Test Summary

Test Results

Expand All Collapse All
All times are UTC
2021-05-27 16:47:16 INFO
TEST-RUNNER
Test instance AIPmt9BVfWsEV8Y created
baseUrl
https://www.certification.openid.net/test/a/Intuit_pauth_openid_core_basic_plan_1
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code",
  "request_type": "plain_http_request",
  "response_mode": "default",
  "client_registration": "static_client"
}
alias
Intuit_pauth_openid_core_basic_plan_1
description
Test Core OpenId on Intuit PartnerAuth
planId
c3dY1ClOWenWa
config
{
  "alias": "Intuit_pauth_openid_core_basic_plan_1",
  "description": "Test Core OpenId on Intuit PartnerAuth",
  "client": {
    "client_secret_jwt_alg": "RS256",
    "client_id": "12345678-openid-core-clientid",
    "client_secret": "abcdefgh-openid-core-clientsecret",
    "redirect_uri": "https://partnerauth-e2e.platform.intuit.com/external_partner/openid_core_cert/callback",
    "scope": "openid accounts",
    "jwks": {
      "keys": [
        {
          "kty": "RSA",
          "e": "AQAB",
          "n": "nXe9vqDEtjUQ3bYdMv67vtZ1Nr95Fnn1lQKO6ASiaIhL133AUSNmsC2De7_Fs2rEQ6r3KpzwEg6H4e7dFzCo0MTK11ZMHXyIcQsKRnviG_G8bV5EECoylY959TKvqgLd16rnqK70doAG34dglR1cn-gXpoVdM1tmTWgmQryT3y-jdNvtba9SE3-79e1FsfhbtsZ0YIS8gx7OVypPuVml7MvOkDbP8M-EaNB9YbwIdq4MK9DugaCxXI1U4naoXp47f8sl2iBeaAUuG4JWQ1Ct1sgiJOzRA1ts9WYYdu3pImXCviTb2C-6xD3DgeG5OPFQNcHG0ODQCHmEAX-DL72SHw"
        }
      ]
    },
    "certificate": "-----BEGIN CERTIFICATE-----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\nJJ4ExCQnVkS6U4yaNsKp4HET\n-----END CERTIFICATE-----"
  },
  "server": {
    "jwks": {
      "keys": [
        {
          "p": "0X5a2vAXxfvavrqVOd9EaRGuZzbyQx4GjkI70K8CmW_SpGlNnfiMi-j9pfltfhOezBtbAnLzxikdlMiaIZGX0sfGs7z6l6Iq4fCbKgwGYjDjDj_oRGuZjB7NM_AHIsknjoxaoZrJAZz5xrdttimdkmA5psiSCDGAYLXQr8KAsL0",
          "kty": "RSA",
          "q": "wGy6Gz0YO3bWMpAdxG_iZkFkgvfAgRExE0zUnPKcOgjq3Ue1VeIdUV1639bTpXI80KNaAwKHeFp5M05lrZEzfSeM5HH9yYG0GgfmXx-RFrGa8DZpFQXmcunPu3Opl0cdxADPETZpfSYJ8npo5cBEJTokR7kXtU2eOCG5UGKuggs",
          "d": "RmA_szTS9cQdt5kuz529dvsOA9vrWDpFocU07Uk09JcFnlebXif-Ovr8apA44Yj0EnIUaT0eplNMM5O3yCd9K2Dobvkop30C1dLjUsEHOwn89rxMmxTg6qrnDMkMbWU-lKbTRjZ7F4L8j2ZHqh0nSmhGOawdDVjqDepgPy9cv0AtonAEDRVZiaUiOwie4vFYVy7ksoNvAsCs6Pl4bLaYXDoP7SmWUWeenODHyoMsUt0Z45-3ti_-di0qm7yQNgZ8NWLZNAd5T73qZm5zOwkRO6Tu8ZiWBeAV7t-wteKAaQ-KVLnLik4fRUUVWtS80prbz4b-I9kvNagmtef-GveqcQ",
          "e": "AQAB",
          "qi": "Sbg51OpF8E4zYaRAUjMrQ_DB6My9fZiJhQXF9nrJML1TF30k7SN8pHJ-N86WUweyvRTOm9wRb6CWHrwlpgBX1syaMAMOQPnHxv84e8emQQLl_mO0OUldb4Z53RM9z0DXoyKrgCsGS6B3D9GAX8AUFrsYJQDGNg5ib85aTqGhQG0",
          "dp": "cJyogDpBvUZ2PsKThulyn7xGcOtDbTrNsVj_SF1bW1mV9JU6iOlbu7XB659Z8UTgvr0Rvg5G5kWhxiHTYKof38lOEb5LQomE3bF15zNRlyTKWRWXaHgisQS5r-qeG1_gKKtf6LEIzhow1lYx3pMeRdn-A56biVX6uYHirSgz_00",
          "dq": "qENrSj5WXklAbN6Q6SFdPEWaetvivfomi9X3ZXbRHf6GQhFehEdBk9DGjc3xLQ-EFn2BTHh9tcSHj1HSn8AE4kAfd_QmFHsS3mBiFnQoD0wnTD6IDRYnufyy5hvyBJLveGGssESAYitNL3fTGnTSIiuBZiZ4kNXasQLsZVqldpk",
          "n": "nXe9vqDEtjUQ3bYdMv67vtZ1Nr95Fnn1lQKO6ASiaIhL133AUSNmsC2De7_Fs2rEQ6r3KpzwEg6H4e7dFzCo0MTK11ZMHXyIcQsKRnviG_G8bV5EECoylY959TKvqgLd16rnqK70doAG34dglR1cn-gXpoVdM1tmTWgmQryT3y-jdNvtba9SE3-79e1FsfhbtsZ0YIS8gx7OVypPuVml7MvOkDbP8M-EaNB9YbwIdq4MK9DugaCxXI1U4naoXp47f8sl2iBeaAUuG4JWQ1Ct1sgiJOzRA1ts9WYYdu3pImXCviTb2C-6xD3DgeG5OPFQNcHG0ODQCHmEAX-DL72SHw"
        }
      ]
    }
  }
}
testName
oidcc-client-test-userinfo-invalid-sub
2021-05-27 16:47:17 SUCCESS
OIDCCGenerateServerConfiguration
Generated default server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/Intuit_pauth_openid_core_basic_plan_1/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/Intuit_pauth_openid_core_basic_plan_1/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/Intuit_pauth_openid_core_basic_plan_1/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/Intuit_pauth_openid_core_basic_plan_1/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/Intuit_pauth_openid_core_basic_plan_1/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/Intuit_pauth_openid_core_basic_plan_1/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post",
    "client_secret_jwt",
    "private_key_jwt"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2021-05-27 16:47:17
SetTokenEndpointAuthMethodsSupportedToClientSecretBasicOnly
Changed token_endpoint_auth_methods_supported to client_secret_basic only in server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/Intuit_pauth_openid_core_basic_plan_1/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/Intuit_pauth_openid_core_basic_plan_1/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/Intuit_pauth_openid_core_basic_plan_1/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/Intuit_pauth_openid_core_basic_plan_1/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/Intuit_pauth_openid_core_basic_plan_1/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/Intuit_pauth_openid_core_basic_plan_1/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2021-05-27 16:47:17
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "6nDXEwEs4_qEff_KaSblVEijGvocR820Q6lD1gSE7qWMGjbRbgss9wz9WzHHAeOS2aqfUwU61p4ZxDCPpsIWGn62Z6Ii-TL2i8wae0MIah8SZvtlMG_0FBPw1vVcAASOVlaTVEfzBOFqwI3qhK0yTm8QJzLm9Ll-77_iqdBWCIs",
      "kty": "RSA",
      "q": "58b9RTamhe3idDRUmdVT72aMrMlDI64s-B4ryV8g7gwfIZ9abRkCA30BSEwxOGANCH3lHjplpLn0PPnqasnzkRRZsm-eSpAMPYIiqKYvgwzB3qmFZzjchhNrNrmyBOIt1QzDBSM25c3C5BI8zSR_WvmCyvRcYkqMJbzaRtcCHd0",
      "d": "LsVTOi4j-n30E-omNmHhPORhKosn18-ZvALpxM8LXKPGFraV7igIOlSiupbRzTBHNcUupMPQ54k9VMvWiR2CmuK5rBZqeZX1yWvUwNzgqUjly4NzrhSSJ3FTRu0Q-uTNhBipV-mxTFheLkrzvHRvJO8IcWwvNgM6oezPdaUqghPRoScT_KkZUaZg2DcHnGvVcEz1Y8cz1p8uf6n610yf387vYstkkDSa940qemNgXtpMq-_RcE2gtEBU4K9Hn2S7ohPQKimtAd9L9u_8WLZ3eNgWUhCdydy8WE5hDoG6F9wz_vifS1NnXhWfCKSqkso7vhfvwRAbKFXtL3nRbfg2WQ",
      "e": "AQAB",
      "use": "sig",
      "kid": "023c5192-0ee1-4ade-89b4-f88ad4d89468",
      "qi": "3DKNAxl_CHjIiE3qhGSwfMRLH8AVqs0uqiDHe8gEOUqJnBOROACzo5VFzwxGC37g2lHvoDjA74wCbFTawwrv8mUIbzvrB68XD1OpSMGHNbnX43gqAkK-R8HHDc2le3F8Kdkgg7EsTY0-8gnTcPxuqRwKmL4e7DiIIuKz3p4aGZI",
      "dp": "PT7nYQaglJpgvI3zcg8AQEmNmsGWW8fIfRieKS4bEEFdXYfOpKH0yEGzenyBkePC_GxPnR-zpFe_QXqyPI1duuQ5gM9htZpzwEe871CuxRKC-zZX1BSbPheLhoyo0TRffvy1FoKJYVAGVHF-v9SDXOw02xi4L1y6ZaXKcDSGFUs",
      "dq": "olcHKIZpxp7jIT9SDlmUK7dpStDBPOmPR85iHu6JcxJ8b6FcxdNhTK4uysPLKdBk8JC1fSGr9d_lSRxG67s95V0aold5yIHygNZ4jiWwW5sA44NbE_yIwUQysScJoFAHiBUjN6L9naIsInD_szQgG8ltqdfUKWhLl1caj8mjCuU",
      "n": "1EINSWXGd-gB4HMNbdKBR_vaU_9ndLl0eq82eJh1NRP0xP9tKQCpqB-SyTt7ZmBofE-RRjnbJrOFpZN2K1yexdMo6Ur6jsiOO6C8j1Yg5538tcMuWT5i9DzRQe8WJASdyfhnHLgH6DQ75QDwp8Yzrn41FWhxWhSKJtAbjmoeTODleCylk0zc9B1Qzpg6Vn--5DdPFrgjYkOj0V8uPaYYemjUqK3bT74Tlysd8cMGD7IHGy1ocLJ-LZ29ZQz2YgxP4q8jRPdfFtlEH-GMX2cw0vjdNyFL2SYWPuD6rZjnzbENSkgniHYsldiExjn9hCI0QSkX7iSoaOCwgH8NZ1Me_w"
    },
    {
      "kty": "EC",
      "d": "l4akzLrVCTd8kFJOaU6gSY9MukIseVFfzo3Viy_xtrw",
      "use": "sig",
      "crv": "P-256",
      "kid": "0baed4b4-84f0-4e99-9be2-29273fc0d87f",
      "x": "3MXfTT3O4gI8n7Pu5hvv-nMUrvBLx8oBe95Ds8Z0vcE",
      "y": "vFmBuwBsQ4gr3qVaesDo4N548STAQqicFL9FzrqiEEM"
    },
    {
      "kty": "EC",
      "d": "ocMcVnt4rUFAgMhM5t8M6Oxghgf4CyZdqfcYv8r2GWc",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "f31d70ef-e203-4999-8def-b172baaaa46c",
      "x": "VA_9Gl7aEV_8bzqjl_xNFKkONbmffeXQ84OJUwL-UnY",
      "y": "wLbhaBUjZyO4ZUvKaUne1ZXiMQXuHnjMZwNMVSto-3g"
    },
    {
      "kty": "OKP",
      "d": "jsMcOcx6Emm0FkOJWdFps_7rhLDwDOUlmhH7HZTcx34",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "604c823f-facd-4c04-9f3c-130c8b06e8ea",
      "x": "RmkqPyfqlMqE6f6vQMEh5nqKSZNPPsg3BGSmEYP3Tg0"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "7ZF0dG9cgGsAk5cEXvNEaoXctePyYdAXCpxsprdIrFQy5p2BLiIj7p8QIcnQ4o-gYb2L115Gs0Q6juowvbmOJlAiInQKI7ER-4Qc6lnJJsWwILg9OXHAQUGp3tG6OAUdROvXNJrucktIZ07UI-fjeNZ3szsLLnDFlsyRnchYoEs",
      "kty": "RSA",
      "q": "oXdt6QszlL_zalBEJaVuWSLo2Zf1bJpAsqFAltfhTQ95Zp7NJZGlsN3uMpL8GWfpRvBujkdxOLi38BLkQOy-EPb2AaaZX0jMj3O43AbpRmBn3PATiWgZYN326o69GrPWEBUPmhTo2Rr48rK5g3ivd2BOXYbMZLcmkFhJFaYGuPE",
      "d": "fgkVrM9Ck_WwCNIGj3TGr-Blrr31xv3QGbBtkqhP4KUtUtl3i_qJeTt-A8cc0cVMOBu7t-mIRiK7LFCh0aeMU9lPYK-t0Kr2eUxRTp4_ZnSRQO8n02QOcqYTykAmXiY-VuOvUk3GroJR7f0w7JpVgfn_LwIFMjoCqNdqfcI0uJ2kxbIfjMRUrdLfDZr4XwfAMVzin9LWUie_WCxLvZpN4h3Tar1zsuoFMWteD0TAybZpQ0pt43VDYA33J4IYBhqcq4DtT-3HYo0EpimsE_DEp2HslMX3_RAafNRJ0zK9D6h4PzJV_ykQSr3ob3E8yqBM0r9GSqEomomqzl1hQSyY4Q",
      "e": "AQAB",
      "use": "enc",
      "kid": "859dbeae-7cd8-45c1-8536-331018e89b61",
      "qi": "YRdSL8SC8PFecTQ742lDusstjURr-ZyrkrVIm-7WNBVXXhy6PeK8NvXTkBEG78UFO645firyavVrv_4ZH8WSanpydjrQc_IJZ6DiNUpj3oj2eP_2aFsx-npcdT9hmXC8o9wzEjm1PmTD3YqwPDbiIv2V95tzFA1MljN-EiyUQP4",
      "dp": "DDSH3h-GihZ1Ph_pGpO29R4Re8rNPhc5x9LHhj0uX6QnxU9cPqmEXRMQ-htrPuiQHdVmJNd0HGup8oO3o1ewJOnDBzAdAT5spRZhgezA99v6M4QjqRrd_LxJ5OezgINKwKq5MLuw-nBBtQUIwxt7xU6Hcc7bwTQMArZZ2NhdLUc",
      "alg": "RSA-OAEP",
      "dq": "heZQk03ivJxh8-wUV1PVKr40cx39PM6-kGQA-BaWlB0dA-j1Hw6lZQLmIbKatUbiwR1p0TuVvQASKVjBSMYK6G6km8HYtpfca6n_xxdEJESWXTYKPYzCXv4zYVh1ocs43aVZhuGIJ2KiyEFGbqyKdmi7E_xRS8RGirVsBjPkp0E",
      "n": "lddO2Y6GoCwnsJ2rfttYfChRLEdfCy97B-ujJzCqt7F9EUPwVB8j2u1GzbTHh02fz5c_1Ht5rPhZH3_RMv4jPr5Hf7XDdAiiQyMgFJSBcMnYVodbd0fFqlujI-llW0MMLVpztaoB1MAiG14a_WtMx9HAUSU4-A9KyUCZdiRH9TSzPadGseB45MCfwg6haGWPGV7LJg3ef1ybwxQNqlAc5jWrNZhEF0UVgN6BqbawTygmHyfHarB7O8NxsL7IEKcX19O5kytV_JHAMGeuUe7aInqOA7iXIyH63YGB-3wyJY6usP2Rhx9tVjmjhHYWLqbIwRJ7hah2bnO3nTC0smbOmw"
    },
    {
      "kty": "EC",
      "d": "AgCMoQq21_xKqSBCG_0bzTe7NaMiDRd5akx64AkxWE8",
      "use": "enc",
      "crv": "P-256",
      "kid": "984c9b42-5d7f-4974-b2c7-2c609f407de2",
      "x": "bLLD7czeYuBTqjyYC2gXnwh6T_iAcVpWnRKaP-zo6j4",
      "y": "D6RXSKNgh2BNxIYH1jVwHO6Pl8hKieEoRHXrnzCOJ38",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "023c5192-0ee1-4ade-89b4-f88ad4d89468",
      "n": "1EINSWXGd-gB4HMNbdKBR_vaU_9ndLl0eq82eJh1NRP0xP9tKQCpqB-SyTt7ZmBofE-RRjnbJrOFpZN2K1yexdMo6Ur6jsiOO6C8j1Yg5538tcMuWT5i9DzRQe8WJASdyfhnHLgH6DQ75QDwp8Yzrn41FWhxWhSKJtAbjmoeTODleCylk0zc9B1Qzpg6Vn--5DdPFrgjYkOj0V8uPaYYemjUqK3bT74Tlysd8cMGD7IHGy1ocLJ-LZ29ZQz2YgxP4q8jRPdfFtlEH-GMX2cw0vjdNyFL2SYWPuD6rZjnzbENSkgniHYsldiExjn9hCI0QSkX7iSoaOCwgH8NZ1Me_w"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "2d8d28bc-7755-4938-98b8-e909d9068501",
      "n": "lUOkcqDelKCV16XxVAr9U3AozFKZyCE2pFqJ-6sVz42ybW9dYILI4GcD4HTVq1wrZxnESBI3Jr7e_pLqPxp1NuEoljQV9LQrpn6kgOY1LALlM_6rGpswUN7c2Gc4F1au-jPxSrxwKc21rfX8-oLsa10cs6ZOkwgOcKuSfqFOmdvyQv6jpFxZpO7X2YihVLHfb7Y4Frvs_wnWsZbKSzW6-oiYbll5Svxyjlx2b3cEbBWuWYLhQtUygEYUAlP5eLqzqpp_MetR7liSfFKet2oyUU5mWIOx7csg3le_VIVGYX_WsaXG94I2ZIo9cKlIeVCaHahcGGatvWxVq2QmTwmMCQ"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "0baed4b4-84f0-4e99-9be2-29273fc0d87f",
      "x": "3MXfTT3O4gI8n7Pu5hvv-nMUrvBLx8oBe95Ds8Z0vcE",
      "y": "vFmBuwBsQ4gr3qVaesDo4N548STAQqicFL9FzrqiEEM"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "6cd133c0-acf6-425d-8632-ebf64fd60ebf",
      "x": "gKOqF6FF-gsRiJbqHQfLcfcvYo8qxI9R8riXEC5_Erk",
      "y": "qW9FfTY01Z0T0La5lN3Hxdcs0SBeNFBS8r9_McT95dw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "f31d70ef-e203-4999-8def-b172baaaa46c",
      "x": "VA_9Gl7aEV_8bzqjl_xNFKkONbmffeXQ84OJUwL-UnY",
      "y": "wLbhaBUjZyO4ZUvKaUne1ZXiMQXuHnjMZwNMVSto-3g"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "604c823f-facd-4c04-9f3c-130c8b06e8ea",
      "x": "RmkqPyfqlMqE6f6vQMEh5nqKSZNPPsg3BGSmEYP3Tg0"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "859dbeae-7cd8-45c1-8536-331018e89b61",
      "alg": "RSA-OAEP",
      "n": "lddO2Y6GoCwnsJ2rfttYfChRLEdfCy97B-ujJzCqt7F9EUPwVB8j2u1GzbTHh02fz5c_1Ht5rPhZH3_RMv4jPr5Hf7XDdAiiQyMgFJSBcMnYVodbd0fFqlujI-llW0MMLVpztaoB1MAiG14a_WtMx9HAUSU4-A9KyUCZdiRH9TSzPadGseB45MCfwg6haGWPGV7LJg3ef1ybwxQNqlAc5jWrNZhEF0UVgN6BqbawTygmHyfHarB7O8NxsL7IEKcX19O5kytV_JHAMGeuUe7aInqOA7iXIyH63YGB-3wyJY6usP2Rhx9tVjmjhHYWLqbIwRJ7hah2bnO3nTC0smbOmw"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "984c9b42-5d7f-4974-b2c7-2c609f407de2",
      "x": "bLLD7czeYuBTqjyYC2gXnwh6T_iAcVpWnRKaP-zo6j4",
      "y": "D6RXSKNgh2BNxIYH1jVwHO6Pl8hKieEoRHXrnzCOJ38",
      "alg": "ECDH-ES"
    }
  ]
}
2021-05-27 16:47:17 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2021-05-27 16:47:17 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2021-05-27 16:47:17 SUCCESS
OIDCCLoadUserInfo
Added user information
user_info
{
  "sub": "user-subject-1234531",
  "name": "Demo T. User",
  "given_name": "Demo",
  "family_name": "User",
  "middle_name": "Theresa",
  "nickname": "Dee",
  "preferred_username": "d.tu",
  "gender": "female",
  "birthdate": "2000-02-03",
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "zoneinfo": "America/Los_Angeles",
  "locale": "en-US",
  "phone_number": "+1 555 5550000",
  "phone_number_verified": false,
  "email": "user@example.com",
  "email_verified": false,
  "website": "https://openid.net/",
  "updated_at": 1580000000
}
2021-05-27 16:47:17 SUCCESS
OIDCCGetStaticClientConfigurationForRPTests
Found a static client object
client_secret_jwt_alg
RS256
client_id
12345678-openid-core-clientid
client_secret
abcdefgh-openid-core-clientsecret
scope
openid accounts
jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "n": "nXe9vqDEtjUQ3bYdMv67vtZ1Nr95Fnn1lQKO6ASiaIhL133AUSNmsC2De7_Fs2rEQ6r3KpzwEg6H4e7dFzCo0MTK11ZMHXyIcQsKRnviG_G8bV5EECoylY959TKvqgLd16rnqK70doAG34dglR1cn-gXpoVdM1tmTWgmQryT3y-jdNvtba9SE3-79e1FsfhbtsZ0YIS8gx7OVypPuVml7MvOkDbP8M-EaNB9YbwIdq4MK9DugaCxXI1U4naoXp47f8sl2iBeaAUuG4JWQ1Ct1sgiJOzRA1ts9WYYdu3pImXCviTb2C-6xD3DgeG5OPFQNcHG0ODQCHmEAX-DL72SHw"
    }
  ]
}
certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
redirect_uris
[
  "https://partnerauth-e2e.platform.intuit.com/external_partner/openid_core_cert/callback"
]
2021-05-27 16:47:17 SUCCESS
EnsureClientDoesNotHaveBothJwksAndJwksUri
Client does not have both jwks and jwks_uri set
client
{
  "client_secret_jwt_alg": "RS256",
  "client_id": "12345678-openid-core-clientid",
  "client_secret": "abcdefgh-openid-core-clientsecret",
  "scope": "openid accounts",
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "n": "nXe9vqDEtjUQ3bYdMv67vtZ1Nr95Fnn1lQKO6ASiaIhL133AUSNmsC2De7_Fs2rEQ6r3KpzwEg6H4e7dFzCo0MTK11ZMHXyIcQsKRnviG_G8bV5EECoylY959TKvqgLd16rnqK70doAG34dglR1cn-gXpoVdM1tmTWgmQryT3y-jdNvtba9SE3-79e1FsfhbtsZ0YIS8gx7OVypPuVml7MvOkDbP8M-EaNB9YbwIdq4MK9DugaCxXI1U4naoXp47f8sl2iBeaAUuG4JWQ1Ct1sgiJOzRA1ts9WYYdu3pImXCviTb2C-6xD3DgeG5OPFQNcHG0ODQCHmEAX-DL72SHw"
      }
    ]
  },
  "certificate": "-----BEGIN CERTIFICATE-----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\nJJ4ExCQnVkS6U4yaNsKp4HET\n-----END CERTIFICATE-----",
  "redirect_uris": [
    "https://partnerauth-e2e.platform.intuit.com/external_partner/openid_core_cert/callback"
  ]
}
2021-05-27 16:47:17 INFO
FetchClientKeys
Skipped evaluation due to missing required element: client jwks_uri
path
jwks_uri
mapped
object
client
2021-05-27 16:47:17 SUCCESS
ValidateClientGrantTypes
grant_types match response_types
grant_types
[
  "authorization_code"
]
response_types
[
  "code"
]
2021-05-27 16:47:17 SUCCESS
OIDCCValidateClientRedirectUris
Valid redirect_uri(s) provided in registration request
redirect_uris
[
  "https://partnerauth-e2e.platform.intuit.com/external_partner/openid_core_cert/callback"
]
2021-05-27 16:47:17 SUCCESS
ValidateClientLogoUris
Client does not contain any logo_uri
2021-05-27 16:47:17 SUCCESS
ValidateClientUris
Client does not contain any client_uri
2021-05-27 16:47:17 SUCCESS
ValidateClientPolicyUris
Client does not contain any policy_uri
2021-05-27 16:47:17 SUCCESS
ValidateClientTosUris
Client does not contain any tos_uri
2021-05-27 16:47:17 SUCCESS
ValidateClientSubjectType
A subject_type was not provided
2021-05-27 16:47:17 INFO
ValidateIdTokenSignedResponseAlg
Skipped evaluation due to missing required element: client id_token_signed_response_alg
path
id_token_signed_response_alg
mapped
object
client
2021-05-27 16:47:17 SUCCESS
EnsureIdTokenEncryptedResponseAlgIsSetIfEncIsSet
id_token_encrypted_response_enc is not set
2021-05-27 16:47:17 INFO
ValidateUserinfoSignedResponseAlg
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2021-05-27 16:47:17 SUCCESS
EnsureUserinfoEncryptedResponseAlgIsSetIfEncIsSet
userinfo_encrypted_response_enc is not set
2021-05-27 16:47:17 INFO
ValidateRequestObjectSigningAlg
Skipped evaluation due to missing required element: client request_object_signing_alg
path
request_object_signing_alg
mapped
object
client
2021-05-27 16:47:17 SUCCESS
EnsureRequestObjectEncryptionAlgIsSetIfEncIsSet
request_object_encryption_enc is not set
2021-05-27 16:47:17 INFO
ValidateTokenEndpointAuthSigningAlg
Skipped evaluation due to missing required element: client token_endpoint_auth_signing_alg
path
token_endpoint_auth_signing_alg
mapped
object
client
2021-05-27 16:47:17 SUCCESS
ValidateDefaultMaxAge
default_max_age is not set
2021-05-27 16:47:17 INFO
ValidateRequireAuthTime
Skipped evaluation due to missing required element: client require_auth_time
path
require_auth_time
mapped
object
client
2021-05-27 16:47:17 INFO
ValidateDefaultAcrValues
Skipped evaluation due to missing required element: client default_acr_values
path
default_acr_values
mapped
object
client
2021-05-27 16:47:17 INFO
ValidateInitiateLoginUri
Skipped evaluation due to missing required element: client initiate_login_uri
path
initiate_login_uri
mapped
object
client
2021-05-27 16:47:17 INFO
ValidateRequestUris
Skipped evaluation due to missing required element: client request_uris
path
request_uris
mapped
object
client
2021-05-27 16:47:17 SUCCESS
OIDCCExtractServerSigningAlg
Using the default algorithm for the first key in server jwks
signing_algorithm
RS256
2021-05-27 16:47:17
SetClientIdTokenSignedResponseAlgToServerSigningAlg
Set id_token_signed_response_alg for the registered client
id_token_signed_response_alg
RS256
2021-05-27 16:47:17
oidcc-client-test-userinfo-invalid-sub
Setup Done
2021-05-27 16:47:40 INCOMING
oidcc-client-test-userinfo-invalid-sub
Incoming HTTP request to test instance AIPmt9BVfWsEV8Y
incoming_headers
{
  "host": "www.certification.openid.net",
  "upgrade-insecure-requests": "1",
  "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/avif,image/webp,image/apng,*/*;q\u003d0.8,application/signed-exchange;v\u003db3;q\u003d0.9",
  "sec-fetch-site": "none",
  "sec-fetch-mode": "navigate",
  "sec-fetch-user": "?1",
  "sec-fetch-dest": "document",
  "sec-ch-ua": "\" Not A;Brand\";v\u003d\"99\", \"Chromium\";v\u003d\"90\", \"Google Chrome\";v\u003d\"90\"",
  "sec-ch-ua-mobile": "?0",
  "accept-encoding": "gzip, deflate, br",
  "accept-language": "en-US,en;q\u003d0.9,hi;q\u003d0.8",
  "cookie": "__utmz\u003d201319536.1621283291.13.3.utmcsr\u003dgoogle|utmccn\u003d(organic)|utmcmd\u003dorganic|utmctr\u003d(not%20provided); __utma\u003d201319536.30309185.1617009267.1621283291.1621288066.14; JSESSIONID\u003dE2235002E33C55C6D18638CE4FD23E81",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
authorize
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "scope": "openid phone profile email address offline_access",
  "response_type": "code",
  "redirect_uri": "https://partnerauth-e2e.platform.intuit.com/external_partner/openid_core_cert/callback",
  "client_id": "12345678-openid-core-clientid",
  "nonce": "awb.f412fc55-305c-4cba-8cae-ea5f89ca771e",
  "state": "awb.f412fc55-305c-4cba-8cae-ea5f89ca771e"
}
incoming_body
Authorization endpoint
2021-05-27 16:47:40 SUCCESS
EnsureRequestDoesNotContainRequestObject
Request does not contain a request parameter
2021-05-27 16:47:40 SUCCESS
OIDCCEnsureAuthorizationHttpRequestContainsOpenIDScope
Found 'openid' in scope http request parameter
actual
[
  "openid",
  "phone",
  "profile",
  "email",
  "address",
  "offline_access"
]
expected
openid
2021-05-27 16:47:40 SUCCESS
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
effective_authorization_endpoint_request
{
  "scope": "openid phone profile email address offline_access",
  "response_type": "code",
  "redirect_uri": "https://partnerauth-e2e.platform.intuit.com/external_partner/openid_core_cert/callback",
  "client_id": "12345678-openid-core-clientid",
  "nonce": "awb.f412fc55-305c-4cba-8cae-ea5f89ca771e",
  "state": "awb.f412fc55-305c-4cba-8cae-ea5f89ca771e"
}
2021-05-27 16:47:40 SUCCESS
ExtractRequestedScopes
Requested scopes
scope
openid phone profile email address offline_access
2021-05-27 16:47:40 SUCCESS
ExtractNonceFromAuthorizationRequest
Extracted nonce
nonce
awb.f412fc55-305c-4cba-8cae-ea5f89ca771e
2021-05-27 16:47:40 SUCCESS
EnsureResponseTypeIsCode
Response type is expected value
expected
code
2021-05-27 16:47:40 SUCCESS
EnsureMatchingClientId
Client ID matched
client_id
12345678-openid-core-clientid
2021-05-27 16:47:40 SUCCESS
EnsureValidRedirectUriForAuthorizationEndpointRequest
redirect_uri is one of the allowed redirect uris
actual
https://partnerauth-e2e.platform.intuit.com/external_partner/openid_core_cert/callback
expected
[
  "https://partnerauth-e2e.platform.intuit.com/external_partner/openid_core_cert/callback"
]
2021-05-27 16:47:40 SUCCESS
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
actual
[
  "openid",
  "phone",
  "profile",
  "email",
  "address",
  "offline_access"
]
expected
openid
2021-05-27 16:47:40 SUCCESS
DisallowMaxAgeEqualsZeroAndPromptNone
The client did not send max_age=0 and prompt=none parameters as expected
2021-05-27 16:47:40 SUCCESS
CreateAuthorizationCode
Created authorization code
authorization_code
xcnnkmr0cp
2021-05-27 16:47:40 SUCCESS
CalculateCHash
Successful c_hash encoding
c_hash
otqDEkL9Az7xqKFvLl7VtA
2021-05-27 16:47:40 SUCCESS
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
params
{
  "redirect_uri": "https://partnerauth-e2e.platform.intuit.com/external_partner/openid_core_cert/callback",
  "state": "awb.f412fc55-305c-4cba-8cae-ea5f89ca771e"
}
2021-05-27 16:47:40 SUCCESS
AddCodeToAuthorizationEndpointResponseParams
Added code to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://partnerauth-e2e.platform.intuit.com/external_partner/openid_core_cert/callback",
  "state": "awb.f412fc55-305c-4cba-8cae-ea5f89ca771e",
  "code": "xcnnkmr0cp"
}
2021-05-27 16:47:40
SendAuthorizationResponseWithResponseModeQuery
Redirecting back to client
uri
https://partnerauth-e2e.platform.intuit.com/external_partner/openid_core_cert/callback?state=awb.f412fc55-305c-4cba-8cae-ea5f89ca771e&code=xcnnkmr0cp
2021-05-27 16:47:40 OUTGOING
oidcc-client-test-userinfo-invalid-sub
Response to HTTP request to test instance AIPmt9BVfWsEV8Y
outgoing
org.springframework.web.servlet.view.RedirectView: [RedirectView]; URL [https://partnerauth-e2e.platform.intuit.com/external_partner/openid_core_cert/callback?state=awb.f412fc55-305c-4cba-8cae-ea5f89ca771e&code=xcnnkmr0cp]
outgoing_path
authorize
2021-05-27 16:47:42 INCOMING
oidcc-client-test-userinfo-invalid-sub
Incoming HTTP request to test instance AIPmt9BVfWsEV8Y
incoming_headers
{
  "host": "www.certification.openid.net",
  "authorization": "Basic MTIzNDU2Nzgtb3BlbmlkLWNvcmUtY2xpZW50aWQ6YWJjZGVmZ2gtb3BlbmlkLWNvcmUtY2xpZW50c2VjcmV0",
  "content-type": "application/x-www-form-urlencoded; charset\u003dUTF-8",
  "user-agent": "Apache-HttpClient/4.5.6 (Java/1.8.0_241)",
  "accept-encoding": "gzip,deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "245",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
token
incoming_body_form_params
{
  "code": "xcnnkmr0cp",
  "grant_type": "authorization_code",
  "redirect_uri": "https://partnerauth-e2e.platform.intuit.com/external_partner/openid_core_cert/callback",
  "client_id": "12345678-openid-core-clientid",
  "client_secret": "abcdefgh-openid-core-clientsecret"
}
incoming_method
POST
incoming_body_json
incoming_query_string_params
{}
incoming_body
code=xcnnkmr0cp&grant_type=authorization_code&redirect_uri=https%3A%2F%2Fpartnerauth-e2e.platform.intuit.com%2Fexternal_partner%2Fopenid_core_cert%2Fcallback&client_id=12345678-openid-core-clientid&client_secret=abcdefgh-openid-core-clientsecret
Token endpoint
2021-05-27 16:47:42 SUCCESS
ExtractClientCredentialsFromBasicAuthorizationHeader
Extracted client authentication
client_id
12345678-openid-core-clientid
client_secret
abcdefgh-openid-core-clientsecret
method
client_secret_basic
2021-05-27 16:47:42 SUCCESS
ValidateClientIdAndSecret
Client id and secret match
2021-05-27 16:47:42 SUCCESS
ValidateAuthorizationCode
Found authorization code
authorization_code
xcnnkmr0cp
2021-05-27 16:47:42 SUCCESS
ValidateRedirectUriForTokenEndpointRequest
redirect_uri is the same as the one used in the authorization request
actual
https://partnerauth-e2e.platform.intuit.com/external_partner/openid_core_cert/callback
2021-05-27 16:47:42 SUCCESS
GenerateBearerAccessToken
Generated access token
access_token
DgerkUsQe60nptCLHrWAlhAud70YbDQRJUtR6kLzlGazUAm4O7
2021-05-27 16:47:42 SUCCESS
CalculateAtHash
Successful at_hash encoding
at_hash
v-FZ44OnumR9EiaTgbRYuQ
2021-05-27 16:47:42 SUCCESS
GenerateIdTokenClaims
Created ID Token Claims
iss
https://www.certification.openid.net/test/a/Intuit_pauth_openid_core_basic_plan_1/
sub
user-subject-1234531
aud
12345678-openid-core-clientid
nonce
awb.f412fc55-305c-4cba-8cae-ea5f89ca771e
iat
1622134062
exp
1622134362
2021-05-27 16:47:42 SUCCESS
AddAtHashToIdTokenClaims
Added at_hash to ID token claims
at_hash
v-FZ44OnumR9EiaTgbRYuQ
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/a/Intuit_pauth_openid_core_basic_plan_1/",
  "sub": "user-subject-1234531",
  "aud": "12345678-openid-core-clientid",
  "nonce": "awb.f412fc55-305c-4cba-8cae-ea5f89ca771e",
  "iat": 1622134062,
  "exp": 1622134362,
  "at_hash": "v-FZ44OnumR9EiaTgbRYuQ"
}
2021-05-27 16:47:42 SUCCESS
OIDCCSignIdToken
Signed the ID token
id_token
eyJraWQiOiIwMjNjNTE5Mi0wZWUxLTRhZGUtODliNC1mODhhZDRkODk0NjgiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoidi1GWjQ0T251bVI5RWlhVGdiUll1USIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiMTIzNDU2Nzgtb3BlbmlkLWNvcmUtY2xpZW50aWQiLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvYVwvSW50dWl0X3BhdXRoX29wZW5pZF9jb3JlX2Jhc2ljX3BsYW5fMVwvIiwiZXhwIjoxNjIyMTM0MzYyLCJub25jZSI6ImF3Yi5mNDEyZmM1NS0zMDVjLTRjYmEtOGNhZS1lYTVmODljYTc3MWUiLCJpYXQiOjE2MjIxMzQwNjJ9.q21VJvS6l_j2rgVk1RbpwG3heNNpz2_7tLG3tp_XOz2j1TdcqbREMzaOsr47-C37Jt5v3iusj9OUFi3SHTVkXYYsuBXnn2tnNMSAZzN0jH4l4c1XwW6NF_s0620pmVkqxL_yjlgxoPggDAYTHl-IKeETR-VJ_-iP5_vKkvglhCjYnhUMN5iXIlYFX3vt2lhJNd0VAyhThKmbSZKB_wL_Tr_4TDcSKWB2d1ZNZmTLhIanJ8b5pmrIkywIsG0BBS0lsGD_Qc4vxhFPn69Rewo2MUXS-vjeTZib1O1fqWuC9p0dUFN8XaSc3sefPzH1RFmqjSHRroHdwz3RDTYK-teqzA
key
{"p":"6nDXEwEs4_qEff_KaSblVEijGvocR820Q6lD1gSE7qWMGjbRbgss9wz9WzHHAeOS2aqfUwU61p4ZxDCPpsIWGn62Z6Ii-TL2i8wae0MIah8SZvtlMG_0FBPw1vVcAASOVlaTVEfzBOFqwI3qhK0yTm8QJzLm9Ll-77_iqdBWCIs","kty":"RSA","q":"58b9RTamhe3idDRUmdVT72aMrMlDI64s-B4ryV8g7gwfIZ9abRkCA30BSEwxOGANCH3lHjplpLn0PPnqasnzkRRZsm-eSpAMPYIiqKYvgwzB3qmFZzjchhNrNrmyBOIt1QzDBSM25c3C5BI8zSR_WvmCyvRcYkqMJbzaRtcCHd0","d":"LsVTOi4j-n30E-omNmHhPORhKosn18-ZvALpxM8LXKPGFraV7igIOlSiupbRzTBHNcUupMPQ54k9VMvWiR2CmuK5rBZqeZX1yWvUwNzgqUjly4NzrhSSJ3FTRu0Q-uTNhBipV-mxTFheLkrzvHRvJO8IcWwvNgM6oezPdaUqghPRoScT_KkZUaZg2DcHnGvVcEz1Y8cz1p8uf6n610yf387vYstkkDSa940qemNgXtpMq-_RcE2gtEBU4K9Hn2S7ohPQKimtAd9L9u_8WLZ3eNgWUhCdydy8WE5hDoG6F9wz_vifS1NnXhWfCKSqkso7vhfvwRAbKFXtL3nRbfg2WQ","e":"AQAB","use":"sig","kid":"023c5192-0ee1-4ade-89b4-f88ad4d89468","qi":"3DKNAxl_CHjIiE3qhGSwfMRLH8AVqs0uqiDHe8gEOUqJnBOROACzo5VFzwxGC37g2lHvoDjA74wCbFTawwrv8mUIbzvrB68XD1OpSMGHNbnX43gqAkK-R8HHDc2le3F8Kdkgg7EsTY0-8gnTcPxuqRwKmL4e7DiIIuKz3p4aGZI","dp":"PT7nYQaglJpgvI3zcg8AQEmNmsGWW8fIfRieKS4bEEFdXYfOpKH0yEGzenyBkePC_GxPnR-zpFe_QXqyPI1duuQ5gM9htZpzwEe871CuxRKC-zZX1BSbPheLhoyo0TRffvy1FoKJYVAGVHF-v9SDXOw02xi4L1y6ZaXKcDSGFUs","dq":"olcHKIZpxp7jIT9SDlmUK7dpStDBPOmPR85iHu6JcxJ8b6FcxdNhTK4uysPLKdBk8JC1fSGr9d_lSRxG67s95V0aold5yIHygNZ4jiWwW5sA44NbE_yIwUQysScJoFAHiBUjN6L9naIsInD_szQgG8ltqdfUKWhLl1caj8mjCuU","n":"1EINSWXGd-gB4HMNbdKBR_vaU_9ndLl0eq82eJh1NRP0xP9tKQCpqB-SyTt7ZmBofE-RRjnbJrOFpZN2K1yexdMo6Ur6jsiOO6C8j1Yg5538tcMuWT5i9DzRQe8WJASdyfhnHLgH6DQ75QDwp8Yzrn41FWhxWhSKJtAbjmoeTODleCylk0zc9B1Qzpg6Vn--5DdPFrgjYkOj0V8uPaYYemjUqK3bT74Tlysd8cMGD7IHGy1ocLJ-LZ29ZQz2YgxP4q8jRPdfFtlEH-GMX2cw0vjdNyFL2SYWPuD6rZjnzbENSkgniHYsldiExjn9hCI0QSkX7iSoaOCwgH8NZ1Me_w"}
algorithm
RS256
2021-05-27 16:47:42 INFO
EncryptIdToken
Skipped evaluation due to missing required element: client id_token_encrypted_response_alg
path
id_token_encrypted_response_alg
mapped
object
client
2021-05-27 16:47:42 SUCCESS
CreateTokenEndpointResponse
Created token endpoint response
access_token
DgerkUsQe60nptCLHrWAlhAud70YbDQRJUtR6kLzlGazUAm4O7
token_type
Bearer
id_token
eyJraWQiOiIwMjNjNTE5Mi0wZWUxLTRhZGUtODliNC1mODhhZDRkODk0NjgiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoidi1GWjQ0T251bVI5RWlhVGdiUll1USIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiMTIzNDU2Nzgtb3BlbmlkLWNvcmUtY2xpZW50aWQiLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvYVwvSW50dWl0X3BhdXRoX29wZW5pZF9jb3JlX2Jhc2ljX3BsYW5fMVwvIiwiZXhwIjoxNjIyMTM0MzYyLCJub25jZSI6ImF3Yi5mNDEyZmM1NS0zMDVjLTRjYmEtOGNhZS1lYTVmODljYTc3MWUiLCJpYXQiOjE2MjIxMzQwNjJ9.q21VJvS6l_j2rgVk1RbpwG3heNNpz2_7tLG3tp_XOz2j1TdcqbREMzaOsr47-C37Jt5v3iusj9OUFi3SHTVkXYYsuBXnn2tnNMSAZzN0jH4l4c1XwW6NF_s0620pmVkqxL_yjlgxoPggDAYTHl-IKeETR-VJ_-iP5_vKkvglhCjYnhUMN5iXIlYFX3vt2lhJNd0VAyhThKmbSZKB_wL_Tr_4TDcSKWB2d1ZNZmTLhIanJ8b5pmrIkywIsG0BBS0lsGD_Qc4vxhFPn69Rewo2MUXS-vjeTZib1O1fqWuC9p0dUFN8XaSc3sefPzH1RFmqjSHRroHdwz3RDTYK-teqzA
scope
openid phone profile email address offline_access
2021-05-27 16:47:42 OUTGOING
oidcc-client-test-userinfo-invalid-sub
Response to HTTP request to test instance AIPmt9BVfWsEV8Y
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "access_token": "DgerkUsQe60nptCLHrWAlhAud70YbDQRJUtR6kLzlGazUAm4O7",
  "token_type": "Bearer",
  "id_token": "eyJraWQiOiIwMjNjNTE5Mi0wZWUxLTRhZGUtODliNC1mODhhZDRkODk0NjgiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoidi1GWjQ0T251bVI5RWlhVGdiUll1USIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiMTIzNDU2Nzgtb3BlbmlkLWNvcmUtY2xpZW50aWQiLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvYVwvSW50dWl0X3BhdXRoX29wZW5pZF9jb3JlX2Jhc2ljX3BsYW5fMVwvIiwiZXhwIjoxNjIyMTM0MzYyLCJub25jZSI6ImF3Yi5mNDEyZmM1NS0zMDVjLTRjYmEtOGNhZS1lYTVmODljYTc3MWUiLCJpYXQiOjE2MjIxMzQwNjJ9.q21VJvS6l_j2rgVk1RbpwG3heNNpz2_7tLG3tp_XOz2j1TdcqbREMzaOsr47-C37Jt5v3iusj9OUFi3SHTVkXYYsuBXnn2tnNMSAZzN0jH4l4c1XwW6NF_s0620pmVkqxL_yjlgxoPggDAYTHl-IKeETR-VJ_-iP5_vKkvglhCjYnhUMN5iXIlYFX3vt2lhJNd0VAyhThKmbSZKB_wL_Tr_4TDcSKWB2d1ZNZmTLhIanJ8b5pmrIkywIsG0BBS0lsGD_Qc4vxhFPn69Rewo2MUXS-vjeTZib1O1fqWuC9p0dUFN8XaSc3sefPzH1RFmqjSHRroHdwz3RDTYK-teqzA",
  "scope": "openid phone profile email address offline_access"
}
outgoing_path
token
2021-05-27 16:47:43 INCOMING
oidcc-client-test-userinfo-invalid-sub
Incoming HTTP request to test instance AIPmt9BVfWsEV8Y
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Apache-HttpClient/4.5.6 (Java/1.8.0_241)",
  "accept-encoding": "gzip,deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
jwks
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Jwks endpoint
2021-05-27 16:47:43 OUTGOING
oidcc-client-test-userinfo-invalid-sub
Response to HTTP request to test instance AIPmt9BVfWsEV8Y
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "023c5192-0ee1-4ade-89b4-f88ad4d89468",
      "n": "1EINSWXGd-gB4HMNbdKBR_vaU_9ndLl0eq82eJh1NRP0xP9tKQCpqB-SyTt7ZmBofE-RRjnbJrOFpZN2K1yexdMo6Ur6jsiOO6C8j1Yg5538tcMuWT5i9DzRQe8WJASdyfhnHLgH6DQ75QDwp8Yzrn41FWhxWhSKJtAbjmoeTODleCylk0zc9B1Qzpg6Vn--5DdPFrgjYkOj0V8uPaYYemjUqK3bT74Tlysd8cMGD7IHGy1ocLJ-LZ29ZQz2YgxP4q8jRPdfFtlEH-GMX2cw0vjdNyFL2SYWPuD6rZjnzbENSkgniHYsldiExjn9hCI0QSkX7iSoaOCwgH8NZ1Me_w"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "2d8d28bc-7755-4938-98b8-e909d9068501",
      "n": "lUOkcqDelKCV16XxVAr9U3AozFKZyCE2pFqJ-6sVz42ybW9dYILI4GcD4HTVq1wrZxnESBI3Jr7e_pLqPxp1NuEoljQV9LQrpn6kgOY1LALlM_6rGpswUN7c2Gc4F1au-jPxSrxwKc21rfX8-oLsa10cs6ZOkwgOcKuSfqFOmdvyQv6jpFxZpO7X2YihVLHfb7Y4Frvs_wnWsZbKSzW6-oiYbll5Svxyjlx2b3cEbBWuWYLhQtUygEYUAlP5eLqzqpp_MetR7liSfFKet2oyUU5mWIOx7csg3le_VIVGYX_WsaXG94I2ZIo9cKlIeVCaHahcGGatvWxVq2QmTwmMCQ"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "0baed4b4-84f0-4e99-9be2-29273fc0d87f",
      "x": "3MXfTT3O4gI8n7Pu5hvv-nMUrvBLx8oBe95Ds8Z0vcE",
      "y": "vFmBuwBsQ4gr3qVaesDo4N548STAQqicFL9FzrqiEEM"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "6cd133c0-acf6-425d-8632-ebf64fd60ebf",
      "x": "gKOqF6FF-gsRiJbqHQfLcfcvYo8qxI9R8riXEC5_Erk",
      "y": "qW9FfTY01Z0T0La5lN3Hxdcs0SBeNFBS8r9_McT95dw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "f31d70ef-e203-4999-8def-b172baaaa46c",
      "x": "VA_9Gl7aEV_8bzqjl_xNFKkONbmffeXQ84OJUwL-UnY",
      "y": "wLbhaBUjZyO4ZUvKaUne1ZXiMQXuHnjMZwNMVSto-3g"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "604c823f-facd-4c04-9f3c-130c8b06e8ea",
      "x": "RmkqPyfqlMqE6f6vQMEh5nqKSZNPPsg3BGSmEYP3Tg0"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "859dbeae-7cd8-45c1-8536-331018e89b61",
      "alg": "RSA-OAEP",
      "n": "lddO2Y6GoCwnsJ2rfttYfChRLEdfCy97B-ujJzCqt7F9EUPwVB8j2u1GzbTHh02fz5c_1Ht5rPhZH3_RMv4jPr5Hf7XDdAiiQyMgFJSBcMnYVodbd0fFqlujI-llW0MMLVpztaoB1MAiG14a_WtMx9HAUSU4-A9KyUCZdiRH9TSzPadGseB45MCfwg6haGWPGV7LJg3ef1ybwxQNqlAc5jWrNZhEF0UVgN6BqbawTygmHyfHarB7O8NxsL7IEKcX19O5kytV_JHAMGeuUe7aInqOA7iXIyH63YGB-3wyJY6usP2Rhx9tVjmjhHYWLqbIwRJ7hah2bnO3nTC0smbOmw"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "984c9b42-5d7f-4974-b2c7-2c609f407de2",
      "x": "bLLD7czeYuBTqjyYC2gXnwh6T_iAcVpWnRKaP-zo6j4",
      "y": "D6RXSKNgh2BNxIYH1jVwHO6Pl8hKieEoRHXrnzCOJ38",
      "alg": "ECDH-ES"
    }
  ]
}
outgoing_path
jwks
2021-05-27 16:47:43 INCOMING
oidcc-client-test-userinfo-invalid-sub
Incoming HTTP request to test instance AIPmt9BVfWsEV8Y
incoming_headers
{
  "host": "www.certification.openid.net",
  "authorization": "Bearer DgerkUsQe60nptCLHrWAlhAud70YbDQRJUtR6kLzlGazUAm4O7",
  "user-agent": "Apache-HttpClient/4.5.6 (Java/1.8.0_241)",
  "accept-encoding": "gzip,deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
userinfo
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Userinfo endpoint
2021-05-27 16:47:43 SUCCESS
OIDCCExtractBearerAccessTokenFromRequest
Found access token on incoming request
access_token
DgerkUsQe60nptCLHrWAlhAud70YbDQRJUtR6kLzlGazUAm4O7
2021-05-27 16:47:43 SUCCESS
RequireBearerAccessToken
Found access token in request
actual
DgerkUsQe60nptCLHrWAlhAud70YbDQRJUtR6kLzlGazUAm4O7
2021-05-27 16:47:43 SUCCESS
FilterUserInfoForScopes
User info endpoint output
sub
user-subject-1234531
phone_number_verified
false
phone_number
+1 555 5550000
website
https://openid.net/
zoneinfo
America/Los_Angeles
birthdate
2000-02-03
gender
female
preferred_username
d.tu
given_name
Demo
middle_name
Theresa
locale
en-US
updated_at
1580000000
name
Demo T. User
nickname
Dee
family_name
User
email
user@example.com
email_verified
false
address
{
  "street_address": "100 Universal City Plaza",
  "locality": "Hollywood",
  "region": "CA",
  "postal_code": "91608",
  "country": "USA"
}
2021-05-27 16:47:43
ChangeSubInUserInfoResponseToBeInvalid
Added invalid sub to userinfo endpoint output
sub
user-subject-1234531invalid
phone_number_verified
false
phone_number
+1 555 5550000
website
https://openid.net/
zoneinfo
America/Los_Angeles
birthdate
2000-02-03
gender
female
preferred_username
d.tu
given_name
Demo
middle_name
Theresa
locale
en-US
updated_at
1580000000
name
Demo T. User
nickname
Dee
family_name
User
email
user@example.com
email_verified
false
address
{
  "street_address": "100 Universal City Plaza",
  "locality": "Hollywood",
  "region": "CA",
  "postal_code": "91608",
  "country": "USA"
}
2021-05-27 16:47:43
ClearAccessTokenFromRequest
Condition ran but did not log anything
2021-05-27 16:47:43 INFO
AddIssAndAudToUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2021-05-27 16:47:43 INFO
SignUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2021-05-27 16:47:43 INFO
EncryptUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_encrypted_response_alg
path
userinfo_encrypted_response_alg
mapped
object
client
2021-05-27 16:47:43 OUTGOING
oidcc-client-test-userinfo-invalid-sub
Response to HTTP request to test instance AIPmt9BVfWsEV8Y
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "sub": "user-subject-1234531invalid",
  "phone_number_verified": false,
  "phone_number": "+1 555 5550000",
  "website": "https://openid.net/",
  "zoneinfo": "America/Los_Angeles",
  "birthdate": "2000-02-03",
  "gender": "female",
  "preferred_username": "d.tu",
  "given_name": "Demo",
  "middle_name": "Theresa",
  "locale": "en-US",
  "updated_at": 1580000000,
  "name": "Demo T. User",
  "nickname": "Dee",
  "family_name": "User",
  "email": "user@example.com",
  "email_verified": false,
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  }
}
outgoing_path
userinfo
2021-05-27 16:47:43 FINISHED
oidcc-client-test-userinfo-invalid-sub
Test has run to completion
testmodule_result
PASSED
Test Results