Test Name | fapi-rw-id2-client-test-invalid-signature |
---|---|
Variant | client_auth_type=private_key_jwt, fapi_profile=plain_fapi |
Test ID | mjU48bMvkO348XL https://www.certification.openid.net/log-detail.html?public=true&log=mjU48bMvkO348XL |
Created | 2021-06-01T19:09:41.508067Z |
Description | Test plan for for Plain FAPI with private key |
Test Version | 4.1.11 |
Test Owner | 107007636079726338623 https://accounts.google.com |
Plan ID | qVUXeEfcuZWlp https://www.certification.openid.net/plan-detail.html?public=true&plan=qVUXeEfcuZWlp |
Exported From | https://www.certification.openid.net |
Exported By | 107007636079726338623 https://accounts.google.com |
Suite Version | 4.1.26 |
Exported | 2021-09-07 05:11:56 (UTC) |
Status: FINISHED Result: PASSED |
SUCCESS 53 FAILURE 0 WARNING 0 REVIEW 0 INFO 1 |
2021-06-01 19:09:41 |
INFO
|
TEST-RUNNER
Test instance mjU48bMvkO348XL created
|
||||||||||||||
|
2021-06-01 19:09:41 |
SUCCESS
|
GenerateServerConfigurationMTLS
Created server configuration
|
||||||
|
2021-06-01 19:09:41 |
|
SetTokenEndpointAuthMethodsSupportedToPrivateKeyJWTOnly
Changed token_endpoint_auth_methods_supported to private_key_jwt only in server configuration
|
||
|
2021-06-01 19:09:41 |
SUCCESS
|
AddResponseTypeCodeIdTokenToServerConfiguration
Added code id_token as response type supported
|
||
|
2021-06-01 19:09:41 |
SUCCESS
|
AddTokenEndpointSigningAlg
Set 'PS256' for token_endpoint_auth_signing_alg
|
|
2021-06-01 19:09:41 |
SUCCESS
|
CheckServerConfiguration
Found required server configuration keys
|
||
|
2021-06-01 19:09:41 |
SUCCESS
|
LoadServerJWKs
Parsed public and private JWK sets
|
||||
|
2021-06-01 19:09:41 | SUCCESS |
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
|
|
2021-06-01 19:09:41 | SUCCESS |
FAPIEnsureMinimumServerKeyLength
Validated minimum key lengths for server_jwks
|
||
|
2021-06-01 19:09:41 |
SUCCESS
|
LoadUserInfo
Added user information
|
||
|
2021-06-01 19:09:41 |
SUCCESS
|
GetStaticClientConfiguration
Found a static client object
|
||||||||||||||
|
2021-06-01 19:09:41 | SUCCESS |
ValidateClientJWKsPublicPart
Valid client JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
|
|
2021-06-01 19:09:41 |
SUCCESS
|
ExtractJWKsFromStaticClientConfiguration
Extracted client JWK
|
||||
|
2021-06-01 19:09:41 | SUCCESS |
CheckDistinctKeyIdValueInClientJWKs
Distinct 'kid' value in all keys of client_jwks
|
||
|
2021-06-01 19:09:41 |
SUCCESS
|
EnsureClientJwksDoesNotContainPrivateOrSymmetricKeys
Jwks does not contain any private or symmetric keys
|
|
2021-06-01 19:09:41 | SUCCESS |
FAPIEnsureMinimumClientKeyLength
Validated minimum key lengths for client_jwks
|
||
|
2021-06-01 19:09:41 |
|
fapi-rw-id2-client-test-invalid-signature
Setup Done
|
|
2021-06-01 19:09:54 |
INCOMING
|
fapi-rw-id2-client-test-invalid-signature
Incoming HTTP request to test instance mjU48bMvkO348XL
|
||||||||||||||
|
2021-06-01 19:09:54 | SUCCESS |
EnsureIncomingTls12
Found TLS 1.2 connection
|
|
2021-06-01 19:09:54 | SUCCESS |
EnsureIncomingTlsSecureCipher
TLS cipher is allowed
|
||||
|
Authorization endpoint |
2021-06-01 19:09:54 | SUCCESS |
ExtractRequestObject
Parsed request object
|
||
|
2021-06-01 19:09:54 |
SUCCESS
|
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
|
||
|
2021-06-01 19:09:54 |
SUCCESS
|
EnsureAuthorizationParametersMatchRequestObject
All claims in the query parameters exist in the request object
|
||
|
2021-06-01 19:09:54 | SUCCESS |
FAPIValidateRequestObjectSigningAlg
Request object was signed with a permitted algorithm
|
||
|
2021-06-01 19:09:54 | SUCCESS |
FAPIValidateRequestObjectIdTokenACRClaims
Acr value in request object is as expected
|
||
|
2021-06-01 19:09:54 | SUCCESS |
FAPIValidateRequestObjectExp
Request object contains a valid exp claim, expiry time
|
||
|
2021-06-01 19:09:54 |
|
ValidateRequestObjectClaims
Request object does not contain a max_age claim
|
|
2021-06-01 19:09:54 |
SUCCESS
|
ValidateRequestObjectClaims
Request object claims passed all validation checks
|
|
2021-06-01 19:09:54 | SUCCESS |
EnsureNumericRequestObjectClaimsAreNotNull
None of the claims expected to have numeric values, have null values
|
||
|
2021-06-01 19:09:54 |
SUCCESS
|
EnsureMatchingRedirectUriInRequestObject
Redirect URI matched
|
||
|
2021-06-01 19:09:54 | SUCCESS |
EnsureRequestObjectDoesNotContainRequestOrRequestUri
Request object does not contain request or request_uri
|
|
2021-06-01 19:09:54 | SUCCESS |
EnsureRequestObjectDoesNotContainSubWithClientId
Request object does not contain Client Id in sub
|
|
2021-06-01 19:09:54 | SUCCESS |
ValidateRequestObjectSignature
Request object signature validated using a key in the client's JWKS and using the client's registered request_object_signing_alg
|
||||||
|
2021-06-01 19:09:54 | SUCCESS |
EnsureResponseTypeIsCodeIdToken
Response type is expected value
|
||
|
2021-06-01 19:09:54 | SUCCESS |
EnsureMatchingClientId
Client ID matched
|
||
|
2021-06-01 19:09:54 |
SUCCESS
|
ExtractRequestedScopes
Requested scopes
|
||
|
2021-06-01 19:09:54 | SUCCESS |
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
|
||||
|
2021-06-01 19:09:54 | SUCCESS |
ExtractNonceFromAuthorizationRequest
Extracted nonce
|
||
|
2021-06-01 19:09:54 |
SUCCESS
|
CreateAuthorizationCode
Created authorization code
|
||
|
2021-06-01 19:09:54 |
SUCCESS
|
ExtractServerSigningAlg
Successfully extracted algorithm
|
||
|
2021-06-01 19:09:54 | SUCCESS |
CalculateCHash
Successful c_hash encoding
|
||
|
2021-06-01 19:09:54 | SUCCESS |
CalculateSHash
Successful s_hash encoding
|
||
|
2021-06-01 19:09:54 |
SUCCESS
|
GenerateBearerAccessToken
Generated access token
|
||
|
2021-06-01 19:09:54 | SUCCESS |
CalculateAtHash
Successful at_hash encoding
|
||
|
2021-06-01 19:09:54 |
SUCCESS
|
GenerateIdTokenClaims
Created ID Token Claims
|
||||||||||||
|
2021-06-01 19:09:54 | SUCCESS |
AddCHashToIdTokenClaims
Added c_hash to ID token claims
|
||||
|
2021-06-01 19:09:54 | SUCCESS |
AddSHashToIdTokenClaims
Added s_hash to ID token claims
|
||||
|
2021-06-01 19:09:54 | SUCCESS |
AddAtHashToIdTokenClaims
Added at_hash to ID token claims
|
||||
|
2021-06-01 19:09:54 | SUCCESS |
AddACRClaimToIdTokenClaims
Added acr value to id_token_claims
|
||||
|
2021-06-01 19:09:54 |
SUCCESS
|
SignIdToken
Signed the ID token
|
||
|
2021-06-01 19:09:54 | SUCCESS |
SignIdTokenInvalid
Made the id_token signature invalid
|
||
|
2021-06-01 19:09:54 |
SUCCESS
|
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
|
||
|
2021-06-01 19:09:54 | SUCCESS |
AddCodeToAuthorizationEndpointResponseParams
Added code to authorization endpoint response params
|
||
|
2021-06-01 19:09:54 | SUCCESS |
AddIdTokenToAuthorizationEndpointResponseParams
Added id_token to authorization endpoint response params
|
||
|
2021-06-01 19:09:54 |
|
SendAuthorizationResponseWithResponseModeFragment
Redirecting back to client
|
||
|
2021-06-01 19:09:54 |
OUTGOING
|
fapi-rw-id2-client-test-invalid-signature
Response to HTTP request to test instance mjU48bMvkO348XL
|
||||
|
2021-06-01 19:09:58 |
INCOMING
|
fapi-rw-id2-client-test-invalid-signature
Incoming HTTP request to test instance mjU48bMvkO348XL
|
||||||||||||||
|
2021-06-01 19:09:58 | SUCCESS |
EnsureIncomingTls12
Found TLS 1.2 connection
|
|
2021-06-01 19:09:58 | SUCCESS |
EnsureIncomingTlsSecureCipher
TLS cipher is allowed
|
||||
|
2021-06-01 19:09:58 |
OUTGOING
|
fapi-rw-id2-client-test-invalid-signature
Response to HTTP request to test instance mjU48bMvkO348XL
|
||||||||
|
2021-06-01 19:09:58 |
INCOMING
|
fapi-rw-id2-client-test-invalid-signature
Incoming HTTP request to test instance mjU48bMvkO348XL
|
||||||||||||||
|
2021-06-01 19:09:58 | SUCCESS |
EnsureIncomingTls12
Found TLS 1.2 connection
|
|
2021-06-01 19:09:58 | SUCCESS |
EnsureIncomingTlsSecureCipher
TLS cipher is allowed
|
||||
|
2021-06-01 19:09:58 |
OUTGOING
|
fapi-rw-id2-client-test-invalid-signature
Response to HTTP request to test instance mjU48bMvkO348XL
|
||||||||
|
2021-06-01 19:09:59 |
FINISHED
|
fapi-rw-id2-client-test-invalid-signature
Test has run to completion
|
||
|
2021-06-01 19:11:36 |
|
TEST-RUNNER
Alias has now been claimed by another test
|
||||
|