Test Summary

Test Results

Expand All Collapse All
All times are UTC
2022-05-16 11:33:44 INFO
TEST-RUNNER
Test instance 9KfFP0UqMyOUkVp created
baseUrl
https://www.certification.openid.net/test/a/keycloak
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code",
  "server_metadata": "discovery",
  "response_mode": "default",
  "client_registration": "static_client"
}
alias
keycloak
description
Keycloak, OpenID Connect Core: Rp Initiated Logout Certification Profile (client_registration:static_client)
planId
lK6ID0bWTp3L6
config
{
  "alias": "keycloak",
  "description": "Keycloak, OpenID Connect Core: Rp Initiated Logout Certification Profile (client_registration:static_client)",
  "server": {
    "discoveryUrl": "https://84-244-72-90.nip.io:60000/auth/realms/test/.well-known/openid-configuration",
    "login_hint": "john"
  },
  "client": {
    "client_id": "client1-rp-initiated-logout",
    "client_secret": "hYrN6jbdLq6WtfxjhVxmdF3vVdOgNK9p"
  }
}
testName
oidcc-rp-initiated-logout-bad-id-token-hint
2022-05-16 11:33:44 SUCCESS
CreateRedirectUri
Created redirect URI
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
2022-05-16 11:33:44
GetDynamicServerConfiguration
HTTP request
request_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/.well-known/openid-configuration
request_method
GET
request_headers
{
  "accept": "text/plain, application/json, application/*+json, */*",
  "content-length": "0"
}
request_body

                                
2022-05-16 11:33:45 RESPONSE
GetDynamicServerConfiguration
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "cache-control": "no-cache, must-revalidate, no-transform, no-store",
  "x-xss-protection": "1; mode\u003dblock",
  "x-frame-options": "SAMEORIGIN",
  "referrer-policy": "no-referrer",
  "date": "Mon, 16 May 2022 11:33:45 GMT",
  "connection": "keep-alive",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "content-type": "application/json",
  "content-length": "6208"
}
response_body
{"issuer":"https://84-244-72-90.nip.io:60000/auth/realms/test","authorization_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth","token_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token","introspection_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token/introspect","userinfo_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/userinfo","end_session_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/logout","frontchannel_logout_session_supported":true,"frontchannel_logout_supported":true,"jwks_uri":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/certs","check_session_iframe":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/login-status-iframe.html","grant_types_supported":["authorization_code","implicit","refresh_token","password","client_credentials","urn:ietf:params:oauth:grant-type:device_code","urn:openid:params:grant-type:ciba"],"acr_values_supported":["0","1"],"response_types_supported":["code","none","id_token","token","id_token token","code id_token","code token","code id_token token"],"subject_types_supported":["public","pairwise"],"id_token_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512"],"id_token_encryption_alg_values_supported":["RSA-OAEP","RSA-OAEP-256","RSA1_5"],"id_token_encryption_enc_values_supported":["A256GCM","A192GCM","A128GCM","A128CBC-HS256","A192CBC-HS384","A256CBC-HS512"],"userinfo_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512","none"],"userinfo_encryption_alg_values_supported":["RSA-OAEP","RSA-OAEP-256","RSA1_5"],"userinfo_encryption_enc_values_supported":["A256GCM","A192GCM","A128GCM","A128CBC-HS256","A192CBC-HS384","A256CBC-HS512"],"request_object_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512","none"],"request_object_encryption_alg_values_supported":["RSA-OAEP","RSA-OAEP-256","RSA1_5"],"request_object_encryption_enc_values_supported":["A256GCM","A192GCM","A128GCM","A128CBC-HS256","A192CBC-HS384","A256CBC-HS512"],"response_modes_supported":["query","fragment","form_post","query.jwt","fragment.jwt","form_post.jwt","jwt"],"registration_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect","token_endpoint_auth_methods_supported":["private_key_jwt","client_secret_basic","client_secret_post","tls_client_auth","client_secret_jwt"],"token_endpoint_auth_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512"],"introspection_endpoint_auth_methods_supported":["private_key_jwt","client_secret_basic","client_secret_post","tls_client_auth","client_secret_jwt"],"introspection_endpoint_auth_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512"],"authorization_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512"],"authorization_encryption_alg_values_supported":["RSA-OAEP","RSA-OAEP-256","RSA1_5"],"authorization_encryption_enc_values_supported":["A256GCM","A192GCM","A128GCM","A128CBC-HS256","A192CBC-HS384","A256CBC-HS512"],"claims_supported":["aud","sub","iss","auth_time","name","given_name","family_name","preferred_username","email","acr"],"claim_types_supported":["normal"],"claims_parameter_supported":true,"scopes_supported":["openid","consents","name_claims","microprofile-jwt","consent:1","name_claims_for_implicit","roles","address","phone","web-origins","profile","offline_access","resources","email"],"request_parameter_supported":true,"request_uri_parameter_supported":true,"require_request_uri_registration":true,"code_challenge_methods_supported":["plain","S256"],"tls_client_certificate_bound_access_tokens":true,"revocation_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/revoke","revocation_endpoint_auth_methods_supported":["private_key_jwt","client_secret_basic","client_secret_post","tls_client_auth","client_secret_jwt"],"revocation_endpoint_auth_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512"],"backchannel_logout_supported":true,"backchannel_logout_session_supported":true,"device_authorization_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth/device","backchannel_token_delivery_modes_supported":["poll","ping"],"backchannel_authentication_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/ciba/auth","backchannel_authentication_request_signing_alg_values_supported":["PS384","ES384","RS384","ES256","RS256","ES512","PS256","PS512","RS512"],"require_pushed_authorization_requests":false,"pushed_authorization_request_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/par/request","mtls_endpoint_aliases":{"token_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token","revocation_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/revoke","introspection_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token/introspect","device_authorization_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth/device","registration_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect","userinfo_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/userinfo","pushed_authorization_request_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/par/request","backchannel_authentication_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/ciba/auth"}}
2022-05-16 11:33:45 SUCCESS
GetDynamicServerConfiguration
Successfully parsed server configuration
issuer
https://84-244-72-90.nip.io:60000/auth/realms/test
authorization_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth
token_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token
introspection_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token/introspect
userinfo_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/userinfo
end_session_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/logout
frontchannel_logout_session_supported
true
frontchannel_logout_supported
true
jwks_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/certs
check_session_iframe
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/login-status-iframe.html
grant_types_supported
[
  "authorization_code",
  "implicit",
  "refresh_token",
  "password",
  "client_credentials",
  "urn:ietf:params:oauth:grant-type:device_code",
  "urn:openid:params:grant-type:ciba"
]
acr_values_supported
[
  "0",
  "1"
]
response_types_supported
[
  "code",
  "none",
  "id_token",
  "token",
  "id_token token",
  "code id_token",
  "code token",
  "code id_token token"
]
subject_types_supported
[
  "public",
  "pairwise"
]
id_token_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512"
]
id_token_encryption_alg_values_supported
[
  "RSA-OAEP",
  "RSA-OAEP-256",
  "RSA1_5"
]
id_token_encryption_enc_values_supported
[
  "A256GCM",
  "A192GCM",
  "A128GCM",
  "A128CBC-HS256",
  "A192CBC-HS384",
  "A256CBC-HS512"
]
userinfo_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512",
  "none"
]
userinfo_encryption_alg_values_supported
[
  "RSA-OAEP",
  "RSA-OAEP-256",
  "RSA1_5"
]
userinfo_encryption_enc_values_supported
[
  "A256GCM",
  "A192GCM",
  "A128GCM",
  "A128CBC-HS256",
  "A192CBC-HS384",
  "A256CBC-HS512"
]
request_object_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512",
  "none"
]
request_object_encryption_alg_values_supported
[
  "RSA-OAEP",
  "RSA-OAEP-256",
  "RSA1_5"
]
request_object_encryption_enc_values_supported
[
  "A256GCM",
  "A192GCM",
  "A128GCM",
  "A128CBC-HS256",
  "A192CBC-HS384",
  "A256CBC-HS512"
]
response_modes_supported
[
  "query",
  "fragment",
  "form_post",
  "query.jwt",
  "fragment.jwt",
  "form_post.jwt",
  "jwt"
]
registration_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect
token_endpoint_auth_methods_supported
[
  "private_key_jwt",
  "client_secret_basic",
  "client_secret_post",
  "tls_client_auth",
  "client_secret_jwt"
]
token_endpoint_auth_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512"
]
introspection_endpoint_auth_methods_supported
[
  "private_key_jwt",
  "client_secret_basic",
  "client_secret_post",
  "tls_client_auth",
  "client_secret_jwt"
]
introspection_endpoint_auth_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512"
]
authorization_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512"
]
authorization_encryption_alg_values_supported
[
  "RSA-OAEP",
  "RSA-OAEP-256",
  "RSA1_5"
]
authorization_encryption_enc_values_supported
[
  "A256GCM",
  "A192GCM",
  "A128GCM",
  "A128CBC-HS256",
  "A192CBC-HS384",
  "A256CBC-HS512"
]
claims_supported
[
  "aud",
  "sub",
  "iss",
  "auth_time",
  "name",
  "given_name",
  "family_name",
  "preferred_username",
  "email",
  "acr"
]
claim_types_supported
[
  "normal"
]
claims_parameter_supported
true
scopes_supported
[
  "openid",
  "consents",
  "name_claims",
  "microprofile-jwt",
  "consent:1",
  "name_claims_for_implicit",
  "roles",
  "address",
  "phone",
  "web-origins",
  "profile",
  "offline_access",
  "resources",
  "email"
]
request_parameter_supported
true
request_uri_parameter_supported
true
require_request_uri_registration
true
code_challenge_methods_supported
[
  "plain",
  "S256"
]
tls_client_certificate_bound_access_tokens
true
revocation_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/revoke
revocation_endpoint_auth_methods_supported
[
  "private_key_jwt",
  "client_secret_basic",
  "client_secret_post",
  "tls_client_auth",
  "client_secret_jwt"
]
revocation_endpoint_auth_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512"
]
backchannel_logout_supported
true
backchannel_logout_session_supported
true
device_authorization_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth/device
backchannel_token_delivery_modes_supported
[
  "poll",
  "ping"
]
backchannel_authentication_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/ciba/auth
backchannel_authentication_request_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "ES256",
  "RS256",
  "ES512",
  "PS256",
  "PS512",
  "RS512"
]
require_pushed_authorization_requests
false
pushed_authorization_request_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/par/request
mtls_endpoint_aliases
{
  "token_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token",
  "revocation_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/revoke",
  "introspection_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token/introspect",
  "device_authorization_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth/device",
  "registration_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect",
  "userinfo_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/userinfo",
  "pushed_authorization_request_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/par/request",
  "backchannel_authentication_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/ciba/auth"
}
2022-05-16 11:33:45 SUCCESS
CheckServerConfiguration
Found required server configuration keys
required
[
  "authorization_endpoint",
  "token_endpoint",
  "issuer"
]
2022-05-16 11:33:45 SUCCESS
ExtractTLSTestValuesFromServerConfiguration
Extracted TLS information from authorization server configuration
registration_endpoint
{
  "testHost": "84-244-72-90.nip.io",
  "testPort": 60000
}
authorization_endpoint
{
  "testHost": "84-244-72-90.nip.io",
  "testPort": 60000
}
token_endpoint
{
  "testHost": "84-244-72-90.nip.io",
  "testPort": 60000
}
userinfo_endpoint
{
  "testHost": "84-244-72-90.nip.io",
  "testPort": 60000
}
2022-05-16 11:33:45
FetchServerKeys
Fetching server key
jwks_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/certs
2022-05-16 11:33:45
FetchServerKeys
HTTP request
request_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/certs
request_method
GET
request_headers
{
  "accept": "text/plain, application/json, application/*+json, */*",
  "content-length": "0"
}
request_body

                                
2022-05-16 11:33:45 RESPONSE
FetchServerKeys
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "cache-control": "no-cache",
  "x-xss-protection": "1; mode\u003dblock",
  "x-frame-options": "SAMEORIGIN",
  "referrer-policy": "no-referrer",
  "date": "Mon, 16 May 2022 11:33:45 GMT",
  "connection": "keep-alive",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "content-type": "application/json",
  "content-length": "4559"
}
response_body
{"keys":[{"kid":"nVJXuV18rIhJQK_ezukCg6B6ihqd_ysVRpNmmGNIJgg","kty":"RSA","alg":"PS256","use":"enc","n":"gJeVMx_ucf4OkwPjfo3QqRVGJad4MoGX0epHfzh_9JWhetahQKvU2R8I7YnWMRmdni2ZuWVdnRDdrU83FN-RGKRq8bkV59-U9UM25mrFD-27qczX_SvipPeSJfCC8BVg6IVaG0xYVJcAJyqCczhV0p36Tv3ehLhnZA_JZYgGcQznEXRawqQMQ1hKLC-cbQdXbcuzlKB-jGKUvNOPrRWkFYbcbbPMqeqv60TtQL--9X0rFxySfGbUVTDENmsJUaS5vs-cHEyst-UX6Y-lmCoTA0LZsOaH608POFmeaVB7ZmDdeGCHS_H4BCbQS7p_vI67i-IH8L5qrr_TZGabii1Ggw","e":"AQAB","x5c":["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"],"x5t":"nsamQNPuXTrs2Bh2mhtQ1p-Cs-M","x5t#S256":"g1XbSXBmnrd0nphVoyIfkix50Nsr0HqrJAvypgOzBq0"},{"kid":"RzJaSl5uXbIzduF-D5dOo6yLiqMOrdK3P_7vKZKsqrY","kty":"RSA","alg":"RS256","use":"sig","n":"hc3JDwS0TS-SX74-_FJKP9bq5LuuyrFZkxLfX6NVyyR9iEO-_WY4bnc_f9DVWEn1ygYY-K0WlVBvaPpgoEKKPxNqJ0NrgAj_xjOr-9Pqw5q8I3ziIAPTmxH0NQkVUTsCR5p62aXUEfpmTeNtqMOS9GTHZPjAuHimiEgdEY-boolGJbUwAfzpd42vDjnz2kWct80D74iUHANxLz8jJ1reyUwH1QyLF-ouHb5Kh4yHfhVd1iP0oQwPEtB3IS25NQsRyrOHJpFvooRhmzWdyceG-c2Ui670zFv3gUAwoZclkVlS9ykPvVqZyYNQ6Sl-TUNUOWppIG-VSQW15mtfWmiskw","e":"AQAB","x5c":["MIIClzCCAX8CBgGAzCPu7jANBgkqhkiG9w0BAQsFADAPMQ0wCwYDVQQDDAR0ZXN0MB4XDTIyMDUxNjA5MTA0OFoXDTMyMDUxNjA5MTIyOFowDzENMAsGA1UEAwwEdGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIXNyQ8EtE0vkl++PvxSSj/W6uS7rsqxWZMS31+jVcskfYhDvv1mOG53P3/Q1VhJ9coGGPitFpVQb2j6YKBCij8TaidDa4AI/8Yzq/vT6sOavCN84iAD05sR9DUJFVE7Akeaetml1BH6Zk3jbajDkvRkx2T4wLh4pohIHRGPm6KJRiW1MAH86XeNrw4589pFnLfNA++IlBwDcS8/Iyda3slMB9UMixfqLh2+SoeMh34VXdYj9KEMDxLQdyEtuTULEcqzhyaRb6KEYZs1ncnHhvnNlIuu9Mxb94FAMKGXJZFZUvcpD71amcmDUOkpfk1DVDlqaSBvlUkFteZrX1porJMCAwEAATANBgkqhkiG9w0BAQsFAAOCAQEABc4byb50M1IWWJgsXem0mAQAT8Zn/Q8qbVpTx2n5+uegtnetUTF4bvhlgtBrWVQSt1tPAjPo5A3uvfiSqaWmu66XzhWMXsPyFfchRdpIUZsnZCxv0upO232DWsbIURvK7oyZWIYerU5luUyUCZ0nVYPdKsfqr3bSnFfM8nSV8/mA1HWKNXUXpkJCwvqY0xUKkuvmxholp0c9GXjZ8yoz595DsaAM56CkZ1jN1wlCkkoOb8l7pFBPSjUgYmHWb4TDdgKr1XVUChP1yfWCk8ypYdBwlekLYLmBQneH/Y/sVT+pQZqtkb22ptGOy3wu4q7TJ7KW5JI/GZCT6izsRvmJKQ=="],"x5t":"a9EHlEUdeGHxtup6eQp74LCZWyk","x5t#S256":"XM6CJJcSE1YeZJ5rtNWzbhZe6FhjvVmYzxyUhflmx80"},{"kid":"3j2X9LXvxBl15lAOntwKWvoS13ZFGSskSq4qW2rv_us","kty":"RSA","alg":"PS256","use":"sig","n":"jF-GpA0T_8cZjweY69yY5oKwOwWXKIXCL4mG8PcFcdeuihPGTU3w6XV-dTQPjfZpysISmSpZKm1aEMwTh2yXIl5Oel95rNzaj-7rMI4nrZn9ruHjh_cToHxyWDI8bs_V-MSBwqbbFGltdXWUa3LFsrwRt0XKNMPzhQLciuLO0iBumF4Yc1VqmmS9buwpCqPc2qNggMp7pteZe5Lbkc-0X6zbBqkgo8wkbq31TN7cwDWxmVttxw7Mc4eUSVuROqiLgSKRCoWGYf9vIsiiXov8Q3mLaXyiQvh9gzDyWwzzAxbmVQhBxF-PVOdgGurYU0HkNjw3cr3OZkvKzbqccdYsiQ","e":"AQAB","x5c":["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"],"x5t":"TvB49qBdfskwNG8LWUYOE3z29fE","x5t#S256":"kTzfVukTOuEwsJ7ICp69-kbcipMUZ31yTNOPdQifuMk"},{"kid":"6p6LMG-CvC-c6SvkKKOP8W_Z4fTBS9Q461P9zxi2n6o","kty":"EC","alg":"ES256","use":"sig","crv":"P-256","x":"wy_EGIii551Ei-nodYzkg-S_y3ecdgTATnAwUxinhhQ","y":"LCbIl7PUYc2DtBJGRMrOt80rk3PJbJ1onUwK_82yHUw"}]}
2022-05-16 11:33:45
FetchServerKeys
Found JWK set string
jwk_string
{"keys":[{"kid":"nVJXuV18rIhJQK_ezukCg6B6ihqd_ysVRpNmmGNIJgg","kty":"RSA","alg":"PS256","use":"enc","n":"gJeVMx_ucf4OkwPjfo3QqRVGJad4MoGX0epHfzh_9JWhetahQKvU2R8I7YnWMRmdni2ZuWVdnRDdrU83FN-RGKRq8bkV59-U9UM25mrFD-27qczX_SvipPeSJfCC8BVg6IVaG0xYVJcAJyqCczhV0p36Tv3ehLhnZA_JZYgGcQznEXRawqQMQ1hKLC-cbQdXbcuzlKB-jGKUvNOPrRWkFYbcbbPMqeqv60TtQL--9X0rFxySfGbUVTDENmsJUaS5vs-cHEyst-UX6Y-lmCoTA0LZsOaH608POFmeaVB7ZmDdeGCHS_H4BCbQS7p_vI67i-IH8L5qrr_TZGabii1Ggw","e":"AQAB","x5c":["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"],"x5t":"nsamQNPuXTrs2Bh2mhtQ1p-Cs-M","x5t#S256":"g1XbSXBmnrd0nphVoyIfkix50Nsr0HqrJAvypgOzBq0"},{"kid":"RzJaSl5uXbIzduF-D5dOo6yLiqMOrdK3P_7vKZKsqrY","kty":"RSA","alg":"RS256","use":"sig","n":"hc3JDwS0TS-SX74-_FJKP9bq5LuuyrFZkxLfX6NVyyR9iEO-_WY4bnc_f9DVWEn1ygYY-K0WlVBvaPpgoEKKPxNqJ0NrgAj_xjOr-9Pqw5q8I3ziIAPTmxH0NQkVUTsCR5p62aXUEfpmTeNtqMOS9GTHZPjAuHimiEgdEY-boolGJbUwAfzpd42vDjnz2kWct80D74iUHANxLz8jJ1reyUwH1QyLF-ouHb5Kh4yHfhVd1iP0oQwPEtB3IS25NQsRyrOHJpFvooRhmzWdyceG-c2Ui670zFv3gUAwoZclkVlS9ykPvVqZyYNQ6Sl-TUNUOWppIG-VSQW15mtfWmiskw","e":"AQAB","x5c":["MIIClzCCAX8CBgGAzCPu7jANBgkqhkiG9w0BAQsFADAPMQ0wCwYDVQQDDAR0ZXN0MB4XDTIyMDUxNjA5MTA0OFoXDTMyMDUxNjA5MTIyOFowDzENMAsGA1UEAwwEdGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIXNyQ8EtE0vkl++PvxSSj/W6uS7rsqxWZMS31+jVcskfYhDvv1mOG53P3/Q1VhJ9coGGPitFpVQb2j6YKBCij8TaidDa4AI/8Yzq/vT6sOavCN84iAD05sR9DUJFVE7Akeaetml1BH6Zk3jbajDkvRkx2T4wLh4pohIHRGPm6KJRiW1MAH86XeNrw4589pFnLfNA++IlBwDcS8/Iyda3slMB9UMixfqLh2+SoeMh34VXdYj9KEMDxLQdyEtuTULEcqzhyaRb6KEYZs1ncnHhvnNlIuu9Mxb94FAMKGXJZFZUvcpD71amcmDUOkpfk1DVDlqaSBvlUkFteZrX1porJMCAwEAATANBgkqhkiG9w0BAQsFAAOCAQEABc4byb50M1IWWJgsXem0mAQAT8Zn/Q8qbVpTx2n5+uegtnetUTF4bvhlgtBrWVQSt1tPAjPo5A3uvfiSqaWmu66XzhWMXsPyFfchRdpIUZsnZCxv0upO232DWsbIURvK7oyZWIYerU5luUyUCZ0nVYPdKsfqr3bSnFfM8nSV8/mA1HWKNXUXpkJCwvqY0xUKkuvmxholp0c9GXjZ8yoz595DsaAM56CkZ1jN1wlCkkoOb8l7pFBPSjUgYmHWb4TDdgKr1XVUChP1yfWCk8ypYdBwlekLYLmBQneH/Y/sVT+pQZqtkb22ptGOy3wu4q7TJ7KW5JI/GZCT6izsRvmJKQ=="],"x5t":"a9EHlEUdeGHxtup6eQp74LCZWyk","x5t#S256":"XM6CJJcSE1YeZJ5rtNWzbhZe6FhjvVmYzxyUhflmx80"},{"kid":"3j2X9LXvxBl15lAOntwKWvoS13ZFGSskSq4qW2rv_us","kty":"RSA","alg":"PS256","use":"sig","n":"jF-GpA0T_8cZjweY69yY5oKwOwWXKIXCL4mG8PcFcdeuihPGTU3w6XV-dTQPjfZpysISmSpZKm1aEMwTh2yXIl5Oel95rNzaj-7rMI4nrZn9ruHjh_cToHxyWDI8bs_V-MSBwqbbFGltdXWUa3LFsrwRt0XKNMPzhQLciuLO0iBumF4Yc1VqmmS9buwpCqPc2qNggMp7pteZe5Lbkc-0X6zbBqkgo8wkbq31TN7cwDWxmVttxw7Mc4eUSVuROqiLgSKRCoWGYf9vIsiiXov8Q3mLaXyiQvh9gzDyWwzzAxbmVQhBxF-PVOdgGurYU0HkNjw3cr3OZkvKzbqccdYsiQ","e":"AQAB","x5c":["MIIClzCCAX8CBgGAzCPxHDANBgkqhkiG9w0BAQsFADAPMQ0wCwYDVQQDDAR0ZXN0MB4XDTIyMDUxNjA5MTA0OVoXDTMyMDUxNjA5MTIyOVowDzENMAsGA1UEAwwEdGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIxfhqQNE//HGY8HmOvcmOaCsDsFlyiFwi+JhvD3BXHXrooTxk1N8Ol1fnU0D432acrCEpkqWSptWhDME4dslyJeTnpfeazc2o/u6zCOJ62Z/a7h44f3E6B8clgyPG7P1fjEgcKm2xRpbXV1lGtyxbK8EbdFyjTD84UC3IriztIgbpheGHNVappkvW7sKQqj3NqjYIDKe6bXmXuS25HPtF+s2wapIKPMJG6t9Uze3MA1sZlbbccOzHOHlElbkTqoi4EikQqFhmH/byLIol6L/EN5i2l8okL4fYMw8lsM8wMW5lUIQcRfj1TnYBrq2FNB5DY8N3K9zmZLys26nHHWLIkCAwEAATANBgkqhkiG9w0BAQsFAAOCAQEAR/S3MzoIbclxpeaKYQ40BVKdzvIGPH6okrW4IUUL/DSs4hiwf2yQ8r0oSvbXuEg23NKMYlH0YeLmMrFhoq0TnA98OP346YX7ladE5US+lXQC1At3B6r7hUY7YMcz6Fw6AnqQK8O3Qw8TDZRfd+TJzM9jBXZxKP/gj8+70uH7gAP+gMnt2wwgbG/yl433/xGByrDz0lntisQcn7YbvzFnpvSqcWHAmxNnNM+H817FNvfQPg4GU8PP2Pblzk24i6qT0v3emMg5eAk0bFef5RevPWFW53ti0fWXuP5CHQZNMeFB+6ZqbWDaX43V3AC8CGnQL0zzNXXFzGRfFeoBJLAzzA=="],"x5t":"TvB49qBdfskwNG8LWUYOE3z29fE","x5t#S256":"kTzfVukTOuEwsJ7ICp69-kbcipMUZ31yTNOPdQifuMk"},{"kid":"6p6LMG-CvC-c6SvkKKOP8W_Z4fTBS9Q461P9zxi2n6o","kty":"EC","alg":"ES256","use":"sig","crv":"P-256","x":"wy_EGIii551Ei-nodYzkg-S_y3ecdgTATnAwUxinhhQ","y":"LCbIl7PUYc2DtBJGRMrOt80rk3PJbJ1onUwK_82yHUw"}]}
2022-05-16 11:33:45 SUCCESS
FetchServerKeys
Found server JWK set
server_jwks
{
  "keys": [
    {
      "kid": "nVJXuV18rIhJQK_ezukCg6B6ihqd_ysVRpNmmGNIJgg",
      "kty": "RSA",
      "alg": "PS256",
      "use": "enc",
      "n": "gJeVMx_ucf4OkwPjfo3QqRVGJad4MoGX0epHfzh_9JWhetahQKvU2R8I7YnWMRmdni2ZuWVdnRDdrU83FN-RGKRq8bkV59-U9UM25mrFD-27qczX_SvipPeSJfCC8BVg6IVaG0xYVJcAJyqCczhV0p36Tv3ehLhnZA_JZYgGcQznEXRawqQMQ1hKLC-cbQdXbcuzlKB-jGKUvNOPrRWkFYbcbbPMqeqv60TtQL--9X0rFxySfGbUVTDENmsJUaS5vs-cHEyst-UX6Y-lmCoTA0LZsOaH608POFmeaVB7ZmDdeGCHS_H4BCbQS7p_vI67i-IH8L5qrr_TZGabii1Ggw",
      "e": "AQAB",
      "x5c": [
        "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\u003d\u003d"
      ],
      "x5t": "nsamQNPuXTrs2Bh2mhtQ1p-Cs-M",
      "x5t#S256": "g1XbSXBmnrd0nphVoyIfkix50Nsr0HqrJAvypgOzBq0"
    },
    {
      "kid": "RzJaSl5uXbIzduF-D5dOo6yLiqMOrdK3P_7vKZKsqrY",
      "kty": "RSA",
      "alg": "RS256",
      "use": "sig",
      "n": "hc3JDwS0TS-SX74-_FJKP9bq5LuuyrFZkxLfX6NVyyR9iEO-_WY4bnc_f9DVWEn1ygYY-K0WlVBvaPpgoEKKPxNqJ0NrgAj_xjOr-9Pqw5q8I3ziIAPTmxH0NQkVUTsCR5p62aXUEfpmTeNtqMOS9GTHZPjAuHimiEgdEY-boolGJbUwAfzpd42vDjnz2kWct80D74iUHANxLz8jJ1reyUwH1QyLF-ouHb5Kh4yHfhVd1iP0oQwPEtB3IS25NQsRyrOHJpFvooRhmzWdyceG-c2Ui670zFv3gUAwoZclkVlS9ykPvVqZyYNQ6Sl-TUNUOWppIG-VSQW15mtfWmiskw",
      "e": "AQAB",
      "x5c": [
        "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\u003d\u003d"
      ],
      "x5t": "a9EHlEUdeGHxtup6eQp74LCZWyk",
      "x5t#S256": "XM6CJJcSE1YeZJ5rtNWzbhZe6FhjvVmYzxyUhflmx80"
    },
    {
      "kid": "3j2X9LXvxBl15lAOntwKWvoS13ZFGSskSq4qW2rv_us",
      "kty": "RSA",
      "alg": "PS256",
      "use": "sig",
      "n": "jF-GpA0T_8cZjweY69yY5oKwOwWXKIXCL4mG8PcFcdeuihPGTU3w6XV-dTQPjfZpysISmSpZKm1aEMwTh2yXIl5Oel95rNzaj-7rMI4nrZn9ruHjh_cToHxyWDI8bs_V-MSBwqbbFGltdXWUa3LFsrwRt0XKNMPzhQLciuLO0iBumF4Yc1VqmmS9buwpCqPc2qNggMp7pteZe5Lbkc-0X6zbBqkgo8wkbq31TN7cwDWxmVttxw7Mc4eUSVuROqiLgSKRCoWGYf9vIsiiXov8Q3mLaXyiQvh9gzDyWwzzAxbmVQhBxF-PVOdgGurYU0HkNjw3cr3OZkvKzbqccdYsiQ",
      "e": "AQAB",
      "x5c": [
        "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\u003d\u003d"
      ],
      "x5t": "TvB49qBdfskwNG8LWUYOE3z29fE",
      "x5t#S256": "kTzfVukTOuEwsJ7ICp69-kbcipMUZ31yTNOPdQifuMk"
    },
    {
      "kid": "6p6LMG-CvC-c6SvkKKOP8W_Z4fTBS9Q461P9zxi2n6o",
      "kty": "EC",
      "alg": "ES256",
      "use": "sig",
      "crv": "P-256",
      "x": "wy_EGIii551Ei-nodYzkg-S_y3ecdgTATnAwUxinhhQ",
      "y": "LCbIl7PUYc2DtBJGRMrOt80rk3PJbJ1onUwK_82yHUw"
    }
  ]
}
2022-05-16 11:33:45 SUCCESS
CheckServerKeysIsValid
Server JWKs is valid
server_jwks
{
  "keys": [
    {
      "kid": "nVJXuV18rIhJQK_ezukCg6B6ihqd_ysVRpNmmGNIJgg",
      "kty": "RSA",
      "alg": "PS256",
      "use": "enc",
      "n": "gJeVMx_ucf4OkwPjfo3QqRVGJad4MoGX0epHfzh_9JWhetahQKvU2R8I7YnWMRmdni2ZuWVdnRDdrU83FN-RGKRq8bkV59-U9UM25mrFD-27qczX_SvipPeSJfCC8BVg6IVaG0xYVJcAJyqCczhV0p36Tv3ehLhnZA_JZYgGcQznEXRawqQMQ1hKLC-cbQdXbcuzlKB-jGKUvNOPrRWkFYbcbbPMqeqv60TtQL--9X0rFxySfGbUVTDENmsJUaS5vs-cHEyst-UX6Y-lmCoTA0LZsOaH608POFmeaVB7ZmDdeGCHS_H4BCbQS7p_vI67i-IH8L5qrr_TZGabii1Ggw",
      "e": "AQAB",
      "x5c": [
        "MIIClzCCAX8CBgGAzCPyBjANBgkqhkiG9w0BAQsFADAPMQ0wCwYDVQQDDAR0ZXN0MB4XDTIyMDUxNjA5MTA0OVoXDTMyMDUxNjA5MTIyOVowDzENMAsGA1UEAwwEdGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAICXlTMf7nH+DpMD436N0KkVRiWneDKBl9HqR384f/SVoXrWoUCr1NkfCO2J1jEZnZ4tmbllXZ0Q3a1PNxTfkRikavG5FefflPVDNuZqxQ/tu6nM1/0r4qT3kiXwgvAVYOiFWhtMWFSXACcqgnM4VdKd+k793oS4Z2QPyWWIBnEM5xF0WsKkDENYSiwvnG0HV23Ls5SgfoxilLzTj60VpBWG3G2zzKnqr+tE7UC/vvV9Kxccknxm1FUwxDZrCVGkub7PnBxMrLflF+mPpZgqEwNC2bDmh+tPDzhZnmlQe2Zg3Xhgh0vx+AQm0Eu6f7yOu4viB/C+aq6/02Rmm4otRoMCAwEAATANBgkqhkiG9w0BAQsFAAOCAQEAJGENeCNqIbHidimks6k9WRJaYYP0n5cRFcxh2EKKwgOJqaHJ3oaeWJ97owND+S7wl6VZLKebb6BPwaKoedtkPgSh/H4wYBW5u5reE/GkU1M7T37Zn1Xs6jsLDISJWWxDn8k+hTeAi08P0Qoymq8WnDbKplbjiPbKTtDDqEcBsXvwRHkPUrBFKzlSapWWSIspqcHwpFklfYKm9JCC6JtFdw/lCyd/0u+x/dQ/ZNhYx9WUOUtLtnqFxkWWuydQ0z6hOkfUDUokH5FhjdvfYJk8Nw82VuTm3ly3HEv59HbjOxnobzDM0pnqJfiYWRNcfJ480b55sdzMF1604bk//h0oVQ\u003d\u003d"
      ],
      "x5t": "nsamQNPuXTrs2Bh2mhtQ1p-Cs-M",
      "x5t#S256": "g1XbSXBmnrd0nphVoyIfkix50Nsr0HqrJAvypgOzBq0"
    },
    {
      "kid": "RzJaSl5uXbIzduF-D5dOo6yLiqMOrdK3P_7vKZKsqrY",
      "kty": "RSA",
      "alg": "RS256",
      "use": "sig",
      "n": "hc3JDwS0TS-SX74-_FJKP9bq5LuuyrFZkxLfX6NVyyR9iEO-_WY4bnc_f9DVWEn1ygYY-K0WlVBvaPpgoEKKPxNqJ0NrgAj_xjOr-9Pqw5q8I3ziIAPTmxH0NQkVUTsCR5p62aXUEfpmTeNtqMOS9GTHZPjAuHimiEgdEY-boolGJbUwAfzpd42vDjnz2kWct80D74iUHANxLz8jJ1reyUwH1QyLF-ouHb5Kh4yHfhVd1iP0oQwPEtB3IS25NQsRyrOHJpFvooRhmzWdyceG-c2Ui670zFv3gUAwoZclkVlS9ykPvVqZyYNQ6Sl-TUNUOWppIG-VSQW15mtfWmiskw",
      "e": "AQAB",
      "x5c": [
        "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\u003d\u003d"
      ],
      "x5t": "a9EHlEUdeGHxtup6eQp74LCZWyk",
      "x5t#S256": "XM6CJJcSE1YeZJ5rtNWzbhZe6FhjvVmYzxyUhflmx80"
    },
    {
      "kid": "3j2X9LXvxBl15lAOntwKWvoS13ZFGSskSq4qW2rv_us",
      "kty": "RSA",
      "alg": "PS256",
      "use": "sig",
      "n": "jF-GpA0T_8cZjweY69yY5oKwOwWXKIXCL4mG8PcFcdeuihPGTU3w6XV-dTQPjfZpysISmSpZKm1aEMwTh2yXIl5Oel95rNzaj-7rMI4nrZn9ruHjh_cToHxyWDI8bs_V-MSBwqbbFGltdXWUa3LFsrwRt0XKNMPzhQLciuLO0iBumF4Yc1VqmmS9buwpCqPc2qNggMp7pteZe5Lbkc-0X6zbBqkgo8wkbq31TN7cwDWxmVttxw7Mc4eUSVuROqiLgSKRCoWGYf9vIsiiXov8Q3mLaXyiQvh9gzDyWwzzAxbmVQhBxF-PVOdgGurYU0HkNjw3cr3OZkvKzbqccdYsiQ",
      "e": "AQAB",
      "x5c": [
        "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\u003d\u003d"
      ],
      "x5t": "TvB49qBdfskwNG8LWUYOE3z29fE",
      "x5t#S256": "kTzfVukTOuEwsJ7ICp69-kbcipMUZ31yTNOPdQifuMk"
    },
    {
      "kid": "6p6LMG-CvC-c6SvkKKOP8W_Z4fTBS9Q461P9zxi2n6o",
      "kty": "EC",
      "alg": "ES256",
      "use": "sig",
      "crv": "P-256",
      "x": "wy_EGIii551Ei-nodYzkg-S_y3ecdgTATnAwUxinhhQ",
      "y": "LCbIl7PUYc2DtBJGRMrOt80rk3PJbJ1onUwK_82yHUw"
    }
  ]
}
2022-05-16 11:33:45 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2022-05-16 11:33:45 SUCCESS
CheckForKeyIdInServerJWKs
All keys contain kids
2022-05-16 11:33:45 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2022-05-16 11:33:45 SUCCESS
EnsureServerJwksDoesNotContainPrivateOrSymmetricKeys
Jwks does not contain any private or symmetric keys
2022-05-16 11:33:45 SUCCESS
CreatePostLogoutRedirectUri
Created post_logout_redirect_uri URI
post_logout_redirect_uri
https://www.certification.openid.net/test/a/keycloak/post_logout_redirect
2022-05-16 11:33:45 SUCCESS
GetStaticClientConfiguration
Found a static client object
client_id
client1-rp-initiated-logout
client_secret
hYrN6jbdLq6WtfxjhVxmdF3vVdOgNK9p
2022-05-16 11:33:45 INFO
ValidateClientJWKsPrivatePart
Skipped evaluation due to missing required element: client jwks
path
jwks
mapped
object
client
2022-05-16 11:33:45 INFO
ExtractJWKsFromStaticClientConfiguration
Skipped evaluation due to missing required element: client jwks
path
jwks
mapped
object
client
2022-05-16 11:33:45 INFO
CheckDistinctKeyIdValueInClientJWKs
Skipped evaluation due to missing required element: client jwks
path
jwks
mapped
object
client
2022-05-16 11:33:45
SetScopeInClientConfigurationToOpenId
Set scope in client configuration to "openid"
scope
openid
2022-05-16 11:33:45 SUCCESS
EnsureServerConfigurationSupportsClientSecretBasic
Contents of 'token_endpoint_auth_methods_supported' in discovery document matches expectations.
actual
[
  "private_key_jwt",
  "client_secret_basic",
  "client_secret_post",
  "tls_client_auth",
  "client_secret_jwt"
]
expected
[
  "client_secret_basic"
]
minimum_matches_required
1
2022-05-16 11:33:45 SUCCESS
SetProtectedResourceUrlToUserInfoEndpoint
userinfo_endpoint will be used to test access token. The user info is not a mandatory to implement feature in the OpenID Connect specification, but is mandatory for certification.
protected_resource_url
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/userinfo
2022-05-16 11:33:45 SUCCESS
GenerateJWKsFromClientSecret
Generated JWK Set from symmetric key
client_jwks
{
  "keys": [
    {
      "kty": "oct",
      "use": "sig",
      "k": "aFlyTjZqYmRMcTZXdGZ4amhWeG1kRjN2VmRPZ05LOXA",
      "alg": "HS256"
    }
  ]
}
2022-05-16 11:33:45
oidcc-rp-initiated-logout-bad-id-token-hint
Setup Done
Make request to authorization endpoint
2022-05-16 11:33:45 SUCCESS
CreateAuthorizationEndpointRequestFromClientInformation
Created authorization endpoint request
client_id
client1-rp-initiated-logout
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
scope
openid
2022-05-16 11:33:45
CreateRandomStateValue
Created state value
requested_state_length
128
state
fb2nL5hUI9XF91gSAmegaOcc9CLHMVHRheFPeKQfVhBRBSFdtV6btDPZtjg6ahUKWXSz90GF6ZXsf5NYJevVwD4lnff3MrWC3mwArJi7vHwpfRooQIO2erIQ9vEKN5C1
2022-05-16 11:33:45 SUCCESS
AddStateToAuthorizationEndpointRequest
Added state parameter to request
client_id
client1-rp-initiated-logout
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
scope
openid
state
fb2nL5hUI9XF91gSAmegaOcc9CLHMVHRheFPeKQfVhBRBSFdtV6btDPZtjg6ahUKWXSz90GF6ZXsf5NYJevVwD4lnff3MrWC3mwArJi7vHwpfRooQIO2erIQ9vEKN5C1
2022-05-16 11:33:45
CreateRandomNonceValue
Created nonce value
requested_nonce_length
10
nonce
CDWkq1VJLW
2022-05-16 11:33:45 SUCCESS
AddNonceToAuthorizationEndpointRequest
Added nonce parameter to request
client_id
client1-rp-initiated-logout
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
scope
openid
state
fb2nL5hUI9XF91gSAmegaOcc9CLHMVHRheFPeKQfVhBRBSFdtV6btDPZtjg6ahUKWXSz90GF6ZXsf5NYJevVwD4lnff3MrWC3mwArJi7vHwpfRooQIO2erIQ9vEKN5C1
nonce
CDWkq1VJLW
2022-05-16 11:33:45 SUCCESS
SetAuthorizationEndpointRequestResponseTypeFromEnvironment
Added response_type parameter to request
client_id
client1-rp-initiated-logout
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
scope
openid
state
fb2nL5hUI9XF91gSAmegaOcc9CLHMVHRheFPeKQfVhBRBSFdtV6btDPZtjg6ahUKWXSz90GF6ZXsf5NYJevVwD4lnff3MrWC3mwArJi7vHwpfRooQIO2erIQ9vEKN5C1
nonce
CDWkq1VJLW
response_type
code
2022-05-16 11:33:45 SUCCESS
BuildPlainRedirectToAuthorizationEndpoint
Sending to authorization endpoint
auth_request
{
  "client_id": "client1-rp-initiated-logout",
  "redirect_uri": "https://www.certification.openid.net/test/a/keycloak/callback",
  "scope": "openid",
  "state": "fb2nL5hUI9XF91gSAmegaOcc9CLHMVHRheFPeKQfVhBRBSFdtV6btDPZtjg6ahUKWXSz90GF6ZXsf5NYJevVwD4lnff3MrWC3mwArJi7vHwpfRooQIO2erIQ9vEKN5C1",
  "nonce": "CDWkq1VJLW",
  "response_type": "code"
}
redirect_to_authorization_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth?client_id=client1-rp-initiated-logout&redirect_uri=https://www.certification.openid.net/test/a/keycloak/callback&scope=openid&state=fb2nL5hUI9XF91gSAmegaOcc9CLHMVHRheFPeKQfVhBRBSFdtV6btDPZtjg6ahUKWXSz90GF6ZXsf5NYJevVwD4lnff3MrWC3mwArJi7vHwpfRooQIO2erIQ9vEKN5C1&nonce=CDWkq1VJLW&response_type=code
2022-05-16 11:33:45 REDIRECT
oidcc-rp-initiated-logout-bad-id-token-hint
Redirecting to authorization endpoint
redirect_to
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth?client_id=client1-rp-initiated-logout&redirect_uri=https://www.certification.openid.net/test/a/keycloak/callback&scope=openid&state=fb2nL5hUI9XF91gSAmegaOcc9CLHMVHRheFPeKQfVhBRBSFdtV6btDPZtjg6ahUKWXSz90GF6ZXsf5NYJevVwD4lnff3MrWC3mwArJi7vHwpfRooQIO2erIQ9vEKN5C1&nonce=CDWkq1VJLW&response_type=code
2022-05-16 11:33:48 INCOMING
oidcc-rp-initiated-logout-bad-id-token-hint
Incoming HTTP request to /test/a/keycloak/callback
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:100.0) Gecko/20100101 Firefox/100.0",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/avif,image/webp,*/*;q\u003d0.8",
  "accept-language": "en-US,en;q\u003d0.5",
  "accept-encoding": "gzip, deflate, br",
  "cookie": "__utma\u003d201319536.747058366.1611919072.1652681365.1652688969.137; __utmz\u003d201319536.1647870296.126.44.utmcsr\u003dgoogle|utmccn\u003d(organic)|utmcmd\u003dorganic|utmctr\u003d(not%20provided); _ga\u003dGA1.2.747058366.1611919072; __utmc\u003d201319536; JSESSIONID\u003d63EE1707428F3F9812307D8819923D9B",
  "upgrade-insecure-requests": "1",
  "sec-fetch-dest": "document",
  "sec-fetch-mode": "navigate",
  "sec-fetch-site": "cross-site",
  "connection": "close"
}
incoming_path
/test/a/keycloak/callback
incoming_body_form_params
incoming_method
GET
incoming_tls_version
TLSv1.2
incoming_tls_cipher
ECDHE-RSA-AES128-GCM-SHA256
incoming_tls_cert
incoming_body_json
incoming_query_string_params
{
  "state": "fb2nL5hUI9XF91gSAmegaOcc9CLHMVHRheFPeKQfVhBRBSFdtV6btDPZtjg6ahUKWXSz90GF6ZXsf5NYJevVwD4lnff3MrWC3mwArJi7vHwpfRooQIO2erIQ9vEKN5C1",
  "session_state": "496ed173-aff6-403b-96f8-958d59343d43",
  "code": "ac39974e-b241-4b24-a7d0-7185431b7e6b.496ed173-aff6-403b-96f8-958d59343d43.369f61c6-3b09-49c8-b1e1-3efee0b11f42"
}
incoming_body
2022-05-16 11:33:48 SUCCESS
CreateRandomImplicitSubmitUrl
Created random implicit submission URL
implicit_submit
{
  "path": "implicit/WUdOvDtuxcmdfaDI3aVk",
  "fullUrl": "https://www.certification.openid.net/test/a/keycloak/implicit/WUdOvDtuxcmdfaDI3aVk"
}
2022-05-16 11:33:48 OUTGOING
oidcc-rp-initiated-logout-bad-id-token-hint
Response to HTTP request to test instance 9KfFP0UqMyOUkVp
outgoing
ModelAndView [view="implicitCallback"; model={implicitSubmitUrl=https://www.certification.openid.net/test/a/keycloak/implicit/WUdOvDtuxcmdfaDI3aVk, returnUrl=/log-detail.html?log=9KfFP0UqMyOUkVp}]
outgoing_path
callback
2022-05-16 11:33:49 INCOMING
oidcc-rp-initiated-logout-bad-id-token-hint
Incoming HTTP request to /test/a/keycloak/implicit/WUdOvDtuxcmdfaDI3aVk
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:100.0) Gecko/20100101 Firefox/100.0",
  "accept": "*/*",
  "accept-language": "en-US,en;q\u003d0.5",
  "accept-encoding": "gzip, deflate, br",
  "content-type": "text/plain",
  "x-requested-with": "XMLHttpRequest",
  "origin": "https://www.certification.openid.net",
  "referer": "https://www.certification.openid.net/test/a/keycloak/callback?state\u003dfb2nL5hUI9XF91gSAmegaOcc9CLHMVHRheFPeKQfVhBRBSFdtV6btDPZtjg6ahUKWXSz90GF6ZXsf5NYJevVwD4lnff3MrWC3mwArJi7vHwpfRooQIO2erIQ9vEKN5C1\u0026session_state\u003d496ed173-aff6-403b-96f8-958d59343d43\u0026code\u003dac39974e-b241-4b24-a7d0-7185431b7e6b.496ed173-aff6-403b-96f8-958d59343d43.369f61c6-3b09-49c8-b1e1-3efee0b11f42",
  "cookie": "__utma\u003d201319536.747058366.1611919072.1652681365.1652688969.137; __utmz\u003d201319536.1647870296.126.44.utmcsr\u003dgoogle|utmccn\u003d(organic)|utmcmd\u003dorganic|utmctr\u003d(not%20provided); _ga\u003dGA1.2.747058366.1611919072; __utmc\u003d201319536; JSESSIONID\u003d63EE1707428F3F9812307D8819923D9B",
  "sec-fetch-dest": "empty",
  "sec-fetch-mode": "cors",
  "sec-fetch-site": "same-origin",
  "connection": "close",
  "content-length": "0"
}
incoming_path
/test/a/keycloak/implicit/WUdOvDtuxcmdfaDI3aVk
incoming_body_form_params
incoming_method
POST
incoming_tls_version
TLSv1.2
incoming_tls_cipher
ECDHE-RSA-AES128-GCM-SHA256
incoming_tls_cert
incoming_body_json
incoming_query_string_params
{}
incoming_body
2022-05-16 11:33:49 OUTGOING
oidcc-rp-initiated-logout-bad-id-token-hint
Response to HTTP request to test instance 9KfFP0UqMyOUkVp
outgoing_status_code
204
outgoing_headers
{}
outgoing_body

                                
outgoing_path
implicit/WUdOvDtuxcmdfaDI3aVk
2022-05-16 11:33:49 SUCCESS
ExtractImplicitHashToCallbackResponse
implicit_hash is empty
2022-05-16 11:33:49 REDIRECT-IN
oidcc-rp-initiated-logout-bad-id-token-hint
Authorization endpoint response captured
url_query
{
  "state": "fb2nL5hUI9XF91gSAmegaOcc9CLHMVHRheFPeKQfVhBRBSFdtV6btDPZtjg6ahUKWXSz90GF6ZXsf5NYJevVwD4lnff3MrWC3mwArJi7vHwpfRooQIO2erIQ9vEKN5C1",
  "session_state": "496ed173-aff6-403b-96f8-958d59343d43",
  "code": "ac39974e-b241-4b24-a7d0-7185431b7e6b.496ed173-aff6-403b-96f8-958d59343d43.369f61c6-3b09-49c8-b1e1-3efee0b11f42"
}
headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:100.0) Gecko/20100101 Firefox/100.0",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/avif,image/webp,*/*;q\u003d0.8",
  "accept-language": "en-US,en;q\u003d0.5",
  "accept-encoding": "gzip, deflate, br",
  "cookie": "__utma\u003d201319536.747058366.1611919072.1652681365.1652688969.137; __utmz\u003d201319536.1647870296.126.44.utmcsr\u003dgoogle|utmccn\u003d(organic)|utmcmd\u003dorganic|utmctr\u003d(not%20provided); _ga\u003dGA1.2.747058366.1611919072; __utmc\u003d201319536; JSESSIONID\u003d63EE1707428F3F9812307D8819923D9B",
  "upgrade-insecure-requests": "1",
  "sec-fetch-dest": "document",
  "sec-fetch-mode": "navigate",
  "sec-fetch-site": "cross-site",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "x-forwarded-proto": "https",
  "x-forwarded-port": "443",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
http_method
GET
url_fragment
{}
post_body
Verify authorization endpoint response
2022-05-16 11:33:49 SUCCESS
CheckMatchingCallbackParameters
Callback parameters successfully verified
2022-05-16 11:33:49
ValidateIssInAuthorizationResponse
No 'iss' value in authorization response.
2022-05-16 11:33:49 SUCCESS
CheckIfAuthorizationEndpointError
No error from authorization endpoint
2022-05-16 11:33:49 SUCCESS
CheckStateInAuthorizationResponse
State in response correctly returned
state
fb2nL5hUI9XF91gSAmegaOcc9CLHMVHRheFPeKQfVhBRBSFdtV6btDPZtjg6ahUKWXSz90GF6ZXsf5NYJevVwD4lnff3MrWC3mwArJi7vHwpfRooQIO2erIQ9vEKN5C1
2022-05-16 11:33:49 SUCCESS
ExtractAuthorizationCodeFromAuthorizationResponse
Found authorization code
code
ac39974e-b241-4b24-a7d0-7185431b7e6b.496ed173-aff6-403b-96f8-958d59343d43.369f61c6-3b09-49c8-b1e1-3efee0b11f42
2022-05-16 11:33:49 SUCCESS
CreateTokenEndpointRequestForAuthorizationCodeGrant
Created token endpoint request
grant_type
authorization_code
code
ac39974e-b241-4b24-a7d0-7185431b7e6b.496ed173-aff6-403b-96f8-958d59343d43.369f61c6-3b09-49c8-b1e1-3efee0b11f42
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
2022-05-16 11:33:49 SUCCESS
AddBasicAuthClientSecretAuthenticationParameters
Added basic authorization header
Authorization
Basic Y2xpZW50MS1ycC1pbml0aWF0ZWQtbG9nb3V0OmhZck42amJkTHE2V3RmeGpoVnhtZEYzdlZkT2dOSzlw
2022-05-16 11:33:49
CallTokenEndpoint
HTTP request
request_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token
request_method
POST
request_headers
{
  "accept": "application/json",
  "authorization": "Basic Y2xpZW50MS1ycC1pbml0aWF0ZWQtbG9nb3V0OmhZck42amJkTHE2V3RmeGpoVnhtZEYzdlZkT2dOSzlw",
  "content-type": "application/x-www-form-urlencoded;charset\u003dUTF-8",
  "content-length": "234"
}
request_body
grant_type=authorization_code&code=ac39974e-b241-4b24-a7d0-7185431b7e6b.496ed173-aff6-403b-96f8-958d59343d43.369f61c6-3b09-49c8-b1e1-3efee0b11f42&redirect_uri=https%3A%2F%2Fwww.certification.openid.net%2Ftest%2Fa%2Fkeycloak%2Fcallback
2022-05-16 11:33:49 RESPONSE
CallTokenEndpoint
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "cache-control": "no-store",
  "x-xss-protection": "1; mode\u003dblock",
  "pragma": "no-cache",
  "x-frame-options": "SAMEORIGIN",
  "referrer-policy": "no-referrer",
  "date": "Mon, 16 May 2022 11:33:49 GMT",
  "connection": "keep-alive",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "content-type": "application/json",
  "content-length": "3935"
}
response_body
{"access_token":"eyJhbGciOiJQUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICIzajJYOUxYdnhCbDE1bEFPbnR3S1d2b1MxM1pGR1Nza1NxNHFXMnJ2X3VzIn0.eyJleHAiOjE2NTI3MDExMjksImlhdCI6MTY1MjcwMDgyOSwiYXV0aF90aW1lIjoxNjUyNzAwNzQ3LCJqdGkiOiJjYzEwYzc3Zi0yYzE5LTQxNGEtOGI0Ni1kMjU3OTA0YzBkN2YiLCJpc3MiOiJodHRwczovLzg0LTI0NC03Mi05MC5uaXAuaW86NjAwMDAvYXV0aC9yZWFsbXMvdGVzdCIsImF1ZCI6InJlc291cmNlLXNlcnZlciIsInN1YiI6IjNlY2RjZWNkLTQzZGMtNGRjOS1hYTFjLWI5NzkxZmNmNzMwZiIsInR5cCI6IkJlYXJlciIsImF6cCI6ImNsaWVudDEtcnAtaW5pdGlhdGVkLWxvZ291dCIsIm5vbmNlIjoiQ0RXa3ExVkpMVyIsInNlc3Npb25fc3RhdGUiOiI0OTZlZDE3My1hZmY2LTQwM2ItOTZmOC05NThkNTkzNDNkNDMiLCJhbGxvd2VkLW9yaWdpbnMiOlsiaHR0cHM6Ly9yZXZpZXctYXBwLWRldi1icmFuY2gtMi5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXQiLCJodHRwczovL3Jldmlldy1hcHAtZGV2LWJyYW5jaC03LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldCIsImh0dHBzOi8vcmV2aWV3LWFwcC1kZXYtYnJhbmNoLTguY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0IiwiaHR0cHM6Ly93d3cuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0IiwiaHR0cHM6Ly9yZXZpZXctYXBwLWRldi1icmFuY2gtNi5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXQiLCJodHRwczovL2NvbmZvcm1hbmNlLXN1aXRlLmtleWNsb2FrLWZhcGkub3JnIiwiaHR0cHM6Ly9sb2NhbGhvc3QuZW1vYml4LmNvLnVrIiwiaHR0cHM6Ly9yZXZpZXctYXBwLWRldi1icmFuY2gtOS5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXQiLCJodHRwczovL3Jldmlldy1hcHAtZGV2LWJyYW5jaC0xLmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldCIsImh0dHBzOi8vbG9jYWxob3N0LmVtb2JpeC5jby51azo4NDQzIiwiaHR0cHM6Ly9zdGFnaW5nLmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldCIsImh0dHBzOi8vcmV2aWV3LWFwcC1kZXYtYnJhbmNoLTUuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0IiwiaHR0cHM6Ly9yZXZpZXctYXBwLWRldi1icmFuY2gtNC5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXQiLCJodHRwczovL2RlbW8uY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0IiwiaHR0cHM6Ly9sb2NhbGhvc3Q6ODQ0MyIsImh0dHBzOi8vcmV2aWV3LWFwcC1kZXYtYnJhbmNoLTMuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0Il0sInJlYWxtX2FjY2VzcyI6eyJyb2xlcyI6WyJvZmZsaW5lX2FjY2VzcyJdfSwic2NvcGUiOiJvcGVuaWQgbmFtZV9jbGFpbXMiLCJzaWQiOiI0OTZlZDE3My1hZmY2LTQwM2ItOTZmOC05NThkNTkzNDNkNDMifQ.clXzdN9CzzxlvMPBFMqoF_1WTN6J0vWl4STDP3BBWxtSgZS1yQrh0CVMrlopD3pNWnUooFPCjGKmeoeQ-es7lHDojxYJxWcPRCmpemjFI9Roa2WbGwTWgJvgXe5vp-sIRr7x6XW-jFe4xR9Sng5A-MINCBlljBWvSd9JcccsGk0DKcrBsvjrUIAJQcwjv-jksfCpEpl85gSxlH_m61y5jdlAmJ6ChJkbm8i-9VnuTvBTJEKX8Y2AM67DSLMM-_SrNwjv_CKtnrPre16fRD0ekJdr-won400yLTcf7aOh4L0FNz_QqbUQ-XI2HfgR63zivVn9CWmeiEl2gwTrvHEMlg","expires_in":300,"refresh_expires_in":1800,"refresh_token":"eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlZGU2NjRjNS0zN2U1LTQ3ZGItOTQzZC04ODk5ZDRmNzExNTQifQ.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.nnBwaFYVy3yyO2znFPPJBdLJn0yLCpeGwRMfV8DDCxo","token_type":"Bearer","id_token":"eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.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.w9jHc5OAt1GuyHEmfa36cy77mqtgwsmeWAkqL08x7KujexJE1D5X81axawOGldsxEJeZFIOQeDtUzuqXPLjzPA","not-before-policy":0,"session_state":"496ed173-aff6-403b-96f8-958d59343d43","scope":"openid name_claims"}
2022-05-16 11:33:49 SUCCESS
CallTokenEndpoint
Parsed token endpoint response
access_token
eyJhbGciOiJQUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICIzajJYOUxYdnhCbDE1bEFPbnR3S1d2b1MxM1pGR1Nza1NxNHFXMnJ2X3VzIn0.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.clXzdN9CzzxlvMPBFMqoF_1WTN6J0vWl4STDP3BBWxtSgZS1yQrh0CVMrlopD3pNWnUooFPCjGKmeoeQ-es7lHDojxYJxWcPRCmpemjFI9Roa2WbGwTWgJvgXe5vp-sIRr7x6XW-jFe4xR9Sng5A-MINCBlljBWvSd9JcccsGk0DKcrBsvjrUIAJQcwjv-jksfCpEpl85gSxlH_m61y5jdlAmJ6ChJkbm8i-9VnuTvBTJEKX8Y2AM67DSLMM-_SrNwjv_CKtnrPre16fRD0ekJdr-won400yLTcf7aOh4L0FNz_QqbUQ-XI2HfgR63zivVn9CWmeiEl2gwTrvHEMlg
expires_in
300
refresh_expires_in
1800
refresh_token
eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlZGU2NjRjNS0zN2U1LTQ3ZGItOTQzZC04ODk5ZDRmNzExNTQifQ.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.nnBwaFYVy3yyO2znFPPJBdLJn0yLCpeGwRMfV8DDCxo
token_type
Bearer
id_token
eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.eyJleHAiOjE2NTI3MDExMjksImlhdCI6MTY1MjcwMDgyOSwiYXV0aF90aW1lIjoxNjUyNzAwNzQ3LCJqdGkiOiIwYjE2ZjZiNy0xMjllLTQ0NDEtODcxYi05ZTUxNTNkOTU0MGIiLCJpc3MiOiJodHRwczovLzg0LTI0NC03Mi05MC5uaXAuaW86NjAwMDAvYXV0aC9yZWFsbXMvdGVzdCIsImF1ZCI6ImNsaWVudDEtcnAtaW5pdGlhdGVkLWxvZ291dCIsInN1YiI6IjNlY2RjZWNkLTQzZGMtNGRjOS1hYTFjLWI5NzkxZmNmNzMwZiIsInR5cCI6IklEIiwiYXpwIjoiY2xpZW50MS1ycC1pbml0aWF0ZWQtbG9nb3V0Iiwibm9uY2UiOiJDRFdrcTFWSkxXIiwic2Vzc2lvbl9zdGF0ZSI6IjQ5NmVkMTczLWFmZjYtNDAzYi05NmY4LTk1OGQ1OTM0M2Q0MyIsImF0X2hhc2giOiIyQ3prX09WWERnVWZSUV9nWG1jUDV3Iiwic2lkIjoiNDk2ZWQxNzMtYWZmNi00MDNiLTk2ZjgtOTU4ZDU5MzQzZDQzIn0.w9jHc5OAt1GuyHEmfa36cy77mqtgwsmeWAkqL08x7KujexJE1D5X81axawOGldsxEJeZFIOQeDtUzuqXPLjzPA
not-before-policy
0
session_state
496ed173-aff6-403b-96f8-958d59343d43
scope
openid name_claims
2022-05-16 11:33:49 SUCCESS
CheckIfTokenEndpointResponseError
No error from token endpoint
2022-05-16 11:33:49 SUCCESS
CheckForAccessTokenValue
Found an access token
access_token
eyJhbGciOiJQUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICIzajJYOUxYdnhCbDE1bEFPbnR3S1d2b1MxM1pGR1Nza1NxNHFXMnJ2X3VzIn0.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.clXzdN9CzzxlvMPBFMqoF_1WTN6J0vWl4STDP3BBWxtSgZS1yQrh0CVMrlopD3pNWnUooFPCjGKmeoeQ-es7lHDojxYJxWcPRCmpemjFI9Roa2WbGwTWgJvgXe5vp-sIRr7x6XW-jFe4xR9Sng5A-MINCBlljBWvSd9JcccsGk0DKcrBsvjrUIAJQcwjv-jksfCpEpl85gSxlH_m61y5jdlAmJ6ChJkbm8i-9VnuTvBTJEKX8Y2AM67DSLMM-_SrNwjv_CKtnrPre16fRD0ekJdr-won400yLTcf7aOh4L0FNz_QqbUQ-XI2HfgR63zivVn9CWmeiEl2gwTrvHEMlg
2022-05-16 11:33:49 SUCCESS
ExtractAccessTokenFromTokenResponse
Extracted the access token
value
eyJhbGciOiJQUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICIzajJYOUxYdnhCbDE1bEFPbnR3S1d2b1MxM1pGR1Nza1NxNHFXMnJ2X3VzIn0.eyJleHAiOjE2NTI3MDExMjksImlhdCI6MTY1MjcwMDgyOSwiYXV0aF90aW1lIjoxNjUyNzAwNzQ3LCJqdGkiOiJjYzEwYzc3Zi0yYzE5LTQxNGEtOGI0Ni1kMjU3OTA0YzBkN2YiLCJpc3MiOiJodHRwczovLzg0LTI0NC03Mi05MC5uaXAuaW86NjAwMDAvYXV0aC9yZWFsbXMvdGVzdCIsImF1ZCI6InJlc291cmNlLXNlcnZlciIsInN1YiI6IjNlY2RjZWNkLTQzZGMtNGRjOS1hYTFjLWI5NzkxZmNmNzMwZiIsInR5cCI6IkJlYXJlciIsImF6cCI6ImNsaWVudDEtcnAtaW5pdGlhdGVkLWxvZ291dCIsIm5vbmNlIjoiQ0RXa3ExVkpMVyIsInNlc3Npb25fc3RhdGUiOiI0OTZlZDE3My1hZmY2LTQwM2ItOTZmOC05NThkNTkzNDNkNDMiLCJhbGxvd2VkLW9yaWdpbnMiOlsiaHR0cHM6Ly9yZXZpZXctYXBwLWRldi1icmFuY2gtMi5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXQiLCJodHRwczovL3Jldmlldy1hcHAtZGV2LWJyYW5jaC03LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldCIsImh0dHBzOi8vcmV2aWV3LWFwcC1kZXYtYnJhbmNoLTguY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0IiwiaHR0cHM6Ly93d3cuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0IiwiaHR0cHM6Ly9yZXZpZXctYXBwLWRldi1icmFuY2gtNi5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXQiLCJodHRwczovL2NvbmZvcm1hbmNlLXN1aXRlLmtleWNsb2FrLWZhcGkub3JnIiwiaHR0cHM6Ly9sb2NhbGhvc3QuZW1vYml4LmNvLnVrIiwiaHR0cHM6Ly9yZXZpZXctYXBwLWRldi1icmFuY2gtOS5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXQiLCJodHRwczovL3Jldmlldy1hcHAtZGV2LWJyYW5jaC0xLmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldCIsImh0dHBzOi8vbG9jYWxob3N0LmVtb2JpeC5jby51azo4NDQzIiwiaHR0cHM6Ly9zdGFnaW5nLmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldCIsImh0dHBzOi8vcmV2aWV3LWFwcC1kZXYtYnJhbmNoLTUuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0IiwiaHR0cHM6Ly9yZXZpZXctYXBwLWRldi1icmFuY2gtNC5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXQiLCJodHRwczovL2RlbW8uY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0IiwiaHR0cHM6Ly9sb2NhbGhvc3Q6ODQ0MyIsImh0dHBzOi8vcmV2aWV3LWFwcC1kZXYtYnJhbmNoLTMuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0Il0sInJlYWxtX2FjY2VzcyI6eyJyb2xlcyI6WyJvZmZsaW5lX2FjY2VzcyJdfSwic2NvcGUiOiJvcGVuaWQgbmFtZV9jbGFpbXMiLCJzaWQiOiI0OTZlZDE3My1hZmY2LTQwM2ItOTZmOC05NThkNTkzNDNkNDMifQ.clXzdN9CzzxlvMPBFMqoF_1WTN6J0vWl4STDP3BBWxtSgZS1yQrh0CVMrlopD3pNWnUooFPCjGKmeoeQ-es7lHDojxYJxWcPRCmpemjFI9Roa2WbGwTWgJvgXe5vp-sIRr7x6XW-jFe4xR9Sng5A-MINCBlljBWvSd9JcccsGk0DKcrBsvjrUIAJQcwjv-jksfCpEpl85gSxlH_m61y5jdlAmJ6ChJkbm8i-9VnuTvBTJEKX8Y2AM67DSLMM-_SrNwjv_CKtnrPre16fRD0ekJdr-won400yLTcf7aOh4L0FNz_QqbUQ-XI2HfgR63zivVn9CWmeiEl2gwTrvHEMlg
type
Bearer
2022-05-16 11:33:49 SUCCESS
ExtractExpiresInFromTokenEndpointResponse
Extracted 'expires_in'
expires_in
300
2022-05-16 11:33:49 SUCCESS
ValidateExpiresIn
expires_in passed all validation checks
expires_in
300
2022-05-16 11:33:49 SUCCESS
CheckForRefreshTokenValue
Found a refresh token
refresh_token
eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlZGU2NjRjNS0zN2U1LTQ3ZGItOTQzZC04ODk5ZDRmNzExNTQifQ.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.nnBwaFYVy3yyO2znFPPJBdLJn0yLCpeGwRMfV8DDCxo
2022-05-16 11:33:49 SUCCESS
ExtractIdTokenFromTokenResponse
Found and parsed the id_token from token_endpoint_response
value
eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.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.w9jHc5OAt1GuyHEmfa36cy77mqtgwsmeWAkqL08x7KujexJE1D5X81axawOGldsxEJeZFIOQeDtUzuqXPLjzPA
header
{
  "kid": "6p6LMG-CvC-c6SvkKKOP8W_Z4fTBS9Q461P9zxi2n6o",
  "typ": "JWT",
  "alg": "ES256"
}
claims
{
  "at_hash": "2Czk_OVXDgUfRQ_gXmcP5w",
  "sub": "3ecdcecd-43dc-4dc9-aa1c-b9791fcf730f",
  "iss": "https://84-244-72-90.nip.io:60000/auth/realms/test",
  "typ": "ID",
  "nonce": "CDWkq1VJLW",
  "sid": "496ed173-aff6-403b-96f8-958d59343d43",
  "aud": "client1-rp-initiated-logout",
  "azp": "client1-rp-initiated-logout",
  "auth_time": 1652700747,
  "exp": 1652701129,
  "session_state": "496ed173-aff6-403b-96f8-958d59343d43",
  "iat": 1652700829,
  "jti": "0b16f6b7-129e-4441-871b-9e5153d9540b"
}
2022-05-16 11:33:49 SUCCESS
ValidateIdToken
ID token iss, aud, exp, iat, auth_time, acr & nbf claims passed validation checks
2022-05-16 11:33:49 SUCCESS
ValidateIdTokenNonce
Nonce values match
nonce
CDWkq1VJLW
2022-05-16 11:33:49 SUCCESS
ValidateIdTokenACRClaimAgainstRequest
Nothing to check; the conformance suite did not request an acr claim in request object
2022-05-16 11:33:49 SUCCESS
ValidateIdTokenSignature
id_token signature validated
id_token
eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.eyJleHAiOjE2NTI3MDExMjksImlhdCI6MTY1MjcwMDgyOSwiYXV0aF90aW1lIjoxNjUyNzAwNzQ3LCJqdGkiOiIwYjE2ZjZiNy0xMjllLTQ0NDEtODcxYi05ZTUxNTNkOTU0MGIiLCJpc3MiOiJodHRwczovLzg0LTI0NC03Mi05MC5uaXAuaW86NjAwMDAvYXV0aC9yZWFsbXMvdGVzdCIsImF1ZCI6ImNsaWVudDEtcnAtaW5pdGlhdGVkLWxvZ291dCIsInN1YiI6IjNlY2RjZWNkLTQzZGMtNGRjOS1hYTFjLWI5NzkxZmNmNzMwZiIsInR5cCI6IklEIiwiYXpwIjoiY2xpZW50MS1ycC1pbml0aWF0ZWQtbG9nb3V0Iiwibm9uY2UiOiJDRFdrcTFWSkxXIiwic2Vzc2lvbl9zdGF0ZSI6IjQ5NmVkMTczLWFmZjYtNDAzYi05NmY4LTk1OGQ1OTM0M2Q0MyIsImF0X2hhc2giOiIyQ3prX09WWERnVWZSUV9nWG1jUDV3Iiwic2lkIjoiNDk2ZWQxNzMtYWZmNi00MDNiLTk2ZjgtOTU4ZDU5MzQzZDQzIn0.w9jHc5OAt1GuyHEmfa36cy77mqtgwsmeWAkqL08x7KujexJE1D5X81axawOGldsxEJeZFIOQeDtUzuqXPLjzPA
2022-05-16 11:33:49 SUCCESS
ValidateIdTokenSignatureUsingKid
id_token signature validated
id_token
eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.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.w9jHc5OAt1GuyHEmfa36cy77mqtgwsmeWAkqL08x7KujexJE1D5X81axawOGldsxEJeZFIOQeDtUzuqXPLjzPA
2022-05-16 11:33:49 SUCCESS
CheckForSubjectInIdToken
Found 'sub' in id_token
sub
3ecdcecd-43dc-4dc9-aa1c-b9791fcf730f
2022-05-16 11:33:49 INFO
FAPIValidateEncryptedIdTokenHasKid
Skipped evaluation due to missing required element: id_token jwe_header
path
jwe_header
mapped
object
id_token
Second authorization: Userinfo endpoint tests
2022-05-16 11:33:49
CallProtectedResource
HTTP request
request_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/userinfo
request_method
GET
request_headers
{
  "accept": "application/json",
  "authorization": "Bearer eyJhbGciOiJQUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICIzajJYOUxYdnhCbDE1bEFPbnR3S1d2b1MxM1pGR1Nza1NxNHFXMnJ2X3VzIn0.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.clXzdN9CzzxlvMPBFMqoF_1WTN6J0vWl4STDP3BBWxtSgZS1yQrh0CVMrlopD3pNWnUooFPCjGKmeoeQ-es7lHDojxYJxWcPRCmpemjFI9Roa2WbGwTWgJvgXe5vp-sIRr7x6XW-jFe4xR9Sng5A-MINCBlljBWvSd9JcccsGk0DKcrBsvjrUIAJQcwjv-jksfCpEpl85gSxlH_m61y5jdlAmJ6ChJkbm8i-9VnuTvBTJEKX8Y2AM67DSLMM-_SrNwjv_CKtnrPre16fRD0ekJdr-won400yLTcf7aOh4L0FNz_QqbUQ-XI2HfgR63zivVn9CWmeiEl2gwTrvHEMlg",
  "content-length": "0"
}
request_body

                                
2022-05-16 11:33:50 RESPONSE
CallProtectedResource
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "cache-control": "no-cache",
  "x-xss-protection": "1; mode\u003dblock",
  "x-frame-options": "SAMEORIGIN",
  "referrer-policy": "no-referrer",
  "date": "Mon, 16 May 2022 11:33:50 GMT",
  "connection": "keep-alive",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "content-type": "application/json",
  "content-length": "46"
}
response_body
{"sub":"3ecdcecd-43dc-4dc9-aa1c-b9791fcf730f"}
2022-05-16 11:33:50 SUCCESS
CallProtectedResource
Got a response from the resource endpoint
status
200
endpoint_name
resource
headers
{
  "cache-control": "no-cache",
  "x-xss-protection": "1; mode\u003dblock",
  "x-frame-options": "SAMEORIGIN",
  "referrer-policy": "no-referrer",
  "date": "Mon, 16 May 2022 11:33:50 GMT",
  "connection": "keep-alive",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "content-type": "application/json",
  "content-length": "46"
}
body
{"sub":"3ecdcecd-43dc-4dc9-aa1c-b9791fcf730f"}
2022-05-16 11:33:50 SUCCESS
EnsureHttpStatusCodeIs200
resource endpoint returned the expected http status
expected_status
200
http_status
200
2022-05-16 11:33:50 SUCCESS
GenerateFakeIdTokenClaims
Created ID Token Claims
iss
client1-rp-initiated-logout
sub
SubjectID
aud
https://84-244-72-90.nip.io:60000/auth/realms/test
nonce
flibble
iat
1652700830
exp
1652701130
2022-05-16 11:33:50 SUCCESS
SignFakeIdToken
Signed a 'fake' ID token using the client's keys
id_token
eyJhbGciOiJIUzI1NiJ9.eyJzdWIiOiJTdWJqZWN0SUQiLCJhdWQiOiJodHRwczpcL1wvODQtMjQ0LTcyLTkwLm5pcC5pbzo2MDAwMFwvYXV0aFwvcmVhbG1zXC90ZXN0IiwiaXNzIjoiY2xpZW50MS1ycC1pbml0aWF0ZWQtbG9nb3V0IiwiZXhwIjoxNjUyNzAxMTMwLCJub25jZSI6ImZsaWJibGUiLCJpYXQiOjE2NTI3MDA4MzB9.WRLCtMTZrC3L6IH0NEOU124gJp7tziCBzIWbocqaQlk
Redirect to end session endpoint & wait for response
2022-05-16 11:33:50
CreateRandomEndSessionState
Created end_session_state value
end_session_state
zxfrJEjrhKOEQetWvQmqwjcGzPfCsbXcdHsJrNeHMuWreVzrSn0835546006:?!$~>~&~$~~)@:'\=$^_',~}.|/>_
2022-05-16 11:33:50 SUCCESS
CreateEndSessionEndpointRequest
Created end session endpoint request
id_token_hint
eyJhbGciOiJIUzI1NiJ9.eyJzdWIiOiJTdWJqZWN0SUQiLCJhdWQiOiJodHRwczpcL1wvODQtMjQ0LTcyLTkwLm5pcC5pbzo2MDAwMFwvYXV0aFwvcmVhbG1zXC90ZXN0IiwiaXNzIjoiY2xpZW50MS1ycC1pbml0aWF0ZWQtbG9nb3V0IiwiZXhwIjoxNjUyNzAxMTMwLCJub25jZSI6ImZsaWJibGUiLCJpYXQiOjE2NTI3MDA4MzB9.WRLCtMTZrC3L6IH0NEOU124gJp7tziCBzIWbocqaQlk
post_logout_redirect_uri
https://www.certification.openid.net/test/a/keycloak/post_logout_redirect
state
zxfrJEjrhKOEQetWvQmqwjcGzPfCsbXcdHsJrNeHMuWreVzrSn0835546006:?!$~>~&~$~~)@:'\=$^_',~}.|/>_
2022-05-16 11:33:50 SUCCESS
BuildRedirectToEndSessionEndpoint
Sending to end_session endpoint
redirect_to_end_session_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/logout?id_token_hint=eyJhbGciOiJIUzI1NiJ9.eyJzdWIiOiJTdWJqZWN0SUQiLCJhdWQiOiJodHRwczpcL1wvODQtMjQ0LTcyLTkwLm5pcC5pbzo2MDAwMFwvYXV0aFwvcmVhbG1zXC90ZXN0IiwiaXNzIjoiY2xpZW50MS1ycC1pbml0aWF0ZWQtbG9nb3V0IiwiZXhwIjoxNjUyNzAxMTMwLCJub25jZSI6ImZsaWJibGUiLCJpYXQiOjE2NTI3MDA4MzB9.WRLCtMTZrC3L6IH0NEOU124gJp7tziCBzIWbocqaQlk&post_logout_redirect_uri=https://www.certification.openid.net/test/a/keycloak/post_logout_redirect&state=zxfrJEjrhKOEQetWvQmqwjcGzPfCsbXcdHsJrNeHMuWreVzrSn0835546006:?!$~%3E~%26~$~~)@:'%5C%3D$%5E_',~%7D.%7C/%3E_
2022-05-16 11:33:50 REVIEW IMAGE
ExpectInvalidIdTokenHintErrorPage
The server must show an error page saying the request is invalid as the id_token_hint is not valid - upload a screenshot of the error page.
img
updatedAt
1652700847861
2022-05-16 11:33:50 REDIRECT
oidcc-rp-initiated-logout-bad-id-token-hint
Redirecting to end session endpoint
redirect_to
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/logout?id_token_hint=eyJhbGciOiJIUzI1NiJ9.eyJzdWIiOiJTdWJqZWN0SUQiLCJhdWQiOiJodHRwczpcL1wvODQtMjQ0LTcyLTkwLm5pcC5pbzo2MDAwMFwvYXV0aFwvcmVhbG1zXC90ZXN0IiwiaXNzIjoiY2xpZW50MS1ycC1pbml0aWF0ZWQtbG9nb3V0IiwiZXhwIjoxNjUyNzAxMTMwLCJub25jZSI6ImZsaWJibGUiLCJpYXQiOjE2NTI3MDA4MzB9.WRLCtMTZrC3L6IH0NEOU124gJp7tziCBzIWbocqaQlk&post_logout_redirect_uri=https://www.certification.openid.net/test/a/keycloak/post_logout_redirect&state=zxfrJEjrhKOEQetWvQmqwjcGzPfCsbXcdHsJrNeHMuWreVzrSn0835546006:?!$~%3E~%26~$~~)@:'%5C%3D$%5E_',~%7D.%7C/%3E_
2022-05-16 11:34:21 FINISHED
oidcc-rp-initiated-logout-bad-id-token-hint
Test has run to completion
testmodule_result
REVIEW
Unregister dynamically registered client
2022-05-16 11:34:21
UnregisterDynamicallyRegisteredClient
Couldn't find registration_access_token.
2022-05-16 11:36:55
TEST-RUNNER
Alias has now been claimed by another test
alias
keycloak
new_test_id
waxpQvnjGrsWtV5
Test Results