Test Summary

Test Results

Expand All Collapse All
All times are UTC
2022-11-22 08:17:47 INFO
TEST-RUNNER
Test instance w5TWFzoGjNic8Vl created
baseUrl
https://www.certification.openid.net/test/a/tal_test
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code",
  "request_type": "plain_http_request",
  "response_mode": "default",
  "client_registration": "static_client"
}
alias
tal_test
description
OIDC basic RP
planId
e8h4aJW3KlCcO
config
{
  "keys": [
    {
      "kty": "RSA",
      "n": "pD35mn3PUlIIRrShaxHkggSi1QdIElCRlfVNogupS2PidMDqnO7MDW3hEteZPzxHuARva09X8lSzoT8Ad5zl8fGO0WP0YXTTJKMEqpAHoBmimOX6XnVs7USSxPLVGIGO4pdjKQUeUlTXEcuRUuABa6h13Dj2v0TB6ako8Fa_YDvRxsqkd73SCaDp7Isnx3uy9PlyO9Uc5pupyf2Tq1oqP-NnxYgYl7F8AMgtpZhTqLT3b6xw4I4vjQy3vKBo3kJK8LacnVtKdXJDTZat75qATDDS0Pht8mtwpGPBN0T_j06k7Hx5tZVQHJn1FZGbOzr5THCTKSoz_3Tay5ZN3vgDNw",
      "e": "AQAB",
      "alg": "RS256",
      "use": "sig",
      "kid": "QjA0MzI4REU2NTQzMDkzMzAxRDExRTJGRkY5ODNERkI0MkNFRkJENA"
    }
  ],
  "alias": "tal_test",
  "description": "OIDC basic RP",
  "server": {
    "issuer": "https://us-oidc-op-tal.com/",
    "authorization_endpoint": "https://fidm.us1.gigya.com/oidc/op/v1.0/4_r4_M9P7uNb9K50G4XFmyEw/authorize",
    "token_endpoint": "https://fidm.us1.gigya.com/oidc/op/v1.0/4_r4_M9P7uNb9K50G4XFmyEw/token",
    "userinfo_endpoint": "https://fidm.us1.gigya.com/oidc/op/v1.0/4_r4_M9P7uNb9K50G4XFmyEw/userinfo",
    "jwks_uri": "https://fidm.us1.gigya.com/oidc/op/v1.0/4_r4_M9P7uNb9K50G4XFmyEw/.well-known/jwks"
  },
  "client": {
    "client_id": "hPNHrtzZmktTOROQam3V6jsB",
    "client_secret": "Pm2tl7mD0KVT1fgcuqIzw8h1_odnk6j6j3lf8Dqo0rw31pHfHQX_UbNsIca9MkffsX3jjgVW1zZnNT4dbG_kPA",
    "redirect_uri": "https://socialize.gigya.com/socialize.finalizeOidcLogin?"
  },
  "client_secret_post": {
    "client_id": "hPNHrtzZmktTOROQam3V6jsB",
    "client_secret": "Pm2tl7mD0KVT1fgcuqIzw8h1_odnk6j6j3lf8Dqo0rw31pHfHQX_UbNsIca9MkffsX3jjgVW1zZnNT4dbG_kPA"
  },
  "client2": {
    "client_secret": "OsfJrq6QX1PITBWKKkAUbetQMZ5A3TQmr_18ldff8LkZqSfL7IBb5d7xsyB-HV4I3ppgrODHCKm-BfDLIHWl-g",
    "client_id": "u-NyAWylVfYwyPjl4tqKS9GY"
  },
  "consent": {}
}
testName
oidcc-client-test-missing-iat
2022-11-22 08:17:47 SUCCESS
OIDCCGenerateServerConfiguration
Generated default server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/tal_test/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/tal_test/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/tal_test/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/tal_test/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/tal_test/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/tal_test/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post",
    "client_secret_jwt",
    "private_key_jwt"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "preferred_username",
    "gender",
    "birthdate",
    "address",
    "zoneinfo",
    "locale",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified",
    "website",
    "profile",
    "updated_at"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "RSA-OAEP-384",
    "RSA-OAEP-512",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "RSA-OAEP-384",
    "RSA-OAEP-512",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "RSA-OAEP-384",
    "RSA-OAEP-512",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2022-11-22 08:17:47
SetTokenEndpointAuthMethodsSupportedToClientSecretBasicOnly
Changed token_endpoint_auth_methods_supported to client_secret_basic only in server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/tal_test/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/tal_test/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/tal_test/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/tal_test/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/tal_test/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/tal_test/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "preferred_username",
    "gender",
    "birthdate",
    "address",
    "zoneinfo",
    "locale",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified",
    "website",
    "profile",
    "updated_at"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "RSA-OAEP-384",
    "RSA-OAEP-512",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "RSA-OAEP-384",
    "RSA-OAEP-512",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "RSA-OAEP-384",
    "RSA-OAEP-512",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2022-11-22 08:17:47
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "4d_4qORC8C_gwlxKaptNjBHwPxUCNr_h9D0DqihyCVyvKQY0Uo8rca8njG_kZ4-O2t8G_lNfqZV2hjIu6Yt7Zh8RUtRov249jxoMAqH5vyOgZtTwuvRWdbGcgolQAm9UYguIv6M3mRxCm3zpZDVmxpveC356IMddrDPAHiDblR8",
      "kty": "RSA",
      "q": "nz3iKBdbjfkds8ZskkrxRcZhLVQwxJT24_-ymsbT-kO3-dgb7HHo5pJSFAdq3xhxnKgDVblLOQ_22_bBsV8NPN1Q-l05f78QWGqwFV71PpKM3VxBu6FB2Al_zBfwdOaPTk2V370HbeDDBHppr28kZcwTbT7ugTLt8iuQAUcWuQk",
      "d": "PQgbvtv2f3on7_bciEcfxn3aFhVHDqy02pdYgdc0_QU5QkNwXVWnj8YyNh23IdWq3MMj7YMHV_4vLgbbS85im5cFu60hrpzB5CRaLVJRKJWgdsZLLEgZonnODNSYjCVk6AKoyAKeDAbkgrIONKwB0moW45Z1WY5itpXyMHevboQfBN8csyNbggPxNOsxpXQQO-fu_bejYujnrhtNJE_1_mJrZGd7tAUTKx88_NquR_e6VjTe1uItVAE3MO9GC8LF4dXRJ92CUiOh56MnQvUNKA8zpanoAkMZUek3uWLIb6gvvLIwQlb2xXEP_r_Se7jrqiiWUKOsGyGZnLf3dF64wQ",
      "e": "AQAB",
      "use": "sig",
      "kid": "a9fddf8b-a116-4ca1-9fb6-2f1b40824e9d",
      "qi": "UeCKYsQrtPpn6HE0LvqJDjVGjOge7v2C9QSP8yk079alJFTzIQGmfRppQkDScUxNPwlk4igH4Wcv8vU2QXd0_D_c4-IIhNZf4blqiB6Gtcp804w0cc-o4sIc6rrIUhmvR27jcPNAxrZqmRzWbwTwoSiB1UC2pgfS_HfGvptoVbo",
      "dp": "pqc7rlEMWm7Y5E530YRYiPpLSh_UDFUy_6Ns6sUAroul6RzcyfU8VpqnEWUVHpu7CR346PjW4iaW1ph8KHBzUXumqnhx-Jv763OKXP7pZ-9_T5_ZJfdVO20aTu3FDKbbmaNs-AgS43MIafSVtwv3kp46DDz7Gug94uoj25berH0",
      "dq": "XD4Rol2daEk03m2DeN62kk-O_R32vfj4Zyw3_pZMNn1BthVsX3PAkMeTigyd6KuVLETa4a5bF6vauKJgoulHlskw3kZgR1KbGkx6wXZnI57qwFNvtEt-A7HE-KmpXV4tBxPETH2ILyrybMaoL7p24Azt9-trZyXkVdLMMSFH1Vk",
      "n": "jIC1Wj8j0kB0DxjAgTzl5nCXirs8NrVkvwoir5qgGv9ffw2Vm2jTRBJKbNhfPr0-3J-R7-A--ZxtULxHrTYxXm-8QaKrZVBl4C_A2fKtZwsyN9CJbeseWJbvjKGgZdlgoO1EQm57p0UahjpaDtbxxw7wedfdnNPnJz_apg4r3hT6YZHiBFxCbQtwkWYT9k2wycBq6j95LZst1l4ZeqsA14yGdZgUYAMJKLaY6cOPVwPVNhmpOYgRbVYs6EmfS7uMnizgb2HzouiToR_v6nR6QCA04GwH1WXn1hxuBPKkm6Qo9tSRiDzzdc72i3K92YW8h8d2cuV0wJ1QTUUnQCWlFw"
    },
    {
      "kty": "EC",
      "d": "5OsCsJAZ6YAI6FIyrGEWPyUlnq4zEyDpHFJr7ag1-9g",
      "use": "sig",
      "crv": "P-256",
      "kid": "9fe5e4a1-0e86-4924-8cb7-68def39da7ea",
      "x": "YDavTursMsBKTDlMfels_cHrL2c7O9NJT6VamPRHVNw",
      "y": "19Ea1A3sARweGuFbNTuLTw_Bt8_BtlABc5GrfaesqkQ"
    },
    {
      "kty": "EC",
      "d": "rqN0059tYzf4f6zQF9QjpWJcsCmBUyj1DqpRj-1KNLk",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "80b1a473-7063-4b4a-ab59-501e9033f5c4",
      "x": "4lJCTnEKN9CjGuM_H9amVcXtjRkMNk9-JyxDYef7CUw",
      "y": "4JGYXTIWUA0EGwgZif9HilFk6UzqqcHY-i00ZSsnVjM"
    },
    {
      "kty": "OKP",
      "d": "Y8e4wt5W8x9fMcLu5ifb64bBQC2xai7RUbDuwvmXzlw",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "b713449c-3f02-4a0c-a194-e123b58e6c7e",
      "x": "pJXC6aVc3yY_e7fo3AcXfoC-EG7w-YIGirKPvgVNC5c"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "1--drRhN3ARNL_zaHpOOw4aOO5aRSuHa6H3WwzQHY_A3r-gL7hQfy1PuXXt06rAwDRJU3sbIcIv1hPT6Xjaoo816mDEdLce-tbi9KEqI-nCspFT4xuAZ0K29AHA49uE6IdGCh78LYXmNL9tNkP0lqvGty_c2zpa47r7D5Bap6ps",
      "kty": "RSA",
      "q": "p5AN7zP2My9Yf8OdcXnUpWQKwr146eZd9RIZ6Q6UOhwUNiIldb79QMqxCQ8GXLoxydFXjUBg83F2Y1Z11Tky0lrIjNtYQlbovXBf3aYEB3huuOHtrE25FdW9KNQot6OPolUTCHU46OK7ItjozNS_x_cxpUyCtj3SYOXA1xbk_jU",
      "d": "Q656zAO0SY4DA22hgiX21VGGaU8o86VdCdn8mQnnZ84ONkpx_MIJmz0nG2G9_bKOMQkySQq_1BK4w4MJT3IoFtVgAZGviQTkgUfceF6FoePBS5-jteEmIXCbsSOaGsnJVTGTo-SUrrzCZz4pNJqWf0-Od3VtFfzwsVu2W-LJEW_2s3lahtGlCsUbBOGr2_9yDs6hmRN-Rq4sMFgByPFVhRPLTsVjPC6iA8IKWj5KzW0CGqG8Q3jv6toy6aRN7bJNvmyXs7WdxIrKtqDuYt-3KUbTQxEkOZMwTRzRtIG0PIwvTZrtzQPIdHOn2vkjMXwqqOOAGg_mezbI2iPA-8tPeQ",
      "e": "AQAB",
      "use": "enc",
      "kid": "840f8d60-6996-4741-b9ca-dab1e4ee71de",
      "qi": "H4_X4Q6_gxEi-KFKCiLvJ7DkklJFUq6TIzh8Que9Z8sCoGSnuH93dDD66UhZ0PIspSwTYTG7GUyTgHZZSKxfCC2eaPvWRyQeoIRLqT4bB6QbgNbwBe2Orezi8bV3_uFkewC2gCeuNgFXwzpQVlG2qQ10uNnhs1ET2qc-unm3A7Y",
      "dp": "S5j3-sGngH-BBmvfcRT3xjw1T2dHNpAbs4laxrxQWgyfclYq1w70kpqvuMqgBAnqyKjCTbwKMFzPd9zMSm-YWsB1SxLmxEBJ5BTpJFHz4rnPtziIYBfU8dnhcWXYi5YOZAiVSjD4KwgDBd4hKcF2joJN9jp2VZ0u4Wan7hKBKkE",
      "alg": "RSA-OAEP",
      "dq": "bJnlLh_TdiE9jrFOHfoEZJ2Oi-EZuR9hzjDJMlAMqg0A3IUNGl-K7K9yRpjCWt8i3dcck6QiMiZbwM6M2IGV-th0Gzce4QBLIFzxBUtQWTcpLBLiZEaLqyc4znmTWlJcCa5yA41WMTqiZ1eGqxtIoWYJe0U3gr5W2A6RCdcA2_E",
      "n": "jVbSZYvC3P_h3Mg4UOp7HsOX1ptAZFp8dRkWWeW4ijI_vmu6MyV4KLYGQLoQAAEkIBHG_7TlFFteTulzqoHgX8dH9o0ldLGD0KAgG-PCbqPwPCz9ebjJeS61rUuzmiGHBOjyN9BdvOjy28-MpVzdAzj6D8Z6snLs49HkihAs7qGPtfc2VVJj_e7GKOb27_nD681oRc5gGUS1cu82uspDtaC-4Z26E4W09lWT-rTgvuXzb9jSO3WsKfHlolTYltvwMjeHn60CX3n3iEHL3co2OzfOB1755OrbfMXb-sHctRD-kDTlCAKWXzhUQku9a5DsneRzcGCurZQ6QO5gi_9cFw"
    },
    {
      "kty": "EC",
      "d": "08ujIgFzHl6W-I-flB8CNfQLRI-subaF4hRIACUeS0g",
      "use": "enc",
      "crv": "P-256",
      "kid": "105e1da6-f238-473d-8ee9-8f3d6e9ba367",
      "x": "6bmQqdEX38t8fNYOvZiXl4wNw0A_5olqE8LBEbTsslI",
      "y": "tJLB6rDQRJEL6c1pu-LiHRy6uwetKsASQgCYUPqppoM",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "a9fddf8b-a116-4ca1-9fb6-2f1b40824e9d",
      "n": "jIC1Wj8j0kB0DxjAgTzl5nCXirs8NrVkvwoir5qgGv9ffw2Vm2jTRBJKbNhfPr0-3J-R7-A--ZxtULxHrTYxXm-8QaKrZVBl4C_A2fKtZwsyN9CJbeseWJbvjKGgZdlgoO1EQm57p0UahjpaDtbxxw7wedfdnNPnJz_apg4r3hT6YZHiBFxCbQtwkWYT9k2wycBq6j95LZst1l4ZeqsA14yGdZgUYAMJKLaY6cOPVwPVNhmpOYgRbVYs6EmfS7uMnizgb2HzouiToR_v6nR6QCA04GwH1WXn1hxuBPKkm6Qo9tSRiDzzdc72i3K92YW8h8d2cuV0wJ1QTUUnQCWlFw"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "b5bdb090-eb2d-4568-a4b9-fd738125968b",
      "n": "hZ7nef5AJJKI60Fuuel9Z2V7MBlImElAT-yEXVJkLEEZtmd1sguGXXUjxQuv0JKQv4aI64oT4w7H98q5zOHIo3xxqyaDwAoHldfpIog0OCp7KYYC_mfsgQM0CPy5CrtcDc39w9d0HtVvSu7FG1CGrkutB_wcmdXfbo8oWMl9uRUaMnFYQhlz4nrkBz2CPpfMcqzqqP8fu3CoCuLK-ttVgqDiB-p2NhzQsI5L72KOVN17hX0wull6Sf9WRKsL9Bx5isu2cEji27kferTlo-gZYwxjL5eoJJYhtBXs41QVCcHe_fDYNTU5r_kw7uIEQ54sdWo7XwxtZiIgWmvim4gviw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "9fe5e4a1-0e86-4924-8cb7-68def39da7ea",
      "x": "YDavTursMsBKTDlMfels_cHrL2c7O9NJT6VamPRHVNw",
      "y": "19Ea1A3sARweGuFbNTuLTw_Bt8_BtlABc5GrfaesqkQ"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "2788d095-d66f-42e8-8e17-076a24dcfa9a",
      "x": "OpKLicyHh2pIRtcAqRyHW8ZHV4q5OThxlaSmL-r7azo",
      "y": "B2Dpya33ZuwUqf_N9VmCQm2NBxPYIvxOjXC8m5Zqw8E"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "80b1a473-7063-4b4a-ab59-501e9033f5c4",
      "x": "4lJCTnEKN9CjGuM_H9amVcXtjRkMNk9-JyxDYef7CUw",
      "y": "4JGYXTIWUA0EGwgZif9HilFk6UzqqcHY-i00ZSsnVjM"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "b713449c-3f02-4a0c-a194-e123b58e6c7e",
      "x": "pJXC6aVc3yY_e7fo3AcXfoC-EG7w-YIGirKPvgVNC5c"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "840f8d60-6996-4741-b9ca-dab1e4ee71de",
      "alg": "RSA-OAEP",
      "n": "jVbSZYvC3P_h3Mg4UOp7HsOX1ptAZFp8dRkWWeW4ijI_vmu6MyV4KLYGQLoQAAEkIBHG_7TlFFteTulzqoHgX8dH9o0ldLGD0KAgG-PCbqPwPCz9ebjJeS61rUuzmiGHBOjyN9BdvOjy28-MpVzdAzj6D8Z6snLs49HkihAs7qGPtfc2VVJj_e7GKOb27_nD681oRc5gGUS1cu82uspDtaC-4Z26E4W09lWT-rTgvuXzb9jSO3WsKfHlolTYltvwMjeHn60CX3n3iEHL3co2OzfOB1755OrbfMXb-sHctRD-kDTlCAKWXzhUQku9a5DsneRzcGCurZQ6QO5gi_9cFw"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "105e1da6-f238-473d-8ee9-8f3d6e9ba367",
      "x": "6bmQqdEX38t8fNYOvZiXl4wNw0A_5olqE8LBEbTsslI",
      "y": "tJLB6rDQRJEL6c1pu-LiHRy6uwetKsASQgCYUPqppoM",
      "alg": "ECDH-ES"
    }
  ]
}
2022-11-22 08:17:47 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2022-11-22 08:17:47 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2022-11-22 08:17:47 SUCCESS
OIDCCLoadUserInfo
Added user information
user_info
{
  "sub": "user-subject-1234531",
  "name": "Demo T. User",
  "given_name": "Demo",
  "family_name": "User",
  "middle_name": "Theresa",
  "nickname": "Dee",
  "preferred_username": "d.tu",
  "gender": "female",
  "birthdate": "2000-02-03",
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "zoneinfo": "America/Los_Angeles",
  "locale": "en-US",
  "phone_number": "+1 555 5550000",
  "phone_number_verified": false,
  "email": "user@example.com",
  "email_verified": false,
  "website": "https://openid.net/",
  "profile": "https://example.com/user",
  "updated_at": 1580000000
}
2022-11-22 08:17:47 SUCCESS
OIDCCGetStaticClientConfigurationForRPTests
Found a static client object
client_id
hPNHrtzZmktTOROQam3V6jsB
client_secret
Pm2tl7mD0KVT1fgcuqIzw8h1_odnk6j6j3lf8Dqo0rw31pHfHQX_UbNsIca9MkffsX3jjgVW1zZnNT4dbG_kPA
redirect_uris
[
  "https://socialize.gigya.com/socialize.finalizeOidcLogin?"
]
2022-11-22 08:17:47 SUCCESS
EnsureClientDoesNotHaveBothJwksAndJwksUri
Client does not have both jwks and jwks_uri set
client
{
  "client_id": "hPNHrtzZmktTOROQam3V6jsB",
  "client_secret": "Pm2tl7mD0KVT1fgcuqIzw8h1_odnk6j6j3lf8Dqo0rw31pHfHQX_UbNsIca9MkffsX3jjgVW1zZnNT4dbG_kPA",
  "redirect_uris": [
    "https://socialize.gigya.com/socialize.finalizeOidcLogin?"
  ]
}
2022-11-22 08:17:47 INFO
FetchClientKeys
Skipped evaluation due to missing required element: client jwks_uri
path
jwks_uri
mapped
object
client
2022-11-22 08:17:47 SUCCESS
ValidateClientGrantTypes
grant_types match response_types
grant_types
[
  "authorization_code"
]
response_types
[
  "code"
]
2022-11-22 08:17:47 SUCCESS
OIDCCValidateClientRedirectUris
Valid redirect_uri(s) provided in registration request
redirect_uris
[
  "https://socialize.gigya.com/socialize.finalizeOidcLogin?"
]
2022-11-22 08:17:47 SUCCESS
ValidateClientLogoUris
Client does not contain any logo_uri
2022-11-22 08:17:47 SUCCESS
ValidateClientUris
Client does not contain any client_uri
2022-11-22 08:17:47 SUCCESS
ValidateClientPolicyUris
Client does not contain any policy_uri
2022-11-22 08:17:47 SUCCESS
ValidateClientTosUris
Client does not contain any tos_uri
2022-11-22 08:17:47 SUCCESS
ValidateClientSubjectType
A subject_type was not provided
2022-11-22 08:17:47 INFO
ValidateIdTokenSignedResponseAlg
Skipped evaluation due to missing required element: client id_token_signed_response_alg
path
id_token_signed_response_alg
mapped
object
client
2022-11-22 08:17:47 SUCCESS
EnsureIdTokenEncryptedResponseAlgIsSetIfEncIsSet
id_token_encrypted_response_enc is not set
2022-11-22 08:17:47 INFO
ValidateUserinfoSignedResponseAlg
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2022-11-22 08:17:47 SUCCESS
EnsureUserinfoEncryptedResponseAlgIsSetIfEncIsSet
userinfo_encrypted_response_enc is not set
2022-11-22 08:17:47 INFO
ValidateRequestObjectSigningAlg
Skipped evaluation due to missing required element: client request_object_signing_alg
path
request_object_signing_alg
mapped
object
client
2022-11-22 08:17:47 SUCCESS
EnsureRequestObjectEncryptionAlgIsSetIfEncIsSet
request_object_encryption_enc is not set
2022-11-22 08:17:47 INFO
ValidateTokenEndpointAuthSigningAlg
Skipped evaluation due to missing required element: client token_endpoint_auth_signing_alg
path
token_endpoint_auth_signing_alg
mapped
object
client
2022-11-22 08:17:47 SUCCESS
ValidateDefaultMaxAge
default_max_age is not set
2022-11-22 08:17:47 INFO
ValidateRequireAuthTime
Skipped evaluation due to missing required element: client require_auth_time
path
require_auth_time
mapped
object
client
2022-11-22 08:17:47 INFO
ValidateDefaultAcrValues
Skipped evaluation due to missing required element: client default_acr_values
path
default_acr_values
mapped
object
client
2022-11-22 08:17:47 INFO
ValidateInitiateLoginUri
Skipped evaluation due to missing required element: client initiate_login_uri
path
initiate_login_uri
mapped
object
client
2022-11-22 08:17:47 INFO
ValidateRequestUris
Skipped evaluation due to missing required element: client request_uris
path
request_uris
mapped
object
client
2022-11-22 08:17:47 SUCCESS
OIDCCExtractServerSigningAlg
Using the default algorithm for the first key in server jwks
signing_algorithm
RS256
2022-11-22 08:17:47
SetClientIdTokenSignedResponseAlgToServerSigningAlg
Set id_token_signed_response_alg for the registered client
id_token_signed_response_alg
RS256
2022-11-22 08:17:47
oidcc-client-test-missing-iat
Setup Done
2022-11-22 08:18:00 INCOMING
oidcc-client-test-missing-iat
Incoming HTTP request to /test/a/tal_test/jwks
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "PostmanRuntime/7.29.2",
  "accept": "*/*",
  "postman-token": "aafdb7cc-f8bf-4a8b-a473-50b29bb1015d",
  "accept-encoding": "gzip, deflate, br",
  "cookie": "JSESSIONID\u003d257ED7B888E67176B6F9F3421FBF063F",
  "connection": "close"
}
incoming_path
/test/a/tal_test/jwks
incoming_body_form_params
incoming_method
GET
incoming_tls_version
TLSv1.2
incoming_tls_cert
incoming_query_string_params
{}
incoming_body
incoming_tls_chain
[
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL"
]
incoming_tls_cipher
ECDHE-RSA-AES128-GCM-SHA256
incoming_body_json
Jwks endpoint
2022-11-22 08:18:00 OUTGOING
oidcc-client-test-missing-iat
Response to HTTP request to test instance w5TWFzoGjNic8Vl
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "a9fddf8b-a116-4ca1-9fb6-2f1b40824e9d",
      "n": "jIC1Wj8j0kB0DxjAgTzl5nCXirs8NrVkvwoir5qgGv9ffw2Vm2jTRBJKbNhfPr0-3J-R7-A--ZxtULxHrTYxXm-8QaKrZVBl4C_A2fKtZwsyN9CJbeseWJbvjKGgZdlgoO1EQm57p0UahjpaDtbxxw7wedfdnNPnJz_apg4r3hT6YZHiBFxCbQtwkWYT9k2wycBq6j95LZst1l4ZeqsA14yGdZgUYAMJKLaY6cOPVwPVNhmpOYgRbVYs6EmfS7uMnizgb2HzouiToR_v6nR6QCA04GwH1WXn1hxuBPKkm6Qo9tSRiDzzdc72i3K92YW8h8d2cuV0wJ1QTUUnQCWlFw"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "b5bdb090-eb2d-4568-a4b9-fd738125968b",
      "n": "hZ7nef5AJJKI60Fuuel9Z2V7MBlImElAT-yEXVJkLEEZtmd1sguGXXUjxQuv0JKQv4aI64oT4w7H98q5zOHIo3xxqyaDwAoHldfpIog0OCp7KYYC_mfsgQM0CPy5CrtcDc39w9d0HtVvSu7FG1CGrkutB_wcmdXfbo8oWMl9uRUaMnFYQhlz4nrkBz2CPpfMcqzqqP8fu3CoCuLK-ttVgqDiB-p2NhzQsI5L72KOVN17hX0wull6Sf9WRKsL9Bx5isu2cEji27kferTlo-gZYwxjL5eoJJYhtBXs41QVCcHe_fDYNTU5r_kw7uIEQ54sdWo7XwxtZiIgWmvim4gviw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "9fe5e4a1-0e86-4924-8cb7-68def39da7ea",
      "x": "YDavTursMsBKTDlMfels_cHrL2c7O9NJT6VamPRHVNw",
      "y": "19Ea1A3sARweGuFbNTuLTw_Bt8_BtlABc5GrfaesqkQ"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "2788d095-d66f-42e8-8e17-076a24dcfa9a",
      "x": "OpKLicyHh2pIRtcAqRyHW8ZHV4q5OThxlaSmL-r7azo",
      "y": "B2Dpya33ZuwUqf_N9VmCQm2NBxPYIvxOjXC8m5Zqw8E"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "80b1a473-7063-4b4a-ab59-501e9033f5c4",
      "x": "4lJCTnEKN9CjGuM_H9amVcXtjRkMNk9-JyxDYef7CUw",
      "y": "4JGYXTIWUA0EGwgZif9HilFk6UzqqcHY-i00ZSsnVjM"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "b713449c-3f02-4a0c-a194-e123b58e6c7e",
      "x": "pJXC6aVc3yY_e7fo3AcXfoC-EG7w-YIGirKPvgVNC5c"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "840f8d60-6996-4741-b9ca-dab1e4ee71de",
      "alg": "RSA-OAEP",
      "n": "jVbSZYvC3P_h3Mg4UOp7HsOX1ptAZFp8dRkWWeW4ijI_vmu6MyV4KLYGQLoQAAEkIBHG_7TlFFteTulzqoHgX8dH9o0ldLGD0KAgG-PCbqPwPCz9ebjJeS61rUuzmiGHBOjyN9BdvOjy28-MpVzdAzj6D8Z6snLs49HkihAs7qGPtfc2VVJj_e7GKOb27_nD681oRc5gGUS1cu82uspDtaC-4Z26E4W09lWT-rTgvuXzb9jSO3WsKfHlolTYltvwMjeHn60CX3n3iEHL3co2OzfOB1755OrbfMXb-sHctRD-kDTlCAKWXzhUQku9a5DsneRzcGCurZQ6QO5gi_9cFw"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "105e1da6-f238-473d-8ee9-8f3d6e9ba367",
      "x": "6bmQqdEX38t8fNYOvZiXl4wNw0A_5olqE8LBEbTsslI",
      "y": "tJLB6rDQRJEL6c1pu-LiHRy6uwetKsASQgCYUPqppoM",
      "alg": "ECDH-ES"
    }
  ]
}
outgoing_path
jwks
2022-11-22 08:18:05 INCOMING
oidcc-client-test-missing-iat
Incoming HTTP request to /test/a/tal_test/jwks
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "PostmanRuntime/7.29.2",
  "accept": "*/*",
  "postman-token": "a95b6c11-f0d1-4d01-92aa-e2bb43a99fba",
  "accept-encoding": "gzip, deflate, br",
  "cookie": "JSESSIONID\u003d257ED7B888E67176B6F9F3421FBF063F",
  "connection": "close"
}
incoming_path
/test/a/tal_test/jwks
incoming_body_form_params
incoming_method
GET
incoming_tls_version
TLSv1.2
incoming_tls_cert
incoming_query_string_params
{}
incoming_body
incoming_tls_chain
[
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL"
]
incoming_tls_cipher
ECDHE-RSA-AES128-GCM-SHA256
incoming_body_json
Jwks endpoint
2022-11-22 08:18:05 OUTGOING
oidcc-client-test-missing-iat
Response to HTTP request to test instance w5TWFzoGjNic8Vl
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "a9fddf8b-a116-4ca1-9fb6-2f1b40824e9d",
      "n": "jIC1Wj8j0kB0DxjAgTzl5nCXirs8NrVkvwoir5qgGv9ffw2Vm2jTRBJKbNhfPr0-3J-R7-A--ZxtULxHrTYxXm-8QaKrZVBl4C_A2fKtZwsyN9CJbeseWJbvjKGgZdlgoO1EQm57p0UahjpaDtbxxw7wedfdnNPnJz_apg4r3hT6YZHiBFxCbQtwkWYT9k2wycBq6j95LZst1l4ZeqsA14yGdZgUYAMJKLaY6cOPVwPVNhmpOYgRbVYs6EmfS7uMnizgb2HzouiToR_v6nR6QCA04GwH1WXn1hxuBPKkm6Qo9tSRiDzzdc72i3K92YW8h8d2cuV0wJ1QTUUnQCWlFw"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "b5bdb090-eb2d-4568-a4b9-fd738125968b",
      "n": "hZ7nef5AJJKI60Fuuel9Z2V7MBlImElAT-yEXVJkLEEZtmd1sguGXXUjxQuv0JKQv4aI64oT4w7H98q5zOHIo3xxqyaDwAoHldfpIog0OCp7KYYC_mfsgQM0CPy5CrtcDc39w9d0HtVvSu7FG1CGrkutB_wcmdXfbo8oWMl9uRUaMnFYQhlz4nrkBz2CPpfMcqzqqP8fu3CoCuLK-ttVgqDiB-p2NhzQsI5L72KOVN17hX0wull6Sf9WRKsL9Bx5isu2cEji27kferTlo-gZYwxjL5eoJJYhtBXs41QVCcHe_fDYNTU5r_kw7uIEQ54sdWo7XwxtZiIgWmvim4gviw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "9fe5e4a1-0e86-4924-8cb7-68def39da7ea",
      "x": "YDavTursMsBKTDlMfels_cHrL2c7O9NJT6VamPRHVNw",
      "y": "19Ea1A3sARweGuFbNTuLTw_Bt8_BtlABc5GrfaesqkQ"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "2788d095-d66f-42e8-8e17-076a24dcfa9a",
      "x": "OpKLicyHh2pIRtcAqRyHW8ZHV4q5OThxlaSmL-r7azo",
      "y": "B2Dpya33ZuwUqf_N9VmCQm2NBxPYIvxOjXC8m5Zqw8E"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "80b1a473-7063-4b4a-ab59-501e9033f5c4",
      "x": "4lJCTnEKN9CjGuM_H9amVcXtjRkMNk9-JyxDYef7CUw",
      "y": "4JGYXTIWUA0EGwgZif9HilFk6UzqqcHY-i00ZSsnVjM"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "b713449c-3f02-4a0c-a194-e123b58e6c7e",
      "x": "pJXC6aVc3yY_e7fo3AcXfoC-EG7w-YIGirKPvgVNC5c"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "840f8d60-6996-4741-b9ca-dab1e4ee71de",
      "alg": "RSA-OAEP",
      "n": "jVbSZYvC3P_h3Mg4UOp7HsOX1ptAZFp8dRkWWeW4ijI_vmu6MyV4KLYGQLoQAAEkIBHG_7TlFFteTulzqoHgX8dH9o0ldLGD0KAgG-PCbqPwPCz9ebjJeS61rUuzmiGHBOjyN9BdvOjy28-MpVzdAzj6D8Z6snLs49HkihAs7qGPtfc2VVJj_e7GKOb27_nD681oRc5gGUS1cu82uspDtaC-4Z26E4W09lWT-rTgvuXzb9jSO3WsKfHlolTYltvwMjeHn60CX3n3iEHL3co2OzfOB1755OrbfMXb-sHctRD-kDTlCAKWXzhUQku9a5DsneRzcGCurZQ6QO5gi_9cFw"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "105e1da6-f238-473d-8ee9-8f3d6e9ba367",
      "x": "6bmQqdEX38t8fNYOvZiXl4wNw0A_5olqE8LBEbTsslI",
      "y": "tJLB6rDQRJEL6c1pu-LiHRy6uwetKsASQgCYUPqppoM",
      "alg": "ECDH-ES"
    }
  ]
}
outgoing_path
jwks
2022-11-22 08:18:09 INCOMING
oidcc-client-test-missing-iat
Incoming HTTP request to /test/a/tal_test/jwks
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "PostmanRuntime/7.29.2",
  "accept": "*/*",
  "postman-token": "ec2fd016-96a8-44bb-b73f-dd8780f48c7f",
  "accept-encoding": "gzip, deflate, br",
  "cookie": "JSESSIONID\u003d257ED7B888E67176B6F9F3421FBF063F",
  "connection": "close"
}
incoming_path
/test/a/tal_test/jwks
incoming_body_form_params
incoming_method
GET
incoming_tls_version
TLSv1.2
incoming_tls_cert
incoming_query_string_params
{}
incoming_body
incoming_tls_chain
[
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL"
]
incoming_tls_cipher
ECDHE-RSA-AES128-GCM-SHA256
incoming_body_json
Jwks endpoint
2022-11-22 08:18:09 OUTGOING
oidcc-client-test-missing-iat
Response to HTTP request to test instance w5TWFzoGjNic8Vl
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "a9fddf8b-a116-4ca1-9fb6-2f1b40824e9d",
      "n": "jIC1Wj8j0kB0DxjAgTzl5nCXirs8NrVkvwoir5qgGv9ffw2Vm2jTRBJKbNhfPr0-3J-R7-A--ZxtULxHrTYxXm-8QaKrZVBl4C_A2fKtZwsyN9CJbeseWJbvjKGgZdlgoO1EQm57p0UahjpaDtbxxw7wedfdnNPnJz_apg4r3hT6YZHiBFxCbQtwkWYT9k2wycBq6j95LZst1l4ZeqsA14yGdZgUYAMJKLaY6cOPVwPVNhmpOYgRbVYs6EmfS7uMnizgb2HzouiToR_v6nR6QCA04GwH1WXn1hxuBPKkm6Qo9tSRiDzzdc72i3K92YW8h8d2cuV0wJ1QTUUnQCWlFw"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "b5bdb090-eb2d-4568-a4b9-fd738125968b",
      "n": "hZ7nef5AJJKI60Fuuel9Z2V7MBlImElAT-yEXVJkLEEZtmd1sguGXXUjxQuv0JKQv4aI64oT4w7H98q5zOHIo3xxqyaDwAoHldfpIog0OCp7KYYC_mfsgQM0CPy5CrtcDc39w9d0HtVvSu7FG1CGrkutB_wcmdXfbo8oWMl9uRUaMnFYQhlz4nrkBz2CPpfMcqzqqP8fu3CoCuLK-ttVgqDiB-p2NhzQsI5L72KOVN17hX0wull6Sf9WRKsL9Bx5isu2cEji27kferTlo-gZYwxjL5eoJJYhtBXs41QVCcHe_fDYNTU5r_kw7uIEQ54sdWo7XwxtZiIgWmvim4gviw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "9fe5e4a1-0e86-4924-8cb7-68def39da7ea",
      "x": "YDavTursMsBKTDlMfels_cHrL2c7O9NJT6VamPRHVNw",
      "y": "19Ea1A3sARweGuFbNTuLTw_Bt8_BtlABc5GrfaesqkQ"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "2788d095-d66f-42e8-8e17-076a24dcfa9a",
      "x": "OpKLicyHh2pIRtcAqRyHW8ZHV4q5OThxlaSmL-r7azo",
      "y": "B2Dpya33ZuwUqf_N9VmCQm2NBxPYIvxOjXC8m5Zqw8E"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "80b1a473-7063-4b4a-ab59-501e9033f5c4",
      "x": "4lJCTnEKN9CjGuM_H9amVcXtjRkMNk9-JyxDYef7CUw",
      "y": "4JGYXTIWUA0EGwgZif9HilFk6UzqqcHY-i00ZSsnVjM"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "b713449c-3f02-4a0c-a194-e123b58e6c7e",
      "x": "pJXC6aVc3yY_e7fo3AcXfoC-EG7w-YIGirKPvgVNC5c"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "840f8d60-6996-4741-b9ca-dab1e4ee71de",
      "alg": "RSA-OAEP",
      "n": "jVbSZYvC3P_h3Mg4UOp7HsOX1ptAZFp8dRkWWeW4ijI_vmu6MyV4KLYGQLoQAAEkIBHG_7TlFFteTulzqoHgX8dH9o0ldLGD0KAgG-PCbqPwPCz9ebjJeS61rUuzmiGHBOjyN9BdvOjy28-MpVzdAzj6D8Z6snLs49HkihAs7qGPtfc2VVJj_e7GKOb27_nD681oRc5gGUS1cu82uspDtaC-4Z26E4W09lWT-rTgvuXzb9jSO3WsKfHlolTYltvwMjeHn60CX3n3iEHL3co2OzfOB1755OrbfMXb-sHctRD-kDTlCAKWXzhUQku9a5DsneRzcGCurZQ6QO5gi_9cFw"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "105e1da6-f238-473d-8ee9-8f3d6e9ba367",
      "x": "6bmQqdEX38t8fNYOvZiXl4wNw0A_5olqE8LBEbTsslI",
      "y": "tJLB6rDQRJEL6c1pu-LiHRy6uwetKsASQgCYUPqppoM",
      "alg": "ECDH-ES"
    }
  ]
}
outgoing_path
jwks
2022-11-22 08:18:25 INCOMING
oidcc-client-test-missing-iat
Incoming HTTP request to /test/a/tal_test/authorize
incoming_headers
{
  "host": "www.certification.openid.net",
  "sec-ch-ua": "\"Google Chrome\";v\u003d\"107\", \"Chromium\";v\u003d\"107\", \"Not\u003dA?Brand\";v\u003d\"24\"",
  "sec-ch-ua-mobile": "?0",
  "sec-ch-ua-platform": "\"macOS\"",
  "upgrade-insecure-requests": "1",
  "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/avif,image/webp,image/apng,*/*;q\u003d0.8,application/signed-exchange;v\u003db3;q\u003d0.9",
  "sec-fetch-site": "cross-site",
  "sec-fetch-mode": "navigate",
  "sec-fetch-dest": "document",
  "referer": "https://socialize.us1.gigya.com/",
  "accept-encoding": "gzip, deflate, br",
  "accept-language": "en-US,en;q\u003d0.9,he;q\u003d0.8",
  "cookie": "__utma\u003d201319536.76864017.1658307142.1664786690.1665555850.13; __utmz\u003d201319536.1665555850.13.6.utmcsr\u003dgoogle|utmccn\u003d(organic)|utmcmd\u003dorganic|utmctr\u003d(not%20provided); JSESSIONID\u003d119918A143D359300525FD5835CE0195",
  "connection": "close"
}
incoming_path
/test/a/tal_test/authorize
incoming_body_form_params
incoming_method
GET
incoming_tls_version
TLSv1.2
incoming_tls_cert
incoming_query_string_params
{
  "client_id": "hPNHrtzZmktTOROQam3V6jsB",
  "redirect_uri": "https://socialize.gigya.com/socialize.finalizeOidcLogin?",
  "scope": "openid email profile address phone",
  "state": "tk2.oi.AcbHEH6qxQ.78g0UpM6vY2gjMUr27i2AxdPf70VX3G-fiSiPBa8sOIuoBD6YdyS4naT2kSxXmhR.umWxxusIjVggfRxxYyzMF9UbI6eBuUuMf_h3vHZn88bf0eAPENP83WDRZY19ObNK19oC45Cf7XW5UGdKr3WcXw.sc3yc463l70n4055151h7",
  "response_type": "code",
  "nonce": "abbe5e584b224a12a36e9826887ab19a"
}
incoming_body
incoming_tls_chain
[
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL"
]
incoming_tls_cipher
ECDHE-RSA-AES128-GCM-SHA256
incoming_body_json
Authorization endpoint
2022-11-22 08:18:25 SUCCESS
EnsureRequestDoesNotContainRequestObject
Request does not contain a request parameter
2022-11-22 08:18:25 SUCCESS
EnsureAuthorizationHttpRequestContainsOpenIDScope
Found 'openid' in scope http request parameter
actual
[
  "openid",
  "email",
  "profile",
  "address",
  "phone"
]
expected
openid
2022-11-22 08:18:25 SUCCESS
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
effective_authorization_endpoint_request
{
  "client_id": "hPNHrtzZmktTOROQam3V6jsB",
  "redirect_uri": "https://socialize.gigya.com/socialize.finalizeOidcLogin?",
  "scope": "openid email profile address phone",
  "state": "tk2.oi.AcbHEH6qxQ.78g0UpM6vY2gjMUr27i2AxdPf70VX3G-fiSiPBa8sOIuoBD6YdyS4naT2kSxXmhR.umWxxusIjVggfRxxYyzMF9UbI6eBuUuMf_h3vHZn88bf0eAPENP83WDRZY19ObNK19oC45Cf7XW5UGdKr3WcXw.sc3yc463l70n4055151h7",
  "response_type": "code",
  "nonce": "abbe5e584b224a12a36e9826887ab19a"
}
2022-11-22 08:18:25 SUCCESS
ExtractRequestedScopes
Requested scopes
scope
openid email profile address phone
2022-11-22 08:18:25 SUCCESS
ExtractNonceFromAuthorizationRequest
Extracted nonce
nonce
abbe5e584b224a12a36e9826887ab19a
2022-11-22 08:18:25 INFO
EnsureAuthorizationRequestContainsPkceCodeChallenge
Skipped evaluation due to missing required element: effective_authorization_endpoint_request code_challenge
path
code_challenge
mapped
object
effective_authorization_endpoint_request
2022-11-22 08:18:25 SUCCESS
EnsureResponseTypeIsCode
Response type is expected value
expected
code
2022-11-22 08:18:25 SUCCESS
EnsureMatchingClientId
Client ID matched
client_id
hPNHrtzZmktTOROQam3V6jsB
2022-11-22 08:18:25 SUCCESS
EnsureValidRedirectUriForAuthorizationEndpointRequest
redirect_uri is one of the allowed redirect uris
actual
https://socialize.gigya.com/socialize.finalizeOidcLogin?
expected
[
  "https://socialize.gigya.com/socialize.finalizeOidcLogin?"
]
2022-11-22 08:18:25 SUCCESS
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
actual
[
  "openid",
  "email",
  "profile",
  "address",
  "phone"
]
expected
openid
2022-11-22 08:18:25 SUCCESS
DisallowMaxAgeEqualsZeroAndPromptNone
The client did not send max_age=0 and prompt=none parameters as expected
2022-11-22 08:18:25 SUCCESS
CreateAuthorizationCode
Created authorization code
authorization_code
Y97D68mYdpo4Qh3dRWnFbVeQIX7pQNFU
2022-11-22 08:18:25 SUCCESS
CalculateCHash
Successful c_hash encoding
c_hash
qk-1_ctMvH2DIe8B_0z6Rg
2022-11-22 08:18:25 SUCCESS
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
params
{
  "redirect_uri": "https://socialize.gigya.com/socialize.finalizeOidcLogin?",
  "state": "tk2.oi.AcbHEH6qxQ.78g0UpM6vY2gjMUr27i2AxdPf70VX3G-fiSiPBa8sOIuoBD6YdyS4naT2kSxXmhR.umWxxusIjVggfRxxYyzMF9UbI6eBuUuMf_h3vHZn88bf0eAPENP83WDRZY19ObNK19oC45Cf7XW5UGdKr3WcXw.sc3yc463l70n4055151h7"
}
2022-11-22 08:18:25 SUCCESS
AddCodeToAuthorizationEndpointResponseParams
Added code to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://socialize.gigya.com/socialize.finalizeOidcLogin?",
  "state": "tk2.oi.AcbHEH6qxQ.78g0UpM6vY2gjMUr27i2AxdPf70VX3G-fiSiPBa8sOIuoBD6YdyS4naT2kSxXmhR.umWxxusIjVggfRxxYyzMF9UbI6eBuUuMf_h3vHZn88bf0eAPENP83WDRZY19ObNK19oC45Cf7XW5UGdKr3WcXw.sc3yc463l70n4055151h7",
  "code": "Y97D68mYdpo4Qh3dRWnFbVeQIX7pQNFU"
}
2022-11-22 08:18:25
SendAuthorizationResponseWithResponseModeQuery
Redirecting back to client
uri
https://socialize.gigya.com/socialize.finalizeOidcLogin?state=tk2.oi.AcbHEH6qxQ.78g0UpM6vY2gjMUr27i2AxdPf70VX3G-fiSiPBa8sOIuoBD6YdyS4naT2kSxXmhR.umWxxusIjVggfRxxYyzMF9UbI6eBuUuMf_h3vHZn88bf0eAPENP83WDRZY19ObNK19oC45Cf7XW5UGdKr3WcXw.sc3yc463l70n4055151h7&code=Y97D68mYdpo4Qh3dRWnFbVeQIX7pQNFU
2022-11-22 08:18:25 OUTGOING
oidcc-client-test-missing-iat
Response to HTTP request to test instance w5TWFzoGjNic8Vl
outgoing
org.springframework.web.servlet.view.RedirectView: [RedirectView]; URL [https://socialize.gigya.com/socialize.finalizeOidcLogin?state=tk2.oi.AcbHEH6qxQ.78g0UpM6vY2gjMUr27i2AxdPf70VX3G-fiSiPBa8sOIuoBD6YdyS4naT2kSxXmhR.umWxxusIjVggfRxxYyzMF9UbI6eBuUuMf_h3vHZn88bf0eAPENP83WDRZY19ObNK19oC45Cf7XW5UGdKr3WcXw.sc3yc463l70n4055151h7&code=Y97D68mYdpo4Qh3dRWnFbVeQIX7pQNFU]
outgoing_path
authorize
2022-11-22 08:18:25 INCOMING
oidcc-client-test-missing-iat
Incoming HTTP request to /test/a/tal_test/token
incoming_headers
{
  "host": "www.certification.openid.net",
  "authorization": "Basic aFBOSHJ0elpta3RUT1JPUWFtM1Y2anNCOlBtMnRsN21EMEtWVDFmZ2N1cUl6dzhoMV9vZG5rNmo2ajNsZjhEcW8wcnczMXBIZkhRWF9VYk5zSWNhOU1rZmZzWDNqamdWVzF6Wm5OVDRkYkdfa1BB",
  "accept": "application/json, application/json",
  "cookie": "JSESSIONID\u003d9B191115A14BE432CE4273D7653201F7",
  "content-type": "application/x-www-form-urlencoded",
  "connection": "close",
  "content-length": "147"
}
incoming_path
/test/a/tal_test/token
incoming_body_form_params
{
  "code": "Y97D68mYdpo4Qh3dRWnFbVeQIX7pQNFU",
  "grant_type": "authorization_code",
  "redirect_uri": "https://socialize.gigya.com/socialize.finalizeOidcLogin?"
}
incoming_method
POST
incoming_tls_version
TLSv1.2
incoming_tls_cert
incoming_query_string_params
{}
incoming_body
code=Y97D68mYdpo4Qh3dRWnFbVeQIX7pQNFU&grant_type=authorization_code&redirect_uri=https%3A%2F%2Fsocialize.gigya.com%2Fsocialize.finalizeOidcLogin%3F
incoming_tls_chain
[
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL"
]
incoming_tls_cipher
ECDHE-RSA-AES256-GCM-SHA384
incoming_body_json
Token endpoint
2022-11-22 08:18:25
CheckClientIdMatchesOnTokenRequestIfPresent
client_id not present, nothing to check
2022-11-22 08:18:25 SUCCESS
ExtractClientCredentialsFromBasicAuthorizationHeader
Extracted client authentication
client_id
hPNHrtzZmktTOROQam3V6jsB
client_secret
Pm2tl7mD0KVT1fgcuqIzw8h1_odnk6j6j3lf8Dqo0rw31pHfHQX_UbNsIca9MkffsX3jjgVW1zZnNT4dbG_kPA
method
client_secret_basic
2022-11-22 08:18:25 SUCCESS
ValidateClientIdAndSecret
Client id and secret match
2022-11-22 08:18:25 SUCCESS
ValidateAuthorizationCode
Found authorization code
authorization_code
Y97D68mYdpo4Qh3dRWnFbVeQIX7pQNFU
2022-11-22 08:18:25 SUCCESS
ValidateRedirectUriForTokenEndpointRequest
redirect_uri is the same as the one used in the authorization request
actual
https://socialize.gigya.com/socialize.finalizeOidcLogin?
2022-11-22 08:18:25 SUCCESS
GenerateBearerAccessToken
Generated access token
access_token
FbuRSDDVzUW8jGdmKXugGS1FJdlBVjGIuii00FESrakIqkMkgu
2022-11-22 08:18:25 SUCCESS
CalculateAtHash
Successful at_hash encoding
at_hash
em7jCxyNrrNHXPGxQuFLYA
2022-11-22 08:18:25 SUCCESS
GenerateIdTokenClaims
Created ID Token Claims
iss
https://www.certification.openid.net/test/a/tal_test/
sub
user-subject-1234531
aud
hPNHrtzZmktTOROQam3V6jsB
nonce
abbe5e584b224a12a36e9826887ab19a
iat
1669105105
exp
1669105405
2022-11-22 08:18:25 SUCCESS
RemoveIatFromIdToken
Removed iat from ID token claims
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/a/tal_test/",
  "sub": "user-subject-1234531",
  "aud": "hPNHrtzZmktTOROQam3V6jsB",
  "nonce": "abbe5e584b224a12a36e9826887ab19a",
  "exp": 1669105405
}
2022-11-22 08:18:25 SUCCESS
AddAtHashToIdTokenClaims
Added at_hash to ID token claims
at_hash
em7jCxyNrrNHXPGxQuFLYA
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/a/tal_test/",
  "sub": "user-subject-1234531",
  "aud": "hPNHrtzZmktTOROQam3V6jsB",
  "nonce": "abbe5e584b224a12a36e9826887ab19a",
  "exp": 1669105405,
  "at_hash": "em7jCxyNrrNHXPGxQuFLYA"
}
2022-11-22 08:18:25 SUCCESS
OIDCCSignIdToken
Signed the ID token
id_token
eyJraWQiOiJhOWZkZGY4Yi1hMTE2LTRjYTEtOWZiNi0yZjFiNDA4MjRlOWQiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiZW03akN4eU5yck5IWFBHeFF1RkxZQSIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiaFBOSHJ0elpta3RUT1JPUWFtM1Y2anNCIiwiaXNzIjoiaHR0cHM6XC9cL3d3dy5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXRcL3Rlc3RcL2FcL3RhbF90ZXN0XC8iLCJleHAiOjE2NjkxMDU0MDUsIm5vbmNlIjoiYWJiZTVlNTg0YjIyNGExMmEzNmU5ODI2ODg3YWIxOWEifQ.gURcP_JUyGEn_OA9UT6Hzo_N9rc8mtUgNLGl4mY-6IJVbkfyDdXbT5aKYPFcUoIDUX-3I0sB1_C5BiNuI4IbyZdk4EkVMjYJKaBhtLMinbF-hSZ352t-77Ill6WSFfEBeazEsFvhUHzF7-s6alf6BbRkKXpTnpc1rsxUagL1K2xcP8C0T-aC3LRvFPRQrHsgB_Q3eb17s0G737tQEOmMnYT19Y2JdlF3O9TQs2mXYCHmXS48sLa10ldAm52BlgNfe5Nu_Zv69LyHmZW6v_2syMdsqjlBzQ2qP6qeb3T46u48PzjrFkT-eypfBrKA1SFfD-v--OUOl5x6Ioabc2lbfw
key
{"p":"4d_4qORC8C_gwlxKaptNjBHwPxUCNr_h9D0DqihyCVyvKQY0Uo8rca8njG_kZ4-O2t8G_lNfqZV2hjIu6Yt7Zh8RUtRov249jxoMAqH5vyOgZtTwuvRWdbGcgolQAm9UYguIv6M3mRxCm3zpZDVmxpveC356IMddrDPAHiDblR8","kty":"RSA","q":"nz3iKBdbjfkds8ZskkrxRcZhLVQwxJT24_-ymsbT-kO3-dgb7HHo5pJSFAdq3xhxnKgDVblLOQ_22_bBsV8NPN1Q-l05f78QWGqwFV71PpKM3VxBu6FB2Al_zBfwdOaPTk2V370HbeDDBHppr28kZcwTbT7ugTLt8iuQAUcWuQk","d":"PQgbvtv2f3on7_bciEcfxn3aFhVHDqy02pdYgdc0_QU5QkNwXVWnj8YyNh23IdWq3MMj7YMHV_4vLgbbS85im5cFu60hrpzB5CRaLVJRKJWgdsZLLEgZonnODNSYjCVk6AKoyAKeDAbkgrIONKwB0moW45Z1WY5itpXyMHevboQfBN8csyNbggPxNOsxpXQQO-fu_bejYujnrhtNJE_1_mJrZGd7tAUTKx88_NquR_e6VjTe1uItVAE3MO9GC8LF4dXRJ92CUiOh56MnQvUNKA8zpanoAkMZUek3uWLIb6gvvLIwQlb2xXEP_r_Se7jrqiiWUKOsGyGZnLf3dF64wQ","e":"AQAB","use":"sig","kid":"a9fddf8b-a116-4ca1-9fb6-2f1b40824e9d","qi":"UeCKYsQrtPpn6HE0LvqJDjVGjOge7v2C9QSP8yk079alJFTzIQGmfRppQkDScUxNPwlk4igH4Wcv8vU2QXd0_D_c4-IIhNZf4blqiB6Gtcp804w0cc-o4sIc6rrIUhmvR27jcPNAxrZqmRzWbwTwoSiB1UC2pgfS_HfGvptoVbo","dp":"pqc7rlEMWm7Y5E530YRYiPpLSh_UDFUy_6Ns6sUAroul6RzcyfU8VpqnEWUVHpu7CR346PjW4iaW1ph8KHBzUXumqnhx-Jv763OKXP7pZ-9_T5_ZJfdVO20aTu3FDKbbmaNs-AgS43MIafSVtwv3kp46DDz7Gug94uoj25berH0","dq":"XD4Rol2daEk03m2DeN62kk-O_R32vfj4Zyw3_pZMNn1BthVsX3PAkMeTigyd6KuVLETa4a5bF6vauKJgoulHlskw3kZgR1KbGkx6wXZnI57qwFNvtEt-A7HE-KmpXV4tBxPETH2ILyrybMaoL7p24Azt9-trZyXkVdLMMSFH1Vk","n":"jIC1Wj8j0kB0DxjAgTzl5nCXirs8NrVkvwoir5qgGv9ffw2Vm2jTRBJKbNhfPr0-3J-R7-A--ZxtULxHrTYxXm-8QaKrZVBl4C_A2fKtZwsyN9CJbeseWJbvjKGgZdlgoO1EQm57p0UahjpaDtbxxw7wedfdnNPnJz_apg4r3hT6YZHiBFxCbQtwkWYT9k2wycBq6j95LZst1l4ZeqsA14yGdZgUYAMJKLaY6cOPVwPVNhmpOYgRbVYs6EmfS7uMnizgb2HzouiToR_v6nR6QCA04GwH1WXn1hxuBPKkm6Qo9tSRiDzzdc72i3K92YW8h8d2cuV0wJ1QTUUnQCWlFw"}
algorithm
RS256
2022-11-22 08:18:25 INFO
EncryptIdToken
Skipped evaluation due to missing required element: client id_token_encrypted_response_alg
path
id_token_encrypted_response_alg
mapped
object
client
2022-11-22 08:18:25 SUCCESS
CreateTokenEndpointResponse
Created token endpoint response
access_token
FbuRSDDVzUW8jGdmKXugGS1FJdlBVjGIuii00FESrakIqkMkgu
token_type
Bearer
id_token
eyJraWQiOiJhOWZkZGY4Yi1hMTE2LTRjYTEtOWZiNi0yZjFiNDA4MjRlOWQiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiZW03akN4eU5yck5IWFBHeFF1RkxZQSIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiaFBOSHJ0elpta3RUT1JPUWFtM1Y2anNCIiwiaXNzIjoiaHR0cHM6XC9cL3d3dy5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXRcL3Rlc3RcL2FcL3RhbF90ZXN0XC8iLCJleHAiOjE2NjkxMDU0MDUsIm5vbmNlIjoiYWJiZTVlNTg0YjIyNGExMmEzNmU5ODI2ODg3YWIxOWEifQ.gURcP_JUyGEn_OA9UT6Hzo_N9rc8mtUgNLGl4mY-6IJVbkfyDdXbT5aKYPFcUoIDUX-3I0sB1_C5BiNuI4IbyZdk4EkVMjYJKaBhtLMinbF-hSZ352t-77Ill6WSFfEBeazEsFvhUHzF7-s6alf6BbRkKXpTnpc1rsxUagL1K2xcP8C0T-aC3LRvFPRQrHsgB_Q3eb17s0G737tQEOmMnYT19Y2JdlF3O9TQs2mXYCHmXS48sLa10ldAm52BlgNfe5Nu_Zv69LyHmZW6v_2syMdsqjlBzQ2qP6qeb3T46u48PzjrFkT-eypfBrKA1SFfD-v--OUOl5x6Ioabc2lbfw
scope
openid email profile address phone
2022-11-22 08:18:25 OUTGOING
oidcc-client-test-missing-iat
Response to HTTP request to test instance w5TWFzoGjNic8Vl
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "access_token": "FbuRSDDVzUW8jGdmKXugGS1FJdlBVjGIuii00FESrakIqkMkgu",
  "token_type": "Bearer",
  "id_token": "eyJraWQiOiJhOWZkZGY4Yi1hMTE2LTRjYTEtOWZiNi0yZjFiNDA4MjRlOWQiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiZW03akN4eU5yck5IWFBHeFF1RkxZQSIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiaFBOSHJ0elpta3RUT1JPUWFtM1Y2anNCIiwiaXNzIjoiaHR0cHM6XC9cL3d3dy5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXRcL3Rlc3RcL2FcL3RhbF90ZXN0XC8iLCJleHAiOjE2NjkxMDU0MDUsIm5vbmNlIjoiYWJiZTVlNTg0YjIyNGExMmEzNmU5ODI2ODg3YWIxOWEifQ.gURcP_JUyGEn_OA9UT6Hzo_N9rc8mtUgNLGl4mY-6IJVbkfyDdXbT5aKYPFcUoIDUX-3I0sB1_C5BiNuI4IbyZdk4EkVMjYJKaBhtLMinbF-hSZ352t-77Ill6WSFfEBeazEsFvhUHzF7-s6alf6BbRkKXpTnpc1rsxUagL1K2xcP8C0T-aC3LRvFPRQrHsgB_Q3eb17s0G737tQEOmMnYT19Y2JdlF3O9TQs2mXYCHmXS48sLa10ldAm52BlgNfe5Nu_Zv69LyHmZW6v_2syMdsqjlBzQ2qP6qeb3T46u48PzjrFkT-eypfBrKA1SFfD-v--OUOl5x6Ioabc2lbfw",
  "scope": "openid email profile address phone"
}
outgoing_path
token
2022-11-22 08:18:30 FINISHED
oidcc-client-test-missing-iat
Test has run to completion
testmodule_result
PASSED
2022-11-22 08:18:33
TEST-RUNNER
Alias has now been claimed by another test
alias
tal_test
new_test_id
tqBy8otmEshzqRj
Test Results