Test Name | oidcc-ensure-request-object-with-redirect-uri |
---|---|
Variant | client_auth_type=client_secret_basic, server_metadata=discovery, response_type=id_token, response_mode=form_post, client_registration=static_client |
Test ID | Ovv5snNq6V7xIjY https://www.certification.openid.net/log-detail.html?public=true&log=Ovv5snNq6V7xIjY |
Created | 2022-08-04T12:20:37.733941Z |
Description | isva_op_oidc_core_test_gh static_client |
Test Version | 4.1.45 |
Test Owner | 3287601 https://gitlab.com |
Plan ID | 4W8pt9lPrRz0W https://www.certification.openid.net/plan-detail.html?public=true&plan=4W8pt9lPrRz0W |
Exported From | https://www.certification.openid.net |
Exported By | 3287601 https://gitlab.com |
Suite Version | 5.0.0 |
Exported | 2022-08-11 05:49:30 (UTC) |
Status: FINISHED Result: SKIPPED |
SUCCESS 13 FAILURE 0 WARNING 0 REVIEW 0 INFO 4 |
2022-08-04 12:20:37 |
INFO
|
TEST-RUNNER
Test instance Ovv5snNq6V7xIjY created
|
||||||||||||||
|
2022-08-04 12:20:37 |
SUCCESS
|
CreateRedirectUri
Created redirect URI
|
||
|
2022-08-04 12:20:37 |
|
GetDynamicServerConfiguration
HTTP request
|
||||||||
|
2022-08-04 12:20:38 |
RESPONSE
|
GetDynamicServerConfiguration
HTTP response
|
||||||||
|
2022-08-04 12:20:38 |
SUCCESS
|
GetDynamicServerConfiguration
Successfully parsed server configuration
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
2022-08-04 12:20:38 |
SUCCESS
|
CheckServerConfiguration
Found required server configuration keys
|
||
|
2022-08-04 12:20:38 |
SUCCESS
|
ExtractTLSTestValuesFromServerConfiguration
Extracted TLS information from authorization server configuration
|
||||||||
|
2022-08-04 12:20:38 |
|
FetchServerKeys
Fetching server key
|
||
|
2022-08-04 12:20:38 |
|
FetchServerKeys
HTTP request
|
||||||||
|
2022-08-04 12:20:39 |
RESPONSE
|
FetchServerKeys
HTTP response
|
||||||||
|
2022-08-04 12:20:39 |
|
FetchServerKeys
Found JWK set string
|
||
|
2022-08-04 12:20:39 |
SUCCESS
|
FetchServerKeys
Found server JWK set
|
||
|
2022-08-04 12:20:39 |
SUCCESS
|
CheckServerKeysIsValid
Server JWKs is valid
|
||
|
2022-08-04 12:20:39 | SUCCESS |
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
|
|
2022-08-04 12:20:39 | SUCCESS |
CheckForKeyIdInServerJWKs
All keys contain kids
|
|
2022-08-04 12:20:39 | SUCCESS |
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
|
||
|
2022-08-04 12:20:39 | SUCCESS |
EnsureServerJwksDoesNotContainPrivateOrSymmetricKeys
Jwks does not contain any private or symmetric keys
|
|
2022-08-04 12:20:39 |
SUCCESS
|
GetStaticClientConfiguration
Found a static client object
|
||||
|
2022-08-04 12:20:39 | INFO |
ValidateClientJWKsPrivatePart
Skipped evaluation due to missing required element: client jwks
|
||||||
|
2022-08-04 12:20:39 |
INFO
|
ExtractJWKsFromStaticClientConfiguration
Skipped evaluation due to missing required element: client jwks
|
||||||
|
2022-08-04 12:20:39 | INFO |
CheckDistinctKeyIdValueInClientJWKs
Skipped evaluation due to missing required element: client jwks
|
||||||
|
2022-08-04 12:20:39 |
|
SetScopeInClientConfigurationToOpenId
Set scope in client configuration to "openid"
|
||
|
2022-08-04 12:20:39 |
SUCCESS
|
EnsureServerConfigurationSupportsClientSecretBasic
Contents of 'token_endpoint_auth_methods_supported' in discovery document matches expectations.
|
||||||
|
2022-08-04 12:20:39 |
SUCCESS
|
SetProtectedResourceUrlToUserInfoEndpoint
userinfo_endpoint will be used to test access token. The user info is not a mandatory to implement feature in the OpenID Connect specification, but is mandatory for certification.
|
||
|
2022-08-04 12:20:39 |
FINISHED
|
oidcc-ensure-request-object-with-redirect-uri
Test has run to completion
|
||
|
Unregister dynamically registered client |
2022-08-04 12:20:39 |
|
UnregisterDynamicallyRegisteredClient
Couldn't find registration_access_token.
|
|
2022-08-04 12:21:18 |
|
TEST-RUNNER
Alias has now been claimed by another test
|
||||
|