Test Name | fapi1-advanced-final-ensure-client-id-in-token-endpoint |
---|---|
Variant | client_auth_type=private_key_jwt, fapi_auth_request_method=by_value, fapi_profile=plain_fapi, fapi_response_mode=jarm |
Test ID | qhUfZ4alGGt67Lk https://www.certification.openid.net/log-detail.html?public=true&log=qhUfZ4alGGt67Lk |
Created | 2022-07-06T10:23:32.484887Z |
Description | aa.openit.io testing |
Test Version | 4.1.44 |
Test Owner | 5019191 https://gitlab.com |
Plan ID | z73KXRiP4L9Ke https://www.certification.openid.net/plan-detail.html?public=true&plan=z73KXRiP4L9Ke |
Exported From | https://www.certification.openid.net |
Exported By | 5019191 https://gitlab.com |
Suite Version | 4.1.44 |
Exported | 2022-07-08 10:18:55 (UTC) |
Status: FINISHED Result: PASSED |
SUCCESS 78 FAILURE 0 WARNING 0 REVIEW 0 INFO 1 |
2022-07-06 10:23:32 |
INFO
|
TEST-RUNNER
Test instance qhUfZ4alGGt67Lk created
|
||||||||||||||
|
2022-07-06 10:23:32 |
SUCCESS
|
CreateRedirectUri
Created redirect URI
|
||
|
2022-07-06 10:23:32 |
|
GetDynamicServerConfiguration
HTTP request
|
||||||||
|
2022-07-06 10:23:32 |
RESPONSE
|
GetDynamicServerConfiguration
HTTP response
|
||||||||
|
2022-07-06 10:23:32 |
SUCCESS
|
GetDynamicServerConfiguration
Successfully parsed server configuration
|
||||||||||||||||||||||||||||||||||||||||||||||||
|
2022-07-06 10:23:32 | SUCCESS |
AddMTLSEndpointAliasesToEnvironment
Added mtls_endpoint_aliases to environment
|
|
2022-07-06 10:23:32 |
SUCCESS
|
CheckServerConfiguration
Found required server configuration keys
|
||
|
2022-07-06 10:23:32 |
|
FetchServerKeys
Fetching server key
|
||
|
2022-07-06 10:23:33 |
|
FetchServerKeys
HTTP request
|
||||||||
|
2022-07-06 10:23:33 |
RESPONSE
|
FetchServerKeys
HTTP response
|
||||||||
|
2022-07-06 10:23:33 |
|
FetchServerKeys
Found JWK set string
|
||
|
2022-07-06 10:23:33 |
SUCCESS
|
FetchServerKeys
Found server JWK set
|
||
|
2022-07-06 10:23:33 |
SUCCESS
|
CheckServerKeysIsValid
Server JWKs is valid
|
||
|
2022-07-06 10:23:33 | SUCCESS |
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
|
|
2022-07-06 10:23:33 | SUCCESS |
CheckForKeyIdInServerJWKs
All keys contain kids
|
|
2022-07-06 10:23:33 | SUCCESS |
EnsureServerJwksDoesNotContainPrivateOrSymmetricKeys
Jwks does not contain any private or symmetric keys
|
|
2022-07-06 10:23:33 | SUCCESS |
FAPIEnsureMinimumServerKeyLength
Validated minimum key lengths for server_jwks
|
||
|
2022-07-06 10:23:33 |
SUCCESS
|
GetStaticClientConfiguration
Found a static client object
|
||||||
|
2022-07-06 10:23:33 |
SUCCESS
|
ValidateMTLSCertificatesHeader
MTLS certificates header is valid
|
|
2022-07-06 10:23:33 |
SUCCESS
|
ExtractMTLSCertificatesFromConfiguration
Mutual TLS authentication credentials loaded
|
||||||
|
2022-07-06 10:23:33 | SUCCESS |
ValidateClientJWKsPrivatePart
Valid client JWKs: keys are valid JSON, contain the required fields, the private/public exponents match and are correctly encoded using unpadded base64url
|
|
2022-07-06 10:23:33 |
SUCCESS
|
ExtractJWKsFromStaticClientConfiguration
Extracted client JWK
|
||||
|
2022-07-06 10:23:33 | SUCCESS |
CheckForKeyIdInClientJWKs
All keys contain kids
|
|
2022-07-06 10:23:33 | SUCCESS |
CheckDistinctKeyIdValueInClientJWKs
Distinct 'kid' value in all keys of client_jwks
|
||
|
2022-07-06 10:23:33 | SUCCESS |
FAPICheckKeyAlgInClientJWKs
Keys in client JWKS all have permitted 'alg'
|
||
|
2022-07-06 10:23:33 | SUCCESS |
FAPIEnsureMinimumClientKeyLength
Validated minimum key lengths for client_jwks
|
||
|
2022-07-06 10:23:33 |
SUCCESS
|
ValidateMTLSCertificatesAsX509
Mutual TLS authentication cert validated as X.509
|
|
Verify configuration of second client |
2022-07-06 10:23:33 |
SUCCESS
|
GetStaticClient2Configuration
Found a static second client object
|
||||||
|
2022-07-06 10:23:33 |
SUCCESS
|
ValidateMTLSCertificates2Header
MTLS certificates header is valid
|
|
2022-07-06 10:23:33 |
SUCCESS
|
ExtractMTLSCertificates2FromConfiguration
Mutual TLS authentication credentials loaded
|
||||||
|
2022-07-06 10:23:33 | SUCCESS |
ValidateClientJWKsPrivatePart
Valid client JWKs: keys are valid JSON, contain the required fields, the private/public exponents match and are correctly encoded using unpadded base64url
|
|
2022-07-06 10:23:33 |
SUCCESS
|
ExtractJWKsFromStaticClientConfiguration
Extracted client JWK
|
||||
|
2022-07-06 10:23:33 | SUCCESS |
CheckForKeyIdInClientJWKs
All keys contain kids
|
|
2022-07-06 10:23:33 | SUCCESS |
CheckDistinctKeyIdValueInClientJWKs
Distinct 'kid' value in all keys of client_jwks
|
||
|
2022-07-06 10:23:33 | SUCCESS |
FAPICheckKeyAlgInClientJWKs
Keys in client JWKS all have permitted 'alg'
|
||
|
2022-07-06 10:23:33 | SUCCESS |
FAPIEnsureMinimumClientKeyLength
Validated minimum key lengths for client_jwks
|
||
|
2022-07-06 10:23:33 |
SUCCESS
|
ValidateMTLSCertificatesAsX509
Mutual TLS authentication cert validated as X.509
|
|
2022-07-06 10:23:33 |
SUCCESS
|
ValidateClientPrivateKeysAreDifferent
Client signing JWKs have different thumbprints
|
||||
|
2022-07-06 10:23:33 |
SUCCESS
|
GetResourceEndpointConfiguration
Found a resource endpoint object
|
||||||||
|
2022-07-06 10:23:33 |
SUCCESS
|
SetProtectedResourceUrlToSingleResourceEndpoint
Set protected resource URL
|
||
|
2022-07-06 10:23:33 |
SUCCESS
|
ExtractTLSTestValuesFromResourceConfiguration
Extracted TLS information from resource endpoint
|
||
|
2022-07-06 10:23:33 |
SUCCESS
|
ExtractTLSTestValuesFromOBResourceConfiguration
Extracted TLS information from resource endpoint
|
||||
|
2022-07-06 10:23:33 |
|
fapi1-advanced-final-ensure-client-id-in-token-endpoint
Setup Done
|
|
Make request to authorization endpoint |
2022-07-06 10:23:33 |
SUCCESS
|
CreateAuthorizationEndpointRequestFromClientInformation
Created authorization endpoint request
|
||||||
|
2022-07-06 10:23:33 |
SUCCESS
|
AddAcrClaimToAuthorizationEndpointRequest
Added acr claim to authorization_endpoint_request
|
||
|
2022-07-06 10:23:33 |
|
CreateRandomStateValue
Created state value
|
||||
|
2022-07-06 10:23:33 |
SUCCESS
|
AddStateToAuthorizationEndpointRequest
Added state parameter to request
|
||||||||||
|
2022-07-06 10:23:33 |
|
CreateRandomNonceValue
Created nonce value
|
||||
|
2022-07-06 10:23:33 |
SUCCESS
|
AddNonceToAuthorizationEndpointRequest
Added nonce parameter to request
|
||||||||||||
|
2022-07-06 10:23:33 |
SUCCESS
|
SetAuthorizationEndpointRequestResponseTypeToCode
Added response_type parameter to request
|
||||||||||||||
|
2022-07-06 10:23:33 |
SUCCESS
|
SetAuthorizationEndpointRequestResponseModeToJWT
Added response_mode parameter to request
|
||||||||||||||||
|
2022-07-06 10:23:33 |
SUCCESS
|
ConvertAuthorizationEndpointRequestToRequestObject
Created request object claims
|
||
|
2022-07-06 10:23:33 | SUCCESS |
AddNbfToRequestObject
Added nbf to request object claims
|
||
|
2022-07-06 10:23:33 | SUCCESS |
AddExpToRequestObject
Added exp to request object claims
|
||
|
2022-07-06 10:23:33 | SUCCESS |
AddAudToRequestObject
Added aud to request object claims
|
||
|
2022-07-06 10:23:33 | SUCCESS |
AddIssToRequestObject
Added iss to request object claims
|
||
|
2022-07-06 10:23:33 | SUCCESS |
AddClientIdToRequestObject
Added client_id to request object claims
|
||
|
2022-07-06 10:23:33 |
SUCCESS
|
SignRequestObject
Signed the request object
|
||||||||
|
2022-07-06 10:23:33 |
SUCCESS
|
BuildRequestObjectByValueRedirectToAuthorizationEndpoint
Sending to authorization endpoint
|
||
|
2022-07-06 10:23:33 |
REDIRECT
|
fapi1-advanced-final-ensure-client-id-in-token-endpoint
Redirecting to authorization endpoint
|
||
|
2022-07-06 10:23:51 |
INCOMING
|
fapi1-advanced-final-ensure-client-id-in-token-endpoint
Incoming HTTP request to /test/a/aa-openitio/callback
|
||||||||||||||||||||||
|
2022-07-06 10:23:51 |
SUCCESS
|
CreateRandomImplicitSubmitUrl
Created random implicit submission URL
|
||
|
2022-07-06 10:23:51 |
OUTGOING
|
fapi1-advanced-final-ensure-client-id-in-token-endpoint
Response to HTTP request to test instance qhUfZ4alGGt67Lk
|
||||
|
2022-07-06 10:23:52 |
INCOMING
|
fapi1-advanced-final-ensure-client-id-in-token-endpoint
Incoming HTTP request to /test/a/aa-openitio/implicit/6kzeXKc223rub23ORIZ0
|
||||||||||||||||||||||
|
2022-07-06 10:23:52 |
OUTGOING
|
fapi1-advanced-final-ensure-client-id-in-token-endpoint
Response to HTTP request to test instance qhUfZ4alGGt67Lk
|
||||||||
|
2022-07-06 10:23:52 |
SUCCESS
|
ExtractImplicitHashToCallbackResponse
implicit_hash is empty
|
|
2022-07-06 10:23:52 |
REDIRECT-IN
|
fapi1-advanced-final-ensure-client-id-in-token-endpoint
Authorization endpoint response captured
|
||||||||||
|
Verify authorization endpoint response |
2022-07-06 10:23:52 | SUCCESS |
ExtractJARMFromURLQuery
Found and parsed the jarm_response from callback_query_params
|
||||||
|
2022-07-06 10:23:52 | SUCCESS |
RejectNonJarmResponsesInUrlQuery
Authorization endpoint response only includes the JARM JWT.
|
|
2022-07-06 10:23:52 |
SUCCESS
|
ExtractAuthorizationEndpointResponseFromJARMResponse
Extracted the authorization response
|
||||||||
|
2022-07-06 10:23:52 | SUCCESS |
ValidateJARMResponse
JARM response standard JWT claims are valid
|
|
2022-07-06 10:23:52 | SUCCESS |
ValidateJARMExpRecommendations
JARM response 'exp' is less than 10 minutes
|
||||
|
2022-07-06 10:23:52 | SUCCESS |
ValidateJARMSignatureUsingKid
jarm_response signature validated
|
||
|
2022-07-06 10:23:52 | SUCCESS |
RejectAuthCodeInUrlQuery
Authorization code is not present in URL query returned from authorization endpoint
|
|
2022-07-06 10:23:52 |
SUCCESS
|
CheckMatchingCallbackParameters
Callback parameters successfully verified
|
|
2022-07-06 10:23:52 | SUCCESS |
RejectStateInUrlQueryForHybridFlow
state is correctly not present in URL query returned from authorization endpoint (as in the hybrid flow it must be returned in the URL fragment/hash only)
|
|
2022-07-06 10:23:52 |
SUCCESS
|
CheckIfAuthorizationEndpointError
No error from authorization endpoint
|
|
2022-07-06 10:23:52 |
SUCCESS
|
ValidateSuccessfulJARMResponseFromAuthorizationEndpoint
authorization endpoint response does not include unexpected parameters
|
||||||||
|
2022-07-06 10:23:52 | SUCCESS |
CheckStateInAuthorizationResponse
State in response correctly returned
|
||
|
2022-07-06 10:23:52 | SUCCESS |
ValidateIssInAuthorizationResponse
'iss' parameter in authorization response matches server's issuer value.
|
|
2022-07-06 10:23:52 |
SUCCESS
|
ExtractAuthorizationCodeFromAuthorizationResponse
Found authorization code
|
||
|
2022-07-06 10:23:52 | SUCCESS |
EnsureMinimumAuthorizationCodeLength
Authorization code is of sufficient length
|
||||
|
2022-07-06 10:23:52 | SUCCESS |
EnsureMinimumAuthorizationCodeEntropy
Calculated shannon entropy seems sufficient
|
||||||
|
2022-07-06 10:23:52 |
SUCCESS
|
CreateTokenEndpointRequestForAuthorizationCodeGrant
Created token endpoint request
|
||||||
|
Swapping to Client2 |
2022-07-06 10:23:52 |
|
AddClientIdToTokenEndpointRequest
|
||||||||
|
2022-07-06 10:23:52 |
SUCCESS
|
CreateClientAuthenticationAssertionClaims
Created client assertion claims
|
||||||||||||
|
2022-07-06 10:23:52 |
SUCCESS
|
SignClientAuthenticationAssertion
Signed the client assertion
|
||
|
2022-07-06 10:23:52 |
|
AddClientAssertionToTokenEndpointRequest
Added client assertion
|
||||||||||||
|
2022-07-06 10:23:52 |
|
CallTokenEndpointAndReturnFullResponse
HTTP request
|
||||||||||
|
2022-07-06 10:23:52 |
RESPONSE
|
CallTokenEndpointAndReturnFullResponse
HTTP response
|
||||||||
|
2022-07-06 10:23:52 | SUCCESS |
CallTokenEndpointAndReturnFullResponse
Parsed token endpoint response
|
||||
|
2022-07-06 10:23:52 | SUCCESS |
CheckTokenEndpointHttpStatusIs400Allowing401ForInvalidClientError
Token endpoint http status code was 401 for error 'invalid_client'
|
|
2022-07-06 10:23:52 | SUCCESS |
CheckTokenEndpointReturnedJsonContentType
token_endpoint_response_headers Content-Type: header is application/json
|
|
2022-07-06 10:23:52 | SUCCESS |
CheckErrorFromTokenEndpointResponseErrorInvalidClientOrInvalidGrant
Token Endpoint response error returned expected 'error' of 'invalid_client'
|
||
|
2022-07-06 10:23:52 | SUCCESS |
ValidateErrorFromTokenEndpointResponseError
Token endpoint response error returned valid 'error' field
|
||
|
2022-07-06 10:23:52 | SUCCESS |
CheckErrorDescriptionFromTokenEndpointResponseErrorContainsCRLFTAB
token_endpoint_response 'error_description' field does not include CR/LF/TAB
|
||
|
2022-07-06 10:23:52 | SUCCESS |
ValidateErrorDescriptionFromTokenEndpointResponseError
token_endpoint_response error returned valid 'error_description' field
|
||
|
2022-07-06 10:23:52 | SUCCESS |
ValidateErrorUriFromTokenEndpointResponseError
token_endpoint_response did not include optional 'error_uri' field
|
|
2022-07-06 10:23:52 |
FINISHED
|
fapi1-advanced-final-ensure-client-id-in-token-endpoint
Test has run to completion
|
||
|
2022-07-06 10:23:59 |
|
TEST-RUNNER
Alias has now been claimed by another test
|
||||
|