Test Name | fapi1-advanced-final-client-test-invalid-scope-in-token-endpoint-response |
---|---|
Variant | client_auth_type=private_key_jwt, fapi_jarm_type=oidc, fapi_auth_request_method=pushed, fapi_profile=openbanking_brazil, fapi_response_mode=plain_response |
Test ID | udZfy50EDja8TPo https://www.certification.openid.net/log-detail.html?public=true&log=udZfy50EDja8TPo |
Created | 2021-12-16T20:35:49.378701Z |
Description | Bocom BBM Certification Accounts |
Test Version | 4.1.38 |
Test Owner | 111476473075596536739 https://accounts.google.com |
Plan ID | oRZ7gpc7zbOS8 https://www.certification.openid.net/plan-detail.html?public=true&plan=oRZ7gpc7zbOS8 |
Exported From | https://www.certification.openid.net |
Exported By | 111476473075596536739 https://accounts.google.com |
Suite Version | 4.1.38 |
Exported | 2021-12-16 23:47:23 (UTC) |
Status: FINISHED Result: PASSED |
SUCCESS 120 FAILURE 0 WARNING 0 REVIEW 0 INFO 8 |
2021-12-16 20:35:49 |
INFO
|
TEST-RUNNER
Test instance udZfy50EDja8TPo created
|
||||||||||||||
|
2021-12-16 20:35:49 |
SUCCESS
|
FAPIBrazilGenerateServerConfiguration
Created server configuration
|
||||||
|
2021-12-16 20:35:49 |
SUCCESS
|
LoadServerJWKs
Parsed public and private JWK sets
|
||||||
|
2021-12-16 20:35:49 | SUCCESS |
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
|
|
2021-12-16 20:35:49 |
|
SetServerSigningAlgToPS256
Successfully set signing algorithm to PS256
|
|
2021-12-16 20:35:49 |
|
FAPIBrazilSetGrantTypesSupportedInServerConfiguration
Successfully set grant_types_supported
|
||
|
2021-12-16 20:35:49 |
|
AddClaimsParameterSupportedTrueToServerConfiguration
Successfully added claims_parameter_supported to server configuration
|
||
|
2021-12-16 20:35:49 |
|
FAPIBrazilAddBrazilSpecificSettingsToServerConfiguration
Added open banking Brazil specific server settings
|
||
|
2021-12-16 20:35:49 |
|
SetTokenEndpointAuthMethodsSupportedToPrivateKeyJWTOnly
Changed token_endpoint_auth_methods_supported to private_key_jwt only in server configuration
|
||
|
2021-12-16 20:35:49 |
|
AddPushedAuthorizationRequestEndpointToServerConfig
Added pushed_authorization_request_endpoint to server configuration
|
||
|
2021-12-16 20:35:49 |
|
AddRequirePushedAuthorizationRequestsToServerConfig
Added require_pushed_authorization_requests to server configuration
|
||
|
2021-12-16 20:35:49 | SUCCESS |
AddResponseTypeCodeIdTokenToServerConfiguration
Added code id_token as response type supported
|
||
|
2021-12-16 20:35:49 |
SUCCESS
|
FAPIBrazilAddTokenEndpointAuthSigningAlgValuesSupportedToServer
Set token_endpoint_auth_signing_alg_values_supported
|
||
|
2021-12-16 20:35:49 |
SUCCESS
|
CheckServerConfiguration
Found required server configuration keys
|
||
|
2021-12-16 20:35:49 | SUCCESS |
FAPIEnsureMinimumServerKeyLength
Validated minimum key lengths for server_jwks
|
||
|
2021-12-16 20:35:49 |
SUCCESS
|
LoadUserInfo
Added user information
|
||
|
Verify configuration of first client |
2021-12-16 20:35:49 |
SUCCESS
|
GetStaticClientConfiguration
Found a static client object
|
||||||||
|
2021-12-16 20:35:49 | SUCCESS |
ValidateClientJWKsPublicPart
Valid client JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
|
|
2021-12-16 20:35:49 |
SUCCESS
|
ExtractJWKsFromStaticClientConfiguration
Extracted client JWK
|
||||
|
2021-12-16 20:35:49 | SUCCESS |
CheckDistinctKeyIdValueInClientJWKs
Distinct 'kid' value in all keys of client_jwks
|
||
|
2021-12-16 20:35:49 |
SUCCESS
|
EnsureClientJwksDoesNotContainPrivateOrSymmetricKeys
Jwks does not contain any private or symmetric keys
|
|
2021-12-16 20:35:49 | SUCCESS |
FAPIEnsureMinimumClientKeyLength
Validated minimum key lengths for client_jwks
|
||
|
Verify configuration of second client |
2021-12-16 20:35:49 |
SUCCESS
|
GetStaticClient2Configuration
Found a static second client object
|
||||||||||||
|
2021-12-16 20:35:49 | SUCCESS |
ValidateClientJWKsPublicPart
Valid client JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
|
|
2021-12-16 20:35:49 |
SUCCESS
|
ExtractJWKsFromStaticClientConfiguration
Extracted client JWK
|
||||
|
2021-12-16 20:35:49 | SUCCESS |
CheckDistinctKeyIdValueInClientJWKs
Distinct 'kid' value in all keys of client_jwks
|
||
|
2021-12-16 20:35:49 |
SUCCESS
|
EnsureClientJwksDoesNotContainPrivateOrSymmetricKeys
Jwks does not contain any private or symmetric keys
|
|
2021-12-16 20:35:49 | SUCCESS |
FAPIEnsureMinimumClientKeyLength
Validated minimum key lengths for client_jwks
|
||
|
2021-12-16 20:35:49 |
|
fapi1-advanced-final-client-test-invalid-scope-in-token-endpoint-response
Setup Done
|
|
2021-12-16 20:35:55 |
INCOMING
|
fapi1-advanced-final-client-test-invalid-scope-in-token-endpoint-response
Incoming HTTP request to test instance udZfy50EDja8TPo
|
||||||||||||||||||||
|
2021-12-16 20:35:55 | SUCCESS |
EnsureIncomingTls12WithSecureCipherOrTls13
TLS 1.2 in use and cipher is one recommended by BCP195
|
||||
|
2021-12-16 20:35:55 |
OUTGOING
|
fapi1-advanced-final-client-test-invalid-scope-in-token-endpoint-response
Response to HTTP request to test instance udZfy50EDja8TPo
|
||||||||
|
2021-12-16 20:35:56 |
INCOMING
|
fapi1-advanced-final-client-test-invalid-scope-in-token-endpoint-response
Incoming HTTP request to test instance udZfy50EDja8TPo
|
||||||||||||||||||||
|
2021-12-16 20:35:56 | SUCCESS |
EnsureIncomingTls12WithSecureCipherOrTls13
TLS 1.2 in use and cipher is one recommended by BCP195
|
||||
|
Token endpoint |
2021-12-16 20:35:56 |
SUCCESS
|
ExtractClientCertificateFromTokenEndpointRequestHeaders
Extracted client certificate
|
||
|
2021-12-16 20:35:56 | SUCCESS |
CheckForClientCertificate
Found client certificate
|
|
2021-12-16 20:35:56 |
SUCCESS
|
EnsureClientCertificateMatches
Presented certificate matches registered certificate
|
||
|
2021-12-16 20:35:56 | SUCCESS |
ExtractClientAssertion
Parsed client assertion
|
||
|
2021-12-16 20:35:56 |
|
EnsureClientAssertionSignatureAlgorithmMatchesRegistered
token_endpoint_auth_signing_alg is not set for the client, any supported algorithm can be used
|
|
2021-12-16 20:35:56 | SUCCESS |
ValidateClientAssertionSignature
client_assertion signature validated
|
||
|
2021-12-16 20:35:56 | SUCCESS |
EnsureClientAssertionTypeIsJwt
Found JWT assertion type
|
||
|
2021-12-16 20:35:56 | SUCCESS |
ValidateClientAssertionClaims
Client Assertion passed all validation checks
|
|
2021-12-16 20:35:56 |
SUCCESS
|
FAPIBrazilExtractRequestedScopeFromClientCredentialsGrant
Found 'payments' scope in request
|
||||
|
2021-12-16 20:35:56 |
SUCCESS
|
GenerateBearerAccessToken
Generated access token
|
||
|
2021-12-16 20:35:56 |
SUCCESS
|
CreateTokenEndpointResponse
Created token endpoint response
|
||||
|
2021-12-16 20:35:56 |
|
CopyAccessTokenToClientCredentialsField
Condition ran but did not log anything
|
|
2021-12-16 20:35:56 |
OUTGOING
|
fapi1-advanced-final-client-test-invalid-scope-in-token-endpoint-response
Response to HTTP request to test instance udZfy50EDja8TPo
|
||||||||
|
2021-12-16 20:35:56 |
INCOMING
|
fapi1-advanced-final-client-test-invalid-scope-in-token-endpoint-response
Incoming HTTP request to test instance udZfy50EDja8TPo
|
||||||||||||||||||||
|
2021-12-16 20:35:56 | SUCCESS |
EnsureIncomingTls12WithSecureCipherOrTls13
TLS 1.2 in use and cipher is one recommended by BCP195
|
||||
|
New consent endpoint |
2021-12-16 20:35:56 |
SUCCESS
|
ExtractClientCertificateFromTokenEndpointRequestHeaders
Extracted client certificate
|
||
|
2021-12-16 20:35:56 | SUCCESS |
CheckForClientCertificate
Found client certificate
|
|
2021-12-16 20:35:56 |
SUCCESS
|
EnsureClientCertificateMatches
Presented certificate matches registered certificate
|
||
|
2021-12-16 20:35:56 |
SUCCESS
|
EnsureIncomingRequestMethodIsPost
Client correctly used http POST method
|
|
2021-12-16 20:35:56 | SUCCESS |
EnsureBearerAccessTokenNotInParams
Client correctly did not send access token in query parameters or form body
|
|
2021-12-16 20:35:56 | SUCCESS |
ExtractBearerAccessTokenFromHeader
Found access token on incoming request
|
||
|
2021-12-16 20:35:56 |
SUCCESS
|
RequireBearerClientCredentialsAccessToken
Found access token in request
|
||
|
2021-12-16 20:35:56 | SUCCESS |
ExtractFapiDateHeader
Found a FAPI auth date header
|
||
|
2021-12-16 20:35:56 | INFO |
ExtractFapiIpAddressHeader
Skipped evaluation due to missing required element: incoming_request headers.x-fapi-customer-ip-address
|
||||||
|
2021-12-16 20:35:56 | SUCCESS |
ExtractFapiInteractionIdHeader
Found a FAPI interaction ID header
|
||
|
2021-12-16 20:35:56 |
SUCCESS
|
FAPIBrazilEnsureClientCredentialsScopeContainedConsents
The token request which was used to obtain the access token contained 'consents' scope
|
||
|
2021-12-16 20:35:56 |
|
FAPIBrazilExtractConsentRequest
Condition ran but did not log anything
|
|
2021-12-16 20:35:56 |
INFO
|
CreateFapiInteractionIdIfNeeded
Found existing FAPI interaction ID
|
||
|
2021-12-16 20:35:56 | SUCCESS |
FAPIBrazilGenerateNewConsentResponse
Created consent response
|
||||||
|
2021-12-16 20:35:56 |
|
ClearAccessTokenFromRequest
Condition ran but did not log anything
|
|
2021-12-16 20:35:56 |
OUTGOING
|
fapi1-advanced-final-client-test-invalid-scope-in-token-endpoint-response
Response to HTTP request to test instance udZfy50EDja8TPo
|
||||||||
|
2021-12-16 20:35:57 |
INCOMING
|
fapi1-advanced-final-client-test-invalid-scope-in-token-endpoint-response
Incoming HTTP request to test instance udZfy50EDja8TPo
|
||||||||||||||||||||
|
2021-12-16 20:35:57 | SUCCESS |
EnsureIncomingTls12WithSecureCipherOrTls13
TLS 1.2 in use and cipher is one recommended by BCP195
|
||||
|
PAR endpoint |
2021-12-16 20:35:57 |
SUCCESS
|
ExtractClientCertificateFromTokenEndpointRequestHeaders
Extracted client certificate
|
||
|
2021-12-16 20:35:57 | SUCCESS |
CheckForClientCertificate
Found client certificate
|
|
2021-12-16 20:35:57 |
SUCCESS
|
EnsureClientCertificateMatches
Presented certificate matches registered certificate
|
||
|
2021-12-16 20:35:57 | SUCCESS |
ExtractClientAssertion
Parsed client assertion
|
||
|
2021-12-16 20:35:57 |
|
EnsureClientAssertionSignatureAlgorithmMatchesRegistered
token_endpoint_auth_signing_alg is not set for the client, any supported algorithm can be used
|
|
2021-12-16 20:35:57 | SUCCESS |
ValidateClientAssertionSignature
client_assertion signature validated
|
||
|
2021-12-16 20:35:57 | SUCCESS |
EnsureClientAssertionTypeIsJwt
Found JWT assertion type
|
||
|
2021-12-16 20:35:57 | SUCCESS |
ValidateClientAssertionClaimsForPAREndpoint
Client Assertion passed all validation checks
|
|
2021-12-16 20:35:57 | SUCCESS |
ExtractRequestObjectFromPAREndpointRequest
Parsed request object
|
||
|
2021-12-16 20:35:57 | SUCCESS |
EnsurePAREndpointRequestDoesNotContainRequestUriParameter
PAR endpoint request does not contain a request_uri parameter
|
|
2021-12-16 20:35:57 | INFO |
ValidateEncryptedRequestObjectHasKid
Skipped evaluation due to missing required element: authorization_request_object jwe_header
|
||||||
|
2021-12-16 20:35:57 | SUCCESS |
FAPIValidateRequestObjectSigningAlg
Request object was signed with a permitted algorithm
|
||
|
2021-12-16 20:35:57 | SUCCESS |
FAPIBrazilValidateRequestObjectIdTokenACRClaims
Acr value in request object is as expected
|
||
|
2021-12-16 20:35:57 | SUCCESS |
FAPIValidateRequestObjectExp
Request object contains a valid exp claim, expiry time
|
||
|
2021-12-16 20:35:57 | SUCCESS |
FAPI1AdvancedValidateRequestObjectNBFClaim
nbf claim is valid
|
||||
|
2021-12-16 20:35:57 |
|
ValidateRequestObjectClaims
Request object does not contain a max_age claim
|
|
2021-12-16 20:35:57 |
SUCCESS
|
ValidateRequestObjectClaims
Request object claims passed all validation checks
|
|
2021-12-16 20:35:57 | SUCCESS |
EnsureNumericRequestObjectClaimsAreNotNull
None of the claims expected to have numeric values, have null values
|
||
|
2021-12-16 20:35:57 | SUCCESS |
EnsureRequestObjectDoesNotContainRequestOrRequestUri
Request object does not contain request or request_uri
|
|
2021-12-16 20:35:57 | SUCCESS |
EnsureRequestObjectDoesNotContainSubWithClientId
Request object does not contain Client Id in sub
|
|
2021-12-16 20:35:57 | SUCCESS |
ValidateRequestObjectSignature
Request object signature validated using a key in the client's JWKS and using the client's registered request_object_signing_alg
|
||||||
|
2021-12-16 20:35:57 |
SUCCESS
|
EnsureMatchingRedirectUriInRequestObject
Redirect URI matched
|
||
|
2021-12-16 20:35:57 | SUCCESS |
EnsureRequestObjectContainsCodeChallengeWhenUsingPAR
Found required PKCE parameters in request
|
||||
|
2021-12-16 20:35:57 | SUCCESS |
CreatePAREndpointResponse
Created PAR endpoint response
|
||||
|
2021-12-16 20:35:57 |
OUTGOING
|
fapi1-advanced-final-client-test-invalid-scope-in-token-endpoint-response
Response to HTTP request to test instance udZfy50EDja8TPo
|
||||||||
|
2021-12-16 20:35:57 |
INCOMING
|
fapi1-advanced-final-client-test-invalid-scope-in-token-endpoint-response
Incoming HTTP request to test instance udZfy50EDja8TPo
|
||||||||||||||||||||
|
2021-12-16 20:35:57 | SUCCESS |
EnsureIncomingTls12WithSecureCipherOrTls13
TLS 1.2 in use and cipher is one recommended by BCP195
|
||||
|
Authorization endpoint |
2021-12-16 20:35:57 |
SUCCESS
|
EnsureAuthorizationRequestDoesNotContainRequestWhenUsingPAR
Request does not contain a request parameter
|
|
2021-12-16 20:35:57 | INFO |
ValidateEncryptedRequestObjectHasKid
Skipped evaluation due to missing required element: authorization_request_object jwe_header
|
||||||
|
2021-12-16 20:35:57 |
SUCCESS
|
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
|
||
|
2021-12-16 20:35:57 | SUCCESS |
EnsureClientIdInAuthorizationRequestParametersMatchRequestObject
client_id http request parameter value matches client_id in request object
|
|
2021-12-16 20:35:57 |
SUCCESS
|
ExtractRequestedScopes
Requested scopes
|
||
|
2021-12-16 20:35:57 |
SUCCESS
|
FAPIBrazilValidateConsentScope
Found consent scope in request
|
||||
|
2021-12-16 20:35:57 |
SUCCESS
|
EnsureScopeContainsAccounts
Found accounts scope in request
|
||
|
2021-12-16 20:35:57 | SUCCESS |
EnsureResponseTypeIsCodeIdToken
Response type is expected value
|
||
|
2021-12-16 20:35:57 | SUCCESS |
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
|
||||
|
2021-12-16 20:35:57 | SUCCESS |
EnsureMatchingClientId
Client ID matched
|
||
|
2021-12-16 20:35:57 |
SUCCESS
|
CreateAuthorizationCode
Created authorization code
|
||
|
2021-12-16 20:35:57 | SUCCESS |
ExtractNonceFromAuthorizationRequest
Extracted nonce
|
||
|
2021-12-16 20:35:57 | SUCCESS |
CalculateCHash
Successful c_hash encoding
|
||
|
2021-12-16 20:35:57 | SUCCESS |
CalculateSHash
Successful s_hash encoding
|
||
|
2021-12-16 20:35:57 |
SUCCESS
|
GenerateIdTokenClaims
Created ID Token Claims
|
||||||||||||
|
2021-12-16 20:35:57 | SUCCESS |
FAPIBrazilAddCPFAndCPNJToIdTokenClaims
Added claims to id_token claims
|
||
|
2021-12-16 20:35:57 | SUCCESS |
AddCHashToIdTokenClaims
Added c_hash to ID token claims
|
||||
|
2021-12-16 20:35:57 | SUCCESS |
AddSHashToIdTokenClaims
Added s_hash to ID token claims
|
||||
|
2021-12-16 20:35:57 | INFO |
AddAtHashToIdTokenClaims
Skipped evaluation due to missing required string: at_hash
|
||
|
2021-12-16 20:35:57 | SUCCESS |
FAPIBrazilAddACRClaimToIdTokenClaims
Added acr value to id_token_claims
|
||||
|
2021-12-16 20:35:57 |
SUCCESS
|
SignIdToken
Signed the ID token
|
||
|
2021-12-16 20:35:57 |
SUCCESS
|
FAPIBrazilChangeConsentStatusToAuthorized
Changed consent status to AUTHORISED
|
||
|
2021-12-16 20:35:57 |
SUCCESS
|
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
|
||
|
2021-12-16 20:35:57 | SUCCESS |
AddCodeToAuthorizationEndpointResponseParams
Added code to authorization endpoint response params
|
||
|
2021-12-16 20:35:57 | SUCCESS |
AddIdTokenToAuthorizationEndpointResponseParams
Added id_token to authorization endpoint response params
|
||
|
2021-12-16 20:35:57 |
|
SendAuthorizationResponseWithResponseModeFragment
Redirecting back to client
|
||
|
2021-12-16 20:35:57 |
OUTGOING
|
fapi1-advanced-final-client-test-invalid-scope-in-token-endpoint-response
Response to HTTP request to test instance udZfy50EDja8TPo
|
||||
|
2021-12-16 20:35:58 |
INCOMING
|
fapi1-advanced-final-client-test-invalid-scope-in-token-endpoint-response
Incoming HTTP request to test instance udZfy50EDja8TPo
|
||||||||||||||||||||
|
2021-12-16 20:35:58 | SUCCESS |
EnsureIncomingTls12WithSecureCipherOrTls13
TLS 1.2 in use and cipher is one recommended by BCP195
|
||||
|
Get consent endpoint |
2021-12-16 20:35:58 |
SUCCESS
|
ExtractClientCertificateFromTokenEndpointRequestHeaders
Extracted client certificate
|
||
|
2021-12-16 20:35:58 | SUCCESS |
CheckForClientCertificate
Found client certificate
|
|
2021-12-16 20:35:58 |
SUCCESS
|
EnsureClientCertificateMatches
Presented certificate matches registered certificate
|
||
|
2021-12-16 20:35:58 | SUCCESS |
EnsureBearerAccessTokenNotInParams
Client correctly did not send access token in query parameters or form body
|
|
2021-12-16 20:35:58 | SUCCESS |
ExtractBearerAccessTokenFromHeader
Found access token on incoming request
|
||
|
2021-12-16 20:35:58 |
SUCCESS
|
RequireBearerClientCredentialsAccessToken
Found access token in request
|
||
|
2021-12-16 20:35:58 | SUCCESS |
ExtractFapiDateHeader
Found a FAPI auth date header
|
||
|
2021-12-16 20:35:58 | INFO |
ExtractFapiIpAddressHeader
Skipped evaluation due to missing required element: incoming_request headers.x-fapi-customer-ip-address
|
||||||
|
2021-12-16 20:35:58 | SUCCESS |
ExtractFapiInteractionIdHeader
Found a FAPI interaction ID header
|
||
|
2021-12-16 20:35:58 |
INFO
|
CreateFapiInteractionIdIfNeeded
Found existing FAPI interaction ID
|
||
|
2021-12-16 20:35:58 | SUCCESS |
FAPIBrazilGenerateGetConsentResponse
Created consent response
|
||
|
2021-12-16 20:35:58 |
|
ClearAccessTokenFromRequest
Condition ran but did not log anything
|
|
2021-12-16 20:35:58 |
OUTGOING
|
fapi1-advanced-final-client-test-invalid-scope-in-token-endpoint-response
Response to HTTP request to test instance udZfy50EDja8TPo
|
||||||||
|
2021-12-16 20:35:59 |
INCOMING
|
fapi1-advanced-final-client-test-invalid-scope-in-token-endpoint-response
Incoming HTTP request to test instance udZfy50EDja8TPo
|
||||||||||||||||||||
|
2021-12-16 20:35:59 | SUCCESS |
EnsureIncomingTls12WithSecureCipherOrTls13
TLS 1.2 in use and cipher is one recommended by BCP195
|
||||
|
2021-12-16 20:35:59 |
OUTGOING
|
fapi1-advanced-final-client-test-invalid-scope-in-token-endpoint-response
Response to HTTP request to test instance udZfy50EDja8TPo
|
||||||||
|
2021-12-16 20:35:59 |
INCOMING
|
fapi1-advanced-final-client-test-invalid-scope-in-token-endpoint-response
Incoming HTTP request to test instance udZfy50EDja8TPo
|
||||||||||||||||||||
|
2021-12-16 20:35:59 | SUCCESS |
EnsureIncomingTls12WithSecureCipherOrTls13
TLS 1.2 in use and cipher is one recommended by BCP195
|
||||
|
Token endpoint |
2021-12-16 20:35:59 |
SUCCESS
|
ExtractClientCertificateFromTokenEndpointRequestHeaders
Extracted client certificate
|
||
|
2021-12-16 20:35:59 | SUCCESS |
CheckForClientCertificate
Found client certificate
|
|
2021-12-16 20:35:59 |
SUCCESS
|
EnsureClientCertificateMatches
Presented certificate matches registered certificate
|
||
|
2021-12-16 20:35:59 | SUCCESS |
ExtractClientAssertion
Parsed client assertion
|
||
|
2021-12-16 20:35:59 |
|
EnsureClientAssertionSignatureAlgorithmMatchesRegistered
token_endpoint_auth_signing_alg is not set for the client, any supported algorithm can be used
|
|
2021-12-16 20:35:59 | SUCCESS |
ValidateClientAssertionSignature
client_assertion signature validated
|
||
|
2021-12-16 20:35:59 | SUCCESS |
EnsureClientAssertionTypeIsJwt
Found JWT assertion type
|
||
|
2021-12-16 20:35:59 | SUCCESS |
ValidateClientAssertionClaims
Client Assertion passed all validation checks
|
|
2021-12-16 20:35:59 |
SUCCESS
|
ValidateAuthorizationCode
Found authorization code
|
||
|
2021-12-16 20:35:59 |
SUCCESS
|
ValidateRedirectUri
Found redirect uri
|
||
|
2021-12-16 20:35:59 | SUCCESS |
ValidateCodeVerifierWithS256
Validated code_verifier successfully
|
||||||
|
2021-12-16 20:35:59 |
SUCCESS
|
GenerateBearerAccessToken
Generated access token
|
||
|
2021-12-16 20:35:59 | SUCCESS |
CalculateAtHash
Successful at_hash encoding
|
||
|
2021-12-16 20:35:59 |
|
CreateRefreshToken
Created refresh token
|
||
|
2021-12-16 20:35:59 |
SUCCESS
|
GenerateIdTokenClaims
Created ID Token Claims
|
||||||||||||
|
2021-12-16 20:35:59 | SUCCESS |
FAPIBrazilAddCPFAndCPNJToIdTokenClaims
Added claims to id_token claims
|
||
|
2021-12-16 20:35:59 | SUCCESS |
AddAtHashToIdTokenClaims
Added at_hash to ID token claims
|
||||
|
2021-12-16 20:35:59 | SUCCESS |
FAPIBrazilAddACRClaimToIdTokenClaims
Added acr value to id_token_claims
|
||||
|
2021-12-16 20:35:59 |
SUCCESS
|
SignIdToken
Signed the ID token
|
||
|
2021-12-16 20:35:59 |
SUCCESS
|
CreateTokenEndpointResponse
Created token endpoint response
|
||||||||||
|
2021-12-16 20:35:59 |
OUTGOING
|
fapi1-advanced-final-client-test-invalid-scope-in-token-endpoint-response
Response to HTTP request to test instance udZfy50EDja8TPo
|
||||||||
|
2021-12-16 20:36:04 |
FINISHED
|
fapi1-advanced-final-client-test-invalid-scope-in-token-endpoint-response
Test has run to completion
|
||
|
2021-12-16 20:36:07 |
|
TEST-RUNNER
Alias has now been claimed by another test
|
||||
|