Test Summary

Test Results

Expand All Collapse All
All times are UTC
2022-05-16 11:37:23 INFO
TEST-RUNNER
Test instance PQMCw8hvVlTBRXe created
baseUrl
https://www.certification.openid.net/test/a/keycloak
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "id_token",
  "server_metadata": "discovery",
  "response_mode": "default",
  "client_registration": "static_client"
}
alias
keycloak
description
Keycloak, OpenID Connect Core: Rp Initiated Logout Certification Profile (client_registration:static_client)
planId
ofaeIVWGvFYCk
config
{
  "alias": "keycloak",
  "description": "Keycloak, OpenID Connect Core: Rp Initiated Logout Certification Profile (client_registration:static_client)",
  "server": {
    "discoveryUrl": "https://84-244-72-90.nip.io:60000/auth/realms/test/.well-known/openid-configuration",
    "login_hint": "john"
  },
  "client": {
    "client_id": "client1-rp-initiated-logout",
    "client_secret": "hYrN6jbdLq6WtfxjhVxmdF3vVdOgNK9p"
  }
}
testName
oidcc-rp-initiated-logout-bad-post-logout-redirect-uri
2022-05-16 11:37:23 SUCCESS
CreateRedirectUri
Created redirect URI
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
2022-05-16 11:37:24
GetDynamicServerConfiguration
HTTP request
request_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/.well-known/openid-configuration
request_method
GET
request_headers
{
  "accept": "text/plain, application/json, application/*+json, */*",
  "content-length": "0"
}
request_body

                                
2022-05-16 11:37:24 RESPONSE
GetDynamicServerConfiguration
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "cache-control": "no-cache, must-revalidate, no-transform, no-store",
  "x-xss-protection": "1; mode\u003dblock",
  "x-frame-options": "SAMEORIGIN",
  "referrer-policy": "no-referrer",
  "date": "Mon, 16 May 2022 11:37:24 GMT",
  "connection": "keep-alive",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "content-type": "application/json",
  "content-length": "6208"
}
response_body
{"issuer":"https://84-244-72-90.nip.io:60000/auth/realms/test","authorization_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth","token_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token","introspection_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token/introspect","userinfo_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/userinfo","end_session_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/logout","frontchannel_logout_session_supported":true,"frontchannel_logout_supported":true,"jwks_uri":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/certs","check_session_iframe":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/login-status-iframe.html","grant_types_supported":["authorization_code","implicit","refresh_token","password","client_credentials","urn:ietf:params:oauth:grant-type:device_code","urn:openid:params:grant-type:ciba"],"acr_values_supported":["0","1"],"response_types_supported":["code","none","id_token","token","id_token token","code id_token","code token","code id_token token"],"subject_types_supported":["public","pairwise"],"id_token_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512"],"id_token_encryption_alg_values_supported":["RSA-OAEP","RSA-OAEP-256","RSA1_5"],"id_token_encryption_enc_values_supported":["A256GCM","A192GCM","A128GCM","A128CBC-HS256","A192CBC-HS384","A256CBC-HS512"],"userinfo_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512","none"],"userinfo_encryption_alg_values_supported":["RSA-OAEP","RSA-OAEP-256","RSA1_5"],"userinfo_encryption_enc_values_supported":["A256GCM","A192GCM","A128GCM","A128CBC-HS256","A192CBC-HS384","A256CBC-HS512"],"request_object_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512","none"],"request_object_encryption_alg_values_supported":["RSA-OAEP","RSA-OAEP-256","RSA1_5"],"request_object_encryption_enc_values_supported":["A256GCM","A192GCM","A128GCM","A128CBC-HS256","A192CBC-HS384","A256CBC-HS512"],"response_modes_supported":["query","fragment","form_post","query.jwt","fragment.jwt","form_post.jwt","jwt"],"registration_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect","token_endpoint_auth_methods_supported":["private_key_jwt","client_secret_basic","client_secret_post","tls_client_auth","client_secret_jwt"],"token_endpoint_auth_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512"],"introspection_endpoint_auth_methods_supported":["private_key_jwt","client_secret_basic","client_secret_post","tls_client_auth","client_secret_jwt"],"introspection_endpoint_auth_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512"],"authorization_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512"],"authorization_encryption_alg_values_supported":["RSA-OAEP","RSA-OAEP-256","RSA1_5"],"authorization_encryption_enc_values_supported":["A256GCM","A192GCM","A128GCM","A128CBC-HS256","A192CBC-HS384","A256CBC-HS512"],"claims_supported":["aud","sub","iss","auth_time","name","given_name","family_name","preferred_username","email","acr"],"claim_types_supported":["normal"],"claims_parameter_supported":true,"scopes_supported":["openid","consents","name_claims","microprofile-jwt","consent:1","name_claims_for_implicit","roles","address","phone","web-origins","profile","offline_access","resources","email"],"request_parameter_supported":true,"request_uri_parameter_supported":true,"require_request_uri_registration":true,"code_challenge_methods_supported":["plain","S256"],"tls_client_certificate_bound_access_tokens":true,"revocation_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/revoke","revocation_endpoint_auth_methods_supported":["private_key_jwt","client_secret_basic","client_secret_post","tls_client_auth","client_secret_jwt"],"revocation_endpoint_auth_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512"],"backchannel_logout_supported":true,"backchannel_logout_session_supported":true,"device_authorization_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth/device","backchannel_token_delivery_modes_supported":["poll","ping"],"backchannel_authentication_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/ciba/auth","backchannel_authentication_request_signing_alg_values_supported":["PS384","ES384","RS384","ES256","RS256","ES512","PS256","PS512","RS512"],"require_pushed_authorization_requests":false,"pushed_authorization_request_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/par/request","mtls_endpoint_aliases":{"token_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token","revocation_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/revoke","introspection_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token/introspect","device_authorization_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth/device","registration_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect","userinfo_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/userinfo","pushed_authorization_request_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/par/request","backchannel_authentication_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/ciba/auth"}}
2022-05-16 11:37:24 SUCCESS
GetDynamicServerConfiguration
Successfully parsed server configuration
issuer
https://84-244-72-90.nip.io:60000/auth/realms/test
authorization_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth
token_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token
introspection_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token/introspect
userinfo_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/userinfo
end_session_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/logout
frontchannel_logout_session_supported
true
frontchannel_logout_supported
true
jwks_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/certs
check_session_iframe
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/login-status-iframe.html
grant_types_supported
[
  "authorization_code",
  "implicit",
  "refresh_token",
  "password",
  "client_credentials",
  "urn:ietf:params:oauth:grant-type:device_code",
  "urn:openid:params:grant-type:ciba"
]
acr_values_supported
[
  "0",
  "1"
]
response_types_supported
[
  "code",
  "none",
  "id_token",
  "token",
  "id_token token",
  "code id_token",
  "code token",
  "code id_token token"
]
subject_types_supported
[
  "public",
  "pairwise"
]
id_token_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512"
]
id_token_encryption_alg_values_supported
[
  "RSA-OAEP",
  "RSA-OAEP-256",
  "RSA1_5"
]
id_token_encryption_enc_values_supported
[
  "A256GCM",
  "A192GCM",
  "A128GCM",
  "A128CBC-HS256",
  "A192CBC-HS384",
  "A256CBC-HS512"
]
userinfo_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512",
  "none"
]
userinfo_encryption_alg_values_supported
[
  "RSA-OAEP",
  "RSA-OAEP-256",
  "RSA1_5"
]
userinfo_encryption_enc_values_supported
[
  "A256GCM",
  "A192GCM",
  "A128GCM",
  "A128CBC-HS256",
  "A192CBC-HS384",
  "A256CBC-HS512"
]
request_object_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512",
  "none"
]
request_object_encryption_alg_values_supported
[
  "RSA-OAEP",
  "RSA-OAEP-256",
  "RSA1_5"
]
request_object_encryption_enc_values_supported
[
  "A256GCM",
  "A192GCM",
  "A128GCM",
  "A128CBC-HS256",
  "A192CBC-HS384",
  "A256CBC-HS512"
]
response_modes_supported
[
  "query",
  "fragment",
  "form_post",
  "query.jwt",
  "fragment.jwt",
  "form_post.jwt",
  "jwt"
]
registration_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect
token_endpoint_auth_methods_supported
[
  "private_key_jwt",
  "client_secret_basic",
  "client_secret_post",
  "tls_client_auth",
  "client_secret_jwt"
]
token_endpoint_auth_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512"
]
introspection_endpoint_auth_methods_supported
[
  "private_key_jwt",
  "client_secret_basic",
  "client_secret_post",
  "tls_client_auth",
  "client_secret_jwt"
]
introspection_endpoint_auth_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512"
]
authorization_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512"
]
authorization_encryption_alg_values_supported
[
  "RSA-OAEP",
  "RSA-OAEP-256",
  "RSA1_5"
]
authorization_encryption_enc_values_supported
[
  "A256GCM",
  "A192GCM",
  "A128GCM",
  "A128CBC-HS256",
  "A192CBC-HS384",
  "A256CBC-HS512"
]
claims_supported
[
  "aud",
  "sub",
  "iss",
  "auth_time",
  "name",
  "given_name",
  "family_name",
  "preferred_username",
  "email",
  "acr"
]
claim_types_supported
[
  "normal"
]
claims_parameter_supported
true
scopes_supported
[
  "openid",
  "consents",
  "name_claims",
  "microprofile-jwt",
  "consent:1",
  "name_claims_for_implicit",
  "roles",
  "address",
  "phone",
  "web-origins",
  "profile",
  "offline_access",
  "resources",
  "email"
]
request_parameter_supported
true
request_uri_parameter_supported
true
require_request_uri_registration
true
code_challenge_methods_supported
[
  "plain",
  "S256"
]
tls_client_certificate_bound_access_tokens
true
revocation_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/revoke
revocation_endpoint_auth_methods_supported
[
  "private_key_jwt",
  "client_secret_basic",
  "client_secret_post",
  "tls_client_auth",
  "client_secret_jwt"
]
revocation_endpoint_auth_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512"
]
backchannel_logout_supported
true
backchannel_logout_session_supported
true
device_authorization_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth/device
backchannel_token_delivery_modes_supported
[
  "poll",
  "ping"
]
backchannel_authentication_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/ciba/auth
backchannel_authentication_request_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "ES256",
  "RS256",
  "ES512",
  "PS256",
  "PS512",
  "RS512"
]
require_pushed_authorization_requests
false
pushed_authorization_request_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/par/request
mtls_endpoint_aliases
{
  "token_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token",
  "revocation_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/revoke",
  "introspection_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token/introspect",
  "device_authorization_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth/device",
  "registration_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect",
  "userinfo_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/userinfo",
  "pushed_authorization_request_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/par/request",
  "backchannel_authentication_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/ciba/auth"
}
2022-05-16 11:37:24 SUCCESS
CheckServerConfiguration
Found required server configuration keys
required
[
  "authorization_endpoint",
  "token_endpoint",
  "issuer"
]
2022-05-16 11:37:24 SUCCESS
ExtractTLSTestValuesFromServerConfiguration
Extracted TLS information from authorization server configuration
registration_endpoint
{
  "testHost": "84-244-72-90.nip.io",
  "testPort": 60000
}
authorization_endpoint
{
  "testHost": "84-244-72-90.nip.io",
  "testPort": 60000
}
token_endpoint
{
  "testHost": "84-244-72-90.nip.io",
  "testPort": 60000
}
userinfo_endpoint
{
  "testHost": "84-244-72-90.nip.io",
  "testPort": 60000
}
2022-05-16 11:37:24
FetchServerKeys
Fetching server key
jwks_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/certs
2022-05-16 11:37:24
FetchServerKeys
HTTP request
request_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/certs
request_method
GET
request_headers
{
  "accept": "text/plain, application/json, application/*+json, */*",
  "content-length": "0"
}
request_body

                                
2022-05-16 11:37:25 RESPONSE
FetchServerKeys
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "cache-control": "no-cache",
  "x-xss-protection": "1; mode\u003dblock",
  "x-frame-options": "SAMEORIGIN",
  "referrer-policy": "no-referrer",
  "date": "Mon, 16 May 2022 11:37:25 GMT",
  "connection": "keep-alive",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "content-type": "application/json",
  "content-length": "4559"
}
response_body
{"keys":[{"kid":"nVJXuV18rIhJQK_ezukCg6B6ihqd_ysVRpNmmGNIJgg","kty":"RSA","alg":"PS256","use":"enc","n":"gJeVMx_ucf4OkwPjfo3QqRVGJad4MoGX0epHfzh_9JWhetahQKvU2R8I7YnWMRmdni2ZuWVdnRDdrU83FN-RGKRq8bkV59-U9UM25mrFD-27qczX_SvipPeSJfCC8BVg6IVaG0xYVJcAJyqCczhV0p36Tv3ehLhnZA_JZYgGcQznEXRawqQMQ1hKLC-cbQdXbcuzlKB-jGKUvNOPrRWkFYbcbbPMqeqv60TtQL--9X0rFxySfGbUVTDENmsJUaS5vs-cHEyst-UX6Y-lmCoTA0LZsOaH608POFmeaVB7ZmDdeGCHS_H4BCbQS7p_vI67i-IH8L5qrr_TZGabii1Ggw","e":"AQAB","x5c":["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"],"x5t":"nsamQNPuXTrs2Bh2mhtQ1p-Cs-M","x5t#S256":"g1XbSXBmnrd0nphVoyIfkix50Nsr0HqrJAvypgOzBq0"},{"kid":"RzJaSl5uXbIzduF-D5dOo6yLiqMOrdK3P_7vKZKsqrY","kty":"RSA","alg":"RS256","use":"sig","n":"hc3JDwS0TS-SX74-_FJKP9bq5LuuyrFZkxLfX6NVyyR9iEO-_WY4bnc_f9DVWEn1ygYY-K0WlVBvaPpgoEKKPxNqJ0NrgAj_xjOr-9Pqw5q8I3ziIAPTmxH0NQkVUTsCR5p62aXUEfpmTeNtqMOS9GTHZPjAuHimiEgdEY-boolGJbUwAfzpd42vDjnz2kWct80D74iUHANxLz8jJ1reyUwH1QyLF-ouHb5Kh4yHfhVd1iP0oQwPEtB3IS25NQsRyrOHJpFvooRhmzWdyceG-c2Ui670zFv3gUAwoZclkVlS9ykPvVqZyYNQ6Sl-TUNUOWppIG-VSQW15mtfWmiskw","e":"AQAB","x5c":["MIIClzCCAX8CBgGAzCPu7jANBgkqhkiG9w0BAQsFADAPMQ0wCwYDVQQDDAR0ZXN0MB4XDTIyMDUxNjA5MTA0OFoXDTMyMDUxNjA5MTIyOFowDzENMAsGA1UEAwwEdGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIXNyQ8EtE0vkl++PvxSSj/W6uS7rsqxWZMS31+jVcskfYhDvv1mOG53P3/Q1VhJ9coGGPitFpVQb2j6YKBCij8TaidDa4AI/8Yzq/vT6sOavCN84iAD05sR9DUJFVE7Akeaetml1BH6Zk3jbajDkvRkx2T4wLh4pohIHRGPm6KJRiW1MAH86XeNrw4589pFnLfNA++IlBwDcS8/Iyda3slMB9UMixfqLh2+SoeMh34VXdYj9KEMDxLQdyEtuTULEcqzhyaRb6KEYZs1ncnHhvnNlIuu9Mxb94FAMKGXJZFZUvcpD71amcmDUOkpfk1DVDlqaSBvlUkFteZrX1porJMCAwEAATANBgkqhkiG9w0BAQsFAAOCAQEABc4byb50M1IWWJgsXem0mAQAT8Zn/Q8qbVpTx2n5+uegtnetUTF4bvhlgtBrWVQSt1tPAjPo5A3uvfiSqaWmu66XzhWMXsPyFfchRdpIUZsnZCxv0upO232DWsbIURvK7oyZWIYerU5luUyUCZ0nVYPdKsfqr3bSnFfM8nSV8/mA1HWKNXUXpkJCwvqY0xUKkuvmxholp0c9GXjZ8yoz595DsaAM56CkZ1jN1wlCkkoOb8l7pFBPSjUgYmHWb4TDdgKr1XVUChP1yfWCk8ypYdBwlekLYLmBQneH/Y/sVT+pQZqtkb22ptGOy3wu4q7TJ7KW5JI/GZCT6izsRvmJKQ=="],"x5t":"a9EHlEUdeGHxtup6eQp74LCZWyk","x5t#S256":"XM6CJJcSE1YeZJ5rtNWzbhZe6FhjvVmYzxyUhflmx80"},{"kid":"3j2X9LXvxBl15lAOntwKWvoS13ZFGSskSq4qW2rv_us","kty":"RSA","alg":"PS256","use":"sig","n":"jF-GpA0T_8cZjweY69yY5oKwOwWXKIXCL4mG8PcFcdeuihPGTU3w6XV-dTQPjfZpysISmSpZKm1aEMwTh2yXIl5Oel95rNzaj-7rMI4nrZn9ruHjh_cToHxyWDI8bs_V-MSBwqbbFGltdXWUa3LFsrwRt0XKNMPzhQLciuLO0iBumF4Yc1VqmmS9buwpCqPc2qNggMp7pteZe5Lbkc-0X6zbBqkgo8wkbq31TN7cwDWxmVttxw7Mc4eUSVuROqiLgSKRCoWGYf9vIsiiXov8Q3mLaXyiQvh9gzDyWwzzAxbmVQhBxF-PVOdgGurYU0HkNjw3cr3OZkvKzbqccdYsiQ","e":"AQAB","x5c":["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"],"x5t":"TvB49qBdfskwNG8LWUYOE3z29fE","x5t#S256":"kTzfVukTOuEwsJ7ICp69-kbcipMUZ31yTNOPdQifuMk"},{"kid":"6p6LMG-CvC-c6SvkKKOP8W_Z4fTBS9Q461P9zxi2n6o","kty":"EC","alg":"ES256","use":"sig","crv":"P-256","x":"wy_EGIii551Ei-nodYzkg-S_y3ecdgTATnAwUxinhhQ","y":"LCbIl7PUYc2DtBJGRMrOt80rk3PJbJ1onUwK_82yHUw"}]}
2022-05-16 11:37:25
FetchServerKeys
Found JWK set string
jwk_string
{"keys":[{"kid":"nVJXuV18rIhJQK_ezukCg6B6ihqd_ysVRpNmmGNIJgg","kty":"RSA","alg":"PS256","use":"enc","n":"gJeVMx_ucf4OkwPjfo3QqRVGJad4MoGX0epHfzh_9JWhetahQKvU2R8I7YnWMRmdni2ZuWVdnRDdrU83FN-RGKRq8bkV59-U9UM25mrFD-27qczX_SvipPeSJfCC8BVg6IVaG0xYVJcAJyqCczhV0p36Tv3ehLhnZA_JZYgGcQznEXRawqQMQ1hKLC-cbQdXbcuzlKB-jGKUvNOPrRWkFYbcbbPMqeqv60TtQL--9X0rFxySfGbUVTDENmsJUaS5vs-cHEyst-UX6Y-lmCoTA0LZsOaH608POFmeaVB7ZmDdeGCHS_H4BCbQS7p_vI67i-IH8L5qrr_TZGabii1Ggw","e":"AQAB","x5c":["MIIClzCCAX8CBgGAzCPyBjANBgkqhkiG9w0BAQsFADAPMQ0wCwYDVQQDDAR0ZXN0MB4XDTIyMDUxNjA5MTA0OVoXDTMyMDUxNjA5MTIyOVowDzENMAsGA1UEAwwEdGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAICXlTMf7nH+DpMD436N0KkVRiWneDKBl9HqR384f/SVoXrWoUCr1NkfCO2J1jEZnZ4tmbllXZ0Q3a1PNxTfkRikavG5FefflPVDNuZqxQ/tu6nM1/0r4qT3kiXwgvAVYOiFWhtMWFSXACcqgnM4VdKd+k793oS4Z2QPyWWIBnEM5xF0WsKkDENYSiwvnG0HV23Ls5SgfoxilLzTj60VpBWG3G2zzKnqr+tE7UC/vvV9Kxccknxm1FUwxDZrCVGkub7PnBxMrLflF+mPpZgqEwNC2bDmh+tPDzhZnmlQe2Zg3Xhgh0vx+AQm0Eu6f7yOu4viB/C+aq6/02Rmm4otRoMCAwEAATANBgkqhkiG9w0BAQsFAAOCAQEAJGENeCNqIbHidimks6k9WRJaYYP0n5cRFcxh2EKKwgOJqaHJ3oaeWJ97owND+S7wl6VZLKebb6BPwaKoedtkPgSh/H4wYBW5u5reE/GkU1M7T37Zn1Xs6jsLDISJWWxDn8k+hTeAi08P0Qoymq8WnDbKplbjiPbKTtDDqEcBsXvwRHkPUrBFKzlSapWWSIspqcHwpFklfYKm9JCC6JtFdw/lCyd/0u+x/dQ/ZNhYx9WUOUtLtnqFxkWWuydQ0z6hOkfUDUokH5FhjdvfYJk8Nw82VuTm3ly3HEv59HbjOxnobzDM0pnqJfiYWRNcfJ480b55sdzMF1604bk//h0oVQ=="],"x5t":"nsamQNPuXTrs2Bh2mhtQ1p-Cs-M","x5t#S256":"g1XbSXBmnrd0nphVoyIfkix50Nsr0HqrJAvypgOzBq0"},{"kid":"RzJaSl5uXbIzduF-D5dOo6yLiqMOrdK3P_7vKZKsqrY","kty":"RSA","alg":"RS256","use":"sig","n":"hc3JDwS0TS-SX74-_FJKP9bq5LuuyrFZkxLfX6NVyyR9iEO-_WY4bnc_f9DVWEn1ygYY-K0WlVBvaPpgoEKKPxNqJ0NrgAj_xjOr-9Pqw5q8I3ziIAPTmxH0NQkVUTsCR5p62aXUEfpmTeNtqMOS9GTHZPjAuHimiEgdEY-boolGJbUwAfzpd42vDjnz2kWct80D74iUHANxLz8jJ1reyUwH1QyLF-ouHb5Kh4yHfhVd1iP0oQwPEtB3IS25NQsRyrOHJpFvooRhmzWdyceG-c2Ui670zFv3gUAwoZclkVlS9ykPvVqZyYNQ6Sl-TUNUOWppIG-VSQW15mtfWmiskw","e":"AQAB","x5c":["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"],"x5t":"a9EHlEUdeGHxtup6eQp74LCZWyk","x5t#S256":"XM6CJJcSE1YeZJ5rtNWzbhZe6FhjvVmYzxyUhflmx80"},{"kid":"3j2X9LXvxBl15lAOntwKWvoS13ZFGSskSq4qW2rv_us","kty":"RSA","alg":"PS256","use":"sig","n":"jF-GpA0T_8cZjweY69yY5oKwOwWXKIXCL4mG8PcFcdeuihPGTU3w6XV-dTQPjfZpysISmSpZKm1aEMwTh2yXIl5Oel95rNzaj-7rMI4nrZn9ruHjh_cToHxyWDI8bs_V-MSBwqbbFGltdXWUa3LFsrwRt0XKNMPzhQLciuLO0iBumF4Yc1VqmmS9buwpCqPc2qNggMp7pteZe5Lbkc-0X6zbBqkgo8wkbq31TN7cwDWxmVttxw7Mc4eUSVuROqiLgSKRCoWGYf9vIsiiXov8Q3mLaXyiQvh9gzDyWwzzAxbmVQhBxF-PVOdgGurYU0HkNjw3cr3OZkvKzbqccdYsiQ","e":"AQAB","x5c":["MIIClzCCAX8CBgGAzCPxHDANBgkqhkiG9w0BAQsFADAPMQ0wCwYDVQQDDAR0ZXN0MB4XDTIyMDUxNjA5MTA0OVoXDTMyMDUxNjA5MTIyOVowDzENMAsGA1UEAwwEdGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIxfhqQNE//HGY8HmOvcmOaCsDsFlyiFwi+JhvD3BXHXrooTxk1N8Ol1fnU0D432acrCEpkqWSptWhDME4dslyJeTnpfeazc2o/u6zCOJ62Z/a7h44f3E6B8clgyPG7P1fjEgcKm2xRpbXV1lGtyxbK8EbdFyjTD84UC3IriztIgbpheGHNVappkvW7sKQqj3NqjYIDKe6bXmXuS25HPtF+s2wapIKPMJG6t9Uze3MA1sZlbbccOzHOHlElbkTqoi4EikQqFhmH/byLIol6L/EN5i2l8okL4fYMw8lsM8wMW5lUIQcRfj1TnYBrq2FNB5DY8N3K9zmZLys26nHHWLIkCAwEAATANBgkqhkiG9w0BAQsFAAOCAQEAR/S3MzoIbclxpeaKYQ40BVKdzvIGPH6okrW4IUUL/DSs4hiwf2yQ8r0oSvbXuEg23NKMYlH0YeLmMrFhoq0TnA98OP346YX7ladE5US+lXQC1At3B6r7hUY7YMcz6Fw6AnqQK8O3Qw8TDZRfd+TJzM9jBXZxKP/gj8+70uH7gAP+gMnt2wwgbG/yl433/xGByrDz0lntisQcn7YbvzFnpvSqcWHAmxNnNM+H817FNvfQPg4GU8PP2Pblzk24i6qT0v3emMg5eAk0bFef5RevPWFW53ti0fWXuP5CHQZNMeFB+6ZqbWDaX43V3AC8CGnQL0zzNXXFzGRfFeoBJLAzzA=="],"x5t":"TvB49qBdfskwNG8LWUYOE3z29fE","x5t#S256":"kTzfVukTOuEwsJ7ICp69-kbcipMUZ31yTNOPdQifuMk"},{"kid":"6p6LMG-CvC-c6SvkKKOP8W_Z4fTBS9Q461P9zxi2n6o","kty":"EC","alg":"ES256","use":"sig","crv":"P-256","x":"wy_EGIii551Ei-nodYzkg-S_y3ecdgTATnAwUxinhhQ","y":"LCbIl7PUYc2DtBJGRMrOt80rk3PJbJ1onUwK_82yHUw"}]}
2022-05-16 11:37:25 SUCCESS
FetchServerKeys
Found server JWK set
server_jwks
{
  "keys": [
    {
      "kid": "nVJXuV18rIhJQK_ezukCg6B6ihqd_ysVRpNmmGNIJgg",
      "kty": "RSA",
      "alg": "PS256",
      "use": "enc",
      "n": "gJeVMx_ucf4OkwPjfo3QqRVGJad4MoGX0epHfzh_9JWhetahQKvU2R8I7YnWMRmdni2ZuWVdnRDdrU83FN-RGKRq8bkV59-U9UM25mrFD-27qczX_SvipPeSJfCC8BVg6IVaG0xYVJcAJyqCczhV0p36Tv3ehLhnZA_JZYgGcQznEXRawqQMQ1hKLC-cbQdXbcuzlKB-jGKUvNOPrRWkFYbcbbPMqeqv60TtQL--9X0rFxySfGbUVTDENmsJUaS5vs-cHEyst-UX6Y-lmCoTA0LZsOaH608POFmeaVB7ZmDdeGCHS_H4BCbQS7p_vI67i-IH8L5qrr_TZGabii1Ggw",
      "e": "AQAB",
      "x5c": [
        "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\u003d\u003d"
      ],
      "x5t": "nsamQNPuXTrs2Bh2mhtQ1p-Cs-M",
      "x5t#S256": "g1XbSXBmnrd0nphVoyIfkix50Nsr0HqrJAvypgOzBq0"
    },
    {
      "kid": "RzJaSl5uXbIzduF-D5dOo6yLiqMOrdK3P_7vKZKsqrY",
      "kty": "RSA",
      "alg": "RS256",
      "use": "sig",
      "n": "hc3JDwS0TS-SX74-_FJKP9bq5LuuyrFZkxLfX6NVyyR9iEO-_WY4bnc_f9DVWEn1ygYY-K0WlVBvaPpgoEKKPxNqJ0NrgAj_xjOr-9Pqw5q8I3ziIAPTmxH0NQkVUTsCR5p62aXUEfpmTeNtqMOS9GTHZPjAuHimiEgdEY-boolGJbUwAfzpd42vDjnz2kWct80D74iUHANxLz8jJ1reyUwH1QyLF-ouHb5Kh4yHfhVd1iP0oQwPEtB3IS25NQsRyrOHJpFvooRhmzWdyceG-c2Ui670zFv3gUAwoZclkVlS9ykPvVqZyYNQ6Sl-TUNUOWppIG-VSQW15mtfWmiskw",
      "e": "AQAB",
      "x5c": [
        "MIIClzCCAX8CBgGAzCPu7jANBgkqhkiG9w0BAQsFADAPMQ0wCwYDVQQDDAR0ZXN0MB4XDTIyMDUxNjA5MTA0OFoXDTMyMDUxNjA5MTIyOFowDzENMAsGA1UEAwwEdGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIXNyQ8EtE0vkl++PvxSSj/W6uS7rsqxWZMS31+jVcskfYhDvv1mOG53P3/Q1VhJ9coGGPitFpVQb2j6YKBCij8TaidDa4AI/8Yzq/vT6sOavCN84iAD05sR9DUJFVE7Akeaetml1BH6Zk3jbajDkvRkx2T4wLh4pohIHRGPm6KJRiW1MAH86XeNrw4589pFnLfNA++IlBwDcS8/Iyda3slMB9UMixfqLh2+SoeMh34VXdYj9KEMDxLQdyEtuTULEcqzhyaRb6KEYZs1ncnHhvnNlIuu9Mxb94FAMKGXJZFZUvcpD71amcmDUOkpfk1DVDlqaSBvlUkFteZrX1porJMCAwEAATANBgkqhkiG9w0BAQsFAAOCAQEABc4byb50M1IWWJgsXem0mAQAT8Zn/Q8qbVpTx2n5+uegtnetUTF4bvhlgtBrWVQSt1tPAjPo5A3uvfiSqaWmu66XzhWMXsPyFfchRdpIUZsnZCxv0upO232DWsbIURvK7oyZWIYerU5luUyUCZ0nVYPdKsfqr3bSnFfM8nSV8/mA1HWKNXUXpkJCwvqY0xUKkuvmxholp0c9GXjZ8yoz595DsaAM56CkZ1jN1wlCkkoOb8l7pFBPSjUgYmHWb4TDdgKr1XVUChP1yfWCk8ypYdBwlekLYLmBQneH/Y/sVT+pQZqtkb22ptGOy3wu4q7TJ7KW5JI/GZCT6izsRvmJKQ\u003d\u003d"
      ],
      "x5t": "a9EHlEUdeGHxtup6eQp74LCZWyk",
      "x5t#S256": "XM6CJJcSE1YeZJ5rtNWzbhZe6FhjvVmYzxyUhflmx80"
    },
    {
      "kid": "3j2X9LXvxBl15lAOntwKWvoS13ZFGSskSq4qW2rv_us",
      "kty": "RSA",
      "alg": "PS256",
      "use": "sig",
      "n": "jF-GpA0T_8cZjweY69yY5oKwOwWXKIXCL4mG8PcFcdeuihPGTU3w6XV-dTQPjfZpysISmSpZKm1aEMwTh2yXIl5Oel95rNzaj-7rMI4nrZn9ruHjh_cToHxyWDI8bs_V-MSBwqbbFGltdXWUa3LFsrwRt0XKNMPzhQLciuLO0iBumF4Yc1VqmmS9buwpCqPc2qNggMp7pteZe5Lbkc-0X6zbBqkgo8wkbq31TN7cwDWxmVttxw7Mc4eUSVuROqiLgSKRCoWGYf9vIsiiXov8Q3mLaXyiQvh9gzDyWwzzAxbmVQhBxF-PVOdgGurYU0HkNjw3cr3OZkvKzbqccdYsiQ",
      "e": "AQAB",
      "x5c": [
        "MIIClzCCAX8CBgGAzCPxHDANBgkqhkiG9w0BAQsFADAPMQ0wCwYDVQQDDAR0ZXN0MB4XDTIyMDUxNjA5MTA0OVoXDTMyMDUxNjA5MTIyOVowDzENMAsGA1UEAwwEdGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIxfhqQNE//HGY8HmOvcmOaCsDsFlyiFwi+JhvD3BXHXrooTxk1N8Ol1fnU0D432acrCEpkqWSptWhDME4dslyJeTnpfeazc2o/u6zCOJ62Z/a7h44f3E6B8clgyPG7P1fjEgcKm2xRpbXV1lGtyxbK8EbdFyjTD84UC3IriztIgbpheGHNVappkvW7sKQqj3NqjYIDKe6bXmXuS25HPtF+s2wapIKPMJG6t9Uze3MA1sZlbbccOzHOHlElbkTqoi4EikQqFhmH/byLIol6L/EN5i2l8okL4fYMw8lsM8wMW5lUIQcRfj1TnYBrq2FNB5DY8N3K9zmZLys26nHHWLIkCAwEAATANBgkqhkiG9w0BAQsFAAOCAQEAR/S3MzoIbclxpeaKYQ40BVKdzvIGPH6okrW4IUUL/DSs4hiwf2yQ8r0oSvbXuEg23NKMYlH0YeLmMrFhoq0TnA98OP346YX7ladE5US+lXQC1At3B6r7hUY7YMcz6Fw6AnqQK8O3Qw8TDZRfd+TJzM9jBXZxKP/gj8+70uH7gAP+gMnt2wwgbG/yl433/xGByrDz0lntisQcn7YbvzFnpvSqcWHAmxNnNM+H817FNvfQPg4GU8PP2Pblzk24i6qT0v3emMg5eAk0bFef5RevPWFW53ti0fWXuP5CHQZNMeFB+6ZqbWDaX43V3AC8CGnQL0zzNXXFzGRfFeoBJLAzzA\u003d\u003d"
      ],
      "x5t": "TvB49qBdfskwNG8LWUYOE3z29fE",
      "x5t#S256": "kTzfVukTOuEwsJ7ICp69-kbcipMUZ31yTNOPdQifuMk"
    },
    {
      "kid": "6p6LMG-CvC-c6SvkKKOP8W_Z4fTBS9Q461P9zxi2n6o",
      "kty": "EC",
      "alg": "ES256",
      "use": "sig",
      "crv": "P-256",
      "x": "wy_EGIii551Ei-nodYzkg-S_y3ecdgTATnAwUxinhhQ",
      "y": "LCbIl7PUYc2DtBJGRMrOt80rk3PJbJ1onUwK_82yHUw"
    }
  ]
}
2022-05-16 11:37:25 SUCCESS
CheckServerKeysIsValid
Server JWKs is valid
server_jwks
{
  "keys": [
    {
      "kid": "nVJXuV18rIhJQK_ezukCg6B6ihqd_ysVRpNmmGNIJgg",
      "kty": "RSA",
      "alg": "PS256",
      "use": "enc",
      "n": "gJeVMx_ucf4OkwPjfo3QqRVGJad4MoGX0epHfzh_9JWhetahQKvU2R8I7YnWMRmdni2ZuWVdnRDdrU83FN-RGKRq8bkV59-U9UM25mrFD-27qczX_SvipPeSJfCC8BVg6IVaG0xYVJcAJyqCczhV0p36Tv3ehLhnZA_JZYgGcQznEXRawqQMQ1hKLC-cbQdXbcuzlKB-jGKUvNOPrRWkFYbcbbPMqeqv60TtQL--9X0rFxySfGbUVTDENmsJUaS5vs-cHEyst-UX6Y-lmCoTA0LZsOaH608POFmeaVB7ZmDdeGCHS_H4BCbQS7p_vI67i-IH8L5qrr_TZGabii1Ggw",
      "e": "AQAB",
      "x5c": [
        "MIIClzCCAX8CBgGAzCPyBjANBgkqhkiG9w0BAQsFADAPMQ0wCwYDVQQDDAR0ZXN0MB4XDTIyMDUxNjA5MTA0OVoXDTMyMDUxNjA5MTIyOVowDzENMAsGA1UEAwwEdGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAICXlTMf7nH+DpMD436N0KkVRiWneDKBl9HqR384f/SVoXrWoUCr1NkfCO2J1jEZnZ4tmbllXZ0Q3a1PNxTfkRikavG5FefflPVDNuZqxQ/tu6nM1/0r4qT3kiXwgvAVYOiFWhtMWFSXACcqgnM4VdKd+k793oS4Z2QPyWWIBnEM5xF0WsKkDENYSiwvnG0HV23Ls5SgfoxilLzTj60VpBWG3G2zzKnqr+tE7UC/vvV9Kxccknxm1FUwxDZrCVGkub7PnBxMrLflF+mPpZgqEwNC2bDmh+tPDzhZnmlQe2Zg3Xhgh0vx+AQm0Eu6f7yOu4viB/C+aq6/02Rmm4otRoMCAwEAATANBgkqhkiG9w0BAQsFAAOCAQEAJGENeCNqIbHidimks6k9WRJaYYP0n5cRFcxh2EKKwgOJqaHJ3oaeWJ97owND+S7wl6VZLKebb6BPwaKoedtkPgSh/H4wYBW5u5reE/GkU1M7T37Zn1Xs6jsLDISJWWxDn8k+hTeAi08P0Qoymq8WnDbKplbjiPbKTtDDqEcBsXvwRHkPUrBFKzlSapWWSIspqcHwpFklfYKm9JCC6JtFdw/lCyd/0u+x/dQ/ZNhYx9WUOUtLtnqFxkWWuydQ0z6hOkfUDUokH5FhjdvfYJk8Nw82VuTm3ly3HEv59HbjOxnobzDM0pnqJfiYWRNcfJ480b55sdzMF1604bk//h0oVQ\u003d\u003d"
      ],
      "x5t": "nsamQNPuXTrs2Bh2mhtQ1p-Cs-M",
      "x5t#S256": "g1XbSXBmnrd0nphVoyIfkix50Nsr0HqrJAvypgOzBq0"
    },
    {
      "kid": "RzJaSl5uXbIzduF-D5dOo6yLiqMOrdK3P_7vKZKsqrY",
      "kty": "RSA",
      "alg": "RS256",
      "use": "sig",
      "n": "hc3JDwS0TS-SX74-_FJKP9bq5LuuyrFZkxLfX6NVyyR9iEO-_WY4bnc_f9DVWEn1ygYY-K0WlVBvaPpgoEKKPxNqJ0NrgAj_xjOr-9Pqw5q8I3ziIAPTmxH0NQkVUTsCR5p62aXUEfpmTeNtqMOS9GTHZPjAuHimiEgdEY-boolGJbUwAfzpd42vDjnz2kWct80D74iUHANxLz8jJ1reyUwH1QyLF-ouHb5Kh4yHfhVd1iP0oQwPEtB3IS25NQsRyrOHJpFvooRhmzWdyceG-c2Ui670zFv3gUAwoZclkVlS9ykPvVqZyYNQ6Sl-TUNUOWppIG-VSQW15mtfWmiskw",
      "e": "AQAB",
      "x5c": [
        "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\u003d\u003d"
      ],
      "x5t": "a9EHlEUdeGHxtup6eQp74LCZWyk",
      "x5t#S256": "XM6CJJcSE1YeZJ5rtNWzbhZe6FhjvVmYzxyUhflmx80"
    },
    {
      "kid": "3j2X9LXvxBl15lAOntwKWvoS13ZFGSskSq4qW2rv_us",
      "kty": "RSA",
      "alg": "PS256",
      "use": "sig",
      "n": "jF-GpA0T_8cZjweY69yY5oKwOwWXKIXCL4mG8PcFcdeuihPGTU3w6XV-dTQPjfZpysISmSpZKm1aEMwTh2yXIl5Oel95rNzaj-7rMI4nrZn9ruHjh_cToHxyWDI8bs_V-MSBwqbbFGltdXWUa3LFsrwRt0XKNMPzhQLciuLO0iBumF4Yc1VqmmS9buwpCqPc2qNggMp7pteZe5Lbkc-0X6zbBqkgo8wkbq31TN7cwDWxmVttxw7Mc4eUSVuROqiLgSKRCoWGYf9vIsiiXov8Q3mLaXyiQvh9gzDyWwzzAxbmVQhBxF-PVOdgGurYU0HkNjw3cr3OZkvKzbqccdYsiQ",
      "e": "AQAB",
      "x5c": [
        "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\u003d\u003d"
      ],
      "x5t": "TvB49qBdfskwNG8LWUYOE3z29fE",
      "x5t#S256": "kTzfVukTOuEwsJ7ICp69-kbcipMUZ31yTNOPdQifuMk"
    },
    {
      "kid": "6p6LMG-CvC-c6SvkKKOP8W_Z4fTBS9Q461P9zxi2n6o",
      "kty": "EC",
      "alg": "ES256",
      "use": "sig",
      "crv": "P-256",
      "x": "wy_EGIii551Ei-nodYzkg-S_y3ecdgTATnAwUxinhhQ",
      "y": "LCbIl7PUYc2DtBJGRMrOt80rk3PJbJ1onUwK_82yHUw"
    }
  ]
}
2022-05-16 11:37:25 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2022-05-16 11:37:25 SUCCESS
CheckForKeyIdInServerJWKs
All keys contain kids
2022-05-16 11:37:25 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2022-05-16 11:37:25 SUCCESS
EnsureServerJwksDoesNotContainPrivateOrSymmetricKeys
Jwks does not contain any private or symmetric keys
2022-05-16 11:37:25 SUCCESS
CreatePostLogoutRedirectUri
Created post_logout_redirect_uri URI
post_logout_redirect_uri
https://www.certification.openid.net/test/a/keycloak/post_logout_redirect
2022-05-16 11:37:25 SUCCESS
GetStaticClientConfiguration
Found a static client object
client_id
client1-rp-initiated-logout
client_secret
hYrN6jbdLq6WtfxjhVxmdF3vVdOgNK9p
2022-05-16 11:37:25 INFO
ValidateClientJWKsPrivatePart
Skipped evaluation due to missing required element: client jwks
path
jwks
mapped
object
client
2022-05-16 11:37:25 INFO
ExtractJWKsFromStaticClientConfiguration
Skipped evaluation due to missing required element: client jwks
path
jwks
mapped
object
client
2022-05-16 11:37:25 INFO
CheckDistinctKeyIdValueInClientJWKs
Skipped evaluation due to missing required element: client jwks
path
jwks
mapped
object
client
2022-05-16 11:37:25
SetScopeInClientConfigurationToOpenId
Set scope in client configuration to "openid"
scope
openid
2022-05-16 11:37:25 SUCCESS
EnsureServerConfigurationSupportsClientSecretBasic
Contents of 'token_endpoint_auth_methods_supported' in discovery document matches expectations.
actual
[
  "private_key_jwt",
  "client_secret_basic",
  "client_secret_post",
  "tls_client_auth",
  "client_secret_jwt"
]
expected
[
  "client_secret_basic"
]
minimum_matches_required
1
2022-05-16 11:37:25 SUCCESS
SetProtectedResourceUrlToUserInfoEndpoint
userinfo_endpoint will be used to test access token. The user info is not a mandatory to implement feature in the OpenID Connect specification, but is mandatory for certification.
protected_resource_url
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/userinfo
2022-05-16 11:37:25
oidcc-rp-initiated-logout-bad-post-logout-redirect-uri
Setup Done
Make request to authorization endpoint
2022-05-16 11:37:25 SUCCESS
CreateAuthorizationEndpointRequestFromClientInformation
Created authorization endpoint request
client_id
client1-rp-initiated-logout
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
scope
openid
2022-05-16 11:37:25
CreateRandomStateValue
Created state value
requested_state_length
128
state
V2tBp0AMzYGFfzHcNOSh8zjo58Y0cU9pyBWIKbm8s2RWT7ZA2lQGs9yDTUWDaGLWWksG1Q6RoS31lHOdYEOdVp35q6ZJHTVZmk3L3JkpwtsVfyBq7C94kr0cUOgQGagN
2022-05-16 11:37:25 SUCCESS
AddStateToAuthorizationEndpointRequest
Added state parameter to request
client_id
client1-rp-initiated-logout
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
scope
openid
state
V2tBp0AMzYGFfzHcNOSh8zjo58Y0cU9pyBWIKbm8s2RWT7ZA2lQGs9yDTUWDaGLWWksG1Q6RoS31lHOdYEOdVp35q6ZJHTVZmk3L3JkpwtsVfyBq7C94kr0cUOgQGagN
2022-05-16 11:37:25
CreateRandomNonceValue
Created nonce value
requested_nonce_length
10
nonce
QAfrwi7H6p
2022-05-16 11:37:25 SUCCESS
AddNonceToAuthorizationEndpointRequest
Added nonce parameter to request
client_id
client1-rp-initiated-logout
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
scope
openid
state
V2tBp0AMzYGFfzHcNOSh8zjo58Y0cU9pyBWIKbm8s2RWT7ZA2lQGs9yDTUWDaGLWWksG1Q6RoS31lHOdYEOdVp35q6ZJHTVZmk3L3JkpwtsVfyBq7C94kr0cUOgQGagN
nonce
QAfrwi7H6p
2022-05-16 11:37:25 SUCCESS
SetAuthorizationEndpointRequestResponseTypeFromEnvironment
Added response_type parameter to request
client_id
client1-rp-initiated-logout
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
scope
openid
state
V2tBp0AMzYGFfzHcNOSh8zjo58Y0cU9pyBWIKbm8s2RWT7ZA2lQGs9yDTUWDaGLWWksG1Q6RoS31lHOdYEOdVp35q6ZJHTVZmk3L3JkpwtsVfyBq7C94kr0cUOgQGagN
nonce
QAfrwi7H6p
response_type
id_token
2022-05-16 11:37:25 SUCCESS
BuildPlainRedirectToAuthorizationEndpoint
Sending to authorization endpoint
auth_request
{
  "client_id": "client1-rp-initiated-logout",
  "redirect_uri": "https://www.certification.openid.net/test/a/keycloak/callback",
  "scope": "openid",
  "state": "V2tBp0AMzYGFfzHcNOSh8zjo58Y0cU9pyBWIKbm8s2RWT7ZA2lQGs9yDTUWDaGLWWksG1Q6RoS31lHOdYEOdVp35q6ZJHTVZmk3L3JkpwtsVfyBq7C94kr0cUOgQGagN",
  "nonce": "QAfrwi7H6p",
  "response_type": "id_token"
}
redirect_to_authorization_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth?client_id=client1-rp-initiated-logout&redirect_uri=https://www.certification.openid.net/test/a/keycloak/callback&scope=openid&state=V2tBp0AMzYGFfzHcNOSh8zjo58Y0cU9pyBWIKbm8s2RWT7ZA2lQGs9yDTUWDaGLWWksG1Q6RoS31lHOdYEOdVp35q6ZJHTVZmk3L3JkpwtsVfyBq7C94kr0cUOgQGagN&nonce=QAfrwi7H6p&response_type=id_token
2022-05-16 11:37:25 REDIRECT
oidcc-rp-initiated-logout-bad-post-logout-redirect-uri
Redirecting to authorization endpoint
redirect_to
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth?client_id=client1-rp-initiated-logout&redirect_uri=https://www.certification.openid.net/test/a/keycloak/callback&scope=openid&state=V2tBp0AMzYGFfzHcNOSh8zjo58Y0cU9pyBWIKbm8s2RWT7ZA2lQGs9yDTUWDaGLWWksG1Q6RoS31lHOdYEOdVp35q6ZJHTVZmk3L3JkpwtsVfyBq7C94kr0cUOgQGagN&nonce=QAfrwi7H6p&response_type=id_token
2022-05-16 11:37:33 INCOMING
oidcc-rp-initiated-logout-bad-post-logout-redirect-uri
Incoming HTTP request to /test/a/keycloak/callback
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:100.0) Gecko/20100101 Firefox/100.0",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/avif,image/webp,*/*;q\u003d0.8",
  "accept-language": "en-US,en;q\u003d0.5",
  "accept-encoding": "gzip, deflate, br",
  "cookie": "__utma\u003d201319536.747058366.1611919072.1652681365.1652688969.137; __utmz\u003d201319536.1647870296.126.44.utmcsr\u003dgoogle|utmccn\u003d(organic)|utmcmd\u003dorganic|utmctr\u003d(not%20provided); _ga\u003dGA1.2.747058366.1611919072; __utmc\u003d201319536; JSESSIONID\u003d63EE1707428F3F9812307D8819923D9B",
  "upgrade-insecure-requests": "1",
  "sec-fetch-dest": "document",
  "sec-fetch-mode": "navigate",
  "sec-fetch-site": "none",
  "sec-fetch-user": "?1",
  "connection": "close"
}
incoming_path
/test/a/keycloak/callback
incoming_body_form_params
incoming_method
GET
incoming_tls_version
TLSv1.2
incoming_tls_cipher
ECDHE-RSA-AES128-GCM-SHA256
incoming_tls_cert
incoming_body_json
incoming_query_string_params
{}
incoming_body
2022-05-16 11:37:33 SUCCESS
CreateRandomImplicitSubmitUrl
Created random implicit submission URL
implicit_submit
{
  "path": "implicit/vMjFXnE06P1ZCwyMvp4d",
  "fullUrl": "https://www.certification.openid.net/test/a/keycloak/implicit/vMjFXnE06P1ZCwyMvp4d"
}
2022-05-16 11:37:33 OUTGOING
oidcc-rp-initiated-logout-bad-post-logout-redirect-uri
Response to HTTP request to test instance PQMCw8hvVlTBRXe
outgoing
ModelAndView [view="implicitCallback"; model={implicitSubmitUrl=https://www.certification.openid.net/test/a/keycloak/implicit/vMjFXnE06P1ZCwyMvp4d, returnUrl=/log-detail.html?log=PQMCw8hvVlTBRXe}]
outgoing_path
callback
2022-05-16 11:37:33 INCOMING
oidcc-rp-initiated-logout-bad-post-logout-redirect-uri
Incoming HTTP request to /test/a/keycloak/implicit/vMjFXnE06P1ZCwyMvp4d
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:100.0) Gecko/20100101 Firefox/100.0",
  "accept": "*/*",
  "accept-language": "en-US,en;q\u003d0.5",
  "accept-encoding": "gzip, deflate, br",
  "content-type": "text/plain",
  "x-requested-with": "XMLHttpRequest",
  "origin": "https://www.certification.openid.net",
  "referer": "https://www.certification.openid.net/test/a/keycloak/callback",
  "cookie": "__utma\u003d201319536.747058366.1611919072.1652681365.1652688969.137; __utmz\u003d201319536.1647870296.126.44.utmcsr\u003dgoogle|utmccn\u003d(organic)|utmcmd\u003dorganic|utmctr\u003d(not%20provided); _ga\u003dGA1.2.747058366.1611919072; __utmc\u003d201319536; JSESSIONID\u003d63EE1707428F3F9812307D8819923D9B",
  "sec-fetch-dest": "empty",
  "sec-fetch-mode": "cors",
  "sec-fetch-site": "same-origin",
  "connection": "close",
  "content-length": "989"
}
incoming_path
/test/a/keycloak/implicit/vMjFXnE06P1ZCwyMvp4d
incoming_body_form_params
incoming_method
POST
incoming_tls_version
TLSv1.2
incoming_tls_cipher
ECDHE-RSA-AES128-GCM-SHA256
incoming_tls_cert
incoming_body_json
incoming_query_string_params
{}
incoming_body
#state=V2tBp0AMzYGFfzHcNOSh8zjo58Y0cU9pyBWIKbm8s2RWT7ZA2lQGs9yDTUWDaGLWWksG1Q6RoS31lHOdYEOdVp35q6ZJHTVZmk3L3JkpwtsVfyBq7C94kr0cUOgQGagN&session_state=cb9b2ab8-393f-425a-8b95-86289b2436a3&id_token=eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.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.ePQicsMYqOielPtNnitVtJX74_9x3YYcPYScra2fpwDMEdEd82gBiYp9mD6x-w5FCJVQDB-PyLtrFzGKqRENoA
2022-05-16 11:37:33 OUTGOING
oidcc-rp-initiated-logout-bad-post-logout-redirect-uri
Response to HTTP request to test instance PQMCw8hvVlTBRXe
outgoing_status_code
204
outgoing_headers
{}
outgoing_body

                                
outgoing_path
implicit/vMjFXnE06P1ZCwyMvp4d
2022-05-16 11:37:33
ExtractImplicitHashToCallbackResponse
Extracted response from URL fragment
parameters
[
  {
    "name": "state",
    "value": "V2tBp0AMzYGFfzHcNOSh8zjo58Y0cU9pyBWIKbm8s2RWT7ZA2lQGs9yDTUWDaGLWWksG1Q6RoS31lHOdYEOdVp35q6ZJHTVZmk3L3JkpwtsVfyBq7C94kr0cUOgQGagN"
  },
  {
    "name": "session_state",
    "value": "cb9b2ab8-393f-425a-8b95-86289b2436a3"
  },
  {
    "name": "id_token",
    "value": "eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.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.ePQicsMYqOielPtNnitVtJX74_9x3YYcPYScra2fpwDMEdEd82gBiYp9mD6x-w5FCJVQDB-PyLtrFzGKqRENoA"
  }
]
2022-05-16 11:37:33 SUCCESS
ExtractImplicitHashToCallbackResponse
Extracted the hash values
state
V2tBp0AMzYGFfzHcNOSh8zjo58Y0cU9pyBWIKbm8s2RWT7ZA2lQGs9yDTUWDaGLWWksG1Q6RoS31lHOdYEOdVp35q6ZJHTVZmk3L3JkpwtsVfyBq7C94kr0cUOgQGagN
session_state
cb9b2ab8-393f-425a-8b95-86289b2436a3
id_token
eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.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.ePQicsMYqOielPtNnitVtJX74_9x3YYcPYScra2fpwDMEdEd82gBiYp9mD6x-w5FCJVQDB-PyLtrFzGKqRENoA
2022-05-16 11:37:33 REDIRECT-IN
oidcc-rp-initiated-logout-bad-post-logout-redirect-uri
Authorization endpoint response captured
url_query
{}
headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:100.0) Gecko/20100101 Firefox/100.0",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/avif,image/webp,*/*;q\u003d0.8",
  "accept-language": "en-US,en;q\u003d0.5",
  "accept-encoding": "gzip, deflate, br",
  "cookie": "__utma\u003d201319536.747058366.1611919072.1652681365.1652688969.137; __utmz\u003d201319536.1647870296.126.44.utmcsr\u003dgoogle|utmccn\u003d(organic)|utmcmd\u003dorganic|utmctr\u003d(not%20provided); _ga\u003dGA1.2.747058366.1611919072; __utmc\u003d201319536; JSESSIONID\u003d63EE1707428F3F9812307D8819923D9B",
  "upgrade-insecure-requests": "1",
  "sec-fetch-dest": "document",
  "sec-fetch-mode": "navigate",
  "sec-fetch-site": "none",
  "sec-fetch-user": "?1",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "x-forwarded-proto": "https",
  "x-forwarded-port": "443",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
http_method
GET
url_fragment
{
  "state": "V2tBp0AMzYGFfzHcNOSh8zjo58Y0cU9pyBWIKbm8s2RWT7ZA2lQGs9yDTUWDaGLWWksG1Q6RoS31lHOdYEOdVp35q6ZJHTVZmk3L3JkpwtsVfyBq7C94kr0cUOgQGagN",
  "session_state": "cb9b2ab8-393f-425a-8b95-86289b2436a3",
  "id_token": "eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.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.ePQicsMYqOielPtNnitVtJX74_9x3YYcPYScra2fpwDMEdEd82gBiYp9mD6x-w5FCJVQDB-PyLtrFzGKqRENoA"
}
post_body
Verify authorization endpoint response
2022-05-16 11:37:33 SUCCESS
RejectAuthCodeInUrlQuery
Authorization code is not present in URL query returned from authorization endpoint
2022-05-16 11:37:33 SUCCESS
RejectErrorInUrlQuery
'error' is not present in URL query returned from authorization endpoint
2022-05-16 11:37:33 SUCCESS
CheckMatchingCallbackParameters
Callback parameters successfully verified
2022-05-16 11:37:33
ValidateIssInAuthorizationResponse
No 'iss' value in authorization response.
2022-05-16 11:37:33 SUCCESS
CheckIfAuthorizationEndpointError
No error from authorization endpoint
2022-05-16 11:37:33 SUCCESS
CheckStateInAuthorizationResponse
State in response correctly returned
state
V2tBp0AMzYGFfzHcNOSh8zjo58Y0cU9pyBWIKbm8s2RWT7ZA2lQGs9yDTUWDaGLWWksG1Q6RoS31lHOdYEOdVp35q6ZJHTVZmk3L3JkpwtsVfyBq7C94kr0cUOgQGagN
2022-05-16 11:37:33 SUCCESS
ExtractIdTokenFromAuthorizationResponse
Found and parsed the id_token from authorization_endpoint_response
value
eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.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.ePQicsMYqOielPtNnitVtJX74_9x3YYcPYScra2fpwDMEdEd82gBiYp9mD6x-w5FCJVQDB-PyLtrFzGKqRENoA
header
{
  "kid": "6p6LMG-CvC-c6SvkKKOP8W_Z4fTBS9Q461P9zxi2n6o",
  "typ": "JWT",
  "alg": "ES256"
}
claims
{
  "sub": "3ecdcecd-43dc-4dc9-aa1c-b9791fcf730f",
  "iss": "https://84-244-72-90.nip.io:60000/auth/realms/test",
  "typ": "ID",
  "nonce": "QAfrwi7H6p",
  "sid": "cb9b2ab8-393f-425a-8b95-86289b2436a3",
  "aud": "client1-rp-initiated-logout",
  "s_hash": "QsI13MuNw29ZOCNUr2KDZg",
  "azp": "client1-rp-initiated-logout",
  "auth_time": 1652701053,
  "exp": 1652701953,
  "session_state": "cb9b2ab8-393f-425a-8b95-86289b2436a3",
  "iat": 1652701053,
  "jti": "395a761d-3ee6-4b7d-a2a6-07ca6003b2f5"
}
2022-05-16 11:37:33 SUCCESS
ValidateIdToken
ID token iss, aud, exp, iat, auth_time, acr & nbf claims passed validation checks
2022-05-16 11:37:33 SUCCESS
ValidateIdTokenNonce
Nonce values match
nonce
QAfrwi7H6p
2022-05-16 11:37:33 SUCCESS
ValidateIdTokenACRClaimAgainstRequest
Nothing to check; the conformance suite did not request an acr claim in request object
2022-05-16 11:37:33 SUCCESS
ValidateIdTokenSignature
id_token signature validated
id_token
eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.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.ePQicsMYqOielPtNnitVtJX74_9x3YYcPYScra2fpwDMEdEd82gBiYp9mD6x-w5FCJVQDB-PyLtrFzGKqRENoA
2022-05-16 11:37:33 SUCCESS
ValidateIdTokenSignatureUsingKid
id_token signature validated
id_token
eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.eyJleHAiOjE2NTI3MDE5NTMsImlhdCI6MTY1MjcwMTA1MywiYXV0aF90aW1lIjoxNjUyNzAxMDUzLCJqdGkiOiIzOTVhNzYxZC0zZWU2LTRiN2QtYTJhNi0wN2NhNjAwM2IyZjUiLCJpc3MiOiJodHRwczovLzg0LTI0NC03Mi05MC5uaXAuaW86NjAwMDAvYXV0aC9yZWFsbXMvdGVzdCIsImF1ZCI6ImNsaWVudDEtcnAtaW5pdGlhdGVkLWxvZ291dCIsInN1YiI6IjNlY2RjZWNkLTQzZGMtNGRjOS1hYTFjLWI5NzkxZmNmNzMwZiIsInR5cCI6IklEIiwiYXpwIjoiY2xpZW50MS1ycC1pbml0aWF0ZWQtbG9nb3V0Iiwibm9uY2UiOiJRQWZyd2k3SDZwIiwic2Vzc2lvbl9zdGF0ZSI6ImNiOWIyYWI4LTM5M2YtNDI1YS04Yjk1LTg2Mjg5YjI0MzZhMyIsInNfaGFzaCI6IlFzSTEzTXVOdzI5Wk9DTlVyMktEWmciLCJzaWQiOiJjYjliMmFiOC0zOTNmLTQyNWEtOGI5NS04NjI4OWIyNDM2YTMifQ.ePQicsMYqOielPtNnitVtJX74_9x3YYcPYScra2fpwDMEdEd82gBiYp9mD6x-w5FCJVQDB-PyLtrFzGKqRENoA
2022-05-16 11:37:33 SUCCESS
CheckForSubjectInIdToken
Found 'sub' in id_token
sub
3ecdcecd-43dc-4dc9-aa1c-b9791fcf730f
2022-05-16 11:37:33 INFO
FAPIValidateEncryptedIdTokenHasKid
Skipped evaluation due to missing required element: id_token jwe_header
path
jwe_header
mapped
object
id_token
Redirect to end session endpoint & wait for response
2022-05-16 11:37:33
CreateRandomEndSessionState
Created end_session_state value
end_session_state
tIidDIiEhBjprtbrRcRzWmcauFAtYezOWsGYLDjLxrxVoveZBl2579315022~[}_^/:#.@~&{\.[}^~#":@_\^[.~*
2022-05-16 11:37:33 SUCCESS
CreateEndSessionEndpointRequest
Created end session endpoint request
id_token_hint
eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.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.ePQicsMYqOielPtNnitVtJX74_9x3YYcPYScra2fpwDMEdEd82gBiYp9mD6x-w5FCJVQDB-PyLtrFzGKqRENoA
post_logout_redirect_uri
https://www.certification.openid.net/test/a/keycloak/post_logout_redirect
state
tIidDIiEhBjprtbrRcRzWmcauFAtYezOWsGYLDjLxrxVoveZBl2579315022~[}_^/:#.@~&{\.[}^~#":@_\^[.~*
2022-05-16 11:37:33 SUCCESS
AddBadPostLogoutRedirectUriToEndSessionEndpointRequest
Added bad post_logout_redirect_uri to end session endpoint request
id_token_hint
eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.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.ePQicsMYqOielPtNnitVtJX74_9x3YYcPYScra2fpwDMEdEd82gBiYp9mD6x-w5FCJVQDB-PyLtrFzGKqRENoA
post_logout_redirect_uri
https://www.certification.openid.net/test/a/keycloak/bad_post_logout_redirect_uri
state
tIidDIiEhBjprtbrRcRzWmcauFAtYezOWsGYLDjLxrxVoveZBl2579315022~[}_^/:#.@~&{\.[}^~#":@_\^[.~*
2022-05-16 11:37:33 SUCCESS
BuildRedirectToEndSessionEndpoint
Sending to end_session endpoint
redirect_to_end_session_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/logout?id_token_hint=eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.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.ePQicsMYqOielPtNnitVtJX74_9x3YYcPYScra2fpwDMEdEd82gBiYp9mD6x-w5FCJVQDB-PyLtrFzGKqRENoA&post_logout_redirect_uri=https://www.certification.openid.net/test/a/keycloak/bad_post_logout_redirect_uri&state=tIidDIiEhBjprtbrRcRzWmcauFAtYezOWsGYLDjLxrxVoveZBl2579315022~%5B%7D_%5E/:%23.@~%26%7B%5C.%5B%7D%5E~%23%22:@_%5C%5E%5B.~*
2022-05-16 11:37:33 REVIEW IMAGE
ExpectPostLogoutRedirectUriNotRegisteredErrorPage
The server must show an error page saying the request is invalid as the post_logout_redirect_uri is not a registered one - upload a screenshot of the error page.
img
updatedAt
1652701073914
2022-05-16 11:37:33 REDIRECT
oidcc-rp-initiated-logout-bad-post-logout-redirect-uri
Redirecting to end session endpoint
redirect_to
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/logout?id_token_hint=eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.eyJleHAiOjE2NTI3MDE5NTMsImlhdCI6MTY1MjcwMTA1MywiYXV0aF90aW1lIjoxNjUyNzAxMDUzLCJqdGkiOiIzOTVhNzYxZC0zZWU2LTRiN2QtYTJhNi0wN2NhNjAwM2IyZjUiLCJpc3MiOiJodHRwczovLzg0LTI0NC03Mi05MC5uaXAuaW86NjAwMDAvYXV0aC9yZWFsbXMvdGVzdCIsImF1ZCI6ImNsaWVudDEtcnAtaW5pdGlhdGVkLWxvZ291dCIsInN1YiI6IjNlY2RjZWNkLTQzZGMtNGRjOS1hYTFjLWI5NzkxZmNmNzMwZiIsInR5cCI6IklEIiwiYXpwIjoiY2xpZW50MS1ycC1pbml0aWF0ZWQtbG9nb3V0Iiwibm9uY2UiOiJRQWZyd2k3SDZwIiwic2Vzc2lvbl9zdGF0ZSI6ImNiOWIyYWI4LTM5M2YtNDI1YS04Yjk1LTg2Mjg5YjI0MzZhMyIsInNfaGFzaCI6IlFzSTEzTXVOdzI5Wk9DTlVyMktEWmciLCJzaWQiOiJjYjliMmFiOC0zOTNmLTQyNWEtOGI5NS04NjI4OWIyNDM2YTMifQ.ePQicsMYqOielPtNnitVtJX74_9x3YYcPYScra2fpwDMEdEd82gBiYp9mD6x-w5FCJVQDB-PyLtrFzGKqRENoA&post_logout_redirect_uri=https://www.certification.openid.net/test/a/keycloak/bad_post_logout_redirect_uri&state=tIidDIiEhBjprtbrRcRzWmcauFAtYezOWsGYLDjLxrxVoveZBl2579315022~%5B%7D_%5E/:%23.@~%26%7B%5C.%5B%7D%5E~%23%22:@_%5C%5E%5B.~*
2022-05-16 11:38:04 FINISHED
oidcc-rp-initiated-logout-bad-post-logout-redirect-uri
Test has run to completion
testmodule_result
REVIEW
Unregister dynamically registered client
2022-05-16 11:38:04
UnregisterDynamicallyRegisteredClient
Couldn't find registration_access_token.
2022-05-16 11:38:06
TEST-RUNNER
Alias has now been claimed by another test
alias
keycloak
new_test_id
pMM3xCdVEUIuqiW
Test Results