Test Summary

Test Results

Expand All Collapse All
All times are UTC
2022-11-22 08:21:56 INFO
TEST-RUNNER
Test instance yYTxL2sYReZ3fl4 created
baseUrl
https://www.certification.openid.net/test/a/tal_test
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code",
  "request_type": "plain_http_request",
  "response_mode": "default",
  "client_registration": "static_client"
}
alias
tal_test
description
OIDC basic RP
planId
e8h4aJW3KlCcO
config
{
  "keys": [
    {
      "kty": "RSA",
      "n": "pD35mn3PUlIIRrShaxHkggSi1QdIElCRlfVNogupS2PidMDqnO7MDW3hEteZPzxHuARva09X8lSzoT8Ad5zl8fGO0WP0YXTTJKMEqpAHoBmimOX6XnVs7USSxPLVGIGO4pdjKQUeUlTXEcuRUuABa6h13Dj2v0TB6ako8Fa_YDvRxsqkd73SCaDp7Isnx3uy9PlyO9Uc5pupyf2Tq1oqP-NnxYgYl7F8AMgtpZhTqLT3b6xw4I4vjQy3vKBo3kJK8LacnVtKdXJDTZat75qATDDS0Pht8mtwpGPBN0T_j06k7Hx5tZVQHJn1FZGbOzr5THCTKSoz_3Tay5ZN3vgDNw",
      "e": "AQAB",
      "alg": "RS256",
      "use": "sig",
      "kid": "QjA0MzI4REU2NTQzMDkzMzAxRDExRTJGRkY5ODNERkI0MkNFRkJENA"
    }
  ],
  "alias": "tal_test",
  "description": "OIDC basic RP",
  "server": {
    "issuer": "https://us-oidc-op-tal.com/",
    "authorization_endpoint": "https://fidm.us1.gigya.com/oidc/op/v1.0/4_r4_M9P7uNb9K50G4XFmyEw/authorize",
    "token_endpoint": "https://fidm.us1.gigya.com/oidc/op/v1.0/4_r4_M9P7uNb9K50G4XFmyEw/token",
    "userinfo_endpoint": "https://fidm.us1.gigya.com/oidc/op/v1.0/4_r4_M9P7uNb9K50G4XFmyEw/userinfo",
    "jwks_uri": "https://fidm.us1.gigya.com/oidc/op/v1.0/4_r4_M9P7uNb9K50G4XFmyEw/.well-known/jwks"
  },
  "client": {
    "client_id": "hPNHrtzZmktTOROQam3V6jsB",
    "client_secret": "Pm2tl7mD0KVT1fgcuqIzw8h1_odnk6j6j3lf8Dqo0rw31pHfHQX_UbNsIca9MkffsX3jjgVW1zZnNT4dbG_kPA",
    "redirect_uri": "https://socialize.gigya.com/socialize.finalizeOidcLogin?"
  },
  "client_secret_post": {
    "client_id": "hPNHrtzZmktTOROQam3V6jsB",
    "client_secret": "Pm2tl7mD0KVT1fgcuqIzw8h1_odnk6j6j3lf8Dqo0rw31pHfHQX_UbNsIca9MkffsX3jjgVW1zZnNT4dbG_kPA"
  },
  "client2": {
    "client_secret": "OsfJrq6QX1PITBWKKkAUbetQMZ5A3TQmr_18ldff8LkZqSfL7IBb5d7xsyB-HV4I3ppgrODHCKm-BfDLIHWl-g",
    "client_id": "u-NyAWylVfYwyPjl4tqKS9GY"
  },
  "consent": {}
}
testName
oidcc-client-test-nonce-invalid
2022-11-22 08:21:56 SUCCESS
OIDCCGenerateServerConfiguration
Generated default server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/tal_test/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/tal_test/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/tal_test/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/tal_test/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/tal_test/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/tal_test/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post",
    "client_secret_jwt",
    "private_key_jwt"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "preferred_username",
    "gender",
    "birthdate",
    "address",
    "zoneinfo",
    "locale",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified",
    "website",
    "profile",
    "updated_at"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "RSA-OAEP-384",
    "RSA-OAEP-512",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "RSA-OAEP-384",
    "RSA-OAEP-512",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "RSA-OAEP-384",
    "RSA-OAEP-512",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2022-11-22 08:21:56
SetTokenEndpointAuthMethodsSupportedToClientSecretBasicOnly
Changed token_endpoint_auth_methods_supported to client_secret_basic only in server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/tal_test/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/tal_test/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/tal_test/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/tal_test/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/tal_test/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/tal_test/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "preferred_username",
    "gender",
    "birthdate",
    "address",
    "zoneinfo",
    "locale",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified",
    "website",
    "profile",
    "updated_at"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "RSA-OAEP-384",
    "RSA-OAEP-512",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "RSA-OAEP-384",
    "RSA-OAEP-512",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "RSA-OAEP-384",
    "RSA-OAEP-512",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2022-11-22 08:21:57
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "-I17RMqAze5vPPRaCfdguw5IAc-XU6mOHW2iaATiqy5Kp-N3CT8FCEfGU8cPyaOQ1PIVpNa2wAbv4BxqabsxH8HFa9Zzuj6cnL8gHYb3mvd4wMalP1t6sELbvWU_CGpBdrdOWGb71g77nxRjDDLnZNRNmGVLLHvHz2M-y8ic8ME",
      "kty": "RSA",
      "q": "s3K1MfyDzRO27tpV_y4QwUuOjEdDXu-xkuXRUL5BHKvouMC4xCdY1-A9PiZyKGPfVVyrrPSw4oWC7Ybw06Fs3srd4SPdaaI4W8v5lmjukXZPCtT8N9MddUCue_RwGfu3psp_0Bl0Yx3oF-6fAlMHdyl-nmtQ3yS81_BDtsEdLE0",
      "d": "EumNHbwJ3bUYYvLIcpWJpyOiczLh2IKBagZuJn2g61tP5r1ISsE6K4e97wJxzat0EbdtQnmHAeVUz5-muPg-dfOjartcZtPh6r0yWWNVwohqxMoqCPjLac3xV7pdxdP39y7m1hiLAG1U8PwIJELttCvLiqB8bZsK02TvQXxEEGd0mZ56a-eoGY2XQd0EqeiK9Bm7auiH4B2usbFaZaTasMDxqdWT-r38UUDSCSmBcXcIu7xr07WzFGyUObB9GS9kAEQRMIDIHVVqOa2S1JLAA2-VxD2QTy8-AIt1QGY4o9ZN7ftR_bC7NSnq-W0rnSd8xeiWYo4oQNVuH_wkzlF6AQ",
      "e": "AQAB",
      "use": "sig",
      "kid": "cabfbeea-8488-4b94-9eb9-29a61ed9ef5f",
      "qi": "Q9lYm9Efilzen4J7c53ndVP86NHQSP7WPzEgaD2VjGXbLvhMu5Ndbt7Ot0xGcIcKCcPY0-uYy5Q1yFRTxKuoeW_BRAjWSP6KSUYdyrC7yy8K6MlsEabXJrBuR4I1O8mzXX55wKQKHUgSbmnascLKTl0BBdDExnGhK-3P6sQsIHw",
      "dp": "u54glJa_j7MR6NMSPD-tlsV6-VL4CcENc41UcGxvpYO1-vEq46HcbJmxTYAPnMeJBhUO3XTuUhlqbKNGeDVDKZOdMH-ar9WfZnqnBWLh-OohDnNkPWUSQYbWVCre371FWRWZYAWsx7JboYNEGOs729KeGBEuI4_0Dcn-ltkCDoE",
      "dq": "eSBLeGM3YB0XlOBhve6NNrxWiw-rRRDMLxjbkgHqF31eiB7mWNkqWgUtsZ7n3aWUYZ088HD2WODAAK7eLiu_Ph93Z3n7AUuTeTsUzNcleaB_OBON7-yb7MJtRJQ5ewBy9a2oWoJkEmdke4sBX-NFncSviCVuIEE_Cw9N1bVCiN0",
      "n": "rjpMHo6htYt7k0tU5xj7fX3KRJBpMwo3lJ0wweGba5rIS-ZX8xmVOP9nqjl2QIfxgQaDMvvOm3gSmlJrQj91LOnPbtzrR3opQvkO2NYngdd0kGgr3v7KVNSSKSgkR77b6YEdwoO--Sy-Oug33CAGlsK-FwgZQ9lwbx0-V3_Nyd4CsTRHpn1x0Avb5nKp4-vd92gica31xUdrNilhENdcGRcJOZIbklbuvS2luBa7FAzaTcoDIp3JDrQIO2JkpWWvFM8cfXJXRP-PyxM-agS10-R7pGMWMT241I9BMKRN3usAJz01RuND0sAqkr0la-tUhUuvVcZksMWtfqFFF3KWDQ"
    },
    {
      "kty": "EC",
      "d": "5_E3RyTaQH8cGrJaTA9cWbTBsWO_4Q4xIJubttU0tPc",
      "use": "sig",
      "crv": "P-256",
      "kid": "5f818046-1a33-4fd1-8652-2a061d4ae55b",
      "x": "_0fkGS6YxDoLGEZG93r9SOkUyQMrM6iR-6B9zYyBSfc",
      "y": "6oY6N7Es-WQ6cHXw67rcByyuDk26K0YbNMPKR386vuU"
    },
    {
      "kty": "EC",
      "d": "v6k0cCvP8CG6iAddWf2aXa_r_oRCBtvKVfyAwOYN6eQ",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "5f903b61-a77a-4356-a630-a63551ca0b75",
      "x": "tjeAx-fJYTLN_MpeVj6lJzDf85zxDM2RmudkYwLwKVc",
      "y": "iOUtgNK72MVAu-iNYBtSai0gPZImmYYdnUjV96_awlo"
    },
    {
      "kty": "OKP",
      "d": "g55W43dQKwFGGZ5ovcTdegHi2Q_apOGBftBTjBRjj8w",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "59f667de-441c-4542-85e7-4668734cedb3",
      "x": "4rnNY5-A034wgcXJLhuIzBHxWTVNpvO3Ua3Hz24BcUc"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "2Taemus41sZhs3ZiuxL5J3oGXIBj_YXQyvBJkIWERuV_03eafsxlBvKmVbC6o6ihIYWw9XaNwu3fP6HNkv7Y0CabbINNSmkgV0W_avGygiruDi_gYWE6iu0-FN2Rt7pGoIhH5XGiw7rsZ7OyH3qlYnwlt9el8OGVEreTxSwmQE0",
      "kty": "RSA",
      "q": "tnVyRjiYmCQ5xm2INWzzrt69mji_lb1j4j_xDsZhUXERNyasnn4xYJbQxn6uzaRyi4HEh1wiaX3o3519Q-IYllB3hHic0XU0UR6Hvy4BOT0ui48hy1mz7aq7VvBlPZNUmCWGF6Yo4dySjVpG_ufjJY62PfzxaQfcemtFMCnATG8",
      "d": "EqZg7_KIbaT9URvq9Kgxp6_iPzncq1ID1LqEa-hU2gjy6UIo-IMSAitpVBW6b5--EXDJT7VFbUtDCsgwULXMGl6RWOeB_XZmkTbOaBD9JjDm4Vb_jCouPpldJjVmMJTFk1Z0vwo9iNklDgKEPiCEhVtVIpInSFy8x-wv6DOTdiA0i6as6RHBdtCSeDQfYuuFhC6zMPU6Y2pxc2iqRO5-Rhg-nbbn7Hlotpz_kVMNrOl4KgwJJFWfvWsaiworo224Bn8msFVyRlvPzgQarX_2vei5gOJ_DEVSNHkE-fckj8uez894Kd7EDyFlgssaWLzTB0NHq2p2RtGDBbddJU2NGQ",
      "e": "AQAB",
      "use": "enc",
      "kid": "3996dc2c-7e2d-4078-a42f-7ca9b4c27cb6",
      "qi": "yARx4givQXsUibO9aOc9TdQnFHsqfjdmRg5Jl0f-7wcV-n64jD6GWVwWMpfQnZdWzCKzzBbAz5GrYjpPUrkNVHNs4i_oQZX5pleL2lfpCl08CvRCIa-e58RwBXkJdb3CtMnvQESZ00HoeID7NT4xaXhqekKMdBntaySf9yEnnfM",
      "dp": "lonQKjXTUqZyl9n4WwavPrjHJ9yjb9UJ-1vE4DBomGn9ySUfIbmuWr5YoRK2hy4bXgw1tCjR3sLU8ljFDJcq1Deth-sH6gYpr9Ja81dHDAeMrLBppZOo6xe46uUUVGz4_dD1YwL6dwRZSxWy4TYy4KqByYPfMa5ljm9ELmaGrBE",
      "alg": "RSA-OAEP",
      "dq": "B7E95x39uPRWBzqY8n-samPzpGveD-cTLfe6JwBQHAnjSurzfh8d38-b77JpljvnpGANNBO7U60-Qyc1n8YJeVTdJRWcruv9D6p02KeM36fnrXSUXSlj_5IiIdEyw3zRpTR3ycl0kckl2JXExnxqRCwXHNfsKZxuPC8HlLc95zs",
      "n": "mtB7roedsP4NnzecqqkkWGCPrmu24t8gF8_Ju7xzH2n3Dqie16GojlRa567CJLYoLmVznP28DeaGPkwKiPglnnxPfYwTOjdy3xFV29u5Bra4cc9TVsti9Ku3ve83aij9s4qfQhU5lzj39qXEjWZ0FFvHxVn567PFp8TZpzO1N4pSWcbnCHj2DWayTbWNu5XSOBZm1vvuEzXfN13LJ7wQhsSObUy2Wjo5fk0wjxZmkSzfgAYUU8yc-LsNpREk0Rkzf8UPpFZdfdW_1G9lD4riN0s978bNIcwl1j0bnZbuQ8mLebSyItFiRdzyiBNKaeZEJWSyYBchZzcuGqgGDmy9Yw"
    },
    {
      "kty": "EC",
      "d": "ohgOqQq2uQdNCj2tVUJ9PO6o-FlgK9AIWppqrNBBlj8",
      "use": "enc",
      "crv": "P-256",
      "kid": "4af1e602-2543-4739-889e-6b0473fab00a",
      "x": "WVd4V35kM1R6yo6vuP3ZJrxjKaVbJODAyShpEldsu1w",
      "y": "xLXNJZKpZRW1fo7DaDml2YppyiJQN7FBGXJOesXBAjg",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "cabfbeea-8488-4b94-9eb9-29a61ed9ef5f",
      "n": "rjpMHo6htYt7k0tU5xj7fX3KRJBpMwo3lJ0wweGba5rIS-ZX8xmVOP9nqjl2QIfxgQaDMvvOm3gSmlJrQj91LOnPbtzrR3opQvkO2NYngdd0kGgr3v7KVNSSKSgkR77b6YEdwoO--Sy-Oug33CAGlsK-FwgZQ9lwbx0-V3_Nyd4CsTRHpn1x0Avb5nKp4-vd92gica31xUdrNilhENdcGRcJOZIbklbuvS2luBa7FAzaTcoDIp3JDrQIO2JkpWWvFM8cfXJXRP-PyxM-agS10-R7pGMWMT241I9BMKRN3usAJz01RuND0sAqkr0la-tUhUuvVcZksMWtfqFFF3KWDQ"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "c0da4662-6e22-4e1e-87a6-09f9d0b802a9",
      "n": "nC0X4MO13aInV5ZqIjyFOr-FBGvw3HvXqz0hzz1MhaICiis2ngG_wxKr__omzS_HdCpeORd39DAnCHk-B9TyBdJHgioJZ9RD0tMtl4R4fSUwa7hRl5Nk_M1O4pocVHMJsDJCnEFp0HO1ghG66VYKSDKVvdHDV9yG-qL-5u1ADzxXucwL-stgMTCEQECraSScXB9zK0sarCYa_zBZCJydYGnctu_op7kUIqUKsO80S949OzWGcBJN3AAFIqubUVPSrJOrT2XsxniD6IRi_Ty01pAdzr47ZTcK1g_D58AxOkVHFppFBpsEWd2bho0tEFYJku91aqS7tqw0xp9jBiwpcw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "5f818046-1a33-4fd1-8652-2a061d4ae55b",
      "x": "_0fkGS6YxDoLGEZG93r9SOkUyQMrM6iR-6B9zYyBSfc",
      "y": "6oY6N7Es-WQ6cHXw67rcByyuDk26K0YbNMPKR386vuU"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "b5c26af5-18a2-4191-81c3-c97028e28b49",
      "x": "RvuThpBjeXPeBAg2BNA61QnlA9cr72Wwr5efdV84Mow",
      "y": "43yqTbfmTCBawjyukAJc-px5veFqXpewHkXqRPeo44s"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "5f903b61-a77a-4356-a630-a63551ca0b75",
      "x": "tjeAx-fJYTLN_MpeVj6lJzDf85zxDM2RmudkYwLwKVc",
      "y": "iOUtgNK72MVAu-iNYBtSai0gPZImmYYdnUjV96_awlo"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "59f667de-441c-4542-85e7-4668734cedb3",
      "x": "4rnNY5-A034wgcXJLhuIzBHxWTVNpvO3Ua3Hz24BcUc"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "3996dc2c-7e2d-4078-a42f-7ca9b4c27cb6",
      "alg": "RSA-OAEP",
      "n": "mtB7roedsP4NnzecqqkkWGCPrmu24t8gF8_Ju7xzH2n3Dqie16GojlRa567CJLYoLmVznP28DeaGPkwKiPglnnxPfYwTOjdy3xFV29u5Bra4cc9TVsti9Ku3ve83aij9s4qfQhU5lzj39qXEjWZ0FFvHxVn567PFp8TZpzO1N4pSWcbnCHj2DWayTbWNu5XSOBZm1vvuEzXfN13LJ7wQhsSObUy2Wjo5fk0wjxZmkSzfgAYUU8yc-LsNpREk0Rkzf8UPpFZdfdW_1G9lD4riN0s978bNIcwl1j0bnZbuQ8mLebSyItFiRdzyiBNKaeZEJWSyYBchZzcuGqgGDmy9Yw"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "4af1e602-2543-4739-889e-6b0473fab00a",
      "x": "WVd4V35kM1R6yo6vuP3ZJrxjKaVbJODAyShpEldsu1w",
      "y": "xLXNJZKpZRW1fo7DaDml2YppyiJQN7FBGXJOesXBAjg",
      "alg": "ECDH-ES"
    }
  ]
}
2022-11-22 08:21:57 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2022-11-22 08:21:57 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2022-11-22 08:21:57 SUCCESS
OIDCCLoadUserInfo
Added user information
user_info
{
  "sub": "user-subject-1234531",
  "name": "Demo T. User",
  "given_name": "Demo",
  "family_name": "User",
  "middle_name": "Theresa",
  "nickname": "Dee",
  "preferred_username": "d.tu",
  "gender": "female",
  "birthdate": "2000-02-03",
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "zoneinfo": "America/Los_Angeles",
  "locale": "en-US",
  "phone_number": "+1 555 5550000",
  "phone_number_verified": false,
  "email": "user@example.com",
  "email_verified": false,
  "website": "https://openid.net/",
  "profile": "https://example.com/user",
  "updated_at": 1580000000
}
2022-11-22 08:21:57 SUCCESS
OIDCCGetStaticClientConfigurationForRPTests
Found a static client object
client_id
hPNHrtzZmktTOROQam3V6jsB
client_secret
Pm2tl7mD0KVT1fgcuqIzw8h1_odnk6j6j3lf8Dqo0rw31pHfHQX_UbNsIca9MkffsX3jjgVW1zZnNT4dbG_kPA
redirect_uris
[
  "https://socialize.gigya.com/socialize.finalizeOidcLogin?"
]
2022-11-22 08:21:57 SUCCESS
EnsureClientDoesNotHaveBothJwksAndJwksUri
Client does not have both jwks and jwks_uri set
client
{
  "client_id": "hPNHrtzZmktTOROQam3V6jsB",
  "client_secret": "Pm2tl7mD0KVT1fgcuqIzw8h1_odnk6j6j3lf8Dqo0rw31pHfHQX_UbNsIca9MkffsX3jjgVW1zZnNT4dbG_kPA",
  "redirect_uris": [
    "https://socialize.gigya.com/socialize.finalizeOidcLogin?"
  ]
}
2022-11-22 08:21:57 INFO
FetchClientKeys
Skipped evaluation due to missing required element: client jwks_uri
path
jwks_uri
mapped
object
client
2022-11-22 08:21:57 SUCCESS
ValidateClientGrantTypes
grant_types match response_types
grant_types
[
  "authorization_code"
]
response_types
[
  "code"
]
2022-11-22 08:21:57 SUCCESS
OIDCCValidateClientRedirectUris
Valid redirect_uri(s) provided in registration request
redirect_uris
[
  "https://socialize.gigya.com/socialize.finalizeOidcLogin?"
]
2022-11-22 08:21:57 SUCCESS
ValidateClientLogoUris
Client does not contain any logo_uri
2022-11-22 08:21:57 SUCCESS
ValidateClientUris
Client does not contain any client_uri
2022-11-22 08:21:57 SUCCESS
ValidateClientPolicyUris
Client does not contain any policy_uri
2022-11-22 08:21:57 SUCCESS
ValidateClientTosUris
Client does not contain any tos_uri
2022-11-22 08:21:57 SUCCESS
ValidateClientSubjectType
A subject_type was not provided
2022-11-22 08:21:57 INFO
ValidateIdTokenSignedResponseAlg
Skipped evaluation due to missing required element: client id_token_signed_response_alg
path
id_token_signed_response_alg
mapped
object
client
2022-11-22 08:21:57 SUCCESS
EnsureIdTokenEncryptedResponseAlgIsSetIfEncIsSet
id_token_encrypted_response_enc is not set
2022-11-22 08:21:57 INFO
ValidateUserinfoSignedResponseAlg
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2022-11-22 08:21:57 SUCCESS
EnsureUserinfoEncryptedResponseAlgIsSetIfEncIsSet
userinfo_encrypted_response_enc is not set
2022-11-22 08:21:57 INFO
ValidateRequestObjectSigningAlg
Skipped evaluation due to missing required element: client request_object_signing_alg
path
request_object_signing_alg
mapped
object
client
2022-11-22 08:21:57 SUCCESS
EnsureRequestObjectEncryptionAlgIsSetIfEncIsSet
request_object_encryption_enc is not set
2022-11-22 08:21:57 INFO
ValidateTokenEndpointAuthSigningAlg
Skipped evaluation due to missing required element: client token_endpoint_auth_signing_alg
path
token_endpoint_auth_signing_alg
mapped
object
client
2022-11-22 08:21:57 SUCCESS
ValidateDefaultMaxAge
default_max_age is not set
2022-11-22 08:21:57 INFO
ValidateRequireAuthTime
Skipped evaluation due to missing required element: client require_auth_time
path
require_auth_time
mapped
object
client
2022-11-22 08:21:57 INFO
ValidateDefaultAcrValues
Skipped evaluation due to missing required element: client default_acr_values
path
default_acr_values
mapped
object
client
2022-11-22 08:21:57 INFO
ValidateInitiateLoginUri
Skipped evaluation due to missing required element: client initiate_login_uri
path
initiate_login_uri
mapped
object
client
2022-11-22 08:21:57 INFO
ValidateRequestUris
Skipped evaluation due to missing required element: client request_uris
path
request_uris
mapped
object
client
2022-11-22 08:21:57 SUCCESS
OIDCCExtractServerSigningAlg
Using the default algorithm for the first key in server jwks
signing_algorithm
RS256
2022-11-22 08:21:57
SetClientIdTokenSignedResponseAlgToServerSigningAlg
Set id_token_signed_response_alg for the registered client
id_token_signed_response_alg
RS256
2022-11-22 08:21:57
oidcc-client-test-nonce-invalid
Setup Done
2022-11-22 08:22:08 INCOMING
oidcc-client-test-nonce-invalid
Incoming HTTP request to /test/a/tal_test/jwks
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "PostmanRuntime/7.29.2",
  "accept": "*/*",
  "postman-token": "9c49e96d-b259-47d6-9ff7-12a9ab6f1991",
  "accept-encoding": "gzip, deflate, br",
  "cookie": "JSESSIONID\u003d257ED7B888E67176B6F9F3421FBF063F",
  "connection": "close"
}
incoming_path
/test/a/tal_test/jwks
incoming_body_form_params
incoming_method
GET
incoming_tls_version
TLSv1.2
incoming_tls_cert
incoming_query_string_params
{}
incoming_body
incoming_tls_chain
[
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL"
]
incoming_tls_cipher
ECDHE-RSA-AES128-GCM-SHA256
incoming_body_json
Jwks endpoint
2022-11-22 08:22:08 OUTGOING
oidcc-client-test-nonce-invalid
Response to HTTP request to test instance yYTxL2sYReZ3fl4
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "cabfbeea-8488-4b94-9eb9-29a61ed9ef5f",
      "n": "rjpMHo6htYt7k0tU5xj7fX3KRJBpMwo3lJ0wweGba5rIS-ZX8xmVOP9nqjl2QIfxgQaDMvvOm3gSmlJrQj91LOnPbtzrR3opQvkO2NYngdd0kGgr3v7KVNSSKSgkR77b6YEdwoO--Sy-Oug33CAGlsK-FwgZQ9lwbx0-V3_Nyd4CsTRHpn1x0Avb5nKp4-vd92gica31xUdrNilhENdcGRcJOZIbklbuvS2luBa7FAzaTcoDIp3JDrQIO2JkpWWvFM8cfXJXRP-PyxM-agS10-R7pGMWMT241I9BMKRN3usAJz01RuND0sAqkr0la-tUhUuvVcZksMWtfqFFF3KWDQ"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "c0da4662-6e22-4e1e-87a6-09f9d0b802a9",
      "n": "nC0X4MO13aInV5ZqIjyFOr-FBGvw3HvXqz0hzz1MhaICiis2ngG_wxKr__omzS_HdCpeORd39DAnCHk-B9TyBdJHgioJZ9RD0tMtl4R4fSUwa7hRl5Nk_M1O4pocVHMJsDJCnEFp0HO1ghG66VYKSDKVvdHDV9yG-qL-5u1ADzxXucwL-stgMTCEQECraSScXB9zK0sarCYa_zBZCJydYGnctu_op7kUIqUKsO80S949OzWGcBJN3AAFIqubUVPSrJOrT2XsxniD6IRi_Ty01pAdzr47ZTcK1g_D58AxOkVHFppFBpsEWd2bho0tEFYJku91aqS7tqw0xp9jBiwpcw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "5f818046-1a33-4fd1-8652-2a061d4ae55b",
      "x": "_0fkGS6YxDoLGEZG93r9SOkUyQMrM6iR-6B9zYyBSfc",
      "y": "6oY6N7Es-WQ6cHXw67rcByyuDk26K0YbNMPKR386vuU"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "b5c26af5-18a2-4191-81c3-c97028e28b49",
      "x": "RvuThpBjeXPeBAg2BNA61QnlA9cr72Wwr5efdV84Mow",
      "y": "43yqTbfmTCBawjyukAJc-px5veFqXpewHkXqRPeo44s"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "5f903b61-a77a-4356-a630-a63551ca0b75",
      "x": "tjeAx-fJYTLN_MpeVj6lJzDf85zxDM2RmudkYwLwKVc",
      "y": "iOUtgNK72MVAu-iNYBtSai0gPZImmYYdnUjV96_awlo"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "59f667de-441c-4542-85e7-4668734cedb3",
      "x": "4rnNY5-A034wgcXJLhuIzBHxWTVNpvO3Ua3Hz24BcUc"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "3996dc2c-7e2d-4078-a42f-7ca9b4c27cb6",
      "alg": "RSA-OAEP",
      "n": "mtB7roedsP4NnzecqqkkWGCPrmu24t8gF8_Ju7xzH2n3Dqie16GojlRa567CJLYoLmVznP28DeaGPkwKiPglnnxPfYwTOjdy3xFV29u5Bra4cc9TVsti9Ku3ve83aij9s4qfQhU5lzj39qXEjWZ0FFvHxVn567PFp8TZpzO1N4pSWcbnCHj2DWayTbWNu5XSOBZm1vvuEzXfN13LJ7wQhsSObUy2Wjo5fk0wjxZmkSzfgAYUU8yc-LsNpREk0Rkzf8UPpFZdfdW_1G9lD4riN0s978bNIcwl1j0bnZbuQ8mLebSyItFiRdzyiBNKaeZEJWSyYBchZzcuGqgGDmy9Yw"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "4af1e602-2543-4739-889e-6b0473fab00a",
      "x": "WVd4V35kM1R6yo6vuP3ZJrxjKaVbJODAyShpEldsu1w",
      "y": "xLXNJZKpZRW1fo7DaDml2YppyiJQN7FBGXJOesXBAjg",
      "alg": "ECDH-ES"
    }
  ]
}
outgoing_path
jwks
2022-11-22 08:22:23 INCOMING
oidcc-client-test-nonce-invalid
Incoming HTTP request to /test/a/tal_test/authorize
incoming_headers
{
  "host": "www.certification.openid.net",
  "sec-ch-ua": "\"Google Chrome\";v\u003d\"107\", \"Chromium\";v\u003d\"107\", \"Not\u003dA?Brand\";v\u003d\"24\"",
  "sec-ch-ua-mobile": "?0",
  "sec-ch-ua-platform": "\"macOS\"",
  "upgrade-insecure-requests": "1",
  "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/avif,image/webp,image/apng,*/*;q\u003d0.8,application/signed-exchange;v\u003db3;q\u003d0.9",
  "sec-fetch-site": "cross-site",
  "sec-fetch-mode": "navigate",
  "sec-fetch-dest": "document",
  "referer": "https://socialize.us1.gigya.com/",
  "accept-encoding": "gzip, deflate, br",
  "accept-language": "en-US,en;q\u003d0.9,he;q\u003d0.8",
  "cookie": "__utma\u003d201319536.76864017.1658307142.1664786690.1665555850.13; __utmz\u003d201319536.1665555850.13.6.utmcsr\u003dgoogle|utmccn\u003d(organic)|utmcmd\u003dorganic|utmctr\u003d(not%20provided); JSESSIONID\u003d119918A143D359300525FD5835CE0195",
  "connection": "close"
}
incoming_path
/test/a/tal_test/authorize
incoming_body_form_params
incoming_method
GET
incoming_tls_version
TLSv1.2
incoming_tls_cert
incoming_query_string_params
{
  "client_id": "hPNHrtzZmktTOROQam3V6jsB",
  "redirect_uri": "https://socialize.gigya.com/socialize.finalizeOidcLogin?",
  "scope": "openid email profile address phone",
  "state": "tk2.oi.AcbHvH6hSQ.-7Nk2eEKQCHahUPYpngFrBoo1W_m4hMmkUMhI__otEBXyELqAVp6b1NFHyY6bh_1.jraebPdsKRsQUr984X0_AkfET010HlMVjBOrYBYe9A3Qwzjd2Sqrf47B8LdBodIFnQuJNq5105tyb_BTXRtBvg.sc3yc463l70n4055151h7",
  "response_type": "code",
  "nonce": "77cacc2765bc482f9144df4718cd9240"
}
incoming_body
incoming_tls_chain
[
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL"
]
incoming_tls_cipher
ECDHE-RSA-AES128-GCM-SHA256
incoming_body_json
Authorization endpoint
2022-11-22 08:22:23 SUCCESS
EnsureRequestDoesNotContainRequestObject
Request does not contain a request parameter
2022-11-22 08:22:23 SUCCESS
EnsureAuthorizationHttpRequestContainsOpenIDScope
Found 'openid' in scope http request parameter
actual
[
  "openid",
  "email",
  "profile",
  "address",
  "phone"
]
expected
openid
2022-11-22 08:22:23 SUCCESS
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
effective_authorization_endpoint_request
{
  "client_id": "hPNHrtzZmktTOROQam3V6jsB",
  "redirect_uri": "https://socialize.gigya.com/socialize.finalizeOidcLogin?",
  "scope": "openid email profile address phone",
  "state": "tk2.oi.AcbHvH6hSQ.-7Nk2eEKQCHahUPYpngFrBoo1W_m4hMmkUMhI__otEBXyELqAVp6b1NFHyY6bh_1.jraebPdsKRsQUr984X0_AkfET010HlMVjBOrYBYe9A3Qwzjd2Sqrf47B8LdBodIFnQuJNq5105tyb_BTXRtBvg.sc3yc463l70n4055151h7",
  "response_type": "code",
  "nonce": "77cacc2765bc482f9144df4718cd9240"
}
2022-11-22 08:22:23 SUCCESS
ExtractRequestedScopes
Requested scopes
scope
openid email profile address phone
2022-11-22 08:22:23 SUCCESS
ExtractNonceFromAuthorizationRequest
Extracted nonce
nonce
77cacc2765bc482f9144df4718cd9240
2022-11-22 08:22:23 INFO
EnsureAuthorizationRequestContainsPkceCodeChallenge
Skipped evaluation due to missing required element: effective_authorization_endpoint_request code_challenge
path
code_challenge
mapped
object
effective_authorization_endpoint_request
2022-11-22 08:22:23 SUCCESS
EnsureResponseTypeIsCode
Response type is expected value
expected
code
2022-11-22 08:22:23 SUCCESS
EnsureMatchingClientId
Client ID matched
client_id
hPNHrtzZmktTOROQam3V6jsB
2022-11-22 08:22:23 SUCCESS
EnsureValidRedirectUriForAuthorizationEndpointRequest
redirect_uri is one of the allowed redirect uris
actual
https://socialize.gigya.com/socialize.finalizeOidcLogin?
expected
[
  "https://socialize.gigya.com/socialize.finalizeOidcLogin?"
]
2022-11-22 08:22:23 SUCCESS
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
actual
[
  "openid",
  "email",
  "profile",
  "address",
  "phone"
]
expected
openid
2022-11-22 08:22:23 SUCCESS
DisallowMaxAgeEqualsZeroAndPromptNone
The client did not send max_age=0 and prompt=none parameters as expected
2022-11-22 08:22:23 SUCCESS
CreateAuthorizationCode
Created authorization code
authorization_code
I3LsJwROnq4l749yXFYd9yfvigKilTqm
2022-11-22 08:22:23 SUCCESS
CalculateCHash
Successful c_hash encoding
c_hash
UxBMxJMj7G6jgVQBytrzcQ
2022-11-22 08:22:23 SUCCESS
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
params
{
  "redirect_uri": "https://socialize.gigya.com/socialize.finalizeOidcLogin?",
  "state": "tk2.oi.AcbHvH6hSQ.-7Nk2eEKQCHahUPYpngFrBoo1W_m4hMmkUMhI__otEBXyELqAVp6b1NFHyY6bh_1.jraebPdsKRsQUr984X0_AkfET010HlMVjBOrYBYe9A3Qwzjd2Sqrf47B8LdBodIFnQuJNq5105tyb_BTXRtBvg.sc3yc463l70n4055151h7"
}
2022-11-22 08:22:23 SUCCESS
AddCodeToAuthorizationEndpointResponseParams
Added code to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://socialize.gigya.com/socialize.finalizeOidcLogin?",
  "state": "tk2.oi.AcbHvH6hSQ.-7Nk2eEKQCHahUPYpngFrBoo1W_m4hMmkUMhI__otEBXyELqAVp6b1NFHyY6bh_1.jraebPdsKRsQUr984X0_AkfET010HlMVjBOrYBYe9A3Qwzjd2Sqrf47B8LdBodIFnQuJNq5105tyb_BTXRtBvg.sc3yc463l70n4055151h7",
  "code": "I3LsJwROnq4l749yXFYd9yfvigKilTqm"
}
2022-11-22 08:22:23
SendAuthorizationResponseWithResponseModeQuery
Redirecting back to client
uri
https://socialize.gigya.com/socialize.finalizeOidcLogin?state=tk2.oi.AcbHvH6hSQ.-7Nk2eEKQCHahUPYpngFrBoo1W_m4hMmkUMhI__otEBXyELqAVp6b1NFHyY6bh_1.jraebPdsKRsQUr984X0_AkfET010HlMVjBOrYBYe9A3Qwzjd2Sqrf47B8LdBodIFnQuJNq5105tyb_BTXRtBvg.sc3yc463l70n4055151h7&code=I3LsJwROnq4l749yXFYd9yfvigKilTqm
2022-11-22 08:22:23 OUTGOING
oidcc-client-test-nonce-invalid
Response to HTTP request to test instance yYTxL2sYReZ3fl4
outgoing
org.springframework.web.servlet.view.RedirectView: [RedirectView]; URL [https://socialize.gigya.com/socialize.finalizeOidcLogin?state=tk2.oi.AcbHvH6hSQ.-7Nk2eEKQCHahUPYpngFrBoo1W_m4hMmkUMhI__otEBXyELqAVp6b1NFHyY6bh_1.jraebPdsKRsQUr984X0_AkfET010HlMVjBOrYBYe9A3Qwzjd2Sqrf47B8LdBodIFnQuJNq5105tyb_BTXRtBvg.sc3yc463l70n4055151h7&code=I3LsJwROnq4l749yXFYd9yfvigKilTqm]
outgoing_path
authorize
2022-11-22 08:22:24 INCOMING
oidcc-client-test-nonce-invalid
Incoming HTTP request to /test/a/tal_test/token
incoming_headers
{
  "host": "www.certification.openid.net",
  "authorization": "Basic aFBOSHJ0elpta3RUT1JPUWFtM1Y2anNCOlBtMnRsN21EMEtWVDFmZ2N1cUl6dzhoMV9vZG5rNmo2ajNsZjhEcW8wcnczMXBIZkhRWF9VYk5zSWNhOU1rZmZzWDNqamdWVzF6Wm5OVDRkYkdfa1BB",
  "accept": "application/json, application/json",
  "cookie": "JSESSIONID\u003d9B191115A14BE432CE4273D7653201F7",
  "content-type": "application/x-www-form-urlencoded",
  "connection": "close",
  "content-length": "147"
}
incoming_path
/test/a/tal_test/token
incoming_body_form_params
{
  "code": "I3LsJwROnq4l749yXFYd9yfvigKilTqm",
  "grant_type": "authorization_code",
  "redirect_uri": "https://socialize.gigya.com/socialize.finalizeOidcLogin?"
}
incoming_method
POST
incoming_tls_version
TLSv1.2
incoming_tls_cert
incoming_query_string_params
{}
incoming_body
code=I3LsJwROnq4l749yXFYd9yfvigKilTqm&grant_type=authorization_code&redirect_uri=https%3A%2F%2Fsocialize.gigya.com%2Fsocialize.finalizeOidcLogin%3F
incoming_tls_chain
[
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL"
]
incoming_tls_cipher
ECDHE-RSA-AES256-GCM-SHA384
incoming_body_json
Token endpoint
2022-11-22 08:22:24
CheckClientIdMatchesOnTokenRequestIfPresent
client_id not present, nothing to check
2022-11-22 08:22:24 SUCCESS
ExtractClientCredentialsFromBasicAuthorizationHeader
Extracted client authentication
client_id
hPNHrtzZmktTOROQam3V6jsB
client_secret
Pm2tl7mD0KVT1fgcuqIzw8h1_odnk6j6j3lf8Dqo0rw31pHfHQX_UbNsIca9MkffsX3jjgVW1zZnNT4dbG_kPA
method
client_secret_basic
2022-11-22 08:22:24 SUCCESS
ValidateClientIdAndSecret
Client id and secret match
2022-11-22 08:22:24 SUCCESS
ValidateAuthorizationCode
Found authorization code
authorization_code
I3LsJwROnq4l749yXFYd9yfvigKilTqm
2022-11-22 08:22:24 SUCCESS
ValidateRedirectUriForTokenEndpointRequest
redirect_uri is the same as the one used in the authorization request
actual
https://socialize.gigya.com/socialize.finalizeOidcLogin?
2022-11-22 08:22:24 SUCCESS
GenerateBearerAccessToken
Generated access token
access_token
2QGCb3GI8a0jWXcfBWtPoxbgf8NSJSsHwJmRdgaZsH2cuo2cLY
2022-11-22 08:22:24 SUCCESS
CalculateAtHash
Successful at_hash encoding
at_hash
gZtRo-HWDRel266fgocjzQ
2022-11-22 08:22:24 SUCCESS
GenerateIdTokenClaims
Created ID Token Claims
iss
https://www.certification.openid.net/test/a/tal_test/
sub
user-subject-1234531
aud
hPNHrtzZmktTOROQam3V6jsB
nonce
77cacc2765bc482f9144df4718cd9240
iat
1669105344
exp
1669105644
2022-11-22 08:22:24 SUCCESS
AddInvalidNonceValueToIdToken
Added invalid nonce to ID token claims
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/a/tal_test/",
  "sub": "user-subject-1234531",
  "aud": "hPNHrtzZmktTOROQam3V6jsB",
  "nonce": "77cacc2765bc482f9144df4718cd92401",
  "iat": 1669105344,
  "exp": 1669105644
}
nonce
77cacc2765bc482f9144df4718cd92401
2022-11-22 08:22:24 SUCCESS
AddAtHashToIdTokenClaims
Added at_hash to ID token claims
at_hash
gZtRo-HWDRel266fgocjzQ
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/a/tal_test/",
  "sub": "user-subject-1234531",
  "aud": "hPNHrtzZmktTOROQam3V6jsB",
  "nonce": "77cacc2765bc482f9144df4718cd92401",
  "iat": 1669105344,
  "exp": 1669105644,
  "at_hash": "gZtRo-HWDRel266fgocjzQ"
}
2022-11-22 08:22:24 SUCCESS
OIDCCSignIdToken
Signed the ID token
id_token
eyJraWQiOiJjYWJmYmVlYS04NDg4LTRiOTQtOWViOS0yOWE2MWVkOWVmNWYiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiZ1p0Um8tSFdEUmVsMjY2ZmdvY2p6USIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiaFBOSHJ0elpta3RUT1JPUWFtM1Y2anNCIiwiaXNzIjoiaHR0cHM6XC9cL3d3dy5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXRcL3Rlc3RcL2FcL3RhbF90ZXN0XC8iLCJleHAiOjE2NjkxMDU2NDQsIm5vbmNlIjoiNzdjYWNjMjc2NWJjNDgyZjkxNDRkZjQ3MThjZDkyNDAxIiwiaWF0IjoxNjY5MTA1MzQ0fQ.i0CYXkfmO2UPcRzJSZb8MgVVEtpVKxbTMtAO5DCScTvqsFkke2hSYU9wwy1cmE5URb_R-qSToIRKJG24OCMRFfspuqC8Zx7OlqptJ3nFZjcIDj4U45cTGQGat2Cqaii3oWV65zNm1ptyueGiT7HHjX4xfa3K7d2LV5rWH6c8t_9qsNyi8wTmAlHvcEEIYj8ehE-ecADVsdChuCO31IcP6CoqVpsXVxKqUHMS4wmTQwP3x9gPflVSiEsTKnfDJdXphoVuI_PvV411JcaQSIxfXEMTGNYTvXaVlMXObr4d-h4eBQnU2UZ_RCYSAhV88Uj8X6rZRaZ2ZSuOiHXPELj1DA
key
{"p":"-I17RMqAze5vPPRaCfdguw5IAc-XU6mOHW2iaATiqy5Kp-N3CT8FCEfGU8cPyaOQ1PIVpNa2wAbv4BxqabsxH8HFa9Zzuj6cnL8gHYb3mvd4wMalP1t6sELbvWU_CGpBdrdOWGb71g77nxRjDDLnZNRNmGVLLHvHz2M-y8ic8ME","kty":"RSA","q":"s3K1MfyDzRO27tpV_y4QwUuOjEdDXu-xkuXRUL5BHKvouMC4xCdY1-A9PiZyKGPfVVyrrPSw4oWC7Ybw06Fs3srd4SPdaaI4W8v5lmjukXZPCtT8N9MddUCue_RwGfu3psp_0Bl0Yx3oF-6fAlMHdyl-nmtQ3yS81_BDtsEdLE0","d":"EumNHbwJ3bUYYvLIcpWJpyOiczLh2IKBagZuJn2g61tP5r1ISsE6K4e97wJxzat0EbdtQnmHAeVUz5-muPg-dfOjartcZtPh6r0yWWNVwohqxMoqCPjLac3xV7pdxdP39y7m1hiLAG1U8PwIJELttCvLiqB8bZsK02TvQXxEEGd0mZ56a-eoGY2XQd0EqeiK9Bm7auiH4B2usbFaZaTasMDxqdWT-r38UUDSCSmBcXcIu7xr07WzFGyUObB9GS9kAEQRMIDIHVVqOa2S1JLAA2-VxD2QTy8-AIt1QGY4o9ZN7ftR_bC7NSnq-W0rnSd8xeiWYo4oQNVuH_wkzlF6AQ","e":"AQAB","use":"sig","kid":"cabfbeea-8488-4b94-9eb9-29a61ed9ef5f","qi":"Q9lYm9Efilzen4J7c53ndVP86NHQSP7WPzEgaD2VjGXbLvhMu5Ndbt7Ot0xGcIcKCcPY0-uYy5Q1yFRTxKuoeW_BRAjWSP6KSUYdyrC7yy8K6MlsEabXJrBuR4I1O8mzXX55wKQKHUgSbmnascLKTl0BBdDExnGhK-3P6sQsIHw","dp":"u54glJa_j7MR6NMSPD-tlsV6-VL4CcENc41UcGxvpYO1-vEq46HcbJmxTYAPnMeJBhUO3XTuUhlqbKNGeDVDKZOdMH-ar9WfZnqnBWLh-OohDnNkPWUSQYbWVCre371FWRWZYAWsx7JboYNEGOs729KeGBEuI4_0Dcn-ltkCDoE","dq":"eSBLeGM3YB0XlOBhve6NNrxWiw-rRRDMLxjbkgHqF31eiB7mWNkqWgUtsZ7n3aWUYZ088HD2WODAAK7eLiu_Ph93Z3n7AUuTeTsUzNcleaB_OBON7-yb7MJtRJQ5ewBy9a2oWoJkEmdke4sBX-NFncSviCVuIEE_Cw9N1bVCiN0","n":"rjpMHo6htYt7k0tU5xj7fX3KRJBpMwo3lJ0wweGba5rIS-ZX8xmVOP9nqjl2QIfxgQaDMvvOm3gSmlJrQj91LOnPbtzrR3opQvkO2NYngdd0kGgr3v7KVNSSKSgkR77b6YEdwoO--Sy-Oug33CAGlsK-FwgZQ9lwbx0-V3_Nyd4CsTRHpn1x0Avb5nKp4-vd92gica31xUdrNilhENdcGRcJOZIbklbuvS2luBa7FAzaTcoDIp3JDrQIO2JkpWWvFM8cfXJXRP-PyxM-agS10-R7pGMWMT241I9BMKRN3usAJz01RuND0sAqkr0la-tUhUuvVcZksMWtfqFFF3KWDQ"}
algorithm
RS256
2022-11-22 08:22:24 INFO
EncryptIdToken
Skipped evaluation due to missing required element: client id_token_encrypted_response_alg
path
id_token_encrypted_response_alg
mapped
object
client
2022-11-22 08:22:24 SUCCESS
CreateTokenEndpointResponse
Created token endpoint response
access_token
2QGCb3GI8a0jWXcfBWtPoxbgf8NSJSsHwJmRdgaZsH2cuo2cLY
token_type
Bearer
id_token
eyJraWQiOiJjYWJmYmVlYS04NDg4LTRiOTQtOWViOS0yOWE2MWVkOWVmNWYiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiZ1p0Um8tSFdEUmVsMjY2ZmdvY2p6USIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiaFBOSHJ0elpta3RUT1JPUWFtM1Y2anNCIiwiaXNzIjoiaHR0cHM6XC9cL3d3dy5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXRcL3Rlc3RcL2FcL3RhbF90ZXN0XC8iLCJleHAiOjE2NjkxMDU2NDQsIm5vbmNlIjoiNzdjYWNjMjc2NWJjNDgyZjkxNDRkZjQ3MThjZDkyNDAxIiwiaWF0IjoxNjY5MTA1MzQ0fQ.i0CYXkfmO2UPcRzJSZb8MgVVEtpVKxbTMtAO5DCScTvqsFkke2hSYU9wwy1cmE5URb_R-qSToIRKJG24OCMRFfspuqC8Zx7OlqptJ3nFZjcIDj4U45cTGQGat2Cqaii3oWV65zNm1ptyueGiT7HHjX4xfa3K7d2LV5rWH6c8t_9qsNyi8wTmAlHvcEEIYj8ehE-ecADVsdChuCO31IcP6CoqVpsXVxKqUHMS4wmTQwP3x9gPflVSiEsTKnfDJdXphoVuI_PvV411JcaQSIxfXEMTGNYTvXaVlMXObr4d-h4eBQnU2UZ_RCYSAhV88Uj8X6rZRaZ2ZSuOiHXPELj1DA
scope
openid email profile address phone
2022-11-22 08:22:24 OUTGOING
oidcc-client-test-nonce-invalid
Response to HTTP request to test instance yYTxL2sYReZ3fl4
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "access_token": "2QGCb3GI8a0jWXcfBWtPoxbgf8NSJSsHwJmRdgaZsH2cuo2cLY",
  "token_type": "Bearer",
  "id_token": "eyJraWQiOiJjYWJmYmVlYS04NDg4LTRiOTQtOWViOS0yOWE2MWVkOWVmNWYiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiZ1p0Um8tSFdEUmVsMjY2ZmdvY2p6USIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiaFBOSHJ0elpta3RUT1JPUWFtM1Y2anNCIiwiaXNzIjoiaHR0cHM6XC9cL3d3dy5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXRcL3Rlc3RcL2FcL3RhbF90ZXN0XC8iLCJleHAiOjE2NjkxMDU2NDQsIm5vbmNlIjoiNzdjYWNjMjc2NWJjNDgyZjkxNDRkZjQ3MThjZDkyNDAxIiwiaWF0IjoxNjY5MTA1MzQ0fQ.i0CYXkfmO2UPcRzJSZb8MgVVEtpVKxbTMtAO5DCScTvqsFkke2hSYU9wwy1cmE5URb_R-qSToIRKJG24OCMRFfspuqC8Zx7OlqptJ3nFZjcIDj4U45cTGQGat2Cqaii3oWV65zNm1ptyueGiT7HHjX4xfa3K7d2LV5rWH6c8t_9qsNyi8wTmAlHvcEEIYj8ehE-ecADVsdChuCO31IcP6CoqVpsXVxKqUHMS4wmTQwP3x9gPflVSiEsTKnfDJdXphoVuI_PvV411JcaQSIxfXEMTGNYTvXaVlMXObr4d-h4eBQnU2UZ_RCYSAhV88Uj8X6rZRaZ2ZSuOiHXPELj1DA",
  "scope": "openid email profile address phone"
}
outgoing_path
token
2022-11-22 08:22:29 FINISHED
oidcc-client-test-nonce-invalid
Test has run to completion
testmodule_result
PASSED
2022-11-22 08:22:32
TEST-RUNNER
Alias has now been claimed by another test
alias
tal_test
new_test_id
JaQwtCJeoSAafwr
Test Results