Test Name | fapi1-advanced-final-ensure-authorization-request-without-request-object-fails |
---|---|
Variant | client_auth_type=private_key_jwt, fapi_auth_request_method=pushed, fapi_profile=openbanking_brazil, fapi_response_mode=plain_response |
Test ID | PcatEuQnRB0s8eI https://www.certification.openid.net/log-detail.html?public=true&log=PcatEuQnRB0s8eI |
Created | 2023-02-09T13:07:40.762752Z |
Description | Agibank test Teros |
Test Version | 5.1.0 |
Test Owner | 103861140183205531055 https://accounts.google.com |
Plan ID | eYn9nY45VFXwl https://www.certification.openid.net/plan-detail.html?public=true&plan=eYn9nY45VFXwl |
Exported From | https://www.certification.openid.net |
Exported By | 103861140183205531055 https://accounts.google.com |
Suite Version | 5.1.0 |
Exported | 2023-02-10 12:27:06 (UTC) |
Status: FINISHED Result: REVIEW |
SUCCESS 74 FAILURE 0 WARNING 0 REVIEW 1 INFO 1 |
2023-02-09 13:07:40 |
INFO
|
TEST-RUNNER
Test instance PcatEuQnRB0s8eI created
|
||||||||||||||
|
2023-02-09 13:07:40 |
SUCCESS
|
CreateRedirectUri
Created redirect URI
|
||
|
2023-02-09 13:07:40 |
|
GetDynamicServerConfiguration
HTTP request
|
||||||||
|
2023-02-09 13:07:40 |
RESPONSE
|
GetDynamicServerConfiguration
HTTP response
|
||||||||
|
2023-02-09 13:07:40 |
SUCCESS
|
GetDynamicServerConfiguration
Successfully parsed server configuration
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
2023-02-09 13:07:40 | SUCCESS |
AddMTLSEndpointAliasesToEnvironment
Added mtls_endpoint_aliases to environment
|
|
2023-02-09 13:07:40 |
SUCCESS
|
CheckServerConfiguration
Found required server configuration keys
|
||
|
2023-02-09 13:07:40 |
|
FetchServerKeys
Fetching server key
|
||
|
2023-02-09 13:07:40 |
|
FetchServerKeys
HTTP request
|
||||||||
|
2023-02-09 13:07:40 |
RESPONSE
|
FetchServerKeys
HTTP response
|
||||||||
|
2023-02-09 13:07:40 |
|
FetchServerKeys
Found JWK set string
|
||
|
2023-02-09 13:07:40 |
SUCCESS
|
FetchServerKeys
Found server JWK set
|
||
|
2023-02-09 13:07:40 |
SUCCESS
|
CheckServerKeysIsValid
Server JWKs is valid
|
||
|
2023-02-09 13:07:40 | SUCCESS |
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
|
|
2023-02-09 13:07:40 | SUCCESS |
CheckForKeyIdInServerJWKs
All keys contain kids
|
|
2023-02-09 13:07:40 | SUCCESS |
EnsureServerJwksDoesNotContainPrivateOrSymmetricKeys
Jwks does not contain any private or symmetric keys
|
|
2023-02-09 13:07:40 | SUCCESS |
FAPIEnsureMinimumServerKeyLength
Validated minimum key lengths for server_jwks
|
||
|
2023-02-09 13:07:40 |
SUCCESS
|
GetStaticClientConfiguration
Found a static client object
|
||||||||
|
2023-02-09 13:07:40 |
SUCCESS
|
ValidateMTLSCertificatesHeader
MTLS certificates header is valid
|
|
2023-02-09 13:07:40 |
SUCCESS
|
ExtractMTLSCertificatesFromConfiguration
Mutual TLS authentication credentials loaded
|
||||||
|
2023-02-09 13:07:40 | SUCCESS |
ValidateClientJWKsPrivatePart
Valid client JWKs: keys are valid JSON, contain the required fields, the private/public exponents match and are correctly encoded using unpadded base64url
|
|
2023-02-09 13:07:40 |
SUCCESS
|
ExtractJWKsFromStaticClientConfiguration
Extracted client JWK
|
||||
|
2023-02-09 13:07:40 | SUCCESS |
CheckForKeyIdInClientJWKs
All keys contain kids
|
|
2023-02-09 13:07:40 | SUCCESS |
CheckDistinctKeyIdValueInClientJWKs
Distinct 'kid' value in all keys of client_jwks
|
||
|
2023-02-09 13:07:40 | SUCCESS |
FAPIBrazilCheckKeyAlgInClientJWKs
Keys in client JWKS all have permitted 'alg'
|
||
|
2023-02-09 13:07:40 | SUCCESS |
FAPIEnsureMinimumClientKeyLength
Validated minimum key lengths for client_jwks
|
||
|
2023-02-09 13:07:40 |
SUCCESS
|
ValidateMTLSCertificatesAsX509
Mutual TLS authentication cert validated as X.509
|
|
Verify configuration of second client |
2023-02-09 13:07:40 |
SUCCESS
|
GetStaticClient2Configuration
Found a static second client object
|
||||||||
|
2023-02-09 13:07:40 |
SUCCESS
|
ValidateMTLSCertificates2Header
MTLS certificates header is valid
|
|
2023-02-09 13:07:40 |
SUCCESS
|
ExtractMTLSCertificates2FromConfiguration
Mutual TLS authentication credentials loaded
|
||||||
|
2023-02-09 13:07:40 | SUCCESS |
ValidateClientJWKsPrivatePart
Valid client JWKs: keys are valid JSON, contain the required fields, the private/public exponents match and are correctly encoded using unpadded base64url
|
|
2023-02-09 13:07:40 |
SUCCESS
|
ExtractJWKsFromStaticClientConfiguration
Extracted client JWK
|
||||
|
2023-02-09 13:07:40 | SUCCESS |
CheckForKeyIdInClientJWKs
All keys contain kids
|
|
2023-02-09 13:07:40 | SUCCESS |
CheckDistinctKeyIdValueInClientJWKs
Distinct 'kid' value in all keys of client_jwks
|
||
|
2023-02-09 13:07:40 | SUCCESS |
FAPIBrazilCheckKeyAlgInClientJWKs
Keys in client JWKS all have permitted 'alg'
|
||
|
2023-02-09 13:07:40 | SUCCESS |
FAPIEnsureMinimumClientKeyLength
Validated minimum key lengths for client_jwks
|
||
|
2023-02-09 13:07:40 |
SUCCESS
|
ValidateMTLSCertificatesAsX509
Mutual TLS authentication cert validated as X.509
|
|
2023-02-09 13:07:40 |
SUCCESS
|
ValidateClientPrivateKeysAreDifferent
Client signing JWKs have different thumbprints
|
||||
|
2023-02-09 13:07:40 |
SUCCESS
|
GetResourceEndpointConfiguration
Found a resource endpoint object
|
||||||||||||
|
2023-02-09 13:07:40 |
SUCCESS
|
SetProtectedResourceUrlToSingleResourceEndpoint
Set protected resource URL
|
||
|
2023-02-09 13:07:40 |
SUCCESS
|
ExtractTLSTestValuesFromResourceConfiguration
Extracted TLS information from resource endpoint
|
||
|
2023-02-09 13:07:40 |
SUCCESS
|
ExtractTLSTestValuesFromOBResourceConfiguration
Extracted TLS information from resource endpoint
|
||||
|
2023-02-09 13:07:40 |
|
fapi1-advanced-final-ensure-authorization-request-without-request-object-fails
Setup Done
|
|
2023-02-09 13:07:40 |
|
fapi1-advanced-final-ensure-authorization-request-without-request-object-fails
Payments scope present - protected resource assumed to be a payments endpoint
|
|
2023-02-09 13:07:40 |
SUCCESS
|
FAPIBrazilSetPaymentDateToToday
Successfully added current date ('2023-02-09') to payment consent payload
|
||||||||||
|
Use client_credentials grant to obtain Brazil consent |
2023-02-09 13:07:40 |
SUCCESS
|
CreateTokenEndpointRequestForClientCredentialsGrant
Created token endpoint request
|
||||
|
2023-02-09 13:07:40 |
SUCCESS
|
SetPaymentsScopeOnTokenEndpointRequest
Set scope parameter to 'payments'
|
||||
|
2023-02-09 13:07:40 |
SUCCESS
|
CreateClientAuthenticationAssertionClaims
Created client assertion claims
|
||||||||||||
|
2023-02-09 13:07:40 |
SUCCESS
|
SignClientAuthenticationAssertion
Signed the client assertion
|
||
|
2023-02-09 13:07:40 |
|
AddClientAssertionToTokenEndpointRequest
Added client assertion
|
||||||||
|
2023-02-09 13:07:40 |
|
CallTokenEndpoint
HTTP request
|
||||||||||
|
2023-02-09 13:07:41 |
RESPONSE
|
CallTokenEndpoint
HTTP response
|
||||||||
|
2023-02-09 13:07:41 |
SUCCESS
|
CallTokenEndpoint
Parsed token endpoint response
|
||||||||
|
2023-02-09 13:07:41 |
SUCCESS
|
CheckIfTokenEndpointResponseError
No error from token endpoint
|
|
2023-02-09 13:07:41 |
SUCCESS
|
CheckForAccessTokenValue
Found an access token
|
||
|
2023-02-09 13:07:41 |
SUCCESS
|
ExtractAccessTokenFromTokenResponse
Extracted the access token
|
||||
|
2023-02-09 13:07:41 | SUCCESS |
ExtractExpiresInFromTokenEndpointResponse
Extracted 'expires_in'
|
||
|
2023-02-09 13:07:41 | SUCCESS |
ValidateExpiresIn
expires_in passed all validation checks
|
||
|
2023-02-09 13:07:41 |
|
CreateEmptyResourceEndpointRequestHeaders
Created empty headers
|
||
|
2023-02-09 13:07:41 |
SUCCESS
|
AddFAPIAuthDateToResourceEndpointRequest
Added x-fapi-auth-date to resource endpoint request headers
|
||
|
2023-02-09 13:07:41 |
SUCCESS
|
CreateIdempotencyKey
Created idempotency key
|
||
|
2023-02-09 13:07:41 |
SUCCESS
|
AddIdempotencyKeyHeader
Added x-idempotency-key to resource endpoint request headers
|
||
|
2023-02-09 13:07:41 |
SUCCESS
|
FAPIBrazilCreatePaymentConsentRequest
|
||
|
2023-02-09 13:07:41 |
SUCCESS
|
FAPIBrazilExtractClientMTLSCertificateSubject
Extracted subject from MTLS certificate
|
||||||||
|
2023-02-09 13:07:41 | SUCCESS |
AddAudAsPaymentConsentUriToRequestObject
Added aud to request object claims
|
||
|
2023-02-09 13:07:41 |
|
AddIssAsCertificateOuToRequestObject
Added iss value based on TLS certificate organizational unit to request object claims
|
||
|
2023-02-09 13:07:41 | SUCCESS |
AddJtiAsUuidToRequestObject
Added jti to request object claims
|
||
|
2023-02-09 13:07:41 | SUCCESS |
AddIatToRequestObject
Added iat to request object claims
|
||
|
2023-02-09 13:07:41 |
SUCCESS
|
ValidateOrganizationJWKsPrivatePart
Valid organization JWKs: keys are valid JSON, contain the required fields, the private/public exponents match and are correctly encoded using unpadded base64url
|
|
2023-02-09 13:07:41 |
SUCCESS
|
FAPIBrazilSignPaymentConsentRequest
Signed the request
|
||||||||
|
2023-02-09 13:07:41 |
|
FAPIBrazilCallPaymentConsentEndpointWithBearerToken
HTTP request
|
||||||||||
|
2023-02-09 13:07:42 |
RESPONSE
|
FAPIBrazilCallPaymentConsentEndpointWithBearerToken
HTTP response
|
||||||||
|
2023-02-09 13:07:42 |
SUCCESS
|
FAPIBrazilCallPaymentConsentEndpointWithBearerToken
Payment consent endpoint response
|
||||||||
|
2023-02-09 13:07:42 | SUCCESS |
EnsureContentTypeApplicationJwt
endpoint_response Content-Type: header is application/jwt
|
|
2023-02-09 13:07:42 |
SUCCESS
|
EnsureHttpStatusCodeIs201
resource endpoint returned the expected http status
|
||||
|
2023-02-09 13:07:42 | SUCCESS |
ExtractSignedJwtFromResourceResponse
Found and parsed the JWT from payment consent endpoint
|
||||||
|
2023-02-09 13:07:42 | SUCCESS |
FAPIBrazilValidateResourceResponseSigningAlg
Response was signed with PS256
|
||
|
2023-02-09 13:07:42 | SUCCESS |
FAPIBrazilValidateResourceResponseTyp
'typ' is the header of the JWT returned in the API response is 'JWT'
|
||
|
2023-02-09 13:07:42 |
SUCCESS
|
FAPIBrazilGetKeystoreJwksUri
Determined organisation jwks uri
|
||
|
2023-02-09 13:07:42 |
|
FetchServerKeys
Fetching server key
|
||
|
2023-02-09 13:07:42 |
|
FetchServerKeys
HTTP request
|
||||||||||
|
2023-02-09 13:07:42 |
RESPONSE
|
FetchServerKeys
HTTP response
|
||||||||
|
2023-02-09 13:07:42 |
|
FetchServerKeys
Found JWK set string
|
||
|
2023-02-09 13:07:42 |
SUCCESS
|
FetchServerKeys
Found server JWK set
|
||
|
2023-02-09 13:07:42 | SUCCESS |
ValidateResourceResponseSignature
endpoint_response_jwt signature validated
|
||
|
2023-02-09 13:07:42 | SUCCESS |
ValidateResourceResponseJwtClaims
Resource endpoint response JWS iss, aud, exp, iat, auth_time, acr & nbf claims passed validation checks
|
|
2023-02-09 13:07:42 |
SUCCESS
|
ExtractConsentIdFromConsentEndpointResponse
Extracted the consent id
|
||
|
2023-02-09 13:07:42 | SUCCESS |
CheckForFAPIInteractionIdInResourceResponse
Found x-fapi-interaction-id
|
||
|
2023-02-09 13:07:42 |
SUCCESS
|
FAPIBrazilAddConsentIdToClientScope
Added scope of 'openid payments consent:urn:agibankstaging:382520bb-854b-4594-9784-c76a63c8378f' to client's scope
|
||||||||
|
Make request to authorization endpoint |
2023-02-09 13:07:42 |
SUCCESS
|
CreateAuthorizationEndpointRequestFromClientInformation
Created authorization endpoint request
|
||||||
|
2023-02-09 13:07:42 |
|
CreateRandomStateValue
Created state value
|
||||
|
2023-02-09 13:07:42 |
SUCCESS
|
AddStateToAuthorizationEndpointRequest
Added state parameter to request
|
||||||||
|
2023-02-09 13:07:42 |
|
CreateRandomNonceValue
Created nonce value
|
||||
|
2023-02-09 13:07:42 |
SUCCESS
|
AddNonceToAuthorizationEndpointRequest
Added nonce parameter to request
|
||||||||||
|
2023-02-09 13:07:42 |
SUCCESS
|
SetAuthorizationEndpointRequestResponseTypeToCodeIdtoken
Added response_type parameter to request
|
||||||||||||
|
2023-02-09 13:07:42 | SUCCESS |
BuildPlainRedirectToAuthorizationEndpoint
Sending to authorization endpoint
|
||||
|
2023-02-09 13:07:42 |
REDIRECT
|
fapi1-advanced-final-ensure-authorization-request-without-request-object-fails
Redirecting to authorization endpoint
|
||
|
2023-02-09 13:07:42 | REVIEW IMAGE |
ExpectAuthorizationRequestWithoutRequestObjectErrorPage
If the server does not return an invalid_request error back to the client, it must show an error page saying the request is invalid as it is missing the request_object - upload a screenshot of the error page.
|
||||
|
2023-02-09 13:10:53 |
FINISHED
|
fapi1-advanced-final-ensure-authorization-request-without-request-object-fails
Test has run to completion
|
||
|
2023-02-09 13:13:09 |
IMAGE
|
_image-api
|
||
|
2023-02-09 13:14:26 |
|
TEST-RUNNER
Alias has now been claimed by another test
|
||||
|