Test Name | oidcc-ensure-request-object-with-redirect-uri |
---|---|
Variant | client_auth_type=client_secret_basic, server_metadata=discovery, response_type=code id_token, response_mode=form_post, client_registration=static_client |
Test ID | CF2Xf2dqND0QWuR https://www.certification.openid.net/log-detail.html?public=true&log=CF2Xf2dqND0QWuR |
Created | 2022-08-04T05:50:36.025162Z |
Description | isva_op_oidc_core_test_gh static_client |
Test Version | 4.1.45 |
Test Owner | 3287601 https://gitlab.com |
Plan ID | AxyngbKamNbao https://www.certification.openid.net/plan-detail.html?public=true&plan=AxyngbKamNbao |
Exported From | https://www.certification.openid.net |
Exported By | 3287601 https://gitlab.com |
Suite Version | 5.0.0 |
Exported | 2022-08-11 05:57:08 (UTC) |
Status: FINISHED Result: SKIPPED |
SUCCESS 13 FAILURE 0 WARNING 0 REVIEW 0 INFO 4 |
2022-08-04 05:50:36 |
INFO
|
TEST-RUNNER
Test instance CF2Xf2dqND0QWuR created
|
||||||||||||||
|
2022-08-04 05:50:36 |
SUCCESS
|
CreateRedirectUri
Created redirect URI
|
||
|
2022-08-04 05:50:36 |
|
GetDynamicServerConfiguration
HTTP request
|
||||||||
|
2022-08-04 05:50:37 |
RESPONSE
|
GetDynamicServerConfiguration
HTTP response
|
||||||||
|
2022-08-04 05:50:37 |
SUCCESS
|
GetDynamicServerConfiguration
Successfully parsed server configuration
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
2022-08-04 05:50:37 |
SUCCESS
|
CheckServerConfiguration
Found required server configuration keys
|
||
|
2022-08-04 05:50:37 |
SUCCESS
|
ExtractTLSTestValuesFromServerConfiguration
Extracted TLS information from authorization server configuration
|
||||||||
|
2022-08-04 05:50:37 |
|
FetchServerKeys
Fetching server key
|
||
|
2022-08-04 05:50:37 |
|
FetchServerKeys
HTTP request
|
||||||||
|
2022-08-04 05:50:38 |
RESPONSE
|
FetchServerKeys
HTTP response
|
||||||||
|
2022-08-04 05:50:38 |
|
FetchServerKeys
Found JWK set string
|
||
|
2022-08-04 05:50:38 |
SUCCESS
|
FetchServerKeys
Found server JWK set
|
||
|
2022-08-04 05:50:38 |
SUCCESS
|
CheckServerKeysIsValid
Server JWKs is valid
|
||
|
2022-08-04 05:50:38 | SUCCESS |
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
|
|
2022-08-04 05:50:38 | SUCCESS |
CheckForKeyIdInServerJWKs
All keys contain kids
|
|
2022-08-04 05:50:38 | SUCCESS |
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
|
||
|
2022-08-04 05:50:38 | SUCCESS |
EnsureServerJwksDoesNotContainPrivateOrSymmetricKeys
Jwks does not contain any private or symmetric keys
|
|
2022-08-04 05:50:38 |
SUCCESS
|
GetStaticClientConfiguration
Found a static client object
|
||||
|
2022-08-04 05:50:38 | INFO |
ValidateClientJWKsPrivatePart
Skipped evaluation due to missing required element: client jwks
|
||||||
|
2022-08-04 05:50:38 |
INFO
|
ExtractJWKsFromStaticClientConfiguration
Skipped evaluation due to missing required element: client jwks
|
||||||
|
2022-08-04 05:50:38 | INFO |
CheckDistinctKeyIdValueInClientJWKs
Skipped evaluation due to missing required element: client jwks
|
||||||
|
2022-08-04 05:50:38 |
|
SetScopeInClientConfigurationToOpenId
Set scope in client configuration to "openid"
|
||
|
2022-08-04 05:50:38 |
SUCCESS
|
EnsureServerConfigurationSupportsClientSecretBasic
Contents of 'token_endpoint_auth_methods_supported' in discovery document matches expectations.
|
||||||
|
2022-08-04 05:50:38 |
SUCCESS
|
SetProtectedResourceUrlToUserInfoEndpoint
userinfo_endpoint will be used to test access token. The user info is not a mandatory to implement feature in the OpenID Connect specification, but is mandatory for certification.
|
||
|
2022-08-04 05:50:38 |
FINISHED
|
oidcc-ensure-request-object-with-redirect-uri
Test has run to completion
|
||
|
Unregister dynamically registered client |
2022-08-04 05:50:38 |
|
UnregisterDynamicallyRegisteredClient
Couldn't find registration_access_token.
|
|
2022-08-04 05:50:49 |
|
TEST-RUNNER
Alias has now been claimed by another test
|
||||
|