Test Name | fapi-rw-id2-ensure-signed-client-assertion-with-RS256-fails |
---|---|
Variant | private_key_jwt, by_value, plain_fapi, plain_response |
Test ID | A2PvPloTgXCzRIG |
Created | 2020-09-05T04:58:19.358463Z |
Description | NC7000-3A-OC FAPI Conformance Test |
Test Version | 4.1.1 |
Test Owner | 104676522646289729413 https://accounts.google.com |
Plan ID | 0EXGX3mqQUPdO |
Exported From | https://www.certification.openid.net |
Exported By | 104676522646289729413 https://accounts.google.com |
Suite Version | 4.1.1 |
Exported | 2020-09-29 00:03:02 (UTC) |
Status: FINISHED Result: SKIPPED |
SUCCESS 34 FAILURE 0 WARNING 0 REVIEW 0 INFO 1 |
2020-09-05 04:58:19 |
INFO
|
TEST-RUNNER
Test instance A2PvPloTgXCzRIG created
|
||||||||||||||
|
2020-09-05 04:58:19 |
SUCCESS
|
CreateRedirectUri
Created redirect URI
|
||
|
2020-09-05 04:58:19 |
|
GetDynamicServerConfiguration
HTTP request
|
||||||||
|
2020-09-05 04:58:20 |
RESPONSE
|
GetDynamicServerConfiguration
HTTP response
|
||||||||
|
2020-09-05 04:58:20 |
|
GetDynamicServerConfiguration
Downloaded server configuration
|
||
|
2020-09-05 04:58:20 |
SUCCESS
|
GetDynamicServerConfiguration
Successfully parsed server configuration
|
||||||||||||||||||||||||||||||||||||||||||||||
|
2020-09-05 04:58:20 |
SUCCESS
|
CheckServerConfiguration
Found required server configuration keys
|
||
|
2020-09-05 04:58:20 |
SUCCESS
|
ExtractTLSTestValuesFromServerConfiguration
Extracted TLS information from authorization server configuration
|
||||||||
|
2020-09-05 04:58:20 |
|
FetchServerKeys
Fetching server key
|
||
|
2020-09-05 04:58:20 |
|
FetchServerKeys
HTTP request
|
||||||||
|
2020-09-05 04:58:20 |
RESPONSE
|
FetchServerKeys
HTTP response
|
||||||||
|
2020-09-05 04:58:20 |
|
FetchServerKeys
Found JWK set string
|
||
|
2020-09-05 04:58:20 |
SUCCESS
|
FetchServerKeys
Found server JWK set
|
||
|
2020-09-05 04:58:20 |
SUCCESS
|
CheckServerKeysIsValid
Server JWKs is valid
|
||
|
2020-09-05 04:58:20 | SUCCESS |
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
|
|
2020-09-05 04:58:20 | SUCCESS |
CheckForKeyIdInServerJWKs
All keys contain kids
|
|
2020-09-05 04:58:20 | SUCCESS |
EnsureServerJwksDoesNotContainPrivateOrSymmetricKeys
Jwks does not contain any private or symmetric keys
|
|
2020-09-05 04:58:20 | SUCCESS |
FAPIEnsureMinimumServerKeyLength
Validated minimum key lengths for server_jwks
|
||
|
2020-09-05 04:58:20 |
SUCCESS
|
GetStaticClientConfiguration
Found a static client object
|
||||||||||||||
|
2020-09-05 04:58:20 |
|
ValidateMTLSCertificatesHeader
No certificate authority found for MTLS
|
|
2020-09-05 04:58:20 |
SUCCESS
|
ValidateMTLSCertificatesHeader
MTLS certificates header is valid
|
|
2020-09-05 04:58:20 |
|
ExtractMTLSCertificatesFromConfiguration
No certificate authority found for MTLS
|
|
2020-09-05 04:58:20 |
SUCCESS
|
ExtractMTLSCertificatesFromConfiguration
Mutual TLS authentication credentials loaded
|
||||
|
2020-09-05 04:58:20 | SUCCESS |
ValidateClientJWKsPrivatePart
Valid client JWKs: keys are valid JSON, contain the required fields, the private/public exponents match and are correctly encoded using unpadded base64url
|
|
2020-09-05 04:58:20 |
SUCCESS
|
ExtractJWKsFromStaticClientConfiguration
Extracted client JWK
|
||||
|
2020-09-05 04:58:20 | SUCCESS |
CheckForKeyIdInClientJWKs
All keys contain kids
|
|
2020-09-05 04:58:20 | SUCCESS |
CheckDistinctKeyIdValueInClientJWKs
Distinct 'kid' value in all keys of client_jwks
|
||
|
2020-09-05 04:58:20 | SUCCESS |
FAPICheckKeyAlgInClientJWKs
Found a key with alg PS256 or ES256
|
|
2020-09-05 04:58:20 | SUCCESS |
FAPIEnsureMinimumClientKeyLength
Validated minimum key lengths for client_jwks
|
||
|
2020-09-05 04:58:20 |
SUCCESS
|
ValidateMTLSCertificatesAsX509
Mutual TLS authentication cert validated as X.509
|
|
Verify configuration of second client |
2020-09-05 04:58:20 |
SUCCESS
|
GetStaticClient2Configuration
Found a static second client object
|
||||||||||
|
2020-09-05 04:58:20 |
|
ValidateMTLSCertificates2Header
No certificate authority found for MTLS
|
|
2020-09-05 04:58:20 |
SUCCESS
|
ValidateMTLSCertificates2Header
MTLS certificates header is valid
|
|
2020-09-05 04:58:20 |
|
ExtractMTLSCertificates2FromConfiguration
No certificate authority found for MTLS
|
|
2020-09-05 04:58:20 |
SUCCESS
|
ExtractMTLSCertificates2FromConfiguration
Mutual TLS authentication credentials loaded
|
||||
|
2020-09-05 04:58:20 | SUCCESS |
ValidateClientJWKsPrivatePart
Valid client JWKs: keys are valid JSON, contain the required fields, the private/public exponents match and are correctly encoded using unpadded base64url
|
|
2020-09-05 04:58:20 |
SUCCESS
|
ExtractJWKsFromStaticClientConfiguration
Extracted client JWK
|
||||
|
2020-09-05 04:58:20 | SUCCESS |
CheckForKeyIdInClientJWKs
All keys contain kids
|
|
2020-09-05 04:58:20 | SUCCESS |
CheckDistinctKeyIdValueInClientJWKs
Distinct 'kid' value in all keys of client_jwks
|
||
|
2020-09-05 04:58:20 | SUCCESS |
FAPICheckKeyAlgInClientJWKs
Found a key with alg PS256 or ES256
|
|
2020-09-05 04:58:20 | SUCCESS |
FAPIEnsureMinimumClientKeyLength
Validated minimum key lengths for client_jwks
|
||
|
2020-09-05 04:58:20 |
SUCCESS
|
ValidateMTLSCertificatesAsX509
Mutual TLS authentication cert validated as X.509
|
|
2020-09-05 04:58:20 |
SUCCESS
|
GetResourceEndpointConfiguration
Found a resource endpoint object
|
||||
|
2020-09-05 04:58:20 |
SUCCESS
|
SetProtectedResourceUrlToSingleResourceEndpoint
Set protected resource URL
|
||
|
2020-09-05 04:58:20 |
SUCCESS
|
ExtractTLSTestValuesFromResourceConfiguration
Extracted TLS information from resource endpoint
|
||
|
2020-09-05 04:58:20 |
SUCCESS
|
ExtractTLSTestValuesFromOBResourceConfiguration
Extracted TLS information from resource endpoint
|
||||
|
2020-09-05 04:58:20 |
FINISHED
|
fapi-rw-id2-ensure-signed-client-assertion-with-RS256-fails
Test has run to completion
|
||
|
2020-09-05 04:58:56 |
|
TEST-RUNNER
Alias has now been claimed by another test
|
||||
|