Test Name | oidcc-ensure-request-without-nonce-fails |
---|---|
Variant | client_auth_type=client_secret_basic, server_metadata=discovery, response_type=id_token, response_mode=default, client_registration=static_client |
Test ID | 70PphBO1KFELE9R https://www.certification.openid.net/log-detail.html?public=true&log=70PphBO1KFELE9R |
Created | 2022-07-20T11:01:40.404076Z |
Description | ANVA FinLife b1528 |
Test Version | 4.1.45 |
Test Owner | 104173993983491404678 https://accounts.google.com |
Plan ID | 9ZJLJK0pBb3Qe https://www.certification.openid.net/plan-detail.html?public=true&plan=9ZJLJK0pBb3Qe |
Exported From | https://www.certification.openid.net |
Exported By | 104173993983491404678 https://accounts.google.com |
Suite Version | 4.1.45 |
Exported | 2022-07-21 11:10:56 (UTC) |
Status: FINISHED Result: REVIEW |
SUCCESS 17 FAILURE 0 WARNING 0 REVIEW 1 INFO 4 |
2022-07-20 11:01:40 |
INFO
|
TEST-RUNNER
Test instance 70PphBO1KFELE9R created
|
||||||||||||||
|
2022-07-20 11:01:40 |
SUCCESS
|
CreateRedirectUri
Created redirect URI
|
||
|
2022-07-20 11:01:40 |
|
GetDynamicServerConfiguration
HTTP request
|
||||||||
|
2022-07-20 11:01:40 |
RESPONSE
|
GetDynamicServerConfiguration
HTTP response
|
||||||||
|
2022-07-20 11:01:40 |
SUCCESS
|
GetDynamicServerConfiguration
Successfully parsed server configuration
|
||||||||||||||||||||||||||||||
|
2022-07-20 11:01:40 |
SUCCESS
|
CheckServerConfiguration
Found required server configuration keys
|
||
|
2022-07-20 11:01:40 |
SUCCESS
|
ExtractTLSTestValuesFromServerConfiguration
Extracted TLS information from authorization server configuration
|
||||||||
|
2022-07-20 11:01:40 |
|
FetchServerKeys
Fetching server key
|
||
|
2022-07-20 11:01:40 |
|
FetchServerKeys
HTTP request
|
||||||||
|
2022-07-20 11:01:41 |
RESPONSE
|
FetchServerKeys
HTTP response
|
||||||||
|
2022-07-20 11:01:41 |
|
FetchServerKeys
Found JWK set string
|
||
|
2022-07-20 11:01:41 |
SUCCESS
|
FetchServerKeys
Found server JWK set
|
||
|
2022-07-20 11:01:41 |
SUCCESS
|
CheckServerKeysIsValid
Server JWKs is valid
|
||
|
2022-07-20 11:01:41 | SUCCESS |
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
|
|
2022-07-20 11:01:41 | SUCCESS |
CheckForKeyIdInServerJWKs
All keys contain kids
|
|
2022-07-20 11:01:41 | SUCCESS |
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
|
||
|
2022-07-20 11:01:41 | SUCCESS |
EnsureServerJwksDoesNotContainPrivateOrSymmetricKeys
Jwks does not contain any private or symmetric keys
|
|
2022-07-20 11:01:41 |
SUCCESS
|
GetStaticClientConfiguration
Found a static client object
|
||||
|
2022-07-20 11:01:41 | INFO |
ValidateClientJWKsPrivatePart
Skipped evaluation due to missing required element: client jwks
|
||||||
|
2022-07-20 11:01:41 |
INFO
|
ExtractJWKsFromStaticClientConfiguration
Skipped evaluation due to missing required element: client jwks
|
||||||
|
2022-07-20 11:01:41 | INFO |
CheckDistinctKeyIdValueInClientJWKs
Skipped evaluation due to missing required element: client jwks
|
||||||
|
2022-07-20 11:01:41 |
|
SetScopeInClientConfigurationToOpenId
Set scope in client configuration to "openid"
|
||
|
2022-07-20 11:01:41 |
SUCCESS
|
EnsureServerConfigurationSupportsClientSecretBasic
Contents of 'token_endpoint_auth_methods_supported' in discovery document matches expectations.
|
||||||
|
2022-07-20 11:01:41 |
SUCCESS
|
SetProtectedResourceUrlToUserInfoEndpoint
userinfo_endpoint will be used to test access token. The user info is not a mandatory to implement feature in the OpenID Connect specification, but is mandatory for certification.
|
||
|
2022-07-20 11:01:41 |
|
oidcc-ensure-request-without-nonce-fails
Setup Done
|
|
Make request to authorization endpoint |
2022-07-20 11:01:41 |
SUCCESS
|
CreateAuthorizationEndpointRequestFromClientInformation
Created authorization endpoint request
|
||||||
|
2022-07-20 11:01:41 |
|
CreateRandomStateValue
Created state value
|
||||
|
2022-07-20 11:01:41 |
SUCCESS
|
AddStateToAuthorizationEndpointRequest
Added state parameter to request
|
||||||||
|
2022-07-20 11:01:41 |
|
CreateRandomNonceValue
Created nonce value
|
||||
|
2022-07-20 11:01:41 |
|
AddNonceToAuthorizationEndpointRequest
NOT adding nonce to request object
|
|
2022-07-20 11:01:41 |
SUCCESS
|
SetAuthorizationEndpointRequestResponseTypeFromEnvironment
Added response_type parameter to request
|
||||||||||
|
2022-07-20 11:01:41 |
SUCCESS
|
BuildPlainRedirectToAuthorizationEndpoint
Sending to authorization endpoint
|
||||
|
2022-07-20 11:01:41 |
REDIRECT
|
oidcc-ensure-request-without-nonce-fails
Redirecting to authorization endpoint
|
||
|
2022-07-20 11:01:41 | REVIEW IMAGE |
ExpectRequestMissingNonceErrorPage
If the server does not return an invalid_request error back to the client, it must show an error page saying the request is invalid as it is missing the 'nonce' claim - upload a screenshot of the error page.
|
||||
|
2022-07-20 11:02:44 |
FINISHED
|
oidcc-ensure-request-without-nonce-fails
Test has run to completion
|
||
|
Unregister dynamically registered client |
2022-07-20 11:02:44 |
|
UnregisterDynamicallyRegisteredClient
Couldn't find registration_access_token.
|
|
2022-07-20 11:02:53 |
|
TEST-RUNNER
Alias has now been claimed by another test
|
||||
|