Test Name | fapi1-advanced-final-ensure-different-nonce-inside-and-outside-request-object |
---|---|
Variant | client_auth_type=private_key_jwt, fapi_auth_request_method=pushed, fapi_profile=openbanking_brazil, fapi_response_mode=jarm |
Test ID | YKFolAmueY8KVgf https://www.certification.openid.net/log-detail.html?public=true&log=YKFolAmueY8KVgf |
Created | 2022-01-04T15:52:47.686525Z |
Description | FAPI1-Advanced-Final, OB-BR, PAR, JARM: Keycloak test with private_key_jwt client authentication (RequestObject:PS256/IDToken:PS256) |
Test Version | 4.1.38 |
Test Owner | 115310558227229560855 https://accounts.google.com |
Plan ID | eQLR26yxaDgDU https://www.certification.openid.net/plan-detail.html?public=true&plan=eQLR26yxaDgDU |
Exported From | https://www.certification.openid.net |
Exported By | 115310558227229560855 https://accounts.google.com |
Suite Version | 4.1.38 |
Exported | 2022-01-04 16:06:11 (UTC) |
Status: FINISHED Result: PASSED |
SUCCESS 93 FAILURE 0 WARNING 0 REVIEW 1 INFO 1 |
2022-01-04 15:52:47 |
INFO
|
TEST-RUNNER
Test instance YKFolAmueY8KVgf created
|
||||||||||||||
|
2022-01-04 15:52:47 |
SUCCESS
|
CreateRedirectUri
Created redirect URI
|
||
|
2022-01-04 15:52:47 |
|
GetDynamicServerConfiguration
HTTP request
|
||||||||
|
2022-01-04 15:52:48 |
RESPONSE
|
GetDynamicServerConfiguration
HTTP response
|
||||||||
|
2022-01-04 15:52:48 |
|
GetDynamicServerConfiguration
Downloaded server configuration
|
||
|
2022-01-04 15:52:48 |
SUCCESS
|
GetDynamicServerConfiguration
Successfully parsed server configuration
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
2022-01-04 15:52:48 | SUCCESS |
AddMTLSEndpointAliasesToEnvironment
Added mtls_endpoint_aliases to environment
|
|
2022-01-04 15:52:48 |
SUCCESS
|
CheckServerConfiguration
Found required server configuration keys
|
||
|
2022-01-04 15:52:48 |
|
FetchServerKeys
Fetching server key
|
||
|
2022-01-04 15:52:48 |
|
FetchServerKeys
HTTP request
|
||||||||
|
2022-01-04 15:52:49 |
RESPONSE
|
FetchServerKeys
HTTP response
|
||||||||
|
2022-01-04 15:52:49 |
|
FetchServerKeys
Found JWK set string
|
||
|
2022-01-04 15:52:49 |
SUCCESS
|
FetchServerKeys
Found server JWK set
|
||
|
2022-01-04 15:52:49 |
SUCCESS
|
CheckServerKeysIsValid
Server JWKs is valid
|
||
|
2022-01-04 15:52:49 | SUCCESS |
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
|
|
2022-01-04 15:52:49 | SUCCESS |
CheckForKeyIdInServerJWKs
All keys contain kids
|
|
2022-01-04 15:52:49 | SUCCESS |
EnsureServerJwksDoesNotContainPrivateOrSymmetricKeys
Jwks does not contain any private or symmetric keys
|
|
2022-01-04 15:52:49 | SUCCESS |
FAPIEnsureMinimumServerKeyLength
Validated minimum key lengths for server_jwks
|
||
|
2022-01-04 15:52:49 |
SUCCESS
|
GetStaticClientConfiguration
Found a static client object
|
||||||
|
2022-01-04 15:52:49 |
|
ValidateMTLSCertificatesHeader
No certificate authority found for MTLS
|
|
2022-01-04 15:52:49 |
SUCCESS
|
ValidateMTLSCertificatesHeader
MTLS certificates header is valid
|
|
2022-01-04 15:52:49 |
|
ExtractMTLSCertificatesFromConfiguration
No certificate authority found for MTLS
|
|
2022-01-04 15:52:49 |
SUCCESS
|
ExtractMTLSCertificatesFromConfiguration
Mutual TLS authentication credentials loaded
|
||||
|
2022-01-04 15:52:49 | SUCCESS |
ValidateClientJWKsPrivatePart
Valid client JWKs: keys are valid JSON, contain the required fields, the private/public exponents match and are correctly encoded using unpadded base64url
|
|
2022-01-04 15:52:49 |
SUCCESS
|
ExtractJWKsFromStaticClientConfiguration
Extracted client JWK
|
||||
|
2022-01-04 15:52:49 | SUCCESS |
CheckForKeyIdInClientJWKs
All keys contain kids
|
|
2022-01-04 15:52:49 | SUCCESS |
CheckDistinctKeyIdValueInClientJWKs
Distinct 'kid' value in all keys of client_jwks
|
||
|
2022-01-04 15:52:49 | SUCCESS |
FAPIBrazilCheckKeyAlgInClientJWKs
Keys in client JWKS all have permitted 'alg'
|
||
|
2022-01-04 15:52:49 | SUCCESS |
FAPIEnsureMinimumClientKeyLength
Validated minimum key lengths for client_jwks
|
||
|
2022-01-04 15:52:49 |
SUCCESS
|
ValidateMTLSCertificatesAsX509
Mutual TLS authentication cert validated as X.509
|
|
Verify configuration of second client |
2022-01-04 15:52:49 |
SUCCESS
|
GetStaticClient2Configuration
Found a static second client object
|
||||||
|
2022-01-04 15:52:49 |
|
ValidateMTLSCertificates2Header
No certificate authority found for MTLS
|
|
2022-01-04 15:52:49 |
SUCCESS
|
ValidateMTLSCertificates2Header
MTLS certificates header is valid
|
|
2022-01-04 15:52:49 |
|
ExtractMTLSCertificates2FromConfiguration
No certificate authority found for MTLS
|
|
2022-01-04 15:52:49 |
SUCCESS
|
ExtractMTLSCertificates2FromConfiguration
Mutual TLS authentication credentials loaded
|
||||
|
2022-01-04 15:52:49 | SUCCESS |
ValidateClientJWKsPrivatePart
Valid client JWKs: keys are valid JSON, contain the required fields, the private/public exponents match and are correctly encoded using unpadded base64url
|
|
2022-01-04 15:52:49 |
SUCCESS
|
ExtractJWKsFromStaticClientConfiguration
Extracted client JWK
|
||||
|
2022-01-04 15:52:49 | SUCCESS |
CheckForKeyIdInClientJWKs
All keys contain kids
|
|
2022-01-04 15:52:49 | SUCCESS |
CheckDistinctKeyIdValueInClientJWKs
Distinct 'kid' value in all keys of client_jwks
|
||
|
2022-01-04 15:52:49 | SUCCESS |
FAPIBrazilCheckKeyAlgInClientJWKs
Keys in client JWKS all have permitted 'alg'
|
||
|
2022-01-04 15:52:49 | SUCCESS |
FAPIEnsureMinimumClientKeyLength
Validated minimum key lengths for client_jwks
|
||
|
2022-01-04 15:52:49 |
SUCCESS
|
ValidateMTLSCertificatesAsX509
Mutual TLS authentication cert validated as X.509
|
|
2022-01-04 15:52:49 |
SUCCESS
|
ValidateClientPrivateKeysAreDifferent
Client signing JWKs have different thumbprints
|
||||
|
2022-01-04 15:52:49 |
SUCCESS
|
GetResourceEndpointConfiguration
Found a resource endpoint object
|
||||||||
|
2022-01-04 15:52:49 |
SUCCESS
|
SetProtectedResourceUrlToSingleResourceEndpoint
Set protected resource URL
|
||
|
2022-01-04 15:52:49 |
SUCCESS
|
ExtractTLSTestValuesFromResourceConfiguration
Extracted TLS information from resource endpoint
|
||
|
2022-01-04 15:52:49 |
SUCCESS
|
ExtractTLSTestValuesFromOBResourceConfiguration
Extracted TLS information from resource endpoint
|
||||
|
2022-01-04 15:52:49 |
|
fapi1-advanced-final-ensure-different-nonce-inside-and-outside-request-object
Setup Done
|
|
Use client_credentials grant to obtain Brazil consent |
2022-01-04 15:52:49 |
SUCCESS
|
CreateTokenEndpointRequestForClientCredentialsGrant
|
||||
|
2022-01-04 15:52:49 |
SUCCESS
|
SetConsentsScopeOnTokenEndpointRequest
Set scope parameter to 'consents'
|
||||
|
2022-01-04 15:52:49 |
SUCCESS
|
CreateClientAuthenticationAssertionClaims
Created client assertion claims
|
||||||||||||
|
2022-01-04 15:52:49 |
SUCCESS
|
SignClientAuthenticationAssertion
Signed the client assertion
|
||
|
2022-01-04 15:52:49 |
|
AddClientAssertionToTokenEndpointRequest
Added client assertion
|
||||||||
|
2022-01-04 15:52:49 |
|
CallTokenEndpoint
HTTP request
|
||||||||||
|
2022-01-04 15:52:49 |
RESPONSE
|
CallTokenEndpoint
HTTP response
|
||||||||
|
2022-01-04 15:52:49 |
|
CallTokenEndpoint
Token endpoint response
|
||
|
2022-01-04 15:52:49 |
SUCCESS
|
CallTokenEndpoint
Parsed token endpoint response
|
||||||||||||
|
2022-01-04 15:52:49 |
SUCCESS
|
CheckIfTokenEndpointResponseError
No error from token endpoint
|
|
2022-01-04 15:52:49 |
SUCCESS
|
CheckForAccessTokenValue
Found an access token
|
||
|
2022-01-04 15:52:49 |
SUCCESS
|
ExtractAccessTokenFromTokenResponse
Extracted the access token
|
||||
|
2022-01-04 15:52:49 | SUCCESS |
ExtractExpiresInFromTokenEndpointResponse
Extracted 'expires_in'
|
||
|
2022-01-04 15:52:49 | SUCCESS |
ValidateExpiresIn
expires_in passed all validation checks
|
||
|
2022-01-04 15:52:49 |
|
CreateEmptyResourceEndpointRequestHeaders
Created empty headers
|
||
|
2022-01-04 15:52:49 |
SUCCESS
|
AddFAPIAuthDateToResourceEndpointRequest
Added x-fapi-auth-date to resource endpoint request headers
|
||
|
2022-01-04 15:52:49 |
SUCCESS
|
FAPIBrazilCreateConsentRequest
|
||
|
2022-01-04 15:52:49 |
SUCCESS
|
FAPIBrazilAddExpirationToConsentRequest
Added expiration time to consent request
|
||
|
2022-01-04 15:52:49 |
|
CallConsentEndpointWithBearerToken
HTTP request
|
||||||||||
|
2022-01-04 15:52:50 |
RESPONSE
|
CallConsentEndpointWithBearerToken
HTTP response
|
||||||||
|
2022-01-04 15:52:50 |
|
CallConsentEndpointWithBearerToken
Consent endpoint response
|
||
|
2022-01-04 15:52:50 |
SUCCESS
|
CallConsentEndpointWithBearerToken
Parsed consent endpoint response
|
||||
|
2022-01-04 15:52:50 |
SUCCESS
|
FAPIBrazilConsentEndpointResponseValidatePermissions
Consent endpoint response contains expected permissions
|
||||
|
2022-01-04 15:52:50 |
SUCCESS
|
ExtractConsentIdFromConsentEndpointResponse
Extracted the consent id
|
||
|
2022-01-04 15:52:50 | SUCCESS |
CheckForFAPIInteractionIdInResourceResponse
Found x-fapi-interaction-id
|
||
|
2022-01-04 15:52:50 |
SUCCESS
|
FAPIBrazilAddConsentIdToClientScope
Added scope of 'openid email consent:1' to client's scope
|
||||||
|
Make request to authorization endpoint |
2022-01-04 15:52:50 |
SUCCESS
|
CreateAuthorizationEndpointRequestFromClientInformation
Created authorization endpoint request
|
||||||
|
2022-01-04 15:52:50 |
|
CreateRandomStateValue
Created state value
|
||||
|
2022-01-04 15:52:50 |
SUCCESS
|
AddStateToAuthorizationEndpointRequest
Added state parameter to request
|
||||||||
|
2022-01-04 15:52:50 |
|
CreateRandomNonceValue
Created nonce value
|
||||
|
2022-01-04 15:52:50 |
SUCCESS
|
AddNonceToAuthorizationEndpointRequest
Added nonce parameter to request
|
||||||||||
|
2022-01-04 15:52:50 |
SUCCESS
|
SetAuthorizationEndpointRequestResponseTypeToCode
Added response_type parameter to request
|
||||||||||||
|
2022-01-04 15:52:50 |
SUCCESS
|
SetAuthorizationEndpointRequestResponseModeToJWT
Added response_mode parameter to request
|
||||||||||||||
|
2022-01-04 15:52:50 |
|
CreateRandomCodeVerifier
Created code_verifier value
|
||
|
2022-01-04 15:52:50 |
|
CreateS256CodeChallenge
Created code_challenge value
|
||
|
2022-01-04 15:52:50 | SUCCESS |
AddCodeChallengeToAuthorizationEndpointRequest
Added code_challenge and code_challenge_method parameters to request
|
||||||||||||||||||
|
2022-01-04 15:52:50 |
SUCCESS
|
ConvertAuthorizationEndpointRequestToRequestObject
Created request object claims
|
||
|
2022-01-04 15:52:50 |
SUCCESS
|
AddIncorrectNonceToAuthorizationEndpointRequest
Added incorrect nonce parameter to request
|
||||||||||||||||||
|
2022-01-04 15:52:50 | SUCCESS |
AddNbfToRequestObject
Added nbf to request object claims
|
||
|
2022-01-04 15:52:50 | SUCCESS |
AddExpToRequestObject
Added exp to request object claims
|
||
|
2022-01-04 15:52:50 | SUCCESS |
AddAudToRequestObject
Added aud to request object claims
|
||
|
2022-01-04 15:52:50 | SUCCESS |
AddIssToRequestObject
Added iss to request object claims
|
||
|
2022-01-04 15:52:50 | SUCCESS |
AddClientIdToRequestObject
Added client_id to request object claims
|
||
|
2022-01-04 15:52:50 |
SUCCESS
|
SignRequestObject
Signed the request object
|
||||||||
|
2022-01-04 15:52:50 |
SUCCESS
|
BuildRequestObjectPostToPAREndpoint
|
||
|
2022-01-04 15:52:50 |
SUCCESS
|
CreateClientAuthenticationAssertionClaims
Created client assertion claims
|
||||||||||||
|
2022-01-04 15:52:50 | SUCCESS |
UpdateClientAuthenticationAssertionClaimsWithISSAud
Updated audience in client assertion claims
|
||||||||||||
|
2022-01-04 15:52:50 |
SUCCESS
|
SignClientAuthenticationAssertion
Signed the client assertion
|
||
|
2022-01-04 15:52:50 |
SUCCESS
|
AddClientAssertionToPAREndpointParameters
Added client assertion to request
|
||
|
2022-01-04 15:52:50 |
|
CallPAREndpoint
HTTP request
|
||||||||||
|
2022-01-04 15:52:51 |
RESPONSE
|
CallPAREndpoint
HTTP response
|
||||||||
|
2022-01-04 15:52:51 | SUCCESS |
CallPAREndpoint
Storing pushed_authorization_endpoint_response_http_status 201
|
|
2022-01-04 15:52:51 | SUCCESS |
CallPAREndpoint
Parsed pushed authorization request endpoint response
|
||||
|
2022-01-04 15:52:51 | SUCCESS |
CheckIfPAREndpointResponseError
pushed authorization request endpoint correct response.
|
|
2022-01-04 15:52:51 | SUCCESS |
CheckForRequestUriValue
Found valid request_uri
|
||
|
2022-01-04 15:52:51 | SUCCESS |
CheckForPARResponseExpiresIn
Found expires_in
|
||
|
2022-01-04 15:52:51 |
SUCCESS
|
ExtractRequestUriFromPARResponse
Extracted the request_uri: urn:ietf:params:oauth:request_uri:57d0a698-0d2d-4c58-b434-de5bb0c59507
|
|
2022-01-04 15:52:51 | SUCCESS |
EnsureMinimumRequestUriEntropy
Calculated shannon entropy seems sufficient
|
||||||
|
2022-01-04 15:52:51 | SUCCESS |
BuildRequestObjectByReferenceRedirectToAuthorizationEndpoint
Sending to authorization endpoint
|
||
|
2022-01-04 15:52:51 |
REDIRECT
|
fapi1-advanced-final-ensure-different-nonce-inside-and-outside-request-object
Redirecting to authorization endpoint
|
||
|
2022-01-04 15:52:51 | REVIEW |
ExpectRequestDifferentNonceInsideAndOutsideErrorPage
If the server does not return an invalid_request error back to the client, it must either show an error page (saying the request is invalid as the 'nonce' value in the request object and outside it are different - upload a screenshot of the error page) or must successfully authenticate and but return the nonce from inside the request object.
|
||
|
2022-01-04 15:52:53 |
INCOMING
|
fapi1-advanced-final-ensure-different-nonce-inside-and-outside-request-object
Incoming HTTP request to test instance YKFolAmueY8KVgf
|
||||||||||||||||||||
|
2022-01-04 15:52:53 |
SUCCESS
|
CreateRandomImplicitSubmitUrl
Created random implicit submission URL
|
||
|
2022-01-04 15:52:53 |
OUTGOING
|
fapi1-advanced-final-ensure-different-nonce-inside-and-outside-request-object
Response to HTTP request to test instance YKFolAmueY8KVgf
|
||||
|
2022-01-04 15:52:53 |
INCOMING
|
fapi1-advanced-final-ensure-different-nonce-inside-and-outside-request-object
Incoming HTTP request to test instance YKFolAmueY8KVgf
|
||||||||||||||||||||
|
2022-01-04 15:52:53 |
OUTGOING
|
fapi1-advanced-final-ensure-different-nonce-inside-and-outside-request-object
Response to HTTP request to test instance YKFolAmueY8KVgf
|
||||||||
|
2022-01-04 15:52:53 |
SUCCESS
|
ExtractImplicitHashToCallbackResponse
implicit_hash is empty
|
|
2022-01-04 15:52:53 |
REDIRECT-IN
|
fapi1-advanced-final-ensure-different-nonce-inside-and-outside-request-object
Authorization endpoint response captured
|
||||||||||
|
Verify authorization endpoint response |
2022-01-04 15:52:53 | SUCCESS |
ExtractJARMFromURLQuery
Found and parsed the jarm_response from callback_query_params
|
||||||
|
2022-01-04 15:52:53 | SUCCESS |
RejectNonJarmResponsesInUrlQuery
Authorization endpoint response only includes the JARM JWT.
|
|
2022-01-04 15:52:53 |
SUCCESS
|
ExtractAuthorizationEndpointResponseFromJARMResponse
Extracted the authorization response
|
||||||
|
2022-01-04 15:52:53 | SUCCESS |
ValidateJARMResponse
JARM response standard JWT claims are valid
|
|
2022-01-04 15:52:53 | SUCCESS |
ValidateJARMExpRecommendations
JARM response 'exp' is less than 10 minutes
|
||||
|
2022-01-04 15:52:53 | SUCCESS |
ValidateJARMSignatureUsingKid
jarm_response signature validated
|
||
|
2022-01-04 15:52:53 | SUCCESS |
RejectAuthCodeInUrlQuery
Authorization code is not present in URL query returned from authorization endpoint
|
|
2022-01-04 15:52:53 |
SUCCESS
|
CheckStateInAuthorizationResponse
State in response correctly returned
|
||
|
2022-01-04 15:52:53 | SUCCESS |
EnsureErrorFromAuthorizationEndpointResponse
Authorization endpoint returned an error
|
||||||
|
2022-01-04 15:52:53 | SUCCESS |
CheckForUnexpectedParametersInErrorResponseFromAuthorizationEndpoint
error response includes only expected parameters
|
||||||
|
2022-01-04 15:52:53 | SUCCESS |
EnsureInvalidRequestError
Authorization endpoint returned expected 'error' of 'invalid_request'
|
||
|
2022-01-04 15:52:53 |
FINISHED
|
fapi1-advanced-final-ensure-different-nonce-inside-and-outside-request-object
Test has run to completion
|
||
|
2022-01-04 15:52:59 |
|
TEST-RUNNER
Alias has now been claimed by another test
|
||||
|