Test Summary

Test Results

Expand All Collapse All
All times are UTC
2022-05-16 12:22:46 INFO
TEST-RUNNER
Test instance nGIF2nKonPWC5QS created
baseUrl
https://www.certification.openid.net/test/a/keycloak
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "id_token token",
  "server_metadata": "discovery",
  "response_mode": "default",
  "client_registration": "static_client"
}
alias
keycloak
description
Keycloak, OpenID Connect Core: Rp Initiated Logout Certification Profile (client_registration:static_client)
planId
q8YiVoTO9Yb81
config
{
  "alias": "keycloak",
  "description": "Keycloak, OpenID Connect Core: Rp Initiated Logout Certification Profile (client_registration:static_client)",
  "server": {
    "discoveryUrl": "https://84-244-72-90.nip.io:60000/auth/realms/test/.well-known/openid-configuration",
    "login_hint": "john"
  },
  "client": {
    "client_id": "client1-rp-initiated-logout",
    "client_secret": "hYrN6jbdLq6WtfxjhVxmdF3vVdOgNK9p"
  }
}
testName
oidcc-rp-initiated-logout-bad-id-token-hint
2022-05-16 12:22:46 SUCCESS
CreateRedirectUri
Created redirect URI
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
2022-05-16 12:22:46
GetDynamicServerConfiguration
HTTP request
request_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/.well-known/openid-configuration
request_method
GET
request_headers
{
  "accept": "text/plain, application/json, application/*+json, */*",
  "content-length": "0"
}
request_body

                                
2022-05-16 12:22:47 RESPONSE
GetDynamicServerConfiguration
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "cache-control": "no-cache, must-revalidate, no-transform, no-store",
  "x-xss-protection": "1; mode\u003dblock",
  "x-frame-options": "SAMEORIGIN",
  "referrer-policy": "no-referrer",
  "date": "Mon, 16 May 2022 12:22:47 GMT",
  "connection": "keep-alive",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "content-type": "application/json",
  "content-length": "6208"
}
response_body
{"issuer":"https://84-244-72-90.nip.io:60000/auth/realms/test","authorization_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth","token_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token","introspection_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token/introspect","userinfo_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/userinfo","end_session_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/logout","frontchannel_logout_session_supported":true,"frontchannel_logout_supported":true,"jwks_uri":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/certs","check_session_iframe":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/login-status-iframe.html","grant_types_supported":["authorization_code","implicit","refresh_token","password","client_credentials","urn:ietf:params:oauth:grant-type:device_code","urn:openid:params:grant-type:ciba"],"acr_values_supported":["0","1"],"response_types_supported":["code","none","id_token","token","id_token token","code id_token","code token","code id_token token"],"subject_types_supported":["public","pairwise"],"id_token_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512"],"id_token_encryption_alg_values_supported":["RSA-OAEP","RSA-OAEP-256","RSA1_5"],"id_token_encryption_enc_values_supported":["A256GCM","A192GCM","A128GCM","A128CBC-HS256","A192CBC-HS384","A256CBC-HS512"],"userinfo_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512","none"],"userinfo_encryption_alg_values_supported":["RSA-OAEP","RSA-OAEP-256","RSA1_5"],"userinfo_encryption_enc_values_supported":["A256GCM","A192GCM","A128GCM","A128CBC-HS256","A192CBC-HS384","A256CBC-HS512"],"request_object_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512","none"],"request_object_encryption_alg_values_supported":["RSA-OAEP","RSA-OAEP-256","RSA1_5"],"request_object_encryption_enc_values_supported":["A256GCM","A192GCM","A128GCM","A128CBC-HS256","A192CBC-HS384","A256CBC-HS512"],"response_modes_supported":["query","fragment","form_post","query.jwt","fragment.jwt","form_post.jwt","jwt"],"registration_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect","token_endpoint_auth_methods_supported":["private_key_jwt","client_secret_basic","client_secret_post","tls_client_auth","client_secret_jwt"],"token_endpoint_auth_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512"],"introspection_endpoint_auth_methods_supported":["private_key_jwt","client_secret_basic","client_secret_post","tls_client_auth","client_secret_jwt"],"introspection_endpoint_auth_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512"],"authorization_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512"],"authorization_encryption_alg_values_supported":["RSA-OAEP","RSA-OAEP-256","RSA1_5"],"authorization_encryption_enc_values_supported":["A256GCM","A192GCM","A128GCM","A128CBC-HS256","A192CBC-HS384","A256CBC-HS512"],"claims_supported":["aud","sub","iss","auth_time","name","given_name","family_name","preferred_username","email","acr"],"claim_types_supported":["normal"],"claims_parameter_supported":true,"scopes_supported":["openid","consents","name_claims","microprofile-jwt","consent:1","name_claims_for_implicit","roles","address","phone","web-origins","profile","offline_access","resources","email"],"request_parameter_supported":true,"request_uri_parameter_supported":true,"require_request_uri_registration":true,"code_challenge_methods_supported":["plain","S256"],"tls_client_certificate_bound_access_tokens":true,"revocation_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/revoke","revocation_endpoint_auth_methods_supported":["private_key_jwt","client_secret_basic","client_secret_post","tls_client_auth","client_secret_jwt"],"revocation_endpoint_auth_signing_alg_values_supported":["PS384","ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","PS256","PS512","RS512"],"backchannel_logout_supported":true,"backchannel_logout_session_supported":true,"device_authorization_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth/device","backchannel_token_delivery_modes_supported":["poll","ping"],"backchannel_authentication_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/ciba/auth","backchannel_authentication_request_signing_alg_values_supported":["PS384","ES384","RS384","ES256","RS256","ES512","PS256","PS512","RS512"],"require_pushed_authorization_requests":false,"pushed_authorization_request_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/par/request","mtls_endpoint_aliases":{"token_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token","revocation_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/revoke","introspection_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token/introspect","device_authorization_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth/device","registration_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect","userinfo_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/userinfo","pushed_authorization_request_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/par/request","backchannel_authentication_endpoint":"https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/ciba/auth"}}
2022-05-16 12:22:47 SUCCESS
GetDynamicServerConfiguration
Successfully parsed server configuration
issuer
https://84-244-72-90.nip.io:60000/auth/realms/test
authorization_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth
token_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token
introspection_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token/introspect
userinfo_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/userinfo
end_session_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/logout
frontchannel_logout_session_supported
true
frontchannel_logout_supported
true
jwks_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/certs
check_session_iframe
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/login-status-iframe.html
grant_types_supported
[
  "authorization_code",
  "implicit",
  "refresh_token",
  "password",
  "client_credentials",
  "urn:ietf:params:oauth:grant-type:device_code",
  "urn:openid:params:grant-type:ciba"
]
acr_values_supported
[
  "0",
  "1"
]
response_types_supported
[
  "code",
  "none",
  "id_token",
  "token",
  "id_token token",
  "code id_token",
  "code token",
  "code id_token token"
]
subject_types_supported
[
  "public",
  "pairwise"
]
id_token_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512"
]
id_token_encryption_alg_values_supported
[
  "RSA-OAEP",
  "RSA-OAEP-256",
  "RSA1_5"
]
id_token_encryption_enc_values_supported
[
  "A256GCM",
  "A192GCM",
  "A128GCM",
  "A128CBC-HS256",
  "A192CBC-HS384",
  "A256CBC-HS512"
]
userinfo_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512",
  "none"
]
userinfo_encryption_alg_values_supported
[
  "RSA-OAEP",
  "RSA-OAEP-256",
  "RSA1_5"
]
userinfo_encryption_enc_values_supported
[
  "A256GCM",
  "A192GCM",
  "A128GCM",
  "A128CBC-HS256",
  "A192CBC-HS384",
  "A256CBC-HS512"
]
request_object_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512",
  "none"
]
request_object_encryption_alg_values_supported
[
  "RSA-OAEP",
  "RSA-OAEP-256",
  "RSA1_5"
]
request_object_encryption_enc_values_supported
[
  "A256GCM",
  "A192GCM",
  "A128GCM",
  "A128CBC-HS256",
  "A192CBC-HS384",
  "A256CBC-HS512"
]
response_modes_supported
[
  "query",
  "fragment",
  "form_post",
  "query.jwt",
  "fragment.jwt",
  "form_post.jwt",
  "jwt"
]
registration_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect
token_endpoint_auth_methods_supported
[
  "private_key_jwt",
  "client_secret_basic",
  "client_secret_post",
  "tls_client_auth",
  "client_secret_jwt"
]
token_endpoint_auth_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512"
]
introspection_endpoint_auth_methods_supported
[
  "private_key_jwt",
  "client_secret_basic",
  "client_secret_post",
  "tls_client_auth",
  "client_secret_jwt"
]
introspection_endpoint_auth_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512"
]
authorization_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512"
]
authorization_encryption_alg_values_supported
[
  "RSA-OAEP",
  "RSA-OAEP-256",
  "RSA1_5"
]
authorization_encryption_enc_values_supported
[
  "A256GCM",
  "A192GCM",
  "A128GCM",
  "A128CBC-HS256",
  "A192CBC-HS384",
  "A256CBC-HS512"
]
claims_supported
[
  "aud",
  "sub",
  "iss",
  "auth_time",
  "name",
  "given_name",
  "family_name",
  "preferred_username",
  "email",
  "acr"
]
claim_types_supported
[
  "normal"
]
claims_parameter_supported
true
scopes_supported
[
  "openid",
  "consents",
  "name_claims",
  "microprofile-jwt",
  "consent:1",
  "name_claims_for_implicit",
  "roles",
  "address",
  "phone",
  "web-origins",
  "profile",
  "offline_access",
  "resources",
  "email"
]
request_parameter_supported
true
request_uri_parameter_supported
true
require_request_uri_registration
true
code_challenge_methods_supported
[
  "plain",
  "S256"
]
tls_client_certificate_bound_access_tokens
true
revocation_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/revoke
revocation_endpoint_auth_methods_supported
[
  "private_key_jwt",
  "client_secret_basic",
  "client_secret_post",
  "tls_client_auth",
  "client_secret_jwt"
]
revocation_endpoint_auth_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "HS256",
  "HS512",
  "ES256",
  "RS256",
  "HS384",
  "ES512",
  "PS256",
  "PS512",
  "RS512"
]
backchannel_logout_supported
true
backchannel_logout_session_supported
true
device_authorization_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth/device
backchannel_token_delivery_modes_supported
[
  "poll",
  "ping"
]
backchannel_authentication_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/ciba/auth
backchannel_authentication_request_signing_alg_values_supported
[
  "PS384",
  "ES384",
  "RS384",
  "ES256",
  "RS256",
  "ES512",
  "PS256",
  "PS512",
  "RS512"
]
require_pushed_authorization_requests
false
pushed_authorization_request_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/par/request
mtls_endpoint_aliases
{
  "token_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token",
  "revocation_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/revoke",
  "introspection_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/token/introspect",
  "device_authorization_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth/device",
  "registration_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/clients-registrations/openid-connect",
  "userinfo_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/userinfo",
  "pushed_authorization_request_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/par/request",
  "backchannel_authentication_endpoint": "https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/ext/ciba/auth"
}
2022-05-16 12:22:47 SUCCESS
CheckServerConfiguration
Found required server configuration keys
required
[
  "authorization_endpoint",
  "token_endpoint",
  "issuer"
]
2022-05-16 12:22:47 SUCCESS
ExtractTLSTestValuesFromServerConfiguration
Extracted TLS information from authorization server configuration
registration_endpoint
{
  "testHost": "84-244-72-90.nip.io",
  "testPort": 60000
}
authorization_endpoint
{
  "testHost": "84-244-72-90.nip.io",
  "testPort": 60000
}
token_endpoint
{
  "testHost": "84-244-72-90.nip.io",
  "testPort": 60000
}
userinfo_endpoint
{
  "testHost": "84-244-72-90.nip.io",
  "testPort": 60000
}
2022-05-16 12:22:47
FetchServerKeys
Fetching server key
jwks_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/certs
2022-05-16 12:22:47
FetchServerKeys
HTTP request
request_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/certs
request_method
GET
request_headers
{
  "accept": "text/plain, application/json, application/*+json, */*",
  "content-length": "0"
}
request_body

                                
2022-05-16 12:22:48 RESPONSE
FetchServerKeys
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "cache-control": "no-cache",
  "x-xss-protection": "1; mode\u003dblock",
  "x-frame-options": "SAMEORIGIN",
  "referrer-policy": "no-referrer",
  "date": "Mon, 16 May 2022 12:22:48 GMT",
  "connection": "keep-alive",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "content-type": "application/json",
  "content-length": "4559"
}
response_body
{"keys":[{"kid":"nVJXuV18rIhJQK_ezukCg6B6ihqd_ysVRpNmmGNIJgg","kty":"RSA","alg":"PS256","use":"enc","n":"gJeVMx_ucf4OkwPjfo3QqRVGJad4MoGX0epHfzh_9JWhetahQKvU2R8I7YnWMRmdni2ZuWVdnRDdrU83FN-RGKRq8bkV59-U9UM25mrFD-27qczX_SvipPeSJfCC8BVg6IVaG0xYVJcAJyqCczhV0p36Tv3ehLhnZA_JZYgGcQznEXRawqQMQ1hKLC-cbQdXbcuzlKB-jGKUvNOPrRWkFYbcbbPMqeqv60TtQL--9X0rFxySfGbUVTDENmsJUaS5vs-cHEyst-UX6Y-lmCoTA0LZsOaH608POFmeaVB7ZmDdeGCHS_H4BCbQS7p_vI67i-IH8L5qrr_TZGabii1Ggw","e":"AQAB","x5c":["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"],"x5t":"nsamQNPuXTrs2Bh2mhtQ1p-Cs-M","x5t#S256":"g1XbSXBmnrd0nphVoyIfkix50Nsr0HqrJAvypgOzBq0"},{"kid":"RzJaSl5uXbIzduF-D5dOo6yLiqMOrdK3P_7vKZKsqrY","kty":"RSA","alg":"RS256","use":"sig","n":"hc3JDwS0TS-SX74-_FJKP9bq5LuuyrFZkxLfX6NVyyR9iEO-_WY4bnc_f9DVWEn1ygYY-K0WlVBvaPpgoEKKPxNqJ0NrgAj_xjOr-9Pqw5q8I3ziIAPTmxH0NQkVUTsCR5p62aXUEfpmTeNtqMOS9GTHZPjAuHimiEgdEY-boolGJbUwAfzpd42vDjnz2kWct80D74iUHANxLz8jJ1reyUwH1QyLF-ouHb5Kh4yHfhVd1iP0oQwPEtB3IS25NQsRyrOHJpFvooRhmzWdyceG-c2Ui670zFv3gUAwoZclkVlS9ykPvVqZyYNQ6Sl-TUNUOWppIG-VSQW15mtfWmiskw","e":"AQAB","x5c":["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"],"x5t":"a9EHlEUdeGHxtup6eQp74LCZWyk","x5t#S256":"XM6CJJcSE1YeZJ5rtNWzbhZe6FhjvVmYzxyUhflmx80"},{"kid":"3j2X9LXvxBl15lAOntwKWvoS13ZFGSskSq4qW2rv_us","kty":"RSA","alg":"PS256","use":"sig","n":"jF-GpA0T_8cZjweY69yY5oKwOwWXKIXCL4mG8PcFcdeuihPGTU3w6XV-dTQPjfZpysISmSpZKm1aEMwTh2yXIl5Oel95rNzaj-7rMI4nrZn9ruHjh_cToHxyWDI8bs_V-MSBwqbbFGltdXWUa3LFsrwRt0XKNMPzhQLciuLO0iBumF4Yc1VqmmS9buwpCqPc2qNggMp7pteZe5Lbkc-0X6zbBqkgo8wkbq31TN7cwDWxmVttxw7Mc4eUSVuROqiLgSKRCoWGYf9vIsiiXov8Q3mLaXyiQvh9gzDyWwzzAxbmVQhBxF-PVOdgGurYU0HkNjw3cr3OZkvKzbqccdYsiQ","e":"AQAB","x5c":["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"],"x5t":"TvB49qBdfskwNG8LWUYOE3z29fE","x5t#S256":"kTzfVukTOuEwsJ7ICp69-kbcipMUZ31yTNOPdQifuMk"},{"kid":"6p6LMG-CvC-c6SvkKKOP8W_Z4fTBS9Q461P9zxi2n6o","kty":"EC","alg":"ES256","use":"sig","crv":"P-256","x":"wy_EGIii551Ei-nodYzkg-S_y3ecdgTATnAwUxinhhQ","y":"LCbIl7PUYc2DtBJGRMrOt80rk3PJbJ1onUwK_82yHUw"}]}
2022-05-16 12:22:48
FetchServerKeys
Found JWK set string
jwk_string
{"keys":[{"kid":"nVJXuV18rIhJQK_ezukCg6B6ihqd_ysVRpNmmGNIJgg","kty":"RSA","alg":"PS256","use":"enc","n":"gJeVMx_ucf4OkwPjfo3QqRVGJad4MoGX0epHfzh_9JWhetahQKvU2R8I7YnWMRmdni2ZuWVdnRDdrU83FN-RGKRq8bkV59-U9UM25mrFD-27qczX_SvipPeSJfCC8BVg6IVaG0xYVJcAJyqCczhV0p36Tv3ehLhnZA_JZYgGcQznEXRawqQMQ1hKLC-cbQdXbcuzlKB-jGKUvNOPrRWkFYbcbbPMqeqv60TtQL--9X0rFxySfGbUVTDENmsJUaS5vs-cHEyst-UX6Y-lmCoTA0LZsOaH608POFmeaVB7ZmDdeGCHS_H4BCbQS7p_vI67i-IH8L5qrr_TZGabii1Ggw","e":"AQAB","x5c":["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"],"x5t":"nsamQNPuXTrs2Bh2mhtQ1p-Cs-M","x5t#S256":"g1XbSXBmnrd0nphVoyIfkix50Nsr0HqrJAvypgOzBq0"},{"kid":"RzJaSl5uXbIzduF-D5dOo6yLiqMOrdK3P_7vKZKsqrY","kty":"RSA","alg":"RS256","use":"sig","n":"hc3JDwS0TS-SX74-_FJKP9bq5LuuyrFZkxLfX6NVyyR9iEO-_WY4bnc_f9DVWEn1ygYY-K0WlVBvaPpgoEKKPxNqJ0NrgAj_xjOr-9Pqw5q8I3ziIAPTmxH0NQkVUTsCR5p62aXUEfpmTeNtqMOS9GTHZPjAuHimiEgdEY-boolGJbUwAfzpd42vDjnz2kWct80D74iUHANxLz8jJ1reyUwH1QyLF-ouHb5Kh4yHfhVd1iP0oQwPEtB3IS25NQsRyrOHJpFvooRhmzWdyceG-c2Ui670zFv3gUAwoZclkVlS9ykPvVqZyYNQ6Sl-TUNUOWppIG-VSQW15mtfWmiskw","e":"AQAB","x5c":["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"],"x5t":"a9EHlEUdeGHxtup6eQp74LCZWyk","x5t#S256":"XM6CJJcSE1YeZJ5rtNWzbhZe6FhjvVmYzxyUhflmx80"},{"kid":"3j2X9LXvxBl15lAOntwKWvoS13ZFGSskSq4qW2rv_us","kty":"RSA","alg":"PS256","use":"sig","n":"jF-GpA0T_8cZjweY69yY5oKwOwWXKIXCL4mG8PcFcdeuihPGTU3w6XV-dTQPjfZpysISmSpZKm1aEMwTh2yXIl5Oel95rNzaj-7rMI4nrZn9ruHjh_cToHxyWDI8bs_V-MSBwqbbFGltdXWUa3LFsrwRt0XKNMPzhQLciuLO0iBumF4Yc1VqmmS9buwpCqPc2qNggMp7pteZe5Lbkc-0X6zbBqkgo8wkbq31TN7cwDWxmVttxw7Mc4eUSVuROqiLgSKRCoWGYf9vIsiiXov8Q3mLaXyiQvh9gzDyWwzzAxbmVQhBxF-PVOdgGurYU0HkNjw3cr3OZkvKzbqccdYsiQ","e":"AQAB","x5c":["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"],"x5t":"TvB49qBdfskwNG8LWUYOE3z29fE","x5t#S256":"kTzfVukTOuEwsJ7ICp69-kbcipMUZ31yTNOPdQifuMk"},{"kid":"6p6LMG-CvC-c6SvkKKOP8W_Z4fTBS9Q461P9zxi2n6o","kty":"EC","alg":"ES256","use":"sig","crv":"P-256","x":"wy_EGIii551Ei-nodYzkg-S_y3ecdgTATnAwUxinhhQ","y":"LCbIl7PUYc2DtBJGRMrOt80rk3PJbJ1onUwK_82yHUw"}]}
2022-05-16 12:22:48 SUCCESS
FetchServerKeys
Found server JWK set
server_jwks
{
  "keys": [
    {
      "kid": "nVJXuV18rIhJQK_ezukCg6B6ihqd_ysVRpNmmGNIJgg",
      "kty": "RSA",
      "alg": "PS256",
      "use": "enc",
      "n": "gJeVMx_ucf4OkwPjfo3QqRVGJad4MoGX0epHfzh_9JWhetahQKvU2R8I7YnWMRmdni2ZuWVdnRDdrU83FN-RGKRq8bkV59-U9UM25mrFD-27qczX_SvipPeSJfCC8BVg6IVaG0xYVJcAJyqCczhV0p36Tv3ehLhnZA_JZYgGcQznEXRawqQMQ1hKLC-cbQdXbcuzlKB-jGKUvNOPrRWkFYbcbbPMqeqv60TtQL--9X0rFxySfGbUVTDENmsJUaS5vs-cHEyst-UX6Y-lmCoTA0LZsOaH608POFmeaVB7ZmDdeGCHS_H4BCbQS7p_vI67i-IH8L5qrr_TZGabii1Ggw",
      "e": "AQAB",
      "x5c": [
        "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\u003d\u003d"
      ],
      "x5t": "nsamQNPuXTrs2Bh2mhtQ1p-Cs-M",
      "x5t#S256": "g1XbSXBmnrd0nphVoyIfkix50Nsr0HqrJAvypgOzBq0"
    },
    {
      "kid": "RzJaSl5uXbIzduF-D5dOo6yLiqMOrdK3P_7vKZKsqrY",
      "kty": "RSA",
      "alg": "RS256",
      "use": "sig",
      "n": "hc3JDwS0TS-SX74-_FJKP9bq5LuuyrFZkxLfX6NVyyR9iEO-_WY4bnc_f9DVWEn1ygYY-K0WlVBvaPpgoEKKPxNqJ0NrgAj_xjOr-9Pqw5q8I3ziIAPTmxH0NQkVUTsCR5p62aXUEfpmTeNtqMOS9GTHZPjAuHimiEgdEY-boolGJbUwAfzpd42vDjnz2kWct80D74iUHANxLz8jJ1reyUwH1QyLF-ouHb5Kh4yHfhVd1iP0oQwPEtB3IS25NQsRyrOHJpFvooRhmzWdyceG-c2Ui670zFv3gUAwoZclkVlS9ykPvVqZyYNQ6Sl-TUNUOWppIG-VSQW15mtfWmiskw",
      "e": "AQAB",
      "x5c": [
        "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\u003d\u003d"
      ],
      "x5t": "a9EHlEUdeGHxtup6eQp74LCZWyk",
      "x5t#S256": "XM6CJJcSE1YeZJ5rtNWzbhZe6FhjvVmYzxyUhflmx80"
    },
    {
      "kid": "3j2X9LXvxBl15lAOntwKWvoS13ZFGSskSq4qW2rv_us",
      "kty": "RSA",
      "alg": "PS256",
      "use": "sig",
      "n": "jF-GpA0T_8cZjweY69yY5oKwOwWXKIXCL4mG8PcFcdeuihPGTU3w6XV-dTQPjfZpysISmSpZKm1aEMwTh2yXIl5Oel95rNzaj-7rMI4nrZn9ruHjh_cToHxyWDI8bs_V-MSBwqbbFGltdXWUa3LFsrwRt0XKNMPzhQLciuLO0iBumF4Yc1VqmmS9buwpCqPc2qNggMp7pteZe5Lbkc-0X6zbBqkgo8wkbq31TN7cwDWxmVttxw7Mc4eUSVuROqiLgSKRCoWGYf9vIsiiXov8Q3mLaXyiQvh9gzDyWwzzAxbmVQhBxF-PVOdgGurYU0HkNjw3cr3OZkvKzbqccdYsiQ",
      "e": "AQAB",
      "x5c": [
        "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\u003d\u003d"
      ],
      "x5t": "TvB49qBdfskwNG8LWUYOE3z29fE",
      "x5t#S256": "kTzfVukTOuEwsJ7ICp69-kbcipMUZ31yTNOPdQifuMk"
    },
    {
      "kid": "6p6LMG-CvC-c6SvkKKOP8W_Z4fTBS9Q461P9zxi2n6o",
      "kty": "EC",
      "alg": "ES256",
      "use": "sig",
      "crv": "P-256",
      "x": "wy_EGIii551Ei-nodYzkg-S_y3ecdgTATnAwUxinhhQ",
      "y": "LCbIl7PUYc2DtBJGRMrOt80rk3PJbJ1onUwK_82yHUw"
    }
  ]
}
2022-05-16 12:22:48 SUCCESS
CheckServerKeysIsValid
Server JWKs is valid
server_jwks
{
  "keys": [
    {
      "kid": "nVJXuV18rIhJQK_ezukCg6B6ihqd_ysVRpNmmGNIJgg",
      "kty": "RSA",
      "alg": "PS256",
      "use": "enc",
      "n": "gJeVMx_ucf4OkwPjfo3QqRVGJad4MoGX0epHfzh_9JWhetahQKvU2R8I7YnWMRmdni2ZuWVdnRDdrU83FN-RGKRq8bkV59-U9UM25mrFD-27qczX_SvipPeSJfCC8BVg6IVaG0xYVJcAJyqCczhV0p36Tv3ehLhnZA_JZYgGcQznEXRawqQMQ1hKLC-cbQdXbcuzlKB-jGKUvNOPrRWkFYbcbbPMqeqv60TtQL--9X0rFxySfGbUVTDENmsJUaS5vs-cHEyst-UX6Y-lmCoTA0LZsOaH608POFmeaVB7ZmDdeGCHS_H4BCbQS7p_vI67i-IH8L5qrr_TZGabii1Ggw",
      "e": "AQAB",
      "x5c": [
        "MIIClzCCAX8CBgGAzCPyBjANBgkqhkiG9w0BAQsFADAPMQ0wCwYDVQQDDAR0ZXN0MB4XDTIyMDUxNjA5MTA0OVoXDTMyMDUxNjA5MTIyOVowDzENMAsGA1UEAwwEdGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAICXlTMf7nH+DpMD436N0KkVRiWneDKBl9HqR384f/SVoXrWoUCr1NkfCO2J1jEZnZ4tmbllXZ0Q3a1PNxTfkRikavG5FefflPVDNuZqxQ/tu6nM1/0r4qT3kiXwgvAVYOiFWhtMWFSXACcqgnM4VdKd+k793oS4Z2QPyWWIBnEM5xF0WsKkDENYSiwvnG0HV23Ls5SgfoxilLzTj60VpBWG3G2zzKnqr+tE7UC/vvV9Kxccknxm1FUwxDZrCVGkub7PnBxMrLflF+mPpZgqEwNC2bDmh+tPDzhZnmlQe2Zg3Xhgh0vx+AQm0Eu6f7yOu4viB/C+aq6/02Rmm4otRoMCAwEAATANBgkqhkiG9w0BAQsFAAOCAQEAJGENeCNqIbHidimks6k9WRJaYYP0n5cRFcxh2EKKwgOJqaHJ3oaeWJ97owND+S7wl6VZLKebb6BPwaKoedtkPgSh/H4wYBW5u5reE/GkU1M7T37Zn1Xs6jsLDISJWWxDn8k+hTeAi08P0Qoymq8WnDbKplbjiPbKTtDDqEcBsXvwRHkPUrBFKzlSapWWSIspqcHwpFklfYKm9JCC6JtFdw/lCyd/0u+x/dQ/ZNhYx9WUOUtLtnqFxkWWuydQ0z6hOkfUDUokH5FhjdvfYJk8Nw82VuTm3ly3HEv59HbjOxnobzDM0pnqJfiYWRNcfJ480b55sdzMF1604bk//h0oVQ\u003d\u003d"
      ],
      "x5t": "nsamQNPuXTrs2Bh2mhtQ1p-Cs-M",
      "x5t#S256": "g1XbSXBmnrd0nphVoyIfkix50Nsr0HqrJAvypgOzBq0"
    },
    {
      "kid": "RzJaSl5uXbIzduF-D5dOo6yLiqMOrdK3P_7vKZKsqrY",
      "kty": "RSA",
      "alg": "RS256",
      "use": "sig",
      "n": "hc3JDwS0TS-SX74-_FJKP9bq5LuuyrFZkxLfX6NVyyR9iEO-_WY4bnc_f9DVWEn1ygYY-K0WlVBvaPpgoEKKPxNqJ0NrgAj_xjOr-9Pqw5q8I3ziIAPTmxH0NQkVUTsCR5p62aXUEfpmTeNtqMOS9GTHZPjAuHimiEgdEY-boolGJbUwAfzpd42vDjnz2kWct80D74iUHANxLz8jJ1reyUwH1QyLF-ouHb5Kh4yHfhVd1iP0oQwPEtB3IS25NQsRyrOHJpFvooRhmzWdyceG-c2Ui670zFv3gUAwoZclkVlS9ykPvVqZyYNQ6Sl-TUNUOWppIG-VSQW15mtfWmiskw",
      "e": "AQAB",
      "x5c": [
        "MIIClzCCAX8CBgGAzCPu7jANBgkqhkiG9w0BAQsFADAPMQ0wCwYDVQQDDAR0ZXN0MB4XDTIyMDUxNjA5MTA0OFoXDTMyMDUxNjA5MTIyOFowDzENMAsGA1UEAwwEdGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIXNyQ8EtE0vkl++PvxSSj/W6uS7rsqxWZMS31+jVcskfYhDvv1mOG53P3/Q1VhJ9coGGPitFpVQb2j6YKBCij8TaidDa4AI/8Yzq/vT6sOavCN84iAD05sR9DUJFVE7Akeaetml1BH6Zk3jbajDkvRkx2T4wLh4pohIHRGPm6KJRiW1MAH86XeNrw4589pFnLfNA++IlBwDcS8/Iyda3slMB9UMixfqLh2+SoeMh34VXdYj9KEMDxLQdyEtuTULEcqzhyaRb6KEYZs1ncnHhvnNlIuu9Mxb94FAMKGXJZFZUvcpD71amcmDUOkpfk1DVDlqaSBvlUkFteZrX1porJMCAwEAATANBgkqhkiG9w0BAQsFAAOCAQEABc4byb50M1IWWJgsXem0mAQAT8Zn/Q8qbVpTx2n5+uegtnetUTF4bvhlgtBrWVQSt1tPAjPo5A3uvfiSqaWmu66XzhWMXsPyFfchRdpIUZsnZCxv0upO232DWsbIURvK7oyZWIYerU5luUyUCZ0nVYPdKsfqr3bSnFfM8nSV8/mA1HWKNXUXpkJCwvqY0xUKkuvmxholp0c9GXjZ8yoz595DsaAM56CkZ1jN1wlCkkoOb8l7pFBPSjUgYmHWb4TDdgKr1XVUChP1yfWCk8ypYdBwlekLYLmBQneH/Y/sVT+pQZqtkb22ptGOy3wu4q7TJ7KW5JI/GZCT6izsRvmJKQ\u003d\u003d"
      ],
      "x5t": "a9EHlEUdeGHxtup6eQp74LCZWyk",
      "x5t#S256": "XM6CJJcSE1YeZJ5rtNWzbhZe6FhjvVmYzxyUhflmx80"
    },
    {
      "kid": "3j2X9LXvxBl15lAOntwKWvoS13ZFGSskSq4qW2rv_us",
      "kty": "RSA",
      "alg": "PS256",
      "use": "sig",
      "n": "jF-GpA0T_8cZjweY69yY5oKwOwWXKIXCL4mG8PcFcdeuihPGTU3w6XV-dTQPjfZpysISmSpZKm1aEMwTh2yXIl5Oel95rNzaj-7rMI4nrZn9ruHjh_cToHxyWDI8bs_V-MSBwqbbFGltdXWUa3LFsrwRt0XKNMPzhQLciuLO0iBumF4Yc1VqmmS9buwpCqPc2qNggMp7pteZe5Lbkc-0X6zbBqkgo8wkbq31TN7cwDWxmVttxw7Mc4eUSVuROqiLgSKRCoWGYf9vIsiiXov8Q3mLaXyiQvh9gzDyWwzzAxbmVQhBxF-PVOdgGurYU0HkNjw3cr3OZkvKzbqccdYsiQ",
      "e": "AQAB",
      "x5c": [
        "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\u003d\u003d"
      ],
      "x5t": "TvB49qBdfskwNG8LWUYOE3z29fE",
      "x5t#S256": "kTzfVukTOuEwsJ7ICp69-kbcipMUZ31yTNOPdQifuMk"
    },
    {
      "kid": "6p6LMG-CvC-c6SvkKKOP8W_Z4fTBS9Q461P9zxi2n6o",
      "kty": "EC",
      "alg": "ES256",
      "use": "sig",
      "crv": "P-256",
      "x": "wy_EGIii551Ei-nodYzkg-S_y3ecdgTATnAwUxinhhQ",
      "y": "LCbIl7PUYc2DtBJGRMrOt80rk3PJbJ1onUwK_82yHUw"
    }
  ]
}
2022-05-16 12:22:48 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2022-05-16 12:22:48 SUCCESS
CheckForKeyIdInServerJWKs
All keys contain kids
2022-05-16 12:22:48 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2022-05-16 12:22:48 SUCCESS
EnsureServerJwksDoesNotContainPrivateOrSymmetricKeys
Jwks does not contain any private or symmetric keys
2022-05-16 12:22:48 SUCCESS
CreatePostLogoutRedirectUri
Created post_logout_redirect_uri URI
post_logout_redirect_uri
https://www.certification.openid.net/test/a/keycloak/post_logout_redirect
2022-05-16 12:22:48 SUCCESS
GetStaticClientConfiguration
Found a static client object
client_id
client1-rp-initiated-logout
client_secret
hYrN6jbdLq6WtfxjhVxmdF3vVdOgNK9p
2022-05-16 12:22:48 INFO
ValidateClientJWKsPrivatePart
Skipped evaluation due to missing required element: client jwks
path
jwks
mapped
object
client
2022-05-16 12:22:48 INFO
ExtractJWKsFromStaticClientConfiguration
Skipped evaluation due to missing required element: client jwks
path
jwks
mapped
object
client
2022-05-16 12:22:48 INFO
CheckDistinctKeyIdValueInClientJWKs
Skipped evaluation due to missing required element: client jwks
path
jwks
mapped
object
client
2022-05-16 12:22:48
SetScopeInClientConfigurationToOpenId
Set scope in client configuration to "openid"
scope
openid
2022-05-16 12:22:48 SUCCESS
EnsureServerConfigurationSupportsClientSecretBasic
Contents of 'token_endpoint_auth_methods_supported' in discovery document matches expectations.
actual
[
  "private_key_jwt",
  "client_secret_basic",
  "client_secret_post",
  "tls_client_auth",
  "client_secret_jwt"
]
expected
[
  "client_secret_basic"
]
minimum_matches_required
1
2022-05-16 12:22:48 SUCCESS
SetProtectedResourceUrlToUserInfoEndpoint
userinfo_endpoint will be used to test access token. The user info is not a mandatory to implement feature in the OpenID Connect specification, but is mandatory for certification.
protected_resource_url
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/userinfo
2022-05-16 12:22:48 SUCCESS
GenerateJWKsFromClientSecret
Generated JWK Set from symmetric key
client_jwks
{
  "keys": [
    {
      "kty": "oct",
      "use": "sig",
      "k": "aFlyTjZqYmRMcTZXdGZ4amhWeG1kRjN2VmRPZ05LOXA",
      "alg": "HS256"
    }
  ]
}
2022-05-16 12:22:48
oidcc-rp-initiated-logout-bad-id-token-hint
Setup Done
Make request to authorization endpoint
2022-05-16 12:22:48 SUCCESS
CreateAuthorizationEndpointRequestFromClientInformation
Created authorization endpoint request
client_id
client1-rp-initiated-logout
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
scope
openid
2022-05-16 12:22:48
CreateRandomStateValue
Created state value
requested_state_length
128
state
R6LjX2BCXvFskWkIbFdbq3lkhUNDTTKJ2iUrBlqI6b6sm192HCaHrJOvTrDewCuGjJnZg58bU5SwjLdpE9QUrwA6k7EbHjNgBoGh95O2F4cw27OVNq7ASziydCNXd0ju
2022-05-16 12:22:48 SUCCESS
AddStateToAuthorizationEndpointRequest
Added state parameter to request
client_id
client1-rp-initiated-logout
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
scope
openid
state
R6LjX2BCXvFskWkIbFdbq3lkhUNDTTKJ2iUrBlqI6b6sm192HCaHrJOvTrDewCuGjJnZg58bU5SwjLdpE9QUrwA6k7EbHjNgBoGh95O2F4cw27OVNq7ASziydCNXd0ju
2022-05-16 12:22:48
CreateRandomNonceValue
Created nonce value
requested_nonce_length
10
nonce
WiFhoERS5h
2022-05-16 12:22:48 SUCCESS
AddNonceToAuthorizationEndpointRequest
Added nonce parameter to request
client_id
client1-rp-initiated-logout
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
scope
openid
state
R6LjX2BCXvFskWkIbFdbq3lkhUNDTTKJ2iUrBlqI6b6sm192HCaHrJOvTrDewCuGjJnZg58bU5SwjLdpE9QUrwA6k7EbHjNgBoGh95O2F4cw27OVNq7ASziydCNXd0ju
nonce
WiFhoERS5h
2022-05-16 12:22:48 SUCCESS
SetAuthorizationEndpointRequestResponseTypeFromEnvironment
Added response_type parameter to request
client_id
client1-rp-initiated-logout
redirect_uri
https://www.certification.openid.net/test/a/keycloak/callback
scope
openid
state
R6LjX2BCXvFskWkIbFdbq3lkhUNDTTKJ2iUrBlqI6b6sm192HCaHrJOvTrDewCuGjJnZg58bU5SwjLdpE9QUrwA6k7EbHjNgBoGh95O2F4cw27OVNq7ASziydCNXd0ju
nonce
WiFhoERS5h
response_type
id_token token
2022-05-16 12:22:48 SUCCESS
BuildPlainRedirectToAuthorizationEndpoint
Sending to authorization endpoint
auth_request
{
  "client_id": "client1-rp-initiated-logout",
  "redirect_uri": "https://www.certification.openid.net/test/a/keycloak/callback",
  "scope": "openid",
  "state": "R6LjX2BCXvFskWkIbFdbq3lkhUNDTTKJ2iUrBlqI6b6sm192HCaHrJOvTrDewCuGjJnZg58bU5SwjLdpE9QUrwA6k7EbHjNgBoGh95O2F4cw27OVNq7ASziydCNXd0ju",
  "nonce": "WiFhoERS5h",
  "response_type": "id_token token"
}
redirect_to_authorization_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth?client_id=client1-rp-initiated-logout&redirect_uri=https://www.certification.openid.net/test/a/keycloak/callback&scope=openid&state=R6LjX2BCXvFskWkIbFdbq3lkhUNDTTKJ2iUrBlqI6b6sm192HCaHrJOvTrDewCuGjJnZg58bU5SwjLdpE9QUrwA6k7EbHjNgBoGh95O2F4cw27OVNq7ASziydCNXd0ju&nonce=WiFhoERS5h&response_type=id_token%20token
2022-05-16 12:22:48 REDIRECT
oidcc-rp-initiated-logout-bad-id-token-hint
Redirecting to authorization endpoint
redirect_to
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/auth?client_id=client1-rp-initiated-logout&redirect_uri=https://www.certification.openid.net/test/a/keycloak/callback&scope=openid&state=R6LjX2BCXvFskWkIbFdbq3lkhUNDTTKJ2iUrBlqI6b6sm192HCaHrJOvTrDewCuGjJnZg58bU5SwjLdpE9QUrwA6k7EbHjNgBoGh95O2F4cw27OVNq7ASziydCNXd0ju&nonce=WiFhoERS5h&response_type=id_token%20token
2022-05-16 12:22:50 INCOMING
oidcc-rp-initiated-logout-bad-id-token-hint
Incoming HTTP request to /test/a/keycloak/callback
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:100.0) Gecko/20100101 Firefox/100.0",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/avif,image/webp,*/*;q\u003d0.8",
  "accept-language": "en-US,en;q\u003d0.5",
  "accept-encoding": "gzip, deflate, br",
  "cookie": "__utma\u003d201319536.747058366.1611919072.1652681365.1652688969.137; __utmz\u003d201319536.1647870296.126.44.utmcsr\u003dgoogle|utmccn\u003d(organic)|utmcmd\u003dorganic|utmctr\u003d(not%20provided); _ga\u003dGA1.2.747058366.1611919072; __utmc\u003d201319536; JSESSIONID\u003d63EE1707428F3F9812307D8819923D9B",
  "upgrade-insecure-requests": "1",
  "sec-fetch-dest": "document",
  "sec-fetch-mode": "navigate",
  "sec-fetch-site": "cross-site",
  "connection": "close"
}
incoming_path
/test/a/keycloak/callback
incoming_body_form_params
incoming_method
GET
incoming_tls_version
TLSv1.2
incoming_tls_cipher
ECDHE-RSA-AES128-GCM-SHA256
incoming_tls_cert
incoming_body_json
incoming_query_string_params
{}
incoming_body
2022-05-16 12:22:50 SUCCESS
CreateRandomImplicitSubmitUrl
Created random implicit submission URL
implicit_submit
{
  "path": "implicit/ugJDbYPovSSeIaJYDSRR",
  "fullUrl": "https://www.certification.openid.net/test/a/keycloak/implicit/ugJDbYPovSSeIaJYDSRR"
}
2022-05-16 12:22:50 OUTGOING
oidcc-rp-initiated-logout-bad-id-token-hint
Response to HTTP request to test instance nGIF2nKonPWC5QS
outgoing
ModelAndView [view="implicitCallback"; model={implicitSubmitUrl=https://www.certification.openid.net/test/a/keycloak/implicit/ugJDbYPovSSeIaJYDSRR, returnUrl=/log-detail.html?log=nGIF2nKonPWC5QS}]
outgoing_path
callback
2022-05-16 12:22:51 INCOMING
oidcc-rp-initiated-logout-bad-id-token-hint
Incoming HTTP request to /test/a/keycloak/implicit/ugJDbYPovSSeIaJYDSRR
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:100.0) Gecko/20100101 Firefox/100.0",
  "accept": "*/*",
  "accept-language": "en-US,en;q\u003d0.5",
  "accept-encoding": "gzip, deflate, br",
  "content-type": "text/plain",
  "x-requested-with": "XMLHttpRequest",
  "origin": "https://www.certification.openid.net",
  "referer": "https://www.certification.openid.net/test/a/keycloak/callback",
  "cookie": "__utma\u003d201319536.747058366.1611919072.1652681365.1652688969.137; __utmz\u003d201319536.1647870296.126.44.utmcsr\u003dgoogle|utmccn\u003d(organic)|utmcmd\u003dorganic|utmctr\u003d(not%20provided); _ga\u003dGA1.2.747058366.1611919072; __utmc\u003d201319536; JSESSIONID\u003d63EE1707428F3F9812307D8819923D9B",
  "sec-fetch-dest": "empty",
  "sec-fetch-mode": "cors",
  "sec-fetch-site": "same-origin",
  "connection": "close",
  "content-length": "3259"
}
incoming_path
/test/a/keycloak/implicit/ugJDbYPovSSeIaJYDSRR
incoming_body_form_params
incoming_method
POST
incoming_tls_version
TLSv1.2
incoming_tls_cipher
ECDHE-RSA-AES128-GCM-SHA256
incoming_tls_cert
incoming_body_json
incoming_query_string_params
{}
incoming_body
#state=R6LjX2BCXvFskWkIbFdbq3lkhUNDTTKJ2iUrBlqI6b6sm192HCaHrJOvTrDewCuGjJnZg58bU5SwjLdpE9QUrwA6k7EbHjNgBoGh95O2F4cw27OVNq7ASziydCNXd0ju&session_state=206a3f16-1bc2-45a9-8b3e-0b2b92bf2027&id_token=eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.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.GBRQXyFQBgtEgcIi6vr4aw_DApu6bKCdw0Go-GXVkCsFtGbg2OQTygeEYcdiEvpitr7X_K1Eea8Esrv9NJunVA&access_token=eyJhbGciOiJQUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICIzajJYOUxYdnhCbDE1bEFPbnR3S1d2b1MxM1pGR1Nza1NxNHFXMnJ2X3VzIn0.eyJleHAiOjE2NTI3MDQ2NzAsImlhdCI6MTY1MjcwMzc3MCwiYXV0aF90aW1lIjoxNjUyNzAzNzMyLCJqdGkiOiJjNGYzNmRmMS0zOTliLTQyMjItYjZmNC1jZWUwZmMwMjFkNjkiLCJpc3MiOiJodHRwczovLzg0LTI0NC03Mi05MC5uaXAuaW86NjAwMDAvYXV0aC9yZWFsbXMvdGVzdCIsImF1ZCI6InJlc291cmNlLXNlcnZlciIsInN1YiI6IjNlY2RjZWNkLTQzZGMtNGRjOS1hYTFjLWI5NzkxZmNmNzMwZiIsInR5cCI6IkJlYXJlciIsImF6cCI6ImNsaWVudDEtcnAtaW5pdGlhdGVkLWxvZ291dCIsIm5vbmNlIjoiV2lGaG9FUlM1aCIsInNlc3Npb25fc3RhdGUiOiIyMDZhM2YxNi0xYmMyLTQ1YTktOGIzZS0wYjJiOTJiZjIwMjciLCJhbGxvd2VkLW9yaWdpbnMiOlsiaHR0cHM6Ly9yZXZpZXctYXBwLWRldi1icmFuY2gtMi5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXQiLCJodHRwczovL3Jldmlldy1hcHAtZGV2LWJyYW5jaC03LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldCIsImh0dHBzOi8vcmV2aWV3LWFwcC1kZXYtYnJhbmNoLTguY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0IiwiaHR0cHM6Ly93d3cuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0IiwiaHR0cHM6Ly9yZXZpZXctYXBwLWRldi1icmFuY2gtNi5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXQiLCJodHRwczovL2NvbmZvcm1hbmNlLXN1aXRlLmtleWNsb2FrLWZhcGkub3JnIiwiaHR0cHM6Ly9sb2NhbGhvc3QuZW1vYml4LmNvLnVrIiwiaHR0cHM6Ly9yZXZpZXctYXBwLWRldi1icmFuY2gtOS5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXQiLCJodHRwczovL3Jldmlldy1hcHAtZGV2LWJyYW5jaC0xLmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldCIsImh0dHBzOi8vbG9jYWxob3N0LmVtb2JpeC5jby51azo4NDQzIiwiaHR0cHM6Ly9zdGFnaW5nLmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldCIsImh0dHBzOi8vcmV2aWV3LWFwcC1kZXYtYnJhbmNoLTUuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0IiwiaHR0cHM6Ly9yZXZpZXctYXBwLWRldi1icmFuY2gtNC5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXQiLCJodHRwczovL2RlbW8uY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0IiwiaHR0cHM6Ly9sb2NhbGhvc3Q6ODQ0MyIsImh0dHBzOi8vcmV2aWV3LWFwcC1kZXYtYnJhbmNoLTMuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0Il0sInJlYWxtX2FjY2VzcyI6eyJyb2xlcyI6WyJvZmZsaW5lX2FjY2VzcyJdfSwic2NvcGUiOiJvcGVuaWQgbmFtZV9jbGFpbXMiLCJzaWQiOiIyMDZhM2YxNi0xYmMyLTQ1YTktOGIzZS0wYjJiOTJiZjIwMjcifQ.dop5t1lDycpQ05YLBmNRC9K4yk035KumcLUZUGoe7Oqibb996tmRNpOABEI_x8itLnDTrSlvA5ybQvX3bw36zaSvUYOvaVAeBaswYcBlofLUL5x2EmbowNuw4-V1scCysRic0eyhaVXvtY8U4R1f2_HghPYFVPhtmdtLbRR7ZAPHBuhwy55TzCDBRot2_f-HjUTeZVgkbida3bx_aFa7zDesr8qKC0i6R-cHjIJBlmTuEz4VsfIGwViOB7glroKXVeIsrAYgdpUfC2ARCdLHEAeRJ88sTm0x8kmp7_9f5WP1cK3mih5gkru-APBD6s6btXF8Aqo1ZnRduYN_y_gyCQ&token_type=Bearer&expires_in=900
2022-05-16 12:22:51 OUTGOING
oidcc-rp-initiated-logout-bad-id-token-hint
Response to HTTP request to test instance nGIF2nKonPWC5QS
outgoing_status_code
204
outgoing_headers
{}
outgoing_body

                                
outgoing_path
implicit/ugJDbYPovSSeIaJYDSRR
2022-05-16 12:22:51
ExtractImplicitHashToCallbackResponse
Extracted response from URL fragment
parameters
[
  {
    "name": "state",
    "value": "R6LjX2BCXvFskWkIbFdbq3lkhUNDTTKJ2iUrBlqI6b6sm192HCaHrJOvTrDewCuGjJnZg58bU5SwjLdpE9QUrwA6k7EbHjNgBoGh95O2F4cw27OVNq7ASziydCNXd0ju"
  },
  {
    "name": "session_state",
    "value": "206a3f16-1bc2-45a9-8b3e-0b2b92bf2027"
  },
  {
    "name": "id_token",
    "value": "eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.eyJleHAiOjE2NTI3MDQ2NzAsImlhdCI6MTY1MjcwMzc3MCwiYXV0aF90aW1lIjoxNjUyNzAzNzMyLCJqdGkiOiIwOWRlMDk0MC0yYWEwLTQxODItOThlZi0zZWRlMGI5MGQxZDgiLCJpc3MiOiJodHRwczovLzg0LTI0NC03Mi05MC5uaXAuaW86NjAwMDAvYXV0aC9yZWFsbXMvdGVzdCIsImF1ZCI6ImNsaWVudDEtcnAtaW5pdGlhdGVkLWxvZ291dCIsInN1YiI6IjNlY2RjZWNkLTQzZGMtNGRjOS1hYTFjLWI5NzkxZmNmNzMwZiIsInR5cCI6IklEIiwiYXpwIjoiY2xpZW50MS1ycC1pbml0aWF0ZWQtbG9nb3V0Iiwibm9uY2UiOiJXaUZob0VSUzVoIiwic2Vzc2lvbl9zdGF0ZSI6IjIwNmEzZjE2LTFiYzItNDVhOS04YjNlLTBiMmI5MmJmMjAyNyIsImF0X2hhc2giOiJNZzZHSUs4d1JlX2RNSkFxUGRjWnFnIiwic19oYXNoIjoidXcxRy1HTmpCLVo3aVl4bDUzeWpXdyIsInNpZCI6IjIwNmEzZjE2LTFiYzItNDVhOS04YjNlLTBiMmI5MmJmMjAyNyJ9.GBRQXyFQBgtEgcIi6vr4aw_DApu6bKCdw0Go-GXVkCsFtGbg2OQTygeEYcdiEvpitr7X_K1Eea8Esrv9NJunVA"
  },
  {
    "name": "access_token",
    "value": "eyJhbGciOiJQUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICIzajJYOUxYdnhCbDE1bEFPbnR3S1d2b1MxM1pGR1Nza1NxNHFXMnJ2X3VzIn0.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.dop5t1lDycpQ05YLBmNRC9K4yk035KumcLUZUGoe7Oqibb996tmRNpOABEI_x8itLnDTrSlvA5ybQvX3bw36zaSvUYOvaVAeBaswYcBlofLUL5x2EmbowNuw4-V1scCysRic0eyhaVXvtY8U4R1f2_HghPYFVPhtmdtLbRR7ZAPHBuhwy55TzCDBRot2_f-HjUTeZVgkbida3bx_aFa7zDesr8qKC0i6R-cHjIJBlmTuEz4VsfIGwViOB7glroKXVeIsrAYgdpUfC2ARCdLHEAeRJ88sTm0x8kmp7_9f5WP1cK3mih5gkru-APBD6s6btXF8Aqo1ZnRduYN_y_gyCQ"
  },
  {
    "name": "token_type",
    "value": "Bearer"
  },
  {
    "name": "expires_in",
    "value": "900"
  }
]
2022-05-16 12:22:51 SUCCESS
ExtractImplicitHashToCallbackResponse
Extracted the hash values
state
R6LjX2BCXvFskWkIbFdbq3lkhUNDTTKJ2iUrBlqI6b6sm192HCaHrJOvTrDewCuGjJnZg58bU5SwjLdpE9QUrwA6k7EbHjNgBoGh95O2F4cw27OVNq7ASziydCNXd0ju
session_state
206a3f16-1bc2-45a9-8b3e-0b2b92bf2027
id_token
eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.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.GBRQXyFQBgtEgcIi6vr4aw_DApu6bKCdw0Go-GXVkCsFtGbg2OQTygeEYcdiEvpitr7X_K1Eea8Esrv9NJunVA
access_token
eyJhbGciOiJQUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICIzajJYOUxYdnhCbDE1bEFPbnR3S1d2b1MxM1pGR1Nza1NxNHFXMnJ2X3VzIn0.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.dop5t1lDycpQ05YLBmNRC9K4yk035KumcLUZUGoe7Oqibb996tmRNpOABEI_x8itLnDTrSlvA5ybQvX3bw36zaSvUYOvaVAeBaswYcBlofLUL5x2EmbowNuw4-V1scCysRic0eyhaVXvtY8U4R1f2_HghPYFVPhtmdtLbRR7ZAPHBuhwy55TzCDBRot2_f-HjUTeZVgkbida3bx_aFa7zDesr8qKC0i6R-cHjIJBlmTuEz4VsfIGwViOB7glroKXVeIsrAYgdpUfC2ARCdLHEAeRJ88sTm0x8kmp7_9f5WP1cK3mih5gkru-APBD6s6btXF8Aqo1ZnRduYN_y_gyCQ
token_type
Bearer
expires_in
900
2022-05-16 12:22:51 REDIRECT-IN
oidcc-rp-initiated-logout-bad-id-token-hint
Authorization endpoint response captured
url_query
{}
headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:100.0) Gecko/20100101 Firefox/100.0",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/avif,image/webp,*/*;q\u003d0.8",
  "accept-language": "en-US,en;q\u003d0.5",
  "accept-encoding": "gzip, deflate, br",
  "cookie": "__utma\u003d201319536.747058366.1611919072.1652681365.1652688969.137; __utmz\u003d201319536.1647870296.126.44.utmcsr\u003dgoogle|utmccn\u003d(organic)|utmcmd\u003dorganic|utmctr\u003d(not%20provided); _ga\u003dGA1.2.747058366.1611919072; __utmc\u003d201319536; JSESSIONID\u003d63EE1707428F3F9812307D8819923D9B",
  "upgrade-insecure-requests": "1",
  "sec-fetch-dest": "document",
  "sec-fetch-mode": "navigate",
  "sec-fetch-site": "cross-site",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "x-forwarded-proto": "https",
  "x-forwarded-port": "443",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
http_method
GET
url_fragment
{
  "state": "R6LjX2BCXvFskWkIbFdbq3lkhUNDTTKJ2iUrBlqI6b6sm192HCaHrJOvTrDewCuGjJnZg58bU5SwjLdpE9QUrwA6k7EbHjNgBoGh95O2F4cw27OVNq7ASziydCNXd0ju",
  "session_state": "206a3f16-1bc2-45a9-8b3e-0b2b92bf2027",
  "id_token": "eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.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.GBRQXyFQBgtEgcIi6vr4aw_DApu6bKCdw0Go-GXVkCsFtGbg2OQTygeEYcdiEvpitr7X_K1Eea8Esrv9NJunVA",
  "access_token": "eyJhbGciOiJQUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICIzajJYOUxYdnhCbDE1bEFPbnR3S1d2b1MxM1pGR1Nza1NxNHFXMnJ2X3VzIn0.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.dop5t1lDycpQ05YLBmNRC9K4yk035KumcLUZUGoe7Oqibb996tmRNpOABEI_x8itLnDTrSlvA5ybQvX3bw36zaSvUYOvaVAeBaswYcBlofLUL5x2EmbowNuw4-V1scCysRic0eyhaVXvtY8U4R1f2_HghPYFVPhtmdtLbRR7ZAPHBuhwy55TzCDBRot2_f-HjUTeZVgkbida3bx_aFa7zDesr8qKC0i6R-cHjIJBlmTuEz4VsfIGwViOB7glroKXVeIsrAYgdpUfC2ARCdLHEAeRJ88sTm0x8kmp7_9f5WP1cK3mih5gkru-APBD6s6btXF8Aqo1ZnRduYN_y_gyCQ",
  "token_type": "Bearer",
  "expires_in": "900"
}
post_body
Verify authorization endpoint response
2022-05-16 12:22:51 SUCCESS
RejectAuthCodeInUrlQuery
Authorization code is not present in URL query returned from authorization endpoint
2022-05-16 12:22:51 SUCCESS
RejectErrorInUrlQuery
'error' is not present in URL query returned from authorization endpoint
2022-05-16 12:22:51 SUCCESS
CheckMatchingCallbackParameters
Callback parameters successfully verified
2022-05-16 12:22:51
ValidateIssInAuthorizationResponse
No 'iss' value in authorization response.
2022-05-16 12:22:51 SUCCESS
CheckIfAuthorizationEndpointError
No error from authorization endpoint
2022-05-16 12:22:51 SUCCESS
CheckStateInAuthorizationResponse
State in response correctly returned
state
R6LjX2BCXvFskWkIbFdbq3lkhUNDTTKJ2iUrBlqI6b6sm192HCaHrJOvTrDewCuGjJnZg58bU5SwjLdpE9QUrwA6k7EbHjNgBoGh95O2F4cw27OVNq7ASziydCNXd0ju
2022-05-16 12:22:51 SUCCESS
ExtractAccessTokenFromAuthorizationResponse
Extracted the access token
value
eyJhbGciOiJQUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICIzajJYOUxYdnhCbDE1bEFPbnR3S1d2b1MxM1pGR1Nza1NxNHFXMnJ2X3VzIn0.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.dop5t1lDycpQ05YLBmNRC9K4yk035KumcLUZUGoe7Oqibb996tmRNpOABEI_x8itLnDTrSlvA5ybQvX3bw36zaSvUYOvaVAeBaswYcBlofLUL5x2EmbowNuw4-V1scCysRic0eyhaVXvtY8U4R1f2_HghPYFVPhtmdtLbRR7ZAPHBuhwy55TzCDBRot2_f-HjUTeZVgkbida3bx_aFa7zDesr8qKC0i6R-cHjIJBlmTuEz4VsfIGwViOB7glroKXVeIsrAYgdpUfC2ARCdLHEAeRJ88sTm0x8kmp7_9f5WP1cK3mih5gkru-APBD6s6btXF8Aqo1ZnRduYN_y_gyCQ
type
Bearer
2022-05-16 12:22:51 SUCCESS
ExtractIdTokenFromAuthorizationResponse
Found and parsed the id_token from authorization_endpoint_response
value
eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.eyJleHAiOjE2NTI3MDQ2NzAsImlhdCI6MTY1MjcwMzc3MCwiYXV0aF90aW1lIjoxNjUyNzAzNzMyLCJqdGkiOiIwOWRlMDk0MC0yYWEwLTQxODItOThlZi0zZWRlMGI5MGQxZDgiLCJpc3MiOiJodHRwczovLzg0LTI0NC03Mi05MC5uaXAuaW86NjAwMDAvYXV0aC9yZWFsbXMvdGVzdCIsImF1ZCI6ImNsaWVudDEtcnAtaW5pdGlhdGVkLWxvZ291dCIsInN1YiI6IjNlY2RjZWNkLTQzZGMtNGRjOS1hYTFjLWI5NzkxZmNmNzMwZiIsInR5cCI6IklEIiwiYXpwIjoiY2xpZW50MS1ycC1pbml0aWF0ZWQtbG9nb3V0Iiwibm9uY2UiOiJXaUZob0VSUzVoIiwic2Vzc2lvbl9zdGF0ZSI6IjIwNmEzZjE2LTFiYzItNDVhOS04YjNlLTBiMmI5MmJmMjAyNyIsImF0X2hhc2giOiJNZzZHSUs4d1JlX2RNSkFxUGRjWnFnIiwic19oYXNoIjoidXcxRy1HTmpCLVo3aVl4bDUzeWpXdyIsInNpZCI6IjIwNmEzZjE2LTFiYzItNDVhOS04YjNlLTBiMmI5MmJmMjAyNyJ9.GBRQXyFQBgtEgcIi6vr4aw_DApu6bKCdw0Go-GXVkCsFtGbg2OQTygeEYcdiEvpitr7X_K1Eea8Esrv9NJunVA
header
{
  "kid": "6p6LMG-CvC-c6SvkKKOP8W_Z4fTBS9Q461P9zxi2n6o",
  "typ": "JWT",
  "alg": "ES256"
}
claims
{
  "at_hash": "Mg6GIK8wRe_dMJAqPdcZqg",
  "sub": "3ecdcecd-43dc-4dc9-aa1c-b9791fcf730f",
  "iss": "https://84-244-72-90.nip.io:60000/auth/realms/test",
  "typ": "ID",
  "nonce": "WiFhoERS5h",
  "sid": "206a3f16-1bc2-45a9-8b3e-0b2b92bf2027",
  "aud": "client1-rp-initiated-logout",
  "s_hash": "uw1G-GNjB-Z7iYxl53yjWw",
  "azp": "client1-rp-initiated-logout",
  "auth_time": 1652703732,
  "exp": 1652704670,
  "session_state": "206a3f16-1bc2-45a9-8b3e-0b2b92bf2027",
  "iat": 1652703770,
  "jti": "09de0940-2aa0-4182-98ef-3ede0b90d1d8"
}
2022-05-16 12:22:51 SUCCESS
ValidateIdToken
ID token iss, aud, exp, iat, auth_time, acr & nbf claims passed validation checks
2022-05-16 12:22:51 SUCCESS
ValidateIdTokenNonce
Nonce values match
nonce
WiFhoERS5h
2022-05-16 12:22:51 SUCCESS
ValidateIdTokenACRClaimAgainstRequest
Nothing to check; the conformance suite did not request an acr claim in request object
2022-05-16 12:22:51 SUCCESS
ValidateIdTokenSignature
id_token signature validated
id_token
eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.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.GBRQXyFQBgtEgcIi6vr4aw_DApu6bKCdw0Go-GXVkCsFtGbg2OQTygeEYcdiEvpitr7X_K1Eea8Esrv9NJunVA
2022-05-16 12:22:51 SUCCESS
ValidateIdTokenSignatureUsingKid
id_token signature validated
id_token
eyJhbGciOiJFUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2cDZMTUctQ3ZDLWM2U3ZrS0tPUDhXX1o0ZlRCUzlRNDYxUDl6eGkybjZvIn0.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.GBRQXyFQBgtEgcIi6vr4aw_DApu6bKCdw0Go-GXVkCsFtGbg2OQTygeEYcdiEvpitr7X_K1Eea8Esrv9NJunVA
2022-05-16 12:22:51 SUCCESS
CheckForSubjectInIdToken
Found 'sub' in id_token
sub
3ecdcecd-43dc-4dc9-aa1c-b9791fcf730f
2022-05-16 12:22:51 INFO
FAPIValidateEncryptedIdTokenHasKid
Skipped evaluation due to missing required element: id_token jwe_header
path
jwe_header
mapped
object
id_token
Second authorization: Userinfo endpoint tests
2022-05-16 12:22:51
CallProtectedResource
HTTP request
request_uri
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/userinfo
request_method
GET
request_headers
{
  "accept": "application/json",
  "authorization": "Bearer eyJhbGciOiJQUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICIzajJYOUxYdnhCbDE1bEFPbnR3S1d2b1MxM1pGR1Nza1NxNHFXMnJ2X3VzIn0.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.dop5t1lDycpQ05YLBmNRC9K4yk035KumcLUZUGoe7Oqibb996tmRNpOABEI_x8itLnDTrSlvA5ybQvX3bw36zaSvUYOvaVAeBaswYcBlofLUL5x2EmbowNuw4-V1scCysRic0eyhaVXvtY8U4R1f2_HghPYFVPhtmdtLbRR7ZAPHBuhwy55TzCDBRot2_f-HjUTeZVgkbida3bx_aFa7zDesr8qKC0i6R-cHjIJBlmTuEz4VsfIGwViOB7glroKXVeIsrAYgdpUfC2ARCdLHEAeRJ88sTm0x8kmp7_9f5WP1cK3mih5gkru-APBD6s6btXF8Aqo1ZnRduYN_y_gyCQ",
  "content-length": "0"
}
request_body

                                
2022-05-16 12:22:51 RESPONSE
CallProtectedResource
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "cache-control": "no-cache",
  "x-xss-protection": "1; mode\u003dblock",
  "x-frame-options": "SAMEORIGIN",
  "referrer-policy": "no-referrer",
  "date": "Mon, 16 May 2022 12:22:51 GMT",
  "connection": "keep-alive",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "content-type": "application/json",
  "content-length": "46"
}
response_body
{"sub":"3ecdcecd-43dc-4dc9-aa1c-b9791fcf730f"}
2022-05-16 12:22:51 SUCCESS
CallProtectedResource
Got a response from the resource endpoint
status
200
endpoint_name
resource
headers
{
  "cache-control": "no-cache",
  "x-xss-protection": "1; mode\u003dblock",
  "x-frame-options": "SAMEORIGIN",
  "referrer-policy": "no-referrer",
  "date": "Mon, 16 May 2022 12:22:51 GMT",
  "connection": "keep-alive",
  "strict-transport-security": "max-age\u003d31536000; includeSubDomains",
  "x-content-type-options": "nosniff",
  "content-type": "application/json",
  "content-length": "46"
}
body
{"sub":"3ecdcecd-43dc-4dc9-aa1c-b9791fcf730f"}
2022-05-16 12:22:51 SUCCESS
EnsureHttpStatusCodeIs200
resource endpoint returned the expected http status
expected_status
200
http_status
200
2022-05-16 12:22:51 SUCCESS
GenerateFakeIdTokenClaims
Created ID Token Claims
iss
client1-rp-initiated-logout
sub
SubjectID
aud
https://84-244-72-90.nip.io:60000/auth/realms/test
nonce
flibble
iat
1652703771
exp
1652704071
2022-05-16 12:22:51 SUCCESS
SignFakeIdToken
Signed a 'fake' ID token using the client's keys
id_token
eyJhbGciOiJIUzI1NiJ9.eyJzdWIiOiJTdWJqZWN0SUQiLCJhdWQiOiJodHRwczpcL1wvODQtMjQ0LTcyLTkwLm5pcC5pbzo2MDAwMFwvYXV0aFwvcmVhbG1zXC90ZXN0IiwiaXNzIjoiY2xpZW50MS1ycC1pbml0aWF0ZWQtbG9nb3V0IiwiZXhwIjoxNjUyNzA0MDcxLCJub25jZSI6ImZsaWJibGUiLCJpYXQiOjE2NTI3MDM3NzF9.KupHk63-b6icjLw3F49_mOe4JEADsg-M_6Rw7DQ-t4I
Redirect to end session endpoint & wait for response
2022-05-16 12:22:51
CreateRandomEndSessionState
Created end_session_state value
end_session_state
fHadIDOMhAhVuiVerxcljvkNjCsvLyuAIBXCvengkuBvSjALPw7427079489_&*<|^`,/"~\<$-$~?'.]"&,#|,">~
2022-05-16 12:22:51 SUCCESS
CreateEndSessionEndpointRequest
Created end session endpoint request
id_token_hint
eyJhbGciOiJIUzI1NiJ9.eyJzdWIiOiJTdWJqZWN0SUQiLCJhdWQiOiJodHRwczpcL1wvODQtMjQ0LTcyLTkwLm5pcC5pbzo2MDAwMFwvYXV0aFwvcmVhbG1zXC90ZXN0IiwiaXNzIjoiY2xpZW50MS1ycC1pbml0aWF0ZWQtbG9nb3V0IiwiZXhwIjoxNjUyNzA0MDcxLCJub25jZSI6ImZsaWJibGUiLCJpYXQiOjE2NTI3MDM3NzF9.KupHk63-b6icjLw3F49_mOe4JEADsg-M_6Rw7DQ-t4I
post_logout_redirect_uri
https://www.certification.openid.net/test/a/keycloak/post_logout_redirect
state
fHadIDOMhAhVuiVerxcljvkNjCsvLyuAIBXCvengkuBvSjALPw7427079489_&*<|^`,/"~\<$-$~?'.]"&,#|,">~
2022-05-16 12:22:51 SUCCESS
BuildRedirectToEndSessionEndpoint
Sending to end_session endpoint
redirect_to_end_session_endpoint
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/logout?id_token_hint=eyJhbGciOiJIUzI1NiJ9.eyJzdWIiOiJTdWJqZWN0SUQiLCJhdWQiOiJodHRwczpcL1wvODQtMjQ0LTcyLTkwLm5pcC5pbzo2MDAwMFwvYXV0aFwvcmVhbG1zXC90ZXN0IiwiaXNzIjoiY2xpZW50MS1ycC1pbml0aWF0ZWQtbG9nb3V0IiwiZXhwIjoxNjUyNzA0MDcxLCJub25jZSI6ImZsaWJibGUiLCJpYXQiOjE2NTI3MDM3NzF9.KupHk63-b6icjLw3F49_mOe4JEADsg-M_6Rw7DQ-t4I&post_logout_redirect_uri=https://www.certification.openid.net/test/a/keycloak/post_logout_redirect&state=fHadIDOMhAhVuiVerxcljvkNjCsvLyuAIBXCvengkuBvSjALPw7427079489_%26*%3C%7C%5E%60,/%22~%5C%3C$-$~?'.%5D%22%26,%23%7C,%22%3E~
2022-05-16 12:22:51 REVIEW IMAGE
ExpectInvalidIdTokenHintErrorPage
The server must show an error page saying the request is invalid as the id_token_hint is not valid - upload a screenshot of the error page.
img
updatedAt
1652703797419
2022-05-16 12:22:51 REDIRECT
oidcc-rp-initiated-logout-bad-id-token-hint
Redirecting to end session endpoint
redirect_to
https://84-244-72-90.nip.io:60000/auth/realms/test/protocol/openid-connect/logout?id_token_hint=eyJhbGciOiJIUzI1NiJ9.eyJzdWIiOiJTdWJqZWN0SUQiLCJhdWQiOiJodHRwczpcL1wvODQtMjQ0LTcyLTkwLm5pcC5pbzo2MDAwMFwvYXV0aFwvcmVhbG1zXC90ZXN0IiwiaXNzIjoiY2xpZW50MS1ycC1pbml0aWF0ZWQtbG9nb3V0IiwiZXhwIjoxNjUyNzA0MDcxLCJub25jZSI6ImZsaWJibGUiLCJpYXQiOjE2NTI3MDM3NzF9.KupHk63-b6icjLw3F49_mOe4JEADsg-M_6Rw7DQ-t4I&post_logout_redirect_uri=https://www.certification.openid.net/test/a/keycloak/post_logout_redirect&state=fHadIDOMhAhVuiVerxcljvkNjCsvLyuAIBXCvengkuBvSjALPw7427079489_%26*%3C%7C%5E%60,/%22~%5C%3C$-$~?'.%5D%22%26,%23%7C,%22%3E~
2022-05-16 12:23:22 FINISHED
oidcc-rp-initiated-logout-bad-id-token-hint
Test has run to completion
testmodule_result
REVIEW
Unregister dynamically registered client
2022-05-16 12:23:22
UnregisterDynamicallyRegisteredClient
Couldn't find registration_access_token.
2022-05-16 12:26:49
TEST-RUNNER
Alias has now been claimed by another test
alias
keycloak
new_test_id
NJsuWF2N05OHdD5
Test Results