Test Name | fapi1-advanced-final-ensure-request-object-with-invalid-signature-fails |
---|---|
Variant | client_auth_type=mtls, fapi_auth_request_method=pushed, fapi_profile=openbanking_brazil, fapi_response_mode=jarm |
Test ID | Ho2gNbnvkb8Ehot https://www.certification.openid.net/log-detail.html?public=true&log=Ho2gNbnvkb8Ehot |
Created | 2022-01-04T19:09:14.653309Z |
Description | FAPI1-Advanced-Final, OB-BR, PAR, JARM: Keycloak test with mtls client authentication (RequestObject:PS256/IDToken:PS256) |
Test Version | 4.1.38 |
Test Owner | 115310558227229560855 https://accounts.google.com |
Plan ID | St980IgQsdWLE https://www.certification.openid.net/plan-detail.html?public=true&plan=St980IgQsdWLE |
Exported From | https://www.certification.openid.net |
Exported By | 115310558227229560855 https://accounts.google.com |
Suite Version | 4.1.38 |
Exported | 2022-01-04 19:21:19 (UTC) |
Status: FINISHED Result: PASSED |
SUCCESS 69 FAILURE 0 WARNING 0 REVIEW 0 INFO 1 |
2022-01-04 19:09:14 |
INFO
|
TEST-RUNNER
Test instance Ho2gNbnvkb8Ehot created
|
||||||||||||||
|
2022-01-04 19:09:14 |
SUCCESS
|
CreateRedirectUri
Created redirect URI
|
||
|
2022-01-04 19:09:14 |
|
GetDynamicServerConfiguration
HTTP request
|
||||||||
|
2022-01-04 19:09:15 |
RESPONSE
|
GetDynamicServerConfiguration
HTTP response
|
||||||||
|
2022-01-04 19:09:15 |
|
GetDynamicServerConfiguration
Downloaded server configuration
|
||
|
2022-01-04 19:09:15 |
SUCCESS
|
GetDynamicServerConfiguration
Successfully parsed server configuration
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
2022-01-04 19:09:15 | SUCCESS |
AddMTLSEndpointAliasesToEnvironment
Added mtls_endpoint_aliases to environment
|
|
2022-01-04 19:09:15 |
SUCCESS
|
CheckServerConfiguration
Found required server configuration keys
|
||
|
2022-01-04 19:09:15 |
|
FetchServerKeys
Fetching server key
|
||
|
2022-01-04 19:09:15 |
|
FetchServerKeys
HTTP request
|
||||||||
|
2022-01-04 19:09:16 |
RESPONSE
|
FetchServerKeys
HTTP response
|
||||||||
|
2022-01-04 19:09:16 |
|
FetchServerKeys
Found JWK set string
|
||
|
2022-01-04 19:09:16 |
SUCCESS
|
FetchServerKeys
Found server JWK set
|
||
|
2022-01-04 19:09:16 |
SUCCESS
|
CheckServerKeysIsValid
Server JWKs is valid
|
||
|
2022-01-04 19:09:16 | SUCCESS |
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
|
|
2022-01-04 19:09:16 | SUCCESS |
CheckForKeyIdInServerJWKs
All keys contain kids
|
|
2022-01-04 19:09:16 | SUCCESS |
EnsureServerJwksDoesNotContainPrivateOrSymmetricKeys
Jwks does not contain any private or symmetric keys
|
|
2022-01-04 19:09:16 | SUCCESS |
FAPIEnsureMinimumServerKeyLength
Validated minimum key lengths for server_jwks
|
||
|
2022-01-04 19:09:16 |
SUCCESS
|
GetStaticClientConfiguration
Found a static client object
|
||||||
|
2022-01-04 19:09:16 |
|
ValidateMTLSCertificatesHeader
No certificate authority found for MTLS
|
|
2022-01-04 19:09:16 |
SUCCESS
|
ValidateMTLSCertificatesHeader
MTLS certificates header is valid
|
|
2022-01-04 19:09:16 |
|
ExtractMTLSCertificatesFromConfiguration
No certificate authority found for MTLS
|
|
2022-01-04 19:09:16 |
SUCCESS
|
ExtractMTLSCertificatesFromConfiguration
Mutual TLS authentication credentials loaded
|
||||
|
2022-01-04 19:09:16 | SUCCESS |
ValidateClientJWKsPrivatePart
Valid client JWKs: keys are valid JSON, contain the required fields, the private/public exponents match and are correctly encoded using unpadded base64url
|
|
2022-01-04 19:09:16 |
SUCCESS
|
ExtractJWKsFromStaticClientConfiguration
Extracted client JWK
|
||||
|
2022-01-04 19:09:16 | SUCCESS |
CheckForKeyIdInClientJWKs
All keys contain kids
|
|
2022-01-04 19:09:16 | SUCCESS |
CheckDistinctKeyIdValueInClientJWKs
Distinct 'kid' value in all keys of client_jwks
|
||
|
2022-01-04 19:09:16 | SUCCESS |
FAPIBrazilCheckKeyAlgInClientJWKs
Keys in client JWKS all have permitted 'alg'
|
||
|
2022-01-04 19:09:16 | SUCCESS |
FAPIEnsureMinimumClientKeyLength
Validated minimum key lengths for client_jwks
|
||
|
2022-01-04 19:09:16 |
SUCCESS
|
ValidateMTLSCertificatesAsX509
Mutual TLS authentication cert validated as X.509
|
|
Verify configuration of second client |
2022-01-04 19:09:16 |
SUCCESS
|
GetStaticClient2Configuration
Found a static second client object
|
||||||
|
2022-01-04 19:09:16 |
|
ValidateMTLSCertificates2Header
No certificate authority found for MTLS
|
|
2022-01-04 19:09:16 |
SUCCESS
|
ValidateMTLSCertificates2Header
MTLS certificates header is valid
|
|
2022-01-04 19:09:16 |
|
ExtractMTLSCertificates2FromConfiguration
No certificate authority found for MTLS
|
|
2022-01-04 19:09:16 |
SUCCESS
|
ExtractMTLSCertificates2FromConfiguration
Mutual TLS authentication credentials loaded
|
||||
|
2022-01-04 19:09:16 | SUCCESS |
ValidateClientJWKsPrivatePart
Valid client JWKs: keys are valid JSON, contain the required fields, the private/public exponents match and are correctly encoded using unpadded base64url
|
|
2022-01-04 19:09:16 |
SUCCESS
|
ExtractJWKsFromStaticClientConfiguration
Extracted client JWK
|
||||
|
2022-01-04 19:09:16 | SUCCESS |
CheckForKeyIdInClientJWKs
All keys contain kids
|
|
2022-01-04 19:09:16 | SUCCESS |
CheckDistinctKeyIdValueInClientJWKs
Distinct 'kid' value in all keys of client_jwks
|
||
|
2022-01-04 19:09:16 | SUCCESS |
FAPIBrazilCheckKeyAlgInClientJWKs
Keys in client JWKS all have permitted 'alg'
|
||
|
2022-01-04 19:09:16 | SUCCESS |
FAPIEnsureMinimumClientKeyLength
Validated minimum key lengths for client_jwks
|
||
|
2022-01-04 19:09:16 |
SUCCESS
|
ValidateMTLSCertificatesAsX509
Mutual TLS authentication cert validated as X.509
|
|
2022-01-04 19:09:16 |
SUCCESS
|
ValidateClientPrivateKeysAreDifferent
Client signing JWKs have different thumbprints
|
||||
|
2022-01-04 19:09:16 |
SUCCESS
|
GetResourceEndpointConfiguration
Found a resource endpoint object
|
||||||||
|
2022-01-04 19:09:16 |
SUCCESS
|
SetProtectedResourceUrlToSingleResourceEndpoint
Set protected resource URL
|
||
|
2022-01-04 19:09:16 |
SUCCESS
|
ExtractTLSTestValuesFromResourceConfiguration
Extracted TLS information from resource endpoint
|
||
|
2022-01-04 19:09:16 |
SUCCESS
|
ExtractTLSTestValuesFromOBResourceConfiguration
Extracted TLS information from resource endpoint
|
||||
|
2022-01-04 19:09:16 |
|
fapi1-advanced-final-ensure-request-object-with-invalid-signature-fails
Setup Done
|
|
Use client_credentials grant to obtain Brazil consent |
2022-01-04 19:09:16 |
SUCCESS
|
CreateTokenEndpointRequestForClientCredentialsGrant
|
||||
|
2022-01-04 19:09:16 |
SUCCESS
|
SetConsentsScopeOnTokenEndpointRequest
Set scope parameter to 'consents'
|
||||
|
2022-01-04 19:09:16 |
|
AddClientIdToTokenEndpointRequest
|
||||||
|
2022-01-04 19:09:16 |
|
CallTokenEndpoint
HTTP request
|
||||||||||
|
2022-01-04 19:09:16 |
RESPONSE
|
CallTokenEndpoint
HTTP response
|
||||||||
|
2022-01-04 19:09:16 |
|
CallTokenEndpoint
Token endpoint response
|
||
|
2022-01-04 19:09:16 |
SUCCESS
|
CallTokenEndpoint
Parsed token endpoint response
|
||||||||||||
|
2022-01-04 19:09:16 |
SUCCESS
|
CheckIfTokenEndpointResponseError
No error from token endpoint
|
|
2022-01-04 19:09:16 |
SUCCESS
|
CheckForAccessTokenValue
Found an access token
|
||
|
2022-01-04 19:09:16 |
SUCCESS
|
ExtractAccessTokenFromTokenResponse
Extracted the access token
|
||||
|
2022-01-04 19:09:16 | SUCCESS |
ExtractExpiresInFromTokenEndpointResponse
Extracted 'expires_in'
|
||
|
2022-01-04 19:09:16 | SUCCESS |
ValidateExpiresIn
expires_in passed all validation checks
|
||
|
2022-01-04 19:09:16 |
|
CreateEmptyResourceEndpointRequestHeaders
Created empty headers
|
||
|
2022-01-04 19:09:16 |
SUCCESS
|
AddFAPIAuthDateToResourceEndpointRequest
Added x-fapi-auth-date to resource endpoint request headers
|
||
|
2022-01-04 19:09:16 |
SUCCESS
|
FAPIBrazilCreateConsentRequest
|
||
|
2022-01-04 19:09:16 |
SUCCESS
|
FAPIBrazilAddExpirationToConsentRequest
Added expiration time to consent request
|
||
|
2022-01-04 19:09:16 |
|
CallConsentEndpointWithBearerToken
HTTP request
|
||||||||||
|
2022-01-04 19:09:17 |
RESPONSE
|
CallConsentEndpointWithBearerToken
HTTP response
|
||||||||
|
2022-01-04 19:09:17 |
|
CallConsentEndpointWithBearerToken
Consent endpoint response
|
||
|
2022-01-04 19:09:17 |
SUCCESS
|
CallConsentEndpointWithBearerToken
Parsed consent endpoint response
|
||||
|
2022-01-04 19:09:17 |
SUCCESS
|
FAPIBrazilConsentEndpointResponseValidatePermissions
Consent endpoint response contains expected permissions
|
||||
|
2022-01-04 19:09:17 |
SUCCESS
|
ExtractConsentIdFromConsentEndpointResponse
Extracted the consent id
|
||
|
2022-01-04 19:09:17 | SUCCESS |
CheckForFAPIInteractionIdInResourceResponse
Found x-fapi-interaction-id
|
||
|
2022-01-04 19:09:17 |
SUCCESS
|
FAPIBrazilAddConsentIdToClientScope
Added scope of 'openid email consent:1' to client's scope
|
||||||
|
Make request to authorization endpoint |
2022-01-04 19:09:17 |
SUCCESS
|
CreateAuthorizationEndpointRequestFromClientInformation
Created authorization endpoint request
|
||||||
|
2022-01-04 19:09:17 |
|
CreateRandomStateValue
Created state value
|
||||
|
2022-01-04 19:09:17 |
SUCCESS
|
AddStateToAuthorizationEndpointRequest
Added state parameter to request
|
||||||||
|
2022-01-04 19:09:17 |
|
CreateRandomNonceValue
Created nonce value
|
||||
|
2022-01-04 19:09:17 |
SUCCESS
|
AddNonceToAuthorizationEndpointRequest
Added nonce parameter to request
|
||||||||||
|
2022-01-04 19:09:17 |
SUCCESS
|
SetAuthorizationEndpointRequestResponseTypeToCode
Added response_type parameter to request
|
||||||||||||
|
2022-01-04 19:09:17 |
SUCCESS
|
SetAuthorizationEndpointRequestResponseModeToJWT
Added response_mode parameter to request
|
||||||||||||||
|
2022-01-04 19:09:17 |
|
CreateRandomCodeVerifier
Created code_verifier value
|
||
|
2022-01-04 19:09:17 |
|
CreateS256CodeChallenge
Created code_challenge value
|
||
|
2022-01-04 19:09:17 | SUCCESS |
AddCodeChallengeToAuthorizationEndpointRequest
Added code_challenge and code_challenge_method parameters to request
|
||||||||||||||||||
|
2022-01-04 19:09:17 |
SUCCESS
|
ConvertAuthorizationEndpointRequestToRequestObject
Created request object claims
|
||
|
2022-01-04 19:09:17 | SUCCESS |
AddNbfToRequestObject
Added nbf to request object claims
|
||
|
2022-01-04 19:09:17 | SUCCESS |
AddExpToRequestObject
Added exp to request object claims
|
||
|
2022-01-04 19:09:17 | SUCCESS |
AddAudToRequestObject
Added aud to request object claims
|
||
|
2022-01-04 19:09:17 | SUCCESS |
AddIssToRequestObject
Added iss to request object claims
|
||
|
2022-01-04 19:09:17 | SUCCESS |
AddClientIdToRequestObject
Added client_id to request object claims
|
||
|
2022-01-04 19:09:17 |
SUCCESS
|
SignRequestObject
Signed the request object
|
||||||||
|
2022-01-04 19:09:17 |
|
InvalidateRequestObjectSignature
Made the request_object signature invalid
|
||
|
2022-01-04 19:09:17 |
SUCCESS
|
BuildRequestObjectPostToPAREndpoint
|
||
|
2022-01-04 19:09:17 |
SUCCESS
|
AddClientIdToPAREndpointRequest
|
||||
|
2022-01-04 19:09:17 |
|
CallPAREndpoint
HTTP request
|
||||||||||
|
2022-01-04 19:09:18 |
RESPONSE
|
CallPAREndpoint
HTTP response
|
||||||||
|
2022-01-04 19:09:18 | SUCCESS |
CallPAREndpoint
Storing pushed_authorization_endpoint_response_http_status 400
|
|
2022-01-04 19:09:18 | SUCCESS |
CallPAREndpoint
Parsed pushed authorization request endpoint response
|
||||
|
2022-01-04 19:09:18 | SUCCESS |
EnsurePARInvalidRequestObjectError
Pushed Authorization Request Endpoint returned expected 'error' of '[invalid_request_object]'
|
||||
|
2022-01-04 19:09:18 |
FINISHED
|
fapi1-advanced-final-ensure-request-object-with-invalid-signature-fails
Test has run to completion
|
||
|
2022-01-04 19:09:19 |
|
TEST-RUNNER
Alias has now been claimed by another test
|
||||
|