Test Summary

Test Results

Expand All Collapse All
All times are UTC
2022-05-16 11:41:37 INFO
TEST-RUNNER
Test instance DFWkDSXQrg4rO5b created
baseUrl
https://www.certification.openid.net/test/a/keycloak
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "id_token",
  "server_metadata": "discovery",
  "response_mode": "default",
  "client_registration": "static_client"
}
alias
keycloak
description
Keycloak, OpenID Connect Core: Rp Initiated Logout Certification Profile (client_registration:static_client)
planId
ofaeIVWGvFYCk
config
{
  "alias": "keycloak",
  "description": "Keycloak, OpenID Connect Core: Rp Initiated Logout Certification Profile (client_registration:static_client)",
  "server": {
    "discoveryUrl": "https://84-244-72-90.nip.io:60000/auth/realms/test/.well-known/openid-configuration",
    "login_hint": "john"
  },
  "client": {
    "client_id": "client1-rp-initiated-logout",
    "client_secret": "hYrN6jbdLq6WtfxjhVxmdF3vVdOgNK9p"
  }
}
testName
oidcc-rp-initiated-logout-no-state
2022-05-16 11:41:38 SUCCESS
CreateRedirectUri
Created redirect URI
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
2022-05-16 11:41:38
GetDynamicServerConfiguration
HTTP request
request_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/.well-known/openid-configuration
request_method
GET
request_headers
{
  "accept": "text/plain, application/json, application/*+json, */*",
  "content-length": "0"
}
request_body

                                
2022-05-16 11:41:38 RESPONSE
GetDynamicServerConfiguration
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "cache-control": "no-cache, must-revalidate, no-transform, no-store",
  "x-xss-protection": "1; mode\u003dblock",
  "x-frame-options": "SAMEORIGIN",
  "referrer-policy": "no-referrer",
  "date": "Mon, 16 May 2022 11:41:38 GMT",
  "connection": "keep-alive",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "content-type": "application/json",
  "content-length": "6208"
}
response_body
{"issuer":"https://84-244-72-90.nip.io:60000/auth/realms/test","authorization_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth","token_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token","introspection_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token/introspect","userinfo_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/userinfo","end_session_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/logout","frontchannel_logout_session_supported":true,"frontchannel_logout_supported":true,"jwks_uri":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/certs","check_session_iframe":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/login-status-iframe.html","grant_types_supported":["authorization_code","implicit","refresh_token","password","client_credentials","urn:ietf:params:oauth:grant-type:device_code","urn:openid:params:grant-type:ciba"],"acr_values_supported":["0","1"],"response_types_supported":["code","none","id_token","token","id_token token","code id_token","code token","code id_token token"],"subject_types_supported":["public","pairwise"],"id_token_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512"],"id_token_encryption_alg_values_supported":["RSA-OAEP","RSA-OAEP-256","RSA1_5"],"id_token_encryption_enc_values_supported":["A256GCM","A192GCM","A128GCM","A128CBC-HS256","A192CBC-HS384","A256CBC-HS512"],"userinfo_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512","none"],"userinfo_encryption_alg_values_supported":["RSA-OAEP","RSA-OAEP-256","RSA1_5"],"userinfo_encryption_enc_values_supported":["A256GCM","A192GCM","A128GCM","A128CBC-HS256","A192CBC-HS384","A256CBC-HS512"],"request_object_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512","none"],"request_object_encryption_alg_values_supported":["RSA-OAEP","RSA-OAEP-256","RSA1_5"],"request_object_encryption_enc_values_supported":["A256GCM","A192GCM","A128GCM","A128CBC-HS256","A192CBC-HS384","A256CBC-HS512"],"response_modes_supported":["query","fragment","form_post","query.jwt","fragment.jwt","form_post.jwt","jwt"],"registration_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect","token_endpoint_auth_methods_supported":["private_key_jwt","client_secret_basic","client_secret_post","tls_client_auth","client_secret_jwt"],"token_endpoint_auth_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512"],"introspection_endpoint_auth_methods_supported":["private_key_jwt","client_secret_basic","client_secret_post","tls_client_auth","client_secret_jwt"],"introspection_endpoint_auth_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512"],"authorization_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512"],"authorization_encryption_alg_values_supported":["RSA-OAEP","RSA-OAEP-256","RSA1_5"],"authorization_encryption_enc_values_supported":["A256GCM","A192GCM","A128GCM","A128CBC-HS256","A192CBC-HS384","A256CBC-HS512"],"claims_supported":["aud","sub","iss","auth_time","name","given_name","family_name","preferred_username","email","acr"],"claim_types_supported":["normal"],"claims_parameter_supported":true,"scopes_supported":["openid","consents","name_claims","microprofile-jwt","consent:1","name_claims_for_implicit","roles","address","phone","web-origins","profile","offline_access","resources","email"],"request_parameter_supported":true,"request_uri_parameter_supported":true,"require_request_uri_registration":true,"code_challenge_methods_supported":["plain","S256"],"tls_client_certificate_bound_access_tokens":true,"revocation_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/revoke","revocation_endpoint_auth_methods_supported":["private_key_jwt","client_secret_basic","client_secret_post","tls_client_auth","client_secret_jwt"],"revocation_endpoint_auth_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512"],"backchannel_logout_supported":true,"backchannel_logout_session_supported":true,"device_authorization_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth/device","backchannel_token_delivery_modes_supported":["poll","ping"],"backchannel_authentication_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/ciba/auth","backchannel_authentication_request_signing_alg_values_supported":["PS384","ES384","RS384","ES256","RS256","ES512","PS256","PS512","RS512"],"require_pushed_authorization_requests":false,"pushed_authorization_request_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/par/request","mtls_endpoint_aliases":{"token_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token","revocation_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/revoke","introspection_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token/introspect","device_authorization_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth/device","registration_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect","userinfo_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/userinfo","pushed_authorization_request_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/par/request","backchannel_authentication_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/ciba/auth"}}
2022-05-16 11:41:38 SUCCESS
GetDynamicServerConfiguration
Successfully parsed server configuration
issuer
https://84-244-72-90.nip.io:60000/auth/realms/test
authorization_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth
token_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token
introspection_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token/introspect
userinfo_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/userinfo
end_session_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/logout
frontchannel_logout_session_supported
true
frontchannel_logout_supported
true
jwks_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/certs
check_session_iframe
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/login-status-iframe.html
grant_types_supported
[
  "authorization_code",
  "implicit",
  "refresh_token",
  "password",
  "client_credentials",
  "urn:ietf:params:oauth:grant-type:device_code",
  "urn:openid:params:grant-type:ciba"
]
acr_values_supported
[
  "0",
  "1"
]
response_types_supported
[
  "code",
  "none",
  "id_token",
  "token",
  "id_token token",
  "code id_token",
  "code token",
  "code id_token token"
]
subject_types_supported
[
  "public",
  "pairwise"
]
id_token_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512"
]
id_token_encryption_alg_values_supported
[
  "RSA-OAEP",
  "RSA-OAEP-256",
  "RSA1_5"
]
id_token_encryption_enc_values_supported
[
  "A256GCM",
  "A192GCM",
  "A128GCM",
  "A128CBC-HS256",
  "A192CBC-HS384",
  "A256CBC-HS512"
]
userinfo_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512",
  "none"
]
userinfo_encryption_alg_values_supported
[
  "RSA-OAEP",
  "RSA-OAEP-256",
  "RSA1_5"
]
userinfo_encryption_enc_values_supported
[
  "A256GCM",
  "A192GCM",
  "A128GCM",
  "A128CBC-HS256",
  "A192CBC-HS384",
  "A256CBC-HS512"
]
request_object_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512",
  "none"
]
request_object_encryption_alg_values_supported
[
  "RSA-OAEP",
  "RSA-OAEP-256",
  "RSA1_5"
]
request_object_encryption_enc_values_supported
[
  "A256GCM",
  "A192GCM",
  "A128GCM",
  "A128CBC-HS256",
  "A192CBC-HS384",
  "A256CBC-HS512"
]
response_modes_supported
[
  "query",
  "fragment",
  "form_post",
  "query.jwt",
  "fragment.jwt",
  "form_post.jwt",
  "jwt"
]
registration_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect
token_endpoint_auth_methods_supported
[
  "private_key_jwt",
  "client_secret_basic",
  "client_secret_post",
  "tls_client_auth",
  "client_secret_jwt"
]
token_endpoint_auth_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512"
]
introspection_endpoint_auth_methods_supported
[
  "private_key_jwt",
  "client_secret_basic",
  "client_secret_post",
  "tls_client_auth",
  "client_secret_jwt"
]
introspection_endpoint_auth_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512"
]
authorization_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512"
]
authorization_encryption_alg_values_supported
[
  "RSA-OAEP",
  "RSA-OAEP-256",
  "RSA1_5"
]
authorization_encryption_enc_values_supported
[
  "A256GCM",
  "A192GCM",
  "A128GCM",
  "A128CBC-HS256",
  "A192CBC-HS384",
  "A256CBC-HS512"
]
claims_supported
[
  "aud",
  "sub",
  "iss",
  "auth_time",
  "name",
  "given_name",
  "family_name",
  "preferred_username",
  "email",
  "acr"
]
claim_types_supported
[
  "normal"
]
claims_parameter_supported
true
scopes_supported
[
  "openid",
  "consents",
  "name_claims",
  "microprofile-jwt",
  "consent:1",
  "name_claims_for_implicit",
  "roles",
  "address",
  "phone",
  "web-origins",
  "profile",
  "offline_access",
  "resources",
  "email"
]
request_parameter_supported
true
request_uri_parameter_supported
true
require_request_uri_registration
true
code_challenge_methods_supported
[
  "plain",
  "S256"
]
tls_client_certificate_bound_access_tokens
true
revocation_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/revoke
revocation_endpoint_auth_methods_supported
[
  "private_key_jwt",
  "client_secret_basic",
  "client_secret_post",
  "tls_client_auth",
  "client_secret_jwt"
]
revocation_endpoint_auth_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512"
]
backchannel_logout_supported
true
backchannel_logout_session_supported
true
device_authorization_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth/device
backchannel_token_delivery_modes_supported
[
  "poll",
  "ping"
]
backchannel_authentication_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/ciba/auth
backchannel_authentication_request_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "ES256",
  "RS256",
  "ES512",
  "PS256",
  "PS512",
  "RS512"
]
require_pushed_authorization_requests
false
pushed_authorization_request_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/par/request
mtls_endpoint_aliases
{
  "token_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token",
  "revocation_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/revoke",
  "introspection_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token/introspect",
  "device_authorization_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth/device",
  "registration_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect",
  "userinfo_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/userinfo",
  "pushed_authorization_request_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/par/request",
  "backchannel_authentication_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/ciba/auth"
}
2022-05-16 11:41:38 SUCCESS
CheckServerConfiguration
Found required server configuration keys
required
[
  "authorization_endpoint",
  "token_endpoint",
  "issuer"
]
2022-05-16 11:41:38 SUCCESS
ExtractTLSTestValuesFromServerConfiguration
Extracted TLS information from authorization server configuration
registration_endpoint
{
  "testHost": "84-244-72-90.nip.io",
  "testPort": 60000
}
authorization_endpoint
{
  "testHost": "84-244-72-90.nip.io",
  "testPort": 60000
}
token_endpoint
{
  "testHost": "84-244-72-90.nip.io",
  "testPort": 60000
}
userinfo_endpoint
{
  "testHost": "84-244-72-90.nip.io",
  "testPort": 60000
}
2022-05-16 11:41:38
FetchServerKeys
Fetching server key
jwks_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/certs
2022-05-16 11:41:38
FetchServerKeys
HTTP request
request_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/certs
request_method
GET
request_headers
{
  "accept": "text/plain, application/json, application/*+json, */*",
  "content-length": "0"
}
request_body

                                
2022-05-16 11:41:39 RESPONSE
FetchServerKeys
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "cache-control": "no-cache",
  "x-xss-protection": "1; mode\u003dblock",
  "x-frame-options": "SAMEORIGIN",
  "referrer-policy": "no-referrer",
  "date": "Mon, 16 May 2022 11:41:39 GMT",
  "connection": "keep-alive",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "content-type": "application/json",
  "content-length": "4559"
}
response_body
{"keys":[{"kid":"nVJXuV18rIhJQK_ezukCg6B6ihqd_ysVRpNmmGNIJgg","kty":"RSA","alg":"PS256","use":"enc","n":"gJeVMx_ucf4OkwPjfo3QqRVGJad4MoGX0epHfzh_9JWhetahQKvU2R8I7YnWMRmdni2ZuWVdnRDdrU83FN-RGKRq8bkV59-U9UM25mrFD-27qczX_SvipPeSJfCC8BVg6IVaG0xYVJcAJyqCczhV0p36Tv3ehLhnZA_JZYgGcQznEXRawqQMQ1hKLC-cbQdXbcuzlKB-jGKUvNOPrRWkFYbcbbPMqeqv60TtQL--9X0rFxySfGbUVTDENmsJUaS5vs-cHEyst-UX6Y-lmCoTA0LZsOaH608POFmeaVB7ZmDdeGCHS_H4BCbQS7p_vI67i-IH8L5qrr_TZGabii1Ggw","e":"AQAB","x5c":["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"],"x5t":"nsamQNPuXTrs2Bh2mhtQ1p-Cs-M","x5t#S256":"g1XbSXBmnrd0nphVoyIfkix50Nsr0HqrJAvypgOzBq0"},{"kid":"RzJaSl5uXbIzduF-D5dOo6yLiqMOrdK3P_7vKZKsqrY","kty":"RSA","alg":"RS256","use":"sig","n":"hc3JDwS0TS-SX74-_FJKP9bq5LuuyrFZkxLfX6NVyyR9iEO-_WY4bnc_f9DVWEn1ygYY-K0WlVBvaPpgoEKKPxNqJ0NrgAj_xjOr-9Pqw5q8I3ziIAPTmxH0NQkVUTsCR5p62aXUEfpmTeNtqMOS9GTHZPjAuHimiEgdEY-boolGJbUwAfzpd42vDjnz2kWct80D74iUHANxLz8jJ1reyUwH1QyLF-ouHb5Kh4yHfhVd1iP0oQwPEtB3IS25NQsRyrOHJpFvooRhmzWdyceG-c2Ui670zFv3gUAwoZclkVlS9ykPvVqZyYNQ6Sl-TUNUOWppIG-VSQW15mtfWmiskw","e":"AQAB","x5c":["MIIClzCCAX8CBgGAzCPu7jANBgkqhkiG9w0BAQsFADAPMQ0wCwYDVQQDDAR0ZXN0MB4XDTIyMDUxNjA5MTA0OFoXDTMyMDUxNjA5MTIyOFowDzENMAsGA1UEAwwEdGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIXNyQ8EtE0vkl++PvxSSj/W6uS7rsqxWZMS31+jVcskfYhDvv1mOG53P3/Q1VhJ9coGGPitFpVQb2j6YKBCij8TaidDa4AI/8Yzq/vT6sOavCN84iAD05sR9DUJFVE7Akeaetml1BH6Zk3jbajDkvRkx2T4wLh4pohIHRGPm6KJRiW1MAH86XeNrw4589pFnLfNA++IlBwDcS8/Iyda3slMB9UMixfqLh2+SoeMh34VXdYj9KEMDxLQdyEtuTULEcqzhyaRb6KEYZs1ncnHhvnNlIuu9Mxb94FAMKGXJZFZUvcpD71amcmDUOkpfk1DVDlqaSBvlUkFteZrX1porJMCAwEAATANBgkqhkiG9w0BAQsFAAOCAQEABc4byb50M1IWWJgsXem0mAQAT8Zn/Q8qbVpTx2n5+uegtnetUTF4bvhlgtBrWVQSt1tPAjPo5A3uvfiSqaWmu66XzhWMXsPyFfchRdpIUZsnZCxv0upO232DWsbIURvK7oyZWIYerU5luUyUCZ0nVYPdKsfqr3bSnFfM8nSV8/mA1HWKNXUXpkJCwvqY0xUKkuvmxholp0c9GXjZ8yoz595DsaAM56CkZ1jN1wlCkkoOb8l7pFBPSjUgYmHWb4TDdgKr1XVUChP1yfWCk8ypYdBwlekLYLmBQneH/Y/sVT+pQZqtkb22ptGOy3wu4q7TJ7KW5JI/GZCT6izsRvmJKQ=="],"x5t":"a9EHlEUdeGHxtup6eQp74LCZWyk","x5t#S256":"XM6CJJcSE1YeZJ5rtNWzbhZe6FhjvVmYzxyUhflmx80"},{"kid":"3j2X9LXvxBl15lAOntwKWvoS13ZFGSskSq4qW2rv_us","kty":"RSA","alg":"PS256","use":"sig","n":"jF-GpA0T_8cZjweY69yY5oKwOwWXKIXCL4mG8PcFcdeuihPGTU3w6XV-dTQPjfZpysISmSpZKm1aEMwTh2yXIl5Oel95rNzaj-7rMI4nrZn9ruHjh_cToHxyWDI8bs_V-MSBwqbbFGltdXWUa3LFsrwRt0XKNMPzhQLciuLO0iBumF4Yc1VqmmS9buwpCqPc2qNggMp7pteZe5Lbkc-0X6zbBqkgo8wkbq31TN7cwDWxmVttxw7Mc4eUSVuROqiLgSKRCoWGYf9vIsiiXov8Q3mLaXyiQvh9gzDyWwzzAxbmVQhBxF-PVOdgGurYU0HkNjw3cr3OZkvKzbqccdYsiQ","e":"AQAB","x5c":["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"],"x5t":"TvB49qBdfskwNG8LWUYOE3z29fE","x5t#S256":"kTzfVukTOuEwsJ7ICp69-kbcipMUZ31yTNOPdQifuMk"},{"kid":"6p6LMG-CvC-c6SvkKKOP8W_Z4fTBS9Q461P9zxi2n6o","kty":"EC","alg":"ES256","use":"sig","crv":"P-256","x":"wy_EGIii551Ei-nodYzkg-S_y3ecdgTATnAwUxinhhQ","y":"LCbIl7PUYc2DtBJGRMrOt80rk3PJbJ1onUwK_82yHUw"}]}
2022-05-16 11:41:39
FetchServerKeys
Found JWK set string
jwk_string
{"keys":[{"kid":"nVJXuV18rIhJQK_ezukCg6B6ihqd_ysVRpNmmGNIJgg","kty":"RSA","alg":"PS256","use":"enc","n":"gJeVMx_ucf4OkwPjfo3QqRVGJad4MoGX0epHfzh_9JWhetahQKvU2R8I7YnWMRmdni2ZuWVdnRDdrU83FN-RGKRq8bkV59-U9UM25mrFD-27qczX_SvipPeSJfCC8BVg6IVaG0xYVJcAJyqCczhV0p36Tv3ehLhnZA_JZYgGcQznEXRawqQMQ1hKLC-cbQdXbcuzlKB-jGKUvNOPrRWkFYbcbbPMqeqv60TtQL--9X0rFxySfGbUVTDENmsJUaS5vs-cHEyst-UX6Y-lmCoTA0LZsOaH608POFmeaVB7ZmDdeGCHS_H4BCbQS7p_vI67i-IH8L5qrr_TZGabii1Ggw","e":"AQAB","x5c":["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"],"x5t":"nsamQNPuXTrs2Bh2mhtQ1p-Cs-M","x5t#S256":"g1XbSXBmnrd0nphVoyIfkix50Nsr0HqrJAvypgOzBq0"},{"kid":"RzJaSl5uXbIzduF-D5dOo6yLiqMOrdK3P_7vKZKsqrY","kty":"RSA","alg":"RS256","use":"sig","n":"hc3JDwS0TS-SX74-_FJKP9bq5LuuyrFZkxLfX6NVyyR9iEO-_WY4bnc_f9DVWEn1ygYY-K0WlVBvaPpgoEKKPxNqJ0NrgAj_xjOr-9Pqw5q8I3ziIAPTmxH0NQkVUTsCR5p62aXUEfpmTeNtqMOS9GTHZPjAuHimiEgdEY-boolGJbUwAfzpd42vDjnz2kWct80D74iUHANxLz8jJ1reyUwH1QyLF-ouHb5Kh4yHfhVd1iP0oQwPEtB3IS25NQsRyrOHJpFvooRhmzWdyceG-c2Ui670zFv3gUAwoZclkVlS9ykPvVqZyYNQ6Sl-TUNUOWppIG-VSQW15mtfWmiskw","e":"AQAB","x5c":["MIIClzCCAX8CBgGAzCPu7jANBgkqhkiG9w0BAQsFADAPMQ0wCwYDVQQDDAR0ZXN0MB4XDTIyMDUxNjA5MTA0OFoXDTMyMDUxNjA5MTIyOFowDzENMAsGA1UEAwwEdGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIXNyQ8EtE0vkl++PvxSSj/W6uS7rsqxWZMS31+jVcskfYhDvv1mOG53P3/Q1VhJ9coGGPitFpVQb2j6YKBCij8TaidDa4AI/8Yzq/vT6sOavCN84iAD05sR9DUJFVE7Akeaetml1BH6Zk3jbajDkvRkx2T4wLh4pohIHRGPm6KJRiW1MAH86XeNrw4589pFnLfNA++IlBwDcS8/Iyda3slMB9UMixfqLh2+SoeMh34VXdYj9KEMDxLQdyEtuTULEcqzhyaRb6KEYZs1ncnHhvnNlIuu9Mxb94FAMKGXJZFZUvcpD71amcmDUOkpfk1DVDlqaSBvlUkFteZrX1porJMCAwEAATANBgkqhkiG9w0BAQsFAAOCAQEABc4byb50M1IWWJgsXem0mAQAT8Zn/Q8qbVpTx2n5+uegtnetUTF4bvhlgtBrWVQSt1tPAjPo5A3uvfiSqaWmu66XzhWMXsPyFfchRdpIUZsnZCxv0upO232DWsbIURvK7oyZWIYerU5luUyUCZ0nVYPdKsfqr3bSnFfM8nSV8/mA1HWKNXUXpkJCwvqY0xUKkuvmxholp0c9GXjZ8yoz595DsaAM56CkZ1jN1wlCkkoOb8l7pFBPSjUgYmHWb4TDdgKr1XVUChP1yfWCk8ypYdBwlekLYLmBQneH/Y/sVT+pQZqtkb22ptGOy3wu4q7TJ7KW5JI/GZCT6izsRvmJKQ=="],"x5t":"a9EHlEUdeGHxtup6eQp74LCZWyk","x5t#S256":"XM6CJJcSE1YeZJ5rtNWzbhZe6FhjvVmYzxyUhflmx80"},{"kid":"3j2X9LXvxBl15lAOntwKWvoS13ZFGSskSq4qW2rv_us","kty":"RSA","alg":"PS256","use":"sig","n":"jF-GpA0T_8cZjweY69yY5oKwOwWXKIXCL4mG8PcFcdeuihPGTU3w6XV-dTQPjfZpysISmSpZKm1aEMwTh2yXIl5Oel95rNzaj-7rMI4nrZn9ruHjh_cToHxyWDI8bs_V-MSBwqbbFGltdXWUa3LFsrwRt0XKNMPzhQLciuLO0iBumF4Yc1VqmmS9buwpCqPc2qNggMp7pteZe5Lbkc-0X6zbBqkgo8wkbq31TN7cwDWxmVttxw7Mc4eUSVuROqiLgSKRCoWGYf9vIsiiXov8Q3mLaXyiQvh9gzDyWwzzAxbmVQhBxF-PVOdgGurYU0HkNjw3cr3OZkvKzbqccdYsiQ","e":"AQAB","x5c":["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"],"x5t":"TvB49qBdfskwNG8LWUYOE3z29fE","x5t#S256":"kTzfVukTOuEwsJ7ICp69-kbcipMUZ31yTNOPdQifuMk"},{"kid":"6p6LMG-CvC-c6SvkKKOP8W_Z4fTBS9Q461P9zxi2n6o","kty":"EC","alg":"ES256","use":"sig","crv":"P-256","x":"wy_EGIii551Ei-nodYzkg-S_y3ecdgTATnAwUxinhhQ","y":"LCbIl7PUYc2DtBJGRMrOt80rk3PJbJ1onUwK_82yHUw"}]}
2022-05-16 11:41:39 SUCCESS
FetchServerKeys
Found server JWK set
server_jwks
{
  "keys": [
    {
      "kid": "nVJXuV18rIhJQK_ezukCg6B6ihqd_ysVRpNmmGNIJgg",
      "kty": "RSA",
      "alg": "PS256",
      "use": "enc",
      "n": "gJeVMx_ucf4OkwPjfo3QqRVGJad4MoGX0epHfzh_9JWhetahQKvU2R8I7YnWMRmdni2ZuWVdnRDdrU83FN-RGKRq8bkV59-U9UM25mrFD-27qczX_SvipPeSJfCC8BVg6IVaG0xYVJcAJyqCczhV0p36Tv3ehLhnZA_JZYgGcQznEXRawqQMQ1hKLC-cbQdXbcuzlKB-jGKUvNOPrRWkFYbcbbPMqeqv60TtQL--9X0rFxySfGbUVTDENmsJUaS5vs-cHEyst-UX6Y-lmCoTA0LZsOaH608POFmeaVB7ZmDdeGCHS_H4BCbQS7p_vI67i-IH8L5qrr_TZGabii1Ggw",
      "e": "AQAB",
      "x5c": [
        "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\u003d\u003d"
      ],
      "x5t": "nsamQNPuXTrs2Bh2mhtQ1p-Cs-M",
      "x5t#S256": "g1XbSXBmnrd0nphVoyIfkix50Nsr0HqrJAvypgOzBq0"
    },
    {
      "kid": "RzJaSl5uXbIzduF-D5dOo6yLiqMOrdK3P_7vKZKsqrY",
      "kty": "RSA",
      "alg": "RS256",
      "use": "sig",
      "n": "hc3JDwS0TS-SX74-_FJKP9bq5LuuyrFZkxLfX6NVyyR9iEO-_WY4bnc_f9DVWEn1ygYY-K0WlVBvaPpgoEKKPxNqJ0NrgAj_xjOr-9Pqw5q8I3ziIAPTmxH0NQkVUTsCR5p62aXUEfpmTeNtqMOS9GTHZPjAuHimiEgdEY-boolGJbUwAfzpd42vDjnz2kWct80D74iUHANxLz8jJ1reyUwH1QyLF-ouHb5Kh4yHfhVd1iP0oQwPEtB3IS25NQsRyrOHJpFvooRhmzWdyceG-c2Ui670zFv3gUAwoZclkVlS9ykPvVqZyYNQ6Sl-TUNUOWppIG-VSQW15mtfWmiskw",
      "e": "AQAB",
      "x5c": [
        "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\u003d\u003d"
      ],
      "x5t": "a9EHlEUdeGHxtup6eQp74LCZWyk",
      "x5t#S256": "XM6CJJcSE1YeZJ5rtNWzbhZe6FhjvVmYzxyUhflmx80"
    },
    {
      "kid": "3j2X9LXvxBl15lAOntwKWvoS13ZFGSskSq4qW2rv_us",
      "kty": "RSA",
      "alg": "PS256",
      "use": "sig",
      "n": "jF-GpA0T_8cZjweY69yY5oKwOwWXKIXCL4mG8PcFcdeuihPGTU3w6XV-dTQPjfZpysISmSpZKm1aEMwTh2yXIl5Oel95rNzaj-7rMI4nrZn9ruHjh_cToHxyWDI8bs_V-MSBwqbbFGltdXWUa3LFsrwRt0XKNMPzhQLciuLO0iBumF4Yc1VqmmS9buwpCqPc2qNggMp7pteZe5Lbkc-0X6zbBqkgo8wkbq31TN7cwDWxmVttxw7Mc4eUSVuROqiLgSKRCoWGYf9vIsiiXov8Q3mLaXyiQvh9gzDyWwzzAxbmVQhBxF-PVOdgGurYU0HkNjw3cr3OZkvKzbqccdYsiQ",
      "e": "AQAB",
      "x5c": [
        "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\u003d\u003d"
      ],
      "x5t": "TvB49qBdfskwNG8LWUYOE3z29fE",
      "x5t#S256": "kTzfVukTOuEwsJ7ICp69-kbcipMUZ31yTNOPdQifuMk"
    },
    {
      "kid": "6p6LMG-CvC-c6SvkKKOP8W_Z4fTBS9Q461P9zxi2n6o",
      "kty": "EC",
      "alg": "ES256",
      "use": "sig",
      "crv": "P-256",
      "x": "wy_EGIii551Ei-nodYzkg-S_y3ecdgTATnAwUxinhhQ",
      "y": "LCbIl7PUYc2DtBJGRMrOt80rk3PJbJ1onUwK_82yHUw"
    }
  ]
}
2022-05-16 11:41:39 SUCCESS
CheckServerKeysIsValid
Server JWKs is valid
server_jwks
{
  "keys": [
    {
      "kid": "nVJXuV18rIhJQK_ezukCg6B6ihqd_ysVRpNmmGNIJgg",
      "kty": "RSA",
      "alg": "PS256",
      "use": "enc",
      "n": "gJeVMx_ucf4OkwPjfo3QqRVGJad4MoGX0epHfzh_9JWhetahQKvU2R8I7YnWMRmdni2ZuWVdnRDdrU83FN-RGKRq8bkV59-U9UM25mrFD-27qczX_SvipPeSJfCC8BVg6IVaG0xYVJcAJyqCczhV0p36Tv3ehLhnZA_JZYgGcQznEXRawqQMQ1hKLC-cbQdXbcuzlKB-jGKUvNOPrRWkFYbcbbPMqeqv60TtQL--9X0rFxySfGbUVTDENmsJUaS5vs-cHEyst-UX6Y-lmCoTA0LZsOaH608POFmeaVB7ZmDdeGCHS_H4BCbQS7p_vI67i-IH8L5qrr_TZGabii1Ggw",
      "e": "AQAB",
      "x5c": [
        "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\u003d\u003d"
      ],
      "x5t": "nsamQNPuXTrs2Bh2mhtQ1p-Cs-M",
      "x5t#S256": "g1XbSXBmnrd0nphVoyIfkix50Nsr0HqrJAvypgOzBq0"
    },
    {
      "kid": "RzJaSl5uXbIzduF-D5dOo6yLiqMOrdK3P_7vKZKsqrY",
      "kty": "RSA",
      "alg": "RS256",
      "use": "sig",
      "n": "hc3JDwS0TS-SX74-_FJKP9bq5LuuyrFZkxLfX6NVyyR9iEO-_WY4bnc_f9DVWEn1ygYY-K0WlVBvaPpgoEKKPxNqJ0NrgAj_xjOr-9Pqw5q8I3ziIAPTmxH0NQkVUTsCR5p62aXUEfpmTeNtqMOS9GTHZPjAuHimiEgdEY-boolGJbUwAfzpd42vDjnz2kWct80D74iUHANxLz8jJ1reyUwH1QyLF-ouHb5Kh4yHfhVd1iP0oQwPEtB3IS25NQsRyrOHJpFvooRhmzWdyceG-c2Ui670zFv3gUAwoZclkVlS9ykPvVqZyYNQ6Sl-TUNUOWppIG-VSQW15mtfWmiskw",
      "e": "AQAB",
      "x5c": [
        "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\u003d\u003d"
      ],
      "x5t": "a9EHlEUdeGHxtup6eQp74LCZWyk",
      "x5t#S256": "XM6CJJcSE1YeZJ5rtNWzbhZe6FhjvVmYzxyUhflmx80"
    },
    {
      "kid": "3j2X9LXvxBl15lAOntwKWvoS13ZFGSskSq4qW2rv_us",
      "kty": "RSA",
      "alg": "PS256",
      "use": "sig",
      "n": "jF-GpA0T_8cZjweY69yY5oKwOwWXKIXCL4mG8PcFcdeuihPGTU3w6XV-dTQPjfZpysISmSpZKm1aEMwTh2yXIl5Oel95rNzaj-7rMI4nrZn9ruHjh_cToHxyWDI8bs_V-MSBwqbbFGltdXWUa3LFsrwRt0XKNMPzhQLciuLO0iBumF4Yc1VqmmS9buwpCqPc2qNggMp7pteZe5Lbkc-0X6zbBqkgo8wkbq31TN7cwDWxmVttxw7Mc4eUSVuROqiLgSKRCoWGYf9vIsiiXov8Q3mLaXyiQvh9gzDyWwzzAxbmVQhBxF-PVOdgGurYU0HkNjw3cr3OZkvKzbqccdYsiQ",
      "e": "AQAB",
      "x5c": [
        "MIIClzCCAX8CBgGAzCPxHDANBgkqhkiG9w0BAQsFADAPMQ0wCwYDVQQDDAR0ZXN0MB4XDTIyMDUxNjA5MTA0OVoXDTMyMDUxNjA5MTIyOVowDzENMAsGA1UEAwwEdGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIxfhqQNE//HGY8HmOvcmOaCsDsFlyiFwi+JhvD3BXHXrooTxk1N8Ol1fnU0D432acrCEpkqWSptWhDME4dslyJeTnpfeazc2o/u6zCOJ62Z/a7h44f3E6B8clgyPG7P1fjEgcKm2xRpbXV1lGtyxbK8EbdFyjTD84UC3IriztIgbpheGHNVappkvW7sKQqj3NqjYIDKe6bXmXuS25HPtF+s2wapIKPMJG6t9Uze3MA1sZlbbccOzHOHlElbkTqoi4EikQqFhmH/byLIol6L/EN5i2l8okL4fYMw8lsM8wMW5lUIQcRfj1TnYBrq2FNB5DY8N3K9zmZLys26nHHWLIkCAwEAATANBgkqhkiG9w0BAQsFAAOCAQEAR/S3MzoIbclxpeaKYQ40BVKdzvIGPH6okrW4IUUL/DSs4hiwf2yQ8r0oSvbXuEg23NKMYlH0YeLmMrFhoq0TnA98OP346YX7ladE5US+lXQC1At3B6r7hUY7YMcz6Fw6AnqQK8O3Qw8TDZRfd+TJzM9jBXZxKP/gj8+70uH7gAP+gMnt2wwgbG/yl433/xGByrDz0lntisQcn7YbvzFnpvSqcWHAmxNnNM+H817FNvfQPg4GU8PP2Pblzk24i6qT0v3emMg5eAk0bFef5RevPWFW53ti0fWXuP5CHQZNMeFB+6ZqbWDaX43V3AC8CGnQL0zzNXXFzGRfFeoBJLAzzA\u003d\u003d"
      ],
      "x5t": "TvB49qBdfskwNG8LWUYOE3z29fE",
      "x5t#S256": "kTzfVukTOuEwsJ7ICp69-kbcipMUZ31yTNOPdQifuMk"
    },
    {
      "kid": "6p6LMG-CvC-c6SvkKKOP8W_Z4fTBS9Q461P9zxi2n6o",
      "kty": "EC",
      "alg": "ES256",
      "use": "sig",
      "crv": "P-256",
      "x": "wy_EGIii551Ei-nodYzkg-S_y3ecdgTATnAwUxinhhQ",
      "y": "LCbIl7PUYc2DtBJGRMrOt80rk3PJbJ1onUwK_82yHUw"
    }
  ]
}
2022-05-16 11:41:39 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2022-05-16 11:41:39 SUCCESS
CheckForKeyIdInServerJWKs
All keys contain kids
2022-05-16 11:41:39 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2022-05-16 11:41:39 SUCCESS
EnsureServerJwksDoesNotContainPrivateOrSymmetricKeys
Jwks does not contain any private or symmetric keys
2022-05-16 11:41:39 SUCCESS
CreatePostLogoutRedirectUri
Created post_logout_redirect_uri URI
post_logout_redirect_uri
https://www.certification.openid.net/test/a/keycloak/post_logout_redirect
2022-05-16 11:41:39 SUCCESS
GetStaticClientConfiguration
Found a static client object
client_id
client1-rp-initiated-logout
client_secret
hYrN6jbdLq6WtfxjhVxmdF3vVdOgNK9p
2022-05-16 11:41:39 INFO
ValidateClientJWKsPrivatePart
Skipped evaluation due to missing required element: client jwks
path
jwks
mapped
object
client
2022-05-16 11:41:39 INFO
ExtractJWKsFromStaticClientConfiguration
Skipped evaluation due to missing required element: client jwks
path
jwks
mapped
object
client
2022-05-16 11:41:39 INFO
CheckDistinctKeyIdValueInClientJWKs
Skipped evaluation due to missing required element: client jwks
path
jwks
mapped
object
client
2022-05-16 11:41:39
SetScopeInClientConfigurationToOpenId
Set scope in client configuration to "openid"
scope
openid
2022-05-16 11:41:39 SUCCESS
EnsureServerConfigurationSupportsClientSecretBasic
Contents of 'token_endpoint_auth_methods_supported' in discovery document matches expectations.
actual
[
  "private_key_jwt",
  "client_secret_basic",
  "client_secret_post",
  "tls_client_auth",
  "client_secret_jwt"
]
expected
[
  "client_secret_basic"
]
minimum_matches_required
1
2022-05-16 11:41:39 SUCCESS
SetProtectedResourceUrlToUserInfoEndpoint
userinfo_endpoint will be used to test access token. The user info is not a mandatory to implement feature in the OpenID Connect specification, but is mandatory for certification.
protected_resource_url
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/userinfo
2022-05-16 11:41:39
oidcc-rp-initiated-logout-no-state
Setup Done
Make request to authorization endpoint
2022-05-16 11:41:39 SUCCESS
CreateAuthorizationEndpointRequestFromClientInformation
Created authorization endpoint request
client_id
client1-rp-initiated-logout
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
scope
openid
2022-05-16 11:41:39
CreateRandomStateValue
Created state value
requested_state_length
128
state
Dq5RPdrTSzTIkm9TJlreeYOqSW4p53CzwWfbDKrgmhnX8uXzkwubY5tIfAxu55qV4lYCLWpcuxy0KsvVSY7NcaZwWkydoRYUWG9Fppe2crKlxLStmQCBz4IglDpUdVeR
2022-05-16 11:41:39 SUCCESS
AddStateToAuthorizationEndpointRequest
Added state parameter to request
client_id
client1-rp-initiated-logout
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
scope
openid
state
Dq5RPdrTSzTIkm9TJlreeYOqSW4p53CzwWfbDKrgmhnX8uXzkwubY5tIfAxu55qV4lYCLWpcuxy0KsvVSY7NcaZwWkydoRYUWG9Fppe2crKlxLStmQCBz4IglDpUdVeR
2022-05-16 11:41:39
CreateRandomNonceValue
Created nonce value
requested_nonce_length
10
nonce
oMNQEI00yk
2022-05-16 11:41:39 SUCCESS
AddNonceToAuthorizationEndpointRequest
Added nonce parameter to request
client_id
client1-rp-initiated-logout
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
scope
openid
state
Dq5RPdrTSzTIkm9TJlreeYOqSW4p53CzwWfbDKrgmhnX8uXzkwubY5tIfAxu55qV4lYCLWpcuxy0KsvVSY7NcaZwWkydoRYUWG9Fppe2crKlxLStmQCBz4IglDpUdVeR
nonce
oMNQEI00yk
2022-05-16 11:41:39 SUCCESS
SetAuthorizationEndpointRequestResponseTypeFromEnvironment
Added response_type parameter to request
client_id
client1-rp-initiated-logout
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
scope
openid
state
Dq5RPdrTSzTIkm9TJlreeYOqSW4p53CzwWfbDKrgmhnX8uXzkwubY5tIfAxu55qV4lYCLWpcuxy0KsvVSY7NcaZwWkydoRYUWG9Fppe2crKlxLStmQCBz4IglDpUdVeR
nonce
oMNQEI00yk
response_type
id_token
2022-05-16 11:41:39 SUCCESS
BuildPlainRedirectToAuthorizationEndpoint
Sending to authorization endpoint
auth_request
{
  "client_id": "client1-rp-initiated-logout",
  "redirect_uri": "https://www.certification.openid.net/test/a/keycloak/callback",
  "scope": "openid",
  "state": "Dq5RPdrTSzTIkm9TJlreeYOqSW4p53CzwWfbDKrgmhnX8uXzkwubY5tIfAxu55qV4lYCLWpcuxy0KsvVSY7NcaZwWkydoRYUWG9Fppe2crKlxLStmQCBz4IglDpUdVeR",
  "nonce": "oMNQEI00yk",
  "response_type": "id_token"
}
redirect_to_authorization_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth?client_id=client1-rp-initiated-logout&redirect_uri=https://www.certification.openid.net/test/a/keycloak/callback&scope=openid&state=Dq5RPdrTSzTIkm9TJlreeYOqSW4p53CzwWfbDKrgmhnX8uXzkwubY5tIfAxu55qV4lYCLWpcuxy0KsvVSY7NcaZwWkydoRYUWG9Fppe2crKlxLStmQCBz4IglDpUdVeR&nonce=oMNQEI00yk&response_type=id_token
2022-05-16 11:41:39 REDIRECT
oidcc-rp-initiated-logout-no-state
Redirecting to authorization endpoint
redirect_to
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth?client_id=client1-rp-initiated-logout&redirect_uri=https://www.certification.openid.net/test/a/keycloak/callback&scope=openid&state=Dq5RPdrTSzTIkm9TJlreeYOqSW4p53CzwWfbDKrgmhnX8uXzkwubY5tIfAxu55qV4lYCLWpcuxy0KsvVSY7NcaZwWkydoRYUWG9Fppe2crKlxLStmQCBz4IglDpUdVeR&nonce=oMNQEI00yk&response_type=id_token
2022-05-16 11:41:47 INCOMING
oidcc-rp-initiated-logout-no-state
Incoming HTTP request to /test/a/keycloak/callback
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:100.0) Gecko/20100101 Firefox/100.0",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/avif,image/webp,*/*;q\u003d0.8",
  "accept-language": "en-US,en;q\u003d0.5",
  "accept-encoding": "gzip, deflate, br",
  "cookie": "__utma\u003d201319536.747058366.1611919072.1652681365.1652688969.137; __utmz\u003d201319536.1647870296.126.44.utmcsr\u003dgoogle|utmccn\u003d(organic)|utmcmd\u003dorganic|utmctr\u003d(not%20provided); _ga\u003dGA1.2.747058366.1611919072; __utmc\u003d201319536; JSESSIONID\u003d63EE1707428F3F9812307D8819923D9B",
  "upgrade-insecure-requests": "1",
  "sec-fetch-dest": "document",
  "sec-fetch-mode": "navigate",
  "sec-fetch-site": "none",
  "sec-fetch-user": "?1",
  "connection": "close"
}
incoming_path
/test/a/keycloak/callback
incoming_body_form_params
incoming_method
GET
incoming_tls_version
TLSv1.2
incoming_tls_cipher
ECDHE-RSA-AES128-GCM-SHA256
incoming_tls_cert
incoming_body_json
incoming_query_string_params
{}
incoming_body
2022-05-16 11:41:47 SUCCESS
CreateRandomImplicitSubmitUrl
Created random implicit submission URL
implicit_submit
{
  "path": "implicit/INXjXvy9K3cuWIN2jXqk",
  "fullUrl": "https://www.certification.openid.net/test/a/keycloak/implicit/INXjXvy9K3cuWIN2jXqk"
}
2022-05-16 11:41:47 OUTGOING
oidcc-rp-initiated-logout-no-state
Response to HTTP request to test instance DFWkDSXQrg4rO5b
outgoing
ModelAndView [view="implicitCallback"; model={implicitSubmitUrl=https://www.certification.openid.net/test/a/keycloak/implicit/INXjXvy9K3cuWIN2jXqk, returnUrl=/log-detail.html?log=DFWkDSXQrg4rO5b}]
outgoing_path
callback
2022-05-16 11:41:47 INCOMING
oidcc-rp-initiated-logout-no-state
Incoming HTTP request to /test/a/keycloak/implicit/INXjXvy9K3cuWIN2jXqk
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:100.0) Gecko/20100101 Firefox/100.0",
  "accept": "*/*",
  "accept-language": "en-US,en;q\u003d0.5",
  "accept-encoding": "gzip, deflate, br",
  "content-type": "text/plain",
  "x-requested-with": "XMLHttpRequest",
  "origin": "https://www.certification.openid.net",
  "referer": "https://www.certification.openid.net/test/a/keycloak/callback",
  "cookie": "__utma\u003d201319536.747058366.1611919072.1652681365.1652688969.137; __utmz\u003d201319536.1647870296.126.44.utmcsr\u003dgoogle|utmccn\u003d(organic)|utmcmd\u003dorganic|utmctr\u003d(not%20provided); _ga\u003dGA1.2.747058366.1611919072; __utmc\u003d201319536; JSESSIONID\u003d63EE1707428F3F9812307D8819923D9B",
  "sec-fetch-dest": "empty",
  "sec-fetch-mode": "cors",
  "sec-fetch-site": "same-origin",
  "connection": "close",
  "content-length": "989"
}
incoming_path
/test/a/keycloak/implicit/INXjXvy9K3cuWIN2jXqk
incoming_body_form_params
incoming_method
POST
incoming_tls_version
TLSv1.2
incoming_tls_cipher
ECDHE-RSA-AES128-GCM-SHA256
incoming_tls_cert
incoming_body_json
incoming_query_string_params
{}
incoming_body
#state=Dq5RPdrTSzTIkm9TJlreeYOqSW4p53CzwWfbDKrgmhnX8uXzkwubY5tIfAxu55qV4lYCLWpcuxy0KsvVSY7NcaZwWkydoRYUWG9Fppe2crKlxLStmQCBz4IglDpUdVeR&session_state=4db72af4-fbb4-453a-9fff-353d571a4e0a&id_token=eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.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.N02zdP_LBR2gQEY1ATS70ur_trCaq8ft8Hm157Hw9lOXpdrQGXw_9tYhVR52OYbfHLQyXlDL-DkkGUXow_g-Qw
2022-05-16 11:41:47 OUTGOING
oidcc-rp-initiated-logout-no-state
Response to HTTP request to test instance DFWkDSXQrg4rO5b
outgoing_status_code
204
outgoing_headers
{}
outgoing_body

                                
outgoing_path
implicit/INXjXvy9K3cuWIN2jXqk
2022-05-16 11:41:47
ExtractImplicitHashToCallbackResponse
Extracted response from URL fragment
parameters
[
  {
    "name": "state",
    "value": "Dq5RPdrTSzTIkm9TJlreeYOqSW4p53CzwWfbDKrgmhnX8uXzkwubY5tIfAxu55qV4lYCLWpcuxy0KsvVSY7NcaZwWkydoRYUWG9Fppe2crKlxLStmQCBz4IglDpUdVeR"
  },
  {
    "name": "session_state",
    "value": "4db72af4-fbb4-453a-9fff-353d571a4e0a"
  },
  {
    "name": "id_token",
    "value": "eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.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.N02zdP_LBR2gQEY1ATS70ur_trCaq8ft8Hm157Hw9lOXpdrQGXw_9tYhVR52OYbfHLQyXlDL-DkkGUXow_g-Qw"
  }
]
2022-05-16 11:41:47 SUCCESS
ExtractImplicitHashToCallbackResponse
Extracted the hash values
state
Dq5RPdrTSzTIkm9TJlreeYOqSW4p53CzwWfbDKrgmhnX8uXzkwubY5tIfAxu55qV4lYCLWpcuxy0KsvVSY7NcaZwWkydoRYUWG9Fppe2crKlxLStmQCBz4IglDpUdVeR
session_state
4db72af4-fbb4-453a-9fff-353d571a4e0a
id_token
eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.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.N02zdP_LBR2gQEY1ATS70ur_trCaq8ft8Hm157Hw9lOXpdrQGXw_9tYhVR52OYbfHLQyXlDL-DkkGUXow_g-Qw
2022-05-16 11:41:47 REDIRECT-IN
oidcc-rp-initiated-logout-no-state
Authorization endpoint response captured
url_query
{}
headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:100.0) Gecko/20100101 Firefox/100.0",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/avif,image/webp,*/*;q\u003d0.8",
  "accept-language": "en-US,en;q\u003d0.5",
  "accept-encoding": "gzip, deflate, br",
  "cookie": "__utma\u003d201319536.747058366.1611919072.1652681365.1652688969.137; __utmz\u003d201319536.1647870296.126.44.utmcsr\u003dgoogle|utmccn\u003d(organic)|utmcmd\u003dorganic|utmctr\u003d(not%20provided); _ga\u003dGA1.2.747058366.1611919072; __utmc\u003d201319536; JSESSIONID\u003d63EE1707428F3F9812307D8819923D9B",
  "upgrade-insecure-requests": "1",
  "sec-fetch-dest": "document",
  "sec-fetch-mode": "navigate",
  "sec-fetch-site": "none",
  "sec-fetch-user": "?1",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "x-forwarded-proto": "https",
  "x-forwarded-port": "443",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
http_method
GET
url_fragment
{
  "state": "Dq5RPdrTSzTIkm9TJlreeYOqSW4p53CzwWfbDKrgmhnX8uXzkwubY5tIfAxu55qV4lYCLWpcuxy0KsvVSY7NcaZwWkydoRYUWG9Fppe2crKlxLStmQCBz4IglDpUdVeR",
  "session_state": "4db72af4-fbb4-453a-9fff-353d571a4e0a",
  "id_token": "eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.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.N02zdP_LBR2gQEY1ATS70ur_trCaq8ft8Hm157Hw9lOXpdrQGXw_9tYhVR52OYbfHLQyXlDL-DkkGUXow_g-Qw"
}
post_body
Verify authorization endpoint response
2022-05-16 11:41:47 SUCCESS
RejectAuthCodeInUrlQuery
Authorization code is not present in URL query returned from authorization endpoint
2022-05-16 11:41:47 SUCCESS
RejectErrorInUrlQuery
'error' is not present in URL query returned from authorization endpoint
2022-05-16 11:41:47 SUCCESS
CheckMatchingCallbackParameters
Callback parameters successfully verified
2022-05-16 11:41:47
ValidateIssInAuthorizationResponse
No 'iss' value in authorization response.
2022-05-16 11:41:47 SUCCESS
CheckIfAuthorizationEndpointError
No error from authorization endpoint
2022-05-16 11:41:47 SUCCESS
CheckStateInAuthorizationResponse
State in response correctly returned
state
Dq5RPdrTSzTIkm9TJlreeYOqSW4p53CzwWfbDKrgmhnX8uXzkwubY5tIfAxu55qV4lYCLWpcuxy0KsvVSY7NcaZwWkydoRYUWG9Fppe2crKlxLStmQCBz4IglDpUdVeR
2022-05-16 11:41:47 SUCCESS
ExtractIdTokenFromAuthorizationResponse
Found and parsed the id_token from authorization_endpoint_response
value
eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.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.N02zdP_LBR2gQEY1ATS70ur_trCaq8ft8Hm157Hw9lOXpdrQGXw_9tYhVR52OYbfHLQyXlDL-DkkGUXow_g-Qw
header
{
  "kid": "6p6LMG-CvC-c6SvkKKOP8W_Z4fTBS9Q461P9zxi2n6o",
  "typ": "JWT",
  "alg": "ES256"
}
claims
{
  "sub": "3ecdcecd-43dc-4dc9-aa1c-b9791fcf730f",
  "iss": "https://84-244-72-90.nip.io:60000/auth/realms/test",
  "typ": "ID",
  "nonce": "oMNQEI00yk",
  "sid": "4db72af4-fbb4-453a-9fff-353d571a4e0a",
  "aud": "client1-rp-initiated-logout",
  "s_hash": "vGdmY8xxP89bsPUAPl_tMg",
  "azp": "client1-rp-initiated-logout",
  "auth_time": 1652701307,
  "exp": 1652702207,
  "session_state": "4db72af4-fbb4-453a-9fff-353d571a4e0a",
  "iat": 1652701307,
  "jti": "7dbcc9eb-63a5-4c0d-8cf4-26f89487295f"
}
2022-05-16 11:41:47 SUCCESS
ValidateIdToken
ID token iss, aud, exp, iat, auth_time, acr & nbf claims passed validation checks
2022-05-16 11:41:47 SUCCESS
ValidateIdTokenNonce
Nonce values match
nonce
oMNQEI00yk
2022-05-16 11:41:47 SUCCESS
ValidateIdTokenACRClaimAgainstRequest
Nothing to check; the conformance suite did not request an acr claim in request object
2022-05-16 11:41:47 SUCCESS
ValidateIdTokenSignature
id_token signature validated
id_token
eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.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.N02zdP_LBR2gQEY1ATS70ur_trCaq8ft8Hm157Hw9lOXpdrQGXw_9tYhVR52OYbfHLQyXlDL-DkkGUXow_g-Qw
2022-05-16 11:41:47 SUCCESS
ValidateIdTokenSignatureUsingKid
id_token signature validated
id_token
eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.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.N02zdP_LBR2gQEY1ATS70ur_trCaq8ft8Hm157Hw9lOXpdrQGXw_9tYhVR52OYbfHLQyXlDL-DkkGUXow_g-Qw
2022-05-16 11:41:47 SUCCESS
CheckForSubjectInIdToken
Found 'sub' in id_token
sub
3ecdcecd-43dc-4dc9-aa1c-b9791fcf730f
2022-05-16 11:41:47 INFO
FAPIValidateEncryptedIdTokenHasKid
Skipped evaluation due to missing required element: id_token jwe_header
path
jwe_header
mapped
object
id_token
Redirect to end session endpoint & wait for response
2022-05-16 11:41:47
CreateRandomEndSessionState
Created end_session_state value
end_session_state
VQpQxNqzNjUIbAsPsXmbJJKDhgGPinZaFWjKQaIWmxbbImSMeY5845233558&~'%`}~.*/~$$~=`&~=':})`@){?~]
2022-05-16 11:41:47 SUCCESS
CreateEndSessionEndpointRequest
Created end session endpoint request
id_token_hint
eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.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.N02zdP_LBR2gQEY1ATS70ur_trCaq8ft8Hm157Hw9lOXpdrQGXw_9tYhVR52OYbfHLQyXlDL-DkkGUXow_g-Qw
post_logout_redirect_uri
https://www.certification.openid.net/test/a/keycloak/post_logout_redirect
state
VQpQxNqzNjUIbAsPsXmbJJKDhgGPinZaFWjKQaIWmxbbImSMeY5845233558&~'%`}~.*/~$$~=`&~=':})`@){?~]
2022-05-16 11:41:47 SUCCESS
RemoveStateFromEndSessionEndpointRequest
Removed state from end session endpoint request
id_token_hint
eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.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.N02zdP_LBR2gQEY1ATS70ur_trCaq8ft8Hm157Hw9lOXpdrQGXw_9tYhVR52OYbfHLQyXlDL-DkkGUXow_g-Qw
post_logout_redirect_uri
https://www.certification.openid.net/test/a/keycloak/post_logout_redirect
2022-05-16 11:41:47 SUCCESS
BuildRedirectToEndSessionEndpoint
Sending to end_session endpoint
redirect_to_end_session_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/logout?id_token_hint=eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.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.N02zdP_LBR2gQEY1ATS70ur_trCaq8ft8Hm157Hw9lOXpdrQGXw_9tYhVR52OYbfHLQyXlDL-DkkGUXow_g-Qw&post_logout_redirect_uri=https://www.certification.openid.net/test/a/keycloak/post_logout_redirect
2022-05-16 11:41:47 REDIRECT
oidcc-rp-initiated-logout-no-state
Redirecting to end session endpoint
redirect_to
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/logout?id_token_hint=eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.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.N02zdP_LBR2gQEY1ATS70ur_trCaq8ft8Hm157Hw9lOXpdrQGXw_9tYhVR52OYbfHLQyXlDL-DkkGUXow_g-Qw&post_logout_redirect_uri=https://www.certification.openid.net/test/a/keycloak/post_logout_redirect
2022-05-16 11:41:53 INCOMING
oidcc-rp-initiated-logout-no-state
Incoming HTTP request to /test/a/keycloak/post_logout_redirect
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:100.0) Gecko/20100101 Firefox/100.0",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/avif,image/webp,*/*;q\u003d0.8",
  "accept-language": "en-US,en;q\u003d0.5",
  "accept-encoding": "gzip, deflate, br",
  "cookie": "__utma\u003d201319536.747058366.1611919072.1652681365.1652688969.137; __utmz\u003d201319536.1647870296.126.44.utmcsr\u003dgoogle|utmccn\u003d(organic)|utmcmd\u003dorganic|utmctr\u003d(not%20provided); _ga\u003dGA1.2.747058366.1611919072; __utmc\u003d201319536; JSESSIONID\u003d63EE1707428F3F9812307D8819923D9B",
  "upgrade-insecure-requests": "1",
  "sec-fetch-dest": "document",
  "sec-fetch-mode": "navigate",
  "sec-fetch-site": "none",
  "sec-fetch-user": "?1",
  "connection": "close"
}
incoming_path
/test/a/keycloak/post_logout_redirect
incoming_body_form_params
incoming_method
GET
incoming_tls_version
TLSv1.2
incoming_tls_cipher
ECDHE-RSA-AES128-GCM-SHA256
incoming_tls_cert
incoming_body_json
incoming_query_string_params
{}
incoming_body
2022-05-16 11:41:53 OUTGOING
oidcc-rp-initiated-logout-no-state
Response to HTTP request to test instance DFWkDSXQrg4rO5b
outgoing
ModelAndView [view="resultCaptured"; model={returnUrl=/log-detail.html?log=DFWkDSXQrg4rO5b}]
outgoing_path
post_logout_redirect
Verify frontchannel post logout redirect
2022-05-16 11:41:53 SUCCESS
CheckNoPostLogoutState
state not passed to post logout redirect uri.
2022-05-16 11:41:53 SUCCESS
CheckForUnexpectedParametersInPostLogoutRedirect
post_logout_redirect includes only expected parameters
Second authorization: Make request to authorization endpoint
2022-05-16 11:41:53 SUCCESS
CreateAuthorizationEndpointRequestFromClientInformation
Created authorization endpoint request
client_id
client1-rp-initiated-logout
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
scope
openid
2022-05-16 11:41:53
CreateRandomStateValue
Created state value
requested_state_length
128
state
sPbQa2aBpqhMaYTMW6iPyRaqWxTpUb5N9qbXYSd3yZe9OWucHAJaOY0MpWXCcH2xGnCknWkABkG5Rm3eDZ0gEF71lCRApr6Ow4Ox3CekHd5rhnpUSLN3VjWxFc7nOpNx
2022-05-16 11:41:53 SUCCESS
AddStateToAuthorizationEndpointRequest
Added state parameter to request
client_id
client1-rp-initiated-logout
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
scope
openid
state
sPbQa2aBpqhMaYTMW6iPyRaqWxTpUb5N9qbXYSd3yZe9OWucHAJaOY0MpWXCcH2xGnCknWkABkG5Rm3eDZ0gEF71lCRApr6Ow4Ox3CekHd5rhnpUSLN3VjWxFc7nOpNx
2022-05-16 11:41:53
CreateRandomNonceValue
Created nonce value
requested_nonce_length
10
nonce
c2DRQVwjx3
2022-05-16 11:41:53 SUCCESS
AddNonceToAuthorizationEndpointRequest
Added nonce parameter to request
client_id
client1-rp-initiated-logout
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
scope
openid
state
sPbQa2aBpqhMaYTMW6iPyRaqWxTpUb5N9qbXYSd3yZe9OWucHAJaOY0MpWXCcH2xGnCknWkABkG5Rm3eDZ0gEF71lCRApr6Ow4Ox3CekHd5rhnpUSLN3VjWxFc7nOpNx
nonce
c2DRQVwjx3
2022-05-16 11:41:53 SUCCESS
SetAuthorizationEndpointRequestResponseTypeFromEnvironment
Added response_type parameter to request
client_id
client1-rp-initiated-logout
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
scope
openid
state
sPbQa2aBpqhMaYTMW6iPyRaqWxTpUb5N9qbXYSd3yZe9OWucHAJaOY0MpWXCcH2xGnCknWkABkG5Rm3eDZ0gEF71lCRApr6Ow4Ox3CekHd5rhnpUSLN3VjWxFc7nOpNx
nonce
c2DRQVwjx3
response_type
id_token
2022-05-16 11:41:53 SUCCESS
AddPromptNoneToAuthorizationEndpointRequest
Added prompt=none to authorization endpoint request
client_id
client1-rp-initiated-logout
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
scope
openid
state
sPbQa2aBpqhMaYTMW6iPyRaqWxTpUb5N9qbXYSd3yZe9OWucHAJaOY0MpWXCcH2xGnCknWkABkG5Rm3eDZ0gEF71lCRApr6Ow4Ox3CekHd5rhnpUSLN3VjWxFc7nOpNx
nonce
c2DRQVwjx3
response_type
id_token
prompt
none
2022-05-16 11:41:53 SUCCESS
BuildPlainRedirectToAuthorizationEndpoint
Sending to authorization endpoint
auth_request
{
  "client_id": "client1-rp-initiated-logout",
  "redirect_uri": "https://www.certification.openid.net/test/a/keycloak/callback",
  "scope": "openid",
  "state": "sPbQa2aBpqhMaYTMW6iPyRaqWxTpUb5N9qbXYSd3yZe9OWucHAJaOY0MpWXCcH2xGnCknWkABkG5Rm3eDZ0gEF71lCRApr6Ow4Ox3CekHd5rhnpUSLN3VjWxFc7nOpNx",
  "nonce": "c2DRQVwjx3",
  "response_type": "id_token",
  "prompt": "none"
}
redirect_to_authorization_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth?client_id=client1-rp-initiated-logout&redirect_uri=https://www.certification.openid.net/test/a/keycloak/callback&scope=openid&state=sPbQa2aBpqhMaYTMW6iPyRaqWxTpUb5N9qbXYSd3yZe9OWucHAJaOY0MpWXCcH2xGnCknWkABkG5Rm3eDZ0gEF71lCRApr6Ow4Ox3CekHd5rhnpUSLN3VjWxFc7nOpNx&nonce=c2DRQVwjx3&response_type=id_token&prompt=none
2022-05-16 11:41:53 REDIRECT
oidcc-rp-initiated-logout-no-state
Redirecting to authorization endpoint
redirect_to
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth?client_id=client1-rp-initiated-logout&redirect_uri=https://www.certification.openid.net/test/a/keycloak/callback&scope=openid&state=sPbQa2aBpqhMaYTMW6iPyRaqWxTpUb5N9qbXYSd3yZe9OWucHAJaOY0MpWXCcH2xGnCknWkABkG5Rm3eDZ0gEF71lCRApr6Ow4Ox3CekHd5rhnpUSLN3VjWxFc7nOpNx&nonce=c2DRQVwjx3&response_type=id_token&prompt=none
2022-05-16 11:41:58 INCOMING
oidcc-rp-initiated-logout-no-state
Incoming HTTP request to /test/a/keycloak/callback
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:100.0) Gecko/20100101 Firefox/100.0",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/avif,image/webp,*/*;q\u003d0.8",
  "accept-language": "en-US,en;q\u003d0.5",
  "accept-encoding": "gzip, deflate, br",
  "cookie": "__utma\u003d201319536.747058366.1611919072.1652681365.1652688969.137; __utmz\u003d201319536.1647870296.126.44.utmcsr\u003dgoogle|utmccn\u003d(organic)|utmcmd\u003dorganic|utmctr\u003d(not%20provided); _ga\u003dGA1.2.747058366.1611919072; __utmc\u003d201319536; JSESSIONID\u003d63EE1707428F3F9812307D8819923D9B",
  "upgrade-insecure-requests": "1",
  "sec-fetch-dest": "document",
  "sec-fetch-mode": "navigate",
  "sec-fetch-site": "cross-site",
  "connection": "close"
}
incoming_path
/test/a/keycloak/callback
incoming_body_form_params
incoming_method
GET
incoming_tls_version
TLSv1.2
incoming_tls_cipher
ECDHE-RSA-AES128-GCM-SHA256
incoming_tls_cert
incoming_body_json
incoming_query_string_params
{}
incoming_body
2022-05-16 11:41:58 SUCCESS
CreateRandomImplicitSubmitUrl
Created random implicit submission URL
implicit_submit
{
  "path": "implicit/WPCbkKvOBylcP8FwT960",
  "fullUrl": "https://www.certification.openid.net/test/a/keycloak/implicit/WPCbkKvOBylcP8FwT960"
}
2022-05-16 11:41:58 OUTGOING
oidcc-rp-initiated-logout-no-state
Response to HTTP request to test instance DFWkDSXQrg4rO5b
outgoing
ModelAndView [view="implicitCallback"; model={implicitSubmitUrl=https://www.certification.openid.net/test/a/keycloak/implicit/WPCbkKvOBylcP8FwT960, returnUrl=/log-detail.html?log=DFWkDSXQrg4rO5b}]
outgoing_path
callback
2022-05-16 11:41:59 INCOMING
oidcc-rp-initiated-logout-no-state
Incoming HTTP request to /test/a/keycloak/implicit/WPCbkKvOBylcP8FwT960
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:100.0) Gecko/20100101 Firefox/100.0",
  "accept": "*/*",
  "accept-language": "en-US,en;q\u003d0.5",
  "accept-encoding": "gzip, deflate, br",
  "content-type": "text/plain",
  "x-requested-with": "XMLHttpRequest",
  "origin": "https://www.certification.openid.net",
  "referer": "https://www.certification.openid.net/test/a/keycloak/callback",
  "cookie": "__utma\u003d201319536.747058366.1611919072.1652681365.1652688969.137; __utmz\u003d201319536.1647870296.126.44.utmcsr\u003dgoogle|utmccn\u003d(organic)|utmcmd\u003dorganic|utmctr\u003d(not%20provided); _ga\u003dGA1.2.747058366.1611919072; __utmc\u003d201319536; JSESSIONID\u003d63EE1707428F3F9812307D8819923D9B",
  "sec-fetch-dest": "empty",
  "sec-fetch-mode": "cors",
  "sec-fetch-site": "same-origin",
  "connection": "close",
  "content-length": "156"
}
incoming_path
/test/a/keycloak/implicit/WPCbkKvOBylcP8FwT960
incoming_body_form_params
incoming_method
POST
incoming_tls_version
TLSv1.2
incoming_tls_cipher
ECDHE-RSA-AES128-GCM-SHA256
incoming_tls_cert
incoming_body_json
incoming_query_string_params
{}
incoming_body
#error=login_required&state=sPbQa2aBpqhMaYTMW6iPyRaqWxTpUb5N9qbXYSd3yZe9OWucHAJaOY0MpWXCcH2xGnCknWkABkG5Rm3eDZ0gEF71lCRApr6Ow4Ox3CekHd5rhnpUSLN3VjWxFc7nOpNx
2022-05-16 11:41:59 OUTGOING
oidcc-rp-initiated-logout-no-state
Response to HTTP request to test instance DFWkDSXQrg4rO5b
outgoing_status_code
204
outgoing_headers
{}
outgoing_body

                                
outgoing_path
implicit/WPCbkKvOBylcP8FwT960
2022-05-16 11:41:59
ExtractImplicitHashToCallbackResponse
Extracted response from URL fragment
parameters
[
  {
    "name": "error",
    "value": "login_required"
  },
  {
    "name": "state",
    "value": "sPbQa2aBpqhMaYTMW6iPyRaqWxTpUb5N9qbXYSd3yZe9OWucHAJaOY0MpWXCcH2xGnCknWkABkG5Rm3eDZ0gEF71lCRApr6Ow4Ox3CekHd5rhnpUSLN3VjWxFc7nOpNx"
  }
]
2022-05-16 11:41:59 SUCCESS
ExtractImplicitHashToCallbackResponse
Extracted the hash values
error
login_required
state
sPbQa2aBpqhMaYTMW6iPyRaqWxTpUb5N9qbXYSd3yZe9OWucHAJaOY0MpWXCcH2xGnCknWkABkG5Rm3eDZ0gEF71lCRApr6Ow4Ox3CekHd5rhnpUSLN3VjWxFc7nOpNx
2022-05-16 11:41:59 REDIRECT-IN
oidcc-rp-initiated-logout-no-state
Authorization endpoint response captured
url_query
{}
headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:100.0) Gecko/20100101 Firefox/100.0",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/avif,image/webp,*/*;q\u003d0.8",
  "accept-language": "en-US,en;q\u003d0.5",
  "accept-encoding": "gzip, deflate, br",
  "cookie": "__utma\u003d201319536.747058366.1611919072.1652681365.1652688969.137; __utmz\u003d201319536.1647870296.126.44.utmcsr\u003dgoogle|utmccn\u003d(organic)|utmcmd\u003dorganic|utmctr\u003d(not%20provided); _ga\u003dGA1.2.747058366.1611919072; __utmc\u003d201319536; JSESSIONID\u003d63EE1707428F3F9812307D8819923D9B",
  "upgrade-insecure-requests": "1",
  "sec-fetch-dest": "document",
  "sec-fetch-mode": "navigate",
  "sec-fetch-site": "cross-site",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "x-forwarded-proto": "https",
  "x-forwarded-port": "443",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
http_method
GET
url_fragment
{
  "error": "login_required",
  "state": "sPbQa2aBpqhMaYTMW6iPyRaqWxTpUb5N9qbXYSd3yZe9OWucHAJaOY0MpWXCcH2xGnCknWkABkG5Rm3eDZ0gEF71lCRApr6Ow4Ox3CekHd5rhnpUSLN3VjWxFc7nOpNx"
}
post_body
Second authorization: Verify authorization endpoint response
2022-05-16 11:41:59 SUCCESS
RejectAuthCodeInUrlQuery
Authorization code is not present in URL query returned from authorization endpoint
2022-05-16 11:41:59 SUCCESS
RejectErrorInUrlQuery
'error' is not present in URL query returned from authorization endpoint
2022-05-16 11:41:59 SUCCESS
CheckStateInAuthorizationResponse
State in response correctly returned
state
sPbQa2aBpqhMaYTMW6iPyRaqWxTpUb5N9qbXYSd3yZe9OWucHAJaOY0MpWXCcH2xGnCknWkABkG5Rm3eDZ0gEF71lCRApr6Ow4Ox3CekHd5rhnpUSLN3VjWxFc7nOpNx
2022-05-16 11:41:59
ValidateIssInAuthorizationResponse
No 'iss' value in authorization response.
2022-05-16 11:41:59 SUCCESS
EnsureErrorFromAuthorizationEndpointResponse
Authorization endpoint returned an error
error
login_required
state
sPbQa2aBpqhMaYTMW6iPyRaqWxTpUb5N9qbXYSd3yZe9OWucHAJaOY0MpWXCcH2xGnCknWkABkG5Rm3eDZ0gEF71lCRApr6Ow4Ox3CekHd5rhnpUSLN3VjWxFc7nOpNx
2022-05-16 11:41:59 SUCCESS
RejectAuthCodeInAuthorizationEndpointResponse
Authorization code is not present in authorization endpoint response
2022-05-16 11:41:59 SUCCESS
CheckForUnexpectedParametersInErrorResponseFromAuthorizationEndpoint
error response includes only expected parameters
error
login_required
state
sPbQa2aBpqhMaYTMW6iPyRaqWxTpUb5N9qbXYSd3yZe9OWucHAJaOY0MpWXCcH2xGnCknWkABkG5Rm3eDZ0gEF71lCRApr6Ow4Ox3CekHd5rhnpUSLN3VjWxFc7nOpNx
2022-05-16 11:41:59 SUCCESS
CheckErrorDescriptionFromAuthorizationEndpointResponseErrorContainsCRLFTAB
authorization_endpoint_response did not include optional 'error_description' field
2022-05-16 11:41:59 SUCCESS
ValidateErrorDescriptionFromAuthorizationEndpointResponseError
authorization_endpoint_response did not include optional 'error_description' field
2022-05-16 11:41:59 SUCCESS
ValidateErrorUriFromAuthorizationEndpointResponseError
authorization_endpoint_response did not include optional 'error_uri' field
2022-05-16 11:41:59 SUCCESS
CheckErrorFromAuthorizationEndpointIsOneThatRequiredAUserInterface
Authorization endpoint returned one of the permitted errors
actual
login_required
permitted
[
  "interaction_required",
  "login_required",
  "account_selection_required",
  "consent_required"
]
2022-05-16 11:41:59 FINISHED
oidcc-rp-initiated-logout-no-state
Test has run to completion
testmodule_result
PASSED
Unregister dynamically registered client
2022-05-16 11:41:59
UnregisterDynamicallyRegisteredClient
Couldn't find registration_access_token.
2022-05-16 11:42:04
TEST-RUNNER
Alias has now been claimed by another test
alias
keycloak
new_test_id
BVw9iohUHODbc69
Test Results