Test Summary

Test Results

Expand All Collapse All
All times are UTC
2021-05-27 16:26:37 INFO
TEST-RUNNER
Test instance Z84DF4T0oUDZ36S created
baseUrl
https://www.certification.openid.net/test/a/Intuit_pauth_openid_core_basic_plan_1
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code",
  "request_type": "plain_http_request",
  "response_mode": "default",
  "client_registration": "static_client"
}
alias
Intuit_pauth_openid_core_basic_plan_1
description
Test Core OpenId on Intuit PartnerAuth
planId
c3dY1ClOWenWa
config
{
  "alias": "Intuit_pauth_openid_core_basic_plan_1",
  "description": "Test Core OpenId on Intuit PartnerAuth",
  "client": {
    "client_secret_jwt_alg": "RS256",
    "client_id": "12345678-openid-core-clientid",
    "client_secret": "abcdefgh-openid-core-clientsecret",
    "redirect_uri": "https://partnerauth-e2e.platform.intuit.com/external_partner/openid_core_cert/callback",
    "scope": "openid accounts",
    "jwks": {
      "keys": [
        {
          "kty": "RSA",
          "e": "AQAB",
          "n": "nXe9vqDEtjUQ3bYdMv67vtZ1Nr95Fnn1lQKO6ASiaIhL133AUSNmsC2De7_Fs2rEQ6r3KpzwEg6H4e7dFzCo0MTK11ZMHXyIcQsKRnviG_G8bV5EECoylY959TKvqgLd16rnqK70doAG34dglR1cn-gXpoVdM1tmTWgmQryT3y-jdNvtba9SE3-79e1FsfhbtsZ0YIS8gx7OVypPuVml7MvOkDbP8M-EaNB9YbwIdq4MK9DugaCxXI1U4naoXp47f8sl2iBeaAUuG4JWQ1Ct1sgiJOzRA1ts9WYYdu3pImXCviTb2C-6xD3DgeG5OPFQNcHG0ODQCHmEAX-DL72SHw"
        }
      ]
    },
    "certificate": "-----BEGIN CERTIFICATE-----\nMIIGDjCCBPagAwIBAgIEWf/FWTANBgkqhkiG9w0BAQsFADBEMQswCQYDVQQGEwJH\nQjEUMBIGA1UEChMLT3BlbkJhbmtpbmcxHzAdBgNVBAMTFk9wZW5CYW5raW5nIElz\nc3VpbmcgQ0EwHhcNMjAxMDE0MTA1NjI3WhcNMjIxMDE0MTEyNjI3WjBeMQswCQYD\nVQQGEwJHQjEXMBUGA1UEChMOSW50dWl0IExpbWl0ZWQxGTAXBgNVBGETEFBTREdC\nLUZDQS03OTI5MzQxGzAZBgNVBAMTEjAwMTU4MDAwMDE2aTQ0akFBQTCCASIwDQYJ\nKoZIhvcNAQEBBQADggEPADCCAQoCggEBANlFM55UI2IKAavSLUBp5Nq62uDUeIox\nyFqKNT9tpFhBvT2I5JSEcg4bttQSloXl6TNi7B3UwCP959iPCNJatXwXlk4W9fQt\n9lP5cXHwwGLtQG2fnu72p0/SZXDe/iLCIV9n7AQJ9TZh8sYYfEhroVT59Pb8cnhb\nz9GpmboNEY5Hy9NpAU5h75fGX1tVk51Se48jzB6f0uMPjcLCJHrlIw2c2aVWYzvt\ncHnGuGGz+O6lhlR/sPDHMiv9bdLQVNsH7uISrV+i48vpRrmtOo+qDpeIlfsv/Gzn\nsbf0sp5eS7PRSIiZAWxqLi0eY0385updRl/4vY/DBF5rbs/vxGLdigUCAwEAAaOC\nAuwwggLoMA4GA1UdDwEB/wQEAwIHgDBpBggrBgEFBQcBAwRdMFswEwYGBACORgEG\nMAkGBwQAjkYBBgMwRAYGBACBmCcCMDowEzARBgcEAIGYJwEDDAZQU1BfQUkMG0Zp\nbmFuY2lhbCBDb25kdWN0IEF1dGhvcml0eQwGR0ItRkNBMCAGA1UdJQEB/wQWMBQG\nCCsGAQUFBwMBBggrBgEFBQcDAjCCAVIGA1UdIASCAUkwggFFMIIBQQYLKwYBBAGo\ndYEGAQEwggEwMDUGCCsGAQUFBwIBFilodHRwOi8vb2IudHJ1c3Rpcy5jb20vcHJv\nZHVjdGlvbi9wb2xpY2llczCB9gYIKwYBBQUHAgIwgekMgeZUaGlzIENlcnRpZmlj\nYXRlIGlzIHNvbGVseSBmb3IgdXNlIHdpdGggT3BlbiBCYW5raW5nIExpbWl0ZWQg\nYW5kIGFzc29jaWF0ZWQgT3BlbiBCYW5raW5nIFNlcnZpY2VzLiBJdHMgcmVjZWlw\ndCwgcG9zc2Vzc2lvbiBvciB1c2UgY29uc3RpdHV0ZXMgYWNjZXB0YW5jZSBvZiB0\naGUgT3BlbiBCYW5raW5nIExpbWl0ZWQgQ2VydGlmaWNhdGUgUG9saWN5IGFuZCBy\nZWxhdGVkIGRvY3VtZW50cyB0aGVyZWluLjByBggrBgEFBQcBAQRmMGQwJgYIKwYB\nBQUHMAGGGmh0dHA6Ly9vYi50cnVzdGlzLmNvbS9vY3NwMDoGCCsGAQUFBzAChi5o\ndHRwOi8vb2IudHJ1c3Rpcy5jb20vcHJvZHVjdGlvbi9pc3N1aW5nY2EuY3J0MD8G\nA1UdHwQ4MDYwNKAyoDCGLmh0dHA6Ly9vYi50cnVzdGlzLmNvbS9wcm9kdWN0aW9u\nL2lzc3VpbmdjYS5jcmwwHwYDVR0jBBgwFoAUn0m/TjanrMMPK8hH9B8pG8B5CwUw\nHQYDVR0OBBYEFMxf816ceEWTyPJGrWKxbQt7sHXMMA0GCSqGSIb3DQEBCwUAA4IB\nAQCFutiV+po2Vla80sD5Dpvy9A5zM/CHT2Pk+Vcn19fD2KMpFc+K87IDEqZTl7gi\nLum22+abRMLwbzBPUXBg+y+j909wBWUr4iiif7W55OwrlJkN6grbruGKvXkOPc76\n6e4zjMCoonUcBy7D1zJoe9naPVrJ1wHWeHde8DZSR/Rp336s9ubp5eQCDyvBtM0a\naOtrmQPhclzfSgLgA+3RZWqxE4MbTrKO65pxK1+LfKgWVAdpxU7krxtb9QUw2qdr\nx8mCl8ErY7UvGgc0l8UGP1yrgi2VLpe3RN9UADnnPy4ME8BViDK9nh6toNzDBKJJ\nJJ4ExCQnVkS6U4yaNsKp4HET\n-----END CERTIFICATE-----"
  },
  "server": {
    "jwks": {
      "keys": [
        {
          "p": "0X5a2vAXxfvavrqVOd9EaRGuZzbyQx4GjkI70K8CmW_SpGlNnfiMi-j9pfltfhOezBtbAnLzxikdlMiaIZGX0sfGs7z6l6Iq4fCbKgwGYjDjDj_oRGuZjB7NM_AHIsknjoxaoZrJAZz5xrdttimdkmA5psiSCDGAYLXQr8KAsL0",
          "kty": "RSA",
          "q": "wGy6Gz0YO3bWMpAdxG_iZkFkgvfAgRExE0zUnPKcOgjq3Ue1VeIdUV1639bTpXI80KNaAwKHeFp5M05lrZEzfSeM5HH9yYG0GgfmXx-RFrGa8DZpFQXmcunPu3Opl0cdxADPETZpfSYJ8npo5cBEJTokR7kXtU2eOCG5UGKuggs",
          "d": "RmA_szTS9cQdt5kuz529dvsOA9vrWDpFocU07Uk09JcFnlebXif-Ovr8apA44Yj0EnIUaT0eplNMM5O3yCd9K2Dobvkop30C1dLjUsEHOwn89rxMmxTg6qrnDMkMbWU-lKbTRjZ7F4L8j2ZHqh0nSmhGOawdDVjqDepgPy9cv0AtonAEDRVZiaUiOwie4vFYVy7ksoNvAsCs6Pl4bLaYXDoP7SmWUWeenODHyoMsUt0Z45-3ti_-di0qm7yQNgZ8NWLZNAd5T73qZm5zOwkRO6Tu8ZiWBeAV7t-wteKAaQ-KVLnLik4fRUUVWtS80prbz4b-I9kvNagmtef-GveqcQ",
          "e": "AQAB",
          "qi": "Sbg51OpF8E4zYaRAUjMrQ_DB6My9fZiJhQXF9nrJML1TF30k7SN8pHJ-N86WUweyvRTOm9wRb6CWHrwlpgBX1syaMAMOQPnHxv84e8emQQLl_mO0OUldb4Z53RM9z0DXoyKrgCsGS6B3D9GAX8AUFrsYJQDGNg5ib85aTqGhQG0",
          "dp": "cJyogDpBvUZ2PsKThulyn7xGcOtDbTrNsVj_SF1bW1mV9JU6iOlbu7XB659Z8UTgvr0Rvg5G5kWhxiHTYKof38lOEb5LQomE3bF15zNRlyTKWRWXaHgisQS5r-qeG1_gKKtf6LEIzhow1lYx3pMeRdn-A56biVX6uYHirSgz_00",
          "dq": "qENrSj5WXklAbN6Q6SFdPEWaetvivfomi9X3ZXbRHf6GQhFehEdBk9DGjc3xLQ-EFn2BTHh9tcSHj1HSn8AE4kAfd_QmFHsS3mBiFnQoD0wnTD6IDRYnufyy5hvyBJLveGGssESAYitNL3fTGnTSIiuBZiZ4kNXasQLsZVqldpk",
          "n": "nXe9vqDEtjUQ3bYdMv67vtZ1Nr95Fnn1lQKO6ASiaIhL133AUSNmsC2De7_Fs2rEQ6r3KpzwEg6H4e7dFzCo0MTK11ZMHXyIcQsKRnviG_G8bV5EECoylY959TKvqgLd16rnqK70doAG34dglR1cn-gXpoVdM1tmTWgmQryT3y-jdNvtba9SE3-79e1FsfhbtsZ0YIS8gx7OVypPuVml7MvOkDbP8M-EaNB9YbwIdq4MK9DugaCxXI1U4naoXp47f8sl2iBeaAUuG4JWQ1Ct1sgiJOzRA1ts9WYYdu3pImXCviTb2C-6xD3DgeG5OPFQNcHG0ODQCHmEAX-DL72SHw"
        }
      ]
    }
  }
}
testName
oidcc-client-test-idtoken-sig-none
2021-05-27 16:26:37 SUCCESS
OIDCCGenerateServerConfiguration
Generated default server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/Intuit_pauth_openid_core_basic_plan_1/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/Intuit_pauth_openid_core_basic_plan_1/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/Intuit_pauth_openid_core_basic_plan_1/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/Intuit_pauth_openid_core_basic_plan_1/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/Intuit_pauth_openid_core_basic_plan_1/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/Intuit_pauth_openid_core_basic_plan_1/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post",
    "client_secret_jwt",
    "private_key_jwt"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2021-05-27 16:26:37
SetTokenEndpointAuthMethodsSupportedToClientSecretBasicOnly
Changed token_endpoint_auth_methods_supported to client_secret_basic only in server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/Intuit_pauth_openid_core_basic_plan_1/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/Intuit_pauth_openid_core_basic_plan_1/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/Intuit_pauth_openid_core_basic_plan_1/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/Intuit_pauth_openid_core_basic_plan_1/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/Intuit_pauth_openid_core_basic_plan_1/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/Intuit_pauth_openid_core_basic_plan_1/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2021-05-27 16:26:38
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "09e9QYuaCylex92usM4xKBrvn7CfNkUupq0eIL003xok7yYIe8PHwSFZXIRSUNDP18IKaYSDNricPicBON1r8Xtr-_mLFrLI7cZmnNl5fTyYHJ4yTpRWWc0dLe7jqeNWJOZu8gKxCK8cza7EIaz0_2gzSnFKolpoz3EBvMQgb80",
      "kty": "RSA",
      "q": "oLw37Wf2xfAkxc8uISJTEMjNwBjJO3O61PHTffBZvQrao6jkuQiGDm-5a64NIPS0Ec6nECdXoKwmeIE7UEkTEkF8PPNm0-CnSOBpkD5FLs5XTt0yJXatCLl19Vq9beND14I1P15v6oaLGLM0Apvj8vZkXXjf1cdNwVlzsvzMu4k",
      "d": "YM0Rt_EEXZLOX7wBB4CgEw_tW2DYnDkRUyzrgTHJp8uw2otfVEmmE0NoTPsHXDJ51OJAUjspSPiuYJzFp8eG9CRtLGMCTQ7KgX5K4Zyk5f_lnb56-K0l0706wFaOD3WvBzc1wHlTAjjj036FfQ_jh0WfdZXkUsn1Dl8WUBJR3NKsQkc_oaC8MOohhi9jjytgyJvUASByVZ9C0Y1LBmWhBTJznHLNOTf1R_8ILaSaouJCzSvaYDokO7Bpz600CgzgSewFQz4jikhWOO0nHsiL1jJjQF3v7tDNVr01z9pt2vf_iyjc9EnU29WLwAT2bNnivQvbjdrlFl_rAv7o5IVeAQ",
      "e": "AQAB",
      "use": "sig",
      "kid": "2cfb932d-81e7-4e99-8679-572ca34a4ff2",
      "qi": "F-uasKs7dYOvfNtSns1f3gign90QBEP9kOZ0mVrYqwx6nS1-ROtkQT3LNBD0QSfuIZDRb_iB3-fL735Ym8IRNKyHiU0zrWK1IUVBspH0KPaNBUmA-ing9tcVSd4_FG_XoK7_VnOLgy8hVNJdyRiWY-LatbZOQDGepPLeH-wmuOg",
      "dp": "Ls1YG7YK93JRZVi9soQrag_hZudvlV7deqd-o38JwkyVYlyFvUo4xJtokb8OLJqlgKZ3BG7pSlqo8jZN19FbesNozQeJyh7_s0CFBRwq8hdEB_aPaLrvBPIDA1Xm6G64ZniehEtB74g4ldyJqmL60b6krkqvUYUl6MavupOeEvU",
      "dq": "dapTps-8rxolUUlhk4_1Dwxw0ndSmNsXoluFX2RbzS_s7nHtPicnO9o9-r3njoCUcZS-Z-zlERH097JjIVrdQzf9IwFr_R8wVwExRg7Pxnv3Hhx_YT2HXiOmXn6WvaLpPxJquIEBnMXxfZtyL5a_QFVvE54w_eZw3WIGeLjnh0E",
      "n": "hQKW_8HOGQddGsN17aGTYpZJklM8hxgIT1dUfjmYkcMo0zzapD7U9Xztc93CHw3xyKyOJp7ZSqNKw1g6w7L2GdMB5MckaYyJJb9Qo2D9hhSASbRjkfLwSgrl91VadgPxNmTNt5m9KeLVjqeYPJKCfGY64tSZbF4p3e3RtSlRPDrev7Al-2HqhzaI3ik3nEPmYgwE_4jWqR6Dspw9UCBMKkFnF0UGUS8PB5tp4r9T7SyFFfetbyn1T2bwte24a_nJ5KYBs9raC_ziEb-aIpBE-7m2H8SNMAe-dGznalmLezuT08aAXwSo3s3P_6TKH4rL2Qu44ni4HfYfRty5imKTtQ"
    },
    {
      "kty": "EC",
      "d": "tc09s7ZhP4EvzGGZ3Uy9nqGkP0QA0ITrDnfqd-hCdww",
      "use": "sig",
      "crv": "P-256",
      "kid": "05bab9ce-254b-4f93-8a59-58c399b562c1",
      "x": "y7XkTxxCeP856DUh74S4RS8DEYNud-GxkjrhlP55TBM",
      "y": "jhcBO0yOzp2Nt8BT5loeE5pNU4rNdoXgaihi8xqi_Nw"
    },
    {
      "kty": "EC",
      "d": "uSxIzAjzp7MfkXBEYw-HedZT1FrNUATdX3bBf8DXifc",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "ef3379b3-bd74-4f51-81fe-245101c09dce",
      "x": "5jOOmEA-R0Nxy0gBJxdBjTkQmWis2O0s02P_xriupvk",
      "y": "BenzAU47HPvIp8zxP2vpHXteZZRHxVbOipeJbOnvpck"
    },
    {
      "kty": "OKP",
      "d": "-YEe-IZ72S7kmKQico6JrRXqfh9cQ-C7r6F3USZsTTo",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "b576bf0f-9b74-4a2e-a527-faa8ab7b44b1",
      "x": "olqrhG3C2X6KaIkvfcenSMSP48PKxfBpY9-4CRgQna0"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "5Tof2porwjQP145DKsmD29B1wfWdk01TNHPqsd31wx417v3ZttAMdaa_eRBQ46GWGZZfstH9xEiWrU9q5A6rBL6xlPQk4_suaB83HrLpAGIzPiinFU19nJx8ad9hCxW799CWSJlTv-_2XZDvUvYuUfSQP7oSumuqIRpXR1sL6vk",
      "kty": "RSA",
      "q": "sB9wXBgBJ-RmbVH0kmNdVbIwUn5rgco8Y-t6SUPXEktRiUABrvRBNqE9GIozD7GbO-vAKbyfP5euqRCejVkwU327sSwaGNQH9MXtnHM_kFmoTIwwV5wghZL7IsFbETc5BPs4YdPTqXHmzadMyQ-utAGrahUnN7O6sqikdX8YyBU",
      "d": "beRoUB0w_podrGfTpK8KB5zadpuZGHLieOat_aUoj8KIA0B7hZu3-3Ps9Uaa-iRX9rW6zZhGbMXx3R45sBTvYzicpwmZTTWNmeO__mMRHVhq10ve9f5kYNpvcvUkcHOMwxD5vH_LVTvyDVDT0xonNUplOeWhO--HTuFz_knG4uNWupJsF9LTgCMVwvsCrTlAukle-PD9mHtvXAefumTqHXtUmvbh6QHy2cS9IdolnXI3PMvQT5T_qRfe0AEXJXD-Fbiv2j2x0CxFg0Vnm7P5Hd5BFrWeLUSjVIB3QHfLnDuH4pRmY4f3EuhdI-XaY-cS2igys0uYN0k1AIS1eJJxgQ",
      "e": "AQAB",
      "use": "enc",
      "kid": "e23a9593-946d-4151-b3eb-82f5fdc246af",
      "qi": "yYKU8CEGDuKuFdFQRcThOKla_mXJ5EyxYRKdJLrZ4wfBTsEASx1iqeGguNdQ_e5qSdLuZkZflXlkPUfhqJ4rSN6rJuA13GIpLMKx5eJYQj44gNe_BIMxtDbsn8O9fsLGLikUWPMqxeZCLj8ickvDlR-fdMLwmXpNXe4_Xu21JfE",
      "dp": "pHCMBV_v4ENE0hemK32gcAIdV-UBA3jHJau6Q5q9ARodCrNkiXa6WXQji4-e141FhlmPkVJ_P13raay9O5kiKic6cWarSDka02sBOa6S48mOhRrYsbmDUOQZhEHQ9gjDbUVfaflEUT6td_XPGa6tD_HnwS-U29L8mv6weengpNE",
      "alg": "RSA-OAEP",
      "dq": "aVcEfzCkUFXdpXklTQE9a-od2NlgN8rb_-9xvqxi0MBXzj2IRDo3XxNlVW4jSDm0XUyOLOhyXzi78MbN7kDwFJ_ZSQjVuw_milJv4elUlWPqs44Nw_jPwtS8fHclntBmvEH94RUvPeOwZkSwOnm0xllRSyvHvxsyiXUwmE4iZlk",
      "n": "nbQcjAnIUsHYhxruEJAgPH19NJID1aS2DHk1_uWCPHgMxL1UlxR1WxSb2DJ_Uf76-NWP8zEEIbQRr66wRx355uL2PoEzloRmPpEhWsMHpgD81jgi_WgTuk24Ai2mNLz2geeKlKBSRlBE7zi2oezop6QgORqtmvezCU9HxgwXqOJQEwzmGVYUJ5yfXO_n6g9CtLr8IzlOMEEMLtI5GObkRPz_sAfSYbt_otGUCi0r8KTcD7fwQ2R7tvcxmejKcCGumeC2_u9AsYOS3S1nALuM_-JxMdz9wcnQ-g4SUTfzmoMl6KT8wx0FqYYUTh0cl-NiZSchAXdQYaN0lkJ4VeTObQ"
    },
    {
      "kty": "EC",
      "d": "25j6tIeY1J4N2pOhRK8sd6Q9OqyWBZ2nzozeGNsalLM",
      "use": "enc",
      "crv": "P-256",
      "kid": "8bf0948e-48ae-439d-9638-7af65b1bf23b",
      "x": "rLOBjMhXhAeW0g1SM_f1Ed_HgxlWv5pqp_xmFXNv_qs",
      "y": "iuXDY2qzn6OU9cUNfR4WwOYWxhYZQ-uIMgiTUBDGRQA",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "2cfb932d-81e7-4e99-8679-572ca34a4ff2",
      "n": "hQKW_8HOGQddGsN17aGTYpZJklM8hxgIT1dUfjmYkcMo0zzapD7U9Xztc93CHw3xyKyOJp7ZSqNKw1g6w7L2GdMB5MckaYyJJb9Qo2D9hhSASbRjkfLwSgrl91VadgPxNmTNt5m9KeLVjqeYPJKCfGY64tSZbF4p3e3RtSlRPDrev7Al-2HqhzaI3ik3nEPmYgwE_4jWqR6Dspw9UCBMKkFnF0UGUS8PB5tp4r9T7SyFFfetbyn1T2bwte24a_nJ5KYBs9raC_ziEb-aIpBE-7m2H8SNMAe-dGznalmLezuT08aAXwSo3s3P_6TKH4rL2Qu44ni4HfYfRty5imKTtQ"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "107ab349-fd93-4adc-aa7c-7c6e57efe049",
      "n": "lE8OMJDi3A283rTPrg32pVyzkiO2iwa01CUpXjGK4j8Cn-LdN6uBVR77FJRdc8_5aTsT64Qx_qZzJNVl5iTxvtKn2eoZxXtpOZnK2cnYDBi64dZxFOVXifMVk0rD_-YOYYv99xLNRjvJ5QLGY1TvkIFU5SxC4U855LhFkqT0C4YNrqBKU_nqf8KDLMzVDaQt76pDb9IfWHH1Q735ooOXHIWI1puIqJ0VXn5OfC_Y_pQMLxUsh7TPmnwjzOebvawjWLi1eBmziOdSO829ytPzXOEiwVdN7qu64G6u1Y0sxioZX4TVcSGrmXvvVZtFVytJQX3i6Qqy08QWVM2Y1Bvwew"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "05bab9ce-254b-4f93-8a59-58c399b562c1",
      "x": "y7XkTxxCeP856DUh74S4RS8DEYNud-GxkjrhlP55TBM",
      "y": "jhcBO0yOzp2Nt8BT5loeE5pNU4rNdoXgaihi8xqi_Nw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "9dfcad7c-c87f-46f7-be29-c05713ddbb8c",
      "x": "8uVp9xZMiLNk78WIlrlCWDJQa3rSP_x0X58AuKQIG7Y",
      "y": "hTF9zZgys27PaPSi57hTzFxa8raSBvFKu-4lxsxkV5Q"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "ef3379b3-bd74-4f51-81fe-245101c09dce",
      "x": "5jOOmEA-R0Nxy0gBJxdBjTkQmWis2O0s02P_xriupvk",
      "y": "BenzAU47HPvIp8zxP2vpHXteZZRHxVbOipeJbOnvpck"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "b576bf0f-9b74-4a2e-a527-faa8ab7b44b1",
      "x": "olqrhG3C2X6KaIkvfcenSMSP48PKxfBpY9-4CRgQna0"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "e23a9593-946d-4151-b3eb-82f5fdc246af",
      "alg": "RSA-OAEP",
      "n": "nbQcjAnIUsHYhxruEJAgPH19NJID1aS2DHk1_uWCPHgMxL1UlxR1WxSb2DJ_Uf76-NWP8zEEIbQRr66wRx355uL2PoEzloRmPpEhWsMHpgD81jgi_WgTuk24Ai2mNLz2geeKlKBSRlBE7zi2oezop6QgORqtmvezCU9HxgwXqOJQEwzmGVYUJ5yfXO_n6g9CtLr8IzlOMEEMLtI5GObkRPz_sAfSYbt_otGUCi0r8KTcD7fwQ2R7tvcxmejKcCGumeC2_u9AsYOS3S1nALuM_-JxMdz9wcnQ-g4SUTfzmoMl6KT8wx0FqYYUTh0cl-NiZSchAXdQYaN0lkJ4VeTObQ"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "8bf0948e-48ae-439d-9638-7af65b1bf23b",
      "x": "rLOBjMhXhAeW0g1SM_f1Ed_HgxlWv5pqp_xmFXNv_qs",
      "y": "iuXDY2qzn6OU9cUNfR4WwOYWxhYZQ-uIMgiTUBDGRQA",
      "alg": "ECDH-ES"
    }
  ]
}
2021-05-27 16:26:38 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2021-05-27 16:26:38 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2021-05-27 16:26:38 SUCCESS
OIDCCLoadUserInfo
Added user information
user_info
{
  "sub": "user-subject-1234531",
  "name": "Demo T. User",
  "given_name": "Demo",
  "family_name": "User",
  "middle_name": "Theresa",
  "nickname": "Dee",
  "preferred_username": "d.tu",
  "gender": "female",
  "birthdate": "2000-02-03",
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "zoneinfo": "America/Los_Angeles",
  "locale": "en-US",
  "phone_number": "+1 555 5550000",
  "phone_number_verified": false,
  "email": "user@example.com",
  "email_verified": false,
  "website": "https://openid.net/",
  "updated_at": 1580000000
}
2021-05-27 16:26:38 SUCCESS
OIDCCGetStaticClientConfigurationForRPTests
Found a static client object
client_secret_jwt_alg
RS256
client_id
12345678-openid-core-clientid
client_secret
abcdefgh-openid-core-clientsecret
scope
openid accounts
jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "n": "nXe9vqDEtjUQ3bYdMv67vtZ1Nr95Fnn1lQKO6ASiaIhL133AUSNmsC2De7_Fs2rEQ6r3KpzwEg6H4e7dFzCo0MTK11ZMHXyIcQsKRnviG_G8bV5EECoylY959TKvqgLd16rnqK70doAG34dglR1cn-gXpoVdM1tmTWgmQryT3y-jdNvtba9SE3-79e1FsfhbtsZ0YIS8gx7OVypPuVml7MvOkDbP8M-EaNB9YbwIdq4MK9DugaCxXI1U4naoXp47f8sl2iBeaAUuG4JWQ1Ct1sgiJOzRA1ts9WYYdu3pImXCviTb2C-6xD3DgeG5OPFQNcHG0ODQCHmEAX-DL72SHw"
    }
  ]
}
certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
redirect_uris
[
  "https://partnerauth-e2e.platform.intuit.com/external_partner/openid_core_cert/callback"
]
2021-05-27 16:26:38 SUCCESS
EnsureClientDoesNotHaveBothJwksAndJwksUri
Client does not have both jwks and jwks_uri set
client
{
  "client_secret_jwt_alg": "RS256",
  "client_id": "12345678-openid-core-clientid",
  "client_secret": "abcdefgh-openid-core-clientsecret",
  "scope": "openid accounts",
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "n": "nXe9vqDEtjUQ3bYdMv67vtZ1Nr95Fnn1lQKO6ASiaIhL133AUSNmsC2De7_Fs2rEQ6r3KpzwEg6H4e7dFzCo0MTK11ZMHXyIcQsKRnviG_G8bV5EECoylY959TKvqgLd16rnqK70doAG34dglR1cn-gXpoVdM1tmTWgmQryT3y-jdNvtba9SE3-79e1FsfhbtsZ0YIS8gx7OVypPuVml7MvOkDbP8M-EaNB9YbwIdq4MK9DugaCxXI1U4naoXp47f8sl2iBeaAUuG4JWQ1Ct1sgiJOzRA1ts9WYYdu3pImXCviTb2C-6xD3DgeG5OPFQNcHG0ODQCHmEAX-DL72SHw"
      }
    ]
  },
  "certificate": "-----BEGIN CERTIFICATE-----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\nJJ4ExCQnVkS6U4yaNsKp4HET\n-----END CERTIFICATE-----",
  "redirect_uris": [
    "https://partnerauth-e2e.platform.intuit.com/external_partner/openid_core_cert/callback"
  ]
}
2021-05-27 16:26:38 INFO
FetchClientKeys
Skipped evaluation due to missing required element: client jwks_uri
path
jwks_uri
mapped
object
client
2021-05-27 16:26:38 SUCCESS
ValidateClientGrantTypes
grant_types match response_types
grant_types
[
  "authorization_code"
]
response_types
[
  "code"
]
2021-05-27 16:26:38 SUCCESS
OIDCCValidateClientRedirectUris
Valid redirect_uri(s) provided in registration request
redirect_uris
[
  "https://partnerauth-e2e.platform.intuit.com/external_partner/openid_core_cert/callback"
]
2021-05-27 16:26:38 SUCCESS
ValidateClientLogoUris
Client does not contain any logo_uri
2021-05-27 16:26:38 SUCCESS
ValidateClientUris
Client does not contain any client_uri
2021-05-27 16:26:38 SUCCESS
ValidateClientPolicyUris
Client does not contain any policy_uri
2021-05-27 16:26:38 SUCCESS
ValidateClientTosUris
Client does not contain any tos_uri
2021-05-27 16:26:38 SUCCESS
ValidateClientSubjectType
A subject_type was not provided
2021-05-27 16:26:38 INFO
ValidateIdTokenSignedResponseAlg
Skipped evaluation due to missing required element: client id_token_signed_response_alg
path
id_token_signed_response_alg
mapped
object
client
2021-05-27 16:26:38 SUCCESS
EnsureIdTokenEncryptedResponseAlgIsSetIfEncIsSet
id_token_encrypted_response_enc is not set
2021-05-27 16:26:38 INFO
ValidateUserinfoSignedResponseAlg
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2021-05-27 16:26:38 SUCCESS
EnsureUserinfoEncryptedResponseAlgIsSetIfEncIsSet
userinfo_encrypted_response_enc is not set
2021-05-27 16:26:38 INFO
ValidateRequestObjectSigningAlg
Skipped evaluation due to missing required element: client request_object_signing_alg
path
request_object_signing_alg
mapped
object
client
2021-05-27 16:26:38 SUCCESS
EnsureRequestObjectEncryptionAlgIsSetIfEncIsSet
request_object_encryption_enc is not set
2021-05-27 16:26:38 INFO
ValidateTokenEndpointAuthSigningAlg
Skipped evaluation due to missing required element: client token_endpoint_auth_signing_alg
path
token_endpoint_auth_signing_alg
mapped
object
client
2021-05-27 16:26:38 SUCCESS
ValidateDefaultMaxAge
default_max_age is not set
2021-05-27 16:26:38 INFO
ValidateRequireAuthTime
Skipped evaluation due to missing required element: client require_auth_time
path
require_auth_time
mapped
object
client
2021-05-27 16:26:38 INFO
ValidateDefaultAcrValues
Skipped evaluation due to missing required element: client default_acr_values
path
default_acr_values
mapped
object
client
2021-05-27 16:26:38 INFO
ValidateInitiateLoginUri
Skipped evaluation due to missing required element: client initiate_login_uri
path
initiate_login_uri
mapped
object
client
2021-05-27 16:26:38 INFO
ValidateRequestUris
Skipped evaluation due to missing required element: client request_uris
path
request_uris
mapped
object
client
2021-05-27 16:26:38
SetServerSigningAlgToNone
Successfully set signing algorithm to none
signing_algorithm
none
2021-05-27 16:26:38
SetClientIdTokenSignedResponseAlgToServerSigningAlg
Set id_token_signed_response_alg for the registered client
id_token_signed_response_alg
none
2021-05-27 16:26:38
oidcc-client-test-idtoken-sig-none
Setup Done
2021-05-27 16:27:04 INCOMING
oidcc-client-test-idtoken-sig-none
Incoming HTTP request to test instance Z84DF4T0oUDZ36S
incoming_headers
{
  "host": "www.certification.openid.net",
  "upgrade-insecure-requests": "1",
  "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/avif,image/webp,image/apng,*/*;q\u003d0.8,application/signed-exchange;v\u003db3;q\u003d0.9",
  "sec-fetch-site": "none",
  "sec-fetch-mode": "navigate",
  "sec-fetch-user": "?1",
  "sec-fetch-dest": "document",
  "sec-ch-ua": "\" Not A;Brand\";v\u003d\"99\", \"Chromium\";v\u003d\"90\", \"Google Chrome\";v\u003d\"90\"",
  "sec-ch-ua-mobile": "?0",
  "accept-encoding": "gzip, deflate, br",
  "accept-language": "en-US,en;q\u003d0.9,hi;q\u003d0.8",
  "cookie": "__utmz\u003d201319536.1621283291.13.3.utmcsr\u003dgoogle|utmccn\u003d(organic)|utmcmd\u003dorganic|utmctr\u003d(not%20provided); __utma\u003d201319536.30309185.1617009267.1621283291.1621288066.14; JSESSIONID\u003dE2235002E33C55C6D18638CE4FD23E81",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
authorize
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "scope": "openid phone profile email address offline_access",
  "response_type": "code",
  "redirect_uri": "https://partnerauth-e2e.platform.intuit.com/external_partner/openid_core_cert/callback",
  "client_id": "12345678-openid-core-clientid",
  "nonce": "awb.3e77e188-324d-4fec-a57d-a384fa6fc0a4",
  "state": "awb.3e77e188-324d-4fec-a57d-a384fa6fc0a4"
}
incoming_body
Authorization endpoint
2021-05-27 16:27:04 SUCCESS
EnsureRequestDoesNotContainRequestObject
Request does not contain a request parameter
2021-05-27 16:27:04 SUCCESS
OIDCCEnsureAuthorizationHttpRequestContainsOpenIDScope
Found 'openid' in scope http request parameter
actual
[
  "openid",
  "phone",
  "profile",
  "email",
  "address",
  "offline_access"
]
expected
openid
2021-05-27 16:27:04 SUCCESS
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
effective_authorization_endpoint_request
{
  "scope": "openid phone profile email address offline_access",
  "response_type": "code",
  "redirect_uri": "https://partnerauth-e2e.platform.intuit.com/external_partner/openid_core_cert/callback",
  "client_id": "12345678-openid-core-clientid",
  "nonce": "awb.3e77e188-324d-4fec-a57d-a384fa6fc0a4",
  "state": "awb.3e77e188-324d-4fec-a57d-a384fa6fc0a4"
}
2021-05-27 16:27:04 SUCCESS
ExtractRequestedScopes
Requested scopes
scope
openid phone profile email address offline_access
2021-05-27 16:27:04 SUCCESS
ExtractNonceFromAuthorizationRequest
Extracted nonce
nonce
awb.3e77e188-324d-4fec-a57d-a384fa6fc0a4
2021-05-27 16:27:04 SUCCESS
EnsureResponseTypeIsCode
Response type is expected value
expected
code
2021-05-27 16:27:04 SUCCESS
EnsureMatchingClientId
Client ID matched
client_id
12345678-openid-core-clientid
2021-05-27 16:27:04 SUCCESS
EnsureValidRedirectUriForAuthorizationEndpointRequest
redirect_uri is one of the allowed redirect uris
actual
https://partnerauth-e2e.platform.intuit.com/external_partner/openid_core_cert/callback
expected
[
  "https://partnerauth-e2e.platform.intuit.com/external_partner/openid_core_cert/callback"
]
2021-05-27 16:27:04 SUCCESS
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
actual
[
  "openid",
  "phone",
  "profile",
  "email",
  "address",
  "offline_access"
]
expected
openid
2021-05-27 16:27:04 SUCCESS
DisallowMaxAgeEqualsZeroAndPromptNone
The client did not send max_age=0 and prompt=none parameters as expected
2021-05-27 16:27:04 SUCCESS
CreateAuthorizationCode
Created authorization code
authorization_code
eXDfMerWeA
2021-05-27 16:27:04 SUCCESS
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
params
{
  "redirect_uri": "https://partnerauth-e2e.platform.intuit.com/external_partner/openid_core_cert/callback",
  "state": "awb.3e77e188-324d-4fec-a57d-a384fa6fc0a4"
}
2021-05-27 16:27:04 SUCCESS
AddCodeToAuthorizationEndpointResponseParams
Added code to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://partnerauth-e2e.platform.intuit.com/external_partner/openid_core_cert/callback",
  "state": "awb.3e77e188-324d-4fec-a57d-a384fa6fc0a4",
  "code": "eXDfMerWeA"
}
2021-05-27 16:27:04
SendAuthorizationResponseWithResponseModeQuery
Redirecting back to client
uri
https://partnerauth-e2e.platform.intuit.com/external_partner/openid_core_cert/callback?state=awb.3e77e188-324d-4fec-a57d-a384fa6fc0a4&code=eXDfMerWeA
2021-05-27 16:27:04 OUTGOING
oidcc-client-test-idtoken-sig-none
Response to HTTP request to test instance Z84DF4T0oUDZ36S
outgoing
org.springframework.web.servlet.view.RedirectView: [RedirectView]; URL [https://partnerauth-e2e.platform.intuit.com/external_partner/openid_core_cert/callback?state=awb.3e77e188-324d-4fec-a57d-a384fa6fc0a4&code=eXDfMerWeA]
outgoing_path
authorize
2021-05-27 16:27:06 INCOMING
oidcc-client-test-idtoken-sig-none
Incoming HTTP request to test instance Z84DF4T0oUDZ36S
incoming_headers
{
  "host": "www.certification.openid.net",
  "authorization": "Basic MTIzNDU2Nzgtb3BlbmlkLWNvcmUtY2xpZW50aWQ6YWJjZGVmZ2gtb3BlbmlkLWNvcmUtY2xpZW50c2VjcmV0",
  "content-type": "application/x-www-form-urlencoded; charset\u003dUTF-8",
  "user-agent": "Apache-HttpClient/4.5.6 (Java/1.8.0_241)",
  "accept-encoding": "gzip,deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "245",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
token
incoming_body_form_params
{
  "code": "eXDfMerWeA",
  "grant_type": "authorization_code",
  "redirect_uri": "https://partnerauth-e2e.platform.intuit.com/external_partner/openid_core_cert/callback",
  "client_id": "12345678-openid-core-clientid",
  "client_secret": "abcdefgh-openid-core-clientsecret"
}
incoming_method
POST
incoming_body_json
incoming_query_string_params
{}
incoming_body
code=eXDfMerWeA&grant_type=authorization_code&redirect_uri=https%3A%2F%2Fpartnerauth-e2e.platform.intuit.com%2Fexternal_partner%2Fopenid_core_cert%2Fcallback&client_id=12345678-openid-core-clientid&client_secret=abcdefgh-openid-core-clientsecret
Token endpoint
2021-05-27 16:27:06 SUCCESS
ExtractClientCredentialsFromBasicAuthorizationHeader
Extracted client authentication
client_id
12345678-openid-core-clientid
client_secret
abcdefgh-openid-core-clientsecret
method
client_secret_basic
2021-05-27 16:27:06 SUCCESS
ValidateClientIdAndSecret
Client id and secret match
2021-05-27 16:27:06 SUCCESS
ValidateAuthorizationCode
Found authorization code
authorization_code
eXDfMerWeA
2021-05-27 16:27:06 SUCCESS
ValidateRedirectUriForTokenEndpointRequest
redirect_uri is the same as the one used in the authorization request
actual
https://partnerauth-e2e.platform.intuit.com/external_partner/openid_core_cert/callback
2021-05-27 16:27:06 SUCCESS
GenerateBearerAccessToken
Generated access token
access_token
lJ6zDx3a12HKotQcqYw2DN5X5NIbSiiYVoldXGdGhB3HrHeQgm
2021-05-27 16:27:06 SUCCESS
GenerateIdTokenClaims
Created ID Token Claims
iss
https://www.certification.openid.net/test/a/Intuit_pauth_openid_core_basic_plan_1/
sub
user-subject-1234531
aud
12345678-openid-core-clientid
nonce
awb.3e77e188-324d-4fec-a57d-a384fa6fc0a4
iat
1622132826
exp
1622133126
2021-05-27 16:27:06 INFO
AddAtHashToIdTokenClaims
Skipped evaluation due to missing required string: at_hash
expected
at_hash
2021-05-27 16:27:06 SUCCESS
SignIdTokenWithAlgNone
Created id_token with alg none
id_token
eyJhbGciOiJub25lIn0.eyJpc3MiOiJodHRwczovL3d3dy5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXQvdGVzdC9hL0ludHVpdF9wYXV0aF9vcGVuaWRfY29yZV9iYXNpY19wbGFuXzEvIiwic3ViIjoidXNlci1zdWJqZWN0LTEyMzQ1MzEiLCJhdWQiOiIxMjM0NTY3OC1vcGVuaWQtY29yZS1jbGllbnRpZCIsIm5vbmNlIjoiYXdiLjNlNzdlMTg4LTMyNGQtNGZlYy1hNTdkLWEzODRmYTZmYzBhNCIsImlhdCI6MTYyMjEzMjgyNiwiZXhwIjoxNjIyMTMzMTI2fQ.
2021-05-27 16:27:06 INFO
EncryptIdToken
Skipped evaluation due to missing required element: client id_token_encrypted_response_alg
path
id_token_encrypted_response_alg
mapped
object
client
2021-05-27 16:27:06 SUCCESS
CreateTokenEndpointResponse
Created token endpoint response
access_token
lJ6zDx3a12HKotQcqYw2DN5X5NIbSiiYVoldXGdGhB3HrHeQgm
token_type
Bearer
id_token
eyJhbGciOiJub25lIn0.eyJpc3MiOiJodHRwczovL3d3dy5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXQvdGVzdC9hL0ludHVpdF9wYXV0aF9vcGVuaWRfY29yZV9iYXNpY19wbGFuXzEvIiwic3ViIjoidXNlci1zdWJqZWN0LTEyMzQ1MzEiLCJhdWQiOiIxMjM0NTY3OC1vcGVuaWQtY29yZS1jbGllbnRpZCIsIm5vbmNlIjoiYXdiLjNlNzdlMTg4LTMyNGQtNGZlYy1hNTdkLWEzODRmYTZmYzBhNCIsImlhdCI6MTYyMjEzMjgyNiwiZXhwIjoxNjIyMTMzMTI2fQ.
scope
openid phone profile email address offline_access
2021-05-27 16:27:06 OUTGOING
oidcc-client-test-idtoken-sig-none
Response to HTTP request to test instance Z84DF4T0oUDZ36S
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "access_token": "lJ6zDx3a12HKotQcqYw2DN5X5NIbSiiYVoldXGdGhB3HrHeQgm",
  "token_type": "Bearer",
  "id_token": "eyJhbGciOiJub25lIn0.eyJpc3MiOiJodHRwczovL3d3dy5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXQvdGVzdC9hL0ludHVpdF9wYXV0aF9vcGVuaWRfY29yZV9iYXNpY19wbGFuXzEvIiwic3ViIjoidXNlci1zdWJqZWN0LTEyMzQ1MzEiLCJhdWQiOiIxMjM0NTY3OC1vcGVuaWQtY29yZS1jbGllbnRpZCIsIm5vbmNlIjoiYXdiLjNlNzdlMTg4LTMyNGQtNGZlYy1hNTdkLWEzODRmYTZmYzBhNCIsImlhdCI6MTYyMjEzMjgyNiwiZXhwIjoxNjIyMTMzMTI2fQ.",
  "scope": "openid phone profile email address offline_access"
}
outgoing_path
token
2021-05-27 16:27:11 WARNING
ClientDidNotContinueAfterReceivingUnsignedIdToken
Client did not send a userinfo request after receiving an unsigned id_token.
2021-05-27 16:27:11 FINISHED
oidcc-client-test-idtoken-sig-none
Test has run to completion
testmodule_result
WARNING
2021-05-27 16:28:24
TEST-RUNNER
Alias has now been claimed by another test
alias
Intuit_pauth_openid_core_basic_plan_1
new_test_id
gkkQSu9krRPmikv
Test Results