Test Name | fapi-ciba-id1-ensure-authorization-request-with-multiple-hints-fails |
---|---|
Variant | client_auth_type=private_key_jwt, ciba_mode=poll, fapi_profile=plain_fapi, client_registration=static_client |
Test ID | JgefMoJg2J4VdRX https://www.certification.openid.net/log-detail.html?public=true&log=JgefMoJg2J4VdRX |
Created | 2022-05-11T06:24:30.433078Z |
Description | |
Test Version | 4.1.42 |
Test Owner | 11547427 https://gitlab.com |
Plan ID | 5TITriHnFuJuH https://www.certification.openid.net/plan-detail.html?public=true&plan=5TITriHnFuJuH |
Exported From | https://www.certification.openid.net |
Exported By | 11547427 https://gitlab.com |
Suite Version | 4.1.42 |
Exported | 2022-05-13 04:25:23 (UTC) |
Status: FINISHED Result: PASSED |
SUCCESS 46 FAILURE 0 WARNING 0 REVIEW 0 INFO 1 |
2022-05-11 06:24:30 |
INFO
|
TEST-RUNNER
Test instance JgefMoJg2J4VdRX created
|
||||||||||||||
|
2022-05-11 06:24:30 |
SUCCESS
|
CreateCIBANotificationEndpointUri
Created ciba notification endpoint URI
|
||
|
2022-05-11 06:24:30 |
|
GetDynamicServerConfiguration
HTTP request
|
||||||||
|
2022-05-11 06:24:30 |
RESPONSE
|
GetDynamicServerConfiguration
HTTP response
|
||||||||
|
2022-05-11 06:24:30 |
SUCCESS
|
GetDynamicServerConfiguration
Successfully parsed server configuration
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
2022-05-11 06:24:30 | SUCCESS |
AddMTLSEndpointAliasesToEnvironment
Added mtls_endpoint_aliases to environment
|
|
2022-05-11 06:24:30 |
SUCCESS
|
CheckCIBAServerConfiguration
Found required server configuration keys
|
||
|
2022-05-11 06:24:30 |
|
FetchServerKeys
Fetching server key
|
||
|
2022-05-11 06:24:30 |
|
FetchServerKeys
HTTP request
|
||||||||
|
2022-05-11 06:24:31 |
RESPONSE
|
FetchServerKeys
HTTP response
|
||||||||
|
2022-05-11 06:24:31 |
|
FetchServerKeys
Found JWK set string
|
||
|
2022-05-11 06:24:31 |
SUCCESS
|
FetchServerKeys
Found server JWK set
|
||
|
2022-05-11 06:24:31 |
SUCCESS
|
CheckServerKeysIsValid
Server JWKs is valid
|
||
|
2022-05-11 06:24:31 | SUCCESS |
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
|
|
2022-05-11 06:24:31 | SUCCESS |
CheckForKeyIdInServerJWKs
All keys contain kids
|
|
2022-05-11 06:24:31 | SUCCESS |
EnsureServerJwksDoesNotContainPrivateOrSymmetricKeys
Jwks does not contain any private or symmetric keys
|
|
2022-05-11 06:24:31 | SUCCESS |
FAPIEnsureMinimumServerKeyLength
Validated minimum key lengths for server_jwks
|
||
|
Verify First client: static client configuration |
2022-05-11 06:24:31 |
SUCCESS
|
GetStaticClientConfiguration
Found a static client object
|
||||||||||
|
2022-05-11 06:24:31 | SUCCESS |
ValidateClientJWKsPrivatePart
Valid client JWKs: keys are valid JSON, contain the required fields, the private/public exponents match and are correctly encoded using unpadded base64url
|
|
2022-05-11 06:24:31 |
SUCCESS
|
ExtractJWKsFromStaticClientConfiguration
Extracted client JWK
|
||||
|
2022-05-11 06:24:31 |
SUCCESS
|
ValidateMTLSCertificatesHeader
MTLS certificates header is valid
|
|
2022-05-11 06:24:31 |
SUCCESS
|
ExtractMTLSCertificatesFromConfiguration
Mutual TLS authentication credentials loaded
|
||||||
|
2022-05-11 06:24:31 | SUCCESS |
CheckForKeyIdInClientJWKs
All keys contain kids
|
|
2022-05-11 06:24:31 | SUCCESS |
CheckDistinctKeyIdValueInClientJWKs
Distinct 'kid' value in all keys of client_jwks
|
||
|
2022-05-11 06:24:31 | SUCCESS |
FAPICheckKeyAlgInClientJWKs
Keys in client JWKS all have permitted 'alg'
|
||
|
2022-05-11 06:24:31 | SUCCESS |
FAPIEnsureMinimumClientKeyLength
Validated minimum key lengths for client_jwks
|
||
|
2022-05-11 06:24:31 |
SUCCESS
|
ValidateMTLSCertificatesAsX509
Mutual TLS authentication cert validated as X.509
|
|
2022-05-11 06:24:31 |
SUCCESS
|
GetResourceEndpointConfiguration
Found a resource endpoint object
|
||
|
2022-05-11 06:24:31 |
SUCCESS
|
SetProtectedResourceUrlToSingleResourceEndpoint
Set protected resource URL
|
||
|
2022-05-11 06:24:31 |
SUCCESS
|
ExtractTLSTestValuesFromResourceConfiguration
Extracted TLS information from resource endpoint
|
||
|
2022-05-11 06:24:31 |
SUCCESS
|
ExtractTLSTestValuesFromOBResourceConfiguration
Extracted TLS information from resource endpoint
|
||||
|
2022-05-11 06:24:31 |
|
fapi-ciba-id1-ensure-authorization-request-with-multiple-hints-fails
Setup Done
|
|
Call backchannel authentication endpoint |
2022-05-11 06:24:31 |
SUCCESS
|
CreateEmptyAuthorizationEndpointRequest
Created empty authorization endpoint request
|
|
2022-05-11 06:24:31 | SUCCESS |
AddScopeToAuthorizationEndpointRequest
Added scope of 'openid email' to authorization endpoint request
|
||
|
2022-05-11 06:24:31 | SUCCESS |
AddMultipleHintsToAuthorizationEndpointRequest
Added two hints value to authorization endpoint request
|
||||
|
2022-05-11 06:24:31 |
SUCCESS
|
ConvertAuthorizationEndpointRequestToRequestObject
Created request object claims
|
||
|
2022-05-11 06:24:31 | SUCCESS |
AddIatToRequestObject
Added iat to request object claims
|
||
|
2022-05-11 06:24:31 | SUCCESS |
AddExpToRequestObject
Added exp to request object claims
|
||
|
2022-05-11 06:24:31 | SUCCESS |
AddNbfToRequestObject
Added nbf to request object claims
|
||
|
2022-05-11 06:24:31 | SUCCESS |
AddJtiToRequestObject
Added jti to request object claims
|
||
|
2022-05-11 06:24:31 | SUCCESS |
AddAudToRequestObject
Added aud to request object claims
|
||
|
2022-05-11 06:24:31 | SUCCESS |
AddIssToRequestObject
Added iss to request object claims
|
||
|
2022-05-11 06:24:31 | SUCCESS |
SignRequestObject
Signed the request object
|
||||||||
|
2022-05-11 06:24:31 | SUCCESS |
CreateBackchannelAuthenticationEndpointRequest
Created backchannel authentication endpoint request
|
|
2022-05-11 06:24:31 |
|
AddRequestToBackchannelAuthenticationEndpointRequest
|
||
|
2022-05-11 06:24:31 |
SUCCESS
|
CreateClientAuthenticationAssertionClaims
Created client assertion claims
|
||||||||||||
|
2022-05-11 06:24:31 |
SUCCESS
|
SetClientAuthenticationAudToBackchannelAuthenticationEndpoint
Add backchannel_authentication_endpoint as aud value to client_assertion_claims
|
||||||||||||
|
2022-05-11 06:24:31 |
SUCCESS
|
SignClientAuthenticationAssertion
Signed the client assertion
|
||
|
2022-05-11 06:24:31 |
|
AddClientAssertionToBackchannelAuthenticationEndpoint
Added client assertion
|
||||||
|
2022-05-11 06:24:31 |
|
CallBackchannelAuthenticationEndpoint
HTTP request
|
||||||||||
|
2022-05-11 06:24:31 |
RESPONSE
|
CallBackchannelAuthenticationEndpoint
HTTP response
|
||||||||
|
2022-05-11 06:24:31 |
|
CallBackchannelAuthenticationEndpoint
Backchannel Authentication endpoint response
|
||
|
2022-05-11 06:24:31 |
SUCCESS
|
CallBackchannelAuthenticationEndpoint
Parsed backchannel authentication endpoint response
|
||||
|
2022-05-11 06:24:31 | SUCCESS |
ValidateErrorResponseFromBackchannelAuthenticationEndpoint
error response includes only expected parameters
|
||||
|
2022-05-11 06:24:31 | SUCCESS |
ValidateErrorUriFromBackchannelAuthenticationEndpoint
backchannel_authentication_endpoint_response did not include optional 'error_uri' field
|
|
2022-05-11 06:24:31 | SUCCESS |
CheckErrorDescriptionFromBackchannelAuthenticationEndpointContainsCRLFTAB
backchannel_authentication_endpoint_response 'error_description' field does not include CR/LF/TAB
|
||
|
2022-05-11 06:24:31 | SUCCESS |
ValidateErrorDescriptionFromBackchannelAuthenticationEndpoint
backchannel_authentication_endpoint_response error returned valid 'error_description' field
|
||
|
2022-05-11 06:24:31 | SUCCESS |
CheckBackchannelAuthenticationEndpointHttpStatus400
Backchannel authentication endpoint http status code was 400
|
|
2022-05-11 06:24:31 | SUCCESS |
CheckErrorFromBackchannelAuthenticationEndpointErrorInvalidRequest
Token Endpoint response error returned expected 'error' of 'invalid_request'
|
||
|
2022-05-11 06:24:31 |
FINISHED
|
fapi-ciba-id1-ensure-authorization-request-with-multiple-hints-fails
Test has run to completion
|
||
|
Unregister dynamically registered client |
2022-05-11 06:24:31 |
|
UnregisterDynamicallyRegisteredClient
Couldn't find registration_access_token.
|
|
2022-05-11 06:24:37 |
|
TEST-RUNNER
Alias has now been claimed by another test
|
||||
|