Test Name | fapi1-advanced-final-client-test-valid-aud-as-array |
---|---|
Variant | client_auth_type=private_key_jwt, fapi_jarm_type=oidc, fapi_auth_request_method=pushed, fapi_profile=openbanking_brazil, fapi_response_mode=plain_response |
Test ID | pyiwHctUup2nA35 https://www.certification.openid.net/log-detail.html?public=true&log=pyiwHctUup2nA35 |
Created | 2021-11-24T21:43:22.721959Z |
Description | Finansystech - Recepção de dados |
Test Version | 4.1.38 |
Test Owner | 112635894686881875468 https://accounts.google.com |
Plan ID | SXomk9oUCKTVt https://www.certification.openid.net/plan-detail.html?public=true&plan=SXomk9oUCKTVt |
Exported From | https://www.certification.openid.net |
Exported By | 112635894686881875468 https://accounts.google.com |
Suite Version | 4.1.38 |
Exported | 2021-12-16 11:42:18 (UTC) |
Status: FINISHED Result: PASSED |
SUCCESS 124 FAILURE 0 WARNING 0 REVIEW 0 INFO 11 |
2021-11-24 21:43:22 |
INFO
|
TEST-RUNNER
Test instance pyiwHctUup2nA35 created
|
||||||||||||||
|
2021-11-24 21:43:22 |
SUCCESS
|
FAPIBrazilGenerateServerConfiguration
Created server configuration
|
||||||
|
2021-11-24 21:43:22 |
SUCCESS
|
LoadServerJWKs
Parsed public and private JWK sets
|
||||||
|
2021-11-24 21:43:22 | SUCCESS |
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
|
|
2021-11-24 21:43:22 |
|
SetServerSigningAlgToPS256
Successfully set signing algorithm to PS256
|
|
2021-11-24 21:43:22 |
|
FAPIBrazilSetGrantTypesSupportedInServerConfiguration
Successfully set grant_types_supported
|
||
|
2021-11-24 21:43:22 |
|
AddClaimsParameterSupportedTrueToServerConfiguration
Successfully added claims_parameter_supported to server configuration
|
||
|
2021-11-24 21:43:22 |
|
FAPIBrazilAddBrazilSpecificSettingsToServerConfiguration
Added open banking Brazil specific server settings
|
||
|
2021-11-24 21:43:22 |
|
SetTokenEndpointAuthMethodsSupportedToPrivateKeyJWTOnly
Changed token_endpoint_auth_methods_supported to private_key_jwt only in server configuration
|
||
|
2021-11-24 21:43:22 |
|
AddPushedAuthorizationRequestEndpointToServerConfig
Added pushed_authorization_request_endpoint to server configuration
|
||
|
2021-11-24 21:43:22 |
|
AddRequirePushedAuthorizationRequestsToServerConfig
Added require_pushed_authorization_requests to server configuration
|
||
|
2021-11-24 21:43:22 | SUCCESS |
AddResponseTypeCodeIdTokenToServerConfiguration
Added code id_token as response type supported
|
||
|
2021-11-24 21:43:22 |
SUCCESS
|
FAPIBrazilAddTokenEndpointAuthSigningAlgValuesSupportedToServer
Set token_endpoint_auth_signing_alg_values_supported
|
||
|
2021-11-24 21:43:22 |
SUCCESS
|
CheckServerConfiguration
Found required server configuration keys
|
||
|
2021-11-24 21:43:22 | SUCCESS |
FAPIEnsureMinimumServerKeyLength
Validated minimum key lengths for server_jwks
|
||
|
2021-11-24 21:43:22 |
SUCCESS
|
LoadUserInfo
Added user information
|
||
|
Verify configuration of first client |
2021-11-24 21:43:22 |
SUCCESS
|
GetStaticClientConfiguration
Found a static client object
|
||||||||
|
2021-11-24 21:43:22 | SUCCESS |
ValidateClientJWKsPublicPart
Valid client JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
|
|
2021-11-24 21:43:22 |
SUCCESS
|
ExtractJWKsFromStaticClientConfiguration
Extracted client JWK
|
||||
|
2021-11-24 21:43:22 | SUCCESS |
CheckDistinctKeyIdValueInClientJWKs
Distinct 'kid' value in all keys of client_jwks
|
||
|
2021-11-24 21:43:22 |
SUCCESS
|
EnsureClientJwksDoesNotContainPrivateOrSymmetricKeys
Jwks does not contain any private or symmetric keys
|
|
2021-11-24 21:43:22 | SUCCESS |
FAPIEnsureMinimumClientKeyLength
Validated minimum key lengths for client_jwks
|
||
|
Verify configuration of second client |
2021-11-24 21:43:22 |
SUCCESS
|
GetStaticClient2Configuration
Found a static second client object
|
||||||||||||
|
2021-11-24 21:43:22 | SUCCESS |
ValidateClientJWKsPublicPart
Valid client JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
|
|
2021-11-24 21:43:22 |
SUCCESS
|
ExtractJWKsFromStaticClientConfiguration
Extracted client JWK
|
||||
|
2021-11-24 21:43:22 | SUCCESS |
CheckDistinctKeyIdValueInClientJWKs
Distinct 'kid' value in all keys of client_jwks
|
||
|
2021-11-24 21:43:22 |
SUCCESS
|
EnsureClientJwksDoesNotContainPrivateOrSymmetricKeys
Jwks does not contain any private or symmetric keys
|
|
2021-11-24 21:43:22 | SUCCESS |
FAPIEnsureMinimumClientKeyLength
Validated minimum key lengths for client_jwks
|
||
|
2021-11-24 21:43:22 |
|
fapi1-advanced-final-client-test-valid-aud-as-array
Setup Done
|
|
2021-11-24 21:43:24 |
INCOMING
|
fapi1-advanced-final-client-test-valid-aud-as-array
Incoming HTTP request to test instance pyiwHctUup2nA35
|
||||||||||||||||||||
|
2021-11-24 21:43:24 | SUCCESS |
EnsureIncomingTls12WithSecureCipherOrTls13
TLS 1.2 in use and cipher is one recommended by BCP195
|
||||
|
2021-11-24 21:43:24 |
OUTGOING
|
fapi1-advanced-final-client-test-valid-aud-as-array
Response to HTTP request to test instance pyiwHctUup2nA35
|
||||||||
|
2021-11-24 21:43:25 |
INCOMING
|
fapi1-advanced-final-client-test-valid-aud-as-array
Incoming HTTP request to test instance pyiwHctUup2nA35
|
||||||||||||||||||||
|
2021-11-24 21:43:25 | SUCCESS |
EnsureIncomingTls12WithSecureCipherOrTls13
TLS 1.2 in use and cipher is one recommended by BCP195
|
||||
|
Token endpoint |
2021-11-24 21:43:25 |
SUCCESS
|
ExtractClientCertificateFromTokenEndpointRequestHeaders
Extracted client certificate
|
||
|
2021-11-24 21:43:25 | SUCCESS |
CheckForClientCertificate
Found client certificate
|
|
2021-11-24 21:43:25 |
SUCCESS
|
EnsureClientCertificateMatches
Presented certificate matches registered certificate
|
||
|
2021-11-24 21:43:25 | SUCCESS |
ExtractClientAssertion
Parsed client assertion
|
||
|
2021-11-24 21:43:25 |
|
EnsureClientAssertionSignatureAlgorithmMatchesRegistered
token_endpoint_auth_signing_alg is not set for the client, any supported algorithm can be used
|
|
2021-11-24 21:43:25 | SUCCESS |
ValidateClientAssertionSignature
client_assertion signature validated
|
||
|
2021-11-24 21:43:25 | SUCCESS |
EnsureClientAssertionTypeIsJwt
Found JWT assertion type
|
||
|
2021-11-24 21:43:25 | SUCCESS |
ValidateClientAssertionClaims
Client Assertion passed all validation checks
|
|
2021-11-24 21:43:25 |
SUCCESS
|
FAPIBrazilExtractRequestedScopeFromClientCredentialsGrant
Found 'consents' scope in request
|
||||
|
2021-11-24 21:43:25 |
SUCCESS
|
GenerateBearerAccessToken
Generated access token
|
||
|
2021-11-24 21:43:25 |
SUCCESS
|
CreateTokenEndpointResponse
Created token endpoint response
|
||||
|
2021-11-24 21:43:25 |
|
CopyAccessTokenToClientCredentialsField
Condition ran but did not log anything
|
|
2021-11-24 21:43:25 |
OUTGOING
|
fapi1-advanced-final-client-test-valid-aud-as-array
Response to HTTP request to test instance pyiwHctUup2nA35
|
||||||||
|
2021-11-24 21:43:25 |
INCOMING
|
fapi1-advanced-final-client-test-valid-aud-as-array
Incoming HTTP request to test instance pyiwHctUup2nA35
|
||||||||||||||||||||
|
2021-11-24 21:43:25 | SUCCESS |
EnsureIncomingTls12WithSecureCipherOrTls13
TLS 1.2 in use and cipher is one recommended by BCP195
|
||||
|
New consent endpoint |
2021-11-24 21:43:25 |
SUCCESS
|
ExtractClientCertificateFromTokenEndpointRequestHeaders
Extracted client certificate
|
||
|
2021-11-24 21:43:25 | SUCCESS |
CheckForClientCertificate
Found client certificate
|
|
2021-11-24 21:43:25 |
SUCCESS
|
EnsureClientCertificateMatches
Presented certificate matches registered certificate
|
||
|
2021-11-24 21:43:25 |
SUCCESS
|
EnsureIncomingRequestMethodIsPost
Client correctly used http POST method
|
|
2021-11-24 21:43:25 | SUCCESS |
EnsureBearerAccessTokenNotInParams
Client correctly did not send access token in query parameters or form body
|
|
2021-11-24 21:43:25 | SUCCESS |
ExtractBearerAccessTokenFromHeader
Found access token on incoming request
|
||
|
2021-11-24 21:43:25 |
SUCCESS
|
RequireBearerClientCredentialsAccessToken
Found access token in request
|
||
|
2021-11-24 21:43:25 | INFO |
ExtractFapiDateHeader
Skipped evaluation due to missing required element: incoming_request headers.x-fapi-auth-date
|
||||||
|
2021-11-24 21:43:25 | INFO |
ExtractFapiIpAddressHeader
Skipped evaluation due to missing required element: incoming_request headers.x-fapi-customer-ip-address
|
||||||
|
2021-11-24 21:43:25 | INFO |
ExtractFapiInteractionIdHeader
Skipped evaluation due to missing required element: incoming_request headers.x-fapi-interaction-id
|
||||||
|
2021-11-24 21:43:25 |
SUCCESS
|
FAPIBrazilEnsureClientCredentialsScopeContainedConsents
The token request which was used to obtain the access token contained 'consents' scope
|
||
|
2021-11-24 21:43:25 |
|
FAPIBrazilExtractConsentRequest
Condition ran but did not log anything
|
|
2021-11-24 21:43:25 | SUCCESS |
CreateFapiInteractionIdIfNeeded
Created new FAPI interaction ID
|
||
|
2021-11-24 21:43:25 | SUCCESS |
FAPIBrazilGenerateNewConsentResponse
Created consent response
|
||||||
|
2021-11-24 21:43:25 |
|
ClearAccessTokenFromRequest
Condition ran but did not log anything
|
|
2021-11-24 21:43:25 |
OUTGOING
|
fapi1-advanced-final-client-test-valid-aud-as-array
Response to HTTP request to test instance pyiwHctUup2nA35
|
||||||||
|
2021-11-24 21:43:26 |
INCOMING
|
fapi1-advanced-final-client-test-valid-aud-as-array
Incoming HTTP request to test instance pyiwHctUup2nA35
|
||||||||||||||||||||
|
2021-11-24 21:43:26 | SUCCESS |
EnsureIncomingTls12WithSecureCipherOrTls13
TLS 1.2 in use and cipher is one recommended by BCP195
|
||||
|
PAR endpoint |
2021-11-24 21:43:26 |
SUCCESS
|
ExtractClientCertificateFromTokenEndpointRequestHeaders
Extracted client certificate
|
||
|
2021-11-24 21:43:26 | SUCCESS |
CheckForClientCertificate
Found client certificate
|
|
2021-11-24 21:43:26 |
SUCCESS
|
EnsureClientCertificateMatches
Presented certificate matches registered certificate
|
||
|
2021-11-24 21:43:26 | SUCCESS |
ExtractClientAssertion
Parsed client assertion
|
||
|
2021-11-24 21:43:26 |
|
EnsureClientAssertionSignatureAlgorithmMatchesRegistered
token_endpoint_auth_signing_alg is not set for the client, any supported algorithm can be used
|
|
2021-11-24 21:43:26 | SUCCESS |
ValidateClientAssertionSignature
client_assertion signature validated
|
||
|
2021-11-24 21:43:26 | SUCCESS |
EnsureClientAssertionTypeIsJwt
Found JWT assertion type
|
||
|
2021-11-24 21:43:26 | SUCCESS |
ValidateClientAssertionClaimsForPAREndpoint
Client Assertion passed all validation checks
|
|
2021-11-24 21:43:26 | SUCCESS |
ExtractRequestObjectFromPAREndpointRequest
Parsed request object
|
||
|
2021-11-24 21:43:26 | SUCCESS |
EnsurePAREndpointRequestDoesNotContainRequestUriParameter
PAR endpoint request does not contain a request_uri parameter
|
|
2021-11-24 21:43:26 | INFO |
ValidateEncryptedRequestObjectHasKid
Skipped evaluation due to missing required element: authorization_request_object jwe_header
|
||||||
|
2021-11-24 21:43:26 | SUCCESS |
FAPIValidateRequestObjectSigningAlg
Request object was signed with a permitted algorithm
|
||
|
2021-11-24 21:43:26 | SUCCESS |
FAPIBrazilValidateRequestObjectIdTokenACRClaims
Acr value in request object is as expected
|
||
|
2021-11-24 21:43:26 | SUCCESS |
FAPIValidateRequestObjectExp
Request object contains a valid exp claim, expiry time
|
||
|
2021-11-24 21:43:26 | SUCCESS |
FAPI1AdvancedValidateRequestObjectNBFClaim
nbf claim is valid
|
||||
|
2021-11-24 21:43:26 |
|
ValidateRequestObjectClaims
Request object does not contain a max_age claim
|
|
2021-11-24 21:43:26 |
SUCCESS
|
ValidateRequestObjectClaims
Request object claims passed all validation checks
|
|
2021-11-24 21:43:26 | SUCCESS |
EnsureNumericRequestObjectClaimsAreNotNull
None of the claims expected to have numeric values, have null values
|
||
|
2021-11-24 21:43:26 | SUCCESS |
EnsureRequestObjectDoesNotContainRequestOrRequestUri
Request object does not contain request or request_uri
|
|
2021-11-24 21:43:26 | SUCCESS |
EnsureRequestObjectDoesNotContainSubWithClientId
Request object does not contain Client Id in sub
|
|
2021-11-24 21:43:26 | SUCCESS |
ValidateRequestObjectSignature
Request object signature validated using a key in the client's JWKS and using the client's registered request_object_signing_alg
|
||||||
|
2021-11-24 21:43:26 |
SUCCESS
|
EnsureMatchingRedirectUriInRequestObject
Redirect URI matched
|
||
|
2021-11-24 21:43:26 | SUCCESS |
EnsureRequestObjectContainsCodeChallengeWhenUsingPAR
Found required PKCE parameters in request
|
||||
|
2021-11-24 21:43:26 | SUCCESS |
CreatePAREndpointResponse
Created PAR endpoint response
|
||||
|
2021-11-24 21:43:26 |
OUTGOING
|
fapi1-advanced-final-client-test-valid-aud-as-array
Response to HTTP request to test instance pyiwHctUup2nA35
|
||||||||
|
2021-11-24 21:43:27 |
INCOMING
|
fapi1-advanced-final-client-test-valid-aud-as-array
Incoming HTTP request to test instance pyiwHctUup2nA35
|
||||||||||||||||||||
|
2021-11-24 21:43:27 | SUCCESS |
EnsureIncomingTls12WithSecureCipherOrTls13
TLS 1.2 in use and cipher is one recommended by BCP195
|
||||
|
Authorization endpoint |
2021-11-24 21:43:27 |
SUCCESS
|
EnsureAuthorizationRequestDoesNotContainRequestWhenUsingPAR
Request does not contain a request parameter
|
|
2021-11-24 21:43:27 | INFO |
ValidateEncryptedRequestObjectHasKid
Skipped evaluation due to missing required element: authorization_request_object jwe_header
|
||||||
|
2021-11-24 21:43:27 |
SUCCESS
|
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
|
||
|
2021-11-24 21:43:27 | SUCCESS |
EnsureClientIdInAuthorizationRequestParametersMatchRequestObject
client_id http request parameter value matches client_id in request object
|
|
2021-11-24 21:43:27 |
SUCCESS
|
ExtractRequestedScopes
Requested scopes
|
||
|
2021-11-24 21:43:27 |
SUCCESS
|
FAPIBrazilValidateConsentScope
Found consent scope in request
|
||||
|
2021-11-24 21:43:27 |
SUCCESS
|
EnsureScopeContainsAccounts
Found accounts scope in request
|
||
|
2021-11-24 21:43:27 | SUCCESS |
EnsureResponseTypeIsCodeIdToken
Response type is expected value
|
||
|
2021-11-24 21:43:27 | SUCCESS |
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
|
||||
|
2021-11-24 21:43:27 | SUCCESS |
EnsureMatchingClientId
Client ID matched
|
||
|
2021-11-24 21:43:27 |
SUCCESS
|
CreateAuthorizationCode
Created authorization code
|
||
|
2021-11-24 21:43:27 | SUCCESS |
ExtractNonceFromAuthorizationRequest
Extracted nonce
|
||
|
2021-11-24 21:43:27 | SUCCESS |
CalculateCHash
Successful c_hash encoding
|
||
|
2021-11-24 21:43:27 | SUCCESS |
CalculateSHash
Successful s_hash encoding
|
||
|
2021-11-24 21:43:27 |
SUCCESS
|
GenerateIdTokenClaims
Created ID Token Claims
|
||||||||||||
|
2021-11-24 21:43:27 | SUCCESS |
FAPIBrazilAddCPFAndCPNJToIdTokenClaims
Added claims to id_token claims
|
||
|
2021-11-24 21:43:27 | SUCCESS |
AddCHashToIdTokenClaims
Added c_hash to ID token claims
|
||||
|
2021-11-24 21:43:27 | SUCCESS |
AddSHashToIdTokenClaims
Added s_hash to ID token claims
|
||||
|
2021-11-24 21:43:27 | INFO |
AddAtHashToIdTokenClaims
Skipped evaluation due to missing required string: at_hash
|
||
|
2021-11-24 21:43:27 | SUCCESS |
AddAudValueAsArrayToIdToken
Added the aud value as an array to ID token claims
|
||||
|
2021-11-24 21:43:27 | SUCCESS |
FAPIBrazilAddACRClaimToIdTokenClaims
Added acr value to id_token_claims
|
||||
|
2021-11-24 21:43:27 |
SUCCESS
|
SignIdToken
Signed the ID token
|
||
|
2021-11-24 21:43:27 |
SUCCESS
|
SignIdTokenBypassingNimbusChecks
Signed the ID token
|
||
|
2021-11-24 21:43:27 |
SUCCESS
|
FAPIBrazilChangeConsentStatusToAuthorized
Changed consent status to AUTHORISED
|
||
|
2021-11-24 21:43:27 |
SUCCESS
|
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
|
||
|
2021-11-24 21:43:27 | SUCCESS |
AddCodeToAuthorizationEndpointResponseParams
Added code to authorization endpoint response params
|
||
|
2021-11-24 21:43:27 | SUCCESS |
AddIdTokenToAuthorizationEndpointResponseParams
Added id_token to authorization endpoint response params
|
||
|
2021-11-24 21:43:27 |
|
SendAuthorizationResponseWithResponseModeFragment
Redirecting back to client
|
||
|
2021-11-24 21:43:27 |
OUTGOING
|
fapi1-advanced-final-client-test-valid-aud-as-array
Response to HTTP request to test instance pyiwHctUup2nA35
|
||||
|
2021-11-24 21:43:27 |
INCOMING
|
fapi1-advanced-final-client-test-valid-aud-as-array
Incoming HTTP request to test instance pyiwHctUup2nA35
|
||||||||||||||||||||
|
2021-11-24 21:43:27 | SUCCESS |
EnsureIncomingTls12WithSecureCipherOrTls13
TLS 1.2 in use and cipher is one recommended by BCP195
|
||||
|
2021-11-24 21:43:27 |
OUTGOING
|
fapi1-advanced-final-client-test-valid-aud-as-array
Response to HTTP request to test instance pyiwHctUup2nA35
|
||||||||
|
2021-11-24 21:43:28 |
INCOMING
|
fapi1-advanced-final-client-test-valid-aud-as-array
Incoming HTTP request to test instance pyiwHctUup2nA35
|
||||||||||||||||||||
|
2021-11-24 21:43:28 | SUCCESS |
EnsureIncomingTls12WithSecureCipherOrTls13
TLS 1.2 in use and cipher is one recommended by BCP195
|
||||
|
2021-11-24 21:43:28 |
OUTGOING
|
fapi1-advanced-final-client-test-valid-aud-as-array
Response to HTTP request to test instance pyiwHctUup2nA35
|
||||||||
|
2021-11-24 21:43:28 |
INCOMING
|
fapi1-advanced-final-client-test-valid-aud-as-array
Incoming HTTP request to test instance pyiwHctUup2nA35
|
||||||||||||||||||||
|
2021-11-24 21:43:28 | SUCCESS |
EnsureIncomingTls12WithSecureCipherOrTls13
TLS 1.2 in use and cipher is one recommended by BCP195
|
||||
|
Token endpoint |
2021-11-24 21:43:28 |
SUCCESS
|
ExtractClientCertificateFromTokenEndpointRequestHeaders
Extracted client certificate
|
||
|
2021-11-24 21:43:28 | SUCCESS |
CheckForClientCertificate
Found client certificate
|
|
2021-11-24 21:43:28 |
SUCCESS
|
EnsureClientCertificateMatches
Presented certificate matches registered certificate
|
||
|
2021-11-24 21:43:28 | SUCCESS |
ExtractClientAssertion
Parsed client assertion
|
||
|
2021-11-24 21:43:28 |
|
EnsureClientAssertionSignatureAlgorithmMatchesRegistered
token_endpoint_auth_signing_alg is not set for the client, any supported algorithm can be used
|
|
2021-11-24 21:43:28 | SUCCESS |
ValidateClientAssertionSignature
client_assertion signature validated
|
||
|
2021-11-24 21:43:28 | SUCCESS |
EnsureClientAssertionTypeIsJwt
Found JWT assertion type
|
||
|
2021-11-24 21:43:28 | SUCCESS |
ValidateClientAssertionClaims
Client Assertion passed all validation checks
|
|
2021-11-24 21:43:28 |
SUCCESS
|
ValidateAuthorizationCode
Found authorization code
|
||
|
2021-11-24 21:43:28 |
SUCCESS
|
ValidateRedirectUri
Found redirect uri
|
||
|
2021-11-24 21:43:28 | SUCCESS |
ValidateCodeVerifierWithS256
Validated code_verifier successfully
|
||||||
|
2021-11-24 21:43:28 |
SUCCESS
|
GenerateBearerAccessToken
Generated access token
|
||
|
2021-11-24 21:43:28 | SUCCESS |
CalculateAtHash
Successful at_hash encoding
|
||
|
2021-11-24 21:43:28 |
|
CreateRefreshToken
Created refresh token
|
||
|
2021-11-24 21:43:28 |
SUCCESS
|
GenerateIdTokenClaims
Created ID Token Claims
|
||||||||||||
|
2021-11-24 21:43:28 | SUCCESS |
FAPIBrazilAddCPFAndCPNJToIdTokenClaims
Added claims to id_token claims
|
||
|
2021-11-24 21:43:28 | SUCCESS |
AddAtHashToIdTokenClaims
Added at_hash to ID token claims
|
||||
|
2021-11-24 21:43:28 | SUCCESS |
AddAudValueAsArrayToIdToken
Added the aud value as an array to ID token claims
|
||||
|
2021-11-24 21:43:28 | SUCCESS |
FAPIBrazilAddACRClaimToIdTokenClaims
Added acr value to id_token_claims
|
||||
|
2021-11-24 21:43:28 |
SUCCESS
|
SignIdToken
Signed the ID token
|
||
|
2021-11-24 21:43:28 |
SUCCESS
|
SignIdTokenBypassingNimbusChecks
Signed the ID token
|
||
|
2021-11-24 21:43:28 |
SUCCESS
|
CreateTokenEndpointResponse
Created token endpoint response
|
||||||||||
|
2021-11-24 21:43:28 |
OUTGOING
|
fapi1-advanced-final-client-test-valid-aud-as-array
Response to HTTP request to test instance pyiwHctUup2nA35
|
||||||||
|
2021-11-24 21:43:29 |
INCOMING
|
fapi1-advanced-final-client-test-valid-aud-as-array
Incoming HTTP request to test instance pyiwHctUup2nA35
|
||||||||||||||||||||
|
2021-11-24 21:43:29 | SUCCESS |
EnsureIncomingTls12WithSecureCipherOrTls13
TLS 1.2 in use and cipher is one recommended by BCP195
|
||||
|
Accounts endpoint |
2021-11-24 21:43:29 |
SUCCESS
|
ExtractClientCertificateFromTokenEndpointRequestHeaders
Extracted client certificate
|
||
|
2021-11-24 21:43:29 | SUCCESS |
CheckForClientCertificate
Found client certificate
|
|
2021-11-24 21:43:29 |
SUCCESS
|
EnsureClientCertificateMatches
Presented certificate matches registered certificate
|
||
|
2021-11-24 21:43:29 | SUCCESS |
EnsureBearerAccessTokenNotInParams
Client correctly did not send access token in query parameters or form body
|
|
2021-11-24 21:43:29 | SUCCESS |
ExtractBearerAccessTokenFromHeader
Found access token on incoming request
|
||
|
2021-11-24 21:43:29 |
SUCCESS
|
RequireBearerAccessToken
Found access token in request
|
||
|
2021-11-24 21:43:29 | INFO |
ExtractFapiDateHeader
Skipped evaluation due to missing required element: incoming_request headers.x-fapi-auth-date
|
||||||
|
2021-11-24 21:43:29 | INFO |
ExtractFapiIpAddressHeader
Skipped evaluation due to missing required element: incoming_request headers.x-fapi-customer-ip-address
|
||||||
|
2021-11-24 21:43:29 | INFO |
ExtractFapiInteractionIdHeader
Skipped evaluation due to missing required element: incoming_request headers.x-fapi-interaction-id
|
||||||
|
2021-11-24 21:43:29 |
SUCCESS
|
FAPIBrazilEnsureAuthorizationRequestScopesContainAccounts
'accounts' was included in authorization request scopes
|
||||
|
2021-11-24 21:43:29 |
INFO
|
CreateFapiInteractionIdIfNeeded
Found existing FAPI interaction ID
|
||
|
2021-11-24 21:43:29 |
SUCCESS
|
CreateFAPIAccountEndpointResponse
Created account response object
|
||||
|
2021-11-24 21:43:29 |
SUCCESS
|
CreateBrazilAccountsEndpointResponse
Created Brazil accounts response (Please note that this is a hardcoded response copied from API documentation)
|
||||
|
2021-11-24 21:43:29 |
|
ClearAccessTokenFromRequest
Condition ran but did not log anything
|
|
2021-11-24 21:43:29 |
OUTGOING
|
fapi1-advanced-final-client-test-valid-aud-as-array
Response to HTTP request to test instance pyiwHctUup2nA35
|
||||||||
|
2021-11-24 21:43:29 |
FINISHED
|
fapi1-advanced-final-client-test-valid-aud-as-array
Test has run to completion
|
||
|
2021-11-24 21:43:38 |
|
TEST-RUNNER
Alias has now been claimed by another test
|
||||
|