
actual
https://89.45.234.133:8090/authz_im_cb/309c9a82d946630b0b7299f6655926f2e20f811fdd4db09cf1018e6ea9276db2
2021-10-08 09:08:51 SUCCESS
GenerateBearerAccessToken
Generated access token
access_token
1wxLJAHNSQbzxxzVXlVKDAEmM6XJDa7AdZeAAoquqI44zMSPpl
2021-10-08 09:08:51 SUCCESS
CalculateAtHash
Successful at_hash encoding
at_hash
BD6-Vs9rElPdaTASRAfvJg
2021-10-08 09:08:51 SUCCESS
GenerateIdTokenClaims
Created ID Token Claims
iss
https://www.certification.openid.net/test/a/idpy/
sub
user-subject-1234531
aud
client_UmVsQSVVvgMLAon60917|+;.`
nonce
xk55DMek1ItlhLimi6qSRwDA
iat
1633684131
exp
1633684431
2021-10-08 09:08:51 SUCCESS
AddInvalidIssValueToIdToken
Added invalid iss to ID token claims
iss
https://www.certification.openid.net/test/a/idpy/1
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/a/idpy/1",
  "sub": "user-subject-1234531",
  "aud": "client_UmVsQSVVvgMLAon60917|+;.`",
  "nonce": "xk55DMek1ItlhLimi6qSRwDA",
  "iat": 1633684131,
  "exp": 1633684431
}
2021-10-08 09:08:51 SUCCESS
AddAtHashToIdTokenClaims
Added at_hash to ID token claims
at_hash
BD6-Vs9rElPdaTASRAfvJg
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/a/idpy/1",
  "sub": "user-subject-1234531",
  "aud": "client_UmVsQSVVvgMLAon60917|+;.`",
  "nonce": "xk55DMek1ItlhLimi6qSRwDA",
  "iat": 1633684131,
  "exp": 1633684431,
  "at_hash": "BD6-Vs9rElPdaTASRAfvJg"
}
2021-10-08 09:08:51 SUCCESS
OIDCCSignIdToken
Signed the ID token
id_token
eyJraWQiOiJlNGI0YzczNi00MDYxLTQ0ZjItYTA0YS05NDFmN2VhODUwN2YiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiQkQ2LVZzOXJFbFBkYVRBU1JBZnZKZyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X1VtVnNRU1ZWdmdNTEFvbjYwOTE3fCs7LmAiLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvYVwvaWRweVwvMSIsImV4cCI6MTYzMzY4NDQzMSwibm9uY2UiOiJ4azU1RE1lazFJdGxoTGltaTZxU1J3REEiLCJpYXQiOjE2MzM2ODQxMzF9.O4ZXV_4TSq1fyVOnECSB58SnWMH9uGQLhyevlTH84f45TiOwGlKTS9oBuqb5btfTUyxpvRqzbpBQCSUNTLDbNSJkMeVTppmk2YkdJF9pq-BMj5W-UFs0GC63YuZJ2_c1WYZws613gF-gNSFKgB-LkeMt4KRi0gHdEyettMaI0zP67ru5_FbpP76JDfS0Z--iu4TikUlZhSZKtRtyQZLGi1ZYshGUEyTSAGerjpdIH8DGcubWQbXXQnKDmNzJ7XtYoHdy8fDDXq_1RwmpQ8e4sveaWb-88Qd2JD0ZvBYfr9RlGQY48wdATB7WgQBNuB31urcNkDoSDBY5QGow6AmM2g
key
{"p":"7S6YqonS3sNOC4OSszQvMAeRKuSoOfdWNxjfAFXVgVcEyOM5B0pi28phamuVNBWqiYUeK2Op7rUX0E4wsmnwC0n-Pd427F_eU7vUBgVs98raK6PgUm_tGVAUglF6tfq-p9fcroFEKOGyeZfqIGcaqdBQgrd8w7Mkqa01WRgmL7U","kty":"RSA","q":"3TczVf1j9ZOL4CR7d_z2uzD04fY5yvKaLTBXfw7QF-LX6WWzqEXSunbcFgJ2fuB7rde01-WNu2U0FzDHxTKIyiRCRQpQck7vNOYeXfJopEA6kJ5l-sIpavqNJakRjcG1Y_lTYWg_fq4H0aKGJMxjoEVcjCq0oxx5oOvoyU5kCEs","d":"dToso5mI33o4gq1fgV7hj8SRE86DDAiwnIqeSJuZNrYLjY8vF6bdrV3sflfkJ_PNs-47LvbibAWXvbqOg-A-Goj_C_feXKQ6aK6-itFKIBVzrjgDKUngH2PdTzumhzUE2ph5ZfmdpnZbq1MxnBOVwxiznU5i51EldYBkaRdidbrPK0fqJST9PghDs1N6Q5qeOqhbr3OshviZIakHGaworASH6aZotyePliuIv6Api2-DaX1igELW7ghwMfc9sacKDITWTj3IOAEaD0maEmj0bol8PNAs26R85cPz0ihaWHzXIEAAJ1sh-pV18uk2NjQ93Kz8pBx6NzdFKsO7Lse1aQ","e":"AQAB","use":"sig","kid":"e4b4c736-4061-44f2-a04a-941f7ea8507f","qi":"tmk9Oi_EW6KVEBGkQ4aerT2Ye75LDjqNnqQTL6k-WjW2DxhaCOnv8ruVtb7qvLOnVbBrX3Pq5WCm2NUCFS5fE2vefqdirLobJLwG__PjX_RZVNoO7-ZOqoz5cke0M8pX-L5LzH7nOfalbsv_liPGHPBmKEvnG-RhFP0dl_AgrXg","dp":"V2-2GCh29GhLfTMkAaxbOPmRKp7g5X2o6ubgTt9Vtji-KtCZVXa2uxAAmZrPhkP2env4g0ZafwWDoecxTJSBSagdcfFZjgpJi9TSdOXLJg5CH5RqPfnFDm_XH7Op6Sxm3LlXQX2mAuwxP2IhjZB04-VHyOibtgl0mpif8hhU-4E","dq":"t4hFwjEBjsyEP0llWq54cePzN8nWNwfCXH2ACj1a7oZYxh6HyLNtWyCkBmqyrx9F3XxaYMjmJzSW3Cqvg28iyDr-9FLTXZMZqRTG2wD0SlmzfSq9xybxv_zxv-4eTzMIcFJ6GBWqoEp42Ddz_fHJMj55wxznU3CbhKRVNTchjTM","n":"zPReXflE-h0bWB5yW0VN5MrkvxVxfOMtccQEJaER9OPtF_ErxnuGjC1xHf2SeBL_PXiRJYOsZpPh1jTD_jdDaxXtJM9UQf1bfGtFWXwFgA4fIEtL9WhpIHJGNrXFBvTAnRzQLUIuX0UphwQqXVa2NodyC086slffUaT6KEdEvts7LA_M57iosVZgrqdc7JnDyGxORARgtJFxfS3J296UHKy0rSeuPgT3eDC-aiHAmpoB9qsyh4R9Wwqtohxd91JZF3TWRns-ddPPdMSfUM7Y7ITU40KQSVLtLd1x2YIq14a8T1Wc6hOEoksDL_9cV4x-t-FI4uWvsTeX8PhsDWGiBw"}
algorithm
RS256
2021-10-08 09:08:51 INFO
EncryptIdToken
Skipped evaluation due to missing required element: client id_token_encrypted_response_alg
path
id_token_encrypted_response_alg
mapped
object
client
2021-10-08 09:08:51 SUCCESS
CreateTokenEndpointResponse
Created token endpoint response
access_token
1wxLJAHNSQbzxxzVXlVKDAEmM6XJDa7AdZeAAoquqI44zMSPpl
token_type
Bearer
id_token
eyJraWQiOiJlNGI0YzczNi00MDYxLTQ0ZjItYTA0YS05NDFmN2VhODUwN2YiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiQkQ2LVZzOXJFbFBkYVRBU1JBZnZKZyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X1VtVnNRU1ZWdmdNTEFvbjYwOTE3fCs7LmAiLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvYVwvaWRweVwvMSIsImV4cCI6MTYzMzY4NDQzMSwibm9uY2UiOiJ4azU1RE1lazFJdGxoTGltaTZxU1J3REEiLCJpYXQiOjE2MzM2ODQxMzF9.O4ZXV_4TSq1fyVOnECSB58SnWMH9uGQLhyevlTH84f45TiOwGlKTS9oBuqb5btfTUyxpvRqzbpBQCSUNTLDbNSJkMeVTppmk2YkdJF9pq-BMj5W-UFs0GC63YuZJ2_c1WYZws613gF-gNSFKgB-LkeMt4KRi0gHdEyettMaI0zP67ru5_FbpP76JDfS0Z--iu4TikUlZhSZKtRtyQZLGi1ZYshGUEyTSAGerjpdIH8DGcubWQbXXQnKDmNzJ7XtYoHdy8fDDXq_1RwmpQ8e4sveaWb-88Qd2JD0ZvBYfr9RlGQY48wdATB7WgQBNuB31urcNkDoSDBY5QGow6AmM2g
scope
openid profile email address phone
2021-10-08 09:08:51 OUTGOING
oidcc-client-test-invalid-iss
Response to HTTP request to test instance 5Yw2bodeRAxhVwb
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "access_token": "1wxLJAHNSQbzxxzVXlVKDAEmM6XJDa7AdZeAAoquqI44zMSPpl",
  "token_type": "Bearer",
  "id_token": "eyJraWQiOiJlNGI0YzczNi00MDYxLTQ0ZjItYTA0YS05NDFmN2VhODUwN2YiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiQkQ2LVZzOXJFbFBkYVRBU1JBZnZKZyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X1VtVnNRU1ZWdmdNTEFvbjYwOTE3fCs7LmAiLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvYVwvaWRweVwvMSIsImV4cCI6MTYzMzY4NDQzMSwibm9uY2UiOiJ4azU1RE1lazFJdGxoTGltaTZxU1J3REEiLCJpYXQiOjE2MzM2ODQxMzF9.O4ZXV_4TSq1fyVOnECSB58SnWMH9uGQLhyevlTH84f45TiOwGlKTS9oBuqb5btfTUyxpvRqzbpBQCSUNTLDbNSJkMeVTppmk2YkdJF9pq-BMj5W-UFs0GC63YuZJ2_c1WYZws613gF-gNSFKgB-LkeMt4KRi0gHdEyettMaI0zP67ru5_FbpP76JDfS0Z--iu4TikUlZhSZKtRtyQZLGi1ZYshGUEyTSAGerjpdIH8DGcubWQbXXQnKDmNzJ7XtYoHdy8fDDXq_1RwmpQ8e4sveaWb-88Qd2JD0ZvBYfr9RlGQY48wdATB7WgQBNuB31urcNkDoSDBY5QGow6AmM2g",
  "scope": "openid profile email address phone"
}
outgoing_path
token
2021-10-08 09:08:56 FINISHED
oidcc-client-test-invalid-iss
Test has run to completion
testmodule_result
PASSED
2021-10-08 09:09:01
TEST-RUNNER
Alias has now been claimed by another test
alias
idpy
new_test_id
fD9GIjQS865A6bf
Test Results