Test Name | fapi1-advanced-final-ensure-signed-request-object-with-RS256-fails |
---|---|
Variant | client_auth_type=private_key_jwt, fapi_auth_request_method=by_value, fapi_profile=openbanking_brazil, fapi_response_mode=jarm |
Test ID | fsl0EFNf70MFojN https://www.certification.openid.net/log-detail.html?public=true&log=fsl0EFNf70MFojN |
Created | 2022-04-11T08:41:09.828906Z |
Description | az.openitio.com testing |
Test Version | 4.1.42 |
Test Owner | 5019191 https://gitlab.com |
Plan ID | qASalaJMTHTUf https://www.certification.openid.net/plan-detail.html?public=true&plan=qASalaJMTHTUf |
Exported From | https://www.certification.openid.net |
Exported By | 5019191 https://gitlab.com |
Suite Version | 4.1.42 |
Exported | 2022-04-20 12:10:55 (UTC) |
Status: FINISHED Result: PASSED |
SUCCESS 82 FAILURE 0 WARNING 0 REVIEW 1 INFO 1 |
2022-04-11 08:41:09 |
INFO
|
TEST-RUNNER
Test instance fsl0EFNf70MFojN created
|
||||||||||||||
|
2022-04-11 08:41:09 |
SUCCESS
|
CreateRedirectUri
Created redirect URI
|
||
|
2022-04-11 08:41:09 |
|
GetDynamicServerConfiguration
HTTP request
|
||||||||
|
2022-04-11 08:41:10 |
RESPONSE
|
GetDynamicServerConfiguration
HTTP response
|
||||||||
|
2022-04-11 08:41:10 |
SUCCESS
|
GetDynamicServerConfiguration
Successfully parsed server configuration
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
|
2022-04-11 08:41:10 | SUCCESS |
AddMTLSEndpointAliasesToEnvironment
Added mtls_endpoint_aliases to environment
|
|
2022-04-11 08:41:10 |
SUCCESS
|
CheckServerConfiguration
Found required server configuration keys
|
||
|
2022-04-11 08:41:10 |
|
FetchServerKeys
Fetching server key
|
||
|
2022-04-11 08:41:10 |
|
FetchServerKeys
HTTP request
|
||||||||
|
2022-04-11 08:41:10 |
RESPONSE
|
FetchServerKeys
HTTP response
|
||||||||
|
2022-04-11 08:41:10 |
|
FetchServerKeys
Found JWK set string
|
||
|
2022-04-11 08:41:10 |
SUCCESS
|
FetchServerKeys
Found server JWK set
|
||
|
2022-04-11 08:41:10 |
SUCCESS
|
CheckServerKeysIsValid
Server JWKs is valid
|
||
|
2022-04-11 08:41:10 | SUCCESS |
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
|
|
2022-04-11 08:41:10 | SUCCESS |
CheckForKeyIdInServerJWKs
All keys contain kids
|
|
2022-04-11 08:41:10 | SUCCESS |
EnsureServerJwksDoesNotContainPrivateOrSymmetricKeys
Jwks does not contain any private or symmetric keys
|
|
2022-04-11 08:41:10 | SUCCESS |
FAPIEnsureMinimumServerKeyLength
Validated minimum key lengths for server_jwks
|
||
|
2022-04-11 08:41:10 |
SUCCESS
|
GetStaticClientConfiguration
Found a static client object
|
||||||
|
2022-04-11 08:41:10 |
SUCCESS
|
ValidateMTLSCertificatesHeader
MTLS certificates header is valid
|
|
2022-04-11 08:41:10 |
SUCCESS
|
ExtractMTLSCertificatesFromConfiguration
Mutual TLS authentication credentials loaded
|
||||||
|
2022-04-11 08:41:10 | SUCCESS |
ValidateClientJWKsPrivatePart
Valid client JWKs: keys are valid JSON, contain the required fields, the private/public exponents match and are correctly encoded using unpadded base64url
|
|
2022-04-11 08:41:10 |
SUCCESS
|
ExtractJWKsFromStaticClientConfiguration
Extracted client JWK
|
||||
|
2022-04-11 08:41:10 | SUCCESS |
CheckForKeyIdInClientJWKs
All keys contain kids
|
|
2022-04-11 08:41:10 | SUCCESS |
CheckDistinctKeyIdValueInClientJWKs
Distinct 'kid' value in all keys of client_jwks
|
||
|
2022-04-11 08:41:10 | SUCCESS |
FAPIBrazilCheckKeyAlgInClientJWKs
Keys in client JWKS all have permitted 'alg'
|
||
|
2022-04-11 08:41:10 | SUCCESS |
FAPIEnsureMinimumClientKeyLength
Validated minimum key lengths for client_jwks
|
||
|
2022-04-11 08:41:10 |
SUCCESS
|
ValidateMTLSCertificatesAsX509
Mutual TLS authentication cert validated as X.509
|
|
Verify configuration of second client |
2022-04-11 08:41:10 |
SUCCESS
|
GetStaticClient2Configuration
Found a static second client object
|
||||||
|
2022-04-11 08:41:10 |
SUCCESS
|
ValidateMTLSCertificates2Header
MTLS certificates header is valid
|
|
2022-04-11 08:41:10 |
SUCCESS
|
ExtractMTLSCertificates2FromConfiguration
Mutual TLS authentication credentials loaded
|
||||||
|
2022-04-11 08:41:10 | SUCCESS |
ValidateClientJWKsPrivatePart
Valid client JWKs: keys are valid JSON, contain the required fields, the private/public exponents match and are correctly encoded using unpadded base64url
|
|
2022-04-11 08:41:10 |
SUCCESS
|
ExtractJWKsFromStaticClientConfiguration
Extracted client JWK
|
||||
|
2022-04-11 08:41:10 | SUCCESS |
CheckForKeyIdInClientJWKs
All keys contain kids
|
|
2022-04-11 08:41:10 | SUCCESS |
CheckDistinctKeyIdValueInClientJWKs
Distinct 'kid' value in all keys of client_jwks
|
||
|
2022-04-11 08:41:10 | SUCCESS |
FAPIBrazilCheckKeyAlgInClientJWKs
Keys in client JWKS all have permitted 'alg'
|
||
|
2022-04-11 08:41:10 | SUCCESS |
FAPIEnsureMinimumClientKeyLength
Validated minimum key lengths for client_jwks
|
||
|
2022-04-11 08:41:10 |
SUCCESS
|
ValidateMTLSCertificatesAsX509
Mutual TLS authentication cert validated as X.509
|
|
2022-04-11 08:41:10 |
SUCCESS
|
ValidateClientPrivateKeysAreDifferent
Client signing JWKs have different thumbprints
|
||||
|
2022-04-11 08:41:10 |
SUCCESS
|
GetResourceEndpointConfiguration
Found a resource endpoint object
|
||||||||
|
2022-04-11 08:41:10 |
SUCCESS
|
SetProtectedResourceUrlToSingleResourceEndpoint
Set protected resource URL
|
||
|
2022-04-11 08:41:10 |
SUCCESS
|
ExtractTLSTestValuesFromResourceConfiguration
Extracted TLS information from resource endpoint
|
||
|
2022-04-11 08:41:10 |
SUCCESS
|
ExtractTLSTestValuesFromOBResourceConfiguration
Extracted TLS information from resource endpoint
|
||||
|
2022-04-11 08:41:10 |
|
fapi1-advanced-final-ensure-signed-request-object-with-RS256-fails
Setup Done
|
|
Use client_credentials grant to obtain Brazil consent |
2022-04-11 08:41:10 |
SUCCESS
|
CreateTokenEndpointRequestForClientCredentialsGrant
Created token endpoint request
|
||||
|
2022-04-11 08:41:10 |
SUCCESS
|
SetConsentsScopeOnTokenEndpointRequest
Set scope parameter to 'consents'
|
||||
|
2022-04-11 08:41:10 |
SUCCESS
|
CreateClientAuthenticationAssertionClaims
Created client assertion claims
|
||||||||||||
|
2022-04-11 08:41:10 |
SUCCESS
|
SignClientAuthenticationAssertion
Signed the client assertion
|
||
|
2022-04-11 08:41:10 |
|
AddClientAssertionToTokenEndpointRequest
Added client assertion
|
||||||||
|
2022-04-11 08:41:10 |
|
CallTokenEndpoint
HTTP request
|
||||||||||
|
2022-04-11 08:41:10 |
RESPONSE
|
CallTokenEndpoint
HTTP response
|
||||||||
|
2022-04-11 08:41:10 |
SUCCESS
|
CallTokenEndpoint
Parsed token endpoint response
|
||||||||
|
2022-04-11 08:41:10 |
SUCCESS
|
CheckIfTokenEndpointResponseError
No error from token endpoint
|
|
2022-04-11 08:41:10 |
SUCCESS
|
CheckForAccessTokenValue
Found an access token
|
||
|
2022-04-11 08:41:10 |
SUCCESS
|
ExtractAccessTokenFromTokenResponse
Extracted the access token
|
||||
|
2022-04-11 08:41:10 | SUCCESS |
ExtractExpiresInFromTokenEndpointResponse
Extracted 'expires_in'
|
||
|
2022-04-11 08:41:10 | SUCCESS |
ValidateExpiresIn
expires_in passed all validation checks
|
||
|
2022-04-11 08:41:10 |
|
CreateEmptyResourceEndpointRequestHeaders
Created empty headers
|
||
|
2022-04-11 08:41:10 |
SUCCESS
|
AddFAPIAuthDateToResourceEndpointRequest
Added x-fapi-auth-date to resource endpoint request headers
|
||
|
2022-04-11 08:41:10 |
SUCCESS
|
FAPIBrazilCreateConsentRequest
|
||
|
2022-04-11 08:41:10 |
SUCCESS
|
FAPIBrazilAddExpirationToConsentRequest
Added expiration time to consent request
|
||
|
2022-04-11 08:41:10 |
|
CallConsentEndpointWithBearerToken
HTTP request
|
||||||||||
|
2022-04-11 08:41:10 |
RESPONSE
|
CallConsentEndpointWithBearerToken
HTTP response
|
||||||||
|
2022-04-11 08:41:10 |
SUCCESS
|
CallConsentEndpointWithBearerToken
Got a response from the consent endpoint
|
||||||||||
|
2022-04-11 08:41:10 |
SUCCESS
|
EnsureHttpStatusCodeIs201
resource endpoint returned the expected http status
|
||||
|
2022-04-11 08:41:10 |
SUCCESS
|
EnsureContentTypeJson
endpoint_response Content-Type: header is application/json
|
|
2022-04-11 08:41:10 |
SUCCESS
|
FAPIBrazilConsentEndpointResponseValidatePermissions
Consent endpoint response contains expected permissions
|
||||
|
2022-04-11 08:41:10 |
SUCCESS
|
ExtractConsentIdFromConsentEndpointResponse
Extracted the consent id
|
||
|
2022-04-11 08:41:10 | SUCCESS |
CheckForFAPIInteractionIdInResourceResponse
Found x-fapi-interaction-id
|
||
|
2022-04-11 08:41:10 |
SUCCESS
|
FAPIBrazilAddConsentIdToClientScope
Added scope of 'openid accounts consent:d9ab2a4c-3b3c-43c4-bd92-c4fe820c1787:17b8b82e-b3ec-42a2-bd90-4097028a37f3' to client's scope
|
||||||
|
Make request to authorization endpoint |
2022-04-11 08:41:10 |
SUCCESS
|
CreateAuthorizationEndpointRequestFromClientInformation
Created authorization endpoint request
|
||||||
|
2022-04-11 08:41:10 |
|
CreateRandomStateValue
Created state value
|
||||
|
2022-04-11 08:41:10 |
SUCCESS
|
AddStateToAuthorizationEndpointRequest
Added state parameter to request
|
||||||||
|
2022-04-11 08:41:10 |
|
CreateRandomNonceValue
Created nonce value
|
||||
|
2022-04-11 08:41:10 |
SUCCESS
|
AddNonceToAuthorizationEndpointRequest
Added nonce parameter to request
|
||||||||||
|
2022-04-11 08:41:10 |
SUCCESS
|
SetAuthorizationEndpointRequestResponseTypeToCode
Added response_type parameter to request
|
||||||||||||
|
2022-04-11 08:41:10 |
SUCCESS
|
SetAuthorizationEndpointRequestResponseModeToJWT
Added response_mode parameter to request
|
||||||||||||||
|
2022-04-11 08:41:10 | SUCCESS |
ChangeClientJwksAlgToRS256
Added RS256 as algorithm
|
||
|
2022-04-11 08:41:10 |
SUCCESS
|
ConvertAuthorizationEndpointRequestToRequestObject
Created request object claims
|
||
|
2022-04-11 08:41:10 | SUCCESS |
AddNbfToRequestObject
Added nbf to request object claims
|
||
|
2022-04-11 08:41:10 | SUCCESS |
AddExpToRequestObject
Added exp to request object claims
|
||
|
2022-04-11 08:41:10 | SUCCESS |
AddAudToRequestObject
Added aud to request object claims
|
||
|
2022-04-11 08:41:10 | SUCCESS |
AddIssToRequestObject
Added iss to request object claims
|
||
|
2022-04-11 08:41:10 | SUCCESS |
AddClientIdToRequestObject
Added client_id to request object claims
|
||
|
2022-04-11 08:41:10 |
SUCCESS
|
SignRequestObject
Signed the request object
|
||||||||
|
2022-04-11 08:41:10 |
|
FAPIBrazilEncryptRequestObject
Encrypted the request object
|
||||||
|
2022-04-11 08:41:10 |
SUCCESS
|
BuildRequestObjectByValueRedirectToAuthorizationEndpoint
Sending to authorization endpoint
|
||
|
2022-04-11 08:41:10 |
REDIRECT
|
fapi1-advanced-final-ensure-signed-request-object-with-RS256-fails
Redirecting to authorization endpoint
|
||
|
2022-04-11 08:41:10 | REVIEW |
ExpectSignedRS256RequestObjectErrorPage
If the server does not return an invalid_request_object error back to the client, it must show an error page saying the request object is invalid as the algorithm in the JWS header of the request object passed by 'request' parameter does not match the registered.
|
||
|
2022-04-11 08:41:19 |
INCOMING
|
fapi1-advanced-final-ensure-signed-request-object-with-RS256-fails
Incoming HTTP request to /test/a/az-openitio/callback
|
||||||||||||||||||||
|
2022-04-11 08:41:19 |
SUCCESS
|
CreateRandomImplicitSubmitUrl
Created random implicit submission URL
|
||
|
2022-04-11 08:41:19 |
OUTGOING
|
fapi1-advanced-final-ensure-signed-request-object-with-RS256-fails
Response to HTTP request to test instance fsl0EFNf70MFojN
|
||||
|
2022-04-11 08:41:19 |
INCOMING
|
fapi1-advanced-final-ensure-signed-request-object-with-RS256-fails
Incoming HTTP request to /test/a/az-openitio/implicit/CGHQtvfaDoYFElj91Zta
|
||||||||||||||||||||
|
2022-04-11 08:41:19 |
OUTGOING
|
fapi1-advanced-final-ensure-signed-request-object-with-RS256-fails
Response to HTTP request to test instance fsl0EFNf70MFojN
|
||||||||
|
2022-04-11 08:41:19 |
SUCCESS
|
ExtractImplicitHashToCallbackResponse
implicit_hash is empty
|
|
2022-04-11 08:41:19 |
REDIRECT-IN
|
fapi1-advanced-final-ensure-signed-request-object-with-RS256-fails
Authorization endpoint response captured
|
||||||||||
|
Verify authorization endpoint response |
2022-04-11 08:41:19 | SUCCESS |
ExtractJARMFromURLQuery
Found and parsed the jarm_response from callback_query_params
|
||||||
|
2022-04-11 08:41:19 | SUCCESS |
RejectNonJarmResponsesInUrlQuery
Authorization endpoint response only includes the JARM JWT.
|
|
2022-04-11 08:41:19 |
SUCCESS
|
ExtractAuthorizationEndpointResponseFromJARMResponse
Extracted the authorization response
|
||||||||
|
2022-04-11 08:41:19 | SUCCESS |
ValidateJARMResponse
JARM response standard JWT claims are valid
|
|
2022-04-11 08:41:19 | SUCCESS |
ValidateJARMExpRecommendations
JARM response 'exp' is less than 10 minutes
|
||||
|
2022-04-11 08:41:19 | SUCCESS |
ValidateJARMSignatureUsingKid
jarm_response signature validated
|
||
|
2022-04-11 08:41:19 | SUCCESS |
RejectAuthCodeInUrlQuery
Authorization code is not present in URL query returned from authorization endpoint
|
|
2022-04-11 08:41:19 |
SUCCESS
|
CheckStateInAuthorizationResponse
State in response correctly returned
|
||
|
2022-04-11 08:41:19 | SUCCESS |
EnsureErrorFromAuthorizationEndpointResponse
Authorization endpoint returned an error
|
||||||||
|
2022-04-11 08:41:19 | SUCCESS |
CheckForUnexpectedParametersInErrorResponseFromAuthorizationEndpoint
error response includes only expected parameters
|
||||||||
|
2022-04-11 08:41:19 | SUCCESS |
EnsureInvalidRequestObjectError
Authorization endpoint returned expected 'error' of 'invalid_request_object'
|
||
|
2022-04-11 08:41:19 |
FINISHED
|
fapi1-advanced-final-ensure-signed-request-object-with-RS256-fails
Test has run to completion
|
||
|
2022-04-11 08:41:24 |
|
TEST-RUNNER
Alias has now been claimed by another test
|
||||
|