Test Summary

Test Results

Expand All Collapse All
All times are UTC
2022-07-20 11:03:01 INFO
TEST-RUNNER
Test instance nOHGhdqx6X60cWX created
baseUrl
https://www.certification.openid.net/test/a/anvaopenid
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "id_token",
  "server_metadata": "discovery",
  "response_mode": "default",
  "client_registration": "static_client"
}
alias
anvaopenid
description
ANVA FinLife b1528
planId
9ZJLJK0pBb3Qe
config
{
  "issuer": "https://api.anva.io/identity",
  "authorization_endpoint": "https://api.anva.io/identity/authorize",
  "token_endpoint": "https://api.anva.io/identity/token",
  "userinfo_endpoint": "https://api.anva.io/identity/userinfo",
  "jwks_uri": "https://api.anva.io/identity/.well-known/jwks",
  "scopes_supported": [
    "openid",
    "Profile",
    "Email",
    "Basic",
    "Customer"
  ],
  "response_types_supported": [
    "code",
    "token",
    "id_token",
    "id_token token"
  ],
  "response_modes_supported": [
    "query",
    "fragment"
  ],
  "grant_types_supported": [
    "authorization_code",
    "client_credentials",
    "refresh_token"
  ],
  "subject_types_supported": [
    "public"
  ],
  "id_token_signing_alg_values_supported": [
    "RS256"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256"
  ],
  "claim_types_supported": [
    "normal"
  ],
  "claims_supported": [
    "iss",
    "sub",
    "aud",
    "jti",
    "iat",
    "exp",
    "nonce",
    "at_hash"
  ],
  "alias": "anvaopenid",
  "server": {
    "discoveryUrl": "https://api.anva.io/identity/.well-known/openid-configuration",
    "login_hint": "openidtest"
  },
  "client": {
    "client_id": "54abcbda-7341-4ecc-b390-2057f6ec7243",
    "client_secret": "oAFuYqOnJVbRqgduaoYBlhhmzOljks"
  },
  "client_secret_post": {
    "client_id": "54abcbda-7341-4ecc-b390-2057f6ec7243",
    "client_secret": "oAFuYqOnJVbRqgduaoYBlhhmzOljks"
  },
  "client2": {
    "client_id": "a78f1cbd-0350-4d86-8ffa-44149bf00a15",
    "client_secret": "RRXeEMIECyurwAqrGGbDeSYbLogTWQ"
  },
  "consent": {},
  "description": "ANVA FinLife b1528"
}
testName
oidcc-scope-email
2022-07-20 11:03:01 SUCCESS
CreateRedirectUri
Created redirect URI
redirect_uri
https://www.certification.openid.net/test/a/anvaopenid/callback
2022-07-20 11:03:01
GetDynamicServerConfiguration
HTTP request
request_uri
https://api.anva.io/identity/.well-known/openid-configuration
request_method
GET
request_headers
{
  "accept": "text/plain, application/json, application/*+json, */*",
  "content-length": "0"
}
request_body

                                
2022-07-20 11:03:01 RESPONSE
GetDynamicServerConfiguration
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "date": "Wed, 20 Jul 2022 11:03:01 GMT",
  "content-type": "application/json;charset\u003dUTF-8",
  "content-length": "1008",
  "connection": "keep-alive",
  "access-control-allow-credentials": "true",
  "access-control-allow-origin": "*",
  "access-control-expose-headers": "Location",
  "set-cookie": "JSESSIONID\u003dkpeC6Q6hgnvmYABJKBAp; path\u003d/identity",
  "strict-transport-security": "max-age\u003d63072000; preload",
  "x-audit-id": "8b38c234-e5e9-4ae2-a2bb-45f583428be7",
  "x-correlation-id": "4807fe28-2d8c-47a5-a774-f40403c90d62"
}
response_body
{
  "issuer" : "https://api.anva.io/identity",
  "authorization_endpoint" : "https://api.anva.io/identity/authorize",
  "token_endpoint" : "https://api.anva.io/identity/token",
  "userinfo_endpoint" : "https://api.anva.io/identity/userinfo",
  "jwks_uri" : "https://api.anva.io/identity/.well-known/jwks",
  "scopes_supported" : [ "openid", "Profile", "Email", "Basic", "Customer" ],
  "response_types_supported" : [ "code", "token", "id_token", "id_token token" ],
  "response_modes_supported" : [ "query", "fragment" ],
  "grant_types_supported" : [ "authorization_code", "client_credentials", "refresh_token" ],
  "subject_types_supported" : [ "public" ],
  "id_token_signing_alg_values_supported" : [ "RS256" ],
  "token_endpoint_auth_methods_supported" : [ "client_secret_basic", "client_secret_post" ],
  "token_endpoint_auth_signing_alg_values_supported" : [ "RS256" ],
  "claim_types_supported" : [ "normal" ],
  "claims_supported" : [ "iss", "sub", "aud", "jti", "iat", "exp", "nonce", "at_hash" ]
}
2022-07-20 11:03:01 SUCCESS
GetDynamicServerConfiguration
Successfully parsed server configuration
issuer
https://api.anva.io/identity
authorization_endpoint
https://api.anva.io/identity/authorize
token_endpoint
https://api.anva.io/identity/token
userinfo_endpoint
https://api.anva.io/identity/userinfo
jwks_uri
https://api.anva.io/identity/.well-known/jwks
scopes_supported
[
  "openid",
  "Profile",
  "Email",
  "Basic",
  "Customer"
]
response_types_supported
[
  "code",
  "token",
  "id_token",
  "id_token token"
]
response_modes_supported
[
  "query",
  "fragment"
]
grant_types_supported
[
  "authorization_code",
  "client_credentials",
  "refresh_token"
]
subject_types_supported
[
  "public"
]
id_token_signing_alg_values_supported
[
  "RS256"
]
token_endpoint_auth_methods_supported
[
  "client_secret_basic",
  "client_secret_post"
]
token_endpoint_auth_signing_alg_values_supported
[
  "RS256"
]
claim_types_supported
[
  "normal"
]
claims_supported
[
  "iss",
  "sub",
  "aud",
  "jti",
  "iat",
  "exp",
  "nonce",
  "at_hash"
]
2022-07-20 11:03:01 SUCCESS
CheckServerConfiguration
Found required server configuration keys
required
[
  "authorization_endpoint",
  "token_endpoint",
  "issuer"
]
2022-07-20 11:03:01 SUCCESS
ExtractTLSTestValuesFromServerConfiguration
Extracted TLS information from authorization server configuration
registration_endpoint
authorization_endpoint
{
  "testHost": "api.anva.io",
  "testPort": 443
}
token_endpoint
{
  "testHost": "api.anva.io",
  "testPort": 443
}
userinfo_endpoint
{
  "testHost": "api.anva.io",
  "testPort": 443
}
2022-07-20 11:03:01
FetchServerKeys
Fetching server key
jwks_uri
https://api.anva.io/identity/.well-known/jwks
2022-07-20 11:03:01
FetchServerKeys
HTTP request
request_uri
https://api.anva.io/identity/.well-known/jwks
request_method
GET
request_headers
{
  "accept": "text/plain, application/json, application/*+json, */*",
  "content-length": "0"
}
request_body

                                
2022-07-20 11:03:02 RESPONSE
FetchServerKeys
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "date": "Wed, 20 Jul 2022 11:03:02 GMT",
  "content-type": "application/json;charset\u003dUTF-8",
  "content-length": "804",
  "connection": "keep-alive",
  "access-control-allow-credentials": "true",
  "access-control-allow-origin": "*",
  "access-control-expose-headers": "Location",
  "set-cookie": "JSESSIONID\u003dZg4veUQu4T8EIsr1OcaP; path\u003d/identity",
  "strict-transport-security": "max-age\u003d63072000; preload",
  "x-audit-id": "b445e4f9-3f0f-445d-ab22-f2ab14dcc888",
  "x-correlation-id": "f6478072-4aa6-4982-8a57-5b9b0cd73414"
}
response_body
{
  "keys" : [ {
    "kid" : "ejBK8eqzzjDb",
    "kty" : "RSA",
    "use" : "sig",
    "n" : "ulipB_aL-5wizErnfzt7IUiGdzNCupx5RG9KYgH6PJHt2K2VDMB2IwR9IvIh07sb0bIQIU-KGQrfFQVdBQiNWD7vjmdTtW9b0T9ipA1_vK0JBgNZoTvweW3n8LzZrg91bVvSOY42Kt1nZsCw0WWMOi0n8T9phH23qhCzU2hd3rzD3qOeR_5u-MkcOQtib7jRR36JvXDJYcrrR3PtdfjbnTBb3cJA0u4om7LyiPhYQJFd5VXCRZcDlBOnY_NKl7FraxTVgYgWxbfk4Qb2E1LgmuALi_9Pv5a0on0zqKYfSUQ2uakhY4VZ9vV2ssfqQP7RFw9UVEFnG_LpZnL7xo_m9KmQrh6X_UOVXfSjpx_3vhkQpJkM4N0Qz0ilISQ-ZxGmL7Uidbd3Q_Q8GUkzgjJ4ED9kj_8an9HP1TwQF9KoR19Vhj8bXcaf-p6iY9KiLVLa_x46DcNicNWrnaHCPpinSwG0Or9CuJmCgx64sWlkU0nHFuS0bmq_muPZcneiu3U7UMDDEjMQqIUAEsIvFMIKFd3dPFLTP2eq4J4ans2H9gnI47nHsB31XqpB9FJqZ3YBsKG0dN2PVx-xN27Lr8r5Ckp6Owzs4Aq1252uvA58ZKMSnzkHwBqoYRasAxSB2i9MoenBZYNX_ymy7I-M_43W50MAAPDswsH2neThEieIcTM",
    "e" : "AQAB"
  } ]
}
2022-07-20 11:03:02
FetchServerKeys
Found JWK set string
jwk_string
{
  "keys" : [ {
    "kid" : "ejBK8eqzzjDb",
    "kty" : "RSA",
    "use" : "sig",
    "n" : "ulipB_aL-5wizErnfzt7IUiGdzNCupx5RG9KYgH6PJHt2K2VDMB2IwR9IvIh07sb0bIQIU-KGQrfFQVdBQiNWD7vjmdTtW9b0T9ipA1_vK0JBgNZoTvweW3n8LzZrg91bVvSOY42Kt1nZsCw0WWMOi0n8T9phH23qhCzU2hd3rzD3qOeR_5u-MkcOQtib7jRR36JvXDJYcrrR3PtdfjbnTBb3cJA0u4om7LyiPhYQJFd5VXCRZcDlBOnY_NKl7FraxTVgYgWxbfk4Qb2E1LgmuALi_9Pv5a0on0zqKYfSUQ2uakhY4VZ9vV2ssfqQP7RFw9UVEFnG_LpZnL7xo_m9KmQrh6X_UOVXfSjpx_3vhkQpJkM4N0Qz0ilISQ-ZxGmL7Uidbd3Q_Q8GUkzgjJ4ED9kj_8an9HP1TwQF9KoR19Vhj8bXcaf-p6iY9KiLVLa_x46DcNicNWrnaHCPpinSwG0Or9CuJmCgx64sWlkU0nHFuS0bmq_muPZcneiu3U7UMDDEjMQqIUAEsIvFMIKFd3dPFLTP2eq4J4ans2H9gnI47nHsB31XqpB9FJqZ3YBsKG0dN2PVx-xN27Lr8r5Ckp6Owzs4Aq1252uvA58ZKMSnzkHwBqoYRasAxSB2i9MoenBZYNX_ymy7I-M_43W50MAAPDswsH2neThEieIcTM",
    "e" : "AQAB"
  } ]
}
2022-07-20 11:03:02 SUCCESS
FetchServerKeys
Found server JWK set
server_jwks
{
  "keys": [
    {
      "kid": "ejBK8eqzzjDb",
      "kty": "RSA",
      "use": "sig",
      "n": "ulipB_aL-5wizErnfzt7IUiGdzNCupx5RG9KYgH6PJHt2K2VDMB2IwR9IvIh07sb0bIQIU-KGQrfFQVdBQiNWD7vjmdTtW9b0T9ipA1_vK0JBgNZoTvweW3n8LzZrg91bVvSOY42Kt1nZsCw0WWMOi0n8T9phH23qhCzU2hd3rzD3qOeR_5u-MkcOQtib7jRR36JvXDJYcrrR3PtdfjbnTBb3cJA0u4om7LyiPhYQJFd5VXCRZcDlBOnY_NKl7FraxTVgYgWxbfk4Qb2E1LgmuALi_9Pv5a0on0zqKYfSUQ2uakhY4VZ9vV2ssfqQP7RFw9UVEFnG_LpZnL7xo_m9KmQrh6X_UOVXfSjpx_3vhkQpJkM4N0Qz0ilISQ-ZxGmL7Uidbd3Q_Q8GUkzgjJ4ED9kj_8an9HP1TwQF9KoR19Vhj8bXcaf-p6iY9KiLVLa_x46DcNicNWrnaHCPpinSwG0Or9CuJmCgx64sWlkU0nHFuS0bmq_muPZcneiu3U7UMDDEjMQqIUAEsIvFMIKFd3dPFLTP2eq4J4ans2H9gnI47nHsB31XqpB9FJqZ3YBsKG0dN2PVx-xN27Lr8r5Ckp6Owzs4Aq1252uvA58ZKMSnzkHwBqoYRasAxSB2i9MoenBZYNX_ymy7I-M_43W50MAAPDswsH2neThEieIcTM",
      "e": "AQAB"
    }
  ]
}
2022-07-20 11:03:02 SUCCESS
CheckServerKeysIsValid
Server JWKs is valid
server_jwks
{
  "keys": [
    {
      "kid": "ejBK8eqzzjDb",
      "kty": "RSA",
      "use": "sig",
      "n": "ulipB_aL-5wizErnfzt7IUiGdzNCupx5RG9KYgH6PJHt2K2VDMB2IwR9IvIh07sb0bIQIU-KGQrfFQVdBQiNWD7vjmdTtW9b0T9ipA1_vK0JBgNZoTvweW3n8LzZrg91bVvSOY42Kt1nZsCw0WWMOi0n8T9phH23qhCzU2hd3rzD3qOeR_5u-MkcOQtib7jRR36JvXDJYcrrR3PtdfjbnTBb3cJA0u4om7LyiPhYQJFd5VXCRZcDlBOnY_NKl7FraxTVgYgWxbfk4Qb2E1LgmuALi_9Pv5a0on0zqKYfSUQ2uakhY4VZ9vV2ssfqQP7RFw9UVEFnG_LpZnL7xo_m9KmQrh6X_UOVXfSjpx_3vhkQpJkM4N0Qz0ilISQ-ZxGmL7Uidbd3Q_Q8GUkzgjJ4ED9kj_8an9HP1TwQF9KoR19Vhj8bXcaf-p6iY9KiLVLa_x46DcNicNWrnaHCPpinSwG0Or9CuJmCgx64sWlkU0nHFuS0bmq_muPZcneiu3U7UMDDEjMQqIUAEsIvFMIKFd3dPFLTP2eq4J4ans2H9gnI47nHsB31XqpB9FJqZ3YBsKG0dN2PVx-xN27Lr8r5Ckp6Owzs4Aq1252uvA58ZKMSnzkHwBqoYRasAxSB2i9MoenBZYNX_ymy7I-M_43W50MAAPDswsH2neThEieIcTM",
      "e": "AQAB"
    }
  ]
}
2022-07-20 11:03:02 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2022-07-20 11:03:02 SUCCESS
CheckForKeyIdInServerJWKs
All keys contain kids
2022-07-20 11:03:02 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2022-07-20 11:03:02 SUCCESS
EnsureServerJwksDoesNotContainPrivateOrSymmetricKeys
Jwks does not contain any private or symmetric keys
2022-07-20 11:03:02 SUCCESS
GetStaticClientConfiguration
Found a static client object
client_id
54abcbda-7341-4ecc-b390-2057f6ec7243
client_secret
oAFuYqOnJVbRqgduaoYBlhhmzOljks
2022-07-20 11:03:02 INFO
ValidateClientJWKsPrivatePart
Skipped evaluation due to missing required element: client jwks
path
jwks
mapped
object
client
2022-07-20 11:03:02 INFO
ExtractJWKsFromStaticClientConfiguration
Skipped evaluation due to missing required element: client jwks
path
jwks
mapped
object
client
2022-07-20 11:03:02 INFO
CheckDistinctKeyIdValueInClientJWKs
Skipped evaluation due to missing required element: client jwks
path
jwks
mapped
object
client
2022-07-20 11:03:02
SetScopeInClientConfigurationToOpenId
Set scope in client configuration to "openid"
scope
openid
2022-07-20 11:03:02 SUCCESS
EnsureServerConfigurationSupportsClientSecretBasic
Contents of 'token_endpoint_auth_methods_supported' in discovery document matches expectations.
actual
[
  "client_secret_basic",
  "client_secret_post"
]
expected
[
  "client_secret_basic"
]
minimum_matches_required
1
2022-07-20 11:03:02
SetScopeInClientConfigurationToOpenIdEmail
Set scope in client configuration to "openid email"
scope
openid email
2022-07-20 11:03:02 INFO
OIDCCCheckScopesSupportedContainScopeTest
'scopes_support' in discovery document doesn't contain expected scopes
actual
[
  "openid",
  "Profile",
  "Email",
  "Basic",
  "Customer"
]
expected
openid email
2022-07-20 11:03:02 FINISHED
oidcc-scope-email
Test has run to completion
testmodule_result
SKIPPED
Unregister dynamically registered client
2022-07-20 11:03:02
UnregisterDynamicallyRegisteredClient
Couldn't find registration_access_token.
2022-07-20 11:03:06
TEST-RUNNER
Alias has now been claimed by another test
alias
anvaopenid
new_test_id
tSu33eC9tLpeMZt
Test Results