Test Name | fapi1-advanced-final-client-test-invalid-chash |
---|---|
Variant | client_auth_type=private_key_jwt, fapi_jarm_type=oidc, fapi_auth_request_method=pushed, fapi_profile=openbanking_brazil, fapi_response_mode=plain_response |
Test ID | Pz5K9ywC94fU2q7 https://www.certification.openid.net/log-detail.html?public=true&log=Pz5K9ywC94fU2q7 |
Created | 2022-01-13T12:21:57.027305Z |
Description | Safra Relying Party Test |
Test Version | 4.1.38 |
Test Owner | 115398831494028880200 https://accounts.google.com |
Plan ID | aHKQkRwE1nAwr https://www.certification.openid.net/plan-detail.html?public=true&plan=aHKQkRwE1nAwr |
Exported From | https://www.certification.openid.net |
Exported By | 115398831494028880200 https://accounts.google.com |
Suite Version | 4.1.38 |
Exported | 2022-01-14 19:58:19 (UTC) |
Status: FINISHED Result: PASSED |
SUCCESS 86 FAILURE 0 WARNING 0 REVIEW 0 INFO 9 |
2022-01-13 12:21:57 |
INFO
|
TEST-RUNNER
Test instance Pz5K9ywC94fU2q7 created
|
||||||||||||||
|
2022-01-13 12:21:57 |
SUCCESS
|
FAPIBrazilGenerateServerConfiguration
Created server configuration
|
||||||
|
2022-01-13 12:21:57 |
SUCCESS
|
LoadServerJWKs
Parsed public and private JWK sets
|
||||||
|
2022-01-13 12:21:57 | SUCCESS |
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
|
|
2022-01-13 12:21:57 |
|
SetServerSigningAlgToPS256
Successfully set signing algorithm to PS256
|
|
2022-01-13 12:21:57 |
|
FAPIBrazilSetGrantTypesSupportedInServerConfiguration
Successfully set grant_types_supported
|
||
|
2022-01-13 12:21:57 |
|
AddClaimsParameterSupportedTrueToServerConfiguration
Successfully added claims_parameter_supported to server configuration
|
||
|
2022-01-13 12:21:57 |
|
FAPIBrazilAddBrazilSpecificSettingsToServerConfiguration
Added open banking Brazil specific server settings
|
||
|
2022-01-13 12:21:57 |
|
SetTokenEndpointAuthMethodsSupportedToPrivateKeyJWTOnly
Changed token_endpoint_auth_methods_supported to private_key_jwt only in server configuration
|
||
|
2022-01-13 12:21:57 |
|
AddPushedAuthorizationRequestEndpointToServerConfig
Added pushed_authorization_request_endpoint to server configuration
|
||
|
2022-01-13 12:21:57 |
|
AddRequirePushedAuthorizationRequestsToServerConfig
Added require_pushed_authorization_requests to server configuration
|
||
|
2022-01-13 12:21:57 | SUCCESS |
AddResponseTypeCodeIdTokenToServerConfiguration
Added code id_token as response type supported
|
||
|
2022-01-13 12:21:57 |
SUCCESS
|
FAPIBrazilAddTokenEndpointAuthSigningAlgValuesSupportedToServer
Set token_endpoint_auth_signing_alg_values_supported
|
||
|
2022-01-13 12:21:57 |
SUCCESS
|
CheckServerConfiguration
Found required server configuration keys
|
||
|
2022-01-13 12:21:57 | SUCCESS |
FAPIEnsureMinimumServerKeyLength
Validated minimum key lengths for server_jwks
|
||
|
2022-01-13 12:21:57 |
SUCCESS
|
LoadUserInfo
Added user information
|
||
|
Verify configuration of first client |
2022-01-13 12:21:57 |
SUCCESS
|
GetStaticClientConfiguration
Found a static client object
|
||||||||
|
2022-01-13 12:21:57 | SUCCESS |
ValidateClientJWKsPublicPart
Valid client JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
|
|
2022-01-13 12:21:57 |
SUCCESS
|
ExtractJWKsFromStaticClientConfiguration
Extracted client JWK
|
||||
|
2022-01-13 12:21:57 | SUCCESS |
CheckDistinctKeyIdValueInClientJWKs
Distinct 'kid' value in all keys of client_jwks
|
||
|
2022-01-13 12:21:57 |
SUCCESS
|
EnsureClientJwksDoesNotContainPrivateOrSymmetricKeys
Jwks does not contain any private or symmetric keys
|
|
2022-01-13 12:21:57 | SUCCESS |
FAPIEnsureMinimumClientKeyLength
Validated minimum key lengths for client_jwks
|
||
|
Verify configuration of second client |
2022-01-13 12:21:57 |
SUCCESS
|
GetStaticClient2Configuration
Found a static second client object
|
||||||||||||
|
2022-01-13 12:21:57 | SUCCESS |
ValidateClientJWKsPublicPart
Valid client JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
|
|
2022-01-13 12:21:57 |
SUCCESS
|
ExtractJWKsFromStaticClientConfiguration
Extracted client JWK
|
||||
|
2022-01-13 12:21:57 | SUCCESS |
CheckDistinctKeyIdValueInClientJWKs
Distinct 'kid' value in all keys of client_jwks
|
||
|
2022-01-13 12:21:57 |
SUCCESS
|
EnsureClientJwksDoesNotContainPrivateOrSymmetricKeys
Jwks does not contain any private or symmetric keys
|
|
2022-01-13 12:21:57 | SUCCESS |
FAPIEnsureMinimumClientKeyLength
Validated minimum key lengths for client_jwks
|
||
|
2022-01-13 12:21:57 |
|
fapi1-advanced-final-client-test-invalid-chash
Setup Done
|
|
2022-01-13 12:22:09 |
INCOMING
|
fapi1-advanced-final-client-test-invalid-chash
Incoming HTTP request to test instance Pz5K9ywC94fU2q7
|
||||||||||||||||||||
|
2022-01-13 12:22:09 | SUCCESS |
EnsureIncomingTls12WithSecureCipherOrTls13
TLS 1.2 in use and cipher is one recommended by BCP195
|
||||
|
Token endpoint |
2022-01-13 12:22:09 |
SUCCESS
|
ExtractClientCertificateFromTokenEndpointRequestHeaders
Extracted client certificate
|
||
|
2022-01-13 12:22:09 | SUCCESS |
CheckForClientCertificate
Found client certificate
|
|
2022-01-13 12:22:09 |
SUCCESS
|
EnsureClientCertificateMatches
Presented certificate matches registered certificate
|
||
|
2022-01-13 12:22:09 | SUCCESS |
ExtractClientAssertion
Parsed client assertion
|
||
|
2022-01-13 12:22:09 |
|
EnsureClientAssertionSignatureAlgorithmMatchesRegistered
token_endpoint_auth_signing_alg is not set for the client, any supported algorithm can be used
|
|
2022-01-13 12:22:09 | SUCCESS |
ValidateClientAssertionSignature
client_assertion signature validated
|
||
|
2022-01-13 12:22:09 | SUCCESS |
EnsureClientAssertionTypeIsJwt
Found JWT assertion type
|
||
|
2022-01-13 12:22:09 | SUCCESS |
ValidateClientAssertionClaims
Client Assertion passed all validation checks
|
|
2022-01-13 12:22:09 |
SUCCESS
|
FAPIBrazilExtractRequestedScopeFromClientCredentialsGrant
Found 'consents' scope in request
|
||||
|
2022-01-13 12:22:09 |
SUCCESS
|
GenerateBearerAccessToken
Generated access token
|
||
|
2022-01-13 12:22:09 |
SUCCESS
|
CreateTokenEndpointResponse
Created token endpoint response
|
||||
|
2022-01-13 12:22:09 |
|
CopyAccessTokenToClientCredentialsField
Condition ran but did not log anything
|
|
2022-01-13 12:22:09 |
OUTGOING
|
fapi1-advanced-final-client-test-invalid-chash
Response to HTTP request to test instance Pz5K9ywC94fU2q7
|
||||||||
|
2022-01-13 12:22:10 |
INCOMING
|
fapi1-advanced-final-client-test-invalid-chash
Incoming HTTP request to test instance Pz5K9ywC94fU2q7
|
||||||||||||||||||||
|
2022-01-13 12:22:10 | SUCCESS |
EnsureIncomingTls12WithSecureCipherOrTls13
TLS 1.2 in use and cipher is one recommended by BCP195
|
||||
|
New consent endpoint |
2022-01-13 12:22:10 |
SUCCESS
|
ExtractClientCertificateFromTokenEndpointRequestHeaders
Extracted client certificate
|
||
|
2022-01-13 12:22:10 | SUCCESS |
CheckForClientCertificate
Found client certificate
|
|
2022-01-13 12:22:10 |
SUCCESS
|
EnsureClientCertificateMatches
Presented certificate matches registered certificate
|
||
|
2022-01-13 12:22:10 |
SUCCESS
|
EnsureIncomingRequestMethodIsPost
Client correctly used http POST method
|
|
2022-01-13 12:22:10 | SUCCESS |
EnsureBearerAccessTokenNotInParams
Client correctly did not send access token in query parameters or form body
|
|
2022-01-13 12:22:10 | SUCCESS |
ExtractBearerAccessTokenFromHeader
Found access token on incoming request
|
||
|
2022-01-13 12:22:10 |
SUCCESS
|
RequireBearerClientCredentialsAccessToken
Found access token in request
|
||
|
2022-01-13 12:22:10 | INFO |
ExtractFapiDateHeader
Skipped evaluation due to missing required element: incoming_request headers.x-fapi-auth-date
|
||||||
|
2022-01-13 12:22:10 | INFO |
ExtractFapiIpAddressHeader
Skipped evaluation due to missing required element: incoming_request headers.x-fapi-customer-ip-address
|
||||||
|
2022-01-13 12:22:10 | INFO |
ExtractFapiInteractionIdHeader
Skipped evaluation due to missing required element: incoming_request headers.x-fapi-interaction-id
|
||||||
|
2022-01-13 12:22:10 |
SUCCESS
|
FAPIBrazilEnsureClientCredentialsScopeContainedConsents
The token request which was used to obtain the access token contained 'consents' scope
|
||
|
2022-01-13 12:22:10 |
|
FAPIBrazilExtractConsentRequest
Condition ran but did not log anything
|
|
2022-01-13 12:22:10 | SUCCESS |
CreateFapiInteractionIdIfNeeded
Created new FAPI interaction ID
|
||
|
2022-01-13 12:22:10 | SUCCESS |
FAPIBrazilGenerateNewConsentResponse
Created consent response
|
||||||
|
2022-01-13 12:22:10 |
|
ClearAccessTokenFromRequest
Condition ran but did not log anything
|
|
2022-01-13 12:22:10 |
OUTGOING
|
fapi1-advanced-final-client-test-invalid-chash
Response to HTTP request to test instance Pz5K9ywC94fU2q7
|
||||||||
|
2022-01-13 12:22:13 |
INCOMING
|
fapi1-advanced-final-client-test-invalid-chash
Incoming HTTP request to test instance Pz5K9ywC94fU2q7
|
||||||||||||||||||||
|
2022-01-13 12:22:13 | SUCCESS |
EnsureIncomingTls12WithSecureCipherOrTls13
TLS 1.2 in use and cipher is one recommended by BCP195
|
||||
|
PAR endpoint |
2022-01-13 12:22:13 |
SUCCESS
|
ExtractClientCertificateFromTokenEndpointRequestHeaders
Extracted client certificate
|
||
|
2022-01-13 12:22:13 | SUCCESS |
CheckForClientCertificate
Found client certificate
|
|
2022-01-13 12:22:13 |
SUCCESS
|
EnsureClientCertificateMatches
Presented certificate matches registered certificate
|
||
|
2022-01-13 12:22:13 | SUCCESS |
ExtractClientAssertion
Parsed client assertion
|
||
|
2022-01-13 12:22:13 |
|
EnsureClientAssertionSignatureAlgorithmMatchesRegistered
token_endpoint_auth_signing_alg is not set for the client, any supported algorithm can be used
|
|
2022-01-13 12:22:13 | SUCCESS |
ValidateClientAssertionSignature
client_assertion signature validated
|
||
|
2022-01-13 12:22:13 | SUCCESS |
EnsureClientAssertionTypeIsJwt
Found JWT assertion type
|
||
|
2022-01-13 12:22:13 | SUCCESS |
ValidateClientAssertionClaimsForPAREndpoint
Client Assertion passed all validation checks
|
|
2022-01-13 12:22:13 | SUCCESS |
ExtractRequestObjectFromPAREndpointRequest
Parsed request object
|
||
|
2022-01-13 12:22:13 | SUCCESS |
EnsurePAREndpointRequestDoesNotContainRequestUriParameter
PAR endpoint request does not contain a request_uri parameter
|
|
2022-01-13 12:22:13 | INFO |
ValidateEncryptedRequestObjectHasKid
Skipped evaluation due to missing required element: authorization_request_object jwe_header
|
||||||
|
2022-01-13 12:22:13 | SUCCESS |
FAPIValidateRequestObjectSigningAlg
Request object was signed with a permitted algorithm
|
||
|
2022-01-13 12:22:13 |
|
FAPIBrazilValidateRequestObjectIdTokenACRClaims
acr claim is not requested
|
|
2022-01-13 12:22:13 | SUCCESS |
FAPIValidateRequestObjectExp
Request object contains a valid exp claim, expiry time
|
||
|
2022-01-13 12:22:13 | SUCCESS |
FAPI1AdvancedValidateRequestObjectNBFClaim
nbf claim is valid
|
||||
|
2022-01-13 12:22:13 |
INFO
|
ValidateRequestObjectClaims
Missing issuance time
|
|
2022-01-13 12:22:13 |
|
ValidateRequestObjectClaims
Request object does not contain a max_age claim
|
|
2022-01-13 12:22:13 |
SUCCESS
|
ValidateRequestObjectClaims
Request object claims passed all validation checks
|
|
2022-01-13 12:22:13 | SUCCESS |
EnsureNumericRequestObjectClaimsAreNotNull
None of the claims expected to have numeric values, have null values
|
||
|
2022-01-13 12:22:13 | SUCCESS |
EnsureRequestObjectDoesNotContainRequestOrRequestUri
Request object does not contain request or request_uri
|
|
2022-01-13 12:22:13 | SUCCESS |
EnsureRequestObjectDoesNotContainSubWithClientId
Request object does not contain Client Id in sub
|
|
2022-01-13 12:22:13 | SUCCESS |
ValidateRequestObjectSignature
Request object signature validated using a key in the client's JWKS and using the client's registered request_object_signing_alg
|
||||||
|
2022-01-13 12:22:13 |
SUCCESS
|
EnsureMatchingRedirectUriInRequestObject
Redirect URI matched
|
||
|
2022-01-13 12:22:13 | SUCCESS |
EnsureRequestObjectContainsCodeChallengeWhenUsingPAR
Found required PKCE parameters in request
|
||||
|
2022-01-13 12:22:13 | SUCCESS |
CreatePAREndpointResponse
Created PAR endpoint response
|
||||
|
2022-01-13 12:22:13 |
OUTGOING
|
fapi1-advanced-final-client-test-invalid-chash
Response to HTTP request to test instance Pz5K9ywC94fU2q7
|
||||||||
|
2022-01-13 12:22:17 |
INCOMING
|
fapi1-advanced-final-client-test-invalid-chash
Incoming HTTP request to test instance Pz5K9ywC94fU2q7
|
||||||||||||||||||||
|
2022-01-13 12:22:17 | SUCCESS |
EnsureIncomingTls12WithSecureCipherOrTls13
TLS 1.2 in use and cipher is one recommended by BCP195
|
||||
|
Authorization endpoint |
2022-01-13 12:22:17 |
SUCCESS
|
EnsureAuthorizationRequestDoesNotContainRequestWhenUsingPAR
Request does not contain a request parameter
|
|
2022-01-13 12:22:17 | INFO |
ValidateEncryptedRequestObjectHasKid
Skipped evaluation due to missing required element: authorization_request_object jwe_header
|
||||||
|
2022-01-13 12:22:17 |
SUCCESS
|
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
|
||
|
2022-01-13 12:22:17 | SUCCESS |
EnsureClientIdInAuthorizationRequestParametersMatchRequestObject
client_id http request parameter value matches client_id in request object
|
|
2022-01-13 12:22:17 |
SUCCESS
|
ExtractRequestedScopes
Requested scopes
|
||
|
2022-01-13 12:22:17 |
SUCCESS
|
FAPIBrazilValidateConsentScope
Found consent scope in request
|
||||
|
2022-01-13 12:22:17 |
SUCCESS
|
EnsureScopeContainsAccounts
Found accounts scope in request
|
||
|
2022-01-13 12:22:17 | SUCCESS |
EnsureResponseTypeIsCodeIdToken
Response type is expected value
|
||
|
2022-01-13 12:22:17 | SUCCESS |
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
|
||||
|
2022-01-13 12:22:17 | SUCCESS |
EnsureMatchingClientId
Client ID matched
|
||
|
2022-01-13 12:22:17 |
SUCCESS
|
CreateAuthorizationCode
Created authorization code
|
||
|
2022-01-13 12:22:17 | SUCCESS |
ExtractNonceFromAuthorizationRequest
Extracted nonce
|
||
|
2022-01-13 12:22:17 | SUCCESS |
CalculateCHash
Successful c_hash encoding
|
||
|
2022-01-13 12:22:17 | SUCCESS |
CalculateSHash
Successful s_hash encoding
|
||
|
2022-01-13 12:22:17 |
SUCCESS
|
GenerateIdTokenClaims
Created ID Token Claims
|
||||||||||||
|
2022-01-13 12:22:17 |
|
FAPIBrazilAddCPFAndCPNJToIdTokenClaims
Request object does not contain a claims element.id_token
|
|
2022-01-13 12:22:17 | SUCCESS |
AddCHashToIdTokenClaims
Added c_hash to ID token claims
|
||||
|
2022-01-13 12:22:17 | SUCCESS |
AddSHashToIdTokenClaims
Added s_hash to ID token claims
|
||||
|
2022-01-13 12:22:17 | INFO |
AddAtHashToIdTokenClaims
Skipped evaluation due to missing required string: at_hash
|
||
|
2022-01-13 12:22:17 | SUCCESS |
AddInvalidCHashValueToIdToken
Added invalid c_hash to ID token claims
|
||||
|
2022-01-13 12:22:17 | INFO |
FAPIBrazilAddACRClaimToIdTokenClaims
Skipped evaluation due to missing required string: requested_id_token_acr_values
|
||
|
2022-01-13 12:22:17 |
SUCCESS
|
SignIdToken
Signed the ID token
|
||
|
2022-01-13 12:22:17 |
SUCCESS
|
FAPIBrazilChangeConsentStatusToAuthorized
Changed consent status to AUTHORISED
|
||
|
2022-01-13 12:22:17 |
SUCCESS
|
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
|
||
|
2022-01-13 12:22:17 | SUCCESS |
AddCodeToAuthorizationEndpointResponseParams
Added code to authorization endpoint response params
|
||
|
2022-01-13 12:22:17 | SUCCESS |
AddIdTokenToAuthorizationEndpointResponseParams
Added id_token to authorization endpoint response params
|
||
|
2022-01-13 12:22:17 |
|
SendAuthorizationResponseWithResponseModeFragment
Redirecting back to client
|
||
|
2022-01-13 12:22:17 |
OUTGOING
|
fapi1-advanced-final-client-test-invalid-chash
Response to HTTP request to test instance Pz5K9ywC94fU2q7
|
||||
|
2022-01-13 12:22:22 |
FINISHED
|
fapi1-advanced-final-client-test-invalid-chash
Test has run to completion
|
||
|
2022-01-13 12:23:02 |
|
TEST-RUNNER
Alias has now been claimed by another test
|
||||
|