Test Name | oidcc-rp-initiated-logout-bad-id-token-hint |
---|---|
Variant | client_auth_type=client_secret_basic, server_metadata=discovery, response_type=id_token token, response_mode=default, client_registration=static_client |
Test ID | nGIF2nKonPWC5QS https://www.certification.openid.net/log-detail.html?public=true&log=nGIF2nKonPWC5QS |
Created | 2022-05-16T12:22:46.716829Z |
Description | Keycloak, OpenID Connect Core: Rp Initiated Logout Certification Profile (client_registration:static_client) |
Test Version | 4.1.42 |
Test Owner | 115310558227229560855 https://accounts.google.com |
Plan ID | q8YiVoTO9Yb81 https://www.certification.openid.net/plan-detail.html?public=true&plan=q8YiVoTO9Yb81 |
Exported From | https://www.certification.openid.net |
Exported By | 115310558227229560855 https://accounts.google.com |
Suite Version | 4.1.42 |
Exported | 2022-05-16 18:01:13 (UTC) |
Status: FINISHED Result: REVIEW |
SUCCESS 41 FAILURE 0 WARNING 0 REVIEW 1 INFO 5 |
2022-05-16 12:22:46 |
INFO
|
TEST-RUNNER
Test instance nGIF2nKonPWC5QS created
|
||||||||||||||
|
2022-05-16 12:22:46 |
SUCCESS
|
CreateRedirectUri
Created redirect URI
|
||
|
2022-05-16 12:22:46 |
|
GetDynamicServerConfiguration
HTTP request
|
||||||||
|
2022-05-16 12:22:47 |
RESPONSE
|
GetDynamicServerConfiguration
HTTP response
|
||||||||
|
2022-05-16 12:22:47 |
SUCCESS
|
GetDynamicServerConfiguration
Successfully parsed server configuration
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
2022-05-16 12:22:47 |
SUCCESS
|
CheckServerConfiguration
Found required server configuration keys
|
||
|
2022-05-16 12:22:47 |
SUCCESS
|
ExtractTLSTestValuesFromServerConfiguration
Extracted TLS information from authorization server configuration
|
||||||||
|
2022-05-16 12:22:47 |
|
FetchServerKeys
Fetching server key
|
||
|
2022-05-16 12:22:47 |
|
FetchServerKeys
HTTP request
|
||||||||
|
2022-05-16 12:22:48 |
RESPONSE
|
FetchServerKeys
HTTP response
|
||||||||
|
2022-05-16 12:22:48 |
|
FetchServerKeys
Found JWK set string
|
||
|
2022-05-16 12:22:48 |
SUCCESS
|
FetchServerKeys
Found server JWK set
|
||
|
2022-05-16 12:22:48 |
SUCCESS
|
CheckServerKeysIsValid
Server JWKs is valid
|
||
|
2022-05-16 12:22:48 | SUCCESS |
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
|
|
2022-05-16 12:22:48 | SUCCESS |
CheckForKeyIdInServerJWKs
All keys contain kids
|
|
2022-05-16 12:22:48 | SUCCESS |
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
|
||
|
2022-05-16 12:22:48 | SUCCESS |
EnsureServerJwksDoesNotContainPrivateOrSymmetricKeys
Jwks does not contain any private or symmetric keys
|
|
2022-05-16 12:22:48 | SUCCESS |
CreatePostLogoutRedirectUri
Created post_logout_redirect_uri URI
|
||
|
2022-05-16 12:22:48 |
SUCCESS
|
GetStaticClientConfiguration
Found a static client object
|
||||
|
2022-05-16 12:22:48 | INFO |
ValidateClientJWKsPrivatePart
Skipped evaluation due to missing required element: client jwks
|
||||||
|
2022-05-16 12:22:48 |
INFO
|
ExtractJWKsFromStaticClientConfiguration
Skipped evaluation due to missing required element: client jwks
|
||||||
|
2022-05-16 12:22:48 | INFO |
CheckDistinctKeyIdValueInClientJWKs
Skipped evaluation due to missing required element: client jwks
|
||||||
|
2022-05-16 12:22:48 |
|
SetScopeInClientConfigurationToOpenId
Set scope in client configuration to "openid"
|
||
|
2022-05-16 12:22:48 |
SUCCESS
|
EnsureServerConfigurationSupportsClientSecretBasic
Contents of 'token_endpoint_auth_methods_supported' in discovery document matches expectations.
|
||||||
|
2022-05-16 12:22:48 |
SUCCESS
|
SetProtectedResourceUrlToUserInfoEndpoint
userinfo_endpoint will be used to test access token. The user info is not a mandatory to implement feature in the OpenID Connect specification, but is mandatory for certification.
|
||
|
2022-05-16 12:22:48 |
SUCCESS
|
GenerateJWKsFromClientSecret
Generated JWK Set from symmetric key
|
||
|
2022-05-16 12:22:48 |
|
oidcc-rp-initiated-logout-bad-id-token-hint
Setup Done
|
|
Make request to authorization endpoint |
2022-05-16 12:22:48 |
SUCCESS
|
CreateAuthorizationEndpointRequestFromClientInformation
Created authorization endpoint request
|
||||||
|
2022-05-16 12:22:48 |
|
CreateRandomStateValue
Created state value
|
||||
|
2022-05-16 12:22:48 |
SUCCESS
|
AddStateToAuthorizationEndpointRequest
Added state parameter to request
|
||||||||
|
2022-05-16 12:22:48 |
|
CreateRandomNonceValue
Created nonce value
|
||||
|
2022-05-16 12:22:48 |
SUCCESS
|
AddNonceToAuthorizationEndpointRequest
Added nonce parameter to request
|
||||||||||
|
2022-05-16 12:22:48 |
SUCCESS
|
SetAuthorizationEndpointRequestResponseTypeFromEnvironment
Added response_type parameter to request
|
||||||||||||
|
2022-05-16 12:22:48 |
SUCCESS
|
BuildPlainRedirectToAuthorizationEndpoint
Sending to authorization endpoint
|
||||
|
2022-05-16 12:22:48 |
REDIRECT
|
oidcc-rp-initiated-logout-bad-id-token-hint
Redirecting to authorization endpoint
|
||
|
2022-05-16 12:22:50 |
INCOMING
|
oidcc-rp-initiated-logout-bad-id-token-hint
Incoming HTTP request to /test/a/keycloak/callback
|
||||||||||||||||||||
|
2022-05-16 12:22:50 |
SUCCESS
|
CreateRandomImplicitSubmitUrl
Created random implicit submission URL
|
||
|
2022-05-16 12:22:50 |
OUTGOING
|
oidcc-rp-initiated-logout-bad-id-token-hint
Response to HTTP request to test instance nGIF2nKonPWC5QS
|
||||
|
2022-05-16 12:22:51 |
INCOMING
|
oidcc-rp-initiated-logout-bad-id-token-hint
Incoming HTTP request to /test/a/keycloak/implicit/ugJDbYPovSSeIaJYDSRR
|
||||||||||||||||||||
|
2022-05-16 12:22:51 |
OUTGOING
|
oidcc-rp-initiated-logout-bad-id-token-hint
Response to HTTP request to test instance nGIF2nKonPWC5QS
|
||||||||
|
2022-05-16 12:22:51 |
|
ExtractImplicitHashToCallbackResponse
Extracted response from URL fragment
|
||
|
2022-05-16 12:22:51 |
SUCCESS
|
ExtractImplicitHashToCallbackResponse
Extracted the hash values
|
||||||||||||
|
2022-05-16 12:22:51 |
REDIRECT-IN
|
oidcc-rp-initiated-logout-bad-id-token-hint
Authorization endpoint response captured
|
||||||||||
|
Verify authorization endpoint response |
2022-05-16 12:22:51 | SUCCESS |
RejectAuthCodeInUrlQuery
Authorization code is not present in URL query returned from authorization endpoint
|
|
2022-05-16 12:22:51 | SUCCESS |
RejectErrorInUrlQuery
'error' is not present in URL query returned from authorization endpoint
|
|
2022-05-16 12:22:51 |
SUCCESS
|
CheckMatchingCallbackParameters
Callback parameters successfully verified
|
|
2022-05-16 12:22:51 |
|
ValidateIssInAuthorizationResponse
No 'iss' value in authorization response.
|
|
2022-05-16 12:22:51 |
SUCCESS
|
CheckIfAuthorizationEndpointError
No error from authorization endpoint
|
|
2022-05-16 12:22:51 |
SUCCESS
|
CheckStateInAuthorizationResponse
State in response correctly returned
|
||
|
2022-05-16 12:22:51 |
SUCCESS
|
ExtractAccessTokenFromAuthorizationResponse
Extracted the access token
|
||||
|
2022-05-16 12:22:51 |
SUCCESS
|
ExtractIdTokenFromAuthorizationResponse
Found and parsed the id_token from authorization_endpoint_response
|
||||||
|
2022-05-16 12:22:51 |
SUCCESS
|
ValidateIdToken
ID token iss, aud, exp, iat, auth_time, acr & nbf claims passed validation checks
|
|
2022-05-16 12:22:51 | SUCCESS |
ValidateIdTokenNonce
Nonce values match
|
||
|
2022-05-16 12:22:51 | SUCCESS |
ValidateIdTokenACRClaimAgainstRequest
Nothing to check; the conformance suite did not request an acr claim in request object
|
|
2022-05-16 12:22:51 |
SUCCESS
|
ValidateIdTokenSignature
id_token signature validated
|
||
|
2022-05-16 12:22:51 |
SUCCESS
|
ValidateIdTokenSignatureUsingKid
id_token signature validated
|
||
|
2022-05-16 12:22:51 | SUCCESS |
CheckForSubjectInIdToken
Found 'sub' in id_token
|
||
|
2022-05-16 12:22:51 | INFO |
FAPIValidateEncryptedIdTokenHasKid
Skipped evaluation due to missing required element: id_token jwe_header
|
||||||
|
Second authorization: Userinfo endpoint tests |
2022-05-16 12:22:51 |
|
CallProtectedResource
HTTP request
|
||||||||
|
2022-05-16 12:22:51 |
RESPONSE
|
CallProtectedResource
HTTP response
|
||||||||
|
2022-05-16 12:22:51 |
SUCCESS
|
CallProtectedResource
Got a response from the resource endpoint
|
||||||||
|
2022-05-16 12:22:51 |
SUCCESS
|
EnsureHttpStatusCodeIs200
resource endpoint returned the expected http status
|
||||
|
2022-05-16 12:22:51 |
SUCCESS
|
GenerateFakeIdTokenClaims
Created ID Token Claims
|
||||||||||||
|
2022-05-16 12:22:51 |
SUCCESS
|
SignFakeIdToken
Signed a 'fake' ID token using the client's keys
|
||
|
Redirect to end session endpoint & wait for response |
2022-05-16 12:22:51 |
|
CreateRandomEndSessionState
Created end_session_state value
|
||
|
2022-05-16 12:22:51 | SUCCESS |
CreateEndSessionEndpointRequest
Created end session endpoint request
|
||||||
|
2022-05-16 12:22:51 | SUCCESS |
BuildRedirectToEndSessionEndpoint
Sending to end_session endpoint
|
||
|
2022-05-16 12:22:51 | REVIEW IMAGE |
ExpectInvalidIdTokenHintErrorPage
The server must show an error page saying the request is invalid as the id_token_hint is not valid - upload a screenshot of the error page.
|
||||
|
2022-05-16 12:22:51 |
REDIRECT
|
oidcc-rp-initiated-logout-bad-id-token-hint
Redirecting to end session endpoint
|
||
|
2022-05-16 12:23:22 |
FINISHED
|
oidcc-rp-initiated-logout-bad-id-token-hint
Test has run to completion
|
||
|
Unregister dynamically registered client |
2022-05-16 12:23:22 |
|
UnregisterDynamicallyRegisteredClient
Couldn't find registration_access_token.
|
|
2022-05-16 12:26:49 |
|
TEST-RUNNER
Alias has now been claimed by another test
|
||||
|