Test Summary

Test Results

Expand All Collapse All
All times are UTC
2022-05-19 13:43:14 INFO
TEST-RUNNER
Test instance SVb9ZwpADzrj7xQ created
baseUrl
https://www.certification.openid.net/test/a/keycloak
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code",
  "server_metadata": "discovery",
  "response_mode": "default",
  "client_registration": "dynamic_client"
}
alias
keycloak
description
Keycloak, OpenID Connect Core: Basic Certification Profile (server_metadata:discovery/client_registration:dynamic_client)
planId
AARDBxQWkvyJU
config
{
  "alias": "keycloak",
  "description": "Keycloak, OpenID Connect Core: Basic Certification Profile (server_metadata:discovery/client_registration:dynamic_client)",
  "server": {
    "discoveryUrl": "https://84-244-72-90.nip.io:60000/auth/realms/test/.well-known/openid-configuration",
    "login_hint": "john"
  },
  "client": {
    "client_id": "client1-oidcc-hybrid",
    "client_secret": "ulvklGmELzpZqKiISkRmberNm4als3z3"
  },
  "client_secret_post": {
    "client_id": "client1-oidcc-hybrid-client_secret_post",
    "client_secret": "4gDNjUhBkki0gSuKlxtytGCTh4UlNc45"
  },
  "client2": {
    "client_id": "client2-oidcc-hybrid",
    "client_secret": "BAfJ8ugBegJ7JWdPVjcqGNFpYfNb6euL"
  }
}
testName
oidcc-refresh-token
2022-05-19 13:43:14 SUCCESS
CreateRedirectUri
Created redirect URI
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
2022-05-19 13:43:14
GetDynamicServerConfiguration
HTTP request
request_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/.well-known/openid-configuration
request_method
GET
request_headers
{
  "accept": "text/plain, application/json, application/*+json, */*",
  "content-length": "0"
}
request_body

                                
2022-05-19 13:43:15 RESPONSE
GetDynamicServerConfiguration
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "cache-control": "no-cache, must-revalidate, no-transform, no-store",
  "x-xss-protection": "1; mode\u003dblock",
  "x-frame-options": "SAMEORIGIN",
  "referrer-policy": "no-referrer",
  "date": "Thu, 19 May 2022 13:43:15 GMT",
  "connection": "keep-alive",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "content-type": "application/json",
  "content-length": "6214"
}
response_body
{"issuer":"https://84-244-72-90.nip.io:60000/auth/realms/test","authorization_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth","token_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token","introspection_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token/introspect","userinfo_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/userinfo","end_session_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/logout","frontchannel_logout_session_supported":true,"frontchannel_logout_supported":true,"jwks_uri":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/certs","check_session_iframe":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/login-status-iframe.html","grant_types_supported":["authorization_code","implicit","refresh_token","password","client_credentials","urn:ietf:params:oauth:grant-type:device_code","urn:openid:params:grant-type:ciba"],"acr_values_supported":["0","1"],"response_types_supported":["code","none","id_token","token","id_token token","code id_token","code token","code id_token token"],"subject_types_supported":["public","pairwise"],"id_token_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512"],"id_token_encryption_alg_values_supported":["RSA-OAEP","RSA-OAEP-256","RSA1_5"],"id_token_encryption_enc_values_supported":["A256GCM","A192GCM","A128GCM","A128CBC-HS256","A192CBC-HS384","A256CBC-HS512"],"userinfo_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512","none"],"userinfo_encryption_alg_values_supported":["RSA-OAEP","RSA-OAEP-256","RSA1_5"],"userinfo_encryption_enc_values_supported":["A256GCM","A192GCM","A128GCM","A128CBC-HS256","A192CBC-HS384","A256CBC-HS512"],"request_object_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512","none"],"request_object_encryption_alg_values_supported":["RSA-OAEP","RSA-OAEP-256","RSA1_5"],"request_object_encryption_enc_values_supported":["A256GCM","A192GCM","A128GCM","A128CBC-HS256","A192CBC-HS384","A256CBC-HS512"],"response_modes_supported":["query","fragment","form_post","query.jwt","fragment.jwt","form_post.jwt","jwt"],"registration_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect","token_endpoint_auth_methods_supported":["private_key_jwt","client_secret_basic","client_secret_post","tls_client_auth","client_secret_jwt"],"token_endpoint_auth_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512"],"introspection_endpoint_auth_methods_supported":["private_key_jwt","client_secret_basic","client_secret_post","tls_client_auth","client_secret_jwt"],"introspection_endpoint_auth_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512"],"authorization_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512"],"authorization_encryption_alg_values_supported":["RSA-OAEP","RSA-OAEP-256","RSA1_5"],"authorization_encryption_enc_values_supported":["A256GCM","A192GCM","A128GCM","A128CBC-HS256","A192CBC-HS384","A256CBC-HS512"],"claims_supported":["aud","sub","iss","auth_time","name","given_name","family_name","preferred_username","email","acr"],"claim_types_supported":["normal"],"claims_parameter_supported":true,"scopes_supported":["openid","consents","name_claims","microprofile-jwt","consent:1","name_claims_for_implicit","roles","address","phone","web-origins","profile","acr","offline_access","resources","email"],"request_parameter_supported":true,"request_uri_parameter_supported":true,"require_request_uri_registration":true,"code_challenge_methods_supported":["plain","S256"],"tls_client_certificate_bound_access_tokens":true,"revocation_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/revoke","revocation_endpoint_auth_methods_supported":["private_key_jwt","client_secret_basic","client_secret_post","tls_client_auth","client_secret_jwt"],"revocation_endpoint_auth_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512"],"backchannel_logout_supported":true,"backchannel_logout_session_supported":true,"device_authorization_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth/device","backchannel_token_delivery_modes_supported":["poll","ping"],"backchannel_authentication_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/ciba/auth","backchannel_authentication_request_signing_alg_values_supported":["PS384","ES384","RS384","ES256","RS256","ES512","PS256","PS512","RS512"],"require_pushed_authorization_requests":false,"pushed_authorization_request_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/par/request","mtls_endpoint_aliases":{"token_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token","revocation_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/revoke","introspection_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token/introspect","device_authorization_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth/device","registration_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect","userinfo_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/userinfo","pushed_authorization_request_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/par/request","backchannel_authentication_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/ciba/auth"}}
2022-05-19 13:43:15 SUCCESS
GetDynamicServerConfiguration
Successfully parsed server configuration
issuer
https://84-244-72-90.nip.io:60000/auth/realms/test
authorization_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth
token_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token
introspection_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token/introspect
userinfo_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/userinfo
end_session_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/logout
frontchannel_logout_session_supported
true
frontchannel_logout_supported
true
jwks_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/certs
check_session_iframe
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/login-status-iframe.html
grant_types_supported
[
  "authorization_code",
  "implicit",
  "refresh_token",
  "password",
  "client_credentials",
  "urn:ietf:params:oauth:grant-type:device_code",
  "urn:openid:params:grant-type:ciba"
]
acr_values_supported
[
  "0",
  "1"
]
response_types_supported
[
  "code",
  "none",
  "id_token",
  "token",
  "id_token token",
  "code id_token",
  "code token",
  "code id_token token"
]
subject_types_supported
[
  "public",
  "pairwise"
]
id_token_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512"
]
id_token_encryption_alg_values_supported
[
  "RSA-OAEP",
  "RSA-OAEP-256",
  "RSA1_5"
]
id_token_encryption_enc_values_supported
[
  "A256GCM",
  "A192GCM",
  "A128GCM",
  "A128CBC-HS256",
  "A192CBC-HS384",
  "A256CBC-HS512"
]
userinfo_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512",
  "none"
]
userinfo_encryption_alg_values_supported
[
  "RSA-OAEP",
  "RSA-OAEP-256",
  "RSA1_5"
]
userinfo_encryption_enc_values_supported
[
  "A256GCM",
  "A192GCM",
  "A128GCM",
  "A128CBC-HS256",
  "A192CBC-HS384",
  "A256CBC-HS512"
]
request_object_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512",
  "none"
]
request_object_encryption_alg_values_supported
[
  "RSA-OAEP",
  "RSA-OAEP-256",
  "RSA1_5"
]
request_object_encryption_enc_values_supported
[
  "A256GCM",
  "A192GCM",
  "A128GCM",
  "A128CBC-HS256",
  "A192CBC-HS384",
  "A256CBC-HS512"
]
response_modes_supported
[
  "query",
  "fragment",
  "form_post",
  "query.jwt",
  "fragment.jwt",
  "form_post.jwt",
  "jwt"
]
registration_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect
token_endpoint_auth_methods_supported
[
  "private_key_jwt",
  "client_secret_basic",
  "client_secret_post",
  "tls_client_auth",
  "client_secret_jwt"
]
token_endpoint_auth_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512"
]
introspection_endpoint_auth_methods_supported
[
  "private_key_jwt",
  "client_secret_basic",
  "client_secret_post",
  "tls_client_auth",
  "client_secret_jwt"
]
introspection_endpoint_auth_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512"
]
authorization_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512"
]
authorization_encryption_alg_values_supported
[
  "RSA-OAEP",
  "RSA-OAEP-256",
  "RSA1_5"
]
authorization_encryption_enc_values_supported
[
  "A256GCM",
  "A192GCM",
  "A128GCM",
  "A128CBC-HS256",
  "A192CBC-HS384",
  "A256CBC-HS512"
]
claims_supported
[
  "aud",
  "sub",
  "iss",
  "auth_time",
  "name",
  "given_name",
  "family_name",
  "preferred_username",
  "email",
  "acr"
]
claim_types_supported
[
  "normal"
]
claims_parameter_supported
true
scopes_supported
[
  "openid",
  "consents",
  "name_claims",
  "microprofile-jwt",
  "consent:1",
  "name_claims_for_implicit",
  "roles",
  "address",
  "phone",
  "web-origins",
  "profile",
  "acr",
  "offline_access",
  "resources",
  "email"
]
request_parameter_supported
true
request_uri_parameter_supported
true
require_request_uri_registration
true
code_challenge_methods_supported
[
  "plain",
  "S256"
]
tls_client_certificate_bound_access_tokens
true
revocation_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/revoke
revocation_endpoint_auth_methods_supported
[
  "private_key_jwt",
  "client_secret_basic",
  "client_secret_post",
  "tls_client_auth",
  "client_secret_jwt"
]
revocation_endpoint_auth_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512"
]
backchannel_logout_supported
true
backchannel_logout_session_supported
true
device_authorization_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth/device
backchannel_token_delivery_modes_supported
[
  "poll",
  "ping"
]
backchannel_authentication_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/ciba/auth
backchannel_authentication_request_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "ES256",
  "RS256",
  "ES512",
  "PS256",
  "PS512",
  "RS512"
]
require_pushed_authorization_requests
false
pushed_authorization_request_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/par/request
mtls_endpoint_aliases
{
  "token_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token",
  "revocation_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/revoke",
  "introspection_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token/introspect",
  "device_authorization_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth/device",
  "registration_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect",
  "userinfo_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/userinfo",
  "pushed_authorization_request_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/par/request",
  "backchannel_authentication_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/ciba/auth"
}
2022-05-19 13:43:15 SUCCESS
CheckServerConfiguration
Found required server configuration keys
required
[
  "authorization_endpoint",
  "token_endpoint",
  "issuer"
]
2022-05-19 13:43:15 SUCCESS
ExtractTLSTestValuesFromServerConfiguration
Extracted TLS information from authorization server configuration
registration_endpoint
{
  "testHost": "84-244-72-90.nip.io",
  "testPort": 60000
}
authorization_endpoint
{
  "testHost": "84-244-72-90.nip.io",
  "testPort": 60000
}
token_endpoint
{
  "testHost": "84-244-72-90.nip.io",
  "testPort": 60000
}
userinfo_endpoint
{
  "testHost": "84-244-72-90.nip.io",
  "testPort": 60000
}
2022-05-19 13:43:15
FetchServerKeys
Fetching server key
jwks_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/certs
2022-05-19 13:43:15
FetchServerKeys
HTTP request
request_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/certs
request_method
GET
request_headers
{
  "accept": "text/plain, application/json, application/*+json, */*",
  "content-length": "0"
}
request_body

                                
2022-05-19 13:43:15 RESPONSE
FetchServerKeys
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "cache-control": "no-cache",
  "x-xss-protection": "1; mode\u003dblock",
  "x-frame-options": "SAMEORIGIN",
  "referrer-policy": "no-referrer",
  "date": "Thu, 19 May 2022 13:43:15 GMT",
  "connection": "keep-alive",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "content-type": "application/json",
  "content-length": "7660"
}
response_body
{"keys":[{"kid":"nVJXuV18rIhJQK_ezukCg6B6ihqd_ysVRpNmmGNIJgg","kty":"RSA","alg":"PS256","use":"enc","n":"gJeVMx_ucf4OkwPjfo3QqRVGJad4MoGX0epHfzh_9JWhetahQKvU2R8I7YnWMRmdni2ZuWVdnRDdrU83FN-RGKRq8bkV59-U9UM25mrFD-27qczX_SvipPeSJfCC8BVg6IVaG0xYVJcAJyqCczhV0p36Tv3ehLhnZA_JZYgGcQznEXRawqQMQ1hKLC-cbQdXbcuzlKB-jGKUvNOPrRWkFYbcbbPMqeqv60TtQL--9X0rFxySfGbUVTDENmsJUaS5vs-cHEyst-UX6Y-lmCoTA0LZsOaH608POFmeaVB7ZmDdeGCHS_H4BCbQS7p_vI67i-IH8L5qrr_TZGabii1Ggw","e":"AQAB","x5c":["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"],"x5t":"nsamQNPuXTrs2Bh2mhtQ1p-Cs-M","x5t#S256":"g1XbSXBmnrd0nphVoyIfkix50Nsr0HqrJAvypgOzBq0"},{"kid":"a91iq85i0CF0ltgMw4EBQ0_y5kYCAtEFXQL_kbTulA0","kty":"EC","alg":"ES256","use":"sig","crv":"P-256","x":"to_LaMDcALkQvaelmWtIn2iyJEKooTbOZxp7KIC74Kg","y":"NVQw_Pya5rmgKM0JLra_IRN-t0O1fUWfrnJrOX8yZn0"},{"kid":"Mb20UGZj81X9UGbs0uReFcFlUV81vJRDYFPclWBv9GY","kty":"RSA","alg":"RS256","use":"sig","n":"juc0_frkLlvtC1Lf_WDb7tkbMmaBS6c0hN0Hl6dbmbgAHqrF39LLKrMokaIafSRKA9kuMOx1W4j-uPm4OpUDYArq7boa2a064j3e4JvAR8BOU2Kz5nDtKXSDDiSQLqa-ZEaHbji879SG0IA_tp_nNiX8EV_BR7CsjjbyaqI9hwzHXsai_o6dAzCa1mbCPFYAQH66m-4xk0AgysRowupKa2yyjFiAtCfw0vI3DJUSzQ1S3OlFZwqUP0U09TOnwh5EP0zAapbW_8J9InF_TAl5q-nUY8HPqtMjgQvTcaCgJ3wntdWrdXR9OrlJ29Zdf1D5Tqi0UCTh3GaOm3lxTFNyJQ","e":"AQAB","x5c":["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"],"x5t":"c5AzQajNLbmncxy7N3Q0uDQm_Xg","x5t#S256":"cQJC3_ilcCLSX2saHq-o1pQaZ0x3KdyxP7crW68ypjc"},{"kid":"iM1idlnX7sRsh3lBqliOt7ENVX1cWkimfTpsfWgYG9k","kty":"RSA","alg":"PS256","use":"sig","n":"ly8t1-qtzaC4RM0-glXufIilNOX8y3-ct_veSR7dHYeyc27-y6aEIckzmtRzGRERaJ6Ux4FVxOZ2Sx2TsuuOk2IH2oCKyCa41fusaRr8yhxGpO2xnv_z_8WC1ELcAS2vvwF-xUNpZLLgdC3k_jFZcnVLDBgKc_A1gZPc1gfyPnhpd_bMxq3OAzKyER-hVVH7HZHo-4qXl_c117u7hOhg6vt3OSklWe4xdHq43Bq72Zb5kVcNAmopHCN5Ri8riSo6iuhx-I-TQG1pmnzYlZAir6vcA-P65berb-nH7IgGToqnU2diLDFsAWAn7LxVYnR2K9WCNL9rBIw5RcCNcdm5ww","e":"AQAB","x5c":["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"],"x5t":"Lm8DzD2yYGlll-4mb0CSlyc0vFY","x5t#S256":"auer9itHtTEkwScExvyYbSFQxh5twqG_ViJra5YBgN4"},{"kid":"zfx31Yr_QijkHreEgzJJmgDt3vpNJw-3UYDHWDL832s","kty":"EC","alg":"ES256","use":"sig","crv":"P-256","x":"kXozRF_AaHf2kBa_0_FJPJVO0NFfHBvA4UE7eE6YYMA","y":"1i7kcT1H0Zb9v_F8XE17tVeBzb2vgThwKWaZcD1lhk4"},{"kid":"43WiDgKXF75uxXjFBcTz5rhUD2FJsRmE_YViw3iaJxE","kty":"RSA","alg":"RS256","use":"sig","n":"2trCYBvZGDi8xlH8EAB04AEBhyUpBK9pXS-hv9ALOuZ6vPYcEdzNVdrwgXKMIPUJlR3HWjb7BsPUNQBekI8aAAoy1WIreP6CkRYPZLS7jKNAKBFYrxNCIptP0aTw-M1MC47d6Unz5x_25i8UZH4uQZiDWRODsqzcvBYYzrP_FhuagI2_pKmkWq73jDsF5T_m13JCwz_OIPL2JpCalPAKihz-7b9QdDr9V_cutP7ymSoTuZLY7gKYFdblZm26SAMGhm9rHVuLaFGobis9ggOdbOsD-4cn82s-q88mKDb7eZ9nmFGZfqTCnvksDOiEjZIycY8p8MnWSYVdyTokyGZSkQ","e":"AQAB","x5c":["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"],"x5t":"075PkNdlE5gbAn1w6OfLONGc7Fw","x5t#S256":"UZRPmtRfCvrCxcRt2M9kR2XFUjwqfJGSBgljPT5wDPI"},{"kid":"oscahzKbEkdWp4Z4gGCNMVm8pjwpj0q2AAQ0ZIn9y1U","kty":"RSA","alg":"PS256","use":"sig","n":"itV4oDZRs9Tc6cXuPtFiUuQ2jUA7Jhg2Xk3XpMDgWfYxQbmYslKS28NjfDmmbvypaiCH9TzQlgaBAvvCl62gNA73TaVGv7uKDIge6vL_g4dwaZsapkxc4Ao36tOsU4w8QQC4pZDh9xCzoqYemvQUuVGh_rSqVUoHhcEzd3_-NGEhamiuNDxrJftHkfMf_GHi05edeN5FHT9ZJrxpcsAXY7fz3SmGI-wiVB9CgErKuaH91SBrReDvY6rnK7fxcGZKgnd0ACbvDUDruNh7R2wvrJT7pTEHSre-ulehLPKNOGOX49jlPEn8CZEFTO6wi-9aK97Cyyg7ZG3uPIfrS-PrDw","e":"AQAB","x5c":["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"],"x5t":"YQwHgxOXWi4PkD6oVDUcZ6sxSL0","x5t#S256":"8XdoYM7hypH7yGcAZsCbu4QkH73aBPsuImUnnn_Q6kU"}]}
2022-05-19 13:43:15
FetchServerKeys
Found JWK set string
jwk_string
{"keys":[{"kid":"nVJXuV18rIhJQK_ezukCg6B6ihqd_ysVRpNmmGNIJgg","kty":"RSA","alg":"PS256","use":"enc","n":"gJeVMx_ucf4OkwPjfo3QqRVGJad4MoGX0epHfzh_9JWhetahQKvU2R8I7YnWMRmdni2ZuWVdnRDdrU83FN-RGKRq8bkV59-U9UM25mrFD-27qczX_SvipPeSJfCC8BVg6IVaG0xYVJcAJyqCczhV0p36Tv3ehLhnZA_JZYgGcQznEXRawqQMQ1hKLC-cbQdXbcuzlKB-jGKUvNOPrRWkFYbcbbPMqeqv60TtQL--9X0rFxySfGbUVTDENmsJUaS5vs-cHEyst-UX6Y-lmCoTA0LZsOaH608POFmeaVB7ZmDdeGCHS_H4BCbQS7p_vI67i-IH8L5qrr_TZGabii1Ggw","e":"AQAB","x5c":["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"],"x5t":"nsamQNPuXTrs2Bh2mhtQ1p-Cs-M","x5t#S256":"g1XbSXBmnrd0nphVoyIfkix50Nsr0HqrJAvypgOzBq0"},{"kid":"a91iq85i0CF0ltgMw4EBQ0_y5kYCAtEFXQL_kbTulA0","kty":"EC","alg":"ES256","use":"sig","crv":"P-256","x":"to_LaMDcALkQvaelmWtIn2iyJEKooTbOZxp7KIC74Kg","y":"NVQw_Pya5rmgKM0JLra_IRN-t0O1fUWfrnJrOX8yZn0"},{"kid":"Mb20UGZj81X9UGbs0uReFcFlUV81vJRDYFPclWBv9GY","kty":"RSA","alg":"RS256","use":"sig","n":"juc0_frkLlvtC1Lf_WDb7tkbMmaBS6c0hN0Hl6dbmbgAHqrF39LLKrMokaIafSRKA9kuMOx1W4j-uPm4OpUDYArq7boa2a064j3e4JvAR8BOU2Kz5nDtKXSDDiSQLqa-ZEaHbji879SG0IA_tp_nNiX8EV_BR7CsjjbyaqI9hwzHXsai_o6dAzCa1mbCPFYAQH66m-4xk0AgysRowupKa2yyjFiAtCfw0vI3DJUSzQ1S3OlFZwqUP0U09TOnwh5EP0zAapbW_8J9InF_TAl5q-nUY8HPqtMjgQvTcaCgJ3wntdWrdXR9OrlJ29Zdf1D5Tqi0UCTh3GaOm3lxTFNyJQ","e":"AQAB","x5c":["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"],"x5t":"c5AzQajNLbmncxy7N3Q0uDQm_Xg","x5t#S256":"cQJC3_ilcCLSX2saHq-o1pQaZ0x3KdyxP7crW68ypjc"},{"kid":"iM1idlnX7sRsh3lBqliOt7ENVX1cWkimfTpsfWgYG9k","kty":"RSA","alg":"PS256","use":"sig","n":"ly8t1-qtzaC4RM0-glXufIilNOX8y3-ct_veSR7dHYeyc27-y6aEIckzmtRzGRERaJ6Ux4FVxOZ2Sx2TsuuOk2IH2oCKyCa41fusaRr8yhxGpO2xnv_z_8WC1ELcAS2vvwF-xUNpZLLgdC3k_jFZcnVLDBgKc_A1gZPc1gfyPnhpd_bMxq3OAzKyER-hVVH7HZHo-4qXl_c117u7hOhg6vt3OSklWe4xdHq43Bq72Zb5kVcNAmopHCN5Ri8riSo6iuhx-I-TQG1pmnzYlZAir6vcA-P65berb-nH7IgGToqnU2diLDFsAWAn7LxVYnR2K9WCNL9rBIw5RcCNcdm5ww","e":"AQAB","x5c":["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"],"x5t":"Lm8DzD2yYGlll-4mb0CSlyc0vFY","x5t#S256":"auer9itHtTEkwScExvyYbSFQxh5twqG_ViJra5YBgN4"},{"kid":"zfx31Yr_QijkHreEgzJJmgDt3vpNJw-3UYDHWDL832s","kty":"EC","alg":"ES256","use":"sig","crv":"P-256","x":"kXozRF_AaHf2kBa_0_FJPJVO0NFfHBvA4UE7eE6YYMA","y":"1i7kcT1H0Zb9v_F8XE17tVeBzb2vgThwKWaZcD1lhk4"},{"kid":"43WiDgKXF75uxXjFBcTz5rhUD2FJsRmE_YViw3iaJxE","kty":"RSA","alg":"RS256","use":"sig","n":"2trCYBvZGDi8xlH8EAB04AEBhyUpBK9pXS-hv9ALOuZ6vPYcEdzNVdrwgXKMIPUJlR3HWjb7BsPUNQBekI8aAAoy1WIreP6CkRYPZLS7jKNAKBFYrxNCIptP0aTw-M1MC47d6Unz5x_25i8UZH4uQZiDWRODsqzcvBYYzrP_FhuagI2_pKmkWq73jDsF5T_m13JCwz_OIPL2JpCalPAKihz-7b9QdDr9V_cutP7ymSoTuZLY7gKYFdblZm26SAMGhm9rHVuLaFGobis9ggOdbOsD-4cn82s-q88mKDb7eZ9nmFGZfqTCnvksDOiEjZIycY8p8MnWSYVdyTokyGZSkQ","e":"AQAB","x5c":["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"],"x5t":"075PkNdlE5gbAn1w6OfLONGc7Fw","x5t#S256":"UZRPmtRfCvrCxcRt2M9kR2XFUjwqfJGSBgljPT5wDPI"},{"kid":"oscahzKbEkdWp4Z4gGCNMVm8pjwpj0q2AAQ0ZIn9y1U","kty":"RSA","alg":"PS256","use":"sig","n":"itV4oDZRs9Tc6cXuPtFiUuQ2jUA7Jhg2Xk3XpMDgWfYxQbmYslKS28NjfDmmbvypaiCH9TzQlgaBAvvCl62gNA73TaVGv7uKDIge6vL_g4dwaZsapkxc4Ao36tOsU4w8QQC4pZDh9xCzoqYemvQUuVGh_rSqVUoHhcEzd3_-NGEhamiuNDxrJftHkfMf_GHi05edeN5FHT9ZJrxpcsAXY7fz3SmGI-wiVB9CgErKuaH91SBrReDvY6rnK7fxcGZKgnd0ACbvDUDruNh7R2wvrJT7pTEHSre-ulehLPKNOGOX49jlPEn8CZEFTO6wi-9aK97Cyyg7ZG3uPIfrS-PrDw","e":"AQAB","x5c":["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"],"x5t":"YQwHgxOXWi4PkD6oVDUcZ6sxSL0","x5t#S256":"8XdoYM7hypH7yGcAZsCbu4QkH73aBPsuImUnnn_Q6kU"}]}
2022-05-19 13:43:15 SUCCESS
FetchServerKeys
Found server JWK set
server_jwks
{
  "keys": [
    {
      "kid": "nVJXuV18rIhJQK_ezukCg6B6ihqd_ysVRpNmmGNIJgg",
      "kty": "RSA",
      "alg": "PS256",
      "use": "enc",
      "n": "gJeVMx_ucf4OkwPjfo3QqRVGJad4MoGX0epHfzh_9JWhetahQKvU2R8I7YnWMRmdni2ZuWVdnRDdrU83FN-RGKRq8bkV59-U9UM25mrFD-27qczX_SvipPeSJfCC8BVg6IVaG0xYVJcAJyqCczhV0p36Tv3ehLhnZA_JZYgGcQznEXRawqQMQ1hKLC-cbQdXbcuzlKB-jGKUvNOPrRWkFYbcbbPMqeqv60TtQL--9X0rFxySfGbUVTDENmsJUaS5vs-cHEyst-UX6Y-lmCoTA0LZsOaH608POFmeaVB7ZmDdeGCHS_H4BCbQS7p_vI67i-IH8L5qrr_TZGabii1Ggw",
      "e": "AQAB",
      "x5c": [
        "MIIClzCCAX8CBgGAzCPyBjANBgkqhkiG9w0BAQsFADAPMQ0wCwYDVQQDDAR0ZXN0MB4XDTIyMDUxNjA5MTA0OVoXDTMyMDUxNjA5MTIyOVowDzENMAsGA1UEAwwEdGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAICXlTMf7nH+DpMD436N0KkVRiWneDKBl9HqR384f/SVoXrWoUCr1NkfCO2J1jEZnZ4tmbllXZ0Q3a1PNxTfkRikavG5FefflPVDNuZqxQ/tu6nM1/0r4qT3kiXwgvAVYOiFWhtMWFSXACcqgnM4VdKd+k793oS4Z2QPyWWIBnEM5xF0WsKkDENYSiwvnG0HV23Ls5SgfoxilLzTj60VpBWG3G2zzKnqr+tE7UC/vvV9Kxccknxm1FUwxDZrCVGkub7PnBxMrLflF+mPpZgqEwNC2bDmh+tPDzhZnmlQe2Zg3Xhgh0vx+AQm0Eu6f7yOu4viB/C+aq6/02Rmm4otRoMCAwEAATANBgkqhkiG9w0BAQsFAAOCAQEAJGENeCNqIbHidimks6k9WRJaYYP0n5cRFcxh2EKKwgOJqaHJ3oaeWJ97owND+S7wl6VZLKebb6BPwaKoedtkPgSh/H4wYBW5u5reE/GkU1M7T37Zn1Xs6jsLDISJWWxDn8k+hTeAi08P0Qoymq8WnDbKplbjiPbKTtDDqEcBsXvwRHkPUrBFKzlSapWWSIspqcHwpFklfYKm9JCC6JtFdw/lCyd/0u+x/dQ/ZNhYx9WUOUtLtnqFxkWWuydQ0z6hOkfUDUokH5FhjdvfYJk8Nw82VuTm3ly3HEv59HbjOxnobzDM0pnqJfiYWRNcfJ480b55sdzMF1604bk//h0oVQ\u003d\u003d"
      ],
      "x5t": "nsamQNPuXTrs2Bh2mhtQ1p-Cs-M",
      "x5t#S256": "g1XbSXBmnrd0nphVoyIfkix50Nsr0HqrJAvypgOzBq0"
    },
    {
      "kid": "a91iq85i0CF0ltgMw4EBQ0_y5kYCAtEFXQL_kbTulA0",
      "kty": "EC",
      "alg": "ES256",
      "use": "sig",
      "crv": "P-256",
      "x": "to_LaMDcALkQvaelmWtIn2iyJEKooTbOZxp7KIC74Kg",
      "y": "NVQw_Pya5rmgKM0JLra_IRN-t0O1fUWfrnJrOX8yZn0"
    },
    {
      "kid": "Mb20UGZj81X9UGbs0uReFcFlUV81vJRDYFPclWBv9GY",
      "kty": "RSA",
      "alg": "RS256",
      "use": "sig",
      "n": "juc0_frkLlvtC1Lf_WDb7tkbMmaBS6c0hN0Hl6dbmbgAHqrF39LLKrMokaIafSRKA9kuMOx1W4j-uPm4OpUDYArq7boa2a064j3e4JvAR8BOU2Kz5nDtKXSDDiSQLqa-ZEaHbji879SG0IA_tp_nNiX8EV_BR7CsjjbyaqI9hwzHXsai_o6dAzCa1mbCPFYAQH66m-4xk0AgysRowupKa2yyjFiAtCfw0vI3DJUSzQ1S3OlFZwqUP0U09TOnwh5EP0zAapbW_8J9InF_TAl5q-nUY8HPqtMjgQvTcaCgJ3wntdWrdXR9OrlJ29Zdf1D5Tqi0UCTh3GaOm3lxTFNyJQ",
      "e": "AQAB",
      "x5c": [
        "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\u003d\u003d"
      ],
      "x5t": "c5AzQajNLbmncxy7N3Q0uDQm_Xg",
      "x5t#S256": "cQJC3_ilcCLSX2saHq-o1pQaZ0x3KdyxP7crW68ypjc"
    },
    {
      "kid": "iM1idlnX7sRsh3lBqliOt7ENVX1cWkimfTpsfWgYG9k",
      "kty": "RSA",
      "alg": "PS256",
      "use": "sig",
      "n": "ly8t1-qtzaC4RM0-glXufIilNOX8y3-ct_veSR7dHYeyc27-y6aEIckzmtRzGRERaJ6Ux4FVxOZ2Sx2TsuuOk2IH2oCKyCa41fusaRr8yhxGpO2xnv_z_8WC1ELcAS2vvwF-xUNpZLLgdC3k_jFZcnVLDBgKc_A1gZPc1gfyPnhpd_bMxq3OAzKyER-hVVH7HZHo-4qXl_c117u7hOhg6vt3OSklWe4xdHq43Bq72Zb5kVcNAmopHCN5Ri8riSo6iuhx-I-TQG1pmnzYlZAir6vcA-P65berb-nH7IgGToqnU2diLDFsAWAn7LxVYnR2K9WCNL9rBIw5RcCNcdm5ww",
      "e": "AQAB",
      "x5c": [
        "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\u003d\u003d"
      ],
      "x5t": "Lm8DzD2yYGlll-4mb0CSlyc0vFY",
      "x5t#S256": "auer9itHtTEkwScExvyYbSFQxh5twqG_ViJra5YBgN4"
    },
    {
      "kid": "zfx31Yr_QijkHreEgzJJmgDt3vpNJw-3UYDHWDL832s",
      "kty": "EC",
      "alg": "ES256",
      "use": "sig",
      "crv": "P-256",
      "x": "kXozRF_AaHf2kBa_0_FJPJVO0NFfHBvA4UE7eE6YYMA",
      "y": "1i7kcT1H0Zb9v_F8XE17tVeBzb2vgThwKWaZcD1lhk4"
    },
    {
      "kid": "43WiDgKXF75uxXjFBcTz5rhUD2FJsRmE_YViw3iaJxE",
      "kty": "RSA",
      "alg": "RS256",
      "use": "sig",
      "n": "2trCYBvZGDi8xlH8EAB04AEBhyUpBK9pXS-hv9ALOuZ6vPYcEdzNVdrwgXKMIPUJlR3HWjb7BsPUNQBekI8aAAoy1WIreP6CkRYPZLS7jKNAKBFYrxNCIptP0aTw-M1MC47d6Unz5x_25i8UZH4uQZiDWRODsqzcvBYYzrP_FhuagI2_pKmkWq73jDsF5T_m13JCwz_OIPL2JpCalPAKihz-7b9QdDr9V_cutP7ymSoTuZLY7gKYFdblZm26SAMGhm9rHVuLaFGobis9ggOdbOsD-4cn82s-q88mKDb7eZ9nmFGZfqTCnvksDOiEjZIycY8p8MnWSYVdyTokyGZSkQ",
      "e": "AQAB",
      "x5c": [
        "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\u003d\u003d"
      ],
      "x5t": "075PkNdlE5gbAn1w6OfLONGc7Fw",
      "x5t#S256": "UZRPmtRfCvrCxcRt2M9kR2XFUjwqfJGSBgljPT5wDPI"
    },
    {
      "kid": "oscahzKbEkdWp4Z4gGCNMVm8pjwpj0q2AAQ0ZIn9y1U",
      "kty": "RSA",
      "alg": "PS256",
      "use": "sig",
      "n": "itV4oDZRs9Tc6cXuPtFiUuQ2jUA7Jhg2Xk3XpMDgWfYxQbmYslKS28NjfDmmbvypaiCH9TzQlgaBAvvCl62gNA73TaVGv7uKDIge6vL_g4dwaZsapkxc4Ao36tOsU4w8QQC4pZDh9xCzoqYemvQUuVGh_rSqVUoHhcEzd3_-NGEhamiuNDxrJftHkfMf_GHi05edeN5FHT9ZJrxpcsAXY7fz3SmGI-wiVB9CgErKuaH91SBrReDvY6rnK7fxcGZKgnd0ACbvDUDruNh7R2wvrJT7pTEHSre-ulehLPKNOGOX49jlPEn8CZEFTO6wi-9aK97Cyyg7ZG3uPIfrS-PrDw",
      "e": "AQAB",
      "x5c": [
        "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\u003d\u003d"
      ],
      "x5t": "YQwHgxOXWi4PkD6oVDUcZ6sxSL0",
      "x5t#S256": "8XdoYM7hypH7yGcAZsCbu4QkH73aBPsuImUnnn_Q6kU"
    }
  ]
}
2022-05-19 13:43:15 SUCCESS
CheckServerKeysIsValid
Server JWKs is valid
server_jwks
{
  "keys": [
    {
      "kid": "nVJXuV18rIhJQK_ezukCg6B6ihqd_ysVRpNmmGNIJgg",
      "kty": "RSA",
      "alg": "PS256",
      "use": "enc",
      "n": "gJeVMx_ucf4OkwPjfo3QqRVGJad4MoGX0epHfzh_9JWhetahQKvU2R8I7YnWMRmdni2ZuWVdnRDdrU83FN-RGKRq8bkV59-U9UM25mrFD-27qczX_SvipPeSJfCC8BVg6IVaG0xYVJcAJyqCczhV0p36Tv3ehLhnZA_JZYgGcQznEXRawqQMQ1hKLC-cbQdXbcuzlKB-jGKUvNOPrRWkFYbcbbPMqeqv60TtQL--9X0rFxySfGbUVTDENmsJUaS5vs-cHEyst-UX6Y-lmCoTA0LZsOaH608POFmeaVB7ZmDdeGCHS_H4BCbQS7p_vI67i-IH8L5qrr_TZGabii1Ggw",
      "e": "AQAB",
      "x5c": [
        "MIIClzCCAX8CBgGAzCPyBjANBgkqhkiG9w0BAQsFADAPMQ0wCwYDVQQDDAR0ZXN0MB4XDTIyMDUxNjA5MTA0OVoXDTMyMDUxNjA5MTIyOVowDzENMAsGA1UEAwwEdGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAICXlTMf7nH+DpMD436N0KkVRiWneDKBl9HqR384f/SVoXrWoUCr1NkfCO2J1jEZnZ4tmbllXZ0Q3a1PNxTfkRikavG5FefflPVDNuZqxQ/tu6nM1/0r4qT3kiXwgvAVYOiFWhtMWFSXACcqgnM4VdKd+k793oS4Z2QPyWWIBnEM5xF0WsKkDENYSiwvnG0HV23Ls5SgfoxilLzTj60VpBWG3G2zzKnqr+tE7UC/vvV9Kxccknxm1FUwxDZrCVGkub7PnBxMrLflF+mPpZgqEwNC2bDmh+tPDzhZnmlQe2Zg3Xhgh0vx+AQm0Eu6f7yOu4viB/C+aq6/02Rmm4otRoMCAwEAATANBgkqhkiG9w0BAQsFAAOCAQEAJGENeCNqIbHidimks6k9WRJaYYP0n5cRFcxh2EKKwgOJqaHJ3oaeWJ97owND+S7wl6VZLKebb6BPwaKoedtkPgSh/H4wYBW5u5reE/GkU1M7T37Zn1Xs6jsLDISJWWxDn8k+hTeAi08P0Qoymq8WnDbKplbjiPbKTtDDqEcBsXvwRHkPUrBFKzlSapWWSIspqcHwpFklfYKm9JCC6JtFdw/lCyd/0u+x/dQ/ZNhYx9WUOUtLtnqFxkWWuydQ0z6hOkfUDUokH5FhjdvfYJk8Nw82VuTm3ly3HEv59HbjOxnobzDM0pnqJfiYWRNcfJ480b55sdzMF1604bk//h0oVQ\u003d\u003d"
      ],
      "x5t": "nsamQNPuXTrs2Bh2mhtQ1p-Cs-M",
      "x5t#S256": "g1XbSXBmnrd0nphVoyIfkix50Nsr0HqrJAvypgOzBq0"
    },
    {
      "kid": "a91iq85i0CF0ltgMw4EBQ0_y5kYCAtEFXQL_kbTulA0",
      "kty": "EC",
      "alg": "ES256",
      "use": "sig",
      "crv": "P-256",
      "x": "to_LaMDcALkQvaelmWtIn2iyJEKooTbOZxp7KIC74Kg",
      "y": "NVQw_Pya5rmgKM0JLra_IRN-t0O1fUWfrnJrOX8yZn0"
    },
    {
      "kid": "Mb20UGZj81X9UGbs0uReFcFlUV81vJRDYFPclWBv9GY",
      "kty": "RSA",
      "alg": "RS256",
      "use": "sig",
      "n": "juc0_frkLlvtC1Lf_WDb7tkbMmaBS6c0hN0Hl6dbmbgAHqrF39LLKrMokaIafSRKA9kuMOx1W4j-uPm4OpUDYArq7boa2a064j3e4JvAR8BOU2Kz5nDtKXSDDiSQLqa-ZEaHbji879SG0IA_tp_nNiX8EV_BR7CsjjbyaqI9hwzHXsai_o6dAzCa1mbCPFYAQH66m-4xk0AgysRowupKa2yyjFiAtCfw0vI3DJUSzQ1S3OlFZwqUP0U09TOnwh5EP0zAapbW_8J9InF_TAl5q-nUY8HPqtMjgQvTcaCgJ3wntdWrdXR9OrlJ29Zdf1D5Tqi0UCTh3GaOm3lxTFNyJQ",
      "e": "AQAB",
      "x5c": [
        "MIIClzCCAX8CBgGA3HI4LjANBgkqhkiG9w0BAQsFADAPMQ0wCwYDVQQDDAR0ZXN0MB4XDTIyMDUxOTEzMTAxNFoXDTMyMDUxOTEzMTE1NFowDzENMAsGA1UEAwwEdGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAI7nNP365C5b7QtS3/1g2+7ZGzJmgUunNITdB5enW5m4AB6qxd/SyyqzKJGiGn0kSgPZLjDsdVuI/rj5uDqVA2AK6u26GtmtOuI93uCbwEfATlNis+Zw7Sl0gw4kkC6mvmRGh244vO/UhtCAP7af5zYl/BFfwUewrI428mqiPYcMx17Gov6OnQMwmtZmwjxWAEB+upvuMZNAIMrEaMLqSmtssoxYgLQn8NLyNwyVEs0NUtzpRWcKlD9FNPUzp8IeRD9MwGqW1v/CfSJxf0wJeavp1GPBz6rTI4EL03GgoCd8J7XVq3V0fTq5SdvWXX9Q+U6otFAk4dxmjpt5cUxTciUCAwEAATANBgkqhkiG9w0BAQsFAAOCAQEALyN8EuuwKeJYqgzbM99mmGM2IixxbTDzFaBhrr2EK6s9vGEGZ/p7G4PYodMenADyVUAIa/9Vfr+dFJMy66mIB/tl2Fq9ES67YtMeo/W3ikS861uZjmshIrM1+w/jmXRkhmU+QgPWZv/tEqm6mmYCCGRV0W4rkkqbsbmGLUxlAsYBvie/jblVPUhnCBati1i5vYEpa7YIkQAVRFSA60u2mcQVcA/C1TvP/wjyfWqn3zbuPVXFxIkLt7JDfWDNxiLv9//hnRKqrxmrwKcT+Suuznn2zooAFM+WbAjAuaq176G4ocwWfMDN7H+r0SF8XqNBO9i0BdY/jxK3SOws9bVP/A\u003d\u003d"
      ],
      "x5t": "c5AzQajNLbmncxy7N3Q0uDQm_Xg",
      "x5t#S256": "cQJC3_ilcCLSX2saHq-o1pQaZ0x3KdyxP7crW68ypjc"
    },
    {
      "kid": "iM1idlnX7sRsh3lBqliOt7ENVX1cWkimfTpsfWgYG9k",
      "kty": "RSA",
      "alg": "PS256",
      "use": "sig",
      "n": "ly8t1-qtzaC4RM0-glXufIilNOX8y3-ct_veSR7dHYeyc27-y6aEIckzmtRzGRERaJ6Ux4FVxOZ2Sx2TsuuOk2IH2oCKyCa41fusaRr8yhxGpO2xnv_z_8WC1ELcAS2vvwF-xUNpZLLgdC3k_jFZcnVLDBgKc_A1gZPc1gfyPnhpd_bMxq3OAzKyER-hVVH7HZHo-4qXl_c117u7hOhg6vt3OSklWe4xdHq43Bq72Zb5kVcNAmopHCN5Ri8riSo6iuhx-I-TQG1pmnzYlZAir6vcA-P65berb-nH7IgGToqnU2diLDFsAWAn7LxVYnR2K9WCNL9rBIw5RcCNcdm5ww",
      "e": "AQAB",
      "x5c": [
        "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\u003d\u003d"
      ],
      "x5t": "Lm8DzD2yYGlll-4mb0CSlyc0vFY",
      "x5t#S256": "auer9itHtTEkwScExvyYbSFQxh5twqG_ViJra5YBgN4"
    },
    {
      "kid": "zfx31Yr_QijkHreEgzJJmgDt3vpNJw-3UYDHWDL832s",
      "kty": "EC",
      "alg": "ES256",
      "use": "sig",
      "crv": "P-256",
      "x": "kXozRF_AaHf2kBa_0_FJPJVO0NFfHBvA4UE7eE6YYMA",
      "y": "1i7kcT1H0Zb9v_F8XE17tVeBzb2vgThwKWaZcD1lhk4"
    },
    {
      "kid": "43WiDgKXF75uxXjFBcTz5rhUD2FJsRmE_YViw3iaJxE",
      "kty": "RSA",
      "alg": "RS256",
      "use": "sig",
      "n": "2trCYBvZGDi8xlH8EAB04AEBhyUpBK9pXS-hv9ALOuZ6vPYcEdzNVdrwgXKMIPUJlR3HWjb7BsPUNQBekI8aAAoy1WIreP6CkRYPZLS7jKNAKBFYrxNCIptP0aTw-M1MC47d6Unz5x_25i8UZH4uQZiDWRODsqzcvBYYzrP_FhuagI2_pKmkWq73jDsF5T_m13JCwz_OIPL2JpCalPAKihz-7b9QdDr9V_cutP7ymSoTuZLY7gKYFdblZm26SAMGhm9rHVuLaFGobis9ggOdbOsD-4cn82s-q88mKDb7eZ9nmFGZfqTCnvksDOiEjZIycY8p8MnWSYVdyTokyGZSkQ",
      "e": "AQAB",
      "x5c": [
        "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\u003d\u003d"
      ],
      "x5t": "075PkNdlE5gbAn1w6OfLONGc7Fw",
      "x5t#S256": "UZRPmtRfCvrCxcRt2M9kR2XFUjwqfJGSBgljPT5wDPI"
    },
    {
      "kid": "oscahzKbEkdWp4Z4gGCNMVm8pjwpj0q2AAQ0ZIn9y1U",
      "kty": "RSA",
      "alg": "PS256",
      "use": "sig",
      "n": "itV4oDZRs9Tc6cXuPtFiUuQ2jUA7Jhg2Xk3XpMDgWfYxQbmYslKS28NjfDmmbvypaiCH9TzQlgaBAvvCl62gNA73TaVGv7uKDIge6vL_g4dwaZsapkxc4Ao36tOsU4w8QQC4pZDh9xCzoqYemvQUuVGh_rSqVUoHhcEzd3_-NGEhamiuNDxrJftHkfMf_GHi05edeN5FHT9ZJrxpcsAXY7fz3SmGI-wiVB9CgErKuaH91SBrReDvY6rnK7fxcGZKgnd0ACbvDUDruNh7R2wvrJT7pTEHSre-ulehLPKNOGOX49jlPEn8CZEFTO6wi-9aK97Cyyg7ZG3uPIfrS-PrDw",
      "e": "AQAB",
      "x5c": [
        "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\u003d\u003d"
      ],
      "x5t": "YQwHgxOXWi4PkD6oVDUcZ6sxSL0",
      "x5t#S256": "8XdoYM7hypH7yGcAZsCbu4QkH73aBPsuImUnnn_Q6kU"
    }
  ]
}
2022-05-19 13:43:15 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2022-05-19 13:43:15 SUCCESS
CheckForKeyIdInServerJWKs
All keys contain kids
2022-05-19 13:43:15 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2022-05-19 13:43:15 SUCCESS
EnsureServerJwksDoesNotContainPrivateOrSymmetricKeys
Jwks does not contain any private or symmetric keys
2022-05-19 13:43:15
StoreOriginalClientConfiguration
Created original_client_config object from the client configuration.
client_id
client1-oidcc-hybrid
client_secret
ulvklGmELzpZqKiISkRmberNm4als3z3
2022-05-19 13:43:15
ExtractClientNameFromStoredConfig
Extracted client_name from stored client configuration.
client_name
2022-05-19 13:43:16 SUCCESS
GenerateRS256ClientJWKs
Generated client JWKs
client_jwks
{
  "keys": [
    {
      "p": "9Ajd_V-8XrHTRY3_YGOo7j8jmWQFxf7RUYAmBbj3WxU3o1EY9SFlpfRbmI-xAJbYYjAPI4kh02iqlfpnwmLVvAIw8y1-0fvESR_V0AEe4_jqQtI6_Le-IxQneiuKpLqm7BC0cIBWmBKw65iA-LPCCQn9RXtul3y3nGRtKnpOffM",
      "kty": "RSA",
      "q": "ynhC40aRd-9f-6z7hmYtpWB5mOuj9-zfFdMYJ5T4a30aPC_--lcCkLpQBkLAS26BI0m3Ip-BNqz1Cu8ivBTkytJuXqg5M_qjQmZj8LLpTfmeuazS3ISX2AklqBnqA7kAC_tCjk1HjHcgvvgPjhZmxZcf2QAGTz4eGU8K7DpRrnc",
      "d": "IWw8JoJ5xNJtifbLzl5E_nnfRkkhzwie8c0mkUgSDtkPXDME_jKr82DHVOIVx9ppKGiUDo6j3ZJ0kzpMzkCVCF1Otid-Tw-box-s0rp5A-IYQB_m-Hz7Ci9gyDKyJ-_UZWSKFYdQF6LjXWLg_uEo3Ugz7N5YR3_XafYrOun8IgUZYxaZPSO3C30rffzKAq_1OVTlM6iLoh2NurBcrw17qWlQwOdDnhM60gFwVvQxGlx8RtzELQzYolZyU6gHDbPOCKv07mliTVaF46fwKz5hp_E4DQg4uJ0BIzfP4jND36kYU6vsAzJTNLtM7DKUNR1brgO3T2vDaHh1wSJLJTa7fQ",
      "e": "AQAB",
      "use": "sig",
      "qi": "ZyTxN9g2Dhd7Ev7aHiJ0BCCV7F83W_FH_z3a4l48N88rCIOk_MRX27IEZPcjjWZxBcC3Hzwr7zh__mBrE8Bzu8BdGvWYDwEgoMienLsALReDhBa8Wj1WMe1uO2iQXOzLVSS_zNpfg70NvCAq_GLywMKu2nN8Vfjhac5TlbEvERs",
      "dp": "2CYCeioR7s4TE8hyKi4bsuq53WN6uaS6QjX_d5Idhc-FOGLceELcheGqP7cGUD9L6awnvJH6JAbREYZ54PMp3R0TvlDNw6_8a8iG2XYkpkgTNpx_Itic0PVJAi0O4FlzACTLrdn-2TO1APhTQ_X0J41xh9mMWyFcgGlzR-yNGYE",
      "alg": "RS256",
      "dq": "yhiQa1udCCIfpI9d4SFMnq5VsZZD7My7QIWcrqW78U7GSR1_XVJMdToDdrxaRPDgZeDGtACScYjiby-TdDlGxkyVblZsAr5DB5w8VZ2_0t0-2gbv0r1m83Tt6YU0WNLogQ0jufbZXBPs07G3lRQ3MTNPzsJ_iclvMcP8Gx97OLE",
      "n": "wQGjFOysxWx8KbFn8lUGlLcz6Ed2fvX2LLXRc7WjFe2ZH4VRB6Onn2HNA3AlZfCMdW0S5-b4oO3j13ZP__Dqbys4lWCfT3d0kZziE22k4KXuxXfHtNa7hUECOTzvQR80M7jMUsVSD7jJk3YBKuJsA1zN7MmYgTWjgvq52XRwyRAlDZF9XsCFyjD0HIMIhZ_8kMBrjQj7_XIY96nOGbiG6cXjQPEPDtBm-3Xf7jjn1b66Cp1EJaMlInASGxtZT2S2tRZd6UKnCUIa_cBkUEwRKCC6OrZd49aeQIjG6l-ouISozG1eHALYs-wBTsysOjxQeeVdiEVNUxeJTLNDG_q19Q"
    }
  ]
}
public_client_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "alg": "RS256",
      "n": "wQGjFOysxWx8KbFn8lUGlLcz6Ed2fvX2LLXRc7WjFe2ZH4VRB6Onn2HNA3AlZfCMdW0S5-b4oO3j13ZP__Dqbys4lWCfT3d0kZziE22k4KXuxXfHtNa7hUECOTzvQR80M7jMUsVSD7jJk3YBKuJsA1zN7MmYgTWjgvq52XRwyRAlDZF9XsCFyjD0HIMIhZ_8kMBrjQj7_XIY96nOGbiG6cXjQPEPDtBm-3Xf7jjn1b66Cp1EJaMlInASGxtZT2S2tRZd6UKnCUIa_cBkUEwRKCC6OrZd49aeQIjG6l-ouISozG1eHALYs-wBTsysOjxQeeVdiEVNUxeJTLNDG_q19Q"
    }
  ]
}
2022-05-19 13:43:16 SUCCESS
CheckDistinctKeyIdValueInClientJWKs
Distinct 'kid' value in all keys of client_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2022-05-19 13:43:16
CreateEmptyDynamicRegistrationRequest
Created empty dynamic registration request
2022-05-19 13:43:16
AddClientNameToDynamicRegistrationRequest
Added client_name to registration request
client_name
OIDF Conformance Test SVb9ZwpADzrj7xQ
2022-05-19 13:43:16
AddAuthorizationCodeGrantTypeToDynamicRegistrationRequest
Added 'authorization_code' to 'grant_types'
grant_types
[
  "authorization_code"
]
2022-05-19 13:43:16
AddPublicJwksToDynamicRegistrationRequest
Added client public JWKS to dynamic registration request
dynamic_registration_request
{
  "client_name": "OIDF Conformance Test SVb9ZwpADzrj7xQ",
  "grant_types": [
    "authorization_code"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "wQGjFOysxWx8KbFn8lUGlLcz6Ed2fvX2LLXRc7WjFe2ZH4VRB6Onn2HNA3AlZfCMdW0S5-b4oO3j13ZP__Dqbys4lWCfT3d0kZziE22k4KXuxXfHtNa7hUECOTzvQR80M7jMUsVSD7jJk3YBKuJsA1zN7MmYgTWjgvq52XRwyRAlDZF9XsCFyjD0HIMIhZ_8kMBrjQj7_XIY96nOGbiG6cXjQPEPDtBm-3Xf7jjn1b66Cp1EJaMlInASGxtZT2S2tRZd6UKnCUIa_cBkUEwRKCC6OrZd49aeQIjG6l-ouISozG1eHALYs-wBTsysOjxQeeVdiEVNUxeJTLNDG_q19Q"
      }
    ]
  }
}
2022-05-19 13:43:16
AddTokenEndpointAuthMethodToDynamicRegistrationRequestFromEnvironment
Added token endpoint auth method to dynamic registration request
dynamic_registration_request
{
  "client_name": "OIDF Conformance Test SVb9ZwpADzrj7xQ",
  "grant_types": [
    "authorization_code"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "wQGjFOysxWx8KbFn8lUGlLcz6Ed2fvX2LLXRc7WjFe2ZH4VRB6Onn2HNA3AlZfCMdW0S5-b4oO3j13ZP__Dqbys4lWCfT3d0kZziE22k4KXuxXfHtNa7hUECOTzvQR80M7jMUsVSD7jJk3YBKuJsA1zN7MmYgTWjgvq52XRwyRAlDZF9XsCFyjD0HIMIhZ_8kMBrjQj7_XIY96nOGbiG6cXjQPEPDtBm-3Xf7jjn1b66Cp1EJaMlInASGxtZT2S2tRZd6UKnCUIa_cBkUEwRKCC6OrZd49aeQIjG6l-ouISozG1eHALYs-wBTsysOjxQeeVdiEVNUxeJTLNDG_q19Q"
      }
    ]
  },
  "token_endpoint_auth_method": "client_secret_basic"
}
2022-05-19 13:43:16
AddResponseTypesArrayToDynamicRegistrationRequestFromEnvironment
Added response_types array to dynamic registration request
dynamic_registration_request
{
  "client_name": "OIDF Conformance Test SVb9ZwpADzrj7xQ",
  "grant_types": [
    "authorization_code"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "wQGjFOysxWx8KbFn8lUGlLcz6Ed2fvX2LLXRc7WjFe2ZH4VRB6Onn2HNA3AlZfCMdW0S5-b4oO3j13ZP__Dqbys4lWCfT3d0kZziE22k4KXuxXfHtNa7hUECOTzvQR80M7jMUsVSD7jJk3YBKuJsA1zN7MmYgTWjgvq52XRwyRAlDZF9XsCFyjD0HIMIhZ_8kMBrjQj7_XIY96nOGbiG6cXjQPEPDtBm-3Xf7jjn1b66Cp1EJaMlInASGxtZT2S2tRZd6UKnCUIa_cBkUEwRKCC6OrZd49aeQIjG6l-ouISozG1eHALYs-wBTsysOjxQeeVdiEVNUxeJTLNDG_q19Q"
      }
    ]
  },
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code"
  ]
}
2022-05-19 13:43:16
AddRedirectUriToDynamicRegistrationRequest
Added redirect_uris array to dynamic registration request
dynamic_registration_request
{
  "client_name": "OIDF Conformance Test SVb9ZwpADzrj7xQ",
  "grant_types": [
    "authorization_code"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "wQGjFOysxWx8KbFn8lUGlLcz6Ed2fvX2LLXRc7WjFe2ZH4VRB6Onn2HNA3AlZfCMdW0S5-b4oO3j13ZP__Dqbys4lWCfT3d0kZziE22k4KXuxXfHtNa7hUECOTzvQR80M7jMUsVSD7jJk3YBKuJsA1zN7MmYgTWjgvq52XRwyRAlDZF9XsCFyjD0HIMIhZ_8kMBrjQj7_XIY96nOGbiG6cXjQPEPDtBm-3Xf7jjn1b66Cp1EJaMlInASGxtZT2S2tRZd6UKnCUIa_cBkUEwRKCC6OrZd49aeQIjG6l-ouISozG1eHALYs-wBTsysOjxQeeVdiEVNUxeJTLNDG_q19Q"
      }
    ]
  },
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code"
  ],
  "redirect_uris": [
    "https://www.certification.openid.net/test/a/keycloak/callback"
  ]
}
2022-05-19 13:43:16
AddContactsToDynamicRegistrationRequest
Added contacts array to dynamic registration request
dynamic_registration_request
{
  "client_name": "OIDF Conformance Test SVb9ZwpADzrj7xQ",
  "grant_types": [
    "authorization_code"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "wQGjFOysxWx8KbFn8lUGlLcz6Ed2fvX2LLXRc7WjFe2ZH4VRB6Onn2HNA3AlZfCMdW0S5-b4oO3j13ZP__Dqbys4lWCfT3d0kZziE22k4KXuxXfHtNa7hUECOTzvQR80M7jMUsVSD7jJk3YBKuJsA1zN7MmYgTWjgvq52XRwyRAlDZF9XsCFyjD0HIMIhZ_8kMBrjQj7_XIY96nOGbiG6cXjQPEPDtBm-3Xf7jjn1b66Cp1EJaMlInASGxtZT2S2tRZd6UKnCUIa_cBkUEwRKCC6OrZd49aeQIjG6l-ouISozG1eHALYs-wBTsysOjxQeeVdiEVNUxeJTLNDG_q19Q"
      }
    ]
  },
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code"
  ],
  "redirect_uris": [
    "https://www.certification.openid.net/test/a/keycloak/callback"
  ],
  "contacts": [
    "certification@oidf.org"
  ]
}
2022-05-19 13:43:16
AddRefreshTokenGrantTypeToDynamicRegistrationRequest
Added 'refresh_token' to 'grant_types'
grant_types
[
  "authorization_code",
  "refresh_token"
]
2022-05-19 13:43:16
CallDynamicRegistrationEndpoint
HTTP request
request_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect
request_method
POST
request_headers
{
  "accept": "application/json",
  "accept-charset": "utf-8",
  "content-type": "application/json",
  "content-length": "723"
}
request_body
{"client_name":"OIDF Conformance Test SVb9ZwpADzrj7xQ","grant_types":["authorization_code","refresh_token"],"jwks":{"keys":[{"kty":"RSA","e":"AQAB","use":"sig","alg":"RS256","n":"wQGjFOysxWx8KbFn8lUGlLcz6Ed2fvX2LLXRc7WjFe2ZH4VRB6Onn2HNA3AlZfCMdW0S5-b4oO3j13ZP__Dqbys4lWCfT3d0kZziE22k4KXuxXfHtNa7hUECOTzvQR80M7jMUsVSD7jJk3YBKuJsA1zN7MmYgTWjgvq52XRwyRAlDZF9XsCFyjD0HIMIhZ_8kMBrjQj7_XIY96nOGbiG6cXjQPEPDtBm-3Xf7jjn1b66Cp1EJaMlInASGxtZT2S2tRZd6UKnCUIa_cBkUEwRKCC6OrZd49aeQIjG6l-ouISozG1eHALYs-wBTsysOjxQeeVdiEVNUxeJTLNDG_q19Q"}]},"token_endpoint_auth_method":"client_secret_basic","response_types":["code"],"redirect_uris":["https://www.certification.openid.net/test/a/keycloak/callback"],"contacts":["certification@oidf.org"]}
2022-05-19 13:43:16 RESPONSE
CallDynamicRegistrationEndpoint
HTTP response
response_status_code
201 CREATED
response_status_text
Created
response_headers
{
  "x-xss-protection": "1; mode\u003dblock",
  "location": "https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect/e99716b4-0f3a-40a8-8b15-846bda62c7ea",
  "x-frame-options": "SAMEORIGIN",
  "referrer-policy": "no-referrer",
  "date": "Thu, 19 May 2022 13:43:16 GMT",
  "connection": "keep-alive",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "content-type": "application/json",
  "content-length": "1823"
}
response_body
{"redirect_uris":["https://www.certification.openid.net/test/a/keycloak/callback"],"token_endpoint_auth_method":"client_secret_basic","grant_types":["authorization_code","refresh_token"],"response_types":["code","none"],"client_id":"e99716b4-0f3a-40a8-8b15-846bda62c7ea","client_secret":"wbuLvQ094jq4s8wWT63pPdYoCY7DDfyv","client_name":"OIDF Conformance Test SVb9ZwpADzrj7xQ","scope":"address phone profile offline_access microprofile-jwt email","jwks":{"keys":[{"kty":"RSA","alg":"RS256","use":"sig","e":"AQAB","n":"wQGjFOysxWx8KbFn8lUGlLcz6Ed2fvX2LLXRc7WjFe2ZH4VRB6Onn2HNA3AlZfCMdW0S5-b4oO3j13ZP__Dqbys4lWCfT3d0kZziE22k4KXuxXfHtNa7hUECOTzvQR80M7jMUsVSD7jJk3YBKuJsA1zN7MmYgTWjgvq52XRwyRAlDZF9XsCFyjD0HIMIhZ_8kMBrjQj7_XIY96nOGbiG6cXjQPEPDtBm-3Xf7jjn1b66Cp1EJaMlInASGxtZT2S2tRZd6UKnCUIa_cBkUEwRKCC6OrZd49aeQIjG6l-ouISozG1eHALYs-wBTsysOjxQeeVdiEVNUxeJTLNDG_q19Q"}]},"subject_type":"public","request_uris":[],"tls_client_certificate_bound_access_tokens":false,"client_id_issued_at":1652967796,"client_secret_expires_at":0,"registration_client_uri":"https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect/e99716b4-0f3a-40a8-8b15-846bda62c7ea","registration_access_token":"eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlZGU2NjRjNS0zN2U1LTQ3ZGItOTQzZC04ODk5ZDRmNzExNTQifQ.eyJleHAiOjAsImlhdCI6MTY1Mjk2Nzc5NiwianRpIjoiMjU3NTUyYTMtYWU1NS00MzMwLWIyMDItODM0NDhlNTU0N2NkIiwiaXNzIjoiaHR0cHM6Ly84NC0yNDQtNzItOTAubmlwLmlvOjYwMDAwL2F1dGgvcmVhbG1zL3Rlc3QiLCJhdWQiOiJodHRwczovLzg0LTI0NC03Mi05MC5uaXAuaW86NjAwMDAvYXV0aC9yZWFsbXMvdGVzdCIsInR5cCI6IlJlZ2lzdHJhdGlvbkFjY2Vzc1Rva2VuIiwicmVnaXN0cmF0aW9uX2F1dGgiOiJhbm9ueW1vdXMifQ.ckEHlveMYwrXrIZEEFPzHEWuxfCxKWzjs29SlZa6GUc","backchannel_logout_session_required":false,"require_pushed_authorization_requests":false,"frontchannel_logout_session_required":false}
2022-05-19 13:43:16
CallDynamicRegistrationEndpoint
Parsed registration endpoint response
status
201
endpoint_name
dynamic registration
headers
{
  "x-xss-protection": "1; mode\u003dblock",
  "location": "https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect/e99716b4-0f3a-40a8-8b15-846bda62c7ea",
  "x-frame-options": "SAMEORIGIN",
  "referrer-policy": "no-referrer",
  "date": "Thu, 19 May 2022 13:43:16 GMT",
  "connection": "keep-alive",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "content-type": "application/json",
  "content-length": "1823"
}
body
{"redirect_uris":["https://www.certification.openid.net/test/a/keycloak/callback"],"token_endpoint_auth_method":"client_secret_basic","grant_types":["authorization_code","refresh_token"],"response_types":["code","none"],"client_id":"e99716b4-0f3a-40a8-8b15-846bda62c7ea","client_secret":"wbuLvQ094jq4s8wWT63pPdYoCY7DDfyv","client_name":"OIDF Conformance Test SVb9ZwpADzrj7xQ","scope":"address phone profile offline_access microprofile-jwt email","jwks":{"keys":[{"kty":"RSA","alg":"RS256","use":"sig","e":"AQAB","n":"wQGjFOysxWx8KbFn8lUGlLcz6Ed2fvX2LLXRc7WjFe2ZH4VRB6Onn2HNA3AlZfCMdW0S5-b4oO3j13ZP__Dqbys4lWCfT3d0kZziE22k4KXuxXfHtNa7hUECOTzvQR80M7jMUsVSD7jJk3YBKuJsA1zN7MmYgTWjgvq52XRwyRAlDZF9XsCFyjD0HIMIhZ_8kMBrjQj7_XIY96nOGbiG6cXjQPEPDtBm-3Xf7jjn1b66Cp1EJaMlInASGxtZT2S2tRZd6UKnCUIa_cBkUEwRKCC6OrZd49aeQIjG6l-ouISozG1eHALYs-wBTsysOjxQeeVdiEVNUxeJTLNDG_q19Q"}]},"subject_type":"public","request_uris":[],"tls_client_certificate_bound_access_tokens":false,"client_id_issued_at":1652967796,"client_secret_expires_at":0,"registration_client_uri":"https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect/e99716b4-0f3a-40a8-8b15-846bda62c7ea","registration_access_token":"eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlZGU2NjRjNS0zN2U1LTQ3ZGItOTQzZC04ODk5ZDRmNzExNTQifQ.eyJleHAiOjAsImlhdCI6MTY1Mjk2Nzc5NiwianRpIjoiMjU3NTUyYTMtYWU1NS00MzMwLWIyMDItODM0NDhlNTU0N2NkIiwiaXNzIjoiaHR0cHM6Ly84NC0yNDQtNzItOTAubmlwLmlvOjYwMDAwL2F1dGgvcmVhbG1zL3Rlc3QiLCJhdWQiOiJodHRwczovLzg0LTI0NC03Mi05MC5uaXAuaW86NjAwMDAvYXV0aC9yZWFsbXMvdGVzdCIsInR5cCI6IlJlZ2lzdHJhdGlvbkFjY2Vzc1Rva2VuIiwicmVnaXN0cmF0aW9uX2F1dGgiOiJhbm9ueW1vdXMifQ.ckEHlveMYwrXrIZEEFPzHEWuxfCxKWzjs29SlZa6GUc","backchannel_logout_session_required":false,"require_pushed_authorization_requests":false,"frontchannel_logout_session_required":false}
body_json
{
  "redirect_uris": [
    "https://www.certification.openid.net/test/a/keycloak/callback"
  ],
  "token_endpoint_auth_method": "client_secret_basic",
  "grant_types": [
    "authorization_code",
    "refresh_token"
  ],
  "response_types": [
    "code",
    "none"
  ],
  "client_id": "e99716b4-0f3a-40a8-8b15-846bda62c7ea",
  "client_secret": "wbuLvQ094jq4s8wWT63pPdYoCY7DDfyv",
  "client_name": "OIDF Conformance Test SVb9ZwpADzrj7xQ",
  "scope": "address phone profile offline_access microprofile-jwt email",
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "alg": "RS256",
        "use": "sig",
        "e": "AQAB",
        "n": "wQGjFOysxWx8KbFn8lUGlLcz6Ed2fvX2LLXRc7WjFe2ZH4VRB6Onn2HNA3AlZfCMdW0S5-b4oO3j13ZP__Dqbys4lWCfT3d0kZziE22k4KXuxXfHtNa7hUECOTzvQR80M7jMUsVSD7jJk3YBKuJsA1zN7MmYgTWjgvq52XRwyRAlDZF9XsCFyjD0HIMIhZ_8kMBrjQj7_XIY96nOGbiG6cXjQPEPDtBm-3Xf7jjn1b66Cp1EJaMlInASGxtZT2S2tRZd6UKnCUIa_cBkUEwRKCC6OrZd49aeQIjG6l-ouISozG1eHALYs-wBTsysOjxQeeVdiEVNUxeJTLNDG_q19Q"
      }
    ]
  },
  "subject_type": "public",
  "request_uris": [],
  "tls_client_certificate_bound_access_tokens": false,
  "client_id_issued_at": 1652967796,
  "client_secret_expires_at": 0,
  "registration_client_uri": "https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect/e99716b4-0f3a-40a8-8b15-846bda62c7ea",
  "registration_access_token": "eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlZGU2NjRjNS0zN2U1LTQ3ZGItOTQzZC04ODk5ZDRmNzExNTQifQ.eyJleHAiOjAsImlhdCI6MTY1Mjk2Nzc5NiwianRpIjoiMjU3NTUyYTMtYWU1NS00MzMwLWIyMDItODM0NDhlNTU0N2NkIiwiaXNzIjoiaHR0cHM6Ly84NC0yNDQtNzItOTAubmlwLmlvOjYwMDAwL2F1dGgvcmVhbG1zL3Rlc3QiLCJhdWQiOiJodHRwczovLzg0LTI0NC03Mi05MC5uaXAuaW86NjAwMDAvYXV0aC9yZWFsbXMvdGVzdCIsInR5cCI6IlJlZ2lzdHJhdGlvbkFjY2Vzc1Rva2VuIiwicmVnaXN0cmF0aW9uX2F1dGgiOiJhbm9ueW1vdXMifQ.ckEHlveMYwrXrIZEEFPzHEWuxfCxKWzjs29SlZa6GUc",
  "backchannel_logout_session_required": false,
  "require_pushed_authorization_requests": false,
  "frontchannel_logout_session_required": false
}
2022-05-19 13:43:16 SUCCESS
EnsureContentTypeJson
endpoint_response Content-Type: header is application/json
2022-05-19 13:43:16 SUCCESS
EnsureHttpStatusCodeIs201
dynamic registration endpoint returned the expected http status
expected_status
201
http_status
201
2022-05-19 13:43:16 SUCCESS
CheckNoErrorFromDynamicRegistrationEndpoint
Dynamic registration endpoint did not return an error.
2022-05-19 13:43:16 SUCCESS
ExtractDynamicRegistrationResponse
Extracted client from dynamic registration response
client_id
e99716b4-0f3a-40a8-8b15-846bda62c7ea
2022-05-19 13:43:16 SUCCESS
VerifyClientManagementCredentials
Verified dynamic registration management credentials
registration_client_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect/e99716b4-0f3a-40a8-8b15-846bda62c7ea
registration_access_token
eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlZGU2NjRjNS0zN2U1LTQ3ZGItOTQzZC04ODk5ZDRmNzExNTQifQ.eyJleHAiOjAsImlhdCI6MTY1Mjk2Nzc5NiwianRpIjoiMjU3NTUyYTMtYWU1NS00MzMwLWIyMDItODM0NDhlNTU0N2NkIiwiaXNzIjoiaHR0cHM6Ly84NC0yNDQtNzItOTAubmlwLmlvOjYwMDAwL2F1dGgvcmVhbG1zL3Rlc3QiLCJhdWQiOiJodHRwczovLzg0LTI0NC03Mi05MC5uaXAuaW86NjAwMDAvYXV0aC9yZWFsbXMvdGVzdCIsInR5cCI6IlJlZ2lzdHJhdGlvbkFjY2Vzc1Rva2VuIiwicmVnaXN0cmF0aW9uX2F1dGgiOiJhbm9ueW1vdXMifQ.ckEHlveMYwrXrIZEEFPzHEWuxfCxKWzjs29SlZa6GUc
2022-05-19 13:43:16
SetScopeInClientConfigurationToOpenId
Set scope in client configuration to "openid"
scope
openid
2022-05-19 13:43:16
SetScopeInClientConfigurationToOpenIdOfflineAccessIfServerSupportsOfflineAccess
Set scope in client configuration to "openid offline_access"as 'scope_supported' contains 'offline_access'
scope
openid offline_access
2022-05-19 13:43:16 SUCCESS
EnsureServerConfigurationSupportsClientSecretBasic
Contents of 'token_endpoint_auth_methods_supported' in discovery document matches expectations.
actual
[
  "private_key_jwt",
  "client_secret_basic",
  "client_secret_post",
  "tls_client_auth",
  "client_secret_jwt"
]
expected
[
  "client_secret_basic"
]
minimum_matches_required
1
2022-05-19 13:43:16
StoreOriginalClient2Configuration
Created original_client_config object from the client configuration.
client_id
client2-oidcc-hybrid
client_secret
BAfJ8ugBegJ7JWdPVjcqGNFpYfNb6euL
2022-05-19 13:43:16
ExtractClientNameFromStoredConfig
Extracted client_name from stored client configuration.
client_name
2022-05-19 13:43:17 SUCCESS
GenerateRS256ClientJWKs
Generated client JWKs
client_jwks
{
  "keys": [
    {
      "p": "47Pr6PoZ_UFcJyTmlLgU2YSlowXesR3BrVDuAoQ1yfnl36uc8rsweGe5b0IWL0RG7g1ShAx-rULVv-hpTd3ibEL7SIImxJ5RUMS-dWOugXPKjYDGuh5VTUCZf8X3Klqg2pw20FOdHkR2bnelEN1x4UaMargsZwZm-H2SsHyHF-s",
      "kty": "RSA",
      "q": "oa7iwxDLbiiUaQpXHBBTWlZK8wQth7YN-utDl8iS9FSBaR1j5VQiMQg71173VDxrzfmdFIbIvMW1h1l2f8bP7g77KZgeZSJzuHqbfk3RecB7C3zTfoQNSwX0hiQXci7e-6B7deI72afTz1LFUR0u7e5Y_6Qdx1Ox0oe9gGMmkck",
      "d": "EPQdnwrJST-_xAc9bNJBWwekbQ0Ai-yGnWjr9xZds_8vBGzPmGUe5a6pC7qhEdei463QJeKL2nOJ-BFQvz2P2YGmHIXsxXyugr2mDjzQqIQSfb6LtSwIjMqGCv5Ld6EKc1VptlQesUn7Q9KYNO6kTp_ZgCYLW-pHtw1Ks2Gx2qF6YKhnTFVYPUyUoInP5QImLZNTNrAlhzS2cpE_tMh-p2cTEMkzRqvira0WYu0R_BPQdGWKAdt0yONzyejl0KSXPVfcRDlGRVNNhsc98_z9h1yEkNBKA2b-68jHQB5dsEeJ4HbHmBSD7aKKgnV0jWzNOXP2zvbn25Gho7k2Aw2VYQ",
      "e": "AQAB",
      "use": "sig",
      "qi": "tnclKDobTldGJevEhz48R7WZNcjqMRoEbLnv7sPaBEEyzFoxAhWv-o7Eu_rMjPyl1xsCEGs2qujsDTG96EUYakk6sp_prve-Sa_4hpX9s2jTYxVg7LefEwVChbAE5NEy5r7iM2k8G7z4qZOr_TC26pAD7Nv67OJKB6pEP7PAhZw",
      "dp": "OSd2NZphX6JCQUkP35B9G0QiV1Mn3Ik9jgVcWKFa5wGk44mt8Xdu6SoP749FBkQ7EZGifqasPU0jXfI2TGc_aDE_5alVldCvVHit3cVRjgjEdNQ4DYuDmcp3PQ0xxx3MdlLzp0L1kx1YJM4_ToZnCUauBDOKYanHuuO6KDZ5qlU",
      "alg": "RS256",
      "dq": "HnLG9aFWDjrKKDXwTbKtX9fcaYOh52rbmyNvKUh2lFjNvjPwuiFsBvvb-SVDQrPWQYX-lP0FFLfPBdxNOqcARX7AwgaJwtYIIPfGDLUu-9TJ11H8qljIABbxA8oMOE6nY4_HcF3Yk5bNhr-5tRrf2aMHU61ehkk2tcUmZOVHQDE",
      "n": "j8-1WjTk5Ze5nTmi9ZXGhTw4ngjM78yop4O5OWaLpHHRmSTHxuYylyWIZWHGOnkqUtxGXlMo6-ZvDhd8igzTgIvy81f7m1FyB_UofK6mg4DcmxsFF-owI59XD_txUZhKXfdJfA0nvgSGUoBMl5ZGSbJ38rshIi7oHupBXUEvIOt8k5uTnQrQkBJss3ayZocwmVD364re4L3iqUOBL0z_xwFggU7paxQl4JvhTZnnNd9784TIVfYwUugUE3Efq4kyBqaC8Bt-7fOV8Njh-U0i6VKEjrH5Iz83rh_ZzvCmsqCUTH2GhT4Hsz9PyG0iH8i5rWn2ry8Jp3ukKlHnuH_igw"
    }
  ]
}
public_client_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "alg": "RS256",
      "n": "j8-1WjTk5Ze5nTmi9ZXGhTw4ngjM78yop4O5OWaLpHHRmSTHxuYylyWIZWHGOnkqUtxGXlMo6-ZvDhd8igzTgIvy81f7m1FyB_UofK6mg4DcmxsFF-owI59XD_txUZhKXfdJfA0nvgSGUoBMl5ZGSbJ38rshIi7oHupBXUEvIOt8k5uTnQrQkBJss3ayZocwmVD364re4L3iqUOBL0z_xwFggU7paxQl4JvhTZnnNd9784TIVfYwUugUE3Efq4kyBqaC8Bt-7fOV8Njh-U0i6VKEjrH5Iz83rh_ZzvCmsqCUTH2GhT4Hsz9PyG0iH8i5rWn2ry8Jp3ukKlHnuH_igw"
    }
  ]
}
2022-05-19 13:43:17 SUCCESS
CheckDistinctKeyIdValueInClientJWKs
Distinct 'kid' value in all keys of client_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2022-05-19 13:43:17
CreateEmptyDynamicRegistrationRequest
Created empty dynamic registration request
2022-05-19 13:43:17
AddClientNameToDynamicRegistrationRequest
Added client_name to registration request
client_name
OIDF Conformance Test SVb9ZwpADzrj7xQ
2022-05-19 13:43:17
AddAuthorizationCodeGrantTypeToDynamicRegistrationRequest
Added 'authorization_code' to 'grant_types'
grant_types
[
  "authorization_code"
]
2022-05-19 13:43:17
AddPublicJwksToDynamicRegistrationRequest
Added client public JWKS to dynamic registration request
dynamic_registration_request
{
  "client_name": "OIDF Conformance Test SVb9ZwpADzrj7xQ",
  "grant_types": [
    "authorization_code"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "j8-1WjTk5Ze5nTmi9ZXGhTw4ngjM78yop4O5OWaLpHHRmSTHxuYylyWIZWHGOnkqUtxGXlMo6-ZvDhd8igzTgIvy81f7m1FyB_UofK6mg4DcmxsFF-owI59XD_txUZhKXfdJfA0nvgSGUoBMl5ZGSbJ38rshIi7oHupBXUEvIOt8k5uTnQrQkBJss3ayZocwmVD364re4L3iqUOBL0z_xwFggU7paxQl4JvhTZnnNd9784TIVfYwUugUE3Efq4kyBqaC8Bt-7fOV8Njh-U0i6VKEjrH5Iz83rh_ZzvCmsqCUTH2GhT4Hsz9PyG0iH8i5rWn2ry8Jp3ukKlHnuH_igw"
      }
    ]
  }
}
2022-05-19 13:43:17
AddTokenEndpointAuthMethodToDynamicRegistrationRequestFromEnvironment
Added token endpoint auth method to dynamic registration request
dynamic_registration_request
{
  "client_name": "OIDF Conformance Test SVb9ZwpADzrj7xQ",
  "grant_types": [
    "authorization_code"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "j8-1WjTk5Ze5nTmi9ZXGhTw4ngjM78yop4O5OWaLpHHRmSTHxuYylyWIZWHGOnkqUtxGXlMo6-ZvDhd8igzTgIvy81f7m1FyB_UofK6mg4DcmxsFF-owI59XD_txUZhKXfdJfA0nvgSGUoBMl5ZGSbJ38rshIi7oHupBXUEvIOt8k5uTnQrQkBJss3ayZocwmVD364re4L3iqUOBL0z_xwFggU7paxQl4JvhTZnnNd9784TIVfYwUugUE3Efq4kyBqaC8Bt-7fOV8Njh-U0i6VKEjrH5Iz83rh_ZzvCmsqCUTH2GhT4Hsz9PyG0iH8i5rWn2ry8Jp3ukKlHnuH_igw"
      }
    ]
  },
  "token_endpoint_auth_method": "client_secret_basic"
}
2022-05-19 13:43:17
AddResponseTypesArrayToDynamicRegistrationRequestFromEnvironment
Added response_types array to dynamic registration request
dynamic_registration_request
{
  "client_name": "OIDF Conformance Test SVb9ZwpADzrj7xQ",
  "grant_types": [
    "authorization_code"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "j8-1WjTk5Ze5nTmi9ZXGhTw4ngjM78yop4O5OWaLpHHRmSTHxuYylyWIZWHGOnkqUtxGXlMo6-ZvDhd8igzTgIvy81f7m1FyB_UofK6mg4DcmxsFF-owI59XD_txUZhKXfdJfA0nvgSGUoBMl5ZGSbJ38rshIi7oHupBXUEvIOt8k5uTnQrQkBJss3ayZocwmVD364re4L3iqUOBL0z_xwFggU7paxQl4JvhTZnnNd9784TIVfYwUugUE3Efq4kyBqaC8Bt-7fOV8Njh-U0i6VKEjrH5Iz83rh_ZzvCmsqCUTH2GhT4Hsz9PyG0iH8i5rWn2ry8Jp3ukKlHnuH_igw"
      }
    ]
  },
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code"
  ]
}
2022-05-19 13:43:17
AddRedirectUriToDynamicRegistrationRequest
Added redirect_uris array to dynamic registration request
dynamic_registration_request
{
  "client_name": "OIDF Conformance Test SVb9ZwpADzrj7xQ",
  "grant_types": [
    "authorization_code"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "j8-1WjTk5Ze5nTmi9ZXGhTw4ngjM78yop4O5OWaLpHHRmSTHxuYylyWIZWHGOnkqUtxGXlMo6-ZvDhd8igzTgIvy81f7m1FyB_UofK6mg4DcmxsFF-owI59XD_txUZhKXfdJfA0nvgSGUoBMl5ZGSbJ38rshIi7oHupBXUEvIOt8k5uTnQrQkBJss3ayZocwmVD364re4L3iqUOBL0z_xwFggU7paxQl4JvhTZnnNd9784TIVfYwUugUE3Efq4kyBqaC8Bt-7fOV8Njh-U0i6VKEjrH5Iz83rh_ZzvCmsqCUTH2GhT4Hsz9PyG0iH8i5rWn2ry8Jp3ukKlHnuH_igw"
      }
    ]
  },
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code"
  ],
  "redirect_uris": [
    "https://www.certification.openid.net/test/a/keycloak/callback"
  ]
}
2022-05-19 13:43:17
AddContactsToDynamicRegistrationRequest
Added contacts array to dynamic registration request
dynamic_registration_request
{
  "client_name": "OIDF Conformance Test SVb9ZwpADzrj7xQ",
  "grant_types": [
    "authorization_code"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "j8-1WjTk5Ze5nTmi9ZXGhTw4ngjM78yop4O5OWaLpHHRmSTHxuYylyWIZWHGOnkqUtxGXlMo6-ZvDhd8igzTgIvy81f7m1FyB_UofK6mg4DcmxsFF-owI59XD_txUZhKXfdJfA0nvgSGUoBMl5ZGSbJ38rshIi7oHupBXUEvIOt8k5uTnQrQkBJss3ayZocwmVD364re4L3iqUOBL0z_xwFggU7paxQl4JvhTZnnNd9784TIVfYwUugUE3Efq4kyBqaC8Bt-7fOV8Njh-U0i6VKEjrH5Iz83rh_ZzvCmsqCUTH2GhT4Hsz9PyG0iH8i5rWn2ry8Jp3ukKlHnuH_igw"
      }
    ]
  },
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code"
  ],
  "redirect_uris": [
    "https://www.certification.openid.net/test/a/keycloak/callback"
  ],
  "contacts": [
    "certification@oidf.org"
  ]
}
2022-05-19 13:43:17
AddRefreshTokenGrantTypeToDynamicRegistrationRequest
Added 'refresh_token' to 'grant_types'
grant_types
[
  "authorization_code",
  "refresh_token"
]
2022-05-19 13:43:17
CallDynamicRegistrationEndpoint
HTTP request
request_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect
request_method
POST
request_headers
{
  "accept": "application/json",
  "accept-charset": "utf-8",
  "content-type": "application/json",
  "content-length": "723"
}
request_body
{"client_name":"OIDF Conformance Test SVb9ZwpADzrj7xQ","grant_types":["authorization_code","refresh_token"],"jwks":{"keys":[{"kty":"RSA","e":"AQAB","use":"sig","alg":"RS256","n":"j8-1WjTk5Ze5nTmi9ZXGhTw4ngjM78yop4O5OWaLpHHRmSTHxuYylyWIZWHGOnkqUtxGXlMo6-ZvDhd8igzTgIvy81f7m1FyB_UofK6mg4DcmxsFF-owI59XD_txUZhKXfdJfA0nvgSGUoBMl5ZGSbJ38rshIi7oHupBXUEvIOt8k5uTnQrQkBJss3ayZocwmVD364re4L3iqUOBL0z_xwFggU7paxQl4JvhTZnnNd9784TIVfYwUugUE3Efq4kyBqaC8Bt-7fOV8Njh-U0i6VKEjrH5Iz83rh_ZzvCmsqCUTH2GhT4Hsz9PyG0iH8i5rWn2ry8Jp3ukKlHnuH_igw"}]},"token_endpoint_auth_method":"client_secret_basic","response_types":["code"],"redirect_uris":["https://www.certification.openid.net/test/a/keycloak/callback"],"contacts":["certification@oidf.org"]}
2022-05-19 13:43:17 RESPONSE
CallDynamicRegistrationEndpoint
HTTP response
response_status_code
201 CREATED
response_status_text
Created
response_headers
{
  "x-xss-protection": "1; mode\u003dblock",
  "location": "https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect/5f24bc2e-d871-4555-82a8-efd61a2aa5f1",
  "x-frame-options": "SAMEORIGIN",
  "referrer-policy": "no-referrer",
  "date": "Thu, 19 May 2022 13:43:17 GMT",
  "connection": "keep-alive",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "content-type": "application/json",
  "content-length": "1823"
}
response_body
{"redirect_uris":["https://www.certification.openid.net/test/a/keycloak/callback"],"token_endpoint_auth_method":"client_secret_basic","grant_types":["authorization_code","refresh_token"],"response_types":["code","none"],"client_id":"5f24bc2e-d871-4555-82a8-efd61a2aa5f1","client_secret":"eUrBatIclsF7YPXVGGrSNDsJqApAscmA","client_name":"OIDF Conformance Test SVb9ZwpADzrj7xQ","scope":"address phone profile offline_access microprofile-jwt email","jwks":{"keys":[{"kty":"RSA","alg":"RS256","use":"sig","e":"AQAB","n":"j8-1WjTk5Ze5nTmi9ZXGhTw4ngjM78yop4O5OWaLpHHRmSTHxuYylyWIZWHGOnkqUtxGXlMo6-ZvDhd8igzTgIvy81f7m1FyB_UofK6mg4DcmxsFF-owI59XD_txUZhKXfdJfA0nvgSGUoBMl5ZGSbJ38rshIi7oHupBXUEvIOt8k5uTnQrQkBJss3ayZocwmVD364re4L3iqUOBL0z_xwFggU7paxQl4JvhTZnnNd9784TIVfYwUugUE3Efq4kyBqaC8Bt-7fOV8Njh-U0i6VKEjrH5Iz83rh_ZzvCmsqCUTH2GhT4Hsz9PyG0iH8i5rWn2ry8Jp3ukKlHnuH_igw"}]},"subject_type":"public","request_uris":[],"tls_client_certificate_bound_access_tokens":false,"client_id_issued_at":1652967797,"client_secret_expires_at":0,"registration_client_uri":"https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect/5f24bc2e-d871-4555-82a8-efd61a2aa5f1","registration_access_token":"eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlZGU2NjRjNS0zN2U1LTQ3ZGItOTQzZC04ODk5ZDRmNzExNTQifQ.eyJleHAiOjAsImlhdCI6MTY1Mjk2Nzc5NywianRpIjoiZmVmZWM0YjgtMzBhMi00NmZkLThlZjUtMjdhM2Y4ZDE4YmFjIiwiaXNzIjoiaHR0cHM6Ly84NC0yNDQtNzItOTAubmlwLmlvOjYwMDAwL2F1dGgvcmVhbG1zL3Rlc3QiLCJhdWQiOiJodHRwczovLzg0LTI0NC03Mi05MC5uaXAuaW86NjAwMDAvYXV0aC9yZWFsbXMvdGVzdCIsInR5cCI6IlJlZ2lzdHJhdGlvbkFjY2Vzc1Rva2VuIiwicmVnaXN0cmF0aW9uX2F1dGgiOiJhbm9ueW1vdXMifQ.VNR-9FJN3QfW5bGNT5N5ehKNmEBVPd2AjyLvFaR7uoU","backchannel_logout_session_required":false,"require_pushed_authorization_requests":false,"frontchannel_logout_session_required":false}
2022-05-19 13:43:17
CallDynamicRegistrationEndpoint
Parsed registration endpoint response
status
201
endpoint_name
dynamic registration
headers
{
  "x-xss-protection": "1; mode\u003dblock",
  "location": "https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect/5f24bc2e-d871-4555-82a8-efd61a2aa5f1",
  "x-frame-options": "SAMEORIGIN",
  "referrer-policy": "no-referrer",
  "date": "Thu, 19 May 2022 13:43:17 GMT",
  "connection": "keep-alive",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "content-type": "application/json",
  "content-length": "1823"
}
body
{"redirect_uris":["https://www.certification.openid.net/test/a/keycloak/callback"],"token_endpoint_auth_method":"client_secret_basic","grant_types":["authorization_code","refresh_token"],"response_types":["code","none"],"client_id":"5f24bc2e-d871-4555-82a8-efd61a2aa5f1","client_secret":"eUrBatIclsF7YPXVGGrSNDsJqApAscmA","client_name":"OIDF Conformance Test SVb9ZwpADzrj7xQ","scope":"address phone profile offline_access microprofile-jwt email","jwks":{"keys":[{"kty":"RSA","alg":"RS256","use":"sig","e":"AQAB","n":"j8-1WjTk5Ze5nTmi9ZXGhTw4ngjM78yop4O5OWaLpHHRmSTHxuYylyWIZWHGOnkqUtxGXlMo6-ZvDhd8igzTgIvy81f7m1FyB_UofK6mg4DcmxsFF-owI59XD_txUZhKXfdJfA0nvgSGUoBMl5ZGSbJ38rshIi7oHupBXUEvIOt8k5uTnQrQkBJss3ayZocwmVD364re4L3iqUOBL0z_xwFggU7paxQl4JvhTZnnNd9784TIVfYwUugUE3Efq4kyBqaC8Bt-7fOV8Njh-U0i6VKEjrH5Iz83rh_ZzvCmsqCUTH2GhT4Hsz9PyG0iH8i5rWn2ry8Jp3ukKlHnuH_igw"}]},"subject_type":"public","request_uris":[],"tls_client_certificate_bound_access_tokens":false,"client_id_issued_at":1652967797,"client_secret_expires_at":0,"registration_client_uri":"https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect/5f24bc2e-d871-4555-82a8-efd61a2aa5f1","registration_access_token":"eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlZGU2NjRjNS0zN2U1LTQ3ZGItOTQzZC04ODk5ZDRmNzExNTQifQ.eyJleHAiOjAsImlhdCI6MTY1Mjk2Nzc5NywianRpIjoiZmVmZWM0YjgtMzBhMi00NmZkLThlZjUtMjdhM2Y4ZDE4YmFjIiwiaXNzIjoiaHR0cHM6Ly84NC0yNDQtNzItOTAubmlwLmlvOjYwMDAwL2F1dGgvcmVhbG1zL3Rlc3QiLCJhdWQiOiJodHRwczovLzg0LTI0NC03Mi05MC5uaXAuaW86NjAwMDAvYXV0aC9yZWFsbXMvdGVzdCIsInR5cCI6IlJlZ2lzdHJhdGlvbkFjY2Vzc1Rva2VuIiwicmVnaXN0cmF0aW9uX2F1dGgiOiJhbm9ueW1vdXMifQ.VNR-9FJN3QfW5bGNT5N5ehKNmEBVPd2AjyLvFaR7uoU","backchannel_logout_session_required":false,"require_pushed_authorization_requests":false,"frontchannel_logout_session_required":false}
body_json
{
  "redirect_uris": [
    "https://www.certification.openid.net/test/a/keycloak/callback"
  ],
  "token_endpoint_auth_method": "client_secret_basic",
  "grant_types": [
    "authorization_code",
    "refresh_token"
  ],
  "response_types": [
    "code",
    "none"
  ],
  "client_id": "5f24bc2e-d871-4555-82a8-efd61a2aa5f1",
  "client_secret": "eUrBatIclsF7YPXVGGrSNDsJqApAscmA",
  "client_name": "OIDF Conformance Test SVb9ZwpADzrj7xQ",
  "scope": "address phone profile offline_access microprofile-jwt email",
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "alg": "RS256",
        "use": "sig",
        "e": "AQAB",
        "n": "j8-1WjTk5Ze5nTmi9ZXGhTw4ngjM78yop4O5OWaLpHHRmSTHxuYylyWIZWHGOnkqUtxGXlMo6-ZvDhd8igzTgIvy81f7m1FyB_UofK6mg4DcmxsFF-owI59XD_txUZhKXfdJfA0nvgSGUoBMl5ZGSbJ38rshIi7oHupBXUEvIOt8k5uTnQrQkBJss3ayZocwmVD364re4L3iqUOBL0z_xwFggU7paxQl4JvhTZnnNd9784TIVfYwUugUE3Efq4kyBqaC8Bt-7fOV8Njh-U0i6VKEjrH5Iz83rh_ZzvCmsqCUTH2GhT4Hsz9PyG0iH8i5rWn2ry8Jp3ukKlHnuH_igw"
      }
    ]
  },
  "subject_type": "public",
  "request_uris": [],
  "tls_client_certificate_bound_access_tokens": false,
  "client_id_issued_at": 1652967797,
  "client_secret_expires_at": 0,
  "registration_client_uri": "https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect/5f24bc2e-d871-4555-82a8-efd61a2aa5f1",
  "registration_access_token": "eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlZGU2NjRjNS0zN2U1LTQ3ZGItOTQzZC04ODk5ZDRmNzExNTQifQ.eyJleHAiOjAsImlhdCI6MTY1Mjk2Nzc5NywianRpIjoiZmVmZWM0YjgtMzBhMi00NmZkLThlZjUtMjdhM2Y4ZDE4YmFjIiwiaXNzIjoiaHR0cHM6Ly84NC0yNDQtNzItOTAubmlwLmlvOjYwMDAwL2F1dGgvcmVhbG1zL3Rlc3QiLCJhdWQiOiJodHRwczovLzg0LTI0NC03Mi05MC5uaXAuaW86NjAwMDAvYXV0aC9yZWFsbXMvdGVzdCIsInR5cCI6IlJlZ2lzdHJhdGlvbkFjY2Vzc1Rva2VuIiwicmVnaXN0cmF0aW9uX2F1dGgiOiJhbm9ueW1vdXMifQ.VNR-9FJN3QfW5bGNT5N5ehKNmEBVPd2AjyLvFaR7uoU",
  "backchannel_logout_session_required": false,
  "require_pushed_authorization_requests": false,
  "frontchannel_logout_session_required": false
}
2022-05-19 13:43:17 SUCCESS
EnsureContentTypeJson
endpoint_response Content-Type: header is application/json
2022-05-19 13:43:17 SUCCESS
EnsureHttpStatusCodeIs201
dynamic registration endpoint returned the expected http status
expected_status
201
http_status
201
2022-05-19 13:43:17 SUCCESS
CheckNoErrorFromDynamicRegistrationEndpoint
Dynamic registration endpoint did not return an error.
2022-05-19 13:43:17 SUCCESS
ExtractDynamicRegistrationResponse
Extracted client from dynamic registration response
client_id
5f24bc2e-d871-4555-82a8-efd61a2aa5f1
2022-05-19 13:43:17 SUCCESS
VerifyClientManagementCredentials
Verified dynamic registration management credentials
registration_client_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect/5f24bc2e-d871-4555-82a8-efd61a2aa5f1
registration_access_token
eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlZGU2NjRjNS0zN2U1LTQ3ZGItOTQzZC04ODk5ZDRmNzExNTQifQ.eyJleHAiOjAsImlhdCI6MTY1Mjk2Nzc5NywianRpIjoiZmVmZWM0YjgtMzBhMi00NmZkLThlZjUtMjdhM2Y4ZDE4YmFjIiwiaXNzIjoiaHR0cHM6Ly84NC0yNDQtNzItOTAubmlwLmlvOjYwMDAwL2F1dGgvcmVhbG1zL3Rlc3QiLCJhdWQiOiJodHRwczovLzg0LTI0NC03Mi05MC5uaXAuaW86NjAwMDAvYXV0aC9yZWFsbXMvdGVzdCIsInR5cCI6IlJlZ2lzdHJhdGlvbkFjY2Vzc1Rva2VuIiwicmVnaXN0cmF0aW9uX2F1dGgiOiJhbm9ueW1vdXMifQ.VNR-9FJN3QfW5bGNT5N5ehKNmEBVPd2AjyLvFaR7uoU
2022-05-19 13:43:17
SetScopeInClientConfigurationToOpenId
Set scope in client configuration to "openid"
scope
openid
2022-05-19 13:43:17
SetScopeInClientConfigurationToOpenIdOfflineAccessIfServerSupportsOfflineAccess
Set scope in client configuration to "openid offline_access"as 'scope_supported' contains 'offline_access'
scope
openid offline_access
2022-05-19 13:43:17 SUCCESS
EnsureServerConfigurationSupportsClientSecretBasic
Contents of 'token_endpoint_auth_methods_supported' in discovery document matches expectations.
actual
[
  "private_key_jwt",
  "client_secret_basic",
  "client_secret_post",
  "tls_client_auth",
  "client_secret_jwt"
]
expected
[
  "client_secret_basic"
]
minimum_matches_required
1
2022-05-19 13:43:17 SUCCESS
SetProtectedResourceUrlToUserInfoEndpoint
userinfo_endpoint will be used to test access token. The user info is not a mandatory to implement feature in the OpenID Connect specification, but is mandatory for certification.
protected_resource_url
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/userinfo
2022-05-19 13:43:17
oidcc-refresh-token
Setup Done
Make request to authorization endpoint
2022-05-19 13:43:17 SUCCESS
CreateAuthorizationEndpointRequestFromClientInformation
Created authorization endpoint request
client_id
e99716b4-0f3a-40a8-8b15-846bda62c7ea
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
scope
openid offline_access
2022-05-19 13:43:17
CreateRandomStateValue
Created state value
requested_state_length
10
state
WRpIVVNytx
2022-05-19 13:43:17 SUCCESS
AddStateToAuthorizationEndpointRequest
Added state parameter to request
client_id
e99716b4-0f3a-40a8-8b15-846bda62c7ea
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
scope
openid offline_access
state
WRpIVVNytx
2022-05-19 13:43:17
CreateRandomNonceValue
Created nonce value
requested_nonce_length
10
nonce
YDTznrHx7k
2022-05-19 13:43:17 SUCCESS
AddNonceToAuthorizationEndpointRequest
Added nonce parameter to request
client_id
e99716b4-0f3a-40a8-8b15-846bda62c7ea
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
scope
openid offline_access
state
WRpIVVNytx
nonce
YDTznrHx7k
2022-05-19 13:43:17 SUCCESS
SetAuthorizationEndpointRequestResponseTypeFromEnvironment
Added response_type parameter to request
client_id
e99716b4-0f3a-40a8-8b15-846bda62c7ea
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
scope
openid offline_access
state
WRpIVVNytx
nonce
YDTznrHx7k
response_type
code
2022-05-19 13:43:17 SUCCESS
AddPromptConsentToAuthorizationEndpointRequestIfScopeContainsOfflineAccess
Added prompt=consent to authorization endpoint request
client_id
e99716b4-0f3a-40a8-8b15-846bda62c7ea
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
scope
openid offline_access
state
WRpIVVNytx
nonce
YDTznrHx7k
response_type
code
prompt
consent
2022-05-19 13:43:17 SUCCESS
BuildPlainRedirectToAuthorizationEndpoint
Sending to authorization endpoint
auth_request
{
  "client_id": "e99716b4-0f3a-40a8-8b15-846bda62c7ea",
  "redirect_uri": "https://www.certification.openid.net/test/a/keycloak/callback",
  "scope": "openid offline_access",
  "state": "WRpIVVNytx",
  "nonce": "YDTznrHx7k",
  "response_type": "code",
  "prompt": "consent"
}
redirect_to_authorization_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth?client_id=e99716b4-0f3a-40a8-8b15-846bda62c7ea&redirect_uri=https://www.certification.openid.net/test/a/keycloak/callback&scope=openid%20offline_access&state=WRpIVVNytx&nonce=YDTznrHx7k&response_type=code&prompt=consent
2022-05-19 13:43:17 REDIRECT
oidcc-refresh-token
Redirecting to authorization endpoint
redirect_to
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth?client_id=e99716b4-0f3a-40a8-8b15-846bda62c7ea&redirect_uri=https://www.certification.openid.net/test/a/keycloak/callback&scope=openid%20offline_access&state=WRpIVVNytx&nonce=YDTznrHx7k&response_type=code&prompt=consent
2022-05-19 13:43:21 INCOMING
oidcc-refresh-token
Incoming HTTP request to /test/a/keycloak/callback
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:100.0) Gecko/20100101 Firefox/100.0",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/avif,image/webp,*/*;q\u003d0.8",
  "accept-language": "en-US,en;q\u003d0.5",
  "accept-encoding": "gzip, deflate, br",
  "cookie": "__utma\u003d201319536.747058366.1611919072.1652941054.1652964248.141; __utmz\u003d201319536.1647870296.126.44.utmcsr\u003dgoogle|utmccn\u003d(organic)|utmcmd\u003dorganic|utmctr\u003d(not%20provided); _ga\u003dGA1.2.747058366.1611919072; __utmc\u003d201319536; JSESSIONID\u003dFA6FE393C94D574E60695BF1ECA081CB",
  "upgrade-insecure-requests": "1",
  "sec-fetch-dest": "document",
  "sec-fetch-mode": "navigate",
  "sec-fetch-site": "none",
  "sec-fetch-user": "?1",
  "connection": "close"
}
incoming_path
/test/a/keycloak/callback
incoming_body_form_params
incoming_method
GET
incoming_tls_version
TLSv1.2
incoming_tls_cipher
ECDHE-RSA-AES128-GCM-SHA256
incoming_tls_cert
incoming_body_json
incoming_query_string_params
{
  "state": "WRpIVVNytx",
  "session_state": "21487f0d-2e82-4b4c-baa2-f307686fd42a",
  "code": "9ae641fb-e5ab-4742-912c-be7fa20b0b02.21487f0d-2e82-4b4c-baa2-f307686fd42a.e99716b4-0f3a-40a8-8b15-846bda62c7ea"
}
incoming_body
2022-05-19 13:43:21 SUCCESS
CreateRandomImplicitSubmitUrl
Created random implicit submission URL
implicit_submit
{
  "path": "implicit/1ETUSfaEfuWAqFcNRXFN",
  "fullUrl": "https://www.certification.openid.net/test/a/keycloak/implicit/1ETUSfaEfuWAqFcNRXFN"
}
2022-05-19 13:43:21 OUTGOING
oidcc-refresh-token
Response to HTTP request to test instance SVb9ZwpADzrj7xQ
outgoing
ModelAndView [view="implicitCallback"; model={implicitSubmitUrl=https://www.certification.openid.net/test/a/keycloak/implicit/1ETUSfaEfuWAqFcNRXFN, returnUrl=/log-detail.html?log=SVb9ZwpADzrj7xQ}]
outgoing_path
callback
2022-05-19 13:43:22 INCOMING
oidcc-refresh-token
Incoming HTTP request to /test/a/keycloak/implicit/1ETUSfaEfuWAqFcNRXFN
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:100.0) Gecko/20100101 Firefox/100.0",
  "accept": "*/*",
  "accept-language": "en-US,en;q\u003d0.5",
  "accept-encoding": "gzip, deflate, br",
  "content-type": "text/plain",
  "x-requested-with": "XMLHttpRequest",
  "origin": "https://www.certification.openid.net",
  "referer": "https://www.certification.openid.net/test/a/keycloak/callback?state\u003dWRpIVVNytx\u0026session_state\u003d21487f0d-2e82-4b4c-baa2-f307686fd42a\u0026code\u003d9ae641fb-e5ab-4742-912c-be7fa20b0b02.21487f0d-2e82-4b4c-baa2-f307686fd42a.e99716b4-0f3a-40a8-8b15-846bda62c7ea",
  "cookie": "__utma\u003d201319536.747058366.1611919072.1652941054.1652964248.141; __utmz\u003d201319536.1647870296.126.44.utmcsr\u003dgoogle|utmccn\u003d(organic)|utmcmd\u003dorganic|utmctr\u003d(not%20provided); _ga\u003dGA1.2.747058366.1611919072; __utmc\u003d201319536; JSESSIONID\u003dFA6FE393C94D574E60695BF1ECA081CB",
  "sec-fetch-dest": "empty",
  "sec-fetch-mode": "cors",
  "sec-fetch-site": "same-origin",
  "connection": "close",
  "content-length": "0"
}
incoming_path
/test/a/keycloak/implicit/1ETUSfaEfuWAqFcNRXFN
incoming_body_form_params
incoming_method
POST
incoming_tls_version
TLSv1.2
incoming_tls_cipher
ECDHE-RSA-AES128-GCM-SHA256
incoming_tls_cert
incoming_body_json
incoming_query_string_params
{}
incoming_body
2022-05-19 13:43:22 OUTGOING
oidcc-refresh-token
Response to HTTP request to test instance SVb9ZwpADzrj7xQ
outgoing_status_code
204
outgoing_headers
{}
outgoing_body

                                
outgoing_path
implicit/1ETUSfaEfuWAqFcNRXFN
2022-05-19 13:43:22 SUCCESS
ExtractImplicitHashToCallbackResponse
implicit_hash is empty
2022-05-19 13:43:22 REDIRECT-IN
oidcc-refresh-token
Authorization endpoint response captured
url_query
{
  "state": "WRpIVVNytx",
  "session_state": "21487f0d-2e82-4b4c-baa2-f307686fd42a",
  "code": "9ae641fb-e5ab-4742-912c-be7fa20b0b02.21487f0d-2e82-4b4c-baa2-f307686fd42a.e99716b4-0f3a-40a8-8b15-846bda62c7ea"
}
headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:100.0) Gecko/20100101 Firefox/100.0",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/avif,image/webp,*/*;q\u003d0.8",
  "accept-language": "en-US,en;q\u003d0.5",
  "accept-encoding": "gzip, deflate, br",
  "cookie": "__utma\u003d201319536.747058366.1611919072.1652941054.1652964248.141; __utmz\u003d201319536.1647870296.126.44.utmcsr\u003dgoogle|utmccn\u003d(organic)|utmcmd\u003dorganic|utmctr\u003d(not%20provided); _ga\u003dGA1.2.747058366.1611919072; __utmc\u003d201319536; JSESSIONID\u003dFA6FE393C94D574E60695BF1ECA081CB",
  "upgrade-insecure-requests": "1",
  "sec-fetch-dest": "document",
  "sec-fetch-mode": "navigate",
  "sec-fetch-site": "none",
  "sec-fetch-user": "?1",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "x-forwarded-proto": "https",
  "x-forwarded-port": "443",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
http_method
GET
url_fragment
{}
post_body
Verify authorization endpoint response
2022-05-19 13:43:22 SUCCESS
CheckMatchingCallbackParameters
Callback parameters successfully verified
2022-05-19 13:43:22
ValidateIssInAuthorizationResponse
No 'iss' value in authorization response.
2022-05-19 13:43:22 SUCCESS
CheckIfAuthorizationEndpointError
No error from authorization endpoint
2022-05-19 13:43:22 SUCCESS
CheckStateInAuthorizationResponse
State in response correctly returned
state
WRpIVVNytx
2022-05-19 13:43:22 SUCCESS
ExtractAuthorizationCodeFromAuthorizationResponse
Found authorization code
code
9ae641fb-e5ab-4742-912c-be7fa20b0b02.21487f0d-2e82-4b4c-baa2-f307686fd42a.e99716b4-0f3a-40a8-8b15-846bda62c7ea
2022-05-19 13:43:22 SUCCESS
CreateTokenEndpointRequestForAuthorizationCodeGrant
Created token endpoint request
grant_type
authorization_code
code
9ae641fb-e5ab-4742-912c-be7fa20b0b02.21487f0d-2e82-4b4c-baa2-f307686fd42a.e99716b4-0f3a-40a8-8b15-846bda62c7ea
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
2022-05-19 13:43:22 SUCCESS
AddBasicAuthClientSecretAuthenticationParameters
Added basic authorization header
Authorization
Basic ZTk5NzE2YjQtMGYzYS00MGE4LThiMTUtODQ2YmRhNjJjN2VhOndidUx2UTA5NGpxNHM4d1dUNjNwUGRZb0NZN0REZnl2
2022-05-19 13:43:22
CallTokenEndpoint
HTTP request
request_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token
request_method
POST
request_headers
{
  "accept": "application/json",
  "authorization": "Basic ZTk5NzE2YjQtMGYzYS00MGE4LThiMTUtODQ2YmRhNjJjN2VhOndidUx2UTA5NGpxNHM4d1dUNjNwUGRZb0NZN0REZnl2",
  "content-type": "application/x-www-form-urlencoded;charset\u003dUTF-8",
  "content-length": "234"
}
request_body
grant_type=authorization_code&code=9ae641fb-e5ab-4742-912c-be7fa20b0b02.21487f0d-2e82-4b4c-baa2-f307686fd42a.e99716b4-0f3a-40a8-8b15-846bda62c7ea&redirect_uri=https%3A%2F%2Fwww.certification.openid.net%2Ftest%2Fa%2Fkeycloak%2Fcallback
2022-05-19 13:43:23 RESPONSE
CallTokenEndpoint
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "cache-control": "no-store",
  "x-xss-protection": "1; mode\u003dblock",
  "pragma": "no-cache",
  "x-frame-options": "SAMEORIGIN",
  "referrer-policy": "no-referrer",
  "date": "Thu, 19 May 2022 13:43:22 GMT",
  "connection": "keep-alive",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "content-type": "application/json",
  "content-length": "3277"
}
response_body
{"access_token":"eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.eyJleHAiOjE2NTI5NjgxMDIsImlhdCI6MTY1Mjk2NzgwMiwiYXV0aF90aW1lIjoxNjUyOTY3MzgwLCJqdGkiOiJjY2NmOGJhOS0yOTU0LTRjZjYtYmViNC0yMTFjYTYwYTg5NjUiLCJpc3MiOiJodHRwczovLzg0LTI0NC03Mi05MC5uaXAuaW86NjAwMDAvYXV0aC9yZWFsbXMvdGVzdCIsInN1YiI6IjNlY2RjZWNkLTQzZGMtNGRjOS1hYTFjLWI5NzkxZmNmNzMwZiIsInR5cCI6IkJlYXJlciIsImF6cCI6ImU5OTcxNmI0LTBmM2EtNDBhOC04YjE1LTg0NmJkYTYyYzdlYSIsIm5vbmNlIjoiWURUem5ySHg3ayIsInNlc3Npb25fc3RhdGUiOiIyMTQ4N2YwZC0yZTgyLTRiNGMtYmFhMi1mMzA3Njg2ZmQ0MmEiLCJhY3IiOiIwIiwiYWxsb3dlZC1vcmlnaW5zIjpbImh0dHBzOi8vd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldCJdLCJyZWFsbV9hY2Nlc3MiOnsicm9sZXMiOlsib2ZmbGluZV9hY2Nlc3MiXX0sInNjb3BlIjoib3BlbmlkIG5hbWVfY2xhaW1zIGFjciBvZmZsaW5lX2FjY2VzcyIsInNpZCI6IjIxNDg3ZjBkLTJlODItNGI0Yy1iYWEyLWYzMDc2ODZmZDQyYSJ9.fNtKHlH5UTaFhw9cWnBa1JP4quxbCiO7xJ4rNHyoZ9DAZ3Agc_YbqI-siDLE-XdCKcQHQtbPPaSriL4T1vC5fqrI5uKagzt-Kt2erSXYRQhy1t9yvEpbbnBnQfhQX94FzUzSxK7XXFZSnlgYVePC_Pd9vUgqdhewzGvk3cy0lRbNLJYXIrnXcOrtRKCYNXVnITJHK0W6e4oesoKKVC4Gkc_J35B1qbj-EqWWh4xQlCPuBgEnD-gKsazlQ5UPha9Fjljtob445LXLn0nJD4lKRJlrhji9UsewqsjhXcU-FC4toBTWV57KXU0DIgVzLeTKhL5fAxrJ1n1Ei1WGs650WQ","expires_in":300,"refresh_expires_in":0,"refresh_token":"eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlZGU2NjRjNS0zN2U1LTQ3ZGItOTQzZC04ODk5ZDRmNzExNTQifQ.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.gmp2JxBSNFkAz27MTId6gFCOpCyXJyg7SG7JbOQjwqM","token_type":"Bearer","id_token":"eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.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.ZFfl4P5kboLj3pQXxg4wfEBg8Mg-Du1g9O7opscusavo_bVElS4ZIF-HAAdoEOPsTz2TkLsYctuwxLlmDUSoJEayTa-iHYuV6FOZCYKbcdPck7xZpcvKH8HPWcmL4IH58n6Fixu_Sjuak_2-bMH1SW_t4aZTczNk9Ui-041-Hm07DpQLZ3CTnvhAoICOcq-WdJ9d5zbRy83VyM-sI5xLSV50gg3lel2cm0MXTx3z7_EIvIPNEousEn9CQSAI10fG9tNoUacXzIB-Ef-NsSB7JpZNX33ESxtZOIZKgYUichZTo-TJSlPBTbHM9ISDUguSaoF80eJi6V-NcXtibJVstQ","not-before-policy":1652951933,"session_state":"21487f0d-2e82-4b4c-baa2-f307686fd42a","scope":"openid name_claims acr offline_access"}
2022-05-19 13:43:23 SUCCESS
CallTokenEndpoint
Parsed token endpoint response
access_token
eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.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.fNtKHlH5UTaFhw9cWnBa1JP4quxbCiO7xJ4rNHyoZ9DAZ3Agc_YbqI-siDLE-XdCKcQHQtbPPaSriL4T1vC5fqrI5uKagzt-Kt2erSXYRQhy1t9yvEpbbnBnQfhQX94FzUzSxK7XXFZSnlgYVePC_Pd9vUgqdhewzGvk3cy0lRbNLJYXIrnXcOrtRKCYNXVnITJHK0W6e4oesoKKVC4Gkc_J35B1qbj-EqWWh4xQlCPuBgEnD-gKsazlQ5UPha9Fjljtob445LXLn0nJD4lKRJlrhji9UsewqsjhXcU-FC4toBTWV57KXU0DIgVzLeTKhL5fAxrJ1n1Ei1WGs650WQ
expires_in
300
refresh_expires_in
0
refresh_token
eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlZGU2NjRjNS0zN2U1LTQ3ZGItOTQzZC04ODk5ZDRmNzExNTQifQ.eyJpYXQiOjE2NTI5Njc4MDIsImp0aSI6IjRlNGYyNTQ3LTg3YjgtNDFiZS1iZDE1LWU3ZWE2NDcwMWRmMiIsImlzcyI6Imh0dHBzOi8vODQtMjQ0LTcyLTkwLm5pcC5pbzo2MDAwMC9hdXRoL3JlYWxtcy90ZXN0IiwiYXVkIjoiaHR0cHM6Ly84NC0yNDQtNzItOTAubmlwLmlvOjYwMDAwL2F1dGgvcmVhbG1zL3Rlc3QiLCJzdWIiOiIzZWNkY2VjZC00M2RjLTRkYzktYWExYy1iOTc5MWZjZjczMGYiLCJ0eXAiOiJPZmZsaW5lIiwiYXpwIjoiZTk5NzE2YjQtMGYzYS00MGE4LThiMTUtODQ2YmRhNjJjN2VhIiwibm9uY2UiOiJZRFR6bnJIeDdrIiwic2Vzc2lvbl9zdGF0ZSI6IjIxNDg3ZjBkLTJlODItNGI0Yy1iYWEyLWYzMDc2ODZmZDQyYSIsInNjb3BlIjoib3BlbmlkIG5hbWVfY2xhaW1zIGFjciBvZmZsaW5lX2FjY2VzcyIsInNpZCI6IjIxNDg3ZjBkLTJlODItNGI0Yy1iYWEyLWYzMDc2ODZmZDQyYSJ9.gmp2JxBSNFkAz27MTId6gFCOpCyXJyg7SG7JbOQjwqM
token_type
Bearer
id_token
eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.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.ZFfl4P5kboLj3pQXxg4wfEBg8Mg-Du1g9O7opscusavo_bVElS4ZIF-HAAdoEOPsTz2TkLsYctuwxLlmDUSoJEayTa-iHYuV6FOZCYKbcdPck7xZpcvKH8HPWcmL4IH58n6Fixu_Sjuak_2-bMH1SW_t4aZTczNk9Ui-041-Hm07DpQLZ3CTnvhAoICOcq-WdJ9d5zbRy83VyM-sI5xLSV50gg3lel2cm0MXTx3z7_EIvIPNEousEn9CQSAI10fG9tNoUacXzIB-Ef-NsSB7JpZNX33ESxtZOIZKgYUichZTo-TJSlPBTbHM9ISDUguSaoF80eJi6V-NcXtibJVstQ
not-before-policy
1652951933
session_state
21487f0d-2e82-4b4c-baa2-f307686fd42a
scope
openid name_claims acr offline_access
2022-05-19 13:43:23 SUCCESS
CheckIfTokenEndpointResponseError
No error from token endpoint
2022-05-19 13:43:23 SUCCESS
CheckForAccessTokenValue
Found an access token
access_token
eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.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.fNtKHlH5UTaFhw9cWnBa1JP4quxbCiO7xJ4rNHyoZ9DAZ3Agc_YbqI-siDLE-XdCKcQHQtbPPaSriL4T1vC5fqrI5uKagzt-Kt2erSXYRQhy1t9yvEpbbnBnQfhQX94FzUzSxK7XXFZSnlgYVePC_Pd9vUgqdhewzGvk3cy0lRbNLJYXIrnXcOrtRKCYNXVnITJHK0W6e4oesoKKVC4Gkc_J35B1qbj-EqWWh4xQlCPuBgEnD-gKsazlQ5UPha9Fjljtob445LXLn0nJD4lKRJlrhji9UsewqsjhXcU-FC4toBTWV57KXU0DIgVzLeTKhL5fAxrJ1n1Ei1WGs650WQ
2022-05-19 13:43:23 SUCCESS
ExtractAccessTokenFromTokenResponse
Extracted the access token
value
eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.eyJleHAiOjE2NTI5NjgxMDIsImlhdCI6MTY1Mjk2NzgwMiwiYXV0aF90aW1lIjoxNjUyOTY3MzgwLCJqdGkiOiJjY2NmOGJhOS0yOTU0LTRjZjYtYmViNC0yMTFjYTYwYTg5NjUiLCJpc3MiOiJodHRwczovLzg0LTI0NC03Mi05MC5uaXAuaW86NjAwMDAvYXV0aC9yZWFsbXMvdGVzdCIsInN1YiI6IjNlY2RjZWNkLTQzZGMtNGRjOS1hYTFjLWI5NzkxZmNmNzMwZiIsInR5cCI6IkJlYXJlciIsImF6cCI6ImU5OTcxNmI0LTBmM2EtNDBhOC04YjE1LTg0NmJkYTYyYzdlYSIsIm5vbmNlIjoiWURUem5ySHg3ayIsInNlc3Npb25fc3RhdGUiOiIyMTQ4N2YwZC0yZTgyLTRiNGMtYmFhMi1mMzA3Njg2ZmQ0MmEiLCJhY3IiOiIwIiwiYWxsb3dlZC1vcmlnaW5zIjpbImh0dHBzOi8vd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldCJdLCJyZWFsbV9hY2Nlc3MiOnsicm9sZXMiOlsib2ZmbGluZV9hY2Nlc3MiXX0sInNjb3BlIjoib3BlbmlkIG5hbWVfY2xhaW1zIGFjciBvZmZsaW5lX2FjY2VzcyIsInNpZCI6IjIxNDg3ZjBkLTJlODItNGI0Yy1iYWEyLWYzMDc2ODZmZDQyYSJ9.fNtKHlH5UTaFhw9cWnBa1JP4quxbCiO7xJ4rNHyoZ9DAZ3Agc_YbqI-siDLE-XdCKcQHQtbPPaSriL4T1vC5fqrI5uKagzt-Kt2erSXYRQhy1t9yvEpbbnBnQfhQX94FzUzSxK7XXFZSnlgYVePC_Pd9vUgqdhewzGvk3cy0lRbNLJYXIrnXcOrtRKCYNXVnITJHK0W6e4oesoKKVC4Gkc_J35B1qbj-EqWWh4xQlCPuBgEnD-gKsazlQ5UPha9Fjljtob445LXLn0nJD4lKRJlrhji9UsewqsjhXcU-FC4toBTWV57KXU0DIgVzLeTKhL5fAxrJ1n1Ei1WGs650WQ
type
Bearer
2022-05-19 13:43:23 SUCCESS
ExtractExpiresInFromTokenEndpointResponse
Extracted 'expires_in'
expires_in
300
2022-05-19 13:43:23 SUCCESS
ValidateExpiresIn
expires_in passed all validation checks
expires_in
300
2022-05-19 13:43:23 SUCCESS
CheckForRefreshTokenValue
Found a refresh token
refresh_token
eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlZGU2NjRjNS0zN2U1LTQ3ZGItOTQzZC04ODk5ZDRmNzExNTQifQ.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.gmp2JxBSNFkAz27MTId6gFCOpCyXJyg7SG7JbOQjwqM
2022-05-19 13:43:23 SUCCESS
ExtractIdTokenFromTokenResponse
Found and parsed the id_token from token_endpoint_response
value
eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.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.ZFfl4P5kboLj3pQXxg4wfEBg8Mg-Du1g9O7opscusavo_bVElS4ZIF-HAAdoEOPsTz2TkLsYctuwxLlmDUSoJEayTa-iHYuV6FOZCYKbcdPck7xZpcvKH8HPWcmL4IH58n6Fixu_Sjuak_2-bMH1SW_t4aZTczNk9Ui-041-Hm07DpQLZ3CTnvhAoICOcq-WdJ9d5zbRy83VyM-sI5xLSV50gg3lel2cm0MXTx3z7_EIvIPNEousEn9CQSAI10fG9tNoUacXzIB-Ef-NsSB7JpZNX33ESxtZOIZKgYUichZTo-TJSlPBTbHM9ISDUguSaoF80eJi6V-NcXtibJVstQ
header
{
  "kid": "Mb20UGZj81X9UGbs0uReFcFlUV81vJRDYFPclWBv9GY",
  "typ": "JWT",
  "alg": "RS256"
}
claims
{
  "at_hash": "9KTc5jKQJCAUfzlYbyj-_g",
  "sub": "3ecdcecd-43dc-4dc9-aa1c-b9791fcf730f",
  "iss": "https://84-244-72-90.nip.io:60000/auth/realms/test",
  "typ": "ID",
  "nonce": "YDTznrHx7k",
  "sid": "21487f0d-2e82-4b4c-baa2-f307686fd42a",
  "aud": "e99716b4-0f3a-40a8-8b15-846bda62c7ea",
  "acr": "0",
  "azp": "e99716b4-0f3a-40a8-8b15-846bda62c7ea",
  "auth_time": 1652967380,
  "exp": 1652968102,
  "session_state": "21487f0d-2e82-4b4c-baa2-f307686fd42a",
  "iat": 1652967802,
  "jti": "799fdbe4-125f-4a85-b9ae-3caec0f18f4c"
}
2022-05-19 13:43:23 SUCCESS
ValidateIdToken
ID token iss, aud, exp, iat, auth_time, acr & nbf claims passed validation checks
2022-05-19 13:43:23 SUCCESS
ValidateIdTokenNonce
Nonce values match
nonce
YDTznrHx7k
2022-05-19 13:43:23 SUCCESS
ValidateIdTokenACRClaimAgainstRequest
Nothing to check; the conformance suite did not request an acr claim in request object
2022-05-19 13:43:23 SUCCESS
ValidateIdTokenSignature
id_token signature validated
id_token
eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.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.ZFfl4P5kboLj3pQXxg4wfEBg8Mg-Du1g9O7opscusavo_bVElS4ZIF-HAAdoEOPsTz2TkLsYctuwxLlmDUSoJEayTa-iHYuV6FOZCYKbcdPck7xZpcvKH8HPWcmL4IH58n6Fixu_Sjuak_2-bMH1SW_t4aZTczNk9Ui-041-Hm07DpQLZ3CTnvhAoICOcq-WdJ9d5zbRy83VyM-sI5xLSV50gg3lel2cm0MXTx3z7_EIvIPNEousEn9CQSAI10fG9tNoUacXzIB-Ef-NsSB7JpZNX33ESxtZOIZKgYUichZTo-TJSlPBTbHM9ISDUguSaoF80eJi6V-NcXtibJVstQ
2022-05-19 13:43:23 SUCCESS
ValidateIdTokenSignatureUsingKid
id_token signature validated
id_token
eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.eyJleHAiOjE2NTI5NjgxMDIsImlhdCI6MTY1Mjk2NzgwMiwiYXV0aF90aW1lIjoxNjUyOTY3MzgwLCJqdGkiOiI3OTlmZGJlNC0xMjVmLTRhODUtYjlhZS0zY2FlYzBmMThmNGMiLCJpc3MiOiJodHRwczovLzg0LTI0NC03Mi05MC5uaXAuaW86NjAwMDAvYXV0aC9yZWFsbXMvdGVzdCIsImF1ZCI6ImU5OTcxNmI0LTBmM2EtNDBhOC04YjE1LTg0NmJkYTYyYzdlYSIsInN1YiI6IjNlY2RjZWNkLTQzZGMtNGRjOS1hYTFjLWI5NzkxZmNmNzMwZiIsInR5cCI6IklEIiwiYXpwIjoiZTk5NzE2YjQtMGYzYS00MGE4LThiMTUtODQ2YmRhNjJjN2VhIiwibm9uY2UiOiJZRFR6bnJIeDdrIiwic2Vzc2lvbl9zdGF0ZSI6IjIxNDg3ZjBkLTJlODItNGI0Yy1iYWEyLWYzMDc2ODZmZDQyYSIsImF0X2hhc2giOiI5S1RjNWpLUUpDQVVmemxZYnlqLV9nIiwiYWNyIjoiMCIsInNpZCI6IjIxNDg3ZjBkLTJlODItNGI0Yy1iYWEyLWYzMDc2ODZmZDQyYSJ9.ZFfl4P5kboLj3pQXxg4wfEBg8Mg-Du1g9O7opscusavo_bVElS4ZIF-HAAdoEOPsTz2TkLsYctuwxLlmDUSoJEayTa-iHYuV6FOZCYKbcdPck7xZpcvKH8HPWcmL4IH58n6Fixu_Sjuak_2-bMH1SW_t4aZTczNk9Ui-041-Hm07DpQLZ3CTnvhAoICOcq-WdJ9d5zbRy83VyM-sI5xLSV50gg3lel2cm0MXTx3z7_EIvIPNEousEn9CQSAI10fG9tNoUacXzIB-Ef-NsSB7JpZNX33ESxtZOIZKgYUichZTo-TJSlPBTbHM9ISDUguSaoF80eJi6V-NcXtibJVstQ
2022-05-19 13:43:23 SUCCESS
CheckForSubjectInIdToken
Found 'sub' in id_token
sub
3ecdcecd-43dc-4dc9-aa1c-b9791fcf730f
2022-05-19 13:43:23 INFO
FAPIValidateEncryptedIdTokenHasKid
Skipped evaluation due to missing required element: id_token jwe_header
path
jwe_header
mapped
object
id_token
2022-05-19 13:43:23 SUCCESS
ExtractRefreshTokenFromTokenResponse
Extracted refresh token from response
refresh_token
eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlZGU2NjRjNS0zN2U1LTQ3ZGItOTQzZC04ODk5ZDRmNzExNTQifQ.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.gmp2JxBSNFkAz27MTId6gFCOpCyXJyg7SG7JbOQjwqM
2022-05-19 13:43:23 SUCCESS
EnsureServerConfigurationSupportsRefreshToken
The server configuration indicates support for refresh tokens
supported_grant_types
[
  "authorization_code",
  "implicit",
  "refresh_token",
  "password",
  "client_credentials",
  "urn:ietf:params:oauth:grant-type:device_code",
  "urn:openid:params:grant-type:ciba"
]
2022-05-19 13:43:23 SUCCESS
EnsureRefreshTokenContainsAllowedCharactersOnly
Refresh token does not contain any illegal characters
Refresh Token Request
2022-05-19 13:43:23 SUCCESS
CreateRefreshTokenRequest
Created token endpoint request parameters
grant_type
refresh_token
refresh_token
eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlZGU2NjRjNS0zN2U1LTQ3ZGItOTQzZC04ODk5ZDRmNzExNTQifQ.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.gmp2JxBSNFkAz27MTId6gFCOpCyXJyg7SG7JbOQjwqM
2022-05-19 13:43:23 SUCCESS
AddScopeToTokenEndpointRequest
Added scope of 'openid offline_access' to token endpoint request
grant_type
refresh_token
refresh_token
eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlZGU2NjRjNS0zN2U1LTQ3ZGItOTQzZC04ODk5ZDRmNzExNTQifQ.eyJpYXQiOjE2NTI5Njc4MDIsImp0aSI6IjRlNGYyNTQ3LTg3YjgtNDFiZS1iZDE1LWU3ZWE2NDcwMWRmMiIsImlzcyI6Imh0dHBzOi8vODQtMjQ0LTcyLTkwLm5pcC5pbzo2MDAwMC9hdXRoL3JlYWxtcy90ZXN0IiwiYXVkIjoiaHR0cHM6Ly84NC0yNDQtNzItOTAubmlwLmlvOjYwMDAwL2F1dGgvcmVhbG1zL3Rlc3QiLCJzdWIiOiIzZWNkY2VjZC00M2RjLTRkYzktYWExYy1iOTc5MWZjZjczMGYiLCJ0eXAiOiJPZmZsaW5lIiwiYXpwIjoiZTk5NzE2YjQtMGYzYS00MGE4LThiMTUtODQ2YmRhNjJjN2VhIiwibm9uY2UiOiJZRFR6bnJIeDdrIiwic2Vzc2lvbl9zdGF0ZSI6IjIxNDg3ZjBkLTJlODItNGI0Yy1iYWEyLWYzMDc2ODZmZDQyYSIsInNjb3BlIjoib3BlbmlkIG5hbWVfY2xhaW1zIGFjciBvZmZsaW5lX2FjY2VzcyIsInNpZCI6IjIxNDg3ZjBkLTJlODItNGI0Yy1iYWEyLWYzMDc2ODZmZDQyYSJ9.gmp2JxBSNFkAz27MTId6gFCOpCyXJyg7SG7JbOQjwqM
scope
openid offline_access
2022-05-19 13:43:23 SUCCESS
AddBasicAuthClientSecretAuthenticationParameters
Added basic authorization header
Authorization
Basic ZTk5NzE2YjQtMGYzYS00MGE4LThiMTUtODQ2YmRhNjJjN2VhOndidUx2UTA5NGpxNHM4d1dUNjNwUGRZb0NZN0REZnl2
2022-05-19 13:43:23 SUCCESS
WaitForOneSecond
Pausing for 1 seconds
2022-05-19 13:43:24 SUCCESS
WaitForOneSecond
Woke up after 1 seconds sleep
2022-05-19 13:43:24
CallTokenEndpointAndReturnFullResponse
HTTP request
request_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token
request_method
POST
request_headers
{
  "accept": "application/json",
  "authorization": "Basic ZTk5NzE2YjQtMGYzYS00MGE4LThiMTUtODQ2YmRhNjJjN2VhOndidUx2UTA5NGpxNHM4d1dUNjNwUGRZb0NZN0REZnl2",
  "content-type": "application/x-www-form-urlencoded;charset\u003dUTF-8",
  "content-length": "822"
}
request_body
grant_type=refresh_token&refresh_token=eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlZGU2NjRjNS0zN2U1LTQ3ZGItOTQzZC04ODk5ZDRmNzExNTQifQ.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.gmp2JxBSNFkAz27MTId6gFCOpCyXJyg7SG7JbOQjwqM&scope=openid+offline_access
2022-05-19 13:43:24 RESPONSE
CallTokenEndpointAndReturnFullResponse
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "cache-control": "no-store",
  "x-xss-protection": "1; mode\u003dblock",
  "pragma": "no-cache",
  "x-frame-options": "SAMEORIGIN",
  "referrer-policy": "no-referrer",
  "date": "Thu, 19 May 2022 13:43:24 GMT",
  "connection": "keep-alive",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "content-type": "application/json",
  "content-length": "3277"
}
response_body
{"access_token":"eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.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.TG0ENi1tJeeRJ6dL4f_vrvlPIgkZsMPwotpJlaRg2Kjl0-qrugWU9Y74JamCLVqpbx2L7_SnHw63xEjPUcJEZ2NzNR8b0sSzaTc8jKV_WS8CXahheiSmhsY3UXVFKL193mRMfQ9N5FiU025AVG2FF9W2EcFoqsmQYbGUtbRCxBVQ5Qh89B1-9jK-7bqggpvPC47gLgZyz-kguGueSJQ_7DIfaniUKPA1lVjHZb9aehlbX1RbQzYRld48bjvoFVY-hx_SuACQA4af38IwHg5Ftm6CAvTT0r391a-YQcR2d3KFT3yOURmqijTI8Pzra0yEyvsQi6Sgtyk-CBsYMFgsZA","expires_in":300,"refresh_expires_in":0,"refresh_token":"eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlZGU2NjRjNS0zN2U1LTQ3ZGItOTQzZC04ODk5ZDRmNzExNTQifQ.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.MaIGJZqqC_qFi1n5Zz6Ow-qAxgvUfuxRGZi65aOeX6s","token_type":"Bearer","id_token":"eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.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.KjXTHS8XYYQm_5jQSzL_QtJvFEkhW8lm5j4tsCf2c8WcnlLWFbxckOtEcxiIHEloOSkQNDrmNEc_1N_-iMvGWt5an0ko_V2C8Z3ia3iVCdkr61mizThpiBoGzxkbWKJvy9eYFJPHkEERM7BQWS4Uaak78lCZ3ZoPuRYVke_x6-6-__GKQlHpiNYJmji1aR2O2AVMQn3vlv3USqkmv5f8yYFVLjoH5jYcKcqDe_a-4qO48hEnu7ly8glL5dEeGuiP2kngczKMIXuunZRoMZC8uZuhaydxx4cXoBOPQN6CizUWlKpm6nfmkD0siiFB8fKGNAMekLuP2wBdV71CouT23Q","not-before-policy":1652951933,"session_state":"21487f0d-2e82-4b4c-baa2-f307686fd42a","scope":"openid name_claims acr offline_access"}
2022-05-19 13:43:24 SUCCESS
CallTokenEndpointAndReturnFullResponse
Parsed token endpoint response
access_token
eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.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.TG0ENi1tJeeRJ6dL4f_vrvlPIgkZsMPwotpJlaRg2Kjl0-qrugWU9Y74JamCLVqpbx2L7_SnHw63xEjPUcJEZ2NzNR8b0sSzaTc8jKV_WS8CXahheiSmhsY3UXVFKL193mRMfQ9N5FiU025AVG2FF9W2EcFoqsmQYbGUtbRCxBVQ5Qh89B1-9jK-7bqggpvPC47gLgZyz-kguGueSJQ_7DIfaniUKPA1lVjHZb9aehlbX1RbQzYRld48bjvoFVY-hx_SuACQA4af38IwHg5Ftm6CAvTT0r391a-YQcR2d3KFT3yOURmqijTI8Pzra0yEyvsQi6Sgtyk-CBsYMFgsZA
expires_in
300
refresh_expires_in
0
refresh_token
eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlZGU2NjRjNS0zN2U1LTQ3ZGItOTQzZC04ODk5ZDRmNzExNTQifQ.eyJpYXQiOjE2NTI5Njc4MDQsImp0aSI6ImI5NjlmMTRhLThhYzctNGVhZi1hZDkzLTFjYWEyMGQ5NGYwZSIsImlzcyI6Imh0dHBzOi8vODQtMjQ0LTcyLTkwLm5pcC5pbzo2MDAwMC9hdXRoL3JlYWxtcy90ZXN0IiwiYXVkIjoiaHR0cHM6Ly84NC0yNDQtNzItOTAubmlwLmlvOjYwMDAwL2F1dGgvcmVhbG1zL3Rlc3QiLCJzdWIiOiIzZWNkY2VjZC00M2RjLTRkYzktYWExYy1iOTc5MWZjZjczMGYiLCJ0eXAiOiJPZmZsaW5lIiwiYXpwIjoiZTk5NzE2YjQtMGYzYS00MGE4LThiMTUtODQ2YmRhNjJjN2VhIiwibm9uY2UiOiJZRFR6bnJIeDdrIiwic2Vzc2lvbl9zdGF0ZSI6IjIxNDg3ZjBkLTJlODItNGI0Yy1iYWEyLWYzMDc2ODZmZDQyYSIsInNjb3BlIjoib3BlbmlkIG5hbWVfY2xhaW1zIGFjciBvZmZsaW5lX2FjY2VzcyIsInNpZCI6IjIxNDg3ZjBkLTJlODItNGI0Yy1iYWEyLWYzMDc2ODZmZDQyYSJ9.MaIGJZqqC_qFi1n5Zz6Ow-qAxgvUfuxRGZi65aOeX6s
token_type
Bearer
id_token
eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.eyJleHAiOjE2NTI5NjgxMDQsImlhdCI6MTY1Mjk2NzgwNCwiYXV0aF90aW1lIjoxNjUyOTY3MzgwLCJqdGkiOiIzZTE1NTdmMC1hNDZiLTRmYzUtYTExZi02MWU4NzcxMjVkOTMiLCJpc3MiOiJodHRwczovLzg0LTI0NC03Mi05MC5uaXAuaW86NjAwMDAvYXV0aC9yZWFsbXMvdGVzdCIsImF1ZCI6ImU5OTcxNmI0LTBmM2EtNDBhOC04YjE1LTg0NmJkYTYyYzdlYSIsInN1YiI6IjNlY2RjZWNkLTQzZGMtNGRjOS1hYTFjLWI5NzkxZmNmNzMwZiIsInR5cCI6IklEIiwiYXpwIjoiZTk5NzE2YjQtMGYzYS00MGE4LThiMTUtODQ2YmRhNjJjN2VhIiwibm9uY2UiOiJZRFR6bnJIeDdrIiwic2Vzc2lvbl9zdGF0ZSI6IjIxNDg3ZjBkLTJlODItNGI0Yy1iYWEyLWYzMDc2ODZmZDQyYSIsImF0X2hhc2giOiJQY29naE8yYXhKeUtfaGw5MW9ZUXZ3IiwiYWNyIjoiMCIsInNpZCI6IjIxNDg3ZjBkLTJlODItNGI0Yy1iYWEyLWYzMDc2ODZmZDQyYSJ9.KjXTHS8XYYQm_5jQSzL_QtJvFEkhW8lm5j4tsCf2c8WcnlLWFbxckOtEcxiIHEloOSkQNDrmNEc_1N_-iMvGWt5an0ko_V2C8Z3ia3iVCdkr61mizThpiBoGzxkbWKJvy9eYFJPHkEERM7BQWS4Uaak78lCZ3ZoPuRYVke_x6-6-__GKQlHpiNYJmji1aR2O2AVMQn3vlv3USqkmv5f8yYFVLjoH5jYcKcqDe_a-4qO48hEnu7ly8glL5dEeGuiP2kngczKMIXuunZRoMZC8uZuhaydxx4cXoBOPQN6CizUWlKpm6nfmkD0siiFB8fKGNAMekLuP2wBdV71CouT23Q
not-before-policy
1652951933
session_state
21487f0d-2e82-4b4c-baa2-f307686fd42a
scope
openid name_claims acr offline_access
2022-05-19 13:43:24 SUCCESS
CheckTokenEndpointHttpStatus200
Token endpoint http status code was 200
2022-05-19 13:43:24 SUCCESS
CheckTokenEndpointReturnedJsonContentType
token_endpoint_response_headers Content-Type: header is application/json
2022-05-19 13:43:24 SUCCESS
CheckTokenEndpointCacheHeaders
'pragma' and 'cache-control' headers in token endpoint response contain expected values.
cache_control_header
no-store
pragma_header
no-cache
2022-05-19 13:43:24 SUCCESS
CheckIfTokenEndpointResponseError
No error from token endpoint
2022-05-19 13:43:24 SUCCESS
ExtractAccessTokenFromTokenResponse
Extracted the access token
value
eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.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.TG0ENi1tJeeRJ6dL4f_vrvlPIgkZsMPwotpJlaRg2Kjl0-qrugWU9Y74JamCLVqpbx2L7_SnHw63xEjPUcJEZ2NzNR8b0sSzaTc8jKV_WS8CXahheiSmhsY3UXVFKL193mRMfQ9N5FiU025AVG2FF9W2EcFoqsmQYbGUtbRCxBVQ5Qh89B1-9jK-7bqggpvPC47gLgZyz-kguGueSJQ_7DIfaniUKPA1lVjHZb9aehlbX1RbQzYRld48bjvoFVY-hx_SuACQA4af38IwHg5Ftm6CAvTT0r391a-YQcR2d3KFT3yOURmqijTI8Pzra0yEyvsQi6Sgtyk-CBsYMFgsZA
type
Bearer
2022-05-19 13:43:24 SUCCESS
CheckTokenTypeIsBearer
Token type is bearer
2022-05-19 13:43:24 SUCCESS
EnsureMinimumAccessTokenEntropy
Calculated shannon entropy seems sufficient
actual
6883.06710949641
expected
96.0
value
s
2022-05-19 13:43:24 SUCCESS
EnsureAccessTokenContainsAllowedCharactersOnly
Access token does not contain any illegal characters
2022-05-19 13:43:24 SUCCESS
ExtractExpiresInFromTokenEndpointResponse
Extracted 'expires_in'
expires_in
300
2022-05-19 13:43:24 SUCCESS
ValidateExpiresIn
expires_in passed all validation checks
expires_in
300
2022-05-19 13:43:24 SUCCESS
EnsureAccessTokenValuesAreDifferent
Access token values are not the same
first_access_token
eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.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.fNtKHlH5UTaFhw9cWnBa1JP4quxbCiO7xJ4rNHyoZ9DAZ3Agc_YbqI-siDLE-XdCKcQHQtbPPaSriL4T1vC5fqrI5uKagzt-Kt2erSXYRQhy1t9yvEpbbnBnQfhQX94FzUzSxK7XXFZSnlgYVePC_Pd9vUgqdhewzGvk3cy0lRbNLJYXIrnXcOrtRKCYNXVnITJHK0W6e4oesoKKVC4Gkc_J35B1qbj-EqWWh4xQlCPuBgEnD-gKsazlQ5UPha9Fjljtob445LXLn0nJD4lKRJlrhji9UsewqsjhXcU-FC4toBTWV57KXU0DIgVzLeTKhL5fAxrJ1n1Ei1WGs650WQ
second_access_token
eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.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.TG0ENi1tJeeRJ6dL4f_vrvlPIgkZsMPwotpJlaRg2Kjl0-qrugWU9Y74JamCLVqpbx2L7_SnHw63xEjPUcJEZ2NzNR8b0sSzaTc8jKV_WS8CXahheiSmhsY3UXVFKL193mRMfQ9N5FiU025AVG2FF9W2EcFoqsmQYbGUtbRCxBVQ5Qh89B1-9jK-7bqggpvPC47gLgZyz-kguGueSJQ_7DIfaniUKPA1lVjHZb9aehlbX1RbQzYRld48bjvoFVY-hx_SuACQA4af38IwHg5Ftm6CAvTT0r391a-YQcR2d3KFT3yOURmqijTI8Pzra0yEyvsQi6Sgtyk-CBsYMFgsZA
2022-05-19 13:43:24 SUCCESS
ExtractIdTokenFromTokenResponse
Found and parsed the id_token from token_endpoint_response
value
eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.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.KjXTHS8XYYQm_5jQSzL_QtJvFEkhW8lm5j4tsCf2c8WcnlLWFbxckOtEcxiIHEloOSkQNDrmNEc_1N_-iMvGWt5an0ko_V2C8Z3ia3iVCdkr61mizThpiBoGzxkbWKJvy9eYFJPHkEERM7BQWS4Uaak78lCZ3ZoPuRYVke_x6-6-__GKQlHpiNYJmji1aR2O2AVMQn3vlv3USqkmv5f8yYFVLjoH5jYcKcqDe_a-4qO48hEnu7ly8glL5dEeGuiP2kngczKMIXuunZRoMZC8uZuhaydxx4cXoBOPQN6CizUWlKpm6nfmkD0siiFB8fKGNAMekLuP2wBdV71CouT23Q
header
{
  "kid": "Mb20UGZj81X9UGbs0uReFcFlUV81vJRDYFPclWBv9GY",
  "typ": "JWT",
  "alg": "RS256"
}
claims
{
  "at_hash": "PcoghO2axJyK_hl91oYQvw",
  "sub": "3ecdcecd-43dc-4dc9-aa1c-b9791fcf730f",
  "iss": "https://84-244-72-90.nip.io:60000/auth/realms/test",
  "typ": "ID",
  "nonce": "YDTznrHx7k",
  "sid": "21487f0d-2e82-4b4c-baa2-f307686fd42a",
  "aud": "e99716b4-0f3a-40a8-8b15-846bda62c7ea",
  "acr": "0",
  "azp": "e99716b4-0f3a-40a8-8b15-846bda62c7ea",
  "auth_time": 1652967380,
  "exp": 1652968104,
  "session_state": "21487f0d-2e82-4b4c-baa2-f307686fd42a",
  "iat": 1652967804,
  "jti": "3e1557f0-a46b-4fc5-a11f-61e877125d93"
}
2022-05-19 13:43:24 SUCCESS
ExtractRefreshTokenFromTokenResponse
Extracted refresh token from response
refresh_token
eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlZGU2NjRjNS0zN2U1LTQ3ZGItOTQzZC04ODk5ZDRmNzExNTQifQ.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.MaIGJZqqC_qFi1n5Zz6Ow-qAxgvUfuxRGZi65aOeX6s
2022-05-19 13:43:24 SUCCESS
EnsureMinimumRefreshTokenLength
Refresh token is of sufficient length
actual
6040
required
128
2022-05-19 13:43:24 SUCCESS
EnsureMinimumRefreshTokenEntropy
Calculated shannon entropy seems sufficient
actual
4233.358592542789
expected
96.0
value
s
2022-05-19 13:43:24 SUCCESS
CompareIdTokenClaims
Validated id token claims successfully
iss
{
  "first": "https://84-244-72-90.nip.io:60000/auth/realms/test",
  "second": "https://84-244-72-90.nip.io:60000/auth/realms/test",
  "note": "Values are expected to be equal"
}
sub
{
  "first": "3ecdcecd-43dc-4dc9-aa1c-b9791fcf730f",
  "second": "3ecdcecd-43dc-4dc9-aa1c-b9791fcf730f",
  "note": "Values are expected to be equal"
}
iat
{
  "first": 1652967802,
  "second": 1652967804,
  "note": "Values are expected to be different"
}
aud
{
  "first": "e99716b4-0f3a-40a8-8b15-846bda62c7ea",
  "second": "e99716b4-0f3a-40a8-8b15-846bda62c7ea",
  "note": "Values are expected to be equal"
}
auth_time
{
  "first": 1652967380,
  "second": 1652967380,
  "note": "Values are expected to be equal"
}
azp
{
  "first": "e99716b4-0f3a-40a8-8b15-846bda62c7ea",
  "second": "e99716b4-0f3a-40a8-8b15-846bda62c7ea",
  "note": "Values are expected to be equal"
}
Userinfo endpoint tests
2022-05-19 13:43:24
CallProtectedResource
HTTP request
request_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/userinfo
request_method
GET
request_headers
{
  "accept": "application/json",
  "authorization": "Bearer eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.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.TG0ENi1tJeeRJ6dL4f_vrvlPIgkZsMPwotpJlaRg2Kjl0-qrugWU9Y74JamCLVqpbx2L7_SnHw63xEjPUcJEZ2NzNR8b0sSzaTc8jKV_WS8CXahheiSmhsY3UXVFKL193mRMfQ9N5FiU025AVG2FF9W2EcFoqsmQYbGUtbRCxBVQ5Qh89B1-9jK-7bqggpvPC47gLgZyz-kguGueSJQ_7DIfaniUKPA1lVjHZb9aehlbX1RbQzYRld48bjvoFVY-hx_SuACQA4af38IwHg5Ftm6CAvTT0r391a-YQcR2d3KFT3yOURmqijTI8Pzra0yEyvsQi6Sgtyk-CBsYMFgsZA",
  "content-length": "0"
}
request_body

                                
2022-05-19 13:43:25 RESPONSE
CallProtectedResource
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "cache-control": "no-cache",
  "x-xss-protection": "1; mode\u003dblock",
  "x-frame-options": "SAMEORIGIN",
  "referrer-policy": "no-referrer",
  "date": "Thu, 19 May 2022 13:43:25 GMT",
  "connection": "keep-alive",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "content-type": "application/json",
  "content-length": "46"
}
response_body
{"sub":"3ecdcecd-43dc-4dc9-aa1c-b9791fcf730f"}
2022-05-19 13:43:25 SUCCESS
CallProtectedResource
Got a response from the resource endpoint
status
200
endpoint_name
resource
headers
{
  "cache-control": "no-cache",
  "x-xss-protection": "1; mode\u003dblock",
  "x-frame-options": "SAMEORIGIN",
  "referrer-policy": "no-referrer",
  "date": "Thu, 19 May 2022 13:43:25 GMT",
  "connection": "keep-alive",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "content-type": "application/json",
  "content-length": "46"
}
body
{"sub":"3ecdcecd-43dc-4dc9-aa1c-b9791fcf730f"}
2022-05-19 13:43:25 SUCCESS
EnsureHttpStatusCodeIs200
resource endpoint returned the expected http status
expected_status
200
http_status
200
Second client: Make request to authorization endpoint
2022-05-19 13:43:25 SUCCESS
CreateAuthorizationEndpointRequestFromClientInformation
Created authorization endpoint request
client_id
5f24bc2e-d871-4555-82a8-efd61a2aa5f1
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
scope
openid offline_access
2022-05-19 13:43:25
CreateRandomStateValue
Created state value
requested_state_length
10
state
PBVlh4MHnM
2022-05-19 13:43:25 SUCCESS
AddStateToAuthorizationEndpointRequest
Added state parameter to request
client_id
5f24bc2e-d871-4555-82a8-efd61a2aa5f1
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
scope
openid offline_access
state
PBVlh4MHnM
2022-05-19 13:43:25
CreateRandomNonceValue
Created nonce value
requested_nonce_length
10
nonce
os7exUNRll
2022-05-19 13:43:25 SUCCESS
AddNonceToAuthorizationEndpointRequest
Added nonce parameter to request
client_id
5f24bc2e-d871-4555-82a8-efd61a2aa5f1
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
scope
openid offline_access
state
PBVlh4MHnM
nonce
os7exUNRll
2022-05-19 13:43:25 SUCCESS
SetAuthorizationEndpointRequestResponseTypeFromEnvironment
Added response_type parameter to request
client_id
5f24bc2e-d871-4555-82a8-efd61a2aa5f1
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
scope
openid offline_access
state
PBVlh4MHnM
nonce
os7exUNRll
response_type
code
2022-05-19 13:43:25 SUCCESS
AddPromptConsentToAuthorizationEndpointRequestIfScopeContainsOfflineAccess
Added prompt=consent to authorization endpoint request
client_id
5f24bc2e-d871-4555-82a8-efd61a2aa5f1
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
scope
openid offline_access
state
PBVlh4MHnM
nonce
os7exUNRll
response_type
code
prompt
consent
2022-05-19 13:43:25 SUCCESS
BuildPlainRedirectToAuthorizationEndpoint
Sending to authorization endpoint
auth_request
{
  "client_id": "5f24bc2e-d871-4555-82a8-efd61a2aa5f1",
  "redirect_uri": "https://www.certification.openid.net/test/a/keycloak/callback",
  "scope": "openid offline_access",
  "state": "PBVlh4MHnM",
  "nonce": "os7exUNRll",
  "response_type": "code",
  "prompt": "consent"
}
redirect_to_authorization_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth?client_id=5f24bc2e-d871-4555-82a8-efd61a2aa5f1&redirect_uri=https://www.certification.openid.net/test/a/keycloak/callback&scope=openid%20offline_access&state=PBVlh4MHnM&nonce=os7exUNRll&response_type=code&prompt=consent
2022-05-19 13:43:25 REDIRECT
oidcc-refresh-token
Redirecting to authorization endpoint
redirect_to
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth?client_id=5f24bc2e-d871-4555-82a8-efd61a2aa5f1&redirect_uri=https://www.certification.openid.net/test/a/keycloak/callback&scope=openid%20offline_access&state=PBVlh4MHnM&nonce=os7exUNRll&response_type=code&prompt=consent
2022-05-19 13:43:38 INCOMING
oidcc-refresh-token
Incoming HTTP request to /test/a/keycloak/callback
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:100.0) Gecko/20100101 Firefox/100.0",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/avif,image/webp,*/*;q\u003d0.8",
  "accept-language": "en-US,en;q\u003d0.5",
  "accept-encoding": "gzip, deflate, br",
  "cookie": "__utma\u003d201319536.747058366.1611919072.1652941054.1652964248.141; __utmz\u003d201319536.1647870296.126.44.utmcsr\u003dgoogle|utmccn\u003d(organic)|utmcmd\u003dorganic|utmctr\u003d(not%20provided); _ga\u003dGA1.2.747058366.1611919072; __utmc\u003d201319536; JSESSIONID\u003dFA6FE393C94D574E60695BF1ECA081CB",
  "upgrade-insecure-requests": "1",
  "sec-fetch-dest": "document",
  "sec-fetch-mode": "navigate",
  "sec-fetch-site": "none",
  "sec-fetch-user": "?1",
  "connection": "close"
}
incoming_path
/test/a/keycloak/callback
incoming_body_form_params
incoming_method
GET
incoming_tls_version
TLSv1.2
incoming_tls_cipher
ECDHE-RSA-AES128-GCM-SHA256
incoming_tls_cert
incoming_body_json
incoming_query_string_params
{
  "state": "PBVlh4MHnM",
  "session_state": "21487f0d-2e82-4b4c-baa2-f307686fd42a",
  "code": "31b40e20-220d-4c1d-b088-25512005676a.21487f0d-2e82-4b4c-baa2-f307686fd42a.5f24bc2e-d871-4555-82a8-efd61a2aa5f1"
}
incoming_body
2022-05-19 13:43:38 SUCCESS
CreateRandomImplicitSubmitUrl
Created random implicit submission URL
implicit_submit
{
  "path": "implicit/upERTtgvsFE8IIZgt3fD",
  "fullUrl": "https://www.certification.openid.net/test/a/keycloak/implicit/upERTtgvsFE8IIZgt3fD"
}
2022-05-19 13:43:38 OUTGOING
oidcc-refresh-token
Response to HTTP request to test instance SVb9ZwpADzrj7xQ
outgoing
ModelAndView [view="implicitCallback"; model={implicitSubmitUrl=https://www.certification.openid.net/test/a/keycloak/implicit/upERTtgvsFE8IIZgt3fD, returnUrl=/log-detail.html?log=SVb9ZwpADzrj7xQ}]
outgoing_path
callback
2022-05-19 13:43:39 INCOMING
oidcc-refresh-token
Incoming HTTP request to /test/a/keycloak/implicit/upERTtgvsFE8IIZgt3fD
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:100.0) Gecko/20100101 Firefox/100.0",
  "accept": "*/*",
  "accept-language": "en-US,en;q\u003d0.5",
  "accept-encoding": "gzip, deflate, br",
  "content-type": "text/plain",
  "x-requested-with": "XMLHttpRequest",
  "origin": "https://www.certification.openid.net",
  "referer": "https://www.certification.openid.net/test/a/keycloak/callback?state\u003dPBVlh4MHnM\u0026session_state\u003d21487f0d-2e82-4b4c-baa2-f307686fd42a\u0026code\u003d31b40e20-220d-4c1d-b088-25512005676a.21487f0d-2e82-4b4c-baa2-f307686fd42a.5f24bc2e-d871-4555-82a8-efd61a2aa5f1",
  "cookie": "__utma\u003d201319536.747058366.1611919072.1652941054.1652964248.141; __utmz\u003d201319536.1647870296.126.44.utmcsr\u003dgoogle|utmccn\u003d(organic)|utmcmd\u003dorganic|utmctr\u003d(not%20provided); _ga\u003dGA1.2.747058366.1611919072; __utmc\u003d201319536; JSESSIONID\u003dFA6FE393C94D574E60695BF1ECA081CB",
  "sec-fetch-dest": "empty",
  "sec-fetch-mode": "cors",
  "sec-fetch-site": "same-origin",
  "connection": "close",
  "content-length": "0"
}
incoming_path
/test/a/keycloak/implicit/upERTtgvsFE8IIZgt3fD
incoming_body_form_params
incoming_method
POST
incoming_tls_version
TLSv1.2
incoming_tls_cipher
ECDHE-RSA-AES128-GCM-SHA256
incoming_tls_cert
incoming_body_json
incoming_query_string_params
{}
incoming_body
2022-05-19 13:43:39 OUTGOING
oidcc-refresh-token
Response to HTTP request to test instance SVb9ZwpADzrj7xQ
outgoing_status_code
204
outgoing_headers
{}
outgoing_body

                                
outgoing_path
implicit/upERTtgvsFE8IIZgt3fD
2022-05-19 13:43:39 SUCCESS
ExtractImplicitHashToCallbackResponse
implicit_hash is empty
2022-05-19 13:43:39 REDIRECT-IN
oidcc-refresh-token
Authorization endpoint response captured
url_query
{
  "state": "PBVlh4MHnM",
  "session_state": "21487f0d-2e82-4b4c-baa2-f307686fd42a",
  "code": "31b40e20-220d-4c1d-b088-25512005676a.21487f0d-2e82-4b4c-baa2-f307686fd42a.5f24bc2e-d871-4555-82a8-efd61a2aa5f1"
}
headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:100.0) Gecko/20100101 Firefox/100.0",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/avif,image/webp,*/*;q\u003d0.8",
  "accept-language": "en-US,en;q\u003d0.5",
  "accept-encoding": "gzip, deflate, br",
  "cookie": "__utma\u003d201319536.747058366.1611919072.1652941054.1652964248.141; __utmz\u003d201319536.1647870296.126.44.utmcsr\u003dgoogle|utmccn\u003d(organic)|utmcmd\u003dorganic|utmctr\u003d(not%20provided); _ga\u003dGA1.2.747058366.1611919072; __utmc\u003d201319536; JSESSIONID\u003dFA6FE393C94D574E60695BF1ECA081CB",
  "upgrade-insecure-requests": "1",
  "sec-fetch-dest": "document",
  "sec-fetch-mode": "navigate",
  "sec-fetch-site": "none",
  "sec-fetch-user": "?1",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "x-forwarded-proto": "https",
  "x-forwarded-port": "443",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
http_method
GET
url_fragment
{}
post_body
Second client: Verify authorization endpoint response
2022-05-19 13:43:39 SUCCESS
CheckMatchingCallbackParameters
Callback parameters successfully verified
2022-05-19 13:43:39
ValidateIssInAuthorizationResponse
No 'iss' value in authorization response.
2022-05-19 13:43:39 SUCCESS
CheckIfAuthorizationEndpointError
No error from authorization endpoint
2022-05-19 13:43:39 SUCCESS
CheckStateInAuthorizationResponse
State in response correctly returned
state
PBVlh4MHnM
2022-05-19 13:43:39 SUCCESS
ExtractAuthorizationCodeFromAuthorizationResponse
Found authorization code
code
31b40e20-220d-4c1d-b088-25512005676a.21487f0d-2e82-4b4c-baa2-f307686fd42a.5f24bc2e-d871-4555-82a8-efd61a2aa5f1
2022-05-19 13:43:39 SUCCESS
CreateTokenEndpointRequestForAuthorizationCodeGrant
Created token endpoint request
grant_type
authorization_code
code
31b40e20-220d-4c1d-b088-25512005676a.21487f0d-2e82-4b4c-baa2-f307686fd42a.5f24bc2e-d871-4555-82a8-efd61a2aa5f1
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
2022-05-19 13:43:39 SUCCESS
AddBasicAuthClientSecretAuthenticationParameters
Added basic authorization header
Authorization
Basic NWYyNGJjMmUtZDg3MS00NTU1LTgyYTgtZWZkNjFhMmFhNWYxOmVVckJhdEljbHNGN1lQWFZHR3JTTkRzSnFBcEFzY21B
2022-05-19 13:43:39
CallTokenEndpoint
HTTP request
request_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token
request_method
POST
request_headers
{
  "accept": "application/json",
  "authorization": "Basic NWYyNGJjMmUtZDg3MS00NTU1LTgyYTgtZWZkNjFhMmFhNWYxOmVVckJhdEljbHNGN1lQWFZHR3JTTkRzSnFBcEFzY21B",
  "content-type": "application/x-www-form-urlencoded;charset\u003dUTF-8",
  "content-length": "234"
}
request_body
grant_type=authorization_code&code=31b40e20-220d-4c1d-b088-25512005676a.21487f0d-2e82-4b4c-baa2-f307686fd42a.5f24bc2e-d871-4555-82a8-efd61a2aa5f1&redirect_uri=https%3A%2F%2Fwww.certification.openid.net%2Ftest%2Fa%2Fkeycloak%2Fcallback
2022-05-19 13:43:39 RESPONSE
CallTokenEndpoint
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "cache-control": "no-store",
  "x-xss-protection": "1; mode\u003dblock",
  "pragma": "no-cache",
  "x-frame-options": "SAMEORIGIN",
  "referrer-policy": "no-referrer",
  "date": "Thu, 19 May 2022 13:43:39 GMT",
  "connection": "keep-alive",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "content-type": "application/json",
  "content-length": "3277"
}
response_body
{"access_token":"eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.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.UAr23JFKS-7WFBe8S08lZiLGJ7u99pyPdETUmjujAGB2UbvU0Nw_gQK_zBf_Stlnmdt-0O_H2uiBxnaZOdyaZ3sXWnOTB5trQnrHdersY2_ue288N6LhPADchk5CUD_t461HhjgZVljOrvNaZheV0mWt3a6-TW-ueRn_-N9PtxPIF_Kab_Ffc4bLUj2rwA0Um4jYMlXJ-zWF4DUokbQk4ZvtIqen50urdeEUPpiLklEfgS4TbWZGXUvCaUE-JzxX7IwSdD03USda2SIFWo25cO1nTHvZQgVTuQO2LHaz_8bS8gUb2xrXD14OcRihQ_k7ZCH1zfBUOTcLP32ZzHyn8A","expires_in":300,"refresh_expires_in":0,"refresh_token":"eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlZGU2NjRjNS0zN2U1LTQ3ZGItOTQzZC04ODk5ZDRmNzExNTQifQ.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.RD7FQpHJ_K0r8rEXbc1jww1j18oTL5A4nlWLz5EM6QE","token_type":"Bearer","id_token":"eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.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.VdSoPv0EfrWPIC-_1CuL3whSoxNEqmYDKaexHsORFRnUOYbQUruCYWcQL2Ft0vtaVXdzpB7GENmN7WTANyxIVcNgMBIJKF1SE4032MbEt_hTpvW3WFLn8HTHrqEmf-Aivt__HJKk0FuD98huaTLwa1z2oihLAKtTTpr0AZFo2bHjOaiM_twREE2c9XK-2mBF1lHLgP4PRH2XZSnTVOYoVDVOlyflhLcOr3BtZ0ih5Z-REvhYvz8AEYh-K9ci4pAsHpx7Rr_jDfX5oHfu_YxbutjGpoasm47g1AnkVRgERhA0eQrgoQPTefnl8a7r7r3wvIEnaZwCDjW9zCTB3kP4pw","not-before-policy":1652951933,"session_state":"21487f0d-2e82-4b4c-baa2-f307686fd42a","scope":"openid name_claims acr offline_access"}
2022-05-19 13:43:39 SUCCESS
CallTokenEndpoint
Parsed token endpoint response
access_token
eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.eyJleHAiOjE2NTI5NjgxMTksImlhdCI6MTY1Mjk2NzgxOSwiYXV0aF90aW1lIjoxNjUyOTY3MzgwLCJqdGkiOiJiN2MwYWMxNC00ZjRhLTQzOTEtYWMxMC1jNDdlZmJkZmY0OGIiLCJpc3MiOiJodHRwczovLzg0LTI0NC03Mi05MC5uaXAuaW86NjAwMDAvYXV0aC9yZWFsbXMvdGVzdCIsInN1YiI6IjNlY2RjZWNkLTQzZGMtNGRjOS1hYTFjLWI5NzkxZmNmNzMwZiIsInR5cCI6IkJlYXJlciIsImF6cCI6IjVmMjRiYzJlLWQ4NzEtNDU1NS04MmE4LWVmZDYxYTJhYTVmMSIsIm5vbmNlIjoib3M3ZXhVTlJsbCIsInNlc3Npb25fc3RhdGUiOiIyMTQ4N2YwZC0yZTgyLTRiNGMtYmFhMi1mMzA3Njg2ZmQ0MmEiLCJhY3IiOiIwIiwiYWxsb3dlZC1vcmlnaW5zIjpbImh0dHBzOi8vd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldCJdLCJyZWFsbV9hY2Nlc3MiOnsicm9sZXMiOlsib2ZmbGluZV9hY2Nlc3MiXX0sInNjb3BlIjoib3BlbmlkIG5hbWVfY2xhaW1zIGFjciBvZmZsaW5lX2FjY2VzcyIsInNpZCI6IjIxNDg3ZjBkLTJlODItNGI0Yy1iYWEyLWYzMDc2ODZmZDQyYSJ9.UAr23JFKS-7WFBe8S08lZiLGJ7u99pyPdETUmjujAGB2UbvU0Nw_gQK_zBf_Stlnmdt-0O_H2uiBxnaZOdyaZ3sXWnOTB5trQnrHdersY2_ue288N6LhPADchk5CUD_t461HhjgZVljOrvNaZheV0mWt3a6-TW-ueRn_-N9PtxPIF_Kab_Ffc4bLUj2rwA0Um4jYMlXJ-zWF4DUokbQk4ZvtIqen50urdeEUPpiLklEfgS4TbWZGXUvCaUE-JzxX7IwSdD03USda2SIFWo25cO1nTHvZQgVTuQO2LHaz_8bS8gUb2xrXD14OcRihQ_k7ZCH1zfBUOTcLP32ZzHyn8A
expires_in
300
refresh_expires_in
0
refresh_token
eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlZGU2NjRjNS0zN2U1LTQ3ZGItOTQzZC04ODk5ZDRmNzExNTQifQ.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.RD7FQpHJ_K0r8rEXbc1jww1j18oTL5A4nlWLz5EM6QE
token_type
Bearer
id_token
eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.eyJleHAiOjE2NTI5NjgxMTksImlhdCI6MTY1Mjk2NzgxOSwiYXV0aF90aW1lIjoxNjUyOTY3MzgwLCJqdGkiOiJlM2FhOGUyNS1jOWM1LTRmOTAtYTM2YS1iMjUyMThhZWQxYjYiLCJpc3MiOiJodHRwczovLzg0LTI0NC03Mi05MC5uaXAuaW86NjAwMDAvYXV0aC9yZWFsbXMvdGVzdCIsImF1ZCI6IjVmMjRiYzJlLWQ4NzEtNDU1NS04MmE4LWVmZDYxYTJhYTVmMSIsInN1YiI6IjNlY2RjZWNkLTQzZGMtNGRjOS1hYTFjLWI5NzkxZmNmNzMwZiIsInR5cCI6IklEIiwiYXpwIjoiNWYyNGJjMmUtZDg3MS00NTU1LTgyYTgtZWZkNjFhMmFhNWYxIiwibm9uY2UiOiJvczdleFVOUmxsIiwic2Vzc2lvbl9zdGF0ZSI6IjIxNDg3ZjBkLTJlODItNGI0Yy1iYWEyLWYzMDc2ODZmZDQyYSIsImF0X2hhc2giOiJrUEYtcDVTN2JfcVZXd2NseDE1TV9RIiwiYWNyIjoiMCIsInNpZCI6IjIxNDg3ZjBkLTJlODItNGI0Yy1iYWEyLWYzMDc2ODZmZDQyYSJ9.VdSoPv0EfrWPIC-_1CuL3whSoxNEqmYDKaexHsORFRnUOYbQUruCYWcQL2Ft0vtaVXdzpB7GENmN7WTANyxIVcNgMBIJKF1SE4032MbEt_hTpvW3WFLn8HTHrqEmf-Aivt__HJKk0FuD98huaTLwa1z2oihLAKtTTpr0AZFo2bHjOaiM_twREE2c9XK-2mBF1lHLgP4PRH2XZSnTVOYoVDVOlyflhLcOr3BtZ0ih5Z-REvhYvz8AEYh-K9ci4pAsHpx7Rr_jDfX5oHfu_YxbutjGpoasm47g1AnkVRgERhA0eQrgoQPTefnl8a7r7r3wvIEnaZwCDjW9zCTB3kP4pw
not-before-policy
1652951933
session_state
21487f0d-2e82-4b4c-baa2-f307686fd42a
scope
openid name_claims acr offline_access
2022-05-19 13:43:39 SUCCESS
CheckIfTokenEndpointResponseError
No error from token endpoint
2022-05-19 13:43:39 SUCCESS
CheckForAccessTokenValue
Found an access token
access_token
eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.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.UAr23JFKS-7WFBe8S08lZiLGJ7u99pyPdETUmjujAGB2UbvU0Nw_gQK_zBf_Stlnmdt-0O_H2uiBxnaZOdyaZ3sXWnOTB5trQnrHdersY2_ue288N6LhPADchk5CUD_t461HhjgZVljOrvNaZheV0mWt3a6-TW-ueRn_-N9PtxPIF_Kab_Ffc4bLUj2rwA0Um4jYMlXJ-zWF4DUokbQk4ZvtIqen50urdeEUPpiLklEfgS4TbWZGXUvCaUE-JzxX7IwSdD03USda2SIFWo25cO1nTHvZQgVTuQO2LHaz_8bS8gUb2xrXD14OcRihQ_k7ZCH1zfBUOTcLP32ZzHyn8A
2022-05-19 13:43:39 SUCCESS
ExtractAccessTokenFromTokenResponse
Extracted the access token
value
eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.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.UAr23JFKS-7WFBe8S08lZiLGJ7u99pyPdETUmjujAGB2UbvU0Nw_gQK_zBf_Stlnmdt-0O_H2uiBxnaZOdyaZ3sXWnOTB5trQnrHdersY2_ue288N6LhPADchk5CUD_t461HhjgZVljOrvNaZheV0mWt3a6-TW-ueRn_-N9PtxPIF_Kab_Ffc4bLUj2rwA0Um4jYMlXJ-zWF4DUokbQk4ZvtIqen50urdeEUPpiLklEfgS4TbWZGXUvCaUE-JzxX7IwSdD03USda2SIFWo25cO1nTHvZQgVTuQO2LHaz_8bS8gUb2xrXD14OcRihQ_k7ZCH1zfBUOTcLP32ZzHyn8A
type
Bearer
2022-05-19 13:43:39 SUCCESS
ExtractExpiresInFromTokenEndpointResponse
Extracted 'expires_in'
expires_in
300
2022-05-19 13:43:39 SUCCESS
ValidateExpiresIn
expires_in passed all validation checks
expires_in
300
2022-05-19 13:43:39 SUCCESS
CheckForRefreshTokenValue
Found a refresh token
refresh_token
eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlZGU2NjRjNS0zN2U1LTQ3ZGItOTQzZC04ODk5ZDRmNzExNTQifQ.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.RD7FQpHJ_K0r8rEXbc1jww1j18oTL5A4nlWLz5EM6QE
2022-05-19 13:43:39 SUCCESS
ExtractIdTokenFromTokenResponse
Found and parsed the id_token from token_endpoint_response
value
eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.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.VdSoPv0EfrWPIC-_1CuL3whSoxNEqmYDKaexHsORFRnUOYbQUruCYWcQL2Ft0vtaVXdzpB7GENmN7WTANyxIVcNgMBIJKF1SE4032MbEt_hTpvW3WFLn8HTHrqEmf-Aivt__HJKk0FuD98huaTLwa1z2oihLAKtTTpr0AZFo2bHjOaiM_twREE2c9XK-2mBF1lHLgP4PRH2XZSnTVOYoVDVOlyflhLcOr3BtZ0ih5Z-REvhYvz8AEYh-K9ci4pAsHpx7Rr_jDfX5oHfu_YxbutjGpoasm47g1AnkVRgERhA0eQrgoQPTefnl8a7r7r3wvIEnaZwCDjW9zCTB3kP4pw
header
{
  "kid": "Mb20UGZj81X9UGbs0uReFcFlUV81vJRDYFPclWBv9GY",
  "typ": "JWT",
  "alg": "RS256"
}
claims
{
  "at_hash": "kPF-p5S7b_qVWwclx15M_Q",
  "sub": "3ecdcecd-43dc-4dc9-aa1c-b9791fcf730f",
  "iss": "https://84-244-72-90.nip.io:60000/auth/realms/test",
  "typ": "ID",
  "nonce": "os7exUNRll",
  "sid": "21487f0d-2e82-4b4c-baa2-f307686fd42a",
  "aud": "5f24bc2e-d871-4555-82a8-efd61a2aa5f1",
  "acr": "0",
  "azp": "5f24bc2e-d871-4555-82a8-efd61a2aa5f1",
  "auth_time": 1652967380,
  "exp": 1652968119,
  "session_state": "21487f0d-2e82-4b4c-baa2-f307686fd42a",
  "iat": 1652967819,
  "jti": "e3aa8e25-c9c5-4f90-a36a-b25218aed1b6"
}
2022-05-19 13:43:39 SUCCESS
ValidateIdToken
ID token iss, aud, exp, iat, auth_time, acr & nbf claims passed validation checks
2022-05-19 13:43:39 SUCCESS
ValidateIdTokenNonce
Nonce values match
nonce
os7exUNRll
2022-05-19 13:43:39 SUCCESS
ValidateIdTokenACRClaimAgainstRequest
Nothing to check; the conformance suite did not request an acr claim in request object
2022-05-19 13:43:39 SUCCESS
ValidateIdTokenSignature
id_token signature validated
id_token
eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.eyJleHAiOjE2NTI5NjgxMTksImlhdCI6MTY1Mjk2NzgxOSwiYXV0aF90aW1lIjoxNjUyOTY3MzgwLCJqdGkiOiJlM2FhOGUyNS1jOWM1LTRmOTAtYTM2YS1iMjUyMThhZWQxYjYiLCJpc3MiOiJodHRwczovLzg0LTI0NC03Mi05MC5uaXAuaW86NjAwMDAvYXV0aC9yZWFsbXMvdGVzdCIsImF1ZCI6IjVmMjRiYzJlLWQ4NzEtNDU1NS04MmE4LWVmZDYxYTJhYTVmMSIsInN1YiI6IjNlY2RjZWNkLTQzZGMtNGRjOS1hYTFjLWI5NzkxZmNmNzMwZiIsInR5cCI6IklEIiwiYXpwIjoiNWYyNGJjMmUtZDg3MS00NTU1LTgyYTgtZWZkNjFhMmFhNWYxIiwibm9uY2UiOiJvczdleFVOUmxsIiwic2Vzc2lvbl9zdGF0ZSI6IjIxNDg3ZjBkLTJlODItNGI0Yy1iYWEyLWYzMDc2ODZmZDQyYSIsImF0X2hhc2giOiJrUEYtcDVTN2JfcVZXd2NseDE1TV9RIiwiYWNyIjoiMCIsInNpZCI6IjIxNDg3ZjBkLTJlODItNGI0Yy1iYWEyLWYzMDc2ODZmZDQyYSJ9.VdSoPv0EfrWPIC-_1CuL3whSoxNEqmYDKaexHsORFRnUOYbQUruCYWcQL2Ft0vtaVXdzpB7GENmN7WTANyxIVcNgMBIJKF1SE4032MbEt_hTpvW3WFLn8HTHrqEmf-Aivt__HJKk0FuD98huaTLwa1z2oihLAKtTTpr0AZFo2bHjOaiM_twREE2c9XK-2mBF1lHLgP4PRH2XZSnTVOYoVDVOlyflhLcOr3BtZ0ih5Z-REvhYvz8AEYh-K9ci4pAsHpx7Rr_jDfX5oHfu_YxbutjGpoasm47g1AnkVRgERhA0eQrgoQPTefnl8a7r7r3wvIEnaZwCDjW9zCTB3kP4pw
2022-05-19 13:43:39 SUCCESS
ValidateIdTokenSignatureUsingKid
id_token signature validated
id_token
eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.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.VdSoPv0EfrWPIC-_1CuL3whSoxNEqmYDKaexHsORFRnUOYbQUruCYWcQL2Ft0vtaVXdzpB7GENmN7WTANyxIVcNgMBIJKF1SE4032MbEt_hTpvW3WFLn8HTHrqEmf-Aivt__HJKk0FuD98huaTLwa1z2oihLAKtTTpr0AZFo2bHjOaiM_twREE2c9XK-2mBF1lHLgP4PRH2XZSnTVOYoVDVOlyflhLcOr3BtZ0ih5Z-REvhYvz8AEYh-K9ci4pAsHpx7Rr_jDfX5oHfu_YxbutjGpoasm47g1AnkVRgERhA0eQrgoQPTefnl8a7r7r3wvIEnaZwCDjW9zCTB3kP4pw
2022-05-19 13:43:39 SUCCESS
CheckForSubjectInIdToken
Found 'sub' in id_token
sub
3ecdcecd-43dc-4dc9-aa1c-b9791fcf730f
2022-05-19 13:43:39 INFO
FAPIValidateEncryptedIdTokenHasKid
Skipped evaluation due to missing required element: id_token jwe_header
path
jwe_header
mapped
object
id_token
2022-05-19 13:43:39 SUCCESS
ExtractRefreshTokenFromTokenResponse
Extracted refresh token from response
refresh_token
eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlZGU2NjRjNS0zN2U1LTQ3ZGItOTQzZC04ODk5ZDRmNzExNTQifQ.eyJpYXQiOjE2NTI5Njc4MTksImp0aSI6ImNjMTVjOGZlLWE0NDItNGNjOC04YTJiLWU0YjMzMmUyODNkMCIsImlzcyI6Imh0dHBzOi8vODQtMjQ0LTcyLTkwLm5pcC5pbzo2MDAwMC9hdXRoL3JlYWxtcy90ZXN0IiwiYXVkIjoiaHR0cHM6Ly84NC0yNDQtNzItOTAubmlwLmlvOjYwMDAwL2F1dGgvcmVhbG1zL3Rlc3QiLCJzdWIiOiIzZWNkY2VjZC00M2RjLTRkYzktYWExYy1iOTc5MWZjZjczMGYiLCJ0eXAiOiJPZmZsaW5lIiwiYXpwIjoiNWYyNGJjMmUtZDg3MS00NTU1LTgyYTgtZWZkNjFhMmFhNWYxIiwibm9uY2UiOiJvczdleFVOUmxsIiwic2Vzc2lvbl9zdGF0ZSI6IjIxNDg3ZjBkLTJlODItNGI0Yy1iYWEyLWYzMDc2ODZmZDQyYSIsInNjb3BlIjoib3BlbmlkIG5hbWVfY2xhaW1zIGFjciBvZmZsaW5lX2FjY2VzcyIsInNpZCI6IjIxNDg3ZjBkLTJlODItNGI0Yy1iYWEyLWYzMDc2ODZmZDQyYSJ9.RD7FQpHJ_K0r8rEXbc1jww1j18oTL5A4nlWLz5EM6QE
2022-05-19 13:43:39 SUCCESS
EnsureServerConfigurationSupportsRefreshToken
The server configuration indicates support for refresh tokens
supported_grant_types
[
  "authorization_code",
  "implicit",
  "refresh_token",
  "password",
  "client_credentials",
  "urn:ietf:params:oauth:grant-type:device_code",
  "urn:openid:params:grant-type:ciba"
]
2022-05-19 13:43:39 SUCCESS
EnsureRefreshTokenContainsAllowedCharactersOnly
Refresh token does not contain any illegal characters
Second client: Refresh Token Request
2022-05-19 13:43:39 SUCCESS
CreateRefreshTokenRequest
Created token endpoint request parameters
grant_type
refresh_token
refresh_token
eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlZGU2NjRjNS0zN2U1LTQ3ZGItOTQzZC04ODk5ZDRmNzExNTQifQ.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.RD7FQpHJ_K0r8rEXbc1jww1j18oTL5A4nlWLz5EM6QE
2022-05-19 13:43:39 SUCCESS
AddBasicAuthClientSecretAuthenticationParameters
Added basic authorization header
Authorization
Basic NWYyNGJjMmUtZDg3MS00NTU1LTgyYTgtZWZkNjFhMmFhNWYxOmVVckJhdEljbHNGN1lQWFZHR3JTTkRzSnFBcEFzY21B
2022-05-19 13:43:39 SUCCESS
WaitForOneSecond
Pausing for 1 seconds
2022-05-19 13:43:40 SUCCESS
WaitForOneSecond
Woke up after 1 seconds sleep
2022-05-19 13:43:40
CallTokenEndpointAndReturnFullResponse
HTTP request
request_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token
request_method
POST
request_headers
{
  "accept": "application/json",
  "authorization": "Basic NWYyNGJjMmUtZDg3MS00NTU1LTgyYTgtZWZkNjFhMmFhNWYxOmVVckJhdEljbHNGN1lQWFZHR3JTTkRzSnFBcEFzY21B",
  "content-type": "application/x-www-form-urlencoded;charset\u003dUTF-8",
  "content-length": "794"
}
request_body
grant_type=refresh_token&refresh_token=eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlZGU2NjRjNS0zN2U1LTQ3ZGItOTQzZC04ODk5ZDRmNzExNTQifQ.eyJpYXQiOjE2NTI5Njc4MTksImp0aSI6ImNjMTVjOGZlLWE0NDItNGNjOC04YTJiLWU0YjMzMmUyODNkMCIsImlzcyI6Imh0dHBzOi8vODQtMjQ0LTcyLTkwLm5pcC5pbzo2MDAwMC9hdXRoL3JlYWxtcy90ZXN0IiwiYXVkIjoiaHR0cHM6Ly84NC0yNDQtNzItOTAubmlwLmlvOjYwMDAwL2F1dGgvcmVhbG1zL3Rlc3QiLCJzdWIiOiIzZWNkY2VjZC00M2RjLTRkYzktYWExYy1iOTc5MWZjZjczMGYiLCJ0eXAiOiJPZmZsaW5lIiwiYXpwIjoiNWYyNGJjMmUtZDg3MS00NTU1LTgyYTgtZWZkNjFhMmFhNWYxIiwibm9uY2UiOiJvczdleFVOUmxsIiwic2Vzc2lvbl9zdGF0ZSI6IjIxNDg3ZjBkLTJlODItNGI0Yy1iYWEyLWYzMDc2ODZmZDQyYSIsInNjb3BlIjoib3BlbmlkIG5hbWVfY2xhaW1zIGFjciBvZmZsaW5lX2FjY2VzcyIsInNpZCI6IjIxNDg3ZjBkLTJlODItNGI0Yy1iYWEyLWYzMDc2ODZmZDQyYSJ9.RD7FQpHJ_K0r8rEXbc1jww1j18oTL5A4nlWLz5EM6QE
2022-05-19 13:43:41 RESPONSE
CallTokenEndpointAndReturnFullResponse
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "cache-control": "no-store",
  "x-xss-protection": "1; mode\u003dblock",
  "pragma": "no-cache",
  "x-frame-options": "SAMEORIGIN",
  "referrer-policy": "no-referrer",
  "date": "Thu, 19 May 2022 13:43:41 GMT",
  "connection": "keep-alive",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "content-type": "application/json",
  "content-length": "3277"
}
response_body
{"access_token":"eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.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.Qa6HtAO9KfyVKTDAs3V-HDcgwHIv1Ka9up-JdBu_h7RYGoEdTfOxujblfq_j1AwVy-yqNb9AavQT4Q9ihPdfRYX_hV8En3Gz-9KOOXAgaEz-q8MGpsLIPZbTslr8HYihxjXVbXlKYqf7a4s2yar4z5ruK9gySCclDt9KikrYIQJGH3_KwjlKZ6AGaxZHY3VaYeOwjVCX-OvYaHRvU76eF-Uz6sbFPSAvCgr7E48dFt2tPdez7qSRlQbva8R360DhQ4GmBXmgMTx-qcaUvhbupzBFjH6DFbHxNFzc9nyLA_bkK28zBr2hGM-_KaIoCCpTK4kg49BnOJU9fRhXV8rTeA","expires_in":300,"refresh_expires_in":0,"refresh_token":"eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlZGU2NjRjNS0zN2U1LTQ3ZGItOTQzZC04ODk5ZDRmNzExNTQifQ.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.TjeDk4fCDbDm8J7V1MJk3h79UKzmg9nveLJniO8DV7M","token_type":"Bearer","id_token":"eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.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.hele2vtmkB7bWXQ0gHq6IOqQ4JTPgr3DNNLPo4mGzsLq3YImX8SxROe-dl7UakD3xLga7BWe560H8-iP88UII-u7Jna4BrDbWUxFmak8_q4nf72ACKLtJzsey-k-YH7cBitxa7ZyNUiJbl6SaPzLy8hG9VS4RbFQLOgZunNY6G_KUCSKOpQryUpgUwDCWByiDzc_zADR8KxTDeXxx-J028ejOxxnIkRQD7gHzbkd5m3Vju1Wq4qLJLLhjxxUm6-PVd9swndAALlQNGWhlTnsEAD9FfhTUIB-kLq9jvaS7wumYh02CjxBbxysAqsaj_aTZWuhwh31pwsigVNLSWmxKw","not-before-policy":1652951933,"session_state":"21487f0d-2e82-4b4c-baa2-f307686fd42a","scope":"openid name_claims acr offline_access"}
2022-05-19 13:43:41 SUCCESS
CallTokenEndpointAndReturnFullResponse
Parsed token endpoint response
access_token
eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.eyJleHAiOjE2NTI5NjgxMjEsImlhdCI6MTY1Mjk2NzgyMSwiYXV0aF90aW1lIjoxNjUyOTY3MzgwLCJqdGkiOiI0MjI0ZDliNy1jZjM3LTRkMDItOTQwMy05YWFlYzhlZjZkYjQiLCJpc3MiOiJodHRwczovLzg0LTI0NC03Mi05MC5uaXAuaW86NjAwMDAvYXV0aC9yZWFsbXMvdGVzdCIsInN1YiI6IjNlY2RjZWNkLTQzZGMtNGRjOS1hYTFjLWI5NzkxZmNmNzMwZiIsInR5cCI6IkJlYXJlciIsImF6cCI6IjVmMjRiYzJlLWQ4NzEtNDU1NS04MmE4LWVmZDYxYTJhYTVmMSIsIm5vbmNlIjoib3M3ZXhVTlJsbCIsInNlc3Npb25fc3RhdGUiOiIyMTQ4N2YwZC0yZTgyLTRiNGMtYmFhMi1mMzA3Njg2ZmQ0MmEiLCJhY3IiOiIwIiwiYWxsb3dlZC1vcmlnaW5zIjpbImh0dHBzOi8vd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldCJdLCJyZWFsbV9hY2Nlc3MiOnsicm9sZXMiOlsib2ZmbGluZV9hY2Nlc3MiXX0sInNjb3BlIjoib3BlbmlkIG5hbWVfY2xhaW1zIGFjciBvZmZsaW5lX2FjY2VzcyIsInNpZCI6IjIxNDg3ZjBkLTJlODItNGI0Yy1iYWEyLWYzMDc2ODZmZDQyYSJ9.Qa6HtAO9KfyVKTDAs3V-HDcgwHIv1Ka9up-JdBu_h7RYGoEdTfOxujblfq_j1AwVy-yqNb9AavQT4Q9ihPdfRYX_hV8En3Gz-9KOOXAgaEz-q8MGpsLIPZbTslr8HYihxjXVbXlKYqf7a4s2yar4z5ruK9gySCclDt9KikrYIQJGH3_KwjlKZ6AGaxZHY3VaYeOwjVCX-OvYaHRvU76eF-Uz6sbFPSAvCgr7E48dFt2tPdez7qSRlQbva8R360DhQ4GmBXmgMTx-qcaUvhbupzBFjH6DFbHxNFzc9nyLA_bkK28zBr2hGM-_KaIoCCpTK4kg49BnOJU9fRhXV8rTeA
expires_in
300
refresh_expires_in
0
refresh_token
eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlZGU2NjRjNS0zN2U1LTQ3ZGItOTQzZC04ODk5ZDRmNzExNTQifQ.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.TjeDk4fCDbDm8J7V1MJk3h79UKzmg9nveLJniO8DV7M
token_type
Bearer
id_token
eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.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.hele2vtmkB7bWXQ0gHq6IOqQ4JTPgr3DNNLPo4mGzsLq3YImX8SxROe-dl7UakD3xLga7BWe560H8-iP88UII-u7Jna4BrDbWUxFmak8_q4nf72ACKLtJzsey-k-YH7cBitxa7ZyNUiJbl6SaPzLy8hG9VS4RbFQLOgZunNY6G_KUCSKOpQryUpgUwDCWByiDzc_zADR8KxTDeXxx-J028ejOxxnIkRQD7gHzbkd5m3Vju1Wq4qLJLLhjxxUm6-PVd9swndAALlQNGWhlTnsEAD9FfhTUIB-kLq9jvaS7wumYh02CjxBbxysAqsaj_aTZWuhwh31pwsigVNLSWmxKw
not-before-policy
1652951933
session_state
21487f0d-2e82-4b4c-baa2-f307686fd42a
scope
openid name_claims acr offline_access
2022-05-19 13:43:41 SUCCESS
CheckTokenEndpointHttpStatus200
Token endpoint http status code was 200
2022-05-19 13:43:41 SUCCESS
CheckTokenEndpointReturnedJsonContentType
token_endpoint_response_headers Content-Type: header is application/json
2022-05-19 13:43:41 SUCCESS
CheckTokenEndpointCacheHeaders
'pragma' and 'cache-control' headers in token endpoint response contain expected values.
cache_control_header
no-store
pragma_header
no-cache
2022-05-19 13:43:41 SUCCESS
CheckIfTokenEndpointResponseError
No error from token endpoint
2022-05-19 13:43:41 SUCCESS
ExtractAccessTokenFromTokenResponse
Extracted the access token
value
eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.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.Qa6HtAO9KfyVKTDAs3V-HDcgwHIv1Ka9up-JdBu_h7RYGoEdTfOxujblfq_j1AwVy-yqNb9AavQT4Q9ihPdfRYX_hV8En3Gz-9KOOXAgaEz-q8MGpsLIPZbTslr8HYihxjXVbXlKYqf7a4s2yar4z5ruK9gySCclDt9KikrYIQJGH3_KwjlKZ6AGaxZHY3VaYeOwjVCX-OvYaHRvU76eF-Uz6sbFPSAvCgr7E48dFt2tPdez7qSRlQbva8R360DhQ4GmBXmgMTx-qcaUvhbupzBFjH6DFbHxNFzc9nyLA_bkK28zBr2hGM-_KaIoCCpTK4kg49BnOJU9fRhXV8rTeA
type
Bearer
2022-05-19 13:43:41 SUCCESS
CheckTokenTypeIsBearer
Token type is bearer
2022-05-19 13:43:41 SUCCESS
EnsureMinimumAccessTokenEntropy
Calculated shannon entropy seems sufficient
actual
6901.504052478802
expected
96.0
value
s
2022-05-19 13:43:41 SUCCESS
EnsureAccessTokenContainsAllowedCharactersOnly
Access token does not contain any illegal characters
2022-05-19 13:43:41 SUCCESS
ExtractExpiresInFromTokenEndpointResponse
Extracted 'expires_in'
expires_in
300
2022-05-19 13:43:41 SUCCESS
ValidateExpiresIn
expires_in passed all validation checks
expires_in
300
2022-05-19 13:43:41 SUCCESS
EnsureAccessTokenValuesAreDifferent
Access token values are not the same
first_access_token
eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.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.UAr23JFKS-7WFBe8S08lZiLGJ7u99pyPdETUmjujAGB2UbvU0Nw_gQK_zBf_Stlnmdt-0O_H2uiBxnaZOdyaZ3sXWnOTB5trQnrHdersY2_ue288N6LhPADchk5CUD_t461HhjgZVljOrvNaZheV0mWt3a6-TW-ueRn_-N9PtxPIF_Kab_Ffc4bLUj2rwA0Um4jYMlXJ-zWF4DUokbQk4ZvtIqen50urdeEUPpiLklEfgS4TbWZGXUvCaUE-JzxX7IwSdD03USda2SIFWo25cO1nTHvZQgVTuQO2LHaz_8bS8gUb2xrXD14OcRihQ_k7ZCH1zfBUOTcLP32ZzHyn8A
second_access_token
eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.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.Qa6HtAO9KfyVKTDAs3V-HDcgwHIv1Ka9up-JdBu_h7RYGoEdTfOxujblfq_j1AwVy-yqNb9AavQT4Q9ihPdfRYX_hV8En3Gz-9KOOXAgaEz-q8MGpsLIPZbTslr8HYihxjXVbXlKYqf7a4s2yar4z5ruK9gySCclDt9KikrYIQJGH3_KwjlKZ6AGaxZHY3VaYeOwjVCX-OvYaHRvU76eF-Uz6sbFPSAvCgr7E48dFt2tPdez7qSRlQbva8R360DhQ4GmBXmgMTx-qcaUvhbupzBFjH6DFbHxNFzc9nyLA_bkK28zBr2hGM-_KaIoCCpTK4kg49BnOJU9fRhXV8rTeA
2022-05-19 13:43:41 SUCCESS
ExtractIdTokenFromTokenResponse
Found and parsed the id_token from token_endpoint_response
value
eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.eyJleHAiOjE2NTI5NjgxMjEsImlhdCI6MTY1Mjk2NzgyMSwiYXV0aF90aW1lIjoxNjUyOTY3MzgwLCJqdGkiOiI4OTgwNGZlMS03YWUyLTRkMzYtYmQyMy05MmNmYWYwYWMxZDkiLCJpc3MiOiJodHRwczovLzg0LTI0NC03Mi05MC5uaXAuaW86NjAwMDAvYXV0aC9yZWFsbXMvdGVzdCIsImF1ZCI6IjVmMjRiYzJlLWQ4NzEtNDU1NS04MmE4LWVmZDYxYTJhYTVmMSIsInN1YiI6IjNlY2RjZWNkLTQzZGMtNGRjOS1hYTFjLWI5NzkxZmNmNzMwZiIsInR5cCI6IklEIiwiYXpwIjoiNWYyNGJjMmUtZDg3MS00NTU1LTgyYTgtZWZkNjFhMmFhNWYxIiwibm9uY2UiOiJvczdleFVOUmxsIiwic2Vzc2lvbl9zdGF0ZSI6IjIxNDg3ZjBkLTJlODItNGI0Yy1iYWEyLWYzMDc2ODZmZDQyYSIsImF0X2hhc2giOiJDc3VMRkZjdXJPeE9BaXM3YTBuRV9RIiwiYWNyIjoiMCIsInNpZCI6IjIxNDg3ZjBkLTJlODItNGI0Yy1iYWEyLWYzMDc2ODZmZDQyYSJ9.hele2vtmkB7bWXQ0gHq6IOqQ4JTPgr3DNNLPo4mGzsLq3YImX8SxROe-dl7UakD3xLga7BWe560H8-iP88UII-u7Jna4BrDbWUxFmak8_q4nf72ACKLtJzsey-k-YH7cBitxa7ZyNUiJbl6SaPzLy8hG9VS4RbFQLOgZunNY6G_KUCSKOpQryUpgUwDCWByiDzc_zADR8KxTDeXxx-J028ejOxxnIkRQD7gHzbkd5m3Vju1Wq4qLJLLhjxxUm6-PVd9swndAALlQNGWhlTnsEAD9FfhTUIB-kLq9jvaS7wumYh02CjxBbxysAqsaj_aTZWuhwh31pwsigVNLSWmxKw
header
{
  "kid": "Mb20UGZj81X9UGbs0uReFcFlUV81vJRDYFPclWBv9GY",
  "typ": "JWT",
  "alg": "RS256"
}
claims
{
  "at_hash": "CsuLFFcurOxOAis7a0nE_Q",
  "sub": "3ecdcecd-43dc-4dc9-aa1c-b9791fcf730f",
  "iss": "https://84-244-72-90.nip.io:60000/auth/realms/test",
  "typ": "ID",
  "nonce": "os7exUNRll",
  "sid": "21487f0d-2e82-4b4c-baa2-f307686fd42a",
  "aud": "5f24bc2e-d871-4555-82a8-efd61a2aa5f1",
  "acr": "0",
  "azp": "5f24bc2e-d871-4555-82a8-efd61a2aa5f1",
  "auth_time": 1652967380,
  "exp": 1652968121,
  "session_state": "21487f0d-2e82-4b4c-baa2-f307686fd42a",
  "iat": 1652967821,
  "jti": "89804fe1-7ae2-4d36-bd23-92cfaf0ac1d9"
}
2022-05-19 13:43:41 SUCCESS
ExtractRefreshTokenFromTokenResponse
Extracted refresh token from response
refresh_token
eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlZGU2NjRjNS0zN2U1LTQ3ZGItOTQzZC04ODk5ZDRmNzExNTQifQ.eyJpYXQiOjE2NTI5Njc4MjEsImp0aSI6ImUyYjk4MTZjLTU3ZmUtNGJjYi05M2ExLWI4ZmNiZGZiNGMxNyIsImlzcyI6Imh0dHBzOi8vODQtMjQ0LTcyLTkwLm5pcC5pbzo2MDAwMC9hdXRoL3JlYWxtcy90ZXN0IiwiYXVkIjoiaHR0cHM6Ly84NC0yNDQtNzItOTAubmlwLmlvOjYwMDAwL2F1dGgvcmVhbG1zL3Rlc3QiLCJzdWIiOiIzZWNkY2VjZC00M2RjLTRkYzktYWExYy1iOTc5MWZjZjczMGYiLCJ0eXAiOiJPZmZsaW5lIiwiYXpwIjoiNWYyNGJjMmUtZDg3MS00NTU1LTgyYTgtZWZkNjFhMmFhNWYxIiwibm9uY2UiOiJvczdleFVOUmxsIiwic2Vzc2lvbl9zdGF0ZSI6IjIxNDg3ZjBkLTJlODItNGI0Yy1iYWEyLWYzMDc2ODZmZDQyYSIsInNjb3BlIjoib3BlbmlkIG5hbWVfY2xhaW1zIGFjciBvZmZsaW5lX2FjY2VzcyIsInNpZCI6IjIxNDg3ZjBkLTJlODItNGI0Yy1iYWEyLWYzMDc2ODZmZDQyYSJ9.TjeDk4fCDbDm8J7V1MJk3h79UKzmg9nveLJniO8DV7M
2022-05-19 13:43:41 SUCCESS
EnsureMinimumRefreshTokenLength
Refresh token is of sufficient length
actual
6040
required
128
2022-05-19 13:43:41 SUCCESS
EnsureMinimumRefreshTokenEntropy
Calculated shannon entropy seems sufficient
actual
4224.826000429258
expected
96.0
value
s
2022-05-19 13:43:41 SUCCESS
CompareIdTokenClaims
Validated id token claims successfully
iss
{
  "first": "https://84-244-72-90.nip.io:60000/auth/realms/test",
  "second": "https://84-244-72-90.nip.io:60000/auth/realms/test",
  "note": "Values are expected to be equal"
}
sub
{
  "first": "3ecdcecd-43dc-4dc9-aa1c-b9791fcf730f",
  "second": "3ecdcecd-43dc-4dc9-aa1c-b9791fcf730f",
  "note": "Values are expected to be equal"
}
iat
{
  "first": 1652967819,
  "second": 1652967821,
  "note": "Values are expected to be different"
}
aud
{
  "first": "5f24bc2e-d871-4555-82a8-efd61a2aa5f1",
  "second": "5f24bc2e-d871-4555-82a8-efd61a2aa5f1",
  "note": "Values are expected to be equal"
}
auth_time
{
  "first": 1652967380,
  "second": 1652967380,
  "note": "Values are expected to be equal"
}
azp
{
  "first": "5f24bc2e-d871-4555-82a8-efd61a2aa5f1",
  "second": "5f24bc2e-d871-4555-82a8-efd61a2aa5f1",
  "note": "Values are expected to be equal"
}
Second client: Userinfo endpoint tests
2022-05-19 13:43:41
CallProtectedResource
HTTP request
request_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/userinfo
request_method
GET
request_headers
{
  "accept": "application/json",
  "authorization": "Bearer eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.eyJleHAiOjE2NTI5NjgxMjEsImlhdCI6MTY1Mjk2NzgyMSwiYXV0aF90aW1lIjoxNjUyOTY3MzgwLCJqdGkiOiI0MjI0ZDliNy1jZjM3LTRkMDItOTQwMy05YWFlYzhlZjZkYjQiLCJpc3MiOiJodHRwczovLzg0LTI0NC03Mi05MC5uaXAuaW86NjAwMDAvYXV0aC9yZWFsbXMvdGVzdCIsInN1YiI6IjNlY2RjZWNkLTQzZGMtNGRjOS1hYTFjLWI5NzkxZmNmNzMwZiIsInR5cCI6IkJlYXJlciIsImF6cCI6IjVmMjRiYzJlLWQ4NzEtNDU1NS04MmE4LWVmZDYxYTJhYTVmMSIsIm5vbmNlIjoib3M3ZXhVTlJsbCIsInNlc3Npb25fc3RhdGUiOiIyMTQ4N2YwZC0yZTgyLTRiNGMtYmFhMi1mMzA3Njg2ZmQ0MmEiLCJhY3IiOiIwIiwiYWxsb3dlZC1vcmlnaW5zIjpbImh0dHBzOi8vd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldCJdLCJyZWFsbV9hY2Nlc3MiOnsicm9sZXMiOlsib2ZmbGluZV9hY2Nlc3MiXX0sInNjb3BlIjoib3BlbmlkIG5hbWVfY2xhaW1zIGFjciBvZmZsaW5lX2FjY2VzcyIsInNpZCI6IjIxNDg3ZjBkLTJlODItNGI0Yy1iYWEyLWYzMDc2ODZmZDQyYSJ9.Qa6HtAO9KfyVKTDAs3V-HDcgwHIv1Ka9up-JdBu_h7RYGoEdTfOxujblfq_j1AwVy-yqNb9AavQT4Q9ihPdfRYX_hV8En3Gz-9KOOXAgaEz-q8MGpsLIPZbTslr8HYihxjXVbXlKYqf7a4s2yar4z5ruK9gySCclDt9KikrYIQJGH3_KwjlKZ6AGaxZHY3VaYeOwjVCX-OvYaHRvU76eF-Uz6sbFPSAvCgr7E48dFt2tPdez7qSRlQbva8R360DhQ4GmBXmgMTx-qcaUvhbupzBFjH6DFbHxNFzc9nyLA_bkK28zBr2hGM-_KaIoCCpTK4kg49BnOJU9fRhXV8rTeA",
  "content-length": "0"
}
request_body

                                
2022-05-19 13:43:42 RESPONSE
CallProtectedResource
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "cache-control": "no-cache",
  "x-xss-protection": "1; mode\u003dblock",
  "x-frame-options": "SAMEORIGIN",
  "referrer-policy": "no-referrer",
  "date": "Thu, 19 May 2022 13:43:42 GMT",
  "connection": "keep-alive",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "content-type": "application/json",
  "content-length": "46"
}
response_body
{"sub":"3ecdcecd-43dc-4dc9-aa1c-b9791fcf730f"}
2022-05-19 13:43:42 SUCCESS
CallProtectedResource
Got a response from the resource endpoint
status
200
endpoint_name
resource
headers
{
  "cache-control": "no-cache",
  "x-xss-protection": "1; mode\u003dblock",
  "x-frame-options": "SAMEORIGIN",
  "referrer-policy": "no-referrer",
  "date": "Thu, 19 May 2022 13:43:42 GMT",
  "connection": "keep-alive",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "content-type": "application/json",
  "content-length": "46"
}
body
{"sub":"3ecdcecd-43dc-4dc9-aa1c-b9791fcf730f"}
2022-05-19 13:43:42 SUCCESS
EnsureHttpStatusCodeIs200
resource endpoint returned the expected http status
expected_status
200
http_status
200
Attempting to use refresh_token issued to client 2 with client 1
2022-05-19 13:43:42 SUCCESS
CreateRefreshTokenRequest
Created token endpoint request parameters
grant_type
refresh_token
refresh_token
eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlZGU2NjRjNS0zN2U1LTQ3ZGItOTQzZC04ODk5ZDRmNzExNTQifQ.eyJpYXQiOjE2NTI5Njc4MjEsImp0aSI6ImUyYjk4MTZjLTU3ZmUtNGJjYi05M2ExLWI4ZmNiZGZiNGMxNyIsImlzcyI6Imh0dHBzOi8vODQtMjQ0LTcyLTkwLm5pcC5pbzo2MDAwMC9hdXRoL3JlYWxtcy90ZXN0IiwiYXVkIjoiaHR0cHM6Ly84NC0yNDQtNzItOTAubmlwLmlvOjYwMDAwL2F1dGgvcmVhbG1zL3Rlc3QiLCJzdWIiOiIzZWNkY2VjZC00M2RjLTRkYzktYWExYy1iOTc5MWZjZjczMGYiLCJ0eXAiOiJPZmZsaW5lIiwiYXpwIjoiNWYyNGJjMmUtZDg3MS00NTU1LTgyYTgtZWZkNjFhMmFhNWYxIiwibm9uY2UiOiJvczdleFVOUmxsIiwic2Vzc2lvbl9zdGF0ZSI6IjIxNDg3ZjBkLTJlODItNGI0Yy1iYWEyLWYzMDc2ODZmZDQyYSIsInNjb3BlIjoib3BlbmlkIG5hbWVfY2xhaW1zIGFjciBvZmZsaW5lX2FjY2VzcyIsInNpZCI6IjIxNDg3ZjBkLTJlODItNGI0Yy1iYWEyLWYzMDc2ODZmZDQyYSJ9.TjeDk4fCDbDm8J7V1MJk3h79UKzmg9nveLJniO8DV7M
2022-05-19 13:43:42 SUCCESS
AddScopeToTokenEndpointRequest
Added scope of 'openid offline_access' to token endpoint request
grant_type
refresh_token
refresh_token
eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlZGU2NjRjNS0zN2U1LTQ3ZGItOTQzZC04ODk5ZDRmNzExNTQifQ.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.TjeDk4fCDbDm8J7V1MJk3h79UKzmg9nveLJniO8DV7M
scope
openid offline_access
2022-05-19 13:43:42 SUCCESS
AddBasicAuthClientSecretAuthenticationParameters
Added basic authorization header
Authorization
Basic ZTk5NzE2YjQtMGYzYS00MGE4LThiMTUtODQ2YmRhNjJjN2VhOndidUx2UTA5NGpxNHM4d1dUNjNwUGRZb0NZN0REZnl2
2022-05-19 13:43:42
CallTokenEndpointAndReturnFullResponse
HTTP request
request_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token
request_method
POST
request_headers
{
  "accept": "application/json",
  "authorization": "Basic ZTk5NzE2YjQtMGYzYS00MGE4LThiMTUtODQ2YmRhNjJjN2VhOndidUx2UTA5NGpxNHM4d1dUNjNwUGRZb0NZN0REZnl2",
  "content-type": "application/x-www-form-urlencoded;charset\u003dUTF-8",
  "content-length": "822"
}
request_body
grant_type=refresh_token&refresh_token=eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlZGU2NjRjNS0zN2U1LTQ3ZGItOTQzZC04ODk5ZDRmNzExNTQifQ.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.TjeDk4fCDbDm8J7V1MJk3h79UKzmg9nveLJniO8DV7M&scope=openid+offline_access
2022-05-19 13:43:42 RESPONSE
CallTokenEndpointAndReturnFullResponse
HTTP response
response_status_code
400 BAD_REQUEST
response_status_text
Bad Request
response_headers
{
  "cache-control": "no-store",
  "x-xss-protection": "1; mode\u003dblock",
  "pragma": "no-cache",
  "x-frame-options": "SAMEORIGIN",
  "referrer-policy": "no-referrer",
  "date": "Thu, 19 May 2022 13:43:42 GMT",
  "connection": "keep-alive",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "content-type": "application/json",
  "content-length": "117"
}
response_body
{"error":"invalid_grant","error_description":"Invalid refresh token. Token client and authorized client don't match"}
2022-05-19 13:43:42 SUCCESS
CallTokenEndpointAndReturnFullResponse
Parsed token endpoint response
error
invalid_grant
error_description
Invalid refresh token. Token client and authorized client don't match
2022-05-19 13:43:42 SUCCESS
ValidateErrorFromTokenEndpointResponseError
Token endpoint response error returned valid 'error' field
error
invalid_grant
2022-05-19 13:43:42 SUCCESS
CheckTokenEndpointHttpStatus400
Token endpoint http status code was 400
2022-05-19 13:43:42 SUCCESS
CheckTokenEndpointReturnedJsonContentType
token_endpoint_response_headers Content-Type: header is application/json
2022-05-19 13:43:42 SUCCESS
CheckErrorFromTokenEndpointResponseErrorInvalidGrant
Token Endpoint response error returned expected 'error' of 'invalid_grant'
expected
[
  "invalid_grant"
]
2022-05-19 13:43:42 FINISHED
oidcc-refresh-token
Test has run to completion
testmodule_result
PASSED
Unregister dynamically registered client
2022-05-19 13:43:43
UnregisterDynamicallyRegisteredClient
HTTP request
request_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect/e99716b4-0f3a-40a8-8b15-846bda62c7ea
request_method
DELETE
request_headers
{
  "accept": "application/json",
  "authorization": "Bearer eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlZGU2NjRjNS0zN2U1LTQ3ZGItOTQzZC04ODk5ZDRmNzExNTQifQ.eyJleHAiOjAsImlhdCI6MTY1Mjk2Nzc5NiwianRpIjoiMjU3NTUyYTMtYWU1NS00MzMwLWIyMDItODM0NDhlNTU0N2NkIiwiaXNzIjoiaHR0cHM6Ly84NC0yNDQtNzItOTAubmlwLmlvOjYwMDAwL2F1dGgvcmVhbG1zL3Rlc3QiLCJhdWQiOiJodHRwczovLzg0LTI0NC03Mi05MC5uaXAuaW86NjAwMDAvYXV0aC9yZWFsbXMvdGVzdCIsInR5cCI6IlJlZ2lzdHJhdGlvbkFjY2Vzc1Rva2VuIiwicmVnaXN0cmF0aW9uX2F1dGgiOiJhbm9ueW1vdXMifQ.ckEHlveMYwrXrIZEEFPzHEWuxfCxKWzjs29SlZa6GUc",
  "content-length": "0"
}
request_body

                                
2022-05-19 13:43:43 RESPONSE
UnregisterDynamicallyRegisteredClient
HTTP response
response_status_code
204 NO_CONTENT
response_status_text
No Content
response_headers
{
  "x-xss-protection": "1; mode\u003dblock",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "referrer-policy": "no-referrer",
  "date": "Thu, 19 May 2022 13:43:43 GMT"
}
response_body

                                
2022-05-19 13:43:43 SUCCESS
UnregisterDynamicallyRegisteredClient
Client successfully unregistered
Second client: Unregister dynamically registered client
2022-05-19 13:43:43
UnregisterDynamicallyRegisteredClient
HTTP request
request_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect/5f24bc2e-d871-4555-82a8-efd61a2aa5f1
request_method
DELETE
request_headers
{
  "accept": "application/json",
  "authorization": "Bearer eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlZGU2NjRjNS0zN2U1LTQ3ZGItOTQzZC04ODk5ZDRmNzExNTQifQ.eyJleHAiOjAsImlhdCI6MTY1Mjk2Nzc5NywianRpIjoiZmVmZWM0YjgtMzBhMi00NmZkLThlZjUtMjdhM2Y4ZDE4YmFjIiwiaXNzIjoiaHR0cHM6Ly84NC0yNDQtNzItOTAubmlwLmlvOjYwMDAwL2F1dGgvcmVhbG1zL3Rlc3QiLCJhdWQiOiJodHRwczovLzg0LTI0NC03Mi05MC5uaXAuaW86NjAwMDAvYXV0aC9yZWFsbXMvdGVzdCIsInR5cCI6IlJlZ2lzdHJhdGlvbkFjY2Vzc1Rva2VuIiwicmVnaXN0cmF0aW9uX2F1dGgiOiJhbm9ueW1vdXMifQ.VNR-9FJN3QfW5bGNT5N5ehKNmEBVPd2AjyLvFaR7uoU",
  "content-length": "0"
}
request_body

                                
2022-05-19 13:43:44 RESPONSE
UnregisterDynamicallyRegisteredClient
HTTP response
response_status_code
204 NO_CONTENT
response_status_text
No Content
response_headers
{
  "x-xss-protection": "1; mode\u003dblock",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "referrer-policy": "no-referrer",
  "date": "Thu, 19 May 2022 13:43:44 GMT"
}
response_body

                                
2022-05-19 13:43:44 SUCCESS
UnregisterDynamicallyRegisteredClient
Client successfully unregistered
2022-05-19 13:44:05
TEST-RUNNER
Alias has now been claimed by another test
alias
keycloak
new_test_id
T0radWruN2TnJpi
Test Results