Test Summary

Test Results

Expand All Collapse All
All times are UTC
2022-08-30 08:58:30 INFO
TEST-RUNNER
Test instance jwHOcw2bJdO7xuk created
baseUrl
https://www.certification.openid.net/test/a/fortifiedid
variant
{
  "server_metadata": "discovery",
  "client_registration": "static_client"
}
alias
fortifiedid
description
Config Cert SSL (oidc.fortifiedid.se)
planId
zHtm9FfxyehJI
config
{
  "alias": "fortifiedid",
  "server": {
    "discoveryUrl": "https://oidc.fortifiedid.se:443/oidc/tenant1/.well-known/openid-configuration"
  },
  "client": {},
  "client_secret_post": {},
  "consent": {},
  "client2": {},
  "description": "Config Cert SSL (oidc.fortifiedid.se)"
}
testName
oidcc-discovery-endpoint-verification
2022-08-30 08:58:30
GetDynamicServerConfiguration
HTTP request
request_uri
https://oidc.fortifiedid.se:443/oidc/tenant1/.well-known/openid-configuration
request_method
GET
request_headers
{
  "accept": "text/plain, application/json, application/*+json, */*",
  "content-length": "0"
}
request_body

                                
2022-08-30 08:58:31 RESPONSE
GetDynamicServerConfiguration
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "date": "Tue, 30 Aug 2022 08:58:31 GMT",
  "server": "Apache/2.4.41 (Ubuntu)",
  "content-type": "application/json",
  "content-length": "859",
  "set-cookie": "__session\u003d3f48a0a752e36f7ad4fee5314d448795; Path\u003d/oidc/; HTTPOnly",
  "keep-alive": "timeout\u003d5, max\u003d100",
  "connection": "Keep-Alive"
}
response_body
{"issuer":"https://oidc.fortifiedid.se:443/oidc/tenant1","authorization_endpoint":"https://oidc.fortifiedid.se:443/test/authn/oidc","token_endpoint":"https://oidc.fortifiedid.se:443/oidc/tenant1/token-endpoint","userinfo_endpoint":"https://oidc.fortifiedid.se:443/oidc/tenant1/userinfo-endpoint","jwks_uri":"https://oidc.fortifiedid.se:443/oidc/tenant1/.well-known/openid-configuration/jwks","end_session_endpoint":"https://oidc.fortifiedid.se:443/test/authn/oidc/logout","scopes_supported":["openid"],"response_types_supported":["code"],"grant_types_supported":["authorization_code"],"subject_types_supported":["public"],"id_token_signing_alg_values_supported":["RS256"],"token_endpoint_auth_methods_supported":["client_secret_post","client_secret_basic"],"claims_supported":["iss","ver","sub","given_name","family_name"],"request_parameter_supported":false}
2022-08-30 08:58:31 SUCCESS
GetDynamicServerConfiguration
Successfully parsed server configuration
issuer
https://oidc.fortifiedid.se:443/oidc/tenant1
authorization_endpoint
https://oidc.fortifiedid.se:443/test/authn/oidc
token_endpoint
https://oidc.fortifiedid.se:443/oidc/tenant1/token-endpoint
userinfo_endpoint
https://oidc.fortifiedid.se:443/oidc/tenant1/userinfo-endpoint
jwks_uri
https://oidc.fortifiedid.se:443/oidc/tenant1/.well-known/openid-configuration/jwks
end_session_endpoint
https://oidc.fortifiedid.se:443/test/authn/oidc/logout
scopes_supported
[
  "openid"
]
response_types_supported
[
  "code"
]
grant_types_supported
[
  "authorization_code"
]
subject_types_supported
[
  "public"
]
id_token_signing_alg_values_supported
[
  "RS256"
]
token_endpoint_auth_methods_supported
[
  "client_secret_post",
  "client_secret_basic"
]
claims_supported
[
  "iss",
  "ver",
  "sub",
  "given_name",
  "family_name"
]
request_parameter_supported
false
2022-08-30 08:58:31 SUCCESS
EnsureDiscoveryEndpointResponseStatusCodeIs200
discovery_endpoint_response returned http 200 as expected
http_status
200
2022-08-30 08:58:31 SUCCESS
CheckDiscoveryEndpointReturnedJsonContentType
discovery_endpoint_response Content-Type: header is application/json
2022-08-30 08:58:31
oidcc-discovery-endpoint-verification
Setup Done
2022-08-30 08:58:31 SUCCESS
OIDCCCheckDiscEndpointResponseTypesSupported
Contents of 'response_types_supported' in discovery document matches expectations.
actual
[
  "code"
]
expected
[
  "code",
  "code id_token",
  "id_token",
  "token id_token",
  "code id_token token",
  "code token"
]
minimum_matches_required
1
2022-08-30 08:58:31 SUCCESS
CheckDiscEndpointDiscoveryUrl
discoveryUrl
actual
https://oidc.fortifiedid.se:443/oidc/tenant1/.well-known/openid-configuration
2022-08-30 08:58:31 SUCCESS
CheckDiscEndpointIssuer
issuer is consistent with the discovery endpoint
2022-08-30 08:58:31 SUCCESS
OIDCCCheckDiscEndpointSubjectTypesSupported
Contents of 'subject_types_supported' in discovery document matches expectations.
actual
[
  "public"
]
expected
[
  "public",
  "pairwise"
]
minimum_matches_required
1
2022-08-30 08:58:31 SUCCESS
OIDCCCheckDiscEndpointIdTokenSigningAlgValuesSupported
Contents of 'id_token_signing_alg_values_supported' in discovery document matches expectations.
actual
[
  "RS256"
]
expected
[
  "RS256"
]
minimum_matches_required
1
2022-08-30 08:58:31 INFO
OIDCCCheckDiscEndpointUserinfoSigningAlgValuesSupported
Skipped evaluation due to missing required element: server userinfo_signing_alg_values_supported
path
userinfo_signing_alg_values_supported
mapped
object
server
2022-08-30 08:58:31 SUCCESS
CheckDiscEndpointAuthorizationEndpoint
authorization_endpoint
actual
https://oidc.fortifiedid.se:443/test/authn/oidc
2022-08-30 08:58:31 SUCCESS
CheckDiscEndpointTokenEndpoint
token_endpoint
actual
https://oidc.fortifiedid.se:443/oidc/tenant1/token-endpoint
2022-08-30 08:58:31 SUCCESS
CheckDiscEndpointUserinfoEndpoint
userinfo_endpoint
actual
https://oidc.fortifiedid.se:443/oidc/tenant1/userinfo-endpoint
2022-08-30 08:58:31 INFO
CheckDiscEndpointRegistrationEndpoint
Skipped evaluation due to missing required element: server registration_endpoint
path
registration_endpoint
mapped
object
server
2022-08-30 08:58:31 SUCCESS
CheckJwksUri
jwks_uri
actual
https://oidc.fortifiedid.se:443/oidc/tenant1/.well-known/openid-configuration/jwks
2022-08-30 08:58:31
FetchServerKeys
Fetching server key
jwks_uri
https://oidc.fortifiedid.se:443/oidc/tenant1/.well-known/openid-configuration/jwks
2022-08-30 08:58:31
FetchServerKeys
HTTP request
request_uri
https://oidc.fortifiedid.se:443/oidc/tenant1/.well-known/openid-configuration/jwks
request_method
GET
request_headers
{
  "accept": "text/plain, application/json, application/*+json, */*",
  "content-length": "0"
}
request_body

                                
2022-08-30 08:58:31 RESPONSE
FetchServerKeys
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "date": "Tue, 30 Aug 2022 08:58:31 GMT",
  "server": "Apache/2.4.41 (Ubuntu)",
  "content-length": "1426",
  "set-cookie": "__session\u003d3a07f97ccc54cdbe75c023d79ad1743a; Path\u003d/oidc/; HTTPOnly",
  "keep-alive": "timeout\u003d5, max\u003d100",
  "connection": "Keep-Alive"
}
response_body
{"keys": [{
  "kty" : "RSA",
  "use" : "sig",
  "n" : "8xVa2N-Jzp1ubscnoa803XRdizKDbBk5YF5hUaslilWl4-F_b6E91FCslFhPSSL2gpUwT7o8yFGgeK2RkvL20W4Wig6xLy4AMTeDb2IhDN_Jdhga5EBCjbYkm2FF4iHL-nKZxS3owzT4-BetOpPlLKI1v8jlszUGJ5gio6f8nsEcQXSc8hsEoNlrVWUJwNxESULdl1WODX_9uQ4L0BrLSzuDWwNRrw8sLG2W3kuKHO348jtFEpD_yZibq1QuZ_5NXvIMnlqeVXmrXtJgiHM6c1NIfh2z5A0yguTIUPadoly4gT0S428BEo7xwZA7e5AUfAPaLfLKYUgBTlieBNJfBQ",
  "e" : "AQAB",
  "kid" : "Rli_VLj5YJs_Go1EIGK1v_wG30A",
  "x5t" : "i5c2Lc9WH1hMqGQHm_kTvQvVvXk",
  "x5c" : [ "MIICpDCCAYygAwIBAgIGAYEeIr3YMA0GCSqGSIb3DQEBCwUAMBMxETAPBgNVBAMMCHRlc3RjZXJ0MB4XDTIyMDYwMTA3MjAwMloXDTIzMDYwMTA3MjAwMlowEzERMA8GA1UEAwwIdGVzdGNlcnQwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDzFVrY34nOnW5uxyehrzTddF2LMoNsGTlgXmFRqyWKVaXj4X9voT3UUKyUWE9JIvaClTBPujzIUaB4rZGS8vbRbhaKDrEvLgAxN4NvYiEM38l2GBrkQEKNtiSbYUXiIcv6cpnFLejDNPj4F606k+UsojW/yOWzNQYnmCKjp/yewRxBdJzyGwSg2WtVZQnA3ERJQt2XVY4Nf/25DgvQGstLO4NbA1GvDywsbZbeS4oc7fjyO0USkP/JmJurVC5n/k1e8gyeWp5Veate0mCIczpzU0h+HbPkDTKC5MhQ9p2iXLiBPRLjbwESjvHBkDt7kBR8A9ot8sphSAFOWJ4E0l8FAgMBAAEwDQYJKoZIhvcNAQELBQADggEBADkjj9Q+fGL/BiPPjtY4UvnWXePYa/QkKM2JwKK3AH5MUx9luZJ+qis0ZpP+Hoj/THTGXZDHtB+OQHz2yGtHGFrVJhu3LfIeggZ409QCjwVsRiXQi9ZoKivYzuSyBYEHfwgJFWv0z1hmbzKdwCCCj1/lB6AoHBbmW8BKDi/x4tyNAlvN7hKAd8yw0Z3nHwKMJDCpD6Id/mr+B3FlNNHZ+FR+bzJ1H6HxZzDC4x+dk3ZrxmZ8Yz+Dyb6d/QicsOpgtuUZoF8FaxhnSp5r0nSbk1jio5xvQSXqf7p2/ZRNeZTtImJVNfmr2TJXxGf2vZCDaqcIfKADR1eRU5GDeYdf+XI=" ]
}]}
2022-08-30 08:58:31
FetchServerKeys
Found JWK set string
jwk_string
{"keys": [{
  "kty" : "RSA",
  "use" : "sig",
  "n" : "8xVa2N-Jzp1ubscnoa803XRdizKDbBk5YF5hUaslilWl4-F_b6E91FCslFhPSSL2gpUwT7o8yFGgeK2RkvL20W4Wig6xLy4AMTeDb2IhDN_Jdhga5EBCjbYkm2FF4iHL-nKZxS3owzT4-BetOpPlLKI1v8jlszUGJ5gio6f8nsEcQXSc8hsEoNlrVWUJwNxESULdl1WODX_9uQ4L0BrLSzuDWwNRrw8sLG2W3kuKHO348jtFEpD_yZibq1QuZ_5NXvIMnlqeVXmrXtJgiHM6c1NIfh2z5A0yguTIUPadoly4gT0S428BEo7xwZA7e5AUfAPaLfLKYUgBTlieBNJfBQ",
  "e" : "AQAB",
  "kid" : "Rli_VLj5YJs_Go1EIGK1v_wG30A",
  "x5t" : "i5c2Lc9WH1hMqGQHm_kTvQvVvXk",
  "x5c" : [ "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" ]
}]}
2022-08-30 08:58:31 SUCCESS
FetchServerKeys
Found server JWK set
server_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "use": "sig",
      "n": "8xVa2N-Jzp1ubscnoa803XRdizKDbBk5YF5hUaslilWl4-F_b6E91FCslFhPSSL2gpUwT7o8yFGgeK2RkvL20W4Wig6xLy4AMTeDb2IhDN_Jdhga5EBCjbYkm2FF4iHL-nKZxS3owzT4-BetOpPlLKI1v8jlszUGJ5gio6f8nsEcQXSc8hsEoNlrVWUJwNxESULdl1WODX_9uQ4L0BrLSzuDWwNRrw8sLG2W3kuKHO348jtFEpD_yZibq1QuZ_5NXvIMnlqeVXmrXtJgiHM6c1NIfh2z5A0yguTIUPadoly4gT0S428BEo7xwZA7e5AUfAPaLfLKYUgBTlieBNJfBQ",
      "e": "AQAB",
      "kid": "Rli_VLj5YJs_Go1EIGK1v_wG30A",
      "x5t": "i5c2Lc9WH1hMqGQHm_kTvQvVvXk",
      "x5c": [
        "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\u003d"
      ]
    }
  ]
}
2022-08-30 08:58:31 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2022-08-30 08:58:31 SUCCESS
EnsureServerJwksDoesNotContainPrivateOrSymmetricKeys
Jwks does not contain any private or symmetric keys
2022-08-30 08:58:31 INFO
CheckDiscEndpointRequestParameterSupported
request_parameter_supported must be: true
discovery_metadata_key
request_parameter_supported
actual
false
expected
true
2022-08-30 08:58:31 SUCCESS
CheckDiscEndpointRequestUriParameterSupported
request_uri_parameter_supported has correct value
request_uri_parameter_supported
2022-08-30 08:58:31 INFO
CheckDiscEndpointRequestObjectSigningAlgValuesSupportedIncludesRS256
Skipped evaluation due to missing required element: server request_object_signing_alg_values_supported
path
request_object_signing_alg_values_supported
mapped
object
server
2022-08-30 08:58:31 INFO
CheckDiscEndpointClaimsParameterSupported
'claims_parameter_supported' should be 'true', but is absent and the default value is 'false'.
discovery_metadata_key
claims_parameter_supported
actual
expected
true
2022-08-30 08:58:31 SUCCESS
OIDCCCheckDiscEndpointClaimsSupported
Contents of 'claims_supported' in discovery document matches expectations.
actual
[
  "iss",
  "ver",
  "sub",
  "given_name",
  "family_name"
]
expected
[]
minimum_matches_required
0
2022-08-30 08:58:31 SUCCESS
OIDCCCheckDiscEndpointGrantTypesSupported
grant_types_supported is a non-empty array.
grant_types_supported
[
  "authorization_code"
]
2022-08-30 08:58:31 SUCCESS
CheckDiscEndpointScopesSupportedContainsOpenId
Contents of 'scopes_supported' in discovery document matches expectations.
actual
[
  "openid"
]
expected
[
  "openid"
]
minimum_matches_required
1
2022-08-30 08:58:31 SUCCESS
CheckDiscEndpointAllEndpointsAreHttps
authorization_endpoint
actual
https://oidc.fortifiedid.se:443/test/authn/oidc
2022-08-30 08:58:31 SUCCESS
CheckDiscEndpointAllEndpointsAreHttps
token_endpoint
actual
https://oidc.fortifiedid.se:443/test/authn/oidc
2022-08-30 08:58:31 SUCCESS
CheckDiscEndpointAllEndpointsAreHttps
userinfo_endpoint
actual
https://oidc.fortifiedid.se:443/test/authn/oidc
2022-08-30 08:58:31 SUCCESS
CheckDiscEndpointAllEndpointsAreHttps
end_session_endpoint
actual
https://oidc.fortifiedid.se:443/test/authn/oidc
2022-08-30 08:58:31 FINISHED
oidcc-discovery-endpoint-verification
Test has run to completion
testmodule_result
PASSED
Test Results