Test Summary

Test Results

Expand All Collapse All
All times are UTC
2022-10-13 07:17:48 INFO
TEST-RUNNER
Test instance hZ8jpNyWzNzYWwL created
baseUrl
https://www.certification.openid.net/test/a/GC_broker
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code",
  "request_type": "plain_http_request",
  "response_mode": "default",
  "client_registration": "static_client"
}
alias
GC_broker
description
GC Broker OIDC RP TEST 0927
planId
FDN4myZlLP3tX
config
{
  "alias": "GC_broker",
  "description": "GC Broker OIDC RP TEST 0927",
  "publish": "everything",
  "consent": {},
  "client": {
    "client_id": "oidc-test-client",
    "client_secret": "123456",
    "redirect_uri": "https://gkidp.ipanda.co.jp/gkidp/global_login/DM001003/callback/01"
  }
}
testName
oidcc-client-test-client-secret-basic
2022-10-13 07:17:48 SUCCESS
OIDCCGenerateServerConfiguration
Generated default server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/GC_broker/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/GC_broker/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/GC_broker/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/GC_broker/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/GC_broker/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/GC_broker/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post",
    "client_secret_jwt",
    "private_key_jwt"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "preferred_username",
    "gender",
    "birthdate",
    "address",
    "zoneinfo",
    "locale",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified",
    "website",
    "profile",
    "updated_at"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "RSA-OAEP-384",
    "RSA-OAEP-512",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "RSA-OAEP-384",
    "RSA-OAEP-512",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "RSA-OAEP-384",
    "RSA-OAEP-512",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2022-10-13 07:17:48
SetTokenEndpointAuthMethodsSupportedToClientSecretBasicOnly
Changed token_endpoint_auth_methods_supported to client_secret_basic only in server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/GC_broker/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/GC_broker/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/GC_broker/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/GC_broker/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/GC_broker/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/GC_broker/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "preferred_username",
    "gender",
    "birthdate",
    "address",
    "zoneinfo",
    "locale",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified",
    "website",
    "profile",
    "updated_at"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "RSA-OAEP-384",
    "RSA-OAEP-512",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "RSA-OAEP-384",
    "RSA-OAEP-512",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "RSA-OAEP-384",
    "RSA-OAEP-512",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2022-10-13 07:17:48
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "9jX3inp_n5xamTbComgXwO3ZokFa8yVmDXbpj-oJKmfGOKlUTpJWisKM_PH9aI4v4HuLhJTOx1bCRHgza8FuamdAopk5sy7l3889hNQsTN1wU3XZPrxpNKf2fSH8uii5Yu-yVjQdSB0m2l9g6G_9VMl8uQWuy21-IpSA5MWgYeU",
      "kty": "RSA",
      "q": "yF3FUFRBe5BC1083P_khMQUUBX6NK3ddJQQxdNE_UyLtbmxsIWpifpDZXAymqdsO-LxDwBitXzBXjCEfmQWzue2-cHgOqmoHaTjQ5QNcmhakIEh4rAz7f5aA1yygP9kACunowc_xF5aXN6udq0QC87K-Z4t7R9j7j0JAuEAL43c",
      "d": "AYOpSujNlgSWQqCCylbXUZEJlSa9Yfh8JtdVWrZ9ZoMMVHvqlWx8SRlAqI3u-XyGQshRrsx8WcqDi9qlBwgXaEV-BlU6SwySjNvZAxramaGO1zT50pJW8Pqasg9YcQs_Ta6yvLQuD3nRj6BB9gtg9tvR0w2ynkQeWigQp9_yfjGA4gJgsgHGxSle2kXRcBZfY1yA7bMVutYVyT9i8VeRN9dAXftA3sB1tu0dxfwouEWASNOf9qJHL7yA52ptxwXPpuYhQ1cQAH90NubwfsqY2iJIzQOharnHPFp_8Xk3jDNdKrCKW_FcvruAEldO-gMDiK_nTEyyTZ5OBPnvheARSQ",
      "e": "AQAB",
      "use": "sig",
      "kid": "e0fa0842-50d7-40b2-821a-713cdfe69820",
      "qi": "JWZGcyhN2-sU7gGcgVQRq0QY-BW0gJcunivkYDex_gawJO40Dx2j965pKowBDcdK2AhWwAU2TbIIEKs04EQn8fLKnWqVLXaPUdW0nN5Y3NXzVwYi2XWx7RJ6AnUGoAgrVAP1mMelEM2RpdAk_dc-ebnmMkLPFFUbmaECeHLJ9Qs",
      "dp": "1jbGFRnXiEtFGCDo3tyqLhXDUMSEGSDk1bosJCZ_qwF3GT1aOLJh0YDLohf5Xsq3JRzYmpXOAumdRG1Ab_Rv2OvU9KNT7G5VWpC4-aSQlp_jZvoV9dt_vWyVrPGxLVbZVRcvlojpISEb-MsbSaCGTQqxFVm4Zw3wvK1wJ5s6m3E",
      "dq": "hustjFPP7EZN2_HJgFhfU0TaIIEAyj4MCHr0Wnb0LyUbv_leLnoWbKdY1bTnHQUW5cLP1DBJvgktSnybbEz8orxGOjF9np7a8q2BbFSBLHkGd36VUzVCvL05cKrqFVQnxTGQu8Er1PhgRupWtxaK7lJ0CAFSOCUR73trXSYzWy0",
      "n": "wLRYw-Zl0F2XOI3gm-b5vZE5QkXbkZSwoMzlrWfylFrjbvkTDvJvJA7KtzjuUEd0eJVbhczf07EhfN0lHuDm1DTWp6TY3iGaT7tWeDqCelyxV-SswvBZIxE8ek3LgJdJiLMo9gRbSwAEsd3-KW1dEsgrLvxbcjMCn0Z-OvS_8hYptKzNFJTBK7DVQTbh1fGZ1QyeZ-3NDQMiPgyyk8UKa55hm8bTaEH3n1699CsiCOudO73ED4f9xhOrxjpCpCH67f2p6ys1HWD2sSR7mnBeHuWxh9rUmEdbVLQfGv7pz3l8ygzzeLuzwchpc5JerIo_Y5gTPyRo7kvIWPiKiTKQcw"
    },
    {
      "kty": "EC",
      "d": "oe83QrZbLIE8bI29Uu2nAVUrUcGeH2o7ARIxKnytZl4",
      "use": "sig",
      "crv": "P-256",
      "kid": "ce476180-3d7a-48ec-a13c-ebde5becfd4c",
      "x": "6Vr57Mk1s6M1DjvR_xoN_TCaOKHqnOc2StkMNmTVJAE",
      "y": "rxmmw01M-yGRYcIk7dgE7CKLvrKu8vUyPtV1oTWH5e8"
    },
    {
      "kty": "EC",
      "d": "cEyVSaYIYel-rS3MPU6lqesVYUoibt_bYRHfTGx6ZV8",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "379625cf-b905-455d-bad3-74013f142290",
      "x": "4Jn5Wz_QXwyDWg_TAAsSWhTvN-YnTE0fkgoSAHBc1WI",
      "y": "oNBIg2EMCy7PyVmSvgjfb52LS1DkDwrC7meNKqCa1pE"
    },
    {
      "kty": "OKP",
      "d": "p51v1McfrJeTjk11bYyRYmLP-g5S5FO484xKG0KVlfY",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "dadcb6f8-d7a5-483d-a8e4-7f4eaf01837d",
      "x": "f11Co2pxKVnj3m5AXIoaKf6Rr23FJOXeSYmHvyfTkVM"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "1HZDNcGk4jW8B9znwOd-bq16Ot_r8S-9jg_HjT33Rv58YHo4kQvu8gnB2LAEYmXfsQcZnhs9HM6UvTumximiTxeORVDIWkMxH__ybFOTrrWNHEI3LJkS25UhcCH_r3D9w0ukfUIXMYbPQljXZJmx28NRXz_m7xuDtOtfwXwe3iU",
      "kty": "RSA",
      "q": "szJyd-8ekme1cuX1S5B4xsE9EUTlP3ywaAw4xagXb5831aGkEay2NoIuO_HWIoYhH79EZjTeDUEXEuTLMlvmPqJW1Nen3V0YEnFYTxt1Qx1JpujV62_9yI9u0_XIibh8Yzm95FJ35P-BWIDQO6on7YyTWsb1HUEatpceXCO-dsk",
      "d": "etAOGsmwAyqValAdKPAxXXEueQfDKYbhBqnB2qO2TWDo_rehvklmklWzhPE57nlz1TIulLOs0ANKNB_ZGdg_PEyRVGi5FZ2uiOjb0eXmu8GzHOkB0InZ5kfaHKNa4SlFwt0QnnEB96qvWAYgAjz8hT7P0fdItfs_lloX0drRcq_FxRJr2Ctf5QRvSaY4E9oscQpVFTwbtZjEzrbypFkpMJiJ9X0PW6oOZVRhxn8zMYYLSnX0-paVMkYbMaMpOiQZ4-sItaDXzBJneoifYZgRoc66B1b5P0w0nIcYApKpYU8N8BZNlOewqUKh-_rYZWkVbGGP_fc8-O7G4MGpvmQNAQ",
      "e": "AQAB",
      "use": "enc",
      "kid": "d1c86a92-5d43-4e18-8275-66102fbd9e0b",
      "qi": "0FQ-QJNu1sA_KU_oDIRpSO157tisU3xqBzJgv7G8suOs6kNfJB3Hlq2joYAp98qq9v0R8ZrivsjpRiOkRb--xiopBa4EsZIWmSn0mkCd6NizrKsG6njD-Hm2eZLFUQ1axqH3I07P53WlfNvCQZL8pHXFKqWvAlCTbFyJJ-JSfoc",
      "dp": "bFSAoIBEGjNb1IaGhI2EodpCYJKcMzYsaKsTDKlz0_ceY_LttMdo5nCjLmFRWvqmvBTqsvsghfevT22C87d20u0n1aADCEMKYU6XxTQ4MPTRJn98sni6bMv1aL9tJ39tZI7FKDjyqoYaV7IE4X6ceXl1nCNxFKnq1ezNvlITSyE",
      "alg": "RSA-OAEP",
      "dq": "HCN4zBJ1V4IHgRJREVuPS45-e165LN30iXIZ3BfIDlQPHXGzZL8dIbQRdIJGIMe1HdoX8ICuuaAV8naQ3ciGgCFXxzZR-rWqmQLJXiquoCpSLW50YPMGA99aBNicc9vPVHl1swusHf5tHiukBypx-KBRZzjEtqJJgpB6SPen6dk",
      "n": "lLiPF-pBErTF75pRBjs7vbaRSQbBdBvACSIPYnPzqzFWiuHq_OlucKzjoZG5O_7MyynVRXNPrKw6id4Uob4L-sIKrQ93J_SEBgOUWl_bOb-p3YurDWnROmXyoA8Yu2mS2ItZoESSQwo2besmONMADGPZyI621ru4ygulifIqXv6n9gV9wdOTkkzoJyHt05dlA86ZYH_VrAjSTv3yOnZ2yQDQuKLMY3hJp8PDeaHgxHbd8jtZ4DmDLsrx4WSWnK4S7fNj8-IlmUusbh0anc4KRz35prkWecili-OnK7MWoZbUvaMnxe372cWNLsiuwnn7-GX6Kp3P94-fduC0nRd5DQ"
    },
    {
      "kty": "EC",
      "d": "sAxCUUBSPpBO1fuGVFn8cbVLLiUSmuERTgg05qmuQdI",
      "use": "enc",
      "crv": "P-256",
      "kid": "16c21b85-e375-439b-9483-70fa8d85afbb",
      "x": "6i9C2rophdwtH03_PV3_lH_HLCvurLqMH_UZQURnUx4",
      "y": "p0eGFdB6uLRxVkUSWXFW6rwAFn6LhYU_kXDRNcbJH00",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "e0fa0842-50d7-40b2-821a-713cdfe69820",
      "n": "wLRYw-Zl0F2XOI3gm-b5vZE5QkXbkZSwoMzlrWfylFrjbvkTDvJvJA7KtzjuUEd0eJVbhczf07EhfN0lHuDm1DTWp6TY3iGaT7tWeDqCelyxV-SswvBZIxE8ek3LgJdJiLMo9gRbSwAEsd3-KW1dEsgrLvxbcjMCn0Z-OvS_8hYptKzNFJTBK7DVQTbh1fGZ1QyeZ-3NDQMiPgyyk8UKa55hm8bTaEH3n1699CsiCOudO73ED4f9xhOrxjpCpCH67f2p6ys1HWD2sSR7mnBeHuWxh9rUmEdbVLQfGv7pz3l8ygzzeLuzwchpc5JerIo_Y5gTPyRo7kvIWPiKiTKQcw"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "3f1ef2f8-4b5c-4b66-a726-7e0dd6941b29",
      "n": "gr4-7p6MPv7kmUPXk7bLEKlpMY4YKH4xJZUB2dCLLswY112ZJkCWVAy3sZIgQpSU4DOWs91c6amqhs9nSWviPWjg-zR4YLAjwlVgSm2WYJyENpPvssru689e6OCkB2g5BOE9oSnbqiDcV-iKGcAY9W2SdWAg5QJDzDxyo5ndXJjjurJl0vWATutxO4pzoT1yxMDZ2i2LE5GHtGlRatgXhdd-qkCckVO_bZPYneqrhoPmj47Kg-GTTjxCg5h2L1Ngecf2gk-F-TyZfy8G6R2c_IMSit9H8_J4ytQkhBW3V4bE1MBMdBCHsvxZYKYBS28DDCUlUP2Q7rn_xKdTvbpyZw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "ce476180-3d7a-48ec-a13c-ebde5becfd4c",
      "x": "6Vr57Mk1s6M1DjvR_xoN_TCaOKHqnOc2StkMNmTVJAE",
      "y": "rxmmw01M-yGRYcIk7dgE7CKLvrKu8vUyPtV1oTWH5e8"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "95a57c34-b8d5-4f23-8923-0b0004e03eee",
      "x": "Me-W0HXuH0u90UisX9h8T7cFdArjbNoJVn9QMP3-p50",
      "y": "PlDwLev3mYW8nVgFiBrUFUhCSfcNGA3DRETlI9oKa-Q"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "379625cf-b905-455d-bad3-74013f142290",
      "x": "4Jn5Wz_QXwyDWg_TAAsSWhTvN-YnTE0fkgoSAHBc1WI",
      "y": "oNBIg2EMCy7PyVmSvgjfb52LS1DkDwrC7meNKqCa1pE"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "dadcb6f8-d7a5-483d-a8e4-7f4eaf01837d",
      "x": "f11Co2pxKVnj3m5AXIoaKf6Rr23FJOXeSYmHvyfTkVM"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "d1c86a92-5d43-4e18-8275-66102fbd9e0b",
      "alg": "RSA-OAEP",
      "n": "lLiPF-pBErTF75pRBjs7vbaRSQbBdBvACSIPYnPzqzFWiuHq_OlucKzjoZG5O_7MyynVRXNPrKw6id4Uob4L-sIKrQ93J_SEBgOUWl_bOb-p3YurDWnROmXyoA8Yu2mS2ItZoESSQwo2besmONMADGPZyI621ru4ygulifIqXv6n9gV9wdOTkkzoJyHt05dlA86ZYH_VrAjSTv3yOnZ2yQDQuKLMY3hJp8PDeaHgxHbd8jtZ4DmDLsrx4WSWnK4S7fNj8-IlmUusbh0anc4KRz35prkWecili-OnK7MWoZbUvaMnxe372cWNLsiuwnn7-GX6Kp3P94-fduC0nRd5DQ"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "16c21b85-e375-439b-9483-70fa8d85afbb",
      "x": "6i9C2rophdwtH03_PV3_lH_HLCvurLqMH_UZQURnUx4",
      "y": "p0eGFdB6uLRxVkUSWXFW6rwAFn6LhYU_kXDRNcbJH00",
      "alg": "ECDH-ES"
    }
  ]
}
2022-10-13 07:17:48 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2022-10-13 07:17:48 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2022-10-13 07:17:48 SUCCESS
OIDCCLoadUserInfo
Added user information
user_info
{
  "sub": "user-subject-1234531",
  "name": "Demo T. User",
  "given_name": "Demo",
  "family_name": "User",
  "middle_name": "Theresa",
  "nickname": "Dee",
  "preferred_username": "d.tu",
  "gender": "female",
  "birthdate": "2000-02-03",
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "zoneinfo": "America/Los_Angeles",
  "locale": "en-US",
  "phone_number": "+1 555 5550000",
  "phone_number_verified": false,
  "email": "user@example.com",
  "email_verified": false,
  "website": "https://openid.net/",
  "profile": "https://example.com/user",
  "updated_at": 1580000000
}
2022-10-13 07:17:48 SUCCESS
OIDCCGetStaticClientConfigurationForRPTests
Found a static client object
client_id
oidc-test-client
client_secret
123456
redirect_uris
[
  "https://gkidp.ipanda.co.jp/gkidp/global_login/DM001003/callback/01"
]
2022-10-13 07:17:48 SUCCESS
EnsureClientDoesNotHaveBothJwksAndJwksUri
Client does not have both jwks and jwks_uri set
client
{
  "client_id": "oidc-test-client",
  "client_secret": "123456",
  "redirect_uris": [
    "https://gkidp.ipanda.co.jp/gkidp/global_login/DM001003/callback/01"
  ]
}
2022-10-13 07:17:48 INFO
FetchClientKeys
Skipped evaluation due to missing required element: client jwks_uri
path
jwks_uri
mapped
object
client
2022-10-13 07:17:48 SUCCESS
ValidateClientGrantTypes
grant_types match response_types
grant_types
[
  "authorization_code"
]
response_types
[
  "code"
]
2022-10-13 07:17:48 SUCCESS
OIDCCValidateClientRedirectUris
Valid redirect_uri(s) provided in registration request
redirect_uris
[
  "https://gkidp.ipanda.co.jp/gkidp/global_login/DM001003/callback/01"
]
2022-10-13 07:17:48 SUCCESS
ValidateClientLogoUris
Client does not contain any logo_uri
2022-10-13 07:17:48 SUCCESS
ValidateClientUris
Client does not contain any client_uri
2022-10-13 07:17:48 SUCCESS
ValidateClientPolicyUris
Client does not contain any policy_uri
2022-10-13 07:17:48 SUCCESS
ValidateClientTosUris
Client does not contain any tos_uri
2022-10-13 07:17:48 SUCCESS
ValidateClientSubjectType
A subject_type was not provided
2022-10-13 07:17:48 INFO
ValidateIdTokenSignedResponseAlg
Skipped evaluation due to missing required element: client id_token_signed_response_alg
path
id_token_signed_response_alg
mapped
object
client
2022-10-13 07:17:48 SUCCESS
EnsureIdTokenEncryptedResponseAlgIsSetIfEncIsSet
id_token_encrypted_response_enc is not set
2022-10-13 07:17:48 INFO
ValidateUserinfoSignedResponseAlg
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2022-10-13 07:17:48 SUCCESS
EnsureUserinfoEncryptedResponseAlgIsSetIfEncIsSet
userinfo_encrypted_response_enc is not set
2022-10-13 07:17:48 INFO
ValidateRequestObjectSigningAlg
Skipped evaluation due to missing required element: client request_object_signing_alg
path
request_object_signing_alg
mapped
object
client
2022-10-13 07:17:48 SUCCESS
EnsureRequestObjectEncryptionAlgIsSetIfEncIsSet
request_object_encryption_enc is not set
2022-10-13 07:17:48 INFO
ValidateTokenEndpointAuthSigningAlg
Skipped evaluation due to missing required element: client token_endpoint_auth_signing_alg
path
token_endpoint_auth_signing_alg
mapped
object
client
2022-10-13 07:17:48 SUCCESS
ValidateDefaultMaxAge
default_max_age is not set
2022-10-13 07:17:48 INFO
ValidateRequireAuthTime
Skipped evaluation due to missing required element: client require_auth_time
path
require_auth_time
mapped
object
client
2022-10-13 07:17:48 INFO
ValidateDefaultAcrValues
Skipped evaluation due to missing required element: client default_acr_values
path
default_acr_values
mapped
object
client
2022-10-13 07:17:48 INFO
ValidateInitiateLoginUri
Skipped evaluation due to missing required element: client initiate_login_uri
path
initiate_login_uri
mapped
object
client
2022-10-13 07:17:48 INFO
ValidateRequestUris
Skipped evaluation due to missing required element: client request_uris
path
request_uris
mapped
object
client
2022-10-13 07:17:48 SUCCESS
OIDCCExtractServerSigningAlg
Using the default algorithm for the first key in server jwks
signing_algorithm
RS256
2022-10-13 07:17:48
SetClientIdTokenSignedResponseAlgToServerSigningAlg
Set id_token_signed_response_alg for the registered client
id_token_signed_response_alg
RS256
2022-10-13 07:17:48
oidcc-client-test-client-secret-basic
Setup Done
2022-10-13 07:18:05 INCOMING
oidcc-client-test-client-secret-basic
Incoming HTTP request to /test/a/GC_broker/.well-known/openid-configuration
incoming_headers
{
  "host": "www.certification.openid.net",
  "accept": "text/plain, application/json, */*",
  "user-agent": "Java/11.0.13",
  "connection": "close"
}
incoming_path
/test/a/GC_broker/.well-known/openid-configuration
incoming_body_form_params
incoming_method
GET
incoming_tls_version
TLSv1.2
incoming_tls_cert
incoming_query_string_params
{}
incoming_body
incoming_tls_chain
[
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL"
]
incoming_tls_cipher
ECDHE-RSA-AES256-GCM-SHA384
incoming_body_json
Discovery endpoint
2022-10-13 07:18:05 OUTGOING
oidcc-client-test-client-secret-basic
Response to HTTP request to test instance hZ8jpNyWzNzYWwL
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "issuer": "https://www.certification.openid.net/test/a/GC_broker/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/GC_broker/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/GC_broker/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/GC_broker/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/GC_broker/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/GC_broker/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "preferred_username",
    "gender",
    "birthdate",
    "address",
    "zoneinfo",
    "locale",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified",
    "website",
    "profile",
    "updated_at"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "RSA-OAEP-384",
    "RSA-OAEP-512",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "RSA-OAEP-384",
    "RSA-OAEP-512",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "RSA-OAEP-384",
    "RSA-OAEP-512",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
outgoing_path
.well-known/openid-configuration
2022-10-13 07:18:06 INCOMING
oidcc-client-test-client-secret-basic
Incoming HTTP request to /test/a/GC_broker/authorize
incoming_headers
{
  "host": "www.certification.openid.net",
  "cache-control": "max-age\u003d0",
  "upgrade-insecure-requests": "1",
  "user-agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/avif,image/webp,image/apng,*/*;q\u003d0.8,application/signed-exchange;v\u003db3;q\u003d0.9",
  "sec-fetch-site": "cross-site",
  "sec-fetch-mode": "navigate",
  "sec-fetch-user": "?1",
  "sec-fetch-dest": "document",
  "sec-ch-ua": "\"Chromium\";v\u003d\"106\", \"Google Chrome\";v\u003d\"106\", \"Not;A\u003dBrand\";v\u003d\"99\"",
  "sec-ch-ua-mobile": "?0",
  "sec-ch-ua-platform": "\"Windows\"",
  "referer": "https://gkidp.ipanda.co.jp/",
  "accept-encoding": "gzip, deflate, br",
  "accept-language": "en",
  "connection": "close"
}
incoming_path
/test/a/GC_broker/authorize
incoming_body_form_params
incoming_method
GET
incoming_tls_version
TLSv1.2
incoming_tls_cert
incoming_query_string_params
{
  "client_id": "oidc-test-client",
  "response_type": "code",
  "redirect_uri": "https://gkidp.ipanda.co.jp/gkidp/global_login/DM001003/callback/01",
  "scope": "openid email phone profile",
  "code_challenge_method": "S256",
  "code_challenge": "vynCzcN1xTzkb6NLk8huLPZxKW_sOYB6jScP7xrxTso",
  "state": "a72lcppa311fsd61jmrj9c2d54ovn8ag"
}
incoming_body
incoming_tls_chain
[
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL"
]
incoming_tls_cipher
ECDHE-RSA-AES128-GCM-SHA256
incoming_body_json
Authorization endpoint
2022-10-13 07:18:06 SUCCESS
EnsureRequestDoesNotContainRequestObject
Request does not contain a request parameter
2022-10-13 07:18:06 SUCCESS
EnsureAuthorizationHttpRequestContainsOpenIDScope
Found 'openid' in scope http request parameter
actual
[
  "openid",
  "email",
  "phone",
  "profile"
]
expected
openid
2022-10-13 07:18:06 SUCCESS
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
effective_authorization_endpoint_request
{
  "client_id": "oidc-test-client",
  "response_type": "code",
  "redirect_uri": "https://gkidp.ipanda.co.jp/gkidp/global_login/DM001003/callback/01",
  "scope": "openid email phone profile",
  "code_challenge_method": "S256",
  "code_challenge": "vynCzcN1xTzkb6NLk8huLPZxKW_sOYB6jScP7xrxTso",
  "state": "a72lcppa311fsd61jmrj9c2d54ovn8ag"
}
2022-10-13 07:18:06 SUCCESS
ExtractRequestedScopes
Requested scopes
scope
openid email phone profile
2022-10-13 07:18:06 INFO
ExtractNonceFromAuthorizationRequest
Couldn't find 'nonce' in authorization endpoint parameters
2022-10-13 07:18:06 SUCCESS
EnsureAuthorizationRequestContainsPkceCodeChallenge
Found required PKCE parameters in request
code_challenge_method
S256
code_challenge
vynCzcN1xTzkb6NLk8huLPZxKW_sOYB6jScP7xrxTso
2022-10-13 07:18:06 SUCCESS
EnsureResponseTypeIsCode
Response type is expected value
expected
code
2022-10-13 07:18:06 SUCCESS
EnsureMatchingClientId
Client ID matched
client_id
oidc-test-client
2022-10-13 07:18:06 SUCCESS
EnsureValidRedirectUriForAuthorizationEndpointRequest
redirect_uri is one of the allowed redirect uris
actual
https://gkidp.ipanda.co.jp/gkidp/global_login/DM001003/callback/01
expected
[
  "https://gkidp.ipanda.co.jp/gkidp/global_login/DM001003/callback/01"
]
2022-10-13 07:18:06 SUCCESS
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
actual
[
  "openid",
  "email",
  "phone",
  "profile"
]
expected
openid
2022-10-13 07:18:06 SUCCESS
DisallowMaxAgeEqualsZeroAndPromptNone
The client did not send max_age=0 and prompt=none parameters as expected
2022-10-13 07:18:06 SUCCESS
CreateAuthorizationCode
Created authorization code
authorization_code
sB79yRUSDkgdIftJwXT1xzq0BlQk3vAp
2022-10-13 07:18:06 SUCCESS
CalculateCHash
Successful c_hash encoding
c_hash
IjRqyu0HAfLP6RdwHa3wVw
2022-10-13 07:18:06 SUCCESS
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
params
{
  "redirect_uri": "https://gkidp.ipanda.co.jp/gkidp/global_login/DM001003/callback/01",
  "state": "a72lcppa311fsd61jmrj9c2d54ovn8ag"
}
2022-10-13 07:18:06 SUCCESS
AddCodeToAuthorizationEndpointResponseParams
Added code to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://gkidp.ipanda.co.jp/gkidp/global_login/DM001003/callback/01",
  "state": "a72lcppa311fsd61jmrj9c2d54ovn8ag",
  "code": "sB79yRUSDkgdIftJwXT1xzq0BlQk3vAp"
}
2022-10-13 07:18:06
SendAuthorizationResponseWithResponseModeQuery
Redirecting back to client
uri
https://gkidp.ipanda.co.jp/gkidp/global_login/DM001003/callback/01?state=a72lcppa311fsd61jmrj9c2d54ovn8ag&code=sB79yRUSDkgdIftJwXT1xzq0BlQk3vAp
2022-10-13 07:18:06 OUTGOING
oidcc-client-test-client-secret-basic
Response to HTTP request to test instance hZ8jpNyWzNzYWwL
outgoing
org.springframework.web.servlet.view.RedirectView: [RedirectView]; URL [https://gkidp.ipanda.co.jp/gkidp/global_login/DM001003/callback/01?state=a72lcppa311fsd61jmrj9c2d54ovn8ag&code=sB79yRUSDkgdIftJwXT1xzq0BlQk3vAp]
outgoing_path
authorize
2022-10-13 07:18:06 INCOMING
oidcc-client-test-client-secret-basic
Incoming HTTP request to /test/a/GC_broker/token
incoming_headers
{
  "host": "www.certification.openid.net",
  "accept": "application/json",
  "authorization": "Basic b2lkYy10ZXN0LWNsaWVudDoxMjM0NTY\u003d",
  "content-type": "application/x-www-form-urlencoded;charset\u003dUTF-8",
  "user-agent": "Java/11.0.13",
  "connection": "close",
  "content-length": "241"
}
incoming_path
/test/a/GC_broker/token
incoming_body_form_params
{
  "client_id": "oidc-test-client",
  "grant_type": "authorization_code",
  "code": "sB79yRUSDkgdIftJwXT1xzq0BlQk3vAp",
  "code_verifier": "7f7225d5-efb2-4aca-aa61-1e032bbe061f",
  "redirect_uri": "https://gkidp.ipanda.co.jp/gkidp/global_login/DM001003/callback/01"
}
incoming_method
POST
incoming_tls_version
TLSv1.2
incoming_tls_cert
incoming_query_string_params
{}
incoming_body
client_id=oidc-test-client&grant_type=authorization_code&code=sB79yRUSDkgdIftJwXT1xzq0BlQk3vAp&code_verifier=7f7225d5-efb2-4aca-aa61-1e032bbe061f&redirect_uri=https%3A%2F%2Fgkidp.ipanda.co.jp%2Fgkidp%2Fglobal_login%2FDM001003%2Fcallback%2F01
incoming_tls_chain
[
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL"
]
incoming_tls_cipher
ECDHE-RSA-AES256-GCM-SHA384
incoming_body_json
Token endpoint
2022-10-13 07:18:06 SUCCESS
CheckClientIdMatchesOnTokenRequestIfPresent
Extracted client_id matches the expected value
client_id
oidc-test-client
2022-10-13 07:18:06 SUCCESS
ExtractClientCredentialsFromBasicAuthorizationHeader
Extracted client authentication
client_id
oidc-test-client
client_secret
123456
method
client_secret_basic
2022-10-13 07:18:06 SUCCESS
ValidateClientIdAndSecret
Client id and secret match
2022-10-13 07:18:06 SUCCESS
ValidateAuthorizationCode
Found authorization code
authorization_code
sB79yRUSDkgdIftJwXT1xzq0BlQk3vAp
2022-10-13 07:18:06 SUCCESS
ValidateRedirectUriForTokenEndpointRequest
redirect_uri is the same as the one used in the authorization request
actual
https://gkidp.ipanda.co.jp/gkidp/global_login/DM001003/callback/01
2022-10-13 07:18:06 SUCCESS
GenerateBearerAccessToken
Generated access token
access_token
CCdqrvJkBRdNTOcsoHSLytcPApLGH4hhJ44wfS3DvGuosgYLbJ
2022-10-13 07:18:06 SUCCESS
CalculateAtHash
Successful at_hash encoding
at_hash
-msPzb072M8MsAwCTDNlAg
2022-10-13 07:18:06 SUCCESS
GenerateIdTokenClaims
Created ID Token Claims
iss
https://www.certification.openid.net/test/a/GC_broker/
sub
user-subject-1234531
aud
oidc-test-client
iat
1665645486
exp
1665645786
2022-10-13 07:18:06 SUCCESS
AddAtHashToIdTokenClaims
Added at_hash to ID token claims
at_hash
-msPzb072M8MsAwCTDNlAg
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/a/GC_broker/",
  "sub": "user-subject-1234531",
  "aud": "oidc-test-client",
  "iat": 1665645486,
  "exp": 1665645786,
  "at_hash": "-msPzb072M8MsAwCTDNlAg"
}
2022-10-13 07:18:06 SUCCESS
OIDCCSignIdToken
Signed the ID token
id_token
eyJraWQiOiJlMGZhMDg0Mi01MGQ3LTQwYjItODIxYS03MTNjZGZlNjk4MjAiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiLW1zUHpiMDcyTThNc0F3Q1RETmxBZyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoib2lkYy10ZXN0LWNsaWVudCIsImlzcyI6Imh0dHBzOlwvXC93d3cuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0XC90ZXN0XC9hXC9HQ19icm9rZXJcLyIsImV4cCI6MTY2NTY0NTc4NiwiaWF0IjoxNjY1NjQ1NDg2fQ.X5AlEVyloKu_gP_GiutHQMx634w_25RUD36RtbJKv-SamoC9V429FCgaISWeW8ShYfGYuFE0aXssJRhzYZAqdz_9cRJZC-738q_jxEBfIym8qMsg2UlbUB_Aj4fs8Fz2Pn1BobnnEds1CF8yINXMOncI4ZJAM703bzV24EjI4eTxzndklfkTHcl2sLeyYrVYJiYrX7IEesrQQd3d0wKwwArSczDEjIepcCz7qKeo141LXvh0mescpoyP4MTPRmf2wZiFDlTqqcmvbc54TUNiSE9f3m3l9J8iehDFg5RhTAMWD9YkIuEQD3tiGroZmD2qfvfUGdZXF7HEvlYdZfo9Jw
key
{"p":"9jX3inp_n5xamTbComgXwO3ZokFa8yVmDXbpj-oJKmfGOKlUTpJWisKM_PH9aI4v4HuLhJTOx1bCRHgza8FuamdAopk5sy7l3889hNQsTN1wU3XZPrxpNKf2fSH8uii5Yu-yVjQdSB0m2l9g6G_9VMl8uQWuy21-IpSA5MWgYeU","kty":"RSA","q":"yF3FUFRBe5BC1083P_khMQUUBX6NK3ddJQQxdNE_UyLtbmxsIWpifpDZXAymqdsO-LxDwBitXzBXjCEfmQWzue2-cHgOqmoHaTjQ5QNcmhakIEh4rAz7f5aA1yygP9kACunowc_xF5aXN6udq0QC87K-Z4t7R9j7j0JAuEAL43c","d":"AYOpSujNlgSWQqCCylbXUZEJlSa9Yfh8JtdVWrZ9ZoMMVHvqlWx8SRlAqI3u-XyGQshRrsx8WcqDi9qlBwgXaEV-BlU6SwySjNvZAxramaGO1zT50pJW8Pqasg9YcQs_Ta6yvLQuD3nRj6BB9gtg9tvR0w2ynkQeWigQp9_yfjGA4gJgsgHGxSle2kXRcBZfY1yA7bMVutYVyT9i8VeRN9dAXftA3sB1tu0dxfwouEWASNOf9qJHL7yA52ptxwXPpuYhQ1cQAH90NubwfsqY2iJIzQOharnHPFp_8Xk3jDNdKrCKW_FcvruAEldO-gMDiK_nTEyyTZ5OBPnvheARSQ","e":"AQAB","use":"sig","kid":"e0fa0842-50d7-40b2-821a-713cdfe69820","qi":"JWZGcyhN2-sU7gGcgVQRq0QY-BW0gJcunivkYDex_gawJO40Dx2j965pKowBDcdK2AhWwAU2TbIIEKs04EQn8fLKnWqVLXaPUdW0nN5Y3NXzVwYi2XWx7RJ6AnUGoAgrVAP1mMelEM2RpdAk_dc-ebnmMkLPFFUbmaECeHLJ9Qs","dp":"1jbGFRnXiEtFGCDo3tyqLhXDUMSEGSDk1bosJCZ_qwF3GT1aOLJh0YDLohf5Xsq3JRzYmpXOAumdRG1Ab_Rv2OvU9KNT7G5VWpC4-aSQlp_jZvoV9dt_vWyVrPGxLVbZVRcvlojpISEb-MsbSaCGTQqxFVm4Zw3wvK1wJ5s6m3E","dq":"hustjFPP7EZN2_HJgFhfU0TaIIEAyj4MCHr0Wnb0LyUbv_leLnoWbKdY1bTnHQUW5cLP1DBJvgktSnybbEz8orxGOjF9np7a8q2BbFSBLHkGd36VUzVCvL05cKrqFVQnxTGQu8Er1PhgRupWtxaK7lJ0CAFSOCUR73trXSYzWy0","n":"wLRYw-Zl0F2XOI3gm-b5vZE5QkXbkZSwoMzlrWfylFrjbvkTDvJvJA7KtzjuUEd0eJVbhczf07EhfN0lHuDm1DTWp6TY3iGaT7tWeDqCelyxV-SswvBZIxE8ek3LgJdJiLMo9gRbSwAEsd3-KW1dEsgrLvxbcjMCn0Z-OvS_8hYptKzNFJTBK7DVQTbh1fGZ1QyeZ-3NDQMiPgyyk8UKa55hm8bTaEH3n1699CsiCOudO73ED4f9xhOrxjpCpCH67f2p6ys1HWD2sSR7mnBeHuWxh9rUmEdbVLQfGv7pz3l8ygzzeLuzwchpc5JerIo_Y5gTPyRo7kvIWPiKiTKQcw"}
algorithm
RS256
2022-10-13 07:18:06 INFO
EncryptIdToken
Skipped evaluation due to missing required element: client id_token_encrypted_response_alg
path
id_token_encrypted_response_alg
mapped
object
client
2022-10-13 07:18:06 SUCCESS
CreateTokenEndpointResponse
Created token endpoint response
access_token
CCdqrvJkBRdNTOcsoHSLytcPApLGH4hhJ44wfS3DvGuosgYLbJ
token_type
Bearer
id_token
eyJraWQiOiJlMGZhMDg0Mi01MGQ3LTQwYjItODIxYS03MTNjZGZlNjk4MjAiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiLW1zUHpiMDcyTThNc0F3Q1RETmxBZyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoib2lkYy10ZXN0LWNsaWVudCIsImlzcyI6Imh0dHBzOlwvXC93d3cuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0XC90ZXN0XC9hXC9HQ19icm9rZXJcLyIsImV4cCI6MTY2NTY0NTc4NiwiaWF0IjoxNjY1NjQ1NDg2fQ.X5AlEVyloKu_gP_GiutHQMx634w_25RUD36RtbJKv-SamoC9V429FCgaISWeW8ShYfGYuFE0aXssJRhzYZAqdz_9cRJZC-738q_jxEBfIym8qMsg2UlbUB_Aj4fs8Fz2Pn1BobnnEds1CF8yINXMOncI4ZJAM703bzV24EjI4eTxzndklfkTHcl2sLeyYrVYJiYrX7IEesrQQd3d0wKwwArSczDEjIepcCz7qKeo141LXvh0mescpoyP4MTPRmf2wZiFDlTqqcmvbc54TUNiSE9f3m3l9J8iehDFg5RhTAMWD9YkIuEQD3tiGroZmD2qfvfUGdZXF7HEvlYdZfo9Jw
scope
openid email phone profile
2022-10-13 07:18:06 OUTGOING
oidcc-client-test-client-secret-basic
Response to HTTP request to test instance hZ8jpNyWzNzYWwL
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "access_token": "CCdqrvJkBRdNTOcsoHSLytcPApLGH4hhJ44wfS3DvGuosgYLbJ",
  "token_type": "Bearer",
  "id_token": "eyJraWQiOiJlMGZhMDg0Mi01MGQ3LTQwYjItODIxYS03MTNjZGZlNjk4MjAiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiLW1zUHpiMDcyTThNc0F3Q1RETmxBZyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoib2lkYy10ZXN0LWNsaWVudCIsImlzcyI6Imh0dHBzOlwvXC93d3cuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0XC90ZXN0XC9hXC9HQ19icm9rZXJcLyIsImV4cCI6MTY2NTY0NTc4NiwiaWF0IjoxNjY1NjQ1NDg2fQ.X5AlEVyloKu_gP_GiutHQMx634w_25RUD36RtbJKv-SamoC9V429FCgaISWeW8ShYfGYuFE0aXssJRhzYZAqdz_9cRJZC-738q_jxEBfIym8qMsg2UlbUB_Aj4fs8Fz2Pn1BobnnEds1CF8yINXMOncI4ZJAM703bzV24EjI4eTxzndklfkTHcl2sLeyYrVYJiYrX7IEesrQQd3d0wKwwArSczDEjIepcCz7qKeo141LXvh0mescpoyP4MTPRmf2wZiFDlTqqcmvbc54TUNiSE9f3m3l9J8iehDFg5RhTAMWD9YkIuEQD3tiGroZmD2qfvfUGdZXF7HEvlYdZfo9Jw",
  "scope": "openid email phone profile"
}
outgoing_path
token
2022-10-13 07:18:07 INCOMING
oidcc-client-test-client-secret-basic
Incoming HTTP request to /test/a/GC_broker/jwks
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Java/11.0.13",
  "accept": "text/html, image/gif, image/jpeg, *; q\u003d.2, */*; q\u003d.2",
  "connection": "close"
}
incoming_path
/test/a/GC_broker/jwks
incoming_body_form_params
incoming_method
GET
incoming_tls_version
TLSv1.2
incoming_tls_cert
incoming_query_string_params
{}
incoming_body
incoming_tls_chain
[
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL"
]
incoming_tls_cipher
ECDHE-RSA-AES256-GCM-SHA384
incoming_body_json
Jwks endpoint
2022-10-13 07:18:07 OUTGOING
oidcc-client-test-client-secret-basic
Response to HTTP request to test instance hZ8jpNyWzNzYWwL
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "e0fa0842-50d7-40b2-821a-713cdfe69820",
      "n": "wLRYw-Zl0F2XOI3gm-b5vZE5QkXbkZSwoMzlrWfylFrjbvkTDvJvJA7KtzjuUEd0eJVbhczf07EhfN0lHuDm1DTWp6TY3iGaT7tWeDqCelyxV-SswvBZIxE8ek3LgJdJiLMo9gRbSwAEsd3-KW1dEsgrLvxbcjMCn0Z-OvS_8hYptKzNFJTBK7DVQTbh1fGZ1QyeZ-3NDQMiPgyyk8UKa55hm8bTaEH3n1699CsiCOudO73ED4f9xhOrxjpCpCH67f2p6ys1HWD2sSR7mnBeHuWxh9rUmEdbVLQfGv7pz3l8ygzzeLuzwchpc5JerIo_Y5gTPyRo7kvIWPiKiTKQcw"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "3f1ef2f8-4b5c-4b66-a726-7e0dd6941b29",
      "n": "gr4-7p6MPv7kmUPXk7bLEKlpMY4YKH4xJZUB2dCLLswY112ZJkCWVAy3sZIgQpSU4DOWs91c6amqhs9nSWviPWjg-zR4YLAjwlVgSm2WYJyENpPvssru689e6OCkB2g5BOE9oSnbqiDcV-iKGcAY9W2SdWAg5QJDzDxyo5ndXJjjurJl0vWATutxO4pzoT1yxMDZ2i2LE5GHtGlRatgXhdd-qkCckVO_bZPYneqrhoPmj47Kg-GTTjxCg5h2L1Ngecf2gk-F-TyZfy8G6R2c_IMSit9H8_J4ytQkhBW3V4bE1MBMdBCHsvxZYKYBS28DDCUlUP2Q7rn_xKdTvbpyZw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "ce476180-3d7a-48ec-a13c-ebde5becfd4c",
      "x": "6Vr57Mk1s6M1DjvR_xoN_TCaOKHqnOc2StkMNmTVJAE",
      "y": "rxmmw01M-yGRYcIk7dgE7CKLvrKu8vUyPtV1oTWH5e8"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "95a57c34-b8d5-4f23-8923-0b0004e03eee",
      "x": "Me-W0HXuH0u90UisX9h8T7cFdArjbNoJVn9QMP3-p50",
      "y": "PlDwLev3mYW8nVgFiBrUFUhCSfcNGA3DRETlI9oKa-Q"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "379625cf-b905-455d-bad3-74013f142290",
      "x": "4Jn5Wz_QXwyDWg_TAAsSWhTvN-YnTE0fkgoSAHBc1WI",
      "y": "oNBIg2EMCy7PyVmSvgjfb52LS1DkDwrC7meNKqCa1pE"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "dadcb6f8-d7a5-483d-a8e4-7f4eaf01837d",
      "x": "f11Co2pxKVnj3m5AXIoaKf6Rr23FJOXeSYmHvyfTkVM"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "d1c86a92-5d43-4e18-8275-66102fbd9e0b",
      "alg": "RSA-OAEP",
      "n": "lLiPF-pBErTF75pRBjs7vbaRSQbBdBvACSIPYnPzqzFWiuHq_OlucKzjoZG5O_7MyynVRXNPrKw6id4Uob4L-sIKrQ93J_SEBgOUWl_bOb-p3YurDWnROmXyoA8Yu2mS2ItZoESSQwo2besmONMADGPZyI621ru4ygulifIqXv6n9gV9wdOTkkzoJyHt05dlA86ZYH_VrAjSTv3yOnZ2yQDQuKLMY3hJp8PDeaHgxHbd8jtZ4DmDLsrx4WSWnK4S7fNj8-IlmUusbh0anc4KRz35prkWecili-OnK7MWoZbUvaMnxe372cWNLsiuwnn7-GX6Kp3P94-fduC0nRd5DQ"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "16c21b85-e375-439b-9483-70fa8d85afbb",
      "x": "6i9C2rophdwtH03_PV3_lH_HLCvurLqMH_UZQURnUx4",
      "y": "p0eGFdB6uLRxVkUSWXFW6rwAFn6LhYU_kXDRNcbJH00",
      "alg": "ECDH-ES"
    }
  ]
}
outgoing_path
jwks
2022-10-13 07:18:07 INCOMING
oidcc-client-test-client-secret-basic
Incoming HTTP request to /test/a/GC_broker/userinfo
incoming_headers
{
  "host": "www.certification.openid.net",
  "accept": "text/plain, application/json, */*",
  "authorization": "Bearer CCdqrvJkBRdNTOcsoHSLytcPApLGH4hhJ44wfS3DvGuosgYLbJ",
  "user-agent": "Java/11.0.13",
  "connection": "close"
}
incoming_path
/test/a/GC_broker/userinfo
incoming_body_form_params
incoming_method
GET
incoming_tls_version
TLSv1.2
incoming_tls_cert
incoming_query_string_params
{}
incoming_body
incoming_tls_chain
[
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL"
]
incoming_tls_cipher
ECDHE-RSA-AES256-GCM-SHA384
incoming_body_json
Userinfo endpoint
2022-10-13 07:18:07 SUCCESS
OIDCCExtractBearerAccessTokenFromRequest
Found access token on incoming request
access_token
CCdqrvJkBRdNTOcsoHSLytcPApLGH4hhJ44wfS3DvGuosgYLbJ
2022-10-13 07:18:07 SUCCESS
RequireBearerAccessToken
Found access token in request
actual
CCdqrvJkBRdNTOcsoHSLytcPApLGH4hhJ44wfS3DvGuosgYLbJ
2022-10-13 07:18:07 SUCCESS
FilterUserInfoForScopes
User info endpoint output
sub
user-subject-1234531
email
user@example.com
email_verified
false
phone_number_verified
false
phone_number
+1 555 5550000
website
https://openid.net/
zoneinfo
America/Los_Angeles
birthdate
2000-02-03
gender
female
profile
https://example.com/user
preferred_username
d.tu
given_name
Demo
middle_name
Theresa
locale
en-US
updated_at
1580000000
name
Demo T. User
nickname
Dee
family_name
User
2022-10-13 07:18:07
ClearAccessTokenFromRequest
Removed incoming access token from environment
2022-10-13 07:18:07 INFO
AddIssAndAudToUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2022-10-13 07:18:07 INFO
SignUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2022-10-13 07:18:07 INFO
EncryptUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_encrypted_response_alg
path
userinfo_encrypted_response_alg
mapped
object
client
2022-10-13 07:18:07 OUTGOING
oidcc-client-test-client-secret-basic
Response to HTTP request to test instance hZ8jpNyWzNzYWwL
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "sub": "user-subject-1234531",
  "email": "user@example.com",
  "email_verified": false,
  "phone_number_verified": false,
  "phone_number": "+1 555 5550000",
  "website": "https://openid.net/",
  "zoneinfo": "America/Los_Angeles",
  "birthdate": "2000-02-03",
  "gender": "female",
  "profile": "https://example.com/user",
  "preferred_username": "d.tu",
  "given_name": "Demo",
  "middle_name": "Theresa",
  "locale": "en-US",
  "updated_at": 1580000000,
  "name": "Demo T. User",
  "nickname": "Dee",
  "family_name": "User"
}
outgoing_path
userinfo
2022-10-13 07:18:07 FINISHED
oidcc-client-test-client-secret-basic
Test has run to completion
testmodule_result
PASSED
Test Results