Test Summary

Test Results

Expand All Collapse All
All times are UTC
2022-05-19 13:37:23 INFO
TEST-RUNNER
Test instance lWF79B3Zl5jAlDs created
baseUrl
https://www.certification.openid.net/test/a/keycloak
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code",
  "server_metadata": "discovery",
  "response_mode": "default",
  "client_registration": "dynamic_client"
}
alias
keycloak
description
Keycloak, OpenID Connect Core: Basic Certification Profile (server_metadata:discovery/client_registration:dynamic_client)
planId
AARDBxQWkvyJU
config
{
  "alias": "keycloak",
  "description": "Keycloak, OpenID Connect Core: Basic Certification Profile (server_metadata:discovery/client_registration:dynamic_client)",
  "server": {
    "discoveryUrl": "https://84-244-72-90.nip.io:60000/auth/realms/test/.well-known/openid-configuration",
    "login_hint": "john"
  },
  "client": {
    "client_id": "client1-oidcc-hybrid",
    "client_secret": "ulvklGmELzpZqKiISkRmberNm4als3z3"
  },
  "client_secret_post": {
    "client_id": "client1-oidcc-hybrid-client_secret_post",
    "client_secret": "4gDNjUhBkki0gSuKlxtytGCTh4UlNc45"
  },
  "client2": {
    "client_id": "client2-oidcc-hybrid",
    "client_secret": "BAfJ8ugBegJ7JWdPVjcqGNFpYfNb6euL"
  }
}
testName
oidcc-codereuse-30seconds
2022-05-19 13:37:23 SUCCESS
CreateRedirectUri
Created redirect URI
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
2022-05-19 13:37:23
GetDynamicServerConfiguration
HTTP request
request_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/.well-known/openid-configuration
request_method
GET
request_headers
{
  "accept": "text/plain, application/json, application/*+json, */*",
  "content-length": "0"
}
request_body

                                
2022-05-19 13:37:24 RESPONSE
GetDynamicServerConfiguration
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "cache-control": "no-cache, must-revalidate, no-transform, no-store",
  "x-xss-protection": "1; mode\u003dblock",
  "x-frame-options": "SAMEORIGIN",
  "referrer-policy": "no-referrer",
  "date": "Thu, 19 May 2022 13:37:24 GMT",
  "connection": "keep-alive",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "content-type": "application/json",
  "content-length": "6214"
}
response_body
{"issuer":"https://84-244-72-90.nip.io:60000/auth/realms/test","authorization_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth","token_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token","introspection_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token/introspect","userinfo_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/userinfo","end_session_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/logout","frontchannel_logout_session_supported":true,"frontchannel_logout_supported":true,"jwks_uri":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/certs","check_session_iframe":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/login-status-iframe.html","grant_types_supported":["authorization_code","implicit","refresh_token","password","client_credentials","urn:ietf:params:oauth:grant-type:device_code","urn:openid:params:grant-type:ciba"],"acr_values_supported":["0","1"],"response_types_supported":["code","none","id_token","token","id_token token","code id_token","code token","code id_token token"],"subject_types_supported":["public","pairwise"],"id_token_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512"],"id_token_encryption_alg_values_supported":["RSA-OAEP","RSA-OAEP-256","RSA1_5"],"id_token_encryption_enc_values_supported":["A256GCM","A192GCM","A128GCM","A128CBC-HS256","A192CBC-HS384","A256CBC-HS512"],"userinfo_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512","none"],"userinfo_encryption_alg_values_supported":["RSA-OAEP","RSA-OAEP-256","RSA1_5"],"userinfo_encryption_enc_values_supported":["A256GCM","A192GCM","A128GCM","A128CBC-HS256","A192CBC-HS384","A256CBC-HS512"],"request_object_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512","none"],"request_object_encryption_alg_values_supported":["RSA-OAEP","RSA-OAEP-256","RSA1_5"],"request_object_encryption_enc_values_supported":["A256GCM","A192GCM","A128GCM","A128CBC-HS256","A192CBC-HS384","A256CBC-HS512"],"response_modes_supported":["query","fragment","form_post","query.jwt","fragment.jwt","form_post.jwt","jwt"],"registration_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect","token_endpoint_auth_methods_supported":["private_key_jwt","client_secret_basic","client_secret_post","tls_client_auth","client_secret_jwt"],"token_endpoint_auth_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512"],"introspection_endpoint_auth_methods_supported":["private_key_jwt","client_secret_basic","client_secret_post","tls_client_auth","client_secret_jwt"],"introspection_endpoint_auth_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512"],"authorization_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512"],"authorization_encryption_alg_values_supported":["RSA-OAEP","RSA-OAEP-256","RSA1_5"],"authorization_encryption_enc_values_supported":["A256GCM","A192GCM","A128GCM","A128CBC-HS256","A192CBC-HS384","A256CBC-HS512"],"claims_supported":["aud","sub","iss","auth_time","name","given_name","family_name","preferred_username","email","acr"],"claim_types_supported":["normal"],"claims_parameter_supported":true,"scopes_supported":["openid","consents","name_claims","microprofile-jwt","consent:1","name_claims_for_implicit","roles","address","phone","web-origins","profile","acr","offline_access","resources","email"],"request_parameter_supported":true,"request_uri_parameter_supported":true,"require_request_uri_registration":true,"code_challenge_methods_supported":["plain","S256"],"tls_client_certificate_bound_access_tokens":true,"revocation_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/revoke","revocation_endpoint_auth_methods_supported":["private_key_jwt","client_secret_basic","client_secret_post","tls_client_auth","client_secret_jwt"],"revocation_endpoint_auth_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512"],"backchannel_logout_supported":true,"backchannel_logout_session_supported":true,"device_authorization_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth/device","backchannel_token_delivery_modes_supported":["poll","ping"],"backchannel_authentication_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/ciba/auth","backchannel_authentication_request_signing_alg_values_supported":["PS384","ES384","RS384","ES256","RS256","ES512","PS256","PS512","RS512"],"require_pushed_authorization_requests":false,"pushed_authorization_request_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/par/request","mtls_endpoint_aliases":{"token_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token","revocation_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/revoke","introspection_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token/introspect","device_authorization_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth/device","registration_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect","userinfo_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/userinfo","pushed_authorization_request_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/par/request","backchannel_authentication_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/ciba/auth"}}
2022-05-19 13:37:24 SUCCESS
GetDynamicServerConfiguration
Successfully parsed server configuration
issuer
https://84-244-72-90.nip.io:60000/auth/realms/test
authorization_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth
token_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token
introspection_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token/introspect
userinfo_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/userinfo
end_session_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/logout
frontchannel_logout_session_supported
true
frontchannel_logout_supported
true
jwks_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/certs
check_session_iframe
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/login-status-iframe.html
grant_types_supported
[
  "authorization_code",
  "implicit",
  "refresh_token",
  "password",
  "client_credentials",
  "urn:ietf:params:oauth:grant-type:device_code",
  "urn:openid:params:grant-type:ciba"
]
acr_values_supported
[
  "0",
  "1"
]
response_types_supported
[
  "code",
  "none",
  "id_token",
  "token",
  "id_token token",
  "code id_token",
  "code token",
  "code id_token token"
]
subject_types_supported
[
  "public",
  "pairwise"
]
id_token_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512"
]
id_token_encryption_alg_values_supported
[
  "RSA-OAEP",
  "RSA-OAEP-256",
  "RSA1_5"
]
id_token_encryption_enc_values_supported
[
  "A256GCM",
  "A192GCM",
  "A128GCM",
  "A128CBC-HS256",
  "A192CBC-HS384",
  "A256CBC-HS512"
]
userinfo_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512",
  "none"
]
userinfo_encryption_alg_values_supported
[
  "RSA-OAEP",
  "RSA-OAEP-256",
  "RSA1_5"
]
userinfo_encryption_enc_values_supported
[
  "A256GCM",
  "A192GCM",
  "A128GCM",
  "A128CBC-HS256",
  "A192CBC-HS384",
  "A256CBC-HS512"
]
request_object_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512",
  "none"
]
request_object_encryption_alg_values_supported
[
  "RSA-OAEP",
  "RSA-OAEP-256",
  "RSA1_5"
]
request_object_encryption_enc_values_supported
[
  "A256GCM",
  "A192GCM",
  "A128GCM",
  "A128CBC-HS256",
  "A192CBC-HS384",
  "A256CBC-HS512"
]
response_modes_supported
[
  "query",
  "fragment",
  "form_post",
  "query.jwt",
  "fragment.jwt",
  "form_post.jwt",
  "jwt"
]
registration_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect
token_endpoint_auth_methods_supported
[
  "private_key_jwt",
  "client_secret_basic",
  "client_secret_post",
  "tls_client_auth",
  "client_secret_jwt"
]
token_endpoint_auth_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512"
]
introspection_endpoint_auth_methods_supported
[
  "private_key_jwt",
  "client_secret_basic",
  "client_secret_post",
  "tls_client_auth",
  "client_secret_jwt"
]
introspection_endpoint_auth_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512"
]
authorization_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512"
]
authorization_encryption_alg_values_supported
[
  "RSA-OAEP",
  "RSA-OAEP-256",
  "RSA1_5"
]
authorization_encryption_enc_values_supported
[
  "A256GCM",
  "A192GCM",
  "A128GCM",
  "A128CBC-HS256",
  "A192CBC-HS384",
  "A256CBC-HS512"
]
claims_supported
[
  "aud",
  "sub",
  "iss",
  "auth_time",
  "name",
  "given_name",
  "family_name",
  "preferred_username",
  "email",
  "acr"
]
claim_types_supported
[
  "normal"
]
claims_parameter_supported
true
scopes_supported
[
  "openid",
  "consents",
  "name_claims",
  "microprofile-jwt",
  "consent:1",
  "name_claims_for_implicit",
  "roles",
  "address",
  "phone",
  "web-origins",
  "profile",
  "acr",
  "offline_access",
  "resources",
  "email"
]
request_parameter_supported
true
request_uri_parameter_supported
true
require_request_uri_registration
true
code_challenge_methods_supported
[
  "plain",
  "S256"
]
tls_client_certificate_bound_access_tokens
true
revocation_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/revoke
revocation_endpoint_auth_methods_supported
[
  "private_key_jwt",
  "client_secret_basic",
  "client_secret_post",
  "tls_client_auth",
  "client_secret_jwt"
]
revocation_endpoint_auth_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512"
]
backchannel_logout_supported
true
backchannel_logout_session_supported
true
device_authorization_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth/device
backchannel_token_delivery_modes_supported
[
  "poll",
  "ping"
]
backchannel_authentication_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/ciba/auth
backchannel_authentication_request_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "ES256",
  "RS256",
  "ES512",
  "PS256",
  "PS512",
  "RS512"
]
require_pushed_authorization_requests
false
pushed_authorization_request_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/par/request
mtls_endpoint_aliases
{
  "token_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token",
  "revocation_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/revoke",
  "introspection_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token/introspect",
  "device_authorization_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth/device",
  "registration_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect",
  "userinfo_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/userinfo",
  "pushed_authorization_request_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/par/request",
  "backchannel_authentication_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/ciba/auth"
}
2022-05-19 13:37:24 SUCCESS
CheckServerConfiguration
Found required server configuration keys
required
[
  "authorization_endpoint",
  "token_endpoint",
  "issuer"
]
2022-05-19 13:37:24 SUCCESS
ExtractTLSTestValuesFromServerConfiguration
Extracted TLS information from authorization server configuration
registration_endpoint
{
  "testHost": "84-244-72-90.nip.io",
  "testPort": 60000
}
authorization_endpoint
{
  "testHost": "84-244-72-90.nip.io",
  "testPort": 60000
}
token_endpoint
{
  "testHost": "84-244-72-90.nip.io",
  "testPort": 60000
}
userinfo_endpoint
{
  "testHost": "84-244-72-90.nip.io",
  "testPort": 60000
}
2022-05-19 13:37:24
FetchServerKeys
Fetching server key
jwks_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/certs
2022-05-19 13:37:24
FetchServerKeys
HTTP request
request_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/certs
request_method
GET
request_headers
{
  "accept": "text/plain, application/json, application/*+json, */*",
  "content-length": "0"
}
request_body

                                
2022-05-19 13:37:24 RESPONSE
FetchServerKeys
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "cache-control": "no-cache",
  "x-xss-protection": "1; mode\u003dblock",
  "x-frame-options": "SAMEORIGIN",
  "referrer-policy": "no-referrer",
  "date": "Thu, 19 May 2022 13:37:24 GMT",
  "connection": "keep-alive",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "content-type": "application/json",
  "content-length": "7660"
}
response_body
{"keys":[{"kid":"nVJXuV18rIhJQK_ezukCg6B6ihqd_ysVRpNmmGNIJgg","kty":"RSA","alg":"PS256","use":"enc","n":"gJeVMx_ucf4OkwPjfo3QqRVGJad4MoGX0epHfzh_9JWhetahQKvU2R8I7YnWMRmdni2ZuWVdnRDdrU83FN-RGKRq8bkV59-U9UM25mrFD-27qczX_SvipPeSJfCC8BVg6IVaG0xYVJcAJyqCczhV0p36Tv3ehLhnZA_JZYgGcQznEXRawqQMQ1hKLC-cbQdXbcuzlKB-jGKUvNOPrRWkFYbcbbPMqeqv60TtQL--9X0rFxySfGbUVTDENmsJUaS5vs-cHEyst-UX6Y-lmCoTA0LZsOaH608POFmeaVB7ZmDdeGCHS_H4BCbQS7p_vI67i-IH8L5qrr_TZGabii1Ggw","e":"AQAB","x5c":["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"],"x5t":"nsamQNPuXTrs2Bh2mhtQ1p-Cs-M","x5t#S256":"g1XbSXBmnrd0nphVoyIfkix50Nsr0HqrJAvypgOzBq0"},{"kid":"a91iq85i0CF0ltgMw4EBQ0_y5kYCAtEFXQL_kbTulA0","kty":"EC","alg":"ES256","use":"sig","crv":"P-256","x":"to_LaMDcALkQvaelmWtIn2iyJEKooTbOZxp7KIC74Kg","y":"NVQw_Pya5rmgKM0JLra_IRN-t0O1fUWfrnJrOX8yZn0"},{"kid":"Mb20UGZj81X9UGbs0uReFcFlUV81vJRDYFPclWBv9GY","kty":"RSA","alg":"RS256","use":"sig","n":"juc0_frkLlvtC1Lf_WDb7tkbMmaBS6c0hN0Hl6dbmbgAHqrF39LLKrMokaIafSRKA9kuMOx1W4j-uPm4OpUDYArq7boa2a064j3e4JvAR8BOU2Kz5nDtKXSDDiSQLqa-ZEaHbji879SG0IA_tp_nNiX8EV_BR7CsjjbyaqI9hwzHXsai_o6dAzCa1mbCPFYAQH66m-4xk0AgysRowupKa2yyjFiAtCfw0vI3DJUSzQ1S3OlFZwqUP0U09TOnwh5EP0zAapbW_8J9InF_TAl5q-nUY8HPqtMjgQvTcaCgJ3wntdWrdXR9OrlJ29Zdf1D5Tqi0UCTh3GaOm3lxTFNyJQ","e":"AQAB","x5c":["MIIClzCCAX8CBgGA3HI4LjANBgkqhkiG9w0BAQsFADAPMQ0wCwYDVQQDDAR0ZXN0MB4XDTIyMDUxOTEzMTAxNFoXDTMyMDUxOTEzMTE1NFowDzENMAsGA1UEAwwEdGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAI7nNP365C5b7QtS3/1g2+7ZGzJmgUunNITdB5enW5m4AB6qxd/SyyqzKJGiGn0kSgPZLjDsdVuI/rj5uDqVA2AK6u26GtmtOuI93uCbwEfATlNis+Zw7Sl0gw4kkC6mvmRGh244vO/UhtCAP7af5zYl/BFfwUewrI428mqiPYcMx17Gov6OnQMwmtZmwjxWAEB+upvuMZNAIMrEaMLqSmtssoxYgLQn8NLyNwyVEs0NUtzpRWcKlD9FNPUzp8IeRD9MwGqW1v/CfSJxf0wJeavp1GPBz6rTI4EL03GgoCd8J7XVq3V0fTq5SdvWXX9Q+U6otFAk4dxmjpt5cUxTciUCAwEAATANBgkqhkiG9w0BAQsFAAOCAQEALyN8EuuwKeJYqgzbM99mmGM2IixxbTDzFaBhrr2EK6s9vGEGZ/p7G4PYodMenADyVUAIa/9Vfr+dFJMy66mIB/tl2Fq9ES67YtMeo/W3ikS861uZjmshIrM1+w/jmXRkhmU+QgPWZv/tEqm6mmYCCGRV0W4rkkqbsbmGLUxlAsYBvie/jblVPUhnCBati1i5vYEpa7YIkQAVRFSA60u2mcQVcA/C1TvP/wjyfWqn3zbuPVXFxIkLt7JDfWDNxiLv9//hnRKqrxmrwKcT+Suuznn2zooAFM+WbAjAuaq176G4ocwWfMDN7H+r0SF8XqNBO9i0BdY/jxK3SOws9bVP/A=="],"x5t":"c5AzQajNLbmncxy7N3Q0uDQm_Xg","x5t#S256":"cQJC3_ilcCLSX2saHq-o1pQaZ0x3KdyxP7crW68ypjc"},{"kid":"iM1idlnX7sRsh3lBqliOt7ENVX1cWkimfTpsfWgYG9k","kty":"RSA","alg":"PS256","use":"sig","n":"ly8t1-qtzaC4RM0-glXufIilNOX8y3-ct_veSR7dHYeyc27-y6aEIckzmtRzGRERaJ6Ux4FVxOZ2Sx2TsuuOk2IH2oCKyCa41fusaRr8yhxGpO2xnv_z_8WC1ELcAS2vvwF-xUNpZLLgdC3k_jFZcnVLDBgKc_A1gZPc1gfyPnhpd_bMxq3OAzKyER-hVVH7HZHo-4qXl_c117u7hOhg6vt3OSklWe4xdHq43Bq72Zb5kVcNAmopHCN5Ri8riSo6iuhx-I-TQG1pmnzYlZAir6vcA-P65berb-nH7IgGToqnU2diLDFsAWAn7LxVYnR2K9WCNL9rBIw5RcCNcdm5ww","e":"AQAB","x5c":["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"],"x5t":"Lm8DzD2yYGlll-4mb0CSlyc0vFY","x5t#S256":"auer9itHtTEkwScExvyYbSFQxh5twqG_ViJra5YBgN4"},{"kid":"zfx31Yr_QijkHreEgzJJmgDt3vpNJw-3UYDHWDL832s","kty":"EC","alg":"ES256","use":"sig","crv":"P-256","x":"kXozRF_AaHf2kBa_0_FJPJVO0NFfHBvA4UE7eE6YYMA","y":"1i7kcT1H0Zb9v_F8XE17tVeBzb2vgThwKWaZcD1lhk4"},{"kid":"43WiDgKXF75uxXjFBcTz5rhUD2FJsRmE_YViw3iaJxE","kty":"RSA","alg":"RS256","use":"sig","n":"2trCYBvZGDi8xlH8EAB04AEBhyUpBK9pXS-hv9ALOuZ6vPYcEdzNVdrwgXKMIPUJlR3HWjb7BsPUNQBekI8aAAoy1WIreP6CkRYPZLS7jKNAKBFYrxNCIptP0aTw-M1MC47d6Unz5x_25i8UZH4uQZiDWRODsqzcvBYYzrP_FhuagI2_pKmkWq73jDsF5T_m13JCwz_OIPL2JpCalPAKihz-7b9QdDr9V_cutP7ymSoTuZLY7gKYFdblZm26SAMGhm9rHVuLaFGobis9ggOdbOsD-4cn82s-q88mKDb7eZ9nmFGZfqTCnvksDOiEjZIycY8p8MnWSYVdyTokyGZSkQ","e":"AQAB","x5c":["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"],"x5t":"075PkNdlE5gbAn1w6OfLONGc7Fw","x5t#S256":"UZRPmtRfCvrCxcRt2M9kR2XFUjwqfJGSBgljPT5wDPI"},{"kid":"oscahzKbEkdWp4Z4gGCNMVm8pjwpj0q2AAQ0ZIn9y1U","kty":"RSA","alg":"PS256","use":"sig","n":"itV4oDZRs9Tc6cXuPtFiUuQ2jUA7Jhg2Xk3XpMDgWfYxQbmYslKS28NjfDmmbvypaiCH9TzQlgaBAvvCl62gNA73TaVGv7uKDIge6vL_g4dwaZsapkxc4Ao36tOsU4w8QQC4pZDh9xCzoqYemvQUuVGh_rSqVUoHhcEzd3_-NGEhamiuNDxrJftHkfMf_GHi05edeN5FHT9ZJrxpcsAXY7fz3SmGI-wiVB9CgErKuaH91SBrReDvY6rnK7fxcGZKgnd0ACbvDUDruNh7R2wvrJT7pTEHSre-ulehLPKNOGOX49jlPEn8CZEFTO6wi-9aK97Cyyg7ZG3uPIfrS-PrDw","e":"AQAB","x5c":["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"],"x5t":"YQwHgxOXWi4PkD6oVDUcZ6sxSL0","x5t#S256":"8XdoYM7hypH7yGcAZsCbu4QkH73aBPsuImUnnn_Q6kU"}]}
2022-05-19 13:37:24
FetchServerKeys
Found JWK set string
jwk_string
{"keys":[{"kid":"nVJXuV18rIhJQK_ezukCg6B6ihqd_ysVRpNmmGNIJgg","kty":"RSA","alg":"PS256","use":"enc","n":"gJeVMx_ucf4OkwPjfo3QqRVGJad4MoGX0epHfzh_9JWhetahQKvU2R8I7YnWMRmdni2ZuWVdnRDdrU83FN-RGKRq8bkV59-U9UM25mrFD-27qczX_SvipPeSJfCC8BVg6IVaG0xYVJcAJyqCczhV0p36Tv3ehLhnZA_JZYgGcQznEXRawqQMQ1hKLC-cbQdXbcuzlKB-jGKUvNOPrRWkFYbcbbPMqeqv60TtQL--9X0rFxySfGbUVTDENmsJUaS5vs-cHEyst-UX6Y-lmCoTA0LZsOaH608POFmeaVB7ZmDdeGCHS_H4BCbQS7p_vI67i-IH8L5qrr_TZGabii1Ggw","e":"AQAB","x5c":["MIIClzCCAX8CBgGAzCPyBjANBgkqhkiG9w0BAQsFADAPMQ0wCwYDVQQDDAR0ZXN0MB4XDTIyMDUxNjA5MTA0OVoXDTMyMDUxNjA5MTIyOVowDzENMAsGA1UEAwwEdGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAICXlTMf7nH+DpMD436N0KkVRiWneDKBl9HqR384f/SVoXrWoUCr1NkfCO2J1jEZnZ4tmbllXZ0Q3a1PNxTfkRikavG5FefflPVDNuZqxQ/tu6nM1/0r4qT3kiXwgvAVYOiFWhtMWFSXACcqgnM4VdKd+k793oS4Z2QPyWWIBnEM5xF0WsKkDENYSiwvnG0HV23Ls5SgfoxilLzTj60VpBWG3G2zzKnqr+tE7UC/vvV9Kxccknxm1FUwxDZrCVGkub7PnBxMrLflF+mPpZgqEwNC2bDmh+tPDzhZnmlQe2Zg3Xhgh0vx+AQm0Eu6f7yOu4viB/C+aq6/02Rmm4otRoMCAwEAATANBgkqhkiG9w0BAQsFAAOCAQEAJGENeCNqIbHidimks6k9WRJaYYP0n5cRFcxh2EKKwgOJqaHJ3oaeWJ97owND+S7wl6VZLKebb6BPwaKoedtkPgSh/H4wYBW5u5reE/GkU1M7T37Zn1Xs6jsLDISJWWxDn8k+hTeAi08P0Qoymq8WnDbKplbjiPbKTtDDqEcBsXvwRHkPUrBFKzlSapWWSIspqcHwpFklfYKm9JCC6JtFdw/lCyd/0u+x/dQ/ZNhYx9WUOUtLtnqFxkWWuydQ0z6hOkfUDUokH5FhjdvfYJk8Nw82VuTm3ly3HEv59HbjOxnobzDM0pnqJfiYWRNcfJ480b55sdzMF1604bk//h0oVQ=="],"x5t":"nsamQNPuXTrs2Bh2mhtQ1p-Cs-M","x5t#S256":"g1XbSXBmnrd0nphVoyIfkix50Nsr0HqrJAvypgOzBq0"},{"kid":"a91iq85i0CF0ltgMw4EBQ0_y5kYCAtEFXQL_kbTulA0","kty":"EC","alg":"ES256","use":"sig","crv":"P-256","x":"to_LaMDcALkQvaelmWtIn2iyJEKooTbOZxp7KIC74Kg","y":"NVQw_Pya5rmgKM0JLra_IRN-t0O1fUWfrnJrOX8yZn0"},{"kid":"Mb20UGZj81X9UGbs0uReFcFlUV81vJRDYFPclWBv9GY","kty":"RSA","alg":"RS256","use":"sig","n":"juc0_frkLlvtC1Lf_WDb7tkbMmaBS6c0hN0Hl6dbmbgAHqrF39LLKrMokaIafSRKA9kuMOx1W4j-uPm4OpUDYArq7boa2a064j3e4JvAR8BOU2Kz5nDtKXSDDiSQLqa-ZEaHbji879SG0IA_tp_nNiX8EV_BR7CsjjbyaqI9hwzHXsai_o6dAzCa1mbCPFYAQH66m-4xk0AgysRowupKa2yyjFiAtCfw0vI3DJUSzQ1S3OlFZwqUP0U09TOnwh5EP0zAapbW_8J9InF_TAl5q-nUY8HPqtMjgQvTcaCgJ3wntdWrdXR9OrlJ29Zdf1D5Tqi0UCTh3GaOm3lxTFNyJQ","e":"AQAB","x5c":["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"],"x5t":"c5AzQajNLbmncxy7N3Q0uDQm_Xg","x5t#S256":"cQJC3_ilcCLSX2saHq-o1pQaZ0x3KdyxP7crW68ypjc"},{"kid":"iM1idlnX7sRsh3lBqliOt7ENVX1cWkimfTpsfWgYG9k","kty":"RSA","alg":"PS256","use":"sig","n":"ly8t1-qtzaC4RM0-glXufIilNOX8y3-ct_veSR7dHYeyc27-y6aEIckzmtRzGRERaJ6Ux4FVxOZ2Sx2TsuuOk2IH2oCKyCa41fusaRr8yhxGpO2xnv_z_8WC1ELcAS2vvwF-xUNpZLLgdC3k_jFZcnVLDBgKc_A1gZPc1gfyPnhpd_bMxq3OAzKyER-hVVH7HZHo-4qXl_c117u7hOhg6vt3OSklWe4xdHq43Bq72Zb5kVcNAmopHCN5Ri8riSo6iuhx-I-TQG1pmnzYlZAir6vcA-P65berb-nH7IgGToqnU2diLDFsAWAn7LxVYnR2K9WCNL9rBIw5RcCNcdm5ww","e":"AQAB","x5c":["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"],"x5t":"Lm8DzD2yYGlll-4mb0CSlyc0vFY","x5t#S256":"auer9itHtTEkwScExvyYbSFQxh5twqG_ViJra5YBgN4"},{"kid":"zfx31Yr_QijkHreEgzJJmgDt3vpNJw-3UYDHWDL832s","kty":"EC","alg":"ES256","use":"sig","crv":"P-256","x":"kXozRF_AaHf2kBa_0_FJPJVO0NFfHBvA4UE7eE6YYMA","y":"1i7kcT1H0Zb9v_F8XE17tVeBzb2vgThwKWaZcD1lhk4"},{"kid":"43WiDgKXF75uxXjFBcTz5rhUD2FJsRmE_YViw3iaJxE","kty":"RSA","alg":"RS256","use":"sig","n":"2trCYBvZGDi8xlH8EAB04AEBhyUpBK9pXS-hv9ALOuZ6vPYcEdzNVdrwgXKMIPUJlR3HWjb7BsPUNQBekI8aAAoy1WIreP6CkRYPZLS7jKNAKBFYrxNCIptP0aTw-M1MC47d6Unz5x_25i8UZH4uQZiDWRODsqzcvBYYzrP_FhuagI2_pKmkWq73jDsF5T_m13JCwz_OIPL2JpCalPAKihz-7b9QdDr9V_cutP7ymSoTuZLY7gKYFdblZm26SAMGhm9rHVuLaFGobis9ggOdbOsD-4cn82s-q88mKDb7eZ9nmFGZfqTCnvksDOiEjZIycY8p8MnWSYVdyTokyGZSkQ","e":"AQAB","x5c":["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"],"x5t":"075PkNdlE5gbAn1w6OfLONGc7Fw","x5t#S256":"UZRPmtRfCvrCxcRt2M9kR2XFUjwqfJGSBgljPT5wDPI"},{"kid":"oscahzKbEkdWp4Z4gGCNMVm8pjwpj0q2AAQ0ZIn9y1U","kty":"RSA","alg":"PS256","use":"sig","n":"itV4oDZRs9Tc6cXuPtFiUuQ2jUA7Jhg2Xk3XpMDgWfYxQbmYslKS28NjfDmmbvypaiCH9TzQlgaBAvvCl62gNA73TaVGv7uKDIge6vL_g4dwaZsapkxc4Ao36tOsU4w8QQC4pZDh9xCzoqYemvQUuVGh_rSqVUoHhcEzd3_-NGEhamiuNDxrJftHkfMf_GHi05edeN5FHT9ZJrxpcsAXY7fz3SmGI-wiVB9CgErKuaH91SBrReDvY6rnK7fxcGZKgnd0ACbvDUDruNh7R2wvrJT7pTEHSre-ulehLPKNOGOX49jlPEn8CZEFTO6wi-9aK97Cyyg7ZG3uPIfrS-PrDw","e":"AQAB","x5c":["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"],"x5t":"YQwHgxOXWi4PkD6oVDUcZ6sxSL0","x5t#S256":"8XdoYM7hypH7yGcAZsCbu4QkH73aBPsuImUnnn_Q6kU"}]}
2022-05-19 13:37:24 SUCCESS
FetchServerKeys
Found server JWK set
server_jwks
{
  "keys": [
    {
      "kid": "nVJXuV18rIhJQK_ezukCg6B6ihqd_ysVRpNmmGNIJgg",
      "kty": "RSA",
      "alg": "PS256",
      "use": "enc",
      "n": "gJeVMx_ucf4OkwPjfo3QqRVGJad4MoGX0epHfzh_9JWhetahQKvU2R8I7YnWMRmdni2ZuWVdnRDdrU83FN-RGKRq8bkV59-U9UM25mrFD-27qczX_SvipPeSJfCC8BVg6IVaG0xYVJcAJyqCczhV0p36Tv3ehLhnZA_JZYgGcQznEXRawqQMQ1hKLC-cbQdXbcuzlKB-jGKUvNOPrRWkFYbcbbPMqeqv60TtQL--9X0rFxySfGbUVTDENmsJUaS5vs-cHEyst-UX6Y-lmCoTA0LZsOaH608POFmeaVB7ZmDdeGCHS_H4BCbQS7p_vI67i-IH8L5qrr_TZGabii1Ggw",
      "e": "AQAB",
      "x5c": [
        "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\u003d\u003d"
      ],
      "x5t": "nsamQNPuXTrs2Bh2mhtQ1p-Cs-M",
      "x5t#S256": "g1XbSXBmnrd0nphVoyIfkix50Nsr0HqrJAvypgOzBq0"
    },
    {
      "kid": "a91iq85i0CF0ltgMw4EBQ0_y5kYCAtEFXQL_kbTulA0",
      "kty": "EC",
      "alg": "ES256",
      "use": "sig",
      "crv": "P-256",
      "x": "to_LaMDcALkQvaelmWtIn2iyJEKooTbOZxp7KIC74Kg",
      "y": "NVQw_Pya5rmgKM0JLra_IRN-t0O1fUWfrnJrOX8yZn0"
    },
    {
      "kid": "Mb20UGZj81X9UGbs0uReFcFlUV81vJRDYFPclWBv9GY",
      "kty": "RSA",
      "alg": "RS256",
      "use": "sig",
      "n": "juc0_frkLlvtC1Lf_WDb7tkbMmaBS6c0hN0Hl6dbmbgAHqrF39LLKrMokaIafSRKA9kuMOx1W4j-uPm4OpUDYArq7boa2a064j3e4JvAR8BOU2Kz5nDtKXSDDiSQLqa-ZEaHbji879SG0IA_tp_nNiX8EV_BR7CsjjbyaqI9hwzHXsai_o6dAzCa1mbCPFYAQH66m-4xk0AgysRowupKa2yyjFiAtCfw0vI3DJUSzQ1S3OlFZwqUP0U09TOnwh5EP0zAapbW_8J9InF_TAl5q-nUY8HPqtMjgQvTcaCgJ3wntdWrdXR9OrlJ29Zdf1D5Tqi0UCTh3GaOm3lxTFNyJQ",
      "e": "AQAB",
      "x5c": [
        "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\u003d\u003d"
      ],
      "x5t": "c5AzQajNLbmncxy7N3Q0uDQm_Xg",
      "x5t#S256": "cQJC3_ilcCLSX2saHq-o1pQaZ0x3KdyxP7crW68ypjc"
    },
    {
      "kid": "iM1idlnX7sRsh3lBqliOt7ENVX1cWkimfTpsfWgYG9k",
      "kty": "RSA",
      "alg": "PS256",
      "use": "sig",
      "n": "ly8t1-qtzaC4RM0-glXufIilNOX8y3-ct_veSR7dHYeyc27-y6aEIckzmtRzGRERaJ6Ux4FVxOZ2Sx2TsuuOk2IH2oCKyCa41fusaRr8yhxGpO2xnv_z_8WC1ELcAS2vvwF-xUNpZLLgdC3k_jFZcnVLDBgKc_A1gZPc1gfyPnhpd_bMxq3OAzKyER-hVVH7HZHo-4qXl_c117u7hOhg6vt3OSklWe4xdHq43Bq72Zb5kVcNAmopHCN5Ri8riSo6iuhx-I-TQG1pmnzYlZAir6vcA-P65berb-nH7IgGToqnU2diLDFsAWAn7LxVYnR2K9WCNL9rBIw5RcCNcdm5ww",
      "e": "AQAB",
      "x5c": [
        "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\u003d\u003d"
      ],
      "x5t": "Lm8DzD2yYGlll-4mb0CSlyc0vFY",
      "x5t#S256": "auer9itHtTEkwScExvyYbSFQxh5twqG_ViJra5YBgN4"
    },
    {
      "kid": "zfx31Yr_QijkHreEgzJJmgDt3vpNJw-3UYDHWDL832s",
      "kty": "EC",
      "alg": "ES256",
      "use": "sig",
      "crv": "P-256",
      "x": "kXozRF_AaHf2kBa_0_FJPJVO0NFfHBvA4UE7eE6YYMA",
      "y": "1i7kcT1H0Zb9v_F8XE17tVeBzb2vgThwKWaZcD1lhk4"
    },
    {
      "kid": "43WiDgKXF75uxXjFBcTz5rhUD2FJsRmE_YViw3iaJxE",
      "kty": "RSA",
      "alg": "RS256",
      "use": "sig",
      "n": "2trCYBvZGDi8xlH8EAB04AEBhyUpBK9pXS-hv9ALOuZ6vPYcEdzNVdrwgXKMIPUJlR3HWjb7BsPUNQBekI8aAAoy1WIreP6CkRYPZLS7jKNAKBFYrxNCIptP0aTw-M1MC47d6Unz5x_25i8UZH4uQZiDWRODsqzcvBYYzrP_FhuagI2_pKmkWq73jDsF5T_m13JCwz_OIPL2JpCalPAKihz-7b9QdDr9V_cutP7ymSoTuZLY7gKYFdblZm26SAMGhm9rHVuLaFGobis9ggOdbOsD-4cn82s-q88mKDb7eZ9nmFGZfqTCnvksDOiEjZIycY8p8MnWSYVdyTokyGZSkQ",
      "e": "AQAB",
      "x5c": [
        "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\u003d\u003d"
      ],
      "x5t": "075PkNdlE5gbAn1w6OfLONGc7Fw",
      "x5t#S256": "UZRPmtRfCvrCxcRt2M9kR2XFUjwqfJGSBgljPT5wDPI"
    },
    {
      "kid": "oscahzKbEkdWp4Z4gGCNMVm8pjwpj0q2AAQ0ZIn9y1U",
      "kty": "RSA",
      "alg": "PS256",
      "use": "sig",
      "n": "itV4oDZRs9Tc6cXuPtFiUuQ2jUA7Jhg2Xk3XpMDgWfYxQbmYslKS28NjfDmmbvypaiCH9TzQlgaBAvvCl62gNA73TaVGv7uKDIge6vL_g4dwaZsapkxc4Ao36tOsU4w8QQC4pZDh9xCzoqYemvQUuVGh_rSqVUoHhcEzd3_-NGEhamiuNDxrJftHkfMf_GHi05edeN5FHT9ZJrxpcsAXY7fz3SmGI-wiVB9CgErKuaH91SBrReDvY6rnK7fxcGZKgnd0ACbvDUDruNh7R2wvrJT7pTEHSre-ulehLPKNOGOX49jlPEn8CZEFTO6wi-9aK97Cyyg7ZG3uPIfrS-PrDw",
      "e": "AQAB",
      "x5c": [
        "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\u003d\u003d"
      ],
      "x5t": "YQwHgxOXWi4PkD6oVDUcZ6sxSL0",
      "x5t#S256": "8XdoYM7hypH7yGcAZsCbu4QkH73aBPsuImUnnn_Q6kU"
    }
  ]
}
2022-05-19 13:37:24 SUCCESS
CheckServerKeysIsValid
Server JWKs is valid
server_jwks
{
  "keys": [
    {
      "kid": "nVJXuV18rIhJQK_ezukCg6B6ihqd_ysVRpNmmGNIJgg",
      "kty": "RSA",
      "alg": "PS256",
      "use": "enc",
      "n": "gJeVMx_ucf4OkwPjfo3QqRVGJad4MoGX0epHfzh_9JWhetahQKvU2R8I7YnWMRmdni2ZuWVdnRDdrU83FN-RGKRq8bkV59-U9UM25mrFD-27qczX_SvipPeSJfCC8BVg6IVaG0xYVJcAJyqCczhV0p36Tv3ehLhnZA_JZYgGcQznEXRawqQMQ1hKLC-cbQdXbcuzlKB-jGKUvNOPrRWkFYbcbbPMqeqv60TtQL--9X0rFxySfGbUVTDENmsJUaS5vs-cHEyst-UX6Y-lmCoTA0LZsOaH608POFmeaVB7ZmDdeGCHS_H4BCbQS7p_vI67i-IH8L5qrr_TZGabii1Ggw",
      "e": "AQAB",
      "x5c": [
        "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\u003d\u003d"
      ],
      "x5t": "nsamQNPuXTrs2Bh2mhtQ1p-Cs-M",
      "x5t#S256": "g1XbSXBmnrd0nphVoyIfkix50Nsr0HqrJAvypgOzBq0"
    },
    {
      "kid": "a91iq85i0CF0ltgMw4EBQ0_y5kYCAtEFXQL_kbTulA0",
      "kty": "EC",
      "alg": "ES256",
      "use": "sig",
      "crv": "P-256",
      "x": "to_LaMDcALkQvaelmWtIn2iyJEKooTbOZxp7KIC74Kg",
      "y": "NVQw_Pya5rmgKM0JLra_IRN-t0O1fUWfrnJrOX8yZn0"
    },
    {
      "kid": "Mb20UGZj81X9UGbs0uReFcFlUV81vJRDYFPclWBv9GY",
      "kty": "RSA",
      "alg": "RS256",
      "use": "sig",
      "n": "juc0_frkLlvtC1Lf_WDb7tkbMmaBS6c0hN0Hl6dbmbgAHqrF39LLKrMokaIafSRKA9kuMOx1W4j-uPm4OpUDYArq7boa2a064j3e4JvAR8BOU2Kz5nDtKXSDDiSQLqa-ZEaHbji879SG0IA_tp_nNiX8EV_BR7CsjjbyaqI9hwzHXsai_o6dAzCa1mbCPFYAQH66m-4xk0AgysRowupKa2yyjFiAtCfw0vI3DJUSzQ1S3OlFZwqUP0U09TOnwh5EP0zAapbW_8J9InF_TAl5q-nUY8HPqtMjgQvTcaCgJ3wntdWrdXR9OrlJ29Zdf1D5Tqi0UCTh3GaOm3lxTFNyJQ",
      "e": "AQAB",
      "x5c": [
        "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\u003d\u003d"
      ],
      "x5t": "c5AzQajNLbmncxy7N3Q0uDQm_Xg",
      "x5t#S256": "cQJC3_ilcCLSX2saHq-o1pQaZ0x3KdyxP7crW68ypjc"
    },
    {
      "kid": "iM1idlnX7sRsh3lBqliOt7ENVX1cWkimfTpsfWgYG9k",
      "kty": "RSA",
      "alg": "PS256",
      "use": "sig",
      "n": "ly8t1-qtzaC4RM0-glXufIilNOX8y3-ct_veSR7dHYeyc27-y6aEIckzmtRzGRERaJ6Ux4FVxOZ2Sx2TsuuOk2IH2oCKyCa41fusaRr8yhxGpO2xnv_z_8WC1ELcAS2vvwF-xUNpZLLgdC3k_jFZcnVLDBgKc_A1gZPc1gfyPnhpd_bMxq3OAzKyER-hVVH7HZHo-4qXl_c117u7hOhg6vt3OSklWe4xdHq43Bq72Zb5kVcNAmopHCN5Ri8riSo6iuhx-I-TQG1pmnzYlZAir6vcA-P65berb-nH7IgGToqnU2diLDFsAWAn7LxVYnR2K9WCNL9rBIw5RcCNcdm5ww",
      "e": "AQAB",
      "x5c": [
        "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\u003d\u003d"
      ],
      "x5t": "Lm8DzD2yYGlll-4mb0CSlyc0vFY",
      "x5t#S256": "auer9itHtTEkwScExvyYbSFQxh5twqG_ViJra5YBgN4"
    },
    {
      "kid": "zfx31Yr_QijkHreEgzJJmgDt3vpNJw-3UYDHWDL832s",
      "kty": "EC",
      "alg": "ES256",
      "use": "sig",
      "crv": "P-256",
      "x": "kXozRF_AaHf2kBa_0_FJPJVO0NFfHBvA4UE7eE6YYMA",
      "y": "1i7kcT1H0Zb9v_F8XE17tVeBzb2vgThwKWaZcD1lhk4"
    },
    {
      "kid": "43WiDgKXF75uxXjFBcTz5rhUD2FJsRmE_YViw3iaJxE",
      "kty": "RSA",
      "alg": "RS256",
      "use": "sig",
      "n": "2trCYBvZGDi8xlH8EAB04AEBhyUpBK9pXS-hv9ALOuZ6vPYcEdzNVdrwgXKMIPUJlR3HWjb7BsPUNQBekI8aAAoy1WIreP6CkRYPZLS7jKNAKBFYrxNCIptP0aTw-M1MC47d6Unz5x_25i8UZH4uQZiDWRODsqzcvBYYzrP_FhuagI2_pKmkWq73jDsF5T_m13JCwz_OIPL2JpCalPAKihz-7b9QdDr9V_cutP7ymSoTuZLY7gKYFdblZm26SAMGhm9rHVuLaFGobis9ggOdbOsD-4cn82s-q88mKDb7eZ9nmFGZfqTCnvksDOiEjZIycY8p8MnWSYVdyTokyGZSkQ",
      "e": "AQAB",
      "x5c": [
        "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\u003d\u003d"
      ],
      "x5t": "075PkNdlE5gbAn1w6OfLONGc7Fw",
      "x5t#S256": "UZRPmtRfCvrCxcRt2M9kR2XFUjwqfJGSBgljPT5wDPI"
    },
    {
      "kid": "oscahzKbEkdWp4Z4gGCNMVm8pjwpj0q2AAQ0ZIn9y1U",
      "kty": "RSA",
      "alg": "PS256",
      "use": "sig",
      "n": "itV4oDZRs9Tc6cXuPtFiUuQ2jUA7Jhg2Xk3XpMDgWfYxQbmYslKS28NjfDmmbvypaiCH9TzQlgaBAvvCl62gNA73TaVGv7uKDIge6vL_g4dwaZsapkxc4Ao36tOsU4w8QQC4pZDh9xCzoqYemvQUuVGh_rSqVUoHhcEzd3_-NGEhamiuNDxrJftHkfMf_GHi05edeN5FHT9ZJrxpcsAXY7fz3SmGI-wiVB9CgErKuaH91SBrReDvY6rnK7fxcGZKgnd0ACbvDUDruNh7R2wvrJT7pTEHSre-ulehLPKNOGOX49jlPEn8CZEFTO6wi-9aK97Cyyg7ZG3uPIfrS-PrDw",
      "e": "AQAB",
      "x5c": [
        "MIIClzCCAX8CBgGA3HCQDjANBgkqhkiG9w0BAQsFADAPMQ0wCwYDVQQDDAR0ZXN0MB4XDTIyMDUxOTEzMDgyNloXDTMyMDUxOTEzMTAwNlowDzENMAsGA1UEAwwEdGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIrVeKA2UbPU3OnF7j7RYlLkNo1AOyYYNl5N16TA4Fn2MUG5mLJSktvDY3w5pm78qWogh/U80JYGgQL7wpetoDQO902lRr+7igyIHury/4OHcGmbGqZMXOAKN+rTrFOMPEEAuKWQ4fcQs6KmHpr0FLlRof60qlVKB4XBM3d//jRhIWporjQ8ayX7R5HzH/xh4tOXnXjeRR0/WSa8aXLAF2O3890phiPsIlQfQoBKyrmh/dUga0Xg72Oq5yu38XBmSoJ3dAAm7w1A67jYe0dsL6yU+6UxB0q3vrpXoSzyjThjl+PY5TxJ/AmRBUzusIvvWivewssoO2Rt7jyH60vj6w8CAwEAATANBgkqhkiG9w0BAQsFAAOCAQEAHtZQkZfHwKHBfv14crbC3IxAp8TaSOBJeFXerV+0pusay7lzFuDM+rT6zcMIasCZos1NHg7EdX3O3RyMwWv1bKT2cejaWu1lNlK9iKptPJjj5d9Lh9/Urs+cdXlp5chpWPQNSy3zbr50yyMc9SUkZ0cU9FJXRCZTsNOHyYb7QhtInM2QKuoF/hK7MVQzkyM2yn3wuYjQy9tLsxUO2LRRoCbXy+8l4fCSFZyxOtls5Ny2dJErFslvQWVT1iiJNyKoQpn4uoxNmUqlwNt2TYsc9OUsJdqf4kkYfmYGIjrlDD5oLtIGGLPTbNbb8NsNIHfuG8+dtU3mM2kCkwEeEkekpw\u003d\u003d"
      ],
      "x5t": "YQwHgxOXWi4PkD6oVDUcZ6sxSL0",
      "x5t#S256": "8XdoYM7hypH7yGcAZsCbu4QkH73aBPsuImUnnn_Q6kU"
    }
  ]
}
2022-05-19 13:37:24 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2022-05-19 13:37:24 SUCCESS
CheckForKeyIdInServerJWKs
All keys contain kids
2022-05-19 13:37:24 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2022-05-19 13:37:24 SUCCESS
EnsureServerJwksDoesNotContainPrivateOrSymmetricKeys
Jwks does not contain any private or symmetric keys
2022-05-19 13:37:24
StoreOriginalClientConfiguration
Created original_client_config object from the client configuration.
client_id
client1-oidcc-hybrid
client_secret
ulvklGmELzpZqKiISkRmberNm4als3z3
2022-05-19 13:37:24
ExtractClientNameFromStoredConfig
Extracted client_name from stored client configuration.
client_name
2022-05-19 13:37:24 SUCCESS
GenerateRS256ClientJWKs
Generated client JWKs
client_jwks
{
  "keys": [
    {
      "p": "5FlBQzx3ASWyzjDhkLoGzrTKOnlkvg5UMqDtsqxr9oHow4heDWGj0JEuWedD_YTIJ2FrdmErEUZBy3ujJzNF0Vb_FcAPhP36huXkRjL_7u64UBOGCMmA94t8Wd4qCNo_J30DdD9NeINFvCNDO04_G2pZcDnhNWaHBZPSOj62U3c",
      "kty": "RSA",
      "q": "ttbTAokCDOO_t4H7z4QmNZ3sE-Eu5tBmwxox206eTsnOSgu_gpf6tpVEey6-hiyTLxVoZelcafareqxDoTdoZhVW7nbcJ3J8Yb0jpLIG61zgE6sb1juNwyDHukfKIQLwWYOTfHG2ix7Xx28opdx1WkDQBJGnW9TIu_lu3P0XWQE",
      "d": "UJA3iUhcYyDOrif-NBLpLFcRsekDECQm6RqfCRAaI0KD4oMZ68WfStm3p5MdsBsWyu9NV-fz8qNWGYC1CKn82-pO4CV4apDifBJhMb_JBmWq8VKQ5rcEunvsRgq96MF7_tmhwcEmVZKqhIoIma48bEqzxlqv1ZOqe2AEyL40fFO5TpdVyVV4-tdeNOdYqKBuWtKiiFZMcMOnjAUxeLjqEsmJTPb6myRRgl13QfqFZmpiHjv4NRMYwIH3s8pN5F5_-k830rFpaf1cQizFFxuHuFl7oYcIABHc-Kh86v1wZ9dKNNSKbtO280oET2o6x6BdIc2BCqrESUx2DNgLS8nEAQ",
      "e": "AQAB",
      "use": "sig",
      "qi": "sXYYjcke6uBsYqzXFukUi_FrBZcVzRXdylHQnkb-vrk-dHaHZxJNm4E-RGPc44XKpWe6qWOtiiQhAI2iW6YTJTgbd67MSdCu4f3YASoYCN8kyPFSElr984omsZY7FfbMimr5mnDXP_YT6Oss2IUxTaOztqs7Y8o9nlAi7XsEMaI",
      "dp": "OPQyHO0F2ZlngZobiJd9fy0Ei5UflW_JfF87KidrPi6kubBXlQrXavvrDa1q_d6SdZAM15fgwAw_-Nq7lNlq_o2uTeR7enZGeEL6rq-luhh8jCxyb9qiehumRlvtLAwTWGwL4oCvd_F2ATjiWfZoMxRRfnZRP5p07uUxuClQHH0",
      "alg": "RS256",
      "dq": "HKbhfj42Igr2mi02ZriQvEo5GoxpKyZxVBWgxns1d6dMOnJI2pAya7ZMevlCRghqMDCsoXvGTZyoFps0Jelm5MhnTQs3SL86Gp7nHQIA75UoUCy6OgIvHureIaTqWe35-C0USaYQMxDsQ4Z52jQH99K8RlsE3PElW7-kzeCjbgE",
      "n": "oxcTOi7jq8ckmpk4WZX8KrPt6kqXjMvRe1KqvOvMN1ObpSZS1LXV1yxZhiZ48ry6utNC2Cv_IoTSUQ8foBbRR__1dHMjiXW4dbQIswkNaaaXeDkUJJBjVMIzSc0ziaJxhhwPlsHc6XCOpX6DtNZP4vTZ0JLwrVyhPmkb20TqlytS3hk1uWp1vUjHTVf8x_dVCatzp1WTXv30kulB1HhRoRULEWO7Gp3yqsQSZZ8ghfld9ycJMtkya_-bAJXGbejw4M7spjSxapZd90E5077meNYNgzhRKp4R-gplwBdU6DzqYTHL4nR9ZvFOsofLe6v5D_DwhLYvjso1K8EpvGuydw"
    }
  ]
}
public_client_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "alg": "RS256",
      "n": "oxcTOi7jq8ckmpk4WZX8KrPt6kqXjMvRe1KqvOvMN1ObpSZS1LXV1yxZhiZ48ry6utNC2Cv_IoTSUQ8foBbRR__1dHMjiXW4dbQIswkNaaaXeDkUJJBjVMIzSc0ziaJxhhwPlsHc6XCOpX6DtNZP4vTZ0JLwrVyhPmkb20TqlytS3hk1uWp1vUjHTVf8x_dVCatzp1WTXv30kulB1HhRoRULEWO7Gp3yqsQSZZ8ghfld9ycJMtkya_-bAJXGbejw4M7spjSxapZd90E5077meNYNgzhRKp4R-gplwBdU6DzqYTHL4nR9ZvFOsofLe6v5D_DwhLYvjso1K8EpvGuydw"
    }
  ]
}
2022-05-19 13:37:24 SUCCESS
CheckDistinctKeyIdValueInClientJWKs
Distinct 'kid' value in all keys of client_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2022-05-19 13:37:24
CreateEmptyDynamicRegistrationRequest
Created empty dynamic registration request
2022-05-19 13:37:24
AddClientNameToDynamicRegistrationRequest
Added client_name to registration request
client_name
OIDF Conformance Test lWF79B3Zl5jAlDs
2022-05-19 13:37:24
AddAuthorizationCodeGrantTypeToDynamicRegistrationRequest
Added 'authorization_code' to 'grant_types'
grant_types
[
  "authorization_code"
]
2022-05-19 13:37:24
AddPublicJwksToDynamicRegistrationRequest
Added client public JWKS to dynamic registration request
dynamic_registration_request
{
  "client_name": "OIDF Conformance Test lWF79B3Zl5jAlDs",
  "grant_types": [
    "authorization_code"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "oxcTOi7jq8ckmpk4WZX8KrPt6kqXjMvRe1KqvOvMN1ObpSZS1LXV1yxZhiZ48ry6utNC2Cv_IoTSUQ8foBbRR__1dHMjiXW4dbQIswkNaaaXeDkUJJBjVMIzSc0ziaJxhhwPlsHc6XCOpX6DtNZP4vTZ0JLwrVyhPmkb20TqlytS3hk1uWp1vUjHTVf8x_dVCatzp1WTXv30kulB1HhRoRULEWO7Gp3yqsQSZZ8ghfld9ycJMtkya_-bAJXGbejw4M7spjSxapZd90E5077meNYNgzhRKp4R-gplwBdU6DzqYTHL4nR9ZvFOsofLe6v5D_DwhLYvjso1K8EpvGuydw"
      }
    ]
  }
}
2022-05-19 13:37:24
AddTokenEndpointAuthMethodToDynamicRegistrationRequestFromEnvironment
Added token endpoint auth method to dynamic registration request
dynamic_registration_request
{
  "client_name": "OIDF Conformance Test lWF79B3Zl5jAlDs",
  "grant_types": [
    "authorization_code"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "oxcTOi7jq8ckmpk4WZX8KrPt6kqXjMvRe1KqvOvMN1ObpSZS1LXV1yxZhiZ48ry6utNC2Cv_IoTSUQ8foBbRR__1dHMjiXW4dbQIswkNaaaXeDkUJJBjVMIzSc0ziaJxhhwPlsHc6XCOpX6DtNZP4vTZ0JLwrVyhPmkb20TqlytS3hk1uWp1vUjHTVf8x_dVCatzp1WTXv30kulB1HhRoRULEWO7Gp3yqsQSZZ8ghfld9ycJMtkya_-bAJXGbejw4M7spjSxapZd90E5077meNYNgzhRKp4R-gplwBdU6DzqYTHL4nR9ZvFOsofLe6v5D_DwhLYvjso1K8EpvGuydw"
      }
    ]
  },
  "token_endpoint_auth_method": "client_secret_basic"
}
2022-05-19 13:37:24
AddResponseTypesArrayToDynamicRegistrationRequestFromEnvironment
Added response_types array to dynamic registration request
dynamic_registration_request
{
  "client_name": "OIDF Conformance Test lWF79B3Zl5jAlDs",
  "grant_types": [
    "authorization_code"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "oxcTOi7jq8ckmpk4WZX8KrPt6kqXjMvRe1KqvOvMN1ObpSZS1LXV1yxZhiZ48ry6utNC2Cv_IoTSUQ8foBbRR__1dHMjiXW4dbQIswkNaaaXeDkUJJBjVMIzSc0ziaJxhhwPlsHc6XCOpX6DtNZP4vTZ0JLwrVyhPmkb20TqlytS3hk1uWp1vUjHTVf8x_dVCatzp1WTXv30kulB1HhRoRULEWO7Gp3yqsQSZZ8ghfld9ycJMtkya_-bAJXGbejw4M7spjSxapZd90E5077meNYNgzhRKp4R-gplwBdU6DzqYTHL4nR9ZvFOsofLe6v5D_DwhLYvjso1K8EpvGuydw"
      }
    ]
  },
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code"
  ]
}
2022-05-19 13:37:24
AddRedirectUriToDynamicRegistrationRequest
Added redirect_uris array to dynamic registration request
dynamic_registration_request
{
  "client_name": "OIDF Conformance Test lWF79B3Zl5jAlDs",
  "grant_types": [
    "authorization_code"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "oxcTOi7jq8ckmpk4WZX8KrPt6kqXjMvRe1KqvOvMN1ObpSZS1LXV1yxZhiZ48ry6utNC2Cv_IoTSUQ8foBbRR__1dHMjiXW4dbQIswkNaaaXeDkUJJBjVMIzSc0ziaJxhhwPlsHc6XCOpX6DtNZP4vTZ0JLwrVyhPmkb20TqlytS3hk1uWp1vUjHTVf8x_dVCatzp1WTXv30kulB1HhRoRULEWO7Gp3yqsQSZZ8ghfld9ycJMtkya_-bAJXGbejw4M7spjSxapZd90E5077meNYNgzhRKp4R-gplwBdU6DzqYTHL4nR9ZvFOsofLe6v5D_DwhLYvjso1K8EpvGuydw"
      }
    ]
  },
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code"
  ],
  "redirect_uris": [
    "https://www.certification.openid.net/test/a/keycloak/callback"
  ]
}
2022-05-19 13:37:24
AddContactsToDynamicRegistrationRequest
Added contacts array to dynamic registration request
dynamic_registration_request
{
  "client_name": "OIDF Conformance Test lWF79B3Zl5jAlDs",
  "grant_types": [
    "authorization_code"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "oxcTOi7jq8ckmpk4WZX8KrPt6kqXjMvRe1KqvOvMN1ObpSZS1LXV1yxZhiZ48ry6utNC2Cv_IoTSUQ8foBbRR__1dHMjiXW4dbQIswkNaaaXeDkUJJBjVMIzSc0ziaJxhhwPlsHc6XCOpX6DtNZP4vTZ0JLwrVyhPmkb20TqlytS3hk1uWp1vUjHTVf8x_dVCatzp1WTXv30kulB1HhRoRULEWO7Gp3yqsQSZZ8ghfld9ycJMtkya_-bAJXGbejw4M7spjSxapZd90E5077meNYNgzhRKp4R-gplwBdU6DzqYTHL4nR9ZvFOsofLe6v5D_DwhLYvjso1K8EpvGuydw"
      }
    ]
  },
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code"
  ],
  "redirect_uris": [
    "https://www.certification.openid.net/test/a/keycloak/callback"
  ],
  "contacts": [
    "certification@oidf.org"
  ]
}
2022-05-19 13:37:24
CallDynamicRegistrationEndpoint
HTTP request
request_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect
request_method
POST
request_headers
{
  "accept": "application/json",
  "accept-charset": "utf-8",
  "content-type": "application/json",
  "content-length": "707"
}
request_body
{"client_name":"OIDF Conformance Test lWF79B3Zl5jAlDs","grant_types":["authorization_code"],"jwks":{"keys":[{"kty":"RSA","e":"AQAB","use":"sig","alg":"RS256","n":"oxcTOi7jq8ckmpk4WZX8KrPt6kqXjMvRe1KqvOvMN1ObpSZS1LXV1yxZhiZ48ry6utNC2Cv_IoTSUQ8foBbRR__1dHMjiXW4dbQIswkNaaaXeDkUJJBjVMIzSc0ziaJxhhwPlsHc6XCOpX6DtNZP4vTZ0JLwrVyhPmkb20TqlytS3hk1uWp1vUjHTVf8x_dVCatzp1WTXv30kulB1HhRoRULEWO7Gp3yqsQSZZ8ghfld9ycJMtkya_-bAJXGbejw4M7spjSxapZd90E5077meNYNgzhRKp4R-gplwBdU6DzqYTHL4nR9ZvFOsofLe6v5D_DwhLYvjso1K8EpvGuydw"}]},"token_endpoint_auth_method":"client_secret_basic","response_types":["code"],"redirect_uris":["https://www.certification.openid.net/test/a/keycloak/callback"],"contacts":["certification@oidf.org"]}
2022-05-19 13:37:25 RESPONSE
CallDynamicRegistrationEndpoint
HTTP response
response_status_code
201 CREATED
response_status_text
Created
response_headers
{
  "x-xss-protection": "1; mode\u003dblock",
  "location": "https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect/bc841b91-cf50-4ebc-94d3-48cc3f3dbc26",
  "x-frame-options": "SAMEORIGIN",
  "referrer-policy": "no-referrer",
  "date": "Thu, 19 May 2022 13:37:25 GMT",
  "connection": "keep-alive",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "content-type": "application/json",
  "content-length": "1807"
}
response_body
{"redirect_uris":["https://www.certification.openid.net/test/a/keycloak/callback"],"token_endpoint_auth_method":"client_secret_basic","grant_types":["authorization_code"],"response_types":["code","none"],"client_id":"bc841b91-cf50-4ebc-94d3-48cc3f3dbc26","client_secret":"30yG1gTspHZYsMiU4FKzxmq0p4gJ3FAp","client_name":"OIDF Conformance Test lWF79B3Zl5jAlDs","scope":"address phone profile offline_access microprofile-jwt email","jwks":{"keys":[{"kty":"RSA","alg":"RS256","use":"sig","e":"AQAB","n":"oxcTOi7jq8ckmpk4WZX8KrPt6kqXjMvRe1KqvOvMN1ObpSZS1LXV1yxZhiZ48ry6utNC2Cv_IoTSUQ8foBbRR__1dHMjiXW4dbQIswkNaaaXeDkUJJBjVMIzSc0ziaJxhhwPlsHc6XCOpX6DtNZP4vTZ0JLwrVyhPmkb20TqlytS3hk1uWp1vUjHTVf8x_dVCatzp1WTXv30kulB1HhRoRULEWO7Gp3yqsQSZZ8ghfld9ycJMtkya_-bAJXGbejw4M7spjSxapZd90E5077meNYNgzhRKp4R-gplwBdU6DzqYTHL4nR9ZvFOsofLe6v5D_DwhLYvjso1K8EpvGuydw"}]},"subject_type":"public","request_uris":[],"tls_client_certificate_bound_access_tokens":false,"client_id_issued_at":1652967445,"client_secret_expires_at":0,"registration_client_uri":"https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect/bc841b91-cf50-4ebc-94d3-48cc3f3dbc26","registration_access_token":"eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlZGU2NjRjNS0zN2U1LTQ3ZGItOTQzZC04ODk5ZDRmNzExNTQifQ.eyJleHAiOjAsImlhdCI6MTY1Mjk2NzQ0NSwianRpIjoiZGEyMWYxNTMtMzIyZS00YTFkLWFiZGItZDY1N2QyZGU0ZGQxIiwiaXNzIjoiaHR0cHM6Ly84NC0yNDQtNzItOTAubmlwLmlvOjYwMDAwL2F1dGgvcmVhbG1zL3Rlc3QiLCJhdWQiOiJodHRwczovLzg0LTI0NC03Mi05MC5uaXAuaW86NjAwMDAvYXV0aC9yZWFsbXMvdGVzdCIsInR5cCI6IlJlZ2lzdHJhdGlvbkFjY2Vzc1Rva2VuIiwicmVnaXN0cmF0aW9uX2F1dGgiOiJhbm9ueW1vdXMifQ.BPEcdVdQDbu1-OGpuyPTId5GHLRjP-DIIHAxXccLxkQ","backchannel_logout_session_required":false,"require_pushed_authorization_requests":false,"frontchannel_logout_session_required":false}
2022-05-19 13:37:25
CallDynamicRegistrationEndpoint
Parsed registration endpoint response
status
201
endpoint_name
dynamic registration
headers
{
  "x-xss-protection": "1; mode\u003dblock",
  "location": "https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect/bc841b91-cf50-4ebc-94d3-48cc3f3dbc26",
  "x-frame-options": "SAMEORIGIN",
  "referrer-policy": "no-referrer",
  "date": "Thu, 19 May 2022 13:37:25 GMT",
  "connection": "keep-alive",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "content-type": "application/json",
  "content-length": "1807"
}
body
{"redirect_uris":["https://www.certification.openid.net/test/a/keycloak/callback"],"token_endpoint_auth_method":"client_secret_basic","grant_types":["authorization_code"],"response_types":["code","none"],"client_id":"bc841b91-cf50-4ebc-94d3-48cc3f3dbc26","client_secret":"30yG1gTspHZYsMiU4FKzxmq0p4gJ3FAp","client_name":"OIDF Conformance Test lWF79B3Zl5jAlDs","scope":"address phone profile offline_access microprofile-jwt email","jwks":{"keys":[{"kty":"RSA","alg":"RS256","use":"sig","e":"AQAB","n":"oxcTOi7jq8ckmpk4WZX8KrPt6kqXjMvRe1KqvOvMN1ObpSZS1LXV1yxZhiZ48ry6utNC2Cv_IoTSUQ8foBbRR__1dHMjiXW4dbQIswkNaaaXeDkUJJBjVMIzSc0ziaJxhhwPlsHc6XCOpX6DtNZP4vTZ0JLwrVyhPmkb20TqlytS3hk1uWp1vUjHTVf8x_dVCatzp1WTXv30kulB1HhRoRULEWO7Gp3yqsQSZZ8ghfld9ycJMtkya_-bAJXGbejw4M7spjSxapZd90E5077meNYNgzhRKp4R-gplwBdU6DzqYTHL4nR9ZvFOsofLe6v5D_DwhLYvjso1K8EpvGuydw"}]},"subject_type":"public","request_uris":[],"tls_client_certificate_bound_access_tokens":false,"client_id_issued_at":1652967445,"client_secret_expires_at":0,"registration_client_uri":"https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect/bc841b91-cf50-4ebc-94d3-48cc3f3dbc26","registration_access_token":"eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlZGU2NjRjNS0zN2U1LTQ3ZGItOTQzZC04ODk5ZDRmNzExNTQifQ.eyJleHAiOjAsImlhdCI6MTY1Mjk2NzQ0NSwianRpIjoiZGEyMWYxNTMtMzIyZS00YTFkLWFiZGItZDY1N2QyZGU0ZGQxIiwiaXNzIjoiaHR0cHM6Ly84NC0yNDQtNzItOTAubmlwLmlvOjYwMDAwL2F1dGgvcmVhbG1zL3Rlc3QiLCJhdWQiOiJodHRwczovLzg0LTI0NC03Mi05MC5uaXAuaW86NjAwMDAvYXV0aC9yZWFsbXMvdGVzdCIsInR5cCI6IlJlZ2lzdHJhdGlvbkFjY2Vzc1Rva2VuIiwicmVnaXN0cmF0aW9uX2F1dGgiOiJhbm9ueW1vdXMifQ.BPEcdVdQDbu1-OGpuyPTId5GHLRjP-DIIHAxXccLxkQ","backchannel_logout_session_required":false,"require_pushed_authorization_requests":false,"frontchannel_logout_session_required":false}
body_json
{
  "redirect_uris": [
    "https://www.certification.openid.net/test/a/keycloak/callback"
  ],
  "token_endpoint_auth_method": "client_secret_basic",
  "grant_types": [
    "authorization_code"
  ],
  "response_types": [
    "code",
    "none"
  ],
  "client_id": "bc841b91-cf50-4ebc-94d3-48cc3f3dbc26",
  "client_secret": "30yG1gTspHZYsMiU4FKzxmq0p4gJ3FAp",
  "client_name": "OIDF Conformance Test lWF79B3Zl5jAlDs",
  "scope": "address phone profile offline_access microprofile-jwt email",
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "alg": "RS256",
        "use": "sig",
        "e": "AQAB",
        "n": "oxcTOi7jq8ckmpk4WZX8KrPt6kqXjMvRe1KqvOvMN1ObpSZS1LXV1yxZhiZ48ry6utNC2Cv_IoTSUQ8foBbRR__1dHMjiXW4dbQIswkNaaaXeDkUJJBjVMIzSc0ziaJxhhwPlsHc6XCOpX6DtNZP4vTZ0JLwrVyhPmkb20TqlytS3hk1uWp1vUjHTVf8x_dVCatzp1WTXv30kulB1HhRoRULEWO7Gp3yqsQSZZ8ghfld9ycJMtkya_-bAJXGbejw4M7spjSxapZd90E5077meNYNgzhRKp4R-gplwBdU6DzqYTHL4nR9ZvFOsofLe6v5D_DwhLYvjso1K8EpvGuydw"
      }
    ]
  },
  "subject_type": "public",
  "request_uris": [],
  "tls_client_certificate_bound_access_tokens": false,
  "client_id_issued_at": 1652967445,
  "client_secret_expires_at": 0,
  "registration_client_uri": "https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect/bc841b91-cf50-4ebc-94d3-48cc3f3dbc26",
  "registration_access_token": "eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlZGU2NjRjNS0zN2U1LTQ3ZGItOTQzZC04ODk5ZDRmNzExNTQifQ.eyJleHAiOjAsImlhdCI6MTY1Mjk2NzQ0NSwianRpIjoiZGEyMWYxNTMtMzIyZS00YTFkLWFiZGItZDY1N2QyZGU0ZGQxIiwiaXNzIjoiaHR0cHM6Ly84NC0yNDQtNzItOTAubmlwLmlvOjYwMDAwL2F1dGgvcmVhbG1zL3Rlc3QiLCJhdWQiOiJodHRwczovLzg0LTI0NC03Mi05MC5uaXAuaW86NjAwMDAvYXV0aC9yZWFsbXMvdGVzdCIsInR5cCI6IlJlZ2lzdHJhdGlvbkFjY2Vzc1Rva2VuIiwicmVnaXN0cmF0aW9uX2F1dGgiOiJhbm9ueW1vdXMifQ.BPEcdVdQDbu1-OGpuyPTId5GHLRjP-DIIHAxXccLxkQ",
  "backchannel_logout_session_required": false,
  "require_pushed_authorization_requests": false,
  "frontchannel_logout_session_required": false
}
2022-05-19 13:37:25 SUCCESS
EnsureContentTypeJson
endpoint_response Content-Type: header is application/json
2022-05-19 13:37:25 SUCCESS
EnsureHttpStatusCodeIs201
dynamic registration endpoint returned the expected http status
expected_status
201
http_status
201
2022-05-19 13:37:25 SUCCESS
CheckNoErrorFromDynamicRegistrationEndpoint
Dynamic registration endpoint did not return an error.
2022-05-19 13:37:25 SUCCESS
ExtractDynamicRegistrationResponse
Extracted client from dynamic registration response
client_id
bc841b91-cf50-4ebc-94d3-48cc3f3dbc26
2022-05-19 13:37:25 SUCCESS
VerifyClientManagementCredentials
Verified dynamic registration management credentials
registration_client_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect/bc841b91-cf50-4ebc-94d3-48cc3f3dbc26
registration_access_token
eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlZGU2NjRjNS0zN2U1LTQ3ZGItOTQzZC04ODk5ZDRmNzExNTQifQ.eyJleHAiOjAsImlhdCI6MTY1Mjk2NzQ0NSwianRpIjoiZGEyMWYxNTMtMzIyZS00YTFkLWFiZGItZDY1N2QyZGU0ZGQxIiwiaXNzIjoiaHR0cHM6Ly84NC0yNDQtNzItOTAubmlwLmlvOjYwMDAwL2F1dGgvcmVhbG1zL3Rlc3QiLCJhdWQiOiJodHRwczovLzg0LTI0NC03Mi05MC5uaXAuaW86NjAwMDAvYXV0aC9yZWFsbXMvdGVzdCIsInR5cCI6IlJlZ2lzdHJhdGlvbkFjY2Vzc1Rva2VuIiwicmVnaXN0cmF0aW9uX2F1dGgiOiJhbm9ueW1vdXMifQ.BPEcdVdQDbu1-OGpuyPTId5GHLRjP-DIIHAxXccLxkQ
2022-05-19 13:37:25
SetScopeInClientConfigurationToOpenId
Set scope in client configuration to "openid"
scope
openid
2022-05-19 13:37:25 SUCCESS
EnsureServerConfigurationSupportsClientSecretBasic
Contents of 'token_endpoint_auth_methods_supported' in discovery document matches expectations.
actual
[
  "private_key_jwt",
  "client_secret_basic",
  "client_secret_post",
  "tls_client_auth",
  "client_secret_jwt"
]
expected
[
  "client_secret_basic"
]
minimum_matches_required
1
2022-05-19 13:37:25 SUCCESS
SetProtectedResourceUrlToUserInfoEndpoint
userinfo_endpoint will be used to test access token. The user info is not a mandatory to implement feature in the OpenID Connect specification, but is mandatory for certification.
protected_resource_url
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/userinfo
2022-05-19 13:37:25
oidcc-codereuse-30seconds
Setup Done
Make request to authorization endpoint
2022-05-19 13:37:25 SUCCESS
CreateAuthorizationEndpointRequestFromClientInformation
Created authorization endpoint request
client_id
bc841b91-cf50-4ebc-94d3-48cc3f3dbc26
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
scope
openid
2022-05-19 13:37:25
CreateRandomStateValue
Created state value
requested_state_length
10
state
lF8Vz4xY6Y
2022-05-19 13:37:25 SUCCESS
AddStateToAuthorizationEndpointRequest
Added state parameter to request
client_id
bc841b91-cf50-4ebc-94d3-48cc3f3dbc26
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
scope
openid
state
lF8Vz4xY6Y
2022-05-19 13:37:25
CreateRandomNonceValue
Created nonce value
requested_nonce_length
10
nonce
IGaITgvKwR
2022-05-19 13:37:25 SUCCESS
AddNonceToAuthorizationEndpointRequest
Added nonce parameter to request
client_id
bc841b91-cf50-4ebc-94d3-48cc3f3dbc26
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
scope
openid
state
lF8Vz4xY6Y
nonce
IGaITgvKwR
2022-05-19 13:37:25 SUCCESS
SetAuthorizationEndpointRequestResponseTypeFromEnvironment
Added response_type parameter to request
client_id
bc841b91-cf50-4ebc-94d3-48cc3f3dbc26
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
scope
openid
state
lF8Vz4xY6Y
nonce
IGaITgvKwR
response_type
code
2022-05-19 13:37:25 SUCCESS
BuildPlainRedirectToAuthorizationEndpoint
Sending to authorization endpoint
auth_request
{
  "client_id": "bc841b91-cf50-4ebc-94d3-48cc3f3dbc26",
  "redirect_uri": "https://www.certification.openid.net/test/a/keycloak/callback",
  "scope": "openid",
  "state": "lF8Vz4xY6Y",
  "nonce": "IGaITgvKwR",
  "response_type": "code"
}
redirect_to_authorization_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth?client_id=bc841b91-cf50-4ebc-94d3-48cc3f3dbc26&redirect_uri=https://www.certification.openid.net/test/a/keycloak/callback&scope=openid&state=lF8Vz4xY6Y&nonce=IGaITgvKwR&response_type=code
2022-05-19 13:37:25 REDIRECT
oidcc-codereuse-30seconds
Redirecting to authorization endpoint
redirect_to
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth?client_id=bc841b91-cf50-4ebc-94d3-48cc3f3dbc26&redirect_uri=https://www.certification.openid.net/test/a/keycloak/callback&scope=openid&state=lF8Vz4xY6Y&nonce=IGaITgvKwR&response_type=code
2022-05-19 13:37:32 INCOMING
oidcc-codereuse-30seconds
Incoming HTTP request to /test/a/keycloak/callback
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:100.0) Gecko/20100101 Firefox/100.0",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/avif,image/webp,*/*;q\u003d0.8",
  "accept-language": "en-US,en;q\u003d0.5",
  "accept-encoding": "gzip, deflate, br",
  "cookie": "__utma\u003d201319536.747058366.1611919072.1652941054.1652964248.141; __utmz\u003d201319536.1647870296.126.44.utmcsr\u003dgoogle|utmccn\u003d(organic)|utmcmd\u003dorganic|utmctr\u003d(not%20provided); _ga\u003dGA1.2.747058366.1611919072; __utmc\u003d201319536; JSESSIONID\u003dFA6FE393C94D574E60695BF1ECA081CB",
  "upgrade-insecure-requests": "1",
  "sec-fetch-dest": "document",
  "sec-fetch-mode": "navigate",
  "sec-fetch-site": "none",
  "sec-fetch-user": "?1",
  "connection": "close"
}
incoming_path
/test/a/keycloak/callback
incoming_body_form_params
incoming_method
GET
incoming_tls_version
TLSv1.2
incoming_tls_cipher
ECDHE-RSA-AES128-GCM-SHA256
incoming_tls_cert
incoming_body_json
incoming_query_string_params
{
  "state": "lF8Vz4xY6Y",
  "session_state": "21487f0d-2e82-4b4c-baa2-f307686fd42a",
  "code": "6d66ca62-37d7-4890-8111-323f880e0f72.21487f0d-2e82-4b4c-baa2-f307686fd42a.bc841b91-cf50-4ebc-94d3-48cc3f3dbc26"
}
incoming_body
2022-05-19 13:37:32 SUCCESS
CreateRandomImplicitSubmitUrl
Created random implicit submission URL
implicit_submit
{
  "path": "implicit/oJtwNu3TfFZGQIBPK4R8",
  "fullUrl": "https://www.certification.openid.net/test/a/keycloak/implicit/oJtwNu3TfFZGQIBPK4R8"
}
2022-05-19 13:37:32 OUTGOING
oidcc-codereuse-30seconds
Response to HTTP request to test instance lWF79B3Zl5jAlDs
outgoing
ModelAndView [view="implicitCallback"; model={implicitSubmitUrl=https://www.certification.openid.net/test/a/keycloak/implicit/oJtwNu3TfFZGQIBPK4R8, returnUrl=/log-detail.html?log=lWF79B3Zl5jAlDs}]
outgoing_path
callback
2022-05-19 13:37:33 INCOMING
oidcc-codereuse-30seconds
Incoming HTTP request to /test/a/keycloak/implicit/oJtwNu3TfFZGQIBPK4R8
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:100.0) Gecko/20100101 Firefox/100.0",
  "accept": "*/*",
  "accept-language": "en-US,en;q\u003d0.5",
  "accept-encoding": "gzip, deflate, br",
  "content-type": "text/plain",
  "x-requested-with": "XMLHttpRequest",
  "origin": "https://www.certification.openid.net",
  "referer": "https://www.certification.openid.net/test/a/keycloak/callback?state\u003dlF8Vz4xY6Y\u0026session_state\u003d21487f0d-2e82-4b4c-baa2-f307686fd42a\u0026code\u003d6d66ca62-37d7-4890-8111-323f880e0f72.21487f0d-2e82-4b4c-baa2-f307686fd42a.bc841b91-cf50-4ebc-94d3-48cc3f3dbc26",
  "cookie": "__utma\u003d201319536.747058366.1611919072.1652941054.1652964248.141; __utmz\u003d201319536.1647870296.126.44.utmcsr\u003dgoogle|utmccn\u003d(organic)|utmcmd\u003dorganic|utmctr\u003d(not%20provided); _ga\u003dGA1.2.747058366.1611919072; __utmc\u003d201319536; JSESSIONID\u003dFA6FE393C94D574E60695BF1ECA081CB",
  "sec-fetch-dest": "empty",
  "sec-fetch-mode": "cors",
  "sec-fetch-site": "same-origin",
  "connection": "close",
  "content-length": "0"
}
incoming_path
/test/a/keycloak/implicit/oJtwNu3TfFZGQIBPK4R8
incoming_body_form_params
incoming_method
POST
incoming_tls_version
TLSv1.2
incoming_tls_cipher
ECDHE-RSA-AES128-GCM-SHA256
incoming_tls_cert
incoming_body_json
incoming_query_string_params
{}
incoming_body
2022-05-19 13:37:33 OUTGOING
oidcc-codereuse-30seconds
Response to HTTP request to test instance lWF79B3Zl5jAlDs
outgoing_status_code
204
outgoing_headers
{}
outgoing_body

                                
outgoing_path
implicit/oJtwNu3TfFZGQIBPK4R8
2022-05-19 13:37:33 SUCCESS
ExtractImplicitHashToCallbackResponse
implicit_hash is empty
2022-05-19 13:37:33 REDIRECT-IN
oidcc-codereuse-30seconds
Authorization endpoint response captured
url_query
{
  "state": "lF8Vz4xY6Y",
  "session_state": "21487f0d-2e82-4b4c-baa2-f307686fd42a",
  "code": "6d66ca62-37d7-4890-8111-323f880e0f72.21487f0d-2e82-4b4c-baa2-f307686fd42a.bc841b91-cf50-4ebc-94d3-48cc3f3dbc26"
}
headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:100.0) Gecko/20100101 Firefox/100.0",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/avif,image/webp,*/*;q\u003d0.8",
  "accept-language": "en-US,en;q\u003d0.5",
  "accept-encoding": "gzip, deflate, br",
  "cookie": "__utma\u003d201319536.747058366.1611919072.1652941054.1652964248.141; __utmz\u003d201319536.1647870296.126.44.utmcsr\u003dgoogle|utmccn\u003d(organic)|utmcmd\u003dorganic|utmctr\u003d(not%20provided); _ga\u003dGA1.2.747058366.1611919072; __utmc\u003d201319536; JSESSIONID\u003dFA6FE393C94D574E60695BF1ECA081CB",
  "upgrade-insecure-requests": "1",
  "sec-fetch-dest": "document",
  "sec-fetch-mode": "navigate",
  "sec-fetch-site": "none",
  "sec-fetch-user": "?1",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "x-forwarded-proto": "https",
  "x-forwarded-port": "443",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
http_method
GET
url_fragment
{}
post_body
Verify authorization endpoint response
2022-05-19 13:37:33 SUCCESS
CheckMatchingCallbackParameters
Callback parameters successfully verified
2022-05-19 13:37:33
ValidateIssInAuthorizationResponse
No 'iss' value in authorization response.
2022-05-19 13:37:33 SUCCESS
CheckIfAuthorizationEndpointError
No error from authorization endpoint
2022-05-19 13:37:33 SUCCESS
CheckStateInAuthorizationResponse
State in response correctly returned
state
lF8Vz4xY6Y
2022-05-19 13:37:33 SUCCESS
ExtractAuthorizationCodeFromAuthorizationResponse
Found authorization code
code
6d66ca62-37d7-4890-8111-323f880e0f72.21487f0d-2e82-4b4c-baa2-f307686fd42a.bc841b91-cf50-4ebc-94d3-48cc3f3dbc26
2022-05-19 13:37:33 SUCCESS
CreateTokenEndpointRequestForAuthorizationCodeGrant
Created token endpoint request
grant_type
authorization_code
code
6d66ca62-37d7-4890-8111-323f880e0f72.21487f0d-2e82-4b4c-baa2-f307686fd42a.bc841b91-cf50-4ebc-94d3-48cc3f3dbc26
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
2022-05-19 13:37:33 SUCCESS
AddBasicAuthClientSecretAuthenticationParameters
Added basic authorization header
Authorization
Basic YmM4NDFiOTEtY2Y1MC00ZWJjLTk0ZDMtNDhjYzNmM2RiYzI2OjMweUcxZ1RzcEhaWXNNaVU0Rkt6eG1xMHA0Z0ozRkFw
2022-05-19 13:37:33
CallTokenEndpoint
HTTP request
request_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token
request_method
POST
request_headers
{
  "accept": "application/json",
  "authorization": "Basic YmM4NDFiOTEtY2Y1MC00ZWJjLTk0ZDMtNDhjYzNmM2RiYzI2OjMweUcxZ1RzcEhaWXNNaVU0Rkt6eG1xMHA0Z0ozRkFw",
  "content-type": "application/x-www-form-urlencoded;charset\u003dUTF-8",
  "content-length": "234"
}
request_body
grant_type=authorization_code&code=6d66ca62-37d7-4890-8111-323f880e0f72.21487f0d-2e82-4b4c-baa2-f307686fd42a.bc841b91-cf50-4ebc-94d3-48cc3f3dbc26&redirect_uri=https%3A%2F%2Fwww.certification.openid.net%2Ftest%2Fa%2Fkeycloak%2Fcallback
2022-05-19 13:37:34 RESPONSE
CallTokenEndpoint
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "cache-control": "no-store",
  "x-xss-protection": "1; mode\u003dblock",
  "pragma": "no-cache",
  "x-frame-options": "SAMEORIGIN",
  "referrer-policy": "no-referrer",
  "date": "Thu, 19 May 2022 13:37:34 GMT",
  "connection": "keep-alive",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "content-type": "application/json",
  "content-length": "2468"
}
response_body
{"access_token":"eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.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.PonZEsKgvlMCUVQEgRtZl_iJf8oqcBmCjjQOuO0X0rlqEjsV9A9H4NtiZv5XS01c89xswSzDMdZH2_kYWJvfIjvqA8c9kOHZpv43spAnJx3Z1VwCyzoN_YIrjH2pV6c94jQcSO2SfpjLp8qKPjygPMLj9NEv2DPZKEInL0DNKWYQY49ug9QWc9T0OnCTbOoqpCv6rRERCNic6cGLuLQEv9v2MLG8cI2yCppgEVX-CN-CGNIPrbz0DGfeEHBwgbRJryq4s8qf7ppuyw01NRKFK1rd59DAd1m0dMnD7OJfa4FBncnxMYmTRmufjY35Z5dmmm8AR1hMgg1gHRXdXzvD9A","expires_in":300,"refresh_expires_in":0,"token_type":"Bearer","id_token":"eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.eyJleHAiOjE2NTI5Njc3NTQsImlhdCI6MTY1Mjk2NzQ1NCwiYXV0aF90aW1lIjoxNjUyOTY3MzgwLCJqdGkiOiJkOTQ1OGFhZS0yNDRmLTRkMGQtODBlOC02MTMyMTQ5NzBhZTUiLCJpc3MiOiJodHRwczovLzg0LTI0NC03Mi05MC5uaXAuaW86NjAwMDAvYXV0aC9yZWFsbXMvdGVzdCIsImF1ZCI6ImJjODQxYjkxLWNmNTAtNGViYy05NGQzLTQ4Y2MzZjNkYmMyNiIsInN1YiI6IjNlY2RjZWNkLTQzZGMtNGRjOS1hYTFjLWI5NzkxZmNmNzMwZiIsInR5cCI6IklEIiwiYXpwIjoiYmM4NDFiOTEtY2Y1MC00ZWJjLTk0ZDMtNDhjYzNmM2RiYzI2Iiwibm9uY2UiOiJJR2FJVGd2S3dSIiwic2Vzc2lvbl9zdGF0ZSI6IjIxNDg3ZjBkLTJlODItNGI0Yy1iYWEyLWYzMDc2ODZmZDQyYSIsImF0X2hhc2giOiJYcVdET3dHbHpyTjIwa2tGR2YxNmtnIiwiYWNyIjoiMCIsInNpZCI6IjIxNDg3ZjBkLTJlODItNGI0Yy1iYWEyLWYzMDc2ODZmZDQyYSJ9.AQAf3ZwDGgbko5z7S63uCwx8y_uiq9JExA5FqQbUpijQykhm1MGrWnnb1SGNl0uf61pQLMzl8rE7cByveMKrA6_CRF18SxlDT4nkosnN4Yd3FP42vtOUIbfv1uwZiCu1KxptxGTl-fZJpLZT7CeFS8tGc_2GmF5PeiJmWhZeF48XuJO80q8ExaRdNfdK-GkYAkZo1juRuMclWYeIzeGlSS1W0EIKOdBVSRpFW8rF83R1sBFWkD0UGyONSvdWe8AlAL-3Rp5EoB6zaKRbXhv5wwuTrjh9jEXBAkYJEwb3pbL8zwRiRDvvp7qduEa_IItw2jXoLKC6hByrn5gKTwhOig","not-before-policy":1652951933,"session_state":"21487f0d-2e82-4b4c-baa2-f307686fd42a","scope":"openid name_claims acr"}
2022-05-19 13:37:34 SUCCESS
CallTokenEndpoint
Parsed token endpoint response
access_token
eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.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.PonZEsKgvlMCUVQEgRtZl_iJf8oqcBmCjjQOuO0X0rlqEjsV9A9H4NtiZv5XS01c89xswSzDMdZH2_kYWJvfIjvqA8c9kOHZpv43spAnJx3Z1VwCyzoN_YIrjH2pV6c94jQcSO2SfpjLp8qKPjygPMLj9NEv2DPZKEInL0DNKWYQY49ug9QWc9T0OnCTbOoqpCv6rRERCNic6cGLuLQEv9v2MLG8cI2yCppgEVX-CN-CGNIPrbz0DGfeEHBwgbRJryq4s8qf7ppuyw01NRKFK1rd59DAd1m0dMnD7OJfa4FBncnxMYmTRmufjY35Z5dmmm8AR1hMgg1gHRXdXzvD9A
expires_in
300
refresh_expires_in
0
token_type
Bearer
id_token
eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.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.AQAf3ZwDGgbko5z7S63uCwx8y_uiq9JExA5FqQbUpijQykhm1MGrWnnb1SGNl0uf61pQLMzl8rE7cByveMKrA6_CRF18SxlDT4nkosnN4Yd3FP42vtOUIbfv1uwZiCu1KxptxGTl-fZJpLZT7CeFS8tGc_2GmF5PeiJmWhZeF48XuJO80q8ExaRdNfdK-GkYAkZo1juRuMclWYeIzeGlSS1W0EIKOdBVSRpFW8rF83R1sBFWkD0UGyONSvdWe8AlAL-3Rp5EoB6zaKRbXhv5wwuTrjh9jEXBAkYJEwb3pbL8zwRiRDvvp7qduEa_IItw2jXoLKC6hByrn5gKTwhOig
not-before-policy
1652951933
session_state
21487f0d-2e82-4b4c-baa2-f307686fd42a
scope
openid name_claims acr
2022-05-19 13:37:34 SUCCESS
CheckIfTokenEndpointResponseError
No error from token endpoint
2022-05-19 13:37:34 SUCCESS
CheckForAccessTokenValue
Found an access token
access_token
eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.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.PonZEsKgvlMCUVQEgRtZl_iJf8oqcBmCjjQOuO0X0rlqEjsV9A9H4NtiZv5XS01c89xswSzDMdZH2_kYWJvfIjvqA8c9kOHZpv43spAnJx3Z1VwCyzoN_YIrjH2pV6c94jQcSO2SfpjLp8qKPjygPMLj9NEv2DPZKEInL0DNKWYQY49ug9QWc9T0OnCTbOoqpCv6rRERCNic6cGLuLQEv9v2MLG8cI2yCppgEVX-CN-CGNIPrbz0DGfeEHBwgbRJryq4s8qf7ppuyw01NRKFK1rd59DAd1m0dMnD7OJfa4FBncnxMYmTRmufjY35Z5dmmm8AR1hMgg1gHRXdXzvD9A
2022-05-19 13:37:34 SUCCESS
ExtractAccessTokenFromTokenResponse
Extracted the access token
value
eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.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.PonZEsKgvlMCUVQEgRtZl_iJf8oqcBmCjjQOuO0X0rlqEjsV9A9H4NtiZv5XS01c89xswSzDMdZH2_kYWJvfIjvqA8c9kOHZpv43spAnJx3Z1VwCyzoN_YIrjH2pV6c94jQcSO2SfpjLp8qKPjygPMLj9NEv2DPZKEInL0DNKWYQY49ug9QWc9T0OnCTbOoqpCv6rRERCNic6cGLuLQEv9v2MLG8cI2yCppgEVX-CN-CGNIPrbz0DGfeEHBwgbRJryq4s8qf7ppuyw01NRKFK1rd59DAd1m0dMnD7OJfa4FBncnxMYmTRmufjY35Z5dmmm8AR1hMgg1gHRXdXzvD9A
type
Bearer
2022-05-19 13:37:34 SUCCESS
ExtractExpiresInFromTokenEndpointResponse
Extracted 'expires_in'
expires_in
300
2022-05-19 13:37:34 SUCCESS
ValidateExpiresIn
expires_in passed all validation checks
expires_in
300
2022-05-19 13:37:34 INFO
CheckForRefreshTokenValue
Couldn't find refresh token
2022-05-19 13:37:34 SUCCESS
ExtractIdTokenFromTokenResponse
Found and parsed the id_token from token_endpoint_response
value
eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.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.AQAf3ZwDGgbko5z7S63uCwx8y_uiq9JExA5FqQbUpijQykhm1MGrWnnb1SGNl0uf61pQLMzl8rE7cByveMKrA6_CRF18SxlDT4nkosnN4Yd3FP42vtOUIbfv1uwZiCu1KxptxGTl-fZJpLZT7CeFS8tGc_2GmF5PeiJmWhZeF48XuJO80q8ExaRdNfdK-GkYAkZo1juRuMclWYeIzeGlSS1W0EIKOdBVSRpFW8rF83R1sBFWkD0UGyONSvdWe8AlAL-3Rp5EoB6zaKRbXhv5wwuTrjh9jEXBAkYJEwb3pbL8zwRiRDvvp7qduEa_IItw2jXoLKC6hByrn5gKTwhOig
header
{
  "kid": "Mb20UGZj81X9UGbs0uReFcFlUV81vJRDYFPclWBv9GY",
  "typ": "JWT",
  "alg": "RS256"
}
claims
{
  "at_hash": "XqWDOwGlzrN20kkFGf16kg",
  "sub": "3ecdcecd-43dc-4dc9-aa1c-b9791fcf730f",
  "iss": "https://84-244-72-90.nip.io:60000/auth/realms/test",
  "typ": "ID",
  "nonce": "IGaITgvKwR",
  "sid": "21487f0d-2e82-4b4c-baa2-f307686fd42a",
  "aud": "bc841b91-cf50-4ebc-94d3-48cc3f3dbc26",
  "acr": "0",
  "azp": "bc841b91-cf50-4ebc-94d3-48cc3f3dbc26",
  "auth_time": 1652967380,
  "exp": 1652967754,
  "session_state": "21487f0d-2e82-4b4c-baa2-f307686fd42a",
  "iat": 1652967454,
  "jti": "d9458aae-244f-4d0d-80e8-613214970ae5"
}
2022-05-19 13:37:34 SUCCESS
ValidateIdToken
ID token iss, aud, exp, iat, auth_time, acr & nbf claims passed validation checks
2022-05-19 13:37:34 SUCCESS
ValidateIdTokenNonce
Nonce values match
nonce
IGaITgvKwR
2022-05-19 13:37:34 SUCCESS
ValidateIdTokenACRClaimAgainstRequest
Nothing to check; the conformance suite did not request an acr claim in request object
2022-05-19 13:37:34 SUCCESS
ValidateIdTokenSignature
id_token signature validated
id_token
eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.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.AQAf3ZwDGgbko5z7S63uCwx8y_uiq9JExA5FqQbUpijQykhm1MGrWnnb1SGNl0uf61pQLMzl8rE7cByveMKrA6_CRF18SxlDT4nkosnN4Yd3FP42vtOUIbfv1uwZiCu1KxptxGTl-fZJpLZT7CeFS8tGc_2GmF5PeiJmWhZeF48XuJO80q8ExaRdNfdK-GkYAkZo1juRuMclWYeIzeGlSS1W0EIKOdBVSRpFW8rF83R1sBFWkD0UGyONSvdWe8AlAL-3Rp5EoB6zaKRbXhv5wwuTrjh9jEXBAkYJEwb3pbL8zwRiRDvvp7qduEa_IItw2jXoLKC6hByrn5gKTwhOig
2022-05-19 13:37:34 SUCCESS
ValidateIdTokenSignatureUsingKid
id_token signature validated
id_token
eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.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.AQAf3ZwDGgbko5z7S63uCwx8y_uiq9JExA5FqQbUpijQykhm1MGrWnnb1SGNl0uf61pQLMzl8rE7cByveMKrA6_CRF18SxlDT4nkosnN4Yd3FP42vtOUIbfv1uwZiCu1KxptxGTl-fZJpLZT7CeFS8tGc_2GmF5PeiJmWhZeF48XuJO80q8ExaRdNfdK-GkYAkZo1juRuMclWYeIzeGlSS1W0EIKOdBVSRpFW8rF83R1sBFWkD0UGyONSvdWe8AlAL-3Rp5EoB6zaKRbXhv5wwuTrjh9jEXBAkYJEwb3pbL8zwRiRDvvp7qduEa_IItw2jXoLKC6hByrn5gKTwhOig
2022-05-19 13:37:34 SUCCESS
CheckForSubjectInIdToken
Found 'sub' in id_token
sub
3ecdcecd-43dc-4dc9-aa1c-b9791fcf730f
2022-05-19 13:37:34 INFO
FAPIValidateEncryptedIdTokenHasKid
Skipped evaluation due to missing required element: id_token jwe_header
path
jwe_header
mapped
object
id_token
Userinfo endpoint tests
2022-05-19 13:37:34
CallProtectedResource
HTTP request
request_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/userinfo
request_method
GET
request_headers
{
  "accept": "application/json",
  "authorization": "Bearer eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.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.PonZEsKgvlMCUVQEgRtZl_iJf8oqcBmCjjQOuO0X0rlqEjsV9A9H4NtiZv5XS01c89xswSzDMdZH2_kYWJvfIjvqA8c9kOHZpv43spAnJx3Z1VwCyzoN_YIrjH2pV6c94jQcSO2SfpjLp8qKPjygPMLj9NEv2DPZKEInL0DNKWYQY49ug9QWc9T0OnCTbOoqpCv6rRERCNic6cGLuLQEv9v2MLG8cI2yCppgEVX-CN-CGNIPrbz0DGfeEHBwgbRJryq4s8qf7ppuyw01NRKFK1rd59DAd1m0dMnD7OJfa4FBncnxMYmTRmufjY35Z5dmmm8AR1hMgg1gHRXdXzvD9A",
  "content-length": "0"
}
request_body

                                
2022-05-19 13:37:35 RESPONSE
CallProtectedResource
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "cache-control": "no-cache",
  "x-xss-protection": "1; mode\u003dblock",
  "x-frame-options": "SAMEORIGIN",
  "referrer-policy": "no-referrer",
  "date": "Thu, 19 May 2022 13:37:35 GMT",
  "connection": "keep-alive",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "content-type": "application/json",
  "content-length": "46"
}
response_body
{"sub":"3ecdcecd-43dc-4dc9-aa1c-b9791fcf730f"}
2022-05-19 13:37:35 SUCCESS
CallProtectedResource
Got a response from the resource endpoint
status
200
endpoint_name
resource
headers
{
  "cache-control": "no-cache",
  "x-xss-protection": "1; mode\u003dblock",
  "x-frame-options": "SAMEORIGIN",
  "referrer-policy": "no-referrer",
  "date": "Thu, 19 May 2022 13:37:35 GMT",
  "connection": "keep-alive",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "content-type": "application/json",
  "content-length": "46"
}
body
{"sub":"3ecdcecd-43dc-4dc9-aa1c-b9791fcf730f"}
2022-05-19 13:37:35 SUCCESS
EnsureHttpStatusCodeIs200
resource endpoint returned the expected http status
expected_status
200
http_status
200
2022-05-19 13:37:35 SUCCESS
WaitFor30Seconds
Pausing for 30 seconds
2022-05-19 13:38:05 SUCCESS
WaitFor30Seconds
Woke up after 30 seconds sleep
Attempting reuse of authorisation code
2022-05-19 13:38:05
CallTokenEndpointAndReturnFullResponse
HTTP request
request_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token
request_method
POST
request_headers
{
  "accept": "application/json",
  "authorization": "Basic YmM4NDFiOTEtY2Y1MC00ZWJjLTk0ZDMtNDhjYzNmM2RiYzI2OjMweUcxZ1RzcEhaWXNNaVU0Rkt6eG1xMHA0Z0ozRkFw",
  "content-type": "application/x-www-form-urlencoded;charset\u003dUTF-8",
  "content-length": "234"
}
request_body
grant_type=authorization_code&code=6d66ca62-37d7-4890-8111-323f880e0f72.21487f0d-2e82-4b4c-baa2-f307686fd42a.bc841b91-cf50-4ebc-94d3-48cc3f3dbc26&redirect_uri=https%3A%2F%2Fwww.certification.openid.net%2Ftest%2Fa%2Fkeycloak%2Fcallback
2022-05-19 13:38:05 RESPONSE
CallTokenEndpointAndReturnFullResponse
HTTP response
response_status_code
400 BAD_REQUEST
response_status_text
Bad Request
response_headers
{
  "cache-control": "no-store",
  "x-xss-protection": "1; mode\u003dblock",
  "pragma": "no-cache",
  "x-frame-options": "SAMEORIGIN",
  "referrer-policy": "no-referrer",
  "date": "Thu, 19 May 2022 13:38:05 GMT",
  "connection": "keep-alive",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "content-type": "application/json",
  "content-length": "62"
}
response_body
{"error":"invalid_grant","error_description":"Code not valid"}
2022-05-19 13:38:05 SUCCESS
CallTokenEndpointAndReturnFullResponse
Parsed token endpoint response
error
invalid_grant
error_description
Code not valid
2022-05-19 13:38:05 SUCCESS
CheckTokenEndpointHttpStatus400
Token endpoint http status code was 400
2022-05-19 13:38:05 SUCCESS
CheckTokenEndpointReturnedJsonContentType
token_endpoint_response_headers Content-Type: header is application/json
2022-05-19 13:38:05 SUCCESS
CheckErrorFromTokenEndpointResponseErrorInvalidGrant
Token Endpoint response error returned expected 'error' of 'invalid_grant'
expected
[
  "invalid_grant"
]
2022-05-19 13:38:05 SUCCESS
ValidateErrorFromTokenEndpointResponseError
Token endpoint response error returned valid 'error' field
error
invalid_grant
2022-05-19 13:38:05 SUCCESS
CheckErrorDescriptionFromTokenEndpointResponseErrorContainsCRLFTAB
token_endpoint_response 'error_description' field does not include CR/LF/TAB
error_description
Code not valid
2022-05-19 13:38:05 SUCCESS
ValidateErrorDescriptionFromTokenEndpointResponseError
token_endpoint_response error returned valid 'error_description' field
error_description
Code not valid
2022-05-19 13:38:05 SUCCESS
ValidateErrorUriFromTokenEndpointResponseError
token_endpoint_response did not include optional 'error_uri' field
Testing if access token was revoked after authorization code reuse (the AS 'should' have revoked the access token)
2022-05-19 13:38:05
CallProtectedResource
HTTP request
request_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/userinfo
request_method
GET
request_headers
{
  "accept": "application/json",
  "authorization": "Bearer eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJNYjIwVUdaajgxWDlVR2JzMHVSZUZjRmxVVjgxdkpSRFlGUGNsV0J2OUdZIn0.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.PonZEsKgvlMCUVQEgRtZl_iJf8oqcBmCjjQOuO0X0rlqEjsV9A9H4NtiZv5XS01c89xswSzDMdZH2_kYWJvfIjvqA8c9kOHZpv43spAnJx3Z1VwCyzoN_YIrjH2pV6c94jQcSO2SfpjLp8qKPjygPMLj9NEv2DPZKEInL0DNKWYQY49ug9QWc9T0OnCTbOoqpCv6rRERCNic6cGLuLQEv9v2MLG8cI2yCppgEVX-CN-CGNIPrbz0DGfeEHBwgbRJryq4s8qf7ppuyw01NRKFK1rd59DAd1m0dMnD7OJfa4FBncnxMYmTRmufjY35Z5dmmm8AR1hMgg1gHRXdXzvD9A",
  "content-length": "0"
}
request_body

                                
2022-05-19 13:38:06 RESPONSE
CallProtectedResource
HTTP response
response_status_code
401 UNAUTHORIZED
response_status_text
Unauthorized
response_headers
{
  "x-xss-protection": "1; mode\u003dblock",
  "x-frame-options": "SAMEORIGIN",
  "referrer-policy": "no-referrer",
  "date": "Thu, 19 May 2022 13:38:06 GMT",
  "connection": "keep-alive",
  "www-authenticate": "Bearer realm\u003d\"test\", error\u003d\"invalid_request\", error_description\u003d\"User session not found or doesn\u0027t have client attached on it\"",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "content-type": "application/json",
  "content-length": "110"
}
response_body
{"error":"invalid_request","error_description":"User session not found or doesn't have client attached on it"}
2022-05-19 13:38:06 SUCCESS
CallProtectedResource
Got a response from the resource endpoint
status
401
endpoint_name
resource
headers
{
  "x-xss-protection": "1; mode\u003dblock",
  "x-frame-options": "SAMEORIGIN",
  "referrer-policy": "no-referrer",
  "date": "Thu, 19 May 2022 13:38:06 GMT",
  "connection": "keep-alive",
  "www-authenticate": "Bearer realm\u003d\"test\", error\u003d\"invalid_request\", error_description\u003d\"User session not found or doesn\u0027t have client attached on it\"",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "content-type": "application/json",
  "content-length": "110"
}
body
{"error":"invalid_request","error_description":"User session not found or doesn't have client attached on it"}
2022-05-19 13:38:06 SUCCESS
EnsureHttpStatusCodeIs4xx
resource endpoint http status code was 401
2022-05-19 13:38:06 FINISHED
oidcc-codereuse-30seconds
Test has run to completion
testmodule_result
PASSED
Unregister dynamically registered client
2022-05-19 13:38:06
UnregisterDynamicallyRegisteredClient
HTTP request
request_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect/bc841b91-cf50-4ebc-94d3-48cc3f3dbc26
request_method
DELETE
request_headers
{
  "accept": "application/json",
  "authorization": "Bearer eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlZGU2NjRjNS0zN2U1LTQ3ZGItOTQzZC04ODk5ZDRmNzExNTQifQ.eyJleHAiOjAsImlhdCI6MTY1Mjk2NzQ0NSwianRpIjoiZGEyMWYxNTMtMzIyZS00YTFkLWFiZGItZDY1N2QyZGU0ZGQxIiwiaXNzIjoiaHR0cHM6Ly84NC0yNDQtNzItOTAubmlwLmlvOjYwMDAwL2F1dGgvcmVhbG1zL3Rlc3QiLCJhdWQiOiJodHRwczovLzg0LTI0NC03Mi05MC5uaXAuaW86NjAwMDAvYXV0aC9yZWFsbXMvdGVzdCIsInR5cCI6IlJlZ2lzdHJhdGlvbkFjY2Vzc1Rva2VuIiwicmVnaXN0cmF0aW9uX2F1dGgiOiJhbm9ueW1vdXMifQ.BPEcdVdQDbu1-OGpuyPTId5GHLRjP-DIIHAxXccLxkQ",
  "content-length": "0"
}
request_body

                                
2022-05-19 13:38:07 RESPONSE
UnregisterDynamicallyRegisteredClient
HTTP response
response_status_code
204 NO_CONTENT
response_status_text
No Content
response_headers
{
  "x-xss-protection": "1; mode\u003dblock",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "referrer-policy": "no-referrer",
  "date": "Thu, 19 May 2022 13:38:07 GMT"
}
response_body

                                
2022-05-19 13:38:07 SUCCESS
UnregisterDynamicallyRegisteredClient
Client successfully unregistered
2022-05-19 13:38:45
TEST-RUNNER
Alias has now been claimed by another test
alias
keycloak
new_test_id
1QRKJGUnaXlCcJU
Test Results