Test Summary

Test Results

Expand All Collapse All
All times are UTC
2022-05-16 09:48:10 INFO
TEST-RUNNER
Test instance zPhNuGzflB9Bqsi created
baseUrl
https://www.certification.openid.net/test/a/keycloak
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code id_token",
  "server_metadata": "discovery",
  "response_mode": "default",
  "client_registration": "static_client"
}
alias
keycloak
description
Keycloak, OpenID Connect Core: Frontchannel Rp Initiated Logout Certification Profile (client_registration:static_client)
planId
17GWO5Fq3lCfF
config
{
  "alias": "keycloak",
  "description": "Keycloak, OpenID Connect Core: Frontchannel Rp Initiated Logout Certification Profile (client_registration:static_client)",
  "server": {
    "discoveryUrl": "https://84-244-72-90.nip.io:60000/auth/realms/test/.well-known/openid-configuration",
    "login_hint": "john"
  },
  "client": {
    "client_id": "client1-oidcc-frontchannel-rp-initiated-logout",
    "client_secret": "45qK5X42ZWolOe0KJTCCDdu5FxfOymYW"
  }
}
testName
oidcc-frontchannel-rp-initiated-logout
2022-05-16 09:48:10 SUCCESS
CreateRedirectUri
Created redirect URI
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
2022-05-16 09:48:10
GetDynamicServerConfiguration
HTTP request
request_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/.well-known/openid-configuration
request_method
GET
request_headers
{
  "accept": "text/plain, application/json, application/*+json, */*",
  "content-length": "0"
}
request_body

                                
2022-05-16 09:48:11 RESPONSE
GetDynamicServerConfiguration
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "cache-control": "no-cache, must-revalidate, no-transform, no-store",
  "x-xss-protection": "1; mode\u003dblock",
  "x-frame-options": "SAMEORIGIN",
  "referrer-policy": "no-referrer",
  "date": "Mon, 16 May 2022 09:48:11 GMT",
  "connection": "keep-alive",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "content-type": "application/json",
  "content-length": "6208"
}
response_body
{"issuer":"https://84-244-72-90.nip.io:60000/auth/realms/test","authorization_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth","token_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token","introspection_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token/introspect","userinfo_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/userinfo","end_session_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/logout","frontchannel_logout_session_supported":true,"frontchannel_logout_supported":true,"jwks_uri":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/certs","check_session_iframe":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/login-status-iframe.html","grant_types_supported":["authorization_code","implicit","refresh_token","password","client_credentials","urn:ietf:params:oauth:grant-type:device_code","urn:openid:params:grant-type:ciba"],"acr_values_supported":["0","1"],"response_types_supported":["code","none","id_token","token","id_token token","code id_token","code token","code id_token token"],"subject_types_supported":["public","pairwise"],"id_token_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512"],"id_token_encryption_alg_values_supported":["RSA-OAEP","RSA-OAEP-256","RSA1_5"],"id_token_encryption_enc_values_supported":["A256GCM","A192GCM","A128GCM","A128CBC-HS256","A192CBC-HS384","A256CBC-HS512"],"userinfo_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512","none"],"userinfo_encryption_alg_values_supported":["RSA-OAEP","RSA-OAEP-256","RSA1_5"],"userinfo_encryption_enc_values_supported":["A256GCM","A192GCM","A128GCM","A128CBC-HS256","A192CBC-HS384","A256CBC-HS512"],"request_object_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512","none"],"request_object_encryption_alg_values_supported":["RSA-OAEP","RSA-OAEP-256","RSA1_5"],"request_object_encryption_enc_values_supported":["A256GCM","A192GCM","A128GCM","A128CBC-HS256","A192CBC-HS384","A256CBC-HS512"],"response_modes_supported":["query","fragment","form_post","query.jwt","fragment.jwt","form_post.jwt","jwt"],"registration_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect","token_endpoint_auth_methods_supported":["private_key_jwt","client_secret_basic","client_secret_post","tls_client_auth","client_secret_jwt"],"token_endpoint_auth_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512"],"introspection_endpoint_auth_methods_supported":["private_key_jwt","client_secret_basic","client_secret_post","tls_client_auth","client_secret_jwt"],"introspection_endpoint_auth_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512"],"authorization_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512"],"authorization_encryption_alg_values_supported":["RSA-OAEP","RSA-OAEP-256","RSA1_5"],"authorization_encryption_enc_values_supported":["A256GCM","A192GCM","A128GCM","A128CBC-HS256","A192CBC-HS384","A256CBC-HS512"],"claims_supported":["aud","sub","iss","auth_time","name","given_name","family_name","preferred_username","email","acr"],"claim_types_supported":["normal"],"claims_parameter_supported":true,"scopes_supported":["openid","consents","name_claims","microprofile-jwt","consent:1","name_claims_for_implicit","roles","address","phone","web-origins","profile","offline_access","resources","email"],"request_parameter_supported":true,"request_uri_parameter_supported":true,"require_request_uri_registration":true,"code_challenge_methods_supported":["plain","S256"],"tls_client_certificate_bound_access_tokens":true,"revocation_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/revoke","revocation_endpoint_auth_methods_supported":["private_key_jwt","client_secret_basic","client_secret_post","tls_client_auth","client_secret_jwt"],"revocation_endpoint_auth_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512"],"backchannel_logout_supported":true,"backchannel_logout_session_supported":true,"device_authorization_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth/device","backchannel_token_delivery_modes_supported":["poll","ping"],"backchannel_authentication_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/ciba/auth","backchannel_authentication_request_signing_alg_values_supported":["PS384","ES384","RS384","ES256","RS256","ES512","PS256","PS512","RS512"],"require_pushed_authorization_requests":false,"pushed_authorization_request_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/par/request","mtls_endpoint_aliases":{"token_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token","revocation_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/revoke","introspection_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token/introspect","device_authorization_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth/device","registration_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect","userinfo_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/userinfo","pushed_authorization_request_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/par/request","backchannel_authentication_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/ciba/auth"}}
2022-05-16 09:48:11 SUCCESS
GetDynamicServerConfiguration
Successfully parsed server configuration
issuer
https://84-244-72-90.nip.io:60000/auth/realms/test
authorization_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth
token_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token
introspection_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token/introspect
userinfo_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/userinfo
end_session_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/logout
frontchannel_logout_session_supported
true
frontchannel_logout_supported
true
jwks_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/certs
check_session_iframe
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/login-status-iframe.html
grant_types_supported
[
  "authorization_code",
  "implicit",
  "refresh_token",
  "password",
  "client_credentials",
  "urn:ietf:params:oauth:grant-type:device_code",
  "urn:openid:params:grant-type:ciba"
]
acr_values_supported
[
  "0",
  "1"
]
response_types_supported
[
  "code",
  "none",
  "id_token",
  "token",
  "id_token token",
  "code id_token",
  "code token",
  "code id_token token"
]
subject_types_supported
[
  "public",
  "pairwise"
]
id_token_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512"
]
id_token_encryption_alg_values_supported
[
  "RSA-OAEP",
  "RSA-OAEP-256",
  "RSA1_5"
]
id_token_encryption_enc_values_supported
[
  "A256GCM",
  "A192GCM",
  "A128GCM",
  "A128CBC-HS256",
  "A192CBC-HS384",
  "A256CBC-HS512"
]
userinfo_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512",
  "none"
]
userinfo_encryption_alg_values_supported
[
  "RSA-OAEP",
  "RSA-OAEP-256",
  "RSA1_5"
]
userinfo_encryption_enc_values_supported
[
  "A256GCM",
  "A192GCM",
  "A128GCM",
  "A128CBC-HS256",
  "A192CBC-HS384",
  "A256CBC-HS512"
]
request_object_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512",
  "none"
]
request_object_encryption_alg_values_supported
[
  "RSA-OAEP",
  "RSA-OAEP-256",
  "RSA1_5"
]
request_object_encryption_enc_values_supported
[
  "A256GCM",
  "A192GCM",
  "A128GCM",
  "A128CBC-HS256",
  "A192CBC-HS384",
  "A256CBC-HS512"
]
response_modes_supported
[
  "query",
  "fragment",
  "form_post",
  "query.jwt",
  "fragment.jwt",
  "form_post.jwt",
  "jwt"
]
registration_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect
token_endpoint_auth_methods_supported
[
  "private_key_jwt",
  "client_secret_basic",
  "client_secret_post",
  "tls_client_auth",
  "client_secret_jwt"
]
token_endpoint_auth_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512"
]
introspection_endpoint_auth_methods_supported
[
  "private_key_jwt",
  "client_secret_basic",
  "client_secret_post",
  "tls_client_auth",
  "client_secret_jwt"
]
introspection_endpoint_auth_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512"
]
authorization_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512"
]
authorization_encryption_alg_values_supported
[
  "RSA-OAEP",
  "RSA-OAEP-256",
  "RSA1_5"
]
authorization_encryption_enc_values_supported
[
  "A256GCM",
  "A192GCM",
  "A128GCM",
  "A128CBC-HS256",
  "A192CBC-HS384",
  "A256CBC-HS512"
]
claims_supported
[
  "aud",
  "sub",
  "iss",
  "auth_time",
  "name",
  "given_name",
  "family_name",
  "preferred_username",
  "email",
  "acr"
]
claim_types_supported
[
  "normal"
]
claims_parameter_supported
true
scopes_supported
[
  "openid",
  "consents",
  "name_claims",
  "microprofile-jwt",
  "consent:1",
  "name_claims_for_implicit",
  "roles",
  "address",
  "phone",
  "web-origins",
  "profile",
  "offline_access",
  "resources",
  "email"
]
request_parameter_supported
true
request_uri_parameter_supported
true
require_request_uri_registration
true
code_challenge_methods_supported
[
  "plain",
  "S256"
]
tls_client_certificate_bound_access_tokens
true
revocation_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/revoke
revocation_endpoint_auth_methods_supported
[
  "private_key_jwt",
  "client_secret_basic",
  "client_secret_post",
  "tls_client_auth",
  "client_secret_jwt"
]
revocation_endpoint_auth_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512"
]
backchannel_logout_supported
true
backchannel_logout_session_supported
true
device_authorization_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth/device
backchannel_token_delivery_modes_supported
[
  "poll",
  "ping"
]
backchannel_authentication_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/ciba/auth
backchannel_authentication_request_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "ES256",
  "RS256",
  "ES512",
  "PS256",
  "PS512",
  "RS512"
]
require_pushed_authorization_requests
false
pushed_authorization_request_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/par/request
mtls_endpoint_aliases
{
  "token_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token",
  "revocation_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/revoke",
  "introspection_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token/introspect",
  "device_authorization_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth/device",
  "registration_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect",
  "userinfo_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/userinfo",
  "pushed_authorization_request_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/par/request",
  "backchannel_authentication_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/ciba/auth"
}
2022-05-16 09:48:11 SUCCESS
CheckServerConfiguration
Found required server configuration keys
required
[
  "authorization_endpoint",
  "token_endpoint",
  "issuer"
]
2022-05-16 09:48:11 SUCCESS
ExtractTLSTestValuesFromServerConfiguration
Extracted TLS information from authorization server configuration
registration_endpoint
{
  "testHost": "84-244-72-90.nip.io",
  "testPort": 60000
}
authorization_endpoint
{
  "testHost": "84-244-72-90.nip.io",
  "testPort": 60000
}
token_endpoint
{
  "testHost": "84-244-72-90.nip.io",
  "testPort": 60000
}
userinfo_endpoint
{
  "testHost": "84-244-72-90.nip.io",
  "testPort": 60000
}
2022-05-16 09:48:11
FetchServerKeys
Fetching server key
jwks_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/certs
2022-05-16 09:48:11
FetchServerKeys
HTTP request
request_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/certs
request_method
GET
request_headers
{
  "accept": "text/plain, application/json, application/*+json, */*",
  "content-length": "0"
}
request_body

                                
2022-05-16 09:48:12 RESPONSE
FetchServerKeys
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "cache-control": "no-cache",
  "x-xss-protection": "1; mode\u003dblock",
  "x-frame-options": "SAMEORIGIN",
  "referrer-policy": "no-referrer",
  "date": "Mon, 16 May 2022 09:48:11 GMT",
  "connection": "keep-alive",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "content-type": "application/json",
  "content-length": "4559"
}
response_body
{"keys":[{"kid":"nVJXuV18rIhJQK_ezukCg6B6ihqd_ysVRpNmmGNIJgg","kty":"RSA","alg":"PS256","use":"enc","n":"gJeVMx_ucf4OkwPjfo3QqRVGJad4MoGX0epHfzh_9JWhetahQKvU2R8I7YnWMRmdni2ZuWVdnRDdrU83FN-RGKRq8bkV59-U9UM25mrFD-27qczX_SvipPeSJfCC8BVg6IVaG0xYVJcAJyqCczhV0p36Tv3ehLhnZA_JZYgGcQznEXRawqQMQ1hKLC-cbQdXbcuzlKB-jGKUvNOPrRWkFYbcbbPMqeqv60TtQL--9X0rFxySfGbUVTDENmsJUaS5vs-cHEyst-UX6Y-lmCoTA0LZsOaH608POFmeaVB7ZmDdeGCHS_H4BCbQS7p_vI67i-IH8L5qrr_TZGabii1Ggw","e":"AQAB","x5c":["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"],"x5t":"nsamQNPuXTrs2Bh2mhtQ1p-Cs-M","x5t#S256":"g1XbSXBmnrd0nphVoyIfkix50Nsr0HqrJAvypgOzBq0"},{"kid":"RzJaSl5uXbIzduF-D5dOo6yLiqMOrdK3P_7vKZKsqrY","kty":"RSA","alg":"RS256","use":"sig","n":"hc3JDwS0TS-SX74-_FJKP9bq5LuuyrFZkxLfX6NVyyR9iEO-_WY4bnc_f9DVWEn1ygYY-K0WlVBvaPpgoEKKPxNqJ0NrgAj_xjOr-9Pqw5q8I3ziIAPTmxH0NQkVUTsCR5p62aXUEfpmTeNtqMOS9GTHZPjAuHimiEgdEY-boolGJbUwAfzpd42vDjnz2kWct80D74iUHANxLz8jJ1reyUwH1QyLF-ouHb5Kh4yHfhVd1iP0oQwPEtB3IS25NQsRyrOHJpFvooRhmzWdyceG-c2Ui670zFv3gUAwoZclkVlS9ykPvVqZyYNQ6Sl-TUNUOWppIG-VSQW15mtfWmiskw","e":"AQAB","x5c":["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"],"x5t":"a9EHlEUdeGHxtup6eQp74LCZWyk","x5t#S256":"XM6CJJcSE1YeZJ5rtNWzbhZe6FhjvVmYzxyUhflmx80"},{"kid":"3j2X9LXvxBl15lAOntwKWvoS13ZFGSskSq4qW2rv_us","kty":"RSA","alg":"PS256","use":"sig","n":"jF-GpA0T_8cZjweY69yY5oKwOwWXKIXCL4mG8PcFcdeuihPGTU3w6XV-dTQPjfZpysISmSpZKm1aEMwTh2yXIl5Oel95rNzaj-7rMI4nrZn9ruHjh_cToHxyWDI8bs_V-MSBwqbbFGltdXWUa3LFsrwRt0XKNMPzhQLciuLO0iBumF4Yc1VqmmS9buwpCqPc2qNggMp7pteZe5Lbkc-0X6zbBqkgo8wkbq31TN7cwDWxmVttxw7Mc4eUSVuROqiLgSKRCoWGYf9vIsiiXov8Q3mLaXyiQvh9gzDyWwzzAxbmVQhBxF-PVOdgGurYU0HkNjw3cr3OZkvKzbqccdYsiQ","e":"AQAB","x5c":["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"],"x5t":"TvB49qBdfskwNG8LWUYOE3z29fE","x5t#S256":"kTzfVukTOuEwsJ7ICp69-kbcipMUZ31yTNOPdQifuMk"},{"kid":"6p6LMG-CvC-c6SvkKKOP8W_Z4fTBS9Q461P9zxi2n6o","kty":"EC","alg":"ES256","use":"sig","crv":"P-256","x":"wy_EGIii551Ei-nodYzkg-S_y3ecdgTATnAwUxinhhQ","y":"LCbIl7PUYc2DtBJGRMrOt80rk3PJbJ1onUwK_82yHUw"}]}
2022-05-16 09:48:12
FetchServerKeys
Found JWK set string
jwk_string
{"keys":[{"kid":"nVJXuV18rIhJQK_ezukCg6B6ihqd_ysVRpNmmGNIJgg","kty":"RSA","alg":"PS256","use":"enc","n":"gJeVMx_ucf4OkwPjfo3QqRVGJad4MoGX0epHfzh_9JWhetahQKvU2R8I7YnWMRmdni2ZuWVdnRDdrU83FN-RGKRq8bkV59-U9UM25mrFD-27qczX_SvipPeSJfCC8BVg6IVaG0xYVJcAJyqCczhV0p36Tv3ehLhnZA_JZYgGcQznEXRawqQMQ1hKLC-cbQdXbcuzlKB-jGKUvNOPrRWkFYbcbbPMqeqv60TtQL--9X0rFxySfGbUVTDENmsJUaS5vs-cHEyst-UX6Y-lmCoTA0LZsOaH608POFmeaVB7ZmDdeGCHS_H4BCbQS7p_vI67i-IH8L5qrr_TZGabii1Ggw","e":"AQAB","x5c":["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"],"x5t":"nsamQNPuXTrs2Bh2mhtQ1p-Cs-M","x5t#S256":"g1XbSXBmnrd0nphVoyIfkix50Nsr0HqrJAvypgOzBq0"},{"kid":"RzJaSl5uXbIzduF-D5dOo6yLiqMOrdK3P_7vKZKsqrY","kty":"RSA","alg":"RS256","use":"sig","n":"hc3JDwS0TS-SX74-_FJKP9bq5LuuyrFZkxLfX6NVyyR9iEO-_WY4bnc_f9DVWEn1ygYY-K0WlVBvaPpgoEKKPxNqJ0NrgAj_xjOr-9Pqw5q8I3ziIAPTmxH0NQkVUTsCR5p62aXUEfpmTeNtqMOS9GTHZPjAuHimiEgdEY-boolGJbUwAfzpd42vDjnz2kWct80D74iUHANxLz8jJ1reyUwH1QyLF-ouHb5Kh4yHfhVd1iP0oQwPEtB3IS25NQsRyrOHJpFvooRhmzWdyceG-c2Ui670zFv3gUAwoZclkVlS9ykPvVqZyYNQ6Sl-TUNUOWppIG-VSQW15mtfWmiskw","e":"AQAB","x5c":["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"],"x5t":"a9EHlEUdeGHxtup6eQp74LCZWyk","x5t#S256":"XM6CJJcSE1YeZJ5rtNWzbhZe6FhjvVmYzxyUhflmx80"},{"kid":"3j2X9LXvxBl15lAOntwKWvoS13ZFGSskSq4qW2rv_us","kty":"RSA","alg":"PS256","use":"sig","n":"jF-GpA0T_8cZjweY69yY5oKwOwWXKIXCL4mG8PcFcdeuihPGTU3w6XV-dTQPjfZpysISmSpZKm1aEMwTh2yXIl5Oel95rNzaj-7rMI4nrZn9ruHjh_cToHxyWDI8bs_V-MSBwqbbFGltdXWUa3LFsrwRt0XKNMPzhQLciuLO0iBumF4Yc1VqmmS9buwpCqPc2qNggMp7pteZe5Lbkc-0X6zbBqkgo8wkbq31TN7cwDWxmVttxw7Mc4eUSVuROqiLgSKRCoWGYf9vIsiiXov8Q3mLaXyiQvh9gzDyWwzzAxbmVQhBxF-PVOdgGurYU0HkNjw3cr3OZkvKzbqccdYsiQ","e":"AQAB","x5c":["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"],"x5t":"TvB49qBdfskwNG8LWUYOE3z29fE","x5t#S256":"kTzfVukTOuEwsJ7ICp69-kbcipMUZ31yTNOPdQifuMk"},{"kid":"6p6LMG-CvC-c6SvkKKOP8W_Z4fTBS9Q461P9zxi2n6o","kty":"EC","alg":"ES256","use":"sig","crv":"P-256","x":"wy_EGIii551Ei-nodYzkg-S_y3ecdgTATnAwUxinhhQ","y":"LCbIl7PUYc2DtBJGRMrOt80rk3PJbJ1onUwK_82yHUw"}]}
2022-05-16 09:48:12 SUCCESS
FetchServerKeys
Found server JWK set
server_jwks
{
  "keys": [
    {
      "kid": "nVJXuV18rIhJQK_ezukCg6B6ihqd_ysVRpNmmGNIJgg",
      "kty": "RSA",
      "alg": "PS256",
      "use": "enc",
      "n": "gJeVMx_ucf4OkwPjfo3QqRVGJad4MoGX0epHfzh_9JWhetahQKvU2R8I7YnWMRmdni2ZuWVdnRDdrU83FN-RGKRq8bkV59-U9UM25mrFD-27qczX_SvipPeSJfCC8BVg6IVaG0xYVJcAJyqCczhV0p36Tv3ehLhnZA_JZYgGcQznEXRawqQMQ1hKLC-cbQdXbcuzlKB-jGKUvNOPrRWkFYbcbbPMqeqv60TtQL--9X0rFxySfGbUVTDENmsJUaS5vs-cHEyst-UX6Y-lmCoTA0LZsOaH608POFmeaVB7ZmDdeGCHS_H4BCbQS7p_vI67i-IH8L5qrr_TZGabii1Ggw",
      "e": "AQAB",
      "x5c": [
        "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\u003d\u003d"
      ],
      "x5t": "nsamQNPuXTrs2Bh2mhtQ1p-Cs-M",
      "x5t#S256": "g1XbSXBmnrd0nphVoyIfkix50Nsr0HqrJAvypgOzBq0"
    },
    {
      "kid": "RzJaSl5uXbIzduF-D5dOo6yLiqMOrdK3P_7vKZKsqrY",
      "kty": "RSA",
      "alg": "RS256",
      "use": "sig",
      "n": "hc3JDwS0TS-SX74-_FJKP9bq5LuuyrFZkxLfX6NVyyR9iEO-_WY4bnc_f9DVWEn1ygYY-K0WlVBvaPpgoEKKPxNqJ0NrgAj_xjOr-9Pqw5q8I3ziIAPTmxH0NQkVUTsCR5p62aXUEfpmTeNtqMOS9GTHZPjAuHimiEgdEY-boolGJbUwAfzpd42vDjnz2kWct80D74iUHANxLz8jJ1reyUwH1QyLF-ouHb5Kh4yHfhVd1iP0oQwPEtB3IS25NQsRyrOHJpFvooRhmzWdyceG-c2Ui670zFv3gUAwoZclkVlS9ykPvVqZyYNQ6Sl-TUNUOWppIG-VSQW15mtfWmiskw",
      "e": "AQAB",
      "x5c": [
        "MIIClzCCAX8CBgGAzCPu7jANBgkqhkiG9w0BAQsFADAPMQ0wCwYDVQQDDAR0ZXN0MB4XDTIyMDUxNjA5MTA0OFoXDTMyMDUxNjA5MTIyOFowDzENMAsGA1UEAwwEdGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIXNyQ8EtE0vkl++PvxSSj/W6uS7rsqxWZMS31+jVcskfYhDvv1mOG53P3/Q1VhJ9coGGPitFpVQb2j6YKBCij8TaidDa4AI/8Yzq/vT6sOavCN84iAD05sR9DUJFVE7Akeaetml1BH6Zk3jbajDkvRkx2T4wLh4pohIHRGPm6KJRiW1MAH86XeNrw4589pFnLfNA++IlBwDcS8/Iyda3slMB9UMixfqLh2+SoeMh34VXdYj9KEMDxLQdyEtuTULEcqzhyaRb6KEYZs1ncnHhvnNlIuu9Mxb94FAMKGXJZFZUvcpD71amcmDUOkpfk1DVDlqaSBvlUkFteZrX1porJMCAwEAATANBgkqhkiG9w0BAQsFAAOCAQEABc4byb50M1IWWJgsXem0mAQAT8Zn/Q8qbVpTx2n5+uegtnetUTF4bvhlgtBrWVQSt1tPAjPo5A3uvfiSqaWmu66XzhWMXsPyFfchRdpIUZsnZCxv0upO232DWsbIURvK7oyZWIYerU5luUyUCZ0nVYPdKsfqr3bSnFfM8nSV8/mA1HWKNXUXpkJCwvqY0xUKkuvmxholp0c9GXjZ8yoz595DsaAM56CkZ1jN1wlCkkoOb8l7pFBPSjUgYmHWb4TDdgKr1XVUChP1yfWCk8ypYdBwlekLYLmBQneH/Y/sVT+pQZqtkb22ptGOy3wu4q7TJ7KW5JI/GZCT6izsRvmJKQ\u003d\u003d"
      ],
      "x5t": "a9EHlEUdeGHxtup6eQp74LCZWyk",
      "x5t#S256": "XM6CJJcSE1YeZJ5rtNWzbhZe6FhjvVmYzxyUhflmx80"
    },
    {
      "kid": "3j2X9LXvxBl15lAOntwKWvoS13ZFGSskSq4qW2rv_us",
      "kty": "RSA",
      "alg": "PS256",
      "use": "sig",
      "n": "jF-GpA0T_8cZjweY69yY5oKwOwWXKIXCL4mG8PcFcdeuihPGTU3w6XV-dTQPjfZpysISmSpZKm1aEMwTh2yXIl5Oel95rNzaj-7rMI4nrZn9ruHjh_cToHxyWDI8bs_V-MSBwqbbFGltdXWUa3LFsrwRt0XKNMPzhQLciuLO0iBumF4Yc1VqmmS9buwpCqPc2qNggMp7pteZe5Lbkc-0X6zbBqkgo8wkbq31TN7cwDWxmVttxw7Mc4eUSVuROqiLgSKRCoWGYf9vIsiiXov8Q3mLaXyiQvh9gzDyWwzzAxbmVQhBxF-PVOdgGurYU0HkNjw3cr3OZkvKzbqccdYsiQ",
      "e": "AQAB",
      "x5c": [
        "MIIClzCCAX8CBgGAzCPxHDANBgkqhkiG9w0BAQsFADAPMQ0wCwYDVQQDDAR0ZXN0MB4XDTIyMDUxNjA5MTA0OVoXDTMyMDUxNjA5MTIyOVowDzENMAsGA1UEAwwEdGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIxfhqQNE//HGY8HmOvcmOaCsDsFlyiFwi+JhvD3BXHXrooTxk1N8Ol1fnU0D432acrCEpkqWSptWhDME4dslyJeTnpfeazc2o/u6zCOJ62Z/a7h44f3E6B8clgyPG7P1fjEgcKm2xRpbXV1lGtyxbK8EbdFyjTD84UC3IriztIgbpheGHNVappkvW7sKQqj3NqjYIDKe6bXmXuS25HPtF+s2wapIKPMJG6t9Uze3MA1sZlbbccOzHOHlElbkTqoi4EikQqFhmH/byLIol6L/EN5i2l8okL4fYMw8lsM8wMW5lUIQcRfj1TnYBrq2FNB5DY8N3K9zmZLys26nHHWLIkCAwEAATANBgkqhkiG9w0BAQsFAAOCAQEAR/S3MzoIbclxpeaKYQ40BVKdzvIGPH6okrW4IUUL/DSs4hiwf2yQ8r0oSvbXuEg23NKMYlH0YeLmMrFhoq0TnA98OP346YX7ladE5US+lXQC1At3B6r7hUY7YMcz6Fw6AnqQK8O3Qw8TDZRfd+TJzM9jBXZxKP/gj8+70uH7gAP+gMnt2wwgbG/yl433/xGByrDz0lntisQcn7YbvzFnpvSqcWHAmxNnNM+H817FNvfQPg4GU8PP2Pblzk24i6qT0v3emMg5eAk0bFef5RevPWFW53ti0fWXuP5CHQZNMeFB+6ZqbWDaX43V3AC8CGnQL0zzNXXFzGRfFeoBJLAzzA\u003d\u003d"
      ],
      "x5t": "TvB49qBdfskwNG8LWUYOE3z29fE",
      "x5t#S256": "kTzfVukTOuEwsJ7ICp69-kbcipMUZ31yTNOPdQifuMk"
    },
    {
      "kid": "6p6LMG-CvC-c6SvkKKOP8W_Z4fTBS9Q461P9zxi2n6o",
      "kty": "EC",
      "alg": "ES256",
      "use": "sig",
      "crv": "P-256",
      "x": "wy_EGIii551Ei-nodYzkg-S_y3ecdgTATnAwUxinhhQ",
      "y": "LCbIl7PUYc2DtBJGRMrOt80rk3PJbJ1onUwK_82yHUw"
    }
  ]
}
2022-05-16 09:48:12 SUCCESS
CheckServerKeysIsValid
Server JWKs is valid
server_jwks
{
  "keys": [
    {
      "kid": "nVJXuV18rIhJQK_ezukCg6B6ihqd_ysVRpNmmGNIJgg",
      "kty": "RSA",
      "alg": "PS256",
      "use": "enc",
      "n": "gJeVMx_ucf4OkwPjfo3QqRVGJad4MoGX0epHfzh_9JWhetahQKvU2R8I7YnWMRmdni2ZuWVdnRDdrU83FN-RGKRq8bkV59-U9UM25mrFD-27qczX_SvipPeSJfCC8BVg6IVaG0xYVJcAJyqCczhV0p36Tv3ehLhnZA_JZYgGcQznEXRawqQMQ1hKLC-cbQdXbcuzlKB-jGKUvNOPrRWkFYbcbbPMqeqv60TtQL--9X0rFxySfGbUVTDENmsJUaS5vs-cHEyst-UX6Y-lmCoTA0LZsOaH608POFmeaVB7ZmDdeGCHS_H4BCbQS7p_vI67i-IH8L5qrr_TZGabii1Ggw",
      "e": "AQAB",
      "x5c": [
        "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\u003d\u003d"
      ],
      "x5t": "nsamQNPuXTrs2Bh2mhtQ1p-Cs-M",
      "x5t#S256": "g1XbSXBmnrd0nphVoyIfkix50Nsr0HqrJAvypgOzBq0"
    },
    {
      "kid": "RzJaSl5uXbIzduF-D5dOo6yLiqMOrdK3P_7vKZKsqrY",
      "kty": "RSA",
      "alg": "RS256",
      "use": "sig",
      "n": "hc3JDwS0TS-SX74-_FJKP9bq5LuuyrFZkxLfX6NVyyR9iEO-_WY4bnc_f9DVWEn1ygYY-K0WlVBvaPpgoEKKPxNqJ0NrgAj_xjOr-9Pqw5q8I3ziIAPTmxH0NQkVUTsCR5p62aXUEfpmTeNtqMOS9GTHZPjAuHimiEgdEY-boolGJbUwAfzpd42vDjnz2kWct80D74iUHANxLz8jJ1reyUwH1QyLF-ouHb5Kh4yHfhVd1iP0oQwPEtB3IS25NQsRyrOHJpFvooRhmzWdyceG-c2Ui670zFv3gUAwoZclkVlS9ykPvVqZyYNQ6Sl-TUNUOWppIG-VSQW15mtfWmiskw",
      "e": "AQAB",
      "x5c": [
        "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\u003d\u003d"
      ],
      "x5t": "a9EHlEUdeGHxtup6eQp74LCZWyk",
      "x5t#S256": "XM6CJJcSE1YeZJ5rtNWzbhZe6FhjvVmYzxyUhflmx80"
    },
    {
      "kid": "3j2X9LXvxBl15lAOntwKWvoS13ZFGSskSq4qW2rv_us",
      "kty": "RSA",
      "alg": "PS256",
      "use": "sig",
      "n": "jF-GpA0T_8cZjweY69yY5oKwOwWXKIXCL4mG8PcFcdeuihPGTU3w6XV-dTQPjfZpysISmSpZKm1aEMwTh2yXIl5Oel95rNzaj-7rMI4nrZn9ruHjh_cToHxyWDI8bs_V-MSBwqbbFGltdXWUa3LFsrwRt0XKNMPzhQLciuLO0iBumF4Yc1VqmmS9buwpCqPc2qNggMp7pteZe5Lbkc-0X6zbBqkgo8wkbq31TN7cwDWxmVttxw7Mc4eUSVuROqiLgSKRCoWGYf9vIsiiXov8Q3mLaXyiQvh9gzDyWwzzAxbmVQhBxF-PVOdgGurYU0HkNjw3cr3OZkvKzbqccdYsiQ",
      "e": "AQAB",
      "x5c": [
        "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\u003d\u003d"
      ],
      "x5t": "TvB49qBdfskwNG8LWUYOE3z29fE",
      "x5t#S256": "kTzfVukTOuEwsJ7ICp69-kbcipMUZ31yTNOPdQifuMk"
    },
    {
      "kid": "6p6LMG-CvC-c6SvkKKOP8W_Z4fTBS9Q461P9zxi2n6o",
      "kty": "EC",
      "alg": "ES256",
      "use": "sig",
      "crv": "P-256",
      "x": "wy_EGIii551Ei-nodYzkg-S_y3ecdgTATnAwUxinhhQ",
      "y": "LCbIl7PUYc2DtBJGRMrOt80rk3PJbJ1onUwK_82yHUw"
    }
  ]
}
2022-05-16 09:48:12 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2022-05-16 09:48:12 SUCCESS
CheckForKeyIdInServerJWKs
All keys contain kids
2022-05-16 09:48:12 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2022-05-16 09:48:12 SUCCESS
EnsureServerJwksDoesNotContainPrivateOrSymmetricKeys
Jwks does not contain any private or symmetric keys
2022-05-16 09:48:12 SUCCESS
CreateFrontchannelLogoutUri
Created frontchannel_logout_uri URI
frontchannel_logout_uri
https://www.certification.openid.net/test/a/keycloak/frontchannel_logout
2022-05-16 09:48:12 SUCCESS
CreatePostLogoutRedirectUri
Created post_logout_redirect_uri URI
post_logout_redirect_uri
https://www.certification.openid.net/test/a/keycloak/post_logout_redirect
2022-05-16 09:48:12 SUCCESS
GetStaticClientConfiguration
Found a static client object
client_id
client1-oidcc-frontchannel-rp-initiated-logout
client_secret
45qK5X42ZWolOe0KJTCCDdu5FxfOymYW
2022-05-16 09:48:12 INFO
ValidateClientJWKsPrivatePart
Skipped evaluation due to missing required element: client jwks
path
jwks
mapped
object
client
2022-05-16 09:48:12 INFO
ExtractJWKsFromStaticClientConfiguration
Skipped evaluation due to missing required element: client jwks
path
jwks
mapped
object
client
2022-05-16 09:48:12 INFO
CheckDistinctKeyIdValueInClientJWKs
Skipped evaluation due to missing required element: client jwks
path
jwks
mapped
object
client
2022-05-16 09:48:12
SetScopeInClientConfigurationToOpenId
Set scope in client configuration to "openid"
scope
openid
2022-05-16 09:48:12 SUCCESS
EnsureServerConfigurationSupportsClientSecretBasic
Contents of 'token_endpoint_auth_methods_supported' in discovery document matches expectations.
actual
[
  "private_key_jwt",
  "client_secret_basic",
  "client_secret_post",
  "tls_client_auth",
  "client_secret_jwt"
]
expected
[
  "client_secret_basic"
]
minimum_matches_required
1
2022-05-16 09:48:12 SUCCESS
SetProtectedResourceUrlToUserInfoEndpoint
userinfo_endpoint will be used to test access token. The user info is not a mandatory to implement feature in the OpenID Connect specification, but is mandatory for certification.
protected_resource_url
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/userinfo
2022-05-16 09:48:12
oidcc-frontchannel-rp-initiated-logout
Setup Done
Make request to authorization endpoint
2022-05-16 09:48:12 SUCCESS
CreateAuthorizationEndpointRequestFromClientInformation
Created authorization endpoint request
client_id
client1-oidcc-frontchannel-rp-initiated-logout
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
scope
openid
2022-05-16 09:48:12
CreateRandomStateValue
Created state value
requested_state_length
128
state
bQP89Kbz6nWsIONmtvmqyICkg7GrILebhEnva3EJikPvx25NZ5QvWf89RtTeTn0steoc0oWWrpbz6qvVXZWwGGgeRkTyDDGWKh1O5xHeKxX6O751TPDcAQtzyG1v5jLW
2022-05-16 09:48:12 SUCCESS
AddStateToAuthorizationEndpointRequest
Added state parameter to request
client_id
client1-oidcc-frontchannel-rp-initiated-logout
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
scope
openid
state
bQP89Kbz6nWsIONmtvmqyICkg7GrILebhEnva3EJikPvx25NZ5QvWf89RtTeTn0steoc0oWWrpbz6qvVXZWwGGgeRkTyDDGWKh1O5xHeKxX6O751TPDcAQtzyG1v5jLW
2022-05-16 09:48:12
CreateRandomNonceValue
Created nonce value
requested_nonce_length
10
nonce
Rz7ou6imSD
2022-05-16 09:48:12 SUCCESS
AddNonceToAuthorizationEndpointRequest
Added nonce parameter to request
client_id
client1-oidcc-frontchannel-rp-initiated-logout
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
scope
openid
state
bQP89Kbz6nWsIONmtvmqyICkg7GrILebhEnva3EJikPvx25NZ5QvWf89RtTeTn0steoc0oWWrpbz6qvVXZWwGGgeRkTyDDGWKh1O5xHeKxX6O751TPDcAQtzyG1v5jLW
nonce
Rz7ou6imSD
2022-05-16 09:48:12 SUCCESS
SetAuthorizationEndpointRequestResponseTypeFromEnvironment
Added response_type parameter to request
client_id
client1-oidcc-frontchannel-rp-initiated-logout
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
scope
openid
state
bQP89Kbz6nWsIONmtvmqyICkg7GrILebhEnva3EJikPvx25NZ5QvWf89RtTeTn0steoc0oWWrpbz6qvVXZWwGGgeRkTyDDGWKh1O5xHeKxX6O751TPDcAQtzyG1v5jLW
nonce
Rz7ou6imSD
response_type
code id_token
2022-05-16 09:48:12 SUCCESS
BuildPlainRedirectToAuthorizationEndpoint
Sending to authorization endpoint
auth_request
{
  "client_id": "client1-oidcc-frontchannel-rp-initiated-logout",
  "redirect_uri": "https://www.certification.openid.net/test/a/keycloak/callback",
  "scope": "openid",
  "state": "bQP89Kbz6nWsIONmtvmqyICkg7GrILebhEnva3EJikPvx25NZ5QvWf89RtTeTn0steoc0oWWrpbz6qvVXZWwGGgeRkTyDDGWKh1O5xHeKxX6O751TPDcAQtzyG1v5jLW",
  "nonce": "Rz7ou6imSD",
  "response_type": "code id_token"
}
redirect_to_authorization_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth?client_id=client1-oidcc-frontchannel-rp-initiated-logout&redirect_uri=https://www.certification.openid.net/test/a/keycloak/callback&scope=openid&state=bQP89Kbz6nWsIONmtvmqyICkg7GrILebhEnva3EJikPvx25NZ5QvWf89RtTeTn0steoc0oWWrpbz6qvVXZWwGGgeRkTyDDGWKh1O5xHeKxX6O751TPDcAQtzyG1v5jLW&nonce=Rz7ou6imSD&response_type=code%20id_token
2022-05-16 09:48:12 REDIRECT
oidcc-frontchannel-rp-initiated-logout
Redirecting to authorization endpoint
redirect_to
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth?client_id=client1-oidcc-frontchannel-rp-initiated-logout&redirect_uri=https://www.certification.openid.net/test/a/keycloak/callback&scope=openid&state=bQP89Kbz6nWsIONmtvmqyICkg7GrILebhEnva3EJikPvx25NZ5QvWf89RtTeTn0steoc0oWWrpbz6qvVXZWwGGgeRkTyDDGWKh1O5xHeKxX6O751TPDcAQtzyG1v5jLW&nonce=Rz7ou6imSD&response_type=code%20id_token
2022-05-16 09:48:22 INCOMING
oidcc-frontchannel-rp-initiated-logout
Incoming HTTP request to /test/a/keycloak/callback
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:100.0) Gecko/20100101 Firefox/100.0",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/avif,image/webp,*/*;q\u003d0.8",
  "accept-language": "en-US,en;q\u003d0.5",
  "accept-encoding": "gzip, deflate, br",
  "cookie": "__utma\u003d201319536.747058366.1611919072.1652681365.1652688969.137; __utmz\u003d201319536.1647870296.126.44.utmcsr\u003dgoogle|utmccn\u003d(organic)|utmcmd\u003dorganic|utmctr\u003d(not%20provided); _ga\u003dGA1.2.747058366.1611919072; __utmc\u003d201319536; JSESSIONID\u003dAE250C368CF582F292B45AEE07ADD533",
  "upgrade-insecure-requests": "1",
  "sec-fetch-dest": "document",
  "sec-fetch-mode": "navigate",
  "sec-fetch-site": "none",
  "sec-fetch-user": "?1",
  "connection": "close"
}
incoming_path
/test/a/keycloak/callback
incoming_body_form_params
incoming_method
GET
incoming_tls_version
TLSv1.2
incoming_tls_cipher
ECDHE-RSA-AES128-GCM-SHA256
incoming_tls_cert
incoming_body_json
incoming_query_string_params
{}
incoming_body
2022-05-16 09:48:22 SUCCESS
CreateRandomImplicitSubmitUrl
Created random implicit submission URL
implicit_submit
{
  "path": "implicit/LvFfsymSDZPITI9xIdlR",
  "fullUrl": "https://www.certification.openid.net/test/a/keycloak/implicit/LvFfsymSDZPITI9xIdlR"
}
2022-05-16 09:48:22 OUTGOING
oidcc-frontchannel-rp-initiated-logout
Response to HTTP request to test instance zPhNuGzflB9Bqsi
outgoing
ModelAndView [view="implicitCallback"; model={implicitSubmitUrl=https://www.certification.openid.net/test/a/keycloak/implicit/LvFfsymSDZPITI9xIdlR, returnUrl=/log-detail.html?log=zPhNuGzflB9Bqsi}]
outgoing_path
callback
2022-05-16 09:48:23 INCOMING
oidcc-frontchannel-rp-initiated-logout
Incoming HTTP request to /test/a/keycloak/implicit/LvFfsymSDZPITI9xIdlR
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:100.0) Gecko/20100101 Firefox/100.0",
  "accept": "*/*",
  "accept-language": "en-US,en;q\u003d0.5",
  "accept-encoding": "gzip, deflate, br",
  "content-type": "text/plain",
  "x-requested-with": "XMLHttpRequest",
  "origin": "https://www.certification.openid.net",
  "referer": "https://www.certification.openid.net/test/a/keycloak/callback",
  "cookie": "__utma\u003d201319536.747058366.1611919072.1652681365.1652688969.137; __utmz\u003d201319536.1647870296.126.44.utmcsr\u003dgoogle|utmccn\u003d(organic)|utmcmd\u003dorganic|utmctr\u003d(not%20provided); _ga\u003dGA1.2.747058366.1611919072; __utmc\u003d201319536; JSESSIONID\u003dAE250C368CF582F292B45AEE07ADD533",
  "sec-fetch-dest": "empty",
  "sec-fetch-mode": "cors",
  "sec-fetch-site": "same-origin",
  "connection": "close",
  "content-length": "1201"
}
incoming_path
/test/a/keycloak/implicit/LvFfsymSDZPITI9xIdlR
incoming_body_form_params
incoming_method
POST
incoming_tls_version
TLSv1.2
incoming_tls_cipher
ECDHE-RSA-AES128-GCM-SHA256
incoming_tls_cert
incoming_body_json
incoming_query_string_params
{}
incoming_body
#state=bQP89Kbz6nWsIONmtvmqyICkg7GrILebhEnva3EJikPvx25NZ5QvWf89RtTeTn0steoc0oWWrpbz6qvVXZWwGGgeRkTyDDGWKh1O5xHeKxX6O751TPDcAQtzyG1v5jLW&session_state=9078abef-d10d-4fb7-9bbe-f3645388a706&code=6ae971c3-1414-4431-91ba-024d178ab5d6.9078abef-d10d-4fb7-9bbe-f3645388a706.3a469d9b-f07a-49bf-91f5-1e097b1aeb8f&id_token=eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.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.WVKdxJw1el3uNDHSJlK_o7ke8BUm0tgF1L_PATPWGUdLcE323NZZ3ESo7dcAfYNUtE-FepAfCJQbH4P54kSPoQ
2022-05-16 09:48:23 OUTGOING
oidcc-frontchannel-rp-initiated-logout
Response to HTTP request to test instance zPhNuGzflB9Bqsi
outgoing_status_code
204
outgoing_headers
{}
outgoing_body

                                
outgoing_path
implicit/LvFfsymSDZPITI9xIdlR
2022-05-16 09:48:23
ExtractImplicitHashToCallbackResponse
Extracted response from URL fragment
parameters
[
  {
    "name": "state",
    "value": "bQP89Kbz6nWsIONmtvmqyICkg7GrILebhEnva3EJikPvx25NZ5QvWf89RtTeTn0steoc0oWWrpbz6qvVXZWwGGgeRkTyDDGWKh1O5xHeKxX6O751TPDcAQtzyG1v5jLW"
  },
  {
    "name": "session_state",
    "value": "9078abef-d10d-4fb7-9bbe-f3645388a706"
  },
  {
    "name": "code",
    "value": "6ae971c3-1414-4431-91ba-024d178ab5d6.9078abef-d10d-4fb7-9bbe-f3645388a706.3a469d9b-f07a-49bf-91f5-1e097b1aeb8f"
  },
  {
    "name": "id_token",
    "value": "eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.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.WVKdxJw1el3uNDHSJlK_o7ke8BUm0tgF1L_PATPWGUdLcE323NZZ3ESo7dcAfYNUtE-FepAfCJQbH4P54kSPoQ"
  }
]
2022-05-16 09:48:23 SUCCESS
ExtractImplicitHashToCallbackResponse
Extracted the hash values
state
bQP89Kbz6nWsIONmtvmqyICkg7GrILebhEnva3EJikPvx25NZ5QvWf89RtTeTn0steoc0oWWrpbz6qvVXZWwGGgeRkTyDDGWKh1O5xHeKxX6O751TPDcAQtzyG1v5jLW
session_state
9078abef-d10d-4fb7-9bbe-f3645388a706
code
6ae971c3-1414-4431-91ba-024d178ab5d6.9078abef-d10d-4fb7-9bbe-f3645388a706.3a469d9b-f07a-49bf-91f5-1e097b1aeb8f
id_token
eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.eyJleHAiOjE2NTI2OTQ4MDIsImlhdCI6MTY1MjY5NDUwMiwiYXV0aF90aW1lIjoxNjUyNjk0NTAyLCJqdGkiOiJhYWRhMjg4NC1hMjFlLTQyNzItOGYwZS02ODU3MjU3MmUwNzMiLCJpc3MiOiJodHRwczovLzg0LTI0NC03Mi05MC5uaXAuaW86NjAwMDAvYXV0aC9yZWFsbXMvdGVzdCIsImF1ZCI6ImNsaWVudDEtb2lkY2MtZnJvbnRjaGFubmVsLXJwLWluaXRpYXRlZC1sb2dvdXQiLCJzdWIiOiIzZWNkY2VjZC00M2RjLTRkYzktYWExYy1iOTc5MWZjZjczMGYiLCJ0eXAiOiJJRCIsImF6cCI6ImNsaWVudDEtb2lkY2MtZnJvbnRjaGFubmVsLXJwLWluaXRpYXRlZC1sb2dvdXQiLCJub25jZSI6IlJ6N291NmltU0QiLCJzZXNzaW9uX3N0YXRlIjoiOTA3OGFiZWYtZDEwZC00ZmI3LTliYmUtZjM2NDUzODhhNzA2IiwiY19oYXNoIjoiaU1nNjE2dVlxbkEyMGVrTmM0Q05aQSIsInNfaGFzaCI6IjNmeWpoQVljUm5UeDg5Zlc3Q2N3c1EiLCJzaWQiOiI5MDc4YWJlZi1kMTBkLTRmYjctOWJiZS1mMzY0NTM4OGE3MDYifQ.WVKdxJw1el3uNDHSJlK_o7ke8BUm0tgF1L_PATPWGUdLcE323NZZ3ESo7dcAfYNUtE-FepAfCJQbH4P54kSPoQ
2022-05-16 09:48:23 REDIRECT-IN
oidcc-frontchannel-rp-initiated-logout
Authorization endpoint response captured
url_query
{}
headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:100.0) Gecko/20100101 Firefox/100.0",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/avif,image/webp,*/*;q\u003d0.8",
  "accept-language": "en-US,en;q\u003d0.5",
  "accept-encoding": "gzip, deflate, br",
  "cookie": "__utma\u003d201319536.747058366.1611919072.1652681365.1652688969.137; __utmz\u003d201319536.1647870296.126.44.utmcsr\u003dgoogle|utmccn\u003d(organic)|utmcmd\u003dorganic|utmctr\u003d(not%20provided); _ga\u003dGA1.2.747058366.1611919072; __utmc\u003d201319536; JSESSIONID\u003dAE250C368CF582F292B45AEE07ADD533",
  "upgrade-insecure-requests": "1",
  "sec-fetch-dest": "document",
  "sec-fetch-mode": "navigate",
  "sec-fetch-site": "none",
  "sec-fetch-user": "?1",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "x-forwarded-proto": "https",
  "x-forwarded-port": "443",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
http_method
GET
url_fragment
{
  "state": "bQP89Kbz6nWsIONmtvmqyICkg7GrILebhEnva3EJikPvx25NZ5QvWf89RtTeTn0steoc0oWWrpbz6qvVXZWwGGgeRkTyDDGWKh1O5xHeKxX6O751TPDcAQtzyG1v5jLW",
  "session_state": "9078abef-d10d-4fb7-9bbe-f3645388a706",
  "code": "6ae971c3-1414-4431-91ba-024d178ab5d6.9078abef-d10d-4fb7-9bbe-f3645388a706.3a469d9b-f07a-49bf-91f5-1e097b1aeb8f",
  "id_token": "eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.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.WVKdxJw1el3uNDHSJlK_o7ke8BUm0tgF1L_PATPWGUdLcE323NZZ3ESo7dcAfYNUtE-FepAfCJQbH4P54kSPoQ"
}
post_body
Verify authorization endpoint response
2022-05-16 09:48:23 SUCCESS
RejectAuthCodeInUrlQuery
Authorization code is not present in URL query returned from authorization endpoint
2022-05-16 09:48:23 SUCCESS
RejectErrorInUrlQuery
'error' is not present in URL query returned from authorization endpoint
2022-05-16 09:48:23 SUCCESS
CheckMatchingCallbackParameters
Callback parameters successfully verified
2022-05-16 09:48:23
ValidateIssInAuthorizationResponse
No 'iss' value in authorization response.
2022-05-16 09:48:23 SUCCESS
CheckIfAuthorizationEndpointError
No error from authorization endpoint
2022-05-16 09:48:23 SUCCESS
CheckStateInAuthorizationResponse
State in response correctly returned
state
bQP89Kbz6nWsIONmtvmqyICkg7GrILebhEnva3EJikPvx25NZ5QvWf89RtTeTn0steoc0oWWrpbz6qvVXZWwGGgeRkTyDDGWKh1O5xHeKxX6O751TPDcAQtzyG1v5jLW
2022-05-16 09:48:23 SUCCESS
ExtractAuthorizationCodeFromAuthorizationResponse
Found authorization code
code
6ae971c3-1414-4431-91ba-024d178ab5d6.9078abef-d10d-4fb7-9bbe-f3645388a706.3a469d9b-f07a-49bf-91f5-1e097b1aeb8f
2022-05-16 09:48:23 SUCCESS
ExtractIdTokenFromAuthorizationResponse
Found and parsed the id_token from authorization_endpoint_response
value
eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.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.WVKdxJw1el3uNDHSJlK_o7ke8BUm0tgF1L_PATPWGUdLcE323NZZ3ESo7dcAfYNUtE-FepAfCJQbH4P54kSPoQ
header
{
  "kid": "6p6LMG-CvC-c6SvkKKOP8W_Z4fTBS9Q461P9zxi2n6o",
  "typ": "JWT",
  "alg": "ES256"
}
claims
{
  "sub": "3ecdcecd-43dc-4dc9-aa1c-b9791fcf730f",
  "iss": "https://84-244-72-90.nip.io:60000/auth/realms/test",
  "typ": "ID",
  "nonce": "Rz7ou6imSD",
  "sid": "9078abef-d10d-4fb7-9bbe-f3645388a706",
  "aud": "client1-oidcc-frontchannel-rp-initiated-logout",
  "c_hash": "iMg616uYqnA20ekNc4CNZA",
  "s_hash": "3fyjhAYcRnTx89fW7CcwsQ",
  "azp": "client1-oidcc-frontchannel-rp-initiated-logout",
  "auth_time": 1652694502,
  "exp": 1652694802,
  "session_state": "9078abef-d10d-4fb7-9bbe-f3645388a706",
  "iat": 1652694502,
  "jti": "aada2884-a21e-4272-8f0e-68572572e073"
}
2022-05-16 09:48:23 SUCCESS
ValidateIdToken
ID token iss, aud, exp, iat, auth_time, acr & nbf claims passed validation checks
2022-05-16 09:48:23 SUCCESS
ValidateIdTokenNonce
Nonce values match
nonce
Rz7ou6imSD
2022-05-16 09:48:23 SUCCESS
ValidateIdTokenACRClaimAgainstRequest
Nothing to check; the conformance suite did not request an acr claim in request object
2022-05-16 09:48:23 SUCCESS
ValidateIdTokenSignature
id_token signature validated
id_token
eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.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.WVKdxJw1el3uNDHSJlK_o7ke8BUm0tgF1L_PATPWGUdLcE323NZZ3ESo7dcAfYNUtE-FepAfCJQbH4P54kSPoQ
2022-05-16 09:48:23 SUCCESS
ValidateIdTokenSignatureUsingKid
id_token signature validated
id_token
eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.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.WVKdxJw1el3uNDHSJlK_o7ke8BUm0tgF1L_PATPWGUdLcE323NZZ3ESo7dcAfYNUtE-FepAfCJQbH4P54kSPoQ
2022-05-16 09:48:23 SUCCESS
CheckForSubjectInIdToken
Found 'sub' in id_token
sub
3ecdcecd-43dc-4dc9-aa1c-b9791fcf730f
2022-05-16 09:48:23 INFO
FAPIValidateEncryptedIdTokenHasKid
Skipped evaluation due to missing required element: id_token jwe_header
path
jwe_header
mapped
object
id_token
2022-05-16 09:48:23 SUCCESS
CreateTokenEndpointRequestForAuthorizationCodeGrant
Created token endpoint request
grant_type
authorization_code
code
6ae971c3-1414-4431-91ba-024d178ab5d6.9078abef-d10d-4fb7-9bbe-f3645388a706.3a469d9b-f07a-49bf-91f5-1e097b1aeb8f
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
2022-05-16 09:48:23 SUCCESS
AddBasicAuthClientSecretAuthenticationParameters
Added basic authorization header
Authorization
Basic Y2xpZW50MS1vaWRjYy1mcm9udGNoYW5uZWwtcnAtaW5pdGlhdGVkLWxvZ291dDo0NXFLNVg0MlpXb2xPZTBLSlRDQ0RkdTVGeGZPeW1ZVw==
2022-05-16 09:48:23
CallTokenEndpoint
HTTP request
request_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token
request_method
POST
request_headers
{
  "accept": "application/json",
  "authorization": "Basic Y2xpZW50MS1vaWRjYy1mcm9udGNoYW5uZWwtcnAtaW5pdGlhdGVkLWxvZ291dDo0NXFLNVg0MlpXb2xPZTBLSlRDQ0RkdTVGeGZPeW1ZVw\u003d\u003d",
  "content-type": "application/x-www-form-urlencoded;charset\u003dUTF-8",
  "content-length": "234"
}
request_body
grant_type=authorization_code&code=6ae971c3-1414-4431-91ba-024d178ab5d6.9078abef-d10d-4fb7-9bbe-f3645388a706.3a469d9b-f07a-49bf-91f5-1e097b1aeb8f&redirect_uri=https%3A%2F%2Fwww.certification.openid.net%2Ftest%2Fa%2Fkeycloak%2Fcallback
2022-05-16 09:48:24 RESPONSE
CallTokenEndpoint
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "cache-control": "no-store",
  "x-xss-protection": "1; mode\u003dblock",
  "pragma": "no-cache",
  "x-frame-options": "SAMEORIGIN",
  "referrer-policy": "no-referrer",
  "date": "Mon, 16 May 2022 09:48:24 GMT",
  "connection": "keep-alive",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "content-type": "application/json",
  "content-length": "4036"
}
response_body
{"access_token":"eyJhbGciOiJQUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICIzajJYOUxYdnhCbDE1bEFPbnR3S1d2b1MxM1pGR1Nza1NxNHFXMnJ2X3VzIn0.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.N07NIdhVkhrd2WhOlptMHllP-JtkehZ_GKtiOchfHvR1FItWJZ359sfU9KeAngFQnwwxwUPNYnUq2CXa6vkmQ_FGHlr2Ae7MngyXoHq5P9xGjANRM-hwSMTKRpTNJyOSCAnc_XqzPiYnsUOn6-bYeS7T-iGvHMIr_QCioqSH5z9BQBJxpWOE1InuYzSsxKuEscSACmq9vi5J2hDSNiQX70g6wl2bIIVINy84umIfu1ZTT7U-g3mXTWQjgVzIszNot4jlThoOd2AZuImp--CNivlrcLpmtYmh9n92_M4P5GgLysFgjVPtj4Tp58lfoj_IaH-5CHr_mGfJfnDB_9-idg","expires_in":300,"refresh_expires_in":1800,"refresh_token":"eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlZGU2NjRjNS0zN2U1LTQ3ZGItOTQzZC04ODk5ZDRmNzExNTQifQ.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.KhBssm9ECF_6zSAm34UaEos1C_W_8nesN55Cq_lByS0","token_type":"Bearer","id_token":"eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.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.Qy2fM756Udu5knV0TY0uAT_UPVJSGzcHKtxGMZKfaQIYjdmjWtEBGkXlGgE2s2n7BHXyBJNMQLrceP5VusMTRA","not-before-policy":0,"session_state":"9078abef-d10d-4fb7-9bbe-f3645388a706","scope":"openid name_claims"}
2022-05-16 09:48:24 SUCCESS
CallTokenEndpoint
Parsed token endpoint response
access_token
eyJhbGciOiJQUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICIzajJYOUxYdnhCbDE1bEFPbnR3S1d2b1MxM1pGR1Nza1NxNHFXMnJ2X3VzIn0.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.N07NIdhVkhrd2WhOlptMHllP-JtkehZ_GKtiOchfHvR1FItWJZ359sfU9KeAngFQnwwxwUPNYnUq2CXa6vkmQ_FGHlr2Ae7MngyXoHq5P9xGjANRM-hwSMTKRpTNJyOSCAnc_XqzPiYnsUOn6-bYeS7T-iGvHMIr_QCioqSH5z9BQBJxpWOE1InuYzSsxKuEscSACmq9vi5J2hDSNiQX70g6wl2bIIVINy84umIfu1ZTT7U-g3mXTWQjgVzIszNot4jlThoOd2AZuImp--CNivlrcLpmtYmh9n92_M4P5GgLysFgjVPtj4Tp58lfoj_IaH-5CHr_mGfJfnDB_9-idg
expires_in
300
refresh_expires_in
1800
refresh_token
eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlZGU2NjRjNS0zN2U1LTQ3ZGItOTQzZC04ODk5ZDRmNzExNTQifQ.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.KhBssm9ECF_6zSAm34UaEos1C_W_8nesN55Cq_lByS0
token_type
Bearer
id_token
eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.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.Qy2fM756Udu5knV0TY0uAT_UPVJSGzcHKtxGMZKfaQIYjdmjWtEBGkXlGgE2s2n7BHXyBJNMQLrceP5VusMTRA
not-before-policy
0
session_state
9078abef-d10d-4fb7-9bbe-f3645388a706
scope
openid name_claims
2022-05-16 09:48:24 SUCCESS
CheckIfTokenEndpointResponseError
No error from token endpoint
2022-05-16 09:48:24 SUCCESS
CheckForAccessTokenValue
Found an access token
access_token
eyJhbGciOiJQUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICIzajJYOUxYdnhCbDE1bEFPbnR3S1d2b1MxM1pGR1Nza1NxNHFXMnJ2X3VzIn0.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.N07NIdhVkhrd2WhOlptMHllP-JtkehZ_GKtiOchfHvR1FItWJZ359sfU9KeAngFQnwwxwUPNYnUq2CXa6vkmQ_FGHlr2Ae7MngyXoHq5P9xGjANRM-hwSMTKRpTNJyOSCAnc_XqzPiYnsUOn6-bYeS7T-iGvHMIr_QCioqSH5z9BQBJxpWOE1InuYzSsxKuEscSACmq9vi5J2hDSNiQX70g6wl2bIIVINy84umIfu1ZTT7U-g3mXTWQjgVzIszNot4jlThoOd2AZuImp--CNivlrcLpmtYmh9n92_M4P5GgLysFgjVPtj4Tp58lfoj_IaH-5CHr_mGfJfnDB_9-idg
2022-05-16 09:48:24 SUCCESS
ExtractAccessTokenFromTokenResponse
Extracted the access token
value
eyJhbGciOiJQUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICIzajJYOUxYdnhCbDE1bEFPbnR3S1d2b1MxM1pGR1Nza1NxNHFXMnJ2X3VzIn0.eyJleHAiOjE2NTI2OTQ4MDQsImlhdCI6MTY1MjY5NDUwNCwiYXV0aF90aW1lIjoxNjUyNjk0NTAyLCJqdGkiOiIzMWMwMmU3ZS04OTRiLTQyNmUtOTgwNC0zYzEwMmY0OGVmZmMiLCJpc3MiOiJodHRwczovLzg0LTI0NC03Mi05MC5uaXAuaW86NjAwMDAvYXV0aC9yZWFsbXMvdGVzdCIsImF1ZCI6InJlc291cmNlLXNlcnZlciIsInN1YiI6IjNlY2RjZWNkLTQzZGMtNGRjOS1hYTFjLWI5NzkxZmNmNzMwZiIsInR5cCI6IkJlYXJlciIsImF6cCI6ImNsaWVudDEtb2lkY2MtZnJvbnRjaGFubmVsLXJwLWluaXRpYXRlZC1sb2dvdXQiLCJub25jZSI6IlJ6N291NmltU0QiLCJzZXNzaW9uX3N0YXRlIjoiOTA3OGFiZWYtZDEwZC00ZmI3LTliYmUtZjM2NDUzODhhNzA2IiwiYWxsb3dlZC1vcmlnaW5zIjpbImh0dHBzOi8vcmV2aWV3LWFwcC1kZXYtYnJhbmNoLTIuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0IiwiaHR0cHM6Ly9yZXZpZXctYXBwLWRldi1icmFuY2gtNy5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXQiLCJodHRwczovL3Jldmlldy1hcHAtZGV2LWJyYW5jaC04LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldCIsImh0dHBzOi8vd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldCIsImh0dHBzOi8vcmV2aWV3LWFwcC1kZXYtYnJhbmNoLTYuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0IiwiaHR0cHM6Ly9jb25mb3JtYW5jZS1zdWl0ZS5rZXljbG9hay1mYXBpLm9yZyIsImh0dHBzOi8vbG9jYWxob3N0LmVtb2JpeC5jby51ayIsImh0dHBzOi8vcmV2aWV3LWFwcC1kZXYtYnJhbmNoLTkuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0IiwiaHR0cHM6Ly9yZXZpZXctYXBwLWRldi1icmFuY2gtMS5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXQiLCJodHRwczovL2xvY2FsaG9zdC5lbW9iaXguY28udWs6ODQ0MyIsImh0dHBzOi8vc3RhZ2luZy5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXQiLCJodHRwczovL3Jldmlldy1hcHAtZGV2LWJyYW5jaC01LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldCIsImh0dHBzOi8vcmV2aWV3LWFwcC1kZXYtYnJhbmNoLTQuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0IiwiaHR0cHM6Ly9kZW1vLmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldCIsImh0dHBzOi8vbG9jYWxob3N0Ojg0NDMiLCJodHRwczovL3Jldmlldy1hcHAtZGV2LWJyYW5jaC0zLmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldCJdLCJyZWFsbV9hY2Nlc3MiOnsicm9sZXMiOlsib2ZmbGluZV9hY2Nlc3MiXX0sInNjb3BlIjoib3BlbmlkIG5hbWVfY2xhaW1zIiwic2lkIjoiOTA3OGFiZWYtZDEwZC00ZmI3LTliYmUtZjM2NDUzODhhNzA2In0.N07NIdhVkhrd2WhOlptMHllP-JtkehZ_GKtiOchfHvR1FItWJZ359sfU9KeAngFQnwwxwUPNYnUq2CXa6vkmQ_FGHlr2Ae7MngyXoHq5P9xGjANRM-hwSMTKRpTNJyOSCAnc_XqzPiYnsUOn6-bYeS7T-iGvHMIr_QCioqSH5z9BQBJxpWOE1InuYzSsxKuEscSACmq9vi5J2hDSNiQX70g6wl2bIIVINy84umIfu1ZTT7U-g3mXTWQjgVzIszNot4jlThoOd2AZuImp--CNivlrcLpmtYmh9n92_M4P5GgLysFgjVPtj4Tp58lfoj_IaH-5CHr_mGfJfnDB_9-idg
type
Bearer
2022-05-16 09:48:24 SUCCESS
ExtractExpiresInFromTokenEndpointResponse
Extracted 'expires_in'
expires_in
300
2022-05-16 09:48:24 SUCCESS
ValidateExpiresIn
expires_in passed all validation checks
expires_in
300
2022-05-16 09:48:24 SUCCESS
CheckForRefreshTokenValue
Found a refresh token
refresh_token
eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlZGU2NjRjNS0zN2U1LTQ3ZGItOTQzZC04ODk5ZDRmNzExNTQifQ.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.KhBssm9ECF_6zSAm34UaEos1C_W_8nesN55Cq_lByS0
2022-05-16 09:48:24 SUCCESS
ExtractIdTokenFromTokenResponse
Found and parsed the id_token from token_endpoint_response
value
eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.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.Qy2fM756Udu5knV0TY0uAT_UPVJSGzcHKtxGMZKfaQIYjdmjWtEBGkXlGgE2s2n7BHXyBJNMQLrceP5VusMTRA
header
{
  "kid": "6p6LMG-CvC-c6SvkKKOP8W_Z4fTBS9Q461P9zxi2n6o",
  "typ": "JWT",
  "alg": "ES256"
}
claims
{
  "at_hash": "PimRKhdfsDuJsvMZBeYZnQ",
  "sub": "3ecdcecd-43dc-4dc9-aa1c-b9791fcf730f",
  "iss": "https://84-244-72-90.nip.io:60000/auth/realms/test",
  "typ": "ID",
  "nonce": "Rz7ou6imSD",
  "sid": "9078abef-d10d-4fb7-9bbe-f3645388a706",
  "aud": "client1-oidcc-frontchannel-rp-initiated-logout",
  "azp": "client1-oidcc-frontchannel-rp-initiated-logout",
  "auth_time": 1652694502,
  "exp": 1652694804,
  "session_state": "9078abef-d10d-4fb7-9bbe-f3645388a706",
  "iat": 1652694504,
  "jti": "96d061ed-01a5-4a43-8a22-b5f635ced691"
}
2022-05-16 09:48:24 SUCCESS
ValidateIdToken
ID token iss, aud, exp, iat, auth_time, acr & nbf claims passed validation checks
2022-05-16 09:48:24 SUCCESS
ValidateIdTokenNonce
Nonce values match
nonce
Rz7ou6imSD
2022-05-16 09:48:24 SUCCESS
ValidateIdTokenACRClaimAgainstRequest
Nothing to check; the conformance suite did not request an acr claim in request object
2022-05-16 09:48:24 SUCCESS
ValidateIdTokenSignature
id_token signature validated
id_token
eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.eyJleHAiOjE2NTI2OTQ4MDQsImlhdCI6MTY1MjY5NDUwNCwiYXV0aF90aW1lIjoxNjUyNjk0NTAyLCJqdGkiOiI5NmQwNjFlZC0wMWE1LTRhNDMtOGEyMi1iNWY2MzVjZWQ2OTEiLCJpc3MiOiJodHRwczovLzg0LTI0NC03Mi05MC5uaXAuaW86NjAwMDAvYXV0aC9yZWFsbXMvdGVzdCIsImF1ZCI6ImNsaWVudDEtb2lkY2MtZnJvbnRjaGFubmVsLXJwLWluaXRpYXRlZC1sb2dvdXQiLCJzdWIiOiIzZWNkY2VjZC00M2RjLTRkYzktYWExYy1iOTc5MWZjZjczMGYiLCJ0eXAiOiJJRCIsImF6cCI6ImNsaWVudDEtb2lkY2MtZnJvbnRjaGFubmVsLXJwLWluaXRpYXRlZC1sb2dvdXQiLCJub25jZSI6IlJ6N291NmltU0QiLCJzZXNzaW9uX3N0YXRlIjoiOTA3OGFiZWYtZDEwZC00ZmI3LTliYmUtZjM2NDUzODhhNzA2IiwiYXRfaGFzaCI6IlBpbVJLaGRmc0R1SnN2TVpCZVlablEiLCJzaWQiOiI5MDc4YWJlZi1kMTBkLTRmYjctOWJiZS1mMzY0NTM4OGE3MDYifQ.Qy2fM756Udu5knV0TY0uAT_UPVJSGzcHKtxGMZKfaQIYjdmjWtEBGkXlGgE2s2n7BHXyBJNMQLrceP5VusMTRA
2022-05-16 09:48:24 SUCCESS
ValidateIdTokenSignatureUsingKid
id_token signature validated
id_token
eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.eyJleHAiOjE2NTI2OTQ4MDQsImlhdCI6MTY1MjY5NDUwNCwiYXV0aF90aW1lIjoxNjUyNjk0NTAyLCJqdGkiOiI5NmQwNjFlZC0wMWE1LTRhNDMtOGEyMi1iNWY2MzVjZWQ2OTEiLCJpc3MiOiJodHRwczovLzg0LTI0NC03Mi05MC5uaXAuaW86NjAwMDAvYXV0aC9yZWFsbXMvdGVzdCIsImF1ZCI6ImNsaWVudDEtb2lkY2MtZnJvbnRjaGFubmVsLXJwLWluaXRpYXRlZC1sb2dvdXQiLCJzdWIiOiIzZWNkY2VjZC00M2RjLTRkYzktYWExYy1iOTc5MWZjZjczMGYiLCJ0eXAiOiJJRCIsImF6cCI6ImNsaWVudDEtb2lkY2MtZnJvbnRjaGFubmVsLXJwLWluaXRpYXRlZC1sb2dvdXQiLCJub25jZSI6IlJ6N291NmltU0QiLCJzZXNzaW9uX3N0YXRlIjoiOTA3OGFiZWYtZDEwZC00ZmI3LTliYmUtZjM2NDUzODhhNzA2IiwiYXRfaGFzaCI6IlBpbVJLaGRmc0R1SnN2TVpCZVlablEiLCJzaWQiOiI5MDc4YWJlZi1kMTBkLTRmYjctOWJiZS1mMzY0NTM4OGE3MDYifQ.Qy2fM756Udu5knV0TY0uAT_UPVJSGzcHKtxGMZKfaQIYjdmjWtEBGkXlGgE2s2n7BHXyBJNMQLrceP5VusMTRA
2022-05-16 09:48:24 SUCCESS
CheckForSubjectInIdToken
Found 'sub' in id_token
sub
3ecdcecd-43dc-4dc9-aa1c-b9791fcf730f
2022-05-16 09:48:24 INFO
FAPIValidateEncryptedIdTokenHasKid
Skipped evaluation due to missing required element: id_token jwe_header
path
jwe_header
mapped
object
id_token
2022-05-16 09:48:24 SUCCESS
VerifyIdTokenSubConsistentHybridFlow
authorization endpoint and token endpoint id_token have same sub
sub_auth_endpoint
3ecdcecd-43dc-4dc9-aa1c-b9791fcf730f
sub_token_endpoint
3ecdcecd-43dc-4dc9-aa1c-b9791fcf730f
Second authorization: Userinfo endpoint tests
2022-05-16 09:48:24
CallProtectedResource
HTTP request
request_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/userinfo
request_method
GET
request_headers
{
  "accept": "application/json",
  "authorization": "Bearer eyJhbGciOiJQUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICIzajJYOUxYdnhCbDE1bEFPbnR3S1d2b1MxM1pGR1Nza1NxNHFXMnJ2X3VzIn0.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.N07NIdhVkhrd2WhOlptMHllP-JtkehZ_GKtiOchfHvR1FItWJZ359sfU9KeAngFQnwwxwUPNYnUq2CXa6vkmQ_FGHlr2Ae7MngyXoHq5P9xGjANRM-hwSMTKRpTNJyOSCAnc_XqzPiYnsUOn6-bYeS7T-iGvHMIr_QCioqSH5z9BQBJxpWOE1InuYzSsxKuEscSACmq9vi5J2hDSNiQX70g6wl2bIIVINy84umIfu1ZTT7U-g3mXTWQjgVzIszNot4jlThoOd2AZuImp--CNivlrcLpmtYmh9n92_M4P5GgLysFgjVPtj4Tp58lfoj_IaH-5CHr_mGfJfnDB_9-idg",
  "content-length": "0"
}
request_body

                                
2022-05-16 09:48:25 RESPONSE
CallProtectedResource
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "cache-control": "no-cache",
  "x-xss-protection": "1; mode\u003dblock",
  "x-frame-options": "SAMEORIGIN",
  "referrer-policy": "no-referrer",
  "date": "Mon, 16 May 2022 09:48:25 GMT",
  "connection": "keep-alive",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "content-type": "application/json",
  "content-length": "46"
}
response_body
{"sub":"3ecdcecd-43dc-4dc9-aa1c-b9791fcf730f"}
2022-05-16 09:48:25 SUCCESS
CallProtectedResource
Got a response from the resource endpoint
status
200
endpoint_name
resource
headers
{
  "cache-control": "no-cache",
  "x-xss-protection": "1; mode\u003dblock",
  "x-frame-options": "SAMEORIGIN",
  "referrer-policy": "no-referrer",
  "date": "Mon, 16 May 2022 09:48:25 GMT",
  "connection": "keep-alive",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "content-type": "application/json",
  "content-length": "46"
}
body
{"sub":"3ecdcecd-43dc-4dc9-aa1c-b9791fcf730f"}
2022-05-16 09:48:25 SUCCESS
EnsureHttpStatusCodeIs200
resource endpoint returned the expected http status
expected_status
200
http_status
200
Redirect to end session endpoint & wait for response
2022-05-16 09:48:25
CreateRandomEndSessionState
Created end_session_state value
end_session_state
UupOjhrFHjZzMirXVBcIQUQWIXApmDuYGxAioIWHxOgUqJEpMF8754462873[~.,!^[:.)^`*:%"~).@$#("-?=]-.
2022-05-16 09:48:25 SUCCESS
CreateEndSessionEndpointRequest
Created end session endpoint request
id_token_hint
eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.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.Qy2fM756Udu5knV0TY0uAT_UPVJSGzcHKtxGMZKfaQIYjdmjWtEBGkXlGgE2s2n7BHXyBJNMQLrceP5VusMTRA
post_logout_redirect_uri
https://www.certification.openid.net/test/a/keycloak/post_logout_redirect
state
UupOjhrFHjZzMirXVBcIQUQWIXApmDuYGxAioIWHxOgUqJEpMF8754462873[~.,!^[:.)^`*:%"~).@$#("-?=]-.
2022-05-16 09:48:25 SUCCESS
BuildRedirectToEndSessionEndpoint
Sending to end_session endpoint
redirect_to_end_session_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/logout?id_token_hint=eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.eyJleHAiOjE2NTI2OTQ4MDQsImlhdCI6MTY1MjY5NDUwNCwiYXV0aF90aW1lIjoxNjUyNjk0NTAyLCJqdGkiOiI5NmQwNjFlZC0wMWE1LTRhNDMtOGEyMi1iNWY2MzVjZWQ2OTEiLCJpc3MiOiJodHRwczovLzg0LTI0NC03Mi05MC5uaXAuaW86NjAwMDAvYXV0aC9yZWFsbXMvdGVzdCIsImF1ZCI6ImNsaWVudDEtb2lkY2MtZnJvbnRjaGFubmVsLXJwLWluaXRpYXRlZC1sb2dvdXQiLCJzdWIiOiIzZWNkY2VjZC00M2RjLTRkYzktYWExYy1iOTc5MWZjZjczMGYiLCJ0eXAiOiJJRCIsImF6cCI6ImNsaWVudDEtb2lkY2MtZnJvbnRjaGFubmVsLXJwLWluaXRpYXRlZC1sb2dvdXQiLCJub25jZSI6IlJ6N291NmltU0QiLCJzZXNzaW9uX3N0YXRlIjoiOTA3OGFiZWYtZDEwZC00ZmI3LTliYmUtZjM2NDUzODhhNzA2IiwiYXRfaGFzaCI6IlBpbVJLaGRmc0R1SnN2TVpCZVlablEiLCJzaWQiOiI5MDc4YWJlZi1kMTBkLTRmYjctOWJiZS1mMzY0NTM4OGE3MDYifQ.Qy2fM756Udu5knV0TY0uAT_UPVJSGzcHKtxGMZKfaQIYjdmjWtEBGkXlGgE2s2n7BHXyBJNMQLrceP5VusMTRA&post_logout_redirect_uri=https://www.certification.openid.net/test/a/keycloak/post_logout_redirect&state=UupOjhrFHjZzMirXVBcIQUQWIXApmDuYGxAioIWHxOgUqJEpMF8754462873%5B~.,!%5E%5B:.)%5E%60*:%25%22~).@$%23(%22-?%3D%5D-.
2022-05-16 09:48:25 REDIRECT
oidcc-frontchannel-rp-initiated-logout
Redirecting to end session endpoint
redirect_to
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/logout?id_token_hint=eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.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.Qy2fM756Udu5knV0TY0uAT_UPVJSGzcHKtxGMZKfaQIYjdmjWtEBGkXlGgE2s2n7BHXyBJNMQLrceP5VusMTRA&post_logout_redirect_uri=https://www.certification.openid.net/test/a/keycloak/post_logout_redirect&state=UupOjhrFHjZzMirXVBcIQUQWIXApmDuYGxAioIWHxOgUqJEpMF8754462873%5B~.,!%5E%5B:.)%5E%60*:%25%22~).@$%23(%22-?%3D%5D-.
2022-05-16 09:48:31 INCOMING
oidcc-frontchannel-rp-initiated-logout
Incoming HTTP request to /test/a/keycloak/frontchannel_logout
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:100.0) Gecko/20100101 Firefox/100.0",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/avif,image/webp,*/*;q\u003d0.8",
  "accept-language": "en-US,en;q\u003d0.5",
  "accept-encoding": "gzip, deflate, br",
  "cookie": "__utma\u003d201319536.747058366.1611919072.1652681365.1652688969.137; __utmz\u003d201319536.1647870296.126.44.utmcsr\u003dgoogle|utmccn\u003d(organic)|utmcmd\u003dorganic|utmctr\u003d(not%20provided); _ga\u003dGA1.2.747058366.1611919072; __utmc\u003d201319536; JSESSIONID\u003dAE250C368CF582F292B45AEE07ADD533",
  "upgrade-insecure-requests": "1",
  "sec-fetch-dest": "iframe",
  "sec-fetch-mode": "navigate",
  "sec-fetch-site": "cross-site",
  "connection": "close"
}
incoming_path
/test/a/keycloak/frontchannel_logout
incoming_body_form_params
incoming_method
GET
incoming_tls_version
TLSv1.2
incoming_tls_cipher
ECDHE-RSA-AES128-GCM-SHA256
incoming_tls_cert
incoming_body_json
incoming_query_string_params
{
  "sid": "9078abef-d10d-4fb7-9bbe-f3645388a706",
  "iss": "https://84-244-72-90.nip.io:60000/auth/realms/test"
}
incoming_body
2022-05-16 09:48:31
oidcc-frontchannel-rp-initiated-logout
Received frontchannel request; waiting for front channel redirect
2022-05-16 09:48:31 OUTGOING
oidcc-frontchannel-rp-initiated-logout
Response to HTTP request to test instance zPhNuGzflB9Bqsi
outgoing_status_code
200
outgoing_headers
{
  "Cache-Control": [
    "no-cache, no-store"
  ],
  "Pragma": [
    "no-cache"
  ]
}
outgoing_body

                                
outgoing_path
frontchannel_logout
2022-05-16 09:48:31 INCOMING
oidcc-frontchannel-rp-initiated-logout
Incoming HTTP request to /test/a/keycloak/post_logout_redirect
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:100.0) Gecko/20100101 Firefox/100.0",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/avif,image/webp,*/*;q\u003d0.8",
  "accept-language": "en-US,en;q\u003d0.5",
  "accept-encoding": "gzip, deflate, br",
  "cookie": "__utma\u003d201319536.747058366.1611919072.1652681365.1652688969.137; __utmz\u003d201319536.1647870296.126.44.utmcsr\u003dgoogle|utmccn\u003d(organic)|utmcmd\u003dorganic|utmctr\u003d(not%20provided); _ga\u003dGA1.2.747058366.1611919072; __utmc\u003d201319536; JSESSIONID\u003dAE250C368CF582F292B45AEE07ADD533",
  "upgrade-insecure-requests": "1",
  "sec-fetch-dest": "document",
  "sec-fetch-mode": "navigate",
  "sec-fetch-site": "cross-site",
  "connection": "close"
}
incoming_path
/test/a/keycloak/post_logout_redirect
incoming_body_form_params
incoming_method
GET
incoming_tls_version
TLSv1.2
incoming_tls_cipher
ECDHE-RSA-AES128-GCM-SHA256
incoming_tls_cert
incoming_body_json
incoming_query_string_params
{
  "state": "UupOjhrFHjZzMirXVBcIQUQWIXApmDuYGxAioIWHxOgUqJEpMF8754462873[~.,!^[:.)^`*:%\"~).@$#(\"-?\u003d]-."
}
incoming_body
2022-05-16 09:48:31 OUTGOING
oidcc-frontchannel-rp-initiated-logout
Response to HTTP request to test instance zPhNuGzflB9Bqsi
outgoing
ModelAndView [view="resultCaptured"; model={returnUrl=/log-detail.html?log=zPhNuGzflB9Bqsi}]
outgoing_path
post_logout_redirect
Verify frontchannel logout request
2022-05-16 09:48:31 SUCCESS
CheckForUnexpectedParametersInFrontchannelLogoutRequest
frontchannel_logout_request includes only expected parameters
sid
9078abef-d10d-4fb7-9bbe-f3645388a706
iss
https://84-244-72-90.nip.io:60000/auth/realms/test
2022-05-16 09:48:31 SUCCESS
ValidateFrontchannelLogoutIss
'iss' in frontchannel logout request matches server issuer
2022-05-16 09:48:31 SUCCESS
CheckIdTokenSidMatchesFrontChannelLogoutRequest
sid is the same in the id_token and the front channel logout request
id_token
{
  "at_hash": "PimRKhdfsDuJsvMZBeYZnQ",
  "sub": "3ecdcecd-43dc-4dc9-aa1c-b9791fcf730f",
  "iss": "https://84-244-72-90.nip.io:60000/auth/realms/test",
  "typ": "ID",
  "nonce": "Rz7ou6imSD",
  "sid": "9078abef-d10d-4fb7-9bbe-f3645388a706",
  "aud": "client1-oidcc-frontchannel-rp-initiated-logout",
  "azp": "client1-oidcc-frontchannel-rp-initiated-logout",
  "auth_time": 1652694502,
  "exp": 1652694804,
  "session_state": "9078abef-d10d-4fb7-9bbe-f3645388a706",
  "iat": 1652694504,
  "jti": "96d061ed-01a5-4a43-8a22-b5f635ced691"
}
logout_request
{
  "sid": "9078abef-d10d-4fb7-9bbe-f3645388a706",
  "iss": "https://84-244-72-90.nip.io:60000/auth/realms/test"
}
Verify frontchannel post logout redirect
2022-05-16 09:48:31 SUCCESS
CheckPostLogoutState
state passed to post logout redirect uri matches request
2022-05-16 09:48:31 SUCCESS
CheckForUnexpectedParametersInPostLogoutRedirect
post_logout_redirect includes only expected parameters
state
UupOjhrFHjZzMirXVBcIQUQWIXApmDuYGxAioIWHxOgUqJEpMF8754462873[~.,!^[:.)^`*:%"~).@$#("-?=]-.
Second authorization: Make request to authorization endpoint
2022-05-16 09:48:31 SUCCESS
CreateAuthorizationEndpointRequestFromClientInformation
Created authorization endpoint request
client_id
client1-oidcc-frontchannel-rp-initiated-logout
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
scope
openid
2022-05-16 09:48:31
CreateRandomStateValue
Created state value
requested_state_length
128
state
ZNydNF5KiYINoAsy4MTaozLNBkRCZpNDdrYsOtO8j9QYBfBZGfgYMk7g9BpEEl6gLzFs8GfEmCBy4z22FO64kytjrrBA2ExhcPX87JGPU5MacFJKrzrxlSnMWzBatzH6
2022-05-16 09:48:31 SUCCESS
AddStateToAuthorizationEndpointRequest
Added state parameter to request
client_id
client1-oidcc-frontchannel-rp-initiated-logout
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
scope
openid
state
ZNydNF5KiYINoAsy4MTaozLNBkRCZpNDdrYsOtO8j9QYBfBZGfgYMk7g9BpEEl6gLzFs8GfEmCBy4z22FO64kytjrrBA2ExhcPX87JGPU5MacFJKrzrxlSnMWzBatzH6
2022-05-16 09:48:31
CreateRandomNonceValue
Created nonce value
requested_nonce_length
10
nonce
l9FckJmmiA
2022-05-16 09:48:31 SUCCESS
AddNonceToAuthorizationEndpointRequest
Added nonce parameter to request
client_id
client1-oidcc-frontchannel-rp-initiated-logout
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
scope
openid
state
ZNydNF5KiYINoAsy4MTaozLNBkRCZpNDdrYsOtO8j9QYBfBZGfgYMk7g9BpEEl6gLzFs8GfEmCBy4z22FO64kytjrrBA2ExhcPX87JGPU5MacFJKrzrxlSnMWzBatzH6
nonce
l9FckJmmiA
2022-05-16 09:48:31 SUCCESS
SetAuthorizationEndpointRequestResponseTypeFromEnvironment
Added response_type parameter to request
client_id
client1-oidcc-frontchannel-rp-initiated-logout
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
scope
openid
state
ZNydNF5KiYINoAsy4MTaozLNBkRCZpNDdrYsOtO8j9QYBfBZGfgYMk7g9BpEEl6gLzFs8GfEmCBy4z22FO64kytjrrBA2ExhcPX87JGPU5MacFJKrzrxlSnMWzBatzH6
nonce
l9FckJmmiA
response_type
code id_token
2022-05-16 09:48:31 SUCCESS
AddPromptNoneToAuthorizationEndpointRequest
Added prompt=none to authorization endpoint request
client_id
client1-oidcc-frontchannel-rp-initiated-logout
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
scope
openid
state
ZNydNF5KiYINoAsy4MTaozLNBkRCZpNDdrYsOtO8j9QYBfBZGfgYMk7g9BpEEl6gLzFs8GfEmCBy4z22FO64kytjrrBA2ExhcPX87JGPU5MacFJKrzrxlSnMWzBatzH6
nonce
l9FckJmmiA
response_type
code id_token
prompt
none
2022-05-16 09:48:31 SUCCESS
BuildPlainRedirectToAuthorizationEndpoint
Sending to authorization endpoint
auth_request
{
  "client_id": "client1-oidcc-frontchannel-rp-initiated-logout",
  "redirect_uri": "https://www.certification.openid.net/test/a/keycloak/callback",
  "scope": "openid",
  "state": "ZNydNF5KiYINoAsy4MTaozLNBkRCZpNDdrYsOtO8j9QYBfBZGfgYMk7g9BpEEl6gLzFs8GfEmCBy4z22FO64kytjrrBA2ExhcPX87JGPU5MacFJKrzrxlSnMWzBatzH6",
  "nonce": "l9FckJmmiA",
  "response_type": "code id_token",
  "prompt": "none"
}
redirect_to_authorization_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth?client_id=client1-oidcc-frontchannel-rp-initiated-logout&redirect_uri=https://www.certification.openid.net/test/a/keycloak/callback&scope=openid&state=ZNydNF5KiYINoAsy4MTaozLNBkRCZpNDdrYsOtO8j9QYBfBZGfgYMk7g9BpEEl6gLzFs8GfEmCBy4z22FO64kytjrrBA2ExhcPX87JGPU5MacFJKrzrxlSnMWzBatzH6&nonce=l9FckJmmiA&response_type=code%20id_token&prompt=none
2022-05-16 09:48:31 REDIRECT
oidcc-frontchannel-rp-initiated-logout
Redirecting to authorization endpoint
redirect_to
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth?client_id=client1-oidcc-frontchannel-rp-initiated-logout&redirect_uri=https://www.certification.openid.net/test/a/keycloak/callback&scope=openid&state=ZNydNF5KiYINoAsy4MTaozLNBkRCZpNDdrYsOtO8j9QYBfBZGfgYMk7g9BpEEl6gLzFs8GfEmCBy4z22FO64kytjrrBA2ExhcPX87JGPU5MacFJKrzrxlSnMWzBatzH6&nonce=l9FckJmmiA&response_type=code%20id_token&prompt=none
2022-05-16 09:48:46 INCOMING
oidcc-frontchannel-rp-initiated-logout
Incoming HTTP request to /test/a/keycloak/callback
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:100.0) Gecko/20100101 Firefox/100.0",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/avif,image/webp,*/*;q\u003d0.8",
  "accept-language": "en-US,en;q\u003d0.5",
  "accept-encoding": "gzip, deflate, br",
  "cookie": "__utma\u003d201319536.747058366.1611919072.1652681365.1652688969.137; __utmz\u003d201319536.1647870296.126.44.utmcsr\u003dgoogle|utmccn\u003d(organic)|utmcmd\u003dorganic|utmctr\u003d(not%20provided); _ga\u003dGA1.2.747058366.1611919072; __utmc\u003d201319536; JSESSIONID\u003dAE250C368CF582F292B45AEE07ADD533",
  "upgrade-insecure-requests": "1",
  "sec-fetch-dest": "document",
  "sec-fetch-mode": "navigate",
  "sec-fetch-site": "cross-site",
  "connection": "close"
}
incoming_path
/test/a/keycloak/callback
incoming_body_form_params
incoming_method
GET
incoming_tls_version
TLSv1.2
incoming_tls_cipher
ECDHE-RSA-AES128-GCM-SHA256
incoming_tls_cert
incoming_body_json
incoming_query_string_params
{}
incoming_body
2022-05-16 09:48:46 SUCCESS
CreateRandomImplicitSubmitUrl
Created random implicit submission URL
implicit_submit
{
  "path": "implicit/J7iYgQqZePll1I3oZ98o",
  "fullUrl": "https://www.certification.openid.net/test/a/keycloak/implicit/J7iYgQqZePll1I3oZ98o"
}
2022-05-16 09:48:46 OUTGOING
oidcc-frontchannel-rp-initiated-logout
Response to HTTP request to test instance zPhNuGzflB9Bqsi
outgoing
ModelAndView [view="implicitCallback"; model={implicitSubmitUrl=https://www.certification.openid.net/test/a/keycloak/implicit/J7iYgQqZePll1I3oZ98o, returnUrl=/log-detail.html?log=zPhNuGzflB9Bqsi}]
outgoing_path
callback
2022-05-16 09:48:46 INCOMING
oidcc-frontchannel-rp-initiated-logout
Incoming HTTP request to /test/a/keycloak/implicit/J7iYgQqZePll1I3oZ98o
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:100.0) Gecko/20100101 Firefox/100.0",
  "accept": "*/*",
  "accept-language": "en-US,en;q\u003d0.5",
  "accept-encoding": "gzip, deflate, br",
  "content-type": "text/plain",
  "x-requested-with": "XMLHttpRequest",
  "origin": "https://www.certification.openid.net",
  "referer": "https://www.certification.openid.net/test/a/keycloak/callback",
  "cookie": "__utma\u003d201319536.747058366.1611919072.1652681365.1652688969.137; __utmz\u003d201319536.1647870296.126.44.utmcsr\u003dgoogle|utmccn\u003d(organic)|utmcmd\u003dorganic|utmctr\u003d(not%20provided); _ga\u003dGA1.2.747058366.1611919072; __utmc\u003d201319536; JSESSIONID\u003dAE250C368CF582F292B45AEE07ADD533",
  "sec-fetch-dest": "empty",
  "sec-fetch-mode": "cors",
  "sec-fetch-site": "same-origin",
  "connection": "close",
  "content-length": "156"
}
incoming_path
/test/a/keycloak/implicit/J7iYgQqZePll1I3oZ98o
incoming_body_form_params
incoming_method
POST
incoming_tls_version
TLSv1.2
incoming_tls_cipher
ECDHE-RSA-AES128-GCM-SHA256
incoming_tls_cert
incoming_body_json
incoming_query_string_params
{}
incoming_body
#error=login_required&state=ZNydNF5KiYINoAsy4MTaozLNBkRCZpNDdrYsOtO8j9QYBfBZGfgYMk7g9BpEEl6gLzFs8GfEmCBy4z22FO64kytjrrBA2ExhcPX87JGPU5MacFJKrzrxlSnMWzBatzH6
2022-05-16 09:48:46 OUTGOING
oidcc-frontchannel-rp-initiated-logout
Response to HTTP request to test instance zPhNuGzflB9Bqsi
outgoing_status_code
204
outgoing_headers
{}
outgoing_body

                                
outgoing_path
implicit/J7iYgQqZePll1I3oZ98o
2022-05-16 09:48:46
ExtractImplicitHashToCallbackResponse
Extracted response from URL fragment
parameters
[
  {
    "name": "error",
    "value": "login_required"
  },
  {
    "name": "state",
    "value": "ZNydNF5KiYINoAsy4MTaozLNBkRCZpNDdrYsOtO8j9QYBfBZGfgYMk7g9BpEEl6gLzFs8GfEmCBy4z22FO64kytjrrBA2ExhcPX87JGPU5MacFJKrzrxlSnMWzBatzH6"
  }
]
2022-05-16 09:48:46 SUCCESS
ExtractImplicitHashToCallbackResponse
Extracted the hash values
error
login_required
state
ZNydNF5KiYINoAsy4MTaozLNBkRCZpNDdrYsOtO8j9QYBfBZGfgYMk7g9BpEEl6gLzFs8GfEmCBy4z22FO64kytjrrBA2ExhcPX87JGPU5MacFJKrzrxlSnMWzBatzH6
2022-05-16 09:48:46 REDIRECT-IN
oidcc-frontchannel-rp-initiated-logout
Authorization endpoint response captured
url_query
{}
headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:100.0) Gecko/20100101 Firefox/100.0",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/avif,image/webp,*/*;q\u003d0.8",
  "accept-language": "en-US,en;q\u003d0.5",
  "accept-encoding": "gzip, deflate, br",
  "cookie": "__utma\u003d201319536.747058366.1611919072.1652681365.1652688969.137; __utmz\u003d201319536.1647870296.126.44.utmcsr\u003dgoogle|utmccn\u003d(organic)|utmcmd\u003dorganic|utmctr\u003d(not%20provided); _ga\u003dGA1.2.747058366.1611919072; __utmc\u003d201319536; JSESSIONID\u003dAE250C368CF582F292B45AEE07ADD533",
  "upgrade-insecure-requests": "1",
  "sec-fetch-dest": "document",
  "sec-fetch-mode": "navigate",
  "sec-fetch-site": "cross-site",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "x-forwarded-proto": "https",
  "x-forwarded-port": "443",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
http_method
GET
url_fragment
{
  "error": "login_required",
  "state": "ZNydNF5KiYINoAsy4MTaozLNBkRCZpNDdrYsOtO8j9QYBfBZGfgYMk7g9BpEEl6gLzFs8GfEmCBy4z22FO64kytjrrBA2ExhcPX87JGPU5MacFJKrzrxlSnMWzBatzH6"
}
post_body
Second authorization: Verify authorization endpoint response
2022-05-16 09:48:46 SUCCESS
RejectAuthCodeInUrlQuery
Authorization code is not present in URL query returned from authorization endpoint
2022-05-16 09:48:46 SUCCESS
RejectErrorInUrlQuery
'error' is not present in URL query returned from authorization endpoint
2022-05-16 09:48:46 SUCCESS
CheckStateInAuthorizationResponse
State in response correctly returned
state
ZNydNF5KiYINoAsy4MTaozLNBkRCZpNDdrYsOtO8j9QYBfBZGfgYMk7g9BpEEl6gLzFs8GfEmCBy4z22FO64kytjrrBA2ExhcPX87JGPU5MacFJKrzrxlSnMWzBatzH6
2022-05-16 09:48:46
ValidateIssInAuthorizationResponse
No 'iss' value in authorization response.
2022-05-16 09:48:46 SUCCESS
EnsureErrorFromAuthorizationEndpointResponse
Authorization endpoint returned an error
error
login_required
state
ZNydNF5KiYINoAsy4MTaozLNBkRCZpNDdrYsOtO8j9QYBfBZGfgYMk7g9BpEEl6gLzFs8GfEmCBy4z22FO64kytjrrBA2ExhcPX87JGPU5MacFJKrzrxlSnMWzBatzH6
2022-05-16 09:48:46 SUCCESS
RejectAuthCodeInAuthorizationEndpointResponse
Authorization code is not present in authorization endpoint response
2022-05-16 09:48:46 SUCCESS
CheckForUnexpectedParametersInErrorResponseFromAuthorizationEndpoint
error response includes only expected parameters
error
login_required
state
ZNydNF5KiYINoAsy4MTaozLNBkRCZpNDdrYsOtO8j9QYBfBZGfgYMk7g9BpEEl6gLzFs8GfEmCBy4z22FO64kytjrrBA2ExhcPX87JGPU5MacFJKrzrxlSnMWzBatzH6
2022-05-16 09:48:46 SUCCESS
CheckErrorDescriptionFromAuthorizationEndpointResponseErrorContainsCRLFTAB
authorization_endpoint_response did not include optional 'error_description' field
2022-05-16 09:48:46 SUCCESS
ValidateErrorDescriptionFromAuthorizationEndpointResponseError
authorization_endpoint_response did not include optional 'error_description' field
2022-05-16 09:48:46 SUCCESS
ValidateErrorUriFromAuthorizationEndpointResponseError
authorization_endpoint_response did not include optional 'error_uri' field
2022-05-16 09:48:46 SUCCESS
CheckErrorFromAuthorizationEndpointIsOneThatRequiredAUserInterface
Authorization endpoint returned one of the permitted errors
actual
login_required
permitted
[
  "interaction_required",
  "login_required",
  "account_selection_required",
  "consent_required"
]
2022-05-16 09:48:46 FINISHED
oidcc-frontchannel-rp-initiated-logout
Test has run to completion
testmodule_result
PASSED
Unregister dynamically registered client
2022-05-16 09:48:46
UnregisterDynamicallyRegisteredClient
Couldn't find registration_access_token.
Test Results