Test Name | oidcc-rp-initiated-logout-bad-id-token-hint |
---|---|
Variant | client_auth_type=client_secret_basic, server_metadata=discovery, response_type=code, response_mode=default, client_registration=static_client |
Test ID | 9KfFP0UqMyOUkVp https://www.certification.openid.net/log-detail.html?public=true&log=9KfFP0UqMyOUkVp |
Created | 2022-05-16T11:33:44.325947Z |
Description | Keycloak, OpenID Connect Core: Rp Initiated Logout Certification Profile (client_registration:static_client) |
Test Version | 4.1.42 |
Test Owner | 115310558227229560855 https://accounts.google.com |
Plan ID | lK6ID0bWTp3L6 https://www.certification.openid.net/plan-detail.html?public=true&plan=lK6ID0bWTp3L6 |
Exported From | https://www.certification.openid.net |
Exported By | 115310558227229560855 https://accounts.google.com |
Suite Version | 4.1.42 |
Exported | 2022-05-16 18:02:37 (UTC) |
Status: FINISHED Result: REVIEW |
SUCCESS 48 FAILURE 0 WARNING 0 REVIEW 1 INFO 5 |
2022-05-16 11:33:44 |
INFO
|
TEST-RUNNER
Test instance 9KfFP0UqMyOUkVp created
|
||||||||||||||
|
2022-05-16 11:33:44 |
SUCCESS
|
CreateRedirectUri
Created redirect URI
|
||
|
2022-05-16 11:33:44 |
|
GetDynamicServerConfiguration
HTTP request
|
||||||||
|
2022-05-16 11:33:45 |
RESPONSE
|
GetDynamicServerConfiguration
HTTP response
|
||||||||
|
2022-05-16 11:33:45 |
SUCCESS
|
GetDynamicServerConfiguration
Successfully parsed server configuration
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
2022-05-16 11:33:45 |
SUCCESS
|
CheckServerConfiguration
Found required server configuration keys
|
||
|
2022-05-16 11:33:45 |
SUCCESS
|
ExtractTLSTestValuesFromServerConfiguration
Extracted TLS information from authorization server configuration
|
||||||||
|
2022-05-16 11:33:45 |
|
FetchServerKeys
Fetching server key
|
||
|
2022-05-16 11:33:45 |
|
FetchServerKeys
HTTP request
|
||||||||
|
2022-05-16 11:33:45 |
RESPONSE
|
FetchServerKeys
HTTP response
|
||||||||
|
2022-05-16 11:33:45 |
|
FetchServerKeys
Found JWK set string
|
||
|
2022-05-16 11:33:45 |
SUCCESS
|
FetchServerKeys
Found server JWK set
|
||
|
2022-05-16 11:33:45 |
SUCCESS
|
CheckServerKeysIsValid
Server JWKs is valid
|
||
|
2022-05-16 11:33:45 | SUCCESS |
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
|
|
2022-05-16 11:33:45 | SUCCESS |
CheckForKeyIdInServerJWKs
All keys contain kids
|
|
2022-05-16 11:33:45 | SUCCESS |
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
|
||
|
2022-05-16 11:33:45 | SUCCESS |
EnsureServerJwksDoesNotContainPrivateOrSymmetricKeys
Jwks does not contain any private or symmetric keys
|
|
2022-05-16 11:33:45 | SUCCESS |
CreatePostLogoutRedirectUri
Created post_logout_redirect_uri URI
|
||
|
2022-05-16 11:33:45 |
SUCCESS
|
GetStaticClientConfiguration
Found a static client object
|
||||
|
2022-05-16 11:33:45 | INFO |
ValidateClientJWKsPrivatePart
Skipped evaluation due to missing required element: client jwks
|
||||||
|
2022-05-16 11:33:45 |
INFO
|
ExtractJWKsFromStaticClientConfiguration
Skipped evaluation due to missing required element: client jwks
|
||||||
|
2022-05-16 11:33:45 | INFO |
CheckDistinctKeyIdValueInClientJWKs
Skipped evaluation due to missing required element: client jwks
|
||||||
|
2022-05-16 11:33:45 |
|
SetScopeInClientConfigurationToOpenId
Set scope in client configuration to "openid"
|
||
|
2022-05-16 11:33:45 |
SUCCESS
|
EnsureServerConfigurationSupportsClientSecretBasic
Contents of 'token_endpoint_auth_methods_supported' in discovery document matches expectations.
|
||||||
|
2022-05-16 11:33:45 |
SUCCESS
|
SetProtectedResourceUrlToUserInfoEndpoint
userinfo_endpoint will be used to test access token. The user info is not a mandatory to implement feature in the OpenID Connect specification, but is mandatory for certification.
|
||
|
2022-05-16 11:33:45 |
SUCCESS
|
GenerateJWKsFromClientSecret
Generated JWK Set from symmetric key
|
||
|
2022-05-16 11:33:45 |
|
oidcc-rp-initiated-logout-bad-id-token-hint
Setup Done
|
|
Make request to authorization endpoint |
2022-05-16 11:33:45 |
SUCCESS
|
CreateAuthorizationEndpointRequestFromClientInformation
Created authorization endpoint request
|
||||||
|
2022-05-16 11:33:45 |
|
CreateRandomStateValue
Created state value
|
||||
|
2022-05-16 11:33:45 |
SUCCESS
|
AddStateToAuthorizationEndpointRequest
Added state parameter to request
|
||||||||
|
2022-05-16 11:33:45 |
|
CreateRandomNonceValue
Created nonce value
|
||||
|
2022-05-16 11:33:45 |
SUCCESS
|
AddNonceToAuthorizationEndpointRequest
Added nonce parameter to request
|
||||||||||
|
2022-05-16 11:33:45 |
SUCCESS
|
SetAuthorizationEndpointRequestResponseTypeFromEnvironment
Added response_type parameter to request
|
||||||||||||
|
2022-05-16 11:33:45 |
SUCCESS
|
BuildPlainRedirectToAuthorizationEndpoint
Sending to authorization endpoint
|
||||
|
2022-05-16 11:33:45 |
REDIRECT
|
oidcc-rp-initiated-logout-bad-id-token-hint
Redirecting to authorization endpoint
|
||
|
2022-05-16 11:33:48 |
INCOMING
|
oidcc-rp-initiated-logout-bad-id-token-hint
Incoming HTTP request to /test/a/keycloak/callback
|
||||||||||||||||||||
|
2022-05-16 11:33:48 |
SUCCESS
|
CreateRandomImplicitSubmitUrl
Created random implicit submission URL
|
||
|
2022-05-16 11:33:48 |
OUTGOING
|
oidcc-rp-initiated-logout-bad-id-token-hint
Response to HTTP request to test instance 9KfFP0UqMyOUkVp
|
||||
|
2022-05-16 11:33:49 |
INCOMING
|
oidcc-rp-initiated-logout-bad-id-token-hint
Incoming HTTP request to /test/a/keycloak/implicit/WUdOvDtuxcmdfaDI3aVk
|
||||||||||||||||||||
|
2022-05-16 11:33:49 |
OUTGOING
|
oidcc-rp-initiated-logout-bad-id-token-hint
Response to HTTP request to test instance 9KfFP0UqMyOUkVp
|
||||||||
|
2022-05-16 11:33:49 |
SUCCESS
|
ExtractImplicitHashToCallbackResponse
implicit_hash is empty
|
|
2022-05-16 11:33:49 |
REDIRECT-IN
|
oidcc-rp-initiated-logout-bad-id-token-hint
Authorization endpoint response captured
|
||||||||||
|
Verify authorization endpoint response |
2022-05-16 11:33:49 |
SUCCESS
|
CheckMatchingCallbackParameters
Callback parameters successfully verified
|
|
2022-05-16 11:33:49 |
|
ValidateIssInAuthorizationResponse
No 'iss' value in authorization response.
|
|
2022-05-16 11:33:49 |
SUCCESS
|
CheckIfAuthorizationEndpointError
No error from authorization endpoint
|
|
2022-05-16 11:33:49 |
SUCCESS
|
CheckStateInAuthorizationResponse
State in response correctly returned
|
||
|
2022-05-16 11:33:49 |
SUCCESS
|
ExtractAuthorizationCodeFromAuthorizationResponse
Found authorization code
|
||
|
2022-05-16 11:33:49 |
SUCCESS
|
CreateTokenEndpointRequestForAuthorizationCodeGrant
Created token endpoint request
|
||||||
|
2022-05-16 11:33:49 |
SUCCESS
|
AddBasicAuthClientSecretAuthenticationParameters
Added basic authorization header
|
||
|
2022-05-16 11:33:49 |
|
CallTokenEndpoint
HTTP request
|
||||||||
|
2022-05-16 11:33:49 |
RESPONSE
|
CallTokenEndpoint
HTTP response
|
||||||||
|
2022-05-16 11:33:49 |
SUCCESS
|
CallTokenEndpoint
Parsed token endpoint response
|
||||||||||||||||||
|
2022-05-16 11:33:49 |
SUCCESS
|
CheckIfTokenEndpointResponseError
No error from token endpoint
|
|
2022-05-16 11:33:49 |
SUCCESS
|
CheckForAccessTokenValue
Found an access token
|
||
|
2022-05-16 11:33:49 |
SUCCESS
|
ExtractAccessTokenFromTokenResponse
Extracted the access token
|
||||
|
2022-05-16 11:33:49 | SUCCESS |
ExtractExpiresInFromTokenEndpointResponse
Extracted 'expires_in'
|
||
|
2022-05-16 11:33:49 | SUCCESS |
ValidateExpiresIn
expires_in passed all validation checks
|
||
|
2022-05-16 11:33:49 |
SUCCESS
|
CheckForRefreshTokenValue
Found a refresh token
|
||
|
2022-05-16 11:33:49 | SUCCESS |
ExtractIdTokenFromTokenResponse
Found and parsed the id_token from token_endpoint_response
|
||||||
|
2022-05-16 11:33:49 |
SUCCESS
|
ValidateIdToken
ID token iss, aud, exp, iat, auth_time, acr & nbf claims passed validation checks
|
|
2022-05-16 11:33:49 | SUCCESS |
ValidateIdTokenNonce
Nonce values match
|
||
|
2022-05-16 11:33:49 | SUCCESS |
ValidateIdTokenACRClaimAgainstRequest
Nothing to check; the conformance suite did not request an acr claim in request object
|
|
2022-05-16 11:33:49 |
SUCCESS
|
ValidateIdTokenSignature
id_token signature validated
|
||
|
2022-05-16 11:33:49 |
SUCCESS
|
ValidateIdTokenSignatureUsingKid
id_token signature validated
|
||
|
2022-05-16 11:33:49 | SUCCESS |
CheckForSubjectInIdToken
Found 'sub' in id_token
|
||
|
2022-05-16 11:33:49 | INFO |
FAPIValidateEncryptedIdTokenHasKid
Skipped evaluation due to missing required element: id_token jwe_header
|
||||||
|
Second authorization: Userinfo endpoint tests |
2022-05-16 11:33:49 |
|
CallProtectedResource
HTTP request
|
||||||||
|
2022-05-16 11:33:50 |
RESPONSE
|
CallProtectedResource
HTTP response
|
||||||||
|
2022-05-16 11:33:50 |
SUCCESS
|
CallProtectedResource
Got a response from the resource endpoint
|
||||||||
|
2022-05-16 11:33:50 |
SUCCESS
|
EnsureHttpStatusCodeIs200
resource endpoint returned the expected http status
|
||||
|
2022-05-16 11:33:50 |
SUCCESS
|
GenerateFakeIdTokenClaims
Created ID Token Claims
|
||||||||||||
|
2022-05-16 11:33:50 |
SUCCESS
|
SignFakeIdToken
Signed a 'fake' ID token using the client's keys
|
||
|
Redirect to end session endpoint & wait for response |
2022-05-16 11:33:50 |
|
CreateRandomEndSessionState
Created end_session_state value
|
||
|
2022-05-16 11:33:50 | SUCCESS |
CreateEndSessionEndpointRequest
Created end session endpoint request
|
||||||
|
2022-05-16 11:33:50 | SUCCESS |
BuildRedirectToEndSessionEndpoint
Sending to end_session endpoint
|
||
|
2022-05-16 11:33:50 | REVIEW IMAGE |
ExpectInvalidIdTokenHintErrorPage
The server must show an error page saying the request is invalid as the id_token_hint is not valid - upload a screenshot of the error page.
|
||||
|
2022-05-16 11:33:50 |
REDIRECT
|
oidcc-rp-initiated-logout-bad-id-token-hint
Redirecting to end session endpoint
|
||
|
2022-05-16 11:34:21 |
FINISHED
|
oidcc-rp-initiated-logout-bad-id-token-hint
Test has run to completion
|
||
|
Unregister dynamically registered client |
2022-05-16 11:34:21 |
|
UnregisterDynamicallyRegisteredClient
Couldn't find registration_access_token.
|
|
2022-05-16 11:36:55 |
|
TEST-RUNNER
Alias has now been claimed by another test
|
||||
|