Test Name | fapi1-advanced-final-ensure-authorization-code-is-bound-to-client |
---|---|
Variant | client_auth_type=private_key_jwt, fapi_auth_request_method=by_value, fapi_profile=openbanking_brazil, fapi_response_mode=plain_response |
Test ID | hmu8gTI8rvNYYjj https://www.certification.openid.net/log-detail.html?public=true&log=hmu8gTI8rvNYYjj |
Created | 2022-10-04T21:26:32.940304Z |
Description | Modal-r-Advanced-Final-Authorization-server-teste |
Test Version | 5.0.4 |
Test Owner | 106854521517405438043 https://accounts.google.com |
Plan ID | fuDUfvBDn033I https://www.certification.openid.net/plan-detail.html?public=true&plan=fuDUfvBDn033I |
Exported From | https://www.certification.openid.net |
Exported By | 106854521517405438043 https://accounts.google.com |
Suite Version | 5.0.7 |
Exported | 2022-12-07 15:37:27 (UTC) |
Status: FINISHED Result: WARNING |
SUCCESS 120 FAILURE 0 WARNING 1 REVIEW 0 INFO 1 |
2022-10-04 21:26:32 |
INFO
|
TEST-RUNNER
Test instance hmu8gTI8rvNYYjj created
|
||||||||||||||
|
2022-10-04 21:26:32 |
SUCCESS
|
CreateRedirectUri
Created redirect URI
|
||
|
2022-10-04 21:26:32 |
|
GetDynamicServerConfiguration
HTTP request
|
||||||||
|
2022-10-04 21:26:33 |
RESPONSE
|
GetDynamicServerConfiguration
HTTP response
|
||||||||
|
2022-10-04 21:26:33 |
SUCCESS
|
GetDynamicServerConfiguration
Successfully parsed server configuration
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
2022-10-04 21:26:33 | SUCCESS |
AddMTLSEndpointAliasesToEnvironment
Added mtls_endpoint_aliases to environment
|
|
2022-10-04 21:26:33 |
SUCCESS
|
CheckServerConfiguration
Found required server configuration keys
|
||
|
2022-10-04 21:26:33 |
|
FetchServerKeys
Fetching server key
|
||
|
2022-10-04 21:26:33 |
|
FetchServerKeys
HTTP request
|
||||||||
|
2022-10-04 21:26:34 |
RESPONSE
|
FetchServerKeys
HTTP response
|
||||||||
|
2022-10-04 21:26:34 |
|
FetchServerKeys
Found JWK set string
|
||
|
2022-10-04 21:26:34 |
SUCCESS
|
FetchServerKeys
Found server JWK set
|
||
|
2022-10-04 21:26:34 |
SUCCESS
|
CheckServerKeysIsValid
Server JWKs is valid
|
||
|
2022-10-04 21:26:34 | SUCCESS |
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
|
|
2022-10-04 21:26:34 | SUCCESS |
CheckForKeyIdInServerJWKs
All keys contain kids
|
|
2022-10-04 21:26:34 | SUCCESS |
EnsureServerJwksDoesNotContainPrivateOrSymmetricKeys
Jwks does not contain any private or symmetric keys
|
|
2022-10-04 21:26:34 | SUCCESS |
FAPIEnsureMinimumServerKeyLength
Validated minimum key lengths for server_jwks
|
||
|
2022-10-04 21:26:34 |
SUCCESS
|
GetStaticClientConfiguration
Found a static client object
|
||||||||
|
2022-10-04 21:26:34 |
|
ValidateMTLSCertificatesHeader
No certificate authority found for MTLS
|
|
2022-10-04 21:26:34 |
SUCCESS
|
ValidateMTLSCertificatesHeader
MTLS certificates header is valid
|
|
2022-10-04 21:26:34 |
|
ExtractMTLSCertificatesFromConfiguration
No certificate authority found for MTLS
|
|
2022-10-04 21:26:34 |
SUCCESS
|
ExtractMTLSCertificatesFromConfiguration
Mutual TLS authentication credentials loaded
|
||||
|
2022-10-04 21:26:34 | SUCCESS |
ValidateClientJWKsPrivatePart
Valid client JWKs: keys are valid JSON, contain the required fields, the private/public exponents match and are correctly encoded using unpadded base64url
|
|
2022-10-04 21:26:34 |
SUCCESS
|
ExtractJWKsFromStaticClientConfiguration
Extracted client JWK
|
||||
|
2022-10-04 21:26:34 | SUCCESS |
CheckForKeyIdInClientJWKs
All keys contain kids
|
|
2022-10-04 21:26:34 | SUCCESS |
CheckDistinctKeyIdValueInClientJWKs
Distinct 'kid' value in all keys of client_jwks
|
||
|
2022-10-04 21:26:34 | SUCCESS |
FAPIBrazilCheckKeyAlgInClientJWKs
Keys in client JWKS all have permitted 'alg'
|
||
|
2022-10-04 21:26:34 | SUCCESS |
FAPIEnsureMinimumClientKeyLength
Validated minimum key lengths for client_jwks
|
||
|
2022-10-04 21:26:34 |
SUCCESS
|
ValidateMTLSCertificatesAsX509
Mutual TLS authentication cert validated as X.509
|
|
Verify configuration of second client |
2022-10-04 21:26:34 |
SUCCESS
|
GetStaticClient2Configuration
Found a static second client object
|
||||||||
|
2022-10-04 21:26:34 |
|
ValidateMTLSCertificates2Header
No certificate authority found for MTLS
|
|
2022-10-04 21:26:34 |
SUCCESS
|
ValidateMTLSCertificates2Header
MTLS certificates header is valid
|
|
2022-10-04 21:26:34 |
|
ExtractMTLSCertificates2FromConfiguration
No certificate authority found for MTLS
|
|
2022-10-04 21:26:34 |
SUCCESS
|
ExtractMTLSCertificates2FromConfiguration
Mutual TLS authentication credentials loaded
|
||||
|
2022-10-04 21:26:34 | SUCCESS |
ValidateClientJWKsPrivatePart
Valid client JWKs: keys are valid JSON, contain the required fields, the private/public exponents match and are correctly encoded using unpadded base64url
|
|
2022-10-04 21:26:34 |
SUCCESS
|
ExtractJWKsFromStaticClientConfiguration
Extracted client JWK
|
||||
|
2022-10-04 21:26:34 | SUCCESS |
CheckForKeyIdInClientJWKs
All keys contain kids
|
|
2022-10-04 21:26:34 | SUCCESS |
CheckDistinctKeyIdValueInClientJWKs
Distinct 'kid' value in all keys of client_jwks
|
||
|
2022-10-04 21:26:34 | SUCCESS |
FAPIBrazilCheckKeyAlgInClientJWKs
Keys in client JWKS all have permitted 'alg'
|
||
|
2022-10-04 21:26:34 | SUCCESS |
FAPIEnsureMinimumClientKeyLength
Validated minimum key lengths for client_jwks
|
||
|
2022-10-04 21:26:34 |
SUCCESS
|
ValidateMTLSCertificatesAsX509
Mutual TLS authentication cert validated as X.509
|
|
2022-10-04 21:26:34 |
SUCCESS
|
ValidateClientPrivateKeysAreDifferent
Client signing JWKs have different thumbprints
|
||||
|
2022-10-04 21:26:34 |
SUCCESS
|
GetResourceEndpointConfiguration
Found a resource endpoint object
|
||||||||||||||
|
2022-10-04 21:26:34 |
SUCCESS
|
SetProtectedResourceUrlToSingleResourceEndpoint
Set protected resource URL
|
||
|
2022-10-04 21:26:34 |
SUCCESS
|
ExtractTLSTestValuesFromResourceConfiguration
Extracted TLS information from resource endpoint
|
||
|
2022-10-04 21:26:34 |
SUCCESS
|
ExtractTLSTestValuesFromOBResourceConfiguration
Extracted TLS information from resource endpoint
|
||||
|
2022-10-04 21:26:34 |
|
fapi1-advanced-final-ensure-authorization-code-is-bound-to-client
Setup Done
|
|
2022-10-04 21:26:34 |
|
fapi1-advanced-final-ensure-authorization-code-is-bound-to-client
Payments scope present - protected resource assumed to be a payments endpoint
|
|
2022-10-04 21:26:34 |
SUCCESS
|
FAPIBrazilSetPaymentDateToToday
Successfully added current date ('2022-10-04') to payment consent payload
|
||||||||||
|
Use client_credentials grant to obtain Brazil consent |
2022-10-04 21:26:34 |
SUCCESS
|
CreateTokenEndpointRequestForClientCredentialsGrant
Created token endpoint request
|
||||
|
2022-10-04 21:26:34 |
SUCCESS
|
SetPaymentsScopeOnTokenEndpointRequest
Set scope parameter to 'payments'
|
||||
|
2022-10-04 21:26:34 |
SUCCESS
|
CreateClientAuthenticationAssertionClaims
Created client assertion claims
|
||||||||||||
|
2022-10-04 21:26:34 |
SUCCESS
|
SignClientAuthenticationAssertion
Signed the client assertion
|
||
|
2022-10-04 21:26:34 |
|
AddClientAssertionToTokenEndpointRequest
Added client assertion
|
||||||||
|
2022-10-04 21:26:34 |
|
CallTokenEndpoint
HTTP request
|
||||||||||
|
2022-10-04 21:26:34 |
RESPONSE
|
CallTokenEndpoint
HTTP response
|
||||||||
|
2022-10-04 21:26:34 |
SUCCESS
|
CallTokenEndpoint
Parsed token endpoint response
|
||||||||
|
2022-10-04 21:26:34 |
SUCCESS
|
CheckIfTokenEndpointResponseError
No error from token endpoint
|
|
2022-10-04 21:26:34 |
SUCCESS
|
CheckForAccessTokenValue
Found an access token
|
||
|
2022-10-04 21:26:34 |
SUCCESS
|
ExtractAccessTokenFromTokenResponse
Extracted the access token
|
||||
|
2022-10-04 21:26:34 | SUCCESS |
ExtractExpiresInFromTokenEndpointResponse
Extracted 'expires_in'
|
||
|
2022-10-04 21:26:34 | SUCCESS |
ValidateExpiresIn
expires_in passed all validation checks
|
||
|
2022-10-04 21:26:34 |
|
CreateEmptyResourceEndpointRequestHeaders
Created empty headers
|
||
|
2022-10-04 21:26:34 |
SUCCESS
|
AddFAPIAuthDateToResourceEndpointRequest
Added x-fapi-auth-date to resource endpoint request headers
|
||
|
2022-10-04 21:26:34 |
SUCCESS
|
CreateIdempotencyKey
Created idempotency key
|
||
|
2022-10-04 21:26:34 |
SUCCESS
|
AddIdempotencyKeyHeader
Added x-idempotency-key to resource endpoint request headers
|
||
|
2022-10-04 21:26:34 |
SUCCESS
|
FAPIBrazilCreatePaymentConsentRequest
|
||
|
2022-10-04 21:26:34 |
SUCCESS
|
FAPIBrazilExtractClientMTLSCertificateSubject
Extracted subject from MTLS certificate
|
||||||
|
2022-10-04 21:26:34 | SUCCESS |
AddAudAsPaymentConsentUriToRequestObject
Added aud to request object claims
|
||
|
2022-10-04 21:26:34 |
|
AddIssAsCertificateOuToRequestObject
Added iss value based on TLS certificate organizational unit to request object claims
|
||
|
2022-10-04 21:26:34 | SUCCESS |
AddJtiAsUuidToRequestObject
Added jti to request object claims
|
||
|
2022-10-04 21:26:34 | SUCCESS |
AddIatToRequestObject
Added iat to request object claims
|
||
|
2022-10-04 21:26:34 |
SUCCESS
|
ValidateOrganizationJWKsPrivatePart
Valid organization JWKs: keys are valid JSON, contain the required fields, the private/public exponents match and are correctly encoded using unpadded base64url
|
|
2022-10-04 21:26:34 |
SUCCESS
|
FAPIBrazilSignPaymentConsentRequest
Signed the request
|
||||||||
|
2022-10-04 21:26:34 |
|
FAPIBrazilCallPaymentConsentEndpointWithBearerToken
HTTP request
|
||||||||||
|
2022-10-04 21:26:35 |
RESPONSE
|
FAPIBrazilCallPaymentConsentEndpointWithBearerToken
HTTP response
|
||||||||
|
2022-10-04 21:26:35 |
SUCCESS
|
FAPIBrazilCallPaymentConsentEndpointWithBearerToken
Payment consent endpoint response
|
||||||||
|
2022-10-04 21:26:35 | SUCCESS |
EnsureContentTypeApplicationJwt
endpoint_response Content-Type: header is application/jwt
|
|
2022-10-04 21:26:35 |
SUCCESS
|
EnsureHttpStatusCodeIs201
resource endpoint returned the expected http status
|
||||
|
2022-10-04 21:26:35 | SUCCESS |
ExtractSignedJwtFromResourceResponse
Found and parsed the JWT from payment consent endpoint
|
||||||
|
2022-10-04 21:26:35 | SUCCESS |
FAPIBrazilValidateResourceResponseSigningAlg
Response was signed with PS256
|
||
|
2022-10-04 21:26:35 | SUCCESS |
FAPIBrazilValidateResourceResponseTyp
'typ' is the header of the JWT returned in the API response is 'JWT'
|
||
|
2022-10-04 21:26:35 |
SUCCESS
|
FAPIBrazilGetKeystoreJwksUri
Determined organisation jwks uri
|
||
|
2022-10-04 21:26:35 |
|
FetchServerKeys
Fetching server key
|
||
|
2022-10-04 21:26:35 |
|
FetchServerKeys
HTTP request
|
||||||||||
|
2022-10-04 21:26:35 |
RESPONSE
|
FetchServerKeys
HTTP response
|
||||||||
|
2022-10-04 21:26:35 |
|
FetchServerKeys
Found JWK set string
|
||
|
2022-10-04 21:26:35 |
SUCCESS
|
FetchServerKeys
Found server JWK set
|
||
|
2022-10-04 21:26:35 | SUCCESS |
ValidateResourceResponseSignature
endpoint_response_jwt signature validated
|
||
|
2022-10-04 21:26:35 | SUCCESS |
ValidateResourceResponseJwtClaims
Resource endpoint response JWS iss, aud, exp, iat, auth_time, acr & nbf claims passed validation checks
|
|
2022-10-04 21:26:35 |
SUCCESS
|
ExtractConsentIdFromConsentEndpointResponse
Extracted the consent id
|
||
|
2022-10-04 21:26:35 | SUCCESS |
CheckForFAPIInteractionIdInResourceResponse
Found x-fapi-interaction-id
|
||
|
2022-10-04 21:26:35 |
SUCCESS
|
FAPIBrazilAddConsentIdToClientScope
Added scope of 'openid payments consent:urn:Modal:e5dc95ad-d3f8-4e58-a568-a2650eaf47a3' to client's scope
|
||||||||
|
Make request to authorization endpoint |
2022-10-04 21:26:35 |
SUCCESS
|
CreateAuthorizationEndpointRequestFromClientInformation
Created authorization endpoint request
|
||||||
|
2022-10-04 21:26:35 |
|
CreateRandomStateValue
Created state value
|
||||
|
2022-10-04 21:26:35 |
SUCCESS
|
AddStateToAuthorizationEndpointRequest
Added state parameter to request
|
||||||||
|
2022-10-04 21:26:35 |
|
CreateRandomNonceValue
Created nonce value
|
||||
|
2022-10-04 21:26:35 |
SUCCESS
|
AddNonceToAuthorizationEndpointRequest
Added nonce parameter to request
|
||||||||||
|
2022-10-04 21:26:35 |
SUCCESS
|
SetAuthorizationEndpointRequestResponseTypeToCodeIdtoken
Added response_type parameter to request
|
||||||||||||
|
2022-10-04 21:26:35 |
SUCCESS
|
ConvertAuthorizationEndpointRequestToRequestObject
Created request object claims
|
||
|
2022-10-04 21:26:35 | SUCCESS |
AddNbfToRequestObject
Added nbf to request object claims
|
||
|
2022-10-04 21:26:35 | SUCCESS |
AddExpToRequestObject
Added exp to request object claims
|
||
|
2022-10-04 21:26:35 | SUCCESS |
AddAudToRequestObject
Added aud to request object claims
|
||
|
2022-10-04 21:26:35 | SUCCESS |
AddIssToRequestObject
Added iss to request object claims
|
||
|
2022-10-04 21:26:35 | SUCCESS |
AddClientIdToRequestObject
Added client_id to request object claims
|
||
|
2022-10-04 21:26:35 |
SUCCESS
|
SignRequestObject
Signed the request object
|
||||||||
|
2022-10-04 21:26:35 |
|
FAPIBrazilEncryptRequestObject
Encrypted the request object
|
||||||
|
2022-10-04 21:26:35 |
SUCCESS
|
BuildRequestObjectByValueRedirectToAuthorizationEndpoint
Sending to authorization endpoint
|
||
|
2022-10-04 21:26:35 |
REDIRECT
|
fapi1-advanced-final-ensure-authorization-code-is-bound-to-client
Redirecting to authorization endpoint
|
||
|
2022-10-04 21:27:15 |
INCOMING
|
fapi1-advanced-final-ensure-authorization-code-is-bound-to-client
Incoming HTTP request to /test/a/Modal-r-Advanced-Final-Authorization-server-teste/callback
|
||||||||||||||||||||||
|
2022-10-04 21:27:15 |
SUCCESS
|
CreateRandomImplicitSubmitUrl
Created random implicit submission URL
|
||
|
2022-10-04 21:27:15 |
OUTGOING
|
fapi1-advanced-final-ensure-authorization-code-is-bound-to-client
Response to HTTP request to test instance hmu8gTI8rvNYYjj
|
||||
|
2022-10-04 21:27:16 |
INCOMING
|
fapi1-advanced-final-ensure-authorization-code-is-bound-to-client
Incoming HTTP request to /test/a/Modal-r-Advanced-Final-Authorization-server-teste/implicit/osEHhpmDmxFXaFY1ld3d
|
||||||||||||||||||||||
|
2022-10-04 21:27:16 |
OUTGOING
|
fapi1-advanced-final-ensure-authorization-code-is-bound-to-client
Response to HTTP request to test instance hmu8gTI8rvNYYjj
|
||||||||
|
2022-10-04 21:27:16 |
|
ExtractImplicitHashToCallbackResponse
Extracted response from URL fragment
|
||
|
2022-10-04 21:27:16 |
SUCCESS
|
ExtractImplicitHashToCallbackResponse
Extracted the hash values
|
||||||||||||
|
2022-10-04 21:27:16 |
REDIRECT-IN
|
fapi1-advanced-final-ensure-authorization-code-is-bound-to-client
Authorization endpoint response captured
|
||||||||||
|
Verify authorization endpoint response |
2022-10-04 21:27:16 | SUCCESS |
RejectErrorInUrlQuery
'error' is not present in URL query returned from authorization endpoint
|
|
2022-10-04 21:27:16 | SUCCESS |
RejectAuthCodeInUrlQuery
Authorization code is not present in URL query returned from authorization endpoint
|
|
2022-10-04 21:27:16 |
SUCCESS
|
CheckMatchingCallbackParameters
Callback parameters successfully verified
|
|
2022-10-04 21:27:16 | SUCCESS |
RejectStateInUrlQueryForHybridFlow
state is correctly not present in URL query returned from authorization endpoint (as in the hybrid flow it must be returned in the URL fragment/hash only)
|
|
2022-10-04 21:27:16 |
SUCCESS
|
CheckIfAuthorizationEndpointError
No error from authorization endpoint
|
|
2022-10-04 21:27:16 |
WARNING
|
ValidateSuccessfulHybridResponseFromAuthorizationEndpoint
authorization endpoint response includes unexpected parameters. This may be because the authorization server supports protocol extensions the conformance suite is unaware of, but may also be because the server is implementing the specification incorrectly.
|
||||
|
2022-10-04 21:27:16 | SUCCESS |
CheckStateInAuthorizationResponse
State in response correctly returned
|
||
|
2022-10-04 21:27:16 |
|
ValidateIssInAuthorizationResponse
No 'iss' value in authorization response.
|
|
2022-10-04 21:27:16 |
SUCCESS
|
ExtractAuthorizationCodeFromAuthorizationResponse
Found authorization code
|
||
|
2022-10-04 21:27:16 | SUCCESS |
EnsureMinimumAuthorizationCodeLength
Authorization code is of sufficient length
|
||||
|
2022-10-04 21:27:16 | SUCCESS |
EnsureMinimumAuthorizationCodeEntropy
Calculated shannon entropy seems sufficient
|
||||||
|
2022-10-04 21:27:16 | SUCCESS |
ExtractIdTokenFromAuthorizationResponse
Found and parsed the id_token from authorization_endpoint_response
|
||||||
|
2022-10-04 21:27:16 | SUCCESS |
ValidateIdToken
ID token iss, aud, exp, iat, auth_time, acr & nbf claims passed validation checks
|
|
2022-10-04 21:27:16 |
|
ValidateIdTokenStandardClaims
sub is a string with content
|
|
2022-10-04 21:27:16 |
|
ValidateIdTokenStandardClaims
Skipping unknown claim: sid
|
|
2022-10-04 21:27:16 | SUCCESS |
ValidateIdTokenStandardClaims
id_token claims are valid
|
|
2022-10-04 21:27:16 | SUCCESS |
EnsureIdTokenContainsKid
kid was found in the ID token header
|
||
|
2022-10-04 21:27:16 | SUCCESS |
ValidateIdTokenNonce
Nonce values match
|
||
|
2022-10-04 21:27:16 | SUCCESS |
ValidateIdTokenSignature
id_token signature validated
|
||
|
2022-10-04 21:27:16 | SUCCESS |
ValidateIdTokenSignatureUsingKid
id_token signature validated
|
||
|
2022-10-04 21:27:16 | SUCCESS |
CheckForSubjectInIdToken
Found 'sub' in id_token
|
||
|
2022-10-04 21:27:16 | SUCCESS |
ExtractSHash
Extracted s_hash from ID Token
|
||||
|
2022-10-04 21:27:16 | SUCCESS |
ValidateSHash
s_hash validated successfully
|
||||||
|
2022-10-04 21:27:16 | SUCCESS |
ExtractCHash
Extracted c_hash from ID Token
|
||||
|
2022-10-04 21:27:16 | SUCCESS |
ValidateCHash
c_hash validated successfully
|
||||||
|
2022-10-04 21:27:16 |
SUCCESS
|
CreateTokenEndpointRequestForAuthorizationCodeGrant
Created token endpoint request
|
||||||
|
2022-10-04 21:27:16 |
SUCCESS
|
CreateClientAuthenticationAssertionClaims
Created client assertion claims
|
||||||||||||
|
2022-10-04 21:27:16 |
SUCCESS
|
SignClientAuthenticationAssertion
Signed the client assertion
|
||
|
2022-10-04 21:27:16 |
|
AddClientAssertionToTokenEndpointRequest
Added client assertion
|
||||||||||
|
2022-10-04 21:27:16 |
|
ValidateMTLSCertificates2Header
No certificate authority found for MTLS
|
|
2022-10-04 21:27:16 |
SUCCESS
|
ValidateMTLSCertificates2Header
MTLS certificates header is valid
|
|
2022-10-04 21:27:16 |
|
ExtractMTLSCertificates2FromConfiguration
No certificate authority found for MTLS
|
|
2022-10-04 21:27:16 |
SUCCESS
|
ExtractMTLSCertificates2FromConfiguration
Mutual TLS authentication credentials loaded
|
||||
|
2022-10-04 21:27:16 |
SUCCESS
|
CreateTokenEndpointRequestForAuthorizationCodeGrant
Created token endpoint request
|
||||||
|
2022-10-04 21:27:16 |
SUCCESS
|
CreateClientAuthenticationAssertionClaims
Created client assertion claims
|
||||||||||||
|
2022-10-04 21:27:16 |
SUCCESS
|
SignClientAuthenticationAssertion
Signed the client assertion
|
||
|
2022-10-04 21:27:16 |
|
AddClientAssertionToTokenEndpointRequest
Added client assertion
|
||||||||||
|
2022-10-04 21:27:16 |
|
CallTokenEndpointAndReturnFullResponse
HTTP request
|
||||||||||
|
2022-10-04 21:27:16 |
RESPONSE
|
CallTokenEndpointAndReturnFullResponse
HTTP response
|
||||||||
|
2022-10-04 21:27:16 | SUCCESS |
CallTokenEndpointAndReturnFullResponse
Parsed token endpoint response
|
||||
|
2022-10-04 21:27:16 | SUCCESS |
CheckTokenEndpointHttpStatus400
Token endpoint http status code was 400
|
|
2022-10-04 21:27:16 | SUCCESS |
CheckTokenEndpointReturnedJsonContentType
token_endpoint_response_headers Content-Type: header is application/json
|
|
2022-10-04 21:27:16 | SUCCESS |
CheckErrorFromTokenEndpointResponseErrorInvalidGrant
Token Endpoint response error returned expected 'error' of 'invalid_grant'
|
||
|
2022-10-04 21:27:16 | SUCCESS |
ValidateErrorFromTokenEndpointResponseError
Token endpoint response error returned valid 'error' field
|
||
|
2022-10-04 21:27:16 | SUCCESS |
CheckErrorDescriptionFromTokenEndpointResponseErrorContainsCRLFTAB
token_endpoint_response 'error_description' field does not include CR/LF/TAB
|
||
|
2022-10-04 21:27:16 | SUCCESS |
ValidateErrorDescriptionFromTokenEndpointResponseError
token_endpoint_response error returned valid 'error_description' field
|
||
|
2022-10-04 21:27:16 | SUCCESS |
ValidateErrorUriFromTokenEndpointResponseError
token_endpoint_response did not include optional 'error_uri' field
|
|
2022-10-04 21:27:16 |
FINISHED
|
fapi1-advanced-final-ensure-authorization-code-is-bound-to-client
Test has run to completion
|
||
|
2022-10-04 21:27:21 |
|
TEST-RUNNER
Alias has now been claimed by another test
|
||||
|