Test Name | fapi-ciba-id1-refresh-token |
---|---|
Variant | client_auth_type=mtls, ciba_mode=ping, fapi_profile=plain_fapi, client_registration=static_client |
Test ID | UGreex5P7STcmrB https://www.certification.openid.net/log-detail.html?public=true&log=UGreex5P7STcmrB |
Created | 2021-11-09T09:32:48.550320Z |
Description | Sirius Brazil Mock Bank CIBA Example (accounts) |
Test Version | 4.1.37 |
Test Owner | 115569385246667235194 https://accounts.google.com |
Plan ID | aeLI7stuSFHKS https://www.certification.openid.net/plan-detail.html?public=true&plan=aeLI7stuSFHKS |
Exported From | https://www.certification.openid.net |
Exported By | 115569385246667235194 https://accounts.google.com |
Suite Version | 4.1.38 |
Exported | 2021-11-30 08:55:07 (UTC) |
Status: FINISHED Result: PASSED |
SUCCESS 253 FAILURE 0 WARNING 0 REVIEW 0 INFO 7 |
2021-11-09 09:32:48 |
INFO
|
TEST-RUNNER
Test instance UGreex5P7STcmrB created
|
||||||||||||||
|
2021-11-09 09:32:48 |
SUCCESS
|
CreateCIBANotificationEndpointUri
Created ciba notification endpoint URI
|
||
|
2021-11-09 09:32:48 |
|
GetDynamicServerConfiguration
HTTP request
|
||||||||
|
2021-11-09 09:32:49 |
RESPONSE
|
GetDynamicServerConfiguration
HTTP response
|
||||||||
|
2021-11-09 09:32:49 |
|
GetDynamicServerConfiguration
Downloaded server configuration
|
||
|
2021-11-09 09:32:49 |
SUCCESS
|
GetDynamicServerConfiguration
Successfully parsed server configuration
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
2021-11-09 09:32:49 | SUCCESS |
AddMTLSEndpointAliasesToEnvironment
Added mtls_endpoint_aliases to environment
|
|
2021-11-09 09:32:49 |
SUCCESS
|
CheckCIBAServerConfiguration
Found required server configuration keys
|
||
|
2021-11-09 09:32:49 |
|
FetchServerKeys
Fetching server key
|
||
|
2021-11-09 09:32:49 |
|
FetchServerKeys
HTTP request
|
||||||||
|
2021-11-09 09:32:50 |
RESPONSE
|
FetchServerKeys
HTTP response
|
||||||||
|
2021-11-09 09:32:50 |
|
FetchServerKeys
Found JWK set string
|
||
|
2021-11-09 09:32:50 |
SUCCESS
|
FetchServerKeys
Found server JWK set
|
||
|
2021-11-09 09:32:50 |
SUCCESS
|
CheckServerKeysIsValid
Server JWKs is valid
|
||
|
2021-11-09 09:32:50 | SUCCESS |
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
|
|
2021-11-09 09:32:50 | SUCCESS |
CheckForKeyIdInServerJWKs
All keys contain kids
|
|
2021-11-09 09:32:50 | SUCCESS |
EnsureServerJwksDoesNotContainPrivateOrSymmetricKeys
Jwks does not contain any private or symmetric keys
|
|
2021-11-09 09:32:50 | SUCCESS |
FAPIEnsureMinimumServerKeyLength
Validated minimum key lengths for server_jwks
|
||
|
Verify First client: static client configuration |
2021-11-09 09:32:50 |
SUCCESS
|
GetStaticClientConfiguration
Found a static client object
|
||||||||||||
|
2021-11-09 09:32:50 | SUCCESS |
ValidateClientJWKsPrivatePart
Valid client JWKs: keys are valid JSON, contain the required fields, the private/public exponents match and are correctly encoded using unpadded base64url
|
|
2021-11-09 09:32:50 |
SUCCESS
|
ExtractJWKsFromStaticClientConfiguration
Extracted client JWK
|
||||
|
2021-11-09 09:32:50 |
SUCCESS
|
ValidateMTLSCertificatesHeader
MTLS certificates header is valid
|
|
2021-11-09 09:32:50 |
SUCCESS
|
ExtractMTLSCertificatesFromConfiguration
Mutual TLS authentication credentials loaded
|
||||||
|
2021-11-09 09:32:50 | SUCCESS |
CheckForKeyIdInClientJWKs
All keys contain kids
|
|
2021-11-09 09:32:50 | SUCCESS |
CheckDistinctKeyIdValueInClientJWKs
Distinct 'kid' value in all keys of client_jwks
|
||
|
2021-11-09 09:32:50 | SUCCESS |
FAPICheckKeyAlgInClientJWKs
Keys in client JWKS all have permitted 'alg'
|
||
|
2021-11-09 09:32:50 | SUCCESS |
FAPIEnsureMinimumClientKeyLength
Validated minimum key lengths for client_jwks
|
||
|
2021-11-09 09:32:50 |
SUCCESS
|
ValidateMTLSCertificatesAsX509
Mutual TLS authentication cert validated as X.509
|
|
Verify Second client: static client configuration |
2021-11-09 09:32:50 |
SUCCESS
|
GetStaticClient2Configuration
Found a static second client object
|
||||||||
|
2021-11-09 09:32:50 | SUCCESS |
ValidateClientJWKsPrivatePart
Valid client JWKs: keys are valid JSON, contain the required fields, the private/public exponents match and are correctly encoded using unpadded base64url
|
|
2021-11-09 09:32:50 |
SUCCESS
|
ExtractJWKsFromStaticClientConfiguration
Extracted client JWK
|
||||
|
2021-11-09 09:32:50 |
SUCCESS
|
ValidateMTLSCertificates2Header
MTLS certificates header is valid
|
|
2021-11-09 09:32:50 |
SUCCESS
|
ExtractMTLSCertificates2FromConfiguration
Mutual TLS authentication credentials loaded
|
||||||
|
2021-11-09 09:32:50 | SUCCESS |
CheckForKeyIdInClientJWKs
All keys contain kids
|
|
2021-11-09 09:32:50 | SUCCESS |
CheckDistinctKeyIdValueInClientJWKs
Distinct 'kid' value in all keys of client_jwks
|
||
|
2021-11-09 09:32:50 | SUCCESS |
FAPICheckKeyAlgInClientJWKs
Keys in client JWKS all have permitted 'alg'
|
||
|
2021-11-09 09:32:50 | SUCCESS |
FAPIEnsureMinimumClientKeyLength
Validated minimum key lengths for client_jwks
|
||
|
2021-11-09 09:32:50 |
SUCCESS
|
ValidateMTLSCertificatesAsX509
Mutual TLS authentication cert validated as X.509
|
|
2021-11-09 09:32:50 |
SUCCESS
|
GetResourceEndpointConfiguration
Found a resource endpoint object
|
||||||||
|
2021-11-09 09:32:50 |
SUCCESS
|
SetProtectedResourceUrlToSingleResourceEndpoint
Set protected resource URL
|
||
|
2021-11-09 09:32:50 |
SUCCESS
|
ExtractTLSTestValuesFromResourceConfiguration
Extracted TLS information from resource endpoint
|
||
|
2021-11-09 09:32:50 |
SUCCESS
|
ExtractTLSTestValuesFromOBResourceConfiguration
Extracted TLS information from resource endpoint
|
||||
|
2021-11-09 09:32:50 |
|
fapi-ciba-id1-refresh-token
Setup Done
|
|
Call backchannel authentication endpoint |
2021-11-09 09:32:50 |
SUCCESS
|
CreateEmptyAuthorizationEndpointRequest
Created empty authorization endpoint request
|
|
2021-11-09 09:32:50 | SUCCESS |
AddScopeToAuthorizationEndpointRequest
Added scope of 'openid offline accounts consents' to authorization endpoint request
|
||
|
2021-11-09 09:32:50 | SUCCESS |
AddHintToAuthorizationEndpointRequest
Added hint to authorization endpoint request
|
||
|
2021-11-09 09:32:50 | SUCCESS |
AddBindingMessageToAuthorizationEndpointRequest
Added binding message to authorization endpoint request
|
||
|
2021-11-09 09:32:50 |
|
CreateRandomClientNotificationToken
Created token value
|
||||
|
2021-11-09 09:32:50 | SUCCESS |
AddClientNotificationTokenToAuthorizationEndpointRequest
Added client_notification_token 'wVFqXP4ucZ0VAyUXZy7Y=' to authorization endpoint request
|
||||||||
|
2021-11-09 09:32:50 |
SUCCESS
|
ConvertAuthorizationEndpointRequestToRequestObject
Created request object claims
|
||
|
2021-11-09 09:32:50 | SUCCESS |
AddIatToRequestObject
Added iat to request object claims
|
||
|
2021-11-09 09:32:50 | SUCCESS |
AddExpToRequestObject
Added exp to request object claims
|
||
|
2021-11-09 09:32:50 | SUCCESS |
AddNbfToRequestObject
Added nbf to request object claims
|
||
|
2021-11-09 09:32:50 | SUCCESS |
AddJtiToRequestObject
Added jti to request object claims
|
||
|
2021-11-09 09:32:50 | SUCCESS |
AddAudToRequestObject
Added aud to request object claims
|
||
|
2021-11-09 09:32:50 | SUCCESS |
AddIssToRequestObject
Added iss to request object claims
|
||
|
2021-11-09 09:32:50 | SUCCESS |
SignRequestObject
Signed the request object
|
||||||||
|
2021-11-09 09:32:50 | SUCCESS |
CreateBackchannelAuthenticationEndpointRequest
Created backchannel authentication endpoint request
|
|
2021-11-09 09:32:50 |
|
AddRequestToBackchannelAuthenticationEndpointRequest
|
||
|
2021-11-09 09:32:50 | SUCCESS |
EnsureServerConfigurationSupportsMTLS
Found supported MTLS method
|
||
|
2021-11-09 09:32:50 |
|
AddClientIdToBackchannelAuthenticationEndpointRequest
|
||||
|
2021-11-09 09:32:50 |
|
CallBackchannelAuthenticationEndpoint
HTTP request
|
||||||||||
|
2021-11-09 09:32:51 |
RESPONSE
|
CallBackchannelAuthenticationEndpoint
HTTP response
|
||||||||
|
2021-11-09 09:32:51 |
|
CallBackchannelAuthenticationEndpoint
Backchannel Authentication endpoint response
|
||
|
2021-11-09 09:32:51 |
SUCCESS
|
CallBackchannelAuthenticationEndpoint
Parsed backchannel authentication endpoint response
|
||||||
|
2021-11-09 09:32:51 | SUCCESS |
CheckBackchannelAuthenticationEndpointHttpStatus200
Backchannel authentication endpoint http status code was 200
|
|
2021-11-09 09:32:51 | SUCCESS |
CheckBackchannelAuthenticationEndpointContentType
Backchannel authentication endpoint Content-Type: header is application/json
|
|
2021-11-09 09:32:51 |
SUCCESS
|
CheckIfBackchannelAuthenticationEndpointResponseError
No error from Backchannel authentication endpoint
|
|
2021-11-09 09:32:51 | SUCCESS |
ValidateAuthenticationRequestId
auth_req_id passed all validation checks
|
|
2021-11-09 09:32:51 | SUCCESS |
EnsureMinimumAuthenticationRequestIdLength
auth_req_id is of sufficient length
|
||||
|
2021-11-09 09:32:51 | SUCCESS |
EnsureMinimumAuthenticationRequestIdEntropy
Calculated shannon entropy seems sufficient
|
||||||
|
2021-11-09 09:32:51 | SUCCESS |
EnsureRecommendedAuthenticationRequestIdEntropy
Calculated entropy
|
||||||
|
2021-11-09 09:32:51 | SUCCESS |
ValidateAuthenticationRequestIdExpiresIn
expires_in passed all validation checks
|
||
|
2021-11-09 09:32:51 | SUCCESS |
ValidateAuthenticationRequestIdInterval
interval passed all validation checks
|
||
|
Call token endpoint expecting pending |
2021-11-09 09:32:51 |
SUCCESS
|
CreateTokenEndpointRequestForCIBAGrant
|
||
|
2021-11-09 09:32:51 |
|
AddAuthReqIdToTokenEndpointRequest
|
||||
|
2021-11-09 09:32:51 |
|
AddClientIdToTokenEndpointRequest
|
||||||
|
2021-11-09 09:32:51 |
|
CallTokenEndpointAndReturnFullResponse
HTTP request
|
||||||||||
|
2021-11-09 09:32:53 |
RESPONSE
|
CallTokenEndpointAndReturnFullResponse
HTTP response
|
||||||||
|
2021-11-09 09:32:53 |
SUCCESS
|
CallTokenEndpointAndReturnFullResponse
Parsed token endpoint response
|
||||||
|
2021-11-09 09:32:53 | SUCCESS |
CheckTokenEndpointReturnedJsonContentType
token_endpoint_response_headers Content-Type: header is application/json
|
|
Verify token endpoint response is pending or slow_down |
2021-11-09 09:32:53 | SUCCESS |
CheckTokenEndpointHttpStatus400
Token endpoint http status code was 400
|
|
2021-11-09 09:32:53 | SUCCESS |
ValidateErrorFromTokenEndpointResponseError
Token endpoint response error returned valid 'error' field
|
||
|
2021-11-09 09:32:53 | SUCCESS |
CheckErrorDescriptionFromTokenEndpointResponseErrorContainsCRLFTAB
token_endpoint_response 'error_description' field does not include CR/LF/TAB
|
||
|
2021-11-09 09:32:53 | SUCCESS |
ValidateErrorDescriptionFromTokenEndpointResponseError
token_endpoint_response error returned valid 'error_description' field
|
||
|
2021-11-09 09:32:53 | SUCCESS |
ValidateErrorUriFromTokenEndpointResponseError
token_endpoint_response did not include optional 'error_uri' field
|
|
2021-11-09 09:32:53 |
SUCCESS
|
EnsureErrorTokenEndpointSlowdownOrAuthorizationPending
error met 'slow_down' or 'authorization_pending'
|
||
|
Call token endpoint expecting pending (second time) |
2021-11-09 09:32:58 |
SUCCESS
|
CreateTokenEndpointRequestForCIBAGrant
|
||
|
2021-11-09 09:32:58 |
|
AddAuthReqIdToTokenEndpointRequest
|
||||
|
2021-11-09 09:32:58 |
|
AddClientIdToTokenEndpointRequest
|
||||||
|
2021-11-09 09:32:58 |
|
CallTokenEndpointAndReturnFullResponse
HTTP request
|
||||||||||
|
2021-11-09 09:32:59 |
RESPONSE
|
CallTokenEndpointAndReturnFullResponse
HTTP response
|
||||||||
|
2021-11-09 09:32:59 |
SUCCESS
|
CallTokenEndpointAndReturnFullResponse
Parsed token endpoint response
|
||||||
|
2021-11-09 09:32:59 | SUCCESS |
CheckTokenEndpointReturnedJsonContentType
token_endpoint_response_headers Content-Type: header is application/json
|
|
Verify token endpoint response is pending or slow_down |
2021-11-09 09:32:59 | SUCCESS |
CheckTokenEndpointHttpStatus400
Token endpoint http status code was 400
|
|
2021-11-09 09:32:59 | SUCCESS |
ValidateErrorFromTokenEndpointResponseError
Token endpoint response error returned valid 'error' field
|
||
|
2021-11-09 09:32:59 | SUCCESS |
CheckErrorDescriptionFromTokenEndpointResponseErrorContainsCRLFTAB
token_endpoint_response 'error_description' field does not include CR/LF/TAB
|
||
|
2021-11-09 09:32:59 | SUCCESS |
ValidateErrorDescriptionFromTokenEndpointResponseError
token_endpoint_response error returned valid 'error_description' field
|
||
|
2021-11-09 09:32:59 | SUCCESS |
ValidateErrorUriFromTokenEndpointResponseError
token_endpoint_response did not include optional 'error_uri' field
|
|
2021-11-09 09:32:59 |
SUCCESS
|
EnsureErrorTokenEndpointSlowdownOrAuthorizationPending
error met 'slow_down' or 'authorization_pending'
|
||
|
2021-11-09 09:32:59 |
|
CallAutomatedCibaApprovalEndpoint
If your server supports automated testing, you can set 'automated_ciba_approval_url' in your configuration to a url like https://cibasim.example.com/action?token={auth_req_id}&type={action} (auth_req_id will be automatically substituted for the current auth_req_id by the conformance suite, action will be allow or deny depending on the test)
|
|
2021-11-09 09:32:59 |
|
TellUserToDoCIBAAuthentication
Please authenticate and authorize the request
|
|
2021-11-09 09:33:22 |
INCOMING
|
fapi-ciba-id1-refresh-token
Incoming HTTP request to test instance UGreex5P7STcmrB
|
||||||||||||||
|
2021-11-09 09:33:22 |
OUTGOING
|
fapi-ciba-id1-refresh-token
Response to HTTP request to test instance UGreex5P7STcmrB
|
||||||||
|
Verify notification callback |
2021-11-09 09:33:22 | SUCCESS |
EnsureIncomingTls12
Found TLS 1.2 connection
|
|
2021-11-09 09:33:22 | SUCCESS |
EnsureIncomingTlsSecureCipher
TLS cipher is allowed
|
||||
|
2021-11-09 09:33:22 | SUCCESS |
CheckIncomingContentTypeIsApplicationJson
Incoming request Content-Type: header has the expected value
|
||||
|
2021-11-09 09:33:22 | SUCCESS |
VerifyBearerTokenHeaderCallback
'Authorization' header in notification callback contained client_notification_token.
|
|
2021-11-09 09:33:22 |
|
CheckAuthReqIdInCallback
notification_callback contents
|
||||||||||
|
2021-11-09 09:33:22 | SUCCESS |
CheckAuthReqIdInCallback
auth_req_id valued received in callback is correct
|
|
2021-11-09 09:33:22 | SUCCESS |
CheckNotificationCallbackOnlyAuthReqId
body received in notification callback contained only auth_req_id
|
||
|
Calling token endpoint after ping notification |
2021-11-09 09:33:22 |
SUCCESS
|
CreateTokenEndpointRequestForCIBAGrant
|
||
|
2021-11-09 09:33:22 |
|
AddAuthReqIdToTokenEndpointRequest
|
||||
|
2021-11-09 09:33:22 |
|
AddClientIdToTokenEndpointRequest
|
||||||
|
2021-11-09 09:33:22 |
|
CallTokenEndpointAndReturnFullResponse
HTTP request
|
||||||||||
|
2021-11-09 09:33:23 |
RESPONSE
|
CallTokenEndpointAndReturnFullResponse
HTTP response
|
||||||||
|
2021-11-09 09:33:23 |
SUCCESS
|
CallTokenEndpointAndReturnFullResponse
Parsed token endpoint response
|
||||||||||
|
2021-11-09 09:33:23 | SUCCESS |
CheckTokenEndpointReturnedJsonContentType
token_endpoint_response_headers Content-Type: header is application/json
|
|
Verify token endpoint response |
2021-11-09 09:33:23 | SUCCESS |
CheckTokenEndpointHttpStatus200
Token endpoint http status code was 200
|
|
2021-11-09 09:33:23 | SUCCESS |
CheckTokenEndpointCacheHeaders
'pragma' and 'cache-control' headers in token endpoint response contain expected values.
|
||||
|
2021-11-09 09:33:23 |
SUCCESS
|
CheckIfTokenEndpointResponseError
No error from token endpoint
|
|
2021-11-09 09:33:23 | SUCCESS |
CheckForAccessTokenValue
Found an access token
|
||
|
2021-11-09 09:33:23 |
SUCCESS
|
ExtractAccessTokenFromTokenResponse
Extracted the access token
|
||||
|
2021-11-09 09:33:23 | SUCCESS |
ExtractExpiresInFromTokenEndpointResponse
Extracted 'expires_in'
|
||
|
2021-11-09 09:33:23 | SUCCESS |
ValidateExpiresIn
expires_in passed all validation checks
|
||
|
2021-11-09 09:33:23 |
SUCCESS
|
CheckForRefreshTokenValue
Found a refresh token
|
||
|
2021-11-09 09:33:23 | SUCCESS |
EnsureMinimumRefreshTokenLength
Refresh token is of sufficient length
|
||||
|
2021-11-09 09:33:23 | SUCCESS |
EnsureMinimumRefreshTokenEntropy
Calculated shannon entropy seems sufficient
|
||||||
|
2021-11-09 09:33:23 | SUCCESS |
EnsureMinimumAccessTokenLength
Access token is of sufficient length
|
||||
|
2021-11-09 09:33:23 | SUCCESS |
EnsureMinimumAccessTokenEntropy
Calculated shannon entropy seems sufficient
|
||||||
|
2021-11-09 09:33:23 | SUCCESS |
ExtractIdTokenFromTokenResponse
Found and parsed the id_token from token_endpoint_response
|
||||||
|
2021-11-09 09:33:23 | SUCCESS |
ValidateIdToken
ID token iss, aud, exp, iat, auth_time, acr & nbf claims passed validation checks
|
|
2021-11-09 09:33:23 | SUCCESS |
EnsureIdTokenContainsKid
kid was found in the ID token header
|
||
|
2021-11-09 09:33:23 | SUCCESS |
ValidateIdTokenSignature
id_token signature validated
|
||
|
2021-11-09 09:33:23 | SUCCESS |
ValidateIdTokenSignatureUsingKid
id_token signature validated
|
||
|
2021-11-09 09:33:23 | SUCCESS |
CheckForSubjectInIdToken
Found 'sub' in id_token
|
||
|
2021-11-09 09:33:23 | SUCCESS |
FAPIValidateIdTokenSigningAlg
id_token was signed with a permitted algorithm
|
||||
|
2021-11-09 09:33:23 | INFO |
FAPIValidateIdTokenEncryptionAlg
Skipped evaluation due to missing required element: id_token jwe_header
|
||||||
|
2021-11-09 09:33:23 | INFO |
FAPIValidateEncryptedIdTokenHasKid
Skipped evaluation due to missing required element: id_token jwe_header
|
||||||
|
2021-11-09 09:33:23 | SUCCESS |
FAPICIBAValidateIdTokenAuthRequestIdClaims
urn:openid:params:jwt:claim:auth_req_id claim in the ID Token matched the auth_req_id in the request.
|
|
2021-11-09 09:33:23 |
SUCCESS
|
ValidateIdTokenNotIncludeCHashAndSHash
id_token claims correctly does not contain 'c_hash' and 's_hash'
|
||
|
2021-11-09 09:33:23 | SUCCESS |
ExtractAtHash
Extracted at_hash from ID Token
|
||||
|
2021-11-09 09:33:23 |
SUCCESS
|
ExtractRtHash
Extracted rt_hash from ID Token
|
||||
|
2021-11-09 09:33:23 | SUCCESS |
FAPICIBAValidateRtHash
rt_hash validated successfully
|
||||||
|
2021-11-09 09:33:23 | SUCCESS |
ValidateAtHash
at_hash validated successfully
|
||||||
|
Check for refresh token |
2021-11-09 09:33:23 |
SUCCESS
|
ExtractRefreshTokenFromTokenResponse
Extracted refresh token from response
|
||
|
2021-11-09 09:33:23 | SUCCESS |
EnsureServerConfigurationSupportsRefreshToken
The server configuration indicates support for refresh tokens
|
||
|
2021-11-09 09:33:23 | SUCCESS |
EnsureRefreshTokenContainsAllowedCharactersOnly
Refresh token does not contain any illegal characters
|
|
Refresh Token Request |
2021-11-09 09:33:23 |
SUCCESS
|
CreateRefreshTokenRequest
Created token endpoint request parameters
|
||||
|
2021-11-09 09:33:23 | SUCCESS |
AddScopeToTokenEndpointRequest
Added scope of 'openid offline accounts consents' to token endpoint request
|
||||||
|
2021-11-09 09:33:23 |
|
AddClientIdToTokenEndpointRequest
|
||||||||
|
2021-11-09 09:33:23 |
SUCCESS
|
WaitForOneSecond
Pausing for 1 seconds
|
|
2021-11-09 09:33:24 |
SUCCESS
|
WaitForOneSecond
Woke up after 1 seconds sleep
|
|
2021-11-09 09:33:24 |
|
CallTokenEndpointAndReturnFullResponse
HTTP request
|
||||||||||
|
2021-11-09 09:33:25 |
RESPONSE
|
CallTokenEndpointAndReturnFullResponse
HTTP response
|
||||||||
|
2021-11-09 09:33:25 |
SUCCESS
|
CallTokenEndpointAndReturnFullResponse
Parsed token endpoint response
|
||||||||||
|
2021-11-09 09:33:25 | SUCCESS |
CheckTokenEndpointHttpStatus200
Token endpoint http status code was 200
|
|
2021-11-09 09:33:25 | SUCCESS |
CheckTokenEndpointReturnedJsonContentType
token_endpoint_response_headers Content-Type: header is application/json
|
|
2021-11-09 09:33:25 | SUCCESS |
CheckTokenEndpointCacheHeaders
'pragma' and 'cache-control' headers in token endpoint response contain expected values.
|
||||
|
2021-11-09 09:33:25 |
SUCCESS
|
CheckIfTokenEndpointResponseError
No error from token endpoint
|
|
2021-11-09 09:33:25 |
SUCCESS
|
ExtractAccessTokenFromTokenResponse
Extracted the access token
|
||||
|
2021-11-09 09:33:25 | SUCCESS |
CheckTokenTypeIsBearer
Token type is bearer
|
|
2021-11-09 09:33:25 | SUCCESS |
EnsureMinimumAccessTokenEntropy
Calculated shannon entropy seems sufficient
|
||||||
|
2021-11-09 09:33:25 | SUCCESS |
EnsureAccessTokenContainsAllowedCharactersOnly
Access token does not contain any illegal characters
|
|
2021-11-09 09:33:25 | SUCCESS |
ExtractExpiresInFromTokenEndpointResponse
Extracted 'expires_in'
|
||
|
2021-11-09 09:33:25 | SUCCESS |
ValidateExpiresIn
expires_in passed all validation checks
|
||
|
2021-11-09 09:33:25 |
SUCCESS
|
EnsureAccessTokenValuesAreDifferent
Access token values are not the same
|
||||
|
2021-11-09 09:33:25 |
SUCCESS
|
ExtractIdTokenFromTokenResponse
Found and parsed the id_token from token_endpoint_response
|
||||||
|
2021-11-09 09:33:25 |
SUCCESS
|
ExtractRefreshTokenFromTokenResponse
Extracted refresh token from response
|
||
|
2021-11-09 09:33:25 | SUCCESS |
EnsureMinimumRefreshTokenLength
Refresh token is of sufficient length
|
||||
|
2021-11-09 09:33:25 | SUCCESS |
EnsureMinimumRefreshTokenEntropy
Calculated shannon entropy seems sufficient
|
||||||
|
2021-11-09 09:33:25 | SUCCESS |
CompareIdTokenClaims
Validated id token claims successfully
|
||||||||||||
|
Resource server endpoint tests |
2021-11-09 09:33:25 |
|
CreateEmptyResourceEndpointRequestHeaders
Created empty headers
|
||
|
2021-11-09 09:33:25 |
SUCCESS
|
AddFAPIAuthDateToResourceEndpointRequest
Added x-fapi-auth-date to resource endpoint request headers
|
||
|
2021-11-09 09:33:25 |
|
CreateRandomFAPIInteractionId
Created interaction ID
|
||
|
2021-11-09 09:33:25 |
SUCCESS
|
AddFAPIInteractionIdToResourceEndpointRequest
Added x-fapi-interaction-id to resource endpoint request headers
|
||
|
2021-11-09 09:33:25 |
|
CallProtectedResourceWithBearerTokenAndCustomHeaders
HTTP request
|
||||||||||
|
2021-11-09 09:33:26 |
RESPONSE
|
CallProtectedResourceWithBearerTokenAndCustomHeaders
HTTP response
|
||||||||
|
2021-11-09 09:33:26 | SUCCESS |
CallProtectedResourceWithBearerTokenAndCustomHeaders
Got a response from the resource endpoint
|
||||||||
|
2021-11-09 09:33:26 | SUCCESS |
CheckForDateHeaderInResourceResponse
Date header present and validated
|
||||
|
2021-11-09 09:33:26 | SUCCESS |
CheckForFAPIInteractionIdInResourceResponse
Found x-fapi-interaction-id
|
||
|
2021-11-09 09:33:26 | SUCCESS |
EnsureMatchingFAPIInteractionId
Interaction ID matched
|
||
|
2021-11-09 09:33:26 | SUCCESS |
EnsureResourceResponseReturnedJsonContentType
Response content type is json
|
||
|
Second client: Call backchannel authentication endpoint |
2021-11-09 09:33:26 |
SUCCESS
|
CreateEmptyAuthorizationEndpointRequest
Created empty authorization endpoint request
|
|
2021-11-09 09:33:26 | SUCCESS |
AddScopeToAuthorizationEndpointRequest
Added scope of 'openid offline accounts consents' to authorization endpoint request
|
||
|
2021-11-09 09:33:26 | SUCCESS |
AddHintToAuthorizationEndpointRequest
Added hint to authorization endpoint request
|
||
|
2021-11-09 09:33:26 | SUCCESS |
AddBindingMessageToAuthorizationEndpointRequest
Added binding message to authorization endpoint request
|
||
|
2021-11-09 09:33:26 |
|
CreateRandomClientNotificationToken
Created token value
|
||||
|
2021-11-09 09:33:26 | SUCCESS |
AddClientNotificationTokenToAuthorizationEndpointRequest
Added client_notification_token '-I44OaL7t6WO4MGZSIiq=' to authorization endpoint request
|
||||||||
|
2021-11-09 09:33:26 |
SUCCESS
|
ConvertAuthorizationEndpointRequestToRequestObject
Created request object claims
|
||
|
2021-11-09 09:33:26 | SUCCESS |
AddIatToRequestObject
Added iat to request object claims
|
||
|
2021-11-09 09:33:26 | SUCCESS |
AddExpToRequestObject
Added exp to request object claims
|
||
|
2021-11-09 09:33:26 | SUCCESS |
AddNbfToRequestObject
Added nbf to request object claims
|
||
|
2021-11-09 09:33:26 | SUCCESS |
AddJtiToRequestObject
Added jti to request object claims
|
||
|
2021-11-09 09:33:26 | SUCCESS |
AddAudToRequestObject
Added aud to request object claims
|
||
|
2021-11-09 09:33:26 | SUCCESS |
AddIssToRequestObject
Added iss to request object claims
|
||
|
2021-11-09 09:33:26 | SUCCESS |
SignRequestObject
Signed the request object
|
||||||||
|
2021-11-09 09:33:26 | SUCCESS |
CreateBackchannelAuthenticationEndpointRequest
Created backchannel authentication endpoint request
|
|
2021-11-09 09:33:26 |
|
AddRequestToBackchannelAuthenticationEndpointRequest
|
||
|
2021-11-09 09:33:26 | SUCCESS |
EnsureServerConfigurationSupportsMTLS
Found supported MTLS method
|
||
|
2021-11-09 09:33:26 |
|
AddClientIdToBackchannelAuthenticationEndpointRequest
|
||||
|
2021-11-09 09:33:26 |
|
CallBackchannelAuthenticationEndpoint
HTTP request
|
||||||||||
|
2021-11-09 09:33:27 |
RESPONSE
|
CallBackchannelAuthenticationEndpoint
HTTP response
|
||||||||
|
2021-11-09 09:33:27 |
|
CallBackchannelAuthenticationEndpoint
Backchannel Authentication endpoint response
|
||
|
2021-11-09 09:33:27 |
SUCCESS
|
CallBackchannelAuthenticationEndpoint
Parsed backchannel authentication endpoint response
|
||||||
|
2021-11-09 09:33:27 | SUCCESS |
CheckBackchannelAuthenticationEndpointHttpStatus200
Backchannel authentication endpoint http status code was 200
|
|
2021-11-09 09:33:27 | SUCCESS |
CheckBackchannelAuthenticationEndpointContentType
Backchannel authentication endpoint Content-Type: header is application/json
|
|
2021-11-09 09:33:27 |
SUCCESS
|
CheckIfBackchannelAuthenticationEndpointResponseError
No error from Backchannel authentication endpoint
|
|
2021-11-09 09:33:27 | SUCCESS |
ValidateAuthenticationRequestId
auth_req_id passed all validation checks
|
|
2021-11-09 09:33:27 | SUCCESS |
EnsureMinimumAuthenticationRequestIdLength
auth_req_id is of sufficient length
|
||||
|
2021-11-09 09:33:27 | SUCCESS |
EnsureMinimumAuthenticationRequestIdEntropy
Calculated shannon entropy seems sufficient
|
||||||
|
2021-11-09 09:33:27 | SUCCESS |
EnsureRecommendedAuthenticationRequestIdEntropy
Calculated entropy
|
||||||
|
2021-11-09 09:33:27 | SUCCESS |
ValidateAuthenticationRequestIdExpiresIn
expires_in passed all validation checks
|
||
|
2021-11-09 09:33:27 | SUCCESS |
ValidateAuthenticationRequestIdInterval
interval passed all validation checks
|
||
|
Second client: Call token endpoint expecting pending |
2021-11-09 09:33:27 |
SUCCESS
|
CreateTokenEndpointRequestForCIBAGrant
|
||
|
2021-11-09 09:33:27 |
|
AddAuthReqIdToTokenEndpointRequest
|
||||
|
2021-11-09 09:33:27 |
|
AddClientIdToTokenEndpointRequest
|
||||||
|
2021-11-09 09:33:27 |
|
CallTokenEndpointAndReturnFullResponse
HTTP request
|
||||||||||
|
2021-11-09 09:33:29 |
RESPONSE
|
CallTokenEndpointAndReturnFullResponse
HTTP response
|
||||||||
|
2021-11-09 09:33:29 |
SUCCESS
|
CallTokenEndpointAndReturnFullResponse
Parsed token endpoint response
|
||||||
|
2021-11-09 09:33:29 | SUCCESS |
CheckTokenEndpointReturnedJsonContentType
token_endpoint_response_headers Content-Type: header is application/json
|
|
Second client: Verify token endpoint response is pending or slow_down |
2021-11-09 09:33:29 | SUCCESS |
CheckTokenEndpointHttpStatus400
Token endpoint http status code was 400
|
|
2021-11-09 09:33:29 | SUCCESS |
ValidateErrorFromTokenEndpointResponseError
Token endpoint response error returned valid 'error' field
|
||
|
2021-11-09 09:33:29 | SUCCESS |
CheckErrorDescriptionFromTokenEndpointResponseErrorContainsCRLFTAB
token_endpoint_response 'error_description' field does not include CR/LF/TAB
|
||
|
2021-11-09 09:33:29 | SUCCESS |
ValidateErrorDescriptionFromTokenEndpointResponseError
token_endpoint_response error returned valid 'error_description' field
|
||
|
2021-11-09 09:33:29 | SUCCESS |
ValidateErrorUriFromTokenEndpointResponseError
token_endpoint_response did not include optional 'error_uri' field
|
|
2021-11-09 09:33:29 |
SUCCESS
|
EnsureErrorTokenEndpointSlowdownOrAuthorizationPending
error met 'slow_down' or 'authorization_pending'
|
||
|
Second client: Call token endpoint expecting pending (second time) |
2021-11-09 09:33:34 |
SUCCESS
|
CreateTokenEndpointRequestForCIBAGrant
|
||
|
2021-11-09 09:33:34 |
|
AddAuthReqIdToTokenEndpointRequest
|
||||
|
2021-11-09 09:33:34 |
|
AddClientIdToTokenEndpointRequest
|
||||||
|
2021-11-09 09:33:34 |
|
CallTokenEndpointAndReturnFullResponse
HTTP request
|
||||||||||
|
2021-11-09 09:33:35 |
RESPONSE
|
CallTokenEndpointAndReturnFullResponse
HTTP response
|
||||||||
|
2021-11-09 09:33:35 |
SUCCESS
|
CallTokenEndpointAndReturnFullResponse
Parsed token endpoint response
|
||||||
|
2021-11-09 09:33:35 | SUCCESS |
CheckTokenEndpointReturnedJsonContentType
token_endpoint_response_headers Content-Type: header is application/json
|
|
Second client: Verify token endpoint response is pending or slow_down |
2021-11-09 09:33:35 | SUCCESS |
CheckTokenEndpointHttpStatus400
Token endpoint http status code was 400
|
|
2021-11-09 09:33:35 | SUCCESS |
ValidateErrorFromTokenEndpointResponseError
Token endpoint response error returned valid 'error' field
|
||
|
2021-11-09 09:33:35 | SUCCESS |
CheckErrorDescriptionFromTokenEndpointResponseErrorContainsCRLFTAB
token_endpoint_response 'error_description' field does not include CR/LF/TAB
|
||
|
2021-11-09 09:33:35 | SUCCESS |
ValidateErrorDescriptionFromTokenEndpointResponseError
token_endpoint_response error returned valid 'error_description' field
|
||
|
2021-11-09 09:33:35 | SUCCESS |
ValidateErrorUriFromTokenEndpointResponseError
token_endpoint_response did not include optional 'error_uri' field
|
|
2021-11-09 09:33:35 |
SUCCESS
|
EnsureErrorTokenEndpointSlowdownOrAuthorizationPending
error met 'slow_down' or 'authorization_pending'
|
||
|
2021-11-09 09:33:35 |
|
CallAutomatedCibaApprovalEndpoint
If your server supports automated testing, you can set 'automated_ciba_approval_url' in your configuration to a url like https://cibasim.example.com/action?token={auth_req_id}&type={action} (auth_req_id will be automatically substituted for the current auth_req_id by the conformance suite, action will be allow or deny depending on the test)
|
|
2021-11-09 09:33:35 |
|
TellUserToDoCIBAAuthentication
Please authenticate and authorize the request
|
|
2021-11-09 09:33:58 |
INCOMING
|
fapi-ciba-id1-refresh-token
Incoming HTTP request to test instance UGreex5P7STcmrB
|
||||||||||||||
|
2021-11-09 09:33:58 |
OUTGOING
|
fapi-ciba-id1-refresh-token
Response to HTTP request to test instance UGreex5P7STcmrB
|
||||||||
|
Second client: Verify notification callback |
2021-11-09 09:33:58 | SUCCESS |
EnsureIncomingTls12
Found TLS 1.2 connection
|
|
2021-11-09 09:33:58 | SUCCESS |
EnsureIncomingTlsSecureCipher
TLS cipher is allowed
|
||||
|
2021-11-09 09:33:58 | SUCCESS |
CheckIncomingContentTypeIsApplicationJson
Incoming request Content-Type: header has the expected value
|
||||
|
2021-11-09 09:33:58 | SUCCESS |
VerifyBearerTokenHeaderCallback
'Authorization' header in notification callback contained client_notification_token.
|
|
2021-11-09 09:33:58 |
|
CheckAuthReqIdInCallback
notification_callback contents
|
||||||||||
|
2021-11-09 09:33:58 | SUCCESS |
CheckAuthReqIdInCallback
auth_req_id valued received in callback is correct
|
|
2021-11-09 09:33:58 | SUCCESS |
CheckNotificationCallbackOnlyAuthReqId
body received in notification callback contained only auth_req_id
|
||
|
Second client: Calling token endpoint after ping notification |
2021-11-09 09:33:58 |
SUCCESS
|
CreateTokenEndpointRequestForCIBAGrant
|
||
|
2021-11-09 09:33:58 |
|
AddAuthReqIdToTokenEndpointRequest
|
||||
|
2021-11-09 09:33:58 |
|
AddClientIdToTokenEndpointRequest
|
||||||
|
2021-11-09 09:33:58 |
|
CallTokenEndpointAndReturnFullResponse
HTTP request
|
||||||||||
|
2021-11-09 09:33:59 |
RESPONSE
|
CallTokenEndpointAndReturnFullResponse
HTTP response
|
||||||||
|
2021-11-09 09:33:59 |
SUCCESS
|
CallTokenEndpointAndReturnFullResponse
Parsed token endpoint response
|
||||||||||
|
2021-11-09 09:33:59 | SUCCESS |
CheckTokenEndpointReturnedJsonContentType
token_endpoint_response_headers Content-Type: header is application/json
|
|
Second client: Verify token endpoint response |
2021-11-09 09:33:59 | SUCCESS |
CheckTokenEndpointHttpStatus200
Token endpoint http status code was 200
|
|
2021-11-09 09:33:59 | SUCCESS |
CheckTokenEndpointCacheHeaders
'pragma' and 'cache-control' headers in token endpoint response contain expected values.
|
||||
|
2021-11-09 09:33:59 |
SUCCESS
|
CheckIfTokenEndpointResponseError
No error from token endpoint
|
|
2021-11-09 09:33:59 | SUCCESS |
CheckForAccessTokenValue
Found an access token
|
||
|
2021-11-09 09:33:59 |
SUCCESS
|
ExtractAccessTokenFromTokenResponse
Extracted the access token
|
||||
|
2021-11-09 09:33:59 | SUCCESS |
ExtractExpiresInFromTokenEndpointResponse
Extracted 'expires_in'
|
||
|
2021-11-09 09:33:59 | SUCCESS |
ValidateExpiresIn
expires_in passed all validation checks
|
||
|
2021-11-09 09:33:59 |
SUCCESS
|
CheckForRefreshTokenValue
Found a refresh token
|
||
|
2021-11-09 09:33:59 | SUCCESS |
EnsureMinimumRefreshTokenLength
Refresh token is of sufficient length
|
||||
|
2021-11-09 09:33:59 | SUCCESS |
EnsureMinimumRefreshTokenEntropy
Calculated shannon entropy seems sufficient
|
||||||
|
2021-11-09 09:33:59 | SUCCESS |
EnsureMinimumAccessTokenLength
Access token is of sufficient length
|
||||
|
2021-11-09 09:33:59 | SUCCESS |
EnsureMinimumAccessTokenEntropy
Calculated shannon entropy seems sufficient
|
||||||
|
2021-11-09 09:33:59 | SUCCESS |
ExtractIdTokenFromTokenResponse
Found and parsed the id_token from token_endpoint_response
|
||||||
|
2021-11-09 09:33:59 | SUCCESS |
ValidateIdToken
ID token iss, aud, exp, iat, auth_time, acr & nbf claims passed validation checks
|
|
2021-11-09 09:33:59 | SUCCESS |
EnsureIdTokenContainsKid
kid was found in the ID token header
|
||
|
2021-11-09 09:33:59 | SUCCESS |
ValidateIdTokenSignature
id_token signature validated
|
||
|
2021-11-09 09:33:59 | SUCCESS |
ValidateIdTokenSignatureUsingKid
id_token signature validated
|
||
|
2021-11-09 09:33:59 | SUCCESS |
CheckForSubjectInIdToken
Found 'sub' in id_token
|
||
|
2021-11-09 09:33:59 | SUCCESS |
FAPIValidateIdTokenSigningAlg
id_token was signed with a permitted algorithm
|
||||
|
2021-11-09 09:33:59 | INFO |
FAPIValidateIdTokenEncryptionAlg
Skipped evaluation due to missing required element: id_token jwe_header
|
||||||
|
2021-11-09 09:33:59 | INFO |
FAPIValidateEncryptedIdTokenHasKid
Skipped evaluation due to missing required element: id_token jwe_header
|
||||||
|
2021-11-09 09:33:59 | SUCCESS |
FAPICIBAValidateIdTokenAuthRequestIdClaims
urn:openid:params:jwt:claim:auth_req_id claim in the ID Token matched the auth_req_id in the request.
|
|
2021-11-09 09:33:59 |
SUCCESS
|
ValidateIdTokenNotIncludeCHashAndSHash
id_token claims correctly does not contain 'c_hash' and 's_hash'
|
||
|
2021-11-09 09:33:59 | SUCCESS |
ExtractAtHash
Extracted at_hash from ID Token
|
||||
|
2021-11-09 09:33:59 |
SUCCESS
|
ExtractRtHash
Extracted rt_hash from ID Token
|
||||
|
2021-11-09 09:33:59 | SUCCESS |
FAPICIBAValidateRtHash
rt_hash validated successfully
|
||||||
|
2021-11-09 09:33:59 | SUCCESS |
ValidateAtHash
at_hash validated successfully
|
||||||
|
Second client: Check for refresh token |
2021-11-09 09:33:59 |
SUCCESS
|
ExtractRefreshTokenFromTokenResponse
Extracted refresh token from response
|
||
|
2021-11-09 09:33:59 | SUCCESS |
EnsureServerConfigurationSupportsRefreshToken
The server configuration indicates support for refresh tokens
|
||
|
2021-11-09 09:33:59 | SUCCESS |
EnsureRefreshTokenContainsAllowedCharactersOnly
Refresh token does not contain any illegal characters
|
|
Second client: Refresh Token Request |
2021-11-09 09:33:59 |
SUCCESS
|
CreateRefreshTokenRequest
Created token endpoint request parameters
|
||||
|
2021-11-09 09:33:59 |
|
AddClientIdToTokenEndpointRequest
|
||||||
|
2021-11-09 09:33:59 |
SUCCESS
|
WaitForOneSecond
Pausing for 1 seconds
|
|
2021-11-09 09:34:00 |
SUCCESS
|
WaitForOneSecond
Woke up after 1 seconds sleep
|
|
2021-11-09 09:34:00 |
|
CallTokenEndpointAndReturnFullResponse
HTTP request
|
||||||||||
|
2021-11-09 09:34:02 |
RESPONSE
|
CallTokenEndpointAndReturnFullResponse
HTTP response
|
||||||||
|
2021-11-09 09:34:02 |
SUCCESS
|
CallTokenEndpointAndReturnFullResponse
Parsed token endpoint response
|
||||||||||
|
2021-11-09 09:34:02 | SUCCESS |
CheckTokenEndpointHttpStatus200
Token endpoint http status code was 200
|
|
2021-11-09 09:34:02 | SUCCESS |
CheckTokenEndpointReturnedJsonContentType
token_endpoint_response_headers Content-Type: header is application/json
|
|
2021-11-09 09:34:02 | SUCCESS |
CheckTokenEndpointCacheHeaders
'pragma' and 'cache-control' headers in token endpoint response contain expected values.
|
||||
|
2021-11-09 09:34:02 |
SUCCESS
|
CheckIfTokenEndpointResponseError
No error from token endpoint
|
|
2021-11-09 09:34:02 |
SUCCESS
|
ExtractAccessTokenFromTokenResponse
Extracted the access token
|
||||
|
2021-11-09 09:34:02 | SUCCESS |
CheckTokenTypeIsBearer
Token type is bearer
|
|
2021-11-09 09:34:02 | SUCCESS |
EnsureMinimumAccessTokenEntropy
Calculated shannon entropy seems sufficient
|
||||||
|
2021-11-09 09:34:02 | SUCCESS |
EnsureAccessTokenContainsAllowedCharactersOnly
Access token does not contain any illegal characters
|
|
2021-11-09 09:34:02 | SUCCESS |
ExtractExpiresInFromTokenEndpointResponse
Extracted 'expires_in'
|
||
|
2021-11-09 09:34:02 | SUCCESS |
ValidateExpiresIn
expires_in passed all validation checks
|
||
|
2021-11-09 09:34:02 |
SUCCESS
|
EnsureAccessTokenValuesAreDifferent
Access token values are not the same
|
||||
|
2021-11-09 09:34:02 |
SUCCESS
|
ExtractIdTokenFromTokenResponse
Found and parsed the id_token from token_endpoint_response
|
||||||
|
2021-11-09 09:34:02 |
SUCCESS
|
ExtractRefreshTokenFromTokenResponse
Extracted refresh token from response
|
||
|
2021-11-09 09:34:02 | SUCCESS |
EnsureMinimumRefreshTokenLength
Refresh token is of sufficient length
|
||||
|
2021-11-09 09:34:02 | SUCCESS |
EnsureMinimumRefreshTokenEntropy
Calculated shannon entropy seems sufficient
|
||||||
|
2021-11-09 09:34:02 | SUCCESS |
CompareIdTokenClaims
Validated id token claims successfully
|
||||||||||||
|
Second client: Resource server endpoint tests |
2021-11-09 09:34:02 |
|
CreateEmptyResourceEndpointRequestHeaders
Created empty headers
|
||
|
2021-11-09 09:34:02 |
|
CallProtectedResourceWithBearerTokenAndCustomHeaders
HTTP request
|
||||||||||
|
2021-11-09 09:34:03 |
RESPONSE
|
CallProtectedResourceWithBearerTokenAndCustomHeaders
HTTP response
|
||||||||
|
2021-11-09 09:34:03 | SUCCESS |
CallProtectedResourceWithBearerTokenAndCustomHeaders
Got a response from the resource endpoint
|
||||||||
|
2021-11-09 09:34:03 | SUCCESS |
CheckForDateHeaderInResourceResponse
Date header present and validated
|
||||
|
2021-11-09 09:34:03 | SUCCESS |
CheckForFAPIInteractionIdInResourceResponse
Found x-fapi-interaction-id
|
||
|
2021-11-09 09:34:03 | SUCCESS |
EnsureResourceResponseReturnedJsonContentType
Response content type is json
|
||
|
Attempting to use refresh_token issued to client 2 with client 1 |
2021-11-09 09:34:03 |
SUCCESS
|
CreateRefreshTokenRequest
Created token endpoint request parameters
|
||||
|
2021-11-09 09:34:03 | SUCCESS |
AddScopeToTokenEndpointRequest
Added scope of 'openid offline accounts consents' to token endpoint request
|
||||||
|
2021-11-09 09:34:03 |
|
AddClientIdToTokenEndpointRequest
|
||||||||
|
2021-11-09 09:34:03 |
|
CallTokenEndpointAndReturnFullResponse
HTTP request
|
||||||||||
|
2021-11-09 09:34:04 |
RESPONSE
|
CallTokenEndpointAndReturnFullResponse
HTTP response
|
||||||||
|
2021-11-09 09:34:04 |
SUCCESS
|
CallTokenEndpointAndReturnFullResponse
Parsed token endpoint response
|
||||||
|
2021-11-09 09:34:04 |
SUCCESS
|
ValidateErrorFromTokenEndpointResponseError
Token endpoint response error returned valid 'error' field
|
||
|
2021-11-09 09:34:04 | SUCCESS |
CheckTokenEndpointHttpStatus400
Token endpoint http status code was 400
|
|
2021-11-09 09:34:04 | SUCCESS |
CheckTokenEndpointReturnedJsonContentType
token_endpoint_response_headers Content-Type: header is application/json
|
|
2021-11-09 09:34:04 | SUCCESS |
CheckErrorFromTokenEndpointResponseErrorInvalidGrant
Token Endpoint response error returned expected 'error' of 'invalid_grant'
|
||
|
2021-11-09 09:34:04 |
FINISHED
|
fapi-ciba-id1-refresh-token
Test has run to completion
|
||
|
Unregister dynamically registered client |
2021-11-09 09:34:04 |
INFO
|
UnregisterDynamicallyRegisteredClient
Skipped evaluation due to missing required string: registration_client_uri
|
||
|
Unregister dynamically registered client2 |
2021-11-09 09:34:04 |
INFO
|
UnregisterDynamicallyRegisteredClient
Skipped evaluation due to missing required string: registration_client_uri
|
||
|
2021-11-09 09:34:43 |
|
TEST-RUNNER
Alias has now been claimed by another test
|
||||
|