Test Name | oidcc-ensure-other-scope-order-succeeds |
---|---|
Variant | client_auth_type=client_secret_basic, server_metadata=static, response_type=code id_token, response_mode=default, client_registration=static_client |
Test ID | uNBRpigKycJHXJG https://www.certification.openid.net/log-detail.html?public=true&log=uNBRpigKycJHXJG |
Created | 2022-05-02T20:50:11.096260Z |
Description | Application integrating boruta package |
Test Version | 4.1.42 |
Test Owner | 1211566 https://gitlab.com |
Plan ID | 7Ta9iyup747KZ https://www.certification.openid.net/plan-detail.html?public=true&plan=7Ta9iyup747KZ |
Exported From | https://www.certification.openid.net |
Exported By | 1211566 https://gitlab.com |
Suite Version | 4.1.42 |
Exported | 2022-05-07 12:11:24 (UTC) |
Status: FINISHED Result: WARNING |
SUCCESS 61 FAILURE 0 WARNING 2 REVIEW 0 INFO 6 |
2022-05-02 20:50:11 |
INFO
|
TEST-RUNNER
Test instance uNBRpigKycJHXJG created
|
||||||||||||||
|
2022-05-02 20:50:11 |
SUCCESS
|
CreateRedirectUri
Created redirect URI
|
||
|
2022-05-02 20:50:11 |
SUCCESS
|
GetStaticServerConfiguration
Found a static server object
|
||||||||||
|
2022-05-02 20:50:11 |
SUCCESS
|
CheckServerConfiguration
Found required server configuration keys
|
||
|
2022-05-02 20:50:11 |
SUCCESS
|
ExtractTLSTestValuesFromServerConfiguration
Extracted TLS information from authorization server configuration
|
||||||||
|
2022-05-02 20:50:11 |
|
FetchServerKeys
Fetching server key
|
||
|
2022-05-02 20:50:11 |
|
FetchServerKeys
HTTP request
|
||||||||
|
2022-05-02 20:50:11 |
RESPONSE
|
FetchServerKeys
HTTP response
|
||||||||
|
2022-05-02 20:50:11 |
|
FetchServerKeys
Found JWK set string
|
||
|
2022-05-02 20:50:11 |
SUCCESS
|
FetchServerKeys
Found server JWK set
|
||
|
2022-05-02 20:50:11 |
SUCCESS
|
CheckServerKeysIsValid
Server JWKs is valid
|
||
|
2022-05-02 20:50:12 | SUCCESS |
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
|
|
2022-05-02 20:50:12 | SUCCESS |
CheckForKeyIdInServerJWKs
All keys contain kids
|
|
2022-05-02 20:50:12 | SUCCESS |
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
|
||
|
2022-05-02 20:50:12 | SUCCESS |
EnsureServerJwksDoesNotContainPrivateOrSymmetricKeys
Jwks does not contain any private or symmetric keys
|
|
2022-05-02 20:50:12 |
SUCCESS
|
GetStaticClientConfiguration
Found a static client object
|
||||
|
2022-05-02 20:50:12 | INFO |
ValidateClientJWKsPrivatePart
Skipped evaluation due to missing required element: client jwks
|
||||||
|
2022-05-02 20:50:12 |
INFO
|
ExtractJWKsFromStaticClientConfiguration
Skipped evaluation due to missing required element: client jwks
|
||||||
|
2022-05-02 20:50:12 | INFO |
CheckDistinctKeyIdValueInClientJWKs
Skipped evaluation due to missing required element: client jwks
|
||||||
|
2022-05-02 20:50:12 |
|
SetScopeInClientConfigurationToOpenId
Set scope in client configuration to "openid"
|
||
|
2022-05-02 20:50:12 |
|
SetScopeInClientConfigurationToOpenIdEmail
Set scope in client configuration to "openid email"
|
||
|
2022-05-02 20:50:12 |
SUCCESS
|
SetProtectedResourceUrlToUserInfoEndpoint
userinfo_endpoint will be used to test access token. The user info is not a mandatory to implement feature in the OpenID Connect specification, but is mandatory for certification.
|
||
|
2022-05-02 20:50:12 |
|
oidcc-ensure-other-scope-order-succeeds
Setup Done
|
|
Make request to authorization endpoint |
2022-05-02 20:50:12 |
SUCCESS
|
CreateAuthorizationEndpointRequestFromClientInformation
Created authorization endpoint request
|
||||||
|
2022-05-02 20:50:12 |
|
CreateRandomStateValue
Created state value
|
||||
|
2022-05-02 20:50:12 |
SUCCESS
|
AddStateToAuthorizationEndpointRequest
Added state parameter to request
|
||||||||
|
2022-05-02 20:50:12 |
|
CreateRandomNonceValue
Created nonce value
|
||||
|
2022-05-02 20:50:12 |
SUCCESS
|
AddNonceToAuthorizationEndpointRequest
Added nonce parameter to request
|
||||||||||
|
2022-05-02 20:50:12 |
SUCCESS
|
SetAuthorizationEndpointRequestResponseTypeFromEnvironment
Added response_type parameter to request
|
||||||||||||
|
2022-05-02 20:50:12 |
|
ReverseScopeOrderInAuthorizationEndpointRequest
Reversed order of scopes in authorization_endpoint_request
|
||||
|
2022-05-02 20:50:12 |
SUCCESS
|
BuildPlainRedirectToAuthorizationEndpoint
Sending to authorization endpoint
|
||||
|
2022-05-02 20:50:12 |
REDIRECT
|
oidcc-ensure-other-scope-order-succeeds
Redirecting to authorization endpoint
|
||
|
2022-05-02 20:50:14 |
INCOMING
|
oidcc-ensure-other-scope-order-succeeds
Incoming HTTP request to /test/a/boruta_example/callback
|
||||||||||||||||||||
|
2022-05-02 20:50:14 |
SUCCESS
|
CreateRandomImplicitSubmitUrl
Created random implicit submission URL
|
||
|
2022-05-02 20:50:14 |
OUTGOING
|
oidcc-ensure-other-scope-order-succeeds
Response to HTTP request to test instance uNBRpigKycJHXJG
|
||||
|
2022-05-02 20:50:15 |
INCOMING
|
oidcc-ensure-other-scope-order-succeeds
Incoming HTTP request to /test/a/boruta_example/implicit/F0l6VRvdC0hPyyKZCgrE
|
||||||||||||||||||||
|
2022-05-02 20:50:15 |
OUTGOING
|
oidcc-ensure-other-scope-order-succeeds
Response to HTTP request to test instance uNBRpigKycJHXJG
|
||||||||
|
2022-05-02 20:50:15 |
|
ExtractImplicitHashToCallbackResponse
Extracted response from URL fragment
|
||
|
2022-05-02 20:50:15 |
SUCCESS
|
ExtractImplicitHashToCallbackResponse
Extracted the hash values
|
||||||||||
|
2022-05-02 20:50:15 |
REDIRECT-IN
|
oidcc-ensure-other-scope-order-succeeds
Authorization endpoint response captured
|
||||||||||
|
Verify authorization endpoint response |
2022-05-02 20:50:15 | SUCCESS |
RejectAuthCodeInUrlQuery
Authorization code is not present in URL query returned from authorization endpoint
|
|
2022-05-02 20:50:15 | SUCCESS |
RejectErrorInUrlQuery
'error' is not present in URL query returned from authorization endpoint
|
|
2022-05-02 20:50:15 |
SUCCESS
|
CheckMatchingCallbackParameters
Callback parameters successfully verified
|
|
2022-05-02 20:50:15 |
|
ValidateIssInAuthorizationResponse
No 'iss' value in authorization response.
|
|
2022-05-02 20:50:15 |
SUCCESS
|
CheckIfAuthorizationEndpointError
No error from authorization endpoint
|
|
2022-05-02 20:50:15 |
SUCCESS
|
CheckStateInAuthorizationResponse
State in response correctly returned
|
||
|
2022-05-02 20:50:15 |
SUCCESS
|
ExtractAuthorizationCodeFromAuthorizationResponse
Found authorization code
|
||
|
2022-05-02 20:50:15 |
SUCCESS
|
ExtractIdTokenFromAuthorizationResponse
Found and parsed the id_token from authorization_endpoint_response
|
||||||
|
2022-05-02 20:50:15 |
SUCCESS
|
ValidateIdToken
ID token iss, aud, exp, iat, auth_time, acr & nbf claims passed validation checks
|
|
2022-05-02 20:50:15 | SUCCESS |
ValidateIdTokenNonce
Nonce values match
|
||
|
2022-05-02 20:50:15 | SUCCESS |
ValidateIdTokenACRClaimAgainstRequest
Nothing to check; the conformance suite did not request an acr claim in request object
|
|
2022-05-02 20:50:15 |
SUCCESS
|
ValidateIdTokenSignature
id_token signature validated
|
||
|
2022-05-02 20:50:15 |
SUCCESS
|
ValidateIdTokenSignatureUsingKid
id_token signature validated
|
||
|
2022-05-02 20:50:15 | INFO |
FAPIValidateEncryptedIdTokenHasKid
Skipped evaluation due to missing required element: id_token jwe_header
|
||||||
|
2022-05-02 20:50:15 | SUCCESS |
EnsureIdTokenDoesNotContainName
name claim not found in id_token, which is expected as it was not requested to be returned there
|
|
2022-05-02 20:50:15 | WARNING |
EnsureIdTokenDoesNotContainEmailForScopeEmail
Unexpectedly found email in id_token. The conformance suite did not request the 'email' claim is returned in the id_token and hence did not expect the server to include it; as per the spec link for this response_type scope=email is a short hand for 'please give me access to the user's email address in the userinfo response'. Technically returning unrequested claims does not violate the specifications but it could be a bug in the server and may result in user data being exposed in unintended ways if the relying party did not expect the email to be in the id_token, and then uses the id_token to provide proof of the authentication event to other parties.
|
||
|
2022-05-02 20:50:15 |
SUCCESS
|
CreateTokenEndpointRequestForAuthorizationCodeGrant
Created token endpoint request
|
||||||
|
2022-05-02 20:50:15 |
SUCCESS
|
AddBasicAuthClientSecretAuthenticationParameters
Added basic authorization header
|
||
|
2022-05-02 20:50:15 |
|
CallTokenEndpoint
HTTP request
|
||||||||
|
2022-05-02 20:50:15 |
RESPONSE
|
CallTokenEndpoint
HTTP response
|
||||||||
|
2022-05-02 20:50:15 |
SUCCESS
|
CallTokenEndpoint
Parsed token endpoint response
|
||||||||||
|
2022-05-02 20:50:15 |
SUCCESS
|
CheckIfTokenEndpointResponseError
No error from token endpoint
|
|
2022-05-02 20:50:15 |
SUCCESS
|
CheckForAccessTokenValue
Found an access token
|
||
|
2022-05-02 20:50:15 |
SUCCESS
|
ExtractAccessTokenFromTokenResponse
Extracted the access token
|
||||
|
2022-05-02 20:50:15 | SUCCESS |
ExtractExpiresInFromTokenEndpointResponse
Extracted 'expires_in'
|
||
|
2022-05-02 20:50:15 | SUCCESS |
ValidateExpiresIn
expires_in passed all validation checks
|
||
|
2022-05-02 20:50:15 |
SUCCESS
|
CheckForRefreshTokenValue
Found a refresh token
|
||
|
2022-05-02 20:50:15 | SUCCESS |
ExtractIdTokenFromTokenResponse
Found and parsed the id_token from token_endpoint_response
|
||||||
|
2022-05-02 20:50:15 |
SUCCESS
|
ValidateIdToken
ID token iss, aud, exp, iat, auth_time, acr & nbf claims passed validation checks
|
|
2022-05-02 20:50:15 | SUCCESS |
ValidateIdTokenNonce
Nonce values match
|
||
|
2022-05-02 20:50:15 | SUCCESS |
ValidateIdTokenACRClaimAgainstRequest
Nothing to check; the conformance suite did not request an acr claim in request object
|
|
2022-05-02 20:50:15 |
SUCCESS
|
ValidateIdTokenSignature
id_token signature validated
|
||
|
2022-05-02 20:50:15 |
SUCCESS
|
ValidateIdTokenSignatureUsingKid
id_token signature validated
|
||
|
2022-05-02 20:50:15 | INFO |
FAPIValidateEncryptedIdTokenHasKid
Skipped evaluation due to missing required element: id_token jwe_header
|
||||||
|
2022-05-02 20:50:15 | SUCCESS |
EnsureIdTokenDoesNotContainName
name claim not found in id_token, which is expected as it was not requested to be returned there
|
|
2022-05-02 20:50:15 | WARNING |
EnsureIdTokenDoesNotContainEmailForScopeEmail
Unexpectedly found email in id_token. The conformance suite did not request the 'email' claim is returned in the id_token and hence did not expect the server to include it; as per the spec link for this response_type scope=email is a short hand for 'please give me access to the user's email address in the userinfo response'. Technically returning unrequested claims does not violate the specifications but it could be a bug in the server and may result in user data being exposed in unintended ways if the relying party did not expect the email to be in the id_token, and then uses the id_token to provide proof of the authentication event to other parties.
|
||
|
2022-05-02 20:50:15 | SUCCESS |
VerifyIdTokenSubConsistentHybridFlow
authorization endpoint and token endpoint id_token have same sub
|
||||
|
Userinfo endpoint tests |
2022-05-02 20:50:15 |
|
CallProtectedResource
HTTP request
|
||||||||
|
2022-05-02 20:50:16 |
RESPONSE
|
CallProtectedResource
HTTP response
|
||||||||
|
2022-05-02 20:50:16 |
SUCCESS
|
CallProtectedResource
Got a response from the resource endpoint
|
||||||||
|
2022-05-02 20:50:16 |
SUCCESS
|
EnsureHttpStatusCodeIs200
resource endpoint returned the expected http status
|
||||
|
2022-05-02 20:50:16 |
|
CallUserInfoEndpointWithBearerToken
HTTP request
|
||||||||
|
2022-05-02 20:50:16 |
RESPONSE
|
CallUserInfoEndpointWithBearerToken
HTTP response
|
||||||||
|
2022-05-02 20:50:16 | SUCCESS |
CallUserInfoEndpointWithBearerToken
Got a response from the userinfo endpoint
|
||||||
|
2022-05-02 20:50:16 |
SUCCESS
|
ExtractUserInfoFromUserInfoEndpointResponse
Extracted user info
|
||
|
2022-05-02 20:50:16 |
|
ValidateUserInfoStandardClaims
sub is a string
|
|
2022-05-02 20:50:16 |
|
ValidateUserInfoStandardClaims
email is a string
|
|
2022-05-02 20:50:16 |
|
ValidateUserInfoStandardClaims
email_verified is a boolean
|
|
2022-05-02 20:50:16 | SUCCESS |
ValidateUserInfoStandardClaims
Userinfo is valid
|
|
2022-05-02 20:50:16 | SUCCESS |
EnsureUserInfoContainsSub
Found sub in userinfo
|
||
|
2022-05-02 20:50:16 |
|
EnsureUserInfoBirthDateValid
userinfo response does not contain 'birthdate'
|
|
2022-05-02 20:50:16 |
|
EnsureUserInfoUpdatedAtValid
userinfo response does not contain 'updated_at'
|
|
2022-05-02 20:50:16 |
|
EnsureMemberValuesInClaimNameReferenceToMemberNamesInClaimSources
userinfo response does not contain '_claim_names' nor _claim_sources'
|
|
2022-05-02 20:50:16 | SUCCESS |
VerifyUserInfoAndIdTokenInAuthorizationEndpointSameSub
userinfo response and id_token sub are the same
|
||||
|
2022-05-02 20:50:16 | SUCCESS |
VerifyUserInfoAndIdTokenInTokenEndpointSameSub
userinfo response and id_token sub are the same
|
||||
|
2022-05-02 20:50:16 | SUCCESS |
VerifyScopesReturnedInUserInfoClaims
'claims' in userinfo contains all scope items of scope in authorization request (corresponds to scope standard claims)
|
||||
|
2022-05-02 20:50:16 | SUCCESS |
EnsureUserInfoDoesNotContainName
name claim not found in userinfo response, which is expected as it was not requested to be returned there
|
|
2022-05-02 20:50:16 |
FINISHED
|
oidcc-ensure-other-scope-order-succeeds
Test has run to completion
|
||
|
Unregister dynamically registered client |
2022-05-02 20:50:16 |
|
UnregisterDynamicallyRegisteredClient
Couldn't find registration_access_token.
|
|
2022-05-02 20:50:20 |
|
TEST-RUNNER
Alias has now been claimed by another test
|
||||
|