language
stringlengths 0
24
| filename
stringlengths 9
214
| code
stringlengths 99
9.93M
|
---|---|---|
Go | hydra/flow/consent_types.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
package flow
import (
"database/sql"
"database/sql/driver"
"encoding/json"
"fmt"
"net/http"
"time"
"github.com/gobuffalo/pop/v6"
"github.com/gofrs/uuid"
"github.com/ory/x/errorsx"
"github.com/ory/fosite"
"github.com/ory/hydra/v2/client"
"github.com/ory/x/sqlcon"
"github.com/ory/x/sqlxx"
)
const (
ConsentRequestDeniedErrorName = "consent request denied"
LoginRequestDeniedErrorName = "login request denied"
)
// OAuth 2.0 Redirect Browser To
//
// Contains a redirect URL used to complete a login, consent, or logout request.
//
// swagger:model oAuth2RedirectTo
type OAuth2RedirectTo struct {
// RedirectURL is the URL which you should redirect the user's browser to once the authentication process is completed.
//
// required: true
// in: body
RedirectTo string `json:"redirect_to"`
}
// swagger:ignore
type LoginSession struct {
ID string `db:"id"`
NID uuid.UUID `db:"nid"`
AuthenticatedAt sqlxx.NullTime `db:"authenticated_at"`
Subject string `db:"subject"`
IdentityProviderSessionID sqlxx.NullString `db:"identity_provider_session_id"`
Remember bool `db:"remember"`
}
func (LoginSession) TableName() string {
return "hydra_oauth2_authentication_session"
}
// The request payload used to accept a login or consent request.
//
// swagger:model rejectOAuth2Request
type RequestDeniedError struct {
// The error should follow the OAuth2 error format (e.g. `invalid_request`, `login_required`).
//
// Defaults to `request_denied`.
Name string `json:"error"`
// Description of the error in a human readable format.
Description string `json:"error_description"`
// Hint to help resolve the error.
Hint string `json:"error_hint"`
// Represents the HTTP status code of the error (e.g. 401 or 403)
//
// Defaults to 400
Code int `json:"status_code"`
// Debug contains information to help resolve the problem as a developer. Usually not exposed
// to the public but only in the server logs.
Debug string `json:"error_debug"`
// swagger:ignore
Valid bool `json:"valid"`
}
func (e *RequestDeniedError) IsError() bool {
return e != nil && e.Valid
}
func (e *RequestDeniedError) SetDefaults(name string) {
if e.Name == "" {
e.Name = name
}
if e.Code == 0 {
e.Code = http.StatusBadRequest
}
}
func (e *RequestDeniedError) ToRFCError() *fosite.RFC6749Error {
if e.Name == "" {
e.Name = "request_denied"
}
if e.Code == 0 {
e.Code = fosite.ErrInvalidRequest.CodeField
}
return &fosite.RFC6749Error{
ErrorField: e.Name,
DescriptionField: e.Description,
HintField: e.Hint,
CodeField: e.Code,
DebugField: e.Debug,
}
}
func (e *RequestDeniedError) Scan(value any) error {
v := fmt.Sprintf("%s", value)
if len(v) == 0 || v == "{}" {
return nil
}
if err := json.Unmarshal([]byte(v), e); err != nil {
return errorsx.WithStack(err)
}
e.Valid = true
return nil
}
func (e *RequestDeniedError) Value() (driver.Value, error) {
if !e.IsError() {
return "{}", nil
}
value, err := json.Marshal(e)
if err != nil {
return nil, errorsx.WithStack(err)
}
return string(value), nil
}
// The request payload used to accept a consent request.
//
// swagger:model acceptOAuth2ConsentRequest
type AcceptOAuth2ConsentRequest struct {
// ID instead of Challenge because of pop
ID string `json:"-"`
// GrantScope sets the scope the user authorized the client to use. Should be a subset of `requested_scope`.
GrantedScope sqlxx.StringSliceJSONFormat `json:"grant_scope"`
// GrantedAudience sets the audience the user authorized the client to use. Should be a subset of `requested_access_token_audience`.
GrantedAudience sqlxx.StringSliceJSONFormat `json:"grant_access_token_audience"`
// Session allows you to set (optional) session data for access and ID tokens.
Session *AcceptOAuth2ConsentRequestSession `json:"session" faker:"-"`
// Remember, if set to true, tells ORY Hydra to remember this consent authorization and reuse it if the same
// client asks the same user for the same, or a subset of, scope.
Remember bool `json:"remember"`
// RememberFor sets how long the consent authorization should be remembered for in seconds. If set to `0`, the
// authorization will be remembered indefinitely.
RememberFor int `json:"remember_for"`
// HandledAt contains the timestamp the consent request was handled.
HandledAt sqlxx.NullTime `json:"handled_at"`
// If set to true means that the request was already handled. This
// can happen on form double-submit or other errors. If this is set
// we recommend redirecting the user to `request_url` to re-initiate
// the flow.
WasHandled bool `json:"-"`
ConsentRequest *OAuth2ConsentRequest `json:"-"`
Error *RequestDeniedError `json:"-"`
RequestedAt time.Time `json:"-"`
AuthenticatedAt sqlxx.NullTime `json:"-"`
SessionIDToken sqlxx.MapStringInterface `json:"-" faker:"-"`
SessionAccessToken sqlxx.MapStringInterface `json:"-" faker:"-"`
}
func (r *AcceptOAuth2ConsentRequest) HasError() bool {
return r.Error.IsError()
}
// List of OAuth 2.0 Consent Sessions
//
// swagger:model oAuth2ConsentSessions
//
//lint:ignore U1000 Used to generate Swagger and OpenAPI definitions
type oAuth2ConsentSessions []OAuth2ConsentSession
// OAuth 2.0 Consent Session
//
// A completed OAuth 2.0 Consent Session.
//
// swagger:model oAuth2ConsentSession
type OAuth2ConsentSession struct {
ID string `json:"-" db:"challenge"`
// Scope Granted
//
// GrantScope sets the scope the user authorized the client to use. Should be a subset of `requested_scope`.
GrantedScope sqlxx.StringSliceJSONFormat `json:"grant_scope" db:"granted_scope"`
// Audience Granted
//
// GrantedAudience sets the audience the user authorized the client to use. Should be a subset of `requested_access_token_audience`.
GrantedAudience sqlxx.StringSliceJSONFormat `json:"grant_access_token_audience" db:"granted_at_audience"`
// Session Details
//
// Session allows you to set (optional) session data for access and ID tokens.
Session *AcceptOAuth2ConsentRequestSession `json:"session" db:"-"`
// Remember Consent
//
// Remember, if set to true, tells ORY Hydra to remember this consent authorization and reuse it if the same
// client asks the same user for the same, or a subset of, scope.
Remember bool `json:"remember" db:"remember"`
// Remember Consent For
//
// RememberFor sets how long the consent authorization should be remembered for in seconds. If set to `0`, the
// authorization will be remembered indefinitely.
RememberFor int `json:"remember_for" db:"remember_for"`
// Consent Handled At
//
// HandledAt contains the timestamp the consent request was handled.
HandledAt sqlxx.NullTime `json:"handled_at" db:"handled_at"`
// If set to true means that the request was already handled. This
// can happen on form double-submit or other errors. If this is set
// we recommend redirecting the user to `request_url` to re-initiate
// the flow.
WasHandled bool `json:"-" db:"was_used"`
// Consent Request
//
// The consent request that lead to this consent session.
ConsentRequest *OAuth2ConsentRequest `json:"consent_request" db:"-"`
Error *RequestDeniedError `json:"-" db:"error"`
RequestedAt time.Time `json:"-" db:"requested_at"`
AuthenticatedAt sqlxx.NullTime `json:"-" db:"authenticated_at"`
SessionIDToken sqlxx.MapStringInterface `db:"session_id_token" json:"-"`
SessionAccessToken sqlxx.MapStringInterface `db:"session_access_token" json:"-"`
}
// HandledLoginRequest is the request payload used to accept a login request.
//
// swagger:model acceptOAuth2LoginRequest
type HandledLoginRequest struct {
// ID instead of challenge for pop
ID string `json:"-"`
// Remember, if set to true, tells ORY Hydra to remember this user by telling the user agent (browser) to store
// a cookie with authentication data. If the same user performs another OAuth 2.0 Authorization Request, he/she
// will not be asked to log in again.
Remember bool `json:"remember"`
// RememberFor sets how long the authentication should be remembered for in seconds. If set to `0`, the
// authorization will be remembered for the duration of the browser session (using a session cookie).
RememberFor int `json:"remember_for"`
// Extend OAuth2 authentication session lifespan
//
// If set to `true`, the OAuth2 authentication cookie lifespan is extended. This is for example useful if you want the user to be able to use `prompt=none` continuously.
//
// This value can only be set to `true` if the user has an authentication, which is the case if the `skip` value is `true`.
//
// required: false
ExtendSessionLifespan bool `json:"extend_session_lifespan"`
// ACR sets the Authentication AuthorizationContext Class Reference value for this authentication session. You can use it
// to express that, for example, a user authenticated using two factor authentication.
ACR string `json:"acr"`
// AMR sets the Authentication Methods References value for this
// authentication session. You can use it to specify the method a user used to
// authenticate. For example, if the acr indicates a user used two factor
// authentication, the amr can express they used a software-secured key.
AMR sqlxx.StringSliceJSONFormat `json:"amr"`
// Subject is the user ID of the end-user that authenticated.
//
// required: true
Subject string `json:"subject"`
// IdentityProviderSessionID is the session ID of the end-user that authenticated.
// If specified, we will use this value to propagate the logout.
//
// required: false
IdentityProviderSessionID string `json:"identity_provider_session_id,omitempty"`
// ForceSubjectIdentifier forces the "pairwise" user ID of the end-user that authenticated. The "pairwise" user ID refers to the
// (Pairwise Identifier Algorithm)[http://openid.net/specs/openid-connect-core-1_0.html#PairwiseAlg] of the OpenID
// Connect specification. It allows you to set an obfuscated subject ("user") identifier that is unique to the client.
//
// Please note that this changes the user ID on endpoint /userinfo and sub claim of the ID Token. It does not change the
// sub claim in the OAuth 2.0 Introspection.
//
// Per default, ORY Hydra handles this value with its own algorithm. In case you want to set this yourself
// you can use this field. Please note that setting this field has no effect if `pairwise` is not configured in
// ORY Hydra or the OAuth 2.0 Client does not expect a pairwise identifier (set via `subject_type` key in the client's
// configuration).
//
// Please also be aware that ORY Hydra is unable to properly compute this value during authentication. This implies
// that you have to compute this value on every authentication process (probably depending on the client ID or some
// other unique value).
//
// If you fail to compute the proper value, then authentication processes which have id_token_hint set might fail.
ForceSubjectIdentifier string `json:"force_subject_identifier"`
// Context is an optional object which can hold arbitrary data. The data will be made available when fetching the
// consent request under the "context" field. This is useful in scenarios where login and consent endpoints share
// data.
Context sqlxx.JSONRawMessage `json:"context"`
// If set to true means that the request was already handled. This
// can happen on form double-submit or other errors. If this is set
// we recommend redirecting the user to `request_url` to re-initiate
// the flow.
WasHandled bool `json:"-"`
LoginRequest *LoginRequest `json:"-" faker:"-"`
Error *RequestDeniedError `json:"-"`
RequestedAt time.Time `json:"-"`
AuthenticatedAt sqlxx.NullTime `json:"-"`
}
func (r *HandledLoginRequest) HasError() bool {
return r.Error.IsError()
}
// Contains optional information about the OpenID Connect request.
//
// swagger:model oAuth2ConsentRequestOpenIDConnectContext
type OAuth2ConsentRequestOpenIDConnectContext struct {
// ACRValues is the Authentication AuthorizationContext Class Reference requested in the OAuth 2.0 Authorization request.
// It is a parameter defined by OpenID Connect and expresses which level of authentication (e.g. 2FA) is required.
//
// OpenID Connect defines it as follows:
// > Requested Authentication AuthorizationContext Class Reference values. Space-separated string that specifies the acr values
// that the Authorization Server is being requested to use for processing this Authentication Request, with the
// values appearing in order of preference. The Authentication AuthorizationContext Class satisfied by the authentication
// performed is returned as the acr Claim Value, as specified in Section 2. The acr Claim is requested as a
// Voluntary Claim by this parameter.
ACRValues []string `json:"acr_values,omitempty"`
// UILocales is the End-User'id preferred languages and scripts for the user interface, represented as a
// space-separated list of BCP47 [RFC5646] language tag values, ordered by preference. For instance, the value
// "fr-CA fr en" represents a preference for French as spoken in Canada, then French (without a region designation),
// followed by English (without a region designation). An error SHOULD NOT result if some or all of the requested
// locales are not supported by the OpenID Provider.
UILocales []string `json:"ui_locales,omitempty"`
// Display is a string value that specifies how the Authorization Server displays the authentication and consent user interface pages to the End-User.
// The defined values are:
// - page: The Authorization Server SHOULD display the authentication and consent UI consistent with a full User Agent page view. If the display parameter is not specified, this is the default display mode.
// - popup: The Authorization Server SHOULD display the authentication and consent UI consistent with a popup User Agent window. The popup User Agent window should be of an appropriate size for a login-focused dialog and should not obscure the entire window that it is popping up over.
// - touch: The Authorization Server SHOULD display the authentication and consent UI consistent with a device that leverages a touch interface.
// - wap: The Authorization Server SHOULD display the authentication and consent UI consistent with a "feature phone" type display.
//
// The Authorization Server MAY also attempt to detect the capabilities of the User Agent and present an appropriate display.
Display string `json:"display,omitempty"`
// IDTokenHintClaims are the claims of the ID Token previously issued by the Authorization Server being passed as a hint about the
// End-User's current or past authenticated session with the Client.
IDTokenHintClaims map[string]interface{} `json:"id_token_hint_claims,omitempty" faker:"-"`
// LoginHint hints about the login identifier the End-User might use to log in (if necessary).
// This hint can be used by an RP if it first asks the End-User for their e-mail address (or other identifier)
// and then wants to pass that value as a hint to the discovered authorization service. This value MAY also be a
// phone number in the format specified for the phone_number Claim. The use of this parameter is optional.
LoginHint string `json:"login_hint,omitempty"`
}
func (n *OAuth2ConsentRequestOpenIDConnectContext) Scan(value interface{}) error {
v := fmt.Sprintf("%s", value)
if len(v) == 0 {
return nil
}
return errorsx.WithStack(json.Unmarshal([]byte(v), n))
}
func (n *OAuth2ConsentRequestOpenIDConnectContext) Value() (driver.Value, error) {
value, err := json.Marshal(n)
return value, errorsx.WithStack(err)
}
// Contains information about an ongoing logout request.
//
// swagger:model oAuth2LogoutRequest
type LogoutRequest struct {
// Challenge is the identifier ("logout challenge") of the logout authentication request. It is used to
// identify the session.
ID string `json:"challenge" db:"challenge"`
NID uuid.UUID `json:"-" db:"nid"`
// Subject is the user for whom the logout was request.
Subject string `json:"subject" db:"subject"`
// SessionID is the login session ID that was requested to log out.
SessionID string `json:"sid,omitempty" db:"sid"`
// RequestURL is the original Logout URL requested.
RequestURL string `json:"request_url" db:"request_url"`
// RPInitiated is set to true if the request was initiated by a Relying Party (RP), also known as an OAuth 2.0 Client.
RPInitiated bool `json:"rp_initiated" db:"rp_initiated"`
// If set to true means that the request was already handled. This
// can happen on form double-submit or other errors. If this is set
// we recommend redirecting the user to `request_url` to re-initiate
// the flow.
WasHandled bool `json:"-" db:"was_used"`
Verifier string `json:"-" db:"verifier"`
PostLogoutRedirectURI string `json:"-" db:"redir_url"`
Accepted bool `json:"-" db:"accepted"`
Rejected bool `db:"rejected" json:"-"`
ClientID sql.NullString `json:"-" db:"client_id"`
Client *client.Client `json:"client" db:"-"`
}
func (LogoutRequest) TableName() string {
return "hydra_oauth2_logout_request"
}
func (r *LogoutRequest) BeforeSave(_ *pop.Connection) error {
if r.Client != nil {
r.ClientID = sql.NullString{
Valid: true,
String: r.Client.GetID(),
}
}
return nil
}
func (r *LogoutRequest) AfterFind(c *pop.Connection) error {
if r.ClientID.Valid {
r.Client = &client.Client{}
return sqlcon.HandleError(c.Where("id = ?", r.ClientID.String).First(r.Client))
}
return nil
}
// Returned when the log out request was used.
//
// swagger:ignore
type LogoutResult struct {
RedirectTo string
FrontChannelLogoutURLs []string
}
// Contains information on an ongoing login request.
//
// swagger:model oAuth2LoginRequest
type LoginRequest struct {
// ID is the identifier ("login challenge") of the login request. It is used to
// identify the session.
//
// required: true
ID string `json:"challenge"`
// RequestedScope contains the OAuth 2.0 Scope requested by the OAuth 2.0 Client.
//
// required: true
RequestedScope sqlxx.StringSliceJSONFormat `json:"requested_scope"`
// RequestedAudience contains the access token audience as requested by the OAuth 2.0 Client.
//
// required: true
RequestedAudience sqlxx.StringSliceJSONFormat `json:"requested_access_token_audience"`
// Skip, if true, implies that the client has requested the same scopes from the same user previously.
// If true, you can skip asking the user to grant the requested scopes, and simply forward the user to the redirect URL.
//
// This feature allows you to update / set session information.
//
// required: true
Skip bool `json:"skip"`
// Subject is the user ID of the end-user that authenticated. Now, that end user needs to grant or deny the scope
// requested by the OAuth 2.0 client. If this value is set and `skip` is true, you MUST include this subject type
// when accepting the login request, or the request will fail.
//
// required: true
Subject string `json:"subject"`
// OpenIDConnectContext provides context for the (potential) OpenID Connect context. Implementation of these
// values in your app are optional but can be useful if you want to be fully compliant with the OpenID Connect spec.
OpenIDConnectContext *OAuth2ConsentRequestOpenIDConnectContext `json:"oidc_context"`
// Client is the OAuth 2.0 Client that initiated the request.
//
// required: true
Client *client.Client `json:"client"`
ClientID string `json:"-"`
// RequestURL is the original OAuth 2.0 Authorization URL requested by the OAuth 2.0 client. It is the URL which
// initiates the OAuth 2.0 Authorization Code or OAuth 2.0 Implicit flow. This URL is typically not needed, but
// might come in handy if you want to deal with additional request parameters.
//
// required: true
RequestURL string `json:"request_url"`
// SessionID is the login session ID. If the user-agent reuses a login session (via cookie / remember flag)
// this ID will remain the same. If the user-agent did not have an existing authentication session (e.g. remember is false)
// this will be a new random value. This value is used as the "sid" parameter in the ID Token and in OIDC Front-/Back-
// channel logout. It's value can generally be used to associate consecutive login requests by a certain user.
SessionID sqlxx.NullString `json:"session_id"`
// If set to true means that the request was already handled. This
// can happen on form double-submit or other errors. If this is set
// we recommend redirecting the user to `request_url` to re-initiate
// the flow.
WasHandled bool `json:"-"`
ForceSubjectIdentifier string `json:"-"` // this is here but has no meaning apart from sql_helper working properly.
Verifier string `json:"-"`
CSRF string `json:"-"`
AuthenticatedAt sqlxx.NullTime `json:"-"`
RequestedAt time.Time `json:"-"`
}
// Contains information on an ongoing consent request.
//
// swagger:model oAuth2ConsentRequest
type OAuth2ConsentRequest struct {
// ID is the identifier ("authorization challenge") of the consent authorization request. It is used to
// identify the session.
//
// required: true
ID string `json:"challenge"`
// RequestedScope contains the OAuth 2.0 Scope requested by the OAuth 2.0 Client.
RequestedScope sqlxx.StringSliceJSONFormat `json:"requested_scope"`
// RequestedAudience contains the access token audience as requested by the OAuth 2.0 Client.
RequestedAudience sqlxx.StringSliceJSONFormat `json:"requested_access_token_audience"`
// Skip, if true, implies that the client has requested the same scopes from the same user previously.
// If true, you must not ask the user to grant the requested scopes. You must however either allow or deny the
// consent request using the usual API call.
Skip bool `json:"skip"`
// Subject is the user ID of the end-user that authenticated. Now, that end user needs to grant or deny the scope
// requested by the OAuth 2.0 client.
Subject string `json:"subject"`
// OpenIDConnectContext provides context for the (potential) OpenID Connect context. Implementation of these
// values in your app are optional but can be useful if you want to be fully compliant with the OpenID Connect spec.
OpenIDConnectContext *OAuth2ConsentRequestOpenIDConnectContext `json:"oidc_context"`
// Client is the OAuth 2.0 Client that initiated the request.
Client *client.Client `json:"client"`
ClientID string `json:"-"`
// RequestURL is the original OAuth 2.0 Authorization URL requested by the OAuth 2.0 client. It is the URL which
// initiates the OAuth 2.0 Authorization Code or OAuth 2.0 Implicit flow. This URL is typically not needed, but
// might come in handy if you want to deal with additional request parameters.
RequestURL string `json:"request_url"`
// LoginChallenge is the login challenge this consent challenge belongs to. It can be used to associate
// a login and consent request in the login & consent app.
LoginChallenge sqlxx.NullString `json:"login_challenge"`
// LoginSessionID is the login session ID. If the user-agent reuses a login session (via cookie / remember flag)
// this ID will remain the same. If the user-agent did not have an existing authentication session (e.g. remember is false)
// this will be a new random value. This value is used as the "sid" parameter in the ID Token and in OIDC Front-/Back-
// channel logout. It's value can generally be used to associate consecutive login requests by a certain user.
LoginSessionID sqlxx.NullString `json:"login_session_id"`
// ACR represents the Authentication AuthorizationContext Class Reference value for this authentication session. You can use it
// to express that, for example, a user authenticated using two factor authentication.
ACR string `json:"acr"`
// AMR is the Authentication Methods References value for this
// authentication session. You can use it to specify the method a user used to
// authenticate. For example, if the acr indicates a user used two factor
// authentication, the amr can express they used a software-secured key.
AMR sqlxx.StringSliceJSONFormat `json:"amr"`
// Context contains arbitrary information set by the login endpoint or is empty if not set.
Context sqlxx.JSONRawMessage `json:"context,omitempty"`
// If set to true means that the request was already handled. This
// can happen on form double-submit or other errors. If this is set
// we recommend redirecting the user to `request_url` to re-initiate
// the flow.
WasHandled bool `json:"-"`
// ForceSubjectIdentifier is the value from authentication (if set).
ForceSubjectIdentifier string `json:"-"`
Verifier string `json:"-"`
CSRF string `json:"-"`
AuthenticatedAt sqlxx.NullTime `json:"-"`
RequestedAt time.Time `json:"-"`
}
// Pass session data to a consent request.
//
// swagger:model acceptOAuth2ConsentRequestSession
type AcceptOAuth2ConsentRequestSession struct {
// AccessToken sets session data for the access and refresh token, as well as any future tokens issued by the
// refresh grant. Keep in mind that this data will be available to anyone performing OAuth 2.0 Challenge Introspection.
// If only your services can perform OAuth 2.0 Challenge Introspection, this is usually fine. But if third parties
// can access that endpoint as well, sensitive data from the session might be exposed to them. Use with care!
AccessToken map[string]interface{} `json:"access_token"`
// IDToken sets session data for the OpenID Connect ID token. Keep in mind that the session'id payloads are readable
// by anyone that has access to the ID Challenge. Use with care!
IDToken map[string]interface{} `json:"id_token"`
}
// NewConsentRequestSessionData creates a new AcceptOAuth2ConsentRequestSession.
func NewConsentRequestSessionData() *AcceptOAuth2ConsentRequestSession {
return &AcceptOAuth2ConsentRequestSession{
AccessToken: map[string]interface{}{},
IDToken: map[string]interface{}{},
}
} |
Go | hydra/flow/consent_types_test.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
package flow
import (
"fmt"
"testing"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
"github.com/ory/fosite"
)
func TestToRFCError(t *testing.T) {
for k, tc := range []struct {
input *RequestDeniedError
expect *fosite.RFC6749Error
}{
{
input: &RequestDeniedError{
Name: "not empty",
Valid: true,
},
expect: &fosite.RFC6749Error{
ErrorField: "not empty",
DescriptionField: "",
CodeField: fosite.ErrInvalidRequest.CodeField,
DebugField: "",
},
},
{
input: &RequestDeniedError{
Name: "",
Description: "not empty",
Valid: true,
},
expect: &fosite.RFC6749Error{
ErrorField: "request_denied",
DescriptionField: "not empty",
CodeField: fosite.ErrInvalidRequest.CodeField,
DebugField: "",
},
},
{
input: &RequestDeniedError{Valid: true},
expect: &fosite.RFC6749Error{
ErrorField: "request_denied",
DescriptionField: "",
HintField: "",
CodeField: fosite.ErrInvalidRequest.CodeField,
DebugField: "",
},
},
} {
t.Run(fmt.Sprintf("case=%d", k), func(t *testing.T) {
require.EqualValues(t, tc.input.ToRFCError(), tc.expect)
})
}
}
func TestRequestDeniedError(t *testing.T) {
var e *RequestDeniedError
v, err := e.Value()
require.NoError(t, err)
assert.EqualValues(t, "{}", fmt.Sprintf("%v", v))
} |
Go | hydra/flow/flow.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
package flow
import (
"context"
"time"
"github.com/gobuffalo/pop/v6"
"github.com/gofrs/uuid"
"github.com/pkg/errors"
"github.com/ory/hydra/v2/aead"
"github.com/ory/hydra/v2/client"
"github.com/ory/hydra/v2/oauth2/flowctx"
"github.com/ory/hydra/v2/x"
"github.com/ory/x/sqlcon"
"github.com/ory/x/sqlxx"
)
// FlowState* constants enumerate the states of a flow. The below graph
// describes possible flow state transitions.
//
// graph TD
//
// LOGIN_INITIALIZED --> LOGIN_UNUSED
// LOGIN_UNUSED --> LOGIN_USED
// LOGIN_UNUSED --> LOGIN_ERROR
// LOGIN_USED --> CONSENT_INITIALIZED
// CONSENT_INITIALIZED --> CONSENT_UNUSED
// CONSENT_UNUSED --> CONSENT_UNUSED
// CONSENT_UNUSED --> CONSENT_USED
// CONSENT_UNUSED --> CONSENT_ERROR
const (
// FlowStateLoginInitialized applies before the login app either
// accepts or rejects the login request.
FlowStateLoginInitialized = int16(1)
// FlowStateLoginUnused indicates that the login has been authenticated, but
// the User Agent hasn't picked up the result yet.
FlowStateLoginUnused = int16(2)
// FlowStateLoginUsed indicates that the User Agent is requesting consent and
// Hydra has invalidated the login request. This is a short-lived state
// because the transition to FlowStateConsentInitialized should happen while
// handling the request that triggered the transition to FlowStateLoginUsed.
FlowStateLoginUsed = int16(3)
// FlowStateConsentInitialized applies while Hydra waits for a consent request
// to be accepted or rejected.
FlowStateConsentInitialized = int16(4)
FlowStateConsentUnused = int16(5)
FlowStateConsentUsed = int16(6)
// TODO: Refactor error handling to persist error codes instead of JSON
// strings. Currently we persist errors as JSON strings in the LoginError
// and ConsentError fields. This shouldn't be necessary because the different
// errors are enumerable; most of them have error codes defined in Fosite. It
// is possible to define a mapping between error codes and the metadata that
// is currently persisted with each erred Flow. This mapping would be used in
// GetConsentRequest, HandleConsentRequest, GetHandledLoginRequest, etc. An
// ErrorContext field can be introduced later if it becomes necessary.
// If the above is implemented, merge the LoginError and ConsentError fields
// and use the following FlowStates when converting to/from
// [Handled]{Login|Consent}Request:
FlowStateLoginError = int16(128)
FlowStateConsentError = int16(129)
)
// Flow is an abstraction used in the persistence layer to unify LoginRequest,
// HandledLoginRequest, ConsentRequest, and AcceptOAuth2ConsentRequest.
//
// TODO: Deprecate the structs that are made obsolete by the Flow concept.
// Context: Before Flow was introduced, the API and the database used the same
// structs, LoginRequest and HandledLoginRequest. These two tables and structs
// were merged into a new concept, Flow, in order to optimize the persistence
// layer. We currently limit the use of Flow to the persistence layer and keep
// using the original structs in the API in order to minimize the impact of the
// database refactoring on the API.
type Flow struct {
// ID is the identifier ("login challenge") of the login request. It is used to
// identify the session.
//
// required: true
ID string `db:"login_challenge"`
NID uuid.UUID `db:"nid"`
// RequestedScope contains the OAuth 2.0 Scope requested by the OAuth 2.0 Client.
//
// required: true
RequestedScope sqlxx.StringSliceJSONFormat `db:"requested_scope"`
// RequestedAudience contains the access token audience as requested by the OAuth 2.0 Client.
//
// required: true
RequestedAudience sqlxx.StringSliceJSONFormat `db:"requested_at_audience"`
// LoginSkip, if true, implies that the client has requested the same scopes from the same user previously.
// If true, you can skip asking the user to grant the requested scopes, and simply forward the user to the redirect URL.
//
// This feature allows you to update / set session information.
//
// required: true
LoginSkip bool `db:"login_skip"`
// Subject is the user ID of the end-user that authenticated. Now, that end user needs to grant or deny the scope
// requested by the OAuth 2.0 client. If this value is set and `skip` is true, you MUST include this subject type
// when accepting the login request, or the request will fail.
//
// required: true
Subject string `db:"subject"`
// OpenIDConnectContext provides context for the (potential) OpenID Connect context. Implementation of these
// values in your app are optional but can be useful if you want to be fully compliant with the OpenID Connect spec.
OpenIDConnectContext *OAuth2ConsentRequestOpenIDConnectContext `db:"oidc_context"`
// Client is the OAuth 2.0 Client that initiated the request.
//
// required: true
Client *client.Client `db:"-"`
ClientID string `db:"client_id"`
// RequestURL is the original OAuth 2.0 Authorization URL requested by the OAuth 2.0 client. It is the URL which
// initiates the OAuth 2.0 Authorization Code or OAuth 2.0 Implicit flow. This URL is typically not needed, but
// might come in handy if you want to deal with additional request parameters.
//
// required: true
RequestURL string `db:"request_url"`
// SessionID is the login session ID. If the user-agent reuses a login session (via cookie / remember flag)
// this ID will remain the same. If the user-agent did not have an existing authentication session (e.g. remember is false)
// this will be a new random value. This value is used as the "sid" parameter in the ID Token and in OIDC Front-/Back-
// channel logout. Its value can generally be used to associate consecutive login requests by a certain user.
SessionID sqlxx.NullString `db:"login_session_id"`
// IdentityProviderSessionID is the session ID of the end-user that authenticated.
// If specified, we will use this value to propagate the logout.
IdentityProviderSessionID sqlxx.NullString `db:"identity_provider_session_id"`
LoginVerifier string `db:"login_verifier"`
LoginCSRF string `db:"login_csrf"`
LoginInitializedAt sqlxx.NullTime `db:"login_initialized_at"`
RequestedAt time.Time `db:"requested_at"`
State int16 `db:"state"`
// LoginRemember, if set to true, tells ORY Hydra to remember this user by telling the user agent (browser) to store
// a cookie with authentication data. If the same user performs another OAuth 2.0 Authorization Request, he/she
// will not be asked to log in again.
LoginRemember bool `db:"login_remember"`
// LoginRememberFor sets how long the authentication should be remembered for in seconds. If set to `0`, the
// authorization will be remembered for the duration of the browser session (using a session cookie).
LoginRememberFor int `db:"login_remember_for"`
// LoginExtendSessionLifespan, if set to true, session cookie expiry time will be updated when session is
// refreshed (login skip=true).
LoginExtendSessionLifespan bool `db:"login_extend_session_lifespan"`
// ACR sets the Authentication AuthorizationContext Class Reference value for this authentication session. You can use it
// to express that, for example, a user authenticated using two factor authentication.
ACR string `db:"acr"`
// AMR sets the Authentication Methods References value for this
// authentication session. You can use it to specify the method a user used to
// authenticate. For example, if the acr indicates a user used two factor
// authentication, the amr can express they used a software-secured key.
AMR sqlxx.StringSliceJSONFormat `db:"amr"`
// ForceSubjectIdentifier forces the "pairwise" user ID of the end-user that authenticated. The "pairwise" user ID refers to the
// (Pairwise Identifier Algorithm)[http://openid.net/specs/openid-connect-core-1_0.html#PairwiseAlg] of the OpenID
// Connect specification. It allows you to set an obfuscated subject ("user") identifier that is unique to the client.
//
// Please note that this changes the user ID on endpoint /userinfo and sub claim of the ID Token. It does not change the
// sub claim in the OAuth 2.0 Introspection.
//
// Per default, ORY Hydra handles this value with its own algorithm. In case you want to set this yourself
// you can use this field. Please note that setting this field has no effect if `pairwise` is not configured in
// ORY Hydra or the OAuth 2.0 Client does not expect a pairwise identifier (set via `subject_type` key in the client's
// configuration).
//
// Please also be aware that ORY Hydra is unable to properly compute this value during authentication. This implies
// that you have to compute this value on every authentication process (probably depending on the client ID or some
// other unique value).
//
// If you fail to compute the proper value, then authentication processes which have id_token_hint set might fail.
ForceSubjectIdentifier string `db:"forced_subject_identifier"`
// Context is an optional object which can hold arbitrary data. The data will be made available when fetching the
// consent request under the "context" field. This is useful in scenarios where login and consent endpoints share
// data.
Context sqlxx.JSONRawMessage `db:"context"`
// LoginWasUsed set to true means that the login request was already handled.
// This can happen on form double-submit or other errors. If this is set we
// recommend redirecting the user to `request_url` to re-initiate the flow.
LoginWasUsed bool `db:"login_was_used"`
LoginError *RequestDeniedError `db:"login_error"`
LoginAuthenticatedAt sqlxx.NullTime `db:"login_authenticated_at"`
// ConsentChallengeID is the identifier ("authorization challenge") of the consent authorization request. It is used to
// identify the session.
//
// required: true
ConsentChallengeID sqlxx.NullString `db:"consent_challenge_id"`
// ConsentSkip, if true, implies that the client has requested the same scopes from the same user previously.
// If true, you must not ask the user to grant the requested scopes. You must however either allow or deny the
// consent request using the usual API call.
ConsentSkip bool `db:"consent_skip"`
ConsentVerifier sqlxx.NullString `db:"consent_verifier"`
ConsentCSRF sqlxx.NullString `db:"consent_csrf"`
// GrantedScope sets the scope the user authorized the client to use. Should be a subset of `requested_scope`.
GrantedScope sqlxx.StringSliceJSONFormat `db:"granted_scope"`
// GrantedAudience sets the audience the user authorized the client to use. Should be a subset of `requested_access_token_audience`.
GrantedAudience sqlxx.StringSliceJSONFormat `db:"granted_at_audience"`
// ConsentRemember, if set to true, tells ORY Hydra to remember this consent authorization and reuse it if the same
// client asks the same user for the same, or a subset of, scope.
ConsentRemember bool `db:"consent_remember"`
// ConsentRememberFor sets how long the consent authorization should be remembered for in seconds. If set to `0`, the
// authorization will be remembered indefinitely.
ConsentRememberFor *int `db:"consent_remember_for"`
// ConsentHandledAt contains the timestamp the consent request was handled.
ConsentHandledAt sqlxx.NullTime `db:"consent_handled_at"`
// ConsentWasHandled set to true means that the request was already handled.
// This can happen on form double-submit or other errors. If this is set we
// recommend redirecting the user to `request_url` to re-initiate the flow.
ConsentWasHandled bool `db:"consent_was_used"`
ConsentError *RequestDeniedError `db:"consent_error"`
SessionIDToken sqlxx.MapStringInterface `db:"session_id_token" faker:"-"`
SessionAccessToken sqlxx.MapStringInterface `db:"session_access_token" faker:"-"`
}
func NewFlow(r *LoginRequest) *Flow {
return &Flow{
ID: r.ID,
RequestedScope: r.RequestedScope,
RequestedAudience: r.RequestedAudience,
LoginSkip: r.Skip,
Subject: r.Subject,
OpenIDConnectContext: r.OpenIDConnectContext,
Client: r.Client,
ClientID: r.ClientID,
RequestURL: r.RequestURL,
SessionID: r.SessionID,
LoginWasUsed: r.WasHandled,
ForceSubjectIdentifier: r.ForceSubjectIdentifier,
LoginVerifier: r.Verifier,
LoginCSRF: r.CSRF,
LoginAuthenticatedAt: r.AuthenticatedAt,
RequestedAt: r.RequestedAt,
State: FlowStateLoginInitialized,
}
}
func (f *Flow) HandleLoginRequest(h *HandledLoginRequest) error {
if f.LoginWasUsed {
return errors.WithStack(x.ErrConflict.WithHint("The login request was already used and can no longer be changed."))
}
if f.State != FlowStateLoginInitialized && f.State != FlowStateLoginUnused && f.State != FlowStateLoginError {
return errors.Errorf("invalid flow state: expected %d/%d/%d, got %d", FlowStateLoginInitialized, FlowStateLoginUnused, FlowStateLoginError, f.State)
}
if f.ID != h.ID {
return errors.Errorf("flow ID %s does not match HandledLoginRequest ID %s", f.ID, h.ID)
}
if f.Subject != "" && h.Subject != "" && f.Subject != h.Subject {
return errors.Errorf("flow Subject %s does not match the HandledLoginRequest Subject %s", f.Subject, h.Subject)
}
if f.ForceSubjectIdentifier != "" && h.ForceSubjectIdentifier != "" && f.ForceSubjectIdentifier != h.ForceSubjectIdentifier {
return errors.Errorf("flow ForceSubjectIdentifier %s does not match the HandledLoginRequest ForceSubjectIdentifier %s", f.ForceSubjectIdentifier, h.ForceSubjectIdentifier)
}
if h.Error != nil {
f.State = FlowStateLoginError
} else {
f.State = FlowStateLoginUnused
}
f.ID = h.ID
f.Subject = h.Subject
f.ForceSubjectIdentifier = h.ForceSubjectIdentifier
f.LoginError = h.Error
f.IdentityProviderSessionID = sqlxx.NullString(h.IdentityProviderSessionID)
f.LoginRemember = h.Remember
f.LoginRememberFor = h.RememberFor
f.LoginExtendSessionLifespan = h.ExtendSessionLifespan
f.ACR = h.ACR
f.AMR = h.AMR
f.Context = h.Context
f.LoginWasUsed = h.WasHandled
f.LoginAuthenticatedAt = h.AuthenticatedAt
return nil
}
func (f *Flow) GetHandledLoginRequest() HandledLoginRequest {
return HandledLoginRequest{
ID: f.ID,
Remember: f.LoginRemember,
RememberFor: f.LoginRememberFor,
ExtendSessionLifespan: f.LoginExtendSessionLifespan,
ACR: f.ACR,
AMR: f.AMR,
Subject: f.Subject,
IdentityProviderSessionID: f.IdentityProviderSessionID.String(),
ForceSubjectIdentifier: f.ForceSubjectIdentifier,
Context: f.Context,
WasHandled: f.LoginWasUsed,
Error: f.LoginError,
LoginRequest: f.GetLoginRequest(),
RequestedAt: f.RequestedAt,
AuthenticatedAt: f.LoginAuthenticatedAt,
}
}
func (f *Flow) GetLoginRequest() *LoginRequest {
return &LoginRequest{
ID: f.ID,
RequestedScope: f.RequestedScope,
RequestedAudience: f.RequestedAudience,
Skip: f.LoginSkip,
Subject: f.Subject,
OpenIDConnectContext: f.OpenIDConnectContext,
Client: f.Client,
ClientID: f.ClientID,
RequestURL: f.RequestURL,
SessionID: f.SessionID,
WasHandled: f.LoginWasUsed,
ForceSubjectIdentifier: f.ForceSubjectIdentifier,
Verifier: f.LoginVerifier,
CSRF: f.LoginCSRF,
AuthenticatedAt: f.LoginAuthenticatedAt,
RequestedAt: f.RequestedAt,
}
}
// InvalidateLoginRequest shifts the flow state to FlowStateLoginUsed. This
// transition is executed upon login completion.
func (f *Flow) InvalidateLoginRequest() error {
if f.State != FlowStateLoginUnused && f.State != FlowStateLoginError {
return errors.Errorf("invalid flow state: expected %d or %d, got %d", FlowStateLoginUnused, FlowStateLoginError, f.State)
}
if f.LoginWasUsed {
return errors.New("login verifier has already been used")
}
f.LoginWasUsed = true
f.State = FlowStateLoginUsed
return nil
}
func (f *Flow) HandleConsentRequest(r *AcceptOAuth2ConsentRequest) error {
if time.Time(r.HandledAt).IsZero() {
return errors.New("refusing to handle a consent request with null HandledAt")
}
if f.ConsentWasHandled {
return x.ErrConflict.WithHint("The consent request was already used and can no longer be changed.")
}
if f.State != FlowStateConsentInitialized && f.State != FlowStateConsentUnused && f.State != FlowStateConsentError {
return errors.Errorf("invalid flow state: expected %d/%d/%d, got %d", FlowStateConsentInitialized, FlowStateConsentUnused, FlowStateConsentError, f.State)
}
if f.ConsentChallengeID.String() != r.ID {
return errors.Errorf("flow.ConsentChallengeID %s doesn't match AcceptOAuth2ConsentRequest.ID %s", f.ConsentChallengeID.String(), r.ID)
}
if r.Error != nil {
f.State = FlowStateConsentError
} else if r.WasHandled {
f.State = FlowStateConsentUsed
} else {
f.State = FlowStateConsentUnused
}
f.GrantedScope = r.GrantedScope
f.GrantedAudience = r.GrantedAudience
f.ConsentRemember = r.Remember
f.ConsentRememberFor = &r.RememberFor
f.ConsentHandledAt = r.HandledAt
f.ConsentWasHandled = r.WasHandled
f.ConsentError = r.Error
if r.Session != nil {
f.SessionIDToken = r.Session.IDToken
f.SessionAccessToken = r.Session.AccessToken
}
return nil
}
func (f *Flow) InvalidateConsentRequest() error {
if f.ConsentWasHandled {
return errors.New("consent verifier has already been used")
}
if f.State != FlowStateConsentUnused && f.State != FlowStateConsentError {
return errors.Errorf("unexpected flow state: expected %d or %d, got %d", FlowStateConsentUnused, FlowStateConsentError, f.State)
}
f.ConsentWasHandled = true
f.State = FlowStateConsentUsed
return nil
}
func (f *Flow) GetConsentRequest() *OAuth2ConsentRequest {
cs := OAuth2ConsentRequest{
ID: f.ConsentChallengeID.String(),
RequestedScope: f.RequestedScope,
RequestedAudience: f.RequestedAudience,
Skip: f.ConsentSkip,
Subject: f.Subject,
OpenIDConnectContext: f.OpenIDConnectContext,
Client: f.Client,
ClientID: f.ClientID,
RequestURL: f.RequestURL,
LoginChallenge: sqlxx.NullString(f.ID),
LoginSessionID: f.SessionID,
ACR: f.ACR,
AMR: f.AMR,
Context: f.Context,
WasHandled: f.ConsentWasHandled,
ForceSubjectIdentifier: f.ForceSubjectIdentifier,
Verifier: f.ConsentVerifier.String(),
CSRF: f.ConsentCSRF.String(),
AuthenticatedAt: f.LoginAuthenticatedAt,
RequestedAt: f.RequestedAt,
}
if cs.AMR == nil {
cs.AMR = []string{}
}
return &cs
}
func (f *Flow) GetHandledConsentRequest() *AcceptOAuth2ConsentRequest {
crf := 0
if f.ConsentRememberFor != nil {
crf = *f.ConsentRememberFor
}
return &AcceptOAuth2ConsentRequest{
ID: f.ConsentChallengeID.String(),
GrantedScope: f.GrantedScope,
GrantedAudience: f.GrantedAudience,
Session: &AcceptOAuth2ConsentRequestSession{AccessToken: f.SessionAccessToken, IDToken: f.SessionIDToken},
Remember: f.ConsentRemember,
RememberFor: crf,
HandledAt: f.ConsentHandledAt,
WasHandled: f.ConsentWasHandled,
ConsentRequest: f.GetConsentRequest(),
Error: f.ConsentError,
RequestedAt: f.RequestedAt,
AuthenticatedAt: f.LoginAuthenticatedAt,
SessionIDToken: f.SessionIDToken,
SessionAccessToken: f.SessionAccessToken,
}
}
func (Flow) TableName() string {
return "hydra_oauth2_flow"
}
func (f *Flow) BeforeSave(_ *pop.Connection) error {
if f.Client != nil {
f.ClientID = f.Client.GetID()
}
if f.State == FlowStateLoginUnused && string(f.Context) == "" {
f.Context = sqlxx.JSONRawMessage("{}")
}
return nil
}
func (f *Flow) AfterFind(c *pop.Connection) error {
// TODO Populate the client field in FindInDB and FindByConsentChallengeID in
// order to avoid accessing the database twice.
f.AfterSave(c)
f.Client = &client.Client{}
return sqlcon.HandleError(c.Where("id = ? AND nid = ?", f.ClientID, f.NID).First(f.Client))
}
func (f *Flow) AfterSave(_ *pop.Connection) {
if f.SessionAccessToken == nil {
f.SessionAccessToken = make(map[string]interface{})
}
if f.SessionIDToken == nil {
f.SessionIDToken = make(map[string]interface{})
}
}
type CipherProvider interface {
FlowCipher() *aead.XChaCha20Poly1305
}
// ToLoginChallenge converts the flow into a login challenge.
func (f *Flow) ToLoginChallenge(ctx context.Context, cipherProvider CipherProvider) (string, error) {
return flowctx.Encode(ctx, cipherProvider.FlowCipher(), f, flowctx.AsLoginChallenge)
}
// ToLoginVerifier converts the flow into a login verifier.
func (f *Flow) ToLoginVerifier(ctx context.Context, cipherProvider CipherProvider) (string, error) {
return flowctx.Encode(ctx, cipherProvider.FlowCipher(), f, flowctx.AsLoginVerifier)
}
// ToConsentChallenge converts the flow into a consent challenge.
func (f *Flow) ToConsentChallenge(ctx context.Context, cipherProvider CipherProvider) (string, error) {
return flowctx.Encode(ctx, cipherProvider.FlowCipher(), f, flowctx.AsConsentChallenge)
}
// ToConsentVerifier converts the flow into a consent verifier.
func (f *Flow) ToConsentVerifier(ctx context.Context, cipherProvider CipherProvider) (string, error) {
return flowctx.Encode(ctx, cipherProvider.FlowCipher(), f, flowctx.AsConsentVerifier)
} |
Go | hydra/flow/flow_test.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
package flow
import (
"testing"
"time"
"github.com/go-faker/faker/v4"
"github.com/mohae/deepcopy"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
"github.com/ory/x/sqlxx"
)
func (f *Flow) setLoginRequest(r *LoginRequest) {
f.ID = r.ID
f.RequestedScope = r.RequestedScope
f.RequestedAudience = r.RequestedAudience
f.LoginSkip = r.Skip
f.Subject = r.Subject
f.OpenIDConnectContext = r.OpenIDConnectContext
f.Client = r.Client
f.ClientID = r.ClientID
f.RequestURL = r.RequestURL
f.SessionID = r.SessionID
f.LoginWasUsed = r.WasHandled
f.ForceSubjectIdentifier = r.ForceSubjectIdentifier
f.LoginVerifier = r.Verifier
f.LoginCSRF = r.CSRF
f.LoginAuthenticatedAt = r.AuthenticatedAt
f.RequestedAt = r.RequestedAt
}
func (f *Flow) setHandledLoginRequest(r *HandledLoginRequest) {
f.ID = r.ID
f.LoginRemember = r.Remember
f.LoginRememberFor = r.RememberFor
f.LoginExtendSessionLifespan = r.ExtendSessionLifespan
f.ACR = r.ACR
f.AMR = r.AMR
f.Subject = r.Subject
f.IdentityProviderSessionID = sqlxx.NullString(r.IdentityProviderSessionID)
f.ForceSubjectIdentifier = r.ForceSubjectIdentifier
f.Context = r.Context
f.LoginWasUsed = r.WasHandled
f.LoginError = r.Error
f.RequestedAt = r.RequestedAt
f.LoginAuthenticatedAt = r.AuthenticatedAt
}
func (f *Flow) setConsentRequest(r OAuth2ConsentRequest) {
f.ConsentChallengeID = sqlxx.NullString(r.ID)
f.RequestedScope = r.RequestedScope
f.RequestedAudience = r.RequestedAudience
f.ConsentSkip = r.Skip
f.Subject = r.Subject
f.OpenIDConnectContext = r.OpenIDConnectContext
f.Client = r.Client
f.ClientID = r.ClientID
f.RequestURL = r.RequestURL
f.ID = r.LoginChallenge.String()
f.SessionID = r.LoginSessionID
f.ACR = r.ACR
f.AMR = r.AMR
f.Context = r.Context
f.ConsentWasHandled = r.WasHandled
f.ForceSubjectIdentifier = r.ForceSubjectIdentifier
f.ConsentVerifier = sqlxx.NullString(r.Verifier)
f.ConsentCSRF = sqlxx.NullString(r.CSRF)
f.LoginAuthenticatedAt = r.AuthenticatedAt
f.RequestedAt = r.RequestedAt
}
func (f *Flow) setHandledConsentRequest(r AcceptOAuth2ConsentRequest) {
f.ConsentChallengeID = sqlxx.NullString(r.ID)
f.GrantedScope = r.GrantedScope
f.GrantedAudience = r.GrantedAudience
f.ConsentRemember = r.Remember
f.ConsentRememberFor = &r.RememberFor
f.ConsentHandledAt = r.HandledAt
f.ConsentWasHandled = r.WasHandled
f.ConsentError = r.Error
f.RequestedAt = r.RequestedAt
f.LoginAuthenticatedAt = r.AuthenticatedAt
f.SessionIDToken = r.SessionIDToken
f.SessionAccessToken = r.SessionAccessToken
}
func TestFlow_GetLoginRequest(t *testing.T) {
t.Run("GetLoginRequest should set all fields on its return value", func(t *testing.T) {
f := Flow{}
expected := LoginRequest{}
assert.NoError(t, faker.FakeData(&expected))
f.setLoginRequest(&expected)
actual := f.GetLoginRequest()
assert.Equal(t, expected, *actual)
})
}
func TestFlow_GetHandledLoginRequest(t *testing.T) {
t.Run("GetHandledLoginRequest should set all fields on its return value", func(t *testing.T) {
f := Flow{}
expected := HandledLoginRequest{}
assert.NoError(t, faker.FakeData(&expected))
f.setHandledLoginRequest(&expected)
actual := f.GetHandledLoginRequest()
assert.NotNil(t, actual.LoginRequest)
expected.LoginRequest = nil
actual.LoginRequest = nil
assert.Equal(t, expected, actual)
})
}
func TestFlow_NewFlow(t *testing.T) {
t.Run("NewFlow and GetLoginRequest should use all LoginRequest fields", func(t *testing.T) {
expected := &LoginRequest{}
assert.NoError(t, faker.FakeData(expected))
actual := NewFlow(expected).GetLoginRequest()
assert.Equal(t, expected, actual)
})
}
func TestFlow_HandleLoginRequest(t *testing.T) {
t.Run(
"HandleLoginRequest should ignore RequestedAt in its argument and copy the other fields",
func(t *testing.T) {
f := Flow{}
assert.NoError(t, faker.FakeData(&f))
f.State = FlowStateLoginInitialized
r := HandledLoginRequest{}
assert.NoError(t, faker.FakeData(&r))
r.ID = f.ID
r.Subject = f.Subject
r.ForceSubjectIdentifier = f.ForceSubjectIdentifier
f.LoginWasUsed = false
assert.NoError(t, f.HandleLoginRequest(&r))
actual := f.GetHandledLoginRequest()
assert.NotEqual(t, r.RequestedAt, actual.RequestedAt)
r.LoginRequest = f.GetLoginRequest()
actual.RequestedAt = r.RequestedAt
assert.Equal(t, r, actual)
},
)
}
func TestFlow_InvalidateLoginRequest(t *testing.T) {
t.Run("InvalidateLoginRequest should transition the flow into FlowStateLoginUsed", func(t *testing.T) {
f := NewFlow(&LoginRequest{
ID: "t3-id",
Subject: "t3-sub",
WasHandled: false,
})
assert.NoError(t, f.HandleLoginRequest(&HandledLoginRequest{
ID: "t3-id",
Subject: "t3-sub",
WasHandled: false,
}))
assert.NoError(t, f.InvalidateLoginRequest())
assert.Equal(t, FlowStateLoginUsed, f.State)
assert.Equal(t, true, f.LoginWasUsed)
})
t.Run("InvalidateLoginRequest should fail when flow.LoginWasUsed is true", func(t *testing.T) {
f := NewFlow(&LoginRequest{
ID: "t3-id",
Subject: "t3-sub",
WasHandled: false,
})
assert.NoError(t, f.HandleLoginRequest(&HandledLoginRequest{
ID: "t3-id",
Subject: "t3-sub",
WasHandled: true,
}))
err := f.InvalidateLoginRequest()
assert.Error(t, err)
assert.Contains(t, err.Error(), "verifier has already been used")
})
}
func TestFlow_GetConsentRequest(t *testing.T) {
t.Run("GetConsentRequest should set all fields on its return value", func(t *testing.T) {
f := Flow{}
expected := OAuth2ConsentRequest{}
assert.NoError(t, faker.FakeData(&expected))
f.setConsentRequest(expected)
actual := f.GetConsentRequest()
assert.Equal(t, expected, *actual)
})
}
func TestFlow_HandleConsentRequest(t *testing.T) {
f := Flow{}
require.NoError(t, faker.FakeData(&f))
expected := AcceptOAuth2ConsentRequest{}
require.NoError(t, faker.FakeData(&expected))
expected.ID = string(f.ConsentChallengeID)
expected.HandledAt = sqlxx.NullTime(time.Now())
expected.RequestedAt = f.RequestedAt
expected.Session = &AcceptOAuth2ConsentRequestSession{
IDToken: sqlxx.MapStringInterface{"claim1": "value1", "claim2": "value2"},
AccessToken: sqlxx.MapStringInterface{"claim3": "value3", "claim4": "value4"},
}
expected.SessionIDToken = expected.Session.IDToken
expected.SessionAccessToken = expected.Session.AccessToken
f.State = FlowStateConsentInitialized
f.ConsentWasHandled = false
fGood := deepcopy.Copy(f).(Flow)
eGood := deepcopy.Copy(expected).(AcceptOAuth2ConsentRequest)
require.NoError(t, f.HandleConsentRequest(&expected))
t.Run("HandleConsentRequest should fail when already handled", func(t *testing.T) {
fBad := deepcopy.Copy(fGood).(Flow)
fBad.ConsentWasHandled = true
require.Error(t, fBad.HandleConsentRequest(&expected))
})
t.Run("HandleConsentRequest should fail when State is FlowStateLoginUsed", func(t *testing.T) {
fBad := deepcopy.Copy(fGood).(Flow)
fBad.State = FlowStateLoginUsed
require.Error(t, fBad.HandleConsentRequest(&expected))
})
t.Run("HandleConsentRequest should fail when HandledAt in its argument is zero", func(t *testing.T) {
f := deepcopy.Copy(fGood).(Flow)
eBad := deepcopy.Copy(eGood).(AcceptOAuth2ConsentRequest)
eBad.HandledAt = sqlxx.NullTime(time.Time{})
require.Error(t, f.HandleConsentRequest(&eBad))
})
require.NoError(t, fGood.HandleConsentRequest(&expected))
actual := f.GetHandledConsentRequest()
require.NotNil(t, actual.ConsentRequest)
expected.ConsentRequest = nil
actual.ConsentRequest = nil
require.Equal(t, &expected, actual)
}
func TestFlow_GetHandledConsentRequest(t *testing.T) {
t.Run("GetHandledConsentRequest should set all fields on its return value", func(t *testing.T) {
f := Flow{}
expected := AcceptOAuth2ConsentRequest{}
assert.NoError(t, faker.FakeData(&expected))
expected.ConsentRequest = nil
expected.Session = &AcceptOAuth2ConsentRequestSession{
IDToken: sqlxx.MapStringInterface{"claim1": "value1", "claim2": "value2"},
AccessToken: sqlxx.MapStringInterface{"claim3": "value3", "claim4": "value4"},
}
expected.SessionIDToken = expected.Session.IDToken
expected.SessionAccessToken = expected.Session.AccessToken
f.setHandledConsentRequest(expected)
actual := f.GetHandledConsentRequest()
assert.NotNil(t, actual.ConsentRequest)
actual.ConsentRequest = nil
assert.Equal(t, expected, *actual)
})
} |
Go | hydra/fositex/config.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
package fositex
import (
"context"
"crypto/sha512"
"hash"
"html/template"
"net/url"
"github.com/hashicorp/go-retryablehttp"
"github.com/ory/fosite"
"github.com/ory/fosite/compose"
"github.com/ory/fosite/i18n"
"github.com/ory/fosite/token/jwt"
"github.com/ory/hydra/v2/driver/config"
"github.com/ory/hydra/v2/oauth2"
"github.com/ory/hydra/v2/persistence"
"github.com/ory/hydra/v2/x"
"github.com/ory/x/urlx"
)
type configDependencies interface {
config.Provider
persistence.Provider
x.HTTPClientProvider
GetJWKSFetcherStrategy() fosite.JWKSFetcherStrategy
ClientHasher() fosite.Hasher
}
type factory func(config fosite.Configurator, storage interface{}, strategy interface{}) interface{}
type Config struct {
deps configDependencies
authorizeEndpointHandlers fosite.AuthorizeEndpointHandlers
tokenEndpointHandlers fosite.TokenEndpointHandlers
tokenIntrospectionHandlers fosite.TokenIntrospectionHandlers
revocationHandlers fosite.RevocationHandlers
*config.DefaultProvider
}
var defaultResponseModeHandler = fosite.NewDefaultResponseModeHandler()
var defaultFactories = []factory{
compose.OAuth2AuthorizeExplicitFactory,
compose.OAuth2AuthorizeImplicitFactory,
compose.OAuth2ClientCredentialsGrantFactory,
compose.OAuth2RefreshTokenGrantFactory,
compose.OpenIDConnectExplicitFactory,
compose.OpenIDConnectHybridFactory,
compose.OpenIDConnectImplicitFactory,
compose.OpenIDConnectRefreshFactory,
compose.OAuth2TokenRevocationFactory,
compose.OAuth2TokenIntrospectionFactory,
compose.OAuth2PKCEFactory,
compose.RFC7523AssertionGrantFactory,
compose.OIDCUserinfoVerifiableCredentialFactory,
}
func NewConfig(deps configDependencies) *Config {
c := &Config{
deps: deps,
DefaultProvider: deps.Config(),
}
return c
}
func (c *Config) LoadDefaultHandlers(strategy interface{}) {
for _, factory := range defaultFactories {
res := factory(c, c.deps.Persister(), strategy)
if ah, ok := res.(fosite.AuthorizeEndpointHandler); ok {
c.authorizeEndpointHandlers.Append(ah)
}
if th, ok := res.(fosite.TokenEndpointHandler); ok {
c.tokenEndpointHandlers.Append(th)
}
if tv, ok := res.(fosite.TokenIntrospector); ok {
c.tokenIntrospectionHandlers.Append(tv)
}
if rh, ok := res.(fosite.RevocationHandler); ok {
c.revocationHandlers.Append(rh)
}
}
}
func (c *Config) GetJWKSFetcherStrategy(ctx context.Context) fosite.JWKSFetcherStrategy {
return c.deps.GetJWKSFetcherStrategy()
}
func (c *Config) GetHTTPClient(ctx context.Context) *retryablehttp.Client {
return c.deps.HTTPClient(ctx)
}
func (c *Config) GetAuthorizeEndpointHandlers(ctx context.Context) fosite.AuthorizeEndpointHandlers {
return c.authorizeEndpointHandlers
}
func (c *Config) GetTokenEndpointHandlers(ctx context.Context) fosite.TokenEndpointHandlers {
return c.tokenEndpointHandlers
}
func (c *Config) GetTokenIntrospectionHandlers(ctx context.Context) (r fosite.TokenIntrospectionHandlers) {
return c.tokenIntrospectionHandlers
}
func (c *Config) GetRevocationHandlers(ctx context.Context) fosite.RevocationHandlers {
return c.revocationHandlers
}
func (c *Config) GetGrantTypeJWTBearerCanSkipClientAuth(ctx context.Context) bool {
return false
}
func (c *Config) GetAudienceStrategy(ctx context.Context) fosite.AudienceMatchingStrategy {
return fosite.DefaultAudienceMatchingStrategy
}
func (c *Config) GetOmitRedirectScopeParam(ctx context.Context) bool {
return false
}
func (c *Config) GetSanitationWhiteList(ctx context.Context) []string {
return []string{"code", "redirect_uri"}
}
func (c *Config) GetEnablePKCEPlainChallengeMethod(ctx context.Context) bool {
return false
}
func (c *Config) GetDisableRefreshTokenValidation(ctx context.Context) bool {
return false
}
func (c *Config) GetRefreshTokenScopes(ctx context.Context) []string {
return []string{"offline", "offline_access"}
}
func (c *Config) GetMinParameterEntropy(_ context.Context) int {
return fosite.MinParameterEntropy
}
func (c *Config) GetClientAuthenticationStrategy(ctx context.Context) fosite.ClientAuthenticationStrategy {
// Fosite falls back to the default fosite.Fosite.DefaultClientAuthenticationStrategy when this is nil.
return nil
}
func (c *Config) GetResponseModeHandlerExtension(ctx context.Context) fosite.ResponseModeHandler {
return defaultResponseModeHandler
}
func (c *Config) GetSendDebugMessagesToClients(ctx context.Context) bool {
return c.deps.Config().GetSendDebugMessagesToClients(ctx)
}
func (c *Config) GetMessageCatalog(ctx context.Context) i18n.MessageCatalog {
// Fosite falls back to the default messages when this is nil.
return nil
}
func (c *Config) GetSecretsHasher(ctx context.Context) fosite.Hasher {
return c.deps.ClientHasher()
}
func (c *Config) GetTokenEntropy(ctx context.Context) int {
return 32
}
func (c *Config) GetHMACHasher(ctx context.Context) func() hash.Hash {
return sha512.New512_256
}
func (c *Config) GetIDTokenIssuer(ctx context.Context) string {
return c.deps.Config().IssuerURL(ctx).String()
}
func (c *Config) GetAllowedPrompts(ctx context.Context) []string {
return []string{"login", "none", "consent"}
}
func (c *Config) GetRedirectSecureChecker(ctx context.Context) func(context.Context, *url.URL) bool {
return x.IsRedirectURISecure(c.deps.Config())
}
func (c *Config) GetAccessTokenIssuer(ctx context.Context) string {
return c.deps.Config().IssuerURL(ctx).String()
}
func (c *Config) GetJWTScopeField(ctx context.Context) jwt.JWTScopeFieldEnum {
return c.deps.Config().GetJWTScopeField(ctx)
}
func (c *Config) GetFormPostHTMLTemplate(ctx context.Context) *template.Template {
return fosite.DefaultFormPostTemplate
}
func (c *Config) GetTokenURL(ctx context.Context) string {
return urlx.AppendPaths(c.deps.Config().PublicURL(ctx), oauth2.TokenPath).String()
} |
Go | hydra/fositex/token_strategy.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
package fositex
import (
"context"
"strings"
"github.com/ory/fosite"
foauth2 "github.com/ory/fosite/handler/oauth2"
"github.com/ory/hydra/v2/client"
"github.com/ory/hydra/v2/driver/config"
)
var _ foauth2.CoreStrategy = (*TokenStrategy)(nil)
// TokenStrategy uses the correct token strategy (jwt, opaque) depending on the configuration.
type TokenStrategy struct {
c *config.DefaultProvider
hmac *foauth2.HMACSHAStrategy
jwt *foauth2.DefaultJWTStrategy
}
// NewTokenStrategy returns a new TokenStrategy.
func NewTokenStrategy(c *config.DefaultProvider, hmac *foauth2.HMACSHAStrategy, jwt *foauth2.DefaultJWTStrategy) *TokenStrategy {
return &TokenStrategy{c: c, hmac: hmac, jwt: jwt}
}
// gs returns the configured strategy.
func (t TokenStrategy) gs(ctx context.Context, additionalSources ...config.AccessTokenStrategySource) foauth2.CoreStrategy {
switch ats := t.c.AccessTokenStrategy(ctx, additionalSources...); ats {
case config.AccessTokenJWTStrategy:
return t.jwt
}
return t.hmac
}
func (t TokenStrategy) AccessTokenSignature(_ context.Context, token string) string {
return genericSignature(token)
}
func (t TokenStrategy) GenerateAccessToken(ctx context.Context, requester fosite.Requester) (token string, signature string, err error) {
return t.gs(ctx, withRequester(requester)).GenerateAccessToken(ctx, requester)
}
func (t TokenStrategy) ValidateAccessToken(ctx context.Context, requester fosite.Requester, token string) (err error) {
return t.gs(ctx, withRequester(requester)).ValidateAccessToken(ctx, requester, token)
}
func (t TokenStrategy) RefreshTokenSignature(ctx context.Context, token string) string {
return t.gs(ctx).RefreshTokenSignature(ctx, token)
}
func (t TokenStrategy) GenerateRefreshToken(ctx context.Context, requester fosite.Requester) (token string, signature string, err error) {
return t.gs(ctx, withRequester(requester)).GenerateRefreshToken(ctx, requester)
}
func (t TokenStrategy) ValidateRefreshToken(ctx context.Context, requester fosite.Requester, token string) (err error) {
return t.gs(ctx, withRequester(requester)).ValidateRefreshToken(ctx, requester, token)
}
func (t TokenStrategy) AuthorizeCodeSignature(ctx context.Context, token string) string {
return t.gs(ctx).AuthorizeCodeSignature(ctx, token)
}
func (t TokenStrategy) GenerateAuthorizeCode(ctx context.Context, requester fosite.Requester) (token string, signature string, err error) {
return t.gs(ctx, withRequester(requester)).GenerateAuthorizeCode(ctx, requester)
}
func (t TokenStrategy) ValidateAuthorizeCode(ctx context.Context, requester fosite.Requester, token string) (err error) {
return t.gs(ctx, withRequester(requester)).ValidateAuthorizeCode(ctx, requester, token)
}
func withRequester(requester fosite.Requester) config.AccessTokenStrategySource {
return client.AccessTokenStrategySource(requester.GetClient())
}
func genericSignature(token string) string {
switch parts := strings.Split(token, "."); len(parts) {
case 2:
return parts[1]
case 3:
return parts[2]
default:
return ""
}
} |
Go | hydra/fositex/token_strategy_test.go | // Copyright © 2023 Ory Corp
// SPDX-License-Identifier: Apache-2.0
package fositex
import (
"context"
"testing"
"github.com/stretchr/testify/assert"
"github.com/ory/fosite/handler/oauth2"
)
// Test that the generic signature function implements the same signature as the
// HMAC and JWT strategies.
func TestAccessTokenSignature(t *testing.T) {
ctx := context.Background()
t.Run("strategy=DefaultJWTStrategy", func(t *testing.T) {
strategy := new(oauth2.DefaultJWTStrategy)
for _, tc := range []struct{ token string }{
{""},
{"foo"},
// tokens with two parts will be handled by the HMAC strategy
{"foo.bar.baz"},
{"foo.bar.baz.qux"},
} {
t.Run("case="+tc.token, func(t *testing.T) {
assert.Equal(t,
strategy.AccessTokenSignature(ctx, tc.token),
genericSignature(tc.token))
})
}
})
t.Run("strategy=HMACStrategy", func(t *testing.T) {
strategy := new(oauth2.HMACSHAStrategy)
for _, tc := range []struct{ token string }{
{""},
{"foo"},
{"foo.bar"},
// tokens with three parts will be handled by the JWT strategy
{"foo.bar.baz.qux"},
} {
t.Run("case="+tc.token, func(t *testing.T) {
assert.Equal(t,
strategy.AccessTokenSignature(ctx, tc.token),
genericSignature(tc.token))
})
}
})
} |
Go | hydra/health/doc.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
package health
// Alive returns an ok status if the instance is ready to handle HTTP requests.
//
// swagger:route GET /health/alive public isInstanceAlive
//
// # Check Alive Status
//
// This endpoint returns a 200 status code when the HTTP server is up running.
// This status does currently not include checks whether the database connection is working.
//
// If the service supports TLS Edge Termination, this endpoint does not require the
// `X-Forwarded-Proto` header to be set.
//
// Be aware that if you are running multiple nodes of this service, the health status will never
// refer to the cluster state, only to a single instance.
//
// Produces:
// - application/json
//
// Responses:
// 200: healthStatus
// 500: errorOAuth2
//
//lint:ignore U1000 Used to generate Swagger and OpenAPI definitions
func swaggerPublicIsInstanceAlive() {}
// Alive returns an ok status if the instance is ready to handle HTTP requests.
//
// swagger:route GET /health/alive admin isInstanceAlive
//
// # Check Alive Status
//
// This endpoint returns a 200 status code when the HTTP server is up running.
// This status does currently not include checks whether the database connection is working.
//
// If the service supports TLS Edge Termination, this endpoint does not require the
// `X-Forwarded-Proto` header to be set.
//
// Be aware that if you are running multiple nodes of this service, the health status will never
// refer to the cluster state, only to a single instance.
//
// Produces:
// - application/json
//
// Responses:
// 200: healthStatus
// 500: errorOAuth2
//
//lint:ignore U1000 Used to generate Swagger and OpenAPI definitions
func swaggerAdminIsInstanceAlive() {}
// Ready returns an ok status if the instance is ready to handle HTTP requests and all ReadyCheckers are ok.
//
// swagger:route GET /health/ready health isInstanceReady
//
// # Check Readiness Status
//
// This endpoint returns a 200 status code when the HTTP server is up running and the environment dependencies (e.g.
// the database) are responsive as well.
//
// If the service supports TLS Edge Termination, this endpoint does not require the
// `X-Forwarded-Proto` header to be set.
//
// Be aware that if you are running multiple nodes of this service, the health status will never
// refer to the cluster state, only to a single instance.
//
// Produces:
// - application/json
//
// Responses:
// 200: healthStatus
// 503: healthNotReadyStatus
//
//lint:ignore U1000 Used to generate Swagger and OpenAPI definitions
func swaggerAdminIsInstanceReady() {}
// Ready returns an ok status if the instance is ready to handle HTTP requests and all ReadyCheckers are ok.
//
// swagger:route GET /health/ready public isInstanceReady
//
// # Check Readiness Status
//
// This endpoint returns a 200 status code when the HTTP server is up running and the environment dependencies (e.g.
// the database) are responsive as well.
//
// If the service supports TLS Edge Termination, this endpoint does not require the
// `X-Forwarded-Proto` header to be set.
//
// Be aware that if you are running multiple nodes of this service, the health status will never
// refer to the cluster state, only to a single instance.
//
// Produces:
// - application/json
//
// Responses:
// 200: healthStatus
// 503: healthNotReadyStatus
//
//lint:ignore U1000 Used to generate Swagger and OpenAPI definitions
func swaggerPublicIsInstanceReady() {}
// Version returns this service's versions.
//
// swagger:route GET /version admin getVersion
//
// # Get Service Version
//
// This endpoint returns the service version typically notated using semantic versioning.
//
// If the service supports TLS Edge Termination, this endpoint does not require the
// `X-Forwarded-Proto` header to be set.
//
// Produces:
// - application/json
//
// Responses:
// 200: version
//
//lint:ignore U1000 Used to generate Swagger and OpenAPI definitions
func swaggerGetVersion() {} |
Go | hydra/health/handler_test.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
package health
import (
"context"
"net/http"
"net/http/httptest"
"testing"
"github.com/stretchr/testify/assert"
"github.com/ory/x/contextx"
"github.com/stretchr/testify/require"
"github.com/ory/hydra/v2/driver/config"
"github.com/ory/hydra/v2/internal"
"github.com/ory/hydra/v2/x"
"github.com/ory/x/healthx"
)
func TestPublicHealthHandler(t *testing.T) {
ctx := context.Background()
doCORSRequest := func(t *testing.T, endpoint string) *http.Response {
req, err := http.NewRequest(http.MethodGet, endpoint, nil)
require.NoError(t, err)
req.Host = "example.com"
req.Header.Add("Origin", "https://example.com")
resp, err := http.DefaultClient.Do(req)
require.NoError(t, err)
return resp
}
expectCORSHeaders := func(t *testing.T, resp *http.Response) {
assert.Equal(t, http.StatusOK, resp.StatusCode)
assert.Equal(t, "Origin", resp.Header.Get("Vary"))
assert.Equal(t, "https://example.com", resp.Header.Get("Access-Control-Allow-Origin"))
assert.Equal(t, "true", resp.Header.Get("Access-Control-Allow-Credentials"))
}
expectNoCORSHeaders := func(t *testing.T, resp *http.Response) {
assert.Equal(t, http.StatusOK, resp.StatusCode)
assert.NotEqual(t, "Origin", resp.Header.Get("Vary"))
assert.Equal(t, "", resp.Header.Get("Access-Control-Allow-Origin"))
}
for _, tc := range []struct {
name string
config map[string]interface{}
verifyResponse func(t *testing.T, resp *http.Response)
}{
{
name: "with CORS enabled",
config: map[string]interface{}{
"cors.allowed_origins": []string{"https://example.com"},
"cors.enabled": true,
"cors.allowed_methods": []string{"GET"},
"cors.allow_credentials": true,
},
verifyResponse: expectCORSHeaders,
},
{
name: "with CORS disabled",
config: map[string]interface{}{
"cors.enabled": false,
},
verifyResponse: expectNoCORSHeaders,
},
} {
t.Run(tc.name, func(t *testing.T) {
conf := internal.NewConfigurationWithDefaults()
for k, v := range tc.config {
conf.MustSet(ctx, config.PublicInterface.Key(k), v)
}
reg := internal.NewRegistryMemory(t, conf, &contextx.Default{})
public := x.NewRouterPublic()
reg.RegisterRoutes(ctx, x.NewRouterAdmin(conf.AdminURL), public)
ts := httptest.NewServer(public)
tc.verifyResponse(t, doCORSRequest(t, ts.URL+healthx.AliveCheckPath))
tc.verifyResponse(t, doCORSRequest(t, ts.URL+healthx.ReadyCheckPath))
})
}
} |
Go | hydra/hsm/crypto11_mock_test.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
//go:build hsm
// +build hsm
// Code generated by MockGen. DO NOT EDIT.
// Source: github.com/ThalesIgnite/crypto11 (interfaces: SignerDecrypter)
// Package hsm_test is a generated GoMock package.
package hsm_test
import (
crypto "crypto"
io "io"
reflect "reflect"
gomock "github.com/golang/mock/gomock"
)
// MockSignerDecrypter is a mock of SignerDecrypter interface.
type MockSignerDecrypter struct {
ctrl *gomock.Controller
recorder *MockSignerDecrypterMockRecorder
}
// MockSignerDecrypterMockRecorder is the mock recorder for MockSignerDecrypter.
type MockSignerDecrypterMockRecorder struct {
mock *MockSignerDecrypter
}
// NewMockSignerDecrypter creates a new mock instance.
func NewMockSignerDecrypter(ctrl *gomock.Controller) *MockSignerDecrypter {
mock := &MockSignerDecrypter{ctrl: ctrl}
mock.recorder = &MockSignerDecrypterMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockSignerDecrypter) EXPECT() *MockSignerDecrypterMockRecorder {
return m.recorder
}
// Decrypt mocks base method.
func (m *MockSignerDecrypter) Decrypt(arg0 io.Reader, arg1 []byte, arg2 crypto.DecrypterOpts) ([]byte, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Decrypt", arg0, arg1, arg2)
ret0, _ := ret[0].([]byte)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Decrypt indicates an expected call of Decrypt.
func (mr *MockSignerDecrypterMockRecorder) Decrypt(arg0, arg1, arg2 interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Decrypt", reflect.TypeOf((*MockSignerDecrypter)(nil).Decrypt), arg0, arg1, arg2)
}
// Delete mocks base method.
func (m *MockSignerDecrypter) Delete() error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Delete")
ret0, _ := ret[0].(error)
return ret0
}
// Delete indicates an expected call of Delete.
func (mr *MockSignerDecrypterMockRecorder) Delete() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Delete", reflect.TypeOf((*MockSignerDecrypter)(nil).Delete))
}
// Public mocks base method.
func (m *MockSignerDecrypter) Public() crypto.PublicKey {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Public")
ret0, _ := ret[0].(crypto.PublicKey)
return ret0
}
// Public indicates an expected call of Public.
func (mr *MockSignerDecrypterMockRecorder) Public() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Public", reflect.TypeOf((*MockSignerDecrypter)(nil).Public))
}
// Sign mocks base method.
func (m *MockSignerDecrypter) Sign(arg0 io.Reader, arg1 []byte, arg2 crypto.SignerOpts) ([]byte, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Sign", arg0, arg1, arg2)
ret0, _ := ret[0].([]byte)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Sign indicates an expected call of Sign.
func (mr *MockSignerDecrypterMockRecorder) Sign(arg0, arg1, arg2 interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Sign", reflect.TypeOf((*MockSignerDecrypter)(nil).Sign), arg0, arg1, arg2)
} |
Go | hydra/hsm/hsm.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
//go:build hsm
// +build hsm
package hsm
import (
"crypto/elliptic"
"github.com/ThalesIgnite/crypto11"
"github.com/ory/hydra/v2/driver/config"
"github.com/ory/x/logrusx"
)
type Context interface {
GenerateRSAKeyPairWithAttributes(public, private crypto11.AttributeSet, bits int) (crypto11.SignerDecrypter, error)
GenerateECDSAKeyPairWithAttributes(public, private crypto11.AttributeSet, curve elliptic.Curve) (crypto11.Signer, error)
FindKeyPair(id []byte, label []byte) (crypto11.Signer, error)
FindKeyPairs(id []byte, label []byte) (signer []crypto11.Signer, err error)
GetAttribute(key interface{}, attribute crypto11.AttributeType) (a *crypto11.Attribute, err error)
}
func NewContext(c *config.DefaultProvider, l *logrusx.Logger) Context {
config11 := &crypto11.Config{
Path: c.HSMLibraryPath(),
Pin: c.HSMPin(),
}
if c.HSMTokenLabel() != "" {
config11.TokenLabel = c.HSMTokenLabel()
} else {
config11.SlotNumber = c.HSMSlotNumber()
}
ctx11, err := crypto11.Configure(config11)
if err != nil {
l.WithError(err).Fatalf("Unable to configure Hardware Security Module. Library path: %s, slot: %v, token label: %s",
c.HSMLibraryPath(), *c.HSMSlotNumber(), c.HSMTokenLabel())
} else {
l.Info("Hardware Security Module is configured.")
}
var hsmContext Context = ctx11
return hsmContext
} |
Go | hydra/hsm/hsm_mock_test.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
//go:build hsm
// +build hsm
// Code generated by MockGen. DO NOT EDIT.
// Source: hsm/hsm.go
// Package hsm_test is a generated GoMock package.
package hsm_test
import (
elliptic "crypto/elliptic"
reflect "reflect"
crypto11 "github.com/ThalesIgnite/crypto11"
gomock "github.com/golang/mock/gomock"
)
// MockContext is a mock of Context interface.
type MockContext struct {
ctrl *gomock.Controller
recorder *MockContextMockRecorder
}
// MockContextMockRecorder is the mock recorder for MockContext.
type MockContextMockRecorder struct {
mock *MockContext
}
// NewMockContext creates a new mock instance.
func NewMockContext(ctrl *gomock.Controller) *MockContext {
mock := &MockContext{ctrl: ctrl}
mock.recorder = &MockContextMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockContext) EXPECT() *MockContextMockRecorder {
return m.recorder
}
// FindKeyPair mocks base method.
func (m *MockContext) FindKeyPair(id, label []byte) (crypto11.Signer, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "FindKeyPair", id, label)
ret0, _ := ret[0].(crypto11.Signer)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// FindKeyPair indicates an expected call of FindKeyPair.
func (mr *MockContextMockRecorder) FindKeyPair(id, label interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "FindKeyPair", reflect.TypeOf((*MockContext)(nil).FindKeyPair), id, label)
}
// FindKeyPairs mocks base method.
func (m *MockContext) FindKeyPairs(id, label []byte) ([]crypto11.Signer, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "FindKeyPairs", id, label)
ret0, _ := ret[0].([]crypto11.Signer)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// FindKeyPairs indicates an expected call of FindKeyPairs.
func (mr *MockContextMockRecorder) FindKeyPairs(id, label interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "FindKeyPairs", reflect.TypeOf((*MockContext)(nil).FindKeyPairs), id, label)
}
// GenerateECDSAKeyPairWithAttributes mocks base method.
func (m *MockContext) GenerateECDSAKeyPairWithAttributes(public, private crypto11.AttributeSet, curve elliptic.Curve) (crypto11.Signer, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GenerateECDSAKeyPairWithAttributes", public, private, curve)
ret0, _ := ret[0].(crypto11.Signer)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GenerateECDSAKeyPairWithAttributes indicates an expected call of GenerateECDSAKeyPairWithAttributes.
func (mr *MockContextMockRecorder) GenerateECDSAKeyPairWithAttributes(public, private, curve interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GenerateECDSAKeyPairWithAttributes", reflect.TypeOf((*MockContext)(nil).GenerateECDSAKeyPairWithAttributes), public, private, curve)
}
// GenerateRSAKeyPairWithAttributes mocks base method.
func (m *MockContext) GenerateRSAKeyPairWithAttributes(public, private crypto11.AttributeSet, bits int) (crypto11.SignerDecrypter, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GenerateRSAKeyPairWithAttributes", public, private, bits)
ret0, _ := ret[0].(crypto11.SignerDecrypter)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GenerateRSAKeyPairWithAttributes indicates an expected call of GenerateRSAKeyPairWithAttributes.
func (mr *MockContextMockRecorder) GenerateRSAKeyPairWithAttributes(public, private, bits interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GenerateRSAKeyPairWithAttributes", reflect.TypeOf((*MockContext)(nil).GenerateRSAKeyPairWithAttributes), public, private, bits)
}
// GetAttribute mocks base method.
func (m *MockContext) GetAttribute(key interface{}, attribute crypto11.AttributeType) (*crypto11.Attribute, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GetAttribute", key, attribute)
ret0, _ := ret[0].(*crypto11.Attribute)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GetAttribute indicates an expected call of GetAttribute.
func (mr *MockContextMockRecorder) GetAttribute(key, attribute interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetAttribute", reflect.TypeOf((*MockContext)(nil).GetAttribute), key, attribute)
} |
Go | hydra/hsm/manager_hsm.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
//go:build hsm
// +build hsm
package hsm
import (
"context"
"crypto/ecdsa"
"crypto/elliptic"
"crypto/rsa"
"crypto/x509"
"fmt"
"net/http"
"sync"
"github.com/ory/hydra/v2/driver/config"
"github.com/ory/x/otelx"
"github.com/pkg/errors"
"github.com/pborman/uuid"
"github.com/ory/fosite"
"github.com/ory/hydra/v2/jwk"
"github.com/miekg/pkcs11"
"github.com/ory/hydra/v2/x"
"github.com/ThalesIgnite/crypto11"
"github.com/go-jose/go-jose/v3"
"github.com/go-jose/go-jose/v3/cryptosigner"
"go.opentelemetry.io/otel"
)
const tracingComponent = "github.com/ory/hydra/hsm"
type KeyManager struct {
jwk.Manager
sync.RWMutex
Context
c config.DefaultProvider
}
var ErrPreGeneratedKeys = &fosite.RFC6749Error{
CodeField: http.StatusBadRequest,
ErrorField: http.StatusText(http.StatusBadRequest),
DescriptionField: "Cannot add/update pre generated keys on Hardware Security Module",
}
func NewKeyManager(hsm Context, config *config.DefaultProvider) *KeyManager {
return &KeyManager{
Context: hsm,
c: *config,
}
}
func (m *KeyManager) GenerateAndPersistKeySet(ctx context.Context, set, kid, alg, use string) (*jose.JSONWebKeySet, error) {
ctx, span := otel.GetTracerProvider().Tracer(tracingComponent).Start(ctx, "hsm.GenerateAndPersistKeySet")
defer span.End()
attrs := map[string]string{
"set": set,
"kid": kid,
"alg": alg,
"use": use,
}
span.SetAttributes(otelx.StringAttrs(attrs)...)
m.Lock()
defer m.Unlock()
set = m.prefixKeySet(set)
err := m.deleteExistingKeySet(set)
if err != nil {
return nil, err
}
if len(kid) == 0 {
kid = uuid.New()
}
privateAttrSet, publicAttrSet, err := getKeyPairAttributes(kid, set, use)
if err != nil {
return nil, err
}
switch {
case alg == "RS256":
key, err := m.GenerateRSAKeyPairWithAttributes(publicAttrSet, privateAttrSet, 4096)
if err != nil {
return nil, err
}
return createKeySet(key, kid, alg, use)
case alg == "ES256":
key, err := m.GenerateECDSAKeyPairWithAttributes(publicAttrSet, privateAttrSet, elliptic.P256())
if err != nil {
return nil, err
}
return createKeySet(key, kid, alg, use)
case alg == "ES512":
key, err := m.GenerateECDSAKeyPairWithAttributes(publicAttrSet, privateAttrSet, elliptic.P521())
if err != nil {
return nil, err
}
return createKeySet(key, kid, alg, use)
// NOTE:
// - HS256, HS512 not supported. Makes sense only if shared HSM is used between Hydra and authenticating client.
// - EdDSA not supported. As of now PKCS#11 v2.4 doesn't support EdDSA keys using curve Ed25519. However,
// PKCS#11 3.0 (https://docs.oasis-open.org/pkcs11/pkcs11-curr/v3.0/pkcs11-curr-v3.0.html)
// contains support for EdDSA.
default:
return nil, errors.WithStack(jwk.ErrUnsupportedKeyAlgorithm)
}
}
func (m *KeyManager) GetKey(ctx context.Context, set, kid string) (*jose.JSONWebKeySet, error) {
ctx, span := otel.GetTracerProvider().Tracer(tracingComponent).Start(ctx, "hsm.GetKey")
defer span.End()
attrs := map[string]string{
"set": set,
"kid": kid,
}
span.SetAttributes(otelx.StringAttrs(attrs)...)
m.RLock()
defer m.RUnlock()
set = m.prefixKeySet(set)
keyPair, err := m.FindKeyPair([]byte(kid), []byte(set))
if err != nil {
return nil, err
}
if keyPair == nil {
return nil, errors.WithStack(x.ErrNotFound)
}
id, alg, use, err := m.getKeySetAttributes(ctx, keyPair, []byte(kid))
if err != nil {
return nil, err
}
return createKeySet(keyPair, id, alg, use)
}
func (m *KeyManager) GetKeySet(ctx context.Context, set string) (*jose.JSONWebKeySet, error) {
ctx, span := otel.GetTracerProvider().Tracer(tracingComponent).Start(ctx, "hsm.GetKeySet")
defer span.End()
attrs := map[string]string{
"set": set,
}
span.SetAttributes(otelx.StringAttrs(attrs)...)
m.RLock()
defer m.RUnlock()
set = m.prefixKeySet(set)
keyPairs, err := m.FindKeyPairs(nil, []byte(set))
if err != nil {
return nil, err
}
if keyPairs == nil {
return nil, errors.WithStack(x.ErrNotFound)
}
var keys []jose.JSONWebKey
for _, keyPair := range keyPairs {
kid, alg, use, err := m.getKeySetAttributes(ctx, keyPair, nil)
if err != nil {
return nil, err
}
keys = append(keys, createKeys(keyPair, kid, alg, use)...)
}
return &jose.JSONWebKeySet{
Keys: keys,
}, nil
}
func (m *KeyManager) DeleteKey(ctx context.Context, set, kid string) error {
ctx, span := otel.GetTracerProvider().Tracer(tracingComponent).Start(ctx, "hsm.DeleteKey")
defer span.End()
attrs := map[string]string{
"set": set,
"kid": kid,
}
span.SetAttributes(otelx.StringAttrs(attrs)...)
m.Lock()
defer m.Unlock()
set = m.prefixKeySet(set)
keyPair, err := m.FindKeyPair([]byte(kid), []byte(set))
if err != nil {
return err
}
if keyPair != nil {
err = keyPair.Delete()
if err != nil {
return err
}
} else {
return errors.WithStack(x.ErrNotFound)
}
return nil
}
func (m *KeyManager) DeleteKeySet(ctx context.Context, set string) error {
ctx, span := otel.GetTracerProvider().Tracer(tracingComponent).Start(ctx, "hsm.DeleteKeySet")
defer span.End()
attrs := map[string]string{
"set": set,
}
span.SetAttributes(otelx.StringAttrs(attrs)...)
m.Lock()
defer m.Unlock()
set = m.prefixKeySet(set)
keyPairs, err := m.FindKeyPairs(nil, []byte(set))
if err != nil {
return err
}
if keyPairs == nil {
return errors.WithStack(x.ErrNotFound)
}
for _, keyPair := range keyPairs {
err = keyPair.Delete()
if err != nil {
return err
}
}
return nil
}
func (m *KeyManager) AddKey(_ context.Context, _ string, _ *jose.JSONWebKey) error {
return errors.WithStack(ErrPreGeneratedKeys)
}
func (m *KeyManager) AddKeySet(_ context.Context, _ string, _ *jose.JSONWebKeySet) error {
return errors.WithStack(ErrPreGeneratedKeys)
}
func (m *KeyManager) UpdateKey(_ context.Context, _ string, _ *jose.JSONWebKey) error {
return errors.WithStack(ErrPreGeneratedKeys)
}
func (m *KeyManager) UpdateKeySet(_ context.Context, _ string, _ *jose.JSONWebKeySet) error {
return errors.WithStack(ErrPreGeneratedKeys)
}
func (m *KeyManager) getKeySetAttributes(ctx context.Context, key crypto11.Signer, kid []byte) (string, string, string, error) {
if kid == nil {
ckaId, err := m.GetAttribute(key, crypto11.CkaId)
if err != nil {
return "", "", "", err
}
kid = ckaId.Value
}
var alg string
switch k := key.Public().(type) {
case *rsa.PublicKey:
alg = "RS256"
if k.N.BitLen() < 4096 && !m.c.IsDevelopmentMode(ctx) {
return "", "", "", errors.WithStack(jwk.ErrMinimalRsaKeyLength)
}
case *ecdsa.PublicKey:
if k.Curve == elliptic.P521() {
alg = "ES512"
} else if k.Curve == elliptic.P256() {
alg = "ES256"
} else {
return "", "", "", errors.WithStack(jwk.ErrUnsupportedEllipticCurve)
}
default:
return "", "", "", errors.WithStack(jwk.ErrUnsupportedKeyAlgorithm)
}
use := "sig"
ckaDecrypt, _ := m.GetAttribute(key, crypto11.CkaDecrypt)
if ckaDecrypt != nil && len(ckaDecrypt.Value) != 0 && ckaDecrypt.Value[0] == 0x1 {
use = "enc"
}
return string(kid), alg, use, nil
}
func getKeyPairAttributes(kid string, set string, use string) (crypto11.AttributeSet, crypto11.AttributeSet, error) {
privateAttrSet, err := crypto11.NewAttributeSetWithIDAndLabel([]byte(kid), []byte(set))
if err != nil {
return nil, nil, err
}
publicAttrSet, err := crypto11.NewAttributeSetWithIDAndLabel([]byte(kid), []byte(set))
if err != nil {
return nil, nil, err
}
if len(use) == 0 || use == "sig" {
publicAttrSet.AddIfNotPresent([]*pkcs11.Attribute{
pkcs11.NewAttribute(pkcs11.CKA_VERIFY, true),
pkcs11.NewAttribute(pkcs11.CKA_ENCRYPT, false),
})
privateAttrSet.AddIfNotPresent([]*pkcs11.Attribute{
pkcs11.NewAttribute(pkcs11.CKA_SIGN, true),
pkcs11.NewAttribute(pkcs11.CKA_DECRYPT, false),
})
} else {
publicAttrSet.AddIfNotPresent([]*pkcs11.Attribute{
pkcs11.NewAttribute(pkcs11.CKA_VERIFY, false),
pkcs11.NewAttribute(pkcs11.CKA_ENCRYPT, true),
})
privateAttrSet.AddIfNotPresent([]*pkcs11.Attribute{
pkcs11.NewAttribute(pkcs11.CKA_SIGN, false),
pkcs11.NewAttribute(pkcs11.CKA_DECRYPT, true),
})
}
return privateAttrSet, publicAttrSet, nil
}
func (m *KeyManager) deleteExistingKeySet(set string) error {
existingKeyPairs, err := m.FindKeyPairs(nil, []byte(set))
if err != nil {
return err
}
if len(existingKeyPairs) != 0 {
for _, keyPair := range existingKeyPairs {
_ = keyPair.Delete()
}
}
return nil
}
func createKeySet(key crypto11.Signer, kid, alg, use string) (*jose.JSONWebKeySet, error) {
return &jose.JSONWebKeySet{
Keys: createKeys(key, kid, alg, use),
}, nil
}
func createKeys(key crypto11.Signer, kid, alg, use string) []jose.JSONWebKey {
return []jose.JSONWebKey{{
Algorithm: alg,
Use: use,
Key: cryptosigner.Opaque(key),
KeyID: kid,
Certificates: []*x509.Certificate{},
CertificateThumbprintSHA1: []uint8{},
CertificateThumbprintSHA256: []uint8{},
}}
}
func (m *KeyManager) prefixKeySet(set string) string {
return fmt.Sprintf("%s%s", m.c.HSMKeySetPrefix(), set)
} |
Go | hydra/hsm/manager_hsm_test.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
//go:build hsm
// +build hsm
package hsm_test
import (
"context"
"crypto/ecdsa"
"crypto/elliptic"
"crypto/rand"
"crypto/rsa"
"crypto/x509"
"fmt"
"reflect"
"testing"
"github.com/ory/hydra/v2/jwk"
"github.com/ory/x/contextx"
"github.com/ory/hydra/v2/driver"
"github.com/ory/hydra/v2/driver/config"
"github.com/ory/hydra/v2/persistence/sql"
"github.com/ory/x/configx"
"github.com/ory/x/logrusx"
"github.com/ThalesIgnite/crypto11"
"github.com/go-jose/go-jose/v3"
"github.com/go-jose/go-jose/v3/cryptosigner"
"github.com/golang/mock/gomock"
"github.com/miekg/pkcs11"
"github.com/pborman/uuid"
"github.com/pkg/errors"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
"github.com/ory/hydra/v2/hsm"
"github.com/ory/hydra/v2/x"
)
func TestDefaultKeyManager_HSMEnabled(t *testing.T) {
ctrl := gomock.NewController(t)
mockHsmContext := NewMockContext(ctrl)
defer ctrl.Finish()
l := logrusx.New("", "")
c := config.MustNew(context.Background(), l, configx.SkipValidation())
c.MustSet(context.Background(), config.KeyDSN, "memory")
c.MustSet(context.Background(), config.HSMEnabled, "true")
reg := driver.NewRegistrySQL()
reg.WithLogger(l)
reg.WithConfig(c)
reg.WithHsmContext(mockHsmContext)
err := reg.Init(context.Background(), false, true, &contextx.TestContextualizer{}, nil, nil)
assert.NoError(t, err)
assert.IsType(t, &jwk.ManagerStrategy{}, reg.KeyManager())
assert.IsType(t, &sql.Persister{}, reg.SoftwareKeyManager())
}
func TestKeyManager_HsmKeySetPrefix(t *testing.T) {
ctrl := gomock.NewController(t)
hsmContext := NewMockContext(ctrl)
defer ctrl.Finish()
l := logrusx.New("", "")
c := config.MustNew(context.Background(), l, configx.SkipValidation())
keySetPrefix := "application_specific_prefix."
c.MustSet(context.Background(), config.HSMKeySetPrefix, keySetPrefix)
m := hsm.NewKeyManager(hsmContext, c)
rsaKey3072, err := rsa.GenerateKey(rand.Reader, 3072)
require.NoError(t, err)
rsaKey4096, err := rsa.GenerateKey(rand.Reader, 4096)
require.NoError(t, err)
ecdsaKey, err := ecdsa.GenerateKey(elliptic.P521(), rand.Reader)
require.NoError(t, err)
rsaKeyPair3072 := NewMockSignerDecrypter(ctrl)
rsaKeyPair3072.EXPECT().Public().Return(&rsaKey3072.PublicKey).AnyTimes()
rsaKeyPair4096 := NewMockSignerDecrypter(ctrl)
rsaKeyPair4096.EXPECT().Public().Return(&rsaKey4096.PublicKey).AnyTimes()
ecdsaKeyPair := NewMockSignerDecrypter(ctrl)
ecdsaKeyPair.EXPECT().Public().Return(&ecdsaKey.PublicKey).AnyTimes()
var kid = uuid.New()
expectedPrefixedOpenIDConnectKeyName := fmt.Sprintf("%s%s", keySetPrefix, x.OpenIDConnectKeyName)
t.Run("case=GenerateAndPersistKeySet", func(t *testing.T) {
privateAttrSet, publicAttrSet := expectedKeyAttributes(t, expectedPrefixedOpenIDConnectKeyName, kid)
hsmContext.EXPECT().FindKeyPairs(gomock.Nil(), gomock.Eq([]byte(expectedPrefixedOpenIDConnectKeyName))).Return(nil, nil)
hsmContext.EXPECT().GenerateRSAKeyPairWithAttributes(gomock.Eq(publicAttrSet), gomock.Eq(privateAttrSet), gomock.Eq(4096)).Return(rsaKeyPair4096, nil)
got, err := m.GenerateAndPersistKeySet(context.TODO(), x.OpenIDConnectKeyName, kid, "RS256", "sig")
assert.NoError(t, err)
expectedKeySet := expectedKeySet(rsaKeyPair4096, kid, "RS256", "sig")
if !reflect.DeepEqual(got, expectedKeySet) {
t.Errorf("GenerateAndPersistKeySet() got = %v, want %v", got, expectedKeySet)
}
})
t.Run("case=GetKey", func(t *testing.T) {
hsmContext.EXPECT().FindKeyPair(gomock.Eq([]byte(kid)), gomock.Eq([]byte(expectedPrefixedOpenIDConnectKeyName))).Return(rsaKeyPair4096, nil)
hsmContext.EXPECT().GetAttribute(gomock.Eq(rsaKeyPair4096), gomock.Eq(crypto11.CkaDecrypt)).Return(nil, nil)
got, err := m.GetKey(context.TODO(), x.OpenIDConnectKeyName, kid)
assert.NoError(t, err)
expectedKeySet := expectedKeySet(rsaKeyPair4096, kid, "RS256", "sig")
if !reflect.DeepEqual(got, expectedKeySet) {
t.Errorf("GetKey() got = %v, want %v", got, expectedKeySet)
}
})
t.Run("case=GetKeyMinimalRsaKeyLengthError", func(t *testing.T) {
hsmContext.EXPECT().FindKeyPair(gomock.Eq([]byte(kid)), gomock.Eq([]byte(expectedPrefixedOpenIDConnectKeyName))).Return(rsaKeyPair3072, nil)
_, err := m.GetKey(context.TODO(), x.OpenIDConnectKeyName, kid)
assert.ErrorIs(t, err, jwk.ErrMinimalRsaKeyLength)
})
t.Run("case=GetKeySet", func(t *testing.T) {
hsmContext.EXPECT().FindKeyPairs(gomock.Nil(), gomock.Eq([]byte(expectedPrefixedOpenIDConnectKeyName))).Return([]crypto11.Signer{rsaKeyPair4096}, nil)
hsmContext.EXPECT().GetAttribute(gomock.Eq(rsaKeyPair4096), gomock.Eq(crypto11.CkaId)).Return(pkcs11.NewAttribute(pkcs11.CKA_ID, []byte(kid)), nil)
hsmContext.EXPECT().GetAttribute(gomock.Eq(rsaKeyPair4096), gomock.Eq(crypto11.CkaDecrypt)).Return(nil, nil)
got, err := m.GetKeySet(context.TODO(), x.OpenIDConnectKeyName)
assert.NoError(t, err)
expectedKeySet := expectedKeySet(rsaKeyPair4096, kid, "RS256", "sig")
if !reflect.DeepEqual(got, expectedKeySet) {
t.Errorf("GetKey() got = %v, want %v", got, expectedKeySet)
}
})
t.Run("case=GetKeySetMinimalRsaKeyLengthError", func(t *testing.T) {
hsmContext.EXPECT().FindKeyPairs(gomock.Nil(), gomock.Eq([]byte(expectedPrefixedOpenIDConnectKeyName))).Return([]crypto11.Signer{rsaKeyPair3072}, nil)
hsmContext.EXPECT().GetAttribute(gomock.Eq(rsaKeyPair3072), gomock.Eq(crypto11.CkaId)).Return(pkcs11.NewAttribute(pkcs11.CKA_ID, []byte(kid)), nil)
_, err := m.GetKeySet(context.TODO(), x.OpenIDConnectKeyName)
assert.ErrorIs(t, err, jwk.ErrMinimalRsaKeyLength)
})
t.Run("case=DeleteKey", func(t *testing.T) {
hsmContext.EXPECT().FindKeyPair(gomock.Eq([]byte(kid)), gomock.Eq([]byte(expectedPrefixedOpenIDConnectKeyName))).Return(rsaKeyPair4096, nil)
rsaKeyPair4096.EXPECT().Delete().Return(nil)
err := m.DeleteKey(context.TODO(), x.OpenIDConnectKeyName, kid)
assert.NoError(t, err)
})
t.Run("case=DeleteKeySet", func(t *testing.T) {
hsmContext.EXPECT().FindKeyPairs(gomock.Nil(), gomock.Eq([]byte(expectedPrefixedOpenIDConnectKeyName))).Return([]crypto11.Signer{rsaKeyPair4096}, nil)
rsaKeyPair4096.EXPECT().Delete().Return(nil)
err := m.DeleteKeySet(context.TODO(), x.OpenIDConnectKeyName)
assert.NoError(t, err)
})
}
func TestKeyManager_GenerateAndPersistKeySet(t *testing.T) {
ctrl := gomock.NewController(t)
hsmContext := NewMockContext(ctrl)
defer ctrl.Finish()
l := logrusx.New("", "")
c := config.MustNew(context.Background(), l, configx.SkipValidation())
m := hsm.NewKeyManager(hsmContext, c)
rsaKey, err := rsa.GenerateKey(rand.Reader, 4096)
require.NoError(t, err)
ecdsaKey, err := ecdsa.GenerateKey(elliptic.P521(), rand.Reader)
require.NoError(t, err)
rsaKeyPair := NewMockSignerDecrypter(ctrl)
rsaKeyPair.EXPECT().Public().Return(&rsaKey.PublicKey).AnyTimes()
ecdsaKeyPair := NewMockSignerDecrypter(ctrl)
ecdsaKeyPair.EXPECT().Public().Return(&ecdsaKey.PublicKey).AnyTimes()
var kid = uuid.New()
type args struct {
ctx context.Context
set string
kid string
alg string
use string
}
tests := []struct {
name string
setup func(t *testing.T)
args args
want *jose.JSONWebKeySet
wantErrMsg string
wantErr error
}{
{
name: "Generate RS256",
args: args{
ctx: context.TODO(),
set: x.OpenIDConnectKeyName,
kid: kid,
alg: "RS256",
use: "sig",
},
setup: func(t *testing.T) {
privateAttrSet, publicAttrSet := expectedKeyAttributes(t, x.OpenIDConnectKeyName, kid)
hsmContext.EXPECT().FindKeyPairs(gomock.Nil(), gomock.Eq([]byte(x.OpenIDConnectKeyName))).Return(nil, nil)
hsmContext.EXPECT().GenerateRSAKeyPairWithAttributes(gomock.Eq(publicAttrSet), gomock.Eq(privateAttrSet), gomock.Eq(4096)).Return(rsaKeyPair, nil)
},
want: expectedKeySet(rsaKeyPair, kid, "RS256", "sig"),
},
{
name: "Generate RS256 with GenerateRSAKeyPairWithAttributes Error",
args: args{
ctx: context.TODO(),
set: x.OpenIDConnectKeyName,
kid: kid,
alg: "RS256",
use: "sig",
},
setup: func(t *testing.T) {
privateAttrSet, publicAttrSet := expectedKeyAttributes(t, x.OpenIDConnectKeyName, kid)
hsmContext.EXPECT().FindKeyPairs(gomock.Nil(), gomock.Eq([]byte(x.OpenIDConnectKeyName))).Return(nil, nil)
hsmContext.EXPECT().GenerateRSAKeyPairWithAttributes(gomock.Eq(publicAttrSet), gomock.Eq(privateAttrSet), gomock.Eq(4096)).Return(nil, errors.New("GenerateRSAKeyPairWithAttributesError"))
},
wantErrMsg: "GenerateRSAKeyPairWithAttributesError",
},
{
name: "Generate ES256",
args: args{
ctx: context.TODO(),
set: x.OpenIDConnectKeyName,
kid: kid,
alg: "ES256",
use: "sig",
},
setup: func(t *testing.T) {
privateAttrSet, publicAttrSet := expectedKeyAttributes(t, x.OpenIDConnectKeyName, kid)
hsmContext.EXPECT().FindKeyPairs(gomock.Nil(), gomock.Eq([]byte(x.OpenIDConnectKeyName))).Return(nil, nil)
hsmContext.EXPECT().GenerateECDSAKeyPairWithAttributes(gomock.Eq(publicAttrSet), gomock.Eq(privateAttrSet), gomock.Eq(elliptic.P256())).Return(ecdsaKeyPair, nil)
},
want: expectedKeySet(ecdsaKeyPair, kid, "ES256", "sig"),
},
{
name: "Generate ES256 with GenerateECDSAKeyPairWithAttributes Error",
args: args{
ctx: context.TODO(),
set: x.OpenIDConnectKeyName,
kid: kid,
alg: "ES256",
use: "sig",
},
setup: func(t *testing.T) {
privateAttrSet, publicAttrSet := expectedKeyAttributes(t, x.OpenIDConnectKeyName, kid)
hsmContext.EXPECT().FindKeyPairs(gomock.Nil(), gomock.Eq([]byte(x.OpenIDConnectKeyName))).Return(nil, nil)
hsmContext.EXPECT().GenerateECDSAKeyPairWithAttributes(gomock.Eq(publicAttrSet), gomock.Eq(privateAttrSet), gomock.Eq(elliptic.P256())).Return(nil, errors.New("GenerateECDSAKeyPairWithAttributesError"))
},
wantErrMsg: "GenerateECDSAKeyPairWithAttributesError",
},
{
name: "Generate ES512",
args: args{
ctx: context.TODO(),
set: x.OpenIDConnectKeyName,
kid: kid,
alg: "ES512",
use: "sig",
},
setup: func(t *testing.T) {
privateAttrSet, publicAttrSet := expectedKeyAttributes(t, x.OpenIDConnectKeyName, kid)
hsmContext.EXPECT().FindKeyPairs(gomock.Nil(), gomock.Eq([]byte(x.OpenIDConnectKeyName))).Return(nil, nil)
hsmContext.EXPECT().GenerateECDSAKeyPairWithAttributes(gomock.Eq(publicAttrSet), gomock.Eq(privateAttrSet), gomock.Eq(elliptic.P521())).Return(ecdsaKeyPair, nil)
},
want: expectedKeySet(ecdsaKeyPair, kid, "ES512", "sig"),
},
{
name: "Generate ES512 GenerateECDSAKeyPairWithAttributes Error",
args: args{
ctx: context.TODO(),
set: x.OpenIDConnectKeyName,
kid: kid,
alg: "ES512",
use: "sig",
},
setup: func(t *testing.T) {
privateAttrSet, publicAttrSet := expectedKeyAttributes(t, x.OpenIDConnectKeyName, kid)
hsmContext.EXPECT().FindKeyPairs(gomock.Nil(), gomock.Eq([]byte(x.OpenIDConnectKeyName))).Return(nil, nil)
hsmContext.EXPECT().GenerateECDSAKeyPairWithAttributes(gomock.Eq(publicAttrSet), gomock.Eq(privateAttrSet), gomock.Eq(elliptic.P521())).Return(nil, errors.New("GenerateECDSAKeyPairWithAttributesError"))
},
wantErrMsg: "GenerateECDSAKeyPairWithAttributesError",
},
{
name: "Generate unsupported",
args: args{
ctx: context.TODO(),
set: x.OpenIDConnectKeyName,
kid: kid,
alg: "ES384",
use: "sig",
},
setup: func(t *testing.T) {
hsmContext.EXPECT().FindKeyPairs(gomock.Nil(), gomock.Eq([]byte(x.OpenIDConnectKeyName))).Return(nil, nil)
},
wantErr: errors.WithStack(jwk.ErrUnsupportedKeyAlgorithm),
},
{
name: "Generate with FindKeyPair Error",
args: args{
ctx: context.TODO(),
set: x.OpenIDConnectKeyName,
kid: kid,
alg: "RS256",
use: "sig",
},
setup: func(t *testing.T) {
hsmContext.EXPECT().FindKeyPairs(gomock.Nil(), gomock.Eq([]byte(x.OpenIDConnectKeyName))).Return(nil, errors.New("FindKeyPairError"))
},
wantErrMsg: "FindKeyPairError",
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
tt.setup(t)
got, err := m.GenerateAndPersistKeySet(tt.args.ctx, tt.args.set, tt.args.kid, tt.args.alg, tt.args.use)
if tt.wantErr != nil {
require.Nil(t, got)
require.IsType(t, tt.wantErr, err)
} else if len(tt.wantErrMsg) != 0 {
require.Nil(t, got)
require.EqualError(t, err, tt.wantErrMsg)
return
}
if !reflect.DeepEqual(got, tt.want) {
t.Errorf("GenerateAndPersistKeySet() got = %v, want %v", got, tt.want)
}
})
}
}
func TestKeyManager_GetKey(t *testing.T) {
ctrl := gomock.NewController(t)
hsmContext := NewMockContext(ctrl)
defer ctrl.Finish()
l := logrusx.New("", "")
c := config.MustNew(context.Background(), l, configx.SkipValidation())
m := hsm.NewKeyManager(hsmContext, c)
rsaKey, err := rsa.GenerateKey(rand.Reader, 4096)
require.NoError(t, err)
rsaKeyPair := NewMockSignerDecrypter(ctrl)
rsaKeyPair.EXPECT().Public().Return(&rsaKey.PublicKey).AnyTimes()
ecdsaP256Key, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
require.NoError(t, err)
ecdsaP256KeyPair := NewMockSignerDecrypter(ctrl)
ecdsaP256KeyPair.EXPECT().Public().Return(&ecdsaP256Key.PublicKey).AnyTimes()
ecdsaP521Key, err := ecdsa.GenerateKey(elliptic.P521(), rand.Reader)
require.NoError(t, err)
ecdsaP521KeyPair := NewMockSignerDecrypter(ctrl)
ecdsaP521KeyPair.EXPECT().Public().Return(&ecdsaP521Key.PublicKey).AnyTimes()
ecdsaP224Key, err := ecdsa.GenerateKey(elliptic.P224(), rand.Reader)
require.NoError(t, err)
ecdsaP224KeyPair := NewMockSignerDecrypter(ctrl)
ecdsaP224KeyPair.EXPECT().Public().Return(&ecdsaP224Key.PublicKey).AnyTimes()
var kid = uuid.New()
type args struct {
ctx context.Context
set string
kid string
}
tests := []struct {
name string
setup func(t *testing.T)
args args
want *jose.JSONWebKeySet
wantErrMsg string
wantErr error
}{
{
name: "Get RS256 sig",
args: args{
ctx: context.TODO(),
set: x.OpenIDConnectKeyName,
kid: kid,
},
setup: func(t *testing.T) {
hsmContext.EXPECT().FindKeyPair(gomock.Eq([]byte(kid)), gomock.Eq([]byte(x.OpenIDConnectKeyName))).Return(rsaKeyPair, nil)
hsmContext.EXPECT().GetAttribute(gomock.Eq(rsaKeyPair), gomock.Eq(crypto11.CkaDecrypt)).Return(nil, nil)
},
want: expectedKeySet(rsaKeyPair, kid, "RS256", "sig"),
},
{
name: "Get RS256 enc",
args: args{
ctx: context.TODO(),
set: x.OpenIDConnectKeyName,
kid: kid,
},
setup: func(t *testing.T) {
hsmContext.EXPECT().FindKeyPair(gomock.Eq([]byte(kid)), gomock.Eq([]byte(x.OpenIDConnectKeyName))).Return(rsaKeyPair, nil)
hsmContext.EXPECT().GetAttribute(gomock.Eq(rsaKeyPair), gomock.Eq(crypto11.CkaDecrypt)).Return(pkcs11.NewAttribute(pkcs11.CKA_DECRYPT, true), nil)
},
want: expectedKeySet(rsaKeyPair, kid, "RS256", "enc"),
},
{
name: "Key usage attribute error",
args: args{
ctx: context.TODO(),
set: x.OpenIDConnectKeyName,
kid: kid,
},
setup: func(t *testing.T) {
hsmContext.EXPECT().FindKeyPair(gomock.Eq([]byte(kid)), gomock.Eq([]byte(x.OpenIDConnectKeyName))).Return(rsaKeyPair, nil)
hsmContext.EXPECT().GetAttribute(gomock.Eq(rsaKeyPair), gomock.Eq(crypto11.CkaDecrypt)).Return(nil, errors.New("GetAttributeError"))
},
want: expectedKeySet(rsaKeyPair, kid, "RS256", "sig"),
},
{
name: "Get ES256 sig",
args: args{
ctx: context.TODO(),
set: x.OpenIDConnectKeyName,
kid: kid,
},
setup: func(t *testing.T) {
hsmContext.EXPECT().FindKeyPair(gomock.Eq([]byte(kid)), gomock.Eq([]byte(x.OpenIDConnectKeyName))).Return(ecdsaP256KeyPair, nil)
hsmContext.EXPECT().GetAttribute(gomock.Eq(ecdsaP256KeyPair), gomock.Eq(crypto11.CkaDecrypt)).Return(nil, nil)
},
want: expectedKeySet(ecdsaP256KeyPair, kid, "ES256", "sig"),
},
{
name: "Get ES256 enc",
args: args{
ctx: context.TODO(),
set: x.OpenIDConnectKeyName,
kid: kid,
},
setup: func(t *testing.T) {
hsmContext.EXPECT().FindKeyPair(gomock.Eq([]byte(kid)), gomock.Eq([]byte(x.OpenIDConnectKeyName))).Return(ecdsaP256KeyPair, nil)
hsmContext.EXPECT().GetAttribute(gomock.Eq(ecdsaP256KeyPair), gomock.Eq(crypto11.CkaDecrypt)).Return(pkcs11.NewAttribute(pkcs11.CKA_DECRYPT, true), nil)
},
want: expectedKeySet(ecdsaP256KeyPair, kid, "ES256", "enc"),
},
{
name: "Get ES512 sig",
args: args{
ctx: context.TODO(),
set: x.OpenIDConnectKeyName,
kid: kid,
},
setup: func(t *testing.T) {
hsmContext.EXPECT().FindKeyPair(gomock.Eq([]byte(kid)), gomock.Eq([]byte(x.OpenIDConnectKeyName))).Return(ecdsaP521KeyPair, nil)
hsmContext.EXPECT().GetAttribute(gomock.Eq(ecdsaP521KeyPair), gomock.Eq(crypto11.CkaDecrypt)).Return(nil, nil)
},
want: expectedKeySet(ecdsaP521KeyPair, kid, "ES512", "sig"),
},
{
name: "Get ES512 enc",
args: args{
ctx: context.TODO(),
set: x.OpenIDConnectKeyName,
kid: kid,
},
setup: func(t *testing.T) {
hsmContext.EXPECT().FindKeyPair(gomock.Eq([]byte(kid)), gomock.Eq([]byte(x.OpenIDConnectKeyName))).Return(ecdsaP521KeyPair, nil)
hsmContext.EXPECT().GetAttribute(gomock.Eq(ecdsaP521KeyPair), gomock.Eq(crypto11.CkaDecrypt)).Return(pkcs11.NewAttribute(pkcs11.CKA_DECRYPT, true), nil)
},
want: expectedKeySet(ecdsaP521KeyPair, kid, "ES512", "enc"),
},
{
name: "Key not found",
args: args{
ctx: context.TODO(),
set: x.OpenIDConnectKeyName,
kid: kid,
},
setup: func(t *testing.T) {
hsmContext.EXPECT().FindKeyPair(gomock.Eq([]byte(kid)), gomock.Eq([]byte(x.OpenIDConnectKeyName))).Return(nil, nil)
},
wantErrMsg: "Not Found",
},
{
name: "FindKeyPair Error",
args: args{
ctx: context.TODO(),
set: x.OpenIDConnectKeyName,
kid: kid,
},
setup: func(t *testing.T) {
hsmContext.EXPECT().FindKeyPair(gomock.Eq([]byte(kid)), gomock.Eq([]byte(x.OpenIDConnectKeyName))).Return(nil, errors.New("FindKeyPairError"))
},
wantErrMsg: "FindKeyPairError",
},
{
name: "Unsupported elliptic curve",
args: args{
ctx: context.TODO(),
set: x.OpenIDConnectKeyName,
kid: kid,
},
setup: func(t *testing.T) {
hsmContext.EXPECT().FindKeyPair(gomock.Eq([]byte(kid)), gomock.Eq([]byte(x.OpenIDConnectKeyName))).Return(ecdsaP224KeyPair, nil)
},
wantErr: errors.WithStack(jwk.ErrUnsupportedEllipticCurve),
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
tt.setup(t)
got, err := m.GetKey(tt.args.ctx, tt.args.set, tt.args.kid)
if tt.wantErr != nil {
require.Nil(t, got)
require.IsType(t, tt.wantErr, err)
} else if len(tt.wantErrMsg) != 0 {
require.Nil(t, got)
require.EqualError(t, err, tt.wantErrMsg)
return
}
if !reflect.DeepEqual(got, tt.want) {
t.Errorf("GetKey() got = %v, want %v", got, tt.want)
}
})
}
}
func TestKeyManager_GetKeySet(t *testing.T) {
ctrl := gomock.NewController(t)
hsmContext := NewMockContext(ctrl)
defer ctrl.Finish()
l := logrusx.New("", "")
c := config.MustNew(context.Background(), l, configx.SkipValidation())
m := hsm.NewKeyManager(hsmContext, c)
rsaKey, err := rsa.GenerateKey(rand.Reader, 4096)
require.NoError(t, err)
rsaKid := uuid.New()
rsaKeyPair := NewMockSignerDecrypter(ctrl)
rsaKeyPair.EXPECT().Public().Return(&rsaKey.PublicKey).AnyTimes()
ecdsaP256Key, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
require.NoError(t, err)
ecdsaP256Kid := uuid.New()
ecdsaP256KeyPair := NewMockSignerDecrypter(ctrl)
ecdsaP256KeyPair.EXPECT().Public().Return(&ecdsaP256Key.PublicKey).AnyTimes()
ecdsaP521Key, err := ecdsa.GenerateKey(elliptic.P521(), rand.Reader)
require.NoError(t, err)
ecdsaP521Kid := uuid.New()
ecdsaP521KeyPair := NewMockSignerDecrypter(ctrl)
ecdsaP521KeyPair.EXPECT().Public().Return(&ecdsaP521Key.PublicKey).AnyTimes()
ecdsaP224Key, err := ecdsa.GenerateKey(elliptic.P224(), rand.Reader)
require.NoError(t, err)
ecdsaP224Kid := uuid.New()
ecdsaP224KeyPair := NewMockSignerDecrypter(ctrl)
ecdsaP224KeyPair.EXPECT().Public().Return(&ecdsaP224Key.PublicKey).AnyTimes()
allKeys := []crypto11.Signer{rsaKeyPair, ecdsaP256KeyPair, ecdsaP521KeyPair}
var keys []jose.JSONWebKey
keys = append(keys, createJSONWebKeys(rsaKeyPair, rsaKid, "RS256", "sig")...)
keys = append(keys, createJSONWebKeys(ecdsaP256KeyPair, ecdsaP256Kid, "ES256", "sig")...)
keys = append(keys, createJSONWebKeys(ecdsaP521KeyPair, ecdsaP521Kid, "ES512", "sig")...)
type args struct {
ctx context.Context
set string
}
tests := []struct {
name string
setup func(t *testing.T)
args args
want *jose.JSONWebKeySet
wantErrMsg string
wantErr error
}{
{
name: "With multiple keys per set",
args: args{
ctx: context.TODO(),
set: x.OpenIDConnectKeyName,
},
setup: func(t *testing.T) {
hsmContext.EXPECT().FindKeyPairs(gomock.Nil(), gomock.Eq([]byte(x.OpenIDConnectKeyName))).Return(allKeys, nil)
hsmContext.EXPECT().GetAttribute(gomock.Eq(rsaKeyPair), gomock.Eq(crypto11.CkaId)).Return(pkcs11.NewAttribute(pkcs11.CKA_ID, []byte(rsaKid)), nil)
hsmContext.EXPECT().GetAttribute(gomock.Eq(rsaKeyPair), gomock.Eq(crypto11.CkaDecrypt)).Return(nil, nil)
hsmContext.EXPECT().GetAttribute(gomock.Eq(ecdsaP256KeyPair), gomock.Eq(crypto11.CkaId)).Return(pkcs11.NewAttribute(pkcs11.CKA_ID, []byte(ecdsaP256Kid)), nil)
hsmContext.EXPECT().GetAttribute(gomock.Eq(ecdsaP256KeyPair), gomock.Eq(crypto11.CkaDecrypt)).Return(nil, nil)
hsmContext.EXPECT().GetAttribute(gomock.Eq(ecdsaP521KeyPair), gomock.Eq(crypto11.CkaId)).Return(pkcs11.NewAttribute(pkcs11.CKA_ID, []byte(ecdsaP521Kid)), nil)
hsmContext.EXPECT().GetAttribute(gomock.Eq(ecdsaP521KeyPair), gomock.Eq(crypto11.CkaDecrypt)).Return(nil, nil)
},
want: &jose.JSONWebKeySet{Keys: keys},
},
{
name: "GetCkaIdAttributeError Error",
args: args{
ctx: context.TODO(),
set: x.OpenIDConnectKeyName,
},
setup: func(t *testing.T) {
hsmContext.EXPECT().FindKeyPairs(gomock.Nil(), gomock.Eq([]byte(x.OpenIDConnectKeyName))).Return(allKeys, nil)
hsmContext.EXPECT().GetAttribute(gomock.Eq(rsaKeyPair), gomock.Eq(crypto11.CkaId)).Return(nil, errors.New("GetCkaIdAttributeError"))
},
wantErrMsg: "GetCkaIdAttributeError",
},
{
name: "Key set not found",
args: args{
ctx: context.TODO(),
set: x.OpenIDConnectKeyName,
},
setup: func(t *testing.T) {
hsmContext.EXPECT().FindKeyPairs(gomock.Nil(), gomock.Eq([]byte(x.OpenIDConnectKeyName))).Return(nil, nil)
},
wantErrMsg: "Not Found",
},
{
name: "FindKeyPairs Error",
args: args{
ctx: context.TODO(),
set: x.OpenIDConnectKeyName,
},
setup: func(t *testing.T) {
hsmContext.EXPECT().FindKeyPairs(gomock.Nil(), gomock.Eq([]byte(x.OpenIDConnectKeyName))).Return(nil, errors.New("FindKeyPairsError"))
},
wantErrMsg: "FindKeyPairsError",
},
{
name: "Unsupported elliptic curve",
args: args{
ctx: context.TODO(),
set: x.OpenIDConnectKeyName,
},
setup: func(t *testing.T) {
hsmContext.EXPECT().FindKeyPairs(gomock.Nil(), gomock.Eq([]byte(x.OpenIDConnectKeyName))).Return([]crypto11.Signer{ecdsaP224KeyPair}, nil)
hsmContext.EXPECT().GetAttribute(gomock.Eq(ecdsaP224KeyPair), gomock.Eq(crypto11.CkaId)).Return(pkcs11.NewAttribute(pkcs11.CKA_ID, []byte(ecdsaP224Kid)), nil)
},
wantErr: errors.WithStack(jwk.ErrUnsupportedEllipticCurve),
},
{
name: "Invalid key type Error",
args: args{
ctx: context.TODO(),
set: x.OpenIDConnectKeyName,
},
setup: func(t *testing.T) {
keyPair := NewMockSignerDecrypter(ctrl)
hsmContext.EXPECT().FindKeyPairs(gomock.Nil(), gomock.Eq([]byte(x.OpenIDConnectKeyName))).Return([]crypto11.Signer{keyPair}, nil)
hsmContext.EXPECT().GetAttribute(gomock.Eq(keyPair), gomock.Eq(crypto11.CkaId)).Return(pkcs11.NewAttribute(pkcs11.CKA_ID, []byte(rsaKid)), nil)
keyPair.EXPECT().Public().Return(nil).Times(1)
},
wantErr: errors.WithStack(jwk.ErrUnsupportedKeyAlgorithm),
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
tt.setup(t)
got, err := m.GetKeySet(tt.args.ctx, tt.args.set)
if tt.wantErr != nil {
require.Nil(t, got)
require.IsType(t, tt.wantErr, err)
} else if len(tt.wantErrMsg) != 0 {
require.Nil(t, got)
require.EqualError(t, err, tt.wantErrMsg)
return
}
if !reflect.DeepEqual(got, tt.want) {
t.Errorf("GetKey() got = %v, want %v", got, tt.want)
}
})
}
}
func TestKeyManager_DeleteKey(t *testing.T) {
ctrl := gomock.NewController(t)
hsmContext := NewMockContext(ctrl)
defer ctrl.Finish()
l := logrusx.New("", "")
c := config.MustNew(context.Background(), l, configx.SkipValidation())
m := hsm.NewKeyManager(hsmContext, c)
rsaKeyPair := NewMockSignerDecrypter(ctrl)
kid := uuid.New()
type args struct {
ctx context.Context
set string
kid string
}
tests := []struct {
name string
setup func(t *testing.T)
args args
wantErrMsg string
}{
{
name: "Existing key",
args: args{
ctx: context.TODO(),
set: x.OpenIDConnectKeyName,
kid: kid,
},
setup: func(t *testing.T) {
hsmContext.EXPECT().FindKeyPair(gomock.Eq([]byte(kid)), gomock.Eq([]byte(x.OpenIDConnectKeyName))).Return(rsaKeyPair, nil)
rsaKeyPair.EXPECT().Delete().Return(nil)
},
},
{
name: "Key not found",
args: args{
ctx: context.TODO(),
set: x.OpenIDConnectKeyName,
kid: kid,
},
setup: func(t *testing.T) {
hsmContext.EXPECT().FindKeyPair(gomock.Eq([]byte(kid)), gomock.Eq([]byte(x.OpenIDConnectKeyName))).Return(nil, nil)
},
wantErrMsg: "Not Found",
},
{
name: "FindKeyPair Error",
args: args{
ctx: context.TODO(),
set: x.OpenIDConnectKeyName,
kid: kid,
},
setup: func(t *testing.T) {
hsmContext.EXPECT().FindKeyPair(gomock.Eq([]byte(kid)), gomock.Eq([]byte(x.OpenIDConnectKeyName))).Return(nil, errors.New("FindKeyPairError"))
},
wantErrMsg: "FindKeyPairError",
},
{
name: "Delete Error",
args: args{
ctx: context.TODO(),
set: x.OpenIDConnectKeyName,
kid: kid,
},
setup: func(t *testing.T) {
hsmContext.EXPECT().FindKeyPair(gomock.Eq([]byte(kid)), gomock.Eq([]byte(x.OpenIDConnectKeyName))).Return(rsaKeyPair, nil)
rsaKeyPair.EXPECT().Delete().Return(errors.New("DeleteError"))
},
wantErrMsg: "DeleteError",
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
tt.setup(t)
if err := m.DeleteKey(tt.args.ctx, tt.args.set, tt.args.kid); len(tt.wantErrMsg) != 0 {
require.EqualError(t, err, tt.wantErrMsg)
}
})
}
}
func TestKeyManager_DeleteKeySet(t *testing.T) {
ctrl := gomock.NewController(t)
hsmContext := NewMockContext(ctrl)
defer ctrl.Finish()
l := logrusx.New("", "")
c := config.MustNew(context.Background(), l, configx.SkipValidation())
m := hsm.NewKeyManager(hsmContext, c)
rsaKeyPair1 := NewMockSignerDecrypter(ctrl)
rsaKeyPair2 := NewMockSignerDecrypter(ctrl)
allKeys := []crypto11.Signer{rsaKeyPair1, rsaKeyPair2}
type args struct {
ctx context.Context
set string
}
tests := []struct {
name string
setup func(t *testing.T)
args args
wantErrMsg string
}{
{
name: "Existing key",
args: args{
ctx: context.TODO(),
set: x.OpenIDConnectKeyName,
},
setup: func(t *testing.T) {
hsmContext.EXPECT().FindKeyPairs(gomock.Nil(), gomock.Eq([]byte(x.OpenIDConnectKeyName))).Return(allKeys, nil)
rsaKeyPair1.EXPECT().Delete().Return(nil)
rsaKeyPair2.EXPECT().Delete().Return(nil)
},
},
{
name: "Key not found",
args: args{
ctx: context.TODO(),
set: x.OpenIDConnectKeyName,
},
setup: func(t *testing.T) {
hsmContext.EXPECT().FindKeyPairs(gomock.Nil(), gomock.Eq([]byte(x.OpenIDConnectKeyName))).Return(nil, nil)
},
wantErrMsg: "Not Found",
},
{
name: "FindKeyPairs Error",
args: args{
ctx: context.TODO(),
set: x.OpenIDConnectKeyName,
},
setup: func(t *testing.T) {
hsmContext.EXPECT().FindKeyPairs(gomock.Nil(), gomock.Eq([]byte(x.OpenIDConnectKeyName))).Return(nil, errors.New("FindKeyPairsError"))
},
wantErrMsg: "FindKeyPairsError",
},
{
name: "Delete Error",
args: args{
ctx: context.TODO(),
set: x.OpenIDConnectKeyName,
},
setup: func(t *testing.T) {
hsmContext.EXPECT().FindKeyPairs(gomock.Nil(), gomock.Eq([]byte(x.OpenIDConnectKeyName))).Return(allKeys, nil)
rsaKeyPair1.EXPECT().Delete().Return(errors.New("DeleteError"))
},
wantErrMsg: "DeleteError",
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
tt.setup(t)
if err := m.DeleteKeySet(tt.args.ctx, tt.args.set); len(tt.wantErrMsg) != 0 {
require.EqualError(t, err, tt.wantErrMsg)
}
})
}
}
func TestKeyManager_AddKey(t *testing.T) {
m := &hsm.KeyManager{
Context: nil,
}
err := m.AddKey(context.TODO(), x.OpenIDConnectKeyName, &jose.JSONWebKey{})
assert.ErrorIs(t, err, hsm.ErrPreGeneratedKeys)
}
func TestKeyManager_AddKeySet(t *testing.T) {
m := &hsm.KeyManager{
Context: nil,
}
err := m.AddKeySet(context.TODO(), x.OpenIDConnectKeyName, &jose.JSONWebKeySet{})
assert.ErrorIs(t, err, hsm.ErrPreGeneratedKeys)
}
func TestKeyManager_UpdateKey(t *testing.T) {
m := &hsm.KeyManager{
Context: nil,
}
err := m.UpdateKey(context.TODO(), x.OpenIDConnectKeyName, &jose.JSONWebKey{})
assert.ErrorIs(t, err, hsm.ErrPreGeneratedKeys)
}
func TestKeyManager_UpdateKeySet(t *testing.T) {
m := &hsm.KeyManager{
Context: nil,
}
err := m.UpdateKeySet(context.TODO(), x.OpenIDConnectKeyName, &jose.JSONWebKeySet{})
assert.ErrorIs(t, err, hsm.ErrPreGeneratedKeys)
}
func expectedKeyAttributes(t *testing.T, set, kid string) (crypto11.AttributeSet, crypto11.AttributeSet) {
privateAttrSet, err := crypto11.NewAttributeSetWithIDAndLabel([]byte(kid), []byte(set))
require.NoError(t, err)
publicAttrSet, err := crypto11.NewAttributeSetWithIDAndLabel([]byte(kid), []byte(set))
require.NoError(t, err)
publicAttrSet.AddIfNotPresent([]*pkcs11.Attribute{
pkcs11.NewAttribute(pkcs11.CKA_VERIFY, true),
pkcs11.NewAttribute(pkcs11.CKA_ENCRYPT, false),
})
privateAttrSet.AddIfNotPresent([]*pkcs11.Attribute{
pkcs11.NewAttribute(pkcs11.CKA_SIGN, true),
pkcs11.NewAttribute(pkcs11.CKA_DECRYPT, false),
})
return privateAttrSet, publicAttrSet
}
func expectedKeySet(keyPair *MockSignerDecrypter, kid, alg, use string) *jose.JSONWebKeySet {
return &jose.JSONWebKeySet{Keys: createJSONWebKeys(keyPair, kid, alg, use)}
}
func createJSONWebKeys(keyPair *MockSignerDecrypter, kid string, alg string, use string) []jose.JSONWebKey {
return []jose.JSONWebKey{{
Algorithm: alg,
Use: use,
Key: cryptosigner.Opaque(keyPair),
KeyID: kid,
Certificates: []*x509.Certificate{},
CertificateThumbprintSHA1: []uint8{},
CertificateThumbprintSHA256: []uint8{},
}}
} |
Go | hydra/hsm/manager_nohsm.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
//go:build !hsm
// +build !hsm
package hsm
import (
"context"
"sync"
"github.com/ory/hydra/v2/driver/config"
"github.com/ory/x/logrusx"
"github.com/pkg/errors"
"github.com/ory/hydra/v2/jwk"
"github.com/go-jose/go-jose/v3"
)
type Context interface {
}
type KeyManager struct {
jwk.Manager
sync.RWMutex
Context
KeySetPrefix string
}
var ErrOpSysNotSupported = errors.New("Hardware Security Module is not supported on this platform.")
func NewContext(c *config.DefaultProvider, l *logrusx.Logger) Context {
l.Fatalf("Hardware Security Module is not supported on this platform.")
return nil
}
func NewKeyManager(hsm Context, config *config.DefaultProvider) *KeyManager {
return nil
}
func (m *KeyManager) GenerateAndPersistKeySet(_ context.Context, set, kid, alg, use string) (*jose.JSONWebKeySet, error) {
return nil, errors.WithStack(ErrOpSysNotSupported)
}
func (m *KeyManager) GetKey(_ context.Context, set, kid string) (*jose.JSONWebKeySet, error) {
return nil, errors.WithStack(ErrOpSysNotSupported)
}
func (m *KeyManager) GetKeySet(_ context.Context, set string) (*jose.JSONWebKeySet, error) {
return nil, errors.WithStack(ErrOpSysNotSupported)
}
func (m *KeyManager) DeleteKey(_ context.Context, set, kid string) error {
return errors.WithStack(ErrOpSysNotSupported)
}
func (m *KeyManager) DeleteKeySet(_ context.Context, set string) error {
return errors.WithStack(ErrOpSysNotSupported)
}
func (m *KeyManager) AddKey(_ context.Context, _ string, _ *jose.JSONWebKey) error {
return errors.WithStack(ErrOpSysNotSupported)
}
func (m *KeyManager) AddKeySet(_ context.Context, _ string, _ *jose.JSONWebKeySet) error {
return errors.WithStack(ErrOpSysNotSupported)
}
func (m *KeyManager) UpdateKey(_ context.Context, _ string, _ *jose.JSONWebKey) error {
return errors.WithStack(ErrOpSysNotSupported)
}
func (m *KeyManager) UpdateKeySet(_ context.Context, _ string, _ *jose.JSONWebKeySet) error {
return errors.WithStack(ErrOpSysNotSupported)
} |
YAML | hydra/internal/.hydra.yaml | log:
level: debug
leak_sensitive_values: false
format: json
serve:
public:
port: 1
host: localhost
socket:
owner: hydra
group: hydra-public-api
mode: 0775
cors:
enabled: false
allowed_origins:
- https://example.com
allowed_methods:
- GET
allowed_headers:
- Authorization
exposed_headers:
- Content-Type
allow_credentials: true
max_age: 1
debug: false
request_log:
disable_for_health: false
admin:
port: 2
host: localhost
socket:
owner: hydra
group: hydra-admin-api
mode: 0770
cors:
enabled: false
allowed_origins:
- https://example.com
allowed_methods:
- GET
allowed_headers:
- Authorization
exposed_headers:
- Content-Type
allow_credentials: true
max_age: 1
debug: false
request_log:
disable_for_health: false
tls:
key:
path: /path/to/file.pem
cert:
base64: b3J5IGh5ZHJhIGlzIGF3ZXNvbWUK
allow_termination_from:
- 127.0.0.1/32
cookies:
same_site_mode: Lax
same_site_legacy_workaround: true
dsn: memory
hsm:
enabled: false
webfinger:
jwks:
broadcast_keys:
- hydra.openid.id-token
oidc_discovery:
jwks_url: https://example.com/jwks.json
auth_url: https://example.com/auth
token_url: https://example.com/token
client_registration_url: https://example.com
supported_claims:
- username
supported_scope:
- whatever
userinfo_url: https://example.com
oidc:
subject_identifiers:
supported_types:
- pairwise
pairwise:
salt: random_salt
dynamic_client_registration:
enabled: false
default_scope:
- whatever
urls:
self:
issuer: https://issuer
public: https://public
admin: https://admin
login: https://login
consent: https://consent
logout: https://logout
error: https://error
post_logout_redirect: https://post_logout
strategies:
scope: exact
access_token: opaque
ttl:
login_consent_request: 2h
access_token: 2h
refresh_token: 2h
id_token: 2h
auth_code: 2h
oauth2:
expose_internal_errors: true
hashers:
bcrypt:
cost: 20
pkce:
enforced: true
enforced_for_public_clients: true
secrets:
system:
- some-random-system-secret
cookie:
- some-random-cookie-secret
profiling: cpu
tracing:
provider: jaeger
service_name: hydra service
providers:
jaeger:
local_agent_address: 127.0.0.1:6831
sampling:
trace_id_ratio: 1
server_url: http://sampling
zipkin:
server_url: http://zipkin/api/v2/spans
otlp:
insecure: true
server_url: localhost:4318
sampling:
sampling_ratio: 1.0 |
Go | hydra/internal/driver.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
package internal
import (
"context"
"sync"
"testing"
"github.com/go-jose/go-jose/v3"
"github.com/ory/x/configx"
"github.com/stretchr/testify/require"
"github.com/ory/hydra/v2/x"
"github.com/ory/x/contextx"
"github.com/ory/x/sqlcon/dockertest"
"github.com/ory/hydra/v2/driver"
"github.com/ory/hydra/v2/driver/config"
"github.com/ory/hydra/v2/jwk"
"github.com/ory/x/logrusx"
)
func resetConfig(p *config.DefaultProvider) {
p.MustSet(context.Background(), config.KeyBCryptCost, "4")
p.MustSet(context.Background(), config.KeySubjectIdentifierAlgorithmSalt, "00000000")
p.MustSet(context.Background(), config.KeyGetSystemSecret, []string{"000000000000000000000000000000000000000000000000"})
p.MustSet(context.Background(), config.KeyGetCookieSecrets, []string{"000000000000000000000000000000000000000000000000"})
p.MustSet(context.Background(), config.KeyLogLevel, "trace")
}
func NewConfigurationWithDefaults() *config.DefaultProvider {
p := config.MustNew(context.Background(), logrusx.New("", ""), configx.SkipValidation())
resetConfig(p)
p.MustSet(context.Background(), config.KeyTLSEnabled, false)
return p
}
func NewConfigurationWithDefaultsAndHTTPS() *config.DefaultProvider {
p := config.MustNew(context.Background(), logrusx.New("", ""), configx.SkipValidation())
resetConfig(p)
p.MustSet(context.Background(), config.KeyTLSEnabled, true)
return p
}
func NewRegistryMemory(t testing.TB, c *config.DefaultProvider, ctxer contextx.Contextualizer) driver.Registry {
return newRegistryDefault(t, "memory", c, true, ctxer)
}
func NewMockedRegistry(t testing.TB, ctxer contextx.Contextualizer) driver.Registry {
return newRegistryDefault(t, "memory", NewConfigurationWithDefaults(), true, ctxer)
}
func NewRegistrySQLFromURL(t testing.TB, url string, migrate bool, ctxer contextx.Contextualizer) driver.Registry {
return newRegistryDefault(t, url, NewConfigurationWithDefaults(), migrate, ctxer)
}
func newRegistryDefault(t testing.TB, url string, c *config.DefaultProvider, migrate bool, ctxer contextx.Contextualizer) driver.Registry {
ctx := context.Background()
c.MustSet(ctx, config.KeyLogLevel, "trace")
c.MustSet(ctx, config.KeyDSN, url)
c.MustSet(ctx, "dev", true)
r, err := driver.NewRegistryFromDSN(ctx, c, logrusx.New("test_hydra", "master"), false, migrate, ctxer)
require.NoError(t, err)
return r
}
func CleanAndMigrate(reg driver.Registry) func(*testing.T) {
return func(t *testing.T) {
x.CleanSQLPop(t, reg.Persister().Connection(context.Background()))
require.NoError(t, reg.Persister().MigrateUp(context.Background()))
t.Log("clean and migrate done")
}
}
func ConnectToMySQL(t testing.TB) string {
return dockertest.RunTestMySQLWithVersion(t, "8.0.26")
}
func ConnectToPG(t testing.TB) string {
return dockertest.RunTestPostgreSQLWithVersion(t, "11.8")
}
func ConnectToCRDB(t testing.TB) string {
return dockertest.RunTestCockroachDBWithVersion(t, "v22.1.2")
}
func ConnectDatabases(t *testing.T, migrate bool, ctxer contextx.Contextualizer) (pg, mysql, crdb driver.Registry, clean func(*testing.T)) {
var pgURL, mysqlURL, crdbURL string
wg := sync.WaitGroup{}
wg.Add(3)
go func() {
pgURL = ConnectToPG(t)
t.Log("Pg done")
wg.Done()
}()
go func() {
mysqlURL = ConnectToMySQL(t)
t.Log("myssql done")
wg.Done()
}()
go func() {
crdbURL = ConnectToCRDB(t)
t.Log("crdb done")
wg.Done()
}()
t.Log("beginning to wait")
wg.Wait()
t.Log("done waiting")
pg = NewRegistrySQLFromURL(t, pgURL, migrate, ctxer)
mysql = NewRegistrySQLFromURL(t, mysqlURL, migrate, ctxer)
crdb = NewRegistrySQLFromURL(t, crdbURL, migrate, ctxer)
dbs := []driver.Registry{pg, mysql, crdb}
clean = func(t *testing.T) {
wg := sync.WaitGroup{}
wg.Add(len(dbs))
for _, db := range dbs {
go func(db driver.Registry) {
defer wg.Done()
CleanAndMigrate(db)(t)
}(db)
}
wg.Wait()
}
clean(t)
return
}
func MustEnsureRegistryKeys(ctx context.Context, r driver.Registry, key string) {
if err := jwk.EnsureAsymmetricKeypairExists(ctx, r, string(jose.ES256), key); err != nil {
panic(err)
}
} |
Go | hydra/internal/fosite_store.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
package internal
import (
"context"
"github.com/ory/hydra/v2/client"
"github.com/ory/hydra/v2/driver"
)
func AddFositeExamples(r driver.Registry) {
for _, c := range []client.Client{
{
LegacyClientID: "my-client",
Secret: "foobar",
RedirectURIs: []string{"http://localhost:3846/callback"},
ResponseTypes: []string{"id_token", "code", "token"},
GrantTypes: []string{"implicit", "refresh_token", "authorization_code", "password", "client_credentials"},
Scope: "fosite,openid,photos,offline",
},
{
LegacyClientID: "encoded:client",
Secret: "encoded&password",
RedirectURIs: []string{"http://localhost:3846/callback"},
ResponseTypes: []string{"id_token", "code", "token"},
GrantTypes: []string{"implicit", "refresh_token", "authorization_code", "password", "client_credentials"},
Scope: "fosite,openid,photos,offline",
},
} {
// #nosec G601
if err := r.ClientManager().CreateClient(context.Background(), &c); err != nil {
panic(err)
}
}
} |
hydra/internal/certification/C.F.T.T.s.tar | ./OP-Req-login_hint.txt 0000644 0000000 0000000 00000014461 13313422663 015116 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-login_hint
Test description: Providing login_hint
Timestamp: 2018-06-23T10:49:23Z
============================================================
Trace output
0.0 phase <--<-- 0 --- VerifyConfiguration -->-->
0.0 phase <--<-- 1 --- Note -->-->
1.343 phase <--<-- 2 --- Webfinger -->-->
1.343 not expected to do WebFinger
1.343 phase <--<-- 3 --- Discovery -->-->
1.343 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.425 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.427 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.427 phase <--<-- 4 --- Registration -->-->
1.427 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.427 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#xKydLDc8jeSHuwnb"
],
"response_types": [
"code"
]
}
1.62 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.621 RegistrationResponse {
"client_id": "e26c0a67-8f52-4ce7-a07c-9eac7d27ce20",
"client_secret": "-Bpt7NDuIHs3",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "e26c0a67-8f52-4ce7-a07c-9eac7d27ce20",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#xKydLDc8jeSHuwnb"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.621 phase <--<-- 5 --- AsyncAuthn -->-->
1.621 AuthorizationRequest {
"client_id": "e26c0a67-8f52-4ce7-a07c-9eac7d27ce20",
"login_hint": "[email protected]",
"nonce": "rviIHKFwvI5A9nUc",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "2o88jse9euiKGexb"
}
1.621 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=e26c0a67-8f52-4ce7-a07c-9eac7d27ce20&state=2o88jse9euiKGexb&response_type=code&nonce=rviIHKFwvI5A9nUc&login_hint=foo%40bar.com
1.622 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=e26c0a67-8f52-4ce7-a07c-9eac7d27ce20&state=2o88jse9euiKGexb&response_type=code&nonce=rviIHKFwvI5A9nUc&login_hint=foo%40bar.com
5.51 response Response URL with query part
5.51 response {'state': '2o88jse9euiKGexb', 'scope': 'openid', 'code': '-5syrbZX5UKD0Sa4YDoWb4aTzw0K40aNMV5mCL65-E0.4q3iNhJpRRp9JZueXI6vzNZ71F1UUbcFkFp_XM9j76Q'}
5.51 response {'state': '2o88jse9euiKGexb', 'scope': 'openid', 'code': '-5syrbZX5UKD0Sa4YDoWb4aTzw0K40aNMV5mCL65-E0.4q3iNhJpRRp9JZueXI6vzNZ71F1UUbcFkFp_XM9j76Q'}
5.511 AuthorizationResponse {
"code": "-5syrbZX5UKD0Sa4YDoWb4aTzw0K40aNMV5mCL65-E0.4q3iNhJpRRp9JZueXI6vzNZ71F1UUbcFkFp_XM9j76Q",
"scope": "openid",
"state": "2o88jse9euiKGexb"
}
5.511 phase <--<-- 6 --- Done -->-->
5.511 end
5.511 assertion VerifyAuthnResponse
5.511 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
5.511 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-IDToken-RS256.txt 0000644 0000000 0000000 00000023346 13313422214 014305 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-IDToken-RS256
Test description: Asymmetric ID Token signature with RS256
Timestamp: 2018-06-23T10:44:28Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.085 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.087 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.087 phase <--<-- 2 --- Registration -->-->
0.087 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'id_token_signed_response_alg': 'RS256', 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.087 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id_token_signed_response_alg": "RS256",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#4k6amLHIs3k6Ra09"
],
"response_types": [
"code"
]
}
0.242 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.243 RegistrationResponse {
"client_id": "d5949b53-660c-4eeb-a850-068c67a74469",
"client_secret": "bLCYOZl72BiD",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "d5949b53-660c-4eeb-a850-068c67a74469",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#4k6amLHIs3k6Ra09"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.243 phase <--<-- 3 --- AsyncAuthn -->-->
0.244 AuthorizationRequest {
"client_id": "d5949b53-660c-4eeb-a850-068c67a74469",
"nonce": "x4dnXvoHgbsiYnpc",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "FU3IeNJ6iGAFQ9Ec"
}
0.244 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=d5949b53-660c-4eeb-a850-068c67a74469&state=FU3IeNJ6iGAFQ9Ec&response_type=code&nonce=x4dnXvoHgbsiYnpc
0.244 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=d5949b53-660c-4eeb-a850-068c67a74469&state=FU3IeNJ6iGAFQ9Ec&response_type=code&nonce=x4dnXvoHgbsiYnpc
2.244 response Response URL with query part
2.245 response {'state': 'FU3IeNJ6iGAFQ9Ec', 'scope': 'openid', 'code': 'a7BAb3PECCndJJrWeGYVo3dw2z7VfYlmmDEy92jLMds.m2i2WLBlaK11-YcnlTmqcAhNRg22emGLEZ4k84tdXK8'}
2.245 response {'state': 'FU3IeNJ6iGAFQ9Ec', 'scope': 'openid', 'code': 'a7BAb3PECCndJJrWeGYVo3dw2z7VfYlmmDEy92jLMds.m2i2WLBlaK11-YcnlTmqcAhNRg22emGLEZ4k84tdXK8'}
2.245 AuthorizationResponse {
"code": "a7BAb3PECCndJJrWeGYVo3dw2z7VfYlmmDEy92jLMds.m2i2WLBlaK11-YcnlTmqcAhNRg22emGLEZ4k84tdXK8",
"scope": "openid",
"state": "FU3IeNJ6iGAFQ9Ec"
}
2.245 phase <--<-- 4 --- AccessToken -->-->
2.245 --> request op_args: {'state': 'FU3IeNJ6iGAFQ9Ec'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.245 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'FU3IeNJ6iGAFQ9Ec', 'code': 'a7BAb3PECCndJJrWeGYVo3dw2z7VfYlmmDEy92jLMds.m2i2WLBlaK11-YcnlTmqcAhNRg22emGLEZ4k84tdXK8', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'd5949b53-660c-4eeb-a850-068c67a74469'}, 'state': 'FU3IeNJ6iGAFQ9Ec'}
2.246 AccessTokenRequest {
"code": "a7BAb3PECCndJJrWeGYVo3dw2z7VfYlmmDEy92jLMds.m2i2WLBlaK11-YcnlTmqcAhNRg22emGLEZ4k84tdXK8",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "FU3IeNJ6iGAFQ9Ec"
}
2.246 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.246 request_http_args {'headers': {'Authorization': 'Basic ZDU5NDliNTMtNjYwYy00ZWViLWE4NTAtMDY4YzY3YTc0NDY5OmJMQ1lPWmw3MkJpRA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.246 request code=a7BAb3PECCndJJrWeGYVo3dw2z7VfYlmmDEy92jLMds.m2i2WLBlaK11-YcnlTmqcAhNRg22emGLEZ4k84tdXK8&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=FU3IeNJ6iGAFQ9Ec
2.459 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.46 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZDU5NDliNTMtNjYwYy00ZWViLWE4NTAtMDY4YzY3YTc0NDY5Il0sImF1dGhfdGltZSI6MTUyOTc1MDU5MiwiZXhwIjoxNTI5NzU0MjY4LCJpYXQiOjE1Mjk3NTA2NjgsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjJjNzc2MWFjLTU5ZjYtNGE3ZS04Yjk2LWU2ZDZjNjU0ZTIyNiIsIm5vbmNlIjoieDRkblh2b0hnYnNpWW5wYyIsInJhdCI6MTUyOTc1MDY2Niwic3ViIjoiZm9vQGJhci5jb20ifQ.qgz3Bqg1uLvpeBdAr7Yk9wVBtOnQmQVvLQU5jgFavYqL9BPbPN-ALzM6P-1rEWTV8vSES8-Q3Ax2XwRD9F43tNGlZL5n0UApUiRbKDalVlQNoOfzW5c3WZL-Iv3yKmnSPKSqJbucBznSfbQ6ewDTxmOIFhO3hM5DTyyH1Mxu2ETdAEK92xTI6YXrYlHLVhw0eq1wdhsb-VH8yH8te4MPKMuXdIe5bxZn5fZfmY1xCKyyOBXNT8VfDTHCAC8BrFCfsGKhf6FsblqCb1BZtpfKpS1qITgNBGS7FtpfBhc0HoC2UcAvlGSVFsOohrXCag4KUYQrtJrNaDK32uVMlrFetJJ7Ap3saIH8vsHi4P1pFGdel6VBMsvgWopWvnwFGjNlg7kJzh3i8vWo-VG9_4d1-0aVrwmQCQzKbVU3j8UA7ydeSnYePTz2EalALlpR5XGRxC1g9RHiePN5BmRi6I7L1JBslYPhuBIn1zbE9vIfLO8gCcBSSnCY4-nsJId3WwL8QJwcXp57ib0bE7lvGg4xrGemfKiR-xZzUXnEG9yNP4sJ-FlVwz0cHudDBVy8JcOsnf6s10-235penDzUEdX7c65XGz3G6XpCkyxWJaeZlJdy9ciKq1x7UavfvS1BnoHNsiY4d38awE6FlFhip0EE-MGNpfR7-1KesVfijsKWarc', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': '2OyFz89sXpFPwHlBlHcJVMALxh7-HrJCSj2Kqy5DTB4.HdnQTD7UrhmjfFDXegNb7sI2raK0DfGWSRzReAqWnXM', 'scope': 'openid'}
2.544 AccessTokenResponse {
"access_token": "2OyFz89sXpFPwHlBlHcJVMALxh7-HrJCSj2Kqy5DTB4.HdnQTD7UrhmjfFDXegNb7sI2raK0DfGWSRzReAqWnXM",
"expires_in": 3599,
"id_token": {
"aud": [
"d5949b53-660c-4eeb-a850-068c67a74469"
],
"auth_time": 1529750592,
"exp": 1529754268,
"iat": 1529750668,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "2c7761ac-59f6-4a7e-8b96-e6d6c654e226",
"nonce": "x4dnXvoHgbsiYnpc",
"rat": 1529750666,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
2.545 phase <--<-- 5 --- Done -->-->
2.545 end
2.545 assertion VerifyResponse
2.545 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.545 assertion VerifySignedIdToken
2.545 condition verify-idtoken-is-signed: status=OK [Verifies that an ID Token is signed]
2.546 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-idtoken-is-signed: status=OK [Verifies that an ID Token is signed]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Registration-Sector-Bad.txt 0000644 0000000 0000000 00000013160 13313422121 016612 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-Sector-Bad
Test description: Incorrect registration of sector_identifier_uri
Timestamp: 2018-06-23T10:43:29Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Registration -->-->
0.075 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'sector_identifier_uri': 'https://op.certification.openid.net:61353/export/siu.json', 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.075 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#pgLJVctDVerylLpy"
],
"response_types": [
"code"
],
"sector_identifier_uri": "https://op.certification.openid.net:61353/export/siu.json"
}
0.306 http response url:https://oidc-certification.ory.sh:8443/clients status_code:400 message:{"error":"invalid_request","error_description":"The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed","error_hint":"Make sure that the various parameters are correct, be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.","status_code":400,"error_debug":"Redirect URL \"https://op.certification.openid.net:61353/authz_cb\" does not match values from sector_identifier_uri."}
0.307 ErrorResponse {
"error": "invalid_request",
"error_debug": "Redirect URL \"https://op.certification.openid.net:61353/authz_cb\" does not match values from sector_identifier_uri.",
"error_description": "The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed",
"error_hint": "Make sure that the various parameters are correct, be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.",
"status_code": 400
}
0.307 exception RegistrationError:{'error_debug': 'Redirect URL "https://op.certification.openid.net:61353/authz_cb" does not match values from sector_identifier_uri.', 'error_description': 'The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed', 'status_code': 400, 'error': 'invalid_request', 'error_hint': 'Make sure that the various parameters are correct, be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.'}
0.307 event got expected exception RegistrationError
0.307 phase <--<-- 3 --- Done -->-->
0.307 end
0.307 condition Done: status=OK
============================================================
Conditions
Done: status=OK
============================================================
RESULT: PASSED
./OP-display-popup.txt 0000644 0000000 0000000 00000014355 13313422306 015041 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-display-popup
Test description: Request with display=popup
Timestamp: 2018-06-23T10:45:26Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.129 phase <--<-- 1 --- Webfinger -->-->
1.129 not expected to do WebFinger
1.13 phase <--<-- 2 --- Discovery -->-->
1.13 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.204 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.205 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.205 phase <--<-- 3 --- Registration -->-->
1.206 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.206 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#sFV83q2g4CcNZYgN"
],
"response_types": [
"code"
]
}
1.366 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.367 RegistrationResponse {
"client_id": "fdcfa78e-4dc5-43bf-9646-63083604c42a",
"client_secret": "qiF3s_DWSIcy",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "fdcfa78e-4dc5-43bf-9646-63083604c42a",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#sFV83q2g4CcNZYgN"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.367 phase <--<-- 4 --- AsyncAuthn -->-->
1.368 AuthorizationRequest {
"client_id": "fdcfa78e-4dc5-43bf-9646-63083604c42a",
"display": "popup",
"nonce": "Zh3sLaPYEccBfrmF",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "zoP7AW4A6y52PKyr"
}
1.368 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=fdcfa78e-4dc5-43bf-9646-63083604c42a&state=zoP7AW4A6y52PKyr&response_type=code&nonce=Zh3sLaPYEccBfrmF&display=popup
1.368 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=fdcfa78e-4dc5-43bf-9646-63083604c42a&state=zoP7AW4A6y52PKyr&response_type=code&nonce=Zh3sLaPYEccBfrmF&display=popup
3.83 response Response URL with query part
3.831 response {'state': 'zoP7AW4A6y52PKyr', 'scope': 'openid', 'code': '6EDv7AOo28h3V5KicwJekf0YWZdGFFJjdmeZ1AA2E2A.aogVGCd522_sIjW2ZZbxX6ViZsF6iU5ntEEzvm-t-Co'}
3.831 response {'state': 'zoP7AW4A6y52PKyr', 'scope': 'openid', 'code': '6EDv7AOo28h3V5KicwJekf0YWZdGFFJjdmeZ1AA2E2A.aogVGCd522_sIjW2ZZbxX6ViZsF6iU5ntEEzvm-t-Co'}
3.831 AuthorizationResponse {
"code": "6EDv7AOo28h3V5KicwJekf0YWZdGFFJjdmeZ1AA2E2A.aogVGCd522_sIjW2ZZbxX6ViZsF6iU5ntEEzvm-t-Co",
"scope": "openid",
"state": "zoP7AW4A6y52PKyr"
}
3.831 phase <--<-- 5 --- Done -->-->
3.831 end
3.832 assertion VerifyResponse
3.832 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.832 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-nonce-NoReq-code.txt 0000644 0000000 0000000 00000014111 13313422312 015252 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-nonce-NoReq-code
Test description: Login no nonce, code flow [Basic]
Timestamp: 2018-06-23T10:45:30Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.088 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.089 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.09 phase <--<-- 2 --- Registration -->-->
0.09 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.09 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#u7laEba6aRPu3CO3"
],
"response_types": [
"code"
]
}
0.244 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.245 RegistrationResponse {
"client_id": "eb73d30c-23c0-4438-b38a-3d43aea4fa70",
"client_secret": "GG8q4Nc6i2bv",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "eb73d30c-23c0-4438-b38a-3d43aea4fa70",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#u7laEba6aRPu3CO3"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.245 phase <--<-- 3 --- AsyncAuthn -->-->
0.245 AuthorizationRequest {
"client_id": "eb73d30c-23c0-4438-b38a-3d43aea4fa70",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "3bJSWLUyoOqqIo3I"
}
0.246 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?state=3bJSWLUyoOqqIo3I&scope=openid&response_type=code&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=eb73d30c-23c0-4438-b38a-3d43aea4fa70
0.246 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?state=3bJSWLUyoOqqIo3I&scope=openid&response_type=code&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=eb73d30c-23c0-4438-b38a-3d43aea4fa70
2.421 response Response URL with query part
2.421 response {'state': '3bJSWLUyoOqqIo3I', 'scope': 'openid', 'code': 'kYKzpZfqgngmmLJoGSOiAh3KQ3lQ4queP480yoTgjkE.3Rve3DXCqo7FJ5df78k-hqNSGisBq59xcVajvel1kew'}
2.422 response {'state': '3bJSWLUyoOqqIo3I', 'scope': 'openid', 'code': 'kYKzpZfqgngmmLJoGSOiAh3KQ3lQ4queP480yoTgjkE.3Rve3DXCqo7FJ5df78k-hqNSGisBq59xcVajvel1kew'}
2.422 AuthorizationResponse {
"code": "kYKzpZfqgngmmLJoGSOiAh3KQ3lQ4queP480yoTgjkE.3Rve3DXCqo7FJ5df78k-hqNSGisBq59xcVajvel1kew",
"scope": "openid",
"state": "3bJSWLUyoOqqIo3I"
}
2.422 phase <--<-- 4 --- Done -->-->
2.422 end
2.423 assertion VerifyResponse
2.423 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.423 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-redirect_uri-RegFrag.txt 0000644 0000000 0000000 00000011526 13313422436 016227 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-RegFrag
Test description: Reject registration where a redirect_uri has a fragment
Timestamp: 2018-06-23T10:46:54Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.072 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Registration -->-->
0.074 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb#foobar'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.074 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb#foobar"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#dzxLL2yTZHS9OrlH"
],
"response_types": [
"code"
]
}
0.179 http response url:https://oidc-certification.ory.sh:8443/clients status_code:400 message:{"error":"invalid_request","error_description":"The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed","error_hint":"Redirect URIs must not contain fragments (#)","status_code":400}
0.18 ErrorResponse {
"error": "invalid_request",
"error_description": "The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed",
"error_hint": "Redirect URIs must not contain fragments (#)",
"status_code": 400
}
0.18 exception RegistrationError:{'error_description': 'The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed', 'status_code': 400, 'error': 'invalid_request', 'error_hint': 'Redirect URIs must not contain fragments (#)'}
0.18 event got expected exception RegistrationError
0.18 phase <--<-- 3 --- Done -->-->
0.18 end
0.181 assertion VerifyErrorMessage
0.181 condition verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
0.181 condition Done: status=OK
============================================================
Conditions
verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-OAuth-2nd.txt 0000644 0000000 0000000 00000030515 13313422725 013735 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-OAuth-2nd
Test description: Trying to use authorization code twice should result in an error
Timestamp: 2018-06-23T10:49:57Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.083 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.085 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.085 phase <--<-- 2 --- Registration -->-->
0.085 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.085 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#FL581Lz6aG6iwVOy"
],
"response_types": [
"code"
]
}
0.242 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.243 RegistrationResponse {
"client_id": "d082c01c-91c4-49df-aa46-33b71608ad1e",
"client_secret": "Ra1Zab_HDS8j",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "d082c01c-91c4-49df-aa46-33b71608ad1e",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#FL581Lz6aG6iwVOy"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.243 phase <--<-- 3 --- Note -->-->
1.421 phase <--<-- 4 --- AsyncAuthn -->-->
1.421 AuthorizationRequest {
"client_id": "d082c01c-91c4-49df-aa46-33b71608ad1e",
"nonce": "yEeKuZL8WoGk8s9H",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "fUctXcDznly6yE0o"
}
1.421 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=d082c01c-91c4-49df-aa46-33b71608ad1e&state=fUctXcDznly6yE0o&response_type=code&nonce=yEeKuZL8WoGk8s9H
1.421 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=d082c01c-91c4-49df-aa46-33b71608ad1e&state=fUctXcDznly6yE0o&response_type=code&nonce=yEeKuZL8WoGk8s9H
4.004 response Response URL with query part
4.005 response {'state': 'fUctXcDznly6yE0o', 'scope': 'openid', 'code': 'oen54vVB1bj-8vrWP3SR1k1hYRrWOr02M-3OtG4b6LQ.quyUhmTNeYRXtwZTLuTG8eZr3saYIjbKVM0HhCKH3f8'}
4.005 response {'state': 'fUctXcDznly6yE0o', 'scope': 'openid', 'code': 'oen54vVB1bj-8vrWP3SR1k1hYRrWOr02M-3OtG4b6LQ.quyUhmTNeYRXtwZTLuTG8eZr3saYIjbKVM0HhCKH3f8'}
4.005 AuthorizationResponse {
"code": "oen54vVB1bj-8vrWP3SR1k1hYRrWOr02M-3OtG4b6LQ.quyUhmTNeYRXtwZTLuTG8eZr3saYIjbKVM0HhCKH3f8",
"scope": "openid",
"state": "fUctXcDznly6yE0o"
}
4.005 phase <--<-- 5 --- AccessToken -->-->
4.006 --> request op_args: {'state': 'fUctXcDznly6yE0o'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
4.006 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'fUctXcDznly6yE0o', 'code': 'oen54vVB1bj-8vrWP3SR1k1hYRrWOr02M-3OtG4b6LQ.quyUhmTNeYRXtwZTLuTG8eZr3saYIjbKVM0HhCKH3f8', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'd082c01c-91c4-49df-aa46-33b71608ad1e'}, 'state': 'fUctXcDznly6yE0o'}
4.006 AccessTokenRequest {
"code": "oen54vVB1bj-8vrWP3SR1k1hYRrWOr02M-3OtG4b6LQ.quyUhmTNeYRXtwZTLuTG8eZr3saYIjbKVM0HhCKH3f8",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "fUctXcDznly6yE0o"
}
4.006 request_url https://oidc-certification.ory.sh:8443/oauth2/token
4.006 request_http_args {'headers': {'Authorization': 'Basic ZDA4MmMwMWMtOTFjNC00OWRmLWFhNDYtMzNiNzE2MDhhZDFlOlJhMVphYl9IRFM4ag==', 'Content-Type': 'application/x-www-form-urlencoded'}}
4.006 request code=oen54vVB1bj-8vrWP3SR1k1hYRrWOr02M-3OtG4b6LQ.quyUhmTNeYRXtwZTLuTG8eZr3saYIjbKVM0HhCKH3f8&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=fUctXcDznly6yE0o
4.217 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
4.218 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZDA4MmMwMWMtOTFjNC00OWRmLWFhNDYtMzNiNzE2MDhhZDFlIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiZXhwIjoxNTI5NzU0NTk2LCJpYXQiOjE1Mjk3NTA5OTcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjIyNTkxNDMyLThhZjQtNGQzMy05ZTc3LTA0ZTg5ZjIxZjg3OSIsIm5vbmNlIjoieUVlS3VaTDhXb0drOHM5SCIsInJhdCI6MTUyOTc1MDk5NCwic3ViIjoiZm9vQGJhci5jb20ifQ.zYM76KEEBI9ExJlVNFalJrXgliJ0JIhNSJhHENueOFx4sT4jL2xnKrUGh5XyMeDZLM9QdkSgLpg3KyzcB7UsNigw5A_76E80rHDSJLmE80nJJ96_ljLm0Jgf0Wh8uJusdBDQDipTEKAlO_Yq7Zi3IlPY6tZ2bJwM4L5HYZV7aEjTOnJgoXeUqxSmj4JKLkdpQb-n1TvHH3lj-epCLwlEwRjzvTo5o-Tnsr9_RYr2RCVjplRtFKCs2VTPY5yOsY4KdEn5r_N_aPpJQuTtShOjkNFXovxbQIq-hB3VtEWFA5kJ-Q0_SeF--uA_pLr4KmikbfNQwp_TE1_6ultiPZLiLAOOxvRQobM2Bybfkb2Uk7cQKPVfn6669BJJSLXhxP7KZfhD578TU2e0uZdxrMhwgStP1FvwWR63McFNxWFn1cKsRUplV6N8qZmGGiFtwTZUNmRsS04oSQxGSjbAXbg-Tcs5aBfBcgemBf5OjjP4tf9PKRRwwz5tLIkUuXUHENGfRskczsBF2UEGkI6J4-imHNu3KEyU83FarDidHQpom929bfq6vptrrvrulaR9zRkpzOsaZIWIlOU-p1Z3SYT7ZpDgHqIeVkrLwsoairipKHfXxLQkflVlK2OTUT3hyqmujm6QHkkbCAeenV5YSwtAcIVtRxoaxAVVn-IuwwKx0QY', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'jKnTPzMdvcxFXMJNUr2lsP_bAOO0F3RRIftv-RZetK8.JINGTI8dGGa1s2uAvA_a1rZxUXZmZYJJbvvqh6iFSIc', 'scope': 'openid'}
4.306 AccessTokenResponse {
"access_token": "jKnTPzMdvcxFXMJNUr2lsP_bAOO0F3RRIftv-RZetK8.JINGTI8dGGa1s2uAvA_a1rZxUXZmZYJJbvvqh6iFSIc",
"expires_in": 3599,
"id_token": {
"aud": [
"d082c01c-91c4-49df-aa46-33b71608ad1e"
],
"auth_time": 1529750975,
"exp": 1529754596,
"iat": 1529750997,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "22591432-8af4-4d33-9e77-04e89f21f879",
"nonce": "yEeKuZL8WoGk8s9H",
"rat": 1529750994,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
4.306 phase <--<-- 6 --- AccessToken -->-->
4.306 --> request op_args: {'state': 'fUctXcDznly6yE0o'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
4.306 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'fUctXcDznly6yE0o', 'code': 'oen54vVB1bj-8vrWP3SR1k1hYRrWOr02M-3OtG4b6LQ.quyUhmTNeYRXtwZTLuTG8eZr3saYIjbKVM0HhCKH3f8', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'd082c01c-91c4-49df-aa46-33b71608ad1e'}, 'state': 'fUctXcDznly6yE0o'}
4.307 AccessTokenRequest {
"code": "oen54vVB1bj-8vrWP3SR1k1hYRrWOr02M-3OtG4b6LQ.quyUhmTNeYRXtwZTLuTG8eZr3saYIjbKVM0HhCKH3f8",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "fUctXcDznly6yE0o"
}
4.307 request_url https://oidc-certification.ory.sh:8443/oauth2/token
4.307 request_http_args {'headers': {'Authorization': 'Basic ZDA4MmMwMWMtOTFjNC00OWRmLWFhNDYtMzNiNzE2MDhhZDFlOlJhMVphYl9IRFM4ag==', 'Content-Type': 'application/x-www-form-urlencoded'}}
4.307 request code=oen54vVB1bj-8vrWP3SR1k1hYRrWOr02M-3OtG4b6LQ.quyUhmTNeYRXtwZTLuTG8eZr3saYIjbKVM0HhCKH3f8&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=fUctXcDznly6yE0o
4.467 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:400 message:{"error":"invalid_grant","error_description":"The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client","status_code":400,"error_debug":"The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found."}
4.467 response {'error_debug': 'The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found.', 'error_description': 'The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client', 'error': 'invalid_grant', 'status_code': 400}
4.467 event Got expected error
4.468 TokenErrorResponse {
"error": "invalid_grant",
"error_debug": "The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found.",
"error_description": "The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client",
"status_code": 400
}
4.468 phase <--<-- 7 --- Done -->-->
4.468 end
4.468 assertion VerifyResponse
4.468 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.468 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Discovery-JWKs.txt 0000644 0000000 0000000 00000006113 13313422113 015003 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Discovery-JWKs
Test description: Keys in OP JWKs well formed
Timestamp: 2018-06-23T10:43:23Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.108 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.11 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.11 phase <--<-- 2 --- Done -->-->
0.11 end
0.11 assertion CheckHTTPResponse
0.11 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.111 assertion VerifyBase64URL
0.212 http response url:https://oidc-certification.ory.sh:8443/.well-known/jwks.json status_code:200
0.213 condition verify-base64url: status=OK [Verifies that the base64 encoded parts of a JWK is in fact base64url encoded and not just base64 encoded]
0.213 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-base64url: status=OK [Verifies that the base64 encoded parts of a JWK is in fact base64url encoded and not just base64 encoded]
Done: status=OK
============================================================
RESULT: PASSED
./OP-scope-profile.txt 0000644 0000000 0000000 00000027155 13313422505 015005 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-scope-profile
Test description: Scope requesting profile claims
Timestamp: 2018-06-23T10:47:33Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.076 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.078 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.078 phase <--<-- 2 --- Registration -->-->
0.078 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.078 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#tcc6BgTp9FrxyYqN"
],
"response_types": [
"code"
]
}
0.236 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.237 RegistrationResponse {
"client_id": "ee74b2f5-49e7-40f7-b353-b0b8dfbcd3fa",
"client_secret": "Ihw.pkGKulT.",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "ee74b2f5-49e7-40f7-b353-b0b8dfbcd3fa",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#tcc6BgTp9FrxyYqN"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.237 phase <--<-- 3 --- AsyncAuthn -->-->
0.238 condition Check support: status=WARNING, message=No support for: scopes_supported=['profile']
0.238 AuthorizationRequest {
"client_id": "ee74b2f5-49e7-40f7-b353-b0b8dfbcd3fa",
"nonce": "eQScCTUwFg4AGv11",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid profile",
"state": "5v4IYw9xlYe4H7FL"
}
0.238 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+profile&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=ee74b2f5-49e7-40f7-b353-b0b8dfbcd3fa&state=5v4IYw9xlYe4H7FL&response_type=code&nonce=eQScCTUwFg4AGv11
0.238 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+profile&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=ee74b2f5-49e7-40f7-b353-b0b8dfbcd3fa&state=5v4IYw9xlYe4H7FL&response_type=code&nonce=eQScCTUwFg4AGv11
2.233 response Response URL with query part
2.233 response {'state': '5v4IYw9xlYe4H7FL', 'scope': 'openid profile', 'code': 'KuUP72LVCo0fW4dXLrrpTmjV8VlI2MYcTvp6GaK61Rg.bDxB6ts5XofLOxbcm6OGLzELNAQD80tqDO8goNkUbW0'}
2.234 response {'state': '5v4IYw9xlYe4H7FL', 'scope': 'openid profile', 'code': 'KuUP72LVCo0fW4dXLrrpTmjV8VlI2MYcTvp6GaK61Rg.bDxB6ts5XofLOxbcm6OGLzELNAQD80tqDO8goNkUbW0'}
2.234 AuthorizationResponse {
"code": "KuUP72LVCo0fW4dXLrrpTmjV8VlI2MYcTvp6GaK61Rg.bDxB6ts5XofLOxbcm6OGLzELNAQD80tqDO8goNkUbW0",
"scope": "openid profile",
"state": "5v4IYw9xlYe4H7FL"
}
2.234 phase <--<-- 4 --- AccessToken -->-->
2.234 --> request op_args: {'state': '5v4IYw9xlYe4H7FL'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.234 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': '5v4IYw9xlYe4H7FL', 'code': 'KuUP72LVCo0fW4dXLrrpTmjV8VlI2MYcTvp6GaK61Rg.bDxB6ts5XofLOxbcm6OGLzELNAQD80tqDO8goNkUbW0', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'ee74b2f5-49e7-40f7-b353-b0b8dfbcd3fa'}, 'state': '5v4IYw9xlYe4H7FL'}
2.234 AccessTokenRequest {
"code": "KuUP72LVCo0fW4dXLrrpTmjV8VlI2MYcTvp6GaK61Rg.bDxB6ts5XofLOxbcm6OGLzELNAQD80tqDO8goNkUbW0",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "5v4IYw9xlYe4H7FL"
}
2.234 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.234 request_http_args {'headers': {'Authorization': 'Basic ZWU3NGIyZjUtNDllNy00MGY3LWIzNTMtYjBiOGRmYmNkM2ZhOklody5wa0dLdWxULg==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.234 request code=KuUP72LVCo0fW4dXLrrpTmjV8VlI2MYcTvp6GaK61Rg.bDxB6ts5XofLOxbcm6OGLzELNAQD80tqDO8goNkUbW0&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=5v4IYw9xlYe4H7FL
2.449 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.45 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZWU3NGIyZjUtNDllNy00MGY3LWIzNTMtYjBiOGRmYmNkM2ZhIl0sImF1dGhfdGltZSI6MTUyOTc1MDc0OSwiZXhwIjoxNTI5NzU0NDUyLCJpYXQiOjE1Mjk3NTA4NTIsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImU1ZDYwOWYwLTE4MmYtNDk3OC1hZGE1LTc5NjA1NDQ4Zjk2NCIsIm5vbmNlIjoiZVFTY0NUVXdGZzRBR3YxMSIsInJhdCI6MTUyOTc1MDg1MCwic3ViIjoiZm9vQGJhci5jb20ifQ.YhKWpW6tAgcWx1QJgP_bHIC66Mw1wwQLF1U6ERdveq9x1gn25mMoRnQqUZU5tWrQq2wubiwTf4ap_hJ1myhK_R19MW1hUl2lM_fhuJ6_2hS3ArlLtoFPKg4lpRFDf-La0aukCw2Su-HYeN8ON8j6bdyg2wlyfUVAHzkKD9StHxGqG27F59dtxv15TfftTYAkyMHS0qUwTafu6Lamq4D-16iqAhHcUeWxo7hOGGD4z6-PKoKgQg96MejkMl8WlhJ4qw6-uqwgk1QcYKlxzngyfxq2SelEJqytxIElO8-oVP0pAipvhuZdtH_1fTarhs_TJiWP1kll_YtAS2dzZoh1clwzZjDwB4LyX61weE_zlfnuZwFx7_OQ2mCQLGnQon3NLpjSjJu1CUyALggFGYdvAQ4rN6zqduIZt1cw5shtDNA0ylwC6pnRlwvM74wNsGcuIFH_5Q8gFjtBC5chAo-shh8pxEiF0j7xV-fi-q7CMFSZWRAr3iWnnzNuq-PavWjm7fI-OYcMdoFSIp_CJtRbsv9ZW3vmZl0y0D4PBJO0CuMDadmy1odLneQ44QVxZh_WymKa4iC2Wj56-TS1fSspLQKOKdtjyFTyWm4bzVYZL9jPL8wJQP2Y0Y4gQ-xaD_zDOrOPD9lQRTOZ0-lOCf5Yki9awh6m9bdWn7JaM0EYTK8', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'zxfTfPSKKF0SgpFF_nWHy4lErzRNNC9YAk_CC9oGk_M.o_e5AIPL-_RU8b2JeOF1iAR8DdCKuqapabwNVP2J6Y4', 'scope': 'openid profile'}
2.533 AccessTokenResponse {
"access_token": "zxfTfPSKKF0SgpFF_nWHy4lErzRNNC9YAk_CC9oGk_M.o_e5AIPL-_RU8b2JeOF1iAR8DdCKuqapabwNVP2J6Y4",
"expires_in": 3599,
"id_token": {
"aud": [
"ee74b2f5-49e7-40f7-b353-b0b8dfbcd3fa"
],
"auth_time": 1529750749,
"exp": 1529754452,
"iat": 1529750852,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "e5d609f0-182f-4978-ada5-79605448f964",
"nonce": "eQScCTUwFg4AGv11",
"rat": 1529750850,
"sub": "[email protected]"
},
"scope": "openid profile",
"token_type": "bearer"
}
2.533 phase <--<-- 5 --- UserInfo -->-->
2.533 do_user_info_request kwargs:{'state': '5v4IYw9xlYe4H7FL', 'method': 'GET', 'authn_method': 'bearer_header'}
2.533 request {'body': None}
2.533 request_url https://oidc-certification.ory.sh:8443/userinfo
2.533 request_http_args {'headers': {'Authorization': 'Bearer zxfTfPSKKF0SgpFF_nWHy4lErzRNNC9YAk_CC9oGk_M.o_e5AIPL-_RU8b2JeOF1iAR8DdCKuqapabwNVP2J6Y4'}}
2.606 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
2.607 OpenIDSchema {
"sub": "[email protected]"
}
2.607 OpenIDSchema {
"sub": "[email protected]"
}
2.607 phase <--<-- 6 --- Done -->-->
2.607 end
2.607 assertion CheckHTTPResponse
2.607 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
2.608 assertion VerifyResponse
2.608 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.608 assertion VerifyScopes
2.608 condition verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username'] [Verifies that the claims corresponding to the requested scopes are returned]
2.608 condition Done: status=OK
============================================================
Conditions
Check support: status=WARNING, message=No support for: scopes_supported=['profile']
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username'] [Verifies that the claims corresponding to the requested scopes are returned]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
No support for: scopes_supported=['profile']
The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username']
./OP-UserInfo-RS256.txt 0000644 0000000 0000000 00000025203 13313422266 014543 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-UserInfo-RS256
Test description: RP registers userinfo_signed_response_alg to signal that it wants signed UserInfo returned
Timestamp: 2018-06-23T10:45:10Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.092 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.093 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.093 phase <--<-- 2 --- Registration -->-->
0.094 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'userinfo_signed_response_alg': 'RS256'}
0.094 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Ztc7biwTsjlG3fdD"
],
"response_types": [
"code"
],
"userinfo_signed_response_alg": "RS256"
}
0.249 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.25 RegistrationResponse {
"client_id": "da4bd40a-7787-4977-a0c4-fe4a83c590e3",
"client_secret": "wvuX4KT9oOBp",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "da4bd40a-7787-4977-a0c4-fe4a83c590e3",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Ztc7biwTsjlG3fdD"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "RS256"
}
0.25 phase <--<-- 3 --- AsyncAuthn -->-->
0.251 AuthorizationRequest {
"client_id": "da4bd40a-7787-4977-a0c4-fe4a83c590e3",
"nonce": "NCy0gQtufCd5PQsv",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "2MJFLy7CHGvobA3G"
}
0.251 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=da4bd40a-7787-4977-a0c4-fe4a83c590e3&state=2MJFLy7CHGvobA3G&response_type=code&nonce=NCy0gQtufCd5PQsv
0.251 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=da4bd40a-7787-4977-a0c4-fe4a83c590e3&state=2MJFLy7CHGvobA3G&response_type=code&nonce=NCy0gQtufCd5PQsv
2.225 response Response URL with query part
2.225 response {'state': '2MJFLy7CHGvobA3G', 'scope': 'openid', 'code': 'xOw-vY3U5TfJXnVh9yN7wvB3x5EoRcx-9kFayPoIjjE.5IDHzDod24rCpK3mgVTGiPTpYrMuLPDk1owLCXRDtmc'}
2.226 response {'state': '2MJFLy7CHGvobA3G', 'scope': 'openid', 'code': 'xOw-vY3U5TfJXnVh9yN7wvB3x5EoRcx-9kFayPoIjjE.5IDHzDod24rCpK3mgVTGiPTpYrMuLPDk1owLCXRDtmc'}
2.226 AuthorizationResponse {
"code": "xOw-vY3U5TfJXnVh9yN7wvB3x5EoRcx-9kFayPoIjjE.5IDHzDod24rCpK3mgVTGiPTpYrMuLPDk1owLCXRDtmc",
"scope": "openid",
"state": "2MJFLy7CHGvobA3G"
}
2.226 phase <--<-- 4 --- AccessToken -->-->
2.226 --> request op_args: {'state': '2MJFLy7CHGvobA3G'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.226 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': '2MJFLy7CHGvobA3G', 'code': 'xOw-vY3U5TfJXnVh9yN7wvB3x5EoRcx-9kFayPoIjjE.5IDHzDod24rCpK3mgVTGiPTpYrMuLPDk1owLCXRDtmc', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'da4bd40a-7787-4977-a0c4-fe4a83c590e3'}, 'state': '2MJFLy7CHGvobA3G'}
2.226 AccessTokenRequest {
"code": "xOw-vY3U5TfJXnVh9yN7wvB3x5EoRcx-9kFayPoIjjE.5IDHzDod24rCpK3mgVTGiPTpYrMuLPDk1owLCXRDtmc",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "2MJFLy7CHGvobA3G"
}
2.226 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.226 request_http_args {'headers': {'Authorization': 'Basic ZGE0YmQ0MGEtNzc4Ny00OTc3LWEwYzQtZmU0YTgzYzU5MGUzOnd2dVg0S1Q5b09CcA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.226 request code=xOw-vY3U5TfJXnVh9yN7wvB3x5EoRcx-9kFayPoIjjE.5IDHzDod24rCpK3mgVTGiPTpYrMuLPDk1owLCXRDtmc&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=2MJFLy7CHGvobA3G
2.451 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.452 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZGE0YmQ0MGEtNzc4Ny00OTc3LWEwYzQtZmU0YTgzYzU5MGUzIl0sImF1dGhfdGltZSI6MTUyOTc1MDU5MiwiZXhwIjoxNTI5NzU0MzEwLCJpYXQiOjE1Mjk3NTA3MTAsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjMyZWYwNWY1LWM0ZjMtNDIxMi1iMmE5LTExNTExNDY5ODA1MyIsIm5vbmNlIjoiTkN5MGdRdHVmQ2Q1UFFzdiIsInJhdCI6MTUyOTc1MDcwOCwic3ViIjoiZm9vQGJhci5jb20ifQ.t7-Bopt6G9ai7hh5jErVJd9PA3z23u2ZAcudonXC3iKlQq3uiVYHNjrq_ntbv8IOZP9CTuNC_mGDpdbs8O5qW16k0Aj3wirLCda_mh2uaHSZAg3cGCZcdJddrnpaSJDBuf6YJByJQN52iJ05YZKfN4CgZzOKmiKQd9QiUq9eJJlJwH-yqxdWKEJnbbgEgA0UvH5yD35AR0w_swbQedFGWn-V1Qj1-E5U3CqFuON7fa5qw3qWC03Pi5cE99xnbrj39HVzbc9icBtHv4OiAQ60arhM4NoL_0gV6V8NoD_FANdV68u5B9iiz0A5W53AIK3RG1nbgZWMPqBbwsJt2BrEkvEmPthLt9aRrZlQal6xvojGnHWpYaSWWcX2UtIkpocAFaa-8fImqvoUU3uOOxSnicLVM-8hLlt1LLAF3s-vZXSEOt3SqSuDAurPi60D3d18lO0SDd30kmbvuz9NYVI3voE4ba2YHcipuPlKzIN-yIiCWTODlt6KXcFMxCQWNILoTC137KgXoCYyxiqUZv3vd7QWiFD6mJc5tDLfGe6CUyjkYi_IlmmEkRn2e4fR8yT_7kOObNMT_UeodC-3IRdNcjnRA58GgYB_XrQReQhkCBfOOzniCIIdBy4k-rFy43oooRyWBfpi6qXCvwjDbDnmrKAGfcrz7y3zoYPssCwBAlU', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': '49imjZ6rmSX5edbq0ufODE_P6lmvSy168GTdhYwWynU.Hz4S_JToZtIMrZI-kaMunN30jN9VjyvmfPKIo8atT7E', 'scope': 'openid'}
2.539 AccessTokenResponse {
"access_token": "49imjZ6rmSX5edbq0ufODE_P6lmvSy168GTdhYwWynU.Hz4S_JToZtIMrZI-kaMunN30jN9VjyvmfPKIo8atT7E",
"expires_in": 3599,
"id_token": {
"aud": [
"da4bd40a-7787-4977-a0c4-fe4a83c590e3"
],
"auth_time": 1529750592,
"exp": 1529754310,
"iat": 1529750710,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "32ef05f5-c4f3-4212-b2a9-115114698053",
"nonce": "NCy0gQtufCd5PQsv",
"rat": 1529750708,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
2.539 phase <--<-- 5 --- UserInfo -->-->
2.539 do_user_info_request kwargs:{'state': '2MJFLy7CHGvobA3G', 'method': 'GET', 'authn_method': 'bearer_header', 'ctype': 'jwt'}
2.539 request {'body': None}
2.539 request_url https://oidc-certification.ory.sh:8443/userinfo
2.539 request_http_args {'headers': {'Authorization': 'Bearer 49imjZ6rmSX5edbq0ufODE_P6lmvSy168GTdhYwWynU.Hz4S_JToZtIMrZI-kaMunN30jN9VjyvmfPKIo8atT7E'}}
2.67 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
2.674 OpenIDSchema {
"aud": [
"da4bd40a-7787-4977-a0c4-fe4a83c590e3"
],
"iss": "https://oidc-certification.ory.sh:8443/",
"sub": "[email protected]"
}
2.674 OpenIDSchema {
"aud": [
"da4bd40a-7787-4977-a0c4-fe4a83c590e3"
],
"iss": "https://oidc-certification.ory.sh:8443/",
"sub": "[email protected]"
}
2.674 phase <--<-- 6 --- Done -->-->
2.674 end
2.675 assertion VerifyResponse
2.675 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.675 assertion CheckAsymSignedUserInfo
2.675 condition asym-signed-userinfo: status=OK [Verifies that the UserInfo was signed with a RSA key]
2.675 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
asym-signed-userinfo: status=OK [Verifies that the UserInfo was signed with a RSA key]
Done: status=OK
============================================================
RESULT: PASSED
./OP-UserInfo-Body.txt 0000644 0000000 0000000 00000024105 13313422245 014654 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-UserInfo-Body
Test description: UserInfo Endpoint access with POST and bearer body
Timestamp: 2018-06-23T10:44:54Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.075 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.076 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.076 phase <--<-- 2 --- Registration -->-->
0.076 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.077 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#CN4s4BIc0vrzjlqu"
],
"response_types": [
"code"
]
}
0.269 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.27 RegistrationResponse {
"client_id": "23fe7a9e-36ec-48be-8eb4-69769144093e",
"client_secret": "qTPBRtqBGWQj",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "23fe7a9e-36ec-48be-8eb4-69769144093e",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#CN4s4BIc0vrzjlqu"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.27 phase <--<-- 3 --- AsyncAuthn -->-->
0.271 AuthorizationRequest {
"client_id": "23fe7a9e-36ec-48be-8eb4-69769144093e",
"nonce": "8JSArgkq5bDA8TYy",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "55wA3cTDwiw71zfG"
}
0.271 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=23fe7a9e-36ec-48be-8eb4-69769144093e&state=55wA3cTDwiw71zfG&response_type=code&nonce=8JSArgkq5bDA8TYy
0.271 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=23fe7a9e-36ec-48be-8eb4-69769144093e&state=55wA3cTDwiw71zfG&response_type=code&nonce=8JSArgkq5bDA8TYy
3.044 response Response URL with query part
3.044 response {'state': '55wA3cTDwiw71zfG', 'scope': 'openid', 'code': 'YlXoApyliGDYrTYk3-xRug2cQtLYjmk8NWlZMwn1SdE.qRH358g22a2csGVt-wk6UhrhBd3u2GNMloOF6bH93vs'}
3.044 response {'state': '55wA3cTDwiw71zfG', 'scope': 'openid', 'code': 'YlXoApyliGDYrTYk3-xRug2cQtLYjmk8NWlZMwn1SdE.qRH358g22a2csGVt-wk6UhrhBd3u2GNMloOF6bH93vs'}
3.045 AuthorizationResponse {
"code": "YlXoApyliGDYrTYk3-xRug2cQtLYjmk8NWlZMwn1SdE.qRH358g22a2csGVt-wk6UhrhBd3u2GNMloOF6bH93vs",
"scope": "openid",
"state": "55wA3cTDwiw71zfG"
}
3.045 phase <--<-- 4 --- AccessToken -->-->
3.045 --> request op_args: {'state': '55wA3cTDwiw71zfG'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.045 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': '55wA3cTDwiw71zfG', 'code': 'YlXoApyliGDYrTYk3-xRug2cQtLYjmk8NWlZMwn1SdE.qRH358g22a2csGVt-wk6UhrhBd3u2GNMloOF6bH93vs', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '23fe7a9e-36ec-48be-8eb4-69769144093e'}, 'state': '55wA3cTDwiw71zfG'}
3.045 AccessTokenRequest {
"code": "YlXoApyliGDYrTYk3-xRug2cQtLYjmk8NWlZMwn1SdE.qRH358g22a2csGVt-wk6UhrhBd3u2GNMloOF6bH93vs",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "55wA3cTDwiw71zfG"
}
3.045 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.045 request_http_args {'headers': {'Authorization': 'Basic MjNmZTdhOWUtMzZlYy00OGJlLThlYjQtNjk3NjkxNDQwOTNlOnFUUEJSdHFCR1dRag==', 'Content-Type': 'application/x-www-form-urlencoded'}}
3.045 request code=YlXoApyliGDYrTYk3-xRug2cQtLYjmk8NWlZMwn1SdE.qRH358g22a2csGVt-wk6UhrhBd3u2GNMloOF6bH93vs&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=55wA3cTDwiw71zfG
3.275 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.276 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMjNmZTdhOWUtMzZlYy00OGJlLThlYjQtNjk3NjkxNDQwOTNlIl0sImF1dGhfdGltZSI6MTUyOTc1MDU5MiwiZXhwIjoxNTI5NzU0MjkzLCJpYXQiOjE1Mjk3NTA2OTMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImExNGYwYmVjLTY5N2YtNGUwMC05NzJhLTQ3YTM0M2ExYmFlYyIsIm5vbmNlIjoiOEpTQXJna3E1YkRBOFRZeSIsInJhdCI6MTUyOTc1MDY5MSwic3ViIjoiZm9vQGJhci5jb20ifQ.OGONV5FRSqkX1mbRXpPELAkhViP4jSZkchX5EpdH7MNqt6LS6UTVKKMjOWl3CZ2gxO0vA6oY8FlpuBvsCvzVEZUgx8u25Mpse7ivWKZJqN8nPCFMWQCvDPdPWFCGlsv2DbsuN2HXjpnb_1pCcUkBAw41ff6FCGnfhywZVEeDLJBZui54vo8BDmmI0u9RACg1AYOYLPA5ZknHjp8yAAoXioLxy9_UFf4rMtMiMMowuImU1fK-YB_s-ibN5pliBxbnCi5HyGQYIxYDXNd2r2mgzTOYki7g6etf3fbimeUs6VVAbLDKxFvoOCdS_FdVNpnqyE2GD4YXn3pmi4Usa66xotaHuBqBV2K_lAvq3G7weoE9PsGFcI2oZIkiOFuLFGi7TMOYRVLc44iWltM_xyEHhNIcZhWzvHbwGLX2MXmmTm2RCHy6pON7pPO_CzkcgCDBZ7CaeF9gMYOeeeK7enZLRVNPX8dWndWwQ03mU7-ZKpR5aKneG--wch2XCW4NsD_VgjJfKN4t15C-qL1O-HE3kals76i8LqiuhB07p52Fnkmxljn7sVepOuepZ3hnNfhGPAudmqp_ic-ENWT2nrZTxsQz9xiwfAonPOFxCrOUHKUxWLQznNcxVjausWVtCCyZBMG2I324BLY2FI_o16G2vcfnJL2QPFZ_uGHTw6yYT6E', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'J26bERU5tBLxOLxoMlN3rry8S7q_eR8PHTGMRxD1Ovg.PgWCiK8aHQh2B22Gk2jCBOTHM64oI5RwoUOT6HBJyn8', 'scope': 'openid'}
3.358 AccessTokenResponse {
"access_token": "J26bERU5tBLxOLxoMlN3rry8S7q_eR8PHTGMRxD1Ovg.PgWCiK8aHQh2B22Gk2jCBOTHM64oI5RwoUOT6HBJyn8",
"expires_in": 3599,
"id_token": {
"aud": [
"23fe7a9e-36ec-48be-8eb4-69769144093e"
],
"auth_time": 1529750592,
"exp": 1529754293,
"iat": 1529750693,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "a14f0bec-697f-4e00-972a-47a343a1baec",
"nonce": "8JSArgkq5bDA8TYy",
"rat": 1529750691,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.359 phase <--<-- 5 --- UserInfo -->-->
3.359 do_user_info_request kwargs:{'state': '55wA3cTDwiw71zfG', 'method': 'POST', 'authn_method': 'token_in_message_body'}
3.359 request {'body': 'access_token=J26bERU5tBLxOLxoMlN3rry8S7q_eR8PHTGMRxD1Ovg.PgWCiK8aHQh2B22Gk2jCBOTHM64oI5RwoUOT6HBJyn8'}
3.359 request_url https://oidc-certification.ory.sh:8443/userinfo
3.359 request_http_args {'headers': {'Content-Type': 'application/x-www-form-urlencoded'}}
3.439 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
3.439 OpenIDSchema {
"sub": "[email protected]"
}
3.439 OpenIDSchema {
"sub": "[email protected]"
}
3.439 phase <--<-- 6 --- Done -->-->
3.44 end
3.44 assertion VerifyResponse
3.44 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.44 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-redirect_uri-Query-Mismatch.txt 0000644 0000000 0000000 00000011122 13313422421 017544 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-Query-Mismatch
Test description: Rejects redirect_uri when query parameter does not match what is registed
Timestamp: 2018-06-23T10:46:41Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Registration -->-->
0.075 register kwargs:{'application_name': 'OIC test tool', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'redirect_uri': ['https://op.certification.openid.net:61353/authz_cb?foo=bar']}
0.075 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#LtySycnhFcGnHiXR"
],
"response_types": [
"code"
]
}
0.236 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.237 RegistrationResponse {
"client_id": "ecb012c6-512d-4236-b362-a17e856e054f",
"client_secret": "xjeZZSzBwdMu",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "ecb012c6-512d-4236-b362-a17e856e054f",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#LtySycnhFcGnHiXR"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.237 phase <--<-- 3 --- Note -->-->
============================================================
Conditions
============================================================
RESULT: PARTIAL RESULT
./OP-ClientAuth-SecretPost-Dynamic.txt 0000644 0000000 0000000 00000023346 13313422237 017751 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-ClientAuth-SecretPost-Dynamic
Test description: Access token request with client_secret_post authentication
Timestamp: 2018-06-23T10:44:47Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.109 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.11 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.11 phase <--<-- 2 --- Registration -->-->
0.11 register kwargs:{'application_name': 'OIC test tool', 'token_endpoint_auth_method': 'client_secret_post', 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'response_types': ['code'], 'url': 'https://oidc-certification.ory.sh:8443/clients', 'application_type': 'web'}
0.111 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#poWXZDCsCiLPxp5X"
],
"response_types": [
"code"
],
"token_endpoint_auth_method": "client_secret_post"
}
0.265 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.266 RegistrationResponse {
"client_id": "fa7e3e69-4c47-4bd6-a85e-e631eb5f370e",
"client_secret": "XJHCjQFO4huZ",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "fa7e3e69-4c47-4bd6-a85e-e631eb5f370e",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#poWXZDCsCiLPxp5X"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_post",
"userinfo_signed_response_alg": "none"
}
0.266 phase <--<-- 3 --- AsyncAuthn -->-->
0.267 AuthorizationRequest {
"client_id": "fa7e3e69-4c47-4bd6-a85e-e631eb5f370e",
"nonce": "IEifmKIFyjEpAt2h",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "iQgoWHDARhVIYd3N"
}
0.267 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=fa7e3e69-4c47-4bd6-a85e-e631eb5f370e&state=iQgoWHDARhVIYd3N&response_type=code&nonce=IEifmKIFyjEpAt2h
0.267 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=fa7e3e69-4c47-4bd6-a85e-e631eb5f370e&state=iQgoWHDARhVIYd3N&response_type=code&nonce=IEifmKIFyjEpAt2h
3.303 response Response URL with query part
3.303 response {'state': 'iQgoWHDARhVIYd3N', 'scope': 'openid', 'code': 'aarGe7yRXxpiaMYLFg15pSt1pC5nyb9PcQ_bhzTdBjo.lhA4be3O4jDEPpIi0ZzSm6mWbQuyW2iFL5L-ib1sBkE'}
3.304 response {'state': 'iQgoWHDARhVIYd3N', 'scope': 'openid', 'code': 'aarGe7yRXxpiaMYLFg15pSt1pC5nyb9PcQ_bhzTdBjo.lhA4be3O4jDEPpIi0ZzSm6mWbQuyW2iFL5L-ib1sBkE'}
3.304 AuthorizationResponse {
"code": "aarGe7yRXxpiaMYLFg15pSt1pC5nyb9PcQ_bhzTdBjo.lhA4be3O4jDEPpIi0ZzSm6mWbQuyW2iFL5L-ib1sBkE",
"scope": "openid",
"state": "iQgoWHDARhVIYd3N"
}
3.304 phase <--<-- 4 --- AccessToken -->-->
3.304 --> request op_args: {'state': 'iQgoWHDARhVIYd3N', 'authn_method': 'client_secret_post'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.304 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'iQgoWHDARhVIYd3N', 'code': 'aarGe7yRXxpiaMYLFg15pSt1pC5nyb9PcQ_bhzTdBjo.lhA4be3O4jDEPpIi0ZzSm6mWbQuyW2iFL5L-ib1sBkE', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'fa7e3e69-4c47-4bd6-a85e-e631eb5f370e'}, 'state': 'iQgoWHDARhVIYd3N', 'authn_method': 'client_secret_post'}
3.305 AccessTokenRequest {
"client_id": "fa7e3e69-4c47-4bd6-a85e-e631eb5f370e",
"client_secret": "XJHCjQFO4huZ",
"code": "aarGe7yRXxpiaMYLFg15pSt1pC5nyb9PcQ_bhzTdBjo.lhA4be3O4jDEPpIi0ZzSm6mWbQuyW2iFL5L-ib1sBkE",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "iQgoWHDARhVIYd3N"
}
3.305 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.305 request_http_args {'headers': {'Content-Type': 'application/x-www-form-urlencoded'}}
3.305 request code=aarGe7yRXxpiaMYLFg15pSt1pC5nyb9PcQ_bhzTdBjo.lhA4be3O4jDEPpIi0ZzSm6mWbQuyW2iFL5L-ib1sBkE&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=fa7e3e69-4c47-4bd6-a85e-e631eb5f370e&grant_type=authorization_code&state=iQgoWHDARhVIYd3N&client_secret=XJHCjQFO4huZ
3.516 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.517 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZmE3ZTNlNjktNGM0Ny00YmQ2LWE4NWUtZTYzMWViNWYzNzBlIl0sImF1dGhfdGltZSI6MTUyOTc1MDU5MiwiZXhwIjoxNTI5NzU0Mjg2LCJpYXQiOjE1Mjk3NTA2ODcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImIyM2E2YTNkLWNlZWItNDhlOS1hZTQ5LWI1OTkyMjc4MDJiMiIsIm5vbmNlIjoiSUVpZm1LSUZ5akVwQXQyaCIsInJhdCI6MTUyOTc1MDY4NCwic3ViIjoiZm9vQGJhci5jb20ifQ.kjOYWeGnPnvxLIY9-9C5zz6efn7eojl0FSfXF7lNVN4cmnC1fxd48bFmLSnQcpPVm0W-YVc7tBv2K3_mUn1zU-yhzpwgSgMAIjPZPdt8YN2bq6IeRclN0sowEJg4jycxpJoph-dlgfc8CwoRbpnKxJ7uwFySg6BidVtrsPpV-MiH9nzvq4jA5K-kAAnWXPQzvIkQsihHKphXuZnLMZ5bWyQUZEVgY1YrFoUYFxD0-3Hr-dx6-Zc0QsTiWPLXknqkJoS9Jxj7SmamMUydC89VRKM4V2_R8ggy1P70IxrrVIIBR64uis0Tw-tcwQxvSHLxE9fkix4wiV5ZR2JAbsLYnI3GcQ5a4dhutfeG_Bh_gZGU57oevpK-UJ6EjeznoKYd22NDA4uuG6DZ4kmIlhMuVyYLP6398uSJ9Yr0hSucL990CVQVuROQIC6rexonpVjCIRjghLoAN_t9VMD1Xolhj9DC9Fg_qw1C70Mt3dzQdpdHHzFbQOON1EQWzY9E1MEjXaHBrwNhPXvSqxvprbU-3ffzbFwR-xYh8zH7GmtjiAC45SQBszfjD2aiSuEm65JYHLuJ1vH21q9MFvq3VAEVZoapmE0wRykpifi29ycdhltnSxZodtLxN4K19pQh6YKa9jsAizaz_4gMnH17MQHrw1aPXuyNU4dUyTINXeOiHXs', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'RR093LmuXffnh3U_kyzJ7VH8bsLqsMPTzUENPj6fJ1A.GARSHaWDXwLTzlWsqJsgezglRIKJz0LSl9nL8LXYiH0', 'scope': 'openid'}
3.63 AccessTokenResponse {
"access_token": "RR093LmuXffnh3U_kyzJ7VH8bsLqsMPTzUENPj6fJ1A.GARSHaWDXwLTzlWsqJsgezglRIKJz0LSl9nL8LXYiH0",
"expires_in": 3599,
"id_token": {
"aud": [
"fa7e3e69-4c47-4bd6-a85e-e631eb5f370e"
],
"auth_time": 1529750592,
"exp": 1529754286,
"iat": 1529750687,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "b23a6a3d-ceeb-48e9-ae49-b599227802b2",
"nonce": "IEifmKIFyjEpAt2h",
"rat": 1529750684,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.63 phase <--<-- 5 --- Done -->-->
3.63 end
3.631 assertion VerifyResponse
3.631 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.631 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Registration-jwks.txt 0000644 0000000 0000000 00000037433 13313422125 015662 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-jwks
Test description: Uses keys registered with jwks value
Timestamp: 2018-06-23T10:43:33Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.092 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.093 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.093 phase <--<-- 2 --- Registration -->-->
0.094 register kwargs:{'application_name': 'OIC test tool', 'jwks': {'keys': [{'use': 'enc', 'kty': 'RSA', 'n': 'pKXuY5tuT9ibmEcq4B6VRx3MafdSsajrOndAk5FjJFedlA6qSpdqDUr9wWUkNeO8h_efdLfg43CHXk3mH6Fp1t2gbHzBQ4-SzT3_X5tsdG2PPqvngem7f5NHO6Kefhq11Zk5q4-FyTL9FUQQW6ZANbrU7GifSAs82Ck20ciIvFdv7cPCphk_THMVv14aW5w0eKEXumgx4Bc7HrQFXQUHSze3dVAKg8hKHDIQOGUU0fkolEFmOC4Gb-G57RpBJryZxXqgdUdEG66xl1f37tqpYgaLViFDWDiI8S7BMVHEbGHN4-f_MD9f6gMduaxrL6a6SfyIW1So2VqtvlAyanesTw', 'e': 'AQAB', 'kid': 'gtH4v3Yr2QqLreBSz0ByQQ8vkf8eFo1KIit3s-3Bbww'}, {'use': 'sig', 'kty': 'RSA', 'n': '1Z8lhYNb0tHZsVrzIQs-JetNCLIBWeOHXblcirxQgFLt6z4Rr-9vxPbEsrmRmZbPuuoL8nGehqOK11LAgqa1QfCR4TKxr2srlbTv4A4Gyf-suhO_KKt0JWv2q9olREZcoIE4FCwK0vuWTqD5q4qL_uqt_kHltzhdkJ4LySdCRCbxG1kcEcXoPNIhZERttqbZTIQviJxJ2HqC7CbwocmZMnbMAzP52bVX86vLxosmI-pqkG1RG8jMTZMhvc2GmYe6CfleW7bRxS0078sWDM_iACSQVOqLk5rcW_C-a61EYzNNN7BMw-VxFSDtoGgNgb6XGM6FTf9fkdJjIRL2VZAt0Q', 'e': 'AQAB', 'kid': 'wt25OgyR_nzG3OoQ7daa2rL6-gMnFdfRzBjhUVPu8RQ'}, {'x': 'aruz0ufjUGuEQwg2Q3ewyy5DnEIWWmIEO5stN8MfUTA', 'use': 'sig', 'kty': 'EC', 'y': 'dZnZMUOQAvzOD6q1f11PEho4-aX7nWdmive8zdxUbrA', 'crv': 'P-256', 'kid': 'AZXCzT401BtqezIxAdHOEez1ApQUu3O5hjcfRFKxXtQ'}, {'x': 'AeI9gyN_hcFae8vO2HgaH7Fh-MVX1YXJdWg-T16g1kM', 'use': 'enc', 'kty': 'EC', 'y': '5ASt8rCvPWTKMAh6wvR8_-OEbl_9TTkkgAd7LXW8H48', 'crv': 'P-256', 'kid': 'CrXNdVSdrZ-lOToSPso6OlcZnP-Et4U9CzOIZOZPvLw'}]}, 'token_endpoint_auth_method': 'private_key_jwt', 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'grant_types': ['authorization_code'], 'response_types': ['code'], 'url': 'https://oidc-certification.ory.sh:8443/clients', 'application_type': 'web'}
0.094 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks": {
"keys": [
{
"e": "AQAB",
"kid": "gtH4v3Yr2QqLreBSz0ByQQ8vkf8eFo1KIit3s-3Bbww",
"kty": "RSA",
"n": "pKXuY5tuT9ibmEcq4B6VRx3MafdSsajrOndAk5FjJFedlA6qSpdqDUr9wWUkNeO8h_efdLfg43CHXk3mH6Fp1t2gbHzBQ4-SzT3_X5tsdG2PPqvngem7f5NHO6Kefhq11Zk5q4-FyTL9FUQQW6ZANbrU7GifSAs82Ck20ciIvFdv7cPCphk_THMVv14aW5w0eKEXumgx4Bc7HrQFXQUHSze3dVAKg8hKHDIQOGUU0fkolEFmOC4Gb-G57RpBJryZxXqgdUdEG66xl1f37tqpYgaLViFDWDiI8S7BMVHEbGHN4-f_MD9f6gMduaxrL6a6SfyIW1So2VqtvlAyanesTw",
"use": "enc"
},
{
"e": "AQAB",
"kid": "wt25OgyR_nzG3OoQ7daa2rL6-gMnFdfRzBjhUVPu8RQ",
"kty": "RSA",
"n": "1Z8lhYNb0tHZsVrzIQs-JetNCLIBWeOHXblcirxQgFLt6z4Rr-9vxPbEsrmRmZbPuuoL8nGehqOK11LAgqa1QfCR4TKxr2srlbTv4A4Gyf-suhO_KKt0JWv2q9olREZcoIE4FCwK0vuWTqD5q4qL_uqt_kHltzhdkJ4LySdCRCbxG1kcEcXoPNIhZERttqbZTIQviJxJ2HqC7CbwocmZMnbMAzP52bVX86vLxosmI-pqkG1RG8jMTZMhvc2GmYe6CfleW7bRxS0078sWDM_iACSQVOqLk5rcW_C-a61EYzNNN7BMw-VxFSDtoGgNgb6XGM6FTf9fkdJjIRL2VZAt0Q",
"use": "sig"
},
{
"crv": "P-256",
"kid": "AZXCzT401BtqezIxAdHOEez1ApQUu3O5hjcfRFKxXtQ",
"kty": "EC",
"use": "sig",
"x": "aruz0ufjUGuEQwg2Q3ewyy5DnEIWWmIEO5stN8MfUTA",
"y": "dZnZMUOQAvzOD6q1f11PEho4-aX7nWdmive8zdxUbrA"
},
{
"crv": "P-256",
"kid": "CrXNdVSdrZ-lOToSPso6OlcZnP-Et4U9CzOIZOZPvLw",
"kty": "EC",
"use": "enc",
"x": "AeI9gyN_hcFae8vO2HgaH7Fh-MVX1YXJdWg-T16g1kM",
"y": "5ASt8rCvPWTKMAh6wvR8_-OEbl_9TTkkgAd7LXW8H48"
}
]
},
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#hJz8quGQztGsPTS8"
],
"response_types": [
"code"
],
"token_endpoint_auth_method": "private_key_jwt"
}
0.282 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.283 RegistrationResponse {
"client_id": "1cf701c5-bb2e-4d69-adad-23cde091db7b",
"client_secret": "Fp9mcCQWBlQp",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "1cf701c5-bb2e-4d69-adad-23cde091db7b",
"jwks": {
"keys": [
{
"e": "AQAB",
"kid": "gtH4v3Yr2QqLreBSz0ByQQ8vkf8eFo1KIit3s-3Bbww",
"kty": "RSA",
"n": "pKXuY5tuT9ibmEcq4B6VRx3MafdSsajrOndAk5FjJFedlA6qSpdqDUr9wWUkNeO8h_efdLfg43CHXk3mH6Fp1t2gbHzBQ4-SzT3_X5tsdG2PPqvngem7f5NHO6Kefhq11Zk5q4-FyTL9FUQQW6ZANbrU7GifSAs82Ck20ciIvFdv7cPCphk_THMVv14aW5w0eKEXumgx4Bc7HrQFXQUHSze3dVAKg8hKHDIQOGUU0fkolEFmOC4Gb-G57RpBJryZxXqgdUdEG66xl1f37tqpYgaLViFDWDiI8S7BMVHEbGHN4-f_MD9f6gMduaxrL6a6SfyIW1So2VqtvlAyanesTw",
"use": "enc"
},
{
"e": "AQAB",
"kid": "wt25OgyR_nzG3OoQ7daa2rL6-gMnFdfRzBjhUVPu8RQ",
"kty": "RSA",
"n": "1Z8lhYNb0tHZsVrzIQs-JetNCLIBWeOHXblcirxQgFLt6z4Rr-9vxPbEsrmRmZbPuuoL8nGehqOK11LAgqa1QfCR4TKxr2srlbTv4A4Gyf-suhO_KKt0JWv2q9olREZcoIE4FCwK0vuWTqD5q4qL_uqt_kHltzhdkJ4LySdCRCbxG1kcEcXoPNIhZERttqbZTIQviJxJ2HqC7CbwocmZMnbMAzP52bVX86vLxosmI-pqkG1RG8jMTZMhvc2GmYe6CfleW7bRxS0078sWDM_iACSQVOqLk5rcW_C-a61EYzNNN7BMw-VxFSDtoGgNgb6XGM6FTf9fkdJjIRL2VZAt0Q",
"use": "sig"
},
{
"crv": "P-256",
"kid": "AZXCzT401BtqezIxAdHOEez1ApQUu3O5hjcfRFKxXtQ",
"kty": "EC",
"use": "sig",
"x": "aruz0ufjUGuEQwg2Q3ewyy5DnEIWWmIEO5stN8MfUTA",
"y": "dZnZMUOQAvzOD6q1f11PEho4-aX7nWdmive8zdxUbrA"
},
{
"crv": "P-256",
"kid": "CrXNdVSdrZ-lOToSPso6OlcZnP-Et4U9CzOIZOZPvLw",
"kty": "EC",
"use": "enc",
"x": "AeI9gyN_hcFae8vO2HgaH7Fh-MVX1YXJdWg-T16g1kM",
"y": "5ASt8rCvPWTKMAh6wvR8_-OEbl_9TTkkgAd7LXW8H48"
}
]
},
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#hJz8quGQztGsPTS8"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "private_key_jwt",
"userinfo_signed_response_alg": "none"
}
0.283 phase <--<-- 3 --- AsyncAuthn -->-->
0.284 AuthorizationRequest {
"client_id": "1cf701c5-bb2e-4d69-adad-23cde091db7b",
"nonce": "6VGUlP2kd4aEPc5j",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "pi2vuIJpsTHD6JyL"
}
0.284 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=1cf701c5-bb2e-4d69-adad-23cde091db7b&state=pi2vuIJpsTHD6JyL&response_type=code&nonce=6VGUlP2kd4aEPc5j
0.284 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=1cf701c5-bb2e-4d69-adad-23cde091db7b&state=pi2vuIJpsTHD6JyL&response_type=code&nonce=6VGUlP2kd4aEPc5j
2.81 response Response URL with query part
2.81 response {'state': 'pi2vuIJpsTHD6JyL', 'scope': 'openid', 'code': 'tw9Ris3XV0JCPHlRK7ug2TGj4uJo8LXqgEzmCVEJzAI.o_QkF_2i10ONH3LPve8RadpDrzsr71tqcsz9chcNZ5g'}
2.81 response {'state': 'pi2vuIJpsTHD6JyL', 'scope': 'openid', 'code': 'tw9Ris3XV0JCPHlRK7ug2TGj4uJo8LXqgEzmCVEJzAI.o_QkF_2i10ONH3LPve8RadpDrzsr71tqcsz9chcNZ5g'}
2.811 AuthorizationResponse {
"code": "tw9Ris3XV0JCPHlRK7ug2TGj4uJo8LXqgEzmCVEJzAI.o_QkF_2i10ONH3LPve8RadpDrzsr71tqcsz9chcNZ5g",
"scope": "openid",
"state": "pi2vuIJpsTHD6JyL"
}
2.811 phase <--<-- 4 --- AccessToken -->-->
2.811 --> request op_args: {'state': 'pi2vuIJpsTHD6JyL', 'authn_method': 'private_key_jwt'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.811 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'pi2vuIJpsTHD6JyL', 'code': 'tw9Ris3XV0JCPHlRK7ug2TGj4uJo8LXqgEzmCVEJzAI.o_QkF_2i10ONH3LPve8RadpDrzsr71tqcsz9chcNZ5g', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '1cf701c5-bb2e-4d69-adad-23cde091db7b'}, 'state': 'pi2vuIJpsTHD6JyL', 'authn_method': 'private_key_jwt'}
2.811 AccessTokenRequest {
"client_assertion": "eyJhbGciOiJSUzI1NiIsImtpZCI6Ind0MjVPZ3lSX256RzNPb1E3ZGFhMnJMNi1nTW5GZGZSekJqaFVWUHU4UlEifQ.eyJpc3MiOiAiMWNmNzAxYzUtYmIyZS00ZDY5LWFkYWQtMjNjZGUwOTFkYjdiIiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiMWNmNzAxYzUtYmIyZS00ZDY5LWFkYWQtMjNjZGUwOTFkYjdiIiwgImlhdCI6IDE1Mjk3NTA2MTIsICJqdGkiOiAiZjhleElKek1GVTVYRkpMNFg3cVNOdjVSR3VaUGZYNTMiLCAiZXhwIjogMTUyOTc1MTIxMn0.c6JaBlLtyZLYG_c060vcz-q3nLmfZZ0V_rkydl1flR-V8IyuqNHw0b-rYXr82gqfJom7_rc0lRWuPD5cc58NUgrRZY9gELOHX6tqWJG4WtrL8Fmf_MJu3DWNG4Rr140Dv4unLOp8U1aYCutrwaD6zvXQtskgWC-qHIEul17C-u9DyewosQWKJI1vDWPqjK_G7iGHvOVIt2_VGlCLhZgLq_sQvkGIvIwLz7v_vBxIs11JKJbauGRKxsN4CO4JYr5oPNjWktD0IPLq7pF7gKU0Z5j0W7k9nw-c4FCgdv6Ct-2pZyKs0KfLjaB-8HDz6doAhd1EINspf_RiXnfq4My0dg",
"client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer",
"code": "tw9Ris3XV0JCPHlRK7ug2TGj4uJo8LXqgEzmCVEJzAI.o_QkF_2i10ONH3LPve8RadpDrzsr71tqcsz9chcNZ5g",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "pi2vuIJpsTHD6JyL"
}
2.817 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.817 request_http_args {'headers': {'Content-Type': 'application/x-www-form-urlencoded'}}
2.817 request code=tw9Ris3XV0JCPHlRK7ug2TGj4uJo8LXqgEzmCVEJzAI.o_QkF_2i10ONH3LPve8RadpDrzsr71tqcsz9chcNZ5g&client_assertion_type=urn%3Aietf%3Aparams%3Aoauth%3Aclient-assertion-type%3Ajwt-bearer&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=pi2vuIJpsTHD6JyL&client_assertion=eyJhbGciOiJSUzI1NiIsImtpZCI6Ind0MjVPZ3lSX256RzNPb1E3ZGFhMnJMNi1nTW5GZGZSekJqaFVWUHU4UlEifQ.eyJpc3MiOiAiMWNmNzAxYzUtYmIyZS00ZDY5LWFkYWQtMjNjZGUwOTFkYjdiIiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiMWNmNzAxYzUtYmIyZS00ZDY5LWFkYWQtMjNjZGUwOTFkYjdiIiwgImlhdCI6IDE1Mjk3NTA2MTIsICJqdGkiOiAiZjhleElKek1GVTVYRkpMNFg3cVNOdjVSR3VaUGZYNTMiLCAiZXhwIjogMTUyOTc1MTIxMn0.c6JaBlLtyZLYG_c060vcz-q3nLmfZZ0V_rkydl1flR-V8IyuqNHw0b-rYXr82gqfJom7_rc0lRWuPD5cc58NUgrRZY9gELOHX6tqWJG4WtrL8Fmf_MJu3DWNG4Rr140Dv4unLOp8U1aYCutrwaD6zvXQtskgWC-qHIEul17C-u9DyewosQWKJI1vDWPqjK_G7iGHvOVIt2_VGlCLhZgLq_sQvkGIvIwLz7v_vBxIs11JKJbauGRKxsN4CO4JYr5oPNjWktD0IPLq7pF7gKU0Z5j0W7k9nw-c4FCgdv6Ct-2pZyKs0KfLjaB-8HDz6doAhd1EINspf_RiXnfq4My0dg
2.983 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.984 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMWNmNzAxYzUtYmIyZS00ZDY5LWFkYWQtMjNjZGUwOTFkYjdiIl0sImF1dGhfdGltZSI6MTUyOTc1MDU5MiwiZXhwIjoxNTI5NzU0MjEyLCJpYXQiOjE1Mjk3NTA2MTIsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImQ4ZjliMGJlLTJkZjUtNDA1NS1hNzE3LWQ0MTljOWY3MWNlOCIsIm5vbmNlIjoiNlZHVWxQMmtkNGFFUGM1aiIsInJhdCI6MTUyOTc1MDYxMCwic3ViIjoiZm9vQGJhci5jb20ifQ.BUjDkue8e5KWI9ke_A3L3RBqCEhDxzNocRBYYXP-r4ekdfbnh5CDVFZNXfgZ1fRkjvDoMTKgp5oGdnBKmzCB_Jw0nFSSX3U2rxKk9VBOkbkSWsUdYLmUtpxop2ramiquUUucFX3y9DmmJR0l5SDVYqvVI2JpVnmqIWAAJJKJnQR2rsR7qd6EAmEBF6crdbSaenLyMp0m_5B0zQ58d_-N164-8FEHG9GKcjDqav3xgw7mJi47JpWcykdlg9ux8DEADTenovv0jC0PPrDYo5i8MnsSPpnvHFU1ZeYH-K0pIJZHPHN861jwMqcvHnK-xQ-z64c9LdNpw8LMOBqEwhO6rKskwVvz0xSNlnYBu3FuNYmNaEZmOwjPZKbSXFovtqNyjdHBocVz8B7W-LfgcF6DflyBhOaGvuQye3KsNmi4dNPy0o06cFdLtnnZhaYQ4yiovcMLvKJvNI3btdDVJROQWdPmkbzqUoX1K6gIvajgY4KkvLUn_PcqFTCJwKj3OZB2AlGPDsK_rvdoCs3F-Csy98Aft4NtFkFV9fV-SgJawdjR9hjCVfkZlqfJJ8p_hG8GnSXMAdCAbf01dO2NzcgDAWeyC2AqgK_IU6nP4CRA-gdGZVBYJH8AY_XXxqBgtCFtTOM0l6hGrQ_9OjUvv3-Fz2ahTw8oroOBtKSbhV8xTLU', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'zzLwtd-HSt0GQh-4I5F17cyQjW96SalXqrKaIMvMeLk.K2wL8vzSg9ZYvghK0Cr38ftWnnYvPMs7p6oxv-MTQyk', 'scope': 'openid'}
3.066 AccessTokenResponse {
"access_token": "zzLwtd-HSt0GQh-4I5F17cyQjW96SalXqrKaIMvMeLk.K2wL8vzSg9ZYvghK0Cr38ftWnnYvPMs7p6oxv-MTQyk",
"expires_in": 3599,
"id_token": {
"aud": [
"1cf701c5-bb2e-4d69-adad-23cde091db7b"
],
"auth_time": 1529750592,
"exp": 1529754212,
"iat": 1529750612,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "d8f9b0be-2df5-4055-a717-d419c9f71ce8",
"nonce": "6VGUlP2kd4aEPc5j",
"rat": 1529750610,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.066 phase <--<-- 5 --- Done -->-->
3.066 end
3.067 assertion VerifyResponse
3.067 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.067 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Rotation-OP-Sig.txt 0000644 0000000 0000000 00000011554 13313423024 015062 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Rotation-OP-Sig
Test description: Can rotate OP signing keys
Timestamp: 2018-06-23T10:51:00Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.072 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- FetchKeys -->-->
0.147 phase <--<-- 3 --- Note -->-->
8.548 phase <--<-- 4 --- Webfinger -->-->
8.548 not expected to do WebFinger
8.548 phase <--<-- 5 --- Discovery -->-->
8.548 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
8.626 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
8.627 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
8.627 phase <--<-- 6 --- FetchKeys -->-->
8.737 phase <--<-- 7 --- Done -->-->
8.737 end
8.738 assertion CheckHTTPResponse
8.738 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
8.738 assertion NewSigningKeys
8.738 condition new-signing-keys: status=OK [Verifies that two set of signing keys are not the same]
8.738 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
new-signing-keys: status=OK [Verifies that two set of signing keys are not the same]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Registration-jwks_uri.txt 0000644 0000000 0000000 00000026325 13313422140 016534 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-jwks_uri
Test description: Uses keys registered with jwks_uri value
Timestamp: 2018-06-23T10:43:44Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.08 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.082 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.082 phase <--<-- 2 --- Registration -->-->
0.082 register kwargs:{'application_name': 'OIC test tool', 'token_endpoint_auth_method': 'private_key_jwt', 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'response_types': ['code'], 'url': 'https://oidc-certification.ory.sh:8443/clients', 'application_type': 'web'}
0.082 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#DJag6msYGkIEs0Gl"
],
"response_types": [
"code"
],
"token_endpoint_auth_method": "private_key_jwt"
}
0.24 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.241 RegistrationResponse {
"client_id": "bbdb0da4-0ef4-4e52-a7e1-7886d8a75941",
"client_secret": "4f~A_g2.OD7p",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "bbdb0da4-0ef4-4e52-a7e1-7886d8a75941",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#DJag6msYGkIEs0Gl"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "private_key_jwt",
"userinfo_signed_response_alg": "none"
}
0.241 phase <--<-- 3 --- AsyncAuthn -->-->
0.242 AuthorizationRequest {
"client_id": "bbdb0da4-0ef4-4e52-a7e1-7886d8a75941",
"nonce": "AjVnT1wp1y1um8fG",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "qv6n7TUvrXnULueo"
}
0.242 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=bbdb0da4-0ef4-4e52-a7e1-7886d8a75941&state=qv6n7TUvrXnULueo&response_type=code&nonce=AjVnT1wp1y1um8fG
0.242 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=bbdb0da4-0ef4-4e52-a7e1-7886d8a75941&state=qv6n7TUvrXnULueo&response_type=code&nonce=AjVnT1wp1y1um8fG
2.764 response Response URL with query part
2.764 response {'state': 'qv6n7TUvrXnULueo', 'scope': 'openid', 'code': '9lilQ3nKKmBECZFkZPKhHdLUNzi1eNzUi1iMSmTDTg0.RjmLsqscpzS5_BiZREu2o2TAxGTlq9_dTJehbcxbh8E'}
2.764 response {'state': 'qv6n7TUvrXnULueo', 'scope': 'openid', 'code': '9lilQ3nKKmBECZFkZPKhHdLUNzi1eNzUi1iMSmTDTg0.RjmLsqscpzS5_BiZREu2o2TAxGTlq9_dTJehbcxbh8E'}
2.765 AuthorizationResponse {
"code": "9lilQ3nKKmBECZFkZPKhHdLUNzi1eNzUi1iMSmTDTg0.RjmLsqscpzS5_BiZREu2o2TAxGTlq9_dTJehbcxbh8E",
"scope": "openid",
"state": "qv6n7TUvrXnULueo"
}
2.765 phase <--<-- 4 --- AccessToken -->-->
2.765 --> request op_args: {'state': 'qv6n7TUvrXnULueo', 'authn_method': 'private_key_jwt'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.765 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'qv6n7TUvrXnULueo', 'code': '9lilQ3nKKmBECZFkZPKhHdLUNzi1eNzUi1iMSmTDTg0.RjmLsqscpzS5_BiZREu2o2TAxGTlq9_dTJehbcxbh8E', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'bbdb0da4-0ef4-4e52-a7e1-7886d8a75941'}, 'state': 'qv6n7TUvrXnULueo', 'authn_method': 'private_key_jwt'}
2.765 AccessTokenRequest {
"client_assertion": "eyJhbGciOiJSUzI1NiIsImtpZCI6Ind0MjVPZ3lSX256RzNPb1E3ZGFhMnJMNi1nTW5GZGZSekJqaFVWUHU4UlEifQ.eyJpc3MiOiAiYmJkYjBkYTQtMGVmNC00ZTUyLWE3ZTEtNzg4NmQ4YTc1OTQxIiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiYmJkYjBkYTQtMGVmNC00ZTUyLWE3ZTEtNzg4NmQ4YTc1OTQxIiwgImlhdCI6IDE1Mjk3NTA2MjQsICJqdGkiOiAib0ZYMEhWbVF5aW9RT0RuNzB2bTQyZXVkWENMNFZOQ2IiLCAiZXhwIjogMTUyOTc1MTIyNH0.NWkYR-d33B-sHimw-IX4DcFccjp1eDuHaS9q-U1IVLEiZPvrPCUdngAcfL9Am04_LgqeM7ShuW63a3LQppS7m3Fq-zTtKz0qscdgGVuCX4Rs2EUP3KSEKpslSIDnaaOXFs5JamfP70f64HIhVGd-Ep_8O3-mIQH7WgjHaDlcmAgy75WXj0uLaGlc52V2NZjIYp5JFmcqJrD0wJCWQ6ZaIKaEedG9YVSLmYhNjar8w0fsCeN_sOgNUj0WV7ruOMHJXMh6qWZQdquY6suPINYuR30pien3DdXqAXuzheppqp779kJPauScigxfkY22VaQxfJ9FE3BKG4QGI2DzbB4s4A",
"client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer",
"code": "9lilQ3nKKmBECZFkZPKhHdLUNzi1eNzUi1iMSmTDTg0.RjmLsqscpzS5_BiZREu2o2TAxGTlq9_dTJehbcxbh8E",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "qv6n7TUvrXnULueo"
}
2.769 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.769 request_http_args {'headers': {'Content-Type': 'application/x-www-form-urlencoded'}}
2.769 request code=9lilQ3nKKmBECZFkZPKhHdLUNzi1eNzUi1iMSmTDTg0.RjmLsqscpzS5_BiZREu2o2TAxGTlq9_dTJehbcxbh8E&client_assertion_type=urn%3Aietf%3Aparams%3Aoauth%3Aclient-assertion-type%3Ajwt-bearer&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=qv6n7TUvrXnULueo&client_assertion=eyJhbGciOiJSUzI1NiIsImtpZCI6Ind0MjVPZ3lSX256RzNPb1E3ZGFhMnJMNi1nTW5GZGZSekJqaFVWUHU4UlEifQ.eyJpc3MiOiAiYmJkYjBkYTQtMGVmNC00ZTUyLWE3ZTEtNzg4NmQ4YTc1OTQxIiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiYmJkYjBkYTQtMGVmNC00ZTUyLWE3ZTEtNzg4NmQ4YTc1OTQxIiwgImlhdCI6IDE1Mjk3NTA2MjQsICJqdGkiOiAib0ZYMEhWbVF5aW9RT0RuNzB2bTQyZXVkWENMNFZOQ2IiLCAiZXhwIjogMTUyOTc1MTIyNH0.NWkYR-d33B-sHimw-IX4DcFccjp1eDuHaS9q-U1IVLEiZPvrPCUdngAcfL9Am04_LgqeM7ShuW63a3LQppS7m3Fq-zTtKz0qscdgGVuCX4Rs2EUP3KSEKpslSIDnaaOXFs5JamfP70f64HIhVGd-Ep_8O3-mIQH7WgjHaDlcmAgy75WXj0uLaGlc52V2NZjIYp5JFmcqJrD0wJCWQ6ZaIKaEedG9YVSLmYhNjar8w0fsCeN_sOgNUj0WV7ruOMHJXMh6qWZQdquY6suPINYuR30pien3DdXqAXuzheppqp779kJPauScigxfkY22VaQxfJ9FE3BKG4QGI2DzbB4s4A
2.93 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.932 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYmJkYjBkYTQtMGVmNC00ZTUyLWE3ZTEtNzg4NmQ4YTc1OTQxIl0sImF1dGhfdGltZSI6MTUyOTc1MDU5MiwiZXhwIjoxNTI5NzU0MjI0LCJpYXQiOjE1Mjk3NTA2MjQsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImI4MzU3MGFmLWE5ZjQtNGM4MS1hMTU5LWM5OTBjZDljNWRjYSIsIm5vbmNlIjoiQWpWblQxd3AxeTF1bThmRyIsInJhdCI6MTUyOTc1MDYyMiwic3ViIjoiZm9vQGJhci5jb20ifQ.CzjfghDP-AIkmdS5CN3rkMJ6NyMe8yWl_rFQaz3vUmmCdtSvc-lsdXun4eL6sqZB85N1nATR0ucmuoR-UpPhWQTRJ7rztVNt3tQ9a40AnHZS7IemFevEnqzE72ync7fnH_Wrx8XIgTtOHxRHZnUlzO9ip3fcjHCk5yuOILFdVhEaa7J0qC6mzaYX8_Rq8Cmo8p29tTcrEnBN-Wbhxw8W6hYtAMl-5z5KkyFBAcazWsTiV_55GcDpUWHbB7QJOU6nieTjl6MYDhlspQOUQA63Syp2PYUEv81iKRJefH9LPWx8UxL-ScTKZS3vV190WmzPUL8-FHkx9Co6lyCHC4HGWC8sau1vWlsoitg4VPvTB0Jq8eanj22zy5hs9VtNse34pPaLIhsFP4D5AliHGgYC0LuXZ2aVreR6iOl-N-onq_YacLUyx2Fzaig3lcD_w0Pgbh1C_xkZGuv-eGQcAAl2Yk5FVE9dWF09autP-8Iky5TZ3MgBj6uHbXvot5tW1oS5F8xuGmxiaRYAksDeH-tM-b2ejnQ6HN2A7iiq6sdj7OcRN8_de6uuMb23Y9APbqA9hyPBs9qM4NZHrK92IE3_YsZrg3FkK_2Utr7Ebw-4GA3_xeYdt8_dZuTRKJQUjld8XXNy8XKCbVa9IIAqFCIJG923IIfbZ0dq1oi5bZP64FA', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': '-X01qotFl-SU05bQEWsWZDhW7Vom0envPM5CUmf06mE.Y62sII-yPfwCeInPgLGPu4avFXmyJP2HFK079ZC5uFw', 'scope': 'openid'}
3.015 AccessTokenResponse {
"access_token": "-X01qotFl-SU05bQEWsWZDhW7Vom0envPM5CUmf06mE.Y62sII-yPfwCeInPgLGPu4avFXmyJP2HFK079ZC5uFw",
"expires_in": 3599,
"id_token": {
"aud": [
"bbdb0da4-0ef4-4e52-a7e1-7886d8a75941"
],
"auth_time": 1529750592,
"exp": 1529754224,
"iat": 1529750624,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "b83570af-a9f4-4c81-a159-c990cd9c5dca",
"nonce": "AjVnT1wp1y1um8fG",
"rat": 1529750622,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.015 phase <--<-- 5 --- Done -->-->
3.015 end
3.016 assertion VerifyResponse
3.016 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.016 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Req-max_age=10000.txt 0000644 0000000 0000000 00000035517 13313422710 015041 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-max_age=10000
Test description: Requesting ID Token with max_age=10000 seconds restriction
Timestamp: 2018-06-23T10:49:44Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.075 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.076 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.076 phase <--<-- 2 --- Registration -->-->
0.076 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.077 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#DXuQUZ3bXuPFPvU4"
],
"response_types": [
"code"
]
}
0.232 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.233 RegistrationResponse {
"client_id": "70cccb54-e0f4-4299-a099-f2975a3fcf5b",
"client_secret": "zFXlj9CwVdS-",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "70cccb54-e0f4-4299-a099-f2975a3fcf5b",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#DXuQUZ3bXuPFPvU4"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.233 phase <--<-- 3 --- AsyncAuthn -->-->
0.234 AuthorizationRequest {
"client_id": "70cccb54-e0f4-4299-a099-f2975a3fcf5b",
"nonce": "DV8BFYgpi39cIokJ",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "j1NsamVKz6wIzlW9"
}
0.234 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=70cccb54-e0f4-4299-a099-f2975a3fcf5b&state=j1NsamVKz6wIzlW9&response_type=code&nonce=DV8BFYgpi39cIokJ
0.234 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=70cccb54-e0f4-4299-a099-f2975a3fcf5b&state=j1NsamVKz6wIzlW9&response_type=code&nonce=DV8BFYgpi39cIokJ
2.96 response Response URL with query part
2.96 response {'state': 'j1NsamVKz6wIzlW9', 'scope': 'openid', 'code': 'l4166QgxrsPnK3EbJGb9youJsnHbIeqY2LQvM6HXkfw.Rr9fgSuxDf0jCMikWr9lIEC4xF12AyDI_k1QzsHg9Tc'}
2.96 response {'state': 'j1NsamVKz6wIzlW9', 'scope': 'openid', 'code': 'l4166QgxrsPnK3EbJGb9youJsnHbIeqY2LQvM6HXkfw.Rr9fgSuxDf0jCMikWr9lIEC4xF12AyDI_k1QzsHg9Tc'}
2.961 AuthorizationResponse {
"code": "l4166QgxrsPnK3EbJGb9youJsnHbIeqY2LQvM6HXkfw.Rr9fgSuxDf0jCMikWr9lIEC4xF12AyDI_k1QzsHg9Tc",
"scope": "openid",
"state": "j1NsamVKz6wIzlW9"
}
2.961 phase <--<-- 4 --- AccessToken -->-->
2.961 --> request op_args: {'state': 'j1NsamVKz6wIzlW9'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.961 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'j1NsamVKz6wIzlW9', 'code': 'l4166QgxrsPnK3EbJGb9youJsnHbIeqY2LQvM6HXkfw.Rr9fgSuxDf0jCMikWr9lIEC4xF12AyDI_k1QzsHg9Tc', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '70cccb54-e0f4-4299-a099-f2975a3fcf5b'}, 'state': 'j1NsamVKz6wIzlW9'}
2.961 AccessTokenRequest {
"code": "l4166QgxrsPnK3EbJGb9youJsnHbIeqY2LQvM6HXkfw.Rr9fgSuxDf0jCMikWr9lIEC4xF12AyDI_k1QzsHg9Tc",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "j1NsamVKz6wIzlW9"
}
2.961 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.961 request_http_args {'headers': {'Authorization': 'Basic NzBjY2NiNTQtZTBmNC00Mjk5LWEwOTktZjI5NzVhM2ZjZjViOnpGWGxqOUN3VmRTLQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.961 request code=l4166QgxrsPnK3EbJGb9youJsnHbIeqY2LQvM6HXkfw.Rr9fgSuxDf0jCMikWr9lIEC4xF12AyDI_k1QzsHg9Tc&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=j1NsamVKz6wIzlW9
3.22 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.221 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNzBjY2NiNTQtZTBmNC00Mjk5LWEwOTktZjI5NzVhM2ZjZjViIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiZXhwIjoxNTI5NzU0NTgyLCJpYXQiOjE1Mjk3NTA5ODIsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImI4MTkxZjEyLWZmMzktNDhhOC1hNjg5LTI0MDgyMmM4ZjJhNSIsIm5vbmNlIjoiRFY4QkZZZ3BpMzljSW9rSiIsInJhdCI6MTUyOTc1MDk3OSwic3ViIjoiZm9vQGJhci5jb20ifQ.bBpHTeHACkHQZBhs2Q9J5x0TfOmSpH3rOlm3BxclV8F12b_6gBVfiPC6vcH4JQwTyS1Ouo4lCfcdIyxnuUjF7n0N6gvuZdbjUfoXbVZ2SGu7_PwZChFRWC_ErNaiDSP9ZRdvElD3yL72pgQSLopT1RiLbgCIyJTsqES6YsYs3nmwz3vDwoD0Ru0WRAOa_NiMBrmLP9ekQw9b0wHs6OlYcJ03UzVarfTp9EEmdAgkNhSfbvb2NmuxtpaF8xDOEg5iAZhRBfHKwckKtBkO4Jf8XiNfImqWh06UgSu916JzRfGxRbSvpHOeXYcW4BLyYv__v4CbcpT_nB6xe9LT7WCbshJ4FPN05ORjK9IX2MD0cgb_OXFZV_UMnMcM1A9YZLRsVHjliZyw30mXFjDhMxdPmB9JZywnSsqW5okGcoAyQGQFitn38qh1IIkDl7AnAe0mhUDI7S8hGo3efpfZfR6sQi6NZWPXUZm5TfVsRKpBUfIDD76KIxKXW2Yaqyw96AsJK2CJFB_Ao9K7Nay2fEWYc2PautExwQBaDn2uVqJlOeV38kMOPesA2qELQaCN3ou4fTnJIuej79xTFbrx-POQiDlXQpvfJuAkMBVPpbENqHwLVOpaJlNKpGpTuYDtanRp8mCJyMBKuA7C2BjQ8neKB4R3RiVIA289ofvbI0zdKmw', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'Qts-uQQqOOTjwpkwJGOVDRWn5wsysUSlj_urWCkv2gc.JsG9HriNfIzYmPOYC3ycJZH5bwFV9FHTBn2lbr993Ks', 'scope': 'openid'}
3.299 AccessTokenResponse {
"access_token": "Qts-uQQqOOTjwpkwJGOVDRWn5wsysUSlj_urWCkv2gc.JsG9HriNfIzYmPOYC3ycJZH5bwFV9FHTBn2lbr993Ks",
"expires_in": 3599,
"id_token": {
"aud": [
"70cccb54-e0f4-4299-a099-f2975a3fcf5b"
],
"auth_time": 1529750975,
"exp": 1529754582,
"iat": 1529750982,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "b8191f12-ff39-48a8-a689-240822c8f2a5",
"nonce": "DV8BFYgpi39cIokJ",
"rat": 1529750979,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.299 phase <--<-- 5 --- AsyncAuthn -->-->
3.3 AuthorizationRequest {
"client_id": "70cccb54-e0f4-4299-a099-f2975a3fcf5b",
"max_age": 10000,
"nonce": "pCda3IRJ4cGzulp0",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "JAX1SGm3GQFzTDpk"
}
3.3 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?max_age=10000&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=70cccb54-e0f4-4299-a099-f2975a3fcf5b&state=JAX1SGm3GQFzTDpk&response_type=code&nonce=pCda3IRJ4cGzulp0
3.3 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?max_age=10000&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=70cccb54-e0f4-4299-a099-f2975a3fcf5b&state=JAX1SGm3GQFzTDpk&response_type=code&nonce=pCda3IRJ4cGzulp0
4.977 response Response URL with query part
4.977 response {'state': 'JAX1SGm3GQFzTDpk', 'scope': 'openid', 'code': 'W_5QuSN7YDwP3j7FJKptV26vGdhNOrIXrHD-XaEhWPE.mLt8BexOYI2kZjI7cd-a9AbsDs4MDSq7IirB1vPRXAk'}
4.977 response {'state': 'JAX1SGm3GQFzTDpk', 'scope': 'openid', 'code': 'W_5QuSN7YDwP3j7FJKptV26vGdhNOrIXrHD-XaEhWPE.mLt8BexOYI2kZjI7cd-a9AbsDs4MDSq7IirB1vPRXAk'}
4.978 AuthorizationResponse {
"code": "W_5QuSN7YDwP3j7FJKptV26vGdhNOrIXrHD-XaEhWPE.mLt8BexOYI2kZjI7cd-a9AbsDs4MDSq7IirB1vPRXAk",
"scope": "openid",
"state": "JAX1SGm3GQFzTDpk"
}
4.978 phase <--<-- 6 --- AccessToken -->-->
4.978 --> request op_args: {'state': 'JAX1SGm3GQFzTDpk'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
4.978 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'JAX1SGm3GQFzTDpk', 'code': 'W_5QuSN7YDwP3j7FJKptV26vGdhNOrIXrHD-XaEhWPE.mLt8BexOYI2kZjI7cd-a9AbsDs4MDSq7IirB1vPRXAk', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '70cccb54-e0f4-4299-a099-f2975a3fcf5b'}, 'state': 'JAX1SGm3GQFzTDpk'}
4.978 AccessTokenRequest {
"code": "W_5QuSN7YDwP3j7FJKptV26vGdhNOrIXrHD-XaEhWPE.mLt8BexOYI2kZjI7cd-a9AbsDs4MDSq7IirB1vPRXAk",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "JAX1SGm3GQFzTDpk"
}
4.978 request_url https://oidc-certification.ory.sh:8443/oauth2/token
4.978 request_http_args {'headers': {'Authorization': 'Basic NzBjY2NiNTQtZTBmNC00Mjk5LWEwOTktZjI5NzVhM2ZjZjViOnpGWGxqOUN3VmRTLQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
4.978 request code=W_5QuSN7YDwP3j7FJKptV26vGdhNOrIXrHD-XaEhWPE.mLt8BexOYI2kZjI7cd-a9AbsDs4MDSq7IirB1vPRXAk&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=JAX1SGm3GQFzTDpk
5.232 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
5.233 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNzBjY2NiNTQtZTBmNC00Mjk5LWEwOTktZjI5NzVhM2ZjZjViIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiZXhwIjoxNTI5NzU0NTg0LCJpYXQiOjE1Mjk3NTA5ODQsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjhlM2FhYjI1LTZkMDAtNDllNi05ZTViLTcxMWM3YTgxNTJiNyIsIm5vbmNlIjoicENkYTNJUko0Y0d6dWxwMCIsInJhdCI6MTUyOTc1MDk4Miwic3ViIjoiZm9vQGJhci5jb20ifQ.UnElRkqLWq6vMpPE57S6St_QWy33pCNniyySzDNPbUQtocnputlFAeFot72E6xiUy9SB9TgJR0ty_HJ_TV0cZoPFgWxICeYtgumoziLhvWHbQn5b3eMEiqVOkDcroo7Q3xfs0Uny144cfTHXI2dGmP4lBiU1xDudGxC37lOcyQJ9-nVUwTiCa-nnj5WhYyrlGfhb_qlfIzaEqBKKzSiTkyHgZG08anVqyCiboRymhjtzqQbb6mjePQBJhQ3Ienm-XIaIB8dZk1AS7HoHBZfLtmF5_4c3bNCL3wefgw3pVnV9vFCGyX7iLq3DDTRuPmo1fMh1k0GA4RT1tG7zG4EG8jfbvtc0lGuaBT1wcPWEBzgUy2i3uG4CnWuYS7E3iZQgTkcbZBfshduH5htkMIhK2eADiAT5abCv1XhILMWOst1yi5jQytyvZHkS5_F4lJ9AcxttUBv_nM0wGl8cvteAi3l9TV2MshDfn6Og6n0TRUUtz5EK1A_FBZjHBFjMTged31WYMXOwnr0KGE-3rZo1OuGBrvxF-7PGCksBM814hzlok5zpOJatqDuSUz-3IzPw9gp1ewLdPc-ofLDfs_d7Mc1Kv-9NI_PKbEhkjcQFvqGucssBQ5s97KV8mAMUs-6fxtBygF4Wso4pOQeDx9y5oBLPUzbUwtooChvbJDNbHVQ', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'DJLtc3HNFiIJ80TT8bi2Ib3pfsSkzfhpH9U5wtVHyVA.5LA7HqMvRFyUO0iHk-AZVU7IzgqPk5QDXJThnfdJ3uo', 'scope': 'openid'}
5.237 AccessTokenResponse {
"access_token": "DJLtc3HNFiIJ80TT8bi2Ib3pfsSkzfhpH9U5wtVHyVA.5LA7HqMvRFyUO0iHk-AZVU7IzgqPk5QDXJThnfdJ3uo",
"expires_in": 3599,
"id_token": {
"aud": [
"70cccb54-e0f4-4299-a099-f2975a3fcf5b"
],
"auth_time": 1529750975,
"exp": 1529754584,
"iat": 1529750984,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "8e3aab25-6d00-49e6-9e5b-711c7a8152b7",
"nonce": "pCda3IRJ4cGzulp0",
"rat": 1529750982,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
5.237 phase <--<-- 7 --- Done -->-->
5.237 end
5.237 assertion AuthTimeCheck
5.238 condition auth_time-check: status=OK [Check that the auth_time returned in the ID Token is in the expected range.]
5.238 assertion VerifyResponse
5.238 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
5.238 assertion SameAuthn
5.238 condition same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
5.239 assertion ClaimsCheck
5.239 condition claims-check: status=OK [Checks if specific claims is present or not]
5.239 condition Done: status=OK
============================================================
Conditions
auth_time-check: status=OK [Check that the auth_time returned in the ID Token is in the expected range.]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
claims-check: status=OK [Checks if specific claims is present or not]
Done: status=OK
============================================================
RESULT: PASSED
./OP-request-Unsigned.txt 0000644 0000000 0000000 00000016451 13313422443 015476 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-request-Unsigned
Test description: Support request request parameter with unsigned request
Timestamp: 2018-06-23T10:46:59Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.143 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.144 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.144 phase <--<-- 2 --- Registration -->-->
0.144 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'request_object_signing_alg': 'none'}
0.145 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "none",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#jfQdJ2iwLxaUTAt9"
],
"response_types": [
"code"
]
}
0.303 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.304 RegistrationResponse {
"client_id": "1b567dbb-9164-428a-9340-340ab8c7d341",
"client_secret": "hEibpZ6INKO0",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "1b567dbb-9164-428a-9340-340ab8c7d341",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "none",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#jfQdJ2iwLxaUTAt9"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.304 phase <--<-- 3 --- AsyncAuthn -->-->
0.305 AuthorizationRequest {
"client_id": "1b567dbb-9164-428a-9340-340ab8c7d341",
"nonce": "L72FDNOM5JEgt209",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"request": "eyJhbGciOiJub25lIn0.eyJzY29wZSI6ICJvcGVuaWQiLCAicmVkaXJlY3RfdXJpIjogImh0dHBzOi8vb3AuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0OjYxMzUzL2F1dGh6X2NiIiwgImNsaWVudF9pZCI6ICIxYjU2N2RiYi05MTY0LTQyOGEtOTM0MC0zNDBhYjhjN2QzNDEiLCAic3RhdGUiOiAiMVRyNnFkYWNhU1p4ZE83RiIsICJyZXNwb25zZV90eXBlIjogImNvZGUiLCAibm9uY2UiOiAiTDcyRkROT001SkVndDIwOSJ9.",
"response_type": "code",
"scope": "openid",
"state": "1Tr6qdacaSZxdO7F"
}
0.305 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=1b567dbb-9164-428a-9340-340ab8c7d341&response_type=code&state=1Tr6qdacaSZxdO7F&request=eyJhbGciOiJub25lIn0.eyJzY29wZSI6ICJvcGVuaWQiLCAicmVkaXJlY3RfdXJpIjogImh0dHBzOi8vb3AuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0OjYxMzUzL2F1dGh6X2NiIiwgImNsaWVudF9pZCI6ICIxYjU2N2RiYi05MTY0LTQyOGEtOTM0MC0zNDBhYjhjN2QzNDEiLCAic3RhdGUiOiAiMVRyNnFkYWNhU1p4ZE83RiIsICJyZXNwb25zZV90eXBlIjogImNvZGUiLCAibm9uY2UiOiAiTDcyRkROT001SkVndDIwOSJ9.&nonce=L72FDNOM5JEgt209
0.305 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=1b567dbb-9164-428a-9340-340ab8c7d341&response_type=code&state=1Tr6qdacaSZxdO7F&request=eyJhbGciOiJub25lIn0.eyJzY29wZSI6ICJvcGVuaWQiLCAicmVkaXJlY3RfdXJpIjogImh0dHBzOi8vb3AuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0OjYxMzUzL2F1dGh6X2NiIiwgImNsaWVudF9pZCI6ICIxYjU2N2RiYi05MTY0LTQyOGEtOTM0MC0zNDBhYjhjN2QzNDEiLCAic3RhdGUiOiAiMVRyNnFkYWNhU1p4ZE83RiIsICJyZXNwb25zZV90eXBlIjogImNvZGUiLCAibm9uY2UiOiAiTDcyRkROT001SkVndDIwOSJ9.&nonce=L72FDNOM5JEgt209
3.163 response Response URL with query part
3.164 response {'state': '1Tr6qdacaSZxdO7F', 'scope': 'openid', 'code': '_QWM6y9PX-kHdJdDy7Xq_A8rJQkGA1BPCUd5_8BwF4s.Hm0Z9AW4fjZbQ8F9fnoU27dQtQVdYX6DlR0-XZz8Hpc'}
3.164 response {'state': '1Tr6qdacaSZxdO7F', 'scope': 'openid', 'code': '_QWM6y9PX-kHdJdDy7Xq_A8rJQkGA1BPCUd5_8BwF4s.Hm0Z9AW4fjZbQ8F9fnoU27dQtQVdYX6DlR0-XZz8Hpc'}
3.164 AuthorizationResponse {
"code": "_QWM6y9PX-kHdJdDy7Xq_A8rJQkGA1BPCUd5_8BwF4s.Hm0Z9AW4fjZbQ8F9fnoU27dQtQVdYX6DlR0-XZz8Hpc",
"scope": "openid",
"state": "1Tr6qdacaSZxdO7F"
}
3.165 phase <--<-- 4 --- Done -->-->
3.165 end
3.165 assertion VerifyAuthnOrErrorResponse
3.165 condition authn-response-or-error: status=OK [Checks that the last response was a JSON encoded authentication or error message]
3.165 condition Done: status=OK
============================================================
Conditions
authn-response-or-error: status=OK [Checks that the last response was a JSON encoded authentication or error message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-ClientAuth-Basic-Dynamic.txt 0000644 0000000 0000000 00000023237 13313422224 016672 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-ClientAuth-Basic-Dynamic
Test description: Access token request with client_secret_basic authentication
Timestamp: 2018-06-23T10:44:36Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.081 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.082 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.082 phase <--<-- 2 --- Registration -->-->
0.082 register kwargs:{'application_name': 'OIC test tool', 'token_endpoint_auth_method': 'client_secret_basic', 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'response_types': ['code'], 'url': 'https://oidc-certification.ory.sh:8443/clients', 'application_type': 'web'}
0.083 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Uk7Qb5p2QPgnoUJs"
],
"response_types": [
"code"
],
"token_endpoint_auth_method": "client_secret_basic"
}
0.24 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.241 RegistrationResponse {
"client_id": "f0852d80-b05c-4f0b-8ebb-2fc758dfc979",
"client_secret": "jUVlAj7TntjH",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "f0852d80-b05c-4f0b-8ebb-2fc758dfc979",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Uk7Qb5p2QPgnoUJs"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.241 phase <--<-- 3 --- AsyncAuthn -->-->
0.242 AuthorizationRequest {
"client_id": "f0852d80-b05c-4f0b-8ebb-2fc758dfc979",
"nonce": "fn5gv4fWICWN5kEK",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "xiFdT0JBP8plW93q"
}
0.242 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=f0852d80-b05c-4f0b-8ebb-2fc758dfc979&state=xiFdT0JBP8plW93q&response_type=code&nonce=fn5gv4fWICWN5kEK
0.242 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=f0852d80-b05c-4f0b-8ebb-2fc758dfc979&state=xiFdT0JBP8plW93q&response_type=code&nonce=fn5gv4fWICWN5kEK
2.139 response Response URL with query part
2.14 response {'state': 'xiFdT0JBP8plW93q', 'scope': 'openid', 'code': 'V0A0eFhM93IYa7WEhh31E2aqNI_FY_RaFFxF50a-nGQ.gnKBFCsJXBOY12bslUEEQmNxfbYVvqb6Gy3W303XPqA'}
2.14 response {'state': 'xiFdT0JBP8plW93q', 'scope': 'openid', 'code': 'V0A0eFhM93IYa7WEhh31E2aqNI_FY_RaFFxF50a-nGQ.gnKBFCsJXBOY12bslUEEQmNxfbYVvqb6Gy3W303XPqA'}
2.14 AuthorizationResponse {
"code": "V0A0eFhM93IYa7WEhh31E2aqNI_FY_RaFFxF50a-nGQ.gnKBFCsJXBOY12bslUEEQmNxfbYVvqb6Gy3W303XPqA",
"scope": "openid",
"state": "xiFdT0JBP8plW93q"
}
2.14 phase <--<-- 4 --- AccessToken -->-->
2.141 --> request op_args: {'state': 'xiFdT0JBP8plW93q', 'authn_method': 'client_secret_basic'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.141 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'xiFdT0JBP8plW93q', 'code': 'V0A0eFhM93IYa7WEhh31E2aqNI_FY_RaFFxF50a-nGQ.gnKBFCsJXBOY12bslUEEQmNxfbYVvqb6Gy3W303XPqA', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'f0852d80-b05c-4f0b-8ebb-2fc758dfc979'}, 'state': 'xiFdT0JBP8plW93q', 'authn_method': 'client_secret_basic'}
2.141 AccessTokenRequest {
"code": "V0A0eFhM93IYa7WEhh31E2aqNI_FY_RaFFxF50a-nGQ.gnKBFCsJXBOY12bslUEEQmNxfbYVvqb6Gy3W303XPqA",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "xiFdT0JBP8plW93q"
}
2.141 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.141 request_http_args {'headers': {'Authorization': 'Basic ZjA4NTJkODAtYjA1Yy00ZjBiLThlYmItMmZjNzU4ZGZjOTc5OmpVVmxBajdUbnRqSA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.141 request code=V0A0eFhM93IYa7WEhh31E2aqNI_FY_RaFFxF50a-nGQ.gnKBFCsJXBOY12bslUEEQmNxfbYVvqb6Gy3W303XPqA&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=xiFdT0JBP8plW93q
2.356 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.357 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZjA4NTJkODAtYjA1Yy00ZjBiLThlYmItMmZjNzU4ZGZjOTc5Il0sImF1dGhfdGltZSI6MTUyOTc1MDU5MiwiZXhwIjoxNTI5NzU0Mjc2LCJpYXQiOjE1Mjk3NTA2NzYsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjUzZTQxODU5LWFlOGMtNGY3Ni04YzgwLTljMGVkYmZiZTIzYyIsIm5vbmNlIjoiZm41Z3Y0ZldJQ1dONWtFSyIsInJhdCI6MTUyOTc1MDY3NCwic3ViIjoiZm9vQGJhci5jb20ifQ.cmg2s22ZDs_e8Pdu_LVMDmN10eobgTtExq56Zqx_obYAJ4KvjF6JEAFbgZy-4xQuB4wajt3AQ7y34HEqa_ShqRnssO7ENLhSLOTwUeyJsQIS2bziWHlANxNBjg4uWmMPBowQl1hJ1ZyQWu6XGHaQs4qhKGtD32wZDentaH5EugE45t1dEwx8wkjzUA9dpP511o9dtvnFmiGw4vb_qnjPi5oqmaFVUtefHqfrPmnlFgKTH65BXN6TC3cPHzl7DfytrLqxNm2otaw3w2IkHlpzjufJ95B8UWa6ZcLgZt5_edP-994SoKYFHm5yML0E3Zia2tA-wCbwFwLEd_SyoklXc_ljFKjBp_RXKTyM0SN5SdbAfoJkxRvEmrgnkat-yFY51KR-1Ih8n0cD7zbyHfElDP6zx9zRTyBBp2u2atJvH3bnwi6DgZvqI_DfIER0ET8JciDYOsA_7Uwul-R2JPiyUkp4txERA6FiX0C0IxkTgU9vUFygoIs6FSP-wqEzjIM1jD5KBRf_hS7Bp4YuMiHQBpKnpOCewGcr94QwSj4b5mbQpwbhrOW4WeTdLn_bpFk1OcNuusy7pAYFS46E2CmSBtwwALTyixgpFFn55XZ5mCgDtiQHziuAfijDjVogovgWZiN3kACTE1T8Ytk8eKSiCM6hAtky20JNIU-s3UdhvOA', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': '7fmF8tKzJ_-loZhTKANHUwK-IU9M0DQdabnlcCnyBnQ.752n8w_2cHkPaJ7JKNZeaP0moSMj-06avj8CwbNkm-E', 'scope': 'openid'}
2.441 AccessTokenResponse {
"access_token": "7fmF8tKzJ_-loZhTKANHUwK-IU9M0DQdabnlcCnyBnQ.752n8w_2cHkPaJ7JKNZeaP0moSMj-06avj8CwbNkm-E",
"expires_in": 3599,
"id_token": {
"aud": [
"f0852d80-b05c-4f0b-8ebb-2fc758dfc979"
],
"auth_time": 1529750592,
"exp": 1529754276,
"iat": 1529750676,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "53e41859-ae8c-4f76-8c80-9c0edbfbe23c",
"nonce": "fn5gv4fWICWN5kEK",
"rat": 1529750674,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
2.441 phase <--<-- 5 --- Done -->-->
2.441 end
2.441 assertion VerifyResponse
2.441 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.441 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Discovery-claims_supported.txt 0000644 0000000 0000000 00000005777 13313422114 017562 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Discovery-claims_supported
Test description: Verify that claims_supported is published
Timestamp: 2018-06-23T10:43:24Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.116 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.117 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.118 phase <--<-- 2 --- Done -->-->
0.118 end
0.118 assertion CheckHTTPResponse
0.118 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.118 assertion CheckHasClaimsSupported
0.118 condition providerinfo-has-claims_supported: status=OK [Check that the claims_supported discovery metadata value is in the provider_info]
0.118 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
providerinfo-has-claims_supported: status=OK [Check that the claims_supported discovery metadata value is in the provider_info]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Registration-logo_uri.txt 0000644 0000000 0000000 00000014557 13313422172 016527 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-logo_uri
Test description: Registration with logo_uri
Timestamp: 2018-06-23T10:44:10Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.082 phase <--<-- 1 --- Webfinger -->-->
1.082 not expected to do WebFinger
1.082 phase <--<-- 2 --- Discovery -->-->
1.082 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.18 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.181 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.182 phase <--<-- 3 --- Registration -->-->
1.182 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'logo_uri': 'https://op.certification.openid.net:61353/static/logo.png'}
1.182 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"logo_uri": "https://op.certification.openid.net:61353/static/logo.png",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#3J63oL6NYS9csBrt"
],
"response_types": [
"code"
]
}
1.343 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.344 RegistrationResponse {
"client_id": "87135160-a662-4fb3-b2ab-f5025517c1a1",
"client_secret": "iflKX8b.ioLO",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "87135160-a662-4fb3-b2ab-f5025517c1a1",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"logo_uri": "https://op.certification.openid.net:61353/static/logo.png",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#3J63oL6NYS9csBrt"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.344 phase <--<-- 4 --- AsyncAuthn -->-->
1.345 AuthorizationRequest {
"client_id": "87135160-a662-4fb3-b2ab-f5025517c1a1",
"nonce": "uxjLGBv3XKggTGwl",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "AfCsHJqVmUwtTqSe"
}
1.345 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=87135160-a662-4fb3-b2ab-f5025517c1a1&state=AfCsHJqVmUwtTqSe&response_type=code&nonce=uxjLGBv3XKggTGwl
1.345 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=87135160-a662-4fb3-b2ab-f5025517c1a1&state=AfCsHJqVmUwtTqSe&response_type=code&nonce=uxjLGBv3XKggTGwl
3.106 response Response URL with query part
3.106 response {'state': 'AfCsHJqVmUwtTqSe', 'scope': '', 'code': 'yVG-Y5soqHrmFH3y-MLa_hnSQXVb5eWfIEyFhMcI1fc.PvP_zMJHlL-JpSnL7yKs4_rkHcbK2h54fmjRh2mHBj0'}
3.107 response {'state': 'AfCsHJqVmUwtTqSe', 'code': 'yVG-Y5soqHrmFH3y-MLa_hnSQXVb5eWfIEyFhMcI1fc.PvP_zMJHlL-JpSnL7yKs4_rkHcbK2h54fmjRh2mHBj0'}
3.107 AuthorizationResponse {
"code": "yVG-Y5soqHrmFH3y-MLa_hnSQXVb5eWfIEyFhMcI1fc.PvP_zMJHlL-JpSnL7yKs4_rkHcbK2h54fmjRh2mHBj0",
"state": "AfCsHJqVmUwtTqSe"
}
3.107 phase <--<-- 5 --- Done -->-->
3.107 end
3.108 assertion VerifyAuthnResponse
3.108 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
3.108 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-redirect_uri-Query-OK.txt 0000644 0000000 0000000 00000015207 13313422434 016324 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-Query-OK
Test description: Request with a redirect_uri with a query component when a redirect_uri with the same query component is registered
Timestamp: 2018-06-23T10:46:52Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.079 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.08 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.08 phase <--<-- 2 --- Registration -->-->
0.08 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb?foo=bar'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.08 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb?foo=bar"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#74G38lF4NGcBjIWN"
],
"response_types": [
"code"
]
}
0.27 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.271 RegistrationResponse {
"client_id": "7d1128b3-4954-4ba1-828f-19865971c75f",
"client_secret": "JON-4DslGitJ",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "7d1128b3-4954-4ba1-828f-19865971c75f",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb?foo=bar"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#74G38lF4NGcBjIWN"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.271 phase <--<-- 3 --- AsyncAuthn -->-->
0.272 AuthorizationRequest {
"client_id": "7d1128b3-4954-4ba1-828f-19865971c75f",
"nonce": "Z0fIcSjs3zD1cAW1",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb?foo=bar",
"response_type": "code",
"scope": "openid",
"state": "5NSRt1eD5V8rHyLi"
}
0.272 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb%3Ffoo%3Dbar&client_id=7d1128b3-4954-4ba1-828f-19865971c75f&state=5NSRt1eD5V8rHyLi&response_type=code&nonce=Z0fIcSjs3zD1cAW1
0.272 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb%3Ffoo%3Dbar&client_id=7d1128b3-4954-4ba1-828f-19865971c75f&state=5NSRt1eD5V8rHyLi&response_type=code&nonce=Z0fIcSjs3zD1cAW1
3.934 response Response URL with query part
3.935 response {'state': '5NSRt1eD5V8rHyLi', 'scope': 'openid', 'code': 'wdY6RkkVbzOn4pg2g4YMDBkxNtkyughZK0m_hn3w4ls.slFPZhEBARhYaNynmc_C7ZVHlVx11NoK4vGLDHsH6Sk', 'foo': 'bar'}
3.936 response {'state': '5NSRt1eD5V8rHyLi', 'scope': 'openid', 'code': 'wdY6RkkVbzOn4pg2g4YMDBkxNtkyughZK0m_hn3w4ls.slFPZhEBARhYaNynmc_C7ZVHlVx11NoK4vGLDHsH6Sk', 'foo': 'bar'}
3.936 AuthorizationResponse {
"code": "wdY6RkkVbzOn4pg2g4YMDBkxNtkyughZK0m_hn3w4ls.slFPZhEBARhYaNynmc_C7ZVHlVx11NoK4vGLDHsH6Sk",
"foo": "bar",
"scope": "openid",
"state": "5NSRt1eD5V8rHyLi"
}
3.936 phase <--<-- 4 --- Done -->-->
3.936 end
3.937 assertion VerifyResponse
3.937 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.937 assertion CheckQueryPart
3.937 condition check-query-part: status=OK [Check that a query part send in the Authorization Request is returned in the Authorization response.]
3.937 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
check-query-part: status=OK [Check that a query part send in the Authorization Request is returned in the Authorization response.]
Done: status=OK
============================================================
RESULT: PASSED
./OP-IDToken-kid.txt 0000644 0000000 0000000 00000023340 13313422221 014263 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-IDToken-kid
Test description: IDToken has kid [Basic, Implicit, Hybrid]
Timestamp: 2018-06-23T10:44:33Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.079 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.08 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.081 phase <--<-- 2 --- Registration -->-->
0.081 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.081 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#7rutQ0b4oNUGNckW"
],
"response_types": [
"code"
]
}
0.248 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.249 RegistrationResponse {
"client_id": "eceec431-1a95-44af-ab84-602c71ff3239",
"client_secret": "~~wLy6mN1M_A",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "eceec431-1a95-44af-ab84-602c71ff3239",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#7rutQ0b4oNUGNckW"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.249 phase <--<-- 3 --- AsyncAuthn -->-->
0.249 AuthorizationRequest {
"client_id": "eceec431-1a95-44af-ab84-602c71ff3239",
"nonce": "jB7FX3wlH6Ju2TV0",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "RTqYTScT57zw7o67"
}
0.249 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=eceec431-1a95-44af-ab84-602c71ff3239&state=RTqYTScT57zw7o67&response_type=code&nonce=jB7FX3wlH6Ju2TV0
0.249 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=eceec431-1a95-44af-ab84-602c71ff3239&state=RTqYTScT57zw7o67&response_type=code&nonce=jB7FX3wlH6Ju2TV0
2.417 response Response URL with query part
2.418 response {'state': 'RTqYTScT57zw7o67', 'scope': 'openid', 'code': 'fsU6T8oJheLs6MYZc5_ZgPIbWxBz71ItggXEliSMQSo.-twObSgCWxbYzoCg4CpLh0oJQWn4umOWUv6_ZDUyCUw'}
2.418 response {'state': 'RTqYTScT57zw7o67', 'scope': 'openid', 'code': 'fsU6T8oJheLs6MYZc5_ZgPIbWxBz71ItggXEliSMQSo.-twObSgCWxbYzoCg4CpLh0oJQWn4umOWUv6_ZDUyCUw'}
2.419 AuthorizationResponse {
"code": "fsU6T8oJheLs6MYZc5_ZgPIbWxBz71ItggXEliSMQSo.-twObSgCWxbYzoCg4CpLh0oJQWn4umOWUv6_ZDUyCUw",
"scope": "openid",
"state": "RTqYTScT57zw7o67"
}
2.419 phase <--<-- 4 --- AccessToken -->-->
2.419 --> request op_args: {'state': 'RTqYTScT57zw7o67'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.419 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'RTqYTScT57zw7o67', 'code': 'fsU6T8oJheLs6MYZc5_ZgPIbWxBz71ItggXEliSMQSo.-twObSgCWxbYzoCg4CpLh0oJQWn4umOWUv6_ZDUyCUw', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'eceec431-1a95-44af-ab84-602c71ff3239'}, 'state': 'RTqYTScT57zw7o67'}
2.419 AccessTokenRequest {
"code": "fsU6T8oJheLs6MYZc5_ZgPIbWxBz71ItggXEliSMQSo.-twObSgCWxbYzoCg4CpLh0oJQWn4umOWUv6_ZDUyCUw",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "RTqYTScT57zw7o67"
}
2.419 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.419 request_http_args {'headers': {'Authorization': 'Basic ZWNlZWM0MzEtMWE5NS00NGFmLWFiODQtNjAyYzcxZmYzMjM5OiU3RSU3RXdMeTZtTjFNX0E=', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.419 request code=fsU6T8oJheLs6MYZc5_ZgPIbWxBz71ItggXEliSMQSo.-twObSgCWxbYzoCg4CpLh0oJQWn4umOWUv6_ZDUyCUw&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=RTqYTScT57zw7o67
2.63 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.632 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZWNlZWM0MzEtMWE5NS00NGFmLWFiODQtNjAyYzcxZmYzMjM5Il0sImF1dGhfdGltZSI6MTUyOTc1MDU5MiwiZXhwIjoxNTI5NzU0MjcyLCJpYXQiOjE1Mjk3NTA2NzIsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImQyYjYzOWU2LTJjNDctNDJkNC04YTg1LTFjZjY2ZGRjOTM0MiIsIm5vbmNlIjoiakI3Rlgzd2xINkp1MlRWMCIsInJhdCI6MTUyOTc1MDY3MCwic3ViIjoiZm9vQGJhci5jb20ifQ.b_UJ5cuRy199i0hfyV9upPWX5T0hDqfSt1C02-M6cMAemOuco3750vYrVJkjIPWqoPDR4FE0GkHJCTthauRXaHt7KL0E9xhEvWo1lAZ6-bytI5DB5WkoPHidPmGgbWBn8vT39punFrRodMp2iou-6LEIonvVMUkCVTcGY9ifo_M1-EszakxLyYMcoF4Bkhz7PkLEsPmSw1mf3fhbNxYvXh3XpH9RMHbM3lsgJUiV2mX7pFszqgNNOY9hXvNDGTKuqqUQyPdwN0PSe9vyl8fiNfkiIwpR-ZW5qmozr1jiGAsgj3N5gf10XZDxLU7KthTXKKYHIJ6RBrx-XCbCr8EVNQfUnTc_uYyBy1nP8HycXEENkuJpwxn4wwPka2hvIbJDYoGmzdNi57MJ7OkfvYagO01gZgsxNsaACDOXVNsFmKTZzoT4Eb6oT7vZu26_85q5cILsh_SvZhPOEqt-fqWJ1x_8i0NOteBKbHG4GIGvJHBrXn5miAa_IRc9397o1_15ovqLdYCwza8sl0k61z_mgVrL1H-y8x5B2JKpeETjvmWdBIYvbGB6OOh1Gx2DZM7Tz4T3FC5Fu4GOuJrt1L_7gT_W1X4WvVXbYex51vGrhepAew-quKdUSA06DwPKzx_Z0rx-iq-_AxmaYx4fHnlVcnmZigJidzuflNlSQYY-Ui0', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'S_MwiGHdaqk7DVgRdqaE35haMvgex1h-35z1bvLXwqQ.zKY1x1PvDDS2GSZF7oao1Uv1Qe8_7CDFTni4IsmCRQw', 'scope': 'openid'}
2.714 AccessTokenResponse {
"access_token": "S_MwiGHdaqk7DVgRdqaE35haMvgex1h-35z1bvLXwqQ.zKY1x1PvDDS2GSZF7oao1Uv1Qe8_7CDFTni4IsmCRQw",
"expires_in": 3599,
"id_token": {
"aud": [
"eceec431-1a95-44af-ab84-602c71ff3239"
],
"auth_time": 1529750592,
"exp": 1529754272,
"iat": 1529750672,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "d2b639e6-2c47-42d4-8a85-1cf66ddc9342",
"nonce": "jB7FX3wlH6Ju2TV0",
"rat": 1529750670,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
2.714 phase <--<-- 5 --- Done -->-->
2.714 end
2.714 assertion VerifySignedIdTokenHasKID
2.714 condition verify-signed-idtoken-has-kid: status=OK [Verifies that the header of a signed IDToken includes a kid claim.]
2.715 assertion VerifyResponse
2.715 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.715 condition Done: status=OK
============================================================
Conditions
verify-signed-idtoken-has-kid: status=OK [Verifies that the header of a signed IDToken includes a kid claim.]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Req-claims_locales.txt 0000644 0000000 0000000 00000024316 13313422623 015732 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-claims_locales
Test description: Providing claims_locales
Timestamp: 2018-06-23T10:48:51Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
2.992 phase <--<-- 1 --- Webfinger -->-->
2.992 not expected to do WebFinger
2.992 phase <--<-- 2 --- Discovery -->-->
2.992 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
3.077 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
3.079 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
3.079 phase <--<-- 3 --- Registration -->-->
3.079 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
3.079 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#dqKFhoFEBSQe8hpu"
],
"response_types": [
"code"
]
}
3.268 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
3.269 RegistrationResponse {
"client_id": "eb9588cc-88e5-4207-9241-7df27bdbbcd9",
"client_secret": "Rlp16I6tzwgt",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "eb9588cc-88e5-4207-9241-7df27bdbbcd9",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#dqKFhoFEBSQe8hpu"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
3.269 phase <--<-- 4 --- AsyncAuthn -->-->
3.27 AuthorizationRequest {
"claims_locales": "se",
"client_id": "eb9588cc-88e5-4207-9241-7df27bdbbcd9",
"nonce": "VmzEXEut5GvFGWFR",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "kcQ8nNRmAMUzvLWw"
}
3.27 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=eb9588cc-88e5-4207-9241-7df27bdbbcd9&state=kcQ8nNRmAMUzvLWw&response_type=code&nonce=VmzEXEut5GvFGWFR&claims_locales=se
3.27 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=eb9588cc-88e5-4207-9241-7df27bdbbcd9&state=kcQ8nNRmAMUzvLWw&response_type=code&nonce=VmzEXEut5GvFGWFR&claims_locales=se
6.571 response Response URL with query part
6.572 response {'state': 'kcQ8nNRmAMUzvLWw', 'scope': 'openid', 'code': 'Tq7nqV5Aoj3vp3oLXiXLMJLOwQoWgz9nC8DkP4UHOCk.HUzY9a92LFqD4frV4bxnxFjuQPc0_Lsk6ZODlG6AS5s'}
6.572 response {'state': 'kcQ8nNRmAMUzvLWw', 'scope': 'openid', 'code': 'Tq7nqV5Aoj3vp3oLXiXLMJLOwQoWgz9nC8DkP4UHOCk.HUzY9a92LFqD4frV4bxnxFjuQPc0_Lsk6ZODlG6AS5s'}
6.572 AuthorizationResponse {
"code": "Tq7nqV5Aoj3vp3oLXiXLMJLOwQoWgz9nC8DkP4UHOCk.HUzY9a92LFqD4frV4bxnxFjuQPc0_Lsk6ZODlG6AS5s",
"scope": "openid",
"state": "kcQ8nNRmAMUzvLWw"
}
6.572 phase <--<-- 5 --- AccessToken -->-->
6.573 --> request op_args: {'state': 'kcQ8nNRmAMUzvLWw'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
6.573 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'kcQ8nNRmAMUzvLWw', 'code': 'Tq7nqV5Aoj3vp3oLXiXLMJLOwQoWgz9nC8DkP4UHOCk.HUzY9a92LFqD4frV4bxnxFjuQPc0_Lsk6ZODlG6AS5s', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'eb9588cc-88e5-4207-9241-7df27bdbbcd9'}, 'state': 'kcQ8nNRmAMUzvLWw'}
6.573 AccessTokenRequest {
"code": "Tq7nqV5Aoj3vp3oLXiXLMJLOwQoWgz9nC8DkP4UHOCk.HUzY9a92LFqD4frV4bxnxFjuQPc0_Lsk6ZODlG6AS5s",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "kcQ8nNRmAMUzvLWw"
}
6.573 request_url https://oidc-certification.ory.sh:8443/oauth2/token
6.573 request_http_args {'headers': {'Authorization': 'Basic ZWI5NTg4Y2MtODhlNS00MjA3LTkyNDEtN2RmMjdiZGJiY2Q5OlJscDE2STZ0endndA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
6.573 request code=Tq7nqV5Aoj3vp3oLXiXLMJLOwQoWgz9nC8DkP4UHOCk.HUzY9a92LFqD4frV4bxnxFjuQPc0_Lsk6ZODlG6AS5s&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=kcQ8nNRmAMUzvLWw
6.789 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
6.79 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZWI5NTg4Y2MtODhlNS00MjA3LTkyNDEtN2RmMjdiZGJiY2Q5Il0sImF1dGhfdGltZSI6MTUyOTc1MDc0OSwiZXhwIjoxNTI5NzU0NTMxLCJpYXQiOjE1Mjk3NTA5MzEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjUxZjliMWMxLWZlOGItNGE1OC1hMzViLTQ3ODg4MmFhNDE5YiIsIm5vbmNlIjoiVm16RVhFdXQ1R3ZGR1dGUiIsInJhdCI6MTUyOTc1MDkyOCwic3ViIjoiZm9vQGJhci5jb20ifQ.BBK8rBwBiQIpF2GgNNJWME4D3jCVIZr1ooXI6QTJhNXH2W7PZixS3ljKU_16a-fom1vqZkW4DNtNj5JG9qczLznva8dS9AGNaUuP13v7i1LIoVQS7OFR6SQ5meFIZzshDaumacQTpNOBEZ15cMFb_Rd2GlEQNcsug6Tqdd2TrNlFaTIW-GpJgPvAmfPFv0T-dy4Y69z8FRz5gULp9qU2U6mwKuZAsjWLCcLDZ2-1Il9pN7g8Y7dgGO4V0u7jeiYCyw8EB6Fb8oK0OOU8PO2YoglbNsbI4C8sUcB1tbrcLx9CwpglyxdzWTnWOD1iHH2Azb5Jj84zloIAlsZWctGSy_gOu0XpRjFki9z3uDS9JgJmJmSDoAKFFUQZvHyOngiiYVlTpJVV8_7DOZzJvtIRHiLgX0mGfqKRXA4saVY1eSbD02BNoaM2kvev4iyoirnahMfVQW1pK-7Sf5U1Jz0Wk-cb9ridv-XODZzXk3llI9cKcGOOL3thSVdQrm3ZOUixuwXD_CI8xrQUFhXJVWBEfq0NzTRMihm1gqpwsgDE6PfRnRReuOtBMw8cvMlDbnHaCFcMvdJ3SyUqSOFcQ0Wr4AyyrK_JlYTbCYUBhAkATcnpp3bfoVI_iWnAprIu6j6hsgB5lWAVZHGxVx4o7VB4dGD5gdibvEE-gx1gSINmOdI', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'rbH3lY0AT2P2aqRSf7ve4Vx54Y7uGOGcu_HlKQ123iM.-ljPYmb1xENPMT9LT-1kXz6oQ4h0XLJ5h893a6GBtdQ', 'scope': 'openid'}
7.116 AccessTokenResponse {
"access_token": "rbH3lY0AT2P2aqRSf7ve4Vx54Y7uGOGcu_HlKQ123iM.-ljPYmb1xENPMT9LT-1kXz6oQ4h0XLJ5h893a6GBtdQ",
"expires_in": 3599,
"id_token": {
"aud": [
"eb9588cc-88e5-4207-9241-7df27bdbbcd9"
],
"auth_time": 1529750749,
"exp": 1529754531,
"iat": 1529750931,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "51f9b1c1-fe8b-4a58-a35b-478882aa419b",
"nonce": "VmzEXEut5GvFGWFR",
"rat": 1529750928,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
7.116 phase <--<-- 6 --- UserInfo -->-->
7.116 do_user_info_request kwargs:{'state': 'kcQ8nNRmAMUzvLWw', 'method': 'GET', 'authn_method': 'bearer_header'}
7.117 request {'body': None}
7.117 request_url https://oidc-certification.ory.sh:8443/userinfo
7.117 request_http_args {'headers': {'Authorization': 'Bearer rbH3lY0AT2P2aqRSf7ve4Vx54Y7uGOGcu_HlKQ123iM.-ljPYmb1xENPMT9LT-1kXz6oQ4h0XLJ5h893a6GBtdQ'}}
7.19 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
7.191 OpenIDSchema {
"sub": "[email protected]"
}
7.191 OpenIDSchema {
"sub": "[email protected]"
}
7.191 phase <--<-- 7 --- DisplayUserInfo -->-->
7.191 phase <--<-- 8 --- Done -->-->
7.191 end
7.192 assertion CheckHTTPResponse
7.192 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
7.192 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Rotation-RP-Sig.txt 0000644 0000000 0000000 00000040662 13313423031 015065 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Rotation-RP-Sig
Test description: Request access token, change RSA signing key and request another access token
Timestamp: 2018-06-23T10:51:06Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.113 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.115 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.115 phase <--<-- 2 --- Registration -->-->
0.115 register kwargs:{'application_name': 'OIC test tool', 'token_endpoint_auth_method': 'private_key_jwt', 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'refresh_token'], 'response_types': ['code'], 'url': 'https://oidc-certification.ory.sh:8443/clients', 'application_type': 'web'}
0.115 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"refresh_token"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#9oVL9l6dfiAKN4Rx"
],
"response_types": [
"code"
],
"token_endpoint_auth_method": "private_key_jwt"
}
0.278 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.279 RegistrationResponse {
"client_id": "94defbce-9d19-444e-82ff-063166893d73",
"client_secret": "ypMiMiH9eHu~",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"refresh_token"
],
"id": "94defbce-9d19-444e-82ff-063166893d73",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#9oVL9l6dfiAKN4Rx"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "private_key_jwt",
"userinfo_signed_response_alg": "none"
}
0.28 phase <--<-- 3 --- AsyncAuthn -->-->
0.28 AuthorizationRequest {
"client_id": "94defbce-9d19-444e-82ff-063166893d73",
"nonce": "78KLPiZTCvbRLGSv",
"prompt": [
"consent"
],
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid offline_access",
"state": "ZPnami488m175HIA"
}
0.28 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=consent&scope=openid+offline_access&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=94defbce-9d19-444e-82ff-063166893d73&state=ZPnami488m175HIA&response_type=code&nonce=78KLPiZTCvbRLGSv
0.28 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=consent&scope=openid+offline_access&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=94defbce-9d19-444e-82ff-063166893d73&state=ZPnami488m175HIA&response_type=code&nonce=78KLPiZTCvbRLGSv
3.569 response Response URL with query part
3.57 response {'state': 'ZPnami488m175HIA', 'scope': 'openid offline_access', 'code': '_ox-YKllX_eyuQg8FDthnD7bynxyCCBvBbLwAfXo29k.IqqWILdWNOxqdYJYCuzF_q28R29wBxdJA-7QFzOQp44'}
3.57 response {'state': 'ZPnami488m175HIA', 'scope': 'openid offline_access', 'code': '_ox-YKllX_eyuQg8FDthnD7bynxyCCBvBbLwAfXo29k.IqqWILdWNOxqdYJYCuzF_q28R29wBxdJA-7QFzOQp44'}
3.57 AuthorizationResponse {
"code": "_ox-YKllX_eyuQg8FDthnD7bynxyCCBvBbLwAfXo29k.IqqWILdWNOxqdYJYCuzF_q28R29wBxdJA-7QFzOQp44",
"scope": "openid offline_access",
"state": "ZPnami488m175HIA"
}
3.57 phase <--<-- 4 --- AccessToken -->-->
3.57 --> request op_args: {'state': 'ZPnami488m175HIA', 'authn_method': 'private_key_jwt'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.571 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'ZPnami488m175HIA', 'code': '_ox-YKllX_eyuQg8FDthnD7bynxyCCBvBbLwAfXo29k.IqqWILdWNOxqdYJYCuzF_q28R29wBxdJA-7QFzOQp44', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '94defbce-9d19-444e-82ff-063166893d73'}, 'state': 'ZPnami488m175HIA', 'authn_method': 'private_key_jwt'}
3.571 AccessTokenRequest {
"client_assertion": "eyJhbGciOiJSUzI1NiIsImtpZCI6Ind0MjVPZ3lSX256RzNPb1E3ZGFhMnJMNi1nTW5GZGZSekJqaFVWUHU4UlEifQ.eyJpc3MiOiAiOTRkZWZiY2UtOWQxOS00NDRlLTgyZmYtMDYzMTY2ODkzZDczIiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiOTRkZWZiY2UtOWQxOS00NDRlLTgyZmYtMDYzMTY2ODkzZDczIiwgImlhdCI6IDE1Mjk3NTEwNjUsICJqdGkiOiAiYWtVSXVmbHJWd3dFVVlJTEkzcnpSeER6b0R2R1FhRVMiLCAiZXhwIjogMTUyOTc1MTY2NX0.gNaR_ICpkvhYIUkYH7nvdJ5G7YprXlipQcrfsQuzSfKyPHiIJDDkWbtwQnOmMjoaAvIZnejD3rAeHR8JXZbyO64gc31hH-8ISrTlUDCnsj-au6y9UEsW-262wPrOneFUMSArq0-toqYEBGQP7-6ze_gBCO0O6Ds-2p4sodTxllpoAaiP2CFMpmO6n8y4RNYhfd07tl9ccbjN4MtQLz2d2538ryJ8VClJq1h4ymn4j3Oxr2fyDvjZFm0voSe7VhnV5_51JkXtlGrO--qCKun0aS_szGHQBBuhsHFN1b4pyDqGhF9BddtW6hX4pXNN3OOr6uL7_YqkRNZau7DgAztFvg",
"client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer",
"code": "_ox-YKllX_eyuQg8FDthnD7bynxyCCBvBbLwAfXo29k.IqqWILdWNOxqdYJYCuzF_q28R29wBxdJA-7QFzOQp44",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "ZPnami488m175HIA"
}
3.574 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.574 request_http_args {'headers': {'Content-Type': 'application/x-www-form-urlencoded'}}
3.574 request code=_ox-YKllX_eyuQg8FDthnD7bynxyCCBvBbLwAfXo29k.IqqWILdWNOxqdYJYCuzF_q28R29wBxdJA-7QFzOQp44&client_assertion_type=urn%3Aietf%3Aparams%3Aoauth%3Aclient-assertion-type%3Ajwt-bearer&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=ZPnami488m175HIA&client_assertion=eyJhbGciOiJSUzI1NiIsImtpZCI6Ind0MjVPZ3lSX256RzNPb1E3ZGFhMnJMNi1nTW5GZGZSekJqaFVWUHU4UlEifQ.eyJpc3MiOiAiOTRkZWZiY2UtOWQxOS00NDRlLTgyZmYtMDYzMTY2ODkzZDczIiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiOTRkZWZiY2UtOWQxOS00NDRlLTgyZmYtMDYzMTY2ODkzZDczIiwgImlhdCI6IDE1Mjk3NTEwNjUsICJqdGkiOiAiYWtVSXVmbHJWd3dFVVlJTEkzcnpSeER6b0R2R1FhRVMiLCAiZXhwIjogMTUyOTc1MTY2NX0.gNaR_ICpkvhYIUkYH7nvdJ5G7YprXlipQcrfsQuzSfKyPHiIJDDkWbtwQnOmMjoaAvIZnejD3rAeHR8JXZbyO64gc31hH-8ISrTlUDCnsj-au6y9UEsW-262wPrOneFUMSArq0-toqYEBGQP7-6ze_gBCO0O6Ds-2p4sodTxllpoAaiP2CFMpmO6n8y4RNYhfd07tl9ccbjN4MtQLz2d2538ryJ8VClJq1h4ymn4j3Oxr2fyDvjZFm0voSe7VhnV5_51JkXtlGrO--qCKun0aS_szGHQBBuhsHFN1b4pyDqGhF9BddtW6hX4pXNN3OOr6uL7_YqkRNZau7DgAztFvg
3.702 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.703 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiOTRkZWZiY2UtOWQxOS00NDRlLTgyZmYtMDYzMTY2ODkzZDczIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiZXhwIjoxNTI5NzU0NjY1LCJpYXQiOjE1Mjk3NTEwNjUsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjNhZDFhNzJiLWFjNzEtNDA5OS04MGFjLWE5NmFmYzg5NDA0OSIsIm5vbmNlIjoiNzhLTFBpWlRDdmJSTEdTdiIsInJhdCI6MTUyOTc1MTA2Miwic3ViIjoiZm9vQGJhci5jb20ifQ.iAwTmRufOWvHsc8VFBM9ztznJJjbXryE4wKpkyzpqwnaJ2kIcsFzxzIhwKjHrj5smva66Uyp2doIP6kNEku5qmcN1hTaE-XyrEkwCzrTKqG6CZJq9IRMV6CxcXCeeN6huMN3iJUXwNmqcFejEKgfT3d6nZXzzWuhKNxvuJ7OHY0ArXdCowhQahSDYBG0FKNfaokhkEP27mbzb6p0FR16EWWE7iuEp7hF9G3f-VlLSfzhGYpeY9hqYrQsS27Xq2r3vEqPEOX_5HZiMUAdVRPyC4AgTiN59w3rQ0_IhWp0zWSFCMGS-T6sjquVNm908Xrkopk726i7ZGvC38SAPRx8paerlZgrqzGd2mJmoz0VNsyO6nIXb0JX0EgchAMFFFVXyDCLmGZ7tlSAMpouJoh2r-3C5Rf0zE971lcrm6TKm2hB3n4asAOPMvfiuETLgwonZL8xV4U00wQaIUUHv7wgGwV_5I-3AUBwKyrB2kYzz4mpVAX_XyIsFRMqZ-YFFW3REYfJVBxU5MTfG7s7M0Pg5sNModiot4hUPgskiHqISEwBNJuutlIGrO5ghB37_-kKc1Jp8eVE0pGKq9kiPkL-4l792hp1-5_0WHO5ozZnku_wigH5pl5V88rHlnPSU2i5XiQtPW1CqnD_hnC-3g8_4z4kGfjivhfaopuhZfJiPg8', 'scope': 'openid offline_access', 'access_token': 'IeVz0vz8NQdA327xdFMGBgW_mrQiVy_eY06rxAoRAeM.k5C1n5drAdms2RRmvb3AitKTRdrtCHcvhevwcMLzfCQ', 'refresh_token': 'hoIr1vEHsEnXJpaDSXnv2Ll3LExhQ_In1q7ktnGRMfs.4_7o2b9QNBMFCC4-jsNdiuGdSbYmxUSP0_uW3_OTbzQ', 'token_type': 'bearer', 'expires_in': 3599}
3.783 AccessTokenResponse {
"access_token": "IeVz0vz8NQdA327xdFMGBgW_mrQiVy_eY06rxAoRAeM.k5C1n5drAdms2RRmvb3AitKTRdrtCHcvhevwcMLzfCQ",
"expires_in": 3599,
"id_token": {
"aud": [
"94defbce-9d19-444e-82ff-063166893d73"
],
"auth_time": 1529750975,
"exp": 1529754665,
"iat": 1529751065,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "3ad1a72b-ac71-4099-80ac-a96afc894049",
"nonce": "78KLPiZTCvbRLGSv",
"rat": 1529751062,
"sub": "[email protected]"
},
"refresh_token": "hoIr1vEHsEnXJpaDSXnv2Ll3LExhQ_In1q7ktnGRMfs.4_7o2b9QNBMFCC4-jsNdiuGdSbYmxUSP0_uW3_OTbzQ",
"scope": "openid offline_access",
"token_type": "bearer"
}
3.783 phase <--<-- 5 --- RotateSigKeys -->-->
3.829 phase <--<-- 6 --- RefreshAccessToken -->-->
3.833 RefreshAccessTokenRequest {
"client_assertion": "eyJhbGciOiJSUzI1NiIsImtpZCI6IkJlYTFmMHRNOWFhRmpkTU5YSmk4RXJhbDhFR0dWdjducF9NVjdUdlJ0UFEifQ.eyJpc3MiOiAiOTRkZWZiY2UtOWQxOS00NDRlLTgyZmYtMDYzMTY2ODkzZDczIiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiOTRkZWZiY2UtOWQxOS00NDRlLTgyZmYtMDYzMTY2ODkzZDczIiwgImlhdCI6IDE1Mjk3NTEwNjUsICJqdGkiOiAiZjBJOFhEWGc1bXZHWnZUdnRmcFgzWjIxSkpFeXZXeTMiLCAiZXhwIjogMTUyOTc1MTY2NX0.JJtCb3fnOy4Y3NBrO8QkebS0VvoRrgcyQnCK3GXyNhQJw-u7K0b9Mu6E-ubhqBWkClSdlEN7bM5QbqRkpHIHSoXJnb7RhlF8ZBMYSmYVG8cl72LyEVHLeuprD5OvyBCvwvIpQcUHHiPyzPekOB9nsHhEmN69939vMfsW3SoM4SFpeyZQTTPaW3pmepzpIgwExVnajFEGfxbQ-KJxCEYbmgDFGVvcU7Lu37kugrIH52KfRr7FaGGJs0T-lzDrpNPVUmsJ15rdAqnUrZSpNQY1LMAkTV5pQmNlYDTn4KfRfUHphdd5HRsbVA6RQXsVY6YqOVSi2nxLKAGbwby8IR86Ig",
"client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer",
"grant_type": "refresh_token",
"refresh_token": "hoIr1vEHsEnXJpaDSXnv2Ll3LExhQ_In1q7ktnGRMfs.4_7o2b9QNBMFCC4-jsNdiuGdSbYmxUSP0_uW3_OTbzQ",
"scope": "openid offline_access"
}
3.837 request {'client_assertion': 'eyJhbGciOiJSUzI1NiIsImtpZCI6IkJlYTFmMHRNOWFhRmpkTU5YSmk4RXJhbDhFR0dWdjducF9NVjdUdlJ0UFEifQ.eyJpc3MiOiAiOTRkZWZiY2UtOWQxOS00NDRlLTgyZmYtMDYzMTY2ODkzZDczIiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiOTRkZWZiY2UtOWQxOS00NDRlLTgyZmYtMDYzMTY2ODkzZDczIiwgImlhdCI6IDE1Mjk3NTEwNjUsICJqdGkiOiAiZjBJOFhEWGc1bXZHWnZUdnRmcFgzWjIxSkpFeXZXeTMiLCAiZXhwIjogMTUyOTc1MTY2NX0.JJtCb3fnOy4Y3NBrO8QkebS0VvoRrgcyQnCK3GXyNhQJw-u7K0b9Mu6E-ubhqBWkClSdlEN7bM5QbqRkpHIHSoXJnb7RhlF8ZBMYSmYVG8cl72LyEVHLeuprD5OvyBCvwvIpQcUHHiPyzPekOB9nsHhEmN69939vMfsW3SoM4SFpeyZQTTPaW3pmepzpIgwExVnajFEGfxbQ-KJxCEYbmgDFGVvcU7Lu37kugrIH52KfRr7FaGGJs0T-lzDrpNPVUmsJ15rdAqnUrZSpNQY1LMAkTV5pQmNlYDTn4KfRfUHphdd5HRsbVA6RQXsVY6YqOVSi2nxLKAGbwby8IR86Ig', 'scope': 'openid offline_access', 'grant_type': 'refresh_token', 'client_assertion_type': 'urn:ietf:params:oauth:client-assertion-type:jwt-bearer', 'refresh_token': 'hoIr1vEHsEnXJpaDSXnv2Ll3LExhQ_In1q7ktnGRMfs.4_7o2b9QNBMFCC4-jsNdiuGdSbYmxUSP0_uW3_OTbzQ'}
3.966 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.966 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.966 handle_response kwargs:{'r': <Response [200]>, 'csi': <oic.oic.message.RefreshAccessTokenRequest object at 0x7f2440115eb8>}
3.967 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiOTRkZWZiY2UtOWQxOS00NDRlLTgyZmYtMDYzMTY2ODkzZDczIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiZXhwIjoxNTI5NzU0NjY1LCJpYXQiOjE1Mjk3NTEwNjUsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImY4YzgwNDAwLTE5YzgtNDM2NS05MjM0LWRkNGE0NDFkYWY1MyIsIm5vbmNlIjoiIiwicmF0IjoxNTI5NzUxMDYyLCJzdWIiOiJmb29AYmFyLmNvbSJ9.Yn3F778rHoILy6xyoA88frqDu_wTTy5zBW-bJ8vDKliiV7RgnrjWSlGYufxgvs59etatv2_sd8qX--hLv0lWgGXVfIZKbD8rVrRFFeo0Y-9xgRK6j_OcpWhp9vaHnOuuvE2us_-hk8qvvKGAR4OAyDybaQcelldb6vmvmOG6AIlQJ3SEt1AETg063K-yEPE-WP7y849E329IOiUxIyvggsjNU5nIVe26I2R-fQ6BYLzqL2QKzotQK_Bht_kXdV2Z8Nf2Zqcnfk6wNmy4ihV0YKjOXZTs0MzR4KBghlWueE0C2nr6ww-uofE7hJJWzebJUHCuK0lxOxIAyBnP4iAvI2vZah5avOuUSywpPQy1-cDinTIG7DXG8BobaHaauOfPhLd0XzGQoUilGe1X8Y6e2UE83sBaDfJV6ayr8kcYZ7nlDTB0alyMjzI8wRhK7CbFnfHwbiPTUJB6VuIsp4IDGvnEWQoEr3nuP5fP48th4taIrSvyuiMt4irkq9xtPfDJQFaxE5oykOQbkYWv4zQbM18k5msAHEVDEzi-kSdQzQYVSVr_mJlGFBobxnWdtRBH81BMaAapYWA-7gdGmHchf8qXr-OQ_XGz3yTstdEtQYKvIIMPhpddQiH_QC0q3Uu_vmBD2WKepVh-z-uCBE9Nj0V1fbYpkBjuNY8Tx02Nxmo', 'scope': 'openid offline_access', 'access_token': '2gCjRUPGKTRXQPWlUUHG3GQWHR9iTwZMNQdqWtdbgQw.UlR0HCq0qY_gdRlwhwr85jiKbR3eAGQD6Aq1_mef-Z0', 'refresh_token': 'Ruk0UHb-qp4MCkl8Jvyexg_JqxrpfP5wzkKKcFedXHI.j--8O2dT8AOu2W9kiN2Pwpz3dkfVZrmbZ1Reee4tw9Q', 'token_type': 'bearer', 'expires_in': 3599}
3.97 jws header {'typ': 'JWT', 'alg': 'RS256', 'kid': 'public:0acf6c64-4d55-4888-abb9-b2a3f661ee7f'}
3.97 AccessTokenResponse {
"access_token": "2gCjRUPGKTRXQPWlUUHG3GQWHR9iTwZMNQdqWtdbgQw.UlR0HCq0qY_gdRlwhwr85jiKbR3eAGQD6Aq1_mef-Z0",
"expires_in": 3599,
"id_token": {
"aud": [
"94defbce-9d19-444e-82ff-063166893d73"
],
"auth_time": 1529750975,
"exp": 1529754665,
"iat": 1529751065,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "f8c80400-19c8-4365-9234-dd4a441daf53",
"rat": 1529751062,
"sub": "[email protected]"
},
"refresh_token": "Ruk0UHb-qp4MCkl8Jvyexg_JqxrpfP5wzkKKcFedXHI.j--8O2dT8AOu2W9kiN2Pwpz3dkfVZrmbZ1Reee4tw9Q",
"scope": "openid offline_access",
"token_type": "bearer"
}
3.97 phase <--<-- 7 --- Done -->-->
3.97 end
3.971 assertion CheckHTTPResponse
3.971 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
3.971 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
Done: status=OK
============================================================
RESULT: PASSED
./OP-OAuth-2nd-Revokes.txt 0000644 0000000 0000000 00000033305 13313423003 015337 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-OAuth-2nd-Revokes
Test description: Trying to use authorization code twice should result in revoking previously issued access tokens
Timestamp: 2018-06-23T10:50:43Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.076 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.077 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.077 phase <--<-- 2 --- Registration -->-->
0.078 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.078 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#XBw87oVdSVU8JxPO"
],
"response_types": [
"code"
]
}
0.242 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.243 RegistrationResponse {
"client_id": "ce8e94bb-b051-4d75-91cb-8f8f99bddb18",
"client_secret": "DdcrL1_M5qmy",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "ce8e94bb-b051-4d75-91cb-8f8f99bddb18",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#XBw87oVdSVU8JxPO"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.243 phase <--<-- 3 --- Note -->-->
1.568 phase <--<-- 4 --- AsyncAuthn -->-->
1.569 AuthorizationRequest {
"client_id": "ce8e94bb-b051-4d75-91cb-8f8f99bddb18",
"nonce": "dqgkYo3H5I69iFX2",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "vo0F5zs0z6N5iLSf"
}
1.569 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=ce8e94bb-b051-4d75-91cb-8f8f99bddb18&state=vo0F5zs0z6N5iLSf&response_type=code&nonce=dqgkYo3H5I69iFX2
1.569 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=ce8e94bb-b051-4d75-91cb-8f8f99bddb18&state=vo0F5zs0z6N5iLSf&response_type=code&nonce=dqgkYo3H5I69iFX2
5.951 response Response URL with query part
5.951 response {'state': 'vo0F5zs0z6N5iLSf', 'scope': 'openid', 'code': 'SOfv2rr_HYydZ5epx3H-S2sUb2cDbL-U3AwOML96bO8.fY-Nw_9SU-VefjGtGzaBxYPqnuWez5BkZJ3Y8xH0XX8'}
5.951 response {'state': 'vo0F5zs0z6N5iLSf', 'scope': 'openid', 'code': 'SOfv2rr_HYydZ5epx3H-S2sUb2cDbL-U3AwOML96bO8.fY-Nw_9SU-VefjGtGzaBxYPqnuWez5BkZJ3Y8xH0XX8'}
5.952 AuthorizationResponse {
"code": "SOfv2rr_HYydZ5epx3H-S2sUb2cDbL-U3AwOML96bO8.fY-Nw_9SU-VefjGtGzaBxYPqnuWez5BkZJ3Y8xH0XX8",
"scope": "openid",
"state": "vo0F5zs0z6N5iLSf"
}
5.952 phase <--<-- 5 --- AccessToken -->-->
5.952 --> request op_args: {'state': 'vo0F5zs0z6N5iLSf'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
5.952 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'vo0F5zs0z6N5iLSf', 'code': 'SOfv2rr_HYydZ5epx3H-S2sUb2cDbL-U3AwOML96bO8.fY-Nw_9SU-VefjGtGzaBxYPqnuWez5BkZJ3Y8xH0XX8', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'ce8e94bb-b051-4d75-91cb-8f8f99bddb18'}, 'state': 'vo0F5zs0z6N5iLSf'}
5.952 AccessTokenRequest {
"code": "SOfv2rr_HYydZ5epx3H-S2sUb2cDbL-U3AwOML96bO8.fY-Nw_9SU-VefjGtGzaBxYPqnuWez5BkZJ3Y8xH0XX8",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "vo0F5zs0z6N5iLSf"
}
5.952 request_url https://oidc-certification.ory.sh:8443/oauth2/token
5.952 request_http_args {'headers': {'Authorization': 'Basic Y2U4ZTk0YmItYjA1MS00ZDc1LTkxY2ItOGY4Zjk5YmRkYjE4OkRkY3JMMV9NNXFteQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
5.952 request code=SOfv2rr_HYydZ5epx3H-S2sUb2cDbL-U3AwOML96bO8.fY-Nw_9SU-VefjGtGzaBxYPqnuWez5BkZJ3Y8xH0XX8&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=vo0F5zs0z6N5iLSf
6.232 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
6.233 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiY2U4ZTk0YmItYjA1MS00ZDc1LTkxY2ItOGY4Zjk5YmRkYjE4Il0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiZXhwIjoxNTI5NzU0NjQyLCJpYXQiOjE1Mjk3NTEwNDMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImZmOGIxYmM4LTk3MDItNDBjZS1iZjQxLTZjMTc3MzgzN2E3ZCIsIm5vbmNlIjoiZHFna1lvM0g1STY5aUZYMiIsInJhdCI6MTUyOTc1MTAzOCwic3ViIjoiZm9vQGJhci5jb20ifQ.bJG06MkuiZQS_XjpyWJP_U8gHU0rHzKscC6dM3UaBtoO7nPchcCa05VAMQRyetTn7VU98lEOT0UXo5rDyxQmVWFpy_4vL-hwdaReVHAiTv0YmsJIP4L0WFE4BhW5q_6YnPWJRX3zls7h6dbCvjxho-oRa5-d1fUM55JqsXn66JE14p7jdY2BmUXEr1ribfMc4HYcHtMYkCV9IHw89nHUneq4nq-IdQyciQVbodkIxGQ5s6jj2YO0udJhgZfwT3yix45YA1YRFmjRGfvpfAD2Pkgvu08mD1NkddVJLphkGejGnpr_hIKvyAHPq2FAjjICLplV5mIjzqi47jsaZxSUNOb5wtnJh50I3sqlkBVY1uHBgVTcbkX0Ss2JLeJsbLpUxV3j5k_SRb2-J5i1iWz8V74A6e8aMEJWc7ewM_nQjzzpRmXFl1sR_GKuGboUXGzJugkzRg6o2K_YfQGG-k7LD108U4WyVA4vTl7-IfxknUL9iOwOoF9S__bigypffx80gtf_PpqHtS6BHKangw7ZFgC3JB-ykhgZ3eVr0zHg_hk-E-LBPw_YlLwSEFquP9GgiM3UFwc53U28j394VgydOmce5dvxJoAego19T7uUtXTcrqGp_oFDAGqfDhfyhREK7fMJ5uiprpFLlSFDyAE5NeAdUw-8ST1XnPdpofJCQj0', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'L6jTyeUSvhHNK1xLNf3BNrdQ9ksIj3aKAu4yOhuN8A0.URku-iZj4qSi7X5SpIBeOpF1_ejXxm2OmGeJg82E4d0', 'scope': 'openid'}
6.349 AccessTokenResponse {
"access_token": "L6jTyeUSvhHNK1xLNf3BNrdQ9ksIj3aKAu4yOhuN8A0.URku-iZj4qSi7X5SpIBeOpF1_ejXxm2OmGeJg82E4d0",
"expires_in": 3599,
"id_token": {
"aud": [
"ce8e94bb-b051-4d75-91cb-8f8f99bddb18"
],
"auth_time": 1529750975,
"exp": 1529754642,
"iat": 1529751043,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "ff8b1bc8-9702-40ce-bf41-6c1773837a7d",
"nonce": "dqgkYo3H5I69iFX2",
"rat": 1529751038,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
6.35 phase <--<-- 6 --- AccessToken -->-->
6.35 --> request op_args: {'state': 'vo0F5zs0z6N5iLSf'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
6.35 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'vo0F5zs0z6N5iLSf', 'code': 'SOfv2rr_HYydZ5epx3H-S2sUb2cDbL-U3AwOML96bO8.fY-Nw_9SU-VefjGtGzaBxYPqnuWez5BkZJ3Y8xH0XX8', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'ce8e94bb-b051-4d75-91cb-8f8f99bddb18'}, 'state': 'vo0F5zs0z6N5iLSf'}
6.35 AccessTokenRequest {
"code": "SOfv2rr_HYydZ5epx3H-S2sUb2cDbL-U3AwOML96bO8.fY-Nw_9SU-VefjGtGzaBxYPqnuWez5BkZJ3Y8xH0XX8",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "vo0F5zs0z6N5iLSf"
}
6.35 request_url https://oidc-certification.ory.sh:8443/oauth2/token
6.35 request_http_args {'headers': {'Authorization': 'Basic Y2U4ZTk0YmItYjA1MS00ZDc1LTkxY2ItOGY4Zjk5YmRkYjE4OkRkY3JMMV9NNXFteQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
6.35 request code=SOfv2rr_HYydZ5epx3H-S2sUb2cDbL-U3AwOML96bO8.fY-Nw_9SU-VefjGtGzaBxYPqnuWez5BkZJ3Y8xH0XX8&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=vo0F5zs0z6N5iLSf
6.513 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:400 message:{"error":"invalid_grant","error_description":"The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client","status_code":400,"error_debug":"The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found."}
6.513 response {'error_debug': 'The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found.', 'error_description': 'The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client', 'error': 'invalid_grant', 'status_code': 400}
6.513 event Got expected error
6.513 TokenErrorResponse {
"error": "invalid_grant",
"error_debug": "The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found.",
"error_description": "The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client",
"status_code": 400
}
6.514 phase <--<-- 7 --- UserInfo -->-->
6.514 do_user_info_request kwargs:{'state': 'vo0F5zs0z6N5iLSf', 'method': 'GET', 'authn_method': 'bearer_header'}
6.514 request {'body': None}
6.514 request_url https://oidc-certification.ory.sh:8443/userinfo
6.514 request_http_args {'headers': {'Authorization': 'Bearer L6jTyeUSvhHNK1xLNf3BNrdQ9ksIj3aKAu4yOhuN8A0.URku-iZj4qSi7X5SpIBeOpF1_ejXxm2OmGeJg82E4d0'}}
6.622 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:401 message:{"error":"request_unauthorized","error_description":"The request could not be authorized","error_hint":"Check that you provided valid credentials in the right format.","status_code":401,"error_debug":"A validator returned an error"}
6.623 event Expected error not received: got request_unauthorized
6.623 ErrorResponse {
"error": "request_unauthorized",
"error_debug": "A validator returned an error",
"error_description": "The request could not be authorized",
"error_hint": "Check that you provided valid credentials in the right format.",
"status_code": 401
}
6.623 ErrorResponse {
"error": "request_unauthorized",
"error_debug": "A validator returned an error",
"error_description": "The request could not be authorized",
"error_hint": "Check that you provided valid credentials in the right format.",
"status_code": 401
}
6.623 phase <--<-- 8 --- Done -->-->
6.623 end
6.624 assertion VerifyResponse
6.624 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
6.624 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Discovery-Config.txt 0000644 0000000 0000000 00000006700 13313422111 015372 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Discovery-Config
Test description: Publishes openid-configuration discovery information
Timestamp: 2018-06-23T10:43:21Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.106 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.107 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.107 phase <--<-- 2 --- Done -->-->
0.107 end
0.108 assertion CheckHTTPResponse
0.108 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.108 assertion VerifyIdTokenSigningAlgorithmIsSupported
0.108 condition verify-id_token_signing-algorithm-is-supported: status=OK [Verify that required algorithms in id_token_signing_alg_values_supported]
0.108 assertion VerifyHTTPSUsage
0.108 condition verify-https-usage: status=OK [Verify that specific endpoints uses https]
0.109 assertion VerifyOPEndpointsUseHTTPS
0.109 condition verify-op-endpoints-use-https: status=OK [Verify that all OP endpoints uses https]
0.109 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-id_token_signing-algorithm-is-supported: status=OK [Verify that required algorithms in id_token_signing_alg_values_supported]
verify-https-usage: status=OK [Verify that specific endpoints uses https]
verify-op-endpoints-use-https: status=OK [Verify that all OP endpoints uses https]
Done: status=OK
============================================================
RESULT: PASSED
./OP-scope-All.txt 0000644 0000000 0000000 00000030100 13313422463 014040 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-scope-All
Test description: Scope requesting all claims
Timestamp: 2018-06-23T10:47:15Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.101 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.102 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.102 phase <--<-- 2 --- Registration -->-->
0.102 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.103 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#afOCONhA3tHSUiZg"
],
"response_types": [
"code"
]
}
0.261 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.262 RegistrationResponse {
"client_id": "5ffbb9c1-0c63-4074-9491-28f0e0fc277c",
"client_secret": "UF_gwCY8VDz6",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "5ffbb9c1-0c63-4074-9491-28f0e0fc277c",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#afOCONhA3tHSUiZg"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.262 phase <--<-- 3 --- AsyncAuthn -->-->
0.262 condition Check support: status=WARNING, message=No support for: scopes_supported=['profile', 'email', 'address', 'phone']
0.262 AuthorizationRequest {
"client_id": "5ffbb9c1-0c63-4074-9491-28f0e0fc277c",
"nonce": "1yrzOHQx6krgPSXA",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid profile email address phone",
"state": "xuXhK2ICXRbT6sfG"
}
0.263 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+profile+email+address+phone&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=5ffbb9c1-0c63-4074-9491-28f0e0fc277c&state=xuXhK2ICXRbT6sfG&response_type=code&nonce=1yrzOHQx6krgPSXA
0.263 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+profile+email+address+phone&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=5ffbb9c1-0c63-4074-9491-28f0e0fc277c&state=xuXhK2ICXRbT6sfG&response_type=code&nonce=1yrzOHQx6krgPSXA
4.3 response Response URL with query part
4.301 response {'state': 'xuXhK2ICXRbT6sfG', 'scope': 'openid profile email address phone', 'code': 'WZA8FZ037sbc_g7mUW-VKuj4tgkhdWk75z2JRY2ZHkw.kZ76IRcCgFSCex4roQ3IZ_Dd6GqJ5epOnYIieb_xY-I'}
4.301 response {'state': 'xuXhK2ICXRbT6sfG', 'scope': 'openid profile email address phone', 'code': 'WZA8FZ037sbc_g7mUW-VKuj4tgkhdWk75z2JRY2ZHkw.kZ76IRcCgFSCex4roQ3IZ_Dd6GqJ5epOnYIieb_xY-I'}
4.301 AuthorizationResponse {
"code": "WZA8FZ037sbc_g7mUW-VKuj4tgkhdWk75z2JRY2ZHkw.kZ76IRcCgFSCex4roQ3IZ_Dd6GqJ5epOnYIieb_xY-I",
"scope": "openid profile email address phone",
"state": "xuXhK2ICXRbT6sfG"
}
4.301 phase <--<-- 4 --- AccessToken -->-->
4.301 --> request op_args: {'state': 'xuXhK2ICXRbT6sfG'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
4.301 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'xuXhK2ICXRbT6sfG', 'code': 'WZA8FZ037sbc_g7mUW-VKuj4tgkhdWk75z2JRY2ZHkw.kZ76IRcCgFSCex4roQ3IZ_Dd6GqJ5epOnYIieb_xY-I', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '5ffbb9c1-0c63-4074-9491-28f0e0fc277c'}, 'state': 'xuXhK2ICXRbT6sfG'}
4.302 AccessTokenRequest {
"code": "WZA8FZ037sbc_g7mUW-VKuj4tgkhdWk75z2JRY2ZHkw.kZ76IRcCgFSCex4roQ3IZ_Dd6GqJ5epOnYIieb_xY-I",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "xuXhK2ICXRbT6sfG"
}
4.302 request_url https://oidc-certification.ory.sh:8443/oauth2/token
4.302 request_http_args {'headers': {'Authorization': 'Basic NWZmYmI5YzEtMGM2My00MDc0LTk0OTEtMjhmMGUwZmMyNzdjOlVGX2d3Q1k4VkR6Ng==', 'Content-Type': 'application/x-www-form-urlencoded'}}
4.302 request code=WZA8FZ037sbc_g7mUW-VKuj4tgkhdWk75z2JRY2ZHkw.kZ76IRcCgFSCex4roQ3IZ_Dd6GqJ5epOnYIieb_xY-I&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=xuXhK2ICXRbT6sfG
4.517 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
4.518 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNWZmYmI5YzEtMGM2My00MDc0LTk0OTEtMjhmMGUwZmMyNzdjIl0sImF1dGhfdGltZSI6MTUyOTc1MDc0OSwiZXhwIjoxNTI5NzU0NDM1LCJpYXQiOjE1Mjk3NTA4MzUsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjdiZWI1YWQwLTFkOWQtNGU4OS1iZmU4LWNkMDRhMTkxZmE1ZCIsIm5vbmNlIjoiMXlyek9IUXg2a3JnUFNYQSIsInJhdCI6MTUyOTc1MDgzMSwic3ViIjoiZm9vQGJhci5jb20ifQ.VBZognv-Jiul9LshSodEeX0fXvnL_B54t-LNfBWXN-7d7TB5hgjsZmPGbvaSSbx0qdnnE3aaTk6eArzBG2cd-Ih3MGc2NeAGvWqFmFD-TF3ASBLy4Er-1HSrxvYGhSe_M4uhNDsYwx2ULxZokOuDlniYFQym9mTzLy9MfvtIxWZHnchtTT2SulR1I1JseiGV_ry-1-d41dKa7CZG2Hy01LALTpU3M1v2L7ZDAzFgQDKi8YGGPlbXL1Chh_rzmNaSjhWKHRq3EZ6nWb3P1FeswjqEslf_XEJYGtKtM502i9s4K0_LbBkhq0CQwtejd4wdhG3hgDAbtX68AobdRg6HsLspHThM71G8un5l281ZiipAUNpkE9eJwdnPkHRNWd30PurypTl3hKbfB5ULBg2Vle1UEaq6WCykmvrKqVnO88YtnCjEjZowMUTDOXLzReRUzjkWtJ-qy9UcbVC53yV8_LqjEeiKXiU_FcTrzj0CEOk1x1b3UYHp2uA_qe2lWee9VigRmKl2r49SebnKQpyQMVrLXZb2J6fIhzx4OE-9LN3Qj8Gt8E5UlwpIdUQcTLd9bCJuCyiQr-JJqJxhwrB5qF5NidNiIBUbmb5VHwZ7j8IbOIhNg_Fcxp2sQOrtgW1Yx6i42Ezyyr2FIDG1qPBgpNbbpIhjwO-OHnhyMlSL4AU', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': '_FiJ3LpkzW0ydTMcrRrFqQURyOPeseUkLcG40A8MDnE.7iMcWKgftVNmNLHTFolNxhMB_WhXEA4wxzy0NXAbhFo', 'scope': 'openid profile email address phone'}
4.604 AccessTokenResponse {
"access_token": "_FiJ3LpkzW0ydTMcrRrFqQURyOPeseUkLcG40A8MDnE.7iMcWKgftVNmNLHTFolNxhMB_WhXEA4wxzy0NXAbhFo",
"expires_in": 3599,
"id_token": {
"aud": [
"5ffbb9c1-0c63-4074-9491-28f0e0fc277c"
],
"auth_time": 1529750749,
"exp": 1529754435,
"iat": 1529750835,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "7beb5ad0-1d9d-4e89-bfe8-cd04a191fa5d",
"nonce": "1yrzOHQx6krgPSXA",
"rat": 1529750831,
"sub": "[email protected]"
},
"scope": "openid profile email address phone",
"token_type": "bearer"
}
4.604 phase <--<-- 5 --- UserInfo -->-->
4.604 do_user_info_request kwargs:{'state': 'xuXhK2ICXRbT6sfG', 'method': 'GET', 'authn_method': 'bearer_header'}
4.605 request {'body': None}
4.605 request_url https://oidc-certification.ory.sh:8443/userinfo
4.605 request_http_args {'headers': {'Authorization': 'Bearer _FiJ3LpkzW0ydTMcrRrFqQURyOPeseUkLcG40A8MDnE.7iMcWKgftVNmNLHTFolNxhMB_WhXEA4wxzy0NXAbhFo'}}
4.698 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
4.699 OpenIDSchema {
"sub": "[email protected]"
}
4.699 OpenIDSchema {
"sub": "[email protected]"
}
4.699 phase <--<-- 6 --- Done -->-->
4.699 end
4.7 assertion CheckHTTPResponse
4.7 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
4.7 assertion VerifyResponse
4.7 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.701 assertion VerifyScopes
4.701 condition verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username', 'email', 'email_verified', 'address', 'phone_number', 'phone_number_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
4.701 condition Done: status=OK
============================================================
Conditions
Check support: status=WARNING, message=No support for: scopes_supported=['profile', 'email', 'address', 'phone']
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username', 'email', 'email_verified', 'address', 'phone_number', 'phone_number_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
No support for: scopes_supported=['profile', 'email', 'address', 'phone']
The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username', 'email', 'email_verified', 'address', 'phone_number', 'phone_number_verified']
./OP-redirect_uri-Query-Added.txt 0000644 0000000 0000000 00000016330 13313422424 017011 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-Query-Added
Test description: Request with redirect_uri with query component when registered redirect_uri has no query component
Timestamp: 2018-06-23T10:46:44Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Registration -->-->
0.075 register kwargs:{'application_name': 'OIC test tool', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'redirect_uri': ['https://op.certification.openid.net:61353/authz_cb?foo=bar']}
0.075 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#LtySycnhFcGnHiXR"
],
"response_types": [
"code"
]
}
0.236 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.237 RegistrationResponse {
"client_id": "ecb012c6-512d-4236-b362-a17e856e054f",
"client_secret": "xjeZZSzBwdMu",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "ecb012c6-512d-4236-b362-a17e856e054f",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#LtySycnhFcGnHiXR"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.237 phase <--<-- 3 --- Note -->-->
15.249 phase <--<-- 4 --- AsyncAuthn -->-->
15.249 AuthorizationRequest {
"client_id": "ecb012c6-512d-4236-b362-a17e856e054f",
"nonce": "BOoxee6CpKSapklm",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb?bar=foo",
"response_type": "code",
"scope": "openid",
"state": "llkFogf4uGclH9hQ"
}
15.25 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb%3Fbar%3Dfoo&client_id=ecb012c6-512d-4236-b362-a17e856e054f&state=llkFogf4uGclH9hQ&response_type=code&nonce=BOoxee6CpKSapklm
15.25 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb%3Fbar%3Dfoo&client_id=ecb012c6-512d-4236-b362-a17e856e054f&state=llkFogf4uGclH9hQ&response_type=code&nonce=BOoxee6CpKSapklm
16.2 phase <--<-- 4 --- AsyncAuthn -->-->
16.201 AuthorizationRequest {
"client_id": "ecb012c6-512d-4236-b362-a17e856e054f",
"nonce": "APR9OMfToXZqwWYp",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb?bar=foo",
"response_type": "code",
"scope": "openid",
"state": "qf39DpT37XADhfJF"
}
16.201 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb%3Fbar%3Dfoo&client_id=ecb012c6-512d-4236-b362-a17e856e054f&state=qf39DpT37XADhfJF&response_type=code&nonce=APR9OMfToXZqwWYp
16.201 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb%3Fbar%3Dfoo&client_id=ecb012c6-512d-4236-b362-a17e856e054f&state=qf39DpT37XADhfJF&response_type=code&nonce=APR9OMfToXZqwWYp
17.286 phase <--<-- 4 --- AsyncAuthn -->-->
17.287 AuthorizationRequest {
"client_id": "ecb012c6-512d-4236-b362-a17e856e054f",
"nonce": "nB4DhCj8O8crsBh3",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb?bar=foo",
"response_type": "code",
"scope": "openid",
"state": "6UwXfce74GGdK9TQ"
}
17.287 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb%3Fbar%3Dfoo&client_id=ecb012c6-512d-4236-b362-a17e856e054f&state=6UwXfce74GGdK9TQ&response_type=code&nonce=nB4DhCj8O8crsBh3
17.287 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb%3Fbar%3Dfoo&client_id=ecb012c6-512d-4236-b362-a17e856e054f&state=6UwXfce74GGdK9TQ&response_type=code&nonce=nB4DhCj8O8crsBh3
============================================================
Conditions
============================================================
RESULT: PARTIAL RESULT
./OP-redirect_uri-Missing.txt 0000644 0000000 0000000 00000011212 13313422371 016311 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-Missing
Test description: Reject request without redirect_uri when multiple registered
Timestamp: 2018-06-23T10:46:17Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.079 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.08 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.08 phase <--<-- 2 --- Registration -->-->
0.08 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb', 'https://op.certification.openid.net:61353/cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.08 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb",
"https://op.certification.openid.net:61353/cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#pUFK3PHKWFcdh5dO"
],
"response_types": [
"code"
]
}
0.277 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.277 RegistrationResponse {
"client_id": "1244821b-a593-4921-875c-30f57414b5d5",
"client_secret": "oi0Cwy.0Hctg",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "1244821b-a593-4921-875c-30f57414b5d5",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb",
"https://op.certification.openid.net:61353/cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#pUFK3PHKWFcdh5dO"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.278 phase <--<-- 3 --- Note -->-->
============================================================
Conditions
============================================================
RESULT: PARTIAL RESULT
./OP-redirect_uri-NotReg.txt 0000644 0000000 0000000 00000012665 13313422421 016107 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-NotReg
Test description: Sent redirect_uri does not match a registered redirect_uri
Timestamp: 2018-06-23T10:46:41Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Registration -->-->
0.075 register kwargs:{'application_name': 'OIC test tool', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'redirect_uri': ['https://op.certification.openid.net:61353/authz_cb?foo=bar']}
0.075 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#LtySycnhFcGnHiXR"
],
"response_types": [
"code"
]
}
0.236 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.237 RegistrationResponse {
"client_id": "ecb012c6-512d-4236-b362-a17e856e054f",
"client_secret": "xjeZZSzBwdMu",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "ecb012c6-512d-4236-b362-a17e856e054f",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#LtySycnhFcGnHiXR"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.237 phase <--<-- 3 --- Note -->-->
15.249 phase <--<-- 4 --- AsyncAuthn -->-->
15.249 AuthorizationRequest {
"client_id": "ecb012c6-512d-4236-b362-a17e856e054f",
"nonce": "BOoxee6CpKSapklm",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb?bar=foo",
"response_type": "code",
"scope": "openid",
"state": "llkFogf4uGclH9hQ"
}
15.25 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb%3Fbar%3Dfoo&client_id=ecb012c6-512d-4236-b362-a17e856e054f&state=llkFogf4uGclH9hQ&response_type=code&nonce=BOoxee6CpKSapklm
15.25 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb%3Fbar%3Dfoo&client_id=ecb012c6-512d-4236-b362-a17e856e054f&state=llkFogf4uGclH9hQ&response_type=code&nonce=BOoxee6CpKSapklm
============================================================
Conditions
============================================================
RESULT: PARTIAL RESULT
./OP-Req-ui_locales.txt 0000644 0000000 0000000 00000014342 13313422717 015101 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-ui_locales
Test description: Providing ui_locales
Timestamp: 2018-06-23T10:49:51Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.153 phase <--<-- 1 --- Webfinger -->-->
1.153 not expected to do WebFinger
1.153 phase <--<-- 2 --- Discovery -->-->
1.153 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.26 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.261 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.262 phase <--<-- 3 --- Registration -->-->
1.262 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.262 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#TDE4KqFk8ntzOfJI"
],
"response_types": [
"code"
]
}
1.42 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.421 RegistrationResponse {
"client_id": "75bab0be-6a42-46e3-a89b-3fad9678c640",
"client_secret": "dlQGv--UZQ-I",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "75bab0be-6a42-46e3-a89b-3fad9678c640",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#TDE4KqFk8ntzOfJI"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.421 phase <--<-- 4 --- AsyncAuthn -->-->
1.422 AuthorizationRequest {
"client_id": "75bab0be-6a42-46e3-a89b-3fad9678c640",
"nonce": "U9weuTEXF2LiK4LZ",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "PU1OyxDSKAY1JwMb",
"ui_locales": "se"
}
1.422 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?ui_locales=se&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=75bab0be-6a42-46e3-a89b-3fad9678c640&state=PU1OyxDSKAY1JwMb&response_type=code&nonce=U9weuTEXF2LiK4LZ
1.422 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?ui_locales=se&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=75bab0be-6a42-46e3-a89b-3fad9678c640&state=PU1OyxDSKAY1JwMb&response_type=code&nonce=U9weuTEXF2LiK4LZ
4.385 response Response URL with query part
4.386 response {'state': 'PU1OyxDSKAY1JwMb', 'scope': 'openid', 'code': 'Mx7TA1Lf5cwf42AVv3xvku_lJeozK5s0lJasPmI2AbU.rqo4xZdN31BEtL9gOnufcAjD8XizSnbTSTGdaQIxAdg'}
4.386 response {'state': 'PU1OyxDSKAY1JwMb', 'scope': 'openid', 'code': 'Mx7TA1Lf5cwf42AVv3xvku_lJeozK5s0lJasPmI2AbU.rqo4xZdN31BEtL9gOnufcAjD8XizSnbTSTGdaQIxAdg'}
4.386 AuthorizationResponse {
"code": "Mx7TA1Lf5cwf42AVv3xvku_lJeozK5s0lJasPmI2AbU.rqo4xZdN31BEtL9gOnufcAjD8XizSnbTSTGdaQIxAdg",
"scope": "openid",
"state": "PU1OyxDSKAY1JwMb"
}
4.387 phase <--<-- 5 --- Done -->-->
4.387 end
4.387 assertion VerifyAuthnResponse
4.387 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
4.387 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-prompt-login.txt 0000644 0000000 0000000 00000034661 13313422331 014662 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-prompt-login
Test description: Request with prompt=login
Timestamp: 2018-06-23T10:45:45Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Registration -->-->
0.075 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.076 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#hXWMLsxMEZ7z6KnS"
],
"response_types": [
"code"
]
}
0.244 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.245 RegistrationResponse {
"client_id": "e6e5d6ab-950a-4534-801e-e12781fb9516",
"client_secret": "a-IJPhIH5ClD",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "e6e5d6ab-950a-4534-801e-e12781fb9516",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#hXWMLsxMEZ7z6KnS"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.245 phase <--<-- 3 --- AsyncAuthn -->-->
0.245 AuthorizationRequest {
"client_id": "e6e5d6ab-950a-4534-801e-e12781fb9516",
"nonce": "ghtrPbyPuirnuLbo",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "bYXnjDF4uAczmtnQ"
}
0.246 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=e6e5d6ab-950a-4534-801e-e12781fb9516&state=bYXnjDF4uAczmtnQ&response_type=code&nonce=ghtrPbyPuirnuLbo
0.246 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=e6e5d6ab-950a-4534-801e-e12781fb9516&state=bYXnjDF4uAczmtnQ&response_type=code&nonce=ghtrPbyPuirnuLbo
2.91 response Response URL with query part
2.91 response {'state': 'bYXnjDF4uAczmtnQ', 'scope': 'openid', 'code': 'q8ylankd9P7W1MyAI5s41uXmidsODni7nWkmYStOZgQ.bmtXi4y15cNeY8CkLdIYs76hQ32JTE3V4xC9alWvpEg'}
2.91 response {'state': 'bYXnjDF4uAczmtnQ', 'scope': 'openid', 'code': 'q8ylankd9P7W1MyAI5s41uXmidsODni7nWkmYStOZgQ.bmtXi4y15cNeY8CkLdIYs76hQ32JTE3V4xC9alWvpEg'}
2.911 AuthorizationResponse {
"code": "q8ylankd9P7W1MyAI5s41uXmidsODni7nWkmYStOZgQ.bmtXi4y15cNeY8CkLdIYs76hQ32JTE3V4xC9alWvpEg",
"scope": "openid",
"state": "bYXnjDF4uAczmtnQ"
}
2.911 phase <--<-- 4 --- AccessToken -->-->
2.911 --> request op_args: {'state': 'bYXnjDF4uAczmtnQ'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.911 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'bYXnjDF4uAczmtnQ', 'code': 'q8ylankd9P7W1MyAI5s41uXmidsODni7nWkmYStOZgQ.bmtXi4y15cNeY8CkLdIYs76hQ32JTE3V4xC9alWvpEg', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'e6e5d6ab-950a-4534-801e-e12781fb9516'}, 'state': 'bYXnjDF4uAczmtnQ'}
2.911 AccessTokenRequest {
"code": "q8ylankd9P7W1MyAI5s41uXmidsODni7nWkmYStOZgQ.bmtXi4y15cNeY8CkLdIYs76hQ32JTE3V4xC9alWvpEg",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "bYXnjDF4uAczmtnQ"
}
2.912 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.912 request_http_args {'headers': {'Authorization': 'Basic ZTZlNWQ2YWItOTUwYS00NTM0LTgwMWUtZTEyNzgxZmI5NTE2OmEtSUpQaElINUNsRA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.912 request code=q8ylankd9P7W1MyAI5s41uXmidsODni7nWkmYStOZgQ.bmtXi4y15cNeY8CkLdIYs76hQ32JTE3V4xC9alWvpEg&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=bYXnjDF4uAczmtnQ
3.126 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.127 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZTZlNWQ2YWItOTUwYS00NTM0LTgwMWUtZTEyNzgxZmI5NTE2Il0sImF1dGhfdGltZSI6MTUyOTc1MDU5MiwiZXhwIjoxNTI5NzU0MzQwLCJpYXQiOjE1Mjk3NTA3NDAsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImFhYmZhZTA1LWQzN2UtNDM0Ni05ODRhLTAwNGU1YWVlNDExMCIsIm5vbmNlIjoiZ2h0clBieVB1aXJudUxibyIsInJhdCI6MTUyOTc1MDczNywic3ViIjoiZm9vQGJhci5jb20ifQ.b3LDZ0CizWz1lIoJ1Wt6nGQGsImQCGHjj0XpeeBJPY5JYHQwOoH_Ifc8bHPzMHmc7KhZ9sdln5OHHfgXpCThmqTLUb1kdakJ2AFJeV7iu5hbBbJ8eX_1OmIBZGWe5UoxK0sQBAbxXxMecXtVQuVumHxJFjh22pXHpxSQwY6BDkvhxrFc_dz0rUlSr4SGeStZqp_97rAY1PFYvrZfdAD2uncDrk8ps7zw_Ew3jcRn3t077iut_PTu5sAK3u_FHJIpHqmjFJ0fNo2ix5ona4D8xppz5OwgvMO5U30zzHszFsxhlkZZw1xyZDngbdJLmPAkGSPYWdx9b6CKWLz2Fvjy2XvoGZtlMnxhWMAzoQ60eok78XdmsdQ_P8xWjL9OOlMyUzciqrWN4PWkxH94Qkn-JEu6rL0v8C2hyCuzvx_Ej0qz3vvUBCScQulTHcbd2oyWM9HMeC3yXUSGLSw3Ov6xGeuR4Vf_FNpepE-yq0ImxGqYFZK1fB5JJ83OVk9fVKlHgnvuaZwNLxXXjIo4H1soKpKgBAuTsr7vinmI8BDuOxCYjHke-RalnApSmytvSF7_d4yWxHzGbpMKplm5UOuyiYzaeFE07stIG0TK9LyOyPopl7ABYRzsgVIlqa9-i_znjHmkj82OqMes4xwVKqWa1q5sSOSW89eTGYVcQAy9ql0', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'uIjyvWq2Qco8ALae-1XmNw2tX0eA_ie6K3TvBM-7B2g.IslXBdiw-P2LUodKwxAveu4gskoq4-1PqBJxLHWgPB0', 'scope': 'openid'}
3.204 AccessTokenResponse {
"access_token": "uIjyvWq2Qco8ALae-1XmNw2tX0eA_ie6K3TvBM-7B2g.IslXBdiw-P2LUodKwxAveu4gskoq4-1PqBJxLHWgPB0",
"expires_in": 3599,
"id_token": {
"aud": [
"e6e5d6ab-950a-4534-801e-e12781fb9516"
],
"auth_time": 1529750592,
"exp": 1529754340,
"iat": 1529750740,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "aabfae05-d37e-4346-984a-004e5aee4110",
"nonce": "ghtrPbyPuirnuLbo",
"rat": 1529750737,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.204 phase <--<-- 5 --- Note -->-->
4.551 phase <--<-- 6 --- AsyncAuthn -->-->
4.551 AuthorizationRequest {
"client_id": "e6e5d6ab-950a-4534-801e-e12781fb9516",
"nonce": "WLnmIFq8SN7COL2r",
"prompt": [
"login"
],
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "qRoPEHDE9rwcYJA2"
}
4.551 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=login&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=e6e5d6ab-950a-4534-801e-e12781fb9516&state=qRoPEHDE9rwcYJA2&response_type=code&nonce=WLnmIFq8SN7COL2r
4.551 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=login&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=e6e5d6ab-950a-4534-801e-e12781fb9516&state=qRoPEHDE9rwcYJA2&response_type=code&nonce=WLnmIFq8SN7COL2r
7.782 response Response URL with query part
7.782 response {'state': 'qRoPEHDE9rwcYJA2', 'scope': 'openid', 'code': 'U7xfLQrCoHL6vtnH8BqOJ57aJkT8IDK8WvoETbhNdp8.FajaFGq-Q6z0tddojqtBrqVs5rDDXkDrTPjw5NodwLM'}
7.782 response {'state': 'qRoPEHDE9rwcYJA2', 'scope': 'openid', 'code': 'U7xfLQrCoHL6vtnH8BqOJ57aJkT8IDK8WvoETbhNdp8.FajaFGq-Q6z0tddojqtBrqVs5rDDXkDrTPjw5NodwLM'}
7.783 AuthorizationResponse {
"code": "U7xfLQrCoHL6vtnH8BqOJ57aJkT8IDK8WvoETbhNdp8.FajaFGq-Q6z0tddojqtBrqVs5rDDXkDrTPjw5NodwLM",
"scope": "openid",
"state": "qRoPEHDE9rwcYJA2"
}
7.783 phase <--<-- 7 --- AccessToken -->-->
7.783 --> request op_args: {'state': 'qRoPEHDE9rwcYJA2'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
7.783 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'qRoPEHDE9rwcYJA2', 'code': 'U7xfLQrCoHL6vtnH8BqOJ57aJkT8IDK8WvoETbhNdp8.FajaFGq-Q6z0tddojqtBrqVs5rDDXkDrTPjw5NodwLM', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'e6e5d6ab-950a-4534-801e-e12781fb9516'}, 'state': 'qRoPEHDE9rwcYJA2'}
7.783 AccessTokenRequest {
"code": "U7xfLQrCoHL6vtnH8BqOJ57aJkT8IDK8WvoETbhNdp8.FajaFGq-Q6z0tddojqtBrqVs5rDDXkDrTPjw5NodwLM",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "qRoPEHDE9rwcYJA2"
}
7.783 request_url https://oidc-certification.ory.sh:8443/oauth2/token
7.783 request_http_args {'headers': {'Authorization': 'Basic ZTZlNWQ2YWItOTUwYS00NTM0LTgwMWUtZTEyNzgxZmI5NTE2OmEtSUpQaElINUNsRA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
7.783 request code=U7xfLQrCoHL6vtnH8BqOJ57aJkT8IDK8WvoETbhNdp8.FajaFGq-Q6z0tddojqtBrqVs5rDDXkDrTPjw5NodwLM&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=qRoPEHDE9rwcYJA2
8.001 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
8.002 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZTZlNWQ2YWItOTUwYS00NTM0LTgwMWUtZTEyNzgxZmI5NTE2Il0sImF1dGhfdGltZSI6MTUyOTc1MDc0NCwiZXhwIjoxNTI5NzU0MzQ1LCJpYXQiOjE1Mjk3NTA3NDUsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImNiZWNhZTAxLTM3ZGItNGQ3OS04MzgzLTA0N2YyY2E2Nzg1MiIsIm5vbmNlIjoiV0xubUlGcThTTjdDT0wyciIsInJhdCI6MTUyOTc1MDc0Miwic3ViIjoiZm9vQGJhci5jb20ifQ.grgWZcVRDvOP2QH-IeBfbFLpLm3-zzNzfb_41pItj40SV8N3V4oV1gl3XURvM4czzzv5wt_8T6ADbD3oBm9lGTFqP3Jt4SvsGzKHrH0O-goNhEhw9kLcY9QIBfJzMdiuZRa6FcDFvTO5Q0dbqsQmTJzWkpNw7d0p5aH45uoIFyzJA-OmmYrjcne1NJrArGUg0J4ikX6UJzsZtaIbc_DcwnSBVv3Rt71bu68aDjlXCvKLE5hBvd0tZMyAzbWucPG2Iy40OtJEx6Xs0VlXg0yUSueaJuNOu8xfWRMUulqRhXpBUdFDOEYw0GTbpwO1HHTNlZDvVXBF6eian75W0B8gFtqv2yQT3eE61Re3DQEWCxs9y8yxwKTkBbcfERAVPJVRZ2oYwtCAGZ8S5tgLh8pqgqy0ms5D0ohMB5RFqKmwQSsXG2qaIy3G6Vq89PRmJZCe63-KYRDuLzvMpXLfcXIJlr___jNz9FgoRk56cCjQe3-dQoKXGq0IyI-hXvDomCXHGsDhNDsTSxYZHbypL8QRB7-NGTuGBeGx2sWn0daFc4pB7UkTS43U3XqiB_RIo2vJGOzoaYErDkK5MunMkaZMqB8rE8-69WCsgMkDaaNw4eTFpRIkNpJGClHVkuYjcfViAj0t8OhzkgrZB8aIX4jtW-uZwpxKynr08yhmAjtQwEw', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'P1tmPbeHlZ9ZlyMWZJrEjpjBW5hKnaczymehndmdy1s.oWSsWwagQ3imZmwaeYO5Knq0jp5aF6KlqRmGVpIU5Ew', 'scope': 'openid'}
8.006 AccessTokenResponse {
"access_token": "P1tmPbeHlZ9ZlyMWZJrEjpjBW5hKnaczymehndmdy1s.oWSsWwagQ3imZmwaeYO5Knq0jp5aF6KlqRmGVpIU5Ew",
"expires_in": 3599,
"id_token": {
"aud": [
"e6e5d6ab-950a-4534-801e-e12781fb9516"
],
"auth_time": 1529750744,
"exp": 1529754345,
"iat": 1529750745,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "cbecae01-37db-4d79-8383-047f2ca67852",
"nonce": "WLnmIFq8SN7COL2r",
"rat": 1529750742,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
8.006 phase <--<-- 8 --- Done -->-->
8.006 end
8.006 assertion VerifyResponse
8.006 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
8.007 assertion MultipleSignOn
8.007 condition multiple-sign-on: status=OK [Verifies that multiple authentications was used in the flow]
8.007 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
multiple-sign-on: status=OK [Verifies that multiple authentications was used in the flow]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Response-Missing.txt 0000644 0000000 0000000 00000015105 13313422074 015434 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Response-Missing
Test description: Authorization request missing the response_type parameter
Timestamp: 2018-06-23T10:43:08Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.141 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.153 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.154 phase <--<-- 2 --- Registration -->-->
0.154 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.154 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Si4UYQrtfWIg8h1Y"
],
"response_types": [
"code"
]
}
0.353 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.354 RegistrationResponse {
"client_id": "65f52f63-0ce2-4f34-8b28-7a655854acdb",
"client_secret": "L701-PZArCjQ",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "65f52f63-0ce2-4f34-8b28-7a655854acdb",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Si4UYQrtfWIg8h1Y"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.355 phase <--<-- 3 --- Note -->-->
1.651 phase <--<-- 4 --- AsyncAuthn -->-->
1.652 AuthorizationRequest {
"client_id": "65f52f63-0ce2-4f34-8b28-7a655854acdb",
"nonce": "7nQtj2WpXvPDKOLZ",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"scope": "openid",
"state": "QP5hDgKl8HxTW7F6"
}
1.652 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?state=QP5hDgKl8HxTW7F6&scope=openid&nonce=7nQtj2WpXvPDKOLZ&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=65f52f63-0ce2-4f34-8b28-7a655854acdb
1.652 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?state=QP5hDgKl8HxTW7F6&scope=openid&nonce=7nQtj2WpXvPDKOLZ&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=65f52f63-0ce2-4f34-8b28-7a655854acdb
2.368 response Response URL with query part
2.368 response {'error_debug': 'The request is missing the response_type parameter', 'error_description': 'The authorization server does not support obtaining a token using this method', 'state': '', 'error': 'unsupported_response_type'}
2.369 response {'error_debug': 'The request is missing the response_type parameter', 'error_description': 'The authorization server does not support obtaining a token using this method', 'error': 'unsupported_response_type'}
2.369 AuthorizationErrorResponse {
"error": "unsupported_response_type",
"error_debug": "The request is missing the response_type parameter",
"error_description": "The authorization server does not support obtaining a token using this method"
}
2.369 AuthorizationErrorResponse {
"error": "unsupported_response_type",
"error_debug": "The request is missing the response_type parameter",
"error_description": "The authorization server does not support obtaining a token using this method"
}
2.369 phase <--<-- 5 --- Done -->-->
2.369 end
2.37 assertion VerifyErrorMessage
2.37 condition verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
2.37 condition Done: status=OK
============================================================
Conditions
verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-UserInfo-Endpoint.txt 0000644 0000000 0000000 00000024042 13313422257 015542 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-UserInfo-Endpoint
Test description: UserInfo Endpoint access with GET and bearer header
Timestamp: 2018-06-23T10:45:03Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.074 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.076 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.076 phase <--<-- 2 --- Registration -->-->
0.076 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.076 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#dS4H9oQi7M3amgkM"
],
"response_types": [
"code"
]
}
0.236 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.237 RegistrationResponse {
"client_id": "26991bdc-d9de-4007-9348-c302b9572d19",
"client_secret": "OLC_FYl5_x6k",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "26991bdc-d9de-4007-9348-c302b9572d19",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#dS4H9oQi7M3amgkM"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.237 phase <--<-- 3 --- AsyncAuthn -->-->
0.237 AuthorizationRequest {
"client_id": "26991bdc-d9de-4007-9348-c302b9572d19",
"nonce": "JgZv8B58VKjNmj6P",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "7GWJAnloMV7r7NLC"
}
0.238 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=26991bdc-d9de-4007-9348-c302b9572d19&state=7GWJAnloMV7r7NLC&response_type=code&nonce=JgZv8B58VKjNmj6P
0.238 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=26991bdc-d9de-4007-9348-c302b9572d19&state=7GWJAnloMV7r7NLC&response_type=code&nonce=JgZv8B58VKjNmj6P
1.922 response Response URL with query part
1.923 response {'state': '7GWJAnloMV7r7NLC', 'scope': 'openid', 'code': 'u3sg2MxtP-MIaMcDqUoq4OwJT1-9giC0QVAlRVQEj88.XzDWQudzDssVnvmHBWFoMpN1IqZ-fHsI3rxa2umv7PA'}
1.923 response {'state': '7GWJAnloMV7r7NLC', 'scope': 'openid', 'code': 'u3sg2MxtP-MIaMcDqUoq4OwJT1-9giC0QVAlRVQEj88.XzDWQudzDssVnvmHBWFoMpN1IqZ-fHsI3rxa2umv7PA'}
1.923 AuthorizationResponse {
"code": "u3sg2MxtP-MIaMcDqUoq4OwJT1-9giC0QVAlRVQEj88.XzDWQudzDssVnvmHBWFoMpN1IqZ-fHsI3rxa2umv7PA",
"scope": "openid",
"state": "7GWJAnloMV7r7NLC"
}
1.923 phase <--<-- 4 --- AccessToken -->-->
1.923 --> request op_args: {'state': '7GWJAnloMV7r7NLC'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
1.923 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': '7GWJAnloMV7r7NLC', 'code': 'u3sg2MxtP-MIaMcDqUoq4OwJT1-9giC0QVAlRVQEj88.XzDWQudzDssVnvmHBWFoMpN1IqZ-fHsI3rxa2umv7PA', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '26991bdc-d9de-4007-9348-c302b9572d19'}, 'state': '7GWJAnloMV7r7NLC'}
1.924 AccessTokenRequest {
"code": "u3sg2MxtP-MIaMcDqUoq4OwJT1-9giC0QVAlRVQEj88.XzDWQudzDssVnvmHBWFoMpN1IqZ-fHsI3rxa2umv7PA",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "7GWJAnloMV7r7NLC"
}
1.924 request_url https://oidc-certification.ory.sh:8443/oauth2/token
1.924 request_http_args {'headers': {'Authorization': 'Basic MjY5OTFiZGMtZDlkZS00MDA3LTkzNDgtYzMwMmI5NTcyZDE5Ok9MQ19GWWw1X3g2aw==', 'Content-Type': 'application/x-www-form-urlencoded'}}
1.924 request code=u3sg2MxtP-MIaMcDqUoq4OwJT1-9giC0QVAlRVQEj88.XzDWQudzDssVnvmHBWFoMpN1IqZ-fHsI3rxa2umv7PA&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=7GWJAnloMV7r7NLC
2.169 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.17 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMjY5OTFiZGMtZDlkZS00MDA3LTkzNDgtYzMwMmI5NTcyZDE5Il0sImF1dGhfdGltZSI6MTUyOTc1MDU5MiwiZXhwIjoxNTI5NzU0MzAyLCJpYXQiOjE1Mjk3NTA3MDIsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6Ijc2NDA1YjkwLTc4NjQtNGQ1Yy04MTFhLTNiMDhhNTJiNzcxMiIsIm5vbmNlIjoiSmdadjhCNThWS2pObWo2UCIsInJhdCI6MTUyOTc1MDcwMSwic3ViIjoiZm9vQGJhci5jb20ifQ.YTYm69ZMPcU9epaeVXZ9QPVZsgtz_Wk0rvC0qIdOZQBlZEdixvQVXr9qd_2_7N37fA3N6-3k5qpaPnnElKVsM3_EtGvnslPAGIT3V7fysVT6CtT1WqOGbet5wgZjKT5txNXhRkbclndVGXGHP_JWQ4rl9GqZOPH00bEiBhHGp7uWDwQW3EF0XR1PE1HG3LG-wMhspBHfAGhG86rfkD39wI-ay8F4YByMW9IPEk_htjUe2DqvFGDl2z9RzFFHJiWObUpi5zcOanJPnngx8LRi2T8GZl49FdRzPIx2Yf7EGeDm5VEfUsjr6tArv3A0LdjyP31OQHw3Gx3D6S_7hk-b3sNeNUO0QjASIJ-Vr64yxK2zfYmy084GUsrJmYwQ_NKova1-CqBcHTeGBMlYxXuvXnyYSCye5pY9MMT71XBZbbd_RI7hY8losFhBNIQfdatEkfG_nCyl3OujV3_ZQCDRogSsbjkS-EtasHNhcvTAoWyJJohnpvB8Y1R8i0hOEpbw3o0Bfs2EQD1OqV1ouhz1mHoI8ii5AEbAj6uK7aLdA82YlfBBB2ltkKbsvqaOYdrnIEY86oCosxPB6ZABOE4D0BMH5kCTIAmzdml__Q4S8omblushaahN6N6nuielnJaoyP-aPG4cvu2xRExqQ0ihudh1ty3yN7-tLcCM8pBCR-E', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'o544Fmn8gB1tahnB3pzNzhnBnIB21AS3lVH8N79llik.1WpXmdMxQEDG3-BMy-la_b5ptkey7Fvxh5oSpFtr8CU', 'scope': 'openid'}
2.252 AccessTokenResponse {
"access_token": "o544Fmn8gB1tahnB3pzNzhnBnIB21AS3lVH8N79llik.1WpXmdMxQEDG3-BMy-la_b5ptkey7Fvxh5oSpFtr8CU",
"expires_in": 3599,
"id_token": {
"aud": [
"26991bdc-d9de-4007-9348-c302b9572d19"
],
"auth_time": 1529750592,
"exp": 1529754302,
"iat": 1529750702,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "76405b90-7864-4d5c-811a-3b08a52b7712",
"nonce": "JgZv8B58VKjNmj6P",
"rat": 1529750701,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
2.253 phase <--<-- 5 --- UserInfo -->-->
2.253 do_user_info_request kwargs:{'state': '7GWJAnloMV7r7NLC', 'method': 'GET', 'authn_method': 'bearer_header'}
2.253 request {'body': None}
2.253 request_url https://oidc-certification.ory.sh:8443/userinfo
2.253 request_http_args {'headers': {'Authorization': 'Bearer o544Fmn8gB1tahnB3pzNzhnBnIB21AS3lVH8N79llik.1WpXmdMxQEDG3-BMy-la_b5ptkey7Fvxh5oSpFtr8CU'}}
2.331 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
2.332 OpenIDSchema {
"sub": "[email protected]"
}
2.332 OpenIDSchema {
"sub": "[email protected]"
}
2.332 phase <--<-- 6 --- Done -->-->
2.332 end
2.332 assertion VerifyResponse
2.332 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.332 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Req-id_token_hint.txt 0000644 0000000 0000000 00000043520 13313422653 015577 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-id_token_hint
Test description: Using prompt=none with user hint through id_token_hint
Timestamp: 2018-06-23T10:49:15Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.117 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.118 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.118 phase <--<-- 2 --- Registration -->-->
0.118 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.119 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#1WWcE2792QFTeUxF"
],
"response_types": [
"code"
]
}
0.319 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.32 RegistrationResponse {
"client_id": "ff067afc-f729-4ebd-a3c1-52378407deaf",
"client_secret": "pK96NV.d8Re-",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "ff067afc-f729-4ebd-a3c1-52378407deaf",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#1WWcE2792QFTeUxF"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.32 phase <--<-- 3 --- AsyncAuthn -->-->
0.321 AuthorizationRequest {
"client_id": "ff067afc-f729-4ebd-a3c1-52378407deaf",
"nonce": "DCfHCfeJMtDXjewS",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "IvQFjZusTqYXb9X3"
}
0.321 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=ff067afc-f729-4ebd-a3c1-52378407deaf&state=IvQFjZusTqYXb9X3&response_type=code&nonce=DCfHCfeJMtDXjewS
0.321 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=ff067afc-f729-4ebd-a3c1-52378407deaf&state=IvQFjZusTqYXb9X3&response_type=code&nonce=DCfHCfeJMtDXjewS
2.678 response Response URL with query part
2.678 response {'state': 'IvQFjZusTqYXb9X3', 'scope': 'openid', 'code': '3_fwm3bVHIFDqKU5RV_CCtMIlKV1ZMl3hIdAPiMfNBg.LWxWRQfU-HzTSLs8V6voZSDeVLDH25Bzip1-a1zA-AI'}
2.678 response {'state': 'IvQFjZusTqYXb9X3', 'scope': 'openid', 'code': '3_fwm3bVHIFDqKU5RV_CCtMIlKV1ZMl3hIdAPiMfNBg.LWxWRQfU-HzTSLs8V6voZSDeVLDH25Bzip1-a1zA-AI'}
2.679 AuthorizationResponse {
"code": "3_fwm3bVHIFDqKU5RV_CCtMIlKV1ZMl3hIdAPiMfNBg.LWxWRQfU-HzTSLs8V6voZSDeVLDH25Bzip1-a1zA-AI",
"scope": "openid",
"state": "IvQFjZusTqYXb9X3"
}
2.679 phase <--<-- 4 --- AccessToken -->-->
2.679 --> request op_args: {'state': 'IvQFjZusTqYXb9X3'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.679 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'IvQFjZusTqYXb9X3', 'code': '3_fwm3bVHIFDqKU5RV_CCtMIlKV1ZMl3hIdAPiMfNBg.LWxWRQfU-HzTSLs8V6voZSDeVLDH25Bzip1-a1zA-AI', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'ff067afc-f729-4ebd-a3c1-52378407deaf'}, 'state': 'IvQFjZusTqYXb9X3'}
2.679 AccessTokenRequest {
"code": "3_fwm3bVHIFDqKU5RV_CCtMIlKV1ZMl3hIdAPiMfNBg.LWxWRQfU-HzTSLs8V6voZSDeVLDH25Bzip1-a1zA-AI",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "IvQFjZusTqYXb9X3"
}
2.679 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.679 request_http_args {'headers': {'Authorization': 'Basic ZmYwNjdhZmMtZjcyOS00ZWJkLWEzYzEtNTIzNzg0MDdkZWFmOnBLOTZOVi5kOFJlLQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.679 request code=3_fwm3bVHIFDqKU5RV_CCtMIlKV1ZMl3hIdAPiMfNBg.LWxWRQfU-HzTSLs8V6voZSDeVLDH25Bzip1-a1zA-AI&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=IvQFjZusTqYXb9X3
2.937 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.939 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZmYwNjdhZmMtZjcyOS00ZWJkLWEzYzEtNTIzNzg0MDdkZWFmIl0sImF1dGhfdGltZSI6MTUyOTc1MDc0OSwiZXhwIjoxNTI5NzU0NTQ3LCJpYXQiOjE1Mjk3NTA5NDcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImM0ODQ3ZDlkLWUxM2MtNDNlNC1hMTMyLTA2N2RkNDNjNzE3NiIsIm5vbmNlIjoiRENmSENmZUpNdERYamV3UyIsInJhdCI6MTUyOTc1MDk0NSwic3ViIjoiZm9vQGJhci5jb20ifQ.kgcqm3iUGExUECXjrJ9gnJgHbkh69Z0WlDpcjEvicz8RVvYv_04t6DQQPt8L0goot4rQYzNNsL3znktu0yOaSGJ4e8nOdpOFIlB8J9kU9vtZ8xjD2Gt8Rt1eYpIvT619wXSGLbM4Fy3X_XunS8hdMtT_tJhb8nhCOj19JgMOp-_ejaFcHNr3jnvnUsPf0h6Boe6tqsCFEruyamrvkFe0bGzriaylRlhANQcOAgHHUz_ViHRGlJrnRPX3MEZjJQljXirqPKDaG1upJb_-nPxaasc8bYYsVqv-tvPAlRJsLRLcbpsvyyJCEVm8-Wbf28XCJO9jnBAMWAZqO-hYZRTB62tPTTsStlwPkwoAbo_WZRht8SBEJxB4S3zpjrIpQUWsG4kRp6gHg6tVvbPYhAxSq3AiXabUq8tP_17wSO4dJg3EgydtgpbGp50aG38G8_T3R53mbJCINSn95g5cYpghgtb2-y6WQrvsY__oMwxqtMRosIjHU-UFwya4avj_ihh-Ftt1gYuDp6tyN26y6N6DCx1KjXnip3k7VkTs33yRBeCWhjthDfKlY_ahJKgu3OqwW87oyjXFqeLVJ9TmFXzxOEyfFEOH3wV00NyDgopE5QJ1Ei7qtiNBp9ezhv7h1iLEyl2xmlh8eWstRSBxX1NYPVSSOJSfM_2wTQelPO_uvL8', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'rLck6Jqpm8s4VhgnKrx_dukjW6fBsGKfepHibcqBQ7I.Cp_7kFeSwan6NYAetD-jEZuBtac8b2SZrADp_k6Zitg', 'scope': 'openid'}
3.02 AccessTokenResponse {
"access_token": "rLck6Jqpm8s4VhgnKrx_dukjW6fBsGKfepHibcqBQ7I.Cp_7kFeSwan6NYAetD-jEZuBtac8b2SZrADp_k6Zitg",
"expires_in": 3599,
"id_token": {
"aud": [
"ff067afc-f729-4ebd-a3c1-52378407deaf"
],
"auth_time": 1529750749,
"exp": 1529754547,
"iat": 1529750947,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "c4847d9d-e13c-43e4-a132-067dd43c7176",
"nonce": "DCfHCfeJMtDXjewS",
"rat": 1529750945,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.02 phase <--<-- 5 --- AsyncAuthn -->-->
3.021 AuthorizationRequest {
"client_id": "ff067afc-f729-4ebd-a3c1-52378407deaf",
"id_token_hint": "eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZmYwNjdhZmMtZjcyOS00ZWJkLWEzYzEtNTIzNzg0MDdkZWFmIl0sImF1dGhfdGltZSI6MTUyOTc1MDc0OSwiZXhwIjoxNTI5NzU0NTQ3LCJpYXQiOjE1Mjk3NTA5NDcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImM0ODQ3ZDlkLWUxM2MtNDNlNC1hMTMyLTA2N2RkNDNjNzE3NiIsIm5vbmNlIjoiRENmSENmZUpNdERYamV3UyIsInJhdCI6MTUyOTc1MDk0NSwic3ViIjoiZm9vQGJhci5jb20ifQ.kgcqm3iUGExUECXjrJ9gnJgHbkh69Z0WlDpcjEvicz8RVvYv_04t6DQQPt8L0goot4rQYzNNsL3znktu0yOaSGJ4e8nOdpOFIlB8J9kU9vtZ8xjD2Gt8Rt1eYpIvT619wXSGLbM4Fy3X_XunS8hdMtT_tJhb8nhCOj19JgMOp-_ejaFcHNr3jnvnUsPf0h6Boe6tqsCFEruyamrvkFe0bGzriaylRlhANQcOAgHHUz_ViHRGlJrnRPX3MEZjJQljXirqPKDaG1upJb_-nPxaasc8bYYsVqv-tvPAlRJsLRLcbpsvyyJCEVm8-Wbf28XCJO9jnBAMWAZqO-hYZRTB62tPTTsStlwPkwoAbo_WZRht8SBEJxB4S3zpjrIpQUWsG4kRp6gHg6tVvbPYhAxSq3AiXabUq8tP_17wSO4dJg3EgydtgpbGp50aG38G8_T3R53mbJCINSn95g5cYpghgtb2-y6WQrvsY__oMwxqtMRosIjHU-UFwya4avj_ihh-Ftt1gYuDp6tyN26y6N6DCx1KjXnip3k7VkTs33yRBeCWhjthDfKlY_ahJKgu3OqwW87oyjXFqeLVJ9TmFXzxOEyfFEOH3wV00NyDgopE5QJ1Ei7qtiNBp9ezhv7h1iLEyl2xmlh8eWstRSBxX1NYPVSSOJSfM_2wTQelPO_uvL8",
"nonce": "wTR3Yfgt9n5uojPq",
"prompt": [
"none"
],
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "FmSlcEa8rY6NQEHn"
}
3.021 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=ff067afc-f729-4ebd-a3c1-52378407deaf&state=FmSlcEa8rY6NQEHn&id_token_hint=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZmYwNjdhZmMtZjcyOS00ZWJkLWEzYzEtNTIzNzg0MDdkZWFmIl0sImF1dGhfdGltZSI6MTUyOTc1MDc0OSwiZXhwIjoxNTI5NzU0NTQ3LCJpYXQiOjE1Mjk3NTA5NDcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImM0ODQ3ZDlkLWUxM2MtNDNlNC1hMTMyLTA2N2RkNDNjNzE3NiIsIm5vbmNlIjoiRENmSENmZUpNdERYamV3UyIsInJhdCI6MTUyOTc1MDk0NSwic3ViIjoiZm9vQGJhci5jb20ifQ.kgcqm3iUGExUECXjrJ9gnJgHbkh69Z0WlDpcjEvicz8RVvYv_04t6DQQPt8L0goot4rQYzNNsL3znktu0yOaSGJ4e8nOdpOFIlB8J9kU9vtZ8xjD2Gt8Rt1eYpIvT619wXSGLbM4Fy3X_XunS8hdMtT_tJhb8nhCOj19JgMOp-_ejaFcHNr3jnvnUsPf0h6Boe6tqsCFEruyamrvkFe0bGzriaylRlhANQcOAgHHUz_ViHRGlJrnRPX3MEZjJQljXirqPKDaG1upJb_-nPxaasc8bYYsVqv-tvPAlRJsLRLcbpsvyyJCEVm8-Wbf28XCJO9jnBAMWAZqO-hYZRTB62tPTTsStlwPkwoAbo_WZRht8SBEJxB4S3zpjrIpQUWsG4kRp6gHg6tVvbPYhAxSq3AiXabUq8tP_17wSO4dJg3EgydtgpbGp50aG38G8_T3R53mbJCINSn95g5cYpghgtb2-y6WQrvsY__oMwxqtMRosIjHU-UFwya4avj_ihh-Ftt1gYuDp6tyN26y6N6DCx1KjXnip3k7VkTs33yRBeCWhjthDfKlY_ahJKgu3OqwW87oyjXFqeLVJ9TmFXzxOEyfFEOH3wV00NyDgopE5QJ1Ei7qtiNBp9ezhv7h1iLEyl2xmlh8eWstRSBxX1NYPVSSOJSfM_2wTQelPO_uvL8&response_type=code&nonce=wTR3Yfgt9n5uojPq
3.021 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=ff067afc-f729-4ebd-a3c1-52378407deaf&state=FmSlcEa8rY6NQEHn&id_token_hint=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZmYwNjdhZmMtZjcyOS00ZWJkLWEzYzEtNTIzNzg0MDdkZWFmIl0sImF1dGhfdGltZSI6MTUyOTc1MDc0OSwiZXhwIjoxNTI5NzU0NTQ3LCJpYXQiOjE1Mjk3NTA5NDcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImM0ODQ3ZDlkLWUxM2MtNDNlNC1hMTMyLTA2N2RkNDNjNzE3NiIsIm5vbmNlIjoiRENmSENmZUpNdERYamV3UyIsInJhdCI6MTUyOTc1MDk0NSwic3ViIjoiZm9vQGJhci5jb20ifQ.kgcqm3iUGExUECXjrJ9gnJgHbkh69Z0WlDpcjEvicz8RVvYv_04t6DQQPt8L0goot4rQYzNNsL3znktu0yOaSGJ4e8nOdpOFIlB8J9kU9vtZ8xjD2Gt8Rt1eYpIvT619wXSGLbM4Fy3X_XunS8hdMtT_tJhb8nhCOj19JgMOp-_ejaFcHNr3jnvnUsPf0h6Boe6tqsCFEruyamrvkFe0bGzriaylRlhANQcOAgHHUz_ViHRGlJrnRPX3MEZjJQljXirqPKDaG1upJb_-nPxaasc8bYYsVqv-tvPAlRJsLRLcbpsvyyJCEVm8-Wbf28XCJO9jnBAMWAZqO-hYZRTB62tPTTsStlwPkwoAbo_WZRht8SBEJxB4S3zpjrIpQUWsG4kRp6gHg6tVvbPYhAxSq3AiXabUq8tP_17wSO4dJg3EgydtgpbGp50aG38G8_T3R53mbJCINSn95g5cYpghgtb2-y6WQrvsY__oMwxqtMRosIjHU-UFwya4avj_ihh-Ftt1gYuDp6tyN26y6N6DCx1KjXnip3k7VkTs33yRBeCWhjthDfKlY_ahJKgu3OqwW87oyjXFqeLVJ9TmFXzxOEyfFEOH3wV00NyDgopE5QJ1Ei7qtiNBp9ezhv7h1iLEyl2xmlh8eWstRSBxX1NYPVSSOJSfM_2wTQelPO_uvL8&response_type=code&nonce=wTR3Yfgt9n5uojPq
10.565 response Response URL with query part
10.565 response {'state': 'FmSlcEa8rY6NQEHn', 'scope': 'openid', 'code': 'lw8ZcvVYO7oxVR_dYuvk36uoLA-NTTImmKvTldXWWjQ.EIwo2mjKW3pnrs8PX2W8ewtUn64RyKkc_6Ahm_QVbrs'}
10.565 response {'state': 'FmSlcEa8rY6NQEHn', 'scope': 'openid', 'code': 'lw8ZcvVYO7oxVR_dYuvk36uoLA-NTTImmKvTldXWWjQ.EIwo2mjKW3pnrs8PX2W8ewtUn64RyKkc_6Ahm_QVbrs'}
10.566 AuthorizationResponse {
"code": "lw8ZcvVYO7oxVR_dYuvk36uoLA-NTTImmKvTldXWWjQ.EIwo2mjKW3pnrs8PX2W8ewtUn64RyKkc_6Ahm_QVbrs",
"scope": "openid",
"state": "FmSlcEa8rY6NQEHn"
}
10.566 phase <--<-- 6 --- AccessToken -->-->
10.566 --> request op_args: {'state': 'FmSlcEa8rY6NQEHn'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
10.566 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'FmSlcEa8rY6NQEHn', 'code': 'lw8ZcvVYO7oxVR_dYuvk36uoLA-NTTImmKvTldXWWjQ.EIwo2mjKW3pnrs8PX2W8ewtUn64RyKkc_6Ahm_QVbrs', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'ff067afc-f729-4ebd-a3c1-52378407deaf'}, 'state': 'FmSlcEa8rY6NQEHn'}
10.566 AccessTokenRequest {
"code": "lw8ZcvVYO7oxVR_dYuvk36uoLA-NTTImmKvTldXWWjQ.EIwo2mjKW3pnrs8PX2W8ewtUn64RyKkc_6Ahm_QVbrs",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "FmSlcEa8rY6NQEHn"
}
10.566 request_url https://oidc-certification.ory.sh:8443/oauth2/token
10.566 request_http_args {'headers': {'Authorization': 'Basic ZmYwNjdhZmMtZjcyOS00ZWJkLWEzYzEtNTIzNzg0MDdkZWFmOnBLOTZOVi5kOFJlLQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
10.566 request code=lw8ZcvVYO7oxVR_dYuvk36uoLA-NTTImmKvTldXWWjQ.EIwo2mjKW3pnrs8PX2W8ewtUn64RyKkc_6Ahm_QVbrs&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=FmSlcEa8rY6NQEHn
10.796 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
10.797 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZmYwNjdhZmMtZjcyOS00ZWJkLWEzYzEtNTIzNzg0MDdkZWFmIl0sImF1dGhfdGltZSI6MTUyOTc1MDc0OSwiZXhwIjoxNTI5NzU0NTU1LCJpYXQiOjE1Mjk3NTA5NTUsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImQzNDYxNDI4LWU2ZjgtNGU3Ny1hYTMyLThkNDAwNjg4ZmUzMiIsIm5vbmNlIjoid1RSM1lmZ3Q5bjV1b2pQcSIsInJhdCI6MTUyOTc1MDk0OCwic3ViIjoiZm9vQGJhci5jb20ifQ.Zh1KpuHVpRg90sXaPbs7dzvSHkgBKYtMTBLJMzh1C0adyTEyZsmCt-OwI1xojHhHu8qMXqLej8PqdcclGsAGlOs-abllxrRQQuqD_a-ohzq3J9qKelJLjo7fApjtRHSoQwB8WCyKJ8eIudAxjvQg1CyQekpfzl9RudPp-0bhfnV_VPZP_Ez_nK-VcFqHsBnkhdeJ-ZtmBqW4qZGoZX3JdB9-DB8bkw6wQSmJ1dd4dHzxgZZU5v-p3GLYh1_nZc45CVfulmYIv3Di5gUkmrp3zoPzosfjSM--MKbaL4GT73tqGCGTJD5PM-kRdHZ8T066-LGcWlu5KBxLTTvDDMMJlXlYvG04m4bzc4Oy3qAnXMIXoFilOKOOuQZpyuZW0DGzagSXlMnx5JKvmlpay_dTfFKknoLDcy_rT6Tutb7usUpa8MsW3dgHMXjCroH6Me3rqM4Q9VyBnRReYq0vGKo2Ad_pr2DvBS9UtpcIkTOAT4rjZVh1qRCf0doSqxaJLJAkjcGFrih0-q_0YxRX8GIgPJN8XoAcyFuk7oxxXQztbgLBmBK5KXYPIAHZXIplKimteLQmQoyjama0fdyVqqC9pLaEhvp1HrmTdJMV_M5e7XI9jV1nzURl6kIGN5wmGGfxpXoYjPkXr-kZKAooN8YZ4RNX4oEVhDiDDBhJPQ8-afo', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'oOzUA99d7m5oDwL3Z-ZohMfRCVxzrbumQ7JV5qEjh6I.wQ4KIyfovk4GD-QG8gjfVISPmGtymYqKW_Z4IDK9aTE', 'scope': 'openid'}
10.801 AccessTokenResponse {
"access_token": "oOzUA99d7m5oDwL3Z-ZohMfRCVxzrbumQ7JV5qEjh6I.wQ4KIyfovk4GD-QG8gjfVISPmGtymYqKW_Z4IDK9aTE",
"expires_in": 3599,
"id_token": {
"aud": [
"ff067afc-f729-4ebd-a3c1-52378407deaf"
],
"auth_time": 1529750749,
"exp": 1529754555,
"iat": 1529750955,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "d3461428-e6f8-4e77-aa32-8d400688fe32",
"nonce": "wTR3Yfgt9n5uojPq",
"rat": 1529750948,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
10.801 phase <--<-- 7 --- Done -->-->
10.801 end
10.801 assertion VerifyResponse
10.801 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
10.802 assertion SameAuthn
10.802 condition same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
10.802 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Registration-tos_uri.txt 0000644 0000000 0000000 00000014625 13313422164 016371 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-tos_uri
Test description: Registration with tos_uri
Timestamp: 2018-06-23T10:44:04Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.09 phase <--<-- 1 --- Webfinger -->-->
1.09 not expected to do WebFinger
1.09 phase <--<-- 2 --- Discovery -->-->
1.09 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.172 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.174 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.174 phase <--<-- 3 --- Registration -->-->
1.174 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'tos_uri': 'https://op.certification.openid.net:61353/static/tos.html', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.174 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#7LsDldjXGsu24rqB"
],
"response_types": [
"code"
],
"tos_uri": "https://op.certification.openid.net:61353/static/tos.html"
}
1.329 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.33 RegistrationResponse {
"client_id": "b9f3defb-96fb-4f5f-a4c1-3da0c0b8245f",
"client_secret": "sEJ_Jj149xEj",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "b9f3defb-96fb-4f5f-a4c1-3da0c0b8245f",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#7LsDldjXGsu24rqB"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"tos_uri": "https://op.certification.openid.net:61353/static/tos.html",
"userinfo_signed_response_alg": "none"
}
1.33 phase <--<-- 4 --- AsyncAuthn -->-->
1.331 AuthorizationRequest {
"client_id": "b9f3defb-96fb-4f5f-a4c1-3da0c0b8245f",
"nonce": "sBCJg0CTIeMKEYCo",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "xBj0nldKDfD34aq7"
}
1.331 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=b9f3defb-96fb-4f5f-a4c1-3da0c0b8245f&state=xBj0nldKDfD34aq7&response_type=code&nonce=sBCJg0CTIeMKEYCo
1.331 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=b9f3defb-96fb-4f5f-a4c1-3da0c0b8245f&state=xBj0nldKDfD34aq7&response_type=code&nonce=sBCJg0CTIeMKEYCo
4.773 response Response URL with query part
4.773 response {'state': 'xBj0nldKDfD34aq7', 'scope': 'openid', 'code': 'CnJRaupaStC3ecxsVUrIX_gO4MWYo6ap4sZsIFAPxU4.oXBBjtX8OlXI7KrLbona60PxiazGJYSQvhNeLKlS-rs'}
4.774 response {'state': 'xBj0nldKDfD34aq7', 'scope': 'openid', 'code': 'CnJRaupaStC3ecxsVUrIX_gO4MWYo6ap4sZsIFAPxU4.oXBBjtX8OlXI7KrLbona60PxiazGJYSQvhNeLKlS-rs'}
4.774 AuthorizationResponse {
"code": "CnJRaupaStC3ecxsVUrIX_gO4MWYo6ap4sZsIFAPxU4.oXBBjtX8OlXI7KrLbona60PxiazGJYSQvhNeLKlS-rs",
"scope": "openid",
"state": "xBj0nldKDfD34aq7"
}
4.774 phase <--<-- 5 --- Done -->-->
4.774 end
4.775 assertion VerifyAuthnResponse
4.775 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
4.775 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-prompt-none-NotLoggedIn.txt 0000644 0000000 0000000 00000015403 13313422354 016656 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-prompt-none-NotLoggedIn
Test description: Request with prompt=none when not logged in
Timestamp: 2018-06-23T10:46:04Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
2.55 phase <--<-- 1 --- Webfinger -->-->
2.55 not expected to do WebFinger
2.55 phase <--<-- 2 --- Discovery -->-->
2.55 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
2.624 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
2.625 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
2.625 phase <--<-- 3 --- Registration -->-->
2.625 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
2.626 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#n0iVlSqvBXqBieXQ"
],
"response_types": [
"code"
]
}
2.785 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
2.786 RegistrationResponse {
"client_id": "68557ec6-8e9f-4ff1-b50c-6d95713e5977",
"client_secret": "SxP6GFsvbnIk",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "68557ec6-8e9f-4ff1-b50c-6d95713e5977",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#n0iVlSqvBXqBieXQ"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
2.786 phase <--<-- 4 --- AsyncAuthn -->-->
2.787 AuthorizationRequest {
"client_id": "68557ec6-8e9f-4ff1-b50c-6d95713e5977",
"nonce": "i3OljxAGcNCbqIiA",
"prompt": [
"none"
],
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "q1An4wJ1Y5ITWTL4"
}
2.787 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=68557ec6-8e9f-4ff1-b50c-6d95713e5977&state=q1An4wJ1Y5ITWTL4&response_type=code&nonce=i3OljxAGcNCbqIiA
2.787 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=68557ec6-8e9f-4ff1-b50c-6d95713e5977&state=q1An4wJ1Y5ITWTL4&response_type=code&nonce=i3OljxAGcNCbqIiA
3.226 response Response URL with query part
3.226 response {'error_debug': 'Prompt "none" was requested, but no existing login session was found', 'error_description': 'The Authorization Server requires End-User authentication', 'state': 'q1An4wJ1Y5ITWTL4', 'error': 'login_required'}
3.227 response {'error_debug': 'Prompt "none" was requested, but no existing login session was found', 'error_description': 'The Authorization Server requires End-User authentication', 'state': 'q1An4wJ1Y5ITWTL4', 'error': 'login_required'}
3.227 AuthorizationErrorResponse {
"error": "login_required",
"error_debug": "Prompt \"none\" was requested, but no existing login session was found",
"error_description": "The Authorization Server requires End-User authentication",
"state": "q1An4wJ1Y5ITWTL4"
}
3.227 AuthorizationErrorResponse {
"error": "login_required",
"error_debug": "Prompt \"none\" was requested, but no existing login session was found",
"error_description": "The Authorization Server requires End-User authentication",
"state": "q1An4wJ1Y5ITWTL4"
}
3.227 phase <--<-- 5 --- Done -->-->
3.227 end
3.228 assertion VerifyErrorMessage
3.228 condition verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
3.228 condition Done: status=OK
============================================================
Conditions
verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-request_uri-Unsigned.txt 0000644 0000000 0000000 00000015413 13313422455 016355 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-request_uri-Unsigned
Test description: Support request_uri request parameter with unsigned request
Timestamp: 2018-06-23T10:47:09Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.108 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.109 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.109 phase <--<-- 2 --- Registration -->-->
0.109 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'request_object_signing_alg': 'none'}
0.11 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "none",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#y3yJCj9aUwijFwLb"
],
"response_types": [
"code"
]
}
0.266 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.267 RegistrationResponse {
"client_id": "7e003ff3-922d-46c7-9aed-14229d2dcd77",
"client_secret": "uDrA6HdvFjX_",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "7e003ff3-922d-46c7-9aed-14229d2dcd77",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "none",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#y3yJCj9aUwijFwLb"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.267 phase <--<-- 3 --- AsyncAuthn -->-->
0.269 AuthorizationRequest {
"client_id": "7e003ff3-922d-46c7-9aed-14229d2dcd77",
"nonce": "J399ANqxm0zU5D12",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"request_uri": "https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#y3yJCj9aUwijFwLb",
"response_type": "code",
"scope": "openid",
"state": "4mLRZhS3TmIfT4PC"
}
0.269 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?request_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Frequests%2Fe3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9%23y3yJCj9aUwijFwLb&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=7e003ff3-922d-46c7-9aed-14229d2dcd77&state=4mLRZhS3TmIfT4PC&response_type=code&nonce=J399ANqxm0zU5D12
0.269 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?request_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Frequests%2Fe3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9%23y3yJCj9aUwijFwLb&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=7e003ff3-922d-46c7-9aed-14229d2dcd77&state=4mLRZhS3TmIfT4PC&response_type=code&nonce=J399ANqxm0zU5D12
4.007 response Response URL with query part
4.007 response {'state': '4mLRZhS3TmIfT4PC', 'scope': 'openid', 'code': 'RC9sPmg6uGLiz7AOGzyMJlz3WRO3TnuDp4ukq6SLn9w.z1UQnAQdHLjEGtAcoTKzJKMuh3OupD8C6-XyXQf0AZw'}
4.008 response {'state': '4mLRZhS3TmIfT4PC', 'scope': 'openid', 'code': 'RC9sPmg6uGLiz7AOGzyMJlz3WRO3TnuDp4ukq6SLn9w.z1UQnAQdHLjEGtAcoTKzJKMuh3OupD8C6-XyXQf0AZw'}
4.008 AuthorizationResponse {
"code": "RC9sPmg6uGLiz7AOGzyMJlz3WRO3TnuDp4ukq6SLn9w.z1UQnAQdHLjEGtAcoTKzJKMuh3OupD8C6-XyXQf0AZw",
"scope": "openid",
"state": "4mLRZhS3TmIfT4PC"
}
4.008 phase <--<-- 4 --- Done -->-->
4.008 end
4.009 assertion VerifyResponse
4.009 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.009 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Response-code.txt 0000644 0000000 0000000 00000014213 13313422104 014726 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Response-code
Test description: Request with response_type=code
Timestamp: 2018-06-23T10:43:16Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.106 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.107 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.107 phase <--<-- 2 --- Registration -->-->
0.107 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.107 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#93s4J36rqeQJiHsM"
],
"response_types": [
"code"
]
}
0.298 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.299 RegistrationResponse {
"client_id": "7aaec6a8-b0a8-438f-af5f-6f2fe5d378dc",
"client_secret": "O1AMWod5wybF",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "7aaec6a8-b0a8-438f-af5f-6f2fe5d378dc",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#93s4J36rqeQJiHsM"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.299 phase <--<-- 3 --- AsyncAuthn -->-->
0.299 AuthorizationRequest {
"client_id": "7aaec6a8-b0a8-438f-af5f-6f2fe5d378dc",
"nonce": "SRMa3MgSMgr6Bjm6",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "fE1XuV4S8dvmxiPT"
}
0.3 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=7aaec6a8-b0a8-438f-af5f-6f2fe5d378dc&state=fE1XuV4S8dvmxiPT&response_type=code&nonce=SRMa3MgSMgr6Bjm6
0.3 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=7aaec6a8-b0a8-438f-af5f-6f2fe5d378dc&state=fE1XuV4S8dvmxiPT&response_type=code&nonce=SRMa3MgSMgr6Bjm6
7.414 response Response URL with query part
7.415 response {'state': 'fE1XuV4S8dvmxiPT', 'scope': 'openid', 'code': 'QdzPnGJ2hEUhGi_Xc2swEZz9BOV1okGsf_03oI6DDmw.YH0sAo_sBk69q7O6Nljqg25K8MHtRyBn64qkqIdJtxA'}
7.415 response {'state': 'fE1XuV4S8dvmxiPT', 'scope': 'openid', 'code': 'QdzPnGJ2hEUhGi_Xc2swEZz9BOV1okGsf_03oI6DDmw.YH0sAo_sBk69q7O6Nljqg25K8MHtRyBn64qkqIdJtxA'}
7.415 AuthorizationResponse {
"code": "QdzPnGJ2hEUhGi_Xc2swEZz9BOV1okGsf_03oI6DDmw.YH0sAo_sBk69q7O6Nljqg25K8MHtRyBn64qkqIdJtxA",
"scope": "openid",
"state": "fE1XuV4S8dvmxiPT"
}
7.415 phase <--<-- 4 --- Done -->-->
7.415 end
7.416 assertion VerifyAuthnResponse
7.416 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
7.416 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Req-acr_values.txt 0000644 0000000 0000000 00000023513 13313422532 015101 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-acr_values
Test description: Providing acr_values
Timestamp: 2018-06-23T10:47:54Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.072 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Registration -->-->
0.074 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.074 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#5ofEKGPE4swDCLVE"
],
"response_types": [
"code"
]
}
0.235 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.236 RegistrationResponse {
"client_id": "45fcfb4e-4c2d-4da4-95f7-e6b24f5a96d1",
"client_secret": "8JdoRG7cbXg9",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "45fcfb4e-4c2d-4da4-95f7-e6b24f5a96d1",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#5ofEKGPE4swDCLVE"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.236 phase <--<-- 3 --- AsyncAuthn -->-->
0.237 AuthorizationRequest {
"acr_values": "1 2",
"client_id": "45fcfb4e-4c2d-4da4-95f7-e6b24f5a96d1",
"nonce": "eU8NNDTqE5vMy3JB",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "nbwase0KVlKytapU"
}
0.237 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=45fcfb4e-4c2d-4da4-95f7-e6b24f5a96d1&state=nbwase0KVlKytapU&acr_values=1+2&response_type=code&nonce=eU8NNDTqE5vMy3JB
0.237 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=45fcfb4e-4c2d-4da4-95f7-e6b24f5a96d1&state=nbwase0KVlKytapU&acr_values=1+2&response_type=code&nonce=eU8NNDTqE5vMy3JB
2.425 response Response URL with query part
2.425 response {'state': 'nbwase0KVlKytapU', 'scope': 'openid', 'code': '4EAM2YmrQcMgZdhPslm3OwP8yBCvC3gX24FKqbiDGxw.wfU4oM_1PpAlM-cxYCUSjL-N9MPFqYN3pFMMYp4q7Dw'}
2.426 response {'state': 'nbwase0KVlKytapU', 'scope': 'openid', 'code': '4EAM2YmrQcMgZdhPslm3OwP8yBCvC3gX24FKqbiDGxw.wfU4oM_1PpAlM-cxYCUSjL-N9MPFqYN3pFMMYp4q7Dw'}
2.426 AuthorizationResponse {
"code": "4EAM2YmrQcMgZdhPslm3OwP8yBCvC3gX24FKqbiDGxw.wfU4oM_1PpAlM-cxYCUSjL-N9MPFqYN3pFMMYp4q7Dw",
"scope": "openid",
"state": "nbwase0KVlKytapU"
}
2.426 phase <--<-- 4 --- AccessToken -->-->
2.426 --> request op_args: {'state': 'nbwase0KVlKytapU'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.426 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'nbwase0KVlKytapU', 'code': '4EAM2YmrQcMgZdhPslm3OwP8yBCvC3gX24FKqbiDGxw.wfU4oM_1PpAlM-cxYCUSjL-N9MPFqYN3pFMMYp4q7Dw', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '45fcfb4e-4c2d-4da4-95f7-e6b24f5a96d1'}, 'state': 'nbwase0KVlKytapU'}
2.426 AccessTokenRequest {
"code": "4EAM2YmrQcMgZdhPslm3OwP8yBCvC3gX24FKqbiDGxw.wfU4oM_1PpAlM-cxYCUSjL-N9MPFqYN3pFMMYp4q7Dw",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "nbwase0KVlKytapU"
}
2.426 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.426 request_http_args {'headers': {'Authorization': 'Basic NDVmY2ZiNGUtNGMyZC00ZGE0LTk1ZjctZTZiMjRmNWE5NmQxOjhKZG9SRzdjYlhnOQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.426 request code=4EAM2YmrQcMgZdhPslm3OwP8yBCvC3gX24FKqbiDGxw.wfU4oM_1PpAlM-cxYCUSjL-N9MPFqYN3pFMMYp4q7Dw&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=nbwase0KVlKytapU
2.64 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.641 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhY3IiOiIwIiwiYXVkIjpbIjQ1ZmNmYjRlLTRjMmQtNGRhNC05NWY3LWU2YjI0ZjVhOTZkMSJdLCJhdXRoX3RpbWUiOjE1Mjk3NTA3NDksImV4cCI6MTUyOTc1NDQ3MywiaWF0IjoxNTI5NzUwODczLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJlNGRhNmIwMi05OTRlLTRhNWQtYjMzNy0wYzE5NTI1YTg4NTEiLCJub25jZSI6ImVVOE5ORFRxRTV2TXkzSkIiLCJyYXQiOjE1Mjk3NTA4NzEsInN1YiI6ImZvb0BiYXIuY29tIn0.c2_g5zxoyoWGUv-bQIPhrFGLGQPzEVNHcAzFc7jbTe61hCDWVc44rlm50s8Nq0oCMjLLBRO_OJsoQsC9esXrdY8deNn8tJ0gjpszgf8a17K7g5VhXenRFqTWD0fVIPL8GodWtiBhfSZJSYgrbKt9d_pjntg6oY1Eak9sHQemD4nKF1IZpMOpsWalO-SC0mUhoVcSNpGUtZ-FCkBkRRXUfUCo7fq83Anmr0IMrCzz6abkVJZk_yOpEq7GE8JesnaQeHT28O3l8LEYOJrzoDZmYuue3nXzesyGNd5D_qrK3MECzvLEMcVQOtJA2dzhjiBy3l61sD_vBbE-s40i7wfTixee_hS8N8I6iF2bZpmXO_fySuCHOvheKtIQ6E8fn6RZ0y_J4XitA1QY_yd5hlGeF5HxBx1X0oGAlFqCK2ur6IJ-fABx4NDvokuPEM2R0RS_YY1xbUYzDQoa2Y99CAREeOhppSCXw7m0sRxgMvHvo5iEEHgX4PZFCj72wFXyLQxoJISiabzWRWCiEo_VigK9TsLo45afZMEhOUfshHkO20HQyrBIi6B5LV2KwbEJeBdBYCFdBYUd2-vpi9lU-Mqt9KX3p0D7Gp6-varcIqHH4brXmB7NfySen_okkQZO0LxyRLXY8mKJT5-yIuda1LJ4BvIXUucob1lTulZgtLEEUro', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'DuS8ueyN2zvYCaP1SCamSzNPUkCiNlH4Z8yNsxUCMPQ.wQDN-_MniAoevr1J9-yavV9WY5lEyXxqPBAsRwScHus', 'scope': 'openid'}
2.72 AccessTokenResponse {
"access_token": "DuS8ueyN2zvYCaP1SCamSzNPUkCiNlH4Z8yNsxUCMPQ.wQDN-_MniAoevr1J9-yavV9WY5lEyXxqPBAsRwScHus",
"expires_in": 3599,
"id_token": {
"acr": "0",
"aud": [
"45fcfb4e-4c2d-4da4-95f7-e6b24f5a96d1"
],
"auth_time": 1529750749,
"exp": 1529754473,
"iat": 1529750873,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "e4da6b02-994e-4a5d-b337-0c19525a8851",
"nonce": "eU8NNDTqE5vMy3JB",
"rat": 1529750871,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
2.72 phase <--<-- 5 --- Done -->-->
2.72 end
2.72 assertion VerifyResponse
2.72 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.721 assertion UsedAcrValue
2.721 condition used-acr-value: status=WARNING, message=Used acr value: 0, preferred: ['1', '2'] [The acr value in the ID Token]
2.721 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
used-acr-value: status=WARNING, message=Used acr value: 0, preferred: ['1', '2'] [The acr value in the ID Token]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
Used acr value: 0, preferred: ['1', '2']
./OP-scope-address.txt 0000644 0000000 0000000 00000026164 13313422470 014772 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-scope-address
Test description: Scope requesting address claims
Timestamp: 2018-06-23T10:47:20Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.545 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.546 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.547 phase <--<-- 2 --- Registration -->-->
0.547 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.547 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#WKsM4xjlUcIg9WDq"
],
"response_types": [
"code"
]
}
0.713 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.714 RegistrationResponse {
"client_id": "a5e1c85e-0347-4ca0-a459-5ad6355ae4e4",
"client_secret": "pf84VVUUcxVF",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "a5e1c85e-0347-4ca0-a459-5ad6355ae4e4",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#WKsM4xjlUcIg9WDq"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.714 phase <--<-- 3 --- AsyncAuthn -->-->
0.715 condition Check support: status=WARNING, message=No support for: scopes_supported=['address']
0.715 AuthorizationRequest {
"client_id": "a5e1c85e-0347-4ca0-a459-5ad6355ae4e4",
"nonce": "1UY1L6Ve7Nab89lx",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid address",
"state": "rz8Zr1KZkZGGEBx3"
}
0.715 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+address&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=a5e1c85e-0347-4ca0-a459-5ad6355ae4e4&state=rz8Zr1KZkZGGEBx3&response_type=code&nonce=1UY1L6Ve7Nab89lx
0.715 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+address&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=a5e1c85e-0347-4ca0-a459-5ad6355ae4e4&state=rz8Zr1KZkZGGEBx3&response_type=code&nonce=1UY1L6Ve7Nab89lx
2.792 response Response URL with query part
2.792 response {'state': 'rz8Zr1KZkZGGEBx3', 'scope': 'openid address', 'code': 'Ij3tPFq6yFy4E-8c_W1hnaCaaYo6JfbIakUBejy8hnA.BhoMQ5IAA4M04KB-2Gp1y4Mi2geoA_qPdJ-ehwQAN18'}
2.793 response {'state': 'rz8Zr1KZkZGGEBx3', 'scope': 'openid address', 'code': 'Ij3tPFq6yFy4E-8c_W1hnaCaaYo6JfbIakUBejy8hnA.BhoMQ5IAA4M04KB-2Gp1y4Mi2geoA_qPdJ-ehwQAN18'}
2.793 AuthorizationResponse {
"code": "Ij3tPFq6yFy4E-8c_W1hnaCaaYo6JfbIakUBejy8hnA.BhoMQ5IAA4M04KB-2Gp1y4Mi2geoA_qPdJ-ehwQAN18",
"scope": "openid address",
"state": "rz8Zr1KZkZGGEBx3"
}
2.793 phase <--<-- 4 --- AccessToken -->-->
2.793 --> request op_args: {'state': 'rz8Zr1KZkZGGEBx3'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.793 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'rz8Zr1KZkZGGEBx3', 'code': 'Ij3tPFq6yFy4E-8c_W1hnaCaaYo6JfbIakUBejy8hnA.BhoMQ5IAA4M04KB-2Gp1y4Mi2geoA_qPdJ-ehwQAN18', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'a5e1c85e-0347-4ca0-a459-5ad6355ae4e4'}, 'state': 'rz8Zr1KZkZGGEBx3'}
2.793 AccessTokenRequest {
"code": "Ij3tPFq6yFy4E-8c_W1hnaCaaYo6JfbIakUBejy8hnA.BhoMQ5IAA4M04KB-2Gp1y4Mi2geoA_qPdJ-ehwQAN18",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "rz8Zr1KZkZGGEBx3"
}
2.794 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.794 request_http_args {'headers': {'Authorization': 'Basic YTVlMWM4NWUtMDM0Ny00Y2EwLWE0NTktNWFkNjM1NWFlNGU0OnBmODRWVlVVY3hWRg==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.794 request code=Ij3tPFq6yFy4E-8c_W1hnaCaaYo6JfbIakUBejy8hnA.BhoMQ5IAA4M04KB-2Gp1y4Mi2geoA_qPdJ-ehwQAN18&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=rz8Zr1KZkZGGEBx3
3.003 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.004 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYTVlMWM4NWUtMDM0Ny00Y2EwLWE0NTktNWFkNjM1NWFlNGU0Il0sImF1dGhfdGltZSI6MTUyOTc1MDc0OSwiZXhwIjoxNTI5NzU0NDQwLCJpYXQiOjE1Mjk3NTA4NDAsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjU0MmNjYTgyLTE0NDItNDRlMi05ZDYzLTgwZWE3YWJhZjBlYSIsIm5vbmNlIjoiMVVZMUw2VmU3TmFiODlseCIsInJhdCI6MTUyOTc1MDgzOCwic3ViIjoiZm9vQGJhci5jb20ifQ.yuvvCsBU9OvCXSin-IInSgRXtrr1-WFCcgnC0p5y4zUZbF0QEHOpDpGnaHijtQlqKKG1MIAufU1rwwTi8RfrlECOJWDQveKEYMraUOVzVPS15H3S0AbC-zu_AF-Dp98vroSVrXCr2Uli35LL1pSCxMy7V3sDEUKlGRAw321My9sq5GvRGO62Hc_zSg4ZhMx0Z6MgthAwPnKM4n9ccN2Iu7yH7jQpJHvDz6oIGaZbUCw5Xk-XXrbVIt27uOrAjf5LS8U4g8fLGEPRPndMQ5IsURpTlInbaVZ3RXoBiBES6m9IJv_7lA2g-eL8NwSlkUooTWMr1FDFgY4S4V85BXQxgPDFblEvnJktY8Hx5v8sCklh4PSrSwPpFYQkrF_RVOWdcOWV9DyLkzeNl3nVqePaqww41FE0JbdoCPB_QfzNv6cyQ78vDbWBtkfTruXw5YIpKnFRiJt0QmAtJ6FDUIjzeenlLPzs1a4GX8vlSw7S6O2DhgJ8CaTOB-8n0Swu66z3nOTr1CKr9CKHGm-ohMftxxovCWudcTW2fwMulpSHMCRuWSHRICuBYWHqBiCdgzpa-IQogWPPcTDKShMmCAlB6cmgtE78DblUD-CGCfUQsYuuqX5knjg5c2bzreWLdOwYkOjQrwJnHrUGFX3R3NBcA2M2eHSgDwYVXzrzRvzhBbM', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'GqtG0m_X_K14O2N-Xp1yAhtNK-XnTQtWow5bKhM8Gnc.6zIuS-868pPOKIwOcBsom7iquex3Vev3sCG0mQv0EWw', 'scope': 'openid address'}
3.118 AccessTokenResponse {
"access_token": "GqtG0m_X_K14O2N-Xp1yAhtNK-XnTQtWow5bKhM8Gnc.6zIuS-868pPOKIwOcBsom7iquex3Vev3sCG0mQv0EWw",
"expires_in": 3599,
"id_token": {
"aud": [
"a5e1c85e-0347-4ca0-a459-5ad6355ae4e4"
],
"auth_time": 1529750749,
"exp": 1529754440,
"iat": 1529750840,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "542cca82-1442-44e2-9d63-80ea7abaf0ea",
"nonce": "1UY1L6Ve7Nab89lx",
"rat": 1529750838,
"sub": "[email protected]"
},
"scope": "openid address",
"token_type": "bearer"
}
3.118 phase <--<-- 5 --- UserInfo -->-->
3.118 do_user_info_request kwargs:{'state': 'rz8Zr1KZkZGGEBx3', 'method': 'GET', 'authn_method': 'bearer_header'}
3.118 request {'body': None}
3.118 request_url https://oidc-certification.ory.sh:8443/userinfo
3.118 request_http_args {'headers': {'Authorization': 'Bearer GqtG0m_X_K14O2N-Xp1yAhtNK-XnTQtWow5bKhM8Gnc.6zIuS-868pPOKIwOcBsom7iquex3Vev3sCG0mQv0EWw'}}
3.19 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
3.19 OpenIDSchema {
"sub": "[email protected]"
}
3.19 OpenIDSchema {
"sub": "[email protected]"
}
3.19 phase <--<-- 6 --- Done -->-->
3.19 end
3.191 assertion CheckHTTPResponse
3.191 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
3.191 assertion VerifyResponse
3.192 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.192 assertion VerifyScopes
3.192 condition verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['address'] [Verifies that the claims corresponding to the requested scopes are returned]
3.192 condition Done: status=OK
============================================================
Conditions
Check support: status=WARNING, message=No support for: scopes_supported=['address']
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['address'] [Verifies that the claims corresponding to the requested scopes are returned]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
No support for: scopes_supported=['address']
The following claims were missing from the returned information: ['address']
./OP-Req-NotUnderstood.txt 0000644 0000000 0000000 00000014302 13313422526 015563 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-NotUnderstood
Test description: Request with extra query component
Timestamp: 2018-06-23T10:47:50Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.079 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.081 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.081 phase <--<-- 2 --- Registration -->-->
0.081 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.081 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#rgycwmXRYanMXQEV"
],
"response_types": [
"code"
]
}
0.239 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.24 RegistrationResponse {
"client_id": "6abf2b84-3a08-482a-b56c-502d5a034123",
"client_secret": "aqC3ZxjtrQsK",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "6abf2b84-3a08-482a-b56c-502d5a034123",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#rgycwmXRYanMXQEV"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.24 phase <--<-- 3 --- AsyncAuthn -->-->
0.24 AuthorizationRequest {
"client_id": "6abf2b84-3a08-482a-b56c-502d5a034123",
"extra": "foobar",
"nonce": "73aJQL913hIWRYHa",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "3Cj6EOpWacd6emyu"
}
0.24 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?extra=foobar&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=6abf2b84-3a08-482a-b56c-502d5a034123&state=3Cj6EOpWacd6emyu&response_type=code&nonce=73aJQL913hIWRYHa
0.24 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?extra=foobar&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=6abf2b84-3a08-482a-b56c-502d5a034123&state=3Cj6EOpWacd6emyu&response_type=code&nonce=73aJQL913hIWRYHa
2.808 response Response URL with query part
2.808 response {'state': '3Cj6EOpWacd6emyu', 'scope': 'openid', 'code': '3U0lyrGU5OUHC2hYPVk1Wbk70FGHMbZy2UTjOJXSvgw.DVyQ3TRCXgTqHd2sDJnCRmi8sBYP-l3lsS6BlzLwyIU'}
2.808 response {'state': '3Cj6EOpWacd6emyu', 'scope': 'openid', 'code': '3U0lyrGU5OUHC2hYPVk1Wbk70FGHMbZy2UTjOJXSvgw.DVyQ3TRCXgTqHd2sDJnCRmi8sBYP-l3lsS6BlzLwyIU'}
2.809 AuthorizationResponse {
"code": "3U0lyrGU5OUHC2hYPVk1Wbk70FGHMbZy2UTjOJXSvgw.DVyQ3TRCXgTqHd2sDJnCRmi8sBYP-l3lsS6BlzLwyIU",
"scope": "openid",
"state": "3Cj6EOpWacd6emyu"
}
2.809 phase <--<-- 4 --- Done -->-->
2.809 end
2.809 assertion VerifyAuthnResponse
2.809 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
2.809 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-scope-email.txt 0000644 0000000 0000000 00000026203 13313422475 014433 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-scope-email
Test description: Scope requesting email claims
Timestamp: 2018-06-23T10:47:25Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.143 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.145 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.145 phase <--<-- 2 --- Registration -->-->
0.145 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.145 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Es1oZIZdTq4xDU37"
],
"response_types": [
"code"
]
}
0.304 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.305 RegistrationResponse {
"client_id": "98d9428f-90d1-4f51-9416-cf90350de5cf",
"client_secret": "dXUURXiqSHe9",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "98d9428f-90d1-4f51-9416-cf90350de5cf",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Es1oZIZdTq4xDU37"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.305 phase <--<-- 3 --- AsyncAuthn -->-->
0.305 condition Check support: status=WARNING, message=No support for: scopes_supported=['email']
0.305 AuthorizationRequest {
"client_id": "98d9428f-90d1-4f51-9416-cf90350de5cf",
"nonce": "B4Vw5MT8LfIePRLm",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid email",
"state": "PDfu4AACDB7uCRJ9"
}
0.305 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+email&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=98d9428f-90d1-4f51-9416-cf90350de5cf&state=PDfu4AACDB7uCRJ9&response_type=code&nonce=B4Vw5MT8LfIePRLm
0.305 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+email&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=98d9428f-90d1-4f51-9416-cf90350de5cf&state=PDfu4AACDB7uCRJ9&response_type=code&nonce=B4Vw5MT8LfIePRLm
2.819 response Response URL with query part
2.82 response {'state': 'PDfu4AACDB7uCRJ9', 'scope': 'openid email', 'code': 'LkbzMOZfkDtJox_WMOUD8ZCvTuxMOKTE_vXDajBt8Iw.eh31vU7si87W3ktCSauU-z13AcMurOWCID83Zr1TsIk'}
2.82 response {'state': 'PDfu4AACDB7uCRJ9', 'scope': 'openid email', 'code': 'LkbzMOZfkDtJox_WMOUD8ZCvTuxMOKTE_vXDajBt8Iw.eh31vU7si87W3ktCSauU-z13AcMurOWCID83Zr1TsIk'}
2.82 AuthorizationResponse {
"code": "LkbzMOZfkDtJox_WMOUD8ZCvTuxMOKTE_vXDajBt8Iw.eh31vU7si87W3ktCSauU-z13AcMurOWCID83Zr1TsIk",
"scope": "openid email",
"state": "PDfu4AACDB7uCRJ9"
}
2.821 phase <--<-- 4 --- AccessToken -->-->
2.821 --> request op_args: {'state': 'PDfu4AACDB7uCRJ9'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.821 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'PDfu4AACDB7uCRJ9', 'code': 'LkbzMOZfkDtJox_WMOUD8ZCvTuxMOKTE_vXDajBt8Iw.eh31vU7si87W3ktCSauU-z13AcMurOWCID83Zr1TsIk', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '98d9428f-90d1-4f51-9416-cf90350de5cf'}, 'state': 'PDfu4AACDB7uCRJ9'}
2.821 AccessTokenRequest {
"code": "LkbzMOZfkDtJox_WMOUD8ZCvTuxMOKTE_vXDajBt8Iw.eh31vU7si87W3ktCSauU-z13AcMurOWCID83Zr1TsIk",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "PDfu4AACDB7uCRJ9"
}
2.821 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.821 request_http_args {'headers': {'Authorization': 'Basic OThkOTQyOGYtOTBkMS00ZjUxLTk0MTYtY2Y5MDM1MGRlNWNmOmRYVVVSWGlxU0hlOQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.821 request code=LkbzMOZfkDtJox_WMOUD8ZCvTuxMOKTE_vXDajBt8Iw.eh31vU7si87W3ktCSauU-z13AcMurOWCID83Zr1TsIk&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=PDfu4AACDB7uCRJ9
3.07 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.071 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiOThkOTQyOGYtOTBkMS00ZjUxLTk0MTYtY2Y5MDM1MGRlNWNmIl0sImF1dGhfdGltZSI6MTUyOTc1MDc0OSwiZXhwIjoxNTI5NzU0NDQ0LCJpYXQiOjE1Mjk3NTA4NDQsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjA4Yjg1MDVlLWQ5YTAtNGYzOS05ZTNhLWVlZjQzMGU2MDhmYiIsIm5vbmNlIjoiQjRWdzVNVDhMZkllUFJMbSIsInJhdCI6MTUyOTc1MDg0Miwic3ViIjoiZm9vQGJhci5jb20ifQ.MnIBJWQ-wRnXoxROKFoyycY7qvaX6quGlPj0nW2nKUkYmRrEYtQUuX2A_OXxKb_ULdjdvov3r0hoj99eYxra7qvJRWGt8g9KMcUR7QPeCYWrWvMxVWf1ul1qARuo3_FqyqfhOKP1fC8gOLENEpDcuoVRt-TcUbDAVK0Cr1hAs7w8U5lvyk-bCwKABkcfGK2aIKiZGQxW7mtDK721PjhZfFGWd-BAqwc9sR5T8CUhg7tF0f5XAO5r0TMzr67N8SUaBR9wTNtYuHMvxJry2AKAhm721VsaZ0HKZ3bN1WaVZrZEW1clwcDJws4Y56gnBvbEb-OvjtC88F02uwgzwnhnCl5XahwXRkAfcx5sHtd9LJbwBzsgbWxU4QJvUKkxchL635r8l7PqKauiGO-MV3luKXvnAXS7l832I5ESRopgI9Uk6gfJEtRXVOs-rSVQ1lMXDxI3WRfvqd4iDp-gp0IYbfAFGj4tAGcoyYW9QpgBHMx1TKX3c0_jFfYQokJUcdPZV9zMQH0xHo2JPo0X9rn7AwaVUhTstFPBVKsuXDj9RqwkUKwK96m5m70WlXmPlafpuP3p8LuYff08lQGXtqBtN522QYLqLZBns06NOHApKPNGMgilR9-tOcYMEZduAG-FdTaV1usXc2nefgLHhaDtyARAGLQk8qeE91WCDMkXy2Q', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'UZcuuRYNbW5N1LyyryJE_noqKNW_uQpSvKHtyKi7YGY.5M9z39nlFo0SP862TLJuyFSJz0gtmcjkIqImBe6nkCk', 'scope': 'openid email'}
3.149 AccessTokenResponse {
"access_token": "UZcuuRYNbW5N1LyyryJE_noqKNW_uQpSvKHtyKi7YGY.5M9z39nlFo0SP862TLJuyFSJz0gtmcjkIqImBe6nkCk",
"expires_in": 3599,
"id_token": {
"aud": [
"98d9428f-90d1-4f51-9416-cf90350de5cf"
],
"auth_time": 1529750749,
"exp": 1529754444,
"iat": 1529750844,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "08b8505e-d9a0-4f39-9e3a-eef430e608fb",
"nonce": "B4Vw5MT8LfIePRLm",
"rat": 1529750842,
"sub": "[email protected]"
},
"scope": "openid email",
"token_type": "bearer"
}
3.149 phase <--<-- 5 --- UserInfo -->-->
3.149 do_user_info_request kwargs:{'state': 'PDfu4AACDB7uCRJ9', 'method': 'GET', 'authn_method': 'bearer_header'}
3.15 request {'body': None}
3.15 request_url https://oidc-certification.ory.sh:8443/userinfo
3.15 request_http_args {'headers': {'Authorization': 'Bearer UZcuuRYNbW5N1LyyryJE_noqKNW_uQpSvKHtyKi7YGY.5M9z39nlFo0SP862TLJuyFSJz0gtmcjkIqImBe6nkCk'}}
3.228 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
3.229 OpenIDSchema {
"sub": "[email protected]"
}
3.229 OpenIDSchema {
"sub": "[email protected]"
}
3.229 phase <--<-- 6 --- Done -->-->
3.229 end
3.23 assertion CheckHTTPResponse
3.23 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
3.23 assertion VerifyResponse
3.23 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.23 assertion VerifyScopes
3.231 condition verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['email', 'email_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
3.231 condition Done: status=OK
============================================================
Conditions
Check support: status=WARNING, message=No support for: scopes_supported=['email']
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['email', 'email_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
No support for: scopes_supported=['email']
The following claims were missing from the returned information: ['email', 'email_verified']
./OP-scope-phone.txt 0000644 0000000 0000000 00000026257 13313422500 014453 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-scope-phone
Test description: Scope requesting phone claims
Timestamp: 2018-06-23T10:47:28Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.074 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.076 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.076 phase <--<-- 2 --- Registration -->-->
0.076 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.076 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#EvRrkiKr0Rp2pyYz"
],
"response_types": [
"code"
]
}
0.231 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.232 RegistrationResponse {
"client_id": "5b5d3c35-af23-4a89-b141-457329dd3aac",
"client_secret": "55Zi~q7f8hGI",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "5b5d3c35-af23-4a89-b141-457329dd3aac",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#EvRrkiKr0Rp2pyYz"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.232 phase <--<-- 3 --- AsyncAuthn -->-->
0.233 condition Check support: status=WARNING, message=No support for: scopes_supported=['phone']
0.233 AuthorizationRequest {
"client_id": "5b5d3c35-af23-4a89-b141-457329dd3aac",
"nonce": "E2Ecg2HCQVBSeF19",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid phone",
"state": "oAU3PBlY9oLIkhDh"
}
0.233 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+phone&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=5b5d3c35-af23-4a89-b141-457329dd3aac&state=oAU3PBlY9oLIkhDh&response_type=code&nonce=E2Ecg2HCQVBSeF19
0.233 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+phone&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=5b5d3c35-af23-4a89-b141-457329dd3aac&state=oAU3PBlY9oLIkhDh&response_type=code&nonce=E2Ecg2HCQVBSeF19
2.209 response Response URL with query part
2.209 response {'state': 'oAU3PBlY9oLIkhDh', 'scope': 'openid phone', 'code': '1gPJ1YECwWpLZsn-GG-ZVuiiDiF65Ln73x1tMeUJKi8.d5svJQ1OwSNwugRNr8pdvsx4ERwjnE07asbTx9fpYOs'}
2.21 response {'state': 'oAU3PBlY9oLIkhDh', 'scope': 'openid phone', 'code': '1gPJ1YECwWpLZsn-GG-ZVuiiDiF65Ln73x1tMeUJKi8.d5svJQ1OwSNwugRNr8pdvsx4ERwjnE07asbTx9fpYOs'}
2.21 AuthorizationResponse {
"code": "1gPJ1YECwWpLZsn-GG-ZVuiiDiF65Ln73x1tMeUJKi8.d5svJQ1OwSNwugRNr8pdvsx4ERwjnE07asbTx9fpYOs",
"scope": "openid phone",
"state": "oAU3PBlY9oLIkhDh"
}
2.21 phase <--<-- 4 --- AccessToken -->-->
2.21 --> request op_args: {'state': 'oAU3PBlY9oLIkhDh'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.21 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'oAU3PBlY9oLIkhDh', 'code': '1gPJ1YECwWpLZsn-GG-ZVuiiDiF65Ln73x1tMeUJKi8.d5svJQ1OwSNwugRNr8pdvsx4ERwjnE07asbTx9fpYOs', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '5b5d3c35-af23-4a89-b141-457329dd3aac'}, 'state': 'oAU3PBlY9oLIkhDh'}
2.21 AccessTokenRequest {
"code": "1gPJ1YECwWpLZsn-GG-ZVuiiDiF65Ln73x1tMeUJKi8.d5svJQ1OwSNwugRNr8pdvsx4ERwjnE07asbTx9fpYOs",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "oAU3PBlY9oLIkhDh"
}
2.21 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.21 request_http_args {'headers': {'Authorization': 'Basic NWI1ZDNjMzUtYWYyMy00YTg5LWIxNDEtNDU3MzI5ZGQzYWFjOjU1WmklN0VxN2Y4aEdJ', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.21 request code=1gPJ1YECwWpLZsn-GG-ZVuiiDiF65Ln73x1tMeUJKi8.d5svJQ1OwSNwugRNr8pdvsx4ERwjnE07asbTx9fpYOs&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=oAU3PBlY9oLIkhDh
2.47 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.472 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNWI1ZDNjMzUtYWYyMy00YTg5LWIxNDEtNDU3MzI5ZGQzYWFjIl0sImF1dGhfdGltZSI6MTUyOTc1MDc0OSwiZXhwIjoxNTI5NzU0NDQ4LCJpYXQiOjE1Mjk3NTA4NDgsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjNmYTIzNWU2LTMwN2UtNDUwMi04ZDMxLWUzODFkZGY1OTZlYyIsIm5vbmNlIjoiRTJFY2cySENRVkJTZUYxOSIsInJhdCI6MTUyOTc1MDg0Niwic3ViIjoiZm9vQGJhci5jb20ifQ.jPZivxl27OgpOvC2fhAI3u-UVt9i4ErPP3hVZl1OckYNGi1CrSz4b34CjDS00RAvEj7BGNivbGn22D4L6oTfNmTjZiUGzDouQ-FbVWBJOcke4RltRV9Upl2ej-pVhluiLFrMTSyl8jyY3xJ_imD_w4eHNBR0RStLlLQ-vUfmQrc0GfJ7PCMfmYwix4_khQoXKJ8K3_ehvxCUt6gBw1pJ0mXpz5Gm5qo1VKyJhlunIWCDN_ls4ThzK8aLdaTA-09jz0c7GKHiTydzTr8gWVuqFt5n7tKY5JgB1hbdlN_z4uy7fSHdtXoMi5e93j1J_dMXuR_8Cv4F1p6mRQUbV1Xl7Yt-afauEir3pWrSm97kqFD5sYMvLKIku0pLkruy86AkqvvYRk16QwPZC_JhhBC__936HZfJJ-7QnsLI2IEk3TvyBRzhmJg9nos9x4deGv0wKi77wVwscYlcvpjNh9Nm55qZFNS25H5vVZMloHsAzizdIn3951fnPtAUhAAFI75ncfUgfCuQusnvKQF35LvNeDxyZKsczCNWnWoY979NcBTZzIpxtWgNtFDilZdhusxCi1noi0jqshhE-7kcKFJS6BEPuTYjKVuBZ70z-3H48JRq_In98rPE6bdFefzFE5Bs2QGKwyWq1cU2cRC0y0Lyz7c7PvghO1vJmOLF8vQhX2M', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'EdSgmItX8P1_5B1_15o-ugHdf4epjRykpsXXkUfvzyQ.GywTVnvUOlZzct6cWJOrIWpJbiLQ4Rb_TsnntA3OFBk', 'scope': 'openid phone'}
2.555 AccessTokenResponse {
"access_token": "EdSgmItX8P1_5B1_15o-ugHdf4epjRykpsXXkUfvzyQ.GywTVnvUOlZzct6cWJOrIWpJbiLQ4Rb_TsnntA3OFBk",
"expires_in": 3599,
"id_token": {
"aud": [
"5b5d3c35-af23-4a89-b141-457329dd3aac"
],
"auth_time": 1529750749,
"exp": 1529754448,
"iat": 1529750848,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "3fa235e6-307e-4502-8d31-e381ddf596ec",
"nonce": "E2Ecg2HCQVBSeF19",
"rat": 1529750846,
"sub": "[email protected]"
},
"scope": "openid phone",
"token_type": "bearer"
}
2.555 phase <--<-- 5 --- UserInfo -->-->
2.555 do_user_info_request kwargs:{'state': 'oAU3PBlY9oLIkhDh', 'method': 'GET', 'authn_method': 'bearer_header'}
2.555 request {'body': None}
2.555 request_url https://oidc-certification.ory.sh:8443/userinfo
2.555 request_http_args {'headers': {'Authorization': 'Bearer EdSgmItX8P1_5B1_15o-ugHdf4epjRykpsXXkUfvzyQ.GywTVnvUOlZzct6cWJOrIWpJbiLQ4Rb_TsnntA3OFBk'}}
2.625 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
2.626 OpenIDSchema {
"sub": "[email protected]"
}
2.626 OpenIDSchema {
"sub": "[email protected]"
}
2.626 phase <--<-- 6 --- Done -->-->
2.626 end
2.627 assertion CheckHTTPResponse
2.627 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
2.627 assertion VerifyResponse
2.627 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.628 assertion VerifyScopes
2.628 condition verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['phone_number', 'phone_number_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
2.628 condition Done: status=OK
============================================================
Conditions
Check support: status=WARNING, message=No support for: scopes_supported=['phone']
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['phone_number', 'phone_number_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
No support for: scopes_supported=['phone']
The following claims were missing from the returned information: ['phone_number', 'phone_number_verified']
./OP-Discovery-jwks_uri.txt 0000644 0000000 0000000 00000014645 13313422115 016035 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Discovery-jwks_uri
Test description: Verify that jwks_uri is published
Timestamp: 2018-06-23T10:43:25Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.105 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.107 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.107 phase <--<-- 2 --- Done -->-->
0.107 end
0.107 assertion CheckHTTPResponse
0.108 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.108 assertion BareKeys
0.173 http response url:https://oidc-certification.ory.sh:8443/.well-known/jwks.json status_code:200
0.174 jwks {'keys': [{'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': '0vvbIEitFVzY4o12elAZbZvpja5xTm5AOh9wi2UEiPEL6aKxAUn1ywpUaLyWKuEXdeuykHyybniLaThik7Gf-6xKk6S9IK9tjbbwfRqHVkn_Xkyul0ohFI3iTcjvFq5FPGr5vEhSB6eckdngUpzb-7S_Kt8yunkdhYTmkuAr2AXSbQcmCbOJXOsvkc5LOwpjmFIWrtBAHwILJ5cHjzIHtkK2QKMJRlknD8b4kmQ3x6vfxA7mtXREUXdQFn7ssnOVPzriPQp4kIi_TMczSmRLlX1PeeOeDGpTnYywQbsAfdBGZ20WdZlwP3lRUUJoKv1GpBU51GKm2xhHtyrzOkiRKE8pH_PD05gh1G9qXbFtBOoHMBWEaCxoxyJcW8_9iLXBPoC-Jhm47VO5T9hPlaISzDY6EUmgYktejS_mx_bR7emBcbtFUccYSVVqT3EZqAFuQlsPsvj8AT9NmEiVncB2Cy4z7ofLX_Wai_VFPCf7AEfmDZ8mzFZQfVGct74Q9KybwXm8YDq0TSszQGuqT0gtvU9In7CPSOytrVDbdk8Peyeg-Wn_ACMRh5T23wUbQ0jy0Wi9kBwIzN-dUpKu3uL6EZ3PmPSZItQHeAxpQbRZJ1vrrd2y-b6EGun3G9rlnOZ3L4_L4-NOKLt4VGPie7sphlND1pc4ZipaXBjZ9uC3bS8', 'alg': 'RS256', 'kid': 'public:490968e8-c6e5-441e-b42e-5053d6c67af2'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': '0WN9e_V2wEp33JZoN7zQ9J4E4Iz0l-dlx6GqIKdepcMjON3PKZHWFML1e0ZKAkuG2ZJRKoX1LaSNZT0NI9N6_wVAT9aNv53sHBJVC4Bww1zKHEvQseGwJbG0lZZHjDXaxCBPte9yQnquIRRp9Ab-uBeziRoaFQ02OV3LBMBSZ79AzFvZ4yTqpUS_xp-Ylfcmh5wXEppd6hoxs9h1tttPTPbnMLte3S_zxCZI4TQi8d1yBi39OvfZxtABQQbgqYPxiYehNdYbfmZ2CAmVlsTxByS3X-ANBe2nmLsOLgXTyVFZfvEZkzY7OgEwwq5zog5pScXJ-TGlj0guZd8nClHEV-GHvXonjb2hZB63dFEiUVMNh5cOblZX034GnlOkzYfAH8UZ_cvOqONHbvplzONuaYSSRMPRaZwj-0fpElhFNHwr1v1pqbE1i9XOxU_c-eSMr4XAm1VsWG3zJKymjoJmaDcW3AEawi3btL1N2tE3p27cHtcdFjcv5birnxMtPI9Vu806U0_WiGtH_kaWxz64Xk3A_yB-lIBQwXe61JME-K81wLLcHE9qoqpF5iUK4mDqMmI_DVIazUlVUzxY0-1iFkV790V95dBxeYFgXKX02g8NyxfnyzUDC12qUKKejJFbG5LPHaMUXWJIQ2ntwBX_XzeF4pGh0u0vYmfxAmfHWN0', 'alg': 'RS256', 'kid': 'public:a09f73cf-d685-4c5c-9312-60a13e57646f'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': 's_BEnyG0xHYDibtz9a4tE1IW8490BQ_z526Lg2d0PWRtHfcqKmPG0pd0DizPuLY2j1NAY4cCXLwNWMJ3Cp1TqddaMl08hElvNbilcTyQr96RQg9MnrWeR1EqpdXEzTjcx06DFDokvzs89YQVZTDzSh_-xY_m_0VkcFQ0RpDTBn1B0dkMh78dbTJVVSGXYSBgMpcKrGlrgDaPIRX7qp_SdvjNtkPStG_wCPkzd_IJAaTAHGrlyj27dyhOC6EqQjpZRhQvT-w7GalbObncCFox3hRiC8wbI9Toi5p7vEuJJ6yksaqtIwgbtPXXUChNTqwQgIc1RE8RVuhI8ExaT6FfStIVLq9Tow6Hd9mopdX_ydEHHbnbvSC0cCRPg8_G8zTk0ihFpiHE1yEDXBQSs6pZIQ8KZF2RG35j75Jh4ngsDyPbC7PmjE93SG25AkX0WZwoB3g8f6q2r4dZqNtemRX1lMDo0FUQyYcOU5mnOiW3E5oNs3g-VH5ISOiaSUSLX6AIxDfdk6Wj5t7FZUo4EcIwTnE3PI-0HxnLJaErwbYEX0hO1BuhfF7zYHxDjc085U7OyN0abZWbuVUMtIMRgq-4ASlM9fTECg3sMmOfTEJV9nrJZaSCxKvVWma9A01bvBPB6Qn92Gj1XNZ0E1RBLUp1V3iXLcS7MGJh7bAAk5kwKCM', 'alg': 'RS256', 'kid': 'public:8e8dab73-c9fe-42ef-9a7b-1e217abba9a9'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': '3cQ2ihjoElfFVnnkleo6ioUvZrkDfddEKOMCaemXP7umEhr8TC9_L3BKYbJqtE15jvkJiqT1vlHgTOKD5wWCFhFSmEa9PAWlt9Hw6BWddFEsiijR113yvj4eT0qfjseMYyiKst0kBxiTRmQdIzllY2Y2UU1IYIkaAP009nZSR7a5IrPYFydZ6SRARk9kZI90fmgRnzUuQKcv7C9HbkUqs7qiApfA17ACpnuKQP5p5lGL41t5ZnU1-5FvmmO6NnwtRZif34HL6WYuksi2RleLAKoHGh_l6P6ygP5v3ucHH0TmdLVBAHMmlLW4BKdVnWa2HEQCKIBiXJztu8EpYCVpZ_ThCaZLagcUM6VCD4nqvsXzQB7pnsBjq75tbo2jlqrGQJE9ekfGVyw7XDN45IkJFLgfVJ2anpyK4NeIAbkB7ZCYSXbR96_EC6h0uZSMHtPYVNIvbRCK6ysCdlDuDsWiQ01tP-lp90eWj1d7ZYlaYNws12OauBfgLyn0NZvjIz5EYXbOO_Hi0P5U6znS1Um-lU0nB1Gsj685Io-KLzN0shOqkfDP8Xcjfx_3EEg0aEPJWqCjiP9K6veNI896ZrIrH6Sd0V_o4TIzpSJimZlMZrTWS6dUm2j6q1WQOE2Z5JlDMC90yTGUC8MNt2AdMB0Z78Mf71rdSrpXpWLMh7rz_7k', 'alg': 'RS256', 'kid': 'public:6a09d4a3-a298-47bc-8bbd-50b64f653f2d'}]}
0.174 condition bare-keys: status=OK [Dynamic OPs MUST publish their public keys as bare JWK keys]
0.174 assertion CheckHasJwksURI
0.174 condition providerinfo-has-jwks_uri: status=OK [Check that the jwks_uri discovery metadata value is in the provider_info]
0.174 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
bare-keys: status=OK [Dynamic OPs MUST publish their public keys as bare JWK keys]
providerinfo-has-jwks_uri: status=OK [Check that the jwks_uri discovery metadata value is in the provider_info]
Done: status=OK
============================================================
RESULT: PASSED
./OP-request_uri-Sig.txt 0000644 0000000 0000000 00000015433 13313422450 015320 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-request_uri-Sig
Test description: Support request_uri request parameter with signed request
Timestamp: 2018-06-23T10:47:04Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.124 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.125 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.125 phase <--<-- 2 --- Registration -->-->
0.125 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'request_object_signing_alg': 'RS256'}
0.126 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "RS256",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#P4zH7hvdIA0S4K0E"
],
"response_types": [
"code"
]
}
0.325 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.326 RegistrationResponse {
"client_id": "309fa3c3-b28d-44b1-96fc-b6804ff9459d",
"client_secret": "4AEImvMBBEy8",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "309fa3c3-b28d-44b1-96fc-b6804ff9459d",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "RS256",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#P4zH7hvdIA0S4K0E"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.326 phase <--<-- 3 --- AsyncAuthn -->-->
0.33 AuthorizationRequest {
"client_id": "309fa3c3-b28d-44b1-96fc-b6804ff9459d",
"nonce": "mzAWCEBxR6Xk9XVc",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"request_uri": "https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#P4zH7hvdIA0S4K0E",
"response_type": "code",
"scope": "openid",
"state": "nQuuCm7XNeDEtfEj"
}
0.33 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?request_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Frequests%2Fe3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9%23P4zH7hvdIA0S4K0E&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=309fa3c3-b28d-44b1-96fc-b6804ff9459d&state=nQuuCm7XNeDEtfEj&response_type=code&nonce=mzAWCEBxR6Xk9XVc
0.33 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?request_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Frequests%2Fe3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9%23P4zH7hvdIA0S4K0E&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=309fa3c3-b28d-44b1-96fc-b6804ff9459d&state=nQuuCm7XNeDEtfEj&response_type=code&nonce=mzAWCEBxR6Xk9XVc
3.147 response Response URL with query part
3.147 response {'state': 'nQuuCm7XNeDEtfEj', 'scope': 'openid', 'code': 'TRBnO70zpOMrHwMMWgjLnJ0nl6eSjRXOpti0Tvlj2vs.6DXPm1IrsnYOp05XFrbt4ZAypymw6pQwGxEWQo1ShSQ'}
3.148 response {'state': 'nQuuCm7XNeDEtfEj', 'scope': 'openid', 'code': 'TRBnO70zpOMrHwMMWgjLnJ0nl6eSjRXOpti0Tvlj2vs.6DXPm1IrsnYOp05XFrbt4ZAypymw6pQwGxEWQo1ShSQ'}
3.148 AuthorizationResponse {
"code": "TRBnO70zpOMrHwMMWgjLnJ0nl6eSjRXOpti0Tvlj2vs.6DXPm1IrsnYOp05XFrbt4ZAypymw6pQwGxEWQo1ShSQ",
"scope": "openid",
"state": "nQuuCm7XNeDEtfEj"
}
3.148 phase <--<-- 4 --- Done -->-->
3.148 end
3.149 assertion VerifyAuthnOrErrorResponse
3.149 condition authn-response-or-error: status=OK [Checks that the last response was a JSON encoded authentication or error message]
3.149 condition Done: status=OK
============================================================
Conditions
authn-response-or-error: status=OK [Checks that the last response was a JSON encoded authentication or error message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-OAuth-2nd-30s.txt 0000644 0000000 0000000 00000030647 13313422771 014347 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-OAuth-2nd-30s
Test description: Trying to use authorization code twice with 30 seconds in between uses must result in an error
Timestamp: 2018-06-23T10:50:33Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.19 phase <--<-- 1 --- Webfinger -->-->
1.19 not expected to do WebFinger
1.19 phase <--<-- 2 --- Discovery -->-->
1.19 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.268 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.27 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.27 phase <--<-- 3 --- Registration -->-->
1.27 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.27 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#AD1unRAWJ9cGq4xD"
],
"response_types": [
"code"
]
}
1.421 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.422 RegistrationResponse {
"client_id": "d5eaf406-5e53-4d49-b6ce-468562086167",
"client_secret": "FcmxTs-Z1NFA",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "d5eaf406-5e53-4d49-b6ce-468562086167",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#AD1unRAWJ9cGq4xD"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.422 phase <--<-- 4 --- AsyncAuthn -->-->
1.423 AuthorizationRequest {
"client_id": "d5eaf406-5e53-4d49-b6ce-468562086167",
"nonce": "LAsOKR5TeGHbO7vv",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "1VX5yS0jZvPegC1I"
}
1.423 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=d5eaf406-5e53-4d49-b6ce-468562086167&state=1VX5yS0jZvPegC1I&response_type=code&nonce=LAsOKR5TeGHbO7vv
1.423 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=d5eaf406-5e53-4d49-b6ce-468562086167&state=1VX5yS0jZvPegC1I&response_type=code&nonce=LAsOKR5TeGHbO7vv
4.081 response Response URL with query part
4.082 response {'state': '1VX5yS0jZvPegC1I', 'scope': 'openid', 'code': 'Us1_zRX6pJeUZ34dsaXbnOI2lkybw_ygyVcY1-wXeNk._pUEhdkfAmmmgCqdjM_gMpmXEWVxDJhl8c075Dp_5eY'}
4.082 response {'state': '1VX5yS0jZvPegC1I', 'scope': 'openid', 'code': 'Us1_zRX6pJeUZ34dsaXbnOI2lkybw_ygyVcY1-wXeNk._pUEhdkfAmmmgCqdjM_gMpmXEWVxDJhl8c075Dp_5eY'}
4.082 AuthorizationResponse {
"code": "Us1_zRX6pJeUZ34dsaXbnOI2lkybw_ygyVcY1-wXeNk._pUEhdkfAmmmgCqdjM_gMpmXEWVxDJhl8c075Dp_5eY",
"scope": "openid",
"state": "1VX5yS0jZvPegC1I"
}
4.082 phase <--<-- 5 --- AccessToken -->-->
4.082 --> request op_args: {'state': '1VX5yS0jZvPegC1I'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
4.082 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': '1VX5yS0jZvPegC1I', 'code': 'Us1_zRX6pJeUZ34dsaXbnOI2lkybw_ygyVcY1-wXeNk._pUEhdkfAmmmgCqdjM_gMpmXEWVxDJhl8c075Dp_5eY', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'd5eaf406-5e53-4d49-b6ce-468562086167'}, 'state': '1VX5yS0jZvPegC1I'}
4.083 AccessTokenRequest {
"code": "Us1_zRX6pJeUZ34dsaXbnOI2lkybw_ygyVcY1-wXeNk._pUEhdkfAmmmgCqdjM_gMpmXEWVxDJhl8c075Dp_5eY",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "1VX5yS0jZvPegC1I"
}
4.083 request_url https://oidc-certification.ory.sh:8443/oauth2/token
4.083 request_http_args {'headers': {'Authorization': 'Basic ZDVlYWY0MDYtNWU1My00ZDQ5LWI2Y2UtNDY4NTYyMDg2MTY3OkZjbXhUcy1aMU5GQQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
4.083 request code=Us1_zRX6pJeUZ34dsaXbnOI2lkybw_ygyVcY1-wXeNk._pUEhdkfAmmmgCqdjM_gMpmXEWVxDJhl8c075Dp_5eY&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=1VX5yS0jZvPegC1I
4.305 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
4.306 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZDVlYWY0MDYtNWU1My00ZDQ5LWI2Y2UtNDY4NTYyMDg2MTY3Il0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiZXhwIjoxNTI5NzU0NjAyLCJpYXQiOjE1Mjk3NTEwMDMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6Ijk4YjE3ZGI0LWMzNTQtNGI1ZC1hNjA3LTBlNWE5M2EwMGQ1NSIsIm5vbmNlIjoiTEFzT0tSNVRlR0hiTzd2diIsInJhdCI6MTUyOTc1MTAwMCwic3ViIjoiZm9vQGJhci5jb20ifQ.DFB9uh6WHBpTS8egu2jY3P08VUxiJclmt9UYxJDrIwpqdet5dXdBhgOTzAXEb7dCltiaL11Ld5DhloZrAZA9KYrRgbbqubTJtCVxWl4OmsougleTdiF2lpuAISO4qPb2BP4bo_-4nKx70u5T_QIUKszPxPjRQNaKtWzD1F7PwmHVaQm82_WguZBm8bOY7AEqvyeVsv3g_yaOQ9iKw8soiAzzSA9kXK4en7hPQ4Kv58IuHgCPmrVk90W4nRIM80v8KjSs9IOp_bWnn-t01XCRoOEUqGfJloU8xiYETycZoOyPdaApIB5MFtB9LWJo9jo1mc_NMG3GuoceBMpmErodk6EVUgfV4rginU_hkTnRUzW_nHIUoHiiSH6SRrVvWLpiqq91sTKec5x3fApSg6LHfGqrnSGm_9ctp6ZjlOzhrSkE6AdD2dfTtQAe8IDF40zZgmRdo4epf5NMttYjbSlKIP9LkCWb-wN_mw_5V74B2wGneEo446Oo1xzPW0qClNUd1ySg7bmpsAD8eVEzzSLT6DkUK8CNewjNbIO0CIhwe3acvsumDsg96KTzsghaKM6x91BNoFG0NAt00KS_hfK_tP_Qz-swan3w3LJNS1Yl4Olsd7Vj9ge3nFDE7QFHAKYzQjcboLzJrHykNNW7zyHTe8mVywME9um7mnmnmZ6MrF0', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'TnwfeNNRZwM__UZhjILaV1mHXmEz4wtUINuOIQfZsMs.CGF1XpdUkLPKUUsTvsjM22Ye1FkNlKSFEuaM-a2hagg', 'scope': 'openid'}
4.386 AccessTokenResponse {
"access_token": "TnwfeNNRZwM__UZhjILaV1mHXmEz4wtUINuOIQfZsMs.CGF1XpdUkLPKUUsTvsjM22Ye1FkNlKSFEuaM-a2hagg",
"expires_in": 3599,
"id_token": {
"aud": [
"d5eaf406-5e53-4d49-b6ce-468562086167"
],
"auth_time": 1529750975,
"exp": 1529754602,
"iat": 1529751003,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "98b17db4-c354-4b5d-a607-0e5a93a00d55",
"nonce": "LAsOKR5TeGHbO7vv",
"rat": 1529751000,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
4.386 phase <--<-- 6 --- TimeDelay -->-->
34.414 phase <--<-- 7 --- AccessToken -->-->
34.414 --> request op_args: {'state': '1VX5yS0jZvPegC1I'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
34.414 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': '1VX5yS0jZvPegC1I', 'code': 'Us1_zRX6pJeUZ34dsaXbnOI2lkybw_ygyVcY1-wXeNk._pUEhdkfAmmmgCqdjM_gMpmXEWVxDJhl8c075Dp_5eY', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'd5eaf406-5e53-4d49-b6ce-468562086167'}, 'state': '1VX5yS0jZvPegC1I'}
34.414 AccessTokenRequest {
"code": "Us1_zRX6pJeUZ34dsaXbnOI2lkybw_ygyVcY1-wXeNk._pUEhdkfAmmmgCqdjM_gMpmXEWVxDJhl8c075Dp_5eY",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "1VX5yS0jZvPegC1I"
}
34.414 request_url https://oidc-certification.ory.sh:8443/oauth2/token
34.414 request_http_args {'headers': {'Authorization': 'Basic ZDVlYWY0MDYtNWU1My00ZDQ5LWI2Y2UtNDY4NTYyMDg2MTY3OkZjbXhUcy1aMU5GQQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
34.414 request code=Us1_zRX6pJeUZ34dsaXbnOI2lkybw_ygyVcY1-wXeNk._pUEhdkfAmmmgCqdjM_gMpmXEWVxDJhl8c075Dp_5eY&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=1VX5yS0jZvPegC1I
34.717 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:400 message:{"error":"invalid_grant","error_description":"The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client","status_code":400,"error_debug":"The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found."}
34.718 response {'error_debug': 'The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found.', 'error_description': 'The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client', 'error': 'invalid_grant', 'status_code': 400}
34.718 event Got expected error
34.718 TokenErrorResponse {
"error": "invalid_grant",
"error_debug": "The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found.",
"error_description": "The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client",
"status_code": 400
}
34.719 phase <--<-- 8 --- Done -->-->
34.719 end
34.719 assertion VerifyResponse
34.719 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
34.719 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Registration-policy_uri.txt 0000644 0000000 0000000 00000014663 13313422176 017070 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-policy_uri
Test description: Registration with policy_uri
Timestamp: 2018-06-23T10:44:14Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.045 phase <--<-- 1 --- Webfinger -->-->
1.045 not expected to do WebFinger
1.045 phase <--<-- 2 --- Discovery -->-->
1.045 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.126 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.127 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.128 phase <--<-- 3 --- Registration -->-->
1.128 register kwargs:{'application_name': 'OIC test tool', 'policy_uri': 'https://op.certification.openid.net:61353/static/policy.html', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.128 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"policy_uri": "https://op.certification.openid.net:61353/static/policy.html",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#xVh8daa99dmlh3cG"
],
"response_types": [
"code"
]
}
1.287 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.287 RegistrationResponse {
"client_id": "bfd04899-4a3e-4904-ad5c-02a8d24e1245",
"client_secret": "VXXN-IucrFts",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "bfd04899-4a3e-4904-ad5c-02a8d24e1245",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"policy_uri": "https://op.certification.openid.net:61353/static/policy.html",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#xVh8daa99dmlh3cG"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.288 phase <--<-- 4 --- AsyncAuthn -->-->
1.288 AuthorizationRequest {
"client_id": "bfd04899-4a3e-4904-ad5c-02a8d24e1245",
"nonce": "5IIeW3of3OLrs5Xm",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "rMIVdEIadjLsSz6G"
}
1.288 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=bfd04899-4a3e-4904-ad5c-02a8d24e1245&state=rMIVdEIadjLsSz6G&response_type=code&nonce=5IIeW3of3OLrs5Xm
1.288 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=bfd04899-4a3e-4904-ad5c-02a8d24e1245&state=rMIVdEIadjLsSz6G&response_type=code&nonce=5IIeW3of3OLrs5Xm
3.172 response Response URL with query part
3.172 response {'state': 'rMIVdEIadjLsSz6G', 'scope': 'openid', 'code': 'ogKm-YFIGresiJFFJp6nR7wLAJTbHd32L2sPlVflEbI.0i1eVEzn055VTDj1iVarMEbvMadpOxafHt-1i_in59s'}
3.173 response {'state': 'rMIVdEIadjLsSz6G', 'scope': 'openid', 'code': 'ogKm-YFIGresiJFFJp6nR7wLAJTbHd32L2sPlVflEbI.0i1eVEzn055VTDj1iVarMEbvMadpOxafHt-1i_in59s'}
3.173 AuthorizationResponse {
"code": "ogKm-YFIGresiJFFJp6nR7wLAJTbHd32L2sPlVflEbI.0i1eVEzn055VTDj1iVarMEbvMadpOxafHt-1i_in59s",
"scope": "openid",
"state": "rMIVdEIadjLsSz6G"
}
3.173 phase <--<-- 5 --- Done -->-->
3.173 end
3.174 assertion VerifyAuthnResponse
3.174 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
3.174 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-claims-essential.txt 0000644 0000000 0000000 00000025422 13313422273 015470 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-claims-essential
Test description: Claims request with essential name claim
Timestamp: 2018-06-23T10:45:15Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.084 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.086 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.086 phase <--<-- 2 --- Registration -->-->
0.086 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.086 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#K2Y2RF6vhgRwjUL4"
],
"response_types": [
"code"
]
}
0.243 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.244 RegistrationResponse {
"client_id": "17be20bc-63a8-49d4-b6fd-69e2862a9e1d",
"client_secret": "YKu0gfhSPcwx",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "17be20bc-63a8-49d4-b6fd-69e2862a9e1d",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#K2Y2RF6vhgRwjUL4"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.244 phase <--<-- 3 --- AsyncAuthn -->-->
0.244 AuthorizationRequest {
"claims": {
"userinfo": {
"name": {
"essential": true
}
}
},
"client_id": "17be20bc-63a8-49d4-b6fd-69e2862a9e1d",
"nonce": "C84S0pdAWVTHCUgu",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "rNNO0wwmUg1UTDvi"
}
0.245 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=17be20bc-63a8-49d4-b6fd-69e2862a9e1d&claims=%7B%22userinfo%22%3A+%7B%22name%22%3A+%7B%22essential%22%3A+true%7D%7D%7D&state=rNNO0wwmUg1UTDvi&response_type=code&nonce=C84S0pdAWVTHCUgu
0.245 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=17be20bc-63a8-49d4-b6fd-69e2862a9e1d&claims=%7B%22userinfo%22%3A+%7B%22name%22%3A+%7B%22essential%22%3A+true%7D%7D%7D&state=rNNO0wwmUg1UTDvi&response_type=code&nonce=C84S0pdAWVTHCUgu
2.782 response Response URL with query part
2.782 response {'state': 'rNNO0wwmUg1UTDvi', 'scope': 'openid', 'code': 'Dkpqw55dihI2n2QeOSi_0oRrZvvhrSA-Emx8UV8u6iI.9NkC-cwAPvujPJloUTUS_sOsaLNhYzbCnj2BlJVYUpQ'}
2.782 response {'state': 'rNNO0wwmUg1UTDvi', 'scope': 'openid', 'code': 'Dkpqw55dihI2n2QeOSi_0oRrZvvhrSA-Emx8UV8u6iI.9NkC-cwAPvujPJloUTUS_sOsaLNhYzbCnj2BlJVYUpQ'}
2.783 AuthorizationResponse {
"code": "Dkpqw55dihI2n2QeOSi_0oRrZvvhrSA-Emx8UV8u6iI.9NkC-cwAPvujPJloUTUS_sOsaLNhYzbCnj2BlJVYUpQ",
"scope": "openid",
"state": "rNNO0wwmUg1UTDvi"
}
2.783 phase <--<-- 4 --- AccessToken -->-->
2.783 --> request op_args: {'state': 'rNNO0wwmUg1UTDvi'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.783 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'rNNO0wwmUg1UTDvi', 'code': 'Dkpqw55dihI2n2QeOSi_0oRrZvvhrSA-Emx8UV8u6iI.9NkC-cwAPvujPJloUTUS_sOsaLNhYzbCnj2BlJVYUpQ', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '17be20bc-63a8-49d4-b6fd-69e2862a9e1d'}, 'state': 'rNNO0wwmUg1UTDvi'}
2.783 AccessTokenRequest {
"code": "Dkpqw55dihI2n2QeOSi_0oRrZvvhrSA-Emx8UV8u6iI.9NkC-cwAPvujPJloUTUS_sOsaLNhYzbCnj2BlJVYUpQ",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "rNNO0wwmUg1UTDvi"
}
2.786 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.786 request_http_args {'headers': {'Authorization': 'Basic MTdiZTIwYmMtNjNhOC00OWQ0LWI2ZmQtNjllMjg2MmE5ZTFkOllLdTBnZmhTUGN3eA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.786 request code=Dkpqw55dihI2n2QeOSi_0oRrZvvhrSA-Emx8UV8u6iI.9NkC-cwAPvujPJloUTUS_sOsaLNhYzbCnj2BlJVYUpQ&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=rNNO0wwmUg1UTDvi
3.0 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.001 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMTdiZTIwYmMtNjNhOC00OWQ0LWI2ZmQtNjllMjg2MmE5ZTFkIl0sImF1dGhfdGltZSI6MTUyOTc1MDU5MiwiZXhwIjoxNTI5NzU0MzE0LCJpYXQiOjE1Mjk3NTA3MTUsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjJkOGY1MzhmLWY4ZDctNDgyNC05NWFkLTI3Nzg2YjNhYjJmOCIsIm5vbmNlIjoiQzg0UzBwZEFXVlRIQ1VndSIsInJhdCI6MTUyOTc1MDcxMiwic3ViIjoiZm9vQGJhci5jb20ifQ.IebCwNPxC2AstcPyn2StHv5t-BOzIp0FzSgH9rW3MOHhJ9kX4o-SgdQPvnKBXfqbmo_H0ATq8bTLRmpUrzVzSHiHLxFD7yappkyRcUU5iY5mzY_ILAyKtYA7gXDS95WLrzX4rzLqnPhEqwK1f9I-ngAGxGHSYtiUd5oYJ2kgbVr56YCzRRdnJW6EYNb7SnEkhQZbDr2rFW3Ezkwg4kATL0d-6fp73USi_SHJtoyYoJ9V4U9PymJPVnuJXKgqYZBZRn_TQNbeRiXDEvpOs6-FafHZZQtpm0Qbw07akYssWUS-4QoM6HGPR4slGcIkr8rRIgBydvU0Qm2OqN1rwvzINXYAcPAvw7R6mafg4INjpOu146r0Ctk8dWl7rdVffn7uOpEm6FJ89gv1-kW66RpY7clKVVPbANNFBfil8xdG2H3S0j0-QL472-9oSsTkb6xgPefIEs3-dEBqsuZWqHW5NRriWz_8jEckLt_0c7M5a29UM0V9tFOfBLr_56cLpmkEz4j9ceJz7EeSFxTwqo6PUrYdV_zGJqyhGpLdx9u_iRNsighJajaOtGWt0keJpgnhOhnjfg9_3LcqLZcyN4IdkgtUM6ivFYJpKy4Y7pcWiNTK0Se8-uc9-unECVLlf-UXBnI8K4hmaFelbys_NgcirABn-sKm2uG1sh73qET_nHg', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'MAmqFWhZ7PEAUpep-jfPyEvASmx8w6ARpWc2nAcNeZQ.JzvgeZe3KrzNGbBbwyQoTmbPJIseCbkQUMhDNDBiY4Y', 'scope': 'openid'}
3.081 AccessTokenResponse {
"access_token": "MAmqFWhZ7PEAUpep-jfPyEvASmx8w6ARpWc2nAcNeZQ.JzvgeZe3KrzNGbBbwyQoTmbPJIseCbkQUMhDNDBiY4Y",
"expires_in": 3599,
"id_token": {
"aud": [
"17be20bc-63a8-49d4-b6fd-69e2862a9e1d"
],
"auth_time": 1529750592,
"exp": 1529754314,
"iat": 1529750715,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "2d8f538f-f8d7-4824-95ad-27786b3ab2f8",
"nonce": "C84S0pdAWVTHCUgu",
"rat": 1529750712,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.081 phase <--<-- 5 --- UserInfo -->-->
3.081 do_user_info_request kwargs:{'state': 'rNNO0wwmUg1UTDvi', 'method': 'GET', 'authn_method': 'bearer_header'}
3.081 request {'body': None}
3.081 request_url https://oidc-certification.ory.sh:8443/userinfo
3.081 request_http_args {'headers': {'Authorization': 'Bearer MAmqFWhZ7PEAUpep-jfPyEvASmx8w6ARpWc2nAcNeZQ.JzvgeZe3KrzNGbBbwyQoTmbPJIseCbkQUMhDNDBiY4Y'}}
3.152 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
3.153 OpenIDSchema {
"sub": "[email protected]"
}
3.153 OpenIDSchema {
"sub": "[email protected]"
}
3.153 phase <--<-- 6 --- Done -->-->
3.153 end
3.153 assertion VerifyClaims
3.154 condition verify-claims: status=WARNING, message=Missing required claim: name [Verifies that the claims returned as UserInfo or in the ID Token is consistent with what was asked for]
3.154 assertion CheckHTTPResponse
3.154 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
3.154 condition Done: status=OK
============================================================
Conditions
verify-claims: status=WARNING, message=Missing required claim: name [Verifies that the claims returned as UserInfo or in the ID Token is consistent with what was asked for]
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
Missing required claim: name
./OP-prompt-none-LoggedIn.txt 0000644 0000000 0000000 00000034653 13313422342 016202 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-prompt-none-LoggedIn
Test description: Request with prompt=none when logged in [Basic, Implicit, Hybrid]
Timestamp: 2018-06-23T10:45:54Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Registration -->-->
0.075 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.075 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#xl418IYHQ78NbkLH"
],
"response_types": [
"code"
]
}
0.242 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.243 RegistrationResponse {
"client_id": "06890cdd-4797-4c39-8b2f-a610890eed9a",
"client_secret": "yV4jXIT~KmTD",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "06890cdd-4797-4c39-8b2f-a610890eed9a",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#xl418IYHQ78NbkLH"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.243 phase <--<-- 3 --- AsyncAuthn -->-->
0.243 AuthorizationRequest {
"client_id": "06890cdd-4797-4c39-8b2f-a610890eed9a",
"nonce": "MFK7My6oTJYJPkWs",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "KlDUXbORnMBL0nSc"
}
0.243 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=06890cdd-4797-4c39-8b2f-a610890eed9a&state=KlDUXbORnMBL0nSc&response_type=code&nonce=MFK7My6oTJYJPkWs
0.243 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=06890cdd-4797-4c39-8b2f-a610890eed9a&state=KlDUXbORnMBL0nSc&response_type=code&nonce=MFK7My6oTJYJPkWs
5.286 response Response URL with query part
5.286 response {'state': 'KlDUXbORnMBL0nSc', 'scope': 'openid', 'code': 'BwbvzCKf1ioyYXdMyWwmivXOlpPD1QPjpjlxLvMJjNg.Bm9_LGXmfadHJc9zAoTk4sVfnzHLEbegz-N9VIb6ZiM'}
5.287 response {'state': 'KlDUXbORnMBL0nSc', 'scope': 'openid', 'code': 'BwbvzCKf1ioyYXdMyWwmivXOlpPD1QPjpjlxLvMJjNg.Bm9_LGXmfadHJc9zAoTk4sVfnzHLEbegz-N9VIb6ZiM'}
5.287 AuthorizationResponse {
"code": "BwbvzCKf1ioyYXdMyWwmivXOlpPD1QPjpjlxLvMJjNg.Bm9_LGXmfadHJc9zAoTk4sVfnzHLEbegz-N9VIb6ZiM",
"scope": "openid",
"state": "KlDUXbORnMBL0nSc"
}
5.287 phase <--<-- 4 --- AccessToken -->-->
5.287 --> request op_args: {'state': 'KlDUXbORnMBL0nSc'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
5.287 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'KlDUXbORnMBL0nSc', 'code': 'BwbvzCKf1ioyYXdMyWwmivXOlpPD1QPjpjlxLvMJjNg.Bm9_LGXmfadHJc9zAoTk4sVfnzHLEbegz-N9VIb6ZiM', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '06890cdd-4797-4c39-8b2f-a610890eed9a'}, 'state': 'KlDUXbORnMBL0nSc'}
5.287 AccessTokenRequest {
"code": "BwbvzCKf1ioyYXdMyWwmivXOlpPD1QPjpjlxLvMJjNg.Bm9_LGXmfadHJc9zAoTk4sVfnzHLEbegz-N9VIb6ZiM",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "KlDUXbORnMBL0nSc"
}
5.288 request_url https://oidc-certification.ory.sh:8443/oauth2/token
5.288 request_http_args {'headers': {'Authorization': 'Basic MDY4OTBjZGQtNDc5Ny00YzM5LThiMmYtYTYxMDg5MGVlZDlhOnlWNGpYSVQlN0VLbVRE', 'Content-Type': 'application/x-www-form-urlencoded'}}
5.288 request code=BwbvzCKf1ioyYXdMyWwmivXOlpPD1QPjpjlxLvMJjNg.Bm9_LGXmfadHJc9zAoTk4sVfnzHLEbegz-N9VIb6ZiM&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=KlDUXbORnMBL0nSc
5.512 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
5.513 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMDY4OTBjZGQtNDc5Ny00YzM5LThiMmYtYTYxMDg5MGVlZDlhIl0sImF1dGhfdGltZSI6MTUyOTc1MDc0OSwiZXhwIjoxNTI5NzU0MzUyLCJpYXQiOjE1Mjk3NTA3NTIsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjUxNzdmZGEyLWYzODctNDhmZS1iZDVmLWQzNjg1YWJlY2FiZCIsIm5vbmNlIjoiTUZLN015Nm9USllKUGtXcyIsInJhdCI6MTUyOTc1MDc0Nywic3ViIjoiZm9vQGJhci5jb20ifQ.Im4_j_iaFL-HB9bSsI-VyxCryqC2gzWvimQynRU175xtAaxldzXnQJKNmsHth-3DSWj6W8lagfiA_1CgWERkU8RNlb9R0hi8yPtySnQUFtIrhJ1kjBMjglEKmY3rW9qvtdrjiZrX6HfZ1GiYTCnflACtZQXdExmAAyCx-AY8i-pH3nvv1qkDFDWRzlKoUrGsZJTq1gvMX1OgEZckz6lPaLhZW5LoaqNWyp3hlFizkDd7p13AEUNol8nzz7EugSp-1jTpO_sZ34nghtjqWUn4UXy81QrwqvN4YE_iE44gTajsB5I3-iPG9NPpB4Frdqm1NjCwF_gdLqhConVC6q41zxkRrd2OvlCakBzJe4uzIUeR8VbAExq9NfE_ssUX5XRGAhVNGab7WGaIOkHny2Gg_IROC_9xnPlCxQUYpK_Wb8QA4KQVrKRyeBkv2kTNQjcE1qGW-hpzwEJzFYsF05Rq9JsJeVyslkjk8rqj3vAKtjkDHaqYNDl7UAnk0BZmfvW-pVi7QNlu7IlowlXHmRNdDmwsuHCeVLaVXwZVdHRq-QcAKqN3TnElx7akTYFDbuGLM47CtNK9XUnEKk3puBTzPjh1Kx0ILsP6EK_NQJZqeJDHWWkvOj097oy1y9D3IEVFjI71xcz2KdckwnVTTVMuUZ3QytjPTtQug_dvKLeJygQ', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'mNcoso5YeldEVWuK9rb4Pdo6q4tvMamXQWds9d9gORw.dzdbHb0mfThlvTqX_CU29F_Fss5LlMbh5Ys-x2kFDLI', 'scope': 'openid'}
5.591 AccessTokenResponse {
"access_token": "mNcoso5YeldEVWuK9rb4Pdo6q4tvMamXQWds9d9gORw.dzdbHb0mfThlvTqX_CU29F_Fss5LlMbh5Ys-x2kFDLI",
"expires_in": 3599,
"id_token": {
"aud": [
"06890cdd-4797-4c39-8b2f-a610890eed9a"
],
"auth_time": 1529750749,
"exp": 1529754352,
"iat": 1529750752,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "5177fda2-f387-48fe-bd5f-d3685abecabd",
"nonce": "MFK7My6oTJYJPkWs",
"rat": 1529750747,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
5.591 phase <--<-- 5 --- AsyncAuthn -->-->
5.591 AuthorizationRequest {
"client_id": "06890cdd-4797-4c39-8b2f-a610890eed9a",
"nonce": "eZRl5hV8YYan8AfR",
"prompt": [
"none"
],
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "e556UQeaBcQnykv8"
}
5.592 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=06890cdd-4797-4c39-8b2f-a610890eed9a&state=e556UQeaBcQnykv8&response_type=code&nonce=eZRl5hV8YYan8AfR
5.592 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=06890cdd-4797-4c39-8b2f-a610890eed9a&state=e556UQeaBcQnykv8&response_type=code&nonce=eZRl5hV8YYan8AfR
6.629 response Response URL with query part
6.629 response {'state': 'e556UQeaBcQnykv8', 'scope': 'openid', 'code': 'JxOxykzbTxO19kytfuBz_KN4LeLuBrzkJ8mwn4a3DL4.L67fMYxGlVT1Yaghted0hlE4ghihRo9VP9i1oORv0vI'}
6.63 response {'state': 'e556UQeaBcQnykv8', 'scope': 'openid', 'code': 'JxOxykzbTxO19kytfuBz_KN4LeLuBrzkJ8mwn4a3DL4.L67fMYxGlVT1Yaghted0hlE4ghihRo9VP9i1oORv0vI'}
6.63 AuthorizationResponse {
"code": "JxOxykzbTxO19kytfuBz_KN4LeLuBrzkJ8mwn4a3DL4.L67fMYxGlVT1Yaghted0hlE4ghihRo9VP9i1oORv0vI",
"scope": "openid",
"state": "e556UQeaBcQnykv8"
}
6.63 phase <--<-- 6 --- AccessToken -->-->
6.63 --> request op_args: {'state': 'e556UQeaBcQnykv8'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
6.63 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'e556UQeaBcQnykv8', 'code': 'JxOxykzbTxO19kytfuBz_KN4LeLuBrzkJ8mwn4a3DL4.L67fMYxGlVT1Yaghted0hlE4ghihRo9VP9i1oORv0vI', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '06890cdd-4797-4c39-8b2f-a610890eed9a'}, 'state': 'e556UQeaBcQnykv8'}
6.63 AccessTokenRequest {
"code": "JxOxykzbTxO19kytfuBz_KN4LeLuBrzkJ8mwn4a3DL4.L67fMYxGlVT1Yaghted0hlE4ghihRo9VP9i1oORv0vI",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "e556UQeaBcQnykv8"
}
6.63 request_url https://oidc-certification.ory.sh:8443/oauth2/token
6.63 request_http_args {'headers': {'Authorization': 'Basic MDY4OTBjZGQtNDc5Ny00YzM5LThiMmYtYTYxMDg5MGVlZDlhOnlWNGpYSVQlN0VLbVRE', 'Content-Type': 'application/x-www-form-urlencoded'}}
6.63 request code=JxOxykzbTxO19kytfuBz_KN4LeLuBrzkJ8mwn4a3DL4.L67fMYxGlVT1Yaghted0hlE4ghihRo9VP9i1oORv0vI&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=e556UQeaBcQnykv8
6.844 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
6.845 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMDY4OTBjZGQtNDc5Ny00YzM5LThiMmYtYTYxMDg5MGVlZDlhIl0sImF1dGhfdGltZSI6MTUyOTc1MDc0OSwiZXhwIjoxNTI5NzU0MzUzLCJpYXQiOjE1Mjk3NTA3NTMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImE2ZjAwZTlkLWM3ZWUtNDY5Zi05YTNlLTc0NWU4Y2UyZjkxNSIsIm5vbmNlIjoiZVpSbDVoVjhZWWFuOEFmUiIsInJhdCI6MTUyOTc1MDc1Miwic3ViIjoiZm9vQGJhci5jb20ifQ.hwSEEoGieIR79YNbHIHR2fiHcpTyxfg9EmuM-iJMLc2O0WkEqoIEM76E4LC6CzqrQjMNZOk-4n_9wNFg-XmgoXAH6N-hWjHzjLv2rVNjShkoxCeOy_HLP8udTFSq2rMYNTI0DWBj_SWinNZ4QStupq2VRaD2hhOJ7aUNEjMervUFhLOndVBgDTzBzoWd_Sx8Y2LkeTV2vh2gNTKeORt4qxhYh2lL_DNxxRoQADiy2MVcpanfJEuqgB0EHOkrYEdPR48ItDbkw0QpRbJU5THX07oHPt-9B6wRpwVDsIDGtlS8JIvsLNvu5wrpA54ewzObo622PTJD4yZUkWJL40lSecj5NN1JveGr55lVR3PS9GQaTZuDTw6OxkdIrygiqf7Audt5CLU_15Qxh97lTgC0eSQvkmYqKfj8Akd_rZaRoVFPup422zD1Emfk5vFs_yXADhXLtQ8E5zDFCMdx1jDStqayl8mM6pZIAGCYqauxhBXLP_pYKr72ryrs1DAFH3bg9yBI3pLzk-PYnGbipimr5YX69wFcDrznRIoYqlOdTCd25a9D7-Q7ErKDPOXa6PxGsqK04Z9ciHuqrUamJTo6otPqm8_NRlUJWLw8Ws42pui7SLISRlcvIUeyLBj0yyuuCJMlBk_Z_SIkqKhcUBnyipeifIEVC4p8B2TBGut6VNc', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'TB3cb7VQoRvyH5bdV5YUVahW0RmdaNYm-CIcodJjcMc.iw2nAwaXi-maWK53F2-CtZlD_AvNrDPOQ6GHfwuW_BU', 'scope': 'openid'}
6.849 AccessTokenResponse {
"access_token": "TB3cb7VQoRvyH5bdV5YUVahW0RmdaNYm-CIcodJjcMc.iw2nAwaXi-maWK53F2-CtZlD_AvNrDPOQ6GHfwuW_BU",
"expires_in": 3599,
"id_token": {
"aud": [
"06890cdd-4797-4c39-8b2f-a610890eed9a"
],
"auth_time": 1529750749,
"exp": 1529754353,
"iat": 1529750753,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "a6f00e9d-c7ee-469f-9a3e-745e8ce2f915",
"nonce": "eZRl5hV8YYan8AfR",
"rat": 1529750752,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
6.849 phase <--<-- 7 --- Done -->-->
6.849 end
6.849 assertion VerifyResponse
6.849 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
6.85 assertion SameAuthn
6.85 condition same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
6.85 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Req-max_age=1.txt 0000644 0000000 0000000 00000045600 13313422702 014534 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-max_age=1
Test description: Requesting ID Token with max_age=1 seconds restriction
Timestamp: 2018-06-23T10:49:38Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.074 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Registration -->-->
0.076 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.076 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#5p0CJ2XQgHjSje1d"
],
"response_types": [
"code"
]
}
0.271 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.272 RegistrationResponse {
"client_id": "a942a48d-32e0-47a3-8894-e6c985d8fe06",
"client_secret": "frX3DqqBfdu2",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "a942a48d-32e0-47a3-8894-e6c985d8fe06",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#5p0CJ2XQgHjSje1d"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.272 phase <--<-- 3 --- AsyncAuthn -->-->
0.273 AuthorizationRequest {
"client_id": "a942a48d-32e0-47a3-8894-e6c985d8fe06",
"nonce": "e5FGaAkgppTjT3F5",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "12ub9oMq3s0bvvRk"
}
0.273 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=a942a48d-32e0-47a3-8894-e6c985d8fe06&state=12ub9oMq3s0bvvRk&response_type=code&nonce=e5FGaAkgppTjT3F5
0.273 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=a942a48d-32e0-47a3-8894-e6c985d8fe06&state=12ub9oMq3s0bvvRk&response_type=code&nonce=e5FGaAkgppTjT3F5
4.564 response Response URL with query part
4.565 response {'state': '12ub9oMq3s0bvvRk', 'scope': 'openid', 'code': 'jXWgT00mZ3E3EpzWOywxD4IxCFu4HRvNQSC3IpJAaLM.L1Nc0O6UNu-olrzB9IP5Aehqia4PBC6ogTFxt6W-85g'}
4.565 response {'state': '12ub9oMq3s0bvvRk', 'scope': 'openid', 'code': 'jXWgT00mZ3E3EpzWOywxD4IxCFu4HRvNQSC3IpJAaLM.L1Nc0O6UNu-olrzB9IP5Aehqia4PBC6ogTFxt6W-85g'}
4.565 AuthorizationResponse {
"code": "jXWgT00mZ3E3EpzWOywxD4IxCFu4HRvNQSC3IpJAaLM.L1Nc0O6UNu-olrzB9IP5Aehqia4PBC6ogTFxt6W-85g",
"scope": "openid",
"state": "12ub9oMq3s0bvvRk"
}
4.566 phase <--<-- 4 --- AccessToken -->-->
4.566 --> request op_args: {'state': '12ub9oMq3s0bvvRk'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
4.566 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': '12ub9oMq3s0bvvRk', 'code': 'jXWgT00mZ3E3EpzWOywxD4IxCFu4HRvNQSC3IpJAaLM.L1Nc0O6UNu-olrzB9IP5Aehqia4PBC6ogTFxt6W-85g', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'a942a48d-32e0-47a3-8894-e6c985d8fe06'}, 'state': '12ub9oMq3s0bvvRk'}
4.566 AccessTokenRequest {
"code": "jXWgT00mZ3E3EpzWOywxD4IxCFu4HRvNQSC3IpJAaLM.L1Nc0O6UNu-olrzB9IP5Aehqia4PBC6ogTFxt6W-85g",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "12ub9oMq3s0bvvRk"
}
4.566 request_url https://oidc-certification.ory.sh:8443/oauth2/token
4.566 request_http_args {'headers': {'Authorization': 'Basic YTk0MmE0OGQtMzJlMC00N2EzLTg4OTQtZTZjOTg1ZDhmZTA2OmZyWDNEcXFCZmR1Mg==', 'Content-Type': 'application/x-www-form-urlencoded'}}
4.566 request code=jXWgT00mZ3E3EpzWOywxD4IxCFu4HRvNQSC3IpJAaLM.L1Nc0O6UNu-olrzB9IP5Aehqia4PBC6ogTFxt6W-85g&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=12ub9oMq3s0bvvRk
4.78 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
4.781 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYTk0MmE0OGQtMzJlMC00N2EzLTg4OTQtZTZjOTg1ZDhmZTA2Il0sImF1dGhfdGltZSI6MTUyOTc1MDc0OSwiZXhwIjoxNTI5NzU0NTcwLCJpYXQiOjE1Mjk3NTA5NzAsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImQ3ZGM1ZTc2LThjNjMtNGNlMS05ZGQxLTUxZDNlZjBkNzg4NiIsIm5vbmNlIjoiZTVGR2FBa2dwcFRqVDNGNSIsInJhdCI6MTUyOTc1MDk2Niwic3ViIjoiZm9vQGJhci5jb20ifQ.hKV80K9doYK7tTefsUOkJP6f7gg99XV4jMrI_8h3YFxPz2nEFFBR-xNQlWS-pvHnoBsd3KUu5iW41oTh51uk3rK50TDNhST-A2TfBxiRS6zwVc9C0khw7Ven2thUsCTOg3uY9tB7L2WgfMx48aLc9eiSworfQapzclEKMgP0LbRilh2QepHl3ot5DvbxekVK0Wr01nrWs7f9s2w5LxPqxZmM-ZEYge0ZtFE0BKuJw0rCfgV2IbJ511cZ5vNVXVn1cwnUuqve-8PvzoW3qk1hdWkyDbfUdiyykZTUfx1-oJ2gFYFwXrF4lx2KGzEA74FvXLAny3HAtfJP870IGpgtxKBvLFjO0oWLEn2vGHXQznwQ_4zxb1WcAIvSsvzIpETRuEuOSVRQd3TRwTEtaS9Pss475rovVjT4OV0VeueaVttGJ-DNmGp7njD3mercaXmscZe4dQKMEYh0v-ZYOSuZ6SBDYgxqB-5e0pBeXCbgYAUitp4PwasoSHnGxAlvlnp-vg780bXKFzLpgr2AZkPIUh5hiWUtaTIvxXtbvJK9dm27euX8YHWHUS10FFRVOtrnEk66bjBbd4YfYODLLO0bju7_2MF32AJLiIVWOj6r7mb76Cn4jVxntDnS9tLwF_cwKzK_a1lSemPRCl_oXFX1OCaH64VD3-gGHTWafjdN1II', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'eIsiutoh_Sceq_OKu80E-Uw82v_vHSEuxvQv70tyI2g.l41YozrJdQfmyjdgr8aOEJQhidrHxXIQZvbJTiKEnz8', 'scope': 'openid'}
4.897 AccessTokenResponse {
"access_token": "eIsiutoh_Sceq_OKu80E-Uw82v_vHSEuxvQv70tyI2g.l41YozrJdQfmyjdgr8aOEJQhidrHxXIQZvbJTiKEnz8",
"expires_in": 3599,
"id_token": {
"aud": [
"a942a48d-32e0-47a3-8894-e6c985d8fe06"
],
"auth_time": 1529750749,
"exp": 1529754570,
"iat": 1529750970,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "d7dc5e76-8c63-4ce1-9dd1-51d3ef0d7886",
"nonce": "e5FGaAkgppTjT3F5",
"rat": 1529750966,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
4.897 phase <--<-- 5 --- Note -->-->
6.952 phase <--<-- 6 --- Webfinger -->-->
6.952 not expected to do WebFinger
6.952 phase <--<-- 7 --- Discovery -->-->
6.952 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
7.04 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
7.041 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
7.041 phase <--<-- 8 --- Registration -->-->
7.041 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
7.042 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#R6uysB49cR0gilVk"
],
"response_types": [
"code"
]
}
7.2 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
7.201 RegistrationResponse {
"client_id": "5e6298c0-5621-4d0e-bcbb-4ec21b2ba554",
"client_secret": "hWW-Grw39Qwe",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "5e6298c0-5621-4d0e-bcbb-4ec21b2ba554",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#R6uysB49cR0gilVk"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
7.201 phase <--<-- 9 --- AsyncAuthn -->-->
7.202 AuthorizationRequest {
"client_id": "5e6298c0-5621-4d0e-bcbb-4ec21b2ba554",
"max_age": 1,
"nonce": "Ld7AQn5QDAHvconQ",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "Qho0A3keI70Da9QM"
}
7.202 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?max_age=1&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=5e6298c0-5621-4d0e-bcbb-4ec21b2ba554&state=Qho0A3keI70Da9QM&response_type=code&nonce=Ld7AQn5QDAHvconQ
7.202 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?max_age=1&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=5e6298c0-5621-4d0e-bcbb-4ec21b2ba554&state=Qho0A3keI70Da9QM&response_type=code&nonce=Ld7AQn5QDAHvconQ
12.034 response Response URL with query part
12.035 response {'state': 'Qho0A3keI70Da9QM', 'scope': 'openid', 'code': 'Wgq7bfvH9KKez90eGhC2a4ruwq4WaWX0CAvGUgiJMIU.QeZU8jDQRKw530vQY8LQJV_2QDJxD7IQreHqBFsmo5g'}
12.036 response {'state': 'Qho0A3keI70Da9QM', 'scope': 'openid', 'code': 'Wgq7bfvH9KKez90eGhC2a4ruwq4WaWX0CAvGUgiJMIU.QeZU8jDQRKw530vQY8LQJV_2QDJxD7IQreHqBFsmo5g'}
12.036 AuthorizationResponse {
"code": "Wgq7bfvH9KKez90eGhC2a4ruwq4WaWX0CAvGUgiJMIU.QeZU8jDQRKw530vQY8LQJV_2QDJxD7IQreHqBFsmo5g",
"scope": "openid",
"state": "Qho0A3keI70Da9QM"
}
12.036 phase <--<-- 10 --- AccessToken -->-->
12.036 --> request op_args: {'state': 'Qho0A3keI70Da9QM'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
12.036 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'Qho0A3keI70Da9QM', 'code': 'Wgq7bfvH9KKez90eGhC2a4ruwq4WaWX0CAvGUgiJMIU.QeZU8jDQRKw530vQY8LQJV_2QDJxD7IQreHqBFsmo5g', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '5e6298c0-5621-4d0e-bcbb-4ec21b2ba554'}, 'state': 'Qho0A3keI70Da9QM'}
12.036 AccessTokenRequest {
"code": "Wgq7bfvH9KKez90eGhC2a4ruwq4WaWX0CAvGUgiJMIU.QeZU8jDQRKw530vQY8LQJV_2QDJxD7IQreHqBFsmo5g",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "Qho0A3keI70Da9QM"
}
12.036 request_url https://oidc-certification.ory.sh:8443/oauth2/token
12.036 request_http_args {'headers': {'Authorization': 'Basic NWU2Mjk4YzAtNTYyMS00ZDBlLWJjYmItNGVjMjFiMmJhNTU0OmhXVy1HcnczOVF3ZQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
12.036 request code=Wgq7bfvH9KKez90eGhC2a4ruwq4WaWX0CAvGUgiJMIU.QeZU8jDQRKw530vQY8LQJV_2QDJxD7IQreHqBFsmo5g&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=Qho0A3keI70Da9QM
12.247 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
12.248 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNWU2Mjk4YzAtNTYyMS00ZDBlLWJjYmItNGVjMjFiMmJhNTU0Il0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiZXhwIjoxNTI5NzU0NTc3LCJpYXQiOjE1Mjk3NTA5NzcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjM2NmIwYmNhLWU2ZDgtNGM5ZS04MjVlLTNiMWI5M2ZkMzcwNiIsIm5vbmNlIjoiTGQ3QVFuNVFEQUh2Y29uUSIsInJhdCI6MTUyOTc1MDk3Mywic3ViIjoiZm9vQGJhci5jb20ifQ.cBJzzWyO7BJRalw2Ibu1okWzxH3sIYaQ22CKjb500HFggIJLcRWyscIkPerV8ZMGCimD0vY1ul6hT5OEaSTejN3ZRLOewP8MwRvBw36fGh6JujP_tn6yW3EKGdt1X1JHGlLBsuvpHlzyVMA5AcCRIZb2t8dYGtu0wpAdP1VfLsac_omeEKUntlK47vi_KLLMwgjfP4S1U94kugm7J7cs7RYmUOECEYNc7irOGDLLqv5GMWKu2aHuqOLcuIAQeJ1Aukdx__8343caUvuhzOMv9jN4QIBkzdYgU6dZJ4Y4Ii3r7H6ZIwaqFkHhYrnwj3dLTslna4P2m6B0urUs0UUekZe6UHKVyszdBhV2AAmRL40SFOQ4KFOmbx4cATXA8SN8FFTU_Wr-w6MgoKWgCqVDUrPexEVJYTtWyT9r1HsgeiyBzlUm201XX3FVwYzg_4D-mZkRD0ZCOYMZTajYz4mYm0e8QYPTj3Ka824zR62XeN9zBO2FyJIRihSptxLPLd0Qr-__gULP_mXNCXL5g3WLcyrG1jVY3dRvWbNqUc4Pd-D8pQrrMbbXmNzSbP7TKHeq6MI1AaXQ5AWcnhKKNq0BRckoCYc4YVffqo9G9zRPcpIHcycUSr0oUy5_MP6uNLg6IIZlzWdtVJ8gyn1k0RO4cntFcp0FLGOQRqLHOHDchF8', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': '3RaT6JkREXBXGu7ksZPmH5iKngTggPPObWOib7OCs1I.44E8ZS_kXK43CB3ptK6j80VA75maDGW_5ifmBBrlvE0', 'scope': 'openid'}
12.252 AccessTokenResponse {
"access_token": "3RaT6JkREXBXGu7ksZPmH5iKngTggPPObWOib7OCs1I.44E8ZS_kXK43CB3ptK6j80VA75maDGW_5ifmBBrlvE0",
"expires_in": 3599,
"id_token": {
"aud": [
"5e6298c0-5621-4d0e-bcbb-4ec21b2ba554"
],
"auth_time": 1529750975,
"exp": 1529754577,
"iat": 1529750977,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "366b0bca-e6d8-4c9e-825e-3b1b93fd3706",
"nonce": "Ld7AQn5QDAHvconQ",
"rat": 1529750973,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
12.252 phase <--<-- 11 --- Done -->-->
12.252 end
12.252 assertion AuthTimeCheck
12.252 condition auth_time-check: status=OK [Check that the auth_time returned in the ID Token is in the expected range.]
12.253 assertion VerifyResponse
12.253 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
12.253 assertion ClaimsCheck
12.253 condition claims-check: status=OK [Checks if specific claims is present or not]
12.254 assertion MultipleSignOn
12.254 condition multiple-sign-on: status=OK [Verifies that multiple authentications was used in the flow]
12.254 condition Done: status=OK
============================================================
Conditions
auth_time-check: status=OK [Check that the auth_time returned in the ID Token is in the expected range.]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
claims-check: status=OK [Checks if specific claims is present or not]
multiple-sign-on: status=OK [Verifies that multiple authentications was used in the flow]
Done: status=OK
============================================================
RESULT: PASSED
./OP-UserInfo-Header.txt 0000644 0000000 0000000 00000024130 13313422262 015144 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-UserInfo-Header
Test description: UserInfo Endpoint access with POST and bearer header
Timestamp: 2018-06-23T10:45:06Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.074 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.076 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.076 phase <--<-- 2 --- Registration -->-->
0.076 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.076 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#FsZG8yaaKFEkQRyv"
],
"response_types": [
"code"
]
}
0.23 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.231 RegistrationResponse {
"client_id": "19524c99-63a9-4332-9635-e3b12a4bfebd",
"client_secret": "cEd5J.bIugIQ",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "19524c99-63a9-4332-9635-e3b12a4bfebd",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#FsZG8yaaKFEkQRyv"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.231 phase <--<-- 3 --- AsyncAuthn -->-->
0.232 AuthorizationRequest {
"client_id": "19524c99-63a9-4332-9635-e3b12a4bfebd",
"nonce": "3GSZWZW6lCoJ0r9M",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "iq5OQv3hTLHWY3Lp"
}
0.232 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=19524c99-63a9-4332-9635-e3b12a4bfebd&state=iq5OQv3hTLHWY3Lp&response_type=code&nonce=3GSZWZW6lCoJ0r9M
0.232 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=19524c99-63a9-4332-9635-e3b12a4bfebd&state=iq5OQv3hTLHWY3Lp&response_type=code&nonce=3GSZWZW6lCoJ0r9M
2.446 response Response URL with query part
2.446 response {'state': 'iq5OQv3hTLHWY3Lp', 'scope': 'openid', 'code': 'fZ1s3s9nV7SQtoiWcit46-3IXrP4B9m4drva5NEZvZA.VEAQygqS8n0amJODgmml8Uwrq83tI7CRxt_EIrqZBdg'}
2.447 response {'state': 'iq5OQv3hTLHWY3Lp', 'scope': 'openid', 'code': 'fZ1s3s9nV7SQtoiWcit46-3IXrP4B9m4drva5NEZvZA.VEAQygqS8n0amJODgmml8Uwrq83tI7CRxt_EIrqZBdg'}
2.447 AuthorizationResponse {
"code": "fZ1s3s9nV7SQtoiWcit46-3IXrP4B9m4drva5NEZvZA.VEAQygqS8n0amJODgmml8Uwrq83tI7CRxt_EIrqZBdg",
"scope": "openid",
"state": "iq5OQv3hTLHWY3Lp"
}
2.447 phase <--<-- 4 --- AccessToken -->-->
2.447 --> request op_args: {'state': 'iq5OQv3hTLHWY3Lp'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.447 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'iq5OQv3hTLHWY3Lp', 'code': 'fZ1s3s9nV7SQtoiWcit46-3IXrP4B9m4drva5NEZvZA.VEAQygqS8n0amJODgmml8Uwrq83tI7CRxt_EIrqZBdg', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '19524c99-63a9-4332-9635-e3b12a4bfebd'}, 'state': 'iq5OQv3hTLHWY3Lp'}
2.447 AccessTokenRequest {
"code": "fZ1s3s9nV7SQtoiWcit46-3IXrP4B9m4drva5NEZvZA.VEAQygqS8n0amJODgmml8Uwrq83tI7CRxt_EIrqZBdg",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "iq5OQv3hTLHWY3Lp"
}
2.447 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.447 request_http_args {'headers': {'Authorization': 'Basic MTk1MjRjOTktNjNhOS00MzMyLTk2MzUtZTNiMTJhNGJmZWJkOmNFZDVKLmJJdWdJUQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.447 request code=fZ1s3s9nV7SQtoiWcit46-3IXrP4B9m4drva5NEZvZA.VEAQygqS8n0amJODgmml8Uwrq83tI7CRxt_EIrqZBdg&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=iq5OQv3hTLHWY3Lp
2.66 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.661 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMTk1MjRjOTktNjNhOS00MzMyLTk2MzUtZTNiMTJhNGJmZWJkIl0sImF1dGhfdGltZSI6MTUyOTc1MDU5MiwiZXhwIjoxNTI5NzU0MzA2LCJpYXQiOjE1Mjk3NTA3MDYsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImEwZGNkNmViLTU5ZmMtNDY0Zi1iZTc5LWVlYzM4YzFhZDI1YiIsIm5vbmNlIjoiM0dTWldaVzZsQ29KMHI5TSIsInJhdCI6MTUyOTc1MDcwNCwic3ViIjoiZm9vQGJhci5jb20ifQ.uDl6VRD5NaE7tJDvfvVcgeruKzGsXZXg6k_SzING_2vpFnCTaETzeA1XgsrP9LsMGLhscJFxj9w5SEm8QVMf1jxFyV7zL-p-UbBdoL7fIc0bZDYBcxu1tk2mg_hgedkKEArSXjL4hwYmhh6E8OzwA2hcg-adi7DevHtMo0xPdUNbh7algn1InBN5facazm05hSNuuGqJdypubelT6UBlTBfiuijbgjn-xt94S8pV3ZvQzfv0plEYvfzoqXLkDPgDM_In4I911asVxvrm1KivTYSElt-fOLEclIWIvf1PxuLrH-44UOfScspkWVOrEXuBf18cW7StjI2EO41QVz5Uq7QJ0j5souoHm45E5fxvAXvfjDYX2ILZ3Oyot-IjBDEQbFC9ZaRkDT5ZLZnkSAZ1-BAhSjvg8QicmcRO10NU99dorD2sX8G5YsU6QMe7SvBxGFQHzkRU2Tt0MVaHdw5CpOMgstAGVMHe1rgsC_m6MrHgl3UTc7DeH2Q51AT5qkPOlKWMUeX4K9xTguzSbhZlSqcyJ3bcA1T_No9n9goH4L-YCtcuBIfOyRWu4er8wExGTSaRWD82BpPihE4Hl4rZqEx5rqmRciyKiX-U-VYv08PIsaSHZruU6Tg0ASyDCE6joTlCFTVN07J_pPB4kWOoKlhpcg9Ileedivth0KDBy-U', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'lEAvI-LvpReCmRzQaelaDNrblmhspAFOciiFR-TsYBc.pVztzjiS37hGLBibb1fZch47UIX70zc9Gcupys6RMCE', 'scope': 'openid'}
2.739 AccessTokenResponse {
"access_token": "lEAvI-LvpReCmRzQaelaDNrblmhspAFOciiFR-TsYBc.pVztzjiS37hGLBibb1fZch47UIX70zc9Gcupys6RMCE",
"expires_in": 3599,
"id_token": {
"aud": [
"19524c99-63a9-4332-9635-e3b12a4bfebd"
],
"auth_time": 1529750592,
"exp": 1529754306,
"iat": 1529750706,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "a0dcd6eb-59fc-464f-be79-eec38c1ad25b",
"nonce": "3GSZWZW6lCoJ0r9M",
"rat": 1529750704,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
2.739 phase <--<-- 5 --- UserInfo -->-->
2.739 do_user_info_request kwargs:{'state': 'iq5OQv3hTLHWY3Lp', 'method': 'POST', 'behavior': 'use_authorization_header'}
2.74 request {'body': ''}
2.74 request_url https://oidc-certification.ory.sh:8443/userinfo
2.74 request_http_args {'headers': {'Authorization': 'Bearer lEAvI-LvpReCmRzQaelaDNrblmhspAFOciiFR-TsYBc.pVztzjiS37hGLBibb1fZch47UIX70zc9Gcupys6RMCE', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.812 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
2.813 OpenIDSchema {
"sub": "[email protected]"
}
2.813 OpenIDSchema {
"sub": "[email protected]"
}
2.813 phase <--<-- 6 --- Done -->-->
2.813 end
2.813 assertion VerifyResponse
2.813 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.813 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-nonce-code.txt 0000644 0000000 0000000 00000023323 13313422316 014241 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-nonce-code
Test description: ID Token has nonce when requested for code flow
Timestamp: 2018-06-23T10:45:34Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.094 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.096 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.096 phase <--<-- 2 --- Registration -->-->
0.096 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.096 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#IJ9QgjAlHuEm72cL"
],
"response_types": [
"code"
]
}
0.267 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.268 RegistrationResponse {
"client_id": "0b4c1ae2-a82c-47eb-acf4-afc93ef92df5",
"client_secret": "2ju7LCfhOshL",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "0b4c1ae2-a82c-47eb-acf4-afc93ef92df5",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#IJ9QgjAlHuEm72cL"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.268 phase <--<-- 3 --- AsyncAuthn -->-->
0.269 AuthorizationRequest {
"client_id": "0b4c1ae2-a82c-47eb-acf4-afc93ef92df5",
"nonce": "godmorgon",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "lsd30TvVdAewHHQe"
}
0.269 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=0b4c1ae2-a82c-47eb-acf4-afc93ef92df5&state=lsd30TvVdAewHHQe&response_type=code&nonce=godmorgon
0.269 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=0b4c1ae2-a82c-47eb-acf4-afc93ef92df5&state=lsd30TvVdAewHHQe&response_type=code&nonce=godmorgon
2.331 response Response URL with query part
2.332 response {'state': 'lsd30TvVdAewHHQe', 'scope': 'openid', 'code': 'jran3uGUhC_W3e3X4KnvgxyTbuOo11M5M3-zbFT3y90.2oWqL8iax2O8IwQJ9aRPcL8Wp1gRV4dt8CZAquG-r_E'}
2.332 response {'state': 'lsd30TvVdAewHHQe', 'scope': 'openid', 'code': 'jran3uGUhC_W3e3X4KnvgxyTbuOo11M5M3-zbFT3y90.2oWqL8iax2O8IwQJ9aRPcL8Wp1gRV4dt8CZAquG-r_E'}
2.332 AuthorizationResponse {
"code": "jran3uGUhC_W3e3X4KnvgxyTbuOo11M5M3-zbFT3y90.2oWqL8iax2O8IwQJ9aRPcL8Wp1gRV4dt8CZAquG-r_E",
"scope": "openid",
"state": "lsd30TvVdAewHHQe"
}
2.332 phase <--<-- 4 --- AccessToken -->-->
2.333 --> request op_args: {'state': 'lsd30TvVdAewHHQe'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.333 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'lsd30TvVdAewHHQe', 'code': 'jran3uGUhC_W3e3X4KnvgxyTbuOo11M5M3-zbFT3y90.2oWqL8iax2O8IwQJ9aRPcL8Wp1gRV4dt8CZAquG-r_E', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '0b4c1ae2-a82c-47eb-acf4-afc93ef92df5'}, 'state': 'lsd30TvVdAewHHQe'}
2.333 AccessTokenRequest {
"code": "jran3uGUhC_W3e3X4KnvgxyTbuOo11M5M3-zbFT3y90.2oWqL8iax2O8IwQJ9aRPcL8Wp1gRV4dt8CZAquG-r_E",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "lsd30TvVdAewHHQe"
}
2.333 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.333 request_http_args {'headers': {'Authorization': 'Basic MGI0YzFhZTItYTgyYy00N2ViLWFjZjQtYWZjOTNlZjkyZGY1OjJqdTdMQ2ZoT3NoTA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.333 request code=jran3uGUhC_W3e3X4KnvgxyTbuOo11M5M3-zbFT3y90.2oWqL8iax2O8IwQJ9aRPcL8Wp1gRV4dt8CZAquG-r_E&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=lsd30TvVdAewHHQe
2.548 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.549 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMGI0YzFhZTItYTgyYy00N2ViLWFjZjQtYWZjOTNlZjkyZGY1Il0sImF1dGhfdGltZSI6MTUyOTc1MDU5MiwiZXhwIjoxNTI5NzU0MzM0LCJpYXQiOjE1Mjk3NTA3MzQsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjJhNTBmMWJhLWQwZTgtNDdkNS1hNzEyLWZjY2E0ODllZThmNCIsIm5vbmNlIjoiZ29kbW9yZ29uIiwicmF0IjoxNTI5NzUwNzMyLCJzdWIiOiJmb29AYmFyLmNvbSJ9.VodgNSYDvojKEuxELokWE81dHyQO72hOx1gZTHi2fNWEkundzAnRV8t123uecnfr7JrDsbl68_sOOVsEt43kuh_QHjlljUn_14NHtNcKPhMh3cHgZp0Pw_rkwIYo4R80vwKCSQEqoJqZMXysDMjKrrsbfkRQnieX96anZJ4dUx8OydnkuDxHY60H9QzK6geJqfQgEtEp5nCmpNaUWdXzsEc2rxv7rCA8T_5ArfORZoIj0B3652BWlmtscpl3vlA8tRcGHLIVxmo3ZPqvcoTrqEnMHupch_hhvGqH57Yn6alDMgzgAoemANVY2N_-T934E_nDyXh1o-Y64DxYK_yA4DWDJY_uPYPOJgqsAAnjZa9ySD6MGOMGUmfv_PYdVgcprtxYyeuFXMI9HpRfTSnWTTv6BcMlDjt4meXt-0tEez5ztYiPzsMuzFaDkoktUDPOC8YmFwp_cRgzkH1WkWdknp6ENJci3PuTKysoQ6LoqxN9cFibGAylvGIYGn_Oh2EfnnzXbgJe57FnCQhYmlE3_rlJLwxnC1bqdxswHZqiqAjViXYcLGsJOKoFE2C7MRIfgtEjPg5PVZS7iv_k9OmsgMmd5FSsB_Y0JafDBQ0qKRfitEYE8GdpvEGkBu-2y44Q7ObmUEIDy_UypvVdFDskS2Ncp_GIEpPb3Pm9zYcb3-E', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'Wz0J5Wf7vL8jPp2DyfFFdNvOYyaH-c7M2DEA7BdgB0g.nzMNBbh_zdFLlJtnTF2qxO9m58LN2xCASyZAE20ZsOk', 'scope': 'openid'}
2.626 AccessTokenResponse {
"access_token": "Wz0J5Wf7vL8jPp2DyfFFdNvOYyaH-c7M2DEA7BdgB0g.nzMNBbh_zdFLlJtnTF2qxO9m58LN2xCASyZAE20ZsOk",
"expires_in": 3599,
"id_token": {
"aud": [
"0b4c1ae2-a82c-47eb-acf4-afc93ef92df5"
],
"auth_time": 1529750592,
"exp": 1529754334,
"iat": 1529750734,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "2a50f1ba-d0e8-47d5-a712-fcca489ee8f4",
"nonce": "godmorgon",
"rat": 1529750732,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
2.626 phase <--<-- 5 --- Done -->-->
2.626 end
2.627 assertion VerifyResponse
2.627 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.627 assertion VerifyNonce
2.627 condition verify-nonce: status=OK [Verifies that the nonce received in the IDToken is the same as was given in the Authorization Request]
2.627 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-nonce: status=OK [Verifies that the nonce received in the IDToken is the same as was given in the Authorization Request]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Registration-Dynamic.txt 0000644 0000000 0000000 00000011475 13313422116 016266 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-Dynamic
Test description: Client registration request
Timestamp: 2018-06-23T10:43:26Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.11 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.111 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.112 phase <--<-- 2 --- Registration -->-->
0.112 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.112 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#wG5lPNdDnhbb3lBI"
],
"response_types": [
"code"
]
}
0.3 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.301 RegistrationResponse {
"client_id": "c52050fc-b532-4d95-b334-83bb56094891",
"client_secret": "Tb1prwm3dErm",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "c52050fc-b532-4d95-b334-83bb56094891",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#wG5lPNdDnhbb3lBI"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.301 phase <--<-- 3 --- Done -->-->
0.301 end
0.302 assertion CheckHTTPResponse
0.302 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.302 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
Done: status=OK
============================================================
RESULT: PASSED
./OP-display-page.txt 0000644 0000000 0000000 00000014347 13313422300 014605 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-display-page
Test description: Request with display=page
Timestamp: 2018-06-23T10:45:20Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.456 phase <--<-- 1 --- Webfinger -->-->
1.457 not expected to do WebFinger
1.457 phase <--<-- 2 --- Discovery -->-->
1.457 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.528 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.529 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.529 phase <--<-- 3 --- Registration -->-->
1.529 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.53 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#NhW5pddP0Mh7rE7e"
],
"response_types": [
"code"
]
}
1.686 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.687 RegistrationResponse {
"client_id": "040fd742-7fa2-427e-ab4a-6a8e3f980798",
"client_secret": "03igEnNuvrH0",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "040fd742-7fa2-427e-ab4a-6a8e3f980798",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#NhW5pddP0Mh7rE7e"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.687 phase <--<-- 4 --- AsyncAuthn -->-->
1.688 AuthorizationRequest {
"client_id": "040fd742-7fa2-427e-ab4a-6a8e3f980798",
"display": "page",
"nonce": "MgBPdF8IkUj0nXT7",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "upGoYKEtjGzwXaoO"
}
1.688 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=040fd742-7fa2-427e-ab4a-6a8e3f980798&state=upGoYKEtjGzwXaoO&response_type=code&nonce=MgBPdF8IkUj0nXT7&display=page
1.688 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=040fd742-7fa2-427e-ab4a-6a8e3f980798&state=upGoYKEtjGzwXaoO&response_type=code&nonce=MgBPdF8IkUj0nXT7&display=page
4.337 response Response URL with query part
4.338 response {'state': 'upGoYKEtjGzwXaoO', 'scope': 'openid', 'code': 'Tlu_o4Xu-inZWVNF4LUDx__ijfxcEYpkj0MfKiQ0orE.hmFF7awAJvJieYsCApfB9NBn3kGIIKFJ81v9LLF-skg'}
4.339 response {'state': 'upGoYKEtjGzwXaoO', 'scope': 'openid', 'code': 'Tlu_o4Xu-inZWVNF4LUDx__ijfxcEYpkj0MfKiQ0orE.hmFF7awAJvJieYsCApfB9NBn3kGIIKFJ81v9LLF-skg'}
4.339 AuthorizationResponse {
"code": "Tlu_o4Xu-inZWVNF4LUDx__ijfxcEYpkj0MfKiQ0orE.hmFF7awAJvJieYsCApfB9NBn3kGIIKFJ81v9LLF-skg",
"scope": "openid",
"state": "upGoYKEtjGzwXaoO"
}
4.339 phase <--<-- 5 --- Done -->-->
4.339 end
4.34 assertion VerifyResponse
4.34 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.34 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Registration-Endpoint.txt 0000644 0000000 0000000 00000005204 13313422120 016446 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-Endpoint
Test description: Verify that registration_endpoint is published
Timestamp: 2018-06-23T10:43:28Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.109 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.11 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.11 phase <--<-- 2 --- Done -->-->
0.11 end
0.111 assertion VerifyOPHasRegistrationEndpoint
0.111 condition verify-op-has-registration-endpoint: status=OK [Verify that the OP has a registration endpoint]
0.111 condition Done: status=OK
============================================================
Conditions
verify-op-has-registration-endpoint: status=OK [Verify that the OP has a registration endpoint]
Done: status=OK
============================================================
RESULT: PASSED
./OP-IDToken-C-Signature.txt 0000644 0000000 0000000 00000023174 13313422203 015642 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-IDToken-C-Signature
Test description: Does the OP sign the ID Token and with what
Timestamp: 2018-06-23T10:44:19Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.091 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.093 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.093 phase <--<-- 2 --- Registration -->-->
0.093 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.093 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#yRexVseJ5WpRjoBI"
],
"response_types": [
"code"
]
}
0.292 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.292 RegistrationResponse {
"client_id": "6f1490e4-ed74-431c-b0a0-c5d4908c41b8",
"client_secret": "E_EZ9WeOhjsd",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "6f1490e4-ed74-431c-b0a0-c5d4908c41b8",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#yRexVseJ5WpRjoBI"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.293 phase <--<-- 3 --- AsyncAuthn -->-->
0.293 AuthorizationRequest {
"client_id": "6f1490e4-ed74-431c-b0a0-c5d4908c41b8",
"nonce": "WJevRTBFfLpx3kyn",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "DStKMWdQshxkfiQD"
}
0.293 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=6f1490e4-ed74-431c-b0a0-c5d4908c41b8&state=DStKMWdQshxkfiQD&response_type=code&nonce=WJevRTBFfLpx3kyn
0.293 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=6f1490e4-ed74-431c-b0a0-c5d4908c41b8&state=DStKMWdQshxkfiQD&response_type=code&nonce=WJevRTBFfLpx3kyn
2.979 response Response URL with query part
2.979 response {'state': 'DStKMWdQshxkfiQD', 'scope': 'openid', 'code': 'EHhv1enltKedw2R49Sw91bYFOAwpzkzxFF2NKVTpt0k.acsXVo87D0pcqC_6QOvy9ZhCp6e9KNFAVG43RnvaD68'}
2.98 response {'state': 'DStKMWdQshxkfiQD', 'scope': 'openid', 'code': 'EHhv1enltKedw2R49Sw91bYFOAwpzkzxFF2NKVTpt0k.acsXVo87D0pcqC_6QOvy9ZhCp6e9KNFAVG43RnvaD68'}
2.98 AuthorizationResponse {
"code": "EHhv1enltKedw2R49Sw91bYFOAwpzkzxFF2NKVTpt0k.acsXVo87D0pcqC_6QOvy9ZhCp6e9KNFAVG43RnvaD68",
"scope": "openid",
"state": "DStKMWdQshxkfiQD"
}
2.98 phase <--<-- 4 --- AccessToken -->-->
2.98 --> request op_args: {'state': 'DStKMWdQshxkfiQD'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.98 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'DStKMWdQshxkfiQD', 'code': 'EHhv1enltKedw2R49Sw91bYFOAwpzkzxFF2NKVTpt0k.acsXVo87D0pcqC_6QOvy9ZhCp6e9KNFAVG43RnvaD68', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '6f1490e4-ed74-431c-b0a0-c5d4908c41b8'}, 'state': 'DStKMWdQshxkfiQD'}
2.98 AccessTokenRequest {
"code": "EHhv1enltKedw2R49Sw91bYFOAwpzkzxFF2NKVTpt0k.acsXVo87D0pcqC_6QOvy9ZhCp6e9KNFAVG43RnvaD68",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "DStKMWdQshxkfiQD"
}
2.981 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.981 request_http_args {'headers': {'Authorization': 'Basic NmYxNDkwZTQtZWQ3NC00MzFjLWIwYTAtYzVkNDkwOGM0MWI4OkVfRVo5V2VPaGpzZA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.981 request code=EHhv1enltKedw2R49Sw91bYFOAwpzkzxFF2NKVTpt0k.acsXVo87D0pcqC_6QOvy9ZhCp6e9KNFAVG43RnvaD68&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=DStKMWdQshxkfiQD
3.196 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.197 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNmYxNDkwZTQtZWQ3NC00MzFjLWIwYTAtYzVkNDkwOGM0MWI4Il0sImF1dGhfdGltZSI6MTUyOTc1MDU5MiwiZXhwIjoxNTI5NzU0MjU5LCJpYXQiOjE1Mjk3NTA2NTksImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjE1ZTY2Y2U4LWYyYzMtNDUzYy1iY2Y3LTg0Yzg3YTVmNDIxZiIsIm5vbmNlIjoiV0pldlJUQkZmTHB4M2t5biIsInJhdCI6MTUyOTc1MDY1Niwic3ViIjoiZm9vQGJhci5jb20ifQ.wDvxxgpwQUqDFR3CBXJ5IdcW5PMoTjMlT0FjSsgschKN3zCuqmIur4qomJBU7U5NmYrR29tS8g8TxU9WJQpH2OvqKwe1WZaELuFJeSUarwsM9oGdRHt0eY81eRuobESKD2eIByXFqC4mqSD3la6_bUyKBt6HK0gXM1NwDIaVelqHC3I6wS0Z_oVgDhcsevwM4y5m1bdxfsChYfP5lpjWJVbx13ReAuvJKcnnuWc9Jf5gl4aPYXxXGsMsafoEPnI20FmdZreH3OEIyiqiiWjh4TAVTVSKLnLmQYzNeOP1V3iz84-miTPkd4IyrEYkkdE_P-J_uEKhc-ny7VKyJUXOA_UyD2qwgAwIYPQsam-TVzuwrjXITE6zr3-g7fuz7Z10QJHnzpC0-t-Qzo4wotqcKRS4MiOShjvNET1dTXptw4aIiPWYdQyI6XGVM5wb2BDHBnDNSQnIWrQxO4kwMYa6LCrNRRwjfHmlw4072og9yR2vvMRgKd66-kxqXfakefIExyCg5anFo8nS4MaSFGbEEorfs6GBs2lC0D5Oj7PZsX7sspVsoFgRGLkqWx30CJy_dwlAleOMCmrC4jHyt-5Mj06PP3twZhJ6MNf9twJbF8gmWiG-itBw-4DQ2hKosV3zxA0ePGrc8W_ASKfzIrOj_ZRgBnK7TDoCf1MnuvcMWmM', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'mmzhHCal4LULBZbMeac1DUQfKfk7cfrq2c5OE7yT6Ns.Bcx1S4VqOnR4HLMld-9pqPOpcjVU6TyL2RzddWvlUlY', 'scope': 'openid'}
3.273 AccessTokenResponse {
"access_token": "mmzhHCal4LULBZbMeac1DUQfKfk7cfrq2c5OE7yT6Ns.Bcx1S4VqOnR4HLMld-9pqPOpcjVU6TyL2RzddWvlUlY",
"expires_in": 3599,
"id_token": {
"aud": [
"6f1490e4-ed74-431c-b0a0-c5d4908c41b8"
],
"auth_time": 1529750592,
"exp": 1529754259,
"iat": 1529750659,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "15e66ce8-f2c3-453c-bcf7-84c87a5f421f",
"nonce": "WJevRTBFfLpx3kyn",
"rat": 1529750656,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.273 phase <--<-- 5 --- Done -->-->
3.273 end
3.274 assertion VerifyResponse
3.274 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.274 assertion IsIDTokenSigned
3.274 condition is-idtoken-signed: status=OK [Checks if the id_token is signed]
3.274 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
is-idtoken-signed: status=OK [Checks if the id_token is signed]
Done: status=OK
============================================================
RESULT: PASSED
|
|
hydra/internal/certification/CI.F.T.T.s.tar | ./OP-Req-login_hint.txt 0000644 0000000 0000000 00000022163 13313423547 015116 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-login_hint
Test description: Providing login_hint
Timestamp: 2018-06-23T10:56:39Z
============================================================
Trace output
0.0 phase <--<-- 0 --- VerifyConfiguration -->-->
0.0 phase <--<-- 1 --- Note -->-->
1.393 phase <--<-- 2 --- Webfinger -->-->
1.393 not expected to do WebFinger
1.393 phase <--<-- 3 --- Discovery -->-->
1.393 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.467 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.468 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.468 phase <--<-- 4 --- Registration -->-->
1.468 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.469 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#SnPpwNgsOvxWaVu1"
],
"response_types": [
"code id_token"
]
}
1.63 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.631 RegistrationResponse {
"client_id": "ee27adf5-f933-42a5-9e1a-bf6ca5cac3e5",
"client_secret": "YR.tG1MuYyIu",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "ee27adf5-f933-42a5-9e1a-bf6ca5cac3e5",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#SnPpwNgsOvxWaVu1"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.631 phase <--<-- 5 --- AsyncAuthn -->-->
1.632 AuthorizationRequest {
"client_id": "ee27adf5-f933-42a5-9e1a-bf6ca5cac3e5",
"login_hint": "[email protected]",
"nonce": "URflupe1MrGLwQrB",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "ijpFV6duPLbt4rlh"
}
1.632 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=ee27adf5-f933-42a5-9e1a-bf6ca5cac3e5&state=ijpFV6duPLbt4rlh&response_type=code+id_token&nonce=URflupe1MrGLwQrB&login_hint=foo%40bar.com
1.632 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=ee27adf5-f933-42a5-9e1a-bf6ca5cac3e5&state=ijpFV6duPLbt4rlh&response_type=code+id_token&nonce=URflupe1MrGLwQrB&login_hint=foo%40bar.com
6.997 http args {}
7.178 response URL with fragment
7.178 response code=FGCX4YA_aMB1hailcO6TshJirdnC31Zy0vx78yRATlw.KEzwP0BNQdX7AY8f0T2RRr04js7JsTes9nB9t0tWw8w&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZWUyN2FkZjUtZjkzMy00MmE1LTllMWEtYmY2Y2E1Y2FjM2U1Il0sImF1dGhfdGltZSI6MTUyOTc1MTM5NiwiY19oYXNoIjoiVm1kdXdPemR4VklvLW5PRXFBdTZDQSIsImV4cCI6MTUyOTc1NDk5OSwiaWF0IjoxNTI5NzUxMzk5LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJmNDNmNDI2OC04MzQ4LTRmMjItOTg5NS1iY2MzMzg5MmU5ODAiLCJub25jZSI6IlVSZmx1cGUxTXJHTHdRckIiLCJyYXQiOjE1Mjk3NTEzOTQsInN1YiI6ImZvb0BiYXIuY29tIn0.EgZtRlUJpmkV60GoIWve-a8kGtEbIeOKPOwcvsVuWq_t_66Ct6PoHONqRpnlOJuTIVBFK-F0mV-pXmKcOjkGkiwJLd9gs8sq96W3H5GSF3njf-zNTN5F4zh-yvXLDKnehihF7neygxknEmZYrxmChTv9OeUpT2Pkoh42tnFeIZWfEruZSk1zeiN_fHf7cecefXJveSzUyXSK9D0BG12ca16uAJVCIhtPNENZ26XzZzjCle31slCezkrniFMz2e33aP2wc5iH1deU0hTpGmywkElmAT_BRyzeiCnP-AM5TaF4IbtxgQEnLeTmq7KMC7CJTNBglk1sG1YYgtP8AxW62CJOV3sE5RRpJBFAMQ_aFqfstOFzdTfVCWUflR0AWfhCJSC4SazpLUUJIb0BBKx772SkCFaT6m7jNnO3Gz-G871zoiCRC6xJGxt5GIoz5y2Gebjxz5F7s1_N3TEteyjwRWGBkj7DW-q7nQ2UkT2h6nBJjUk0x2VBLxN1HBszgHzPr8jCEPKYC30snRm3_8vOkEswJ3DfOl1vrnXIekVl5nWZwGRx1cmnHxcr7LiQoncTlLO1W7z_4gvj6Wk_9D_G5fGU9eoANq6kUrvIqI1x_gxfgXn96CjoIoVov0Mxa10bd9Z1uvQcgBCtvbAfApbGWptuhvsy6SwjU5IFMJKZcHg&state=ijpFV6duPLbt4rlh
7.178 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZWUyN2FkZjUtZjkzMy00MmE1LTllMWEtYmY2Y2E1Y2FjM2U1Il0sImF1dGhfdGltZSI6MTUyOTc1MTM5NiwiY19oYXNoIjoiVm1kdXdPemR4VklvLW5PRXFBdTZDQSIsImV4cCI6MTUyOTc1NDk5OSwiaWF0IjoxNTI5NzUxMzk5LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJmNDNmNDI2OC04MzQ4LTRmMjItOTg5NS1iY2MzMzg5MmU5ODAiLCJub25jZSI6IlVSZmx1cGUxTXJHTHdRckIiLCJyYXQiOjE1Mjk3NTEzOTQsInN1YiI6ImZvb0BiYXIuY29tIn0.EgZtRlUJpmkV60GoIWve-a8kGtEbIeOKPOwcvsVuWq_t_66Ct6PoHONqRpnlOJuTIVBFK-F0mV-pXmKcOjkGkiwJLd9gs8sq96W3H5GSF3njf-zNTN5F4zh-yvXLDKnehihF7neygxknEmZYrxmChTv9OeUpT2Pkoh42tnFeIZWfEruZSk1zeiN_fHf7cecefXJveSzUyXSK9D0BG12ca16uAJVCIhtPNENZ26XzZzjCle31slCezkrniFMz2e33aP2wc5iH1deU0hTpGmywkElmAT_BRyzeiCnP-AM5TaF4IbtxgQEnLeTmq7KMC7CJTNBglk1sG1YYgtP8AxW62CJOV3sE5RRpJBFAMQ_aFqfstOFzdTfVCWUflR0AWfhCJSC4SazpLUUJIb0BBKx772SkCFaT6m7jNnO3Gz-G871zoiCRC6xJGxt5GIoz5y2Gebjxz5F7s1_N3TEteyjwRWGBkj7DW-q7nQ2UkT2h6nBJjUk0x2VBLxN1HBszgHzPr8jCEPKYC30snRm3_8vOkEswJ3DfOl1vrnXIekVl5nWZwGRx1cmnHxcr7LiQoncTlLO1W7z_4gvj6Wk_9D_G5fGU9eoANq6kUrvIqI1x_gxfgXn96CjoIoVov0Mxa10bd9Z1uvQcgBCtvbAfApbGWptuhvsy6SwjU5IFMJKZcHg', 'state': 'ijpFV6duPLbt4rlh', 'code': 'FGCX4YA_aMB1hailcO6TshJirdnC31Zy0vx78yRATlw.KEzwP0BNQdX7AY8f0T2RRr04js7JsTes9nB9t0tWw8w'}
7.274 AuthorizationResponse {
"code": "FGCX4YA_aMB1hailcO6TshJirdnC31Zy0vx78yRATlw.KEzwP0BNQdX7AY8f0T2RRr04js7JsTes9nB9t0tWw8w",
"id_token": {
"aud": [
"ee27adf5-f933-42a5-9e1a-bf6ca5cac3e5"
],
"auth_time": 1529751396,
"c_hash": "VmduwOzdxVIo-nOEqAu6CA",
"exp": 1529754999,
"iat": 1529751399,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "f43f4268-8348-4f22-9895-bcc33892e980",
"nonce": "URflupe1MrGLwQrB",
"rat": 1529751394,
"sub": "[email protected]"
},
"state": "ijpFV6duPLbt4rlh"
}
7.275 phase <--<-- 6 --- Done -->-->
7.275 end
7.275 assertion VerifyAuthnResponse
7.275 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
7.275 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-nonce-NoReq-noncode.txt 0000644 0000000 0000000 00000017647 13313423253 016013 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-nonce-NoReq-noncode
Test description: Reject requests without nonce unless using the code flow
Timestamp: 2018-06-23T10:53:31Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.071 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.073 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.073 phase <--<-- 2 --- Note -->-->
1.198 phase <--<-- 3 --- Registration -->-->
1.198 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.199 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#a2ZSDM0zWQmk9hTt"
],
"response_types": [
"code id_token"
]
}
1.353 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.354 RegistrationResponse {
"client_id": "55ee9a6a-bdf5-464e-95dc-9bac3eb6a086",
"client_secret": "IxS6PXf2eaiH",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "55ee9a6a-bdf5-464e-95dc-9bac3eb6a086",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#a2ZSDM0zWQmk9hTt"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.355 phase <--<-- 4 --- AsyncAuthn -->-->
1.355 AuthorizationRequest {
"client_id": "55ee9a6a-bdf5-464e-95dc-9bac3eb6a086",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "7bxuILmubEg6GlzQ"
}
1.355 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?state=7bxuILmubEg6GlzQ&scope=openid&response_type=code+id_token&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=55ee9a6a-bdf5-464e-95dc-9bac3eb6a086
1.355 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?state=7bxuILmubEg6GlzQ&scope=openid&response_type=code+id_token&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=55ee9a6a-bdf5-464e-95dc-9bac3eb6a086
3.751 http args {}
3.918 response URL with fragment
3.919 response error=invalid_request&error_debug=Parameter+nonce+must+be+set+when+using+the+hybrid+flow&error_description=The+request+is+missing+a+required+parameter%252C+includes+an+invalid+parameter+value%252C+includes+a+parameter+more+than+once%252C+or+is+otherwise+malformed&error_hint=Make+sure+that+the+various+parameters+are+correct%252C+be+aware+of+case+sensitivity+and+trim+your+parameters.+Make+sure+that+the+client+you+are+using+has+exactly+whitelisted+the+redirect_uri+you+specified.&state=7bxuILmubEg6GlzQ
3.919 response {'error_debug': 'Parameter nonce must be set when using the hybrid flow', 'error_description': 'The request is missing a required parameter%2C includes an invalid parameter value%2C includes a parameter more than once%2C or is otherwise malformed', 'state': '7bxuILmubEg6GlzQ', 'error': 'invalid_request', 'error_hint': 'Make sure that the various parameters are correct%2C be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.'}
3.919 AuthorizationErrorResponse {
"error": "invalid_request",
"error_debug": "Parameter nonce must be set when using the hybrid flow",
"error_description": "The request is missing a required parameter%2C includes an invalid parameter value%2C includes a parameter more than once%2C or is otherwise malformed",
"error_hint": "Make sure that the various parameters are correct%2C be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.",
"state": "7bxuILmubEg6GlzQ"
}
3.919 AuthorizationErrorResponse {
"error": "invalid_request",
"error_debug": "Parameter nonce must be set when using the hybrid flow",
"error_description": "The request is missing a required parameter%2C includes an invalid parameter value%2C includes a parameter more than once%2C or is otherwise malformed",
"error_hint": "Make sure that the various parameters are correct%2C be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.",
"state": "7bxuILmubEg6GlzQ"
}
3.919 phase <--<-- 5 --- Done -->-->
3.919 end
3.92 assertion VerifyResponse
3.92 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.92 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-IDToken-RS256.txt 0000644 0000000 0000000 00000031177 13313423150 014306 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-IDToken-RS256
Test description: Asymmetric ID Token signature with RS256
Timestamp: 2018-06-23T10:52:24Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Registration -->-->
0.074 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'id_token_signed_response_alg': 'RS256', 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.075 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id_token_signed_response_alg": "RS256",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#aUGzJ8XAkg0cV0qq"
],
"response_types": [
"code id_token"
]
}
0.232 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.233 RegistrationResponse {
"client_id": "abf7e8d0-332d-487c-a86f-5f4c8913e654",
"client_secret": "vxASIVLDIxXE",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "abf7e8d0-332d-487c-a86f-5f4c8913e654",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#aUGzJ8XAkg0cV0qq"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.233 phase <--<-- 3 --- AsyncAuthn -->-->
0.233 AuthorizationRequest {
"client_id": "abf7e8d0-332d-487c-a86f-5f4c8913e654",
"nonce": "ZXeRY7TYN2wYVBRB",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "dypl4hbc7xI1UKcg"
}
0.234 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=abf7e8d0-332d-487c-a86f-5f4c8913e654&state=dypl4hbc7xI1UKcg&response_type=code+id_token&nonce=ZXeRY7TYN2wYVBRB
0.234 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=abf7e8d0-332d-487c-a86f-5f4c8913e654&state=dypl4hbc7xI1UKcg&response_type=code+id_token&nonce=ZXeRY7TYN2wYVBRB
2.308 http args {}
2.521 response URL with fragment
2.522 response code=flrvnBo3Fa67vHmcNHbXnHAODrRhovCdRWklwAkcixk.8ki218hFxdV0Qu6SCSX2E03chkfmFEy-n1loCsSL0bo&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYWJmN2U4ZDAtMzMyZC00ODdjLWE4NmYtNWY0Yzg5MTNlNjU0Il0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoicWJwclUwQWpzOHZfbWJ0cllrRDJ1USIsImV4cCI6MTUyOTc1NDc0MywiaWF0IjoxNTI5NzUxMTQzLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiIwZWE5NDRhYy05NmFlLTQwYmEtODhiZC0zZWEwMjdiODBmZjEiLCJub25jZSI6IlpYZVJZN1RZTjJ3WVZCUkIiLCJyYXQiOjE1Mjk3NTExNDEsInN1YiI6ImZvb0BiYXIuY29tIn0.XnUFZFlZ2Ur5nCRHNIffNTR1VSzU_qZuQ1wS6YFtExew4ar813HMypm78NbRS4FZx73jvOsBgLSwh7VjxJ42pik2Ew-JCB20hA-tORJNh7SpLzX5t3Pmre9Xr85hAbZ0KfeoRhipBJB0S8EHjmD-stX-XsC6-WesAi2E9ymGwJ9GY0SpN2pS3-Agy78wyoZeh9kLAw3XDHdudLWBgDCGAWu-DaOyeHJP4gEKEL0KzZmCR4S8jW9hKTRgUXQpD5aph4YbUHfN8IJjjvVUkhey41avyf_T1tO5L7PByykKVNK6zRB1k_bhwpZqeGDpJInDo1lftm6v0JD-al6MLhTCFe81kGqJOu7DLl0CBxpTwktQmJmkmDTkQrU9DkbiVpR5mrGS246939t_A4inw0ZvdG-3JPulkGPdK_FFkTygt1LNBwNGhWD_naeMf10nBK7rE1sVc1URBQbghXVnSNZ_a3mu_xgaNli7HpO67elxQL7d4dmapyTSs2uQ22TgtvsYVL9D7mP-8OgSJn98hX1nvmi9901sm8oMIZIm8hRyXdI3u7PWtKY2gzMh2MYzxfQTAy_sgdGd20pD1VkbRI58XRqcgQjqSAIKyjnr-Fvy47DE1eA0hqlCGev0vVqG7sjHLe1Yfhir3CfBRZzxFRJRHopIIQOImqZ5qfVEfFOnxaw&state=dypl4hbc7xI1UKcg
2.522 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYWJmN2U4ZDAtMzMyZC00ODdjLWE4NmYtNWY0Yzg5MTNlNjU0Il0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoicWJwclUwQWpzOHZfbWJ0cllrRDJ1USIsImV4cCI6MTUyOTc1NDc0MywiaWF0IjoxNTI5NzUxMTQzLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiIwZWE5NDRhYy05NmFlLTQwYmEtODhiZC0zZWEwMjdiODBmZjEiLCJub25jZSI6IlpYZVJZN1RZTjJ3WVZCUkIiLCJyYXQiOjE1Mjk3NTExNDEsInN1YiI6ImZvb0BiYXIuY29tIn0.XnUFZFlZ2Ur5nCRHNIffNTR1VSzU_qZuQ1wS6YFtExew4ar813HMypm78NbRS4FZx73jvOsBgLSwh7VjxJ42pik2Ew-JCB20hA-tORJNh7SpLzX5t3Pmre9Xr85hAbZ0KfeoRhipBJB0S8EHjmD-stX-XsC6-WesAi2E9ymGwJ9GY0SpN2pS3-Agy78wyoZeh9kLAw3XDHdudLWBgDCGAWu-DaOyeHJP4gEKEL0KzZmCR4S8jW9hKTRgUXQpD5aph4YbUHfN8IJjjvVUkhey41avyf_T1tO5L7PByykKVNK6zRB1k_bhwpZqeGDpJInDo1lftm6v0JD-al6MLhTCFe81kGqJOu7DLl0CBxpTwktQmJmkmDTkQrU9DkbiVpR5mrGS246939t_A4inw0ZvdG-3JPulkGPdK_FFkTygt1LNBwNGhWD_naeMf10nBK7rE1sVc1URBQbghXVnSNZ_a3mu_xgaNli7HpO67elxQL7d4dmapyTSs2uQ22TgtvsYVL9D7mP-8OgSJn98hX1nvmi9901sm8oMIZIm8hRyXdI3u7PWtKY2gzMh2MYzxfQTAy_sgdGd20pD1VkbRI58XRqcgQjqSAIKyjnr-Fvy47DE1eA0hqlCGev0vVqG7sjHLe1Yfhir3CfBRZzxFRJRHopIIQOImqZ5qfVEfFOnxaw', 'state': 'dypl4hbc7xI1UKcg', 'code': 'flrvnBo3Fa67vHmcNHbXnHAODrRhovCdRWklwAkcixk.8ki218hFxdV0Qu6SCSX2E03chkfmFEy-n1loCsSL0bo'}
2.608 AuthorizationResponse {
"code": "flrvnBo3Fa67vHmcNHbXnHAODrRhovCdRWklwAkcixk.8ki218hFxdV0Qu6SCSX2E03chkfmFEy-n1loCsSL0bo",
"id_token": {
"aud": [
"abf7e8d0-332d-487c-a86f-5f4c8913e654"
],
"auth_time": 1529750975,
"c_hash": "qbprU0Ajs8v_mbtrYkD2uQ",
"exp": 1529754743,
"iat": 1529751143,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "0ea944ac-96ae-40ba-88bd-3ea027b80ff1",
"nonce": "ZXeRY7TYN2wYVBRB",
"rat": 1529751141,
"sub": "[email protected]"
},
"state": "dypl4hbc7xI1UKcg"
}
2.608 phase <--<-- 4 --- AccessToken -->-->
2.609 --> request op_args: {'state': 'dypl4hbc7xI1UKcg'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.609 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'dypl4hbc7xI1UKcg', 'code': 'flrvnBo3Fa67vHmcNHbXnHAODrRhovCdRWklwAkcixk.8ki218hFxdV0Qu6SCSX2E03chkfmFEy-n1loCsSL0bo', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'abf7e8d0-332d-487c-a86f-5f4c8913e654'}, 'state': 'dypl4hbc7xI1UKcg'}
2.609 AccessTokenRequest {
"code": "flrvnBo3Fa67vHmcNHbXnHAODrRhovCdRWklwAkcixk.8ki218hFxdV0Qu6SCSX2E03chkfmFEy-n1loCsSL0bo",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "dypl4hbc7xI1UKcg"
}
2.609 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.609 request_http_args {'headers': {'Authorization': 'Basic YWJmN2U4ZDAtMzMyZC00ODdjLWE4NmYtNWY0Yzg5MTNlNjU0OnZ4QVNJVkxESXhYRQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.609 request code=flrvnBo3Fa67vHmcNHbXnHAODrRhovCdRWklwAkcixk.8ki218hFxdV0Qu6SCSX2E03chkfmFEy-n1loCsSL0bo&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=dypl4hbc7xI1UKcg
2.856 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.857 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYWJmN2U4ZDAtMzMyZC00ODdjLWE4NmYtNWY0Yzg5MTNlNjU0Il0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoicWJwclUwQWpzOHZfbWJ0cllrRDJ1USIsImV4cCI6MTUyOTc1NDc0MywiaWF0IjoxNTI5NzUxMTQ0LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiIzYzc4NjUzMS0zYWY1LTQyZGMtOTcwNC1lZmRlOTFmMjM4NWYiLCJub25jZSI6IlpYZVJZN1RZTjJ3WVZCUkIiLCJyYXQiOjE1Mjk3NTExNDEsInN1YiI6ImZvb0BiYXIuY29tIn0.wBczhN6EaqNGKayHeJq6TNQLSeh9-ujI1PqKjXJFz9wo6_9f2ww60rTQZZgiPAq0yDBbDZwz--pk_msmf3MK-754tlN9wyHsHZ-FD3apmmUWf659AiDP4pv5WBkoTZvBX8PAmPt0tF4sbXlR5MaqRWy_IjG-SMp5EHBcfWoyqJrmWZ_3lU5qgOI0hDtDRuhi-x-c_00sgfWLflP_GerEexHEGZF3L7LoQhr_prdiLl8yXG-1AIJ4_vTIP7XU2QS6uNWkJq_mq7AhLgXZCsxq2WSp-WsQf1Qp5_id_kR-UCAnc6Lxkzyi_MH-_5OM8FYGGjoG08XN93YXhBZYPBci2iA0cFkUfJtIzFfimAnNWHVUML3IXrOUyVxJbfcgHEDSXpT_i8aPP5-cZoITuk-NnFrCAPE12staBNw26WBEp1BWjLayDjLy8odfD42a0lbBs-6O_vUh1jlBDfG38yFmXL7FAKCxk-m12KrnaK7hV7Mjeai4bCICNGzwlf65ixFNhBUuV9HlzVxKOwVBUHsKyHIjMw9cAFJjNYMK0h3QXIybpuLCzr-hzpkxPUyxS38J6yHTmmT1HgQ-KGjswRDHK-BenbuA2Pymh0bvetpU4Z4G6aZ5rINhTN4SE1qNbyqxYa0CfJbbV5tV9KOYsk9lTajBPInEyM0s6Qqzw9_11BQ', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': '9GFcVR6kyPO_j2gUs0z3DIxILhxWN1ckHtQIbkVEglc.2RjSDDM0XPWeYQLW1wBnpLy-K1sbUPPNWMBaQhpKhBc', 'scope': 'openid'}
2.861 AccessTokenResponse {
"access_token": "9GFcVR6kyPO_j2gUs0z3DIxILhxWN1ckHtQIbkVEglc.2RjSDDM0XPWeYQLW1wBnpLy-K1sbUPPNWMBaQhpKhBc",
"expires_in": 3599,
"id_token": {
"aud": [
"abf7e8d0-332d-487c-a86f-5f4c8913e654"
],
"auth_time": 1529750975,
"c_hash": "qbprU0Ajs8v_mbtrYkD2uQ",
"exp": 1529754743,
"iat": 1529751144,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "3c786531-3af5-42dc-9704-efde91f2385f",
"nonce": "ZXeRY7TYN2wYVBRB",
"rat": 1529751141,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
2.861 phase <--<-- 5 --- Done -->-->
2.861 end
2.861 assertion VerifyResponse
2.862 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.862 assertion VerifySignedIdToken
2.862 condition verify-idtoken-is-signed: status=OK [Verifies that an ID Token is signed]
2.862 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-idtoken-is-signed: status=OK [Verifies that an ID Token is signed]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Registration-Sector-Bad.txt 0000644 0000000 0000000 00000013242 13313423106 016617 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-Sector-Bad
Test description: Incorrect registration of sector_identifier_uri
Timestamp: 2018-06-23T10:51:50Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.071 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.073 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.073 phase <--<-- 2 --- Registration -->-->
0.073 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'sector_identifier_uri': 'https://op.certification.openid.net:61353/export/siu.json', 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.073 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#noTomffjxQAYmx3e"
],
"response_types": [
"code id_token"
],
"sector_identifier_uri": "https://op.certification.openid.net:61353/export/siu.json"
}
0.278 http response url:https://oidc-certification.ory.sh:8443/clients status_code:400 message:{"error":"invalid_request","error_description":"The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed","error_hint":"Make sure that the various parameters are correct, be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.","status_code":400,"error_debug":"Redirect URL \"https://op.certification.openid.net:61353/authz_cb\" does not match values from sector_identifier_uri."}
0.278 ErrorResponse {
"error": "invalid_request",
"error_debug": "Redirect URL \"https://op.certification.openid.net:61353/authz_cb\" does not match values from sector_identifier_uri.",
"error_description": "The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed",
"error_hint": "Make sure that the various parameters are correct, be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.",
"status_code": 400
}
0.278 exception RegistrationError:{'error_debug': 'Redirect URL "https://op.certification.openid.net:61353/authz_cb" does not match values from sector_identifier_uri.', 'error_description': 'The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed', 'status_code': 400, 'error': 'invalid_request', 'error_hint': 'Make sure that the various parameters are correct, be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.'}
0.278 event got expected exception RegistrationError
0.278 phase <--<-- 3 --- Done -->-->
0.279 end
0.279 condition Done: status=OK
============================================================
Conditions
Done: status=OK
============================================================
RESULT: PASSED
./OP-display-popup.txt 0000644 0000000 0000000 00000022055 13313423245 015040 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-display-popup
Test description: Request with display=popup
Timestamp: 2018-06-23T10:53:25Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.123 phase <--<-- 1 --- Webfinger -->-->
1.123 not expected to do WebFinger
1.123 phase <--<-- 2 --- Discovery -->-->
1.123 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.198 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.199 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.199 phase <--<-- 3 --- Registration -->-->
1.199 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.2 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#oaXE4k1EDRFOSyId"
],
"response_types": [
"code id_token"
]
}
1.355 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.355 RegistrationResponse {
"client_id": "b6aec107-eff3-4f85-b6aa-96bde2f2723f",
"client_secret": "wJG6dYdG3922",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "b6aec107-eff3-4f85-b6aa-96bde2f2723f",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#oaXE4k1EDRFOSyId"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.356 phase <--<-- 4 --- AsyncAuthn -->-->
1.356 AuthorizationRequest {
"client_id": "b6aec107-eff3-4f85-b6aa-96bde2f2723f",
"display": "popup",
"nonce": "95hhIooRCcoC8eqR",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "ihNQyX2Q1XF04W3l"
}
1.356 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=b6aec107-eff3-4f85-b6aa-96bde2f2723f&state=ihNQyX2Q1XF04W3l&response_type=code+id_token&nonce=95hhIooRCcoC8eqR&display=popup
1.356 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=b6aec107-eff3-4f85-b6aa-96bde2f2723f&state=ihNQyX2Q1XF04W3l&response_type=code+id_token&nonce=95hhIooRCcoC8eqR&display=popup
4.041 http args {}
4.217 response URL with fragment
4.217 response code=DTXODptyXEJ5MjJpn0bq1MEtSBArr4f-bF4-uGU3_fE.ja7hkPgmu3NM2DDt3RfFJc9qWASRh9d2mHnSWaKzRj0&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYjZhZWMxMDctZWZmMy00Zjg1LWI2YWEtOTZiZGUyZjI3MjNmIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoidU51Yms1eFEyMVRDZFNrRXFnQmV6QSIsImV4cCI6MTUyOTc1NDgwNCwiaWF0IjoxNTI5NzUxMjA0LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJiYjllMjkxYy1hMjk3LTQ2MGYtYjk5ZS1jZjI0YWM1ZTQxZTEiLCJub25jZSI6Ijk1aGhJb29SQ2NvQzhlcVIiLCJyYXQiOjE1Mjk3NTEyMDIsInN1YiI6ImZvb0BiYXIuY29tIn0.E4qszyZfX8fyn-FQ322LyHtZihXyLnQkUeddIvRz6yN_u202pbeFO2rqLFMSy5Buybiauhs2MmbYyhqTEAdfdd7bfUBH09oVQXyhnkbuAeanxSw4_KPJhy0VZceKRmvSfAKn2FcVhmmEnpx392m-O4Lbj8iyY5utTbcBMyHfhbUv1M5sL14IFBsbctVUL_8L853o8QsEK_d-ooCxyBxneo_6yL4DQ6D3kuT0gOEdisJBpOKgdZ3GHVEFTQzJLHBaic3SzcL8RSPEcYCvphJjw1RxJ_anyTjYkDtYmq73dMD8D4uNDLQHK3b6DkvfXvBbYL-XE4G4QK-HkawEDsrezD2XKASg5YHX-gK7EZ4DAzalYIx7zbjSZqLjbChoNE8V4SZHwGV0jO4SgHH-7Y9nu96j5wZuj4nBH3FFlFWdQngaAzkElHKYPdEN1hI3jXsXRZSu7FWp8I4weW3s29hzsmCl9nGuiIqst0h-G3y1jRdFh9mx6rQd9kpLHWmHrAHm9U6bQeymgFwKt9ioGPvTlGx6BxMuYyDJ-wj-jhKr10179M87XC_mUBC7bmHQLf7JKLpFIWsipWSMBypwyVNibbKA6Ox64Nd36zHvWHZe97Tgns5qNaGDwzCDMC6dKJWCerCMLaU-XrxrrbOhrn5G0g_PNUBmBVuiulj0YTGW8sM&state=ihNQyX2Q1XF04W3l
4.217 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYjZhZWMxMDctZWZmMy00Zjg1LWI2YWEtOTZiZGUyZjI3MjNmIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoidU51Yms1eFEyMVRDZFNrRXFnQmV6QSIsImV4cCI6MTUyOTc1NDgwNCwiaWF0IjoxNTI5NzUxMjA0LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJiYjllMjkxYy1hMjk3LTQ2MGYtYjk5ZS1jZjI0YWM1ZTQxZTEiLCJub25jZSI6Ijk1aGhJb29SQ2NvQzhlcVIiLCJyYXQiOjE1Mjk3NTEyMDIsInN1YiI6ImZvb0BiYXIuY29tIn0.E4qszyZfX8fyn-FQ322LyHtZihXyLnQkUeddIvRz6yN_u202pbeFO2rqLFMSy5Buybiauhs2MmbYyhqTEAdfdd7bfUBH09oVQXyhnkbuAeanxSw4_KPJhy0VZceKRmvSfAKn2FcVhmmEnpx392m-O4Lbj8iyY5utTbcBMyHfhbUv1M5sL14IFBsbctVUL_8L853o8QsEK_d-ooCxyBxneo_6yL4DQ6D3kuT0gOEdisJBpOKgdZ3GHVEFTQzJLHBaic3SzcL8RSPEcYCvphJjw1RxJ_anyTjYkDtYmq73dMD8D4uNDLQHK3b6DkvfXvBbYL-XE4G4QK-HkawEDsrezD2XKASg5YHX-gK7EZ4DAzalYIx7zbjSZqLjbChoNE8V4SZHwGV0jO4SgHH-7Y9nu96j5wZuj4nBH3FFlFWdQngaAzkElHKYPdEN1hI3jXsXRZSu7FWp8I4weW3s29hzsmCl9nGuiIqst0h-G3y1jRdFh9mx6rQd9kpLHWmHrAHm9U6bQeymgFwKt9ioGPvTlGx6BxMuYyDJ-wj-jhKr10179M87XC_mUBC7bmHQLf7JKLpFIWsipWSMBypwyVNibbKA6Ox64Nd36zHvWHZe97Tgns5qNaGDwzCDMC6dKJWCerCMLaU-XrxrrbOhrn5G0g_PNUBmBVuiulj0YTGW8sM', 'state': 'ihNQyX2Q1XF04W3l', 'code': 'DTXODptyXEJ5MjJpn0bq1MEtSBArr4f-bF4-uGU3_fE.ja7hkPgmu3NM2DDt3RfFJc9qWASRh9d2mHnSWaKzRj0'}
4.293 AuthorizationResponse {
"code": "DTXODptyXEJ5MjJpn0bq1MEtSBArr4f-bF4-uGU3_fE.ja7hkPgmu3NM2DDt3RfFJc9qWASRh9d2mHnSWaKzRj0",
"id_token": {
"aud": [
"b6aec107-eff3-4f85-b6aa-96bde2f2723f"
],
"auth_time": 1529750975,
"c_hash": "uNubk5xQ21TCdSkEqgBezA",
"exp": 1529754804,
"iat": 1529751204,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "bb9e291c-a297-460f-b99e-cf24ac5e41e1",
"nonce": "95hhIooRCcoC8eqR",
"rat": 1529751202,
"sub": "[email protected]"
},
"state": "ihNQyX2Q1XF04W3l"
}
4.293 phase <--<-- 5 --- Done -->-->
4.293 end
4.294 assertion VerifyResponse
4.294 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.294 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-redirect_uri-RegFrag.txt 0000644 0000000 0000000 00000011611 13313423414 016217 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-RegFrag
Test description: Reject registration where a redirect_uri has a fragment
Timestamp: 2018-06-23T10:55:08Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.108 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.11 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.11 phase <--<-- 2 --- Registration -->-->
0.11 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb#foobar'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.11 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb#foobar"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#DB2cLIUlYEdNMUxn"
],
"response_types": [
"code id_token"
]
}
0.181 http response url:https://oidc-certification.ory.sh:8443/clients status_code:400 message:{"error":"invalid_request","error_description":"The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed","error_hint":"Redirect URIs must not contain fragments (#)","status_code":400}
0.182 ErrorResponse {
"error": "invalid_request",
"error_description": "The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed",
"error_hint": "Redirect URIs must not contain fragments (#)",
"status_code": 400
}
0.182 exception RegistrationError:{'error_description': 'The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed', 'status_code': 400, 'error': 'invalid_request', 'error_hint': 'Redirect URIs must not contain fragments (#)'}
0.182 event got expected exception RegistrationError
0.182 phase <--<-- 3 --- Done -->-->
0.182 end
0.182 assertion VerifyErrorMessage
0.182 condition verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
0.182 condition Done: status=OK
============================================================
Conditions
verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-OAuth-2nd.txt 0000644 0000000 0000000 00000036342 13313423623 013737 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-OAuth-2nd
Test description: Trying to use authorization code twice should result in an error
Timestamp: 2018-06-23T10:57:23Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Registration -->-->
0.074 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.075 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#eYjqrW47xyOMOfSk"
],
"response_types": [
"code id_token"
]
}
0.231 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.232 RegistrationResponse {
"client_id": "56d5a7ed-90b1-4c66-9436-4d77fbbb650a",
"client_secret": "C7isK6zN8X7Y",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "56d5a7ed-90b1-4c66-9436-4d77fbbb650a",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#eYjqrW47xyOMOfSk"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.232 phase <--<-- 3 --- Note -->-->
2.737 phase <--<-- 4 --- AsyncAuthn -->-->
2.738 AuthorizationRequest {
"client_id": "56d5a7ed-90b1-4c66-9436-4d77fbbb650a",
"nonce": "W52p79cU7QV79PhK",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "XWmOmGw9T6nhwzkh"
}
2.738 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=56d5a7ed-90b1-4c66-9436-4d77fbbb650a&state=XWmOmGw9T6nhwzkh&response_type=code+id_token&nonce=W52p79cU7QV79PhK
2.738 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=56d5a7ed-90b1-4c66-9436-4d77fbbb650a&state=XWmOmGw9T6nhwzkh&response_type=code+id_token&nonce=W52p79cU7QV79PhK
6.398 http args {}
6.575 response URL with fragment
6.575 response code=9Yv2EYOElE3gAwNGdzzA8_OgP6JCYYWUXfyP0BinRL8.YN2Eg0vFfLCKd_Hy1eDl542JWrsAPhGei5RmzrR_H0o&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNTZkNWE3ZWQtOTBiMS00YzY2LTk0MzYtNGQ3N2ZiYmI2NTBhIl0sImF1dGhfdGltZSI6MTUyOTc1MTQwOSwiY19oYXNoIjoiOFNyVTRjZURvTHFSTVhkU1lpbHJaUSIsImV4cCI6MTUyOTc1NTA0MiwiaWF0IjoxNTI5NzUxNDQyLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJjNDYwOTJhNi04OGQzLTRmYjktOGI0My0yYjU2ZTE3NTcwOGUiLCJub25jZSI6Ilc1MnA3OWNVN1FWNzlQaEsiLCJyYXQiOjE1Mjk3NTE0MzksInN1YiI6ImZvb0BiYXIuY29tIn0.Y7VBgmfpKtUZ5kmVbaOcKz5hSWMzinEo8Bnmb_XLPneTyXE1vslcauGHZ0ti-BMXHutVHke0Qah-slzxmvRrSvpZwlf_hyXFUYKH4-hmEw0QYGeGE_JY-3-7WeyRj0fCfpLCIaRchEWs8HZjRFXd8wfy0YD-utIu-InZZFJbArhfH0lFK61LYCpuDZfH5Ud_n4Ts-JynQ1Y8pmLYQL352rjnXJzyfRx9AkK4MKED3mfq4Va-ViGjG1NI9kVnlN0_mlgBN2UfyfJna0cMQxTdA7m8aPmaljSgIZFYwitLO9r7ismkyNZ17OxOkbJH1-AZQj5h_IL04AclBl6nUxPSULEPRQI1KB0Yq_NZm9eKT5uM6oxQ1ZFrzi0VzzFKta0RUsn1Kyur69t2AppO8rayzCUGiQsd4ii4Hukza22ozuswi440-l0-xMonob5xo7xeOY2ksKpA0p_IJxdI2scHPWCzQIc5cHM0nHkEcUbrY0m6uMx8zAg4uKh7TjrVZmUTi3ktW5HZhFOSlzkVcoRgQYKIYOWZARBOZt40UAANHq8HEMgIo5k_2kr7EoQK198vSbIaQny47kNjrBud8qmtA0wOI6pvBUCdLTWgZJBcg1LIwvlcFOOQf7Hcxkv3qn0Jv-FzbTVb22h1AclhFnG4TeCAswdOa5j-HUzt0KInrPE&state=XWmOmGw9T6nhwzkh
6.575 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNTZkNWE3ZWQtOTBiMS00YzY2LTk0MzYtNGQ3N2ZiYmI2NTBhIl0sImF1dGhfdGltZSI6MTUyOTc1MTQwOSwiY19oYXNoIjoiOFNyVTRjZURvTHFSTVhkU1lpbHJaUSIsImV4cCI6MTUyOTc1NTA0MiwiaWF0IjoxNTI5NzUxNDQyLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJjNDYwOTJhNi04OGQzLTRmYjktOGI0My0yYjU2ZTE3NTcwOGUiLCJub25jZSI6Ilc1MnA3OWNVN1FWNzlQaEsiLCJyYXQiOjE1Mjk3NTE0MzksInN1YiI6ImZvb0BiYXIuY29tIn0.Y7VBgmfpKtUZ5kmVbaOcKz5hSWMzinEo8Bnmb_XLPneTyXE1vslcauGHZ0ti-BMXHutVHke0Qah-slzxmvRrSvpZwlf_hyXFUYKH4-hmEw0QYGeGE_JY-3-7WeyRj0fCfpLCIaRchEWs8HZjRFXd8wfy0YD-utIu-InZZFJbArhfH0lFK61LYCpuDZfH5Ud_n4Ts-JynQ1Y8pmLYQL352rjnXJzyfRx9AkK4MKED3mfq4Va-ViGjG1NI9kVnlN0_mlgBN2UfyfJna0cMQxTdA7m8aPmaljSgIZFYwitLO9r7ismkyNZ17OxOkbJH1-AZQj5h_IL04AclBl6nUxPSULEPRQI1KB0Yq_NZm9eKT5uM6oxQ1ZFrzi0VzzFKta0RUsn1Kyur69t2AppO8rayzCUGiQsd4ii4Hukza22ozuswi440-l0-xMonob5xo7xeOY2ksKpA0p_IJxdI2scHPWCzQIc5cHM0nHkEcUbrY0m6uMx8zAg4uKh7TjrVZmUTi3ktW5HZhFOSlzkVcoRgQYKIYOWZARBOZt40UAANHq8HEMgIo5k_2kr7EoQK198vSbIaQny47kNjrBud8qmtA0wOI6pvBUCdLTWgZJBcg1LIwvlcFOOQf7Hcxkv3qn0Jv-FzbTVb22h1AclhFnG4TeCAswdOa5j-HUzt0KInrPE', 'state': 'XWmOmGw9T6nhwzkh', 'code': '9Yv2EYOElE3gAwNGdzzA8_OgP6JCYYWUXfyP0BinRL8.YN2Eg0vFfLCKd_Hy1eDl542JWrsAPhGei5RmzrR_H0o'}
6.654 AuthorizationResponse {
"code": "9Yv2EYOElE3gAwNGdzzA8_OgP6JCYYWUXfyP0BinRL8.YN2Eg0vFfLCKd_Hy1eDl542JWrsAPhGei5RmzrR_H0o",
"id_token": {
"aud": [
"56d5a7ed-90b1-4c66-9436-4d77fbbb650a"
],
"auth_time": 1529751409,
"c_hash": "8SrU4ceDoLqRMXdSYilrZQ",
"exp": 1529755042,
"iat": 1529751442,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "c46092a6-88d3-4fb9-8b43-2b56e175708e",
"nonce": "W52p79cU7QV79PhK",
"rat": 1529751439,
"sub": "[email protected]"
},
"state": "XWmOmGw9T6nhwzkh"
}
6.655 phase <--<-- 5 --- AccessToken -->-->
6.655 --> request op_args: {'state': 'XWmOmGw9T6nhwzkh'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
6.655 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'XWmOmGw9T6nhwzkh', 'code': '9Yv2EYOElE3gAwNGdzzA8_OgP6JCYYWUXfyP0BinRL8.YN2Eg0vFfLCKd_Hy1eDl542JWrsAPhGei5RmzrR_H0o', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '56d5a7ed-90b1-4c66-9436-4d77fbbb650a'}, 'state': 'XWmOmGw9T6nhwzkh'}
6.655 AccessTokenRequest {
"code": "9Yv2EYOElE3gAwNGdzzA8_OgP6JCYYWUXfyP0BinRL8.YN2Eg0vFfLCKd_Hy1eDl542JWrsAPhGei5RmzrR_H0o",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "XWmOmGw9T6nhwzkh"
}
6.655 request_url https://oidc-certification.ory.sh:8443/oauth2/token
6.655 request_http_args {'headers': {'Authorization': 'Basic NTZkNWE3ZWQtOTBiMS00YzY2LTk0MzYtNGQ3N2ZiYmI2NTBhOkM3aXNLNnpOOFg3WQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
6.655 request code=9Yv2EYOElE3gAwNGdzzA8_OgP6JCYYWUXfyP0BinRL8.YN2Eg0vFfLCKd_Hy1eDl542JWrsAPhGei5RmzrR_H0o&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=XWmOmGw9T6nhwzkh
6.864 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
6.865 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNTZkNWE3ZWQtOTBiMS00YzY2LTk0MzYtNGQ3N2ZiYmI2NTBhIl0sImF1dGhfdGltZSI6MTUyOTc1MTQwOSwiY19oYXNoIjoiOFNyVTRjZURvTHFSTVhkU1lpbHJaUSIsImV4cCI6MTUyOTc1NTA0MiwiaWF0IjoxNTI5NzUxNDQzLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJlY2RkZjBjZS05ODNlLTQyZTUtOGIzMS01MzJiMmMyMWQ4NWMiLCJub25jZSI6Ilc1MnA3OWNVN1FWNzlQaEsiLCJyYXQiOjE1Mjk3NTE0MzksInN1YiI6ImZvb0BiYXIuY29tIn0.DppI2FmrJ5gjI-alBAIcmHj_Gx9sDmB-QdzdSGPMr_cDxvSfPEeW1v-tDFQLgR4kHANemy84INZJbIWa5GSQdyFtlUizMw_vS-fErvocQX9y13Lbt2-bc-1Ezzvb9IcwaE0OrFbMe5jaeDPaqI_ucu6eSmQLS32r9zaUou6yEp_C6ftSAws-K97Nt-KhYUR8ReAwGHE5USe7G24oHxju8zPhIs_kcEDmOE5dgSGc4S4MX2WZcDZhUQyc32k9Vyr-E0zZHtljk9dJUwM0Ua4tj7aw1Mlm3LHnCTqoUugFkTqET4DRzNGQpdDbzrLaEkJZ4ve7PILfHED13jW_OpUgn1qcpEChUlkPQzCBQgXljfQNXvwxi_fyx0vAJtFNkezdy6TUzob5cV6BiGIZK_1bRmw0LlWzpbIvRDX_8KymUbzElZzHJlJ5DlT8UxyPw9XiTi7YSOGJGoGr5iYPfCKR0YJOU4E7sDwR0oG86KC4pcrJReV1eedXSKbE8pN9-BON6nuCyzlSWFjZMHORubpHRhXwFVSfpe9Lvxf6u7-4eiPZe35GzKY8pn8Pxs6qB5X8-ZIHfq1SHnKcNOn0_VXbHGfuZ4isdCbgtZMVUXysbxxnTI3vvp0hIzDEsKK9LShBmpGN2EXk70hmmlgWcc3ZFYABoz7QV6IYKckSyfftlfM', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'sQ0WB52e1yomAf1xx7WddYIzEz51xwrCd9OW9HcR3do.Jq-97mvh0Ol9-bhGAflozH5cBDLb6gIyfHGmMJxT3I8', 'scope': 'openid'}
6.869 AccessTokenResponse {
"access_token": "sQ0WB52e1yomAf1xx7WddYIzEz51xwrCd9OW9HcR3do.Jq-97mvh0Ol9-bhGAflozH5cBDLb6gIyfHGmMJxT3I8",
"expires_in": 3599,
"id_token": {
"aud": [
"56d5a7ed-90b1-4c66-9436-4d77fbbb650a"
],
"auth_time": 1529751409,
"c_hash": "8SrU4ceDoLqRMXdSYilrZQ",
"exp": 1529755042,
"iat": 1529751443,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "ecddf0ce-983e-42e5-8b31-532b2c21d85c",
"nonce": "W52p79cU7QV79PhK",
"rat": 1529751439,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
6.869 phase <--<-- 6 --- AccessToken -->-->
6.869 --> request op_args: {'state': 'XWmOmGw9T6nhwzkh'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
6.869 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'XWmOmGw9T6nhwzkh', 'code': '9Yv2EYOElE3gAwNGdzzA8_OgP6JCYYWUXfyP0BinRL8.YN2Eg0vFfLCKd_Hy1eDl542JWrsAPhGei5RmzrR_H0o', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '56d5a7ed-90b1-4c66-9436-4d77fbbb650a'}, 'state': 'XWmOmGw9T6nhwzkh'}
6.869 AccessTokenRequest {
"code": "9Yv2EYOElE3gAwNGdzzA8_OgP6JCYYWUXfyP0BinRL8.YN2Eg0vFfLCKd_Hy1eDl542JWrsAPhGei5RmzrR_H0o",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "XWmOmGw9T6nhwzkh"
}
6.869 request_url https://oidc-certification.ory.sh:8443/oauth2/token
6.869 request_http_args {'headers': {'Authorization': 'Basic NTZkNWE3ZWQtOTBiMS00YzY2LTk0MzYtNGQ3N2ZiYmI2NTBhOkM3aXNLNnpOOFg3WQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
6.869 request code=9Yv2EYOElE3gAwNGdzzA8_OgP6JCYYWUXfyP0BinRL8.YN2Eg0vFfLCKd_Hy1eDl542JWrsAPhGei5RmzrR_H0o&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=XWmOmGw9T6nhwzkh
7.059 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:400 message:{"error":"invalid_grant","error_description":"The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client","status_code":400,"error_debug":"The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found."}
7.06 response {'error_debug': 'The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found.', 'error_description': 'The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client', 'error': 'invalid_grant', 'status_code': 400}
7.06 event Got expected error
7.06 TokenErrorResponse {
"error": "invalid_grant",
"error_debug": "The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found.",
"error_description": "The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client",
"status_code": 400
}
7.061 phase <--<-- 7 --- Done -->-->
7.061 end
7.061 assertion VerifyResponse
7.061 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
7.061 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Discovery-JWKs.txt 0000644 0000000 0000000 00000006120 13313423100 014776 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Discovery-JWKs
Test description: Keys in OP JWKs well formed
Timestamp: 2018-06-23T10:51:44Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.072 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.073 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.073 phase <--<-- 2 --- Done -->-->
0.074 end
0.074 assertion CheckHTTPResponse
0.074 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.074 assertion VerifyBase64URL
0.136 http response url:https://oidc-certification.ory.sh:8443/.well-known/jwks.json status_code:200
0.137 condition verify-base64url: status=OK [Verifies that the base64 encoded parts of a JWK is in fact base64url encoded and not just base64 encoded]
0.137 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-base64url: status=OK [Verifies that the base64 encoded parts of a JWK is in fact base64url encoded and not just base64 encoded]
Done: status=OK
============================================================
RESULT: PASSED
./OP-scope-profile.txt 0000644 0000000 0000000 00000034737 13313423465 015017 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-scope-profile
Test description: Scope requesting profile claims
Timestamp: 2018-06-23T10:55:49Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Registration -->-->
0.074 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.074 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#6nUSdpqXssoBZBES"
],
"response_types": [
"code id_token"
]
}
0.275 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.276 RegistrationResponse {
"client_id": "14a0879e-4dda-403f-b6cd-69ac7344fff9",
"client_secret": "qKYAXCLuB7gp",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "14a0879e-4dda-403f-b6cd-69ac7344fff9",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#6nUSdpqXssoBZBES"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.276 phase <--<-- 3 --- AsyncAuthn -->-->
0.277 condition Check support: status=WARNING, message=No support for: scopes_supported=['profile']
0.277 AuthorizationRequest {
"client_id": "14a0879e-4dda-403f-b6cd-69ac7344fff9",
"nonce": "vKFOHLuG6AUAA2y0",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid profile",
"state": "j2vAmZAqIrresRP5"
}
0.277 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+profile&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=14a0879e-4dda-403f-b6cd-69ac7344fff9&state=j2vAmZAqIrresRP5&response_type=code+id_token&nonce=vKFOHLuG6AUAA2y0
0.277 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+profile&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=14a0879e-4dda-403f-b6cd-69ac7344fff9&state=j2vAmZAqIrresRP5&response_type=code+id_token&nonce=vKFOHLuG6AUAA2y0
2.73 http args {}
2.899 response URL with fragment
2.899 response code=wj-nnLX0bwLRFWyCDkXK6Ho6moSWJzidaQ0vR6GCh2E.KQBu84b2NCA-rxpWlMrPM1i_OzKuWoslNXbRm-BFAIQ&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMTRhMDg3OWUtNGRkYS00MDNmLWI2Y2QtNjlhYzczNDRmZmY5Il0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiV2NmYXR3RktEUXZSalZwTXFLNFlldyIsImV4cCI6MTUyOTc1NDk0OCwiaWF0IjoxNTI5NzUxMzQ4LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJiN2QyMDZhOC0yNWNjLTQ0YjgtOWU5Ni03MTRkYjIzNDdhMDAiLCJub25jZSI6InZLRk9ITHVHNkFVQUEyeTAiLCJyYXQiOjE1Mjk3NTEzNDYsInN1YiI6ImZvb0BiYXIuY29tIn0.Xaj2vK_QuaKdeZJq9pDK7l0BQmyRQmYHPH7Al3yXrhIDxyIQKpnQYtX1IF6QcALyI_DbDszeMfgtdccdolSUZRyrrBP3t6gF4VrLP05tF8gUykz93Ugf4OkKsjieCnPaivqKqd771l0ZcaZREr69F5uxl1UAM3X2-5QvSmG5r6WqXryJNXD7iOga7bxP3s2ftamRo-QUIubFZEiZC3_6czZlFp-MCHh4oULFCsl9nvtn6xq9yfnKqIJfQ2Xq5DYgyNd8BJ8I1kD2n61RCL2WRcIlYConnG1Zordt-yP-yUb1YEatTuaz10_79b12SixFIH_dv-3BCzwJuQgYTtmPjV__CgbqScr3gmjv9z-Kf09oNe0Vo5TTmM5dE3lNuiwbEZYPrE4Tthz9jYT9liMkp3zHplPoaVcUI8LkMns4eJ-VgxJDGMrOTYzO4_51Hbg5gEDikD7eKcLhU99z_bI4s7xutCc2HstBeATMNYKbTXviex2B-330X1m7s9LfNcef5r37xZfaIKysmOOk0jlnAsNE9n-lo4mGCzj-58wn3CJWLzxiUd6TGEE19voAEkNsopKk195T2FAAd_VCh0GWk2CNeNq4mzQPLk3061YCnu-1mf7XHdy-Bc2k3OyYRLVnXxrfLN9J-pBGzvYzzO3WOfvIpXzz2eoHWpzFLEKuKaM&state=j2vAmZAqIrresRP5
2.9 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMTRhMDg3OWUtNGRkYS00MDNmLWI2Y2QtNjlhYzczNDRmZmY5Il0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiV2NmYXR3RktEUXZSalZwTXFLNFlldyIsImV4cCI6MTUyOTc1NDk0OCwiaWF0IjoxNTI5NzUxMzQ4LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJiN2QyMDZhOC0yNWNjLTQ0YjgtOWU5Ni03MTRkYjIzNDdhMDAiLCJub25jZSI6InZLRk9ITHVHNkFVQUEyeTAiLCJyYXQiOjE1Mjk3NTEzNDYsInN1YiI6ImZvb0BiYXIuY29tIn0.Xaj2vK_QuaKdeZJq9pDK7l0BQmyRQmYHPH7Al3yXrhIDxyIQKpnQYtX1IF6QcALyI_DbDszeMfgtdccdolSUZRyrrBP3t6gF4VrLP05tF8gUykz93Ugf4OkKsjieCnPaivqKqd771l0ZcaZREr69F5uxl1UAM3X2-5QvSmG5r6WqXryJNXD7iOga7bxP3s2ftamRo-QUIubFZEiZC3_6czZlFp-MCHh4oULFCsl9nvtn6xq9yfnKqIJfQ2Xq5DYgyNd8BJ8I1kD2n61RCL2WRcIlYConnG1Zordt-yP-yUb1YEatTuaz10_79b12SixFIH_dv-3BCzwJuQgYTtmPjV__CgbqScr3gmjv9z-Kf09oNe0Vo5TTmM5dE3lNuiwbEZYPrE4Tthz9jYT9liMkp3zHplPoaVcUI8LkMns4eJ-VgxJDGMrOTYzO4_51Hbg5gEDikD7eKcLhU99z_bI4s7xutCc2HstBeATMNYKbTXviex2B-330X1m7s9LfNcef5r37xZfaIKysmOOk0jlnAsNE9n-lo4mGCzj-58wn3CJWLzxiUd6TGEE19voAEkNsopKk195T2FAAd_VCh0GWk2CNeNq4mzQPLk3061YCnu-1mf7XHdy-Bc2k3OyYRLVnXxrfLN9J-pBGzvYzzO3WOfvIpXzz2eoHWpzFLEKuKaM', 'state': 'j2vAmZAqIrresRP5', 'code': 'wj-nnLX0bwLRFWyCDkXK6Ho6moSWJzidaQ0vR6GCh2E.KQBu84b2NCA-rxpWlMrPM1i_OzKuWoslNXbRm-BFAIQ'}
2.999 AuthorizationResponse {
"code": "wj-nnLX0bwLRFWyCDkXK6Ho6moSWJzidaQ0vR6GCh2E.KQBu84b2NCA-rxpWlMrPM1i_OzKuWoslNXbRm-BFAIQ",
"id_token": {
"aud": [
"14a0879e-4dda-403f-b6cd-69ac7344fff9"
],
"auth_time": 1529751224,
"c_hash": "WcfatwFKDQvRjVpMqK4Yew",
"exp": 1529754948,
"iat": 1529751348,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "b7d206a8-25cc-44b8-9e96-714db2347a00",
"nonce": "vKFOHLuG6AUAA2y0",
"rat": 1529751346,
"sub": "[email protected]"
},
"state": "j2vAmZAqIrresRP5"
}
2.999 phase <--<-- 4 --- AccessToken -->-->
3.0 --> request op_args: {'state': 'j2vAmZAqIrresRP5'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.0 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'j2vAmZAqIrresRP5', 'code': 'wj-nnLX0bwLRFWyCDkXK6Ho6moSWJzidaQ0vR6GCh2E.KQBu84b2NCA-rxpWlMrPM1i_OzKuWoslNXbRm-BFAIQ', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '14a0879e-4dda-403f-b6cd-69ac7344fff9'}, 'state': 'j2vAmZAqIrresRP5'}
3.0 AccessTokenRequest {
"code": "wj-nnLX0bwLRFWyCDkXK6Ho6moSWJzidaQ0vR6GCh2E.KQBu84b2NCA-rxpWlMrPM1i_OzKuWoslNXbRm-BFAIQ",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "j2vAmZAqIrresRP5"
}
3.0 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.0 request_http_args {'headers': {'Authorization': 'Basic MTRhMDg3OWUtNGRkYS00MDNmLWI2Y2QtNjlhYzczNDRmZmY5OnFLWUFYQ0x1QjdncA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
3.0 request code=wj-nnLX0bwLRFWyCDkXK6Ho6moSWJzidaQ0vR6GCh2E.KQBu84b2NCA-rxpWlMrPM1i_OzKuWoslNXbRm-BFAIQ&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=j2vAmZAqIrresRP5
3.212 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.213 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMTRhMDg3OWUtNGRkYS00MDNmLWI2Y2QtNjlhYzczNDRmZmY5Il0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiV2NmYXR3RktEUXZSalZwTXFLNFlldyIsImV4cCI6MTUyOTc1NDk0OCwiaWF0IjoxNTI5NzUxMzQ5LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJhNzQ2ZGU3Zi1mYjgyLTRmMGYtOTJkMC01ZTg0ODE0YjVkMDMiLCJub25jZSI6InZLRk9ITHVHNkFVQUEyeTAiLCJyYXQiOjE1Mjk3NTEzNDYsInN1YiI6ImZvb0BiYXIuY29tIn0.K6iPMV2pdEUtWoP_x9w0dJaBotm5q11rFKtn9WMKaSEaLyTefvCb1AbAfNilmHdl_jKxqIk7vmwvxRZEn4RWJyWd-OaWS2vQB6vcweD0KqhyjJ0KhkTcJEmOlrEf_4YigIAO9dw6TxmQr5qJrA-dU0O6dlguP_4CK3CJRTUMUKE9XFqyOtSzA2vYzAsSdX_vl5i1e5LgFliVuQYN3tsiKXw9La2ARkzb0Am-9xPCa6mw4CMuN7CVUhJ1RhOLVWJ5PEIy1ErQVqWNCu7R0t90-rvxALXVZmkLc_s4Ua4ni74sXgJrjLhiBR-UfRt3mM8FtrnY1u3gDzkIJroKBye1Ji9cy7Ilman0v72wwkXRMssxZ9xM0JEZ49uI01oLNjM_I0Dzpda88aJ6_cyVtal_HrMbmUAG9GSvJW0gJmBni2EqaCHCgAGxHh9ioPd_tsudPLIuowBV3WzrDf6OdPRxXa0nzByp93aaUd1_gSqEvrms0rDWFjsOAlfWguDHVQ1oQZI9XjoD78sxKnlHuKi4-Cyi4CFK-oqY2XbZ7Aoeistore2UUWSaMjV-gvU1LEx6KwZvRvkTuQURnWp4uPqZZ3j80fEl-1IilRNoUcpsKn3j-cBzOD4XpxAvvMYJEJ8Zs5uEOscaJvjIXq7--3vTWwTR5IC-dQhVbnBMw4rON_c', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'j8itKsAqtcRypR_IASDjIp6iQdq6tNjR-KJVRaYsT90.gu0B8UUAfOUKBm3yk04vkSdmx6FJB5r5zt0q2v6pib8', 'scope': 'openid profile'}
3.216 AccessTokenResponse {
"access_token": "j8itKsAqtcRypR_IASDjIp6iQdq6tNjR-KJVRaYsT90.gu0B8UUAfOUKBm3yk04vkSdmx6FJB5r5zt0q2v6pib8",
"expires_in": 3599,
"id_token": {
"aud": [
"14a0879e-4dda-403f-b6cd-69ac7344fff9"
],
"auth_time": 1529751224,
"c_hash": "WcfatwFKDQvRjVpMqK4Yew",
"exp": 1529754948,
"iat": 1529751349,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "a746de7f-fb82-4f0f-92d0-5e84814b5d03",
"nonce": "vKFOHLuG6AUAA2y0",
"rat": 1529751346,
"sub": "[email protected]"
},
"scope": "openid profile",
"token_type": "bearer"
}
3.216 phase <--<-- 5 --- UserInfo -->-->
3.217 do_user_info_request kwargs:{'state': 'j2vAmZAqIrresRP5', 'method': 'GET', 'authn_method': 'bearer_header'}
3.217 request {'body': None}
3.217 request_url https://oidc-certification.ory.sh:8443/userinfo
3.217 request_http_args {'headers': {'Authorization': 'Bearer j8itKsAqtcRypR_IASDjIp6iQdq6tNjR-KJVRaYsT90.gu0B8UUAfOUKBm3yk04vkSdmx6FJB5r5zt0q2v6pib8'}}
3.322 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
3.323 OpenIDSchema {
"sub": "[email protected]"
}
3.323 OpenIDSchema {
"sub": "[email protected]"
}
3.323 phase <--<-- 6 --- Done -->-->
3.323 end
3.323 assertion CheckHTTPResponse
3.324 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
3.324 assertion VerifyResponse
3.324 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.324 assertion VerifyScopes
3.325 condition verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username'] [Verifies that the claims corresponding to the requested scopes are returned]
3.325 condition Done: status=OK
============================================================
Conditions
Check support: status=WARNING, message=No support for: scopes_supported=['profile']
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username'] [Verifies that the claims corresponding to the requested scopes are returned]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
No support for: scopes_supported=['profile']
The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username']
./OP-UserInfo-RS256.txt 0000644 0000000 0000000 00000033035 13313423212 014535 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-UserInfo-RS256
Test description: RP registers userinfo_signed_response_alg to signal that it wants signed UserInfo returned
Timestamp: 2018-06-23T10:52:58Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.082 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.084 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.084 phase <--<-- 2 --- Registration -->-->
0.084 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'userinfo_signed_response_alg': 'RS256'}
0.084 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#gvWvlC0AbOv96KAl"
],
"response_types": [
"code id_token"
],
"userinfo_signed_response_alg": "RS256"
}
0.346 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.347 RegistrationResponse {
"client_id": "8e527325-0ba8-4587-a3c7-7c27522dd147",
"client_secret": "NrM3LPypRfIl",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "8e527325-0ba8-4587-a3c7-7c27522dd147",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#gvWvlC0AbOv96KAl"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "RS256"
}
0.347 phase <--<-- 3 --- AsyncAuthn -->-->
0.348 AuthorizationRequest {
"client_id": "8e527325-0ba8-4587-a3c7-7c27522dd147",
"nonce": "qyAm65CczJcER8OW",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "jfnUiIYbjjyS40Ky"
}
0.348 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=8e527325-0ba8-4587-a3c7-7c27522dd147&state=jfnUiIYbjjyS40Ky&response_type=code+id_token&nonce=qyAm65CczJcER8OW
0.348 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=8e527325-0ba8-4587-a3c7-7c27522dd147&state=jfnUiIYbjjyS40Ky&response_type=code+id_token&nonce=qyAm65CczJcER8OW
2.437 http args {}
2.631 response URL with fragment
2.631 response code=aJzdMI-xs6Hf2jvrReGld5k6lIL9ojaiR4-v6tAX0fo.BgcT3M9FfULG7_UTvSVPfttWIDIzs5J3BwaclLPOYYw&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiOGU1MjczMjUtMGJhOC00NTg3LWEzYzctN2MyNzUyMmRkMTQ3Il0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiMDFwQk1GX25mR3FCc2UycVVwU0ZIQSIsImV4cCI6MTUyOTc1NDc3NywiaWF0IjoxNTI5NzUxMTc3LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJkOWU1Njc1Mi1hNTZiLTQxNTItYWRkMi1lMjc5NWQwZjdkOTkiLCJub25jZSI6InF5QW02NUNjekpjRVI4T1ciLCJyYXQiOjE1Mjk3NTExNzUsInN1YiI6ImZvb0BiYXIuY29tIn0.R28YLitZEfWhvhXjAQ0tIuoBjvM3XQyhUIiKDVEYujjlcjVLKe8x8cRbzL5h6TXrNWoIwn5_nAUrl_eZQ23t2ZwNhlTOZ8xwsavlZ891zOQMnjoixhsnf6VA18xjOkobHMRtf2grESv4aLHQPqq5cNmcznmQS94SkOF9ZG3crPugSwnEhViTfjidUh5xqRbO0Bx6k6kqa5AEoUTX_eeSPIoTTB31HExKdDCt8uAGmw-VW45HA1YL_wMLqa2rpcbGzoFb0pDQAe9F0Gycz0SBIoAcUJG4feXzyCuBcpCbFR0gn_yVJtaM7MNREd92bJC9AUIocMVKvQgkhJsX2SGhkCQy1kW_NX9g7hrPWu1Nb3i9JqrJYJgoW2wzHqoTPmDSVmXEI1T8hVz279DijjZSn3-L0uSxZIpxiZCjWOxS1fCcqQC8tyMjTWxmyjyM3KsjvX_5Clg7FC9jPsQi7jD06c8Hbnmqu0jxIfTD7ewARqZ2qHNDSc9vIz58ppdRCfTC7xNFWxdAy9vn74ng4LDJNLaAtVPq82tAm4NRfvO-wusYAf8eFduo_Qq1SU9h-VWOjNRqXEJEVR2il3Kiff3FMqKvcJH1T-YpyU4pzu4TcLqFvJ9t5qR7y3vN__DjgwnF-QRKWrnkeqk7WakYA_V00vaN1sKnZ8e2yGsb2aIygwQ&state=jfnUiIYbjjyS40Ky
2.631 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiOGU1MjczMjUtMGJhOC00NTg3LWEzYzctN2MyNzUyMmRkMTQ3Il0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiMDFwQk1GX25mR3FCc2UycVVwU0ZIQSIsImV4cCI6MTUyOTc1NDc3NywiaWF0IjoxNTI5NzUxMTc3LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJkOWU1Njc1Mi1hNTZiLTQxNTItYWRkMi1lMjc5NWQwZjdkOTkiLCJub25jZSI6InF5QW02NUNjekpjRVI4T1ciLCJyYXQiOjE1Mjk3NTExNzUsInN1YiI6ImZvb0BiYXIuY29tIn0.R28YLitZEfWhvhXjAQ0tIuoBjvM3XQyhUIiKDVEYujjlcjVLKe8x8cRbzL5h6TXrNWoIwn5_nAUrl_eZQ23t2ZwNhlTOZ8xwsavlZ891zOQMnjoixhsnf6VA18xjOkobHMRtf2grESv4aLHQPqq5cNmcznmQS94SkOF9ZG3crPugSwnEhViTfjidUh5xqRbO0Bx6k6kqa5AEoUTX_eeSPIoTTB31HExKdDCt8uAGmw-VW45HA1YL_wMLqa2rpcbGzoFb0pDQAe9F0Gycz0SBIoAcUJG4feXzyCuBcpCbFR0gn_yVJtaM7MNREd92bJC9AUIocMVKvQgkhJsX2SGhkCQy1kW_NX9g7hrPWu1Nb3i9JqrJYJgoW2wzHqoTPmDSVmXEI1T8hVz279DijjZSn3-L0uSxZIpxiZCjWOxS1fCcqQC8tyMjTWxmyjyM3KsjvX_5Clg7FC9jPsQi7jD06c8Hbnmqu0jxIfTD7ewARqZ2qHNDSc9vIz58ppdRCfTC7xNFWxdAy9vn74ng4LDJNLaAtVPq82tAm4NRfvO-wusYAf8eFduo_Qq1SU9h-VWOjNRqXEJEVR2il3Kiff3FMqKvcJH1T-YpyU4pzu4TcLqFvJ9t5qR7y3vN__DjgwnF-QRKWrnkeqk7WakYA_V00vaN1sKnZ8e2yGsb2aIygwQ', 'state': 'jfnUiIYbjjyS40Ky', 'code': 'aJzdMI-xs6Hf2jvrReGld5k6lIL9ojaiR4-v6tAX0fo.BgcT3M9FfULG7_UTvSVPfttWIDIzs5J3BwaclLPOYYw'}
2.706 AuthorizationResponse {
"code": "aJzdMI-xs6Hf2jvrReGld5k6lIL9ojaiR4-v6tAX0fo.BgcT3M9FfULG7_UTvSVPfttWIDIzs5J3BwaclLPOYYw",
"id_token": {
"aud": [
"8e527325-0ba8-4587-a3c7-7c27522dd147"
],
"auth_time": 1529750975,
"c_hash": "01pBMF_nfGqBse2qUpSFHA",
"exp": 1529754777,
"iat": 1529751177,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "d9e56752-a56b-4152-add2-e2795d0f7d99",
"nonce": "qyAm65CczJcER8OW",
"rat": 1529751175,
"sub": "[email protected]"
},
"state": "jfnUiIYbjjyS40Ky"
}
2.706 phase <--<-- 4 --- AccessToken -->-->
2.707 --> request op_args: {'state': 'jfnUiIYbjjyS40Ky'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.707 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'jfnUiIYbjjyS40Ky', 'code': 'aJzdMI-xs6Hf2jvrReGld5k6lIL9ojaiR4-v6tAX0fo.BgcT3M9FfULG7_UTvSVPfttWIDIzs5J3BwaclLPOYYw', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '8e527325-0ba8-4587-a3c7-7c27522dd147'}, 'state': 'jfnUiIYbjjyS40Ky'}
2.707 AccessTokenRequest {
"code": "aJzdMI-xs6Hf2jvrReGld5k6lIL9ojaiR4-v6tAX0fo.BgcT3M9FfULG7_UTvSVPfttWIDIzs5J3BwaclLPOYYw",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "jfnUiIYbjjyS40Ky"
}
2.707 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.707 request_http_args {'headers': {'Authorization': 'Basic OGU1MjczMjUtMGJhOC00NTg3LWEzYzctN2MyNzUyMmRkMTQ3Ok5yTTNMUHlwUmZJbA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.707 request code=aJzdMI-xs6Hf2jvrReGld5k6lIL9ojaiR4-v6tAX0fo.BgcT3M9FfULG7_UTvSVPfttWIDIzs5J3BwaclLPOYYw&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=jfnUiIYbjjyS40Ky
2.92 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.921 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiOGU1MjczMjUtMGJhOC00NTg3LWEzYzctN2MyNzUyMmRkMTQ3Il0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiMDFwQk1GX25mR3FCc2UycVVwU0ZIQSIsImV4cCI6MTUyOTc1NDc3NywiaWF0IjoxNTI5NzUxMTc4LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJkODYyMWY2Zi04ZWUwLTQ4MDItOGVhNS05MWVlMGZhOWE0YjAiLCJub25jZSI6InF5QW02NUNjekpjRVI4T1ciLCJyYXQiOjE1Mjk3NTExNzUsInN1YiI6ImZvb0BiYXIuY29tIn0.t4_g0X5MttNXqJNCRFJlrFDTSMwiYZ_Ef2wvbgR6N3vdJkeLQYanOBRbD5I3FlKfi8HXOojSHbbAQJaOi_X-l8Pj9JJLKLzlD-D0HJXPm1935S97Yo1VpOp2cliVBx_Tz5bCdGp5LjUWoCUsTw3eeIltP2C8WLMsv6j-5gKtW2YoA4PN23eYWZL_KQBnZrAQ6MEmCkT2_qMCeh3-sIODEfObN6CscFzleLe4T-urkxe1b8eHQ6AY-0Yk77HeFQG_tMAqXgz47JIjoW8DY9CNkeLFBtNWu48aQB3u8NUhKyOr5VHYPHitpyc1gf0i5i9zSt5rVVnHxPGW8TUi99fhmgfD_344RQGUh5_pAQnSUnmNXHfaxPv7BHtfCnQHg65G5ox2lHQPzjeSysx6WUP1lPv7ZisZP1-Xgnqy3Xf6JUeE3xxt1_tXgbkYZEeNNJ7DwnRMD3d4UraNtaLRXGvhaYTi7QKdm4oK6GTCtYTLHCNITrDTkT4zqQ8C3BQ-YhzvSsoQatNjj7bhCWm2_mFcYCu-fziP9KgJNcnLiu5ayabCYtIsB6NIQQMICHKLftmdFJyki6mVc20VcUTVrGWPJI55p2JBu9fEZHnnZThr98VMwBFwgDuZADzWSiXItqgk7oKURINskx9-PScQ6DYsNS7DV7jBM9FCj-kHh7eSrYg', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'cGyosWOGtlA27DRvCB7bQJvXPho8MC3Gz1fm-spDJfc.S_W7cUaE6MkbV-zNBPV0MisawAdZEkBWpAZkG_1tP3w', 'scope': 'openid'}
2.925 AccessTokenResponse {
"access_token": "cGyosWOGtlA27DRvCB7bQJvXPho8MC3Gz1fm-spDJfc.S_W7cUaE6MkbV-zNBPV0MisawAdZEkBWpAZkG_1tP3w",
"expires_in": 3599,
"id_token": {
"aud": [
"8e527325-0ba8-4587-a3c7-7c27522dd147"
],
"auth_time": 1529750975,
"c_hash": "01pBMF_nfGqBse2qUpSFHA",
"exp": 1529754777,
"iat": 1529751178,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "d8621f6f-8ee0-4802-8ea5-91ee0fa9a4b0",
"nonce": "qyAm65CczJcER8OW",
"rat": 1529751175,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
2.925 phase <--<-- 5 --- UserInfo -->-->
2.925 do_user_info_request kwargs:{'state': 'jfnUiIYbjjyS40Ky', 'method': 'GET', 'authn_method': 'bearer_header', 'ctype': 'jwt'}
2.925 request {'body': None}
2.925 request_url https://oidc-certification.ory.sh:8443/userinfo
2.925 request_http_args {'headers': {'Authorization': 'Bearer cGyosWOGtlA27DRvCB7bQJvXPho8MC3Gz1fm-spDJfc.S_W7cUaE6MkbV-zNBPV0MisawAdZEkBWpAZkG_1tP3w'}}
3.058 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
3.062 OpenIDSchema {
"aud": [
"8e527325-0ba8-4587-a3c7-7c27522dd147"
],
"iss": "https://oidc-certification.ory.sh:8443/",
"sub": "[email protected]"
}
3.062 OpenIDSchema {
"aud": [
"8e527325-0ba8-4587-a3c7-7c27522dd147"
],
"iss": "https://oidc-certification.ory.sh:8443/",
"sub": "[email protected]"
}
3.063 phase <--<-- 6 --- Done -->-->
3.063 end
3.063 assertion VerifyResponse
3.063 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.063 assertion CheckAsymSignedUserInfo
3.063 condition asym-signed-userinfo: status=OK [Verifies that the UserInfo was signed with a RSA key]
3.063 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
asym-signed-userinfo: status=OK [Verifies that the UserInfo was signed with a RSA key]
Done: status=OK
============================================================
RESULT: PASSED
./OP-UserInfo-Body.txt 0000644 0000000 0000000 00000031723 13313423174 014662 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-UserInfo-Body
Test description: UserInfo Endpoint access with POST and bearer body
Timestamp: 2018-06-23T10:52:44Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.077 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.078 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.079 phase <--<-- 2 --- Registration -->-->
0.079 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.079 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#x4apJR5pv5KHKeCY"
],
"response_types": [
"code id_token"
]
}
0.238 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.239 RegistrationResponse {
"client_id": "070453ec-5c66-4086-8b6d-794b9b03c36a",
"client_secret": "B6MJ82RhngHR",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "070453ec-5c66-4086-8b6d-794b9b03c36a",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#x4apJR5pv5KHKeCY"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.239 phase <--<-- 3 --- AsyncAuthn -->-->
0.24 AuthorizationRequest {
"client_id": "070453ec-5c66-4086-8b6d-794b9b03c36a",
"nonce": "0fSpMVPMmKIY8bi6",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "7icERr6XVK18gB5I"
}
0.24 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=070453ec-5c66-4086-8b6d-794b9b03c36a&state=7icERr6XVK18gB5I&response_type=code+id_token&nonce=0fSpMVPMmKIY8bi6
0.24 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=070453ec-5c66-4086-8b6d-794b9b03c36a&state=7icERr6XVK18gB5I&response_type=code+id_token&nonce=0fSpMVPMmKIY8bi6
2.296 http args {}
2.5 response URL with fragment
2.5 response code=SrSwltTtZVuwey8vhEqQMH6eLKRT5YQ0SvSfYP282YU.02AhsDd_a84Z7jWwOvELcOOoSdoAZm_zhDeUdPL9jWs&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMDcwNDUzZWMtNWM2Ni00MDg2LThiNmQtNzk0YjliMDNjMzZhIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiTG1NdGhvQ2Z5TXNGcFRUWFE3RnNYdyIsImV4cCI6MTUyOTc1NDc2MywiaWF0IjoxNTI5NzUxMTYzLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI3M2MzOGIyOS1lMjE1LTQ3YWItYTU5Mi05YWNkMTEyMDc3ZjgiLCJub25jZSI6IjBmU3BNVlBNbUtJWThiaTYiLCJyYXQiOjE1Mjk3NTExNjIsInN1YiI6ImZvb0BiYXIuY29tIn0.PHlivWpNHUYf6Po7PWQe9DMY877-XuZKLhEgPimmbjKxPzjSBGtPYM-RW_C9p6gpCqin3cfVArraEE2P9b-ziKxqvq75eQIjyCMtQp5kNJfQpOdIYAJZl1TTRdbWOfMPcCzvL-h-GV00_sz60eTtkYj77MfXVU3XFL7a8YcYkHbttmsvHW1EWy0EaAJhRJpqXWxm_EINKd9JMLT13cFHRKGxG8VZDHYx_WAzXtOuD_Mdt4QcVLUDVYYGv69hWLx955Kpamq8dQJ2EeZmYInZ92jaStSQ7dGpDlnLmD9eAxe4jqZDWqw5Q8YnaCoY5j1NcK76xYlqfedXnM5BdBmoWRkc7V2OMlqbkkXgfl2bUkFLF3j8zBuOktnncaMz6s4KfdDsaq03BZZjBeTc16QGitzHQzesBwoVajVUa9V-0vQ_5qMCB2VBNnb4-p_lb4QRSeP6O3fw8gt53kHdJ-Pyi0sLmKaKmceQgjOj96Rdp8hvIk4CxryOdTL_Pg5FCcmN3i4VSW7ciauPl8RGszXkgFPzz1GmTITCn2u1QGoUKaZ7Ov80lrJu9fvfIS6BXvmiFUMmLhrSuLqc_J-a9TPcshIpYj0ONFXtZrgcVrnAazSbMrT6A6kAglONILSwXzOYxD3yGttloCK_mwRj_PUDeMU7onw2-Yik_7BMCyzuxzY&state=7icERr6XVK18gB5I
2.501 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMDcwNDUzZWMtNWM2Ni00MDg2LThiNmQtNzk0YjliMDNjMzZhIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiTG1NdGhvQ2Z5TXNGcFRUWFE3RnNYdyIsImV4cCI6MTUyOTc1NDc2MywiaWF0IjoxNTI5NzUxMTYzLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI3M2MzOGIyOS1lMjE1LTQ3YWItYTU5Mi05YWNkMTEyMDc3ZjgiLCJub25jZSI6IjBmU3BNVlBNbUtJWThiaTYiLCJyYXQiOjE1Mjk3NTExNjIsInN1YiI6ImZvb0BiYXIuY29tIn0.PHlivWpNHUYf6Po7PWQe9DMY877-XuZKLhEgPimmbjKxPzjSBGtPYM-RW_C9p6gpCqin3cfVArraEE2P9b-ziKxqvq75eQIjyCMtQp5kNJfQpOdIYAJZl1TTRdbWOfMPcCzvL-h-GV00_sz60eTtkYj77MfXVU3XFL7a8YcYkHbttmsvHW1EWy0EaAJhRJpqXWxm_EINKd9JMLT13cFHRKGxG8VZDHYx_WAzXtOuD_Mdt4QcVLUDVYYGv69hWLx955Kpamq8dQJ2EeZmYInZ92jaStSQ7dGpDlnLmD9eAxe4jqZDWqw5Q8YnaCoY5j1NcK76xYlqfedXnM5BdBmoWRkc7V2OMlqbkkXgfl2bUkFLF3j8zBuOktnncaMz6s4KfdDsaq03BZZjBeTc16QGitzHQzesBwoVajVUa9V-0vQ_5qMCB2VBNnb4-p_lb4QRSeP6O3fw8gt53kHdJ-Pyi0sLmKaKmceQgjOj96Rdp8hvIk4CxryOdTL_Pg5FCcmN3i4VSW7ciauPl8RGszXkgFPzz1GmTITCn2u1QGoUKaZ7Ov80lrJu9fvfIS6BXvmiFUMmLhrSuLqc_J-a9TPcshIpYj0ONFXtZrgcVrnAazSbMrT6A6kAglONILSwXzOYxD3yGttloCK_mwRj_PUDeMU7onw2-Yik_7BMCyzuxzY', 'state': '7icERr6XVK18gB5I', 'code': 'SrSwltTtZVuwey8vhEqQMH6eLKRT5YQ0SvSfYP282YU.02AhsDd_a84Z7jWwOvELcOOoSdoAZm_zhDeUdPL9jWs'}
2.58 AuthorizationResponse {
"code": "SrSwltTtZVuwey8vhEqQMH6eLKRT5YQ0SvSfYP282YU.02AhsDd_a84Z7jWwOvELcOOoSdoAZm_zhDeUdPL9jWs",
"id_token": {
"aud": [
"070453ec-5c66-4086-8b6d-794b9b03c36a"
],
"auth_time": 1529750975,
"c_hash": "LmMthoCfyMsFpTTXQ7FsXw",
"exp": 1529754763,
"iat": 1529751163,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "73c38b29-e215-47ab-a592-9acd112077f8",
"nonce": "0fSpMVPMmKIY8bi6",
"rat": 1529751162,
"sub": "[email protected]"
},
"state": "7icERr6XVK18gB5I"
}
2.58 phase <--<-- 4 --- AccessToken -->-->
2.58 --> request op_args: {'state': '7icERr6XVK18gB5I'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.58 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': '7icERr6XVK18gB5I', 'code': 'SrSwltTtZVuwey8vhEqQMH6eLKRT5YQ0SvSfYP282YU.02AhsDd_a84Z7jWwOvELcOOoSdoAZm_zhDeUdPL9jWs', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '070453ec-5c66-4086-8b6d-794b9b03c36a'}, 'state': '7icERr6XVK18gB5I'}
2.58 AccessTokenRequest {
"code": "SrSwltTtZVuwey8vhEqQMH6eLKRT5YQ0SvSfYP282YU.02AhsDd_a84Z7jWwOvELcOOoSdoAZm_zhDeUdPL9jWs",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "7icERr6XVK18gB5I"
}
2.58 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.58 request_http_args {'headers': {'Authorization': 'Basic MDcwNDUzZWMtNWM2Ni00MDg2LThiNmQtNzk0YjliMDNjMzZhOkI2TUo4MlJobmdIUg==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.58 request code=SrSwltTtZVuwey8vhEqQMH6eLKRT5YQ0SvSfYP282YU.02AhsDd_a84Z7jWwOvELcOOoSdoAZm_zhDeUdPL9jWs&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=7icERr6XVK18gB5I
2.792 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.794 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMDcwNDUzZWMtNWM2Ni00MDg2LThiNmQtNzk0YjliMDNjMzZhIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiTG1NdGhvQ2Z5TXNGcFRUWFE3RnNYdyIsImV4cCI6MTUyOTc1NDc2MywiaWF0IjoxNTI5NzUxMTY0LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI1Y2QwNjdkMy0yMDdjLTQ0YTItYjEzYS0yMmZjNWY3MDQ2ZDAiLCJub25jZSI6IjBmU3BNVlBNbUtJWThiaTYiLCJyYXQiOjE1Mjk3NTExNjIsInN1YiI6ImZvb0BiYXIuY29tIn0.HCde4lgyEUn5H21TZwa_XIkfZ0OS4r-PymNH0J-XwztcfFap1dPV3aeNoyLCcshrznNHXzWOVMlmlakW2FYra9g5qZCGMRL39L5FqtksOg0HIkGyHWWpyNQ6ZfXqVlNJoaMt_6Y8vnJaRelwjPlS7TN7FmXIXll9mPWfk60FSlDdivK-Gpoazf2IqF1gEwkqQSgLxEf9HtbKQttWyyLZlvnYh8KrAbzZ8gvSRhMj6ODoSAuUkjNFI7c-6bpy9ZCj887Ii_HIe4InIDKluMhqhNe_Vj_BU1FtciQSj_gjhOGklkJfeIEKld-pi7Uymcuc9soicZAI9I5vhqa33ms0-1gM85cmlV6j40Hu5V12yaq2K4o7d4S4SzKDLZtpb9LhPPKvwQjPGimXaA-rfMNQVg5rNQQ3MPvlWvZXtLn8TD9kUoItfC1gcSL4DTyJhlDdLbTkDpkMpb6aBctHZJVCj8TLBN3sPcmoIB2CBWpK9XF4xzw94P7DGuTN2xbhUXsJi_ov_3El_vEnbQ4QiVu5HbWy8lTi7_hLQ-jhX8h06C4LMQ44B34GyUe_7Z9_xl-Ot8INLp2vVu_sJmGeFwJ92xnCCl7JJNJ_E0IOaDcZOj7Yewos_Hy68H4ktaSEOXBPuJ8s-0MHw2XPgu1jUIusePMDfLEy9GBIqXNIuZhe0Sc', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'BwzBsbxXk56m8FexDe3NdNviAhHlvQVU6eAgd_2v1H0.cGRLaKGAP0F1fSFvr0oqnkU_snmvn8A9pRKtI5_4oi8', 'scope': 'openid'}
2.797 AccessTokenResponse {
"access_token": "BwzBsbxXk56m8FexDe3NdNviAhHlvQVU6eAgd_2v1H0.cGRLaKGAP0F1fSFvr0oqnkU_snmvn8A9pRKtI5_4oi8",
"expires_in": 3599,
"id_token": {
"aud": [
"070453ec-5c66-4086-8b6d-794b9b03c36a"
],
"auth_time": 1529750975,
"c_hash": "LmMthoCfyMsFpTTXQ7FsXw",
"exp": 1529754763,
"iat": 1529751164,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "5cd067d3-207c-44a2-b13a-22fc5f7046d0",
"nonce": "0fSpMVPMmKIY8bi6",
"rat": 1529751162,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
2.797 phase <--<-- 5 --- UserInfo -->-->
2.797 do_user_info_request kwargs:{'state': '7icERr6XVK18gB5I', 'method': 'POST', 'authn_method': 'token_in_message_body'}
2.797 request {'body': 'access_token=BwzBsbxXk56m8FexDe3NdNviAhHlvQVU6eAgd_2v1H0.cGRLaKGAP0F1fSFvr0oqnkU_snmvn8A9pRKtI5_4oi8'}
2.797 request_url https://oidc-certification.ory.sh:8443/userinfo
2.797 request_http_args {'headers': {'Content-Type': 'application/x-www-form-urlencoded'}}
2.87 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
2.871 OpenIDSchema {
"sub": "[email protected]"
}
2.871 OpenIDSchema {
"sub": "[email protected]"
}
2.871 phase <--<-- 6 --- Done -->-->
2.871 end
2.872 assertion VerifyResponse
2.872 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.872 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-redirect_uri-Query-Mismatch.txt 0000644 0000000 0000000 00000011240 13313423404 017547 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-Query-Mismatch
Test description: Rejects redirect_uri when query parameter does not match what is registed
Timestamp: 2018-06-23T10:55:00Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.08 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.081 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.081 phase <--<-- 2 --- Registration -->-->
0.082 register kwargs:{'application_name': 'OIC test tool', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'redirect_uri': ['https://op.certification.openid.net:61353/authz_cb?foo=bar']}
0.082 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#yKaAQzDIpvWxQiWS"
],
"response_types": [
"code id_token"
]
}
0.243 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.244 RegistrationResponse {
"client_id": "26460dc9-2966-41d1-ab3f-f25c7c38ad81",
"client_secret": "_zkTbI_RSVmN",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "26460dc9-2966-41d1-ab3f-f25c7c38ad81",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#yKaAQzDIpvWxQiWS"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.244 phase <--<-- 3 --- Note -->-->
============================================================
Conditions
============================================================
RESULT: PARTIAL RESULT
./OP-ClientAuth-SecretPost-Dynamic.txt 0000644 0000000 0000000 00000031204 13313423170 017736 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-ClientAuth-SecretPost-Dynamic
Test description: Access token request with client_secret_post authentication
Timestamp: 2018-06-23T10:52:40Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.074 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.076 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.076 phase <--<-- 2 --- Registration -->-->
0.076 register kwargs:{'application_name': 'OIC test tool', 'token_endpoint_auth_method': 'client_secret_post', 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'response_types': ['code id_token'], 'url': 'https://oidc-certification.ory.sh:8443/clients', 'application_type': 'web'}
0.076 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#WLZrs5ZB0BWRMPro"
],
"response_types": [
"code id_token"
],
"token_endpoint_auth_method": "client_secret_post"
}
0.237 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.237 RegistrationResponse {
"client_id": "ffa257cc-7836-4f05-9d44-bb5540e3761a",
"client_secret": "5XyfzEIlj9R3",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "ffa257cc-7836-4f05-9d44-bb5540e3761a",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#WLZrs5ZB0BWRMPro"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_post",
"userinfo_signed_response_alg": "none"
}
0.238 phase <--<-- 3 --- AsyncAuthn -->-->
0.238 AuthorizationRequest {
"client_id": "ffa257cc-7836-4f05-9d44-bb5540e3761a",
"nonce": "TgbKjihOnmvcocC5",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "fVfcyMeK1JbGCdp3"
}
0.238 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=ffa257cc-7836-4f05-9d44-bb5540e3761a&state=fVfcyMeK1JbGCdp3&response_type=code+id_token&nonce=TgbKjihOnmvcocC5
0.238 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=ffa257cc-7836-4f05-9d44-bb5540e3761a&state=fVfcyMeK1JbGCdp3&response_type=code+id_token&nonce=TgbKjihOnmvcocC5
2.357 http args {}
2.527 response URL with fragment
2.528 response code=Uv1WRHKOToE2zPWigvY6QouliyvPSsGLSgezrhK3QmA.Cn5IctMDd6zsDp3bOdAgrT2CKuIZ8Z4U5T6RGeZpcRE&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZmZhMjU3Y2MtNzgzNi00ZjA1LTlkNDQtYmI1NTQwZTM3NjFhIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiTmU3X1JxOVV2ZWRjMFJLUkVPcW83dyIsImV4cCI6MTUyOTc1NDc1OSwiaWF0IjoxNTI5NzUxMTU5LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJiY2QwNDNhNy1lMWY2LTQ3MjAtODFhMC03MTRmM2U1YTkwYzAiLCJub25jZSI6IlRnYktqaWhPbm12Y29jQzUiLCJyYXQiOjE1Mjk3NTExNTgsInN1YiI6ImZvb0BiYXIuY29tIn0.I2U6khGR1IegBEFtlA-TYYTrQmkB_IIb7iYIkJ5HFR-PAyk0h8ZtR1aaA7a166VsFyRzjtnkI0FZp4wrPCuqh0AxohAKBU3CMGJmKIpQqNVixqG2_PkK8mdKSSdte7Xf0GApBBGIdPr0oIPxKYT9pdoEOgJbKbqPygoqjPwCChaSz88tvu-diLC9BVMn81oG_J3YTytcHkkHqe4T_Rj-EF_1OqDf3SXYngJ2zgKLeSc6Bh1GQlLZrshbLXW_RfR9930fpkJ9JK3bbxUfBUSTfNB70zskQe52A988sKkQzptjpPIm1AXZpcnbgIzbQHeDhSRnGHbnjxq4eLIeO3EdMupBsI5DkrRktOHiAOgHhdGUxEwnWfEa0FLImofBGR-KLr9eIKxL-_JVXfOM-MIi1vXaBGFrcA07nm92MvTvnoFzB5JRKiwGzlNAdytvp0t-rXZyfTJZGGnA8WGNhUVHyqvTuk-9TW_S6yhUli3hQCGHR2RbT1g-DRB2KFtXj5UGN8EVnQSQEmiX4hcD8bK3t175gUpHL4nSV6l9vs3266FrV56ImcmzEdkRHCIsMjLygQT_uthqm9xD3nVsoWXkIiEXVwjCIT9scXNGQhuEdBDtHz-sBvmLXQ8tu4GLpubWNHujRifxypCWDCwU2XN5Rpb5Mn6V84hrlZhsTaGbBvw&state=fVfcyMeK1JbGCdp3
2.528 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZmZhMjU3Y2MtNzgzNi00ZjA1LTlkNDQtYmI1NTQwZTM3NjFhIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiTmU3X1JxOVV2ZWRjMFJLUkVPcW83dyIsImV4cCI6MTUyOTc1NDc1OSwiaWF0IjoxNTI5NzUxMTU5LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJiY2QwNDNhNy1lMWY2LTQ3MjAtODFhMC03MTRmM2U1YTkwYzAiLCJub25jZSI6IlRnYktqaWhPbm12Y29jQzUiLCJyYXQiOjE1Mjk3NTExNTgsInN1YiI6ImZvb0BiYXIuY29tIn0.I2U6khGR1IegBEFtlA-TYYTrQmkB_IIb7iYIkJ5HFR-PAyk0h8ZtR1aaA7a166VsFyRzjtnkI0FZp4wrPCuqh0AxohAKBU3CMGJmKIpQqNVixqG2_PkK8mdKSSdte7Xf0GApBBGIdPr0oIPxKYT9pdoEOgJbKbqPygoqjPwCChaSz88tvu-diLC9BVMn81oG_J3YTytcHkkHqe4T_Rj-EF_1OqDf3SXYngJ2zgKLeSc6Bh1GQlLZrshbLXW_RfR9930fpkJ9JK3bbxUfBUSTfNB70zskQe52A988sKkQzptjpPIm1AXZpcnbgIzbQHeDhSRnGHbnjxq4eLIeO3EdMupBsI5DkrRktOHiAOgHhdGUxEwnWfEa0FLImofBGR-KLr9eIKxL-_JVXfOM-MIi1vXaBGFrcA07nm92MvTvnoFzB5JRKiwGzlNAdytvp0t-rXZyfTJZGGnA8WGNhUVHyqvTuk-9TW_S6yhUli3hQCGHR2RbT1g-DRB2KFtXj5UGN8EVnQSQEmiX4hcD8bK3t175gUpHL4nSV6l9vs3266FrV56ImcmzEdkRHCIsMjLygQT_uthqm9xD3nVsoWXkIiEXVwjCIT9scXNGQhuEdBDtHz-sBvmLXQ8tu4GLpubWNHujRifxypCWDCwU2XN5Rpb5Mn6V84hrlZhsTaGbBvw', 'state': 'fVfcyMeK1JbGCdp3', 'code': 'Uv1WRHKOToE2zPWigvY6QouliyvPSsGLSgezrhK3QmA.Cn5IctMDd6zsDp3bOdAgrT2CKuIZ8Z4U5T6RGeZpcRE'}
2.615 AuthorizationResponse {
"code": "Uv1WRHKOToE2zPWigvY6QouliyvPSsGLSgezrhK3QmA.Cn5IctMDd6zsDp3bOdAgrT2CKuIZ8Z4U5T6RGeZpcRE",
"id_token": {
"aud": [
"ffa257cc-7836-4f05-9d44-bb5540e3761a"
],
"auth_time": 1529750975,
"c_hash": "Ne7_Rq9Uvedc0RKREOqo7w",
"exp": 1529754759,
"iat": 1529751159,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "bcd043a7-e1f6-4720-81a0-714f3e5a90c0",
"nonce": "TgbKjihOnmvcocC5",
"rat": 1529751158,
"sub": "[email protected]"
},
"state": "fVfcyMeK1JbGCdp3"
}
2.615 phase <--<-- 4 --- AccessToken -->-->
2.615 --> request op_args: {'state': 'fVfcyMeK1JbGCdp3', 'authn_method': 'client_secret_post'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.615 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'fVfcyMeK1JbGCdp3', 'code': 'Uv1WRHKOToE2zPWigvY6QouliyvPSsGLSgezrhK3QmA.Cn5IctMDd6zsDp3bOdAgrT2CKuIZ8Z4U5T6RGeZpcRE', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'ffa257cc-7836-4f05-9d44-bb5540e3761a'}, 'state': 'fVfcyMeK1JbGCdp3', 'authn_method': 'client_secret_post'}
2.615 AccessTokenRequest {
"client_id": "ffa257cc-7836-4f05-9d44-bb5540e3761a",
"client_secret": "5XyfzEIlj9R3",
"code": "Uv1WRHKOToE2zPWigvY6QouliyvPSsGLSgezrhK3QmA.Cn5IctMDd6zsDp3bOdAgrT2CKuIZ8Z4U5T6RGeZpcRE",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "fVfcyMeK1JbGCdp3"
}
2.615 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.615 request_http_args {'headers': {'Content-Type': 'application/x-www-form-urlencoded'}}
2.615 request code=Uv1WRHKOToE2zPWigvY6QouliyvPSsGLSgezrhK3QmA.Cn5IctMDd6zsDp3bOdAgrT2CKuIZ8Z4U5T6RGeZpcRE&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=ffa257cc-7836-4f05-9d44-bb5540e3761a&grant_type=authorization_code&state=fVfcyMeK1JbGCdp3&client_secret=5XyfzEIlj9R3
2.831 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.832 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZmZhMjU3Y2MtNzgzNi00ZjA1LTlkNDQtYmI1NTQwZTM3NjFhIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiTmU3X1JxOVV2ZWRjMFJLUkVPcW83dyIsImV4cCI6MTUyOTc1NDc1OSwiaWF0IjoxNTI5NzUxMTYwLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJiODE4MzA1NS04YTU5LTRlNDUtOGU0Yy0xMjc5NTc1NDFhNGEiLCJub25jZSI6IlRnYktqaWhPbm12Y29jQzUiLCJyYXQiOjE1Mjk3NTExNTgsInN1YiI6ImZvb0BiYXIuY29tIn0.hBwP7XYgqDu7zn_QF-TbfAbuZ0gauwyj4p5vImEr_25IUSyGo3dEJsFSkhV2tyzLlaeCQBb5S689MM3VWAUXphKG4Ni_pTJ-Ykknkw2x7XSJS9BZ5RNgM3cfXkjerhVAFms7BHzg4vJPPAdnCucRqhTzDaX0-yFkJDpQyK0iU-2ODe1Z0gl9vOrrk6I70dXcYwBCdo2fhLmB5B-_PrCl-qlMuMwxXiKFSNYberN4b1hUg3zIjYepsqpS9uRvBdCiB1qg4l3Ud-CxxybGYLNiYQa2ha6Pk285wDmqEC9Bwtw4mJdU8HgAnpZdMR9q2B1mlNXPJQDWdbNVvw9R9knYh0QxKkrWwposqcv2WiVS_NCGAw4FStXsx0dYEtkVb2Zc8SbsLuWNOasgCe1dbMc_RyiHNUcVBLYtpyeKu-lAZ-iBydjiSyTXMXOikp54FCR3c-sc4DPB4ok8Tz8yOdT4c4KNvC-Uf7l2auIMseyLXQmxYu_FmXXM_Ts8dqSAJPWpjS-vgj6i6Iw1cHhbugbtgNkhSaIKsEc_XF99xi6eBCACGCrF3N7me2ssc8xG-rPgP4CUNJFwbX4Ohfv_Hp0CWSz6joqqHZv10amfY-VxWyq82d6UvFfUBKKoWRyRqq1GbgP7tnUH0SbtlRZdJz0HAKuMGdrG1n13VrpQ8QKM6F4', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'ncAMt5VsqxULb_vO5fIu1vYKPwT8NC2_1gkxHIDXz74.HX2Rs6YvzDa6Kcy_FsoTxyylhWCB9-7JC6elFHBz2Tw', 'scope': 'openid'}
2.835 AccessTokenResponse {
"access_token": "ncAMt5VsqxULb_vO5fIu1vYKPwT8NC2_1gkxHIDXz74.HX2Rs6YvzDa6Kcy_FsoTxyylhWCB9-7JC6elFHBz2Tw",
"expires_in": 3599,
"id_token": {
"aud": [
"ffa257cc-7836-4f05-9d44-bb5540e3761a"
],
"auth_time": 1529750975,
"c_hash": "Ne7_Rq9Uvedc0RKREOqo7w",
"exp": 1529754759,
"iat": 1529751160,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "b8183055-8a59-4e45-8e4c-127957541a4a",
"nonce": "TgbKjihOnmvcocC5",
"rat": 1529751158,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
2.835 phase <--<-- 5 --- Done -->-->
2.835 end
2.836 assertion VerifyResponse
2.836 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.836 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-nonce-noncode.txt 0000644 0000000 0000000 00000031266 13313423257 014766 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-nonce-noncode
Test description: Request with nonce, verifies it was returned in ID Token [Implicit, Hybrid]
Timestamp: 2018-06-23T10:53:35Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.083 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.085 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.085 phase <--<-- 2 --- Registration -->-->
0.085 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.085 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#vzPzLHB6z9sH2t9P"
],
"response_types": [
"code id_token"
]
}
0.284 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.285 RegistrationResponse {
"client_id": "5c4259c1-4c26-4419-888d-b5d77faa9366",
"client_secret": "cBBvKtL9yA7D",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "5c4259c1-4c26-4419-888d-b5d77faa9366",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#vzPzLHB6z9sH2t9P"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.285 phase <--<-- 3 --- AsyncAuthn -->-->
0.285 AuthorizationRequest {
"client_id": "5c4259c1-4c26-4419-888d-b5d77faa9366",
"nonce": "DmrkBKhNbhmv1Wip",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "xoCIUh5vSWiABf3m"
}
0.285 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=5c4259c1-4c26-4419-888d-b5d77faa9366&state=xoCIUh5vSWiABf3m&response_type=code+id_token&nonce=DmrkBKhNbhmv1Wip
0.285 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=5c4259c1-4c26-4419-888d-b5d77faa9366&state=xoCIUh5vSWiABf3m&response_type=code+id_token&nonce=DmrkBKhNbhmv1Wip
2.536 http args {}
2.706 response URL with fragment
2.707 response code=JiFti5AYMRG6l5Sx5J6qmKbyKK57F3w94n_eut4qZHM.MmOqyknmcw-lmZxZ_AIuZRRc3TxPOSvEKpxTNz956-g&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNWM0MjU5YzEtNGMyNi00NDE5LTg4OGQtYjVkNzdmYWE5MzY2Il0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiajJUOGtaSFdMNkpjSWhIN1BRUThpZyIsImV4cCI6MTUyOTc1NDgxNSwiaWF0IjoxNTI5NzUxMjE1LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI4Yjg3ZjE3Zi01OWNlLTQ2MTctOWJkNC1lNTYwYTVlYWYwOGMiLCJub25jZSI6IkRtcmtCS2hOYmhtdjFXaXAiLCJyYXQiOjE1Mjk3NTEyMTMsInN1YiI6ImZvb0BiYXIuY29tIn0.Qh1XXmuykLpQ-1QOd7VPpegg_zFaNI1EZAUPgx_wJ36b-FgiOuaBvc0NtslHmb6rXA-b7mXESQuKB9o3Ic7-2ruE6y1WOxue-8NpuLrJBPBF9o0UsVZyit_3J0VTNPJBy_WSIQHXo119zhKqJBRBa8IrLkpQk6b7LnV9OnIkVBAHGyekltWBZ8cDH0cPqNsPjzwAi_Ct-GmQvl4eACnLVftM6mdWvxnTfr7jEv1SmpDO37c5SHRUCVfgr9hoO77GEj4aIgQASxZm7wJpG_yWN5XrGpJPHaxfe3KBjYTmuEMGkPKIjXPCbBePRw3jcnLOtM6EfohEnBnzDsF1PLiffppru4WaDpyfOrbIRpAOi6U58lI8J_oPWqGcbkakGTnh5sRiDwCvJIMWZ-1RXjVjQIVVCpBdjPQV115FSigbsiHbvowYbsvxdXWXpy5z_KN0ziZtSx67QiQcB3H88QArw92Hga2pC4pk_6x2ICC6RKgL-gQxqN2ieqzhjufE26DFuJyjUVwRFtbhq2o8XhPjofjXn0E0_7-mSHcySjMhQOFm122SVJ2F0VaaXzwc-Vpa-LmRSHHSAYdD-ns9aksB5RZnJWf_queO5HNw40f5VIHpC5yCHvtFZn7YkzM43qbH8L7cDwmrNC72GMbyYfgMCa3sGrkU7QFhGMdQZoznVe0&state=xoCIUh5vSWiABf3m
2.707 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNWM0MjU5YzEtNGMyNi00NDE5LTg4OGQtYjVkNzdmYWE5MzY2Il0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiajJUOGtaSFdMNkpjSWhIN1BRUThpZyIsImV4cCI6MTUyOTc1NDgxNSwiaWF0IjoxNTI5NzUxMjE1LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI4Yjg3ZjE3Zi01OWNlLTQ2MTctOWJkNC1lNTYwYTVlYWYwOGMiLCJub25jZSI6IkRtcmtCS2hOYmhtdjFXaXAiLCJyYXQiOjE1Mjk3NTEyMTMsInN1YiI6ImZvb0BiYXIuY29tIn0.Qh1XXmuykLpQ-1QOd7VPpegg_zFaNI1EZAUPgx_wJ36b-FgiOuaBvc0NtslHmb6rXA-b7mXESQuKB9o3Ic7-2ruE6y1WOxue-8NpuLrJBPBF9o0UsVZyit_3J0VTNPJBy_WSIQHXo119zhKqJBRBa8IrLkpQk6b7LnV9OnIkVBAHGyekltWBZ8cDH0cPqNsPjzwAi_Ct-GmQvl4eACnLVftM6mdWvxnTfr7jEv1SmpDO37c5SHRUCVfgr9hoO77GEj4aIgQASxZm7wJpG_yWN5XrGpJPHaxfe3KBjYTmuEMGkPKIjXPCbBePRw3jcnLOtM6EfohEnBnzDsF1PLiffppru4WaDpyfOrbIRpAOi6U58lI8J_oPWqGcbkakGTnh5sRiDwCvJIMWZ-1RXjVjQIVVCpBdjPQV115FSigbsiHbvowYbsvxdXWXpy5z_KN0ziZtSx67QiQcB3H88QArw92Hga2pC4pk_6x2ICC6RKgL-gQxqN2ieqzhjufE26DFuJyjUVwRFtbhq2o8XhPjofjXn0E0_7-mSHcySjMhQOFm122SVJ2F0VaaXzwc-Vpa-LmRSHHSAYdD-ns9aksB5RZnJWf_queO5HNw40f5VIHpC5yCHvtFZn7YkzM43qbH8L7cDwmrNC72GMbyYfgMCa3sGrkU7QFhGMdQZoznVe0', 'state': 'xoCIUh5vSWiABf3m', 'code': 'JiFti5AYMRG6l5Sx5J6qmKbyKK57F3w94n_eut4qZHM.MmOqyknmcw-lmZxZ_AIuZRRc3TxPOSvEKpxTNz956-g'}
2.791 AuthorizationResponse {
"code": "JiFti5AYMRG6l5Sx5J6qmKbyKK57F3w94n_eut4qZHM.MmOqyknmcw-lmZxZ_AIuZRRc3TxPOSvEKpxTNz956-g",
"id_token": {
"aud": [
"5c4259c1-4c26-4419-888d-b5d77faa9366"
],
"auth_time": 1529750975,
"c_hash": "j2T8kZHWL6JcIhH7PQQ8ig",
"exp": 1529754815,
"iat": 1529751215,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "8b87f17f-59ce-4617-9bd4-e560a5eaf08c",
"nonce": "DmrkBKhNbhmv1Wip",
"rat": 1529751213,
"sub": "[email protected]"
},
"state": "xoCIUh5vSWiABf3m"
}
2.792 phase <--<-- 4 --- AccessToken -->-->
2.792 --> request op_args: {'state': 'xoCIUh5vSWiABf3m'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.792 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'xoCIUh5vSWiABf3m', 'code': 'JiFti5AYMRG6l5Sx5J6qmKbyKK57F3w94n_eut4qZHM.MmOqyknmcw-lmZxZ_AIuZRRc3TxPOSvEKpxTNz956-g', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '5c4259c1-4c26-4419-888d-b5d77faa9366'}, 'state': 'xoCIUh5vSWiABf3m'}
2.792 AccessTokenRequest {
"code": "JiFti5AYMRG6l5Sx5J6qmKbyKK57F3w94n_eut4qZHM.MmOqyknmcw-lmZxZ_AIuZRRc3TxPOSvEKpxTNz956-g",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "xoCIUh5vSWiABf3m"
}
2.792 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.792 request_http_args {'headers': {'Authorization': 'Basic NWM0MjU5YzEtNGMyNi00NDE5LTg4OGQtYjVkNzdmYWE5MzY2OmNCQnZLdEw5eUE3RA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.792 request code=JiFti5AYMRG6l5Sx5J6qmKbyKK57F3w94n_eut4qZHM.MmOqyknmcw-lmZxZ_AIuZRRc3TxPOSvEKpxTNz956-g&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=xoCIUh5vSWiABf3m
3.004 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.005 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNWM0MjU5YzEtNGMyNi00NDE5LTg4OGQtYjVkNzdmYWE5MzY2Il0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiajJUOGtaSFdMNkpjSWhIN1BRUThpZyIsImV4cCI6MTUyOTc1NDgxNSwiaWF0IjoxNTI5NzUxMjE1LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiIzMTVmMmI2MS02ZTQ1LTQ2YTUtOWZiNi00ZTM0MWUyNDI0MzIiLCJub25jZSI6IkRtcmtCS2hOYmhtdjFXaXAiLCJyYXQiOjE1Mjk3NTEyMTMsInN1YiI6ImZvb0BiYXIuY29tIn0.VYbF3VoPLAmco6q7X8a6_ooX9Xelf5PPks_Q11THHhpCxxyIxman5xJep28Ld72YL1060r-jIm55g_jOiFNXW3l7E2ZHL2H5sLK8LCHOajWY2vpNZitFDfGosfuUN-wV37pEATlvT4XA56nmHq-6nXFI2ml7dBsCPcL7RO7sBeU8pTsxRCh8ELgYE6osCA0qFeSF2PQqAehips3tQl5ne8pDA9Gu3I97_ZGLNoN2coI3GIHOqnULNKlNHzL76lOSGlCDtkdIh77cfL9CkJALUSiyOoxKg0-vfQeWn9dZTW_xYRRAQBAErvybGzArJam7L-qiozec2MSwkOf2sFVtkyd5PBcR9q-8YeHvyAooySmtX726hzWGqQ-4JpEc4bAbCTKwVGvA32TbBQGdSsp2l-CagpV43-_fLCvH3LOma27b_5P_SOxOoLKzkkWkXF1k2KT9qIsM4o4GI4OHPQ6HoghITxFD4pel-Aw6aFlyiC-a_9VGlLgJj4oAgn2wiSm5XAJT_rGmyZqz8m3o1WuNlrlYGwbSllmFVRlWIz2Fq8bmIxX5bHQA9vtOS3nSU33P3zUoxqKFSR4EyLm1xfWySAbouacwAXQ282L-YxQpN5hkONL4zPen9Qd_MZKWm8qldPdSCdXYQBZ8WeU5OmjRBXexBts9VHWKbnqLkkbtKqc', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'Op17Wlqgi8U-SmNzHr_8DBuTdk6poKacKhU1aRX3ix8.zSi_kqAQZvNQxfxF4UzDLcfHw6pBwC6UVHex6cUc83E', 'scope': 'openid'}
3.008 AccessTokenResponse {
"access_token": "Op17Wlqgi8U-SmNzHr_8DBuTdk6poKacKhU1aRX3ix8.zSi_kqAQZvNQxfxF4UzDLcfHw6pBwC6UVHex6cUc83E",
"expires_in": 3599,
"id_token": {
"aud": [
"5c4259c1-4c26-4419-888d-b5d77faa9366"
],
"auth_time": 1529750975,
"c_hash": "j2T8kZHWL6JcIhH7PQQ8ig",
"exp": 1529754815,
"iat": 1529751215,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "315f2b61-6e45-46a5-9fb6-4e341e242432",
"nonce": "DmrkBKhNbhmv1Wip",
"rat": 1529751213,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.008 phase <--<-- 5 --- Done -->-->
3.008 end
3.009 assertion VerifyResponse
3.009 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.009 assertion CheckIdTokenNonce
3.009 condition check-idtoken-nonce: status=OK [Verify that the nonce in the IDToken is the same that's included in the Authorization Request.]
3.009 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
check-idtoken-nonce: status=OK [Verify that the nonce in the IDToken is the same that's included in the Authorization Request.]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Registration-jwks.txt 0000644 0000000 0000000 00000045264 13313423112 015660 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-jwks
Test description: Uses keys registered with jwks value
Timestamp: 2018-06-23T10:51:54Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.111 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.112 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.112 phase <--<-- 2 --- Registration -->-->
0.113 register kwargs:{'application_name': 'OIC test tool', 'jwks': {'keys': [{'use': 'enc', 'kty': 'RSA', 'n': 'pKXuY5tuT9ibmEcq4B6VRx3MafdSsajrOndAk5FjJFedlA6qSpdqDUr9wWUkNeO8h_efdLfg43CHXk3mH6Fp1t2gbHzBQ4-SzT3_X5tsdG2PPqvngem7f5NHO6Kefhq11Zk5q4-FyTL9FUQQW6ZANbrU7GifSAs82Ck20ciIvFdv7cPCphk_THMVv14aW5w0eKEXumgx4Bc7HrQFXQUHSze3dVAKg8hKHDIQOGUU0fkolEFmOC4Gb-G57RpBJryZxXqgdUdEG66xl1f37tqpYgaLViFDWDiI8S7BMVHEbGHN4-f_MD9f6gMduaxrL6a6SfyIW1So2VqtvlAyanesTw', 'e': 'AQAB', 'kid': 'gtH4v3Yr2QqLreBSz0ByQQ8vkf8eFo1KIit3s-3Bbww'}, {'use': 'sig', 'kty': 'RSA', 'n': '1Z8lhYNb0tHZsVrzIQs-JetNCLIBWeOHXblcirxQgFLt6z4Rr-9vxPbEsrmRmZbPuuoL8nGehqOK11LAgqa1QfCR4TKxr2srlbTv4A4Gyf-suhO_KKt0JWv2q9olREZcoIE4FCwK0vuWTqD5q4qL_uqt_kHltzhdkJ4LySdCRCbxG1kcEcXoPNIhZERttqbZTIQviJxJ2HqC7CbwocmZMnbMAzP52bVX86vLxosmI-pqkG1RG8jMTZMhvc2GmYe6CfleW7bRxS0078sWDM_iACSQVOqLk5rcW_C-a61EYzNNN7BMw-VxFSDtoGgNgb6XGM6FTf9fkdJjIRL2VZAt0Q', 'e': 'AQAB', 'kid': 'wt25OgyR_nzG3OoQ7daa2rL6-gMnFdfRzBjhUVPu8RQ'}, {'x': 'aruz0ufjUGuEQwg2Q3ewyy5DnEIWWmIEO5stN8MfUTA', 'use': 'sig', 'kty': 'EC', 'y': 'dZnZMUOQAvzOD6q1f11PEho4-aX7nWdmive8zdxUbrA', 'crv': 'P-256', 'kid': 'AZXCzT401BtqezIxAdHOEez1ApQUu3O5hjcfRFKxXtQ'}, {'x': 'AeI9gyN_hcFae8vO2HgaH7Fh-MVX1YXJdWg-T16g1kM', 'use': 'enc', 'kty': 'EC', 'y': '5ASt8rCvPWTKMAh6wvR8_-OEbl_9TTkkgAd7LXW8H48', 'crv': 'P-256', 'kid': 'CrXNdVSdrZ-lOToSPso6OlcZnP-Et4U9CzOIZOZPvLw'}]}, 'token_endpoint_auth_method': 'private_key_jwt', 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'grant_types': ['authorization_code', 'implicit'], 'response_types': ['code id_token'], 'url': 'https://oidc-certification.ory.sh:8443/clients', 'application_type': 'web'}
0.114 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks": {
"keys": [
{
"e": "AQAB",
"kid": "gtH4v3Yr2QqLreBSz0ByQQ8vkf8eFo1KIit3s-3Bbww",
"kty": "RSA",
"n": "pKXuY5tuT9ibmEcq4B6VRx3MafdSsajrOndAk5FjJFedlA6qSpdqDUr9wWUkNeO8h_efdLfg43CHXk3mH6Fp1t2gbHzBQ4-SzT3_X5tsdG2PPqvngem7f5NHO6Kefhq11Zk5q4-FyTL9FUQQW6ZANbrU7GifSAs82Ck20ciIvFdv7cPCphk_THMVv14aW5w0eKEXumgx4Bc7HrQFXQUHSze3dVAKg8hKHDIQOGUU0fkolEFmOC4Gb-G57RpBJryZxXqgdUdEG66xl1f37tqpYgaLViFDWDiI8S7BMVHEbGHN4-f_MD9f6gMduaxrL6a6SfyIW1So2VqtvlAyanesTw",
"use": "enc"
},
{
"e": "AQAB",
"kid": "wt25OgyR_nzG3OoQ7daa2rL6-gMnFdfRzBjhUVPu8RQ",
"kty": "RSA",
"n": "1Z8lhYNb0tHZsVrzIQs-JetNCLIBWeOHXblcirxQgFLt6z4Rr-9vxPbEsrmRmZbPuuoL8nGehqOK11LAgqa1QfCR4TKxr2srlbTv4A4Gyf-suhO_KKt0JWv2q9olREZcoIE4FCwK0vuWTqD5q4qL_uqt_kHltzhdkJ4LySdCRCbxG1kcEcXoPNIhZERttqbZTIQviJxJ2HqC7CbwocmZMnbMAzP52bVX86vLxosmI-pqkG1RG8jMTZMhvc2GmYe6CfleW7bRxS0078sWDM_iACSQVOqLk5rcW_C-a61EYzNNN7BMw-VxFSDtoGgNgb6XGM6FTf9fkdJjIRL2VZAt0Q",
"use": "sig"
},
{
"crv": "P-256",
"kid": "AZXCzT401BtqezIxAdHOEez1ApQUu3O5hjcfRFKxXtQ",
"kty": "EC",
"use": "sig",
"x": "aruz0ufjUGuEQwg2Q3ewyy5DnEIWWmIEO5stN8MfUTA",
"y": "dZnZMUOQAvzOD6q1f11PEho4-aX7nWdmive8zdxUbrA"
},
{
"crv": "P-256",
"kid": "CrXNdVSdrZ-lOToSPso6OlcZnP-Et4U9CzOIZOZPvLw",
"kty": "EC",
"use": "enc",
"x": "AeI9gyN_hcFae8vO2HgaH7Fh-MVX1YXJdWg-T16g1kM",
"y": "5ASt8rCvPWTKMAh6wvR8_-OEbl_9TTkkgAd7LXW8H48"
}
]
},
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Tzh286Wml5K27qZH"
],
"response_types": [
"code id_token"
],
"token_endpoint_auth_method": "private_key_jwt"
}
0.307 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.308 RegistrationResponse {
"client_id": "7dee9676-da0d-4809-9064-eb419417ed42",
"client_secret": "45YFASTQezfu",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "7dee9676-da0d-4809-9064-eb419417ed42",
"jwks": {
"keys": [
{
"e": "AQAB",
"kid": "gtH4v3Yr2QqLreBSz0ByQQ8vkf8eFo1KIit3s-3Bbww",
"kty": "RSA",
"n": "pKXuY5tuT9ibmEcq4B6VRx3MafdSsajrOndAk5FjJFedlA6qSpdqDUr9wWUkNeO8h_efdLfg43CHXk3mH6Fp1t2gbHzBQ4-SzT3_X5tsdG2PPqvngem7f5NHO6Kefhq11Zk5q4-FyTL9FUQQW6ZANbrU7GifSAs82Ck20ciIvFdv7cPCphk_THMVv14aW5w0eKEXumgx4Bc7HrQFXQUHSze3dVAKg8hKHDIQOGUU0fkolEFmOC4Gb-G57RpBJryZxXqgdUdEG66xl1f37tqpYgaLViFDWDiI8S7BMVHEbGHN4-f_MD9f6gMduaxrL6a6SfyIW1So2VqtvlAyanesTw",
"use": "enc"
},
{
"e": "AQAB",
"kid": "wt25OgyR_nzG3OoQ7daa2rL6-gMnFdfRzBjhUVPu8RQ",
"kty": "RSA",
"n": "1Z8lhYNb0tHZsVrzIQs-JetNCLIBWeOHXblcirxQgFLt6z4Rr-9vxPbEsrmRmZbPuuoL8nGehqOK11LAgqa1QfCR4TKxr2srlbTv4A4Gyf-suhO_KKt0JWv2q9olREZcoIE4FCwK0vuWTqD5q4qL_uqt_kHltzhdkJ4LySdCRCbxG1kcEcXoPNIhZERttqbZTIQviJxJ2HqC7CbwocmZMnbMAzP52bVX86vLxosmI-pqkG1RG8jMTZMhvc2GmYe6CfleW7bRxS0078sWDM_iACSQVOqLk5rcW_C-a61EYzNNN7BMw-VxFSDtoGgNgb6XGM6FTf9fkdJjIRL2VZAt0Q",
"use": "sig"
},
{
"crv": "P-256",
"kid": "AZXCzT401BtqezIxAdHOEez1ApQUu3O5hjcfRFKxXtQ",
"kty": "EC",
"use": "sig",
"x": "aruz0ufjUGuEQwg2Q3ewyy5DnEIWWmIEO5stN8MfUTA",
"y": "dZnZMUOQAvzOD6q1f11PEho4-aX7nWdmive8zdxUbrA"
},
{
"crv": "P-256",
"kid": "CrXNdVSdrZ-lOToSPso6OlcZnP-Et4U9CzOIZOZPvLw",
"kty": "EC",
"use": "enc",
"x": "AeI9gyN_hcFae8vO2HgaH7Fh-MVX1YXJdWg-T16g1kM",
"y": "5ASt8rCvPWTKMAh6wvR8_-OEbl_9TTkkgAd7LXW8H48"
}
]
},
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Tzh286Wml5K27qZH"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "private_key_jwt",
"userinfo_signed_response_alg": "none"
}
0.308 phase <--<-- 3 --- AsyncAuthn -->-->
0.308 AuthorizationRequest {
"client_id": "7dee9676-da0d-4809-9064-eb419417ed42",
"nonce": "wImxpPwpNL4O4Jwg",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "iG2I1RwoIvp4IyqP"
}
0.308 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=7dee9676-da0d-4809-9064-eb419417ed42&state=iG2I1RwoIvp4IyqP&response_type=code+id_token&nonce=wImxpPwpNL4O4Jwg
0.308 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=7dee9676-da0d-4809-9064-eb419417ed42&state=iG2I1RwoIvp4IyqP&response_type=code+id_token&nonce=wImxpPwpNL4O4Jwg
2.716 http args {}
2.949 response URL with fragment
2.949 response code=o6H3qrdlC4nsw3HQUiG_oG2u-zhhrl57kSlx-0cUJCw.Zn4NlFwPWHd28eWgzYm9AOiqvJ710IkILd9bFUxWzck&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiN2RlZTk2NzYtZGEwZC00ODA5LTkwNjQtZWI0MTk0MTdlZDQyIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiM2pyT1RKeTh1OE1YRjJ6eFFLWkN4QSIsImV4cCI6MTUyOTc1NDcxMywiaWF0IjoxNTI5NzUxMTEzLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI5YzFhM2FiZS01MmFhLTQxOTUtOGY5OS04NTVjOGJjMTE0ZjMiLCJub25jZSI6IndJbXhwUHdwTkw0TzRKd2ciLCJyYXQiOjE1Mjk3NTExMTEsInN1YiI6ImZvb0BiYXIuY29tIn0.Qt1poXWgklvggyQmE-Tqmpsu2dpAh0iqGXfDasTb_2YEdumklrF4RbdZ8EaG7c2hwnr_j63-qIdmC_R9DJxbw5gVUtH7lcOQiFIdZkEvA1_n1DIq7Mqr6SNLh89q_MwcLdGh5Jbfyh9fe7ukZpq8ANRkS3DJzWcnbBfEz5Wu_M2OJ8Quj1J60emDfDzOQh9yMab6xJ_S-tC8LKafVhzwmTc5MpMlkhTCZeTnO8fQwteP-4r7wN7KRAPOVOM0EZNRrmHqvD-vg91lL-XDf0tgr4Hu-Ja7QcJxs-I6-FE2vggGh7YNoKOxmZrxSOIIJekLcgaSo2teDo7Q7FQ8ZISWzHVlKWZzYQekDn1riya6JQ374F_ZIWsCmEXH5g5ghbfXcH_k3mo-wlSK04VcwaV85CMbFpSWFxsJNSK4DluZXJF4D5CFCPhJMsIUDaoih4S8ubSBIQhKQtGtJjuH6-3qnv9qU4Th1lOSYJAqmPoc9PqUuxXPMza3Vt-d1pPc5BvBYw-rZNibPBEoSmJJqGxUjLzLYLKocqdGCCIFtNL1lLFURCg0FNKa_v8WPYGucgWTZ_XBeaROKcghPbyNNaohsYBCnORrydRId1TQWEbaYIQyzc6A6SSycPSmxYdJ59cqdHFzJK-i0PqRdkC5risrh_yv_P0frUeqQQLQg_r5px0&state=iG2I1RwoIvp4IyqP
2.95 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiN2RlZTk2NzYtZGEwZC00ODA5LTkwNjQtZWI0MTk0MTdlZDQyIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiM2pyT1RKeTh1OE1YRjJ6eFFLWkN4QSIsImV4cCI6MTUyOTc1NDcxMywiaWF0IjoxNTI5NzUxMTEzLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI5YzFhM2FiZS01MmFhLTQxOTUtOGY5OS04NTVjOGJjMTE0ZjMiLCJub25jZSI6IndJbXhwUHdwTkw0TzRKd2ciLCJyYXQiOjE1Mjk3NTExMTEsInN1YiI6ImZvb0BiYXIuY29tIn0.Qt1poXWgklvggyQmE-Tqmpsu2dpAh0iqGXfDasTb_2YEdumklrF4RbdZ8EaG7c2hwnr_j63-qIdmC_R9DJxbw5gVUtH7lcOQiFIdZkEvA1_n1DIq7Mqr6SNLh89q_MwcLdGh5Jbfyh9fe7ukZpq8ANRkS3DJzWcnbBfEz5Wu_M2OJ8Quj1J60emDfDzOQh9yMab6xJ_S-tC8LKafVhzwmTc5MpMlkhTCZeTnO8fQwteP-4r7wN7KRAPOVOM0EZNRrmHqvD-vg91lL-XDf0tgr4Hu-Ja7QcJxs-I6-FE2vggGh7YNoKOxmZrxSOIIJekLcgaSo2teDo7Q7FQ8ZISWzHVlKWZzYQekDn1riya6JQ374F_ZIWsCmEXH5g5ghbfXcH_k3mo-wlSK04VcwaV85CMbFpSWFxsJNSK4DluZXJF4D5CFCPhJMsIUDaoih4S8ubSBIQhKQtGtJjuH6-3qnv9qU4Th1lOSYJAqmPoc9PqUuxXPMza3Vt-d1pPc5BvBYw-rZNibPBEoSmJJqGxUjLzLYLKocqdGCCIFtNL1lLFURCg0FNKa_v8WPYGucgWTZ_XBeaROKcghPbyNNaohsYBCnORrydRId1TQWEbaYIQyzc6A6SSycPSmxYdJ59cqdHFzJK-i0PqRdkC5risrh_yv_P0frUeqQQLQg_r5px0', 'state': 'iG2I1RwoIvp4IyqP', 'code': 'o6H3qrdlC4nsw3HQUiG_oG2u-zhhrl57kSlx-0cUJCw.Zn4NlFwPWHd28eWgzYm9AOiqvJ710IkILd9bFUxWzck'}
3.036 AuthorizationResponse {
"code": "o6H3qrdlC4nsw3HQUiG_oG2u-zhhrl57kSlx-0cUJCw.Zn4NlFwPWHd28eWgzYm9AOiqvJ710IkILd9bFUxWzck",
"id_token": {
"aud": [
"7dee9676-da0d-4809-9064-eb419417ed42"
],
"auth_time": 1529750975,
"c_hash": "3jrOTJy8u8MXF2zxQKZCxA",
"exp": 1529754713,
"iat": 1529751113,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "9c1a3abe-52aa-4195-8f99-855c8bc114f3",
"nonce": "wImxpPwpNL4O4Jwg",
"rat": 1529751111,
"sub": "[email protected]"
},
"state": "iG2I1RwoIvp4IyqP"
}
3.036 phase <--<-- 4 --- AccessToken -->-->
3.036 --> request op_args: {'state': 'iG2I1RwoIvp4IyqP', 'authn_method': 'private_key_jwt'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.036 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'iG2I1RwoIvp4IyqP', 'code': 'o6H3qrdlC4nsw3HQUiG_oG2u-zhhrl57kSlx-0cUJCw.Zn4NlFwPWHd28eWgzYm9AOiqvJ710IkILd9bFUxWzck', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '7dee9676-da0d-4809-9064-eb419417ed42'}, 'state': 'iG2I1RwoIvp4IyqP', 'authn_method': 'private_key_jwt'}
3.036 AccessTokenRequest {
"client_assertion": "eyJhbGciOiJSUzI1NiIsImtpZCI6Ind0MjVPZ3lSX256RzNPb1E3ZGFhMnJMNi1nTW5GZGZSekJqaFVWUHU4UlEifQ.eyJpc3MiOiAiN2RlZTk2NzYtZGEwZC00ODA5LTkwNjQtZWI0MTk0MTdlZDQyIiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiN2RlZTk2NzYtZGEwZC00ODA5LTkwNjQtZWI0MTk0MTdlZDQyIiwgImlhdCI6IDE1Mjk3NTExMTQsICJqdGkiOiAiQzlCVTNtZGw2OFJUem12ZGRJUzlBQmIxR2wwdnBFWGkiLCAiZXhwIjogMTUyOTc1MTcxNH0.CM71wCmqp9i3fIb5dqBNj9PyyVVoWRCBTvkg8O8bpn1IVTBbDU3MTFG7vlZHh8zylobLyWWYt7f4DDSQM3Gc7kcwauq4QuEc_g-VwIKJIKzX00Yo_nldxJK44wI4Tj7PcL_cNsvGUh4vh4WTYKCLMS2q6unDdoh_Y8FrSvUdxgYD3KbTsKiuLENmf0x2owvIGPsv3uFB07C09Qvx_UY1S-62Q_1kwR4-FMRS5R6PU7o7YgWBOxT36QUbsn60KLjYPM4zSiIXI6n6JSId-0GygbS9i1AB1sN9VKrsYjbb8uP2rvaC1pVgvVPXW-_BBQD-xaLNcBam1wOSyfBa9rhmOg",
"client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer",
"code": "o6H3qrdlC4nsw3HQUiG_oG2u-zhhrl57kSlx-0cUJCw.Zn4NlFwPWHd28eWgzYm9AOiqvJ710IkILd9bFUxWzck",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "iG2I1RwoIvp4IyqP"
}
3.039 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.039 request_http_args {'headers': {'Content-Type': 'application/x-www-form-urlencoded'}}
3.039 request code=o6H3qrdlC4nsw3HQUiG_oG2u-zhhrl57kSlx-0cUJCw.Zn4NlFwPWHd28eWgzYm9AOiqvJ710IkILd9bFUxWzck&client_assertion_type=urn%3Aietf%3Aparams%3Aoauth%3Aclient-assertion-type%3Ajwt-bearer&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=iG2I1RwoIvp4IyqP&client_assertion=eyJhbGciOiJSUzI1NiIsImtpZCI6Ind0MjVPZ3lSX256RzNPb1E3ZGFhMnJMNi1nTW5GZGZSekJqaFVWUHU4UlEifQ.eyJpc3MiOiAiN2RlZTk2NzYtZGEwZC00ODA5LTkwNjQtZWI0MTk0MTdlZDQyIiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiN2RlZTk2NzYtZGEwZC00ODA5LTkwNjQtZWI0MTk0MTdlZDQyIiwgImlhdCI6IDE1Mjk3NTExMTQsICJqdGkiOiAiQzlCVTNtZGw2OFJUem12ZGRJUzlBQmIxR2wwdnBFWGkiLCAiZXhwIjogMTUyOTc1MTcxNH0.CM71wCmqp9i3fIb5dqBNj9PyyVVoWRCBTvkg8O8bpn1IVTBbDU3MTFG7vlZHh8zylobLyWWYt7f4DDSQM3Gc7kcwauq4QuEc_g-VwIKJIKzX00Yo_nldxJK44wI4Tj7PcL_cNsvGUh4vh4WTYKCLMS2q6unDdoh_Y8FrSvUdxgYD3KbTsKiuLENmf0x2owvIGPsv3uFB07C09Qvx_UY1S-62Q_1kwR4-FMRS5R6PU7o7YgWBOxT36QUbsn60KLjYPM4zSiIXI6n6JSId-0GygbS9i1AB1sN9VKrsYjbb8uP2rvaC1pVgvVPXW-_BBQD-xaLNcBam1wOSyfBa9rhmOg
3.21 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.211 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiN2RlZTk2NzYtZGEwZC00ODA5LTkwNjQtZWI0MTk0MTdlZDQyIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiM2pyT1RKeTh1OE1YRjJ6eFFLWkN4QSIsImV4cCI6MTUyOTc1NDcxMywiaWF0IjoxNTI5NzUxMTE0LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI0YjFkOTRjMC01ZmFlLTRlY2EtOGIwYS03OTUyY2U1MTE5MDEiLCJub25jZSI6IndJbXhwUHdwTkw0TzRKd2ciLCJyYXQiOjE1Mjk3NTExMTEsInN1YiI6ImZvb0BiYXIuY29tIn0.ju-bVJjC-QTqTFCObVWO1JYedANDGgs-oN_nRQXPIzakHGQWhtNIv03s6ttOeenyR9BYYa8CjNd7Eq7VCGSSaU2-U771Ci9p-RyGu8QYOxbEsqkXgeC3gWVMScrw8kbShY_THmbVRbWGLsBtTeUlj9TSDwdD9ABsCR5Di51wvCm0yZTa4xOHFtexwPA0Wtg1GiGhg0AOYA8c7SewdEKlvQ-r4v2_zB1fR-Ef2L2HwDGPJd0HffaWQ-xiBTWHTTaGvn-CI5JTbEbTQftHsLnusNX-QoHMp3v6zPD1ebKQnStmK2YcB4ELCpTLbPBjcqsDkG_iW9nNqaYbbk8LxobJf47TDm6lCsO9CYELK-bh8LgOhOsyAfiTgcZbBotTm8b8_WnldcYek3QQRU2F-KofROce9rex36DwQrZS_5YrkSGC3iQBudy0TUYG3W8CHpyvCSPSEPfflnBy9sROJvMSkpQQ0uVtl9jtnW5gwbjYvDSr8PxPivmdjjGF_rM_pg_P6lx3KWG5VDci-l7V8VzJgXHy8oITXKwvyBkmbLsnVkqnqlGYVWZHGHCjBNRE62TrnG7ZFy-znXC0_qc1FFkjhsjDSg15I4JmczgZ45WC4ONMjmWbgLBrMMmuhQyJ17wW5TQXr1qxRZeQeghFMgOo9fLJ3BX-270zUyUAN6blba4', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'g0TWISgJtWGuUD2BHhqFywSzfnH82uw3xrVzbOPA384.YlK0CO23-p72i90TgsOYV5Wz_igqflQmoz6lLvHGueo', 'scope': 'openid'}
3.215 AccessTokenResponse {
"access_token": "g0TWISgJtWGuUD2BHhqFywSzfnH82uw3xrVzbOPA384.YlK0CO23-p72i90TgsOYV5Wz_igqflQmoz6lLvHGueo",
"expires_in": 3599,
"id_token": {
"aud": [
"7dee9676-da0d-4809-9064-eb419417ed42"
],
"auth_time": 1529750975,
"c_hash": "3jrOTJy8u8MXF2zxQKZCxA",
"exp": 1529754713,
"iat": 1529751114,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "4b1d94c0-5fae-4eca-8b0a-7952ce511901",
"nonce": "wImxpPwpNL4O4Jwg",
"rat": 1529751111,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.215 phase <--<-- 5 --- Done -->-->
3.215 end
3.216 assertion VerifyResponse
3.216 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.216 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Rotation-OP-Sig.txt 0000644 0000000 0000000 00000011571 13313423726 015072 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Rotation-OP-Sig
Test description: Can rotate OP signing keys
Timestamp: 2018-06-23T10:58:30Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.072 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- FetchKeys -->-->
0.184 phase <--<-- 3 --- Note -->-->
13.383 phase <--<-- 4 --- Webfinger -->-->
13.383 not expected to do WebFinger
13.383 phase <--<-- 5 --- Discovery -->-->
13.383 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
13.46 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
13.461 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
13.461 phase <--<-- 6 --- FetchKeys -->-->
13.531 phase <--<-- 7 --- Done -->-->
13.531 end
13.531 assertion CheckHTTPResponse
13.531 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
13.532 assertion NewSigningKeys
13.532 condition new-signing-keys: status=OK [Verifies that two set of signing keys are not the same]
13.532 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
new-signing-keys: status=OK [Verifies that two set of signing keys are not the same]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Registration-jwks_uri.txt 0000644 0000000 0000000 00000034153 13313423116 016536 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-jwks_uri
Test description: Uses keys registered with jwks_uri value
Timestamp: 2018-06-23T10:51:58Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.079 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.08 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.08 phase <--<-- 2 --- Registration -->-->
0.08 register kwargs:{'application_name': 'OIC test tool', 'token_endpoint_auth_method': 'private_key_jwt', 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'response_types': ['code id_token'], 'url': 'https://oidc-certification.ory.sh:8443/clients', 'application_type': 'web'}
0.08 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#RALD2uCkwAnUzS21"
],
"response_types": [
"code id_token"
],
"token_endpoint_auth_method": "private_key_jwt"
}
0.243 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.244 RegistrationResponse {
"client_id": "f0de2a5a-07eb-4178-87a2-bebb6c681090",
"client_secret": "pb~0RA8Yn96Y",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "f0de2a5a-07eb-4178-87a2-bebb6c681090",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#RALD2uCkwAnUzS21"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "private_key_jwt",
"userinfo_signed_response_alg": "none"
}
0.244 phase <--<-- 3 --- AsyncAuthn -->-->
0.244 AuthorizationRequest {
"client_id": "f0de2a5a-07eb-4178-87a2-bebb6c681090",
"nonce": "22mlu2OayiH4AoIC",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "bTMKwC5XpJ72r5kB"
}
0.245 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=f0de2a5a-07eb-4178-87a2-bebb6c681090&state=bTMKwC5XpJ72r5kB&response_type=code+id_token&nonce=22mlu2OayiH4AoIC
0.245 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=f0de2a5a-07eb-4178-87a2-bebb6c681090&state=bTMKwC5XpJ72r5kB&response_type=code+id_token&nonce=22mlu2OayiH4AoIC
2.63 http args {}
2.833 response URL with fragment
2.833 response code=Qk9LwkbMzDE29WqCQ9yjVQ8nEfkzM4EhuPD4w1u5Qg8.x6YBH5lxPi3wGnScs5gDdiwfAsrXrbvWI-kLroiu3Gw&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZjBkZTJhNWEtMDdlYi00MTc4LTg3YTItYmViYjZjNjgxMDkwIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoidTNGbkdsejJGZ0pDbWxBT25uOXhaQSIsImV4cCI6MTUyOTc1NDcxOCwiaWF0IjoxNTI5NzUxMTE4LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJhYjNiMTNkMS02YmY3LTQ0ODAtODQyNC0yNGUyYWJjMWVlNGMiLCJub25jZSI6IjIybWx1Mk9heWlINEFvSUMiLCJyYXQiOjE1Mjk3NTExMTYsInN1YiI6ImZvb0BiYXIuY29tIn0.sqpIUzyx0QlGWJQyDOMwmYkZsCQkextidpfggJygUejHXnPdzGbjt49ET0pHNzYd6DX534A9X6cYsCu_RjZD-BFE8I-xrpsxr6jRMjtoPhT1wEysp3eF9OZP1tE6A1CJBpdvDJheU_1SS509kDwVziibVu6Rgbvo6c_t4VJWQ1IPwZ7dv1vsHilrRaXHJ7ZGZ_STR7LYcdD8Q7T5YiNnw_W1VK34xNrlKexKKyw3m_J1wn-9mfnrSbPQqIuk4dkDLXo8iI1Kai00TFZP9YfXHa55JnHxJ4S7YcXdigK6Hsz3j2PBrH-FWRc7qUqS8nolwOgG0MWdfwtpObrP_Kkg2EKTCCdy6X4kU6MopSqsQ6OS9t7N9hsMDvII1PgHCpODKxdrN_gS_dbrcU5to33r5CS3jX82TPT4ciDg8qvykqTVxJVmw5vXZ07joFUxtyrMwR6OBN8AkxVWxbQgOEuFq6fZRmIoB8pAq3aWYB8bjyYEwc-oJnqTX3QcGphXwnv57nNSpS4qf01x6M5RGw_81PsPs5TZhN07xHor0isW8j_QgFgifG6pcH-xricD3eGQI0U-pRYIYdGRJTc0Tud5JukqLDOhmykTN7Mrh9nf3wIxhtJQjJIoujMxnbnaBi13g8plaN8J6K4kYal9JF7jluRFo8rlLPAQ2KfSC1aQ5_s&state=bTMKwC5XpJ72r5kB
2.833 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZjBkZTJhNWEtMDdlYi00MTc4LTg3YTItYmViYjZjNjgxMDkwIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoidTNGbkdsejJGZ0pDbWxBT25uOXhaQSIsImV4cCI6MTUyOTc1NDcxOCwiaWF0IjoxNTI5NzUxMTE4LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJhYjNiMTNkMS02YmY3LTQ0ODAtODQyNC0yNGUyYWJjMWVlNGMiLCJub25jZSI6IjIybWx1Mk9heWlINEFvSUMiLCJyYXQiOjE1Mjk3NTExMTYsInN1YiI6ImZvb0BiYXIuY29tIn0.sqpIUzyx0QlGWJQyDOMwmYkZsCQkextidpfggJygUejHXnPdzGbjt49ET0pHNzYd6DX534A9X6cYsCu_RjZD-BFE8I-xrpsxr6jRMjtoPhT1wEysp3eF9OZP1tE6A1CJBpdvDJheU_1SS509kDwVziibVu6Rgbvo6c_t4VJWQ1IPwZ7dv1vsHilrRaXHJ7ZGZ_STR7LYcdD8Q7T5YiNnw_W1VK34xNrlKexKKyw3m_J1wn-9mfnrSbPQqIuk4dkDLXo8iI1Kai00TFZP9YfXHa55JnHxJ4S7YcXdigK6Hsz3j2PBrH-FWRc7qUqS8nolwOgG0MWdfwtpObrP_Kkg2EKTCCdy6X4kU6MopSqsQ6OS9t7N9hsMDvII1PgHCpODKxdrN_gS_dbrcU5to33r5CS3jX82TPT4ciDg8qvykqTVxJVmw5vXZ07joFUxtyrMwR6OBN8AkxVWxbQgOEuFq6fZRmIoB8pAq3aWYB8bjyYEwc-oJnqTX3QcGphXwnv57nNSpS4qf01x6M5RGw_81PsPs5TZhN07xHor0isW8j_QgFgifG6pcH-xricD3eGQI0U-pRYIYdGRJTc0Tud5JukqLDOhmykTN7Mrh9nf3wIxhtJQjJIoujMxnbnaBi13g8plaN8J6K4kYal9JF7jluRFo8rlLPAQ2KfSC1aQ5_s', 'state': 'bTMKwC5XpJ72r5kB', 'code': 'Qk9LwkbMzDE29WqCQ9yjVQ8nEfkzM4EhuPD4w1u5Qg8.x6YBH5lxPi3wGnScs5gDdiwfAsrXrbvWI-kLroiu3Gw'}
2.918 AuthorizationResponse {
"code": "Qk9LwkbMzDE29WqCQ9yjVQ8nEfkzM4EhuPD4w1u5Qg8.x6YBH5lxPi3wGnScs5gDdiwfAsrXrbvWI-kLroiu3Gw",
"id_token": {
"aud": [
"f0de2a5a-07eb-4178-87a2-bebb6c681090"
],
"auth_time": 1529750975,
"c_hash": "u3FnGlz2FgJCmlAOnn9xZA",
"exp": 1529754718,
"iat": 1529751118,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "ab3b13d1-6bf7-4480-8424-24e2abc1ee4c",
"nonce": "22mlu2OayiH4AoIC",
"rat": 1529751116,
"sub": "[email protected]"
},
"state": "bTMKwC5XpJ72r5kB"
}
2.918 phase <--<-- 4 --- AccessToken -->-->
2.918 --> request op_args: {'state': 'bTMKwC5XpJ72r5kB', 'authn_method': 'private_key_jwt'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.918 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'bTMKwC5XpJ72r5kB', 'code': 'Qk9LwkbMzDE29WqCQ9yjVQ8nEfkzM4EhuPD4w1u5Qg8.x6YBH5lxPi3wGnScs5gDdiwfAsrXrbvWI-kLroiu3Gw', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'f0de2a5a-07eb-4178-87a2-bebb6c681090'}, 'state': 'bTMKwC5XpJ72r5kB', 'authn_method': 'private_key_jwt'}
2.918 AccessTokenRequest {
"client_assertion": "eyJhbGciOiJSUzI1NiIsImtpZCI6Ind0MjVPZ3lSX256RzNPb1E3ZGFhMnJMNi1nTW5GZGZSekJqaFVWUHU4UlEifQ.eyJpc3MiOiAiZjBkZTJhNWEtMDdlYi00MTc4LTg3YTItYmViYjZjNjgxMDkwIiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiZjBkZTJhNWEtMDdlYi00MTc4LTg3YTItYmViYjZjNjgxMDkwIiwgImlhdCI6IDE1Mjk3NTExMTgsICJqdGkiOiAiVGp6TmxrOGtBNEV6NmRnam52Q0hmZTc2TlZ3WkFpRnAiLCAiZXhwIjogMTUyOTc1MTcxOH0.FHCFx8f2zI913XM-q20w_xNsb0Mwct4ya5xnVEtM-DjATD6wAIDjJ01J1iVbyuH2L01wzUMFLbmFmzeKOFc65yWGhclwt0bQ3HdfUxcUjElCK0KhkTm2x3z_KBzrM4D3p6vOKOsQoAJLjItd7qfCriaobtZybjWI8q7hv2njpgFeZO78iCFYlLeeE-XYN0-94hOAKhyq2v9zVd8K07itv4uia4250sr4zY5g7H1Wyqmo5pSpTIAS_GZAx4LYCxHJPfKiw0oifDFCR_AHyqJ48kM87zbN_GMJkyWGs3Lx0Xn_2euxvbUpvOrLx6Q2-4W6OhIhq9mT7UMlh9-4slruzw",
"client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer",
"code": "Qk9LwkbMzDE29WqCQ9yjVQ8nEfkzM4EhuPD4w1u5Qg8.x6YBH5lxPi3wGnScs5gDdiwfAsrXrbvWI-kLroiu3Gw",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "bTMKwC5XpJ72r5kB"
}
2.921 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.921 request_http_args {'headers': {'Content-Type': 'application/x-www-form-urlencoded'}}
2.921 request code=Qk9LwkbMzDE29WqCQ9yjVQ8nEfkzM4EhuPD4w1u5Qg8.x6YBH5lxPi3wGnScs5gDdiwfAsrXrbvWI-kLroiu3Gw&client_assertion_type=urn%3Aietf%3Aparams%3Aoauth%3Aclient-assertion-type%3Ajwt-bearer&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=bTMKwC5XpJ72r5kB&client_assertion=eyJhbGciOiJSUzI1NiIsImtpZCI6Ind0MjVPZ3lSX256RzNPb1E3ZGFhMnJMNi1nTW5GZGZSekJqaFVWUHU4UlEifQ.eyJpc3MiOiAiZjBkZTJhNWEtMDdlYi00MTc4LTg3YTItYmViYjZjNjgxMDkwIiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiZjBkZTJhNWEtMDdlYi00MTc4LTg3YTItYmViYjZjNjgxMDkwIiwgImlhdCI6IDE1Mjk3NTExMTgsICJqdGkiOiAiVGp6TmxrOGtBNEV6NmRnam52Q0hmZTc2TlZ3WkFpRnAiLCAiZXhwIjogMTUyOTc1MTcxOH0.FHCFx8f2zI913XM-q20w_xNsb0Mwct4ya5xnVEtM-DjATD6wAIDjJ01J1iVbyuH2L01wzUMFLbmFmzeKOFc65yWGhclwt0bQ3HdfUxcUjElCK0KhkTm2x3z_KBzrM4D3p6vOKOsQoAJLjItd7qfCriaobtZybjWI8q7hv2njpgFeZO78iCFYlLeeE-XYN0-94hOAKhyq2v9zVd8K07itv4uia4250sr4zY5g7H1Wyqmo5pSpTIAS_GZAx4LYCxHJPfKiw0oifDFCR_AHyqJ48kM87zbN_GMJkyWGs3Lx0Xn_2euxvbUpvOrLx6Q2-4W6OhIhq9mT7UMlh9-4slruzw
3.092 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.093 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZjBkZTJhNWEtMDdlYi00MTc4LTg3YTItYmViYjZjNjgxMDkwIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoidTNGbkdsejJGZ0pDbWxBT25uOXhaQSIsImV4cCI6MTUyOTc1NDcxOCwiaWF0IjoxNTI5NzUxMTE4LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiIxMjAxZDU0NS1jNjQ2LTQxNmQtYWIxZi1iZWQ1M2VlMWE4NDgiLCJub25jZSI6IjIybWx1Mk9heWlINEFvSUMiLCJyYXQiOjE1Mjk3NTExMTYsInN1YiI6ImZvb0BiYXIuY29tIn0.IZb6SSllyPpbF078PDTRgU76WM7cTOtUGPhIIsWk3eA2qSMIlYvFD_wOz1SYup4FughexOftDGs3bJztych9wJgPQpQ37m04DviVd-HOB_PHZmDcEryms2h0BsHfWa0rHL7gbMHLrgNp9Mw_j37jsTMAP98-ty84EunAOe2jggyGYNgihbuwjbjrkS6nIRHLQ7vzowykOGtHeZAiFypokJW3VkUNZMKNLA0fqBJ2tXieJJr04zWNI9LwXDNQAPM7gvHZ-sYvCkZuPcm52Hfv52rmgZvmvfSdg1nyMMB-GHvC06Szs_UMzKh80nYiF8NaXxUIBs10ImhKfDxwePxfLhGwG1EcSe1Yd2pby_NKJlMCmeEr7DLxPBdjHsPKkwVwo5IW7MyM8XsoR1pUQcw8z213ZjhJIAWpAvMpAxI5aRU8xzqDErnc9h4RTbXdZqReENTofz3I-FjrYMKLqWPenBlP8b1sSj176AXvCAHpC8JPUuHKYdC3lgqJu-40W42n8Wt_uQcbr7ziRQEBdCW3LG52eWWDAEDwPUC170HA-UfMB2TvxhQvERjX0fAcikr6bqwmT5kPi9NszjIimbprNnwx8KSlVDuYHO9BBnn7UZygFyhHRAoR8i0RxovlU8Dyj1F9qwFLxErfkpSV6VCpOrZID_r18keCWcfXfjlQUv4', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'krdL-Cur0qjuGj8nuz8UF3L_CFqrU1GPrn3oWLv6OnA.GFpAmY13s0s29B3w8XCdaiBHWbILiq6NARp9Ywj1Vq4', 'scope': 'openid'}
3.097 AccessTokenResponse {
"access_token": "krdL-Cur0qjuGj8nuz8UF3L_CFqrU1GPrn3oWLv6OnA.GFpAmY13s0s29B3w8XCdaiBHWbILiq6NARp9Ywj1Vq4",
"expires_in": 3599,
"id_token": {
"aud": [
"f0de2a5a-07eb-4178-87a2-bebb6c681090"
],
"auth_time": 1529750975,
"c_hash": "u3FnGlz2FgJCmlAOnn9xZA",
"exp": 1529754718,
"iat": 1529751118,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "1201d545-c646-416d-ab1f-bed53ee1a848",
"nonce": "22mlu2OayiH4AoIC",
"rat": 1529751116,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.097 phase <--<-- 5 --- Done -->-->
3.097 end
3.097 assertion VerifyResponse
3.097 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.097 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Req-max_age=10000.txt 0000644 0000000 0000000 00000051054 13313423602 015034 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-max_age=10000
Test description: Requesting ID Token with max_age=10000 seconds restriction
Timestamp: 2018-06-23T10:57:06Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.08 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.081 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.081 phase <--<-- 2 --- Registration -->-->
0.082 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.082 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#fLPTgjGfeGRPPN9Y"
],
"response_types": [
"code id_token"
]
}
0.273 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.274 RegistrationResponse {
"client_id": "9047c519-077a-43ed-b2b7-346421140d21",
"client_secret": "r.5hfyKN~JNx",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "9047c519-077a-43ed-b2b7-346421140d21",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#fLPTgjGfeGRPPN9Y"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.274 phase <--<-- 3 --- AsyncAuthn -->-->
0.275 AuthorizationRequest {
"client_id": "9047c519-077a-43ed-b2b7-346421140d21",
"nonce": "EBUJLlZChozSmtSt",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "YeMFiDuQJfrAFM74"
}
0.275 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=9047c519-077a-43ed-b2b7-346421140d21&state=YeMFiDuQJfrAFM74&response_type=code+id_token&nonce=EBUJLlZChozSmtSt
0.275 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=9047c519-077a-43ed-b2b7-346421140d21&state=YeMFiDuQJfrAFM74&response_type=code+id_token&nonce=EBUJLlZChozSmtSt
3.962 http args {}
4.18 response URL with fragment
4.18 response code=vIOqsxsJbos_ZtWg3ecMBo1LjF28AtyiEvxfAo89PGg.1imFn9VStnjuYjZKlAM5DrY7nLcTn-m0u_jYFNdMdl0&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiOTA0N2M1MTktMDc3YS00M2VkLWIyYjctMzQ2NDIxMTQwZDIxIl0sImF1dGhfdGltZSI6MTUyOTc1MTQwOSwiY19oYXNoIjoic1ZkaTBfN1NBamV6N05pa0NYdDlEUSIsImV4cCI6MTUyOTc1NTAyMywiaWF0IjoxNTI5NzUxNDIzLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI0ZjNjODhkOS0xMzQ5LTRiNzQtYjg3OS1iNTA5MjNmMTcwMzUiLCJub25jZSI6IkVCVUpMbFpDaG96U210U3QiLCJyYXQiOjE1Mjk3NTE0MjAsInN1YiI6ImZvb0BiYXIuY29tIn0.d8QN53nAlQg2_W_55XjonrrQdVuf7ieE5WB9M9ByTB_ZbFbqhzrlbOjvMtqdTc5nPcr5J4koqi4hnNrKxIwUrYbWMkm4VCpDHVPIvRW7Psm0YrbG6MKMiKx6i8JrJXNgU4E93bE1UYvyPTidOpxHYY2nYQR5Uy1GBvibvZxoY1fTnJV8ZsTO7yFf-LCczorTZQKKNvcAve4i5gM5vTEpMJLBjYrYYFPNyx7wo54deFcLudXfyOV01-bq7hZOCHvIqJsVyDZ45rQMpCpuiKlGkPh0ykqRsszVb1_9w2AxHTO40WJpdvkJ6ePfUMwVtk36gZZoBr9k3rqQi1tVpoKQDgtqT3g67HrnhSUPUk_ssyHK_3e9s8pNKu6w30yLK4TRmqgu3YWB46077JsizEp8tDRhvMHAyhjysJv5GLQTMw4lnh8C9cy02tp_PgTpID0G_RjcT1sEaZ9TREHxpihiZmViLJr44NcO9y17VpKxXIBRQM88lIRs4uIhJsBb9eqqQXV0dfhZC9JjqqxdhJeAbCFazSiDcfnBhkK5LEBie6_YS29ieRKF_F4oqv2ORVZ-LW__mzTx345y_5OnlW6MvpKDEtEVjpmdq9EokYVKALjVR_sp4idk7AR4eullkuI-pkpoOXK_02ElrYGcMli4Pg47C7FX-LNSU0enk6xDChw&state=YeMFiDuQJfrAFM74
4.18 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiOTA0N2M1MTktMDc3YS00M2VkLWIyYjctMzQ2NDIxMTQwZDIxIl0sImF1dGhfdGltZSI6MTUyOTc1MTQwOSwiY19oYXNoIjoic1ZkaTBfN1NBamV6N05pa0NYdDlEUSIsImV4cCI6MTUyOTc1NTAyMywiaWF0IjoxNTI5NzUxNDIzLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI0ZjNjODhkOS0xMzQ5LTRiNzQtYjg3OS1iNTA5MjNmMTcwMzUiLCJub25jZSI6IkVCVUpMbFpDaG96U210U3QiLCJyYXQiOjE1Mjk3NTE0MjAsInN1YiI6ImZvb0BiYXIuY29tIn0.d8QN53nAlQg2_W_55XjonrrQdVuf7ieE5WB9M9ByTB_ZbFbqhzrlbOjvMtqdTc5nPcr5J4koqi4hnNrKxIwUrYbWMkm4VCpDHVPIvRW7Psm0YrbG6MKMiKx6i8JrJXNgU4E93bE1UYvyPTidOpxHYY2nYQR5Uy1GBvibvZxoY1fTnJV8ZsTO7yFf-LCczorTZQKKNvcAve4i5gM5vTEpMJLBjYrYYFPNyx7wo54deFcLudXfyOV01-bq7hZOCHvIqJsVyDZ45rQMpCpuiKlGkPh0ykqRsszVb1_9w2AxHTO40WJpdvkJ6ePfUMwVtk36gZZoBr9k3rqQi1tVpoKQDgtqT3g67HrnhSUPUk_ssyHK_3e9s8pNKu6w30yLK4TRmqgu3YWB46077JsizEp8tDRhvMHAyhjysJv5GLQTMw4lnh8C9cy02tp_PgTpID0G_RjcT1sEaZ9TREHxpihiZmViLJr44NcO9y17VpKxXIBRQM88lIRs4uIhJsBb9eqqQXV0dfhZC9JjqqxdhJeAbCFazSiDcfnBhkK5LEBie6_YS29ieRKF_F4oqv2ORVZ-LW__mzTx345y_5OnlW6MvpKDEtEVjpmdq9EokYVKALjVR_sp4idk7AR4eullkuI-pkpoOXK_02ElrYGcMli4Pg47C7FX-LNSU0enk6xDChw', 'state': 'YeMFiDuQJfrAFM74', 'code': 'vIOqsxsJbos_ZtWg3ecMBo1LjF28AtyiEvxfAo89PGg.1imFn9VStnjuYjZKlAM5DrY7nLcTn-m0u_jYFNdMdl0'}
4.268 AuthorizationResponse {
"code": "vIOqsxsJbos_ZtWg3ecMBo1LjF28AtyiEvxfAo89PGg.1imFn9VStnjuYjZKlAM5DrY7nLcTn-m0u_jYFNdMdl0",
"id_token": {
"aud": [
"9047c519-077a-43ed-b2b7-346421140d21"
],
"auth_time": 1529751409,
"c_hash": "sVdi0_7SAjez7NikCXt9DQ",
"exp": 1529755023,
"iat": 1529751423,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "4f3c88d9-1349-4b74-b879-b50923f17035",
"nonce": "EBUJLlZChozSmtSt",
"rat": 1529751420,
"sub": "[email protected]"
},
"state": "YeMFiDuQJfrAFM74"
}
4.268 phase <--<-- 4 --- AccessToken -->-->
4.268 --> request op_args: {'state': 'YeMFiDuQJfrAFM74'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
4.268 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'YeMFiDuQJfrAFM74', 'code': 'vIOqsxsJbos_ZtWg3ecMBo1LjF28AtyiEvxfAo89PGg.1imFn9VStnjuYjZKlAM5DrY7nLcTn-m0u_jYFNdMdl0', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '9047c519-077a-43ed-b2b7-346421140d21'}, 'state': 'YeMFiDuQJfrAFM74'}
4.268 AccessTokenRequest {
"code": "vIOqsxsJbos_ZtWg3ecMBo1LjF28AtyiEvxfAo89PGg.1imFn9VStnjuYjZKlAM5DrY7nLcTn-m0u_jYFNdMdl0",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "YeMFiDuQJfrAFM74"
}
4.268 request_url https://oidc-certification.ory.sh:8443/oauth2/token
4.268 request_http_args {'headers': {'Authorization': 'Basic OTA0N2M1MTktMDc3YS00M2VkLWIyYjctMzQ2NDIxMTQwZDIxOnIuNWhmeUtOJTdFSk54', 'Content-Type': 'application/x-www-form-urlencoded'}}
4.268 request code=vIOqsxsJbos_ZtWg3ecMBo1LjF28AtyiEvxfAo89PGg.1imFn9VStnjuYjZKlAM5DrY7nLcTn-m0u_jYFNdMdl0&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=YeMFiDuQJfrAFM74
4.515 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
4.516 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiOTA0N2M1MTktMDc3YS00M2VkLWIyYjctMzQ2NDIxMTQwZDIxIl0sImF1dGhfdGltZSI6MTUyOTc1MTQwOSwiY19oYXNoIjoic1ZkaTBfN1NBamV6N05pa0NYdDlEUSIsImV4cCI6MTUyOTc1NTAyMywiaWF0IjoxNTI5NzUxNDI0LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJhYWE3YmVhZC1jMGQ0LTRkMDYtODc0ZS01YjdhNjZhYjE5MTciLCJub25jZSI6IkVCVUpMbFpDaG96U210U3QiLCJyYXQiOjE1Mjk3NTE0MjAsInN1YiI6ImZvb0BiYXIuY29tIn0.m3pO6Ii26hb5neyzvcsWaXZRJnwfEKYaRKSp3GNtaLHmnz6guWZzZtTI9pCLDf-mhL0Av7IVCePmlIlUBUJY1yZ0IoIO4Trwy0eOrOalLizhWcMVMfSLcScVM_RXdagAGOEvgd7HDdOS3XvheTw23q1pmxpFOSaWV5yxh7XEQDUoVubIJLVeLR0E4UqBkK9T-TAisjYOt_cf4gn0pSxdhIxYNmuQn4Zdff6jKAKcBJpjJBExAiseZNCH3WkOp4sfUrxgCeNwDMfXRFbytxl0nyFrggUYOmc9ju8GrVKfX1o-mdab3BHJQF0RvxbtUVJ3AD15TUN1gIAvru8fHr4uIOlBcogYz1NUg1N-Wx8vU-mvTvsgrTr8-8d1atup1Vnzdf9XOpsZkG5Yj9ORub5D0VxaYcC5pB_CuKcOkGqFksWnVstkVnJE97VJD-RdG4xgOj-pEr_KaA6T89fc5yxxztlPxqhCbGUA4P11kI58PCy-uDkvaoAoy2bGwZI74iLKqpaxqrKCDqXwMkxAbVAz9xTbawZ_-0wywg6-CPMACUOX66pKVL8mMSXA4lu79S_6h6oS0YMaJfT-sUmrg3GXtxOa1uxjVHgYy1R1kZJR572sd5L31K7mu4pfW7cnkxNvV9XDswBerBYCSzw60gNqRgxjqFhi9Jzf05mZqVXaBmU', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'k6pHKnJ4L4DlAoHOchKMhzfO1jZdoXwwTKFuQtSaFms.zfii50iIYYA1jH93HSNfqZ-32Drhlw_nZEvxRt01bJA', 'scope': 'openid'}
4.519 AccessTokenResponse {
"access_token": "k6pHKnJ4L4DlAoHOchKMhzfO1jZdoXwwTKFuQtSaFms.zfii50iIYYA1jH93HSNfqZ-32Drhlw_nZEvxRt01bJA",
"expires_in": 3599,
"id_token": {
"aud": [
"9047c519-077a-43ed-b2b7-346421140d21"
],
"auth_time": 1529751409,
"c_hash": "sVdi0_7SAjez7NikCXt9DQ",
"exp": 1529755023,
"iat": 1529751424,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "aaa7bead-c0d4-4d06-874e-5b7a66ab1917",
"nonce": "EBUJLlZChozSmtSt",
"rat": 1529751420,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
4.519 phase <--<-- 5 --- AsyncAuthn -->-->
4.52 AuthorizationRequest {
"client_id": "9047c519-077a-43ed-b2b7-346421140d21",
"max_age": 10000,
"nonce": "2yXMCdNFzevgdtQC",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "IIY8wBHQgGQcY0zR"
}
4.52 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?max_age=10000&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=9047c519-077a-43ed-b2b7-346421140d21&state=IIY8wBHQgGQcY0zR&response_type=code+id_token&nonce=2yXMCdNFzevgdtQC
4.52 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?max_age=10000&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=9047c519-077a-43ed-b2b7-346421140d21&state=IIY8wBHQgGQcY0zR&response_type=code+id_token&nonce=2yXMCdNFzevgdtQC
5.619 http args {}
5.829 response URL with fragment
5.83 response code=T4Kh2Ydt2R2wuOmLwVVoIUCViqRtztgSgVB5i5UArHQ.bv2301VTGyeQwiHXx04SfNFSX4qQR3mvNDstgSozkAs&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiOTA0N2M1MTktMDc3YS00M2VkLWIyYjctMzQ2NDIxMTQwZDIxIl0sImF1dGhfdGltZSI6MTUyOTc1MTQwOSwiY19oYXNoIjoiUVJSTjhHTHJhaDlvbDYzNnZISTZ4dyIsImV4cCI6MTUyOTc1NTAyNSwiaWF0IjoxNTI5NzUxNDI1LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI3MjE2NWI2Zi04ZTU0LTRhMzAtOWQ1Mi1iMzY4ZGM2OTRmN2IiLCJub25jZSI6IjJ5WE1DZE5GemV2Z2R0UUMiLCJyYXQiOjE1Mjk3NTE0MjQsInN1YiI6ImZvb0BiYXIuY29tIn0.KhocAO7KkKQb2FxqLvNZvC4NyODsuQlMGTCbCDLqyBCuinz0v4QEdU3Wl4UMzl7hWSO8-YUAq9Hemalb_TyRcseLUnYGI9PDkkgkoQOsUPv9k470yO2eJjruA8ZBxiUtGqupz13WJVupezVYDmwc1-6ztPzqJ2r6Gke3Sa_EVFr12_HivBEaOLUm92OCCdhkiXmeosfjXIU0-AHY8_GbFXcTP7kPVDbgCJN4eCT9V2K6RwWaeiZQn4lefI9I1fC-DI-FSE_VBu-YNm6qsTHSC4ZOevSsm_A_1s0-aewsKSEqcJViUkaqDfG35TDhESPTZErb4jPXUfH5Y8yvZ2pLFB4RHhko3RmTpZIhl1MQBGdTH_COOe-Yo8EGlRoginyGbdTCHVKAazlHUAqqjffdIu4Pjy3IchNNhLHwXGYhRy6k_A8-Tdr-6XfWWbwPKgp0nSN10gTriDNo5BI-ExIHCuBOfD6G-I9TyhIgzrOB5zH6CZPOZ04kN8odgd1CLoRJ7rstiCV7lMchfTVFPEVnhnSR3Xr2g_2Ar_XxoynfOtVExxmGazW3SJXdBysbfoXQqFhQEzpF0pbdxHP04UKi1aWbmpVLX7b42RF1_gOBesJ853_c6DH1AadlRKCzcCpADPpH3Up5PAz9m8-6fikmDdTGkuV_SgJpfIVUELRaRbw&state=IIY8wBHQgGQcY0zR
5.83 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiOTA0N2M1MTktMDc3YS00M2VkLWIyYjctMzQ2NDIxMTQwZDIxIl0sImF1dGhfdGltZSI6MTUyOTc1MTQwOSwiY19oYXNoIjoiUVJSTjhHTHJhaDlvbDYzNnZISTZ4dyIsImV4cCI6MTUyOTc1NTAyNSwiaWF0IjoxNTI5NzUxNDI1LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI3MjE2NWI2Zi04ZTU0LTRhMzAtOWQ1Mi1iMzY4ZGM2OTRmN2IiLCJub25jZSI6IjJ5WE1DZE5GemV2Z2R0UUMiLCJyYXQiOjE1Mjk3NTE0MjQsInN1YiI6ImZvb0BiYXIuY29tIn0.KhocAO7KkKQb2FxqLvNZvC4NyODsuQlMGTCbCDLqyBCuinz0v4QEdU3Wl4UMzl7hWSO8-YUAq9Hemalb_TyRcseLUnYGI9PDkkgkoQOsUPv9k470yO2eJjruA8ZBxiUtGqupz13WJVupezVYDmwc1-6ztPzqJ2r6Gke3Sa_EVFr12_HivBEaOLUm92OCCdhkiXmeosfjXIU0-AHY8_GbFXcTP7kPVDbgCJN4eCT9V2K6RwWaeiZQn4lefI9I1fC-DI-FSE_VBu-YNm6qsTHSC4ZOevSsm_A_1s0-aewsKSEqcJViUkaqDfG35TDhESPTZErb4jPXUfH5Y8yvZ2pLFB4RHhko3RmTpZIhl1MQBGdTH_COOe-Yo8EGlRoginyGbdTCHVKAazlHUAqqjffdIu4Pjy3IchNNhLHwXGYhRy6k_A8-Tdr-6XfWWbwPKgp0nSN10gTriDNo5BI-ExIHCuBOfD6G-I9TyhIgzrOB5zH6CZPOZ04kN8odgd1CLoRJ7rstiCV7lMchfTVFPEVnhnSR3Xr2g_2Ar_XxoynfOtVExxmGazW3SJXdBysbfoXQqFhQEzpF0pbdxHP04UKi1aWbmpVLX7b42RF1_gOBesJ853_c6DH1AadlRKCzcCpADPpH3Up5PAz9m8-6fikmDdTGkuV_SgJpfIVUELRaRbw', 'state': 'IIY8wBHQgGQcY0zR', 'code': 'T4Kh2Ydt2R2wuOmLwVVoIUCViqRtztgSgVB5i5UArHQ.bv2301VTGyeQwiHXx04SfNFSX4qQR3mvNDstgSozkAs'}
5.834 AuthorizationResponse {
"code": "T4Kh2Ydt2R2wuOmLwVVoIUCViqRtztgSgVB5i5UArHQ.bv2301VTGyeQwiHXx04SfNFSX4qQR3mvNDstgSozkAs",
"id_token": {
"aud": [
"9047c519-077a-43ed-b2b7-346421140d21"
],
"auth_time": 1529751409,
"c_hash": "QRRN8GLrah9ol636vHI6xw",
"exp": 1529755025,
"iat": 1529751425,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "72165b6f-8e54-4a30-9d52-b368dc694f7b",
"nonce": "2yXMCdNFzevgdtQC",
"rat": 1529751424,
"sub": "[email protected]"
},
"state": "IIY8wBHQgGQcY0zR"
}
5.834 phase <--<-- 6 --- AccessToken -->-->
5.834 --> request op_args: {'state': 'IIY8wBHQgGQcY0zR'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
5.834 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'IIY8wBHQgGQcY0zR', 'code': 'T4Kh2Ydt2R2wuOmLwVVoIUCViqRtztgSgVB5i5UArHQ.bv2301VTGyeQwiHXx04SfNFSX4qQR3mvNDstgSozkAs', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '9047c519-077a-43ed-b2b7-346421140d21'}, 'state': 'IIY8wBHQgGQcY0zR'}
5.834 AccessTokenRequest {
"code": "T4Kh2Ydt2R2wuOmLwVVoIUCViqRtztgSgVB5i5UArHQ.bv2301VTGyeQwiHXx04SfNFSX4qQR3mvNDstgSozkAs",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "IIY8wBHQgGQcY0zR"
}
5.834 request_url https://oidc-certification.ory.sh:8443/oauth2/token
5.834 request_http_args {'headers': {'Authorization': 'Basic OTA0N2M1MTktMDc3YS00M2VkLWIyYjctMzQ2NDIxMTQwZDIxOnIuNWhmeUtOJTdFSk54', 'Content-Type': 'application/x-www-form-urlencoded'}}
5.834 request code=T4Kh2Ydt2R2wuOmLwVVoIUCViqRtztgSgVB5i5UArHQ.bv2301VTGyeQwiHXx04SfNFSX4qQR3mvNDstgSozkAs&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=IIY8wBHQgGQcY0zR
6.054 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
6.055 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiOTA0N2M1MTktMDc3YS00M2VkLWIyYjctMzQ2NDIxMTQwZDIxIl0sImF1dGhfdGltZSI6MTUyOTc1MTQwOSwiY19oYXNoIjoiUVJSTjhHTHJhaDlvbDYzNnZISTZ4dyIsImV4cCI6MTUyOTc1NTAyNSwiaWF0IjoxNTI5NzUxNDI1LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJiNDY4ZDJkZC01YjUyLTRkMDUtYjkzMS1lMDkzMjg0Nzg1ZGUiLCJub25jZSI6IjJ5WE1DZE5GemV2Z2R0UUMiLCJyYXQiOjE1Mjk3NTE0MjQsInN1YiI6ImZvb0BiYXIuY29tIn0.lVwRW7gyLJSFFSiiwf3Rg0zrQMUGLjWcNRcmhdReoXsPh_hnbOw_eTq_z-SdDm5seb9HLHOJuo5CkL-COd1xDDIzCW9ecj-SW2Pmt9d6Xj-ggfGZ11DiDzIWjvvmx3KbxmQPPZ7UjH2-idDrIbk9FwuGiR-c-49zDCH6xd-E1XRDl4DyQ2by8hdpMo09rz2NwNF4mOuNLAFxwZem4eZgX6vwBNWtjQ_wC1TMIkgYFrV0iqZxvSh0tMGtFg_OwIDznmBodV3Gvfp9wrNJun6Me8Q_lw52hiNCtRbSO7TlZQahaBD103p1dtRTPnp9UKRvJCxoybirJy3G9NGADGrFckwAW7vOI18rwMw9g2GenqaJLCVGuNz52abbEL2iYuFItTUKqDXJ5JWuLcJzwqTN7ivE1zihI2Odjon63PIALnXw4xPSxkpl7lTMXJ9DcbJfsrRiwetId8GCJf0Jll7bahq40GVaE49QRCmNoR8nOwkp6GGqrm-udcFIUAUldkorY4zvAeenhNF_h234Y2JEb0f1qR1S1G4WfnJ1IkeQ-FNGn5lFSCsyMukks_t8g43P4fDmKfLReoAcUHckVy6DUqKJnHgA-cqUhrYGz-rHnsQQ_-HGYG2G0VI80FI6WhrYfIcc_LOyGmw8_gSJ3QcTn-oWgnVPLqbskMUy3zuwrUQ', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'PDPf__ShUgcUmIWMCfjEpDJZT0I5dT6wfKuzd24W_-Q.crumhzZiAhtk0XfWNALeOeIlgEt8hTSq1-9JqJM9VQs', 'scope': 'openid'}
6.058 AccessTokenResponse {
"access_token": "PDPf__ShUgcUmIWMCfjEpDJZT0I5dT6wfKuzd24W_-Q.crumhzZiAhtk0XfWNALeOeIlgEt8hTSq1-9JqJM9VQs",
"expires_in": 3599,
"id_token": {
"aud": [
"9047c519-077a-43ed-b2b7-346421140d21"
],
"auth_time": 1529751409,
"c_hash": "QRRN8GLrah9ol636vHI6xw",
"exp": 1529755025,
"iat": 1529751425,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "b468d2dd-5b52-4d05-b931-e093284785de",
"nonce": "2yXMCdNFzevgdtQC",
"rat": 1529751424,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
6.058 phase <--<-- 7 --- Done -->-->
6.058 end
6.059 assertion AuthTimeCheck
6.059 condition auth_time-check: status=OK [Check that the auth_time returned in the ID Token is in the expected range.]
6.059 assertion VerifyResponse
6.059 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
6.06 assertion SameAuthn
6.06 condition same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
6.06 assertion ClaimsCheck
6.06 condition claims-check: status=OK [Checks if specific claims is present or not]
6.06 condition Done: status=OK
============================================================
Conditions
auth_time-check: status=OK [Check that the auth_time returned in the ID Token is in the expected range.]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
claims-check: status=OK [Checks if specific claims is present or not]
Done: status=OK
============================================================
RESULT: PASSED
./OP-request-Unsigned.txt 0000644 0000000 0000000 00000024214 13313423421 015467 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-request-Unsigned
Test description: Support request request parameter with unsigned request
Timestamp: 2018-06-23T10:55:13Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.074 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Registration -->-->
0.076 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'request_object_signing_alg': 'none'}
0.076 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "none",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#7AtBK3UigObyK80H"
],
"response_types": [
"code id_token"
]
}
0.237 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.238 RegistrationResponse {
"client_id": "c8ef90b3-25ca-468c-9c0a-a8a34ea57b80",
"client_secret": "LKfjtdO4zCwY",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "c8ef90b3-25ca-468c-9c0a-a8a34ea57b80",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "none",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#7AtBK3UigObyK80H"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.238 phase <--<-- 3 --- AsyncAuthn -->-->
0.239 AuthorizationRequest {
"client_id": "c8ef90b3-25ca-468c-9c0a-a8a34ea57b80",
"nonce": "8hFjb8qgVYrKyWOq",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"request": "eyJhbGciOiJub25lIn0.eyJzY29wZSI6ICJvcGVuaWQiLCAicmVkaXJlY3RfdXJpIjogImh0dHBzOi8vb3AuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0OjYxMzUzL2F1dGh6X2NiIiwgImNsaWVudF9pZCI6ICJjOGVmOTBiMy0yNWNhLTQ2OGMtOWMwYS1hOGEzNGVhNTdiODAiLCAic3RhdGUiOiAiS0JDZElHQzlKSUFkNUFPbiIsICJyZXNwb25zZV90eXBlIjogImNvZGUgaWRfdG9rZW4iLCAibm9uY2UiOiAiOGhGamI4cWdWWXJLeVdPcSJ9.",
"response_type": "code id_token",
"scope": "openid",
"state": "KBCdIGC9JIAd5AOn"
}
0.239 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=c8ef90b3-25ca-468c-9c0a-a8a34ea57b80&response_type=code+id_token&state=KBCdIGC9JIAd5AOn&request=eyJhbGciOiJub25lIn0.eyJzY29wZSI6ICJvcGVuaWQiLCAicmVkaXJlY3RfdXJpIjogImh0dHBzOi8vb3AuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0OjYxMzUzL2F1dGh6X2NiIiwgImNsaWVudF9pZCI6ICJjOGVmOTBiMy0yNWNhLTQ2OGMtOWMwYS1hOGEzNGVhNTdiODAiLCAic3RhdGUiOiAiS0JDZElHQzlKSUFkNUFPbiIsICJyZXNwb25zZV90eXBlIjogImNvZGUgaWRfdG9rZW4iLCAibm9uY2UiOiAiOGhGamI4cWdWWXJLeVdPcSJ9.&nonce=8hFjb8qgVYrKyWOq
0.239 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=c8ef90b3-25ca-468c-9c0a-a8a34ea57b80&response_type=code+id_token&state=KBCdIGC9JIAd5AOn&request=eyJhbGciOiJub25lIn0.eyJzY29wZSI6ICJvcGVuaWQiLCAicmVkaXJlY3RfdXJpIjogImh0dHBzOi8vb3AuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0OjYxMzUzL2F1dGh6X2NiIiwgImNsaWVudF9pZCI6ICJjOGVmOTBiMy0yNWNhLTQ2OGMtOWMwYS1hOGEzNGVhNTdiODAiLCAic3RhdGUiOiAiS0JDZElHQzlKSUFkNUFPbiIsICJyZXNwb25zZV90eXBlIjogImNvZGUgaWRfdG9rZW4iLCAibm9uY2UiOiAiOGhGamI4cWdWWXJLeVdPcSJ9.&nonce=8hFjb8qgVYrKyWOq
2.283 http args {}
2.452 response URL with fragment
2.453 response code=gmtuBfPVbWzmnx5G6zyJtCOJSENH27ikbaDPVYVVLEg.m8gB0gZMpB3XfOR75bsf9fPyj0gH08WY4q8eSqsi6ew&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYzhlZjkwYjMtMjVjYS00NjhjLTljMGEtYThhMzRlYTU3YjgwIl0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiYlNxUzdCOEFselVySl9RZFZTUU9YUSIsImV4cCI6MTUyOTc1NDkxMiwiaWF0IjoxNTI5NzUxMzEyLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI0Nzc1MWJjMC1mYzRlLTRlNjktOGM5MC01ZTY5MjFlY2M3NjgiLCJub25jZSI6IjhoRmpiOHFnVllyS3lXT3EiLCJyYXQiOjE1Mjk3NTEzMTAsInN1YiI6ImZvb0BiYXIuY29tIn0.L-9_vfCFWtQug2nN6N3_IQOzeagFadNEdcN8s3m75v476Wvqz_S1KxujN7PRhUReEpmSTUaXgnPk1P1_WlPMMxjTMJWE6ZAgSCYWFR1vyEsmqjyQKjel_Q14xZDTrZW0kwoGhoDVV5aWyyMmLYKlBml43IVg7W8GpiHXtzEbvG8vj2gr-TVSZ80GqkmGhsgrooMAnS4Qg0_HCf7V7ijbTSiZoNJ9NPMTIj4manXtEFxxy88r7xeoNY5c6p4fPXKmNgJC2RA9M5Pox5cDa4yJWJdYGMuX1yJ-pQ84_7c1wFsumh8OJIEC0oEg46ljNf7NMfvePUFwFbab7pZds7fgfz7K0ogU_M_KxwFMPzkQUDdGA_p1dkkk_x4tgahs07TC7CZvzPvvkwEpILsWsUsFjjS_pznKhlQAdqxCSbfpPfEqm47ZmnviTJtkGEht1CkAgd3fxo3gQ1fVjMIiY66s-_eqsJt32mVBxEB8AwtH-zDYiMH3HBQtaF74MPA_4sO6Wfz3yZC_YF-3icy1d7GxFwjsLWfU65ssUdcDWF1G1CxX6gulD1zgKo2BN_TNbYLWaSQkhiID7Udc0Kx8qLoadVfzufntDsBW87hN3qSzSQKAce05JvSvZfSszS2DcXPsfk9OyhO190myMUUQYNkeL5oNfpYZFhxsPmS1t07W5r8&state=KBCdIGC9JIAd5AOn
2.453 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYzhlZjkwYjMtMjVjYS00NjhjLTljMGEtYThhMzRlYTU3YjgwIl0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiYlNxUzdCOEFselVySl9RZFZTUU9YUSIsImV4cCI6MTUyOTc1NDkxMiwiaWF0IjoxNTI5NzUxMzEyLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI0Nzc1MWJjMC1mYzRlLTRlNjktOGM5MC01ZTY5MjFlY2M3NjgiLCJub25jZSI6IjhoRmpiOHFnVllyS3lXT3EiLCJyYXQiOjE1Mjk3NTEzMTAsInN1YiI6ImZvb0BiYXIuY29tIn0.L-9_vfCFWtQug2nN6N3_IQOzeagFadNEdcN8s3m75v476Wvqz_S1KxujN7PRhUReEpmSTUaXgnPk1P1_WlPMMxjTMJWE6ZAgSCYWFR1vyEsmqjyQKjel_Q14xZDTrZW0kwoGhoDVV5aWyyMmLYKlBml43IVg7W8GpiHXtzEbvG8vj2gr-TVSZ80GqkmGhsgrooMAnS4Qg0_HCf7V7ijbTSiZoNJ9NPMTIj4manXtEFxxy88r7xeoNY5c6p4fPXKmNgJC2RA9M5Pox5cDa4yJWJdYGMuX1yJ-pQ84_7c1wFsumh8OJIEC0oEg46ljNf7NMfvePUFwFbab7pZds7fgfz7K0ogU_M_KxwFMPzkQUDdGA_p1dkkk_x4tgahs07TC7CZvzPvvkwEpILsWsUsFjjS_pznKhlQAdqxCSbfpPfEqm47ZmnviTJtkGEht1CkAgd3fxo3gQ1fVjMIiY66s-_eqsJt32mVBxEB8AwtH-zDYiMH3HBQtaF74MPA_4sO6Wfz3yZC_YF-3icy1d7GxFwjsLWfU65ssUdcDWF1G1CxX6gulD1zgKo2BN_TNbYLWaSQkhiID7Udc0Kx8qLoadVfzufntDsBW87hN3qSzSQKAce05JvSvZfSszS2DcXPsfk9OyhO190myMUUQYNkeL5oNfpYZFhxsPmS1t07W5r8', 'state': 'KBCdIGC9JIAd5AOn', 'code': 'gmtuBfPVbWzmnx5G6zyJtCOJSENH27ikbaDPVYVVLEg.m8gB0gZMpB3XfOR75bsf9fPyj0gH08WY4q8eSqsi6ew'}
2.537 AuthorizationResponse {
"code": "gmtuBfPVbWzmnx5G6zyJtCOJSENH27ikbaDPVYVVLEg.m8gB0gZMpB3XfOR75bsf9fPyj0gH08WY4q8eSqsi6ew",
"id_token": {
"aud": [
"c8ef90b3-25ca-468c-9c0a-a8a34ea57b80"
],
"auth_time": 1529751224,
"c_hash": "bSqS7B8AlzUrJ_QdVSQOXQ",
"exp": 1529754912,
"iat": 1529751312,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "47751bc0-fc4e-4e69-8c90-5e6921ecc768",
"nonce": "8hFjb8qgVYrKyWOq",
"rat": 1529751310,
"sub": "[email protected]"
},
"state": "KBCdIGC9JIAd5AOn"
}
2.537 phase <--<-- 4 --- Done -->-->
2.537 end
2.538 assertion VerifyAuthnOrErrorResponse
2.538 condition authn-response-or-error: status=OK [Checks that the last response was a JSON encoded authentication or error message]
2.538 condition Done: status=OK
============================================================
Conditions
authn-response-or-error: status=OK [Checks that the last response was a JSON encoded authentication or error message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-ClientAuth-Basic-Dynamic.txt 0000644 0000000 0000000 00000031074 13313423164 016674 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-ClientAuth-Basic-Dynamic
Test description: Access token request with client_secret_basic authentication
Timestamp: 2018-06-23T10:52:36Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.075 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.077 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.077 phase <--<-- 2 --- Registration -->-->
0.077 register kwargs:{'application_name': 'OIC test tool', 'token_endpoint_auth_method': 'client_secret_basic', 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'response_types': ['code id_token'], 'url': 'https://oidc-certification.ory.sh:8443/clients', 'application_type': 'web'}
0.077 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#OiyJvR4yVkJM3nRf"
],
"response_types": [
"code id_token"
],
"token_endpoint_auth_method": "client_secret_basic"
}
0.237 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.238 RegistrationResponse {
"client_id": "d5eab431-2dfb-473d-8522-bf10654623b8",
"client_secret": "N_9W~UVpRECK",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "d5eab431-2dfb-473d-8522-bf10654623b8",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#OiyJvR4yVkJM3nRf"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.238 phase <--<-- 3 --- AsyncAuthn -->-->
0.239 AuthorizationRequest {
"client_id": "d5eab431-2dfb-473d-8522-bf10654623b8",
"nonce": "4rnKjtb151JJSYV4",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "xKfCNycWHarQegeT"
}
0.239 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=d5eab431-2dfb-473d-8522-bf10654623b8&state=xKfCNycWHarQegeT&response_type=code+id_token&nonce=4rnKjtb151JJSYV4
0.239 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=d5eab431-2dfb-473d-8522-bf10654623b8&state=xKfCNycWHarQegeT&response_type=code+id_token&nonce=4rnKjtb151JJSYV4
2.239 http args {}
2.411 response URL with fragment
2.411 response code=xN5s-M4iSkj2iZm04r6RtS0zoQSCNRn5zMGw5uHJn_E.AoEIUUSbnRtDi0EeZ6WeDzNz-MwsSKd9gnghdIBdVIY&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZDVlYWI0MzEtMmRmYi00NzNkLTg1MjItYmYxMDY1NDYyM2I4Il0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiT2FPRWtNZ3BmZDgxN2U5VVB4NGdFUSIsImV4cCI6MTUyOTc1NDc1NSwiaWF0IjoxNTI5NzUxMTU1LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI0Y2YzNzMxYy1lODQ5LTQyZTktOTFmNS0yMjU5NTgyZDA1OGEiLCJub25jZSI6IjRybktqdGIxNTFKSlNZVjQiLCJyYXQiOjE1Mjk3NTExNTQsInN1YiI6ImZvb0BiYXIuY29tIn0.o7PywR9XjTGrWslVA7XOaIf5cqQ-kVs7XktIi_vLl0Gr1wWzVsAQozf4wEvxdZHLIjRLyi7VRcMZZoGLPbycXgHw2bmjsnUc4-gEuwwzMYZtkRSdJdCrv_HeAr4Y4jiczXvVqNvVfxne4_FQGUrQjfq0Lcou0vQx5tXclFL6zK6ehR9mGOWit9QamvLEVDnMRmhUkgegLdMTXvZ5RcH0XmXcW--3rXfXbSoOBWIEVSsrpNBLzKc1gw9TtGdmzT4o8cPMxZZsfPrkT3NT9HU1k5wbHA3wW7J-xHOy529MaNOcaZUt4iwBe2J09TFTreqASiLGqqIfKbkl2R_guyFrdSXdWSm62Sdb2gYSk0iyx1iETJK7sG7jldxG09iLzyXOZSvnDsZxlpMrTZgLF9I_rDwy3Hcecugk1H-7NjlhleI8DxcNlmkKr03s0-R96NiCJ2qczzlv8wpTBzcu-gmJXybE5zF6tjwCfxgcNcUxqvgtRUgJ6cYgkjXD7s7upDVd8izxL-QyNb22rNH9H1SPQa8rCGRuNBlbHkSWveXjDmCXPwagT3BbCp3Q6Y1QopKeSYpD0yIqvUi8jeZS0A8L32An3gNl5fLXhWm0-x3ivlhF8OI-_vaC9gMFd6UM2Emo8FxGHqtafxEq9DzY7UUMl_WSruQzDLzy4eq88BEkOqo&state=xKfCNycWHarQegeT
2.412 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZDVlYWI0MzEtMmRmYi00NzNkLTg1MjItYmYxMDY1NDYyM2I4Il0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiT2FPRWtNZ3BmZDgxN2U5VVB4NGdFUSIsImV4cCI6MTUyOTc1NDc1NSwiaWF0IjoxNTI5NzUxMTU1LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI0Y2YzNzMxYy1lODQ5LTQyZTktOTFmNS0yMjU5NTgyZDA1OGEiLCJub25jZSI6IjRybktqdGIxNTFKSlNZVjQiLCJyYXQiOjE1Mjk3NTExNTQsInN1YiI6ImZvb0BiYXIuY29tIn0.o7PywR9XjTGrWslVA7XOaIf5cqQ-kVs7XktIi_vLl0Gr1wWzVsAQozf4wEvxdZHLIjRLyi7VRcMZZoGLPbycXgHw2bmjsnUc4-gEuwwzMYZtkRSdJdCrv_HeAr4Y4jiczXvVqNvVfxne4_FQGUrQjfq0Lcou0vQx5tXclFL6zK6ehR9mGOWit9QamvLEVDnMRmhUkgegLdMTXvZ5RcH0XmXcW--3rXfXbSoOBWIEVSsrpNBLzKc1gw9TtGdmzT4o8cPMxZZsfPrkT3NT9HU1k5wbHA3wW7J-xHOy529MaNOcaZUt4iwBe2J09TFTreqASiLGqqIfKbkl2R_guyFrdSXdWSm62Sdb2gYSk0iyx1iETJK7sG7jldxG09iLzyXOZSvnDsZxlpMrTZgLF9I_rDwy3Hcecugk1H-7NjlhleI8DxcNlmkKr03s0-R96NiCJ2qczzlv8wpTBzcu-gmJXybE5zF6tjwCfxgcNcUxqvgtRUgJ6cYgkjXD7s7upDVd8izxL-QyNb22rNH9H1SPQa8rCGRuNBlbHkSWveXjDmCXPwagT3BbCp3Q6Y1QopKeSYpD0yIqvUi8jeZS0A8L32An3gNl5fLXhWm0-x3ivlhF8OI-_vaC9gMFd6UM2Emo8FxGHqtafxEq9DzY7UUMl_WSruQzDLzy4eq88BEkOqo', 'state': 'xKfCNycWHarQegeT', 'code': 'xN5s-M4iSkj2iZm04r6RtS0zoQSCNRn5zMGw5uHJn_E.AoEIUUSbnRtDi0EeZ6WeDzNz-MwsSKd9gnghdIBdVIY'}
2.515 AuthorizationResponse {
"code": "xN5s-M4iSkj2iZm04r6RtS0zoQSCNRn5zMGw5uHJn_E.AoEIUUSbnRtDi0EeZ6WeDzNz-MwsSKd9gnghdIBdVIY",
"id_token": {
"aud": [
"d5eab431-2dfb-473d-8522-bf10654623b8"
],
"auth_time": 1529750975,
"c_hash": "OaOEkMgpfd817e9UPx4gEQ",
"exp": 1529754755,
"iat": 1529751155,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "4cf3731c-e849-42e9-91f5-2259582d058a",
"nonce": "4rnKjtb151JJSYV4",
"rat": 1529751154,
"sub": "[email protected]"
},
"state": "xKfCNycWHarQegeT"
}
2.515 phase <--<-- 4 --- AccessToken -->-->
2.515 --> request op_args: {'state': 'xKfCNycWHarQegeT', 'authn_method': 'client_secret_basic'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.515 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'xKfCNycWHarQegeT', 'code': 'xN5s-M4iSkj2iZm04r6RtS0zoQSCNRn5zMGw5uHJn_E.AoEIUUSbnRtDi0EeZ6WeDzNz-MwsSKd9gnghdIBdVIY', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'd5eab431-2dfb-473d-8522-bf10654623b8'}, 'state': 'xKfCNycWHarQegeT', 'authn_method': 'client_secret_basic'}
2.515 AccessTokenRequest {
"code": "xN5s-M4iSkj2iZm04r6RtS0zoQSCNRn5zMGw5uHJn_E.AoEIUUSbnRtDi0EeZ6WeDzNz-MwsSKd9gnghdIBdVIY",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "xKfCNycWHarQegeT"
}
2.515 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.515 request_http_args {'headers': {'Authorization': 'Basic ZDVlYWI0MzEtMmRmYi00NzNkLTg1MjItYmYxMDY1NDYyM2I4Ok5fOVclN0VVVnBSRUNL', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.515 request code=xN5s-M4iSkj2iZm04r6RtS0zoQSCNRn5zMGw5uHJn_E.AoEIUUSbnRtDi0EeZ6WeDzNz-MwsSKd9gnghdIBdVIY&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=xKfCNycWHarQegeT
2.733 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.734 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZDVlYWI0MzEtMmRmYi00NzNkLTg1MjItYmYxMDY1NDYyM2I4Il0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiT2FPRWtNZ3BmZDgxN2U5VVB4NGdFUSIsImV4cCI6MTUyOTc1NDc1NSwiaWF0IjoxNTI5NzUxMTU2LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI3OWRjMDk3Yy1lNzI0LTQ4YzMtOGU2OC02ZDU2YjY4NzhmMTkiLCJub25jZSI6IjRybktqdGIxNTFKSlNZVjQiLCJyYXQiOjE1Mjk3NTExNTQsInN1YiI6ImZvb0BiYXIuY29tIn0.WJjnUU6FKNqu15gIpDIdbNEBPghVJSB0hW--eMNullHHQVbpePLV2QQsk0d9t5vVym_VV1uZRL4RN1Ul4h_6Nd_HF-Fvae2zStucdv1dEBamzdmvgE3dsk7AcvULUMn57IndYMdq_vQ8IRmuIMUiCs8Hs7Q2CRHGZCKy5MvAjTtKIvbMSLpBADWOPPG2Y2PK1saC7zYefodnmcpotrKQQZynFZ1RCEfLk19RCfk-VkoqO3Q0HYIbo3kRg8RkN2ctPHigEMfMHffpNXq1awBSp90bUd3AC3lMRWB7ql4joAQY38w2LMX8GNzd_ykKpS3d-Y1GLT3GG5xaIiGEu6prDNf7zTUo-hg5ce3XJo9Qu-KeNB15thfXOKRsOvMMWeqsFFjTkZNyAqw_i-m5d7ZbepuDN_XiICVwv6K-E59rLF14TCwbBB9K5DlCpVlwxCBIoltzZcDpFTrceWaxhPmYwZ1-Gw6iSuLKM1drjAYDpeICw8483Iqc5W40UyykE0RFU3XPc33GJhHR7muOwj-wRItQddzEEnHBUhVO58QXClD6qTCWMoSmpB_dHDjgxDzCLmHtJhRKoh-JUcikF-L2XAeYDRjhZDp7qnCW7ov-keLmdle9ziAuvriPEl10S8S8BWXSt_WHUCg04FDZaaiElpWkXyv91V6zw3EyB018OaE', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'kjPClPaAO--qoAXOCH4RGJyoS0HNnghUhy2RCsuDl0Y.C2UvOofD2SUQY5oSFYw2KXATo-qovAiinrjcwwhBgZ8', 'scope': 'openid'}
2.738 AccessTokenResponse {
"access_token": "kjPClPaAO--qoAXOCH4RGJyoS0HNnghUhy2RCsuDl0Y.C2UvOofD2SUQY5oSFYw2KXATo-qovAiinrjcwwhBgZ8",
"expires_in": 3599,
"id_token": {
"aud": [
"d5eab431-2dfb-473d-8522-bf10654623b8"
],
"auth_time": 1529750975,
"c_hash": "OaOEkMgpfd817e9UPx4gEQ",
"exp": 1529754755,
"iat": 1529751156,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "79dc097c-e724-48c3-8e68-6d56b6878f19",
"nonce": "4rnKjtb151JJSYV4",
"rat": 1529751154,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
2.738 phase <--<-- 5 --- Done -->-->
2.738 end
2.738 assertion VerifyResponse
2.738 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.738 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Discovery-claims_supported.txt 0000644 0000000 0000000 00000005772 13313423101 017552 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Discovery-claims_supported
Test description: Verify that claims_supported is published
Timestamp: 2018-06-23T10:51:45Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.078 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.079 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.079 phase <--<-- 2 --- Done -->-->
0.079 end
0.08 assertion CheckHTTPResponse
0.08 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.08 assertion CheckHasClaimsSupported
0.08 condition providerinfo-has-claims_supported: status=OK [Check that the claims_supported discovery metadata value is in the provider_info]
0.08 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
providerinfo-has-claims_supported: status=OK [Check that the claims_supported discovery metadata value is in the provider_info]
Done: status=OK
============================================================
RESULT: PASSED
./OP-IDToken-c_hash.txt 0000644 0000000 0000000 00000022026 13313423154 014747 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-IDToken-c_hash
Test description: ID Token has c_hash when ID Token and Authorization Code returned from Authorization Endpoint [Hybrid]
Timestamp: 2018-06-23T10:52:28Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.113 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.115 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.115 phase <--<-- 2 --- Registration -->-->
0.115 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.115 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#XOiFCmvEwUIU2s6A"
],
"response_types": [
"code id_token"
]
}
0.275 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.276 RegistrationResponse {
"client_id": "f60072bd-f323-4fcc-9eb4-f9bcee97a63f",
"client_secret": "rAj8oS8kkthI",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "f60072bd-f323-4fcc-9eb4-f9bcee97a63f",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#XOiFCmvEwUIU2s6A"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.276 phase <--<-- 3 --- AsyncAuthn -->-->
0.276 AuthorizationRequest {
"client_id": "f60072bd-f323-4fcc-9eb4-f9bcee97a63f",
"nonce": "6ItYBO4OpWPpMFI7",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "trmWXSn7ja9zN449"
}
0.277 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=f60072bd-f323-4fcc-9eb4-f9bcee97a63f&state=trmWXSn7ja9zN449&response_type=code+id_token&nonce=6ItYBO4OpWPpMFI7
0.277 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=f60072bd-f323-4fcc-9eb4-f9bcee97a63f&state=trmWXSn7ja9zN449&response_type=code+id_token&nonce=6ItYBO4OpWPpMFI7
3.036 http args {}
3.243 response URL with fragment
3.243 response code=2E9v9MxJOdXprH69OC274RfzoZSHexc4ic3JZzsskzY.WcRBwU1oMrGbgsIVYlOfIBRfEhkSPJwVQ7gOBUF1rN0&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZjYwMDcyYmQtZjMyMy00ZmNjLTllYjQtZjliY2VlOTdhNjNmIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiM2lhdzBYNTJHZ0tJMzhfYzVxS1RVZyIsImV4cCI6MTUyOTc1NDc0OCwiaWF0IjoxNTI5NzUxMTQ4LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiIwYTE4ODMxMi02YzhlLTQ0YWYtOGUwMy03OThiYTI0ZGM0MTMiLCJub25jZSI6IjZJdFlCTzRPcFdQcE1GSTciLCJyYXQiOjE1Mjk3NTExNDUsInN1YiI6ImZvb0BiYXIuY29tIn0.DbsiMHcgLhN6tou6-vA5G58YdGHMcTaTuVSjG96NlYg0zfuO2mnw1TTEhKoAfMaljAc6AOxcVtwL2YNNFuJQRJ-DkaDs8Tu6OhvN_4OppJbmlFcAiHMXPPy7FtG2xs40ocS3zLoFbGE5kW1LeyUF38UFp04mWvqRshJFo3u17cdNAcWDINcVgIxjzKOtQjpL53uYW_Eoxi_0I8ERXdamL9dFXvOrQy5dbQ20heJImYQeKJeIeLMduLSPAcmVS6N90V4PmCAtJYOXg_Mvr36YBTfKuaIKuZens1MCAWjId5AYEkzGOdf6xvAaSZJAge-Q4uzG7cCNTRvFfomvZKhFTgFJKd76u_xlw-GCe__QT4t_ir11-mYWX2Vi1df_Onl9YigIhZPSuz9T_TN7V7PWjQApJUt0oJrkNY63tKk-9dUgkE07twz3qXfd0qIV7D5z79HNIL_5FKWz2zChXrLLLPPwX3EaHyGdmzMYzLl5Gcv5msvVeWWpZNHNlRU18Y2iaV6OWfRKr_OFrpxFLEVrzxSagh-TpZYg-OgXipidmGFf-bCTzxesbF5BTTrgakDd8FeV8cNLzz3wsepXfmbxa7Zlsu5PlKhshCwfxLmKIIXXdU9hxnvnSCqHzaeVaEGnK_QD4FVcZIMAKOon841p9En1KsSbZ5iEp6Eu0a2PfaE&state=trmWXSn7ja9zN449
3.243 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZjYwMDcyYmQtZjMyMy00ZmNjLTllYjQtZjliY2VlOTdhNjNmIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiM2lhdzBYNTJHZ0tJMzhfYzVxS1RVZyIsImV4cCI6MTUyOTc1NDc0OCwiaWF0IjoxNTI5NzUxMTQ4LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiIwYTE4ODMxMi02YzhlLTQ0YWYtOGUwMy03OThiYTI0ZGM0MTMiLCJub25jZSI6IjZJdFlCTzRPcFdQcE1GSTciLCJyYXQiOjE1Mjk3NTExNDUsInN1YiI6ImZvb0BiYXIuY29tIn0.DbsiMHcgLhN6tou6-vA5G58YdGHMcTaTuVSjG96NlYg0zfuO2mnw1TTEhKoAfMaljAc6AOxcVtwL2YNNFuJQRJ-DkaDs8Tu6OhvN_4OppJbmlFcAiHMXPPy7FtG2xs40ocS3zLoFbGE5kW1LeyUF38UFp04mWvqRshJFo3u17cdNAcWDINcVgIxjzKOtQjpL53uYW_Eoxi_0I8ERXdamL9dFXvOrQy5dbQ20heJImYQeKJeIeLMduLSPAcmVS6N90V4PmCAtJYOXg_Mvr36YBTfKuaIKuZens1MCAWjId5AYEkzGOdf6xvAaSZJAge-Q4uzG7cCNTRvFfomvZKhFTgFJKd76u_xlw-GCe__QT4t_ir11-mYWX2Vi1df_Onl9YigIhZPSuz9T_TN7V7PWjQApJUt0oJrkNY63tKk-9dUgkE07twz3qXfd0qIV7D5z79HNIL_5FKWz2zChXrLLLPPwX3EaHyGdmzMYzLl5Gcv5msvVeWWpZNHNlRU18Y2iaV6OWfRKr_OFrpxFLEVrzxSagh-TpZYg-OgXipidmGFf-bCTzxesbF5BTTrgakDd8FeV8cNLzz3wsepXfmbxa7Zlsu5PlKhshCwfxLmKIIXXdU9hxnvnSCqHzaeVaEGnK_QD4FVcZIMAKOon841p9En1KsSbZ5iEp6Eu0a2PfaE', 'state': 'trmWXSn7ja9zN449', 'code': '2E9v9MxJOdXprH69OC274RfzoZSHexc4ic3JZzsskzY.WcRBwU1oMrGbgsIVYlOfIBRfEhkSPJwVQ7gOBUF1rN0'}
3.322 AuthorizationResponse {
"code": "2E9v9MxJOdXprH69OC274RfzoZSHexc4ic3JZzsskzY.WcRBwU1oMrGbgsIVYlOfIBRfEhkSPJwVQ7gOBUF1rN0",
"id_token": {
"aud": [
"f60072bd-f323-4fcc-9eb4-f9bcee97a63f"
],
"auth_time": 1529750975,
"c_hash": "3iaw0X52GgKI38_c5qKTUg",
"exp": 1529754748,
"iat": 1529751148,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "0a188312-6c8e-44af-8e03-798ba24dc413",
"nonce": "6ItYBO4OpWPpMFI7",
"rat": 1529751145,
"sub": "[email protected]"
},
"state": "trmWXSn7ja9zN449"
}
3.322 phase <--<-- 4 --- Done -->-->
3.322 end
3.323 assertion VerifyAuthnResponse
3.323 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
3.323 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Registration-logo_uri.txt 0000644 0000000 0000000 00000022337 13313423124 016520 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-logo_uri
Test description: Registration with logo_uri
Timestamp: 2018-06-23T10:52:04Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.079 phase <--<-- 1 --- Webfinger -->-->
1.079 not expected to do WebFinger
1.079 phase <--<-- 2 --- Discovery -->-->
1.079 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.154 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.155 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.156 phase <--<-- 3 --- Registration -->-->
1.156 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'logo_uri': 'https://op.certification.openid.net:61353/static/logo.png'}
1.156 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"logo_uri": "https://op.certification.openid.net:61353/static/logo.png",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#JKJlmwAhxBFGF86b"
],
"response_types": [
"code id_token"
]
}
1.317 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.318 RegistrationResponse {
"client_id": "10589b27-19a0-4c90-bc9b-ab9d9abb027d",
"client_secret": "f1x_A1Emojlr",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "10589b27-19a0-4c90-bc9b-ab9d9abb027d",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"logo_uri": "https://op.certification.openid.net:61353/static/logo.png",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#JKJlmwAhxBFGF86b"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.318 phase <--<-- 4 --- AsyncAuthn -->-->
1.319 AuthorizationRequest {
"client_id": "10589b27-19a0-4c90-bc9b-ab9d9abb027d",
"nonce": "5VUjjzrcR0064FJB",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "9OjOJUbZPXjduA4z"
}
1.319 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=10589b27-19a0-4c90-bc9b-ab9d9abb027d&state=9OjOJUbZPXjduA4z&response_type=code+id_token&nonce=5VUjjzrcR0064FJB
1.319 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=10589b27-19a0-4c90-bc9b-ab9d9abb027d&state=9OjOJUbZPXjduA4z&response_type=code+id_token&nonce=5VUjjzrcR0064FJB
4.242 http args {}
4.446 response URL with fragment
4.447 response code=zJ_ck-sv6zM8ZhyM1kpezhbTfxytHCDosM6Um_Kmqz0.wCeWK5wnsR_sl7waxeAFFc0Zl4dL8DgQyKBlwRpx-AQ&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMTA1ODliMjctMTlhMC00YzkwLWJjOWItYWI5ZDlhYmIwMjdkIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiZmpja2RCY050OHFCd2ZNcnFTS2NXdyIsImV4cCI6MTUyOTc1NDcyNCwiaWF0IjoxNTI5NzUxMTI0LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiIxZGFmNGQ0MS1kMzIzLTRlNDUtODI5OS02ZjVjMDRlNTAxMzQiLCJub25jZSI6IjVWVWpqenJjUjAwNjRGSkIiLCJyYXQiOjE1Mjk3NTExMjEsInN1YiI6ImZvb0BiYXIuY29tIn0.x8mYbdGX7SAQ9WurEqLWoiBjZ3hVj-_7lngRt_HkRvGUSCpVJMZrT5bD3KSDttJzYui1MNFg86duJdzNSRvktXN8fVpJP8eVMmKIGdRWRadtfxaCrbFrRUYy4Z4teQdCylRaVZPirotqwFNtqkuo7Z21APZ6S56GQPT--jVvOIrW3EViXFFTCrnZQtQJRdEeBbzFODLk1mV32jXt_jiE8Bp9ZbtZGrteP7-PcW50L-U86uCkdX4M06WdfollB0c6AVoFKLCSONp3bCXQYtgaMhXczqURpzFR3skM51j8cZTISYu2OHoRfmOud7azAjsqePAKI-DhlS15AJeL685y_ipEViv404sYQ6vxOiN88HU9ezcWwD31zNjzN4m7UN6xjkq1Cj1Bwp5VsB0MVO86YzjIcVdOccYjpCWpm-Xodqj9TfieQhmolslLyCFjATi3Kz5xqBZ2BOpT_oestnZ0p89rhQN5X4_7g0t_t2xrF3-YzbxzCEfDf9aSIzn1ooPMsU3jn4VXjX27AhsBOexXgfxRNEK__ApTx1Rp6c5e6LPVyyS74HY9J0NlRPCy0pXG51gEPyNc2UlYN2vOXgUuBEeiFoqa7myqOFDDbt0mcG97RRiXm4C7SK__uioJMbZ6C8PS0jwGUTLamFZhO5IXgRAciL8mkxBzqZixmyfVkVk&state=9OjOJUbZPXjduA4z
4.447 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMTA1ODliMjctMTlhMC00YzkwLWJjOWItYWI5ZDlhYmIwMjdkIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiZmpja2RCY050OHFCd2ZNcnFTS2NXdyIsImV4cCI6MTUyOTc1NDcyNCwiaWF0IjoxNTI5NzUxMTI0LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiIxZGFmNGQ0MS1kMzIzLTRlNDUtODI5OS02ZjVjMDRlNTAxMzQiLCJub25jZSI6IjVWVWpqenJjUjAwNjRGSkIiLCJyYXQiOjE1Mjk3NTExMjEsInN1YiI6ImZvb0BiYXIuY29tIn0.x8mYbdGX7SAQ9WurEqLWoiBjZ3hVj-_7lngRt_HkRvGUSCpVJMZrT5bD3KSDttJzYui1MNFg86duJdzNSRvktXN8fVpJP8eVMmKIGdRWRadtfxaCrbFrRUYy4Z4teQdCylRaVZPirotqwFNtqkuo7Z21APZ6S56GQPT--jVvOIrW3EViXFFTCrnZQtQJRdEeBbzFODLk1mV32jXt_jiE8Bp9ZbtZGrteP7-PcW50L-U86uCkdX4M06WdfollB0c6AVoFKLCSONp3bCXQYtgaMhXczqURpzFR3skM51j8cZTISYu2OHoRfmOud7azAjsqePAKI-DhlS15AJeL685y_ipEViv404sYQ6vxOiN88HU9ezcWwD31zNjzN4m7UN6xjkq1Cj1Bwp5VsB0MVO86YzjIcVdOccYjpCWpm-Xodqj9TfieQhmolslLyCFjATi3Kz5xqBZ2BOpT_oestnZ0p89rhQN5X4_7g0t_t2xrF3-YzbxzCEfDf9aSIzn1ooPMsU3jn4VXjX27AhsBOexXgfxRNEK__ApTx1Rp6c5e6LPVyyS74HY9J0NlRPCy0pXG51gEPyNc2UlYN2vOXgUuBEeiFoqa7myqOFDDbt0mcG97RRiXm4C7SK__uioJMbZ6C8PS0jwGUTLamFZhO5IXgRAciL8mkxBzqZixmyfVkVk', 'state': '9OjOJUbZPXjduA4z', 'code': 'zJ_ck-sv6zM8ZhyM1kpezhbTfxytHCDosM6Um_Kmqz0.wCeWK5wnsR_sl7waxeAFFc0Zl4dL8DgQyKBlwRpx-AQ'}
4.561 AuthorizationResponse {
"code": "zJ_ck-sv6zM8ZhyM1kpezhbTfxytHCDosM6Um_Kmqz0.wCeWK5wnsR_sl7waxeAFFc0Zl4dL8DgQyKBlwRpx-AQ",
"id_token": {
"aud": [
"10589b27-19a0-4c90-bc9b-ab9d9abb027d"
],
"auth_time": 1529750975,
"c_hash": "fjckdBcNt8qBwfMrqSKcWw",
"exp": 1529754724,
"iat": 1529751124,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "1daf4d41-d323-4e45-8299-6f5c04e50134",
"nonce": "5VUjjzrcR0064FJB",
"rat": 1529751121,
"sub": "[email protected]"
},
"state": "9OjOJUbZPXjduA4z"
}
4.561 phase <--<-- 5 --- Done -->-->
4.561 end
4.562 assertion VerifyAuthnResponse
4.562 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
4.562 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-redirect_uri-Query-OK.txt 0000644 0000000 0000000 00000022646 13313423412 016326 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-Query-OK
Test description: Request with a redirect_uri with a query component when a redirect_uri with the same query component is registered
Timestamp: 2018-06-23T10:55:06Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.076 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.077 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.077 phase <--<-- 2 --- Registration -->-->
0.077 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb?foo=bar'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.078 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb?foo=bar"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#VXD8W8WWf1ti8maQ"
],
"response_types": [
"code id_token"
]
}
0.234 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.235 RegistrationResponse {
"client_id": "45b913e8-3e87-466e-b464-2278d2a72190",
"client_secret": "wlGmnrSWeTlU",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "45b913e8-3e87-466e-b464-2278d2a72190",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb?foo=bar"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#VXD8W8WWf1ti8maQ"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.235 phase <--<-- 3 --- AsyncAuthn -->-->
0.235 AuthorizationRequest {
"client_id": "45b913e8-3e87-466e-b464-2278d2a72190",
"nonce": "Ng0mM8TN571Kk3Le",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb?foo=bar",
"response_type": "code id_token",
"scope": "openid",
"state": "3nCtpDevq22iGQEs"
}
0.236 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb%3Ffoo%3Dbar&client_id=45b913e8-3e87-466e-b464-2278d2a72190&state=3nCtpDevq22iGQEs&response_type=code+id_token&nonce=Ng0mM8TN571Kk3Le
0.236 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb%3Ffoo%3Dbar&client_id=45b913e8-3e87-466e-b464-2278d2a72190&state=3nCtpDevq22iGQEs&response_type=code+id_token&nonce=Ng0mM8TN571Kk3Le
2.698 http args {'foo': 'bar'}
2.872 response URL with fragment
2.872 response code=gtAJKrrXqrlZruz5LXVaHztBXf2-s3y4HcVb-W6_4po.szFxKoVQgrv7yPM87KQ2PKlRs7V-WRtFUtoRj78OJms&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNDViOTEzZTgtM2U4Ny00NjZlLWI0NjQtMjI3OGQyYTcyMTkwIl0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiTGF1dWFoX0xjcHdyZXZIVnNGdDVFdyIsImV4cCI6MTUyOTc1NDkwNiwiaWF0IjoxNTI5NzUxMzA2LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJhYmEwNDJjZS1kOTMxLTQ1OTQtOWQ4Mi01ZjljMjRhNDQyMzMiLCJub25jZSI6Ik5nMG1NOFRONTcxS2szTGUiLCJyYXQiOjE1Mjk3NTEzMDQsInN1YiI6ImZvb0BiYXIuY29tIn0.ngy0-UAs8ge1qrFjPQvWjgOw0PUr2tYXUYl1qk1MjeJdvyC_CPyRwPltoXlqW605KYfG1cvth4D0uBqz3qtGWCb0BIa3sNcRMkooEIvIF9AGhgrwg4RU0LWwzU6SoOkt23EjD1clTTqLJ-5hX1KEyNrPTDx6LFzamAb8HUdfMtV-hol4zKgeMMdvU-gXgsvnQjbYfJ3-nOTdtqGqPjJcJxx_nAPY6WOA3ofHd_DG-2Lj_8SXxw-VDGr-fny2KjpEPz5_aNo4bjdaDtfOQOtyoA7LH3UgEmxOYI2PO4oySjQXEjpU6l5hWhvmaa0SdAva6EEVN91-N-JojRKoK5lwhQDLNYRsjU2ETQHKNI_CPoX82UzNFtU6duefO7EnzP1FlJLlbFRLf802owM7YS06yxKL8jwk1194Vr7QNmEKkQn6A3wOc-RpMvE67jTmXMuGl1bXp9j22jcaeYJdnVDkk25vVYWaOm_tjyXZMlNb774XGhCyKMVrMyK8KHR8AQyWbIcyrVIu6PRgGTSk7PTxb8KZ23WIZMcCtGuOam2dSwOQFXkN5x1rlHSoMZsY_EBL1neusG8EV9I91ImP1a40ZS3eDhvTqRMLmdx79EFRhaGTesj7bpcr_5MwjGXGu1Y64nxge6Zqj7aSVBja6FmhSn5gmWUFv0-CJOnDub1eUcI&state=3nCtpDevq22iGQEs
2.873 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNDViOTEzZTgtM2U4Ny00NjZlLWI0NjQtMjI3OGQyYTcyMTkwIl0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiTGF1dWFoX0xjcHdyZXZIVnNGdDVFdyIsImV4cCI6MTUyOTc1NDkwNiwiaWF0IjoxNTI5NzUxMzA2LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJhYmEwNDJjZS1kOTMxLTQ1OTQtOWQ4Mi01ZjljMjRhNDQyMzMiLCJub25jZSI6Ik5nMG1NOFRONTcxS2szTGUiLCJyYXQiOjE1Mjk3NTEzMDQsInN1YiI6ImZvb0BiYXIuY29tIn0.ngy0-UAs8ge1qrFjPQvWjgOw0PUr2tYXUYl1qk1MjeJdvyC_CPyRwPltoXlqW605KYfG1cvth4D0uBqz3qtGWCb0BIa3sNcRMkooEIvIF9AGhgrwg4RU0LWwzU6SoOkt23EjD1clTTqLJ-5hX1KEyNrPTDx6LFzamAb8HUdfMtV-hol4zKgeMMdvU-gXgsvnQjbYfJ3-nOTdtqGqPjJcJxx_nAPY6WOA3ofHd_DG-2Lj_8SXxw-VDGr-fny2KjpEPz5_aNo4bjdaDtfOQOtyoA7LH3UgEmxOYI2PO4oySjQXEjpU6l5hWhvmaa0SdAva6EEVN91-N-JojRKoK5lwhQDLNYRsjU2ETQHKNI_CPoX82UzNFtU6duefO7EnzP1FlJLlbFRLf802owM7YS06yxKL8jwk1194Vr7QNmEKkQn6A3wOc-RpMvE67jTmXMuGl1bXp9j22jcaeYJdnVDkk25vVYWaOm_tjyXZMlNb774XGhCyKMVrMyK8KHR8AQyWbIcyrVIu6PRgGTSk7PTxb8KZ23WIZMcCtGuOam2dSwOQFXkN5x1rlHSoMZsY_EBL1neusG8EV9I91ImP1a40ZS3eDhvTqRMLmdx79EFRhaGTesj7bpcr_5MwjGXGu1Y64nxge6Zqj7aSVBja6FmhSn5gmWUFv0-CJOnDub1eUcI', 'state': '3nCtpDevq22iGQEs', 'code': 'gtAJKrrXqrlZruz5LXVaHztBXf2-s3y4HcVb-W6_4po.szFxKoVQgrv7yPM87KQ2PKlRs7V-WRtFUtoRj78OJms'}
2.95 AuthorizationResponse {
"code": "gtAJKrrXqrlZruz5LXVaHztBXf2-s3y4HcVb-W6_4po.szFxKoVQgrv7yPM87KQ2PKlRs7V-WRtFUtoRj78OJms",
"id_token": {
"aud": [
"45b913e8-3e87-466e-b464-2278d2a72190"
],
"auth_time": 1529751224,
"c_hash": "Lauuah_LcpwrevHVsFt5Ew",
"exp": 1529754906,
"iat": 1529751306,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "aba042ce-d931-4594-9d82-5f9c24a44233",
"nonce": "Ng0mM8TN571Kk3Le",
"rat": 1529751304,
"sub": "[email protected]"
},
"state": "3nCtpDevq22iGQEs"
}
2.95 phase <--<-- 4 --- Done -->-->
2.95 end
2.951 assertion VerifyResponse
2.951 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.951 assertion CheckQueryPart
2.951 condition check-query-part: status=OK [Check that a query part send in the Authorization Request is returned in the Authorization response.]
2.951 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
check-query-part: status=OK [Check that a query part send in the Authorization Request is returned in the Authorization response.]
Done: status=OK
============================================================
RESULT: PASSED
./OP-IDToken-kid.txt 0000644 0000000 0000000 00000031165 13313423160 014272 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-IDToken-kid
Test description: IDToken has kid [Basic, Implicit, Hybrid]
Timestamp: 2018-06-23T10:52:32Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.077 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.079 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.079 phase <--<-- 2 --- Registration -->-->
0.079 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.079 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#hwB23OFBIUT8n3Dx"
],
"response_types": [
"code id_token"
]
}
0.237 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.238 RegistrationResponse {
"client_id": "7d8e41f1-bb90-4c62-8d1c-ba2ef0fb97bc",
"client_secret": "qnaNIVuERuWW",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "7d8e41f1-bb90-4c62-8d1c-ba2ef0fb97bc",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#hwB23OFBIUT8n3Dx"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.238 phase <--<-- 3 --- AsyncAuthn -->-->
0.239 AuthorizationRequest {
"client_id": "7d8e41f1-bb90-4c62-8d1c-ba2ef0fb97bc",
"nonce": "UkvdiHPptM7fQIL0",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "xjK7jKSFSquPZHuQ"
}
0.239 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=7d8e41f1-bb90-4c62-8d1c-ba2ef0fb97bc&state=xjK7jKSFSquPZHuQ&response_type=code+id_token&nonce=UkvdiHPptM7fQIL0
0.239 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=7d8e41f1-bb90-4c62-8d1c-ba2ef0fb97bc&state=xjK7jKSFSquPZHuQ&response_type=code+id_token&nonce=UkvdiHPptM7fQIL0
2.325 http args {}
2.495 response URL with fragment
2.495 response code=v00EpU4rX4fMeTRiYTwd7vUCtNKEhPZ1ilY5ZSroRi4.EXbTpR8l6sZczidVUIkuoW1DORIbqtk7G4rpVbWAOa0&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiN2Q4ZTQxZjEtYmI5MC00YzYyLThkMWMtYmEyZWYwZmI5N2JjIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiSjh3RGR1MWpRbUwtTndaS0JqWjY4QSIsImV4cCI6MTUyOTc1NDc1MSwiaWF0IjoxNTI5NzUxMTUxLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI1Y2Q5YmU5YS04NGU0LTRkNzUtOGJlMC1mNDQ5MzU3ZjFkMGIiLCJub25jZSI6IlVrdmRpSFBwdE03ZlFJTDAiLCJyYXQiOjE1Mjk3NTExNTAsInN1YiI6ImZvb0BiYXIuY29tIn0.UWwkE4jqYovuY-Uuqj5yZ2qk5F3lDz4G4TmjoX3XSPYXnH5u5cRQR0VJP7DtlEe9wOeV06c7a2FGL8gqad9J_FjYxUXpvh97xU7pFgRZUg4DcJpleAU92WAcda3zokwhwgf8Bew_93HM03zxv_qINeJdpQWTrGtLuVNdy3PuaA6uwM_OUQ7SRKoumtjvfQpfT74ZbE-wwsJrj0UBlO8KC684l0pQY0q2OSXWuD4K80ZdCZ2GBlRuGvyOLHwTOuQm9eCDJMpt3yfewsUlL80f5PG_1u2KDRHt8OUh8wqF9cD9nySnzvumZ7c_KEfMRCbMXphrbK4OgZivXe_iUGVZCd0lobr4UEIT0ydTwX4s-D8_yWKSgxIcDGRZ7fEjdkSWtST6phsc61bQJizpp-Wxomk8AsUIoaoc36lchfJvzTc3g43xGmhepwCbsMQLzOpPOdhNkNKdTKk5ElV2qI-ispyoWKpB_6xPujKMWJ8lOZwwhcDaxSzVsCaak6NKzD4kJeWfJPyrGoy8CZZqLYg1Ydk7zgyYKiB0xgeiwbeu1FsfDwX_idfN0CbKKO27hv57vK6jmWQkn8OXfSqPn_oNX12e1yAvIsLtEpd4Xo05BkAucdsw2LNd4OeIUtLZ3Ie0os7ZjfRXTpR5d8IttxF5wUUxEdXB9gkEw4IZmMHfQps&state=xjK7jKSFSquPZHuQ
2.496 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiN2Q4ZTQxZjEtYmI5MC00YzYyLThkMWMtYmEyZWYwZmI5N2JjIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiSjh3RGR1MWpRbUwtTndaS0JqWjY4QSIsImV4cCI6MTUyOTc1NDc1MSwiaWF0IjoxNTI5NzUxMTUxLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI1Y2Q5YmU5YS04NGU0LTRkNzUtOGJlMC1mNDQ5MzU3ZjFkMGIiLCJub25jZSI6IlVrdmRpSFBwdE03ZlFJTDAiLCJyYXQiOjE1Mjk3NTExNTAsInN1YiI6ImZvb0BiYXIuY29tIn0.UWwkE4jqYovuY-Uuqj5yZ2qk5F3lDz4G4TmjoX3XSPYXnH5u5cRQR0VJP7DtlEe9wOeV06c7a2FGL8gqad9J_FjYxUXpvh97xU7pFgRZUg4DcJpleAU92WAcda3zokwhwgf8Bew_93HM03zxv_qINeJdpQWTrGtLuVNdy3PuaA6uwM_OUQ7SRKoumtjvfQpfT74ZbE-wwsJrj0UBlO8KC684l0pQY0q2OSXWuD4K80ZdCZ2GBlRuGvyOLHwTOuQm9eCDJMpt3yfewsUlL80f5PG_1u2KDRHt8OUh8wqF9cD9nySnzvumZ7c_KEfMRCbMXphrbK4OgZivXe_iUGVZCd0lobr4UEIT0ydTwX4s-D8_yWKSgxIcDGRZ7fEjdkSWtST6phsc61bQJizpp-Wxomk8AsUIoaoc36lchfJvzTc3g43xGmhepwCbsMQLzOpPOdhNkNKdTKk5ElV2qI-ispyoWKpB_6xPujKMWJ8lOZwwhcDaxSzVsCaak6NKzD4kJeWfJPyrGoy8CZZqLYg1Ydk7zgyYKiB0xgeiwbeu1FsfDwX_idfN0CbKKO27hv57vK6jmWQkn8OXfSqPn_oNX12e1yAvIsLtEpd4Xo05BkAucdsw2LNd4OeIUtLZ3Ie0os7ZjfRXTpR5d8IttxF5wUUxEdXB9gkEw4IZmMHfQps', 'state': 'xjK7jKSFSquPZHuQ', 'code': 'v00EpU4rX4fMeTRiYTwd7vUCtNKEhPZ1ilY5ZSroRi4.EXbTpR8l6sZczidVUIkuoW1DORIbqtk7G4rpVbWAOa0'}
2.575 AuthorizationResponse {
"code": "v00EpU4rX4fMeTRiYTwd7vUCtNKEhPZ1ilY5ZSroRi4.EXbTpR8l6sZczidVUIkuoW1DORIbqtk7G4rpVbWAOa0",
"id_token": {
"aud": [
"7d8e41f1-bb90-4c62-8d1c-ba2ef0fb97bc"
],
"auth_time": 1529750975,
"c_hash": "J8wDdu1jQmL-NwZKBjZ68A",
"exp": 1529754751,
"iat": 1529751151,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "5cd9be9a-84e4-4d75-8be0-f449357f1d0b",
"nonce": "UkvdiHPptM7fQIL0",
"rat": 1529751150,
"sub": "[email protected]"
},
"state": "xjK7jKSFSquPZHuQ"
}
2.575 phase <--<-- 4 --- AccessToken -->-->
2.575 --> request op_args: {'state': 'xjK7jKSFSquPZHuQ'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.575 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'xjK7jKSFSquPZHuQ', 'code': 'v00EpU4rX4fMeTRiYTwd7vUCtNKEhPZ1ilY5ZSroRi4.EXbTpR8l6sZczidVUIkuoW1DORIbqtk7G4rpVbWAOa0', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '7d8e41f1-bb90-4c62-8d1c-ba2ef0fb97bc'}, 'state': 'xjK7jKSFSquPZHuQ'}
2.575 AccessTokenRequest {
"code": "v00EpU4rX4fMeTRiYTwd7vUCtNKEhPZ1ilY5ZSroRi4.EXbTpR8l6sZczidVUIkuoW1DORIbqtk7G4rpVbWAOa0",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "xjK7jKSFSquPZHuQ"
}
2.575 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.575 request_http_args {'headers': {'Authorization': 'Basic N2Q4ZTQxZjEtYmI5MC00YzYyLThkMWMtYmEyZWYwZmI5N2JjOnFuYU5JVnVFUnVXVw==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.575 request code=v00EpU4rX4fMeTRiYTwd7vUCtNKEhPZ1ilY5ZSroRi4.EXbTpR8l6sZczidVUIkuoW1DORIbqtk7G4rpVbWAOa0&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=xjK7jKSFSquPZHuQ
2.79 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.791 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiN2Q4ZTQxZjEtYmI5MC00YzYyLThkMWMtYmEyZWYwZmI5N2JjIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiSjh3RGR1MWpRbUwtTndaS0JqWjY4QSIsImV4cCI6MTUyOTc1NDc1MSwiaWF0IjoxNTI5NzUxMTUyLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJjYzliNjAyMS05OTdjLTQ4NDItYmNlMi0yZTFmMjM3MWJjMzQiLCJub25jZSI6IlVrdmRpSFBwdE03ZlFJTDAiLCJyYXQiOjE1Mjk3NTExNTAsInN1YiI6ImZvb0BiYXIuY29tIn0.wg2a8jGDiyL1IucKT0KMK74hAJCEoY-lrizgey-5eql5-Lo1r2Dw9HuBbjBzOrGWkadCCFc7tzM60zKk2WIDTkaghcIqL7ZVsxBs9ASErqUlVHxh1IGXQw_NRm7lVuRJgfK1qURle_HD-yt57E7N3kyCMHpIovcHj5wNQbwBUfb-hg86ymz5VvHgeFs0F61PjYalEy1TpTff3OGeOvKKfpQxYIn_0n8-oqouRqcWV56U9BSVOuAxha5_85ktNFMhmhb4OfIwcyfA5BY88XNn1CQYeSBCC_sx5vT7ERF7cPPi7IHufccOPeOc3p37w7HlAo2Gb7_T9Xb05E8M__Q4P_50sENJkhdCsX9vwqJbwByExD7IpEqsz3cXcHy5DC1P6q025akELnB2_M0MDZN1IcCKA-zZbIKMG79kAevCtVxDpGH07_zts1dNlmcYSZ1SEDDDCLgImpobIaXw48jrlvdHK_k_AFme5W_pXjJfkSEc58-lS_BxKmzrMFFzrY8NXMbepizWyL3I8Wb33wp6xwOVtosFKq3sIUjz9LKMW4mW5qwI9ZMMP7iTeJzYcECGP9mV8I2Wc7mHHM7TevzCnmvH9kW4M7DcYq5WcwylvmfnfGI2fui2EQ1WR0OlNZCUwh95fndfS5nuik6ET2UsGBckIFaWFYXWDcUijmg0_Cs', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'R_qGhLUnDUo52fohC5Du1R0GqxhXH8j9u2OFFpRU3OQ.MCk90rUxisSOWEh5ryZj8KwqDQmyxsH4DPaByxUelgk', 'scope': 'openid'}
2.794 AccessTokenResponse {
"access_token": "R_qGhLUnDUo52fohC5Du1R0GqxhXH8j9u2OFFpRU3OQ.MCk90rUxisSOWEh5ryZj8KwqDQmyxsH4DPaByxUelgk",
"expires_in": 3599,
"id_token": {
"aud": [
"7d8e41f1-bb90-4c62-8d1c-ba2ef0fb97bc"
],
"auth_time": 1529750975,
"c_hash": "J8wDdu1jQmL-NwZKBjZ68A",
"exp": 1529754751,
"iat": 1529751152,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "cc9b6021-997c-4842-bce2-2e1f2371bc34",
"nonce": "UkvdiHPptM7fQIL0",
"rat": 1529751150,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
2.794 phase <--<-- 5 --- Done -->-->
2.794 end
2.795 assertion VerifySignedIdTokenHasKID
2.795 condition verify-signed-idtoken-has-kid: status=OK [Verifies that the header of a signed IDToken includes a kid claim.]
2.795 assertion VerifyResponse
2.795 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.795 condition Done: status=OK
============================================================
Conditions
verify-signed-idtoken-has-kid: status=OK [Verifies that the header of a signed IDToken includes a kid claim.]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Req-claims_locales.txt 0000644 0000000 0000000 00000032151 13313423505 015726 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-claims_locales
Test description: Providing claims_locales
Timestamp: 2018-06-23T10:56:05Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
0.995 phase <--<-- 1 --- Webfinger -->-->
0.995 not expected to do WebFinger
0.996 phase <--<-- 2 --- Discovery -->-->
0.996 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.106 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.108 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.108 phase <--<-- 3 --- Registration -->-->
1.108 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.108 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#TkKrL99BnzPDscVc"
],
"response_types": [
"code id_token"
]
}
1.27 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.27 RegistrationResponse {
"client_id": "e69978c7-caff-4582-9e12-aab6fb43b829",
"client_secret": "dFy0y78jhbYH",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "e69978c7-caff-4582-9e12-aab6fb43b829",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#TkKrL99BnzPDscVc"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.271 phase <--<-- 4 --- AsyncAuthn -->-->
1.271 AuthorizationRequest {
"claims_locales": "se",
"client_id": "e69978c7-caff-4582-9e12-aab6fb43b829",
"nonce": "XtMGKaGnVvc2wgnV",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "fIlSaPFu0JjY8QXb"
}
1.271 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=e69978c7-caff-4582-9e12-aab6fb43b829&state=fIlSaPFu0JjY8QXb&response_type=code+id_token&nonce=XtMGKaGnVvc2wgnV&claims_locales=se
1.271 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=e69978c7-caff-4582-9e12-aab6fb43b829&state=fIlSaPFu0JjY8QXb&response_type=code+id_token&nonce=XtMGKaGnVvc2wgnV&claims_locales=se
4.208 http args {}
4.423 response URL with fragment
4.424 response code=wiISqZEYtfnWH61QKxHiAzwJsXtaNLWWx7Ah7HXCoqs.Xv9WTT5OKaw_Tr6D7pu5sviReuNOZ20yRZXTGNXEsaI&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZTY5OTc4YzctY2FmZi00NTgyLTllMTItYWFiNmZiNDNiODI5Il0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiVDZ0dWxJaEJEV1BSc2Z4NGdYdGVpUSIsImV4cCI6MTUyOTc1NDk2NCwiaWF0IjoxNTI5NzUxMzY0LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJhZjg4MDBhOC1mYzY3LTQxNGUtYTYzNi1lMmQ5YzkxZTA3NTAiLCJub25jZSI6Ilh0TUdLYUduVnZjMndnblYiLCJyYXQiOjE1Mjk3NTEzNjIsInN1YiI6ImZvb0BiYXIuY29tIn0.GPddCFsqeJZhuLcpyu659CRCJNT_E3s064Dw00tU_fMgOa0b_AlGKkbgdNPrY5BH9KzSv_BPPHT06SdLpxMm-HPeNLUHA5dakehjIfUTqfFCOwImLU8BUR2sPPO42gEux_wiAoQbuJPYbxklS2p8hnpwZ0U3rbn6qBlBY5rMeWaw5mB5-y2ip4eVDo8VhmJyHhl-5N9o1TXwUL70ZSsqOmevchS2khgPtGzuVoARWNqTqC3x5BL4yP0NYU0-3qzTAsZ7X4a6s1oyOaHzfM6fHO_SmHK0wxvT_CxOj73JyAEs6Jrce8Dm2H-VwO80kzP1THqQsxeIGb2zaDDXDC-kZ5ThLDMvcTCmYmpDuosZrmkiggNLC46hpJI_h8QeM-iFVCPNkSi_BEsEa2S1NnwI0mGKooJhLS-XBUFKT1_LwR-5j1hJ7qnjwSxwfjIPDBRDEhSPb6ZuMwEGU6rak_46K2llGDFpcHrm2mD_p779OMq7Ft68h8V5jj7kUwmCqfDFn5n5xmTeF2DuWiCMBbcqDMcndtjs1_1jKWKRA0S5r_5UhzxfeWkJ-tNdEzathhEKV6vH7qd3Nvu6Cgd3IKU13LsvU7KWGQPof7JcwuOCRagdJFfeVK_aBuIuI5E5siC82JcBAcYJDF5jjredjr5DYgEg2vVExNKAv8ygwOYpnSg&state=fIlSaPFu0JjY8QXb
4.424 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZTY5OTc4YzctY2FmZi00NTgyLTllMTItYWFiNmZiNDNiODI5Il0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiVDZ0dWxJaEJEV1BSc2Z4NGdYdGVpUSIsImV4cCI6MTUyOTc1NDk2NCwiaWF0IjoxNTI5NzUxMzY0LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJhZjg4MDBhOC1mYzY3LTQxNGUtYTYzNi1lMmQ5YzkxZTA3NTAiLCJub25jZSI6Ilh0TUdLYUduVnZjMndnblYiLCJyYXQiOjE1Mjk3NTEzNjIsInN1YiI6ImZvb0BiYXIuY29tIn0.GPddCFsqeJZhuLcpyu659CRCJNT_E3s064Dw00tU_fMgOa0b_AlGKkbgdNPrY5BH9KzSv_BPPHT06SdLpxMm-HPeNLUHA5dakehjIfUTqfFCOwImLU8BUR2sPPO42gEux_wiAoQbuJPYbxklS2p8hnpwZ0U3rbn6qBlBY5rMeWaw5mB5-y2ip4eVDo8VhmJyHhl-5N9o1TXwUL70ZSsqOmevchS2khgPtGzuVoARWNqTqC3x5BL4yP0NYU0-3qzTAsZ7X4a6s1oyOaHzfM6fHO_SmHK0wxvT_CxOj73JyAEs6Jrce8Dm2H-VwO80kzP1THqQsxeIGb2zaDDXDC-kZ5ThLDMvcTCmYmpDuosZrmkiggNLC46hpJI_h8QeM-iFVCPNkSi_BEsEa2S1NnwI0mGKooJhLS-XBUFKT1_LwR-5j1hJ7qnjwSxwfjIPDBRDEhSPb6ZuMwEGU6rak_46K2llGDFpcHrm2mD_p779OMq7Ft68h8V5jj7kUwmCqfDFn5n5xmTeF2DuWiCMBbcqDMcndtjs1_1jKWKRA0S5r_5UhzxfeWkJ-tNdEzathhEKV6vH7qd3Nvu6Cgd3IKU13LsvU7KWGQPof7JcwuOCRagdJFfeVK_aBuIuI5E5siC82JcBAcYJDF5jjredjr5DYgEg2vVExNKAv8ygwOYpnSg', 'state': 'fIlSaPFu0JjY8QXb', 'code': 'wiISqZEYtfnWH61QKxHiAzwJsXtaNLWWx7Ah7HXCoqs.Xv9WTT5OKaw_Tr6D7pu5sviReuNOZ20yRZXTGNXEsaI'}
4.505 AuthorizationResponse {
"code": "wiISqZEYtfnWH61QKxHiAzwJsXtaNLWWx7Ah7HXCoqs.Xv9WTT5OKaw_Tr6D7pu5sviReuNOZ20yRZXTGNXEsaI",
"id_token": {
"aud": [
"e69978c7-caff-4582-9e12-aab6fb43b829"
],
"auth_time": 1529751224,
"c_hash": "T6tulIhBDWPRsfx4gXteiQ",
"exp": 1529754964,
"iat": 1529751364,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "af8800a8-fc67-414e-a636-e2d9c91e0750",
"nonce": "XtMGKaGnVvc2wgnV",
"rat": 1529751362,
"sub": "[email protected]"
},
"state": "fIlSaPFu0JjY8QXb"
}
4.506 phase <--<-- 5 --- AccessToken -->-->
4.506 --> request op_args: {'state': 'fIlSaPFu0JjY8QXb'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
4.506 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'fIlSaPFu0JjY8QXb', 'code': 'wiISqZEYtfnWH61QKxHiAzwJsXtaNLWWx7Ah7HXCoqs.Xv9WTT5OKaw_Tr6D7pu5sviReuNOZ20yRZXTGNXEsaI', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'e69978c7-caff-4582-9e12-aab6fb43b829'}, 'state': 'fIlSaPFu0JjY8QXb'}
4.506 AccessTokenRequest {
"code": "wiISqZEYtfnWH61QKxHiAzwJsXtaNLWWx7Ah7HXCoqs.Xv9WTT5OKaw_Tr6D7pu5sviReuNOZ20yRZXTGNXEsaI",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "fIlSaPFu0JjY8QXb"
}
4.506 request_url https://oidc-certification.ory.sh:8443/oauth2/token
4.506 request_http_args {'headers': {'Authorization': 'Basic ZTY5OTc4YzctY2FmZi00NTgyLTllMTItYWFiNmZiNDNiODI5OmRGeTB5NzhqaGJZSA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
4.506 request code=wiISqZEYtfnWH61QKxHiAzwJsXtaNLWWx7Ah7HXCoqs.Xv9WTT5OKaw_Tr6D7pu5sviReuNOZ20yRZXTGNXEsaI&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=fIlSaPFu0JjY8QXb
4.724 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
4.725 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZTY5OTc4YzctY2FmZi00NTgyLTllMTItYWFiNmZiNDNiODI5Il0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiVDZ0dWxJaEJEV1BSc2Z4NGdYdGVpUSIsImV4cCI6MTUyOTc1NDk2NCwiaWF0IjoxNTI5NzUxMzY1LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI4YTczNzI5ZC1kM2YzLTRmN2EtODZjZi1iMTc3MTljZDFlOTkiLCJub25jZSI6Ilh0TUdLYUduVnZjMndnblYiLCJyYXQiOjE1Mjk3NTEzNjIsInN1YiI6ImZvb0BiYXIuY29tIn0.M93SUDYs2x34STv3TD9v_uD8P_kZ1gsuNY4ThSNqH_XO2iSbuDvV4oWLg1AZHZxwGEjDPTt69-2qg07Dl2sAw7yrGzA5kqbQpqsCy4SwoiypdlWL7t9oFwYt0pcc-9qz2jT-2MVRQj_u1KA7M-217pKipkua45OUMP3Yg_CbSKz_Wzwr3w178hxaZ9nco6zB1orQHR_9k_f71gXwh67fvx-Xr3uEiNxXGO707hUxDubT1O_KpHgOodpuEL_Ml-AgnJSBqG-WoMeZGihxZtyp_Tljs8Ob6foYvHRbBlHUDK4ETGuQ--LOpEsANrEJQ8p-aGMPNYztvR3kRftH2Qq1Wu1nbOLv_VoM3StvYiC4SQF2f8rrxqHkH6WWlJyJUp8BnF6dDC9MIpLx5Z3BG12JCrfubHARu-8dRox_sZ6XwcZsZxGWgC7QmHUfUG8Nr874Qlkhr5X61neyFBpp2ie1F5JXntxoS8tl0FZ3SmXQoT7YWJSPFE0y_MGtcp_5DGp2sFFGMwRerB6evUsj8IIlnHHj3MnbMLUmjwiDvks1k7ZFnx0DHKIX0CCB_N0yx4NoY6bqP-BSwvjm5cf3cYWZWlV8aOj15gGsPi_NZ4ehF14ap3ZS8pzPlSXSEqpYJstUfLvMygyVxPlp0-NpG-YkJfAJJt9ff0bG7nLjZMpRof8', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'lZN9ftMbsHpbFf_YH9CnWVpjEczFf1N3y7icKOeoIEQ.O9wH0NQNpH35rz8GulaEbHgODjwOWxaXqQ2D7ZEU2u0', 'scope': 'openid'}
4.729 AccessTokenResponse {
"access_token": "lZN9ftMbsHpbFf_YH9CnWVpjEczFf1N3y7icKOeoIEQ.O9wH0NQNpH35rz8GulaEbHgODjwOWxaXqQ2D7ZEU2u0",
"expires_in": 3599,
"id_token": {
"aud": [
"e69978c7-caff-4582-9e12-aab6fb43b829"
],
"auth_time": 1529751224,
"c_hash": "T6tulIhBDWPRsfx4gXteiQ",
"exp": 1529754964,
"iat": 1529751365,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "8a73729d-d3f3-4f7a-86cf-b17719cd1e99",
"nonce": "XtMGKaGnVvc2wgnV",
"rat": 1529751362,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
4.729 phase <--<-- 6 --- UserInfo -->-->
4.729 do_user_info_request kwargs:{'state': 'fIlSaPFu0JjY8QXb', 'method': 'GET', 'authn_method': 'bearer_header'}
4.729 request {'body': None}
4.729 request_url https://oidc-certification.ory.sh:8443/userinfo
4.729 request_http_args {'headers': {'Authorization': 'Bearer lZN9ftMbsHpbFf_YH9CnWVpjEczFf1N3y7icKOeoIEQ.O9wH0NQNpH35rz8GulaEbHgODjwOWxaXqQ2D7ZEU2u0'}}
4.817 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
4.818 OpenIDSchema {
"sub": "[email protected]"
}
4.818 OpenIDSchema {
"sub": "[email protected]"
}
4.818 phase <--<-- 7 --- DisplayUserInfo -->-->
4.819 phase <--<-- 8 --- Done -->-->
4.819 end
4.819 assertion CheckHTTPResponse
4.819 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
4.819 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Rotation-RP-Sig.txt 0000644 0000000 0000000 00000046565 13313423736 015111 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Rotation-RP-Sig
Test description: Request access token, change RSA signing key and request another access token
Timestamp: 2018-06-23T10:58:38Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.075 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.076 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.076 phase <--<-- 2 --- Registration -->-->
0.076 register kwargs:{'application_name': 'OIC test tool', 'token_endpoint_auth_method': 'private_key_jwt', 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'refresh_token'], 'response_types': ['code id_token'], 'url': 'https://oidc-certification.ory.sh:8443/clients', 'application_type': 'web'}
0.077 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit",
"refresh_token"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#KJUDla8EKJUjluxD"
],
"response_types": [
"code id_token"
],
"token_endpoint_auth_method": "private_key_jwt"
}
0.235 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.236 RegistrationResponse {
"client_id": "69b7886f-b72b-472e-b738-503b28b7d8c1",
"client_secret": "zRok50-t_0Sg",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit",
"refresh_token"
],
"id": "69b7886f-b72b-472e-b738-503b28b7d8c1",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#KJUDla8EKJUjluxD"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "private_key_jwt",
"userinfo_signed_response_alg": "none"
}
0.236 phase <--<-- 3 --- AsyncAuthn -->-->
0.237 AuthorizationRequest {
"client_id": "69b7886f-b72b-472e-b738-503b28b7d8c1",
"nonce": "159FHQa2R2FiyttH",
"prompt": [
"consent"
],
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid offline_access",
"state": "GzeygYAJCs4OD767"
}
0.237 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=consent&scope=openid+offline_access&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=69b7886f-b72b-472e-b738-503b28b7d8c1&state=GzeygYAJCs4OD767&response_type=code+id_token&nonce=159FHQa2R2FiyttH
0.237 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=consent&scope=openid+offline_access&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=69b7886f-b72b-472e-b738-503b28b7d8c1&state=GzeygYAJCs4OD767&response_type=code+id_token&nonce=159FHQa2R2FiyttH
3.171 http args {}
3.346 response URL with fragment
3.346 response code=tTTOJH7RkaiPzyIjCfdH9EIF2YPttwpBdVDTs9QysFY.EFhjE_8t1qEDTvJp--s0Bm3YZEy5CxoWH5aC7b6JJ9w&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNjliNzg4NmYtYjcyYi00NzJlLWI3MzgtNTAzYjI4YjdkOGMxIl0sImF1dGhfdGltZSI6MTUyOTc1MTQwOSwiY19oYXNoIjoicjRiMl9kaTluTnN4M2hndkRoT2lHZyIsImV4cCI6MTUyOTc1NTExNywiaWF0IjoxNTI5NzUxNTE3LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJjOWRlMGI1ZS03N2E2LTRlM2EtOTRhMy1iYzg3NGYyZjQzOWMiLCJub25jZSI6IjE1OUZIUWEyUjJGaXl0dEgiLCJyYXQiOjE1Mjk3NTE1MTQsInN1YiI6ImZvb0BiYXIuY29tIn0.YO1T3DmieuEcVH66rjfTbcPDWFI3ZnLjHKA8VsI5z-1ueGUVwt5vsyiJhd4iJFhNY0CLiEb5A5b9h9AtYQy4wd00syGO5cBh3bZ8FJtpaVEYY4c2tm3evYK6nnq46gK6Q-3gFP9e5n-yAoRndxJ1il8C8zjrmhzUrKKw01tFROEm3sGUAmjblThHZ0RQvh-o5BDjVl3nHD4lSrnKdkkTgok93vYCPS_KCcNOS6YKmTzOJUpTZ-OkjvZrnQ0I3cVCunVPueqhtFFStymqm-UFV5UYLlSk0IpEm9Mi6QPCqgke5KJ8nhAPBLzkDODvqvml3aTGeFWfIcmv5HSQpcQjbNCzx47b0YHEOZNeqsEGvFJc2aY1hor_c9QaIJSgDvSbtocWzzE73We35oJPM5qimO01nBJlxF1M6kD9Gt_s13XE0Dp-sbLEXIuH1PgOu-2CUp_AcrhiqVoIOtNbgGK9BvMJxRZKycbzgpdFRtLkPOBy1A0Iqax3T-_6ojt0AOQ2WGDCR73JUOuGSpAK4o1A3IVkHLVfdr0Uw9rTqAeyQjtpcaBjUaqPA0ptGx2kQmV8ftrSE8rK5FTv6SKUbiDQbUynEHAQro0iyq_AKRs6ynPxM3sxe_mARInvU3z7U-rGn04YTdUGOlkxk527lkpZfCjUic-pU30ekAiHV_4pBGQ&state=GzeygYAJCs4OD767
3.346 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNjliNzg4NmYtYjcyYi00NzJlLWI3MzgtNTAzYjI4YjdkOGMxIl0sImF1dGhfdGltZSI6MTUyOTc1MTQwOSwiY19oYXNoIjoicjRiMl9kaTluTnN4M2hndkRoT2lHZyIsImV4cCI6MTUyOTc1NTExNywiaWF0IjoxNTI5NzUxNTE3LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJjOWRlMGI1ZS03N2E2LTRlM2EtOTRhMy1iYzg3NGYyZjQzOWMiLCJub25jZSI6IjE1OUZIUWEyUjJGaXl0dEgiLCJyYXQiOjE1Mjk3NTE1MTQsInN1YiI6ImZvb0BiYXIuY29tIn0.YO1T3DmieuEcVH66rjfTbcPDWFI3ZnLjHKA8VsI5z-1ueGUVwt5vsyiJhd4iJFhNY0CLiEb5A5b9h9AtYQy4wd00syGO5cBh3bZ8FJtpaVEYY4c2tm3evYK6nnq46gK6Q-3gFP9e5n-yAoRndxJ1il8C8zjrmhzUrKKw01tFROEm3sGUAmjblThHZ0RQvh-o5BDjVl3nHD4lSrnKdkkTgok93vYCPS_KCcNOS6YKmTzOJUpTZ-OkjvZrnQ0I3cVCunVPueqhtFFStymqm-UFV5UYLlSk0IpEm9Mi6QPCqgke5KJ8nhAPBLzkDODvqvml3aTGeFWfIcmv5HSQpcQjbNCzx47b0YHEOZNeqsEGvFJc2aY1hor_c9QaIJSgDvSbtocWzzE73We35oJPM5qimO01nBJlxF1M6kD9Gt_s13XE0Dp-sbLEXIuH1PgOu-2CUp_AcrhiqVoIOtNbgGK9BvMJxRZKycbzgpdFRtLkPOBy1A0Iqax3T-_6ojt0AOQ2WGDCR73JUOuGSpAK4o1A3IVkHLVfdr0Uw9rTqAeyQjtpcaBjUaqPA0ptGx2kQmV8ftrSE8rK5FTv6SKUbiDQbUynEHAQro0iyq_AKRs6ynPxM3sxe_mARInvU3z7U-rGn04YTdUGOlkxk527lkpZfCjUic-pU30ekAiHV_4pBGQ', 'state': 'GzeygYAJCs4OD767', 'code': 'tTTOJH7RkaiPzyIjCfdH9EIF2YPttwpBdVDTs9QysFY.EFhjE_8t1qEDTvJp--s0Bm3YZEy5CxoWH5aC7b6JJ9w'}
3.466 AuthorizationResponse {
"code": "tTTOJH7RkaiPzyIjCfdH9EIF2YPttwpBdVDTs9QysFY.EFhjE_8t1qEDTvJp--s0Bm3YZEy5CxoWH5aC7b6JJ9w",
"id_token": {
"aud": [
"69b7886f-b72b-472e-b738-503b28b7d8c1"
],
"auth_time": 1529751409,
"c_hash": "r4b2_di9nNsx3hgvDhOiGg",
"exp": 1529755117,
"iat": 1529751517,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "c9de0b5e-77a6-4e3a-94a3-bc874f2f439c",
"nonce": "159FHQa2R2FiyttH",
"rat": 1529751514,
"sub": "[email protected]"
},
"state": "GzeygYAJCs4OD767"
}
3.466 phase <--<-- 4 --- AccessToken -->-->
3.466 --> request op_args: {'state': 'GzeygYAJCs4OD767', 'authn_method': 'private_key_jwt'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.466 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'GzeygYAJCs4OD767', 'code': 'tTTOJH7RkaiPzyIjCfdH9EIF2YPttwpBdVDTs9QysFY.EFhjE_8t1qEDTvJp--s0Bm3YZEy5CxoWH5aC7b6JJ9w', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '69b7886f-b72b-472e-b738-503b28b7d8c1'}, 'state': 'GzeygYAJCs4OD767', 'authn_method': 'private_key_jwt'}
3.466 AccessTokenRequest {
"client_assertion": "eyJhbGciOiJSUzI1NiIsImtpZCI6Ind0MjVPZ3lSX256RzNPb1E3ZGFhMnJMNi1nTW5GZGZSekJqaFVWUHU4UlEifQ.eyJpc3MiOiAiNjliNzg4NmYtYjcyYi00NzJlLWI3MzgtNTAzYjI4YjdkOGMxIiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiNjliNzg4NmYtYjcyYi00NzJlLWI3MzgtNTAzYjI4YjdkOGMxIiwgImlhdCI6IDE1Mjk3NTE1MTcsICJqdGkiOiAiY3VycGttVENDY0hpWUtTYzdvZjZsRzBvZlpKc0dxTEEiLCAiZXhwIjogMTUyOTc1MjExN30.ktz8lfagDUJ8kzfdfKtYJWESJFVhT6ThAoxSvsN2W_UQQuKvG1hqWFf4eqvjxEjlqyKDo9y1argnn4BJqiyrrOFW8v_fFgnylNVW8hnO5yVMpb_sWRBY-ES8fKsa-7Yj5EtWUKQQ3iHRtjz2wvPo61uohxMcGRFQhNevj398RlmZwIpatXeUCGhz5SEwtLUbg_0fMNRbYX_4w0Qu2CIyTkx08tx_0Oqco-lFDf6nLQiTWLrLGqOOU1-YF6X0rstRPMsHMmWTR5y2U9CN7kBewgnmkkIp_95JJfa7SQPSnQtWc4vXXF7DgoVQ_EL9GZN1z3ZQyCmhmNWXSgFRfDsF-A",
"client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer",
"code": "tTTOJH7RkaiPzyIjCfdH9EIF2YPttwpBdVDTs9QysFY.EFhjE_8t1qEDTvJp--s0Bm3YZEy5CxoWH5aC7b6JJ9w",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "GzeygYAJCs4OD767"
}
3.47 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.47 request_http_args {'headers': {'Content-Type': 'application/x-www-form-urlencoded'}}
3.47 request code=tTTOJH7RkaiPzyIjCfdH9EIF2YPttwpBdVDTs9QysFY.EFhjE_8t1qEDTvJp--s0Bm3YZEy5CxoWH5aC7b6JJ9w&client_assertion_type=urn%3Aietf%3Aparams%3Aoauth%3Aclient-assertion-type%3Ajwt-bearer&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=GzeygYAJCs4OD767&client_assertion=eyJhbGciOiJSUzI1NiIsImtpZCI6Ind0MjVPZ3lSX256RzNPb1E3ZGFhMnJMNi1nTW5GZGZSekJqaFVWUHU4UlEifQ.eyJpc3MiOiAiNjliNzg4NmYtYjcyYi00NzJlLWI3MzgtNTAzYjI4YjdkOGMxIiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiNjliNzg4NmYtYjcyYi00NzJlLWI3MzgtNTAzYjI4YjdkOGMxIiwgImlhdCI6IDE1Mjk3NTE1MTcsICJqdGkiOiAiY3VycGttVENDY0hpWUtTYzdvZjZsRzBvZlpKc0dxTEEiLCAiZXhwIjogMTUyOTc1MjExN30.ktz8lfagDUJ8kzfdfKtYJWESJFVhT6ThAoxSvsN2W_UQQuKvG1hqWFf4eqvjxEjlqyKDo9y1argnn4BJqiyrrOFW8v_fFgnylNVW8hnO5yVMpb_sWRBY-ES8fKsa-7Yj5EtWUKQQ3iHRtjz2wvPo61uohxMcGRFQhNevj398RlmZwIpatXeUCGhz5SEwtLUbg_0fMNRbYX_4w0Qu2CIyTkx08tx_0Oqco-lFDf6nLQiTWLrLGqOOU1-YF6X0rstRPMsHMmWTR5y2U9CN7kBewgnmkkIp_95JJfa7SQPSnQtWc4vXXF7DgoVQ_EL9GZN1z3ZQyCmhmNWXSgFRfDsF-A
3.601 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.602 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNjliNzg4NmYtYjcyYi00NzJlLWI3MzgtNTAzYjI4YjdkOGMxIl0sImF1dGhfdGltZSI6MTUyOTc1MTQwOSwiY19oYXNoIjoicjRiMl9kaTluTnN4M2hndkRoT2lHZyIsImV4cCI6MTUyOTc1NTExNywiaWF0IjoxNTI5NzUxNTE3LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI5NjY5N2IxZS00NDQzLTQwMDQtYWM0OC0yNmM1MzU4NDZjOGIiLCJub25jZSI6IjE1OUZIUWEyUjJGaXl0dEgiLCJyYXQiOjE1Mjk3NTE1MTQsInN1YiI6ImZvb0BiYXIuY29tIn0.GRLXaM5AUN3ym1JQSGR21EoGHu40zJip1t7MU37pt2YSajCDtcSBu6w-uV-ZDiZTcNERwhNgwrgUd5Y-7PxR4Up8gZCINw8-VEA78zwQLFwSfm-DXpsySWE0wDpMpE42g9fhl1hS1R8sUNIGpnHSFvHxEN3K0mp0wOJqoUtCHKqRACzbu6hGpaOgaGzr-qsCXxMr5uioaGYyldJLvHM9yR2YcjICOy6g0F7qsauso7SNIU5eehb4D_czBNlFeRaIM-ApSndNHy8PAeIoLRmyCf9ISOWCyXNCffpXbdleI_JdeCBGZ8Jk6CB7tVeAb7jP2f1BvTPQbZ-Wuz0n3F673pOHkveA-YfDFk6gsKQ-tMdxAWxlT9MkyrR6K7pkbVatbgwnIBeWMzAUDyfMyQqNYVEW7oGaxA4SPml9o5qDTpb-m-gm7CoOuiyzGlDVvJJXvVXpkqnBhZp0SSy8D509BgelXr7hAvltmjEeab_ZsnqYaRoAS78Y9kF1QihtyGORti9xnCs4hMlRXWmbwSfJ2nAYJOtBV4b_HAchJidVXJRXpIGcFenVO7yKlX5qYsjRDW_CX4YizQ9TIXSKiDy9iv8gHaAy77Qino-rEjPfs-lnj9gOZOrWEnL3E9RyhO6cmRESBquSN0fOH1QDRYWloncEn8znIFNDnZh2u0SeEOk', 'scope': 'openid offline_access', 'access_token': '1XA8hfwj0NW2RiM08tCSlFVbwGkj_DALqxrNLyQBVS8.gYD7WlGB7S5k3Pmf1ImXJOg_c7uVI8fNdQO1lq2DlE4', 'refresh_token': '94WLBPwou3ADZTX3yDm4-RXDhW1byvlfcr5uX6VLVlI.DB3LHhJNXKt1ceB42NeNduS97vCcfi9KdE7jyPa2zQo', 'token_type': 'bearer', 'expires_in': 3599}
3.606 AccessTokenResponse {
"access_token": "1XA8hfwj0NW2RiM08tCSlFVbwGkj_DALqxrNLyQBVS8.gYD7WlGB7S5k3Pmf1ImXJOg_c7uVI8fNdQO1lq2DlE4",
"expires_in": 3599,
"id_token": {
"aud": [
"69b7886f-b72b-472e-b738-503b28b7d8c1"
],
"auth_time": 1529751409,
"c_hash": "r4b2_di9nNsx3hgvDhOiGg",
"exp": 1529755117,
"iat": 1529751517,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "96697b1e-4443-4004-ac48-26c535846c8b",
"nonce": "159FHQa2R2FiyttH",
"rat": 1529751514,
"sub": "[email protected]"
},
"refresh_token": "94WLBPwou3ADZTX3yDm4-RXDhW1byvlfcr5uX6VLVlI.DB3LHhJNXKt1ceB42NeNduS97vCcfi9KdE7jyPa2zQo",
"scope": "openid offline_access",
"token_type": "bearer"
}
3.606 phase <--<-- 5 --- RotateSigKeys -->-->
3.652 phase <--<-- 6 --- RefreshAccessToken -->-->
3.653 RefreshAccessTokenRequest {
"client_assertion": "eyJhbGciOiJSUzI1NiIsImtpZCI6IkJlYTFmMHRNOWFhRmpkTU5YSmk4RXJhbDhFR0dWdjducF9NVjdUdlJ0UFEifQ.eyJpc3MiOiAiNjliNzg4NmYtYjcyYi00NzJlLWI3MzgtNTAzYjI4YjdkOGMxIiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiNjliNzg4NmYtYjcyYi00NzJlLWI3MzgtNTAzYjI4YjdkOGMxIiwgImlhdCI6IDE1Mjk3NTE1MTcsICJqdGkiOiAiYzZvd1hhN0JyQXdHeTJIUGpXZWNHSUJSaGh2RUdMeDYiLCAiZXhwIjogMTUyOTc1MjExN30.WkM1gou3EKN6cPV03fSfuAqocQuud_9xf5ilRJdPpbq5lcbzkdD573Qvy4Jp43DmcB5p83KmiFsHPpF-bl90dhbFUbrO6j6aY4zWG-Ay1YPxXA0GhO5QgR0v-z4hCSkTZTzuziEW-CwgRQr5PHz1Fuy-vskB_WN1q6WLbS72WCPxaFFZZp3sOmx2fle85anB-7BGNbnYxC6yRw90gG3x1it8w_JhPdZgRJNDpnJIvYDRqbAsjYlP_cCNnzwcBWmk6yvALeaOMfykwxL8qtFdXHgf9EntpssGpE23DVMoUGcoypfdYRwbCrkdu4CE4FLyMiwNfxiZ_jn9OUdDCpY8Ag",
"client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer",
"grant_type": "refresh_token",
"refresh_token": "94WLBPwou3ADZTX3yDm4-RXDhW1byvlfcr5uX6VLVlI.DB3LHhJNXKt1ceB42NeNduS97vCcfi9KdE7jyPa2zQo",
"scope": "openid offline_access"
}
3.656 request {'client_assertion': 'eyJhbGciOiJSUzI1NiIsImtpZCI6IkJlYTFmMHRNOWFhRmpkTU5YSmk4RXJhbDhFR0dWdjducF9NVjdUdlJ0UFEifQ.eyJpc3MiOiAiNjliNzg4NmYtYjcyYi00NzJlLWI3MzgtNTAzYjI4YjdkOGMxIiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiNjliNzg4NmYtYjcyYi00NzJlLWI3MzgtNTAzYjI4YjdkOGMxIiwgImlhdCI6IDE1Mjk3NTE1MTcsICJqdGkiOiAiYzZvd1hhN0JyQXdHeTJIUGpXZWNHSUJSaGh2RUdMeDYiLCAiZXhwIjogMTUyOTc1MjExN30.WkM1gou3EKN6cPV03fSfuAqocQuud_9xf5ilRJdPpbq5lcbzkdD573Qvy4Jp43DmcB5p83KmiFsHPpF-bl90dhbFUbrO6j6aY4zWG-Ay1YPxXA0GhO5QgR0v-z4hCSkTZTzuziEW-CwgRQr5PHz1Fuy-vskB_WN1q6WLbS72WCPxaFFZZp3sOmx2fle85anB-7BGNbnYxC6yRw90gG3x1it8w_JhPdZgRJNDpnJIvYDRqbAsjYlP_cCNnzwcBWmk6yvALeaOMfykwxL8qtFdXHgf9EntpssGpE23DVMoUGcoypfdYRwbCrkdu4CE4FLyMiwNfxiZ_jn9OUdDCpY8Ag', 'scope': 'openid offline_access', 'grant_type': 'refresh_token', 'client_assertion_type': 'urn:ietf:params:oauth:client-assertion-type:jwt-bearer', 'refresh_token': '94WLBPwou3ADZTX3yDm4-RXDhW1byvlfcr5uX6VLVlI.DB3LHhJNXKt1ceB42NeNduS97vCcfi9KdE7jyPa2zQo'}
3.783 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.783 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.783 handle_response kwargs:{'r': <Response [200]>, 'csi': <oic.oic.message.RefreshAccessTokenRequest object at 0x7f2440021c18>}
3.784 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNjliNzg4NmYtYjcyYi00NzJlLWI3MzgtNTAzYjI4YjdkOGMxIl0sImF1dGhfdGltZSI6MTUyOTc1MTQwOSwiY19oYXNoIjoicjRiMl9kaTluTnN4M2hndkRoT2lHZyIsImV4cCI6MTUyOTc1NTExNywiaWF0IjoxNTI5NzUxNTE3LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJjNDEzM2M5OC00ZGZmLTQ0ODMtOGI2MS0yNDMyMzE1MDAzZmMiLCJub25jZSI6IiIsInJhdCI6MTUyOTc1MTUxNCwic3ViIjoiZm9vQGJhci5jb20ifQ.Iix_R_oew4M-xkbCCnVJBXLvGkPIqKl-SH84bhxmT2nHKFR9oUM4wo4IgTMo-TraifPANfo_-V3QprXmP3J4ALOjmszNdqutLyZQHPN1eopyC2_7ocNrwQ-YFthZT4vztBpQlxce5oG428IZeXBtbMUSyRs5l_7nARCB8nj4fGSE7bLK56JNxRNtp09mP3GNZWdGzjGWfFkH213zfFVK1al1IZ8YrQ9r1CQ_ob39XR2GMAZ97Vv_A6XNrbbIoVBOeNtLLV9rGPyqQHV4XCWumVo6TxBjlu5MzhvT0uw4p7jP9bYS-1uw5GofkKvNOoe0cegKHKuZ6WlHwgBZlkLK7ldgsOLv8dd80SJ9R8qxhhpmuMwMHOQLYZJ-LHuoTbOTDZNUhMyRDP1Tduv4_hB4RAYSsCUtpn0nfGH5pMzGgwglToh_bJvSYqFa22FuNMhJPD9Fi9mTACX7Bcqp6iXkv0rgmPeWuHAIsdMfoVZWuoKBuzIR8wHNDeSRy3dxBiOOLw1rOAfp4epC4-isr5P3wugGa7wzTQqlO-pf0RdsrmN3XA7BsJsUq_DXAFvBsQNafS9eP62IAgJZOaeygHh7ndEhhV74K8jXH_O3oEZG1SXy-_D1z5hRmdxQJUlmK7HyUWNt9nMbFvNzFVNdfNOymia7SHxuJYP3ZJA18qREs14', 'scope': 'openid offline_access', 'access_token': 'lbf07R2_dxYqwDJahSc5JemborFBuAHVGimLBEE0I6Q.Iw2Nsee_QTFPMEYCVlgUkyke6w9L_BYbEsl061B_rRs', 'refresh_token': 'd9u1gwit8ZLx01paTZ4slu1DCjA3PhjzwcnFjzUMiYc.HAWB8BoF9S6sb6FvT9YwEjIwQ1fbWBp7vGudeLZBcm0', 'token_type': 'bearer', 'expires_in': 3599}
3.787 jws header {'typ': 'JWT', 'alg': 'RS256', 'kid': 'public:e272a755-7ae2-490e-82f5-62e0678641b0'}
3.787 AccessTokenResponse {
"access_token": "lbf07R2_dxYqwDJahSc5JemborFBuAHVGimLBEE0I6Q.Iw2Nsee_QTFPMEYCVlgUkyke6w9L_BYbEsl061B_rRs",
"expires_in": 3599,
"id_token": {
"aud": [
"69b7886f-b72b-472e-b738-503b28b7d8c1"
],
"auth_time": 1529751409,
"c_hash": "r4b2_di9nNsx3hgvDhOiGg",
"exp": 1529755117,
"iat": 1529751517,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "c4133c98-4dff-4483-8b61-2432315003fc",
"rat": 1529751514,
"sub": "[email protected]"
},
"refresh_token": "d9u1gwit8ZLx01paTZ4slu1DCjA3PhjzwcnFjzUMiYc.HAWB8BoF9S6sb6FvT9YwEjIwQ1fbWBp7vGudeLZBcm0",
"scope": "openid offline_access",
"token_type": "bearer"
}
3.787 phase <--<-- 7 --- Done -->-->
3.788 end
3.788 assertion CheckHTTPResponse
3.788 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
3.788 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
Done: status=OK
============================================================
RESULT: PASSED
./OP-OAuth-2nd-Revokes.txt 0000644 0000000 0000000 00000041136 13313423703 015347 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-OAuth-2nd-Revokes
Test description: Trying to use authorization code twice should result in revoking previously issued access tokens
Timestamp: 2018-06-23T10:58:11Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.089 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.09 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.09 phase <--<-- 2 --- Registration -->-->
0.09 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.091 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#ci3IHpMdg9juPHoI"
],
"response_types": [
"code id_token"
]
}
0.251 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.252 RegistrationResponse {
"client_id": "401bb090-83e6-4049-b716-d9d346990e0a",
"client_secret": "ioLyDpU~kxu-",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "401bb090-83e6-4049-b716-d9d346990e0a",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#ci3IHpMdg9juPHoI"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.252 phase <--<-- 3 --- Note -->-->
2.274 phase <--<-- 4 --- AsyncAuthn -->-->
2.274 AuthorizationRequest {
"client_id": "401bb090-83e6-4049-b716-d9d346990e0a",
"nonce": "dT4epzvgloJmT2ai",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "hItVD6KV0VRWqeqd"
}
2.275 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=401bb090-83e6-4049-b716-d9d346990e0a&state=hItVD6KV0VRWqeqd&response_type=code+id_token&nonce=dT4epzvgloJmT2ai
2.275 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=401bb090-83e6-4049-b716-d9d346990e0a&state=hItVD6KV0VRWqeqd&response_type=code+id_token&nonce=dT4epzvgloJmT2ai
5.893 http args {}
6.067 response URL with fragment
6.068 response code=UUxBST5rFc5wge9VU1TfXE2X5EOAOhxBsbkP-i_UQkM.XtczFf68fL6gj68YslHcXEs_tJMtNb-HsbCFpODACJQ&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNDAxYmIwOTAtODNlNi00MDQ5LWI3MTYtZDlkMzQ2OTkwZTBhIl0sImF1dGhfdGltZSI6MTUyOTc1MTQwOSwiY19oYXNoIjoiRTJDMmE2a21oanM5WjB5aFQ3SVZadyIsImV4cCI6MTUyOTc1NTA5MCwiaWF0IjoxNTI5NzUxNDkwLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJhY2E3NzNkNi1iMGM3LTQ4ZGMtYTYwYy1lMTU0OTVhODBiODAiLCJub25jZSI6ImRUNGVwenZnbG9KbVQyYWkiLCJyYXQiOjE1Mjk3NTE0ODcsInN1YiI6ImZvb0BiYXIuY29tIn0.H67QuRm3vjhZ95uaGcacCFb09lov4mawS6Z0jKCMb-S1i9Vq2nXWXpWDVFPMJpk2B1X1UcUHvJTHVUSGDqaVT3wYPhOY4PhXrGj74v4eJwLyWGeG2XAvCcEx0FKTJYBJiB1Opv9ys-jvf7yMA0tURRxN4pXzx-Is6H30eltKujTiamaW0FWKeMjp_yBV7DErfYtKMIuyNC62aQ1uvtcLON182YnGZfucXQlFMbscQ6ZJH0dOh7xz5DJEJ05HN-1LCpYuzKBIFZlFm5zTqeJgsplHlQfgGp7UuoHet81HT_f_C41itvITiyGkns9qIansUr2y_pdBYMbFIFFY0S_ZP4zkb2C3_pMwEM2rGRk6s_Z0lZpJE-P2d4ZTTYfv-DsxTJNI9aRhY2-BXliFu-jsHW5evXsmcC4x13NqdZPZFHpMhoPWTf92l0uMO2muaPljwPAOtpYmqsejSSquiYoZ267IVSTv2mtkJQsF1nI3bCRac7R6RwC3JeP53NRRPm1Ive6QqzUjUMzD-8SWMVDe--TJxqXWHlZVGX2NTD8naXRtD_MfuRU9uOIjwBELMX9d8y62KALUnBjixbSfpyoVFWPiylq95Y1MZzG6KTMC4H9uayKjzoItFNfGBOZ9o7rKniLs0tiwaiqnlKmBZTa_00q2uRKYeH7foTJ8khqBAB8&state=hItVD6KV0VRWqeqd
6.068 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNDAxYmIwOTAtODNlNi00MDQ5LWI3MTYtZDlkMzQ2OTkwZTBhIl0sImF1dGhfdGltZSI6MTUyOTc1MTQwOSwiY19oYXNoIjoiRTJDMmE2a21oanM5WjB5aFQ3SVZadyIsImV4cCI6MTUyOTc1NTA5MCwiaWF0IjoxNTI5NzUxNDkwLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJhY2E3NzNkNi1iMGM3LTQ4ZGMtYTYwYy1lMTU0OTVhODBiODAiLCJub25jZSI6ImRUNGVwenZnbG9KbVQyYWkiLCJyYXQiOjE1Mjk3NTE0ODcsInN1YiI6ImZvb0BiYXIuY29tIn0.H67QuRm3vjhZ95uaGcacCFb09lov4mawS6Z0jKCMb-S1i9Vq2nXWXpWDVFPMJpk2B1X1UcUHvJTHVUSGDqaVT3wYPhOY4PhXrGj74v4eJwLyWGeG2XAvCcEx0FKTJYBJiB1Opv9ys-jvf7yMA0tURRxN4pXzx-Is6H30eltKujTiamaW0FWKeMjp_yBV7DErfYtKMIuyNC62aQ1uvtcLON182YnGZfucXQlFMbscQ6ZJH0dOh7xz5DJEJ05HN-1LCpYuzKBIFZlFm5zTqeJgsplHlQfgGp7UuoHet81HT_f_C41itvITiyGkns9qIansUr2y_pdBYMbFIFFY0S_ZP4zkb2C3_pMwEM2rGRk6s_Z0lZpJE-P2d4ZTTYfv-DsxTJNI9aRhY2-BXliFu-jsHW5evXsmcC4x13NqdZPZFHpMhoPWTf92l0uMO2muaPljwPAOtpYmqsejSSquiYoZ267IVSTv2mtkJQsF1nI3bCRac7R6RwC3JeP53NRRPm1Ive6QqzUjUMzD-8SWMVDe--TJxqXWHlZVGX2NTD8naXRtD_MfuRU9uOIjwBELMX9d8y62KALUnBjixbSfpyoVFWPiylq95Y1MZzG6KTMC4H9uayKjzoItFNfGBOZ9o7rKniLs0tiwaiqnlKmBZTa_00q2uRKYeH7foTJ8khqBAB8', 'state': 'hItVD6KV0VRWqeqd', 'code': 'UUxBST5rFc5wge9VU1TfXE2X5EOAOhxBsbkP-i_UQkM.XtczFf68fL6gj68YslHcXEs_tJMtNb-HsbCFpODACJQ'}
6.192 AuthorizationResponse {
"code": "UUxBST5rFc5wge9VU1TfXE2X5EOAOhxBsbkP-i_UQkM.XtczFf68fL6gj68YslHcXEs_tJMtNb-HsbCFpODACJQ",
"id_token": {
"aud": [
"401bb090-83e6-4049-b716-d9d346990e0a"
],
"auth_time": 1529751409,
"c_hash": "E2C2a6kmhjs9Z0yhT7IVZw",
"exp": 1529755090,
"iat": 1529751490,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "aca773d6-b0c7-48dc-a60c-e15495a80b80",
"nonce": "dT4epzvgloJmT2ai",
"rat": 1529751487,
"sub": "[email protected]"
},
"state": "hItVD6KV0VRWqeqd"
}
6.192 phase <--<-- 5 --- AccessToken -->-->
6.192 --> request op_args: {'state': 'hItVD6KV0VRWqeqd'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
6.192 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'hItVD6KV0VRWqeqd', 'code': 'UUxBST5rFc5wge9VU1TfXE2X5EOAOhxBsbkP-i_UQkM.XtczFf68fL6gj68YslHcXEs_tJMtNb-HsbCFpODACJQ', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '401bb090-83e6-4049-b716-d9d346990e0a'}, 'state': 'hItVD6KV0VRWqeqd'}
6.192 AccessTokenRequest {
"code": "UUxBST5rFc5wge9VU1TfXE2X5EOAOhxBsbkP-i_UQkM.XtczFf68fL6gj68YslHcXEs_tJMtNb-HsbCFpODACJQ",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "hItVD6KV0VRWqeqd"
}
6.193 request_url https://oidc-certification.ory.sh:8443/oauth2/token
6.193 request_http_args {'headers': {'Authorization': 'Basic NDAxYmIwOTAtODNlNi00MDQ5LWI3MTYtZDlkMzQ2OTkwZTBhOmlvTHlEcFUlN0VreHUt', 'Content-Type': 'application/x-www-form-urlencoded'}}
6.193 request code=UUxBST5rFc5wge9VU1TfXE2X5EOAOhxBsbkP-i_UQkM.XtczFf68fL6gj68YslHcXEs_tJMtNb-HsbCFpODACJQ&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=hItVD6KV0VRWqeqd
6.411 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
6.412 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNDAxYmIwOTAtODNlNi00MDQ5LWI3MTYtZDlkMzQ2OTkwZTBhIl0sImF1dGhfdGltZSI6MTUyOTc1MTQwOSwiY19oYXNoIjoiRTJDMmE2a21oanM5WjB5aFQ3SVZadyIsImV4cCI6MTUyOTc1NTA5MCwiaWF0IjoxNTI5NzUxNDkxLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiIwNmQ4Y2JjOC02NmZiLTQyNzEtODg1OC1mOWNlN2RmNjQ3NGIiLCJub25jZSI6ImRUNGVwenZnbG9KbVQyYWkiLCJyYXQiOjE1Mjk3NTE0ODcsInN1YiI6ImZvb0BiYXIuY29tIn0.s7okpoq0W2xRFWvXO70xq4bmSSnFOmkKidud6kWbvNS3K7fOlm1J2O7v5m8o4cSL5fjUtonMggUDz3edFPVf4-d7Y2SK2w1auEgigT6as3pDjR7VJ5XHlGmiEBNZibaJ2ycCFeSGcMPBhEo01cSYHR6AW9yiGsISYCbdYm1rmpcuKSO1aEMyTWKR9LClRDveAJGtVhhqBBQjx1gCQimQGoDw_DkEHHUI9kIHzLnGxkP7ikUh3ZbfwunmvzfJ6fZHXzHRhssuQVrGfiExlYqqmlCX3s844bKut93PTf8DadtpEA_OSzeLWpC-XPsYJIJQma-_it0n8bZUnzyRNyrB3uiOqtya-IpaoCLjpuvOPL7ZtUIrkQd1lTcXwyG_iVjOLeCHhPq2axZCNXk6IgVXqdp96rNtUCOo2BqvLdXbBdVOgzIOy7t5ioCj_-fcEFSL0G7CUOFiE5IgdjvJAO56aKZeMA3D3cYmk29Qb5O6iUduxJ1A6V-1UfsbuFTj20dWNUfYom2xqAb5cUgI7tsN1msWjUkHJV2581XxbmKFlLVFqe6JH_3hKpcY-DZqw2FZ23W8q7blUbfRrDuCdXowFpTMCnm5ACEtiSEg5t-XBaqtbYXDAEPAtd7Fd5vQyccTTjAFD_0B8Bxng9Q5Q5L707tTEdO7NNSwFsuyH6bDZrY', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'Y4TqIkozORs17kxBNpZBDnBmy1u_q9rxmi1PAbn1F1k.FhgSAI7I0QQQN9FwRe76ppwqRLszBitxxwyB7YBIFv0', 'scope': 'openid'}
6.415 AccessTokenResponse {
"access_token": "Y4TqIkozORs17kxBNpZBDnBmy1u_q9rxmi1PAbn1F1k.FhgSAI7I0QQQN9FwRe76ppwqRLszBitxxwyB7YBIFv0",
"expires_in": 3599,
"id_token": {
"aud": [
"401bb090-83e6-4049-b716-d9d346990e0a"
],
"auth_time": 1529751409,
"c_hash": "E2C2a6kmhjs9Z0yhT7IVZw",
"exp": 1529755090,
"iat": 1529751491,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "06d8cbc8-66fb-4271-8858-f9ce7df6474b",
"nonce": "dT4epzvgloJmT2ai",
"rat": 1529751487,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
6.415 phase <--<-- 6 --- AccessToken -->-->
6.415 --> request op_args: {'state': 'hItVD6KV0VRWqeqd'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
6.415 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'hItVD6KV0VRWqeqd', 'code': 'UUxBST5rFc5wge9VU1TfXE2X5EOAOhxBsbkP-i_UQkM.XtczFf68fL6gj68YslHcXEs_tJMtNb-HsbCFpODACJQ', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '401bb090-83e6-4049-b716-d9d346990e0a'}, 'state': 'hItVD6KV0VRWqeqd'}
6.415 AccessTokenRequest {
"code": "UUxBST5rFc5wge9VU1TfXE2X5EOAOhxBsbkP-i_UQkM.XtczFf68fL6gj68YslHcXEs_tJMtNb-HsbCFpODACJQ",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "hItVD6KV0VRWqeqd"
}
6.415 request_url https://oidc-certification.ory.sh:8443/oauth2/token
6.415 request_http_args {'headers': {'Authorization': 'Basic NDAxYmIwOTAtODNlNi00MDQ5LWI3MTYtZDlkMzQ2OTkwZTBhOmlvTHlEcFUlN0VreHUt', 'Content-Type': 'application/x-www-form-urlencoded'}}
6.415 request code=UUxBST5rFc5wge9VU1TfXE2X5EOAOhxBsbkP-i_UQkM.XtczFf68fL6gj68YslHcXEs_tJMtNb-HsbCFpODACJQ&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=hItVD6KV0VRWqeqd
6.61 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:400 message:{"error":"invalid_grant","error_description":"The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client","status_code":400,"error_debug":"The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found."}
6.61 response {'error_debug': 'The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found.', 'error_description': 'The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client', 'error': 'invalid_grant', 'status_code': 400}
6.61 event Got expected error
6.611 TokenErrorResponse {
"error": "invalid_grant",
"error_debug": "The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found.",
"error_description": "The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client",
"status_code": 400
}
6.611 phase <--<-- 7 --- UserInfo -->-->
6.611 do_user_info_request kwargs:{'state': 'hItVD6KV0VRWqeqd', 'method': 'GET', 'authn_method': 'bearer_header'}
6.611 request {'body': None}
6.611 request_url https://oidc-certification.ory.sh:8443/userinfo
6.611 request_http_args {'headers': {'Authorization': 'Bearer Y4TqIkozORs17kxBNpZBDnBmy1u_q9rxmi1PAbn1F1k.FhgSAI7I0QQQN9FwRe76ppwqRLszBitxxwyB7YBIFv0'}}
6.726 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:401 message:{"error":"request_unauthorized","error_description":"The request could not be authorized","error_hint":"Check that you provided valid credentials in the right format.","status_code":401,"error_debug":"A validator returned an error"}
6.726 event Expected error not received: got request_unauthorized
6.727 ErrorResponse {
"error": "request_unauthorized",
"error_debug": "A validator returned an error",
"error_description": "The request could not be authorized",
"error_hint": "Check that you provided valid credentials in the right format.",
"status_code": 401
}
6.727 ErrorResponse {
"error": "request_unauthorized",
"error_debug": "A validator returned an error",
"error_description": "The request could not be authorized",
"error_hint": "Check that you provided valid credentials in the right format.",
"status_code": 401
}
6.727 phase <--<-- 8 --- Done -->-->
6.727 end
6.727 assertion VerifyResponse
6.727 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
6.727 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Discovery-Config.txt 0000644 0000000 0000000 00000006700 13313423076 015405 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Discovery-Config
Test description: Publishes openid-configuration discovery information
Timestamp: 2018-06-23T10:51:42Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.075 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.077 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.077 phase <--<-- 2 --- Done -->-->
0.077 end
0.077 assertion CheckHTTPResponse
0.077 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.078 assertion VerifyIdTokenSigningAlgorithmIsSupported
0.078 condition verify-id_token_signing-algorithm-is-supported: status=OK [Verify that required algorithms in id_token_signing_alg_values_supported]
0.078 assertion VerifyHTTPSUsage
0.078 condition verify-https-usage: status=OK [Verify that specific endpoints uses https]
0.078 assertion VerifyOPEndpointsUseHTTPS
0.078 condition verify-op-endpoints-use-https: status=OK [Verify that all OP endpoints uses https]
0.078 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-id_token_signing-algorithm-is-supported: status=OK [Verify that required algorithms in id_token_signing_alg_values_supported]
verify-https-usage: status=OK [Verify that specific endpoints uses https]
verify-op-endpoints-use-https: status=OK [Verify that all OP endpoints uses https]
Done: status=OK
============================================================
RESULT: PASSED
./OP-scope-All.txt 0000644 0000000 0000000 00000035610 13313423443 014052 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-scope-All
Test description: Scope requesting all claims
Timestamp: 2018-06-23T10:55:31Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.228 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.23 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.23 phase <--<-- 2 --- Registration -->-->
0.23 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.23 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#IhZUmKd9cGgKKnGO"
],
"response_types": [
"code id_token"
]
}
0.419 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.42 RegistrationResponse {
"client_id": "1f588649-286c-4ad0-9362-0895b46c38cd",
"client_secret": "5bupAZxp2rPk",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "1f588649-286c-4ad0-9362-0895b46c38cd",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#IhZUmKd9cGgKKnGO"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.42 phase <--<-- 3 --- AsyncAuthn -->-->
0.421 condition Check support: status=WARNING, message=No support for: scopes_supported=['profile', 'email', 'address', 'phone']
0.421 AuthorizationRequest {
"client_id": "1f588649-286c-4ad0-9362-0895b46c38cd",
"nonce": "UsKOZSbwyncpUyC7",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid profile email address phone",
"state": "xl6K4Jwush3w9gc3"
}
0.421 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+profile+email+address+phone&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=1f588649-286c-4ad0-9362-0895b46c38cd&state=xl6K4Jwush3w9gc3&response_type=code+id_token&nonce=UsKOZSbwyncpUyC7
0.421 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+profile+email+address+phone&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=1f588649-286c-4ad0-9362-0895b46c38cd&state=xl6K4Jwush3w9gc3&response_type=code+id_token&nonce=UsKOZSbwyncpUyC7
4.295 http args {}
4.466 response URL with fragment
4.467 response code=YXI999pPNvmB-QZxSxVVdZpF6Cwj5M5RTNerWm5Q6Gc.HgisIHTGONKVAiKe5GA6tCISC0IBw4PtnLGhuRgLkP8&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMWY1ODg2NDktMjg2Yy00YWQwLTkzNjItMDg5NWI0NmMzOGNkIl0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiTmFYYWhEMlBWc1doQzc4VDBlV3JpUSIsImV4cCI6MTUyOTc1NDkzMCwiaWF0IjoxNTI5NzUxMzMwLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJmYTg3ODllZi1kOTkyLTRkZjAtOGMwOS1mOTkxYjVhN2Y2MTMiLCJub25jZSI6IlVzS09aU2J3eW5jcFV5QzciLCJyYXQiOjE1Mjk3NTEzMjcsInN1YiI6ImZvb0BiYXIuY29tIn0.qF6TYPAFTRAK87qtOqShG2zucvUc-y4YwzInXKLi53LTIhUqXBkGsDjkGZoIMVrNzywK3p1M82nf_Ksc1JGKvRmlHiA0gnrmnkTK2r9FOfNNRS0ToZz7a8VGee5wuUGg9pVniBZ_4OI0HPR7M9YSbFsiiCiADHG74qAUYXkxhV0INreEQaqKzOYpYbXJKRi_y81_qCsnX3K-ki66pv5PxUoyjn_aI1BKELYPcS4G8Y082PHZE4LhUF2OiWw_4zFPCiX0wb9Y8fFtDgHNwgyqCaBehKn3PFYTpVJVL5h5TS_KAwkJEwaI40gRvuAaA83fFqgBIn4tk7x717bvny8e-jdoMePAQC-oX1DI0-xLKayh9rb--ZAOjS9O7ZS8uX6rrsXtzqKOe25JukXg1-485RHmYfBdtMTd4HNoHNFoqHoBdPv1aYWTHbrLP5F6kCgKZgliy7-olR_A6jnq2JdAEzeT3EvppGX9Ih3OwQCM-4Fz_bLFWffRwnnrYvQroei6aBk6x0Sw_DZBCXo2aRqiftZ-jatCApQeH4eSzf6iU1Sg0KHl6gZFTadjD3nS0GWqvznrYjjCfQT_cb6a3SXjYhOgoSLvlNpfy69HJ1v2Pz29Fsk4B6CCu1ox_d_dO9q_V_ipvI935SpmPCS4OEj3dpM2aJisA1khbRs291uZyk4&state=xl6K4Jwush3w9gc3
4.467 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMWY1ODg2NDktMjg2Yy00YWQwLTkzNjItMDg5NWI0NmMzOGNkIl0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiTmFYYWhEMlBWc1doQzc4VDBlV3JpUSIsImV4cCI6MTUyOTc1NDkzMCwiaWF0IjoxNTI5NzUxMzMwLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJmYTg3ODllZi1kOTkyLTRkZjAtOGMwOS1mOTkxYjVhN2Y2MTMiLCJub25jZSI6IlVzS09aU2J3eW5jcFV5QzciLCJyYXQiOjE1Mjk3NTEzMjcsInN1YiI6ImZvb0BiYXIuY29tIn0.qF6TYPAFTRAK87qtOqShG2zucvUc-y4YwzInXKLi53LTIhUqXBkGsDjkGZoIMVrNzywK3p1M82nf_Ksc1JGKvRmlHiA0gnrmnkTK2r9FOfNNRS0ToZz7a8VGee5wuUGg9pVniBZ_4OI0HPR7M9YSbFsiiCiADHG74qAUYXkxhV0INreEQaqKzOYpYbXJKRi_y81_qCsnX3K-ki66pv5PxUoyjn_aI1BKELYPcS4G8Y082PHZE4LhUF2OiWw_4zFPCiX0wb9Y8fFtDgHNwgyqCaBehKn3PFYTpVJVL5h5TS_KAwkJEwaI40gRvuAaA83fFqgBIn4tk7x717bvny8e-jdoMePAQC-oX1DI0-xLKayh9rb--ZAOjS9O7ZS8uX6rrsXtzqKOe25JukXg1-485RHmYfBdtMTd4HNoHNFoqHoBdPv1aYWTHbrLP5F6kCgKZgliy7-olR_A6jnq2JdAEzeT3EvppGX9Ih3OwQCM-4Fz_bLFWffRwnnrYvQroei6aBk6x0Sw_DZBCXo2aRqiftZ-jatCApQeH4eSzf6iU1Sg0KHl6gZFTadjD3nS0GWqvznrYjjCfQT_cb6a3SXjYhOgoSLvlNpfy69HJ1v2Pz29Fsk4B6CCu1ox_d_dO9q_V_ipvI935SpmPCS4OEj3dpM2aJisA1khbRs291uZyk4', 'state': 'xl6K4Jwush3w9gc3', 'code': 'YXI999pPNvmB-QZxSxVVdZpF6Cwj5M5RTNerWm5Q6Gc.HgisIHTGONKVAiKe5GA6tCISC0IBw4PtnLGhuRgLkP8'}
4.547 AuthorizationResponse {
"code": "YXI999pPNvmB-QZxSxVVdZpF6Cwj5M5RTNerWm5Q6Gc.HgisIHTGONKVAiKe5GA6tCISC0IBw4PtnLGhuRgLkP8",
"id_token": {
"aud": [
"1f588649-286c-4ad0-9362-0895b46c38cd"
],
"auth_time": 1529751224,
"c_hash": "NaXahD2PVsWhC78T0eWriQ",
"exp": 1529754930,
"iat": 1529751330,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "fa8789ef-d992-4df0-8c09-f991b5a7f613",
"nonce": "UsKOZSbwyncpUyC7",
"rat": 1529751327,
"sub": "[email protected]"
},
"state": "xl6K4Jwush3w9gc3"
}
4.547 phase <--<-- 4 --- AccessToken -->-->
4.548 --> request op_args: {'state': 'xl6K4Jwush3w9gc3'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
4.548 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'xl6K4Jwush3w9gc3', 'code': 'YXI999pPNvmB-QZxSxVVdZpF6Cwj5M5RTNerWm5Q6Gc.HgisIHTGONKVAiKe5GA6tCISC0IBw4PtnLGhuRgLkP8', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '1f588649-286c-4ad0-9362-0895b46c38cd'}, 'state': 'xl6K4Jwush3w9gc3'}
4.548 AccessTokenRequest {
"code": "YXI999pPNvmB-QZxSxVVdZpF6Cwj5M5RTNerWm5Q6Gc.HgisIHTGONKVAiKe5GA6tCISC0IBw4PtnLGhuRgLkP8",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "xl6K4Jwush3w9gc3"
}
4.548 request_url https://oidc-certification.ory.sh:8443/oauth2/token
4.548 request_http_args {'headers': {'Authorization': 'Basic MWY1ODg2NDktMjg2Yy00YWQwLTkzNjItMDg5NWI0NmMzOGNkOjVidXBBWnhwMnJQaw==', 'Content-Type': 'application/x-www-form-urlencoded'}}
4.548 request code=YXI999pPNvmB-QZxSxVVdZpF6Cwj5M5RTNerWm5Q6Gc.HgisIHTGONKVAiKe5GA6tCISC0IBw4PtnLGhuRgLkP8&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=xl6K4Jwush3w9gc3
4.796 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
4.797 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMWY1ODg2NDktMjg2Yy00YWQwLTkzNjItMDg5NWI0NmMzOGNkIl0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiTmFYYWhEMlBWc1doQzc4VDBlV3JpUSIsImV4cCI6MTUyOTc1NDkzMCwiaWF0IjoxNTI5NzUxMzMxLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJhZWUxYzc4My0xYTNhLTRhZTItODI1OC03MWQ3Njk1NmQyYzAiLCJub25jZSI6IlVzS09aU2J3eW5jcFV5QzciLCJyYXQiOjE1Mjk3NTEzMjcsInN1YiI6ImZvb0BiYXIuY29tIn0.CW_mZO67Jtoe8FZ1pEOce2ARDFDt-VkSh8zqbamV5rZZx8-aijB0fyYuZQm_ieaBPnBwQFd9M7YeY9j9iAAxwnIdRTe6sqvA73C6BG7c8tfjdflfnCzhi-1Gk4aX9Ty1VflKOOQXgLCDHHefEjWCnzBPAsz4UE79UaiN-Fjq9Qrrjlgc4WdU0BtII_4eJvAKpmnzvmwwYY9bY0KT0BdbXD210ccsjWzO_2jiYNXrqBJiiiSszvUEUxbQxlTcw5yamxFIOD0LSxASR_8B9hKn_cGKmwReB6OnBNGZk5KDBdR4MeCqpOgwig2Ig5Y0QfNHU8GTJV5oMM7gpwx0p4vYZqKaK_vTwxGXlzcd8NqpLa-GZaaL8zUlkEFw5cTVE1CWjETFs2WI-vrtuQ0WQyr95s4fEVSIdKHbv0BP4KInHm0V0Ttepu_iP5hETT7eg6vqmSwKVfBNeLtCZsms-a1C5xCaVNJ6u4gknH6wems8urT5zKFGz5FZrsC_qg6wzjGVOkwMWw1KhPPhXMq7VjUhq5d37NIMidTmiUIc14Q3gEGiLjhhJ-hOlNo_m1BROIl6NhG3_BmKFH7z0SgP2IvJgm4QPjXaVI0_7xFITeV6wW5WAoQF7ekNOnT27VUt3NjnY_saQKlGP7gVuabXSnn7f9mB6AiCJa_EKlV5ed0TFHY', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'dxd32Yqn8FK6ifKno_1-qKD_SzeQiOzvBPptEQE-XTk.qzopoEdEdccef--hq_7gGwFzTT84nrFyJG7VfGVoaUI', 'scope': 'openid profile email address phone'}
4.801 AccessTokenResponse {
"access_token": "dxd32Yqn8FK6ifKno_1-qKD_SzeQiOzvBPptEQE-XTk.qzopoEdEdccef--hq_7gGwFzTT84nrFyJG7VfGVoaUI",
"expires_in": 3599,
"id_token": {
"aud": [
"1f588649-286c-4ad0-9362-0895b46c38cd"
],
"auth_time": 1529751224,
"c_hash": "NaXahD2PVsWhC78T0eWriQ",
"exp": 1529754930,
"iat": 1529751331,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "aee1c783-1a3a-4ae2-8258-71d76956d2c0",
"nonce": "UsKOZSbwyncpUyC7",
"rat": 1529751327,
"sub": "[email protected]"
},
"scope": "openid profile email address phone",
"token_type": "bearer"
}
4.801 phase <--<-- 5 --- UserInfo -->-->
4.801 do_user_info_request kwargs:{'state': 'xl6K4Jwush3w9gc3', 'method': 'GET', 'authn_method': 'bearer_header'}
4.801 request {'body': None}
4.801 request_url https://oidc-certification.ory.sh:8443/userinfo
4.801 request_http_args {'headers': {'Authorization': 'Bearer dxd32Yqn8FK6ifKno_1-qKD_SzeQiOzvBPptEQE-XTk.qzopoEdEdccef--hq_7gGwFzTT84nrFyJG7VfGVoaUI'}}
4.874 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
4.874 OpenIDSchema {
"sub": "[email protected]"
}
4.874 OpenIDSchema {
"sub": "[email protected]"
}
4.874 phase <--<-- 6 --- Done -->-->
4.875 end
4.875 assertion CheckHTTPResponse
4.875 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
4.876 assertion VerifyResponse
4.876 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.876 assertion VerifyScopes
4.876 condition verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username', 'email', 'email_verified', 'address', 'phone_number', 'phone_number_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
4.876 condition Done: status=OK
============================================================
Conditions
Check support: status=WARNING, message=No support for: scopes_supported=['profile', 'email', 'address', 'phone']
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username', 'email', 'email_verified', 'address', 'phone_number', 'phone_number_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
No support for: scopes_supported=['profile', 'email', 'address', 'phone']
The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username', 'email', 'email_verified', 'address', 'phone_number', 'phone_number_verified']
./OP-redirect_uri-Query-Added.txt 0000644 0000000 0000000 00000011146 13313423400 017004 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-Query-Added
Test description: Request with redirect_uri with query component when registered redirect_uri has no query component
Timestamp: 2018-06-23T10:54:56Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Registration -->-->
0.074 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.075 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#EreA8qOoeDCFMMnq"
],
"response_types": [
"code id_token"
]
}
0.23 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.231 RegistrationResponse {
"client_id": "a7f515d0-b891-4868-af96-87a43f811200",
"client_secret": "LpBeGTrIUkjI",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "a7f515d0-b891-4868-af96-87a43f811200",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#EreA8qOoeDCFMMnq"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.231 phase <--<-- 3 --- Note -->-->
============================================================
Conditions
============================================================
RESULT: PARTIAL RESULT
./OP-redirect_uri-Missing.txt 0000644 0000000 0000000 00000011335 13313423371 016320 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-Missing
Test description: Reject request without redirect_uri when multiple registered
Timestamp: 2018-06-23T10:54:49Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.091 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.093 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.093 phase <--<-- 2 --- Registration -->-->
0.093 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb', 'https://op.certification.openid.net:61353/cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.093 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb",
"https://op.certification.openid.net:61353/cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#mSrcg9IqMyVmjszT"
],
"response_types": [
"code id_token"
]
}
0.261 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.262 RegistrationResponse {
"client_id": "af05dfc3-fc92-477b-af7a-0470d3387b66",
"client_secret": "NbZdeYSb5kKP",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "af05dfc3-fc92-477b-af7a-0470d3387b66",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb",
"https://op.certification.openid.net:61353/cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#mSrcg9IqMyVmjszT"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.262 phase <--<-- 3 --- Note -->-->
============================================================
Conditions
============================================================
RESULT: PARTIAL RESULT
./OP-redirect_uri-NotReg.txt 0000644 0000000 0000000 00000011072 13313423375 016107 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-NotReg
Test description: Sent redirect_uri does not match a registered redirect_uri
Timestamp: 2018-06-23T10:54:53Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.072 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.073 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.073 phase <--<-- 2 --- Registration -->-->
0.074 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.074 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#iDfBT2T8TjBAoLll"
],
"response_types": [
"code id_token"
]
}
0.236 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.237 RegistrationResponse {
"client_id": "bada40d0-b289-4647-84ca-2b86dcd9de3c",
"client_secret": "ng0DP0RMt0VO",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "bada40d0-b289-4647-84ca-2b86dcd9de3c",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#iDfBT2T8TjBAoLll"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.237 phase <--<-- 3 --- Note -->-->
============================================================
Conditions
============================================================
RESULT: PARTIAL RESULT
./OP-Req-ui_locales.txt 0000644 0000000 0000000 00000022042 13313423612 015070 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-ui_locales
Test description: Providing ui_locales
Timestamp: 2018-06-23T10:57:14Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.299 phase <--<-- 1 --- Webfinger -->-->
1.299 not expected to do WebFinger
1.299 phase <--<-- 2 --- Discovery -->-->
1.299 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.373 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.374 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.375 phase <--<-- 3 --- Registration -->-->
1.375 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.375 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#cG4oPd59ENbnhAUm"
],
"response_types": [
"code id_token"
]
}
1.54 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.541 RegistrationResponse {
"client_id": "9e11185c-b9ca-479a-9ca6-728d5decd13e",
"client_secret": "byt2~wtohxIy",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "9e11185c-b9ca-479a-9ca6-728d5decd13e",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#cG4oPd59ENbnhAUm"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.541 phase <--<-- 4 --- AsyncAuthn -->-->
1.542 AuthorizationRequest {
"client_id": "9e11185c-b9ca-479a-9ca6-728d5decd13e",
"nonce": "iwA016FLxcjs6KzP",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "yuwR8ay1cvQqyZOO",
"ui_locales": "se"
}
1.542 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?ui_locales=se&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=9e11185c-b9ca-479a-9ca6-728d5decd13e&state=yuwR8ay1cvQqyZOO&response_type=code+id_token&nonce=iwA016FLxcjs6KzP
1.542 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?ui_locales=se&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=9e11185c-b9ca-479a-9ca6-728d5decd13e&state=yuwR8ay1cvQqyZOO&response_type=code+id_token&nonce=iwA016FLxcjs6KzP
5.016 http args {}
5.185 response URL with fragment
5.185 response code=O8b3shVJ_3Ix99qt0yi2Mwq4TKyVOyXHwerpLuu08YA.p4P959cEk-A-iOhL0q4OQ-4w4mOv23B7mNrUP7cyljM&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiOWUxMTE4NWMtYjljYS00NzlhLTljYTYtNzI4ZDVkZWNkMTNlIl0sImF1dGhfdGltZSI6MTUyOTc1MTQwOSwiY19oYXNoIjoiVlpNaExBenh5aDZTbzdrYmo4LXhNUSIsImV4cCI6MTUyOTc1NTAzMywiaWF0IjoxNTI5NzUxNDMzLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiIwMDljZmEwYi02YTFlLTQ4NDEtOTI5OC03NWUwNDZlMzQyNjEiLCJub25jZSI6Iml3QTAxNkZMeGNqczZLelAiLCJyYXQiOjE1Mjk3NTE0MzAsInN1YiI6ImZvb0BiYXIuY29tIn0.Dp_zXe7C0KQoaJ218oRJxOniyzAApXHQqtj3gxSfUPb9ZiK5YbIsMPS3qo5k-HNU8TTFsu8B5Rn9VAl6lzPJWdYz2D0rnkrYxZkT3WlqNPU4c5MWAxQNmxoWkKfTHZ1XL2E9ml1sfSoPpRmpQdHijHGmCpTGVQixsa6QkPmS4_vFIR8f13FrJNz16jFi-sWucjpW2nB3wJkGOrllepcUM2GXL3Ifdg7_D9FxN6Du5Nv6fNKaZm8NodQTpOYH-xSutKU9lz27QROiJ2ChRowboY8r4kythnTzALUGobP30eRpBpf8J7ZaLBKIrylHoG20S9mjNuROBuT4afGbD5MqxV9eHumZaYymfIEcW0ClQnJKb2bcCYFpPXfK4pRQeaqWiDkCtBLg6M_LpJ60JwzJNvSxXb7_fxmnqVgKUPBNsyWKXFfR2RSGev3gd7Iw4Y4l_9ughvJYLMJzTVEZslea4se6VxdNn4MO9r7IFBrJsF56kcywSMJBd3qsqNZTRPnyTPlVTT_Srj-unxO3BCZ-CO-6kmd3Wd7JSRHOCC8jmEnTLsLuLxk7gomdWCuX_QHD5sjDiInJG_44EJRMCyAF5VP_zf1kmsyTE-UkYO1Ly4SETanMgk3gxluJHkqbfd-hYcCwcdeH51NjIUMnNWhe1Ky4027-tKsLkx8961iYDic&state=yuwR8ay1cvQqyZOO
5.185 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiOWUxMTE4NWMtYjljYS00NzlhLTljYTYtNzI4ZDVkZWNkMTNlIl0sImF1dGhfdGltZSI6MTUyOTc1MTQwOSwiY19oYXNoIjoiVlpNaExBenh5aDZTbzdrYmo4LXhNUSIsImV4cCI6MTUyOTc1NTAzMywiaWF0IjoxNTI5NzUxNDMzLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiIwMDljZmEwYi02YTFlLTQ4NDEtOTI5OC03NWUwNDZlMzQyNjEiLCJub25jZSI6Iml3QTAxNkZMeGNqczZLelAiLCJyYXQiOjE1Mjk3NTE0MzAsInN1YiI6ImZvb0BiYXIuY29tIn0.Dp_zXe7C0KQoaJ218oRJxOniyzAApXHQqtj3gxSfUPb9ZiK5YbIsMPS3qo5k-HNU8TTFsu8B5Rn9VAl6lzPJWdYz2D0rnkrYxZkT3WlqNPU4c5MWAxQNmxoWkKfTHZ1XL2E9ml1sfSoPpRmpQdHijHGmCpTGVQixsa6QkPmS4_vFIR8f13FrJNz16jFi-sWucjpW2nB3wJkGOrllepcUM2GXL3Ifdg7_D9FxN6Du5Nv6fNKaZm8NodQTpOYH-xSutKU9lz27QROiJ2ChRowboY8r4kythnTzALUGobP30eRpBpf8J7ZaLBKIrylHoG20S9mjNuROBuT4afGbD5MqxV9eHumZaYymfIEcW0ClQnJKb2bcCYFpPXfK4pRQeaqWiDkCtBLg6M_LpJ60JwzJNvSxXb7_fxmnqVgKUPBNsyWKXFfR2RSGev3gd7Iw4Y4l_9ughvJYLMJzTVEZslea4se6VxdNn4MO9r7IFBrJsF56kcywSMJBd3qsqNZTRPnyTPlVTT_Srj-unxO3BCZ-CO-6kmd3Wd7JSRHOCC8jmEnTLsLuLxk7gomdWCuX_QHD5sjDiInJG_44EJRMCyAF5VP_zf1kmsyTE-UkYO1Ly4SETanMgk3gxluJHkqbfd-hYcCwcdeH51NjIUMnNWhe1Ky4027-tKsLkx8961iYDic', 'state': 'yuwR8ay1cvQqyZOO', 'code': 'O8b3shVJ_3Ix99qt0yi2Mwq4TKyVOyXHwerpLuu08YA.p4P959cEk-A-iOhL0q4OQ-4w4mOv23B7mNrUP7cyljM'}
5.265 AuthorizationResponse {
"code": "O8b3shVJ_3Ix99qt0yi2Mwq4TKyVOyXHwerpLuu08YA.p4P959cEk-A-iOhL0q4OQ-4w4mOv23B7mNrUP7cyljM",
"id_token": {
"aud": [
"9e11185c-b9ca-479a-9ca6-728d5decd13e"
],
"auth_time": 1529751409,
"c_hash": "VZMhLAzxyh6So7kbj8-xMQ",
"exp": 1529755033,
"iat": 1529751433,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "009cfa0b-6a1e-4841-9298-75e046e34261",
"nonce": "iwA016FLxcjs6KzP",
"rat": 1529751430,
"sub": "[email protected]"
},
"state": "yuwR8ay1cvQqyZOO"
}
5.265 phase <--<-- 5 --- Done -->-->
5.265 end
5.265 assertion VerifyAuthnResponse
5.265 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
5.265 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Response-code+id_token.txt 0000644 0000000 0000000 00000022422 13313423075 016527 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Response-code+id_token
Test description: Request with response_type=code id_token
Timestamp: 2018-06-23T10:51:41Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.075 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.076 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.076 phase <--<-- 2 --- Registration -->-->
0.076 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.077 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#m4fBbGHxOJnITOwg"
],
"response_types": [
"code id_token"
]
}
0.238 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.238 RegistrationResponse {
"client_id": "3f310789-685b-4abf-92d0-8dbd31a6965d",
"client_secret": "XA4y7w6wGA3r",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "3f310789-685b-4abf-92d0-8dbd31a6965d",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#m4fBbGHxOJnITOwg"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.238 phase <--<-- 3 --- AsyncAuthn -->-->
0.239 AuthorizationRequest {
"client_id": "3f310789-685b-4abf-92d0-8dbd31a6965d",
"nonce": "fepW6L1aJgF74VbH",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "jfprgTRa66gxWeip"
}
0.239 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=3f310789-685b-4abf-92d0-8dbd31a6965d&state=jfprgTRa66gxWeip&response_type=code+id_token&nonce=fepW6L1aJgF74VbH
0.239 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=3f310789-685b-4abf-92d0-8dbd31a6965d&state=jfprgTRa66gxWeip&response_type=code+id_token&nonce=fepW6L1aJgF74VbH
3.269 http args {}
3.482 response URL with fragment
3.482 response code=1dXZYdJNMSaWnCJKfU1ioQehXwTE08RfKHDMsaOy-aw.Ut4Kl8btgUZXUlaF80gqpRnlQJXccbHgePEwcOv1vLM&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiM2YzMTA3ODktNjg1Yi00YWJmLTkyZDAtOGRiZDMxYTY5NjVkIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiOVJsdHVScUFqRk9NUE82dmRrOEdYZyIsImV4cCI6MTUyOTc1NDcwMCwiaWF0IjoxNTI5NzUxMTAwLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiIwODBmNDA1OC0yYzA3LTQwOTgtYjljMy01ZDMwYTIwMzBjMmMiLCJub25jZSI6ImZlcFc2TDFhSmdGNzRWYkgiLCJyYXQiOjE1Mjk3NTEwOTgsInN1YiI6ImZvb0BiYXIuY29tIn0.1qqoGm2suSXevLfYpwfUr8kna4Hp-qD0U98JNUKpcYFn-CNrNV7CkVBD7QPUCwgLZhJ8KHVgRIsFqGXuSQXDqzq3QbQpnac6mJuVBRy6Y8bnrEP1XcqaSm-VKzV7KvHtCzefQ4cyubfmlH8E6yX99mb7bNkJKGk0m2SCgzdldxxIdx7reRTvuYotPqMsx_1x5EzNsJ_yvrFY5TgYiMOa4is8vBTB9bskcriFz9LZHUIIbEVbJhYs_WW2E76aBeQwEvbJTbkctdWmYkGY8yDE3fp1Xpq5fYIWSwVsQ8eFGEZMxyeBsh2WVKY8K1S1OFi1PcToT7iZuHcrEragvQ2A5qJRWg4K-akSLqjM-OJN69VlxlR1HZil4UeolWn6WkAwq1dq3NzmbdW0jEavIfMDhVlGE_TP-FM3H_Xu9RsW9q4QwP6Z5A0EthKhmPP2A_fCR2r_SeVZkX8a23L7_bSO6QYaTY5ojoP_-HgX9v5zAFU_hub8umlqy3t_jV5bX9nlnrrxPJfMufaH4qB93hndVa99r4ovVz8qJqnhXetWkd--db3zvYNGVv1FOoTHt327B5-YD7OPGg9e0M6dxrVPPjDaHeUfVOuGEdCkKQ7Z9oaxSl-VnIzIFkOvaiz_vLUieLi1WqjtbKZohWayvDzW9iCtYHlWGsUxGVt1UrcnpoI&state=jfprgTRa66gxWeip
3.483 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiM2YzMTA3ODktNjg1Yi00YWJmLTkyZDAtOGRiZDMxYTY5NjVkIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiOVJsdHVScUFqRk9NUE82dmRrOEdYZyIsImV4cCI6MTUyOTc1NDcwMCwiaWF0IjoxNTI5NzUxMTAwLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiIwODBmNDA1OC0yYzA3LTQwOTgtYjljMy01ZDMwYTIwMzBjMmMiLCJub25jZSI6ImZlcFc2TDFhSmdGNzRWYkgiLCJyYXQiOjE1Mjk3NTEwOTgsInN1YiI6ImZvb0BiYXIuY29tIn0.1qqoGm2suSXevLfYpwfUr8kna4Hp-qD0U98JNUKpcYFn-CNrNV7CkVBD7QPUCwgLZhJ8KHVgRIsFqGXuSQXDqzq3QbQpnac6mJuVBRy6Y8bnrEP1XcqaSm-VKzV7KvHtCzefQ4cyubfmlH8E6yX99mb7bNkJKGk0m2SCgzdldxxIdx7reRTvuYotPqMsx_1x5EzNsJ_yvrFY5TgYiMOa4is8vBTB9bskcriFz9LZHUIIbEVbJhYs_WW2E76aBeQwEvbJTbkctdWmYkGY8yDE3fp1Xpq5fYIWSwVsQ8eFGEZMxyeBsh2WVKY8K1S1OFi1PcToT7iZuHcrEragvQ2A5qJRWg4K-akSLqjM-OJN69VlxlR1HZil4UeolWn6WkAwq1dq3NzmbdW0jEavIfMDhVlGE_TP-FM3H_Xu9RsW9q4QwP6Z5A0EthKhmPP2A_fCR2r_SeVZkX8a23L7_bSO6QYaTY5ojoP_-HgX9v5zAFU_hub8umlqy3t_jV5bX9nlnrrxPJfMufaH4qB93hndVa99r4ovVz8qJqnhXetWkd--db3zvYNGVv1FOoTHt327B5-YD7OPGg9e0M6dxrVPPjDaHeUfVOuGEdCkKQ7Z9oaxSl-VnIzIFkOvaiz_vLUieLi1WqjtbKZohWayvDzW9iCtYHlWGsUxGVt1UrcnpoI', 'state': 'jfprgTRa66gxWeip', 'code': '1dXZYdJNMSaWnCJKfU1ioQehXwTE08RfKHDMsaOy-aw.Ut4Kl8btgUZXUlaF80gqpRnlQJXccbHgePEwcOv1vLM'}
3.564 AuthorizationResponse {
"code": "1dXZYdJNMSaWnCJKfU1ioQehXwTE08RfKHDMsaOy-aw.Ut4Kl8btgUZXUlaF80gqpRnlQJXccbHgePEwcOv1vLM",
"id_token": {
"aud": [
"3f310789-685b-4abf-92d0-8dbd31a6965d"
],
"auth_time": 1529750975,
"c_hash": "9RltuRqAjFOMPO6vdk8GXg",
"exp": 1529754700,
"iat": 1529751100,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "080f4058-2c07-4098-b9c3-5d30a2030c2c",
"nonce": "fepW6L1aJgF74VbH",
"rat": 1529751098,
"sub": "[email protected]"
},
"state": "jfprgTRa66gxWeip"
}
3.564 phase <--<-- 4 --- Done -->-->
3.564 end
3.564 assertion VerifyAuthnResponse
3.564 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
3.565 assertion CheckIdTokenNonce
3.565 condition check-idtoken-nonce: status=OK [Verify that the nonce in the IDToken is the same that's included in the Authorization Request.]
3.565 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
check-idtoken-nonce: status=OK [Verify that the nonce in the IDToken is the same that's included in the Authorization Request.]
Done: status=OK
============================================================
RESULT: PASSED
./OP-prompt-login.txt 0000644 0000000 0000000 00000050241 13313423273 014660 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-prompt-login
Test description: Request with prompt=login
Timestamp: 2018-06-23T10:53:47Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.095 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.096 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.096 phase <--<-- 2 --- Registration -->-->
0.097 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.097 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#xq2dFr12aAtLnmqv"
],
"response_types": [
"code id_token"
]
}
0.251 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.252 RegistrationResponse {
"client_id": "9ead53ac-7ec8-4752-a06c-bc25aad8d01f",
"client_secret": ".9zWaD6RDdkA",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "9ead53ac-7ec8-4752-a06c-bc25aad8d01f",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#xq2dFr12aAtLnmqv"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.252 phase <--<-- 3 --- AsyncAuthn -->-->
0.253 AuthorizationRequest {
"client_id": "9ead53ac-7ec8-4752-a06c-bc25aad8d01f",
"nonce": "PQY7HzmrcbQdsSrS",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "3z4cW7o0D48xujHP"
}
0.253 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=9ead53ac-7ec8-4752-a06c-bc25aad8d01f&state=3z4cW7o0D48xujHP&response_type=code+id_token&nonce=PQY7HzmrcbQdsSrS
0.253 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=9ead53ac-7ec8-4752-a06c-bc25aad8d01f&state=3z4cW7o0D48xujHP&response_type=code+id_token&nonce=PQY7HzmrcbQdsSrS
2.896 http args {}
3.11 response URL with fragment
3.11 response code=-2dAkh36cqkvdi1ueoGenMjRTM8J_xe6fkG-ycUDGtY.YnM0Wh69rf626Q9pOk2auo58i12sZvct3Q7VzzVIkig&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiOWVhZDUzYWMtN2VjOC00NzUyLWEwNmMtYmMyNWFhZDhkMDFmIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiWU9Wd2FONm50MDJkQTJGVWx6UThWZyIsImV4cCI6MTUyOTc1NDgxOSwiaWF0IjoxNTI5NzUxMjE5LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJkNjZjZTU2OC01MjM4LTRlNmUtOWNhOC0xMDQ1NDA2MzQ4Y2EiLCJub25jZSI6IlBRWTdIem1yY2JRZHNTclMiLCJyYXQiOjE1Mjk3NTEyMTcsInN1YiI6ImZvb0BiYXIuY29tIn0.NvkZHlVF2YcKg481oQCyQaIpvWzGIdzWootpMD09KXUlG5FdQaZSShlykEM0n756crw0skwaHxA7c41QGXx0mEO2-svr8GRPoEu25iGgZ1iH7qyytTD1DhV4aSxkr-pyo7bs6bWUtO90jaQf0k9Kev8F4UfKBMpkxMBdvt41z_EY1dpGeUPB4bffTa6-1PWHr-ApXCw80s0Q7lJolBrj9XN-KsQiKhTbq0QgL90SltQy8uktk1C7FVSbRz1hcA57-YZ2NYaPeNAf0LDLEdnOD3mx7GkaeRpE8jC_z3RrYF97Z9i9gs4iBRYiJH4tIf1wk4My3LAqob7PsEpyY_J9y6wTcWnI-lwmJcQ51ksKPBbWaDPKEG9mvFRnfw7UH2p4YfcUiIdWG9FO6K40fUCByIv9wBBuoyCYOPY19mRtqB1LTErhnnxS-t6eKFpAET6dVgOI0AWT8M0-yDX3fnljoV-87YX1ttdWkaZcqgbEI4xlHWwJZxo0J211DIQXB9gRMTgPT3BQO3rMZM1vP2aqxx3uyUSG2wOL39OFmkT0E06Oqt_gUFnhLKelyHoCR6CUOv424PqqWBeBEPOOueG3KEa2D4XVC6LMGUC2KLon9JwXtyx_6uQDNlT9U_At2dlZ3McOIMHuoeDK5oe-pGoSZF5XUUXL15GOWOcmDz-LoXk&state=3z4cW7o0D48xujHP
3.111 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiOWVhZDUzYWMtN2VjOC00NzUyLWEwNmMtYmMyNWFhZDhkMDFmIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiWU9Wd2FONm50MDJkQTJGVWx6UThWZyIsImV4cCI6MTUyOTc1NDgxOSwiaWF0IjoxNTI5NzUxMjE5LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJkNjZjZTU2OC01MjM4LTRlNmUtOWNhOC0xMDQ1NDA2MzQ4Y2EiLCJub25jZSI6IlBRWTdIem1yY2JRZHNTclMiLCJyYXQiOjE1Mjk3NTEyMTcsInN1YiI6ImZvb0BiYXIuY29tIn0.NvkZHlVF2YcKg481oQCyQaIpvWzGIdzWootpMD09KXUlG5FdQaZSShlykEM0n756crw0skwaHxA7c41QGXx0mEO2-svr8GRPoEu25iGgZ1iH7qyytTD1DhV4aSxkr-pyo7bs6bWUtO90jaQf0k9Kev8F4UfKBMpkxMBdvt41z_EY1dpGeUPB4bffTa6-1PWHr-ApXCw80s0Q7lJolBrj9XN-KsQiKhTbq0QgL90SltQy8uktk1C7FVSbRz1hcA57-YZ2NYaPeNAf0LDLEdnOD3mx7GkaeRpE8jC_z3RrYF97Z9i9gs4iBRYiJH4tIf1wk4My3LAqob7PsEpyY_J9y6wTcWnI-lwmJcQ51ksKPBbWaDPKEG9mvFRnfw7UH2p4YfcUiIdWG9FO6K40fUCByIv9wBBuoyCYOPY19mRtqB1LTErhnnxS-t6eKFpAET6dVgOI0AWT8M0-yDX3fnljoV-87YX1ttdWkaZcqgbEI4xlHWwJZxo0J211DIQXB9gRMTgPT3BQO3rMZM1vP2aqxx3uyUSG2wOL39OFmkT0E06Oqt_gUFnhLKelyHoCR6CUOv424PqqWBeBEPOOueG3KEa2D4XVC6LMGUC2KLon9JwXtyx_6uQDNlT9U_At2dlZ3McOIMHuoeDK5oe-pGoSZF5XUUXL15GOWOcmDz-LoXk', 'state': '3z4cW7o0D48xujHP', 'code': '-2dAkh36cqkvdi1ueoGenMjRTM8J_xe6fkG-ycUDGtY.YnM0Wh69rf626Q9pOk2auo58i12sZvct3Q7VzzVIkig'}
3.196 AuthorizationResponse {
"code": "-2dAkh36cqkvdi1ueoGenMjRTM8J_xe6fkG-ycUDGtY.YnM0Wh69rf626Q9pOk2auo58i12sZvct3Q7VzzVIkig",
"id_token": {
"aud": [
"9ead53ac-7ec8-4752-a06c-bc25aad8d01f"
],
"auth_time": 1529750975,
"c_hash": "YOVwaN6nt02dA2FUlzQ8Vg",
"exp": 1529754819,
"iat": 1529751219,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "d66ce568-5238-4e6e-9ca8-1045406348ca",
"nonce": "PQY7HzmrcbQdsSrS",
"rat": 1529751217,
"sub": "[email protected]"
},
"state": "3z4cW7o0D48xujHP"
}
3.196 phase <--<-- 4 --- AccessToken -->-->
3.197 --> request op_args: {'state': '3z4cW7o0D48xujHP'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.197 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': '3z4cW7o0D48xujHP', 'code': '-2dAkh36cqkvdi1ueoGenMjRTM8J_xe6fkG-ycUDGtY.YnM0Wh69rf626Q9pOk2auo58i12sZvct3Q7VzzVIkig', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '9ead53ac-7ec8-4752-a06c-bc25aad8d01f'}, 'state': '3z4cW7o0D48xujHP'}
3.197 AccessTokenRequest {
"code": "-2dAkh36cqkvdi1ueoGenMjRTM8J_xe6fkG-ycUDGtY.YnM0Wh69rf626Q9pOk2auo58i12sZvct3Q7VzzVIkig",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "3z4cW7o0D48xujHP"
}
3.197 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.197 request_http_args {'headers': {'Authorization': 'Basic OWVhZDUzYWMtN2VjOC00NzUyLWEwNmMtYmMyNWFhZDhkMDFmOi45eldhRDZSRGRrQQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
3.197 request code=-2dAkh36cqkvdi1ueoGenMjRTM8J_xe6fkG-ycUDGtY.YnM0Wh69rf626Q9pOk2auo58i12sZvct3Q7VzzVIkig&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=3z4cW7o0D48xujHP
3.413 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.414 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiOWVhZDUzYWMtN2VjOC00NzUyLWEwNmMtYmMyNWFhZDhkMDFmIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiWU9Wd2FONm50MDJkQTJGVWx6UThWZyIsImV4cCI6MTUyOTc1NDgxOSwiaWF0IjoxNTI5NzUxMjIwLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI2YmQ3ZGUxNi0zMTM4LTRiY2UtOGQ4Mi0xOTFmNGI1ZjQ2ZjMiLCJub25jZSI6IlBRWTdIem1yY2JRZHNTclMiLCJyYXQiOjE1Mjk3NTEyMTcsInN1YiI6ImZvb0BiYXIuY29tIn0.hIo3bym-VXpzjBUJi4zMGvCSbEjiwteeQTgwCIDyhMx1HUX-AR37Ezc-UzOZWo8OXcUMb660HrPV7kNu241SnDa3a0SsVyrrcVZEX64xJ2soBbn4UGu6a6TlwU_UoKSVDkWLpPNjVUY2vysj5eBTbOZb2l_QfHo4l9vFV4QpU0XWQBDECOHrUuHshohgJNHEs_BkUmsjEo2BI4z7cwU6f5Hju-332hy2ge4SGq8mmINy0AeupiiAPsQfEKf_JfQWHCfOeAyTl2UOlailjGMNDAYvTuEO1uPp78F2Vf8LuDZVahx48fkEZ7pZlyPBrcL7XMZpF-8vL8OtOjZqum6OUj_dFOUUexMj1xj452ZYislKG4EqLperkhPqiIOycfLo9YHIq8j32PUC9EB-xGX6DiAKuiFLYNWfrbo2ivp8Bqr-FJuwUsq1BDkZ5jFqqJK8iW4qvzwPQ_rO15psPlUJprSsh8a6jNPsy9u-3NSrX5nEIJrsSi6diuzkeKAbj1Go0noB0I4ye-6OFTE6esAwkH8BdLpcS7DKBGQgeFWK3V8TEb00UXH2qfb43v8WiNjBk03Z88CvTT0rdxH2Z1JdsY-58A6MeLP2SGk4FG-kAVuTm4QlqkoMaLALAk6XaH7nwbT6dhRv2s4K4lKPm0qNwh077K0A1luHFIgrW25uf6o', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'nBo8jO50qie7UJSGtfr5thfF4W_7ohTMTc3GA9FhQQI.mHA3jvhADHymOMMYmCc7mZVZEhmnnXkU1-jP9Q2X7J4', 'scope': 'openid'}
3.418 AccessTokenResponse {
"access_token": "nBo8jO50qie7UJSGtfr5thfF4W_7ohTMTc3GA9FhQQI.mHA3jvhADHymOMMYmCc7mZVZEhmnnXkU1-jP9Q2X7J4",
"expires_in": 3599,
"id_token": {
"aud": [
"9ead53ac-7ec8-4752-a06c-bc25aad8d01f"
],
"auth_time": 1529750975,
"c_hash": "YOVwaN6nt02dA2FUlzQ8Vg",
"exp": 1529754819,
"iat": 1529751220,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "6bd7de16-3138-4bce-8d82-191f4b5f46f3",
"nonce": "PQY7HzmrcbQdsSrS",
"rat": 1529751217,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.418 phase <--<-- 5 --- Note -->-->
5.244 phase <--<-- 6 --- AsyncAuthn -->-->
5.244 AuthorizationRequest {
"client_id": "9ead53ac-7ec8-4752-a06c-bc25aad8d01f",
"nonce": "WRrQdTa6gwJizPLy",
"prompt": [
"login"
],
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "ECunuyq487DrPNlp"
}
5.245 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=login&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=9ead53ac-7ec8-4752-a06c-bc25aad8d01f&state=ECunuyq487DrPNlp&response_type=code+id_token&nonce=WRrQdTa6gwJizPLy
5.245 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=login&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=9ead53ac-7ec8-4752-a06c-bc25aad8d01f&state=ECunuyq487DrPNlp&response_type=code+id_token&nonce=WRrQdTa6gwJizPLy
10.4 http args {}
10.599 response URL with fragment
10.6 response code=6Nbc0mx1Ac3_k02xzoXya7GOhr0vuy9KLrHlqm18ZKo.1js3d9_naQLrrDiNPMuWZ9o69ufm8PsAj0jyAL3F_Rc&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiOWVhZDUzYWMtN2VjOC00NzUyLWEwNmMtYmMyNWFhZDhkMDFmIl0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiXy1kM2NFeGtjNE4yOXRhZ3UxR1JDUSIsImV4cCI6MTUyOTc1NDgyNywiaWF0IjoxNTI5NzUxMjI3LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJlNTJlMTk4OS04Mjk1LTQ1OGEtOGE1ZC05M2U2MDE3OWQ0Y2UiLCJub25jZSI6IldSclFkVGE2Z3dKaXpQTHkiLCJyYXQiOjE1Mjk3NTEyMjIsInN1YiI6ImZvb0BiYXIuY29tIn0.UjZ0QKeg4nzlnGJdEXIbo0_uaNcdYnpTfr6i4_s72yugCOogZ9jheQeeTz6jsveqWFR_jHlDvhwloACY10lH5mDRXMT2TqRuRzBCTFyyabLUiLFmIjTsaseiPbxlqdi6uAqh-l2i7wRQOB61n0f8j4qfXc2LLgDI3WuAYONcxv7kagRGCcw07ikqLcataW7Km6jK5kbRPlvCeytdEjub_Zv8AZAuV-j3yKfbdxBNWqmm8CAIoYRw4bFdZ7oAWnCzSpLQpoYzoSHXSpoUX79H6pz4M6ky5JwhGhIOsLZ3U4Ckn0tnCfZcvE6YCyjLVQ6VP6SfYeWE4UkzvkwGJ3tVQKx-8ZAXLkSzS0mzHBwVAALhkEFqpiARPMnfF4YtFXARXQjbg9zaR7oIgtn4A5RfRXvbKSPzJ5__R71tfNpolfRAkup0egzdT1cU-6PBkC-t5t9Uf8vTfSYUJHQvGtj2pb8ub-LIfdOIUvfdnjCqFRcn9Bu54Z_NA1yVqYRBqxt1nmKPbe-Rib0znYoEr1DL26b6XwO6WBCx88-m6eVV0Vsm5eGJhYIvAaeeA9hHz72akUWzPkx9Ikuj4KRB6hL_xq6mw5XCEWAjjCyh7pDcSOgXRiTzMwnZxhk92ENf31ZvVhm1SiW5i-9DUA9ZTyTbKH5NqlodJxhR8LqWvwoD0d8&state=ECunuyq487DrPNlp
10.6 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiOWVhZDUzYWMtN2VjOC00NzUyLWEwNmMtYmMyNWFhZDhkMDFmIl0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiXy1kM2NFeGtjNE4yOXRhZ3UxR1JDUSIsImV4cCI6MTUyOTc1NDgyNywiaWF0IjoxNTI5NzUxMjI3LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJlNTJlMTk4OS04Mjk1LTQ1OGEtOGE1ZC05M2U2MDE3OWQ0Y2UiLCJub25jZSI6IldSclFkVGE2Z3dKaXpQTHkiLCJyYXQiOjE1Mjk3NTEyMjIsInN1YiI6ImZvb0BiYXIuY29tIn0.UjZ0QKeg4nzlnGJdEXIbo0_uaNcdYnpTfr6i4_s72yugCOogZ9jheQeeTz6jsveqWFR_jHlDvhwloACY10lH5mDRXMT2TqRuRzBCTFyyabLUiLFmIjTsaseiPbxlqdi6uAqh-l2i7wRQOB61n0f8j4qfXc2LLgDI3WuAYONcxv7kagRGCcw07ikqLcataW7Km6jK5kbRPlvCeytdEjub_Zv8AZAuV-j3yKfbdxBNWqmm8CAIoYRw4bFdZ7oAWnCzSpLQpoYzoSHXSpoUX79H6pz4M6ky5JwhGhIOsLZ3U4Ckn0tnCfZcvE6YCyjLVQ6VP6SfYeWE4UkzvkwGJ3tVQKx-8ZAXLkSzS0mzHBwVAALhkEFqpiARPMnfF4YtFXARXQjbg9zaR7oIgtn4A5RfRXvbKSPzJ5__R71tfNpolfRAkup0egzdT1cU-6PBkC-t5t9Uf8vTfSYUJHQvGtj2pb8ub-LIfdOIUvfdnjCqFRcn9Bu54Z_NA1yVqYRBqxt1nmKPbe-Rib0znYoEr1DL26b6XwO6WBCx88-m6eVV0Vsm5eGJhYIvAaeeA9hHz72akUWzPkx9Ikuj4KRB6hL_xq6mw5XCEWAjjCyh7pDcSOgXRiTzMwnZxhk92ENf31ZvVhm1SiW5i-9DUA9ZTyTbKH5NqlodJxhR8LqWvwoD0d8', 'state': 'ECunuyq487DrPNlp', 'code': '6Nbc0mx1Ac3_k02xzoXya7GOhr0vuy9KLrHlqm18ZKo.1js3d9_naQLrrDiNPMuWZ9o69ufm8PsAj0jyAL3F_Rc'}
10.604 AuthorizationResponse {
"code": "6Nbc0mx1Ac3_k02xzoXya7GOhr0vuy9KLrHlqm18ZKo.1js3d9_naQLrrDiNPMuWZ9o69ufm8PsAj0jyAL3F_Rc",
"id_token": {
"aud": [
"9ead53ac-7ec8-4752-a06c-bc25aad8d01f"
],
"auth_time": 1529751224,
"c_hash": "_-d3cExkc4N29tagu1GRCQ",
"exp": 1529754827,
"iat": 1529751227,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "e52e1989-8295-458a-8a5d-93e60179d4ce",
"nonce": "WRrQdTa6gwJizPLy",
"rat": 1529751222,
"sub": "[email protected]"
},
"state": "ECunuyq487DrPNlp"
}
10.604 phase <--<-- 7 --- AccessToken -->-->
10.604 --> request op_args: {'state': 'ECunuyq487DrPNlp'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
10.604 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'ECunuyq487DrPNlp', 'code': '6Nbc0mx1Ac3_k02xzoXya7GOhr0vuy9KLrHlqm18ZKo.1js3d9_naQLrrDiNPMuWZ9o69ufm8PsAj0jyAL3F_Rc', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '9ead53ac-7ec8-4752-a06c-bc25aad8d01f'}, 'state': 'ECunuyq487DrPNlp'}
10.604 AccessTokenRequest {
"code": "6Nbc0mx1Ac3_k02xzoXya7GOhr0vuy9KLrHlqm18ZKo.1js3d9_naQLrrDiNPMuWZ9o69ufm8PsAj0jyAL3F_Rc",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "ECunuyq487DrPNlp"
}
10.604 request_url https://oidc-certification.ory.sh:8443/oauth2/token
10.604 request_http_args {'headers': {'Authorization': 'Basic OWVhZDUzYWMtN2VjOC00NzUyLWEwNmMtYmMyNWFhZDhkMDFmOi45eldhRDZSRGRrQQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
10.604 request code=6Nbc0mx1Ac3_k02xzoXya7GOhr0vuy9KLrHlqm18ZKo.1js3d9_naQLrrDiNPMuWZ9o69ufm8PsAj0jyAL3F_Rc&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=ECunuyq487DrPNlp
10.816 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
10.817 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiOWVhZDUzYWMtN2VjOC00NzUyLWEwNmMtYmMyNWFhZDhkMDFmIl0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiXy1kM2NFeGtjNE4yOXRhZ3UxR1JDUSIsImV4cCI6MTUyOTc1NDgyNywiaWF0IjoxNTI5NzUxMjI3LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI5ZTIxMTdlZS1iNDY4LTRlYTYtOTA2ZC05MzAzMGE5YjllODIiLCJub25jZSI6IldSclFkVGE2Z3dKaXpQTHkiLCJyYXQiOjE1Mjk3NTEyMjIsInN1YiI6ImZvb0BiYXIuY29tIn0.WB33Pr1hoGdGmpkhhW1a79GGl_Ycl3ObTOqD_bmE2eElfwi51ihjdXHxz_yiCIhZEwmlVwYhPIGBB8odojkx-suTDRBCKXMZ_3aBQ_ik54c739u8c4dO0s-PTJlpMEaLy5NBYx0NQWLb1UcSrGN32HxCeq_dDYb65YcaNUx2N_KtnmHNkXAXjHvWr5ThSmkYq59ikR3xtafwjQ-wV4DuBEu9OpTKkI0hBE4L6SLVDAchSkJTbwSzLb4yzemWMWHQipz81sqzlPrUycHAB91S8IZQOhOhSWgXdEgUmUEfo07Nl_g18oH-EM0RC2sTZXSQGHL6jpMjGVpWUvs2HK5itPUm_2D-ko6XPQdpCnsk-3SeoFZejIW3Z7_ymJ0EV4g6JpSkkpzjBG831ABw2YhGHpT0obogOflPUWvGdnvGmq_Vwhdyp-pcS5OWSqCHKl8J_L44scsokzNVoRlrV6ocuJFDDzU5_kra3g5LqRWHq570QrqEnBskA3PEgDEvFGarcoktREfaiPBOJVy2XbwCE_T5_lY7WWT-GY7Uq6J6ZmwdeIt_01uAxyAMAHSMgs9yLqoZv3KgTsOrbckoGqL6Pvv9bDUoKzyNvX4fxTESt_VmwR9qOKH-t7lzgSH2Pq_UROHAGtY9hzL4if2oMfx29H6LOGm-bTV7usUlfvpEqkY', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'GVHVfcCTykmpCg6E_U3FpqBNdg_SADbyKiI7eMJqygI.5OuAYNrV_IXkbsuvYrcFUopAd9QntfE-HSyEOB-IEIA', 'scope': 'openid'}
10.82 AccessTokenResponse {
"access_token": "GVHVfcCTykmpCg6E_U3FpqBNdg_SADbyKiI7eMJqygI.5OuAYNrV_IXkbsuvYrcFUopAd9QntfE-HSyEOB-IEIA",
"expires_in": 3599,
"id_token": {
"aud": [
"9ead53ac-7ec8-4752-a06c-bc25aad8d01f"
],
"auth_time": 1529751224,
"c_hash": "_-d3cExkc4N29tagu1GRCQ",
"exp": 1529754827,
"iat": 1529751227,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "9e2117ee-b468-4ea6-906d-93030a9b9e82",
"nonce": "WRrQdTa6gwJizPLy",
"rat": 1529751222,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
10.82 phase <--<-- 8 --- Done -->-->
10.821 end
10.821 assertion VerifyResponse
10.821 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
10.821 assertion MultipleSignOn
10.821 condition multiple-sign-on: status=OK [Verifies that multiple authentications was used in the flow]
10.821 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
multiple-sign-on: status=OK [Verifies that multiple authentications was used in the flow]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Response-Missing.txt 0000644 0000000 0000000 00000015226 13313423070 015435 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Response-Missing
Test description: Authorization request missing the response_type parameter
Timestamp: 2018-06-23T10:51:36Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.096 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.097 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.097 phase <--<-- 2 --- Registration -->-->
0.097 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.098 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#JRX1p7YLROLCRtrD"
],
"response_types": [
"code id_token"
]
}
0.29 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.291 RegistrationResponse {
"client_id": "8898dd48-5166-4a3a-9497-7d7eb24cd1e9",
"client_secret": "uWzygpM29J1c",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "8898dd48-5166-4a3a-9497-7d7eb24cd1e9",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#JRX1p7YLROLCRtrD"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.291 phase <--<-- 3 --- Note -->-->
1.701 phase <--<-- 4 --- AsyncAuthn -->-->
1.702 AuthorizationRequest {
"client_id": "8898dd48-5166-4a3a-9497-7d7eb24cd1e9",
"nonce": "rhlRVwXUFBDYJcH2",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"scope": "openid",
"state": "21wdXtuE6WYtc0WJ"
}
1.702 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?state=21wdXtuE6WYtc0WJ&scope=openid&nonce=rhlRVwXUFBDYJcH2&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=8898dd48-5166-4a3a-9497-7d7eb24cd1e9
1.702 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?state=21wdXtuE6WYtc0WJ&scope=openid&nonce=rhlRVwXUFBDYJcH2&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=8898dd48-5166-4a3a-9497-7d7eb24cd1e9
2.314 response Response URL with query part
2.315 response {'error_debug': 'The request is missing the response_type parameter', 'error_description': 'The authorization server does not support obtaining a token using this method', 'state': '', 'error': 'unsupported_response_type'}
2.315 response {'error_debug': 'The request is missing the response_type parameter', 'error_description': 'The authorization server does not support obtaining a token using this method', 'error': 'unsupported_response_type'}
2.315 AuthorizationErrorResponse {
"error": "unsupported_response_type",
"error_debug": "The request is missing the response_type parameter",
"error_description": "The authorization server does not support obtaining a token using this method"
}
2.315 AuthorizationErrorResponse {
"error": "unsupported_response_type",
"error_debug": "The request is missing the response_type parameter",
"error_description": "The authorization server does not support obtaining a token using this method"
}
2.315 phase <--<-- 5 --- Done -->-->
2.316 end
2.316 assertion VerifyErrorMessage
2.316 condition verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
2.316 condition Done: status=OK
============================================================
Conditions
verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-UserInfo-Endpoint.txt 0000644 0000000 0000000 00000031664 13313423201 015540 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-UserInfo-Endpoint
Test description: UserInfo Endpoint access with GET and bearer header
Timestamp: 2018-06-23T10:52:49Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Registration -->-->
0.074 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.075 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#exjfersS8oAONTfg"
],
"response_types": [
"code id_token"
]
}
0.229 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.23 RegistrationResponse {
"client_id": "a5f5ee28-177e-4892-b908-5dc0f258c626",
"client_secret": "5hCrFnoJIfIK",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "a5f5ee28-177e-4892-b908-5dc0f258c626",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#exjfersS8oAONTfg"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.23 phase <--<-- 3 --- AsyncAuthn -->-->
0.231 AuthorizationRequest {
"client_id": "a5f5ee28-177e-4892-b908-5dc0f258c626",
"nonce": "DHAYKfNXZ7AYFwx7",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "cHplUcn5U2bqlgsd"
}
0.231 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=a5f5ee28-177e-4892-b908-5dc0f258c626&state=cHplUcn5U2bqlgsd&response_type=code+id_token&nonce=DHAYKfNXZ7AYFwx7
0.231 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=a5f5ee28-177e-4892-b908-5dc0f258c626&state=cHplUcn5U2bqlgsd&response_type=code+id_token&nonce=DHAYKfNXZ7AYFwx7
2.729 http args {}
2.898 response URL with fragment
2.898 response code=lWRqMGRjwbA__qQKD4LU2obJI5-PL5td76XqfQ9o0K4.RpH7yngXawDRTfXo6wH4GxJOov5SrxswshipOAoNfcM&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYTVmNWVlMjgtMTc3ZS00ODkyLWI5MDgtNWRjMGYyNThjNjI2Il0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiR1U1aVd2VHlraHVZUWtRSklqZktGdyIsImV4cCI6MTUyOTc1NDc2OSwiaWF0IjoxNTI5NzUxMTY5LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJmMTM0ODQ4Zi0wYWZiLTRhMTgtOTE3MC1jNjg5N2ViMTdmYzkiLCJub25jZSI6IkRIQVlLZk5YWjdBWUZ3eDciLCJyYXQiOjE1Mjk3NTExNjYsInN1YiI6ImZvb0BiYXIuY29tIn0.i1pNgZ_sn78hVXE14N41jpJEN4DPr45-fJtbFGq1rAhBF1bHr_GKP6YsISCLqIPfgwQnZkj3jyML-ug9Ia_vbsvgFosryjqQ-uAVnC3M-ngFemyq_GJuvvcK7e8BvmFHBtOfT3V5QCQffEtytk-Zwbhj1xtDdDA9csZUkjLdpXaFv6MJ6sz6ZTNsFfFfv-WkGGrQAmhkrBOQ9JWvgOWn0ao2KhLNFHVVCz5KOsX8pUFmYem0oJT-30rKqot5MJ6rgurXVRTow-9JPJHa-qIr_dfVJpuXdQBgbsT5jJI83aglw1D1-tmJK502N3vXAhj6ECbPXSFeqAhS2v-oLvIHb2vyEIkdjBVBUZVBYn11zaqsDisAa2UajGBVZQZGxnPbHigj7Q_KEOJ9ystemzkog1tkPDCW9g3ufjZSSAx0IHQS2vL_oIIX40IWpHQRHVpniULgxU8z6gyDEW9xJs7oL7jnkhCZFRASIIMabKeu82Iyq4tSw8WYWMhsyzzY-oC8FJhYnnOmcohjeOIHhOG-CYBPXYRVp9YG-4lu1TuUTmsfK9ROlrr1zLY-Ph77tsm_7FcuZSbLcB5bzN4J1jSAu3-MXQOWhL7WYuxBNc2a_yZlHmObtm3QaMq6QgtV92h-9xPgzT8RH-tXehxDOAJPL7ue-namsZtuD1RIz1S7qfE&state=cHplUcn5U2bqlgsd
2.899 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYTVmNWVlMjgtMTc3ZS00ODkyLWI5MDgtNWRjMGYyNThjNjI2Il0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiR1U1aVd2VHlraHVZUWtRSklqZktGdyIsImV4cCI6MTUyOTc1NDc2OSwiaWF0IjoxNTI5NzUxMTY5LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJmMTM0ODQ4Zi0wYWZiLTRhMTgtOTE3MC1jNjg5N2ViMTdmYzkiLCJub25jZSI6IkRIQVlLZk5YWjdBWUZ3eDciLCJyYXQiOjE1Mjk3NTExNjYsInN1YiI6ImZvb0BiYXIuY29tIn0.i1pNgZ_sn78hVXE14N41jpJEN4DPr45-fJtbFGq1rAhBF1bHr_GKP6YsISCLqIPfgwQnZkj3jyML-ug9Ia_vbsvgFosryjqQ-uAVnC3M-ngFemyq_GJuvvcK7e8BvmFHBtOfT3V5QCQffEtytk-Zwbhj1xtDdDA9csZUkjLdpXaFv6MJ6sz6ZTNsFfFfv-WkGGrQAmhkrBOQ9JWvgOWn0ao2KhLNFHVVCz5KOsX8pUFmYem0oJT-30rKqot5MJ6rgurXVRTow-9JPJHa-qIr_dfVJpuXdQBgbsT5jJI83aglw1D1-tmJK502N3vXAhj6ECbPXSFeqAhS2v-oLvIHb2vyEIkdjBVBUZVBYn11zaqsDisAa2UajGBVZQZGxnPbHigj7Q_KEOJ9ystemzkog1tkPDCW9g3ufjZSSAx0IHQS2vL_oIIX40IWpHQRHVpniULgxU8z6gyDEW9xJs7oL7jnkhCZFRASIIMabKeu82Iyq4tSw8WYWMhsyzzY-oC8FJhYnnOmcohjeOIHhOG-CYBPXYRVp9YG-4lu1TuUTmsfK9ROlrr1zLY-Ph77tsm_7FcuZSbLcB5bzN4J1jSAu3-MXQOWhL7WYuxBNc2a_yZlHmObtm3QaMq6QgtV92h-9xPgzT8RH-tXehxDOAJPL7ue-namsZtuD1RIz1S7qfE', 'state': 'cHplUcn5U2bqlgsd', 'code': 'lWRqMGRjwbA__qQKD4LU2obJI5-PL5td76XqfQ9o0K4.RpH7yngXawDRTfXo6wH4GxJOov5SrxswshipOAoNfcM'}
2.978 AuthorizationResponse {
"code": "lWRqMGRjwbA__qQKD4LU2obJI5-PL5td76XqfQ9o0K4.RpH7yngXawDRTfXo6wH4GxJOov5SrxswshipOAoNfcM",
"id_token": {
"aud": [
"a5f5ee28-177e-4892-b908-5dc0f258c626"
],
"auth_time": 1529750975,
"c_hash": "GU5iWvTykhuYQkQJIjfKFw",
"exp": 1529754769,
"iat": 1529751169,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "f134848f-0afb-4a18-9170-c6897eb17fc9",
"nonce": "DHAYKfNXZ7AYFwx7",
"rat": 1529751166,
"sub": "[email protected]"
},
"state": "cHplUcn5U2bqlgsd"
}
2.978 phase <--<-- 4 --- AccessToken -->-->
2.978 --> request op_args: {'state': 'cHplUcn5U2bqlgsd'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.978 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'cHplUcn5U2bqlgsd', 'code': 'lWRqMGRjwbA__qQKD4LU2obJI5-PL5td76XqfQ9o0K4.RpH7yngXawDRTfXo6wH4GxJOov5SrxswshipOAoNfcM', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'a5f5ee28-177e-4892-b908-5dc0f258c626'}, 'state': 'cHplUcn5U2bqlgsd'}
2.978 AccessTokenRequest {
"code": "lWRqMGRjwbA__qQKD4LU2obJI5-PL5td76XqfQ9o0K4.RpH7yngXawDRTfXo6wH4GxJOov5SrxswshipOAoNfcM",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "cHplUcn5U2bqlgsd"
}
2.979 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.979 request_http_args {'headers': {'Authorization': 'Basic YTVmNWVlMjgtMTc3ZS00ODkyLWI5MDgtNWRjMGYyNThjNjI2OjVoQ3JGbm9KSWZJSw==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.979 request code=lWRqMGRjwbA__qQKD4LU2obJI5-PL5td76XqfQ9o0K4.RpH7yngXawDRTfXo6wH4GxJOov5SrxswshipOAoNfcM&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=cHplUcn5U2bqlgsd
3.189 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.19 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYTVmNWVlMjgtMTc3ZS00ODkyLWI5MDgtNWRjMGYyNThjNjI2Il0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiR1U1aVd2VHlraHVZUWtRSklqZktGdyIsImV4cCI6MTUyOTc1NDc2OSwiaWF0IjoxNTI5NzUxMTY5LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI1M2IxMmU0Yi1kNWEwLTRkYzItOGExYi1mMjM1OTZiYjE3ZTUiLCJub25jZSI6IkRIQVlLZk5YWjdBWUZ3eDciLCJyYXQiOjE1Mjk3NTExNjYsInN1YiI6ImZvb0BiYXIuY29tIn0.Mw3wpO_qv1IPqoiCQdR0oFEoXc9puGvs3MTK-pLXMAYML0EXwFujYpZ6uvQxteS2YYb1lXdOV8fmX2a8mCCHhEKhs5JYKMC7lSG9rdQvr3xFv8Ir4xAX9liJHJlmbY3Tgue5CBv3cuMDDbG5lj-o9z7Gxw6oPskqd49FFtHhe31wWbqkBpXWl6-v8pgdKClBZPLZuMGc6HcE8ekZ2BX-3Ojv9PFDVzFZDdRQpIFtEmmkx_k1QtuP7f2MhW5AHfHLYDvjHP7lh2IeI4jPuAaDf9BV5nHWR6pdQAL4OmOrz8_6gHP_IVI9xc24PLTbs_FrNy8vW2tpkDk9b_gipCQ1xivEKB5oiD0-gpdvG-o8hYvVqO-cX9g6jFb7fCoexZvyE40fIVPuoEcnnEYZi4184w7ubB6tKcTy1HZlfu15DkW5ZSobTpmhtjZWDvW8CxbDlmIBvlBNyfz6Qij-ppcf203CUHoQ4cFCY2x-bCzHvxn3ufP_kPFghTdjHB3fwL6QFdQCI9GENXrP8m1Tl8Enps18NZ4g1dxyevHA7gQTgJPVHwB_dqp43M6vU5ldvb7uEHF7jZoo3WU5-0GQjfkFi205Gk0EA97QwzqI5g8SmmGhMeJMBn8u_pPDa9F5hbIHxd9M6ORHSJozInCmJsulSyId6l_bbMIRXfQXBhFxXOw', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'DQzQkdEQQpDvsiizrN1Zd0jFQL4EOSsaRhArfo3B0CY.tAm3G_xHLupgXFWlMjm9nHkkoLmYT-wLPoBW6-rs56U', 'scope': 'openid'}
3.193 AccessTokenResponse {
"access_token": "DQzQkdEQQpDvsiizrN1Zd0jFQL4EOSsaRhArfo3B0CY.tAm3G_xHLupgXFWlMjm9nHkkoLmYT-wLPoBW6-rs56U",
"expires_in": 3599,
"id_token": {
"aud": [
"a5f5ee28-177e-4892-b908-5dc0f258c626"
],
"auth_time": 1529750975,
"c_hash": "GU5iWvTykhuYQkQJIjfKFw",
"exp": 1529754769,
"iat": 1529751169,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "53b12e4b-d5a0-4dc2-8a1b-f23596bb17e5",
"nonce": "DHAYKfNXZ7AYFwx7",
"rat": 1529751166,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.193 phase <--<-- 5 --- UserInfo -->-->
3.194 do_user_info_request kwargs:{'state': 'cHplUcn5U2bqlgsd', 'method': 'GET', 'authn_method': 'bearer_header'}
3.194 request {'body': None}
3.194 request_url https://oidc-certification.ory.sh:8443/userinfo
3.194 request_http_args {'headers': {'Authorization': 'Bearer DQzQkdEQQpDvsiizrN1Zd0jFQL4EOSsaRhArfo3B0CY.tAm3G_xHLupgXFWlMjm9nHkkoLmYT-wLPoBW6-rs56U'}}
3.289 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
3.29 OpenIDSchema {
"sub": "[email protected]"
}
3.29 OpenIDSchema {
"sub": "[email protected]"
}
3.29 phase <--<-- 6 --- Done -->-->
3.29 end
3.291 assertion VerifyResponse
3.291 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.291 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Req-id_token_hint.txt 0000644 0000000 0000000 00000057245 13313423515 015606 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-id_token_hint
Test description: Using prompt=none with user hint through id_token_hint
Timestamp: 2018-06-23T10:56:13Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.075 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.076 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.076 phase <--<-- 2 --- Registration -->-->
0.076 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.076 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#yrnfli01GaFMJl6E"
],
"response_types": [
"code id_token"
]
}
0.242 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.243 RegistrationResponse {
"client_id": "15642923-27b2-4d31-a224-ab6b32f4b0ba",
"client_secret": "xWN.dHu6.1J8",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "15642923-27b2-4d31-a224-ab6b32f4b0ba",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#yrnfli01GaFMJl6E"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.243 phase <--<-- 3 --- AsyncAuthn -->-->
0.244 AuthorizationRequest {
"client_id": "15642923-27b2-4d31-a224-ab6b32f4b0ba",
"nonce": "LkPfAt7CxsvuaFKU",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "RnrMdXJhCMHv6zJL"
}
0.244 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=15642923-27b2-4d31-a224-ab6b32f4b0ba&state=RnrMdXJhCMHv6zJL&response_type=code+id_token&nonce=LkPfAt7CxsvuaFKU
0.244 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=15642923-27b2-4d31-a224-ab6b32f4b0ba&state=RnrMdXJhCMHv6zJL&response_type=code+id_token&nonce=LkPfAt7CxsvuaFKU
3.907 http args {}
4.116 response URL with fragment
4.116 response code=HHLJcnI6O_1WLnfeN-XGnGjtik5rNiJt4W5yBsbtg4Q.zit8mOXOLIrENCVGC8QOpb-RFwNfPbJanYBuqZxzXSI&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMTU2NDI5MjMtMjdiMi00ZDMxLWEyMjQtYWI2YjMyZjRiMGJhIl0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiMDU3Tl9XdkpNRFhmWGdvcVNUR2hxUSIsImV4cCI6MTUyOTc1NDk3MCwiaWF0IjoxNTI5NzUxMzcwLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI4ZTMyODZlYi0wOWVhLTQ1ODQtYmJkNC1kYjQzZGFhZWNhZjQiLCJub25jZSI6IkxrUGZBdDdDeHN2dWFGS1UiLCJyYXQiOjE1Mjk3NTEzNjcsInN1YiI6ImZvb0BiYXIuY29tIn0.vsngnkTpDZ3iyCqlVb4wtlqZkpzq-hECStHpT-vy0r3XkL0HTCt23rR7o0iwJabaHb1Ibx8O3y4msLkTbLivhB0bHhZwfZshXuDicTZQzlyfYB6aVUkUgdRaI-xWRSXgbDvD0eU5MQtLPV_Do2E48jf7mWBrzeBIjShAkSMgG5gw_2cCa7TedLTOyvmEi1_1KGZ5O33U691RoOK93eB9TyLduMXqmKPD8-FZNDtYYxP3Br8l-weuiQNMDKylliS04buqBl8eOOm32NwElYal8F1s5VC-Rq0FG5pAEupmqnipESF0exYTlUybynbXPaHpQAMUNwR_wFfL34rnOvP9BNFwugqpj_Xefkm5YSjoHYgeDOoV9FQj52RsnngJwx4K_PBnij9L359syg9YO6P3PzvNOUZUgYbcublhwfzeCcrsO-zDJSH_M9N3FmW3EqmNE2BbWc0KgUtTpEgVh0lkH8bzUe_WNWFI6EPKh8HimHrcwamna8cCjJbMSfWKw2LHdfeyxvm71QKwz5MaeCYN8shhdlENSWdEJPEDIH24XMjMyHE9VybP0BesnkVpmccS8hKFUVWpS4r89GVcJ8mAkKzSpIxtpVEgamHQgkhMGV7JfmDUibGL8XULvVzmGMEtY5toKzvO2TieXLuTKwicQuISY1sf42JuQjgatUtRdQE&state=RnrMdXJhCMHv6zJL
4.117 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMTU2NDI5MjMtMjdiMi00ZDMxLWEyMjQtYWI2YjMyZjRiMGJhIl0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiMDU3Tl9XdkpNRFhmWGdvcVNUR2hxUSIsImV4cCI6MTUyOTc1NDk3MCwiaWF0IjoxNTI5NzUxMzcwLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI4ZTMyODZlYi0wOWVhLTQ1ODQtYmJkNC1kYjQzZGFhZWNhZjQiLCJub25jZSI6IkxrUGZBdDdDeHN2dWFGS1UiLCJyYXQiOjE1Mjk3NTEzNjcsInN1YiI6ImZvb0BiYXIuY29tIn0.vsngnkTpDZ3iyCqlVb4wtlqZkpzq-hECStHpT-vy0r3XkL0HTCt23rR7o0iwJabaHb1Ibx8O3y4msLkTbLivhB0bHhZwfZshXuDicTZQzlyfYB6aVUkUgdRaI-xWRSXgbDvD0eU5MQtLPV_Do2E48jf7mWBrzeBIjShAkSMgG5gw_2cCa7TedLTOyvmEi1_1KGZ5O33U691RoOK93eB9TyLduMXqmKPD8-FZNDtYYxP3Br8l-weuiQNMDKylliS04buqBl8eOOm32NwElYal8F1s5VC-Rq0FG5pAEupmqnipESF0exYTlUybynbXPaHpQAMUNwR_wFfL34rnOvP9BNFwugqpj_Xefkm5YSjoHYgeDOoV9FQj52RsnngJwx4K_PBnij9L359syg9YO6P3PzvNOUZUgYbcublhwfzeCcrsO-zDJSH_M9N3FmW3EqmNE2BbWc0KgUtTpEgVh0lkH8bzUe_WNWFI6EPKh8HimHrcwamna8cCjJbMSfWKw2LHdfeyxvm71QKwz5MaeCYN8shhdlENSWdEJPEDIH24XMjMyHE9VybP0BesnkVpmccS8hKFUVWpS4r89GVcJ8mAkKzSpIxtpVEgamHQgkhMGV7JfmDUibGL8XULvVzmGMEtY5toKzvO2TieXLuTKwicQuISY1sf42JuQjgatUtRdQE', 'state': 'RnrMdXJhCMHv6zJL', 'code': 'HHLJcnI6O_1WLnfeN-XGnGjtik5rNiJt4W5yBsbtg4Q.zit8mOXOLIrENCVGC8QOpb-RFwNfPbJanYBuqZxzXSI'}
4.197 AuthorizationResponse {
"code": "HHLJcnI6O_1WLnfeN-XGnGjtik5rNiJt4W5yBsbtg4Q.zit8mOXOLIrENCVGC8QOpb-RFwNfPbJanYBuqZxzXSI",
"id_token": {
"aud": [
"15642923-27b2-4d31-a224-ab6b32f4b0ba"
],
"auth_time": 1529751224,
"c_hash": "057N_WvJMDXfXgoqSTGhqQ",
"exp": 1529754970,
"iat": 1529751370,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "8e3286eb-09ea-4584-bbd4-db43daaecaf4",
"nonce": "LkPfAt7CxsvuaFKU",
"rat": 1529751367,
"sub": "[email protected]"
},
"state": "RnrMdXJhCMHv6zJL"
}
4.197 phase <--<-- 4 --- AccessToken -->-->
4.197 --> request op_args: {'state': 'RnrMdXJhCMHv6zJL'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
4.197 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'RnrMdXJhCMHv6zJL', 'code': 'HHLJcnI6O_1WLnfeN-XGnGjtik5rNiJt4W5yBsbtg4Q.zit8mOXOLIrENCVGC8QOpb-RFwNfPbJanYBuqZxzXSI', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '15642923-27b2-4d31-a224-ab6b32f4b0ba'}, 'state': 'RnrMdXJhCMHv6zJL'}
4.197 AccessTokenRequest {
"code": "HHLJcnI6O_1WLnfeN-XGnGjtik5rNiJt4W5yBsbtg4Q.zit8mOXOLIrENCVGC8QOpb-RFwNfPbJanYBuqZxzXSI",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "RnrMdXJhCMHv6zJL"
}
4.197 request_url https://oidc-certification.ory.sh:8443/oauth2/token
4.197 request_http_args {'headers': {'Authorization': 'Basic MTU2NDI5MjMtMjdiMi00ZDMxLWEyMjQtYWI2YjMyZjRiMGJhOnhXTi5kSHU2LjFKOA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
4.197 request code=HHLJcnI6O_1WLnfeN-XGnGjtik5rNiJt4W5yBsbtg4Q.zit8mOXOLIrENCVGC8QOpb-RFwNfPbJanYBuqZxzXSI&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=RnrMdXJhCMHv6zJL
4.846 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
4.847 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMTU2NDI5MjMtMjdiMi00ZDMxLWEyMjQtYWI2YjMyZjRiMGJhIl0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiMDU3Tl9XdkpNRFhmWGdvcVNUR2hxUSIsImV4cCI6MTUyOTc1NDk3MCwiaWF0IjoxNTI5NzUxMzcxLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJhNDg3YjMwMC1mMDFkLTQ0NDAtOGNhYS03ZDU4ZGIxZDRhZGIiLCJub25jZSI6IkxrUGZBdDdDeHN2dWFGS1UiLCJyYXQiOjE1Mjk3NTEzNjcsInN1YiI6ImZvb0BiYXIuY29tIn0.zlGpK6xyHtI6ez9M_xHlba9mrMr7BvKEkcjgyXh6K8eQKO5MrwF9KuH6L1fGwYEQOX0ebjij3GZyUVjWVL8a0oSDSXnd0go7PzAQIEf04Ec7Bm9BI9s4sOcE08tJkL0Bk1aXtLvcrjbP9lVRX_DHiZCeK25gMZ-1iIfJU-42E_8zzIKIBCDBnobRiYGUUPRkc78xwsIDi0_6s57g6RFZCPtuM0mcqWc51O8XmPgciDnAeiOfAY5BW1hamp0yWJjuvI0HgQ2sYlDQtB9lI0YbDlT1SqZYveco0rdhQUg0K8ZtqHN7Yn658Oz4Wk8ecKQCxiW23ij_qyYSFCWRAcf_zLtgcvWxFlfDhsdy3RAm2jQWHJDdvAnKKKUjUNBqNcDxsGMNyA75KgqNaPADzNkONE69tPYUs21ZAGI-FbBa-AOB5vFRa75Ie4mDF1xFePpD0qYp8Y8yw3utUuaMsylxylzlTufw1WmBvDwrrUXfm5Y_seWbovKJnutwK99_HkhRvATUKGcJ-bC4aVhoWMpC6Hgtm8PPFTb5pd5qMPhKBOvNuXnVW9yicuZavt84589zvLbpi6Thdth1mgDoOtg1bvE-OxrSaguk6MQ3DUl6g-QnEgIsT5J70axU-3v0KQwOaqrP2JeJGX7vKdfYb3m68l9sIEMm6CvG9Yl6LYxxG2c', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'J2FbFX_NmPdTQAv362pxm85O0Z351OfE9Yg1ol04oAs.qduNhhGzoEoQIdKzmozja6wQ2v3pIRopDs0E95HOjvo', 'scope': 'openid'}
4.85 AccessTokenResponse {
"access_token": "J2FbFX_NmPdTQAv362pxm85O0Z351OfE9Yg1ol04oAs.qduNhhGzoEoQIdKzmozja6wQ2v3pIRopDs0E95HOjvo",
"expires_in": 3599,
"id_token": {
"aud": [
"15642923-27b2-4d31-a224-ab6b32f4b0ba"
],
"auth_time": 1529751224,
"c_hash": "057N_WvJMDXfXgoqSTGhqQ",
"exp": 1529754970,
"iat": 1529751371,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "a487b300-f01d-4440-8caa-7d58db1d4adb",
"nonce": "LkPfAt7CxsvuaFKU",
"rat": 1529751367,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
4.85 phase <--<-- 5 --- AsyncAuthn -->-->
4.851 AuthorizationRequest {
"client_id": "15642923-27b2-4d31-a224-ab6b32f4b0ba",
"id_token_hint": "eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMTU2NDI5MjMtMjdiMi00ZDMxLWEyMjQtYWI2YjMyZjRiMGJhIl0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiMDU3Tl9XdkpNRFhmWGdvcVNUR2hxUSIsImV4cCI6MTUyOTc1NDk3MCwiaWF0IjoxNTI5NzUxMzcwLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI4ZTMyODZlYi0wOWVhLTQ1ODQtYmJkNC1kYjQzZGFhZWNhZjQiLCJub25jZSI6IkxrUGZBdDdDeHN2dWFGS1UiLCJyYXQiOjE1Mjk3NTEzNjcsInN1YiI6ImZvb0BiYXIuY29tIn0.vsngnkTpDZ3iyCqlVb4wtlqZkpzq-hECStHpT-vy0r3XkL0HTCt23rR7o0iwJabaHb1Ibx8O3y4msLkTbLivhB0bHhZwfZshXuDicTZQzlyfYB6aVUkUgdRaI-xWRSXgbDvD0eU5MQtLPV_Do2E48jf7mWBrzeBIjShAkSMgG5gw_2cCa7TedLTOyvmEi1_1KGZ5O33U691RoOK93eB9TyLduMXqmKPD8-FZNDtYYxP3Br8l-weuiQNMDKylliS04buqBl8eOOm32NwElYal8F1s5VC-Rq0FG5pAEupmqnipESF0exYTlUybynbXPaHpQAMUNwR_wFfL34rnOvP9BNFwugqpj_Xefkm5YSjoHYgeDOoV9FQj52RsnngJwx4K_PBnij9L359syg9YO6P3PzvNOUZUgYbcublhwfzeCcrsO-zDJSH_M9N3FmW3EqmNE2BbWc0KgUtTpEgVh0lkH8bzUe_WNWFI6EPKh8HimHrcwamna8cCjJbMSfWKw2LHdfeyxvm71QKwz5MaeCYN8shhdlENSWdEJPEDIH24XMjMyHE9VybP0BesnkVpmccS8hKFUVWpS4r89GVcJ8mAkKzSpIxtpVEgamHQgkhMGV7JfmDUibGL8XULvVzmGMEtY5toKzvO2TieXLuTKwicQuISY1sf42JuQjgatUtRdQE",
"nonce": "mUrJ09Kb66oqlSbJ",
"prompt": [
"none"
],
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "QvvHtGVIggdmK40U"
}
4.851 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=15642923-27b2-4d31-a224-ab6b32f4b0ba&state=QvvHtGVIggdmK40U&id_token_hint=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMTU2NDI5MjMtMjdiMi00ZDMxLWEyMjQtYWI2YjMyZjRiMGJhIl0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiMDU3Tl9XdkpNRFhmWGdvcVNUR2hxUSIsImV4cCI6MTUyOTc1NDk3MCwiaWF0IjoxNTI5NzUxMzcwLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI4ZTMyODZlYi0wOWVhLTQ1ODQtYmJkNC1kYjQzZGFhZWNhZjQiLCJub25jZSI6IkxrUGZBdDdDeHN2dWFGS1UiLCJyYXQiOjE1Mjk3NTEzNjcsInN1YiI6ImZvb0BiYXIuY29tIn0.vsngnkTpDZ3iyCqlVb4wtlqZkpzq-hECStHpT-vy0r3XkL0HTCt23rR7o0iwJabaHb1Ibx8O3y4msLkTbLivhB0bHhZwfZshXuDicTZQzlyfYB6aVUkUgdRaI-xWRSXgbDvD0eU5MQtLPV_Do2E48jf7mWBrzeBIjShAkSMgG5gw_2cCa7TedLTOyvmEi1_1KGZ5O33U691RoOK93eB9TyLduMXqmKPD8-FZNDtYYxP3Br8l-weuiQNMDKylliS04buqBl8eOOm32NwElYal8F1s5VC-Rq0FG5pAEupmqnipESF0exYTlUybynbXPaHpQAMUNwR_wFfL34rnOvP9BNFwugqpj_Xefkm5YSjoHYgeDOoV9FQj52RsnngJwx4K_PBnij9L359syg9YO6P3PzvNOUZUgYbcublhwfzeCcrsO-zDJSH_M9N3FmW3EqmNE2BbWc0KgUtTpEgVh0lkH8bzUe_WNWFI6EPKh8HimHrcwamna8cCjJbMSfWKw2LHdfeyxvm71QKwz5MaeCYN8shhdlENSWdEJPEDIH24XMjMyHE9VybP0BesnkVpmccS8hKFUVWpS4r89GVcJ8mAkKzSpIxtpVEgamHQgkhMGV7JfmDUibGL8XULvVzmGMEtY5toKzvO2TieXLuTKwicQuISY1sf42JuQjgatUtRdQE&response_type=code+id_token&nonce=mUrJ09Kb66oqlSbJ
4.851 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=15642923-27b2-4d31-a224-ab6b32f4b0ba&state=QvvHtGVIggdmK40U&id_token_hint=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMTU2NDI5MjMtMjdiMi00ZDMxLWEyMjQtYWI2YjMyZjRiMGJhIl0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiMDU3Tl9XdkpNRFhmWGdvcVNUR2hxUSIsImV4cCI6MTUyOTc1NDk3MCwiaWF0IjoxNTI5NzUxMzcwLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI4ZTMyODZlYi0wOWVhLTQ1ODQtYmJkNC1kYjQzZGFhZWNhZjQiLCJub25jZSI6IkxrUGZBdDdDeHN2dWFGS1UiLCJyYXQiOjE1Mjk3NTEzNjcsInN1YiI6ImZvb0BiYXIuY29tIn0.vsngnkTpDZ3iyCqlVb4wtlqZkpzq-hECStHpT-vy0r3XkL0HTCt23rR7o0iwJabaHb1Ibx8O3y4msLkTbLivhB0bHhZwfZshXuDicTZQzlyfYB6aVUkUgdRaI-xWRSXgbDvD0eU5MQtLPV_Do2E48jf7mWBrzeBIjShAkSMgG5gw_2cCa7TedLTOyvmEi1_1KGZ5O33U691RoOK93eB9TyLduMXqmKPD8-FZNDtYYxP3Br8l-weuiQNMDKylliS04buqBl8eOOm32NwElYal8F1s5VC-Rq0FG5pAEupmqnipESF0exYTlUybynbXPaHpQAMUNwR_wFfL34rnOvP9BNFwugqpj_Xefkm5YSjoHYgeDOoV9FQj52RsnngJwx4K_PBnij9L359syg9YO6P3PzvNOUZUgYbcublhwfzeCcrsO-zDJSH_M9N3FmW3EqmNE2BbWc0KgUtTpEgVh0lkH8bzUe_WNWFI6EPKh8HimHrcwamna8cCjJbMSfWKw2LHdfeyxvm71QKwz5MaeCYN8shhdlENSWdEJPEDIH24XMjMyHE9VybP0BesnkVpmccS8hKFUVWpS4r89GVcJ8mAkKzSpIxtpVEgamHQgkhMGV7JfmDUibGL8XULvVzmGMEtY5toKzvO2TieXLuTKwicQuISY1sf42JuQjgatUtRdQE&response_type=code+id_token&nonce=mUrJ09Kb66oqlSbJ
5.995 http args {}
6.184 response URL with fragment
6.185 response code=_tGpBnhdQ367pnOJGwQuAI0VnyBmxm3RFvLDJGXFQJU.dWs0pgdOFmgmRtmkdx_ml6NXbJ1O_GAuyjzTUESpY6c&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMTU2NDI5MjMtMjdiMi00ZDMxLWEyMjQtYWI2YjMyZjRiMGJhIl0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiTTlUcHc1UzhjR21hTkRXb0F6b05ZQSIsImV4cCI6MTUyOTc1NDk3MiwiaWF0IjoxNTI5NzUxMzcyLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiIwMGJiNWRiNi1jODRhLTRiNWUtYjc3Yi00YmIyZmUxYzkyODMiLCJub25jZSI6Im1VckowOUtiNjZvcWxTYkoiLCJyYXQiOjE1Mjk3NTEzNzEsInN1YiI6ImZvb0BiYXIuY29tIn0.1gvKldXG3lM0-T8B4BXaq3cd_C-92nd_csMx7BuCJMkDxephP4nr8OXQxI7tt57DHqFN0YctuISJitWayw90c7Tx9YXMA6PjUeanp8u9DovekgjzLIsve1eGGKSe4l-9hnrpPW-xybi_V97ZfB-xec-qQQQz9H22LZ96afzLczANeZ86WZklSk3HB5sUolJcUlvntsn2TwvgAg47oTPI0GpfaRCPOzXZb25OMaqQvO7HC1CYOVv0bP_l74Wp79VrR7WBo3mIpntdRc-wZzB_dvPvGusk74tfse8a71xVUGqwUQglzUbVNTb6LXsQ-tlccVeP1lg_2bIiFzoWzsUnq38zvL18pjoUoChy4NJtMk4t055orNuCVeyJfRm0l5h24jDELxl1c20XvniSXckwL2qmiaCJTk1KlsPtUKdkV_NWsXhfUBpQdQOW5fZ7B4dLLQKs3S5d5y4ZpGvNr9ZrmmYLdo02-mfeKiqeWM1SuhhX9cTG6MAswz-SLLYlZnuLSYCCfz7vWk774YzPSM7qGGa13qWU6s9kMzoa2YETjRMViWl4xNCwnnHEyYIMoi7aNCRNgIQ5RHgSODXtAt7Gv5myMyHLHQSYoFSWVYCVNl-yWP1NvbIRrM0IAFE_leUBYmZkz8vY9JjTbT6MCuqnX8CSCqOj2vRsdonNDwlHPgU&state=QvvHtGVIggdmK40U
6.185 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMTU2NDI5MjMtMjdiMi00ZDMxLWEyMjQtYWI2YjMyZjRiMGJhIl0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiTTlUcHc1UzhjR21hTkRXb0F6b05ZQSIsImV4cCI6MTUyOTc1NDk3MiwiaWF0IjoxNTI5NzUxMzcyLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiIwMGJiNWRiNi1jODRhLTRiNWUtYjc3Yi00YmIyZmUxYzkyODMiLCJub25jZSI6Im1VckowOUtiNjZvcWxTYkoiLCJyYXQiOjE1Mjk3NTEzNzEsInN1YiI6ImZvb0BiYXIuY29tIn0.1gvKldXG3lM0-T8B4BXaq3cd_C-92nd_csMx7BuCJMkDxephP4nr8OXQxI7tt57DHqFN0YctuISJitWayw90c7Tx9YXMA6PjUeanp8u9DovekgjzLIsve1eGGKSe4l-9hnrpPW-xybi_V97ZfB-xec-qQQQz9H22LZ96afzLczANeZ86WZklSk3HB5sUolJcUlvntsn2TwvgAg47oTPI0GpfaRCPOzXZb25OMaqQvO7HC1CYOVv0bP_l74Wp79VrR7WBo3mIpntdRc-wZzB_dvPvGusk74tfse8a71xVUGqwUQglzUbVNTb6LXsQ-tlccVeP1lg_2bIiFzoWzsUnq38zvL18pjoUoChy4NJtMk4t055orNuCVeyJfRm0l5h24jDELxl1c20XvniSXckwL2qmiaCJTk1KlsPtUKdkV_NWsXhfUBpQdQOW5fZ7B4dLLQKs3S5d5y4ZpGvNr9ZrmmYLdo02-mfeKiqeWM1SuhhX9cTG6MAswz-SLLYlZnuLSYCCfz7vWk774YzPSM7qGGa13qWU6s9kMzoa2YETjRMViWl4xNCwnnHEyYIMoi7aNCRNgIQ5RHgSODXtAt7Gv5myMyHLHQSYoFSWVYCVNl-yWP1NvbIRrM0IAFE_leUBYmZkz8vY9JjTbT6MCuqnX8CSCqOj2vRsdonNDwlHPgU', 'state': 'QvvHtGVIggdmK40U', 'code': '_tGpBnhdQ367pnOJGwQuAI0VnyBmxm3RFvLDJGXFQJU.dWs0pgdOFmgmRtmkdx_ml6NXbJ1O_GAuyjzTUESpY6c'}
6.189 AuthorizationResponse {
"code": "_tGpBnhdQ367pnOJGwQuAI0VnyBmxm3RFvLDJGXFQJU.dWs0pgdOFmgmRtmkdx_ml6NXbJ1O_GAuyjzTUESpY6c",
"id_token": {
"aud": [
"15642923-27b2-4d31-a224-ab6b32f4b0ba"
],
"auth_time": 1529751224,
"c_hash": "M9Tpw5S8cGmaNDWoAzoNYA",
"exp": 1529754972,
"iat": 1529751372,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "00bb5db6-c84a-4b5e-b77b-4bb2fe1c9283",
"nonce": "mUrJ09Kb66oqlSbJ",
"rat": 1529751371,
"sub": "[email protected]"
},
"state": "QvvHtGVIggdmK40U"
}
6.189 phase <--<-- 6 --- AccessToken -->-->
6.189 --> request op_args: {'state': 'QvvHtGVIggdmK40U'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
6.189 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'QvvHtGVIggdmK40U', 'code': '_tGpBnhdQ367pnOJGwQuAI0VnyBmxm3RFvLDJGXFQJU.dWs0pgdOFmgmRtmkdx_ml6NXbJ1O_GAuyjzTUESpY6c', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '15642923-27b2-4d31-a224-ab6b32f4b0ba'}, 'state': 'QvvHtGVIggdmK40U'}
6.189 AccessTokenRequest {
"code": "_tGpBnhdQ367pnOJGwQuAI0VnyBmxm3RFvLDJGXFQJU.dWs0pgdOFmgmRtmkdx_ml6NXbJ1O_GAuyjzTUESpY6c",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "QvvHtGVIggdmK40U"
}
6.189 request_url https://oidc-certification.ory.sh:8443/oauth2/token
6.189 request_http_args {'headers': {'Authorization': 'Basic MTU2NDI5MjMtMjdiMi00ZDMxLWEyMjQtYWI2YjMyZjRiMGJhOnhXTi5kSHU2LjFKOA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
6.189 request code=_tGpBnhdQ367pnOJGwQuAI0VnyBmxm3RFvLDJGXFQJU.dWs0pgdOFmgmRtmkdx_ml6NXbJ1O_GAuyjzTUESpY6c&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=QvvHtGVIggdmK40U
6.477 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
6.478 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMTU2NDI5MjMtMjdiMi00ZDMxLWEyMjQtYWI2YjMyZjRiMGJhIl0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiTTlUcHc1UzhjR21hTkRXb0F6b05ZQSIsImV4cCI6MTUyOTc1NDk3MiwiaWF0IjoxNTI5NzUxMzczLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiIxNDdiZmJkYi0xNWE4LTQ4YTQtYmI0Ny02YTQyYWIxM2ZjN2UiLCJub25jZSI6Im1VckowOUtiNjZvcWxTYkoiLCJyYXQiOjE1Mjk3NTEzNzEsInN1YiI6ImZvb0BiYXIuY29tIn0.g6YdONzd9AlBEKUztNIxyaL0AvZF-GVC7xlBGecqqbaqWS4r_ZscK14JIxLK_8qKQm2BAi_PNNVo-aVjA5byndLGVTCUrL-bLPm-Rj_3jTGMaFBLGlBI0OVuAa6MYmhxSV9caPEZO1quHbC8HM0YujUG8PmAXG3mD4qnrknAKtTitBCQSdOzxn7zQ-TrO92rUHBhVCXNTGnHDrQ6ZT0uqkfdaarc9II4xLSk4zvIN_6UImIjolNa1HQ09QUoeVPVu8tqjwvkMPIoNAJBH0IcQhYJX3GWS3OK3HG990_xgFVw20U6oSCoRNRABtmzbSrY8b5pApq7UITdx1LPQdEammYNKF-U4TDlQBtzEEMKol8hWpZ0cwwY2-KM2J_hfeJ6_gHSP2TF022lPzGBXkzJxrEJ9fO_MiBF7H4Bduv-lzAH6tgiTDLwBCGHxaM8Rj4cFNMx4rtc4kgdPbJ9Yk7RvKznL_Yn-5hXQl5aJxadK1gWAECJdzG6PKTmGdmWR9HhHCFbfPyqi5dVAKoaL4bQPsytJVl_3QIRK9jElrWr9HaFS8zsn0sIYdMt5SI4f-1VNRXQ7N78JtrxXNig_gfSkPNz3VdY_1zddtdN8_Iad9cBLCnyOdXW7nc62qZmgu1Ys40Ti2xpHJ0jg4EqJTDmkQ3wOasjZC-NqYUllL4UpJ0', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'tUuF1kvIqKmy17FjWzgev5qCrZ6esg64x0Z6JhsykM8.rumBCnCEwZtshDZl6rFFBKR9rJpaJGg_vOfGfS3Y04k', 'scope': 'openid'}
6.481 AccessTokenResponse {
"access_token": "tUuF1kvIqKmy17FjWzgev5qCrZ6esg64x0Z6JhsykM8.rumBCnCEwZtshDZl6rFFBKR9rJpaJGg_vOfGfS3Y04k",
"expires_in": 3599,
"id_token": {
"aud": [
"15642923-27b2-4d31-a224-ab6b32f4b0ba"
],
"auth_time": 1529751224,
"c_hash": "M9Tpw5S8cGmaNDWoAzoNYA",
"exp": 1529754972,
"iat": 1529751373,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "147bfbdb-15a8-48a4-bb47-6a42ab13fc7e",
"nonce": "mUrJ09Kb66oqlSbJ",
"rat": 1529751371,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
6.481 phase <--<-- 7 --- Done -->-->
6.482 end
6.482 assertion VerifyResponse
6.482 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
6.482 assertion SameAuthn
6.482 condition same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
6.482 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Registration-tos_uri.txt 0000644 0000000 0000000 00000022330 13313423137 016362 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-tos_uri
Test description: Registration with tos_uri
Timestamp: 2018-06-23T10:52:15Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.352 phase <--<-- 1 --- Webfinger -->-->
1.352 not expected to do WebFinger
1.352 phase <--<-- 2 --- Discovery -->-->
1.352 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.424 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.426 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.426 phase <--<-- 3 --- Registration -->-->
1.426 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'tos_uri': 'https://op.certification.openid.net:61353/static/tos.html', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.426 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#aZtm9xtEV5apzxl1"
],
"response_types": [
"code id_token"
],
"tos_uri": "https://op.certification.openid.net:61353/static/tos.html"
}
1.584 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.585 RegistrationResponse {
"client_id": "88021b12-ac4e-47ff-9fc8-a6670c996ed1",
"client_secret": "zmfmYdwraFs_",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "88021b12-ac4e-47ff-9fc8-a6670c996ed1",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#aZtm9xtEV5apzxl1"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"tos_uri": "https://op.certification.openid.net:61353/static/tos.html",
"userinfo_signed_response_alg": "none"
}
1.585 phase <--<-- 4 --- AsyncAuthn -->-->
1.585 AuthorizationRequest {
"client_id": "88021b12-ac4e-47ff-9fc8-a6670c996ed1",
"nonce": "B0N2VczWBfDXvoJj",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "8eTcnI4kKE563a4A"
}
1.586 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=88021b12-ac4e-47ff-9fc8-a6670c996ed1&state=8eTcnI4kKE563a4A&response_type=code+id_token&nonce=B0N2VczWBfDXvoJj
1.586 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=88021b12-ac4e-47ff-9fc8-a6670c996ed1&state=8eTcnI4kKE563a4A&response_type=code+id_token&nonce=B0N2VczWBfDXvoJj
4.132 http args {}
4.3 response URL with fragment
4.301 response code=T2uY3i0uNaPym5I4_v3164RbsnVJJbtINn8U4OUMSHI.CoBFcWW4A8RDaf5Ia0ljBMRat-_lgao6A4I5i-RRlqI&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiODgwMjFiMTItYWM0ZS00N2ZmLTlmYzgtYTY2NzBjOTk2ZWQxIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoidjB4anR0MjFGM1c1bnVJeDlramEtdyIsImV4cCI6MTUyOTc1NDczNSwiaWF0IjoxNTI5NzUxMTM1LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI2YzEwYTM2YS1jNGM5LTQwNWMtYTE4MC02NGViNTg0NjhiMjEiLCJub25jZSI6IkIwTjJWY3pXQmZEWHZvSmoiLCJyYXQiOjE1Mjk3NTExMzMsInN1YiI6ImZvb0BiYXIuY29tIn0.zDFBwvahkXZvXr85WJQPlvssn8rkHLu3A2mm5BtXNlLagDAVJuRhosn1BOvolK5CagwBd4FPkYCLm_Kwfrg1UUfJXxy9xOrooRV6BppWOKlPlM6GSFSKn-0DpBmiFx_8dg_v3-J2WNEm8idJtHhOmR9JnGCKhsfP70leGyXEz6xEOBqNOjBA8EAWLjjzqHCMHKG1FPMuuaV1am6Uwu61xD5-XhesNHEbm4KHbbwclQ29dS1_yPrikwQV2Hp_VyGh97rDq-Ze3mXwiEHRY8tEspS7zfrbw7YCjOuiA36k7VOZ4f9_QwzufuwFeETVuWqIwnmgS0Ffq5LWK8rJ__kensZ6hqymokeVmzXSM4EIV-PJxM_iJ_z2LD-2-IWALOrsU0wHH6mLibx5O3JBnZfT34IUK-NoSq2NQ2BGzf8R7XlFXSZL1RwIZ0PtjZgi7nf69sGkYx4yR2FPxleiqyie-PYr1tAfQS4NLa4DND0Jx0yN_osz2ylyM-yJHlKeU2JPGAs1hQjX-02VToImZNHm8HiqMipnJ7vXfX2DIDqO4KS9Mu4ztG_MEchKbAix7uEjwzZcOSA-TNSqxiXcTfrzbPBlbgM2uDQuReUeQBHAX21iWhdwuGD7HDy5KWNc0BDhomuiNIy5f7oWopTlMTPpm6cVSrP2SY8O_bYkpl2avCE&state=8eTcnI4kKE563a4A
4.301 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiODgwMjFiMTItYWM0ZS00N2ZmLTlmYzgtYTY2NzBjOTk2ZWQxIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoidjB4anR0MjFGM1c1bnVJeDlramEtdyIsImV4cCI6MTUyOTc1NDczNSwiaWF0IjoxNTI5NzUxMTM1LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI2YzEwYTM2YS1jNGM5LTQwNWMtYTE4MC02NGViNTg0NjhiMjEiLCJub25jZSI6IkIwTjJWY3pXQmZEWHZvSmoiLCJyYXQiOjE1Mjk3NTExMzMsInN1YiI6ImZvb0BiYXIuY29tIn0.zDFBwvahkXZvXr85WJQPlvssn8rkHLu3A2mm5BtXNlLagDAVJuRhosn1BOvolK5CagwBd4FPkYCLm_Kwfrg1UUfJXxy9xOrooRV6BppWOKlPlM6GSFSKn-0DpBmiFx_8dg_v3-J2WNEm8idJtHhOmR9JnGCKhsfP70leGyXEz6xEOBqNOjBA8EAWLjjzqHCMHKG1FPMuuaV1am6Uwu61xD5-XhesNHEbm4KHbbwclQ29dS1_yPrikwQV2Hp_VyGh97rDq-Ze3mXwiEHRY8tEspS7zfrbw7YCjOuiA36k7VOZ4f9_QwzufuwFeETVuWqIwnmgS0Ffq5LWK8rJ__kensZ6hqymokeVmzXSM4EIV-PJxM_iJ_z2LD-2-IWALOrsU0wHH6mLibx5O3JBnZfT34IUK-NoSq2NQ2BGzf8R7XlFXSZL1RwIZ0PtjZgi7nf69sGkYx4yR2FPxleiqyie-PYr1tAfQS4NLa4DND0Jx0yN_osz2ylyM-yJHlKeU2JPGAs1hQjX-02VToImZNHm8HiqMipnJ7vXfX2DIDqO4KS9Mu4ztG_MEchKbAix7uEjwzZcOSA-TNSqxiXcTfrzbPBlbgM2uDQuReUeQBHAX21iWhdwuGD7HDy5KWNc0BDhomuiNIy5f7oWopTlMTPpm6cVSrP2SY8O_bYkpl2avCE', 'state': '8eTcnI4kKE563a4A', 'code': 'T2uY3i0uNaPym5I4_v3164RbsnVJJbtINn8U4OUMSHI.CoBFcWW4A8RDaf5Ia0ljBMRat-_lgao6A4I5i-RRlqI'}
4.415 AuthorizationResponse {
"code": "T2uY3i0uNaPym5I4_v3164RbsnVJJbtINn8U4OUMSHI.CoBFcWW4A8RDaf5Ia0ljBMRat-_lgao6A4I5i-RRlqI",
"id_token": {
"aud": [
"88021b12-ac4e-47ff-9fc8-a6670c996ed1"
],
"auth_time": 1529750975,
"c_hash": "v0xjtt21F3W5nuIx9kja-w",
"exp": 1529754735,
"iat": 1529751135,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "6c10a36a-c4c9-405c-a180-64eb58468b21",
"nonce": "B0N2VczWBfDXvoJj",
"rat": 1529751133,
"sub": "[email protected]"
},
"state": "8eTcnI4kKE563a4A"
}
4.415 phase <--<-- 5 --- Done -->-->
4.415 end
4.415 assertion VerifyAuthnResponse
4.416 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
4.416 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-prompt-none-NotLoggedIn.txt 0000644 0000000 0000000 00000015566 13313423322 016664 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-prompt-none-NotLoggedIn
Test description: Request with prompt=none when not logged in
Timestamp: 2018-06-23T10:54:10Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.97 phase <--<-- 1 --- Webfinger -->-->
1.97 not expected to do WebFinger
1.97 phase <--<-- 2 --- Discovery -->-->
1.97 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
2.045 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
2.046 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
2.046 phase <--<-- 3 --- Registration -->-->
2.047 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
2.047 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#I645FSXsLzn4BkKq"
],
"response_types": [
"code id_token"
]
}
2.202 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
2.203 RegistrationResponse {
"client_id": "c252b53f-ac61-4480-9b1a-ae2ac187c073",
"client_secret": "oqp9EEgDOLcA",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "c252b53f-ac61-4480-9b1a-ae2ac187c073",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#I645FSXsLzn4BkKq"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
2.203 phase <--<-- 4 --- AsyncAuthn -->-->
2.204 AuthorizationRequest {
"client_id": "c252b53f-ac61-4480-9b1a-ae2ac187c073",
"nonce": "pTsTDn5GTmVEQFnb",
"prompt": [
"none"
],
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "Pv8pr2aaYrlyoiuL"
}
2.204 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=c252b53f-ac61-4480-9b1a-ae2ac187c073&state=Pv8pr2aaYrlyoiuL&response_type=code+id_token&nonce=pTsTDn5GTmVEQFnb
2.204 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=c252b53f-ac61-4480-9b1a-ae2ac187c073&state=Pv8pr2aaYrlyoiuL&response_type=code+id_token&nonce=pTsTDn5GTmVEQFnb
2.659 http args {}
2.865 response URL with fragment
2.865 response error=login_required&error_debug=Prompt+%2522none%2522+was+requested%252C+but+no+existing+login+session+was+found&error_description=The+Authorization+Server+requires+End-User+authentication&state=Pv8pr2aaYrlyoiuL
2.865 response {'error_debug': 'Prompt %22none%22 was requested%2C but no existing login session was found', 'error_description': 'The Authorization Server requires End-User authentication', 'state': 'Pv8pr2aaYrlyoiuL', 'error': 'login_required'}
2.866 AuthorizationErrorResponse {
"error": "login_required",
"error_debug": "Prompt %22none%22 was requested%2C but no existing login session was found",
"error_description": "The Authorization Server requires End-User authentication",
"state": "Pv8pr2aaYrlyoiuL"
}
2.866 AuthorizationErrorResponse {
"error": "login_required",
"error_debug": "Prompt %22none%22 was requested%2C but no existing login session was found",
"error_description": "The Authorization Server requires End-User authentication",
"state": "Pv8pr2aaYrlyoiuL"
}
2.866 phase <--<-- 5 --- Done -->-->
2.866 end
2.866 assertion VerifyErrorMessage
2.866 condition verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
2.866 condition Done: status=OK
============================================================
Conditions
verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-request_uri-Unsigned.txt 0000644 0000000 0000000 00000023110 13313423434 016344 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-request_uri-Unsigned
Test description: Support request_uri request parameter with unsigned request
Timestamp: 2018-06-23T10:55:24Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.075 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.076 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.076 phase <--<-- 2 --- Registration -->-->
0.076 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'request_object_signing_alg': 'none'}
0.076 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "none",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#oWtpSthBZSPsjgkU"
],
"response_types": [
"code id_token"
]
}
0.244 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.245 RegistrationResponse {
"client_id": "82ff8c70-fe79-4e96-943e-f6790831e7f6",
"client_secret": "nKkXLwfmfAml",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "82ff8c70-fe79-4e96-943e-f6790831e7f6",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "none",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#oWtpSthBZSPsjgkU"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.245 phase <--<-- 3 --- AsyncAuthn -->-->
0.246 AuthorizationRequest {
"client_id": "82ff8c70-fe79-4e96-943e-f6790831e7f6",
"nonce": "VjHj18xEx7NbzOYG",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"request_uri": "https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#oWtpSthBZSPsjgkU",
"response_type": "code id_token",
"scope": "openid",
"state": "zmu5TYsGIIe83Enu"
}
0.246 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?request_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Frequests%2Fe3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9%23oWtpSthBZSPsjgkU&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=82ff8c70-fe79-4e96-943e-f6790831e7f6&state=zmu5TYsGIIe83Enu&response_type=code+id_token&nonce=VjHj18xEx7NbzOYG
0.246 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?request_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Frequests%2Fe3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9%23oWtpSthBZSPsjgkU&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=82ff8c70-fe79-4e96-943e-f6790831e7f6&state=zmu5TYsGIIe83Enu&response_type=code+id_token&nonce=VjHj18xEx7NbzOYG
2.928 http args {}
3.131 response URL with fragment
3.131 response code=EiS-oOSHEfXZ7eign5pgHwt5Le3bfIHRNMjNBR-o-2Y.LtvDfbYPmn09ZjkpGzil5BBxyrOrs4LD2G5P9UvuyQA&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiODJmZjhjNzAtZmU3OS00ZTk2LTk0M2UtZjY3OTA4MzFlN2Y2Il0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiaVpHRERQVmJhVEhZdHBFZHliMmpkUSIsImV4cCI6MTUyOTc1NDkyMywiaWF0IjoxNTI5NzUxMzIzLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJhZDAyMGZiMi0yNzgxLTQwYjAtOGMyMi0xZDI4ZDM4NmVmOTciLCJub25jZSI6IlZqSGoxOHhFeDdOYnpPWUciLCJyYXQiOjE1Mjk3NTEzMjEsInN1YiI6ImZvb0BiYXIuY29tIn0.NeVen2eJF06qgS2i8EqzxHh_N3Pz1R34T8KAoUzsKNbVY9yVnOddd27pHFjDKKV9O0fyol1oII7wHQ2cOXze7VovTH6qpFmuquAcQSDTf_AqsN3HP7HzC88lukCnCUNO6Csr1DIaY9gVdb8dZGRN9oB9SlgMBEX71ca1SEbGZMd63Ivw8rlnYr27ANuH6D_IwGT8VXu04bZdvo1Zhn5m3QQZYW8CrMzllctXyG1T2F8b_k8BcaSR-bw1Pv8EZ8G4SsPQpu0aeNzg7RwRilrQnbUyI3JKgH1Zrm9iXfoEr-COyave4A9FVVZhN-ZO5TaEyfwiEksN6PV-w7zzMuebRMcIIJ1YUfgYe7bGOzn1lHUi24UXy91hkBsiAdUARULBcye6dO8Oh_ldzRxYMQJYYWi1bT4ysj4lUdQKtjDi4WEmBRFbAOD2gttNKMH8WIW3r8okUYOPsIEVfNNmkMTvgOrSk8HfxSrOEFC7Y6K1zX4oanpGpk-KAbV078c5qaM33zDibtpcrYS1ztase7S9Q_zxq9zVFRaa0zfWq-xl2j7opWeWBbXms5SuNOB3PNrJHZ0ehXCRkGHGrTcPjQqdogSfThCP_C2hNBTLNDBNMZ2MXlnf-8c9O6xmzk4LjBcHYdsMJN8EkR98SVP1PbR9FswCpH_DjT72HJ3ZiCf-tPo&state=zmu5TYsGIIe83Enu
3.131 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiODJmZjhjNzAtZmU3OS00ZTk2LTk0M2UtZjY3OTA4MzFlN2Y2Il0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiaVpHRERQVmJhVEhZdHBFZHliMmpkUSIsImV4cCI6MTUyOTc1NDkyMywiaWF0IjoxNTI5NzUxMzIzLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJhZDAyMGZiMi0yNzgxLTQwYjAtOGMyMi0xZDI4ZDM4NmVmOTciLCJub25jZSI6IlZqSGoxOHhFeDdOYnpPWUciLCJyYXQiOjE1Mjk3NTEzMjEsInN1YiI6ImZvb0BiYXIuY29tIn0.NeVen2eJF06qgS2i8EqzxHh_N3Pz1R34T8KAoUzsKNbVY9yVnOddd27pHFjDKKV9O0fyol1oII7wHQ2cOXze7VovTH6qpFmuquAcQSDTf_AqsN3HP7HzC88lukCnCUNO6Csr1DIaY9gVdb8dZGRN9oB9SlgMBEX71ca1SEbGZMd63Ivw8rlnYr27ANuH6D_IwGT8VXu04bZdvo1Zhn5m3QQZYW8CrMzllctXyG1T2F8b_k8BcaSR-bw1Pv8EZ8G4SsPQpu0aeNzg7RwRilrQnbUyI3JKgH1Zrm9iXfoEr-COyave4A9FVVZhN-ZO5TaEyfwiEksN6PV-w7zzMuebRMcIIJ1YUfgYe7bGOzn1lHUi24UXy91hkBsiAdUARULBcye6dO8Oh_ldzRxYMQJYYWi1bT4ysj4lUdQKtjDi4WEmBRFbAOD2gttNKMH8WIW3r8okUYOPsIEVfNNmkMTvgOrSk8HfxSrOEFC7Y6K1zX4oanpGpk-KAbV078c5qaM33zDibtpcrYS1ztase7S9Q_zxq9zVFRaa0zfWq-xl2j7opWeWBbXms5SuNOB3PNrJHZ0ehXCRkGHGrTcPjQqdogSfThCP_C2hNBTLNDBNMZ2MXlnf-8c9O6xmzk4LjBcHYdsMJN8EkR98SVP1PbR9FswCpH_DjT72HJ3ZiCf-tPo', 'state': 'zmu5TYsGIIe83Enu', 'code': 'EiS-oOSHEfXZ7eign5pgHwt5Le3bfIHRNMjNBR-o-2Y.LtvDfbYPmn09ZjkpGzil5BBxyrOrs4LD2G5P9UvuyQA'}
3.209 AuthorizationResponse {
"code": "EiS-oOSHEfXZ7eign5pgHwt5Le3bfIHRNMjNBR-o-2Y.LtvDfbYPmn09ZjkpGzil5BBxyrOrs4LD2G5P9UvuyQA",
"id_token": {
"aud": [
"82ff8c70-fe79-4e96-943e-f6790831e7f6"
],
"auth_time": 1529751224,
"c_hash": "iZGDDPVbaTHYtpEdyb2jdQ",
"exp": 1529754923,
"iat": 1529751323,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "ad020fb2-2781-40b0-8c22-1d28d386ef97",
"nonce": "VjHj18xEx7NbzOYG",
"rat": 1529751321,
"sub": "[email protected]"
},
"state": "zmu5TYsGIIe83Enu"
}
3.209 phase <--<-- 4 --- Done -->-->
3.209 end
3.21 assertion VerifyResponse
3.21 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.21 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Req-acr_values.txt 0000644 0000000 0000000 00000031427 13313423477 015115 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-acr_values
Test description: Providing acr_values
Timestamp: 2018-06-23T10:55:59Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.074 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Registration -->-->
0.075 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.076 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#ZAXVRhKLUXgI6lq9"
],
"response_types": [
"code id_token"
]
}
0.267 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.268 RegistrationResponse {
"client_id": "498b5241-dead-47e1-a3d2-83e375ffe1ac",
"client_secret": "E6Plpb585M52",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "498b5241-dead-47e1-a3d2-83e375ffe1ac",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#ZAXVRhKLUXgI6lq9"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.268 phase <--<-- 3 --- AsyncAuthn -->-->
0.268 AuthorizationRequest {
"acr_values": "1 2",
"client_id": "498b5241-dead-47e1-a3d2-83e375ffe1ac",
"nonce": "B8L2ZZLxLOYAZtSG",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "RkZYzBGQ3bdBRyNR"
}
0.269 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=498b5241-dead-47e1-a3d2-83e375ffe1ac&state=RkZYzBGQ3bdBRyNR&acr_values=1+2&response_type=code+id_token&nonce=B8L2ZZLxLOYAZtSG
0.269 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=498b5241-dead-47e1-a3d2-83e375ffe1ac&state=RkZYzBGQ3bdBRyNR&acr_values=1+2&response_type=code+id_token&nonce=B8L2ZZLxLOYAZtSG
2.564 http args {}
2.734 response URL with fragment
2.734 response code=Xg7gOkhw73dyA9yneMLy2bHOoaeS-7uejD-Qrq-0phc.VDUwKYn-daDwUxsAUBJUlCNUAj7chOfi_XHFsqfTLBk&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhY3IiOiIwIiwiYXVkIjpbIjQ5OGI1MjQxLWRlYWQtNDdlMS1hM2QyLTgzZTM3NWZmZTFhYyJdLCJhdXRoX3RpbWUiOjE1Mjk3NTEyMjQsImNfaGFzaCI6IjBYMlZlelRhUDB5RXRxR3I4UXpXcFEiLCJleHAiOjE1Mjk3NTQ5NTgsImlhdCI6MTUyOTc1MTM1OCwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiY2ZhZDc3MjctM2QzMC00NTBlLWIyMWMtYjJjMGUyNmVkYTNhIiwibm9uY2UiOiJCOEwyWlpMeExPWUFadFNHIiwicmF0IjoxNTI5NzUxMzU2LCJzdWIiOiJmb29AYmFyLmNvbSJ9.eHnPFP9zOSLK7VmiBmaIyzEuCQeVY6IbgUxB8DlP8ub7iXQQWYR0pK4XlYMoYkNo8POz10tQa7-UqEoMn4i-vsdPOyccry_HyIgVToz-iB9igZPR7yIqXd9QdRq1i-7_XX67HIbnzqlZi57w9a3CnuHnL5ejB0WNfMP0ZbfLPzCAi6q7lygGXGQ9n0llzqbKIi63cVrJsv-zEzfZCk5dxyewSCFqjPtqL_u3wmvork8tSX9csrKWtxrf9j2CzbYclQmmNgejGMQD0t3f1jQhUhoRC5oXtd7DiWnajcjSa55EUb6DHCEIQJ_Vde1xVThawlXpcO9HH2JfMuU6ajkisNbmXRAS8H6KRqslzWlCcACInZbek8aDlIYOqMtbUmBQzQtOrKPrZmxrGDKUYkIVKuXOF_IvmE-Wt-eBAV0rerEChhxBREzNmD9hTP3N9GTtB0sn5dYSs88uZ221cGYqNwh4xTWwD17Y8QxW5AIBCl-Dfk-yBRgLDcFg7B3ou7mcuyJFPs_1CRD-pXZqlIDN3s05B-wpinJQRyzCZjxsf8SXnMmRBw7Hl5VUD28Gxf_mCI3xJ90M6PXHb5cvEvQyu4QDdOfKFf-7pDfBJkznBy0TS6sMdP3ZX8eJaTuiqwdwN5614OLGNqbiF3FXAznzTxyos--1ovt6AUAjEbbgULs&state=RkZYzBGQ3bdBRyNR
2.735 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhY3IiOiIwIiwiYXVkIjpbIjQ5OGI1MjQxLWRlYWQtNDdlMS1hM2QyLTgzZTM3NWZmZTFhYyJdLCJhdXRoX3RpbWUiOjE1Mjk3NTEyMjQsImNfaGFzaCI6IjBYMlZlelRhUDB5RXRxR3I4UXpXcFEiLCJleHAiOjE1Mjk3NTQ5NTgsImlhdCI6MTUyOTc1MTM1OCwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiY2ZhZDc3MjctM2QzMC00NTBlLWIyMWMtYjJjMGUyNmVkYTNhIiwibm9uY2UiOiJCOEwyWlpMeExPWUFadFNHIiwicmF0IjoxNTI5NzUxMzU2LCJzdWIiOiJmb29AYmFyLmNvbSJ9.eHnPFP9zOSLK7VmiBmaIyzEuCQeVY6IbgUxB8DlP8ub7iXQQWYR0pK4XlYMoYkNo8POz10tQa7-UqEoMn4i-vsdPOyccry_HyIgVToz-iB9igZPR7yIqXd9QdRq1i-7_XX67HIbnzqlZi57w9a3CnuHnL5ejB0WNfMP0ZbfLPzCAi6q7lygGXGQ9n0llzqbKIi63cVrJsv-zEzfZCk5dxyewSCFqjPtqL_u3wmvork8tSX9csrKWtxrf9j2CzbYclQmmNgejGMQD0t3f1jQhUhoRC5oXtd7DiWnajcjSa55EUb6DHCEIQJ_Vde1xVThawlXpcO9HH2JfMuU6ajkisNbmXRAS8H6KRqslzWlCcACInZbek8aDlIYOqMtbUmBQzQtOrKPrZmxrGDKUYkIVKuXOF_IvmE-Wt-eBAV0rerEChhxBREzNmD9hTP3N9GTtB0sn5dYSs88uZ221cGYqNwh4xTWwD17Y8QxW5AIBCl-Dfk-yBRgLDcFg7B3ou7mcuyJFPs_1CRD-pXZqlIDN3s05B-wpinJQRyzCZjxsf8SXnMmRBw7Hl5VUD28Gxf_mCI3xJ90M6PXHb5cvEvQyu4QDdOfKFf-7pDfBJkznBy0TS6sMdP3ZX8eJaTuiqwdwN5614OLGNqbiF3FXAznzTxyos--1ovt6AUAjEbbgULs', 'state': 'RkZYzBGQ3bdBRyNR', 'code': 'Xg7gOkhw73dyA9yneMLy2bHOoaeS-7uejD-Qrq-0phc.VDUwKYn-daDwUxsAUBJUlCNUAj7chOfi_XHFsqfTLBk'}
2.818 AuthorizationResponse {
"code": "Xg7gOkhw73dyA9yneMLy2bHOoaeS-7uejD-Qrq-0phc.VDUwKYn-daDwUxsAUBJUlCNUAj7chOfi_XHFsqfTLBk",
"id_token": {
"acr": "0",
"aud": [
"498b5241-dead-47e1-a3d2-83e375ffe1ac"
],
"auth_time": 1529751224,
"c_hash": "0X2VezTaP0yEtqGr8QzWpQ",
"exp": 1529754958,
"iat": 1529751358,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "cfad7727-3d30-450e-b21c-b2c0e26eda3a",
"nonce": "B8L2ZZLxLOYAZtSG",
"rat": 1529751356,
"sub": "[email protected]"
},
"state": "RkZYzBGQ3bdBRyNR"
}
2.818 phase <--<-- 4 --- AccessToken -->-->
2.818 --> request op_args: {'state': 'RkZYzBGQ3bdBRyNR'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.818 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'RkZYzBGQ3bdBRyNR', 'code': 'Xg7gOkhw73dyA9yneMLy2bHOoaeS-7uejD-Qrq-0phc.VDUwKYn-daDwUxsAUBJUlCNUAj7chOfi_XHFsqfTLBk', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '498b5241-dead-47e1-a3d2-83e375ffe1ac'}, 'state': 'RkZYzBGQ3bdBRyNR'}
2.818 AccessTokenRequest {
"code": "Xg7gOkhw73dyA9yneMLy2bHOoaeS-7uejD-Qrq-0phc.VDUwKYn-daDwUxsAUBJUlCNUAj7chOfi_XHFsqfTLBk",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "RkZYzBGQ3bdBRyNR"
}
2.818 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.818 request_http_args {'headers': {'Authorization': 'Basic NDk4YjUyNDEtZGVhZC00N2UxLWEzZDItODNlMzc1ZmZlMWFjOkU2UGxwYjU4NU01Mg==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.818 request code=Xg7gOkhw73dyA9yneMLy2bHOoaeS-7uejD-Qrq-0phc.VDUwKYn-daDwUxsAUBJUlCNUAj7chOfi_XHFsqfTLBk&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=RkZYzBGQ3bdBRyNR
3.031 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.032 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhY3IiOiIwIiwiYXVkIjpbIjQ5OGI1MjQxLWRlYWQtNDdlMS1hM2QyLTgzZTM3NWZmZTFhYyJdLCJhdXRoX3RpbWUiOjE1Mjk3NTEyMjQsImNfaGFzaCI6IjBYMlZlelRhUDB5RXRxR3I4UXpXcFEiLCJleHAiOjE1Mjk3NTQ5NTgsImlhdCI6MTUyOTc1MTM1OSwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiN2FhYWFkZTAtYzg1OC00N2Y0LThkYjktZTVmY2JkMWEzNGI5Iiwibm9uY2UiOiJCOEwyWlpMeExPWUFadFNHIiwicmF0IjoxNTI5NzUxMzU2LCJzdWIiOiJmb29AYmFyLmNvbSJ9.WV4ynsATrPEwy80xht7u6qX5_yfYTjjjKLaZkTWdDqsfGK1pKiUjtDxdaTIffBrYeIDxtvuWPzC_jB0HMhCiuLIxkzECt5-3uuav9zfjHVsTY7NoSsKHfb20beWFdS3TKbaViYE3p9TKz9v3-O6N2ZgHtwPnNTr1RAjfZfwkwZ44NRDVDM3iL-FmKjlkUSI2whTfmRFZiFqA7izpCy1zlB0kVmk0gTPM7ToF_VveIwjT4aTOn_AeZ4LlvKEIwsfXkyIiv7dlIOTcauq5tJJwZuFevS2ym3YLODqEKBGCdSu6CKlbvcWdcKSnR98wkGlxUCHU_sJ_VNEhcVP-W-zsQYr1bjLt_HEnKSg8TC5LOY7Jij6Xyz35r2--876w_xrY_kVJ98eC2QFl2yXrr7UAXCzC7aZmmJX1QYflkNir62G9BsJE-HHNxh1Lo4D1hsIqQiQUvs38ni-rU3cIcO9RMikO7q94mOjAs6HWOtGpP4XYW9sRRdFPK9S_nlER9nqy1a80aTaOO2wNLltCNJFCZaaTzTj5PFDof3sHbRgTg3ah6hXQU5EEugfWplTdxLsSyB2a7DyR9USmsJyFl0O2Th6GzSaT6fS5w7QUJ5GV5C2cjXhbBhDSw539rTF1j76QoFkB9Cc3Sldqu4T_RSnfYvFnchmJSe0BOXelVC9_mjg', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'lKYANrfyyynWmfNfZ27dEkYcVrCzotId5N6Xcw18_hA.xGKycO8XtbzxX110MQyvMUKjGKt4Ik86LMm2wKuGHLA', 'scope': 'openid'}
3.035 AccessTokenResponse {
"access_token": "lKYANrfyyynWmfNfZ27dEkYcVrCzotId5N6Xcw18_hA.xGKycO8XtbzxX110MQyvMUKjGKt4Ik86LMm2wKuGHLA",
"expires_in": 3599,
"id_token": {
"acr": "0",
"aud": [
"498b5241-dead-47e1-a3d2-83e375ffe1ac"
],
"auth_time": 1529751224,
"c_hash": "0X2VezTaP0yEtqGr8QzWpQ",
"exp": 1529754958,
"iat": 1529751359,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "7aaaade0-c858-47f4-8db9-e5fcbd1a34b9",
"nonce": "B8L2ZZLxLOYAZtSG",
"rat": 1529751356,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.036 phase <--<-- 5 --- Done -->-->
3.036 end
3.036 assertion VerifyResponse
3.036 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.036 assertion UsedAcrValue
3.037 condition used-acr-value: status=WARNING, message=Used acr value: 0, preferred: ['1', '2'] [The acr value in the ID Token]
3.037 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
used-acr-value: status=WARNING, message=Used acr value: 0, preferred: ['1', '2'] [The acr value in the ID Token]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
Used acr value: 0, preferred: ['1', '2']
./OP-scope-address.txt 0000644 0000000 0000000 00000033761 13313423450 014772 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-scope-address
Test description: Scope requesting address claims
Timestamp: 2018-06-23T10:55:36Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.071 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.073 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.073 phase <--<-- 2 --- Registration -->-->
0.073 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.073 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#AzR6xbcJSZVNVDf4"
],
"response_types": [
"code id_token"
]
}
0.228 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.229 RegistrationResponse {
"client_id": "a8c27fb3-8d5f-481e-aa1a-0e159e0083e5",
"client_secret": "_T03xK2yUYoC",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "a8c27fb3-8d5f-481e-aa1a-0e159e0083e5",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#AzR6xbcJSZVNVDf4"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.229 phase <--<-- 3 --- AsyncAuthn -->-->
0.229 condition Check support: status=WARNING, message=No support for: scopes_supported=['address']
0.229 AuthorizationRequest {
"client_id": "a8c27fb3-8d5f-481e-aa1a-0e159e0083e5",
"nonce": "pXyspqaEU0NLsuMm",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid address",
"state": "tjDW5056JKzVhg0C"
}
0.23 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+address&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=a8c27fb3-8d5f-481e-aa1a-0e159e0083e5&state=tjDW5056JKzVhg0C&response_type=code+id_token&nonce=pXyspqaEU0NLsuMm
0.23 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+address&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=a8c27fb3-8d5f-481e-aa1a-0e159e0083e5&state=tjDW5056JKzVhg0C&response_type=code+id_token&nonce=pXyspqaEU0NLsuMm
3.309 http args {}
3.48 response URL with fragment
3.48 response code=g3RXKqEZKe7PLVYVkG8HA3zSlHeaKgKCP5BMwsBCBa4.ulQHOVV5wpSfhlUv4-iTruU544jupGwT2jBhHEuRzfE&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYThjMjdmYjMtOGQ1Zi00ODFlLWFhMWEtMGUxNTllMDA4M2U1Il0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiWmg3RGx0R002cFFsV2thVkNrdlN3dyIsImV4cCI6MTUyOTc1NDkzNSwiaWF0IjoxNTI5NzUxMzM1LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJmZTZkNzkyZS04ZTA1LTRhMWItOWZmNi1iNzNiMzBiM2M5MjYiLCJub25jZSI6InBYeXNwcWFFVTBOTHN1TW0iLCJyYXQiOjE1Mjk3NTEzMzMsInN1YiI6ImZvb0BiYXIuY29tIn0.WMmDAxvE-WJ4GKT5imyjlz-0llY7OB5Qve6CjbSFNFhpCkR3XBWo2h2vD68TqDn6cs_e0gtVN74hmY0y0pHZ4NreksyvX8spDjG-vgkv-v38J1NjkTMFvo67tElU0Ey32YAjtnfZAnhwfu2OXT0GK1EiEvgi81WjTdD5uVVCwiGvZRnkA1JjY5ZHdOty4RKf_voObckP3xQrBkzCJRa8NeeDJHx2KvzbsPynvYnI9e3C-pOFWX_fD1r7CWhwVmhzBUmabkqWV6yB5KksH3CFULV4dYHgakpwza-yey8E-YTUVoMS6NNs8h9L8zurwdcyXAWYU19Sb0PH0XLS2f6pfBaoXEq-FZM6J73Bf_dg2-a36kBjYv1r-UmFQOQCLPHUaoqPg5z4lled2lURMBjbECUkh8rXaz_iFPLUtp8aypRCoHSP8g7Z6wDePBR-uV4n8lVXTJ0OGJ9sL1T8ET4y32L0YgCkbc86SejUto09eTZBifiUv6uch0v8byFXzEkhIQkwvZMRaRN1WJHYzbjtqI93xqRegfU_9Sx2ogg6gxHDP01sbELW8Bfukkh79Z169-2mrygwfqDoUjwdLgMgE8JmIYRllBFxolmQK865aE54ZOkji_AEgIdv92EIp6fJgB41YRLn97tryHoaFj5JylXwJXElByoZ1bSaTW1eer0&state=tjDW5056JKzVhg0C
3.48 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYThjMjdmYjMtOGQ1Zi00ODFlLWFhMWEtMGUxNTllMDA4M2U1Il0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiWmg3RGx0R002cFFsV2thVkNrdlN3dyIsImV4cCI6MTUyOTc1NDkzNSwiaWF0IjoxNTI5NzUxMzM1LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJmZTZkNzkyZS04ZTA1LTRhMWItOWZmNi1iNzNiMzBiM2M5MjYiLCJub25jZSI6InBYeXNwcWFFVTBOTHN1TW0iLCJyYXQiOjE1Mjk3NTEzMzMsInN1YiI6ImZvb0BiYXIuY29tIn0.WMmDAxvE-WJ4GKT5imyjlz-0llY7OB5Qve6CjbSFNFhpCkR3XBWo2h2vD68TqDn6cs_e0gtVN74hmY0y0pHZ4NreksyvX8spDjG-vgkv-v38J1NjkTMFvo67tElU0Ey32YAjtnfZAnhwfu2OXT0GK1EiEvgi81WjTdD5uVVCwiGvZRnkA1JjY5ZHdOty4RKf_voObckP3xQrBkzCJRa8NeeDJHx2KvzbsPynvYnI9e3C-pOFWX_fD1r7CWhwVmhzBUmabkqWV6yB5KksH3CFULV4dYHgakpwza-yey8E-YTUVoMS6NNs8h9L8zurwdcyXAWYU19Sb0PH0XLS2f6pfBaoXEq-FZM6J73Bf_dg2-a36kBjYv1r-UmFQOQCLPHUaoqPg5z4lled2lURMBjbECUkh8rXaz_iFPLUtp8aypRCoHSP8g7Z6wDePBR-uV4n8lVXTJ0OGJ9sL1T8ET4y32L0YgCkbc86SejUto09eTZBifiUv6uch0v8byFXzEkhIQkwvZMRaRN1WJHYzbjtqI93xqRegfU_9Sx2ogg6gxHDP01sbELW8Bfukkh79Z169-2mrygwfqDoUjwdLgMgE8JmIYRllBFxolmQK865aE54ZOkji_AEgIdv92EIp6fJgB41YRLn97tryHoaFj5JylXwJXElByoZ1bSaTW1eer0', 'state': 'tjDW5056JKzVhg0C', 'code': 'g3RXKqEZKe7PLVYVkG8HA3zSlHeaKgKCP5BMwsBCBa4.ulQHOVV5wpSfhlUv4-iTruU544jupGwT2jBhHEuRzfE'}
3.562 AuthorizationResponse {
"code": "g3RXKqEZKe7PLVYVkG8HA3zSlHeaKgKCP5BMwsBCBa4.ulQHOVV5wpSfhlUv4-iTruU544jupGwT2jBhHEuRzfE",
"id_token": {
"aud": [
"a8c27fb3-8d5f-481e-aa1a-0e159e0083e5"
],
"auth_time": 1529751224,
"c_hash": "Zh7DltGM6pQlWkaVCkvSww",
"exp": 1529754935,
"iat": 1529751335,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "fe6d792e-8e05-4a1b-9ff6-b73b30b3c926",
"nonce": "pXyspqaEU0NLsuMm",
"rat": 1529751333,
"sub": "[email protected]"
},
"state": "tjDW5056JKzVhg0C"
}
3.562 phase <--<-- 4 --- AccessToken -->-->
3.563 --> request op_args: {'state': 'tjDW5056JKzVhg0C'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.563 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'tjDW5056JKzVhg0C', 'code': 'g3RXKqEZKe7PLVYVkG8HA3zSlHeaKgKCP5BMwsBCBa4.ulQHOVV5wpSfhlUv4-iTruU544jupGwT2jBhHEuRzfE', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'a8c27fb3-8d5f-481e-aa1a-0e159e0083e5'}, 'state': 'tjDW5056JKzVhg0C'}
3.563 AccessTokenRequest {
"code": "g3RXKqEZKe7PLVYVkG8HA3zSlHeaKgKCP5BMwsBCBa4.ulQHOVV5wpSfhlUv4-iTruU544jupGwT2jBhHEuRzfE",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "tjDW5056JKzVhg0C"
}
3.563 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.563 request_http_args {'headers': {'Authorization': 'Basic YThjMjdmYjMtOGQ1Zi00ODFlLWFhMWEtMGUxNTllMDA4M2U1Ol9UMDN4SzJ5VVlvQw==', 'Content-Type': 'application/x-www-form-urlencoded'}}
3.563 request code=g3RXKqEZKe7PLVYVkG8HA3zSlHeaKgKCP5BMwsBCBa4.ulQHOVV5wpSfhlUv4-iTruU544jupGwT2jBhHEuRzfE&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=tjDW5056JKzVhg0C
3.785 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.787 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYThjMjdmYjMtOGQ1Zi00ODFlLWFhMWEtMGUxNTllMDA4M2U1Il0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiWmg3RGx0R002cFFsV2thVkNrdlN3dyIsImV4cCI6MTUyOTc1NDkzNSwiaWF0IjoxNTI5NzUxMzM2LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiIwYTk1MTYyNC00MTIxLTQ1NzEtYmE2Zi0xNjdiY2Y1Y2FlZWQiLCJub25jZSI6InBYeXNwcWFFVTBOTHN1TW0iLCJyYXQiOjE1Mjk3NTEzMzMsInN1YiI6ImZvb0BiYXIuY29tIn0.oE30qBSyPlqGezqvN9Ys_jQmj8LGxScHiQgNgHF5lwMKyFy21m9j0g4hwq8RXiSwmVNcMxUQ6dS4WbhqjheFULgzSqpbLHxCgnIgtOT432GnnGxHL7mR-UqPSf3RWFQVweVVbnO3VRjWZVPuhYzftIRkzClgcZtNEMcOABxjDniEe8PLdU1QWUsWYPPnZqlfSCi91Dwre4_SLuJ4b-eL1rXaeVH8uA8CYRWOCZS59_x_H3tzzUztelMQd_Wafv5dCuJ4QMgovoXF3fh6-Mrww8MJ6M9RSqsMzg8m7CZjAoUeRHi97G_zyIPBvcRjIF8QjxYzyCXcQBrfEvhGrIuWQcRTQP_c5KaGZoAfl43t-A7cxxzBbrCQr9JjMbOFR-s29rnMoEZtCQDYAUwZ6JO9j0z5AvrOZEaHeOG4DKoGQE5S5m4j6QXD7_XW_X9tdlip-cBFO9YdCV11lz7SuEsgYljcdDZ61H9Qm3aRD1yUJgBqGFvMCF7QZgq7R6rmOzDJdGcH1HMzBvEXt2irfqBtQA2drmnBziafs96sOMdVgyOSPOwgmZUugBrrwEGiBg3KPaXf-dgNgY2CB8iaNK2A_P2O8umCxW4zaVPmpGEevG3sc0v5C6pDsRtuMuBSJ3ShXz56bsF_wkbG_k8s70Z82i8vMm4umVykVcplrGjGkxQ', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'oMF4OUOQXfJw6Wr7ZjMKpcaehDLKA1WIcDDKJWJ3EKI.uZMV9jby7RZAEdd3hZwd0LWOx5JcNdwec82NiZFxJyE', 'scope': 'openid address'}
3.79 AccessTokenResponse {
"access_token": "oMF4OUOQXfJw6Wr7ZjMKpcaehDLKA1WIcDDKJWJ3EKI.uZMV9jby7RZAEdd3hZwd0LWOx5JcNdwec82NiZFxJyE",
"expires_in": 3599,
"id_token": {
"aud": [
"a8c27fb3-8d5f-481e-aa1a-0e159e0083e5"
],
"auth_time": 1529751224,
"c_hash": "Zh7DltGM6pQlWkaVCkvSww",
"exp": 1529754935,
"iat": 1529751336,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "0a951624-4121-4571-ba6f-167bcf5caeed",
"nonce": "pXyspqaEU0NLsuMm",
"rat": 1529751333,
"sub": "[email protected]"
},
"scope": "openid address",
"token_type": "bearer"
}
3.79 phase <--<-- 5 --- UserInfo -->-->
3.79 do_user_info_request kwargs:{'state': 'tjDW5056JKzVhg0C', 'method': 'GET', 'authn_method': 'bearer_header'}
3.791 request {'body': None}
3.791 request_url https://oidc-certification.ory.sh:8443/userinfo
3.791 request_http_args {'headers': {'Authorization': 'Bearer oMF4OUOQXfJw6Wr7ZjMKpcaehDLKA1WIcDDKJWJ3EKI.uZMV9jby7RZAEdd3hZwd0LWOx5JcNdwec82NiZFxJyE'}}
3.897 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
3.897 OpenIDSchema {
"sub": "[email protected]"
}
3.897 OpenIDSchema {
"sub": "[email protected]"
}
3.897 phase <--<-- 6 --- Done -->-->
3.898 end
3.898 assertion CheckHTTPResponse
3.898 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
3.899 assertion VerifyResponse
3.899 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.899 assertion VerifyScopes
3.899 condition verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['address'] [Verifies that the claims corresponding to the requested scopes are returned]
3.899 condition Done: status=OK
============================================================
Conditions
Check support: status=WARNING, message=No support for: scopes_supported=['address']
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['address'] [Verifies that the claims corresponding to the requested scopes are returned]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
No support for: scopes_supported=['address']
The following claims were missing from the returned information: ['address']
./OP-Req-NotUnderstood.txt 0000644 0000000 0000000 00000022006 13313423472 015564 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-NotUnderstood
Test description: Request with extra query component
Timestamp: 2018-06-23T10:55:54Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.083 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.084 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.084 phase <--<-- 2 --- Registration -->-->
0.084 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.085 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#VlJGewuu8WDS79Ye"
],
"response_types": [
"code id_token"
]
}
0.251 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.252 RegistrationResponse {
"client_id": "98bec677-0312-4943-b2b5-c6ccb324c28e",
"client_secret": "ATg8peXeAbpE",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "98bec677-0312-4943-b2b5-c6ccb324c28e",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#VlJGewuu8WDS79Ye"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.252 phase <--<-- 3 --- AsyncAuthn -->-->
0.253 AuthorizationRequest {
"client_id": "98bec677-0312-4943-b2b5-c6ccb324c28e",
"extra": "foobar",
"nonce": "lanFHeGUu61LgqlR",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "nWcqqLQbLqVPKwqF"
}
0.253 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?extra=foobar&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=98bec677-0312-4943-b2b5-c6ccb324c28e&state=nWcqqLQbLqVPKwqF&response_type=code+id_token&nonce=lanFHeGUu61LgqlR
0.253 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?extra=foobar&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=98bec677-0312-4943-b2b5-c6ccb324c28e&state=nWcqqLQbLqVPKwqF&response_type=code+id_token&nonce=lanFHeGUu61LgqlR
3.818 http args {}
4.009 response URL with fragment
4.009 response code=LRL8k09sid1KqPdXS95RMeeQ7KwrqGxh0jRLEH2dKSg.mFtFBTn1A5Dwmtfvo4PHp5J0iU_T1lzVpDl8RCxAKK0&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiOThiZWM2NzctMDMxMi00OTQzLWIyYjUtYzZjY2IzMjRjMjhlIl0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiWXloazdDcHlSTEUxYlhfeHZyLVJVdyIsImV4cCI6MTUyOTc1NDk1NCwiaWF0IjoxNTI5NzUxMzU0LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI4ZjQ4MDg2Yy0xNTMyLTRiMzktYjgyMS1jNTI2YjkyMGZiYjgiLCJub25jZSI6ImxhbkZIZUdVdTYxTGdxbFIiLCJyYXQiOjE1Mjk3NTEzNTEsInN1YiI6ImZvb0BiYXIuY29tIn0.VtrafQ9IUpYkvwwP3GAtcm6MVM32TGWJ7khLAv3n_KJoZInTyOxxfW22FPQDuCC0f_xx95N0Id7_4FBdfO5eotzxACINx6yeIdngRLtdJWlWtzAwhBct9SNwFDa1r2w3AOL-SpGXTXjWgH68P49M8_PTUAIq4Fab_SoW4O93ulITIDqGNq2RZc-datPBrSchCzrLj8S8hUB4dJOUlurIgMPA32i3nmFdDjgAGDwgjycVIeaHEvuz7rfx6MEzxxLSBvOuu6lkOOYMSHpIi5IJgHh_y_Gk5ynHkacX-4oNQDYsPe3-Tnb0rMHDnh-88MYCL9-nFMuwSfLJGTpOEqY9XNoTuS-8r0ux61ZGwG7kLVrsP8jM9HyzdF5m2Q8MWNY9zCypU4xPjts_bpL2oFDn6ev9xeyMlkG7-pENx7m9txm5T0DZEAV5o-jdBBVyZ6B9KsVHaJrH2LjWSEkGZHlAH2MzkK_7YKC9nSJiKpEevck8g3fuyXXkpNIsuCfy7NlZ8f8ctqxYIkEC0E8zSEZej7Wb6jyPCgZtvBsB9cTPx_biHeeozMlyBApjPXz_XN2CgBlnaMJQ06LrtuCGcy7KTTHTDPYpI9Xtq-GykoIylrbDt01y7DmKMkKQzOC0L56D2h5rIDWLu6jtkZeAMPrEe8zn-iwTFZUoVoF3UEB5guc&state=nWcqqLQbLqVPKwqF
4.012 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiOThiZWM2NzctMDMxMi00OTQzLWIyYjUtYzZjY2IzMjRjMjhlIl0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiWXloazdDcHlSTEUxYlhfeHZyLVJVdyIsImV4cCI6MTUyOTc1NDk1NCwiaWF0IjoxNTI5NzUxMzU0LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI4ZjQ4MDg2Yy0xNTMyLTRiMzktYjgyMS1jNTI2YjkyMGZiYjgiLCJub25jZSI6ImxhbkZIZUdVdTYxTGdxbFIiLCJyYXQiOjE1Mjk3NTEzNTEsInN1YiI6ImZvb0BiYXIuY29tIn0.VtrafQ9IUpYkvwwP3GAtcm6MVM32TGWJ7khLAv3n_KJoZInTyOxxfW22FPQDuCC0f_xx95N0Id7_4FBdfO5eotzxACINx6yeIdngRLtdJWlWtzAwhBct9SNwFDa1r2w3AOL-SpGXTXjWgH68P49M8_PTUAIq4Fab_SoW4O93ulITIDqGNq2RZc-datPBrSchCzrLj8S8hUB4dJOUlurIgMPA32i3nmFdDjgAGDwgjycVIeaHEvuz7rfx6MEzxxLSBvOuu6lkOOYMSHpIi5IJgHh_y_Gk5ynHkacX-4oNQDYsPe3-Tnb0rMHDnh-88MYCL9-nFMuwSfLJGTpOEqY9XNoTuS-8r0ux61ZGwG7kLVrsP8jM9HyzdF5m2Q8MWNY9zCypU4xPjts_bpL2oFDn6ev9xeyMlkG7-pENx7m9txm5T0DZEAV5o-jdBBVyZ6B9KsVHaJrH2LjWSEkGZHlAH2MzkK_7YKC9nSJiKpEevck8g3fuyXXkpNIsuCfy7NlZ8f8ctqxYIkEC0E8zSEZej7Wb6jyPCgZtvBsB9cTPx_biHeeozMlyBApjPXz_XN2CgBlnaMJQ06LrtuCGcy7KTTHTDPYpI9Xtq-GykoIylrbDt01y7DmKMkKQzOC0L56D2h5rIDWLu6jtkZeAMPrEe8zn-iwTFZUoVoF3UEB5guc', 'state': 'nWcqqLQbLqVPKwqF', 'code': 'LRL8k09sid1KqPdXS95RMeeQ7KwrqGxh0jRLEH2dKSg.mFtFBTn1A5Dwmtfvo4PHp5J0iU_T1lzVpDl8RCxAKK0'}
4.093 AuthorizationResponse {
"code": "LRL8k09sid1KqPdXS95RMeeQ7KwrqGxh0jRLEH2dKSg.mFtFBTn1A5Dwmtfvo4PHp5J0iU_T1lzVpDl8RCxAKK0",
"id_token": {
"aud": [
"98bec677-0312-4943-b2b5-c6ccb324c28e"
],
"auth_time": 1529751224,
"c_hash": "Yyhk7CpyRLE1bX_xvr-RUw",
"exp": 1529754954,
"iat": 1529751354,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "8f48086c-1532-4b39-b821-c526b920fbb8",
"nonce": "lanFHeGUu61LgqlR",
"rat": 1529751351,
"sub": "[email protected]"
},
"state": "nWcqqLQbLqVPKwqF"
}
4.093 phase <--<-- 4 --- Done -->-->
4.093 end
4.093 assertion VerifyAuthnResponse
4.093 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
4.093 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-scope-email.txt 0000644 0000000 0000000 00000034024 13313423454 014431 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-scope-email
Test description: Scope requesting email claims
Timestamp: 2018-06-23T10:55:40Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.077 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.078 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.078 phase <--<-- 2 --- Registration -->-->
0.078 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.079 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#o7wjQZoDf1jUd5Kh"
],
"response_types": [
"code id_token"
]
}
0.235 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.236 RegistrationResponse {
"client_id": "6f76d219-7a7a-4fa7-a31f-73a9376a8bf9",
"client_secret": "06X1ysr~LckR",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "6f76d219-7a7a-4fa7-a31f-73a9376a8bf9",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#o7wjQZoDf1jUd5Kh"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.236 phase <--<-- 3 --- AsyncAuthn -->-->
0.236 condition Check support: status=WARNING, message=No support for: scopes_supported=['email']
0.236 AuthorizationRequest {
"client_id": "6f76d219-7a7a-4fa7-a31f-73a9376a8bf9",
"nonce": "2B41GxUIXgiWBJDc",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid email",
"state": "WgaXpgxfjIrzIdIp"
}
0.236 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+email&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=6f76d219-7a7a-4fa7-a31f-73a9376a8bf9&state=WgaXpgxfjIrzIdIp&response_type=code+id_token&nonce=2B41GxUIXgiWBJDc
0.236 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+email&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=6f76d219-7a7a-4fa7-a31f-73a9376a8bf9&state=WgaXpgxfjIrzIdIp&response_type=code+id_token&nonce=2B41GxUIXgiWBJDc
2.534 http args {}
2.735 response URL with fragment
2.735 response code=NQ8oppEgPKwXkEMskHwEcrOXR63XqqF5q5rwrYK2kjA.bR3q1D56--Bzo3JX894lCVOa3FUt_eKAuZ17nf8OmcM&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNmY3NmQyMTktN2E3YS00ZmE3LWEzMWYtNzNhOTM3NmE4YmY5Il0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiUVZQNmp3dnNMRGdLWUl3RkdKMlRXUSIsImV4cCI6MTUyOTc1NDk0MCwiaWF0IjoxNTI5NzUxMzQwLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI0NzcyNjFjMi04NTRhLTRhMjUtYTg4MC04YThmMmU3YWFhZDEiLCJub25jZSI6IjJCNDFHeFVJWGdpV0JKRGMiLCJyYXQiOjE1Mjk3NTEzMzgsInN1YiI6ImZvb0BiYXIuY29tIn0.iaHFG-SsQ-LQvK_iWetiU0Hn9M-_pJr9tn1lfMIW0YIGmafXVAtX-1biwXpbEwFVEGOmgRRzCCXAN5xuGcv0ssJCgk_I0L76tpuHCV_wfXkfj5MK8dS4tWADsjpTA6HKpD7Yc4W9huRu-3_fYiX9e-o8_CMkd6w1WhS-m_n3oDGz6NCb1apip9sv7MBPgrJjYYv9xSjQvrAXWKAhXQFRW2VvqQ0pe6hx-R0cGPC_25BIZNeSGyDy6IU8rZnwEgDQHwxpOwBQnefisHtlREyKaKa_N7F1HE9MAaaoGGljLgpdtb4B5eXv9uhMKAf6U5FTwhk6aTg0ySprr_52x12fBfzrqt_ttwdJD1OIB6gU35nJY23J95Z8ors3z0gmDfetOA1LZ-7RboM6AW_bYgF8q7SYECaYZzQ50LqhVsog12Gl3h7RAdwS34_0IXr7vGzPNy5JEBcGhMSQf3VDtIo1CKlWmcVaYmcrHRXIm88-Toy3M3EM-_v1mCYrdJ8FSJNTJMdNy9T030-Z-N0VcZDqOe9Pbr_LC0_Xr3TptNFM6ffWglaCRJuw-u-xl5twZ1EIRegl1krU-dYbeynTzAQSesSGqMz-5LfkntChyQ5A4ZOQHHAJ1zsRYUq7T5Ow4D9a-5U_EZm8O2iTwr7EQXn538YAbPZlkFeRDjB6hHbGLn0&state=WgaXpgxfjIrzIdIp
2.736 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNmY3NmQyMTktN2E3YS00ZmE3LWEzMWYtNzNhOTM3NmE4YmY5Il0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiUVZQNmp3dnNMRGdLWUl3RkdKMlRXUSIsImV4cCI6MTUyOTc1NDk0MCwiaWF0IjoxNTI5NzUxMzQwLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI0NzcyNjFjMi04NTRhLTRhMjUtYTg4MC04YThmMmU3YWFhZDEiLCJub25jZSI6IjJCNDFHeFVJWGdpV0JKRGMiLCJyYXQiOjE1Mjk3NTEzMzgsInN1YiI6ImZvb0BiYXIuY29tIn0.iaHFG-SsQ-LQvK_iWetiU0Hn9M-_pJr9tn1lfMIW0YIGmafXVAtX-1biwXpbEwFVEGOmgRRzCCXAN5xuGcv0ssJCgk_I0L76tpuHCV_wfXkfj5MK8dS4tWADsjpTA6HKpD7Yc4W9huRu-3_fYiX9e-o8_CMkd6w1WhS-m_n3oDGz6NCb1apip9sv7MBPgrJjYYv9xSjQvrAXWKAhXQFRW2VvqQ0pe6hx-R0cGPC_25BIZNeSGyDy6IU8rZnwEgDQHwxpOwBQnefisHtlREyKaKa_N7F1HE9MAaaoGGljLgpdtb4B5eXv9uhMKAf6U5FTwhk6aTg0ySprr_52x12fBfzrqt_ttwdJD1OIB6gU35nJY23J95Z8ors3z0gmDfetOA1LZ-7RboM6AW_bYgF8q7SYECaYZzQ50LqhVsog12Gl3h7RAdwS34_0IXr7vGzPNy5JEBcGhMSQf3VDtIo1CKlWmcVaYmcrHRXIm88-Toy3M3EM-_v1mCYrdJ8FSJNTJMdNy9T030-Z-N0VcZDqOe9Pbr_LC0_Xr3TptNFM6ffWglaCRJuw-u-xl5twZ1EIRegl1krU-dYbeynTzAQSesSGqMz-5LfkntChyQ5A4ZOQHHAJ1zsRYUq7T5Ow4D9a-5U_EZm8O2iTwr7EQXn538YAbPZlkFeRDjB6hHbGLn0', 'state': 'WgaXpgxfjIrzIdIp', 'code': 'NQ8oppEgPKwXkEMskHwEcrOXR63XqqF5q5rwrYK2kjA.bR3q1D56--Bzo3JX894lCVOa3FUt_eKAuZ17nf8OmcM'}
2.817 AuthorizationResponse {
"code": "NQ8oppEgPKwXkEMskHwEcrOXR63XqqF5q5rwrYK2kjA.bR3q1D56--Bzo3JX894lCVOa3FUt_eKAuZ17nf8OmcM",
"id_token": {
"aud": [
"6f76d219-7a7a-4fa7-a31f-73a9376a8bf9"
],
"auth_time": 1529751224,
"c_hash": "QVP6jwvsLDgKYIwFGJ2TWQ",
"exp": 1529754940,
"iat": 1529751340,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "477261c2-854a-4a25-a880-8a8f2e7aaad1",
"nonce": "2B41GxUIXgiWBJDc",
"rat": 1529751338,
"sub": "[email protected]"
},
"state": "WgaXpgxfjIrzIdIp"
}
2.817 phase <--<-- 4 --- AccessToken -->-->
2.818 --> request op_args: {'state': 'WgaXpgxfjIrzIdIp'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.818 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'WgaXpgxfjIrzIdIp', 'code': 'NQ8oppEgPKwXkEMskHwEcrOXR63XqqF5q5rwrYK2kjA.bR3q1D56--Bzo3JX894lCVOa3FUt_eKAuZ17nf8OmcM', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '6f76d219-7a7a-4fa7-a31f-73a9376a8bf9'}, 'state': 'WgaXpgxfjIrzIdIp'}
2.818 AccessTokenRequest {
"code": "NQ8oppEgPKwXkEMskHwEcrOXR63XqqF5q5rwrYK2kjA.bR3q1D56--Bzo3JX894lCVOa3FUt_eKAuZ17nf8OmcM",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "WgaXpgxfjIrzIdIp"
}
2.818 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.818 request_http_args {'headers': {'Authorization': 'Basic NmY3NmQyMTktN2E3YS00ZmE3LWEzMWYtNzNhOTM3NmE4YmY5OjA2WDF5c3IlN0VMY2tS', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.818 request code=NQ8oppEgPKwXkEMskHwEcrOXR63XqqF5q5rwrYK2kjA.bR3q1D56--Bzo3JX894lCVOa3FUt_eKAuZ17nf8OmcM&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=WgaXpgxfjIrzIdIp
3.068 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.069 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNmY3NmQyMTktN2E3YS00ZmE3LWEzMWYtNzNhOTM3NmE4YmY5Il0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiUVZQNmp3dnNMRGdLWUl3RkdKMlRXUSIsImV4cCI6MTUyOTc1NDk0MCwiaWF0IjoxNTI5NzUxMzQwLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI2ZmZjYjVlMS1hNmQyLTQ1MGItYjcxZS1mODNlMGM4MzAwZGYiLCJub25jZSI6IjJCNDFHeFVJWGdpV0JKRGMiLCJyYXQiOjE1Mjk3NTEzMzgsInN1YiI6ImZvb0BiYXIuY29tIn0.ZRS_IM4JNQfN7FUTQWIS4KH--ujJgAkp3KEuOEQ9wnAVGUQ6x8tfExgCRIGmbh68Yp3o1343wEU1BOCViZWjwycOCVRbQ36SXLrwXYOm2m3MUAo_dWHM2nQvvbWy87zy0wWGWuBb6RcKB91jWzOKFDWoF29Am_j8cYIk2CEg4HBc4ktvX04bNXZ6oMlDxBDzXBCBjjahsyjHTl1g3lv8gvRXbs0RO0JnB3bTHzoVptW1Wkf44dwEKHODOPaB0gBhgW20FKUN6uT-N_VSIiPWSiZFbZqOl8CUxMBMLzeKxTwG1SmD1p7W7if9321t2FR3lgbYCinTrVGN0UHHAvLUTyc0wVTaUPM-UsHuU4uTh3rYlR9N4DW5oAVKhvAEYVG6sTIDitV8-v4Cgkc1lkbSxnqG2l2HxCTKM5-qBS-tsEwe-auETYCGNYbdTdbdSebLyIokhaXvjCi78qxaOfpOPK1LPv3tfondXSWN9m2up3iJcBRcr4-t33wu-9xTRvcDfheBgX6YCfEAxo1g6nHQizEspEV84e3l7p-MgMgmbQy0sH-Mi0vWQSZ9eZhh02fNEcdYF5QNAa36PMWUI12XIiTBqUaKebahseKLOnjOVaeQjVsLjXyUEEyHnqxVoYKLbKyfJV1NvZOLfwfOx9FDVcv-IC6c_sTPa2JDwFIl0TY', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'lCM8tMk_Y_6W7xXdZ7Gngk7FprNYIkMC1aDU6bnC8OM.FaSki0BnBWaoWt00Q4sinkWtdOL7PRYFk603uufDExg', 'scope': 'openid email'}
3.073 AccessTokenResponse {
"access_token": "lCM8tMk_Y_6W7xXdZ7Gngk7FprNYIkMC1aDU6bnC8OM.FaSki0BnBWaoWt00Q4sinkWtdOL7PRYFk603uufDExg",
"expires_in": 3599,
"id_token": {
"aud": [
"6f76d219-7a7a-4fa7-a31f-73a9376a8bf9"
],
"auth_time": 1529751224,
"c_hash": "QVP6jwvsLDgKYIwFGJ2TWQ",
"exp": 1529754940,
"iat": 1529751340,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "6ffcb5e1-a6d2-450b-b71e-f83e0c8300df",
"nonce": "2B41GxUIXgiWBJDc",
"rat": 1529751338,
"sub": "[email protected]"
},
"scope": "openid email",
"token_type": "bearer"
}
3.073 phase <--<-- 5 --- UserInfo -->-->
3.073 do_user_info_request kwargs:{'state': 'WgaXpgxfjIrzIdIp', 'method': 'GET', 'authn_method': 'bearer_header'}
3.073 request {'body': None}
3.073 request_url https://oidc-certification.ory.sh:8443/userinfo
3.073 request_http_args {'headers': {'Authorization': 'Bearer lCM8tMk_Y_6W7xXdZ7Gngk7FprNYIkMC1aDU6bnC8OM.FaSki0BnBWaoWt00Q4sinkWtdOL7PRYFk603uufDExg'}}
3.15 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
3.151 OpenIDSchema {
"sub": "[email protected]"
}
3.151 OpenIDSchema {
"sub": "[email protected]"
}
3.151 phase <--<-- 6 --- Done -->-->
3.151 end
3.151 assertion CheckHTTPResponse
3.151 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
3.152 assertion VerifyResponse
3.152 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.152 assertion VerifyScopes
3.152 condition verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['email', 'email_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
3.152 condition Done: status=OK
============================================================
Conditions
Check support: status=WARNING, message=No support for: scopes_supported=['email']
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['email', 'email_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
No support for: scopes_supported=['email']
The following claims were missing from the returned information: ['email', 'email_verified']
./OP-scope-phone.txt 0000644 0000000 0000000 00000034071 13313423461 014453 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-scope-phone
Test description: Scope requesting phone claims
Timestamp: 2018-06-23T10:55:45Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.082 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.083 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.083 phase <--<-- 2 --- Registration -->-->
0.083 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.084 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#ZZaCvnDBhzxp6cQz"
],
"response_types": [
"code id_token"
]
}
0.243 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.244 RegistrationResponse {
"client_id": "0df1a08b-de93-4eed-a17e-8904e1f4b3af",
"client_secret": "qaSmmK0soysv",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "0df1a08b-de93-4eed-a17e-8904e1f4b3af",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#ZZaCvnDBhzxp6cQz"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.244 phase <--<-- 3 --- AsyncAuthn -->-->
0.244 condition Check support: status=WARNING, message=No support for: scopes_supported=['phone']
0.244 AuthorizationRequest {
"client_id": "0df1a08b-de93-4eed-a17e-8904e1f4b3af",
"nonce": "2QrpfBWvy2O4biK6",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid phone",
"state": "s8E3ioQJsHni1nXJ"
}
0.245 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+phone&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=0df1a08b-de93-4eed-a17e-8904e1f4b3af&state=s8E3ioQJsHni1nXJ&response_type=code+id_token&nonce=2QrpfBWvy2O4biK6
0.245 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+phone&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=0df1a08b-de93-4eed-a17e-8904e1f4b3af&state=s8E3ioQJsHni1nXJ&response_type=code+id_token&nonce=2QrpfBWvy2O4biK6
2.331 http args {}
2.505 response URL with fragment
2.505 response code=qlGZTKSbHrnn9j9vGrSIGlqPWe_qK6SilwVFYA-wuME.j1KVFwWVlQkECfmv714RpiuTpAge05qG65JaEkfIYl4&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMGRmMWEwOGItZGU5My00ZWVkLWExN2UtODkwNGUxZjRiM2FmIl0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiM09pM09tV1I4YmlKZVBiVVAxVERTQSIsImV4cCI6MTUyOTc1NDk0NCwiaWF0IjoxNTI5NzUxMzQ0LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI1ZGZkODE3Ny03NGYxLTQxN2ItODIwZC1mMDBjOGJmMTJjY2EiLCJub25jZSI6IjJRcnBmQld2eTJPNGJpSzYiLCJyYXQiOjE1Mjk3NTEzNDIsInN1YiI6ImZvb0BiYXIuY29tIn0.M6AkMl74SzI-A1yu9TX6uqdPc-kZb0hcNvXLx6bwWYJQ3SsTPafr_wDBmg73172tw6cSxrEu84hVK1vTUTWNKQQR4zYCyeclxQ_ZjfNgbAqYnQkjBEVAwzU4OtNxRI8mTV4t2IXPltjNxlsgfGj_i9JGgpltS-AeQo_2VeDOTWzSVLJ70VU5n_oJF1EmlQnu324X0LUJdl1UYilM8FdlsjYI9XJC28wTUlZh6CdzCzydn1aROGt-a23JveW5TqEUsWPYZwapZvYJRCwVlUZXtFgq1CKMtlovHxkETIRHhcfxL6YBPfZJbbaqRcUiJElUa21eMtqA-p_q4f42M8MnUh0JBKZ6LS5fcXRzunHQ9CyTvtLAbKSzaHNdi_7pgbLSmePcBwNemKuHsZdluiE5m0Bo1eLbVEUZED29m93ZNubjH-VbbsLTvp81cUeLMaM1iSH0IFCKtaJOqYh_sasqPTeKf7oPAew4f2wQc25d8wYPJ1B4XKp7aVpnv9hlYyzm5CERed2UI_HJvbzuLJnSkzyJgPXrQpbkLb0JV06d5JH_sFiRXNtRIbL1zvqRGnj1sIQ359h8bUNhBMauNy2OoLZ6EDtKNrV_9D2weLk1B6kp2pKePwW5mpcaPSdy2G3-2dxpCKfMjJj_-0eqx6HwtxHGsVtXvmu7nbDyVzbWD7k&state=s8E3ioQJsHni1nXJ
2.506 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMGRmMWEwOGItZGU5My00ZWVkLWExN2UtODkwNGUxZjRiM2FmIl0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiM09pM09tV1I4YmlKZVBiVVAxVERTQSIsImV4cCI6MTUyOTc1NDk0NCwiaWF0IjoxNTI5NzUxMzQ0LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI1ZGZkODE3Ny03NGYxLTQxN2ItODIwZC1mMDBjOGJmMTJjY2EiLCJub25jZSI6IjJRcnBmQld2eTJPNGJpSzYiLCJyYXQiOjE1Mjk3NTEzNDIsInN1YiI6ImZvb0BiYXIuY29tIn0.M6AkMl74SzI-A1yu9TX6uqdPc-kZb0hcNvXLx6bwWYJQ3SsTPafr_wDBmg73172tw6cSxrEu84hVK1vTUTWNKQQR4zYCyeclxQ_ZjfNgbAqYnQkjBEVAwzU4OtNxRI8mTV4t2IXPltjNxlsgfGj_i9JGgpltS-AeQo_2VeDOTWzSVLJ70VU5n_oJF1EmlQnu324X0LUJdl1UYilM8FdlsjYI9XJC28wTUlZh6CdzCzydn1aROGt-a23JveW5TqEUsWPYZwapZvYJRCwVlUZXtFgq1CKMtlovHxkETIRHhcfxL6YBPfZJbbaqRcUiJElUa21eMtqA-p_q4f42M8MnUh0JBKZ6LS5fcXRzunHQ9CyTvtLAbKSzaHNdi_7pgbLSmePcBwNemKuHsZdluiE5m0Bo1eLbVEUZED29m93ZNubjH-VbbsLTvp81cUeLMaM1iSH0IFCKtaJOqYh_sasqPTeKf7oPAew4f2wQc25d8wYPJ1B4XKp7aVpnv9hlYyzm5CERed2UI_HJvbzuLJnSkzyJgPXrQpbkLb0JV06d5JH_sFiRXNtRIbL1zvqRGnj1sIQ359h8bUNhBMauNy2OoLZ6EDtKNrV_9D2weLk1B6kp2pKePwW5mpcaPSdy2G3-2dxpCKfMjJj_-0eqx6HwtxHGsVtXvmu7nbDyVzbWD7k', 'state': 's8E3ioQJsHni1nXJ', 'code': 'qlGZTKSbHrnn9j9vGrSIGlqPWe_qK6SilwVFYA-wuME.j1KVFwWVlQkECfmv714RpiuTpAge05qG65JaEkfIYl4'}
2.584 AuthorizationResponse {
"code": "qlGZTKSbHrnn9j9vGrSIGlqPWe_qK6SilwVFYA-wuME.j1KVFwWVlQkECfmv714RpiuTpAge05qG65JaEkfIYl4",
"id_token": {
"aud": [
"0df1a08b-de93-4eed-a17e-8904e1f4b3af"
],
"auth_time": 1529751224,
"c_hash": "3Oi3OmWR8biJePbUP1TDSA",
"exp": 1529754944,
"iat": 1529751344,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "5dfd8177-74f1-417b-820d-f00c8bf12cca",
"nonce": "2QrpfBWvy2O4biK6",
"rat": 1529751342,
"sub": "[email protected]"
},
"state": "s8E3ioQJsHni1nXJ"
}
2.584 phase <--<-- 4 --- AccessToken -->-->
2.584 --> request op_args: {'state': 's8E3ioQJsHni1nXJ'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.584 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 's8E3ioQJsHni1nXJ', 'code': 'qlGZTKSbHrnn9j9vGrSIGlqPWe_qK6SilwVFYA-wuME.j1KVFwWVlQkECfmv714RpiuTpAge05qG65JaEkfIYl4', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '0df1a08b-de93-4eed-a17e-8904e1f4b3af'}, 'state': 's8E3ioQJsHni1nXJ'}
2.584 AccessTokenRequest {
"code": "qlGZTKSbHrnn9j9vGrSIGlqPWe_qK6SilwVFYA-wuME.j1KVFwWVlQkECfmv714RpiuTpAge05qG65JaEkfIYl4",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "s8E3ioQJsHni1nXJ"
}
2.584 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.584 request_http_args {'headers': {'Authorization': 'Basic MGRmMWEwOGItZGU5My00ZWVkLWExN2UtODkwNGUxZjRiM2FmOnFhU21tSzBzb3lzdg==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.584 request code=qlGZTKSbHrnn9j9vGrSIGlqPWe_qK6SilwVFYA-wuME.j1KVFwWVlQkECfmv714RpiuTpAge05qG65JaEkfIYl4&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=s8E3ioQJsHni1nXJ
2.802 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.803 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMGRmMWEwOGItZGU5My00ZWVkLWExN2UtODkwNGUxZjRiM2FmIl0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiM09pM09tV1I4YmlKZVBiVVAxVERTQSIsImV4cCI6MTUyOTc1NDk0NCwiaWF0IjoxNTI5NzUxMzQ0LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiIyMTA4MmFmYy1mZTkwLTQ0YmMtYjBmYi0zZjZmNzJhYzg1M2IiLCJub25jZSI6IjJRcnBmQld2eTJPNGJpSzYiLCJyYXQiOjE1Mjk3NTEzNDIsInN1YiI6ImZvb0BiYXIuY29tIn0.0-utS9aqe78vsDSBMuxWVljb5GIhCX0JW9KXNT44rDVOVcqc-pVKi--SJJIciCm6L9OfwA1-WMm2-XveDYiI0nb88U6cezMrDfOyV0HbGGrhp_r8RRvyOala_vgeLsN9LKI5Vq84tbMl6VpN9hlNu9osbRCmrKxAI2H4rIu0uFMR96mnkdIdtGLQ8wMzQeQ6En--9p7LJ9hSvHJDlTIrLimuZwDOm9024xT6pd_hC2VREvI5ldn6XkEmsCiLW3I_m3j8ww9OHmycrLqgclbog9FSSxVxWwUBUadRC0gX1jeSdOn0fGMiFf1jrUji2iXIuZ106Jy7-WnJUgGbyfuLPrK_ygdLuscsdAwlcO79KaaxyP-vhWoJUpSpJ9ydUaW31xwT2w8yYqIGElL5MLn35c4qYSrxES2Aj3414tmqn-84P3KjNT0z84wBVpb0ILbxkx5hgCVEDhCEtjndm_wPOIMSpO2Ig6iaBMl8apVrxigRDQ36376RKN_O4bteprmOpqNaPjjyHwSo8MGfWIMEHBdGkRzTuNGxusLoIfSjxndIiEoCXRXZXza2ZDonc_27g7QRfXTTlX725FzhjaLLivBEI7LuAzV5NmS3mlbH0WFOQrkjDHRS-mJpqBa8on4mijjGl-fxEl9J939rHulBxmVW4VhVPG-1d7wKkQB33x0', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'Kw5dglVy8XX-EBm9LkUbqfaPA-cBVTjaNeUcw6OuN3U.gTC3wTKlgvssesddwdtS10cXfjvrwp75CTmPZex8wC4', 'scope': 'openid phone'}
2.807 AccessTokenResponse {
"access_token": "Kw5dglVy8XX-EBm9LkUbqfaPA-cBVTjaNeUcw6OuN3U.gTC3wTKlgvssesddwdtS10cXfjvrwp75CTmPZex8wC4",
"expires_in": 3599,
"id_token": {
"aud": [
"0df1a08b-de93-4eed-a17e-8904e1f4b3af"
],
"auth_time": 1529751224,
"c_hash": "3Oi3OmWR8biJePbUP1TDSA",
"exp": 1529754944,
"iat": 1529751344,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "21082afc-fe90-44bc-b0fb-3f6f72ac853b",
"nonce": "2QrpfBWvy2O4biK6",
"rat": 1529751342,
"sub": "[email protected]"
},
"scope": "openid phone",
"token_type": "bearer"
}
2.807 phase <--<-- 5 --- UserInfo -->-->
2.807 do_user_info_request kwargs:{'state': 's8E3ioQJsHni1nXJ', 'method': 'GET', 'authn_method': 'bearer_header'}
2.807 request {'body': None}
2.807 request_url https://oidc-certification.ory.sh:8443/userinfo
2.807 request_http_args {'headers': {'Authorization': 'Bearer Kw5dglVy8XX-EBm9LkUbqfaPA-cBVTjaNeUcw6OuN3U.gTC3wTKlgvssesddwdtS10cXfjvrwp75CTmPZex8wC4'}}
2.879 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
2.88 OpenIDSchema {
"sub": "[email protected]"
}
2.88 OpenIDSchema {
"sub": "[email protected]"
}
2.88 phase <--<-- 6 --- Done -->-->
2.88 end
2.88 assertion CheckHTTPResponse
2.88 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
2.881 assertion VerifyResponse
2.881 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.881 assertion VerifyScopes
2.881 condition verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['phone_number', 'phone_number_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
2.881 condition Done: status=OK
============================================================
Conditions
Check support: status=WARNING, message=No support for: scopes_supported=['phone']
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['phone_number', 'phone_number_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
No support for: scopes_supported=['phone']
The following claims were missing from the returned information: ['phone_number', 'phone_number_verified']
./OP-Discovery-jwks_uri.txt 0000644 0000000 0000000 00000016312 13313423101 016022 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Discovery-jwks_uri
Test description: Verify that jwks_uri is published
Timestamp: 2018-06-23T10:51:45Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Done -->-->
0.075 end
0.075 assertion CheckHTTPResponse
0.075 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.076 assertion BareKeys
0.145 http response url:https://oidc-certification.ory.sh:8443/.well-known/jwks.json status_code:200
0.145 jwks {'keys': [{'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': '16vFo3VXLypUERl1fqAWJEysIgKnJ15eEnc-5LOiFx7jK2L0zDKtj7q6ySr6rdwmgFjaV1vfG-VKmLHPMD_YuazQeb86blkDnUfNQvHfNID0g-U2G-xeLCqfdl54jzx5NAhMV6BVCUTOwsiUt3dgBaNWGJENo4gU0KGr0S2xEU38sJGUz3zROL6gOmUwqlSAk3YClnhyYYof0tj4j0dW7mXK7MaQ4CRAhq5rJq_VRrMCc4JiD7kAN104V5BmNU409uF4InE2Stugw8RSH4hXeBFp-dXtzQi6qmBLsnHd16_WEce76IxvthFnePqa3XMNg9G4-AJ36RVbH4IhMioQgvgHWGXR276pH1Vyga7V0dSakg8ohSD2vBD5OmlYquJ6krJ3uWUCez59YUeNEgOexn5XaBL0ZEnTQ-zNNHX39QZz9QaU2lftGhknRufg68bmshLWgXJexJS1ht1vFccFcmvpnYEnCTwKzo0kjlcY7IiBpWgJ1f4r1PTIKuh8CluNkitsbABcVx3-FOAhA4CMrQovAaNL_jfp6wKBA9Qy0W9LkESVsRQWFUSpQu_z4pJMOVfjbwJOsquxKwXphI2h1VczR-Hh8rTX7D2GL_4-GyG2nHfpF3jVq7raKnyGxJA8ZIK9kPh0JlQhR2FcBhFOWjvusFjoZ09Po6XtvWlP82E', 'alg': 'RS256', 'kid': 'public:0acf6c64-4d55-4888-abb9-b2a3f661ee7f'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': '0vvbIEitFVzY4o12elAZbZvpja5xTm5AOh9wi2UEiPEL6aKxAUn1ywpUaLyWKuEXdeuykHyybniLaThik7Gf-6xKk6S9IK9tjbbwfRqHVkn_Xkyul0ohFI3iTcjvFq5FPGr5vEhSB6eckdngUpzb-7S_Kt8yunkdhYTmkuAr2AXSbQcmCbOJXOsvkc5LOwpjmFIWrtBAHwILJ5cHjzIHtkK2QKMJRlknD8b4kmQ3x6vfxA7mtXREUXdQFn7ssnOVPzriPQp4kIi_TMczSmRLlX1PeeOeDGpTnYywQbsAfdBGZ20WdZlwP3lRUUJoKv1GpBU51GKm2xhHtyrzOkiRKE8pH_PD05gh1G9qXbFtBOoHMBWEaCxoxyJcW8_9iLXBPoC-Jhm47VO5T9hPlaISzDY6EUmgYktejS_mx_bR7emBcbtFUccYSVVqT3EZqAFuQlsPsvj8AT9NmEiVncB2Cy4z7ofLX_Wai_VFPCf7AEfmDZ8mzFZQfVGct74Q9KybwXm8YDq0TSszQGuqT0gtvU9In7CPSOytrVDbdk8Peyeg-Wn_ACMRh5T23wUbQ0jy0Wi9kBwIzN-dUpKu3uL6EZ3PmPSZItQHeAxpQbRZJ1vrrd2y-b6EGun3G9rlnOZ3L4_L4-NOKLt4VGPie7sphlND1pc4ZipaXBjZ9uC3bS8', 'alg': 'RS256', 'kid': 'public:490968e8-c6e5-441e-b42e-5053d6c67af2'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': '0WN9e_V2wEp33JZoN7zQ9J4E4Iz0l-dlx6GqIKdepcMjON3PKZHWFML1e0ZKAkuG2ZJRKoX1LaSNZT0NI9N6_wVAT9aNv53sHBJVC4Bww1zKHEvQseGwJbG0lZZHjDXaxCBPte9yQnquIRRp9Ab-uBeziRoaFQ02OV3LBMBSZ79AzFvZ4yTqpUS_xp-Ylfcmh5wXEppd6hoxs9h1tttPTPbnMLte3S_zxCZI4TQi8d1yBi39OvfZxtABQQbgqYPxiYehNdYbfmZ2CAmVlsTxByS3X-ANBe2nmLsOLgXTyVFZfvEZkzY7OgEwwq5zog5pScXJ-TGlj0guZd8nClHEV-GHvXonjb2hZB63dFEiUVMNh5cOblZX034GnlOkzYfAH8UZ_cvOqONHbvplzONuaYSSRMPRaZwj-0fpElhFNHwr1v1pqbE1i9XOxU_c-eSMr4XAm1VsWG3zJKymjoJmaDcW3AEawi3btL1N2tE3p27cHtcdFjcv5birnxMtPI9Vu806U0_WiGtH_kaWxz64Xk3A_yB-lIBQwXe61JME-K81wLLcHE9qoqpF5iUK4mDqMmI_DVIazUlVUzxY0-1iFkV790V95dBxeYFgXKX02g8NyxfnyzUDC12qUKKejJFbG5LPHaMUXWJIQ2ntwBX_XzeF4pGh0u0vYmfxAmfHWN0', 'alg': 'RS256', 'kid': 'public:a09f73cf-d685-4c5c-9312-60a13e57646f'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': 's_BEnyG0xHYDibtz9a4tE1IW8490BQ_z526Lg2d0PWRtHfcqKmPG0pd0DizPuLY2j1NAY4cCXLwNWMJ3Cp1TqddaMl08hElvNbilcTyQr96RQg9MnrWeR1EqpdXEzTjcx06DFDokvzs89YQVZTDzSh_-xY_m_0VkcFQ0RpDTBn1B0dkMh78dbTJVVSGXYSBgMpcKrGlrgDaPIRX7qp_SdvjNtkPStG_wCPkzd_IJAaTAHGrlyj27dyhOC6EqQjpZRhQvT-w7GalbObncCFox3hRiC8wbI9Toi5p7vEuJJ6yksaqtIwgbtPXXUChNTqwQgIc1RE8RVuhI8ExaT6FfStIVLq9Tow6Hd9mopdX_ydEHHbnbvSC0cCRPg8_G8zTk0ihFpiHE1yEDXBQSs6pZIQ8KZF2RG35j75Jh4ngsDyPbC7PmjE93SG25AkX0WZwoB3g8f6q2r4dZqNtemRX1lMDo0FUQyYcOU5mnOiW3E5oNs3g-VH5ISOiaSUSLX6AIxDfdk6Wj5t7FZUo4EcIwTnE3PI-0HxnLJaErwbYEX0hO1BuhfF7zYHxDjc085U7OyN0abZWbuVUMtIMRgq-4ASlM9fTECg3sMmOfTEJV9nrJZaSCxKvVWma9A01bvBPB6Qn92Gj1XNZ0E1RBLUp1V3iXLcS7MGJh7bAAk5kwKCM', 'alg': 'RS256', 'kid': 'public:8e8dab73-c9fe-42ef-9a7b-1e217abba9a9'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': '3cQ2ihjoElfFVnnkleo6ioUvZrkDfddEKOMCaemXP7umEhr8TC9_L3BKYbJqtE15jvkJiqT1vlHgTOKD5wWCFhFSmEa9PAWlt9Hw6BWddFEsiijR113yvj4eT0qfjseMYyiKst0kBxiTRmQdIzllY2Y2UU1IYIkaAP009nZSR7a5IrPYFydZ6SRARk9kZI90fmgRnzUuQKcv7C9HbkUqs7qiApfA17ACpnuKQP5p5lGL41t5ZnU1-5FvmmO6NnwtRZif34HL6WYuksi2RleLAKoHGh_l6P6ygP5v3ucHH0TmdLVBAHMmlLW4BKdVnWa2HEQCKIBiXJztu8EpYCVpZ_ThCaZLagcUM6VCD4nqvsXzQB7pnsBjq75tbo2jlqrGQJE9ekfGVyw7XDN45IkJFLgfVJ2anpyK4NeIAbkB7ZCYSXbR96_EC6h0uZSMHtPYVNIvbRCK6ysCdlDuDsWiQ01tP-lp90eWj1d7ZYlaYNws12OauBfgLyn0NZvjIz5EYXbOO_Hi0P5U6znS1Um-lU0nB1Gsj685Io-KLzN0shOqkfDP8Xcjfx_3EEg0aEPJWqCjiP9K6veNI896ZrIrH6Sd0V_o4TIzpSJimZlMZrTWS6dUm2j6q1WQOE2Z5JlDMC90yTGUC8MNt2AdMB0Z78Mf71rdSrpXpWLMh7rz_7k', 'alg': 'RS256', 'kid': 'public:6a09d4a3-a298-47bc-8bbd-50b64f653f2d'}]}
0.145 condition bare-keys: status=OK [Dynamic OPs MUST publish their public keys as bare JWK keys]
0.145 assertion CheckHasJwksURI
0.146 condition providerinfo-has-jwks_uri: status=OK [Check that the jwks_uri discovery metadata value is in the provider_info]
0.146 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
bare-keys: status=OK [Dynamic OPs MUST publish their public keys as bare JWK keys]
providerinfo-has-jwks_uri: status=OK [Check that the jwks_uri discovery metadata value is in the provider_info]
Done: status=OK
============================================================
RESULT: PASSED
./OP-request_uri-Sig.txt 0000644 0000000 0000000 00000023133 13313423425 015317 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-request_uri-Sig
Test description: Support request_uri request parameter with signed request
Timestamp: 2018-06-23T10:55:17Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.081 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.082 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.082 phase <--<-- 2 --- Registration -->-->
0.082 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'request_object_signing_alg': 'RS256'}
0.083 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "RS256",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#nRHfRwX3q9MAcpLB"
],
"response_types": [
"code id_token"
]
}
0.239 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.24 RegistrationResponse {
"client_id": "1155fc8d-4348-4044-9e77-f8192eceb1ed",
"client_secret": "-sqx.8_Ew3~h",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "1155fc8d-4348-4044-9e77-f8192eceb1ed",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "RS256",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#nRHfRwX3q9MAcpLB"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.24 phase <--<-- 3 --- AsyncAuthn -->-->
0.244 AuthorizationRequest {
"client_id": "1155fc8d-4348-4044-9e77-f8192eceb1ed",
"nonce": "4nTrDRXJgY5lJuxN",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"request_uri": "https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#nRHfRwX3q9MAcpLB",
"response_type": "code id_token",
"scope": "openid",
"state": "bcp3flDUeu1CIzUa"
}
0.244 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?request_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Frequests%2Fe3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9%23nRHfRwX3q9MAcpLB&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=1155fc8d-4348-4044-9e77-f8192eceb1ed&state=bcp3flDUeu1CIzUa&response_type=code+id_token&nonce=4nTrDRXJgY5lJuxN
0.244 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?request_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Frequests%2Fe3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9%23nRHfRwX3q9MAcpLB&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=1155fc8d-4348-4044-9e77-f8192eceb1ed&state=bcp3flDUeu1CIzUa&response_type=code+id_token&nonce=4nTrDRXJgY5lJuxN
2.658 http args {}
2.843 response URL with fragment
2.844 response code=vESnTEvB2RqnBy52joTACNu_OLB3JbyDwx5qYgvwwFo.jfFd-9HAOYPlrfRTIaeDSj2xXCG2uV4yudtZ7lDAC84&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMTE1NWZjOGQtNDM0OC00MDQ0LTllNzctZjgxOTJlY2ViMWVkIl0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiVVhQUTNNSDV4ZkZHb1ZyZm5jYU5WdyIsImV4cCI6MTUyOTc1NDkxNiwiaWF0IjoxNTI5NzUxMzE2LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI1NDRkYWZjMy02OGI5LTQ4ODgtOTFlZS00YjhjNGU0MWFkMDQiLCJub25jZSI6IjRuVHJEUlhKZ1k1bEp1eE4iLCJyYXQiOjE1Mjk3NTEzMTQsInN1YiI6ImZvb0BiYXIuY29tIn0.p6WwJ-4MTEVnh7OAeiJKwE8sMQt1aAdJEDRLRg1JUxlBaw8rtSYGiXmrcUUTOTHqhKSK765bRIzU1sPgzrRsY7prxLmy7qlXLWiWb6neA5AmVV5NgI7qasptyZe8HkNWHkCgquiqNrr7K77bKY-1DOo5HoreoEhCMnmzf9x3yIhFT06bNGzXRtIjN2g_NKhbAazL33PPPfD4cl3yTAvyPf7COr4xWGrDFHhBzeOKHrvtVqtogxFjlnIf05ECkbtnA5GRXrCBWVyXXtPF0-eGNYNQMVX2V4G7-eYzqeSf6wGCVyiOsqJ7p6G1MhNlHtfx5DNsyS64rrI6oQwLV8JwQw612RwU6UwV6sQYEqFX0hSqsUx4wm-NY3wmAKd64SCnPRbnyPT0GAtISgYJiyfpybcBEkrHrpd1W6aUHpV9y4LuGEyWMRWktMuXsCfUk93fM7JbMu9V5kLlNdDdhrB2vJFjlWepMNOppnNwwuWte50CFY6-CbXV1xYLGEDhGEYWzp_kCb-yn85KxhNlToYpxsPWYsm1Vs4ZhwVoMw1NMv0ejGyOoYhMrNCqqJSnsv0iQHLBeGv7TYxBxwR7JcAfAFTO0oKWeifcIR24yZZ-KZe6UorRFrGvRq6zHrKdUMz-Ea0pukwsVhBJwoDvFWnxmpKllvWDlV9KjmVYr91My-M&state=bcp3flDUeu1CIzUa
2.844 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMTE1NWZjOGQtNDM0OC00MDQ0LTllNzctZjgxOTJlY2ViMWVkIl0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiVVhQUTNNSDV4ZkZHb1ZyZm5jYU5WdyIsImV4cCI6MTUyOTc1NDkxNiwiaWF0IjoxNTI5NzUxMzE2LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI1NDRkYWZjMy02OGI5LTQ4ODgtOTFlZS00YjhjNGU0MWFkMDQiLCJub25jZSI6IjRuVHJEUlhKZ1k1bEp1eE4iLCJyYXQiOjE1Mjk3NTEzMTQsInN1YiI6ImZvb0BiYXIuY29tIn0.p6WwJ-4MTEVnh7OAeiJKwE8sMQt1aAdJEDRLRg1JUxlBaw8rtSYGiXmrcUUTOTHqhKSK765bRIzU1sPgzrRsY7prxLmy7qlXLWiWb6neA5AmVV5NgI7qasptyZe8HkNWHkCgquiqNrr7K77bKY-1DOo5HoreoEhCMnmzf9x3yIhFT06bNGzXRtIjN2g_NKhbAazL33PPPfD4cl3yTAvyPf7COr4xWGrDFHhBzeOKHrvtVqtogxFjlnIf05ECkbtnA5GRXrCBWVyXXtPF0-eGNYNQMVX2V4G7-eYzqeSf6wGCVyiOsqJ7p6G1MhNlHtfx5DNsyS64rrI6oQwLV8JwQw612RwU6UwV6sQYEqFX0hSqsUx4wm-NY3wmAKd64SCnPRbnyPT0GAtISgYJiyfpybcBEkrHrpd1W6aUHpV9y4LuGEyWMRWktMuXsCfUk93fM7JbMu9V5kLlNdDdhrB2vJFjlWepMNOppnNwwuWte50CFY6-CbXV1xYLGEDhGEYWzp_kCb-yn85KxhNlToYpxsPWYsm1Vs4ZhwVoMw1NMv0ejGyOoYhMrNCqqJSnsv0iQHLBeGv7TYxBxwR7JcAfAFTO0oKWeifcIR24yZZ-KZe6UorRFrGvRq6zHrKdUMz-Ea0pukwsVhBJwoDvFWnxmpKllvWDlV9KjmVYr91My-M', 'state': 'bcp3flDUeu1CIzUa', 'code': 'vESnTEvB2RqnBy52joTACNu_OLB3JbyDwx5qYgvwwFo.jfFd-9HAOYPlrfRTIaeDSj2xXCG2uV4yudtZ7lDAC84'}
2.921 AuthorizationResponse {
"code": "vESnTEvB2RqnBy52joTACNu_OLB3JbyDwx5qYgvwwFo.jfFd-9HAOYPlrfRTIaeDSj2xXCG2uV4yudtZ7lDAC84",
"id_token": {
"aud": [
"1155fc8d-4348-4044-9e77-f8192eceb1ed"
],
"auth_time": 1529751224,
"c_hash": "UXPQ3MH5xfFGoVrfncaNVw",
"exp": 1529754916,
"iat": 1529751316,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "544dafc3-68b9-4888-91ee-4b8c4e41ad04",
"nonce": "4nTrDRXJgY5lJuxN",
"rat": 1529751314,
"sub": "[email protected]"
},
"state": "bcp3flDUeu1CIzUa"
}
2.921 phase <--<-- 4 --- Done -->-->
2.921 end
2.922 assertion VerifyAuthnOrErrorResponse
2.922 condition authn-response-or-error: status=OK [Checks that the last response was a JSON encoded authentication or error message]
2.922 condition Done: status=OK
============================================================
Conditions
authn-response-or-error: status=OK [Checks that the last response was a JSON encoded authentication or error message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-OAuth-2nd-30s.txt 0000644 0000000 0000000 00000036507 13313423671 014350 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-OAuth-2nd-30s
Test description: Trying to use authorization code twice with 30 seconds in between uses must result in an error
Timestamp: 2018-06-23T10:58:01Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.612 phase <--<-- 1 --- Webfinger -->-->
1.612 not expected to do WebFinger
1.612 phase <--<-- 2 --- Discovery -->-->
1.612 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.686 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.687 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.687 phase <--<-- 3 --- Registration -->-->
1.687 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.688 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#WiniNJcSizOs2U5E"
],
"response_types": [
"code id_token"
]
}
1.842 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.843 RegistrationResponse {
"client_id": "adf05591-2b56-4a8a-8976-3fc1be0ecb21",
"client_secret": "CLE.9RwqRr_c",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "adf05591-2b56-4a8a-8976-3fc1be0ecb21",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#WiniNJcSizOs2U5E"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.843 phase <--<-- 4 --- AsyncAuthn -->-->
1.844 AuthorizationRequest {
"client_id": "adf05591-2b56-4a8a-8976-3fc1be0ecb21",
"nonce": "sy1RktaY5R0gMiI0",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "jPDgZXb8TbQXiSq2"
}
1.844 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=adf05591-2b56-4a8a-8976-3fc1be0ecb21&state=jPDgZXb8TbQXiSq2&response_type=code+id_token&nonce=sy1RktaY5R0gMiI0
1.844 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=adf05591-2b56-4a8a-8976-3fc1be0ecb21&state=jPDgZXb8TbQXiSq2&response_type=code+id_token&nonce=sy1RktaY5R0gMiI0
5.114 http args {}
5.281 response URL with fragment
5.282 response code=w03NmGVbjm0FjgcfJm4187EME21tpTSMMIC2OOZW_Pk.-i1OlNCMgHs5joAJxnjiln8CdnBg42ZljPag0hboEQs&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYWRmMDU1OTEtMmI1Ni00YThhLTg5NzYtM2ZjMWJlMGVjYjIxIl0sImF1dGhfdGltZSI6MTUyOTc1MTQwOSwiY19oYXNoIjoiQWN0Q2E3Ui15SGNXTFA3TXI4bUtmQSIsImV4cCI6MTUyOTc1NTA1MCwiaWF0IjoxNTI5NzUxNDUwLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiIzYzAzNWVmMi04MmFjLTQ5N2EtYWE5NS0xZWY0NjVlMDU2MTciLCJub25jZSI6InN5MVJrdGFZNVIwZ01pSTAiLCJyYXQiOjE1Mjk3NTE0NDcsInN1YiI6ImZvb0BiYXIuY29tIn0.FHiQFXkWDyGLQWpkHbUitSYQVFikvyxA6YgHC7s6P-Wapn58IjuiCgeP1u4M4-it3u5ax6j0__w0UTEB_TeOmn2UUREPP0n-bVtr4RyoOmFoAlYxIbloFXvFaSoAJ_bJzLFTDfTcwP4ap2Ovwe5Py-Xp-QZLz3dR1PZyD77lXZXU1i46JB36simthctlNhrUmGLUeQOl3fbtDPFLhS1Y6tKSquhkxCJ4lqRgDQTHWQMBrFrFoJ01k6j2sBWMhYHI5A7OOsXe8HEftCxJtq5RqCXAl85GdUkRsEDhFax7o79taepnWbtjqNw3pAv92VFHsH8NfgnakgZz71dwCD2S_F9fSekzi4ska5Qp8EbCQMU69zDpi3kGLygekyGORSRm5i5huLw3IttVBz2aJT87Lj-uhHHxRtY8xXBDXzClv9Ee3Jv57LT11QnazZG19BUj2z-AetvdfFbc_shzkk_diJZnNFDWbYTmXapwd4t1WF-dXRb-5vFarFPclKweRBDEMvMuWn0K0IK5yMSUjBEsJBzTTGPWQyccddF9HqZoCqpa8_tZhjniCEq_cCHAc_5jmKR44-xhOiMZUoajGGfmZj1LXvbV0kKzFPR5SdvAsxOiYQPu044t6WBItE0eFS6PSwOU64fJuxhX6Ujd6nmO2Ur9Doq_ITR1mcNRzfEe_9E&state=jPDgZXb8TbQXiSq2
5.282 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYWRmMDU1OTEtMmI1Ni00YThhLTg5NzYtM2ZjMWJlMGVjYjIxIl0sImF1dGhfdGltZSI6MTUyOTc1MTQwOSwiY19oYXNoIjoiQWN0Q2E3Ui15SGNXTFA3TXI4bUtmQSIsImV4cCI6MTUyOTc1NTA1MCwiaWF0IjoxNTI5NzUxNDUwLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiIzYzAzNWVmMi04MmFjLTQ5N2EtYWE5NS0xZWY0NjVlMDU2MTciLCJub25jZSI6InN5MVJrdGFZNVIwZ01pSTAiLCJyYXQiOjE1Mjk3NTE0NDcsInN1YiI6ImZvb0BiYXIuY29tIn0.FHiQFXkWDyGLQWpkHbUitSYQVFikvyxA6YgHC7s6P-Wapn58IjuiCgeP1u4M4-it3u5ax6j0__w0UTEB_TeOmn2UUREPP0n-bVtr4RyoOmFoAlYxIbloFXvFaSoAJ_bJzLFTDfTcwP4ap2Ovwe5Py-Xp-QZLz3dR1PZyD77lXZXU1i46JB36simthctlNhrUmGLUeQOl3fbtDPFLhS1Y6tKSquhkxCJ4lqRgDQTHWQMBrFrFoJ01k6j2sBWMhYHI5A7OOsXe8HEftCxJtq5RqCXAl85GdUkRsEDhFax7o79taepnWbtjqNw3pAv92VFHsH8NfgnakgZz71dwCD2S_F9fSekzi4ska5Qp8EbCQMU69zDpi3kGLygekyGORSRm5i5huLw3IttVBz2aJT87Lj-uhHHxRtY8xXBDXzClv9Ee3Jv57LT11QnazZG19BUj2z-AetvdfFbc_shzkk_diJZnNFDWbYTmXapwd4t1WF-dXRb-5vFarFPclKweRBDEMvMuWn0K0IK5yMSUjBEsJBzTTGPWQyccddF9HqZoCqpa8_tZhjniCEq_cCHAc_5jmKR44-xhOiMZUoajGGfmZj1LXvbV0kKzFPR5SdvAsxOiYQPu044t6WBItE0eFS6PSwOU64fJuxhX6Ujd6nmO2Ur9Doq_ITR1mcNRzfEe_9E', 'state': 'jPDgZXb8TbQXiSq2', 'code': 'w03NmGVbjm0FjgcfJm4187EME21tpTSMMIC2OOZW_Pk.-i1OlNCMgHs5joAJxnjiln8CdnBg42ZljPag0hboEQs'}
5.407 AuthorizationResponse {
"code": "w03NmGVbjm0FjgcfJm4187EME21tpTSMMIC2OOZW_Pk.-i1OlNCMgHs5joAJxnjiln8CdnBg42ZljPag0hboEQs",
"id_token": {
"aud": [
"adf05591-2b56-4a8a-8976-3fc1be0ecb21"
],
"auth_time": 1529751409,
"c_hash": "ActCa7R-yHcWLP7Mr8mKfA",
"exp": 1529755050,
"iat": 1529751450,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "3c035ef2-82ac-497a-aa95-1ef465e05617",
"nonce": "sy1RktaY5R0gMiI0",
"rat": 1529751447,
"sub": "[email protected]"
},
"state": "jPDgZXb8TbQXiSq2"
}
5.408 phase <--<-- 5 --- AccessToken -->-->
5.408 --> request op_args: {'state': 'jPDgZXb8TbQXiSq2'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
5.408 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'jPDgZXb8TbQXiSq2', 'code': 'w03NmGVbjm0FjgcfJm4187EME21tpTSMMIC2OOZW_Pk.-i1OlNCMgHs5joAJxnjiln8CdnBg42ZljPag0hboEQs', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'adf05591-2b56-4a8a-8976-3fc1be0ecb21'}, 'state': 'jPDgZXb8TbQXiSq2'}
5.408 AccessTokenRequest {
"code": "w03NmGVbjm0FjgcfJm4187EME21tpTSMMIC2OOZW_Pk.-i1OlNCMgHs5joAJxnjiln8CdnBg42ZljPag0hboEQs",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "jPDgZXb8TbQXiSq2"
}
5.408 request_url https://oidc-certification.ory.sh:8443/oauth2/token
5.408 request_http_args {'headers': {'Authorization': 'Basic YWRmMDU1OTEtMmI1Ni00YThhLTg5NzYtM2ZjMWJlMGVjYjIxOkNMRS45UndxUnJfYw==', 'Content-Type': 'application/x-www-form-urlencoded'}}
5.408 request code=w03NmGVbjm0FjgcfJm4187EME21tpTSMMIC2OOZW_Pk.-i1OlNCMgHs5joAJxnjiln8CdnBg42ZljPag0hboEQs&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=jPDgZXb8TbQXiSq2
5.627 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
5.628 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYWRmMDU1OTEtMmI1Ni00YThhLTg5NzYtM2ZjMWJlMGVjYjIxIl0sImF1dGhfdGltZSI6MTUyOTc1MTQwOSwiY19oYXNoIjoiQWN0Q2E3Ui15SGNXTFA3TXI4bUtmQSIsImV4cCI6MTUyOTc1NTA1MCwiaWF0IjoxNTI5NzUxNDUxLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI3YzAxMjQ5Zi1iZDU3LTQ4NGEtOTQ5My1mYzgxZWJlZGNiYTYiLCJub25jZSI6InN5MVJrdGFZNVIwZ01pSTAiLCJyYXQiOjE1Mjk3NTE0NDcsInN1YiI6ImZvb0BiYXIuY29tIn0.kFLyzPL6WtWU_APV8Soqt-kmuAK7_aeBfYIA_vtcrtK3HBayYX1aRSgR--rqHaXxBWWgyIXzBp8iz7bhUC3Uqen3yYKk5UKCiH4xNmnI5Y-SmxEwWDEbaMm4yT1K67T-WFagHPw9lQib9YWzOtzy2w2GZKVXqmLbNWN4Udpo_Lsk2rgn9ZqFvNJDL9XplKD2-tVZKRNU7YawTWEDs5vCH51tC2BEiP79msapuD0-SgmTsSzLF1uMHgaT0Afi2vG7ANFhBlwWFSDMT8DsC-tJk1k6M0d_QOLT5O3BKGsHuDuJcWb7DmgDNihLBsJv2MsyyP6QUVEH_hreyrinGrIwA1BLImFK4uULzsuqhHN3I39yi5huYjIbjaxwqi4uzwlz7RVt0o2L9V1UjGNLBIudS82mu7HPRBbxU0E5yvQ0ir0ForlYYr7XOphqzaqTo9zDEkdH-80qRYWoJtGzacRXvGEw1kwSk5XZPlC36UK_UHhjw5YW8PjglQtRZU7jawsdjX0C9WhzEHdW0A9zFlQXPl9kPiN5BDd7d0mquTElvjdhlkOqYCRUZBR_5m5kcBswxDKOUDOhvwbWS9XS3lc9ivU3SRRKiW3ursGlmsDTHFGwTSGfGDT-pMlhLmT0MwJaj8dfdPD7iDCJiwNlS3GzY25EOdTburwv2VffROs-71Y', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': '6ktl-BPY_8OEA_Wt3weiczgOEzQaXWVsJfN8V8pBLbg.rXw1l6WXJvoZyUmcSSpAnEL5xkmrOLg72_DZb7GJzw0', 'scope': 'openid'}
5.631 AccessTokenResponse {
"access_token": "6ktl-BPY_8OEA_Wt3weiczgOEzQaXWVsJfN8V8pBLbg.rXw1l6WXJvoZyUmcSSpAnEL5xkmrOLg72_DZb7GJzw0",
"expires_in": 3599,
"id_token": {
"aud": [
"adf05591-2b56-4a8a-8976-3fc1be0ecb21"
],
"auth_time": 1529751409,
"c_hash": "ActCa7R-yHcWLP7Mr8mKfA",
"exp": 1529755050,
"iat": 1529751451,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "7c01249f-bd57-484a-9493-fc81ebedcba6",
"nonce": "sy1RktaY5R0gMiI0",
"rat": 1529751447,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
5.631 phase <--<-- 6 --- TimeDelay -->-->
35.632 phase <--<-- 7 --- AccessToken -->-->
35.632 --> request op_args: {'state': 'jPDgZXb8TbQXiSq2'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
35.632 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'jPDgZXb8TbQXiSq2', 'code': 'w03NmGVbjm0FjgcfJm4187EME21tpTSMMIC2OOZW_Pk.-i1OlNCMgHs5joAJxnjiln8CdnBg42ZljPag0hboEQs', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'adf05591-2b56-4a8a-8976-3fc1be0ecb21'}, 'state': 'jPDgZXb8TbQXiSq2'}
35.632 AccessTokenRequest {
"code": "w03NmGVbjm0FjgcfJm4187EME21tpTSMMIC2OOZW_Pk.-i1OlNCMgHs5joAJxnjiln8CdnBg42ZljPag0hboEQs",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "jPDgZXb8TbQXiSq2"
}
35.632 request_url https://oidc-certification.ory.sh:8443/oauth2/token
35.632 request_http_args {'headers': {'Authorization': 'Basic YWRmMDU1OTEtMmI1Ni00YThhLTg5NzYtM2ZjMWJlMGVjYjIxOkNMRS45UndxUnJfYw==', 'Content-Type': 'application/x-www-form-urlencoded'}}
35.632 request code=w03NmGVbjm0FjgcfJm4187EME21tpTSMMIC2OOZW_Pk.-i1OlNCMgHs5joAJxnjiln8CdnBg42ZljPag0hboEQs&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=jPDgZXb8TbQXiSq2
35.826 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:400 message:{"error":"invalid_grant","error_description":"The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client","status_code":400,"error_debug":"The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found."}
35.827 response {'error_debug': 'The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found.', 'error_description': 'The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client', 'error': 'invalid_grant', 'status_code': 400}
35.827 event Got expected error
35.827 TokenErrorResponse {
"error": "invalid_grant",
"error_debug": "The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found.",
"error_description": "The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client",
"status_code": 400
}
35.827 phase <--<-- 8 --- Done -->-->
35.827 end
35.828 assertion VerifyResponse
35.828 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
35.828 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Registration-policy_uri.txt 0000644 0000000 0000000 00000022361 13313423131 017052 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-policy_uri
Test description: Registration with policy_uri
Timestamp: 2018-06-23T10:52:09Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
0.973 phase <--<-- 1 --- Webfinger -->-->
0.973 not expected to do WebFinger
0.973 phase <--<-- 2 --- Discovery -->-->
0.973 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.045 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.046 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.046 phase <--<-- 3 --- Registration -->-->
1.046 register kwargs:{'application_name': 'OIC test tool', 'policy_uri': 'https://op.certification.openid.net:61353/static/policy.html', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.046 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"policy_uri": "https://op.certification.openid.net:61353/static/policy.html",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#cQrGkepzGoGYcnGE"
],
"response_types": [
"code id_token"
]
}
1.203 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.204 RegistrationResponse {
"client_id": "6d71b7a0-3c08-419a-942a-78e51cdecfa7",
"client_secret": "u-ab2~MAcEcH",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "6d71b7a0-3c08-419a-942a-78e51cdecfa7",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"policy_uri": "https://op.certification.openid.net:61353/static/policy.html",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#cQrGkepzGoGYcnGE"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.204 phase <--<-- 4 --- AsyncAuthn -->-->
1.204 AuthorizationRequest {
"client_id": "6d71b7a0-3c08-419a-942a-78e51cdecfa7",
"nonce": "iD1IXQU1BJgcRM44",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "shfxg976csqrYGvq"
}
1.204 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=6d71b7a0-3c08-419a-942a-78e51cdecfa7&state=shfxg976csqrYGvq&response_type=code+id_token&nonce=iD1IXQU1BJgcRM44
1.204 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=6d71b7a0-3c08-419a-942a-78e51cdecfa7&state=shfxg976csqrYGvq&response_type=code+id_token&nonce=iD1IXQU1BJgcRM44
3.48 http args {}
3.697 response URL with fragment
3.697 response code=JRDNBAFsJUiwlkKo40dyhH8m7bDM5riLH40YpMHlXAU.KVrdJkHVSkYPgQdNXi-7SYI6DLvlez-BU3ABrnlfU9U&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNmQ3MWI3YTAtM2MwOC00MTlhLTk0MmEtNzhlNTFjZGVjZmE3Il0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiQTZhVkJPWmhiT3drOGlXUnprZks5USIsImV4cCI6MTUyOTc1NDcyOSwiaWF0IjoxNTI5NzUxMTI5LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI0NmI4OGU3Mi1kNjJlLTQ3ZGMtYjYzYi02YmJmZjQ3YmQwZjAiLCJub25jZSI6ImlEMUlYUVUxQkpnY1JNNDQiLCJyYXQiOjE1Mjk3NTExMjcsInN1YiI6ImZvb0BiYXIuY29tIn0.K8dSdF7ru5Ivcet6NeqZOOoMLRqxaaq08iYfpkbk0n6Vr1mcpI3BfTx0hwHS56g9jKc63qlTkZ0o3dn30oV0eaKMfLoioYGj8hhQX09osx-E45TQMGnecHJOH_psYjTwBewpOiwKyWIQZ0TE4qJfPE3qIzBO8aQKayI0PJC_7jNCDvLF32lL82kuKKyaDNer_UU_hhOMf8Yh_IAvB4qa1iBUYSCm7FqhZ8KRDu1Cw4QChveXCC_dm4ex6Df--xiAmxeRz6WekwTSFGLCOUiy6dDg7k4ih_MvHyHWGDXe5SegPWuztR2IpSgj7b2eo2duTbXZR3x383mk07_fU5FwDNM_ZfHCI4aQcASUbbIwIX7tdG6SQzCPPZs7Mff4kbZOHZct_bI6HHstDM9z_V5_6R042HjMUZF50O7feWf5lgdkQyvTj9AkrYhdgpDvbryH0R8vMZ65LrPRELCSJ3feQsXtb6gLXBVVw4EpS2LMbBVXQ_7i8K4rBK_E-zDpfCiI9AyWy8y6BdQWxP4zkrn1OGzGzIOF26pxzlFE-TQXhsoJ_MAiUCXVvkOU0PFWWjxmraa_4fyVuh1x_x82k81wAbDZ7Kd8W4WcMyauQEXmJhv0whLYAx6WhX_tql4R_kPQ1vyMIcPvOpI2MbHpahLsOx-omElvvgDl8xciuY0fbyU&state=shfxg976csqrYGvq
3.698 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNmQ3MWI3YTAtM2MwOC00MTlhLTk0MmEtNzhlNTFjZGVjZmE3Il0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiQTZhVkJPWmhiT3drOGlXUnprZks5USIsImV4cCI6MTUyOTc1NDcyOSwiaWF0IjoxNTI5NzUxMTI5LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI0NmI4OGU3Mi1kNjJlLTQ3ZGMtYjYzYi02YmJmZjQ3YmQwZjAiLCJub25jZSI6ImlEMUlYUVUxQkpnY1JNNDQiLCJyYXQiOjE1Mjk3NTExMjcsInN1YiI6ImZvb0BiYXIuY29tIn0.K8dSdF7ru5Ivcet6NeqZOOoMLRqxaaq08iYfpkbk0n6Vr1mcpI3BfTx0hwHS56g9jKc63qlTkZ0o3dn30oV0eaKMfLoioYGj8hhQX09osx-E45TQMGnecHJOH_psYjTwBewpOiwKyWIQZ0TE4qJfPE3qIzBO8aQKayI0PJC_7jNCDvLF32lL82kuKKyaDNer_UU_hhOMf8Yh_IAvB4qa1iBUYSCm7FqhZ8KRDu1Cw4QChveXCC_dm4ex6Df--xiAmxeRz6WekwTSFGLCOUiy6dDg7k4ih_MvHyHWGDXe5SegPWuztR2IpSgj7b2eo2duTbXZR3x383mk07_fU5FwDNM_ZfHCI4aQcASUbbIwIX7tdG6SQzCPPZs7Mff4kbZOHZct_bI6HHstDM9z_V5_6R042HjMUZF50O7feWf5lgdkQyvTj9AkrYhdgpDvbryH0R8vMZ65LrPRELCSJ3feQsXtb6gLXBVVw4EpS2LMbBVXQ_7i8K4rBK_E-zDpfCiI9AyWy8y6BdQWxP4zkrn1OGzGzIOF26pxzlFE-TQXhsoJ_MAiUCXVvkOU0PFWWjxmraa_4fyVuh1x_x82k81wAbDZ7Kd8W4WcMyauQEXmJhv0whLYAx6WhX_tql4R_kPQ1vyMIcPvOpI2MbHpahLsOx-omElvvgDl8xciuY0fbyU', 'state': 'shfxg976csqrYGvq', 'code': 'JRDNBAFsJUiwlkKo40dyhH8m7bDM5riLH40YpMHlXAU.KVrdJkHVSkYPgQdNXi-7SYI6DLvlez-BU3ABrnlfU9U'}
3.777 AuthorizationResponse {
"code": "JRDNBAFsJUiwlkKo40dyhH8m7bDM5riLH40YpMHlXAU.KVrdJkHVSkYPgQdNXi-7SYI6DLvlez-BU3ABrnlfU9U",
"id_token": {
"aud": [
"6d71b7a0-3c08-419a-942a-78e51cdecfa7"
],
"auth_time": 1529750975,
"c_hash": "A6aVBOZhbOwk8iWRzkfK9Q",
"exp": 1529754729,
"iat": 1529751129,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "46b88e72-d62e-47dc-b63b-6bbff47bd0f0",
"nonce": "iD1IXQU1BJgcRM44",
"rat": 1529751127,
"sub": "[email protected]"
},
"state": "shfxg976csqrYGvq"
}
3.777 phase <--<-- 5 --- Done -->-->
3.777 end
3.777 assertion VerifyAuthnResponse
3.778 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
3.778 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-claims-essential.txt 0000644 0000000 0000000 00000033253 13313423217 015470 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-claims-essential
Test description: Claims request with essential name claim
Timestamp: 2018-06-23T10:53:03Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.071 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.073 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.073 phase <--<-- 2 --- Registration -->-->
0.073 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.073 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#p1FlzphpgFkJTQ9L"
],
"response_types": [
"code id_token"
]
}
0.234 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.235 RegistrationResponse {
"client_id": "6b484614-5af7-49c6-ae42-a76478fbb424",
"client_secret": "rtu0jUVDvre~",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "6b484614-5af7-49c6-ae42-a76478fbb424",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#p1FlzphpgFkJTQ9L"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.235 phase <--<-- 3 --- AsyncAuthn -->-->
0.235 AuthorizationRequest {
"claims": {
"userinfo": {
"name": {
"essential": true
}
}
},
"client_id": "6b484614-5af7-49c6-ae42-a76478fbb424",
"nonce": "hGQrxOFXkpRg5qBW",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "aSft07CSxD12s7FU"
}
0.236 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=6b484614-5af7-49c6-ae42-a76478fbb424&claims=%7B%22userinfo%22%3A+%7B%22name%22%3A+%7B%22essential%22%3A+true%7D%7D%7D&state=aSft07CSxD12s7FU&response_type=code+id_token&nonce=hGQrxOFXkpRg5qBW
0.236 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=6b484614-5af7-49c6-ae42-a76478fbb424&claims=%7B%22userinfo%22%3A+%7B%22name%22%3A+%7B%22essential%22%3A+true%7D%7D%7D&state=aSft07CSxD12s7FU&response_type=code+id_token&nonce=hGQrxOFXkpRg5qBW
2.849 http args {}
3.054 response URL with fragment
3.054 response code=AeenAWqYKEvY7aoVbji4SZub_GBBiYQmZaNHkD0f93M.VBUUXzdY2ZY9IcivvERFcZHG-rGjJHEc4rzreg94h3Y&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNmI0ODQ2MTQtNWFmNy00OWM2LWFlNDItYTc2NDc4ZmJiNDI0Il0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiMXVhV3RUcWNiUnVOTlVlaWVyUjdrUSIsImV4cCI6MTUyOTc1NDc4MiwiaWF0IjoxNTI5NzUxMTgyLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJhOWNlOTNkMi1mZWNhLTQxYjQtOTVlMS1jN2Q4ODkyZjk0YjQiLCJub25jZSI6ImhHUXJ4T0ZYa3BSZzVxQlciLCJyYXQiOjE1Mjk3NTExODAsInN1YiI6ImZvb0BiYXIuY29tIn0.Jm8LXjo7CWFylxo-Os7yKMThZuNPRpV0NEmDfk5bXuq3O7LFEEZgtoIPgprp0SlCynyqEMBXi1oNW5FhGcdBIaacpFGIMp7oEv8uXSA_yxMHZirBt4w8F534AddRYhxtHtDd-84V5jYnp03X5RMVOEJlieHTajLaJwBHCFOs1uRwifEnAxTMxSvmHQ8OOPApaWlAq4dh1RYk3j7zcU1UbR9rjmRik1I3trcjhYGRqTifvCeabbsOivmBHi8ZRYqFaPyKC0wt0Vljg-DBLwbya_4RQdQtvCimJzNCPSN7hxZe5g1F4FkmKKgw1baM4hcfPkElA-zWvfEM7ZY7R59TH4rDB-jXv5F9FB54v-_pTt86Szo6FdOpkqoaD6iJjYyD1tgIquMVT2r9sqv6ZvfSGxAf2AYvmBKATzShwcVXS_d1tsfDPzOPhZyWFJjqYM0864Q4zEw6CJPP8g-5-xXZNjzg2urCgcb6K230le8-LHRPENL_w0RQvBqodJ2IPhdpJkVTa6EVyY0EHuTnzxWdiJjyyVAbwcmUDLjvhBfGRUyMAKoBbx_5nO2NTwqVAeWknjrCKDy6rE2MGI-4zr42a9Iprd2UXrnd6rycoRymevkI5VbkLx_jXwKml6-cDcKWV3u1yFakdyKj18me3WCkuVXIuJWTQRJLhqfLZb1b_kg&state=aSft07CSxD12s7FU
3.054 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNmI0ODQ2MTQtNWFmNy00OWM2LWFlNDItYTc2NDc4ZmJiNDI0Il0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiMXVhV3RUcWNiUnVOTlVlaWVyUjdrUSIsImV4cCI6MTUyOTc1NDc4MiwiaWF0IjoxNTI5NzUxMTgyLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJhOWNlOTNkMi1mZWNhLTQxYjQtOTVlMS1jN2Q4ODkyZjk0YjQiLCJub25jZSI6ImhHUXJ4T0ZYa3BSZzVxQlciLCJyYXQiOjE1Mjk3NTExODAsInN1YiI6ImZvb0BiYXIuY29tIn0.Jm8LXjo7CWFylxo-Os7yKMThZuNPRpV0NEmDfk5bXuq3O7LFEEZgtoIPgprp0SlCynyqEMBXi1oNW5FhGcdBIaacpFGIMp7oEv8uXSA_yxMHZirBt4w8F534AddRYhxtHtDd-84V5jYnp03X5RMVOEJlieHTajLaJwBHCFOs1uRwifEnAxTMxSvmHQ8OOPApaWlAq4dh1RYk3j7zcU1UbR9rjmRik1I3trcjhYGRqTifvCeabbsOivmBHi8ZRYqFaPyKC0wt0Vljg-DBLwbya_4RQdQtvCimJzNCPSN7hxZe5g1F4FkmKKgw1baM4hcfPkElA-zWvfEM7ZY7R59TH4rDB-jXv5F9FB54v-_pTt86Szo6FdOpkqoaD6iJjYyD1tgIquMVT2r9sqv6ZvfSGxAf2AYvmBKATzShwcVXS_d1tsfDPzOPhZyWFJjqYM0864Q4zEw6CJPP8g-5-xXZNjzg2urCgcb6K230le8-LHRPENL_w0RQvBqodJ2IPhdpJkVTa6EVyY0EHuTnzxWdiJjyyVAbwcmUDLjvhBfGRUyMAKoBbx_5nO2NTwqVAeWknjrCKDy6rE2MGI-4zr42a9Iprd2UXrnd6rycoRymevkI5VbkLx_jXwKml6-cDcKWV3u1yFakdyKj18me3WCkuVXIuJWTQRJLhqfLZb1b_kg', 'state': 'aSft07CSxD12s7FU', 'code': 'AeenAWqYKEvY7aoVbji4SZub_GBBiYQmZaNHkD0f93M.VBUUXzdY2ZY9IcivvERFcZHG-rGjJHEc4rzreg94h3Y'}
3.148 AuthorizationResponse {
"code": "AeenAWqYKEvY7aoVbji4SZub_GBBiYQmZaNHkD0f93M.VBUUXzdY2ZY9IcivvERFcZHG-rGjJHEc4rzreg94h3Y",
"id_token": {
"aud": [
"6b484614-5af7-49c6-ae42-a76478fbb424"
],
"auth_time": 1529750975,
"c_hash": "1uaWtTqcbRuNNUeierR7kQ",
"exp": 1529754782,
"iat": 1529751182,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "a9ce93d2-feca-41b4-95e1-c7d8892f94b4",
"nonce": "hGQrxOFXkpRg5qBW",
"rat": 1529751180,
"sub": "[email protected]"
},
"state": "aSft07CSxD12s7FU"
}
3.148 phase <--<-- 4 --- AccessToken -->-->
3.148 --> request op_args: {'state': 'aSft07CSxD12s7FU'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.148 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'aSft07CSxD12s7FU', 'code': 'AeenAWqYKEvY7aoVbji4SZub_GBBiYQmZaNHkD0f93M.VBUUXzdY2ZY9IcivvERFcZHG-rGjJHEc4rzreg94h3Y', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '6b484614-5af7-49c6-ae42-a76478fbb424'}, 'state': 'aSft07CSxD12s7FU'}
3.148 AccessTokenRequest {
"code": "AeenAWqYKEvY7aoVbji4SZub_GBBiYQmZaNHkD0f93M.VBUUXzdY2ZY9IcivvERFcZHG-rGjJHEc4rzreg94h3Y",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "aSft07CSxD12s7FU"
}
3.149 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.149 request_http_args {'headers': {'Authorization': 'Basic NmI0ODQ2MTQtNWFmNy00OWM2LWFlNDItYTc2NDc4ZmJiNDI0OnJ0dTBqVVZEdnJlJTdF', 'Content-Type': 'application/x-www-form-urlencoded'}}
3.149 request code=AeenAWqYKEvY7aoVbji4SZub_GBBiYQmZaNHkD0f93M.VBUUXzdY2ZY9IcivvERFcZHG-rGjJHEc4rzreg94h3Y&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=aSft07CSxD12s7FU
3.362 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.363 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNmI0ODQ2MTQtNWFmNy00OWM2LWFlNDItYTc2NDc4ZmJiNDI0Il0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiMXVhV3RUcWNiUnVOTlVlaWVyUjdrUSIsImV4cCI6MTUyOTc1NDc4MiwiaWF0IjoxNTI5NzUxMTgzLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJkOGM5MWRhNS0xOWE2LTRiOWUtYTk5Zi04NDgwMWJjNWM1MTAiLCJub25jZSI6ImhHUXJ4T0ZYa3BSZzVxQlciLCJyYXQiOjE1Mjk3NTExODAsInN1YiI6ImZvb0BiYXIuY29tIn0.PiPf7iaNPDC14NqsrfzGLjuZAe9c2AQ4oPCcVqjeBGOoGxvmLwi-YnkfRJJjaTzWCivm6NymNZq7gP7br2i-ID0Cgn0Ox-tcZ6HX_De438Easw-TU1HZOnkxLVb6nWYwkBTGrrPxcO7YzxJAQ5p0xkAI48q329WOleKxjK6d63euvmjB4M8pimCZgT-EseyYQOFzqu4lAn7_pwf7qKoHFa1_98b1n5g2Snn295w9gwgEJksFzmCVRYtR18d7MtEO8YnGPZANUTLD6jVyGCWrIMkm7gAC9WRJCa-Jb8MxQeoGXaJuskv0i6iBkEW0pdKowF5uPvUJBk0cVoCi3NcHOUYjBLuYqp0eO9wy8RUpEeB-eUsrvIjBVDgsYwNmQiJ4IC24T5kiJCEh74Sl_qlWJdkIjm-LbRrL_AmQp4Ftr85NoJIiidZ56XwoPer_Pa6s3w7sfcG6tZJ0NZxoYsuUSGIJo7reVYWCb9D8cJ6HxVe9djc7vPUjYFYfQRl1Z3LFKHQJYv05sR9dLDvdfroOEwCGywScwLneQZlmGedY7iiQzloZSvhwGx3n15gsGOO1giSmpuzt2CcF1a6aV6dR1Ww-IsIhNfrQUiF-QluwV4Lh-T5gZqZ2GF-HhPOTJrD74Fs2-UG90ehtKIaTIQQDDRUAmAqo26-83ucq9G-DwwQ', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'AG9sIqwGoZjt7hjPO_mDZwG7UNbwFlg35okGl9KOd_c.YVmddbnx1l8m8SE0gpFEGAT0e87CEieQpyvYWYZbUhk', 'scope': 'openid'}
3.366 AccessTokenResponse {
"access_token": "AG9sIqwGoZjt7hjPO_mDZwG7UNbwFlg35okGl9KOd_c.YVmddbnx1l8m8SE0gpFEGAT0e87CEieQpyvYWYZbUhk",
"expires_in": 3599,
"id_token": {
"aud": [
"6b484614-5af7-49c6-ae42-a76478fbb424"
],
"auth_time": 1529750975,
"c_hash": "1uaWtTqcbRuNNUeierR7kQ",
"exp": 1529754782,
"iat": 1529751183,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "d8c91da5-19a6-4b9e-a99f-84801bc5c510",
"nonce": "hGQrxOFXkpRg5qBW",
"rat": 1529751180,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.366 phase <--<-- 5 --- UserInfo -->-->
3.366 do_user_info_request kwargs:{'state': 'aSft07CSxD12s7FU', 'method': 'GET', 'authn_method': 'bearer_header'}
3.366 request {'body': None}
3.366 request_url https://oidc-certification.ory.sh:8443/userinfo
3.367 request_http_args {'headers': {'Authorization': 'Bearer AG9sIqwGoZjt7hjPO_mDZwG7UNbwFlg35okGl9KOd_c.YVmddbnx1l8m8SE0gpFEGAT0e87CEieQpyvYWYZbUhk'}}
3.44 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
3.441 OpenIDSchema {
"sub": "[email protected]"
}
3.441 OpenIDSchema {
"sub": "[email protected]"
}
3.441 phase <--<-- 6 --- Done -->-->
3.441 end
3.442 assertion VerifyClaims
3.442 condition verify-claims: status=WARNING, message=Missing required claim: name [Verifies that the claims returned as UserInfo or in the ID Token is consistent with what was asked for]
3.442 assertion CheckHTTPResponse
3.442 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
3.442 condition Done: status=OK
============================================================
Conditions
verify-claims: status=WARNING, message=Missing required claim: name [Verifies that the claims returned as UserInfo or in the ID Token is consistent with what was asked for]
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
Missing required claim: name
./OP-prompt-none-LoggedIn.txt 0000644 0000000 0000000 00000050211 13313423312 016164 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-prompt-none-LoggedIn
Test description: Request with prompt=none when logged in [Basic, Implicit, Hybrid]
Timestamp: 2018-06-23T10:54:02Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.097 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.099 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.099 phase <--<-- 2 --- Registration -->-->
0.099 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.099 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#NkcKPJB0Uqfnep4Z"
],
"response_types": [
"code id_token"
]
}
0.255 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.256 RegistrationResponse {
"client_id": "b0bdf4b9-46ef-43e9-b3a4-177178b27476",
"client_secret": ".ZiGUseli-mO",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "b0bdf4b9-46ef-43e9-b3a4-177178b27476",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#NkcKPJB0Uqfnep4Z"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.256 phase <--<-- 3 --- AsyncAuthn -->-->
0.257 AuthorizationRequest {
"client_id": "b0bdf4b9-46ef-43e9-b3a4-177178b27476",
"nonce": "ZsPHzQAabEkYHJWE",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "81KBgP18N8Y3c8yd"
}
0.257 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=b0bdf4b9-46ef-43e9-b3a4-177178b27476&state=81KBgP18N8Y3c8yd&response_type=code+id_token&nonce=ZsPHzQAabEkYHJWE
0.257 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=b0bdf4b9-46ef-43e9-b3a4-177178b27476&state=81KBgP18N8Y3c8yd&response_type=code+id_token&nonce=ZsPHzQAabEkYHJWE
2.84 http args {}
3.007 response URL with fragment
3.008 response code=QHTT0kKwVcFdHZ9NtoJCtDoCgKLobuURzbByUwI0l6w.U9emfknmq36eU-qrLXAXSs8BNGrIBYVKQP8yXEW90y4&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYjBiZGY0YjktNDZlZi00M2U5LWIzYTQtMTc3MTc4YjI3NDc2Il0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiSlk0OVlTa3hlRjU3dUIzQ1M5VGZndyIsImV4cCI6MTUyOTc1NDg0MCwiaWF0IjoxNTI5NzUxMjQwLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI0MjcwNDdlYi1kYjZlLTQ3MTEtOWM4My02YjQ3M2RlZjBiM2QiLCJub25jZSI6IlpzUEh6UUFhYkVrWUhKV0UiLCJyYXQiOjE1Mjk3NTEyMzgsInN1YiI6ImZvb0BiYXIuY29tIn0.WYmIxaHtZ1jZ92pS_lRvMqjq4GaFeePrNT_rxIU60giPQUrtulOJKBaJX12ngnPfG28WcGExjFq0nJp39ufcqV_CxldcTlbPZ1IingTVl-RPQYOXoy32zuap-eqNTUf6JuEemShn9nMKr8yGzbUJiOb8YcenWKphA7cd5cF6ZOYqbox3z4ITUv6I6RhFgNQ1otX9Uc9iDfihA1oSmuoZqXAv4zoFhphRLFPLY2gWGEeTTZBmS7RXp72VPjw0fHCvNlVd_7lE56Ya7CJJT81OLe48wnMpWbelb9q1EH26hMjRAfRwSVHRhUHbKAq0fYV3VSBePbKV2kG-qkKzKn_sAiP8UGp_6G2hT6ZdfiXXIlOMfSGdzhx9L_NSflkPvMJJ1_zxCRUvo4euN1KXXMrD6P1Zu9fmTZkvQYv1ZkDJPkTm0kPLcRZ51hkxu8-Lw0oTdWy4-2OyKjQ_7WpcAZxLh9jrdYoMzrpbHnUNaW5bWXMmoDyRF__zuE5RqD_NRWjAW0qJ7ZkEis10FMUfdhri2fBDr5OmGVTGDMBbyQqoj_C42UD1nCGwkjE9hBZ1T7XIndGibbBWqgFc6C2bFpyc_3Zr6KuptrASWGAu9To8rdmTcjdgE-1osHaU8uO7nNxTe1ZxNblMCKZ5p6oXFIWsQ0NHVcTmp_5D0AzCF72xGO8&state=81KBgP18N8Y3c8yd
3.008 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYjBiZGY0YjktNDZlZi00M2U5LWIzYTQtMTc3MTc4YjI3NDc2Il0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiSlk0OVlTa3hlRjU3dUIzQ1M5VGZndyIsImV4cCI6MTUyOTc1NDg0MCwiaWF0IjoxNTI5NzUxMjQwLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI0MjcwNDdlYi1kYjZlLTQ3MTEtOWM4My02YjQ3M2RlZjBiM2QiLCJub25jZSI6IlpzUEh6UUFhYkVrWUhKV0UiLCJyYXQiOjE1Mjk3NTEyMzgsInN1YiI6ImZvb0BiYXIuY29tIn0.WYmIxaHtZ1jZ92pS_lRvMqjq4GaFeePrNT_rxIU60giPQUrtulOJKBaJX12ngnPfG28WcGExjFq0nJp39ufcqV_CxldcTlbPZ1IingTVl-RPQYOXoy32zuap-eqNTUf6JuEemShn9nMKr8yGzbUJiOb8YcenWKphA7cd5cF6ZOYqbox3z4ITUv6I6RhFgNQ1otX9Uc9iDfihA1oSmuoZqXAv4zoFhphRLFPLY2gWGEeTTZBmS7RXp72VPjw0fHCvNlVd_7lE56Ya7CJJT81OLe48wnMpWbelb9q1EH26hMjRAfRwSVHRhUHbKAq0fYV3VSBePbKV2kG-qkKzKn_sAiP8UGp_6G2hT6ZdfiXXIlOMfSGdzhx9L_NSflkPvMJJ1_zxCRUvo4euN1KXXMrD6P1Zu9fmTZkvQYv1ZkDJPkTm0kPLcRZ51hkxu8-Lw0oTdWy4-2OyKjQ_7WpcAZxLh9jrdYoMzrpbHnUNaW5bWXMmoDyRF__zuE5RqD_NRWjAW0qJ7ZkEis10FMUfdhri2fBDr5OmGVTGDMBbyQqoj_C42UD1nCGwkjE9hBZ1T7XIndGibbBWqgFc6C2bFpyc_3Zr6KuptrASWGAu9To8rdmTcjdgE-1osHaU8uO7nNxTe1ZxNblMCKZ5p6oXFIWsQ0NHVcTmp_5D0AzCF72xGO8', 'state': '81KBgP18N8Y3c8yd', 'code': 'QHTT0kKwVcFdHZ9NtoJCtDoCgKLobuURzbByUwI0l6w.U9emfknmq36eU-qrLXAXSs8BNGrIBYVKQP8yXEW90y4'}
3.09 AuthorizationResponse {
"code": "QHTT0kKwVcFdHZ9NtoJCtDoCgKLobuURzbByUwI0l6w.U9emfknmq36eU-qrLXAXSs8BNGrIBYVKQP8yXEW90y4",
"id_token": {
"aud": [
"b0bdf4b9-46ef-43e9-b3a4-177178b27476"
],
"auth_time": 1529751224,
"c_hash": "JY49YSkxeF57uB3CS9Tfgw",
"exp": 1529754840,
"iat": 1529751240,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "427047eb-db6e-4711-9c83-6b473def0b3d",
"nonce": "ZsPHzQAabEkYHJWE",
"rat": 1529751238,
"sub": "[email protected]"
},
"state": "81KBgP18N8Y3c8yd"
}
3.09 phase <--<-- 4 --- AccessToken -->-->
3.09 --> request op_args: {'state': '81KBgP18N8Y3c8yd'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.09 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': '81KBgP18N8Y3c8yd', 'code': 'QHTT0kKwVcFdHZ9NtoJCtDoCgKLobuURzbByUwI0l6w.U9emfknmq36eU-qrLXAXSs8BNGrIBYVKQP8yXEW90y4', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'b0bdf4b9-46ef-43e9-b3a4-177178b27476'}, 'state': '81KBgP18N8Y3c8yd'}
3.09 AccessTokenRequest {
"code": "QHTT0kKwVcFdHZ9NtoJCtDoCgKLobuURzbByUwI0l6w.U9emfknmq36eU-qrLXAXSs8BNGrIBYVKQP8yXEW90y4",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "81KBgP18N8Y3c8yd"
}
3.09 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.09 request_http_args {'headers': {'Authorization': 'Basic YjBiZGY0YjktNDZlZi00M2U5LWIzYTQtMTc3MTc4YjI3NDc2Oi5aaUdVc2VsaS1tTw==', 'Content-Type': 'application/x-www-form-urlencoded'}}
3.09 request code=QHTT0kKwVcFdHZ9NtoJCtDoCgKLobuURzbByUwI0l6w.U9emfknmq36eU-qrLXAXSs8BNGrIBYVKQP8yXEW90y4&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=81KBgP18N8Y3c8yd
3.315 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.316 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYjBiZGY0YjktNDZlZi00M2U5LWIzYTQtMTc3MTc4YjI3NDc2Il0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiSlk0OVlTa3hlRjU3dUIzQ1M5VGZndyIsImV4cCI6MTUyOTc1NDg0MCwiaWF0IjoxNTI5NzUxMjQxLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJiYTFiZDg5OS00YTA5LTQ4MTAtYmJjNC1kZmUxN2ViMWY5MzkiLCJub25jZSI6IlpzUEh6UUFhYkVrWUhKV0UiLCJyYXQiOjE1Mjk3NTEyMzgsInN1YiI6ImZvb0BiYXIuY29tIn0.M-AeTzPXRdUcrwJGN28j-I8XiNSo0xqIEXTEzrZPP_kLU1GNrE83PNx3fXGdGzNwohGZE6u_gf7O35s-1m3ynKNvjOvSpOykfnh0G1dPIE74C7KhpazzWFg1HnccH4dbGN_GTJ6Q-B0JcIgHWHHu0XlEf7MiKNE8UUjxYgjIzKDgYhGzt2tbBAY6dnHIktU1aV_t5Ul0dF2YNBlE_BXgUHbXRU-TElih4rUuEhi4QWCGld9p-7n0hx1osHKyqw3X4ZO4VjCAxL3vAwa4AxURRz5AfczPnItHNfDl0eMdY_0zBYgx96A5S57Zf29MaMLMzhn3jlSlecjER-NbrFLSigyg12AIxOuVTi-3jfjJ2EewA8a2HNm5yqWKAojBQC7Xd-M5aK8zX82-Vi7o5GV7TSleVRKIKgUFvQgtEzK2iJURkYyTEegChaKLDkPirJ3GFW3e1lEYSgU5aONtt_CzJAb1t3OTS5_aE9AM_YNNHfFUiJAMut0WUPiYBDxb7U6XiCAJA5wjFYRrY3Bq3uSWi2Qz22NvN1qXFOSYJ-D8ouiy2kBnF5KdxhQ0iaPhINW1lnzFAplVx7irgnmYfaqavQ8sectJrV7WpVq7fLGcP34uiFKuEGX06z2cxnL6OE6LCnIpgjp5XBipQwv5YAS3VMchgW3R1jmWSkh_nJbZ7Q8', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'DjcySreHaJpXzyDSr46DURILfooP8UktmZ8bn1jq_wU.7BiE6mNr_9Qi8o480ZdjY--MCWIw1ijsBizgJj_AOHo', 'scope': 'openid'}
3.319 AccessTokenResponse {
"access_token": "DjcySreHaJpXzyDSr46DURILfooP8UktmZ8bn1jq_wU.7BiE6mNr_9Qi8o480ZdjY--MCWIw1ijsBizgJj_AOHo",
"expires_in": 3599,
"id_token": {
"aud": [
"b0bdf4b9-46ef-43e9-b3a4-177178b27476"
],
"auth_time": 1529751224,
"c_hash": "JY49YSkxeF57uB3CS9Tfgw",
"exp": 1529754840,
"iat": 1529751241,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "ba1bd899-4a09-4810-bbc4-dfe17eb1f939",
"nonce": "ZsPHzQAabEkYHJWE",
"rat": 1529751238,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.319 phase <--<-- 5 --- AsyncAuthn -->-->
3.32 AuthorizationRequest {
"client_id": "b0bdf4b9-46ef-43e9-b3a4-177178b27476",
"nonce": "byum7cB5IBg8DqXd",
"prompt": [
"none"
],
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "r7U7BRpL6un3bQpQ"
}
3.32 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=b0bdf4b9-46ef-43e9-b3a4-177178b27476&state=r7U7BRpL6un3bQpQ&response_type=code+id_token&nonce=byum7cB5IBg8DqXd
3.32 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=b0bdf4b9-46ef-43e9-b3a4-177178b27476&state=r7U7BRpL6un3bQpQ&response_type=code+id_token&nonce=byum7cB5IBg8DqXd
4.226 http args {}
4.379 response URL with fragment
4.379 response code=4cPtPAr9mx8m9mnRv01x2k2ZBhe2yu7HqVA0UIPVxNU.3ZyE2UzDZMjUVgAsv9BzvnxDlsXC0S3lkY9uSBiXx3M&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYjBiZGY0YjktNDZlZi00M2U5LWIzYTQtMTc3MTc4YjI3NDc2Il0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiUmUtM0otcVhXN1MzUjRyazAyWXFLdyIsImV4cCI6MTUyOTc1NDg0MiwiaWF0IjoxNTI5NzUxMjQyLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI3MmRjYTFiMy0wZmNhLTQ3NzMtYjBmNC1hNmFjODcwZWZjMDgiLCJub25jZSI6ImJ5dW03Y0I1SUJnOERxWGQiLCJyYXQiOjE1Mjk3NTEyNDEsInN1YiI6ImZvb0BiYXIuY29tIn0.oCuW-criNj0b_L38X-0dwKw6uhHsBnbp5dnRb0A1H1T5AVw4rf66Vszu2OKdrVgz7pjWLs-7hDUliHDI-1gybO_I80WRiuXTzMwyRfF5jsE1pDCUPMpBn-RwL0ZNcHdOK6kjFOKwJcOr7e9AiXX3ju9cCfKT8W63qjr1tNiSCgojTl11Zj5kEpLrR1wfMl24BPkZmjLyLTl2c_EDxTh3sS5st58Y1SvevLLBLlIb_S_ktU0CNqw_DL7IqDL_llLlcScU8_Kgzh5iAlj-kQXLA8geA_KzdPzBu6z7syHcdJlZDa_wQyPyYO67ovgrWBP9OdHCg6GwclbZcWFaO5zP76oPBPn6NuIPOsjxo_Y_UubbXIWG6j9lZ2ed4b7Oijs4BefENaKTxMdfE7rC2CwNVDTaAupFYTDQC1qsHUT3wfzWCPVhsu8wy2iw-yCW1wrT2nyiISYXpRKt1xEodiAYsIsvlrtiPmcFArKAiidN3HrtqGUBMUP_Ny8z9FV6BhU6Tur8GxhVC_zjN3x-A9rQQ5LHOYQ7SZDNn1N3xFgptQcebUnZZ9WBKyT3ZVKv-a-aOgaKy6nkQVr7OXDSNmPYMRCHU80VTefHfWDWTEQXTelscBSENZi3UJi8PThNCdDz4kh8WCqm1HgmhUc4a_GkPcieOh5tpR4DCw38FZS2QJs&state=r7U7BRpL6un3bQpQ
4.38 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYjBiZGY0YjktNDZlZi00M2U5LWIzYTQtMTc3MTc4YjI3NDc2Il0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiUmUtM0otcVhXN1MzUjRyazAyWXFLdyIsImV4cCI6MTUyOTc1NDg0MiwiaWF0IjoxNTI5NzUxMjQyLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI3MmRjYTFiMy0wZmNhLTQ3NzMtYjBmNC1hNmFjODcwZWZjMDgiLCJub25jZSI6ImJ5dW03Y0I1SUJnOERxWGQiLCJyYXQiOjE1Mjk3NTEyNDEsInN1YiI6ImZvb0BiYXIuY29tIn0.oCuW-criNj0b_L38X-0dwKw6uhHsBnbp5dnRb0A1H1T5AVw4rf66Vszu2OKdrVgz7pjWLs-7hDUliHDI-1gybO_I80WRiuXTzMwyRfF5jsE1pDCUPMpBn-RwL0ZNcHdOK6kjFOKwJcOr7e9AiXX3ju9cCfKT8W63qjr1tNiSCgojTl11Zj5kEpLrR1wfMl24BPkZmjLyLTl2c_EDxTh3sS5st58Y1SvevLLBLlIb_S_ktU0CNqw_DL7IqDL_llLlcScU8_Kgzh5iAlj-kQXLA8geA_KzdPzBu6z7syHcdJlZDa_wQyPyYO67ovgrWBP9OdHCg6GwclbZcWFaO5zP76oPBPn6NuIPOsjxo_Y_UubbXIWG6j9lZ2ed4b7Oijs4BefENaKTxMdfE7rC2CwNVDTaAupFYTDQC1qsHUT3wfzWCPVhsu8wy2iw-yCW1wrT2nyiISYXpRKt1xEodiAYsIsvlrtiPmcFArKAiidN3HrtqGUBMUP_Ny8z9FV6BhU6Tur8GxhVC_zjN3x-A9rQQ5LHOYQ7SZDNn1N3xFgptQcebUnZZ9WBKyT3ZVKv-a-aOgaKy6nkQVr7OXDSNmPYMRCHU80VTefHfWDWTEQXTelscBSENZi3UJi8PThNCdDz4kh8WCqm1HgmhUc4a_GkPcieOh5tpR4DCw38FZS2QJs', 'state': 'r7U7BRpL6un3bQpQ', 'code': '4cPtPAr9mx8m9mnRv01x2k2ZBhe2yu7HqVA0UIPVxNU.3ZyE2UzDZMjUVgAsv9BzvnxDlsXC0S3lkY9uSBiXx3M'}
4.383 AuthorizationResponse {
"code": "4cPtPAr9mx8m9mnRv01x2k2ZBhe2yu7HqVA0UIPVxNU.3ZyE2UzDZMjUVgAsv9BzvnxDlsXC0S3lkY9uSBiXx3M",
"id_token": {
"aud": [
"b0bdf4b9-46ef-43e9-b3a4-177178b27476"
],
"auth_time": 1529751224,
"c_hash": "Re-3J-qXW7S3R4rk02YqKw",
"exp": 1529754842,
"iat": 1529751242,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "72dca1b3-0fca-4773-b0f4-a6ac870efc08",
"nonce": "byum7cB5IBg8DqXd",
"rat": 1529751241,
"sub": "[email protected]"
},
"state": "r7U7BRpL6un3bQpQ"
}
4.383 phase <--<-- 6 --- AccessToken -->-->
4.383 --> request op_args: {'state': 'r7U7BRpL6un3bQpQ'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
4.383 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'r7U7BRpL6un3bQpQ', 'code': '4cPtPAr9mx8m9mnRv01x2k2ZBhe2yu7HqVA0UIPVxNU.3ZyE2UzDZMjUVgAsv9BzvnxDlsXC0S3lkY9uSBiXx3M', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'b0bdf4b9-46ef-43e9-b3a4-177178b27476'}, 'state': 'r7U7BRpL6un3bQpQ'}
4.383 AccessTokenRequest {
"code": "4cPtPAr9mx8m9mnRv01x2k2ZBhe2yu7HqVA0UIPVxNU.3ZyE2UzDZMjUVgAsv9BzvnxDlsXC0S3lkY9uSBiXx3M",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "r7U7BRpL6un3bQpQ"
}
4.383 request_url https://oidc-certification.ory.sh:8443/oauth2/token
4.383 request_http_args {'headers': {'Authorization': 'Basic YjBiZGY0YjktNDZlZi00M2U5LWIzYTQtMTc3MTc4YjI3NDc2Oi5aaUdVc2VsaS1tTw==', 'Content-Type': 'application/x-www-form-urlencoded'}}
4.383 request code=4cPtPAr9mx8m9mnRv01x2k2ZBhe2yu7HqVA0UIPVxNU.3ZyE2UzDZMjUVgAsv9BzvnxDlsXC0S3lkY9uSBiXx3M&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=r7U7BRpL6un3bQpQ
4.599 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
4.6 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYjBiZGY0YjktNDZlZi00M2U5LWIzYTQtMTc3MTc4YjI3NDc2Il0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoiUmUtM0otcVhXN1MzUjRyazAyWXFLdyIsImV4cCI6MTUyOTc1NDg0MiwiaWF0IjoxNTI5NzUxMjQyLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiIzN2MzZWZjOC00ZGYyLTRlOTYtYTkxYS04NGQwMmE4ZTk5OTAiLCJub25jZSI6ImJ5dW03Y0I1SUJnOERxWGQiLCJyYXQiOjE1Mjk3NTEyNDEsInN1YiI6ImZvb0BiYXIuY29tIn0.WgDPAH1PUdyIIpIqZ9Qr1V9UWCQ5LMrfqB5mOkagbSdjjXlVu2eaWYJ0RqpLE1orskSevVyp4CKiHGZeO2XbgEGV8-wRHrGCuT8LOvdjyjc520Z4BAIdO1ZsZ2NddJvFasIIYSt_uSr0XCA8le6U7Yy5f3bmBz4Q6KYS7BGkvqtqpkzXvtCWaR44BVW7AysdFP9TAbfgXPm4isn0h-tDunos76f7G_xRsemrJc-v-ATkSCyB-QmfZ1uTLUAcZsf3QjJHUsyV0GOqeGFP5-mNiLfjWToA347gEYqP-1KxHhTdUCiE9-Z-6fPwUqg9Xa9149R_ZzpoIaQF3_SXgiBB_0lhyBwiAalDZViYFPdyaVETK41VkL8eDBbNUhOJv1NMqd2EOVNyu6DCb4Yi2vokx0hy1oRN252BM2E39AyXLMoYZZWFZFrh03iPSkss1uVqH8IgjgKVdzXNCszxbi-qI4VEXTSxcjUEwSg5_Mcx0SmfUV0CqOdLXqNX38oWuMHYao39_8Gbhpks6vfYziZsbXESmohInsg_cXl09SpZh-Wm5SYym_XD_h-NZDKUzzqRoEVzdeb6XsQ3p1ZW04pL1X3mUq13-Kqgr_Q_Le9oBerxZjgAn6imlf9Poalw1w6dMZsdNMynJCtq6Zrsb_eAlhLXrDNw7_kxVlI3Y2FHsos', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'sr40dxsqPj16smD8QwjCZy9nHdMAUivOYBmuzN8zx9A.JC7SCiWffQ3cmsbQTgRf83vXLLGNGWHX-A7elL_tdDw', 'scope': 'openid'}
4.603 AccessTokenResponse {
"access_token": "sr40dxsqPj16smD8QwjCZy9nHdMAUivOYBmuzN8zx9A.JC7SCiWffQ3cmsbQTgRf83vXLLGNGWHX-A7elL_tdDw",
"expires_in": 3599,
"id_token": {
"aud": [
"b0bdf4b9-46ef-43e9-b3a4-177178b27476"
],
"auth_time": 1529751224,
"c_hash": "Re-3J-qXW7S3R4rk02YqKw",
"exp": 1529754842,
"iat": 1529751242,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "37c3efc8-4df2-4e96-a91a-84d02a8e9990",
"nonce": "byum7cB5IBg8DqXd",
"rat": 1529751241,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
4.604 phase <--<-- 7 --- Done -->-->
4.604 end
4.604 assertion VerifyResponse
4.604 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.604 assertion SameAuthn
4.605 condition same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
4.605 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Req-max_age=1.txt 0000644 0000000 0000000 00000061236 13313423564 014546 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-max_age=1
Test description: Requesting ID Token with max_age=1 seconds restriction
Timestamp: 2018-06-23T10:56:52Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.093 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.094 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.094 phase <--<-- 2 --- Registration -->-->
0.094 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.095 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Q0QQ7sge7NhJepue"
],
"response_types": [
"code id_token"
]
}
0.254 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.255 RegistrationResponse {
"client_id": "8a45761b-e14e-4aca-ba7b-11e05ebaa414",
"client_secret": "cghi8J1H9J5c",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "8a45761b-e14e-4aca-ba7b-11e05ebaa414",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Q0QQ7sge7NhJepue"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.255 phase <--<-- 3 --- AsyncAuthn -->-->
0.256 AuthorizationRequest {
"client_id": "8a45761b-e14e-4aca-ba7b-11e05ebaa414",
"nonce": "k7JAEXOu94XrLKZI",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "x4eC9w4BpZMoeyp2"
}
0.256 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=8a45761b-e14e-4aca-ba7b-11e05ebaa414&state=x4eC9w4BpZMoeyp2&response_type=code+id_token&nonce=k7JAEXOu94XrLKZI
0.256 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=8a45761b-e14e-4aca-ba7b-11e05ebaa414&state=x4eC9w4BpZMoeyp2&response_type=code+id_token&nonce=k7JAEXOu94XrLKZI
2.605 http args {}
2.778 response URL with fragment
2.778 response code=jIsVipKIupqfOwqNS-PPeTF2v_wWNMDQdHX0z_kpBbg.4Wvlmsl-56tXK2XOErjWxbymUBxGHlFJir2xaWzo86A&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiOGE0NTc2MWItZTE0ZS00YWNhLWJhN2ItMTFlMDVlYmFhNDE0Il0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoienZ3alB5djVzY3F4Q2pfcDRaWGJ5QSIsImV4cCI6MTUyOTc1NTAwNCwiaWF0IjoxNTI5NzUxNDA0LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI3ODYxZTFmNC1lOTczLTQ0MzgtODY5OC1hNzlkMjE1NTcyNDYiLCJub25jZSI6Ims3SkFFWE91OTRYckxLWkkiLCJyYXQiOjE1Mjk3NTE0MDIsInN1YiI6ImZvb0BiYXIuY29tIn0.o4eXYh6OxW0RoVnQgZthjY93w9g44GTnA9P_q5y6nl7_0k__sCiEtnhpSi6g0Hnm6dGx1gShAz3wS0de3BYZ1qv9c7mzeR46ffju-qHh6w_bsBB1j5URYIm4AZ7rIqr-yre78c85ScjHJoqaIQInGvZkGb9NX3Sq3_zRvw15A8m3RqBJEPkXMAAT-LSPBpCPzYQ8aHSodaC0oL8X__1m7HS-ZY-vyqpNoLbTc_vGQfeEuDqARbDI_k6AB2zSNMvrAL3A3UqUF3XmAKEhzkWUxcfqxKnPuyjdFJo4JZ833bTJztbKziS-0JTW2qzEgQEDMhC0vcRRiked9RKMBruC8Q1SpYIwKU9-6fsercLC7BsKp7349l9ZogynhJqGtp0Azfv4USt0dWtndDiza3CX4BagJq-GTkz5Zias0U-lT9RONSczMSsRzIEs1_ZdBi4KFbG6WtxTadXBh4Md1epRNP_QtrZcn2cafNTUTCMS4iF_udjph2F5cDfM5_CjnD0Lomtz4jNEsiEp2Oup0Jkr3j8HGQqkPlaL-qD-ab02Z7AlY5AiAD-whtTF0wbDaPMMexjHLmOA64mwJqHbu7wxghrIuZZX3ry_3yt24iXIuWAgbqezgbgwr2gntyPTPPaDa4RpP7aWSO60RD-b4QWzIJNXCwCrdVAD_r4sWqP3JXY&state=x4eC9w4BpZMoeyp2
2.778 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiOGE0NTc2MWItZTE0ZS00YWNhLWJhN2ItMTFlMDVlYmFhNDE0Il0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoienZ3alB5djVzY3F4Q2pfcDRaWGJ5QSIsImV4cCI6MTUyOTc1NTAwNCwiaWF0IjoxNTI5NzUxNDA0LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI3ODYxZTFmNC1lOTczLTQ0MzgtODY5OC1hNzlkMjE1NTcyNDYiLCJub25jZSI6Ims3SkFFWE91OTRYckxLWkkiLCJyYXQiOjE1Mjk3NTE0MDIsInN1YiI6ImZvb0BiYXIuY29tIn0.o4eXYh6OxW0RoVnQgZthjY93w9g44GTnA9P_q5y6nl7_0k__sCiEtnhpSi6g0Hnm6dGx1gShAz3wS0de3BYZ1qv9c7mzeR46ffju-qHh6w_bsBB1j5URYIm4AZ7rIqr-yre78c85ScjHJoqaIQInGvZkGb9NX3Sq3_zRvw15A8m3RqBJEPkXMAAT-LSPBpCPzYQ8aHSodaC0oL8X__1m7HS-ZY-vyqpNoLbTc_vGQfeEuDqARbDI_k6AB2zSNMvrAL3A3UqUF3XmAKEhzkWUxcfqxKnPuyjdFJo4JZ833bTJztbKziS-0JTW2qzEgQEDMhC0vcRRiked9RKMBruC8Q1SpYIwKU9-6fsercLC7BsKp7349l9ZogynhJqGtp0Azfv4USt0dWtndDiza3CX4BagJq-GTkz5Zias0U-lT9RONSczMSsRzIEs1_ZdBi4KFbG6WtxTadXBh4Md1epRNP_QtrZcn2cafNTUTCMS4iF_udjph2F5cDfM5_CjnD0Lomtz4jNEsiEp2Oup0Jkr3j8HGQqkPlaL-qD-ab02Z7AlY5AiAD-whtTF0wbDaPMMexjHLmOA64mwJqHbu7wxghrIuZZX3ry_3yt24iXIuWAgbqezgbgwr2gntyPTPPaDa4RpP7aWSO60RD-b4QWzIJNXCwCrdVAD_r4sWqP3JXY', 'state': 'x4eC9w4BpZMoeyp2', 'code': 'jIsVipKIupqfOwqNS-PPeTF2v_wWNMDQdHX0z_kpBbg.4Wvlmsl-56tXK2XOErjWxbymUBxGHlFJir2xaWzo86A'}
2.858 AuthorizationResponse {
"code": "jIsVipKIupqfOwqNS-PPeTF2v_wWNMDQdHX0z_kpBbg.4Wvlmsl-56tXK2XOErjWxbymUBxGHlFJir2xaWzo86A",
"id_token": {
"aud": [
"8a45761b-e14e-4aca-ba7b-11e05ebaa414"
],
"auth_time": 1529751224,
"c_hash": "zvwjPyv5scqxCj_p4ZXbyA",
"exp": 1529755004,
"iat": 1529751404,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "7861e1f4-e973-4438-8698-a79d21557246",
"nonce": "k7JAEXOu94XrLKZI",
"rat": 1529751402,
"sub": "[email protected]"
},
"state": "x4eC9w4BpZMoeyp2"
}
2.858 phase <--<-- 4 --- AccessToken -->-->
2.858 --> request op_args: {'state': 'x4eC9w4BpZMoeyp2'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.858 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'x4eC9w4BpZMoeyp2', 'code': 'jIsVipKIupqfOwqNS-PPeTF2v_wWNMDQdHX0z_kpBbg.4Wvlmsl-56tXK2XOErjWxbymUBxGHlFJir2xaWzo86A', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '8a45761b-e14e-4aca-ba7b-11e05ebaa414'}, 'state': 'x4eC9w4BpZMoeyp2'}
2.858 AccessTokenRequest {
"code": "jIsVipKIupqfOwqNS-PPeTF2v_wWNMDQdHX0z_kpBbg.4Wvlmsl-56tXK2XOErjWxbymUBxGHlFJir2xaWzo86A",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "x4eC9w4BpZMoeyp2"
}
2.858 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.858 request_http_args {'headers': {'Authorization': 'Basic OGE0NTc2MWItZTE0ZS00YWNhLWJhN2ItMTFlMDVlYmFhNDE0OmNnaGk4SjFIOUo1Yw==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.858 request code=jIsVipKIupqfOwqNS-PPeTF2v_wWNMDQdHX0z_kpBbg.4Wvlmsl-56tXK2XOErjWxbymUBxGHlFJir2xaWzo86A&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=x4eC9w4BpZMoeyp2
3.081 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.082 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiOGE0NTc2MWItZTE0ZS00YWNhLWJhN2ItMTFlMDVlYmFhNDE0Il0sImF1dGhfdGltZSI6MTUyOTc1MTIyNCwiY19oYXNoIjoienZ3alB5djVzY3F4Q2pfcDRaWGJ5QSIsImV4cCI6MTUyOTc1NTAwNCwiaWF0IjoxNTI5NzUxNDA1LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJmZDAwYjA0MS1kYjI2LTQ2ZWMtYTljYS1hMjI3NTEyMmIzNmYiLCJub25jZSI6Ims3SkFFWE91OTRYckxLWkkiLCJyYXQiOjE1Mjk3NTE0MDIsInN1YiI6ImZvb0BiYXIuY29tIn0.yQ3X04cdpXiVXvRBp96ICE1SJr1M7yTy5ub940TV7vX0uavmcBJM_1zJKOofjt8Dog8cwwFtN1E5ussWUm2abvyQRte5sGvGN7I6s_2kIDpWIoT0XWZhQ3AUoq164NPUvgrnfPmzKiRm1up62u94wTV3xxbaddy3c2UvLkQb4LW8QhznMwTfXFn6lHr0X2wm8l1597JaF7fCqc3w0fA3LTlD1AQHZaROPjEfzTdZgRChPi44ZqoHdnbQuEYOIqERNKM3zuhMnLe18Q8m_OFxQl_WDxBRtILney87TznMYpLfYWj66zeWof_wnZwbbikv_PZqRmPQ1sdn21mkRpLAhZLt6-hR_pkekeRLagQX8NyA8oGRNM6p9E-O_fu8gYhEh8CpdrssDo-eLsYfFixFu38NzdZqD6StyzFoYIhTSr7N7qyxV4dakQfikHWsnBqlmmUDaE5cH1-bW7aV_8Sd6ZJSCIqtwpGT6o5DLzkb_emk7BBLO8vrDYtM1mClNiDQfQQmxSZ8YjEA-Jj0Kvq2hS5QofnQigV1Znxbf-AqXwaxIUpInEYtBBbk5Q_mF0njKxKh8aULQG9j5Pcud9TAhd9Wrbi0cM5aLatZOcwWYe1ysfm0thnmwake4DEmiuS9E9NwD0w_vGo3wFr6AFME9AetmoCCvC_4FR8NmQD7IuM', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'PBgI998yEUu5b9n92b3kMtvLYRhxW_nHCJWwLBAeGXI.xcFUf-6bwBWFkI2m8p0EFoRF119GO6cOThmuT06sM9o', 'scope': 'openid'}
3.085 AccessTokenResponse {
"access_token": "PBgI998yEUu5b9n92b3kMtvLYRhxW_nHCJWwLBAeGXI.xcFUf-6bwBWFkI2m8p0EFoRF119GO6cOThmuT06sM9o",
"expires_in": 3599,
"id_token": {
"aud": [
"8a45761b-e14e-4aca-ba7b-11e05ebaa414"
],
"auth_time": 1529751224,
"c_hash": "zvwjPyv5scqxCj_p4ZXbyA",
"exp": 1529755004,
"iat": 1529751405,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "fd00b041-db26-46ec-a9ca-a2275122b36f",
"nonce": "k7JAEXOu94XrLKZI",
"rat": 1529751402,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.086 phase <--<-- 5 --- Note -->-->
4.195 phase <--<-- 6 --- Webfinger -->-->
4.195 not expected to do WebFinger
4.195 phase <--<-- 7 --- Discovery -->-->
4.195 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
4.27 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
4.271 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
4.271 phase <--<-- 8 --- Registration -->-->
4.271 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
4.271 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#nhvxrWibrF2SsB8C"
],
"response_types": [
"code id_token"
]
}
4.428 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
4.429 RegistrationResponse {
"client_id": "158d7ab8-abdb-4e7d-83a2-e7be554c69cc",
"client_secret": "tlruE59wZUiv",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "158d7ab8-abdb-4e7d-83a2-e7be554c69cc",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#nhvxrWibrF2SsB8C"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
4.429 phase <--<-- 9 --- AsyncAuthn -->-->
4.43 AuthorizationRequest {
"client_id": "158d7ab8-abdb-4e7d-83a2-e7be554c69cc",
"max_age": 1,
"nonce": "mLa0KLJYXI5WGo7n",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "dr1sMUnYZUzWPQyg"
}
4.43 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?max_age=1&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=158d7ab8-abdb-4e7d-83a2-e7be554c69cc&state=dr1sMUnYZUzWPQyg&response_type=code+id_token&nonce=mLa0KLJYXI5WGo7n
4.43 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?max_age=1&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=158d7ab8-abdb-4e7d-83a2-e7be554c69cc&state=dr1sMUnYZUzWPQyg&response_type=code+id_token&nonce=mLa0KLJYXI5WGo7n
9.961 http args {}
10.146 response URL with fragment
10.146 response code=TSSPLMEla5t0kEgD4KRshCT-B7RTgnUE6u_k8c58sjY.kf0LytheMTLKHAEImCzXNKJYSduXnQ_Y7x2wK87zIBY&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMTU4ZDdhYjgtYWJkYi00ZTdkLTgzYTItZTdiZTU1NGM2OWNjIl0sImF1dGhfdGltZSI6MTUyOTc1MTQwOSwiY19oYXNoIjoiWHVWN0JZUjFwTVMwSTNKTENOdUpZdyIsImV4cCI6MTUyOTc1NTAxMiwiaWF0IjoxNTI5NzUxNDEyLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJmOGVhMjZkNi1hNWZhLTRjZDYtOTkwYi00Mjk1OGFlODlhMmQiLCJub25jZSI6Im1MYTBLTEpZWEk1V0dvN24iLCJyYXQiOjE1Mjk3NTE0MDcsInN1YiI6ImZvb0BiYXIuY29tIn0.ZD0sWtsldKtp2nnccFLpBHc334Bezx7XheDAICDzeNrcTWsWcZBD-VAIJSdJ6CL3H2JgmFgO-svKIRRMqpPiXervk1bBA2-eeD61hFpB4RsARdPQXLUpk1qsADsEe9T0Zb4UR-W_SEHb_8TrdxSuNX3frTWSuh3Pk6U9lkI2Mk2OLYEBsgMRVQvhlS4qWLoAcaPNjfzXJg6fhjK6s2r4fKFGwFx54B4YGezOS5shMwL0IYEPLAewqcbRGmtcMINcWAorlFpwBOHgKnD7N7fb2Z51wm3BesTpD2i_-v5V6mwBX6ewqp_xif7I46rBDDOtcyHEJWZn7U0ylnHoU6HEHiWmqV_3K41CQ6voPTB06wnithvmxWYSNUEU51AlfrfHHtuh2WQE7hxamoHWyl4fdWcYlTZ_5hylHsk6kOdqhkEd8PryKcBLJnrdJRPEb4wDXAfPb0dOE5sczyczEslPXZTFW3nGdCHSNraAKq3pVNoOVeYR0m-lqUjfZd9DAYTkoeVZqexfaIPiWoGgn-8sqenublen-EyvLGsCQq4KATa16z2wubjy9buUHxkAXBrsViE3m8fQrZV6IYG3X4nM91mZ7UGoZKqb7F7y80Nll7OPxyp1IwkEBN4mdqhv3WrNc1ijY-vtdrvZkqTdDDz133WXH__KQ4F3n5Ab55pkPPo&state=dr1sMUnYZUzWPQyg
10.146 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMTU4ZDdhYjgtYWJkYi00ZTdkLTgzYTItZTdiZTU1NGM2OWNjIl0sImF1dGhfdGltZSI6MTUyOTc1MTQwOSwiY19oYXNoIjoiWHVWN0JZUjFwTVMwSTNKTENOdUpZdyIsImV4cCI6MTUyOTc1NTAxMiwiaWF0IjoxNTI5NzUxNDEyLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJmOGVhMjZkNi1hNWZhLTRjZDYtOTkwYi00Mjk1OGFlODlhMmQiLCJub25jZSI6Im1MYTBLTEpZWEk1V0dvN24iLCJyYXQiOjE1Mjk3NTE0MDcsInN1YiI6ImZvb0BiYXIuY29tIn0.ZD0sWtsldKtp2nnccFLpBHc334Bezx7XheDAICDzeNrcTWsWcZBD-VAIJSdJ6CL3H2JgmFgO-svKIRRMqpPiXervk1bBA2-eeD61hFpB4RsARdPQXLUpk1qsADsEe9T0Zb4UR-W_SEHb_8TrdxSuNX3frTWSuh3Pk6U9lkI2Mk2OLYEBsgMRVQvhlS4qWLoAcaPNjfzXJg6fhjK6s2r4fKFGwFx54B4YGezOS5shMwL0IYEPLAewqcbRGmtcMINcWAorlFpwBOHgKnD7N7fb2Z51wm3BesTpD2i_-v5V6mwBX6ewqp_xif7I46rBDDOtcyHEJWZn7U0ylnHoU6HEHiWmqV_3K41CQ6voPTB06wnithvmxWYSNUEU51AlfrfHHtuh2WQE7hxamoHWyl4fdWcYlTZ_5hylHsk6kOdqhkEd8PryKcBLJnrdJRPEb4wDXAfPb0dOE5sczyczEslPXZTFW3nGdCHSNraAKq3pVNoOVeYR0m-lqUjfZd9DAYTkoeVZqexfaIPiWoGgn-8sqenublen-EyvLGsCQq4KATa16z2wubjy9buUHxkAXBrsViE3m8fQrZV6IYG3X4nM91mZ7UGoZKqb7F7y80Nll7OPxyp1IwkEBN4mdqhv3WrNc1ijY-vtdrvZkqTdDDz133WXH__KQ4F3n5Ab55pkPPo', 'state': 'dr1sMUnYZUzWPQyg', 'code': 'TSSPLMEla5t0kEgD4KRshCT-B7RTgnUE6u_k8c58sjY.kf0LytheMTLKHAEImCzXNKJYSduXnQ_Y7x2wK87zIBY'}
10.15 AuthorizationResponse {
"code": "TSSPLMEla5t0kEgD4KRshCT-B7RTgnUE6u_k8c58sjY.kf0LytheMTLKHAEImCzXNKJYSduXnQ_Y7x2wK87zIBY",
"id_token": {
"aud": [
"158d7ab8-abdb-4e7d-83a2-e7be554c69cc"
],
"auth_time": 1529751409,
"c_hash": "XuV7BYR1pMS0I3JLCNuJYw",
"exp": 1529755012,
"iat": 1529751412,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "f8ea26d6-a5fa-4cd6-990b-42958ae89a2d",
"nonce": "mLa0KLJYXI5WGo7n",
"rat": 1529751407,
"sub": "[email protected]"
},
"state": "dr1sMUnYZUzWPQyg"
}
10.15 phase <--<-- 10 --- AccessToken -->-->
10.15 --> request op_args: {'state': 'dr1sMUnYZUzWPQyg'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
10.15 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'dr1sMUnYZUzWPQyg', 'code': 'TSSPLMEla5t0kEgD4KRshCT-B7RTgnUE6u_k8c58sjY.kf0LytheMTLKHAEImCzXNKJYSduXnQ_Y7x2wK87zIBY', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '158d7ab8-abdb-4e7d-83a2-e7be554c69cc'}, 'state': 'dr1sMUnYZUzWPQyg'}
10.15 AccessTokenRequest {
"code": "TSSPLMEla5t0kEgD4KRshCT-B7RTgnUE6u_k8c58sjY.kf0LytheMTLKHAEImCzXNKJYSduXnQ_Y7x2wK87zIBY",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "dr1sMUnYZUzWPQyg"
}
10.15 request_url https://oidc-certification.ory.sh:8443/oauth2/token
10.15 request_http_args {'headers': {'Authorization': 'Basic MTU4ZDdhYjgtYWJkYi00ZTdkLTgzYTItZTdiZTU1NGM2OWNjOnRscnVFNTl3WlVpdg==', 'Content-Type': 'application/x-www-form-urlencoded'}}
10.15 request code=TSSPLMEla5t0kEgD4KRshCT-B7RTgnUE6u_k8c58sjY.kf0LytheMTLKHAEImCzXNKJYSduXnQ_Y7x2wK87zIBY&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=dr1sMUnYZUzWPQyg
10.394 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
10.395 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMTU4ZDdhYjgtYWJkYi00ZTdkLTgzYTItZTdiZTU1NGM2OWNjIl0sImF1dGhfdGltZSI6MTUyOTc1MTQwOSwiY19oYXNoIjoiWHVWN0JZUjFwTVMwSTNKTENOdUpZdyIsImV4cCI6MTUyOTc1NTAxMiwiaWF0IjoxNTI5NzUxNDEyLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJjZjM4ZjY4YS1kZmE5LTQ4NGQtOWU4NC0yN2IxMzk3NWJjZmIiLCJub25jZSI6Im1MYTBLTEpZWEk1V0dvN24iLCJyYXQiOjE1Mjk3NTE0MDcsInN1YiI6ImZvb0BiYXIuY29tIn0.sf6SDZd0CS9MxQFMKOtUnI9Xv5rK352LElBdcYYi_b7XQ17wpLYRfeAzrYTH9gWfLu4w2qqYRKenBzbWHsYaqFhvH2AcFIQFSbKYCj3By5GMANg1QtlhU6eMvGKTj18EtOGxsmu5bqIQcqKn3i6uqDo_bw22P4i5SYcA6vUgafdKtBUXcWYavAKQllTacQVj5K9hZRsucBcxrIu2LQLOZdrK3-pi4AcJFgrU8Tf0bIO-UiaTSGvgLkmkRQfy5mv4uIbzOS58Tn9oWnatXP_iUVUoRFyzQsPLJGfrM2GJ7CIWcLVVPgkpxNPc7sA5V9eUIYNl81CgcIqDJ7W3P4SZ5UtV0g2OAESZTznt60s3BFcOuIg7DkIi2Q2bs5GrmuVkNPtuc88FZPHti28AKpU3W4gQZoU8qEddMMbtLVhgRf-dZvdjeNomDjaQXCGVcrFC12jLrftmghu_jXJHDk8htW7yadSl8l7L2B2II1j8FUjuKb_XBvE8r78v4BCQKh18EpSj9pBBCGv8_N08BBLuAcio6ODtF-yyymsh68RCT-nbRuxVytqp-UWEX-94CBa-hieZ7GFeiMDVY5_NRQZ6o8qBrW6_PL1fm-TIedhGolMob6D3fBTSAwn-8r7u9rKNcA6zJ7Jh9FLPenPq0yOwHEMlkRCawl0RtARjBJhYmsM', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'rjLL0E0phvp1T6fVXNf9st3f8rQuE7_9tolj7NLeGUc.lUiYAvquWxqUEpbz39rVanXY1Iv_rWEfLrMG3zObB38', 'scope': 'openid'}
10.399 AccessTokenResponse {
"access_token": "rjLL0E0phvp1T6fVXNf9st3f8rQuE7_9tolj7NLeGUc.lUiYAvquWxqUEpbz39rVanXY1Iv_rWEfLrMG3zObB38",
"expires_in": 3599,
"id_token": {
"aud": [
"158d7ab8-abdb-4e7d-83a2-e7be554c69cc"
],
"auth_time": 1529751409,
"c_hash": "XuV7BYR1pMS0I3JLCNuJYw",
"exp": 1529755012,
"iat": 1529751412,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "cf38f68a-dfa9-484d-9e84-27b13975bcfb",
"nonce": "mLa0KLJYXI5WGo7n",
"rat": 1529751407,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
10.399 phase <--<-- 11 --- Done -->-->
10.399 end
10.399 assertion AuthTimeCheck
10.399 condition auth_time-check: status=OK [Check that the auth_time returned in the ID Token is in the expected range.]
10.4 assertion VerifyResponse
10.4 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
10.4 assertion ClaimsCheck
10.4 condition claims-check: status=OK [Checks if specific claims is present or not]
10.4 assertion MultipleSignOn
10.401 condition multiple-sign-on: status=OK [Verifies that multiple authentications was used in the flow]
10.401 condition Done: status=OK
============================================================
Conditions
auth_time-check: status=OK [Check that the auth_time returned in the ID Token is in the expected range.]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
claims-check: status=OK [Checks if specific claims is present or not]
multiple-sign-on: status=OK [Verifies that multiple authentications was used in the flow]
Done: status=OK
============================================================
RESULT: PASSED
./OP-UserInfo-Header.txt 0000644 0000000 0000000 00000031763 13313423206 015155 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-UserInfo-Header
Test description: UserInfo Endpoint access with POST and bearer header
Timestamp: 2018-06-23T10:52:54Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.072 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.073 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.073 phase <--<-- 2 --- Registration -->-->
0.073 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.074 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#SobNoal7WW8YmbCp"
],
"response_types": [
"code id_token"
]
}
0.233 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.234 RegistrationResponse {
"client_id": "c33f10fb-702e-490d-837d-d0962571f97e",
"client_secret": "4z~ROYHpIzCb",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "c33f10fb-702e-490d-837d-d0962571f97e",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#SobNoal7WW8YmbCp"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.234 phase <--<-- 3 --- AsyncAuthn -->-->
0.234 AuthorizationRequest {
"client_id": "c33f10fb-702e-490d-837d-d0962571f97e",
"nonce": "dDthcIXLhoMk7zes",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "ZNroQQVOPbhfgiKn"
}
0.235 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=c33f10fb-702e-490d-837d-d0962571f97e&state=ZNroQQVOPbhfgiKn&response_type=code+id_token&nonce=dDthcIXLhoMk7zes
0.235 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=c33f10fb-702e-490d-837d-d0962571f97e&state=ZNroQQVOPbhfgiKn&response_type=code+id_token&nonce=dDthcIXLhoMk7zes
2.228 http args {}
2.396 response URL with fragment
2.396 response code=PO2dZ92lkRnGMrUQMXry0uYsT2WrodwkEKDgw5ejg8M.xql59IvwwRlxXlac-LEqmWuZNtB00apqvJlQrKwYepY&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYzMzZjEwZmItNzAyZS00OTBkLTgzN2QtZDA5NjI1NzFmOTdlIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoicU82dW9UUlVLem8tSVh6QURUbXExUSIsImV4cCI6MTUyOTc1NDc3MywiaWF0IjoxNTI5NzUxMTczLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJlMWQwNjBkMC0xZmRmLTRiY2ItYmFkYS00OTAyYzBiYzVkMTIiLCJub25jZSI6ImREdGhjSVhMaG9Nazd6ZXMiLCJyYXQiOjE1Mjk3NTExNzEsInN1YiI6ImZvb0BiYXIuY29tIn0.X7UjCQ6FfIt2KrqkG7vZ6YlLqLuFkPcw0msxhBiafuW5RyAdN28CD1TH5teUmaLgsITxojfAvm8hQyDztA6HhZvgWwY-U8YontVxzOtBsBURZqx7swLyR_WUJqLrNTpKWTDfULJCNbQtvFrOEhLKgCmftr6TEbjQlt89JrjHyAen1MKWG5NMEq1cgiA12OkOL77hNsFUwxL1uqhg984ui5RQhcNvAjNuhI63qLt7qdHkBNAS58WCjIm5q_9fyQ58KeCiIbLr9lfcH8RFLQQNfniwz_cVdr-dlu6UEYk47jkmz6Bg2KFNYWdXgrLVgjgugyeZS7gsqPsiK_fdCOAvc80KQTjTU3V2pb56era7pxVS9eHi_ZmStyGJ62GxbSIakEQjF6hzHLOX-T_UMoQcxKmJ_JbQvi6hkYKCSWKRDe6HzkSboFhpJ-_BQfw-U5ppoVBROqsLF08oIIYCkVq8dXc5UHE5ywNSo-pJYbnndsHPdCUg7gEbRsegImn6ZcBeZJEwGhJ30uqDPZVO-S1uQKRjpfo0Z5TJCfxhKFTl5AmRaPmwOzzRF3KC3v6uecpNtxIfpsdVTfLETg2l_iCw1AcZ6ZlUOfEGWTh4fPhLxoPqDVgpLwIGueBnABZtRfSX5inZI4WBQFURaaL9W4Y5V4v24WZoAzqJZd3xrWP0kUk&state=ZNroQQVOPbhfgiKn
2.396 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYzMzZjEwZmItNzAyZS00OTBkLTgzN2QtZDA5NjI1NzFmOTdlIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoicU82dW9UUlVLem8tSVh6QURUbXExUSIsImV4cCI6MTUyOTc1NDc3MywiaWF0IjoxNTI5NzUxMTczLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJlMWQwNjBkMC0xZmRmLTRiY2ItYmFkYS00OTAyYzBiYzVkMTIiLCJub25jZSI6ImREdGhjSVhMaG9Nazd6ZXMiLCJyYXQiOjE1Mjk3NTExNzEsInN1YiI6ImZvb0BiYXIuY29tIn0.X7UjCQ6FfIt2KrqkG7vZ6YlLqLuFkPcw0msxhBiafuW5RyAdN28CD1TH5teUmaLgsITxojfAvm8hQyDztA6HhZvgWwY-U8YontVxzOtBsBURZqx7swLyR_WUJqLrNTpKWTDfULJCNbQtvFrOEhLKgCmftr6TEbjQlt89JrjHyAen1MKWG5NMEq1cgiA12OkOL77hNsFUwxL1uqhg984ui5RQhcNvAjNuhI63qLt7qdHkBNAS58WCjIm5q_9fyQ58KeCiIbLr9lfcH8RFLQQNfniwz_cVdr-dlu6UEYk47jkmz6Bg2KFNYWdXgrLVgjgugyeZS7gsqPsiK_fdCOAvc80KQTjTU3V2pb56era7pxVS9eHi_ZmStyGJ62GxbSIakEQjF6hzHLOX-T_UMoQcxKmJ_JbQvi6hkYKCSWKRDe6HzkSboFhpJ-_BQfw-U5ppoVBROqsLF08oIIYCkVq8dXc5UHE5ywNSo-pJYbnndsHPdCUg7gEbRsegImn6ZcBeZJEwGhJ30uqDPZVO-S1uQKRjpfo0Z5TJCfxhKFTl5AmRaPmwOzzRF3KC3v6uecpNtxIfpsdVTfLETg2l_iCw1AcZ6ZlUOfEGWTh4fPhLxoPqDVgpLwIGueBnABZtRfSX5inZI4WBQFURaaL9W4Y5V4v24WZoAzqJZd3xrWP0kUk', 'state': 'ZNroQQVOPbhfgiKn', 'code': 'PO2dZ92lkRnGMrUQMXry0uYsT2WrodwkEKDgw5ejg8M.xql59IvwwRlxXlac-LEqmWuZNtB00apqvJlQrKwYepY'}
2.493 AuthorizationResponse {
"code": "PO2dZ92lkRnGMrUQMXry0uYsT2WrodwkEKDgw5ejg8M.xql59IvwwRlxXlac-LEqmWuZNtB00apqvJlQrKwYepY",
"id_token": {
"aud": [
"c33f10fb-702e-490d-837d-d0962571f97e"
],
"auth_time": 1529750975,
"c_hash": "qO6uoTRUKzo-IXzADTmq1Q",
"exp": 1529754773,
"iat": 1529751173,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "e1d060d0-1fdf-4bcb-bada-4902c0bc5d12",
"nonce": "dDthcIXLhoMk7zes",
"rat": 1529751171,
"sub": "[email protected]"
},
"state": "ZNroQQVOPbhfgiKn"
}
2.493 phase <--<-- 4 --- AccessToken -->-->
2.494 --> request op_args: {'state': 'ZNroQQVOPbhfgiKn'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.494 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'ZNroQQVOPbhfgiKn', 'code': 'PO2dZ92lkRnGMrUQMXry0uYsT2WrodwkEKDgw5ejg8M.xql59IvwwRlxXlac-LEqmWuZNtB00apqvJlQrKwYepY', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'c33f10fb-702e-490d-837d-d0962571f97e'}, 'state': 'ZNroQQVOPbhfgiKn'}
2.494 AccessTokenRequest {
"code": "PO2dZ92lkRnGMrUQMXry0uYsT2WrodwkEKDgw5ejg8M.xql59IvwwRlxXlac-LEqmWuZNtB00apqvJlQrKwYepY",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "ZNroQQVOPbhfgiKn"
}
2.494 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.494 request_http_args {'headers': {'Authorization': 'Basic YzMzZjEwZmItNzAyZS00OTBkLTgzN2QtZDA5NjI1NzFmOTdlOjR6JTdFUk9ZSHBJekNi', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.494 request code=PO2dZ92lkRnGMrUQMXry0uYsT2WrodwkEKDgw5ejg8M.xql59IvwwRlxXlac-LEqmWuZNtB00apqvJlQrKwYepY&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=ZNroQQVOPbhfgiKn
2.706 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.707 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYzMzZjEwZmItNzAyZS00OTBkLTgzN2QtZDA5NjI1NzFmOTdlIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoicU82dW9UUlVLem8tSVh6QURUbXExUSIsImV4cCI6MTUyOTc1NDc3MywiaWF0IjoxNTI5NzUxMTczLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiIxYjQ1NTMxZC1iNzc3LTQwNWEtYThhOS0wYThjMzg4OTdlM2QiLCJub25jZSI6ImREdGhjSVhMaG9Nazd6ZXMiLCJyYXQiOjE1Mjk3NTExNzEsInN1YiI6ImZvb0BiYXIuY29tIn0.VB0gpjQD43LQ-o9RJkVOwlm365mPveES6Vw6I6-xgLWYL2kGlm_iWcd6SdFAL7TQ8-AI1xS1RL1WXqdKQhiescmf1JeF3d99hXLByvqTF5_b65lSvCqQ7F4E-rYBBiMzGMjrlrXt0IoEynENtaKnKQ58RnAxYEja1OGDrX0E_t6HmI33Mr-_0jmYKi9n_-RTShWisS5htc7a_OWToBWRJni0G_yAhpYKWXTB104m9bm6PwOl3F0eaohu8tE7kL1dfpFKblyDzmlojW2ae2bNxaLvIw8kTNZ8eSextHqWIxwPFK-IbP7l0zqEHqKquyAPNkJPVYv3mWVvgkeuwgxq_Kz6EmZRBv61eFjL4VH5TD85FtlaKrB29s0J9kgi0aXeQa8tjWzApNYww3DJ7oPQS6gUIwckUaitA0cXkiZBoPqlMw2hx8oCIT-hwh0LhPlSdl1DnPFghKG008y5YnV5FWTdqG0IEc6_WWUnyWRAouL70ubs_fSVuHfZOs9L3aBJOTQ_WhMDgJmvEzvq4XkGWy8Uyk_DehkWiRgDKAJDVg6g3vTlY8ZGb7zvmLdR68UP9pAvjyl4WihVnm4ysOzFJ6w83orxaN2t4z7i8ZrfmulPMKRhyiMnXSF6Y_ZpCVqIWXi6ynn1dqnIC47EtDntHG-KH8Opg662jU2U8Adpv08', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'swVrd5CuG2eBQ0eQiGO5BEsbVXsXtFplXcpc8uIRiFA.q8b-fZvxdshQwIF0-L8my9-Wf9S2U_nfIqkh_HuluFk', 'scope': 'openid'}
2.71 AccessTokenResponse {
"access_token": "swVrd5CuG2eBQ0eQiGO5BEsbVXsXtFplXcpc8uIRiFA.q8b-fZvxdshQwIF0-L8my9-Wf9S2U_nfIqkh_HuluFk",
"expires_in": 3599,
"id_token": {
"aud": [
"c33f10fb-702e-490d-837d-d0962571f97e"
],
"auth_time": 1529750975,
"c_hash": "qO6uoTRUKzo-IXzADTmq1Q",
"exp": 1529754773,
"iat": 1529751173,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "1b45531d-b777-405a-a8a9-0a8c38897e3d",
"nonce": "dDthcIXLhoMk7zes",
"rat": 1529751171,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
2.71 phase <--<-- 5 --- UserInfo -->-->
2.711 do_user_info_request kwargs:{'state': 'ZNroQQVOPbhfgiKn', 'method': 'POST', 'behavior': 'use_authorization_header'}
2.711 request {'body': ''}
2.711 request_url https://oidc-certification.ory.sh:8443/userinfo
2.711 request_http_args {'headers': {'Authorization': 'Bearer swVrd5CuG2eBQ0eQiGO5BEsbVXsXtFplXcpc8uIRiFA.q8b-fZvxdshQwIF0-L8my9-Wf9S2U_nfIqkh_HuluFk', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.784 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
2.785 OpenIDSchema {
"sub": "[email protected]"
}
2.785 OpenIDSchema {
"sub": "[email protected]"
}
2.785 phase <--<-- 6 --- Done -->-->
2.785 end
2.786 assertion VerifyResponse
2.786 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.786 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Registration-Dynamic.txt 0000644 0000000 0000000 00000011613 13313423103 016255 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-Dynamic
Test description: Client registration request
Timestamp: 2018-06-23T10:51:47Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.07 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.072 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.072 phase <--<-- 2 --- Registration -->-->
0.072 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.072 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#aVT41venqjHeHmMa"
],
"response_types": [
"code id_token"
]
}
0.228 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.229 RegistrationResponse {
"client_id": "5b349756-bbd9-460f-b6df-b690064edec2",
"client_secret": "tV10khdQwy1m",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "5b349756-bbd9-460f-b6df-b690064edec2",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#aVT41venqjHeHmMa"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.229 phase <--<-- 3 --- Done -->-->
0.229 end
0.23 assertion CheckHTTPResponse
0.23 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.23 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
Done: status=OK
============================================================
RESULT: PASSED
./OP-display-page.txt 0000644 0000000 0000000 00000022063 13313423234 014606 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-display-page
Test description: Request with display=page
Timestamp: 2018-06-23T10:53:16Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
7.39 phase <--<-- 1 --- Webfinger -->-->
7.391 not expected to do WebFinger
7.391 phase <--<-- 2 --- Discovery -->-->
7.391 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
7.476 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
7.477 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
7.477 phase <--<-- 3 --- Registration -->-->
7.477 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
7.478 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#ekUoir3BzIdrIhA2"
],
"response_types": [
"code id_token"
]
}
7.643 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
7.644 RegistrationResponse {
"client_id": "3e7bb4cb-2870-460e-8aec-16ce918b242d",
"client_secret": "B0~lL4eV.UXQ",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "3e7bb4cb-2870-460e-8aec-16ce918b242d",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#ekUoir3BzIdrIhA2"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
7.644 phase <--<-- 4 --- AsyncAuthn -->-->
7.645 AuthorizationRequest {
"client_id": "3e7bb4cb-2870-460e-8aec-16ce918b242d",
"display": "page",
"nonce": "bmimf5CAulOnXaTI",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "0TeRiQinuw3aYQH0"
}
7.645 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=3e7bb4cb-2870-460e-8aec-16ce918b242d&state=0TeRiQinuw3aYQH0&response_type=code+id_token&nonce=bmimf5CAulOnXaTI&display=page
7.645 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=3e7bb4cb-2870-460e-8aec-16ce918b242d&state=0TeRiQinuw3aYQH0&response_type=code+id_token&nonce=bmimf5CAulOnXaTI&display=page
10.504 http args {}
10.671 response URL with fragment
10.672 response code=2F3v2l_UCmkXeyioyqeRujdKsNz0KgcY61wPU3VPrVM.UuLTifXNuqkWwdDWKC4jybXILE2enCaNKj8Wd1YniMs&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiM2U3YmI0Y2ItMjg3MC00NjBlLThhZWMtMTZjZTkxOGIyNDJkIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiTEVyekdVWmNkWE5jT0VkU0tMRDNwZyIsImV4cCI6MTUyOTc1NDc5NiwiaWF0IjoxNTI5NzUxMTk2LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJkZGIyNjYwYy03OTE3LTRjMzktOWM2Zi1jNzRkNTEwOWRjMTYiLCJub25jZSI6ImJtaW1mNUNBdWxPblhhVEkiLCJyYXQiOjE1Mjk3NTExOTMsInN1YiI6ImZvb0BiYXIuY29tIn0.dNYUeCaD5hEaMyw3tJus49KCjmrB1SI-G7SpC24RNaBSi2OnmHGKQxb0LJOJ3eIHpR3MXAOXr-ClRM9oFURBGq2F7VSJQlmSU3XnTt25-KUKFcUo0jLZwMo-tbxS954LQyeVCez6xH9HRW3nfQ_ZCs6UP0s1EJ6lPv04_fJ5dT1PQmEK6hrEmjDHZjXdqUH_IiVxWoJAYC3yAe6K5aTxKdQwfSZZhZel029t-bDHv3FzzsKKrxjU9p8TfcXrLsT_tsnXrkPuaaomR-UcFP3fMpykpv8tMNV1osCXBQ-uHVIKO_kApL5R5_jTaKu_sWLksLzJxOgs3gbzMjpEImIBvrZ_RopSmTcwzMwiNY_S7Nwo-7bHeQmsFh_W16aEWnJPgnx_Re05UjGbz-dm1W3jQAqZXSWtPgPeXISzAQ3pv19TGHPhv-XUeKk3j9brm3XCLP5kDP6Q8N7BbjNNuJHfVC6fReD9HAG4uW_1XvIcaFD5CZ99EyTaEsp3Z8qeHNDAUG6ORFmKYPMDIuvhLTB-uE-PbC1RsF9ZQqww_mGhkHjqySA3D3jH0YD043P8LR4RExZjKLyYsXILENqiIpJTSPUe3ZNsBuSQKNmkiCLhckGN4LTAfaNyDt-ogTeMOaWh-JSPuKER2uI59BxWkiA0ExaM4IPX_LFkSNCafjT7nYo&state=0TeRiQinuw3aYQH0
10.672 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiM2U3YmI0Y2ItMjg3MC00NjBlLThhZWMtMTZjZTkxOGIyNDJkIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiTEVyekdVWmNkWE5jT0VkU0tMRDNwZyIsImV4cCI6MTUyOTc1NDc5NiwiaWF0IjoxNTI5NzUxMTk2LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJkZGIyNjYwYy03OTE3LTRjMzktOWM2Zi1jNzRkNTEwOWRjMTYiLCJub25jZSI6ImJtaW1mNUNBdWxPblhhVEkiLCJyYXQiOjE1Mjk3NTExOTMsInN1YiI6ImZvb0BiYXIuY29tIn0.dNYUeCaD5hEaMyw3tJus49KCjmrB1SI-G7SpC24RNaBSi2OnmHGKQxb0LJOJ3eIHpR3MXAOXr-ClRM9oFURBGq2F7VSJQlmSU3XnTt25-KUKFcUo0jLZwMo-tbxS954LQyeVCez6xH9HRW3nfQ_ZCs6UP0s1EJ6lPv04_fJ5dT1PQmEK6hrEmjDHZjXdqUH_IiVxWoJAYC3yAe6K5aTxKdQwfSZZhZel029t-bDHv3FzzsKKrxjU9p8TfcXrLsT_tsnXrkPuaaomR-UcFP3fMpykpv8tMNV1osCXBQ-uHVIKO_kApL5R5_jTaKu_sWLksLzJxOgs3gbzMjpEImIBvrZ_RopSmTcwzMwiNY_S7Nwo-7bHeQmsFh_W16aEWnJPgnx_Re05UjGbz-dm1W3jQAqZXSWtPgPeXISzAQ3pv19TGHPhv-XUeKk3j9brm3XCLP5kDP6Q8N7BbjNNuJHfVC6fReD9HAG4uW_1XvIcaFD5CZ99EyTaEsp3Z8qeHNDAUG6ORFmKYPMDIuvhLTB-uE-PbC1RsF9ZQqww_mGhkHjqySA3D3jH0YD043P8LR4RExZjKLyYsXILENqiIpJTSPUe3ZNsBuSQKNmkiCLhckGN4LTAfaNyDt-ogTeMOaWh-JSPuKER2uI59BxWkiA0ExaM4IPX_LFkSNCafjT7nYo', 'state': '0TeRiQinuw3aYQH0', 'code': '2F3v2l_UCmkXeyioyqeRujdKsNz0KgcY61wPU3VPrVM.UuLTifXNuqkWwdDWKC4jybXILE2enCaNKj8Wd1YniMs'}
10.753 AuthorizationResponse {
"code": "2F3v2l_UCmkXeyioyqeRujdKsNz0KgcY61wPU3VPrVM.UuLTifXNuqkWwdDWKC4jybXILE2enCaNKj8Wd1YniMs",
"id_token": {
"aud": [
"3e7bb4cb-2870-460e-8aec-16ce918b242d"
],
"auth_time": 1529750975,
"c_hash": "LErzGUZcdXNcOEdSKLD3pg",
"exp": 1529754796,
"iat": 1529751196,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "ddb2660c-7917-4c39-9c6f-c74d5109dc16",
"nonce": "bmimf5CAulOnXaTI",
"rat": 1529751193,
"sub": "[email protected]"
},
"state": "0TeRiQinuw3aYQH0"
}
10.753 phase <--<-- 5 --- Done -->-->
10.753 end
10.753 assertion VerifyResponse
10.753 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
10.753 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Registration-Endpoint.txt 0000644 0000000 0000000 00000005207 13313423105 016455 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-Endpoint
Test description: Verify that registration_endpoint is published
Timestamp: 2018-06-23T10:51:49Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.074 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.076 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.076 phase <--<-- 2 --- Done -->-->
0.076 end
0.076 assertion VerifyOPHasRegistrationEndpoint
0.076 condition verify-op-has-registration-endpoint: status=OK [Verify that the OP has a registration endpoint]
0.076 condition Done: status=OK
============================================================
Conditions
verify-op-has-registration-endpoint: status=OK [Verify that the OP has a registration endpoint]
Done: status=OK
============================================================
RESULT: PASSED
./OP-IDToken-C-Signature.txt 0000644 0000000 0000000 00000031031 13313423144 015636 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-IDToken-C-Signature
Test description: Does the OP sign the ID Token and with what
Timestamp: 2018-06-23T10:52:20Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Registration -->-->
0.074 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.074 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#XiIminCBzanmSSIl"
],
"response_types": [
"code id_token"
]
}
0.233 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.234 RegistrationResponse {
"client_id": "00068b75-61fb-4b08-9c0e-72bb0f2ddf12",
"client_secret": "e33_WHog_Ikl",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "00068b75-61fb-4b08-9c0e-72bb0f2ddf12",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#XiIminCBzanmSSIl"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.234 phase <--<-- 3 --- AsyncAuthn -->-->
0.234 AuthorizationRequest {
"client_id": "00068b75-61fb-4b08-9c0e-72bb0f2ddf12",
"nonce": "HSzVU44xLhqXeUa4",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "A6WIQrkFEoCM1izG"
}
0.234 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=00068b75-61fb-4b08-9c0e-72bb0f2ddf12&state=A6WIQrkFEoCM1izG&response_type=code+id_token&nonce=HSzVU44xLhqXeUa4
0.234 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=00068b75-61fb-4b08-9c0e-72bb0f2ddf12&state=A6WIQrkFEoCM1izG&response_type=code+id_token&nonce=HSzVU44xLhqXeUa4
2.61 http args {}
2.784 response URL with fragment
2.784 response code=9sLzymMA-2Vk7HBo9Esgo6cqVgEm9JZEGaNtcmJU-h8.AgNR2qzmob1bhvmIM3ikVYzylGmejSTRvoqiCtMgGtg&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMDAwNjhiNzUtNjFmYi00YjA4LTljMGUtNzJiYjBmMmRkZjEyIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiRnR2MWViVDN0cE81cUVDeFo2eTdZdyIsImV4cCI6MTUyOTc1NDczOSwiaWF0IjoxNTI5NzUxMTM5LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiIzYzBmMzYyMS1iZGE2LTRmM2YtOGEyMS1iNmRkMDc2OTg3YjYiLCJub25jZSI6IkhTelZVNDR4TGhxWGVVYTQiLCJyYXQiOjE1Mjk3NTExMzcsInN1YiI6ImZvb0BiYXIuY29tIn0.whGFRnijiE_HrMMOwLaFqITjJM62R1RnW0OMohWI5GXqKdPAjVkxJerxcgKpWgnNgRz7s5Fe2LV6o9BL6bTZoiHWaS5fYCXS6RSFGmDBlFcjNiu9V0Fnwrx0NLn2Bib45tGM1aE22t8bnDjDDdPlKZkFwQzB8VD9ydA5S_OtQNrb0doeEup-58KNVSF1N_CjjZhc6ccnFY22etVReRvOe7y5Ocbq_JM_0Xyp072VU8PtkF2NaxOpzp4cE7sjXpwMmsAm-cJJ8uVOZ1l-PqWyLIYNMALvrvvKcpHT21gYt4N9toSji4E2zW6SNJvEv9qYfLqLwlCICWCspDzyZKTuzh-uHjC9QXKmHyxZznjXxSZrj-jUmpOMlj7-l8Bye2wABbFoMl1Fr2EVBvN8kwRW_lKZIMskSmfoQF9EQYg8IIfkQUNsmrddgfQuN9IERT3vS8vi_CgM28Rm156mpSQOgGoH7x6xOon_0EBn1g-LvhsI1HPtsFsq5zs-C2wlswageO7B1OwglvRMyS07MShGzzGMd2e5gucTk--s8WSDzXBclGctbQkEDCFoyz9FvzrUWKJsEizL4Pno75CSfW4T2XoDUAfQu-evJFTkzA5sAKhAA_fgO0daWbisMCD3rv-JlsrSG4zs41QVd3QyJ2gBDKt91LD2SzK6rhsXyaRTpKQ&state=A6WIQrkFEoCM1izG
2.784 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMDAwNjhiNzUtNjFmYi00YjA4LTljMGUtNzJiYjBmMmRkZjEyIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiRnR2MWViVDN0cE81cUVDeFo2eTdZdyIsImV4cCI6MTUyOTc1NDczOSwiaWF0IjoxNTI5NzUxMTM5LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiIzYzBmMzYyMS1iZGE2LTRmM2YtOGEyMS1iNmRkMDc2OTg3YjYiLCJub25jZSI6IkhTelZVNDR4TGhxWGVVYTQiLCJyYXQiOjE1Mjk3NTExMzcsInN1YiI6ImZvb0BiYXIuY29tIn0.whGFRnijiE_HrMMOwLaFqITjJM62R1RnW0OMohWI5GXqKdPAjVkxJerxcgKpWgnNgRz7s5Fe2LV6o9BL6bTZoiHWaS5fYCXS6RSFGmDBlFcjNiu9V0Fnwrx0NLn2Bib45tGM1aE22t8bnDjDDdPlKZkFwQzB8VD9ydA5S_OtQNrb0doeEup-58KNVSF1N_CjjZhc6ccnFY22etVReRvOe7y5Ocbq_JM_0Xyp072VU8PtkF2NaxOpzp4cE7sjXpwMmsAm-cJJ8uVOZ1l-PqWyLIYNMALvrvvKcpHT21gYt4N9toSji4E2zW6SNJvEv9qYfLqLwlCICWCspDzyZKTuzh-uHjC9QXKmHyxZznjXxSZrj-jUmpOMlj7-l8Bye2wABbFoMl1Fr2EVBvN8kwRW_lKZIMskSmfoQF9EQYg8IIfkQUNsmrddgfQuN9IERT3vS8vi_CgM28Rm156mpSQOgGoH7x6xOon_0EBn1g-LvhsI1HPtsFsq5zs-C2wlswageO7B1OwglvRMyS07MShGzzGMd2e5gucTk--s8WSDzXBclGctbQkEDCFoyz9FvzrUWKJsEizL4Pno75CSfW4T2XoDUAfQu-evJFTkzA5sAKhAA_fgO0daWbisMCD3rv-JlsrSG4zs41QVd3QyJ2gBDKt91LD2SzK6rhsXyaRTpKQ', 'state': 'A6WIQrkFEoCM1izG', 'code': '9sLzymMA-2Vk7HBo9Esgo6cqVgEm9JZEGaNtcmJU-h8.AgNR2qzmob1bhvmIM3ikVYzylGmejSTRvoqiCtMgGtg'}
2.866 AuthorizationResponse {
"code": "9sLzymMA-2Vk7HBo9Esgo6cqVgEm9JZEGaNtcmJU-h8.AgNR2qzmob1bhvmIM3ikVYzylGmejSTRvoqiCtMgGtg",
"id_token": {
"aud": [
"00068b75-61fb-4b08-9c0e-72bb0f2ddf12"
],
"auth_time": 1529750975,
"c_hash": "Ftv1ebT3tpO5qECxZ6y7Yw",
"exp": 1529754739,
"iat": 1529751139,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "3c0f3621-bda6-4f3f-8a21-b6dd076987b6",
"nonce": "HSzVU44xLhqXeUa4",
"rat": 1529751137,
"sub": "[email protected]"
},
"state": "A6WIQrkFEoCM1izG"
}
2.866 phase <--<-- 4 --- AccessToken -->-->
2.866 --> request op_args: {'state': 'A6WIQrkFEoCM1izG'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.866 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'A6WIQrkFEoCM1izG', 'code': '9sLzymMA-2Vk7HBo9Esgo6cqVgEm9JZEGaNtcmJU-h8.AgNR2qzmob1bhvmIM3ikVYzylGmejSTRvoqiCtMgGtg', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '00068b75-61fb-4b08-9c0e-72bb0f2ddf12'}, 'state': 'A6WIQrkFEoCM1izG'}
2.866 AccessTokenRequest {
"code": "9sLzymMA-2Vk7HBo9Esgo6cqVgEm9JZEGaNtcmJU-h8.AgNR2qzmob1bhvmIM3ikVYzylGmejSTRvoqiCtMgGtg",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "A6WIQrkFEoCM1izG"
}
2.866 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.866 request_http_args {'headers': {'Authorization': 'Basic MDAwNjhiNzUtNjFmYi00YjA4LTljMGUtNzJiYjBmMmRkZjEyOmUzM19XSG9nX0lrbA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.866 request code=9sLzymMA-2Vk7HBo9Esgo6cqVgEm9JZEGaNtcmJU-h8.AgNR2qzmob1bhvmIM3ikVYzylGmejSTRvoqiCtMgGtg&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=A6WIQrkFEoCM1izG
3.083 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.084 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMDAwNjhiNzUtNjFmYi00YjA4LTljMGUtNzJiYjBmMmRkZjEyIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiRnR2MWViVDN0cE81cUVDeFo2eTdZdyIsImV4cCI6MTUyOTc1NDczOSwiaWF0IjoxNTI5NzUxMTQwLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiIyOGUxNTM1Yy0xNWZkLTRkY2ItOWNiZS1mZWNhMzY2MTQ4MTciLCJub25jZSI6IkhTelZVNDR4TGhxWGVVYTQiLCJyYXQiOjE1Mjk3NTExMzcsInN1YiI6ImZvb0BiYXIuY29tIn0.YPgxbrGkXPTSogMnwqbK9s-4qs8KwgWCYX73iYEaBX2JcOEw689ZW6FrJKjsgEdpDg0clwuZMK-AE5-hvJnCbx9ZjCIH49JejsktMj2HUvKZTmqHGdfCxvjqrkx-LoaA6psimq7Avuf4HJI4OZNGWHYhPEfYvEg6rgeU4DiottqcTLvk9KoJe5saVl37gSSgQvsc-XNTnkKJ7xHvh2SFBDKZewLVs-mMNqirDE2c_ThC6h2w540iOCjdtFM_FyDxrpRcYz8NAY2VkH37HtNYZkmx2lSg9xU_Bk9I3_wB4FqHMFvrVX4kYqqojNjEkhPomuMXrGpFfGogsXhp3SEBKUO0FC37M1UCzi2yScMnnRIfm9ZZ2SWGuhrLFe5C7OB_dTTy5LVLjT_q4My5U-jj_Tm-5PPJA_P8nem_lc8DYBKicbtsaj8h8731FTnvR-rdZaCBlVflnXDqOqqjDKhRXxAJ1KJE2VDW-o5soVeNWGAi-L-DxNXJbirflw8ZYETXZq8ncjiAvbwx_8sBHDLGewc30IHQ5Y17cvhuYN5ALiBK3ABcCgr2S6qy9DrZuhv9H8kSmmnA3bqTjQ2z5oaKZp6GYHh52j2PXCXAfmDiDbvsKhkv0SzZi9WJ0m4vS4wmPBE1IbgiKL_zRLMy8yPY1GJ_V_q9iPfdj22y3l_Rzys', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'YzhhK2sEDyRCVI8B2x09IwsXPHz31rYFjH5kBRBMheI.JuYFEQDsObSnBximByVdrTnvRUaJ-q_r-FFKA5tJYj0', 'scope': 'openid'}
3.087 AccessTokenResponse {
"access_token": "YzhhK2sEDyRCVI8B2x09IwsXPHz31rYFjH5kBRBMheI.JuYFEQDsObSnBximByVdrTnvRUaJ-q_r-FFKA5tJYj0",
"expires_in": 3599,
"id_token": {
"aud": [
"00068b75-61fb-4b08-9c0e-72bb0f2ddf12"
],
"auth_time": 1529750975,
"c_hash": "Ftv1ebT3tpO5qECxZ6y7Yw",
"exp": 1529754739,
"iat": 1529751140,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "28e1535c-15fd-4dcb-9cbe-feca36614817",
"nonce": "HSzVU44xLhqXeUa4",
"rat": 1529751137,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.088 phase <--<-- 5 --- Done -->-->
3.088 end
3.088 assertion VerifyResponse
3.088 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.089 assertion IsIDTokenSigned
3.089 condition is-idtoken-signed: status=OK [Checks if the id_token is signed]
3.089 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
is-idtoken-signed: status=OK [Checks if the id_token is signed]
Done: status=OK
============================================================
RESULT: PASSED
|
|
hydra/internal/certification/CIT.F.T.T.s.tar | ./OP-Req-login_hint.txt 0000644 0000000 0000000 00000023425 13313424404 015111 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-login_hint
Test description: Providing login_hint
Timestamp: 2018-06-23T11:03:32Z
============================================================
Trace output
0.0 phase <--<-- 0 --- VerifyConfiguration -->-->
0.0 phase <--<-- 1 --- Note -->-->
1.301 phase <--<-- 2 --- Webfinger -->-->
1.301 not expected to do WebFinger
1.301 phase <--<-- 3 --- Discovery -->-->
1.301 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.379 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.381 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.381 phase <--<-- 4 --- Registration -->-->
1.381 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.381 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#iMhZbtPLHAwzSILx"
],
"response_types": [
"code id_token token"
]
}
1.543 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.544 RegistrationResponse {
"client_id": "f767b0fe-1dd3-42cb-98d4-a86776de06e6",
"client_secret": "DUY~qJny~2we",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "f767b0fe-1dd3-42cb-98d4-a86776de06e6",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#iMhZbtPLHAwzSILx"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.544 phase <--<-- 5 --- AsyncAuthn -->-->
1.545 AuthorizationRequest {
"client_id": "f767b0fe-1dd3-42cb-98d4-a86776de06e6",
"login_hint": "[email protected]",
"nonce": "emecVA5pSNei2jy2",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid",
"state": "zOrVzhYFXqHNxDJZ"
}
1.545 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=f767b0fe-1dd3-42cb-98d4-a86776de06e6&state=zOrVzhYFXqHNxDJZ&response_type=code+id_token+token&nonce=emecVA5pSNei2jy2&login_hint=foo%40bar.com
1.545 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=f767b0fe-1dd3-42cb-98d4-a86776de06e6&state=zOrVzhYFXqHNxDJZ&response_type=code+id_token+token&nonce=emecVA5pSNei2jy2&login_hint=foo%40bar.com
4.705 http args {}
4.878 response URL with fragment
4.879 response access_token=47ITfKaruryB9GrMGRKyLBmSuhHQDl8ViC-qnO3EZrA.ZZPtLM2Bpqe3p5rzKUtIDRCgZhzFq_u0O6O6bHWPo5U&code=Bf1eywuBVnYS_aKiMucY_FjsOY8iX2Za3Vs_aWdxuhE.CQw7bEclDbnU2sN7Zb1bokmiD41Ja1w9z26pErdDh4w&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiMVotMklvRTI1WGxBQlpsUkRYNmdYZyIsImF1ZCI6WyJmNzY3YjBmZS0xZGQzLTQyY2ItOThkNC1hODY3NzZkZTA2ZTYiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiJTbndpSHc0aVBTRXFhcmFhTmVZQTFnIiwiZXhwIjoxNTI5NzU1NDEyLCJpYXQiOjE1Mjk3NTE4MTIsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjFhMjczZGU4LTg2YmUtNDYyMy1hYzE5LWI4ZTM0MmQ5MzYzYiIsIm5vbmNlIjoiZW1lY1ZBNXBTTmVpMmp5MiIsInJhdCI6MTUyOTc1MTgwOSwic3ViIjoiZm9vQGJhci5jb20ifQ.A6CmSiett08dx7YRy_WZOm3PtdYlcsvLjXawmhqrGixwV3IXMJ5NmYtyJMZuv88esz3IQTRpvYwQnSLkIk3O0pSoQt7f2Dr_4aDRlPRicmblEwSEaVp-p4h5Gt-Ic7OicYk3gaLHI9Co_obq-7_FKChB4xWGiVdcfMnbTaOSDhZ2t0J9TQPlmddjrdDY3njKbItZB-j6g0M4PoYNK9bx4O-KN8xmf_TpsQ555u_QhuhapqG4VplYp9QVcWdSmeyoZQp4LLXOSNnfKDm84vwphbcmOumshzKmb-MSYxqjUPGlHQCR3jv6-uhJkPyBBbNMaw4qmgEODJCIT228qExXnhf9PgnYBufTgLBzRjSHkZEIhlc45ZrATiZYiS8XRqxZVAAad0iwhrOTWnMIHpzBtRSG4hUIJ-hK8988PAFOvpnjhtgOHZaUbLrGYEFH0am7Ay2_AQoeQiP63exS-epOVS2HEAG4s_aHuAYn_gs4hDciiZGWzViJSbrSVHFSn2mD1bNr8p2n88hJUfF28E_R6CDUmt3i7yvlq5FmcuTH5gh85CKTrzpCWPCdA5dQ2cVvFbbnilTnTIXIIR-hgGSnbuLZSf5VvCineasOp4arA9OeutLm6EdZx_CGpwXe3t0jhaDfWuDk9Xynz25MGmlLF9oGn0o6EC6nv99h1EKV9RQ&scope=openid&state=zOrVzhYFXqHNxDJZ&token_type=bearer
4.879 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiMVotMklvRTI1WGxBQlpsUkRYNmdYZyIsImF1ZCI6WyJmNzY3YjBmZS0xZGQzLTQyY2ItOThkNC1hODY3NzZkZTA2ZTYiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiJTbndpSHc0aVBTRXFhcmFhTmVZQTFnIiwiZXhwIjoxNTI5NzU1NDEyLCJpYXQiOjE1Mjk3NTE4MTIsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjFhMjczZGU4LTg2YmUtNDYyMy1hYzE5LWI4ZTM0MmQ5MzYzYiIsIm5vbmNlIjoiZW1lY1ZBNXBTTmVpMmp5MiIsInJhdCI6MTUyOTc1MTgwOSwic3ViIjoiZm9vQGJhci5jb20ifQ.A6CmSiett08dx7YRy_WZOm3PtdYlcsvLjXawmhqrGixwV3IXMJ5NmYtyJMZuv88esz3IQTRpvYwQnSLkIk3O0pSoQt7f2Dr_4aDRlPRicmblEwSEaVp-p4h5Gt-Ic7OicYk3gaLHI9Co_obq-7_FKChB4xWGiVdcfMnbTaOSDhZ2t0J9TQPlmddjrdDY3njKbItZB-j6g0M4PoYNK9bx4O-KN8xmf_TpsQ555u_QhuhapqG4VplYp9QVcWdSmeyoZQp4LLXOSNnfKDm84vwphbcmOumshzKmb-MSYxqjUPGlHQCR3jv6-uhJkPyBBbNMaw4qmgEODJCIT228qExXnhf9PgnYBufTgLBzRjSHkZEIhlc45ZrATiZYiS8XRqxZVAAad0iwhrOTWnMIHpzBtRSG4hUIJ-hK8988PAFOvpnjhtgOHZaUbLrGYEFH0am7Ay2_AQoeQiP63exS-epOVS2HEAG4s_aHuAYn_gs4hDciiZGWzViJSbrSVHFSn2mD1bNr8p2n88hJUfF28E_R6CDUmt3i7yvlq5FmcuTH5gh85CKTrzpCWPCdA5dQ2cVvFbbnilTnTIXIIR-hgGSnbuLZSf5VvCineasOp4arA9OeutLm6EdZx_CGpwXe3t0jhaDfWuDk9Xynz25MGmlLF9oGn0o6EC6nv99h1EKV9RQ', 'scope': 'openid', 'code': 'Bf1eywuBVnYS_aKiMucY_FjsOY8iX2Za3Vs_aWdxuhE.CQw7bEclDbnU2sN7Zb1bokmiD41Ja1w9z26pErdDh4w', 'access_token': '47ITfKaruryB9GrMGRKyLBmSuhHQDl8ViC-qnO3EZrA.ZZPtLM2Bpqe3p5rzKUtIDRCgZhzFq_u0O6O6bHWPo5U', 'state': 'zOrVzhYFXqHNxDJZ', 'expires_in': 3599, 'token_type': 'bearer'}
4.96 AuthorizationResponse {
"access_token": "47ITfKaruryB9GrMGRKyLBmSuhHQDl8ViC-qnO3EZrA.ZZPtLM2Bpqe3p5rzKUtIDRCgZhzFq_u0O6O6bHWPo5U",
"code": "Bf1eywuBVnYS_aKiMucY_FjsOY8iX2Za3Vs_aWdxuhE.CQw7bEclDbnU2sN7Zb1bokmiD41Ja1w9z26pErdDh4w",
"expires_in": 3599,
"id_token": {
"at_hash": "1Z-2IoE25XlABZlRDX6gXg",
"aud": [
"f767b0fe-1dd3-42cb-98d4-a86776de06e6"
],
"auth_time": 1529751698,
"c_hash": "SnwiHw4iPSEqaraaNeYA1g",
"exp": 1529755412,
"iat": 1529751812,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "1a273de8-86be-4623-ac19-b8e342d9363b",
"nonce": "emecVA5pSNei2jy2",
"rat": 1529751809,
"sub": "[email protected]"
},
"scope": "openid",
"state": "zOrVzhYFXqHNxDJZ",
"token_type": "bearer"
}
4.96 phase <--<-- 6 --- Done -->-->
4.96 end
4.96 assertion VerifyAuthnResponse
4.96 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
4.96 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-nonce-NoReq-noncode.txt 0000644 0000000 0000000 00000017716 13313424203 016004 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-nonce-NoReq-noncode
Test description: Reject requests without nonce unless using the code flow
Timestamp: 2018-06-23T11:01:23Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.078 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.079 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.079 phase <--<-- 2 --- Note -->-->
1.272 phase <--<-- 3 --- Registration -->-->
1.272 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.273 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#ivK7woHoFkQqCRQk"
],
"response_types": [
"code id_token token"
]
}
1.433 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.434 RegistrationResponse {
"client_id": "56452c12-8639-45a9-a29b-befed9217744",
"client_secret": "L7d1I3FVaFRF",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "56452c12-8639-45a9-a29b-befed9217744",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#ivK7woHoFkQqCRQk"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.434 phase <--<-- 4 --- AsyncAuthn -->-->
1.435 AuthorizationRequest {
"client_id": "56452c12-8639-45a9-a29b-befed9217744",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid",
"state": "clgfmwrof4gsJVIs"
}
1.435 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?state=clgfmwrof4gsJVIs&scope=openid&response_type=code+id_token+token&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=56452c12-8639-45a9-a29b-befed9217744
1.435 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?state=clgfmwrof4gsJVIs&scope=openid&response_type=code+id_token+token&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=56452c12-8639-45a9-a29b-befed9217744
4.138 http args {}
4.342 response URL with fragment
4.343 response error=invalid_request&error_debug=Parameter+nonce+must+be+set+when+using+the+hybrid+flow&error_description=The+request+is+missing+a+required+parameter%252C+includes+an+invalid+parameter+value%252C+includes+a+parameter+more+than+once%252C+or+is+otherwise+malformed&error_hint=Make+sure+that+the+various+parameters+are+correct%252C+be+aware+of+case+sensitivity+and+trim+your+parameters.+Make+sure+that+the+client+you+are+using+has+exactly+whitelisted+the+redirect_uri+you+specified.&state=clgfmwrof4gsJVIs
4.343 response {'error_debug': 'Parameter nonce must be set when using the hybrid flow', 'error_description': 'The request is missing a required parameter%2C includes an invalid parameter value%2C includes a parameter more than once%2C or is otherwise malformed', 'state': 'clgfmwrof4gsJVIs', 'error': 'invalid_request', 'error_hint': 'Make sure that the various parameters are correct%2C be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.'}
4.343 AuthorizationErrorResponse {
"error": "invalid_request",
"error_debug": "Parameter nonce must be set when using the hybrid flow",
"error_description": "The request is missing a required parameter%2C includes an invalid parameter value%2C includes a parameter more than once%2C or is otherwise malformed",
"error_hint": "Make sure that the various parameters are correct%2C be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.",
"state": "clgfmwrof4gsJVIs"
}
4.343 AuthorizationErrorResponse {
"error": "invalid_request",
"error_debug": "Parameter nonce must be set when using the hybrid flow",
"error_description": "The request is missing a required parameter%2C includes an invalid parameter value%2C includes a parameter more than once%2C or is otherwise malformed",
"error_hint": "Make sure that the various parameters are correct%2C be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.",
"state": "clgfmwrof4gsJVIs"
}
4.344 phase <--<-- 5 --- Done -->-->
4.344 end
4.344 assertion VerifyResponse
4.344 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.344 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-IDToken-RS256.txt 0000644 0000000 0000000 00000032565 13313424073 014315 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-IDToken-RS256
Test description: Asymmetric ID Token signature with RS256
Timestamp: 2018-06-23T11:00:11Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.083 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.084 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.084 phase <--<-- 2 --- Registration -->-->
0.085 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'id_token_signed_response_alg': 'RS256', 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.085 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id_token_signed_response_alg": "RS256",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#H4fwP31BEal3FAx0"
],
"response_types": [
"code id_token token"
]
}
0.24 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.241 RegistrationResponse {
"client_id": "baa382ab-42d7-40bc-a90c-1efa3efd5e74",
"client_secret": "3l-cCFFbRd7g",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "baa382ab-42d7-40bc-a90c-1efa3efd5e74",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#H4fwP31BEal3FAx0"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.241 phase <--<-- 3 --- AsyncAuthn -->-->
0.241 AuthorizationRequest {
"client_id": "baa382ab-42d7-40bc-a90c-1efa3efd5e74",
"nonce": "N1G5Uf8uoEfoC5rs",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid",
"state": "ZRzmwOlCKAA5vAdt"
}
0.242 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=baa382ab-42d7-40bc-a90c-1efa3efd5e74&state=ZRzmwOlCKAA5vAdt&response_type=code+id_token+token&nonce=N1G5Uf8uoEfoC5rs
0.242 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=baa382ab-42d7-40bc-a90c-1efa3efd5e74&state=ZRzmwOlCKAA5vAdt&response_type=code+id_token+token&nonce=N1G5Uf8uoEfoC5rs
2.628 http args {}
2.811 response URL with fragment
2.811 response access_token=h3dSNDUZgc8AHlQkM-m-3LzzIoE3QpLNy9evw2TWB1M.G8KQR2Zo9JXDMuOsbxCboVzKrNYxdarG9oP_FnJarbM&code=lFLubcr4XPsgM87JaU4xW8yyjGU_V8_p0rdUcsnbbZE.d2EiQ6-7u-hvSRpsmoASy19n1xxyjTSdUen-pFFLwCU&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiUkZPZDJleUhIV0lGYmRyN004d3paQSIsImF1ZCI6WyJiYWEzODJhYi00MmQ3LTQwYmMtYTkwYy0xZWZhM2VmZDVlNzQiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJIVUQ1ZGYzQ3g3dTNGUl9SbDZEZmNBIiwiZXhwIjoxNTI5NzU1MjEwLCJpYXQiOjE1Mjk3NTE2MTAsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjUzYjIzOWM1LTMxMjUtNGM1Ny04ZmRkLTI0Y2Y3NjFiMzEzMyIsIm5vbmNlIjoiTjFHNVVmOHVvRWZvQzVycyIsInJhdCI6MTUyOTc1MTYwOCwic3ViIjoiZm9vQGJhci5jb20ifQ.QS-7XpuJu8REC9iw7eh7GFMlekQFeiA5u3TtyX__5uugASwPhqpn2RQf1str4QGbr-hRwWvpPK-5ZOjyBSBaMtPQf14UONBA6uzdkzb3Q5NTnErgDVy_e-ttznlMNtGdEqnxEw11ktIsTy2Gbe__3bJ6r1zfqlQdCnLFstMOfcbQvvD_UWleCjNTDzEUwu721ni2DT0FVrsJ4QkZUzH60OGyK1Ptft2X_TPmsz044tklBVZV_TXFJqq_hFyatyjww10_jNo-lvuKOJ8KbggRVSrej7u_SQfieka-K-ht0fA88zuL4p2j5kECiTt9MWicG1ikGYMwUDM3ACaVtZYVDCO-RhCIxajKwYZvVY6mRrLPB24gVCJUyagvzj8oVHZcq0LyuV-d8Me2qlatYkVGjnvdLdUzOMjs7Y10RoXicHFEtO76Qsa92a974FidM8lA4nT61Y6XccqwK-1rJr43dqT40CfO7kI7XFwR5YCXnAuESt-eC4BQjuCi3Xy6XPK77OreDAl8X6TKl9LmGX-dSknM37yQbx2N2IFvChZuR24Urwis-89vNXtqP4t3D4nknFvPaVIAJHUsusCdxaruAnsLs7pcp9AUNADwZHHe-C6CNP6W_uP7amRIYVjzX4SiiRw8hUMo-mv3FSIjZDufoL_A2eL3T4yii2vncNostZM&scope=openid&state=ZRzmwOlCKAA5vAdt&token_type=bearer
2.811 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiUkZPZDJleUhIV0lGYmRyN004d3paQSIsImF1ZCI6WyJiYWEzODJhYi00MmQ3LTQwYmMtYTkwYy0xZWZhM2VmZDVlNzQiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJIVUQ1ZGYzQ3g3dTNGUl9SbDZEZmNBIiwiZXhwIjoxNTI5NzU1MjEwLCJpYXQiOjE1Mjk3NTE2MTAsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjUzYjIzOWM1LTMxMjUtNGM1Ny04ZmRkLTI0Y2Y3NjFiMzEzMyIsIm5vbmNlIjoiTjFHNVVmOHVvRWZvQzVycyIsInJhdCI6MTUyOTc1MTYwOCwic3ViIjoiZm9vQGJhci5jb20ifQ.QS-7XpuJu8REC9iw7eh7GFMlekQFeiA5u3TtyX__5uugASwPhqpn2RQf1str4QGbr-hRwWvpPK-5ZOjyBSBaMtPQf14UONBA6uzdkzb3Q5NTnErgDVy_e-ttznlMNtGdEqnxEw11ktIsTy2Gbe__3bJ6r1zfqlQdCnLFstMOfcbQvvD_UWleCjNTDzEUwu721ni2DT0FVrsJ4QkZUzH60OGyK1Ptft2X_TPmsz044tklBVZV_TXFJqq_hFyatyjww10_jNo-lvuKOJ8KbggRVSrej7u_SQfieka-K-ht0fA88zuL4p2j5kECiTt9MWicG1ikGYMwUDM3ACaVtZYVDCO-RhCIxajKwYZvVY6mRrLPB24gVCJUyagvzj8oVHZcq0LyuV-d8Me2qlatYkVGjnvdLdUzOMjs7Y10RoXicHFEtO76Qsa92a974FidM8lA4nT61Y6XccqwK-1rJr43dqT40CfO7kI7XFwR5YCXnAuESt-eC4BQjuCi3Xy6XPK77OreDAl8X6TKl9LmGX-dSknM37yQbx2N2IFvChZuR24Urwis-89vNXtqP4t3D4nknFvPaVIAJHUsusCdxaruAnsLs7pcp9AUNADwZHHe-C6CNP6W_uP7amRIYVjzX4SiiRw8hUMo-mv3FSIjZDufoL_A2eL3T4yii2vncNostZM', 'scope': 'openid', 'code': 'lFLubcr4XPsgM87JaU4xW8yyjGU_V8_p0rdUcsnbbZE.d2EiQ6-7u-hvSRpsmoASy19n1xxyjTSdUen-pFFLwCU', 'access_token': 'h3dSNDUZgc8AHlQkM-m-3LzzIoE3QpLNy9evw2TWB1M.G8KQR2Zo9JXDMuOsbxCboVzKrNYxdarG9oP_FnJarbM', 'state': 'ZRzmwOlCKAA5vAdt', 'expires_in': 3599, 'token_type': 'bearer'}
2.899 AuthorizationResponse {
"access_token": "h3dSNDUZgc8AHlQkM-m-3LzzIoE3QpLNy9evw2TWB1M.G8KQR2Zo9JXDMuOsbxCboVzKrNYxdarG9oP_FnJarbM",
"code": "lFLubcr4XPsgM87JaU4xW8yyjGU_V8_p0rdUcsnbbZE.d2EiQ6-7u-hvSRpsmoASy19n1xxyjTSdUen-pFFLwCU",
"expires_in": 3599,
"id_token": {
"at_hash": "RFOd2eyHHWIFbdr7M8wzZA",
"aud": [
"baa382ab-42d7-40bc-a90c-1efa3efd5e74"
],
"auth_time": 1529751409,
"c_hash": "HUD5df3Cx7u3FR_Rl6DfcA",
"exp": 1529755210,
"iat": 1529751610,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "53b239c5-3125-4c57-8fdd-24cf761b3133",
"nonce": "N1G5Uf8uoEfoC5rs",
"rat": 1529751608,
"sub": "[email protected]"
},
"scope": "openid",
"state": "ZRzmwOlCKAA5vAdt",
"token_type": "bearer"
}
2.899 phase <--<-- 4 --- AccessToken -->-->
2.9 --> request op_args: {'state': 'ZRzmwOlCKAA5vAdt'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.9 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'ZRzmwOlCKAA5vAdt', 'code': 'lFLubcr4XPsgM87JaU4xW8yyjGU_V8_p0rdUcsnbbZE.d2EiQ6-7u-hvSRpsmoASy19n1xxyjTSdUen-pFFLwCU', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'baa382ab-42d7-40bc-a90c-1efa3efd5e74'}, 'state': 'ZRzmwOlCKAA5vAdt'}
2.9 AccessTokenRequest {
"code": "lFLubcr4XPsgM87JaU4xW8yyjGU_V8_p0rdUcsnbbZE.d2EiQ6-7u-hvSRpsmoASy19n1xxyjTSdUen-pFFLwCU",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "ZRzmwOlCKAA5vAdt"
}
2.9 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.9 request_http_args {'headers': {'Authorization': 'Basic YmFhMzgyYWItNDJkNy00MGJjLWE5MGMtMWVmYTNlZmQ1ZTc0OjNsLWNDRkZiUmQ3Zw==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.9 request code=lFLubcr4XPsgM87JaU4xW8yyjGU_V8_p0rdUcsnbbZE.d2EiQ6-7u-hvSRpsmoASy19n1xxyjTSdUen-pFFLwCU&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=ZRzmwOlCKAA5vAdt
3.146 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.147 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiUkZPZDJleUhIV0lGYmRyN004d3paQSIsImF1ZCI6WyJiYWEzODJhYi00MmQ3LTQwYmMtYTkwYy0xZWZhM2VmZDVlNzQiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJIVUQ1ZGYzQ3g3dTNGUl9SbDZEZmNBIiwiZXhwIjoxNTI5NzU1MjEwLCJpYXQiOjE1Mjk3NTE2MTEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImY0ZGFkMzgwLWM0MDktNGUwYy1hNGViLTVkM2NlZmYxZmZlNiIsIm5vbmNlIjoiTjFHNVVmOHVvRWZvQzVycyIsInJhdCI6MTUyOTc1MTYwOCwic3ViIjoiZm9vQGJhci5jb20ifQ.SSZcdm6vhxsgJBw6LFCpYy3lH6Jd7nryxhBkWfM56zt11Splddk1f2Z_8Y2rztY0hQ0QoiCXFiT9CxV_DsWj7hPLdblu4nYdNUpg-xd3tdpVoEkzuphi14E73FWxcLzqa8WJLBBAei6BM--2EDHxpa_A2PbC1n_E1bAPN3LmTGZNYhsLq7SpojSA4JmuQwaU8tzTWTDjpmX36EvS3JOMKmYqmK6Mhj7AwsoJRnPfo0SqpfjJ7UqKrcRLOUjSXRorNB1bSDpTVS0JSHEja2xA0PuBsw5rpVDYt1piLYFZzi_QnCWFdwxV0gvu2OneP2bgBfoylLCMVuxnMQ1gyJ6TAOtWRVtf4j8znrL9i0xJBMpdWBduO26fn6UZUOgyQskPrAyTXbVXf_aMyTe_5XJA_MAXpl3nSFdW3Vj-8k8uEQ-qtdpg7t_-IwCQgdKoMGJ3AV5Okq6e0QC8BsdOi7Dm3qs1rHlWiBHTMuRIW6bFAAED1HgCEVMsRpIGirIHsTtmAMqkbg19NfJKmuTjW6WolVrsHJBTtCkKft1IT-Lr7zrb2MWU0mTjBLnMMgkuCg0fLC9NoH0WlnNXI4ioIpK_OrOF-GVE_netbSpNQyLDCtCOI_i8xZhwDj7CV63-HmiHB0a51uVvLw1HIL1NE5r5WimVFWEu7Ux9x0Ol0vNNw7o', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'CZGFu1YQ_VrKL37SWTim7NasyyDkUaNr4s710LKGoRA.XJHVThg-u0mFqH2flUTnlsn7tl7gGKhGH8wf9_I4z48', 'scope': 'openid'}
3.151 AccessTokenResponse {
"access_token": "CZGFu1YQ_VrKL37SWTim7NasyyDkUaNr4s710LKGoRA.XJHVThg-u0mFqH2flUTnlsn7tl7gGKhGH8wf9_I4z48",
"expires_in": 3599,
"id_token": {
"at_hash": "RFOd2eyHHWIFbdr7M8wzZA",
"aud": [
"baa382ab-42d7-40bc-a90c-1efa3efd5e74"
],
"auth_time": 1529751409,
"c_hash": "HUD5df3Cx7u3FR_Rl6DfcA",
"exp": 1529755210,
"iat": 1529751611,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "f4dad380-c409-4e0c-a4eb-5d3ceff1ffe6",
"nonce": "N1G5Uf8uoEfoC5rs",
"rat": 1529751608,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.151 phase <--<-- 5 --- Done -->-->
3.151 end
3.151 assertion VerifyResponse
3.151 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.152 assertion VerifySignedIdToken
3.152 condition verify-idtoken-is-signed: status=OK [Verifies that an ID Token is signed]
3.152 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-idtoken-is-signed: status=OK [Verifies that an ID Token is signed]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Registration-Sector-Bad.txt 0000644 0000000 0000000 00000013256 13313424017 016626 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-Sector-Bad
Test description: Incorrect registration of sector_identifier_uri
Timestamp: 2018-06-23T10:59:27Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.071 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.073 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.073 phase <--<-- 2 --- Registration -->-->
0.073 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'sector_identifier_uri': 'https://op.certification.openid.net:61353/export/siu.json', 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.073 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#nDS7FiFnL9sv5sh0"
],
"response_types": [
"code id_token token"
],
"sector_identifier_uri": "https://op.certification.openid.net:61353/export/siu.json"
}
0.273 http response url:https://oidc-certification.ory.sh:8443/clients status_code:400 message:{"error":"invalid_request","error_description":"The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed","error_hint":"Make sure that the various parameters are correct, be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.","status_code":400,"error_debug":"Redirect URL \"https://op.certification.openid.net:61353/authz_cb\" does not match values from sector_identifier_uri."}
0.273 ErrorResponse {
"error": "invalid_request",
"error_debug": "Redirect URL \"https://op.certification.openid.net:61353/authz_cb\" does not match values from sector_identifier_uri.",
"error_description": "The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed",
"error_hint": "Make sure that the various parameters are correct, be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.",
"status_code": 400
}
0.273 exception RegistrationError:{'error_debug': 'Redirect URL "https://op.certification.openid.net:61353/authz_cb" does not match values from sector_identifier_uri.', 'error_description': 'The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed', 'status_code': 400, 'error': 'invalid_request', 'error_hint': 'Make sure that the various parameters are correct, be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.'}
0.273 event got expected exception RegistrationError
0.273 phase <--<-- 3 --- Done -->-->
0.273 end
0.273 condition Done: status=OK
============================================================
Conditions
Done: status=OK
============================================================
RESULT: PASSED
./OP-display-popup.txt 0000644 0000000 0000000 00000023323 13313424175 015042 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-display-popup
Test description: Request with display=popup
Timestamp: 2018-06-23T11:01:17Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.038 phase <--<-- 1 --- Webfinger -->-->
1.038 not expected to do WebFinger
1.038 phase <--<-- 2 --- Discovery -->-->
1.038 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.113 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.114 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.114 phase <--<-- 3 --- Registration -->-->
1.115 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.115 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#u548MureAaLU1UKf"
],
"response_types": [
"code id_token token"
]
}
1.274 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.275 RegistrationResponse {
"client_id": "41b4122b-743b-475c-8ac1-5f2356204225",
"client_secret": "9qAPbSLI_NRk",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "41b4122b-743b-475c-8ac1-5f2356204225",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#u548MureAaLU1UKf"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.275 phase <--<-- 4 --- AsyncAuthn -->-->
1.275 AuthorizationRequest {
"client_id": "41b4122b-743b-475c-8ac1-5f2356204225",
"display": "popup",
"nonce": "MrM9lqJepu4gVMwl",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid",
"state": "cDolSvcafYsz3rdJ"
}
1.276 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=41b4122b-743b-475c-8ac1-5f2356204225&state=cDolSvcafYsz3rdJ&response_type=code+id_token+token&nonce=MrM9lqJepu4gVMwl&display=popup
1.276 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=41b4122b-743b-475c-8ac1-5f2356204225&state=cDolSvcafYsz3rdJ&response_type=code+id_token+token&nonce=MrM9lqJepu4gVMwl&display=popup
4.16 http args {}
4.328 response URL with fragment
4.329 response access_token=8ammlZnuydQpOzbgeHkeKlZcyxQDF0UGQwauPaABbQ4.EbYlfyCcVrTZy5nrvVPk-hN2i3je3T9JYh2yo6ZDuIg&code=VGY43i2SKbk1Fip6IzNTcYD5NEkniWuMX77EBzG-gYw.h25sgLfBiJfHxl5GBpKcZTwlhXBUO8-F97R1dg-OPQc&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiMXA4OHpOQnVJZ1lfZXFDRXZ0dWRHZyIsImF1ZCI6WyI0MWI0MTIyYi03NDNiLTQ3NWMtOGFjMS01ZjIzNTYyMDQyMjUiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJDeTFQM2FXZ1ZObHNlRzNGQjRoQ293IiwiZXhwIjoxNTI5NzU1Mjc3LCJpYXQiOjE1Mjk3NTE2NzcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjVjZGUwNjE4LWRlYmMtNGFlYy1hZDhlLTc1MDJkMjBlMTFmNyIsIm5vbmNlIjoiTXJNOWxxSmVwdTRnVk13bCIsInJhdCI6MTUyOTc1MTY3NSwic3ViIjoiZm9vQGJhci5jb20ifQ.FmV3s5zWWheLXBqXRAJS9iV4rVQMTHfKjx4ntbLgtqzWtDHd9pAPiBJW2HHZxMtsivF56vswXPcbEql5dW0TRqGNBGK0BSquSe329u-uVW5Li73AMlBPTF_cefa8dt-XIMkwJCcGuc9GTpv6KXQ7mfUY_9AY3IRZ8vLstn0YfEKmQwI2jvdFduYRS6Qc5hi-u68KGYZ_jFUvQ2kMxki1-4zDXfFhMSzZZ-vZXJkHDqaUvFRizVqBv9lrWfsi4DTKYrgv8lleicGaBrnHuKPWXXTiVNqg0A6NW1G2zaKW4Ew2SI_inqTCRsKcaT52hEdsGPDG_ETh2ngeJZvYv2eyKR2QiVNm7RHmdCZDejZX_wURtLZGtAmLa2-OfrJFRTYuJihG30tatln9BfHCKGEyVRG-GuEQF8ereX6fsRfjOGBVnmQ2tyr9Lt45jzec9vzmevL_h75o7BAro4ORPbDJK9UCV_lOUkG_WOjtX3qWcqJgWJjX9lmknT1vMoMrtSdBajs7wS5ZrPc-VXrHt3ZKd2SqEAXH7r8-dTTu6OBLIBK4vps-DHqiDKW4AbkXROaRa6Hfi6VJSpnJwuFNJ82kUSVc8EClh4KtggjI8i3icsVv2mirWzt83bfv2EC8_a7E5jR0-ShU9pRitXEvF4LVSGtZOSv_1yx_9XODNi4VRt0&scope=openid&state=cDolSvcafYsz3rdJ&token_type=bearer
4.329 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiMXA4OHpOQnVJZ1lfZXFDRXZ0dWRHZyIsImF1ZCI6WyI0MWI0MTIyYi03NDNiLTQ3NWMtOGFjMS01ZjIzNTYyMDQyMjUiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJDeTFQM2FXZ1ZObHNlRzNGQjRoQ293IiwiZXhwIjoxNTI5NzU1Mjc3LCJpYXQiOjE1Mjk3NTE2NzcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjVjZGUwNjE4LWRlYmMtNGFlYy1hZDhlLTc1MDJkMjBlMTFmNyIsIm5vbmNlIjoiTXJNOWxxSmVwdTRnVk13bCIsInJhdCI6MTUyOTc1MTY3NSwic3ViIjoiZm9vQGJhci5jb20ifQ.FmV3s5zWWheLXBqXRAJS9iV4rVQMTHfKjx4ntbLgtqzWtDHd9pAPiBJW2HHZxMtsivF56vswXPcbEql5dW0TRqGNBGK0BSquSe329u-uVW5Li73AMlBPTF_cefa8dt-XIMkwJCcGuc9GTpv6KXQ7mfUY_9AY3IRZ8vLstn0YfEKmQwI2jvdFduYRS6Qc5hi-u68KGYZ_jFUvQ2kMxki1-4zDXfFhMSzZZ-vZXJkHDqaUvFRizVqBv9lrWfsi4DTKYrgv8lleicGaBrnHuKPWXXTiVNqg0A6NW1G2zaKW4Ew2SI_inqTCRsKcaT52hEdsGPDG_ETh2ngeJZvYv2eyKR2QiVNm7RHmdCZDejZX_wURtLZGtAmLa2-OfrJFRTYuJihG30tatln9BfHCKGEyVRG-GuEQF8ereX6fsRfjOGBVnmQ2tyr9Lt45jzec9vzmevL_h75o7BAro4ORPbDJK9UCV_lOUkG_WOjtX3qWcqJgWJjX9lmknT1vMoMrtSdBajs7wS5ZrPc-VXrHt3ZKd2SqEAXH7r8-dTTu6OBLIBK4vps-DHqiDKW4AbkXROaRa6Hfi6VJSpnJwuFNJ82kUSVc8EClh4KtggjI8i3icsVv2mirWzt83bfv2EC8_a7E5jR0-ShU9pRitXEvF4LVSGtZOSv_1yx_9XODNi4VRt0', 'scope': 'openid', 'code': 'VGY43i2SKbk1Fip6IzNTcYD5NEkniWuMX77EBzG-gYw.h25sgLfBiJfHxl5GBpKcZTwlhXBUO8-F97R1dg-OPQc', 'access_token': '8ammlZnuydQpOzbgeHkeKlZcyxQDF0UGQwauPaABbQ4.EbYlfyCcVrTZy5nrvVPk-hN2i3je3T9JYh2yo6ZDuIg', 'state': 'cDolSvcafYsz3rdJ', 'expires_in': 3599, 'token_type': 'bearer'}
4.41 AuthorizationResponse {
"access_token": "8ammlZnuydQpOzbgeHkeKlZcyxQDF0UGQwauPaABbQ4.EbYlfyCcVrTZy5nrvVPk-hN2i3je3T9JYh2yo6ZDuIg",
"code": "VGY43i2SKbk1Fip6IzNTcYD5NEkniWuMX77EBzG-gYw.h25sgLfBiJfHxl5GBpKcZTwlhXBUO8-F97R1dg-OPQc",
"expires_in": 3599,
"id_token": {
"at_hash": "1p88zNBuIgY_eqCEvtudGg",
"aud": [
"41b4122b-743b-475c-8ac1-5f2356204225"
],
"auth_time": 1529751409,
"c_hash": "Cy1P3aWgVNlseG3FB4hCow",
"exp": 1529755277,
"iat": 1529751677,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "5cde0618-debc-4aec-ad8e-7502d20e11f7",
"nonce": "MrM9lqJepu4gVMwl",
"rat": 1529751675,
"sub": "[email protected]"
},
"scope": "openid",
"state": "cDolSvcafYsz3rdJ",
"token_type": "bearer"
}
4.41 phase <--<-- 5 --- Done -->-->
4.411 end
4.411 assertion VerifyResponse
4.411 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.411 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-redirect_uri-RegFrag.txt 0000644 0000000 0000000 00000011631 13313424276 016230 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-RegFrag
Test description: Reject registration where a redirect_uri has a fragment
Timestamp: 2018-06-23T11:02:22Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.077 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.078 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.078 phase <--<-- 2 --- Registration -->-->
0.079 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb#foobar'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.079 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb#foobar"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#GDpNYWPiWEfDKqjf"
],
"response_types": [
"code id_token token"
]
}
0.165 http response url:https://oidc-certification.ory.sh:8443/clients status_code:400 message:{"error":"invalid_request","error_description":"The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed","error_hint":"Redirect URIs must not contain fragments (#)","status_code":400}
0.165 ErrorResponse {
"error": "invalid_request",
"error_description": "The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed",
"error_hint": "Redirect URIs must not contain fragments (#)",
"status_code": 400
}
0.165 exception RegistrationError:{'error_description': 'The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed', 'status_code': 400, 'error': 'invalid_request', 'error_hint': 'Redirect URIs must not contain fragments (#)'}
0.165 event got expected exception RegistrationError
0.166 phase <--<-- 3 --- Done -->-->
0.166 end
0.166 assertion VerifyErrorMessage
0.166 condition verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
0.166 condition Done: status=OK
============================================================
Conditions
verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-OAuth-2nd.txt 0000644 0000000 0000000 00000040005 13313424524 013727 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-OAuth-2nd
Test description: Trying to use authorization code twice should result in an error
Timestamp: 2018-06-23T11:04:52Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.131 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.132 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.132 phase <--<-- 2 --- Registration -->-->
0.132 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.133 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#DD4IV2uvq4iAD58g"
],
"response_types": [
"code id_token token"
]
}
0.29 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.291 RegistrationResponse {
"client_id": "37e36fbf-1246-4f91-9f32-ba8597bba514",
"client_secret": "2VW_2sDMs3QJ",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "37e36fbf-1246-4f91-9f32-ba8597bba514",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#DD4IV2uvq4iAD58g"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.291 phase <--<-- 3 --- Note -->-->
1.628 phase <--<-- 4 --- AsyncAuthn -->-->
1.628 AuthorizationRequest {
"client_id": "37e36fbf-1246-4f91-9f32-ba8597bba514",
"nonce": "zuouQpDudpihZrDo",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid",
"state": "9wzip4uhMatQxDRR"
}
1.629 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=37e36fbf-1246-4f91-9f32-ba8597bba514&state=9wzip4uhMatQxDRR&response_type=code+id_token+token&nonce=zuouQpDudpihZrDo
1.629 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=37e36fbf-1246-4f91-9f32-ba8597bba514&state=9wzip4uhMatQxDRR&response_type=code+id_token+token&nonce=zuouQpDudpihZrDo
12.028 http args {}
12.201 response URL with fragment
12.202 response access_token=TPefHr-2Ye_8R0KN12XdTQ2iyTLLLbdTdYw5z4xTnbQ.4l05XyYeD88WtxDydB-JDWjhLS5Hs-6I1CJ3CxJ4i24&code=_ByeBoeDCK3W9i0HvcrVRLSh5cOXjxQCS095YoE5y6g.u8-QmeuWbDjVOF43YEJdBxcdfpXpymx7irJ0k60nVA0&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiTVp0SUVRV0Z0MGVONENiZFpYa3lZUSIsImF1ZCI6WyIzN2UzNmZiZi0xMjQ2LTRmOTEtOWYzMi1iYTg1OTdiYmE1MTQiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiJIaU9zcGN0NHhjZ0p6Q0diZmhtRTBBIiwiZXhwIjoxNTI5NzU1NDkwLCJpYXQiOjE1Mjk3NTE4OTAsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6Ijg5OTBmNzBkLWE0MTQtNDgwOC1iMTJmLWQ4NjIyZjUyNTliNSIsIm5vbmNlIjoienVvdVFwRHVkcGloWnJEbyIsInJhdCI6MTUyOTc1MTg4MCwic3ViIjoiZm9vQGJhci5jb20ifQ.nPk_5zo3sO1pQJc5B12XhxE0hqc8oUoy61DyStZfpeYYEJgE-34BEzQaZIP4aTz1ZyJG7UT42qzYc-kfajyvjFFU6EncXuoeUD_qujViWzxTbJkBdNFYIuE9Q22IQbNw4JPmlRvSK6EtlzoCZ4KeXrhMnj_rNih1lST8oeHUQWVKeZhfi9xkhq-3Rxamz4dxZr_S_ug4uNjRDgRz4wJhH77XFTFO3ubVpu-Ng1eoqA4K2i36zaPgy1jTyjEe4C_8ecMUxW5aJMQ5Z_XverspxMI07ZxRQAAgpc2A60G9T5vUeoSipxxO-1-9RNkxIeKmZnV7qIjrSF3LflYqs0VD4HRHs_4p7SKG735WtAxgd88kM1mIU7Yko_iwha2TRRSeT7pUhmlw5HTM1Zo2MreeNQAjDUYJ878TX8EbWiGyUTRLyJGtQyq4ci2xwdRBfKXWtaleJBr_8jHBvuypEJWw1HtCMZkWzVR6wqo-hJ7TALPF6ttaJDtw6_jJwElx_T6nX8Ma8B1Kj1IMJwfH4oIuegv9GWAb2XllP3oGBPrxsi02r77b1SMWHJpFGkY3SVGiW7FiXEGkPo8lvguWiMfp4AFseQAxfkQ9xtwOatI6Q2M49a1g2FUgZZ978O6cLFQd9N4rDyt-Q71IecRaz-QgA8yMnoS0zlGXVW5iZx-rQhU&scope=openid&state=9wzip4uhMatQxDRR&token_type=bearer
12.202 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiTVp0SUVRV0Z0MGVONENiZFpYa3lZUSIsImF1ZCI6WyIzN2UzNmZiZi0xMjQ2LTRmOTEtOWYzMi1iYTg1OTdiYmE1MTQiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiJIaU9zcGN0NHhjZ0p6Q0diZmhtRTBBIiwiZXhwIjoxNTI5NzU1NDkwLCJpYXQiOjE1Mjk3NTE4OTAsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6Ijg5OTBmNzBkLWE0MTQtNDgwOC1iMTJmLWQ4NjIyZjUyNTliNSIsIm5vbmNlIjoienVvdVFwRHVkcGloWnJEbyIsInJhdCI6MTUyOTc1MTg4MCwic3ViIjoiZm9vQGJhci5jb20ifQ.nPk_5zo3sO1pQJc5B12XhxE0hqc8oUoy61DyStZfpeYYEJgE-34BEzQaZIP4aTz1ZyJG7UT42qzYc-kfajyvjFFU6EncXuoeUD_qujViWzxTbJkBdNFYIuE9Q22IQbNw4JPmlRvSK6EtlzoCZ4KeXrhMnj_rNih1lST8oeHUQWVKeZhfi9xkhq-3Rxamz4dxZr_S_ug4uNjRDgRz4wJhH77XFTFO3ubVpu-Ng1eoqA4K2i36zaPgy1jTyjEe4C_8ecMUxW5aJMQ5Z_XverspxMI07ZxRQAAgpc2A60G9T5vUeoSipxxO-1-9RNkxIeKmZnV7qIjrSF3LflYqs0VD4HRHs_4p7SKG735WtAxgd88kM1mIU7Yko_iwha2TRRSeT7pUhmlw5HTM1Zo2MreeNQAjDUYJ878TX8EbWiGyUTRLyJGtQyq4ci2xwdRBfKXWtaleJBr_8jHBvuypEJWw1HtCMZkWzVR6wqo-hJ7TALPF6ttaJDtw6_jJwElx_T6nX8Ma8B1Kj1IMJwfH4oIuegv9GWAb2XllP3oGBPrxsi02r77b1SMWHJpFGkY3SVGiW7FiXEGkPo8lvguWiMfp4AFseQAxfkQ9xtwOatI6Q2M49a1g2FUgZZ978O6cLFQd9N4rDyt-Q71IecRaz-QgA8yMnoS0zlGXVW5iZx-rQhU', 'scope': 'openid', 'code': '_ByeBoeDCK3W9i0HvcrVRLSh5cOXjxQCS095YoE5y6g.u8-QmeuWbDjVOF43YEJdBxcdfpXpymx7irJ0k60nVA0', 'access_token': 'TPefHr-2Ye_8R0KN12XdTQ2iyTLLLbdTdYw5z4xTnbQ.4l05XyYeD88WtxDydB-JDWjhLS5Hs-6I1CJ3CxJ4i24', 'state': '9wzip4uhMatQxDRR', 'expires_in': 3599, 'token_type': 'bearer'}
12.363 AuthorizationResponse {
"access_token": "TPefHr-2Ye_8R0KN12XdTQ2iyTLLLbdTdYw5z4xTnbQ.4l05XyYeD88WtxDydB-JDWjhLS5Hs-6I1CJ3CxJ4i24",
"code": "_ByeBoeDCK3W9i0HvcrVRLSh5cOXjxQCS095YoE5y6g.u8-QmeuWbDjVOF43YEJdBxcdfpXpymx7irJ0k60nVA0",
"expires_in": 3599,
"id_token": {
"at_hash": "MZtIEQWFt0eN4CbdZXkyYQ",
"aud": [
"37e36fbf-1246-4f91-9f32-ba8597bba514"
],
"auth_time": 1529751824,
"c_hash": "HiOspct4xcgJzCGbfhmE0A",
"exp": 1529755490,
"iat": 1529751890,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "8990f70d-a414-4808-b12f-d8622f5259b5",
"nonce": "zuouQpDudpihZrDo",
"rat": 1529751880,
"sub": "[email protected]"
},
"scope": "openid",
"state": "9wzip4uhMatQxDRR",
"token_type": "bearer"
}
12.363 phase <--<-- 5 --- AccessToken -->-->
12.363 --> request op_args: {'state': '9wzip4uhMatQxDRR'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
12.363 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': '9wzip4uhMatQxDRR', 'code': '_ByeBoeDCK3W9i0HvcrVRLSh5cOXjxQCS095YoE5y6g.u8-QmeuWbDjVOF43YEJdBxcdfpXpymx7irJ0k60nVA0', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '37e36fbf-1246-4f91-9f32-ba8597bba514'}, 'state': '9wzip4uhMatQxDRR'}
12.363 AccessTokenRequest {
"code": "_ByeBoeDCK3W9i0HvcrVRLSh5cOXjxQCS095YoE5y6g.u8-QmeuWbDjVOF43YEJdBxcdfpXpymx7irJ0k60nVA0",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "9wzip4uhMatQxDRR"
}
12.363 request_url https://oidc-certification.ory.sh:8443/oauth2/token
12.363 request_http_args {'headers': {'Authorization': 'Basic MzdlMzZmYmYtMTI0Ni00ZjkxLTlmMzItYmE4NTk3YmJhNTE0OjJWV18yc0RNczNRSg==', 'Content-Type': 'application/x-www-form-urlencoded'}}
12.363 request code=_ByeBoeDCK3W9i0HvcrVRLSh5cOXjxQCS095YoE5y6g.u8-QmeuWbDjVOF43YEJdBxcdfpXpymx7irJ0k60nVA0&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=9wzip4uhMatQxDRR
12.64 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
12.641 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiTVp0SUVRV0Z0MGVONENiZFpYa3lZUSIsImF1ZCI6WyIzN2UzNmZiZi0xMjQ2LTRmOTEtOWYzMi1iYTg1OTdiYmE1MTQiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiJIaU9zcGN0NHhjZ0p6Q0diZmhtRTBBIiwiZXhwIjoxNTI5NzU1NDkwLCJpYXQiOjE1Mjk3NTE4OTEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjQyNmE0NzdhLTM2MzUtNGRhNy1iMDUxLWFiZTBjZjU2NzM3YyIsIm5vbmNlIjoienVvdVFwRHVkcGloWnJEbyIsInJhdCI6MTUyOTc1MTg4MCwic3ViIjoiZm9vQGJhci5jb20ifQ.CqW5uCc7yHVufSKPLNmsEeyh6S_cq23f2SeutezGgJ_1mujBVR8Rr8K8pmZ23UnxR38I7CxcB4fvEkzBA96tn-OYzTpplrZgeQf6SrcfeI8XG2Yg2uMAAtv8y3r4kx9FG2O1cLB8kDDTENwHg1wHiKbdnGwsSBUaFCAzemmpp04TbhCpu3dXv62ukCKUrPBsh_nRZuhu0rrEUXKXeSuhaBr_gNvA0BeQBWDkWqGoA2TzfQCNsP-WB8fkf5rm23n8DU7aR6WiucmIhxLrfyDQgJlGaPcExzHYkfYe1DbpK4XrQg-iHKhIMmpewGndcwc0SnIhB3TwPv-kP4ukJTg2s7dgSgERoIXCOxfsHU2YXs_4FNofVMdGm16b-haXS-Bm1EcNRroa8pH85iM2wiJaB4VQJwCOqzXa50x88XjhCHZth6DuvvyEtAosGCxUpplrYiLa2vG-vdMyNPYBexJfh0vxHaQ2TqZUIgv0X2wdNNfXW56XLv3bQeRf5b03xR4GF3gftqUixRil-YJt_pj6sDjfLxjeKYiLtgtfxhBYdzjxvUL_D-d1GxMTZtckt5zl864Cc--M51DYi6NBYBtOn0ecTi9nZ5aO2OhJGs_Iu0xxq7kMbvi7qRVzYZKlHCnivFgXsb7Y7atAPDUHe0uOP3hC2kYg0QuKG1qs8Nfn1bQ', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'NIA_EiPKfZUO1Z6QuD9xMWpHfBIA5Q-IWtCqLUEsB8U.ssX_cfD8-t5sA5kb8YVfLAd0XfNsfb9SyTe-LeWIJJ0', 'scope': 'openid'}
12.645 AccessTokenResponse {
"access_token": "NIA_EiPKfZUO1Z6QuD9xMWpHfBIA5Q-IWtCqLUEsB8U.ssX_cfD8-t5sA5kb8YVfLAd0XfNsfb9SyTe-LeWIJJ0",
"expires_in": 3599,
"id_token": {
"at_hash": "MZtIEQWFt0eN4CbdZXkyYQ",
"aud": [
"37e36fbf-1246-4f91-9f32-ba8597bba514"
],
"auth_time": 1529751824,
"c_hash": "HiOspct4xcgJzCGbfhmE0A",
"exp": 1529755490,
"iat": 1529751891,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "426a477a-3635-4da7-b051-abe0cf56737c",
"nonce": "zuouQpDudpihZrDo",
"rat": 1529751880,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
12.645 phase <--<-- 6 --- AccessToken -->-->
12.645 --> request op_args: {'state': '9wzip4uhMatQxDRR'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
12.645 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': '9wzip4uhMatQxDRR', 'code': '_ByeBoeDCK3W9i0HvcrVRLSh5cOXjxQCS095YoE5y6g.u8-QmeuWbDjVOF43YEJdBxcdfpXpymx7irJ0k60nVA0', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '37e36fbf-1246-4f91-9f32-ba8597bba514'}, 'state': '9wzip4uhMatQxDRR'}
12.645 AccessTokenRequest {
"code": "_ByeBoeDCK3W9i0HvcrVRLSh5cOXjxQCS095YoE5y6g.u8-QmeuWbDjVOF43YEJdBxcdfpXpymx7irJ0k60nVA0",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "9wzip4uhMatQxDRR"
}
12.645 request_url https://oidc-certification.ory.sh:8443/oauth2/token
12.645 request_http_args {'headers': {'Authorization': 'Basic MzdlMzZmYmYtMTI0Ni00ZjkxLTlmMzItYmE4NTk3YmJhNTE0OjJWV18yc0RNczNRSg==', 'Content-Type': 'application/x-www-form-urlencoded'}}
12.645 request code=_ByeBoeDCK3W9i0HvcrVRLSh5cOXjxQCS095YoE5y6g.u8-QmeuWbDjVOF43YEJdBxcdfpXpymx7irJ0k60nVA0&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=9wzip4uhMatQxDRR
12.846 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:400 message:{"error":"invalid_grant","error_description":"The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client","status_code":400,"error_debug":"The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found."}
12.846 response {'error_debug': 'The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found.', 'error_description': 'The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client', 'error': 'invalid_grant', 'status_code': 400}
12.846 event Got expected error
12.847 TokenErrorResponse {
"error": "invalid_grant",
"error_debug": "The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found.",
"error_description": "The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client",
"status_code": 400
}
12.847 phase <--<-- 7 --- Done -->-->
12.847 end
12.847 assertion VerifyResponse
12.847 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
12.847 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Discovery-JWKs.txt 0000644 0000000 0000000 00000006117 13313424010 015005 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Discovery-JWKs
Test description: Keys in OP JWKs well formed
Timestamp: 2018-06-23T10:59:20Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.145 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.146 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.146 phase <--<-- 2 --- Done -->-->
0.146 end
0.147 assertion CheckHTTPResponse
0.147 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.147 assertion VerifyBase64URL
0.22 http response url:https://oidc-certification.ory.sh:8443/.well-known/jwks.json status_code:200
0.221 condition verify-base64url: status=OK [Verifies that the base64 encoded parts of a JWK is in fact base64url encoded and not just base64 encoded]
0.221 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-base64url: status=OK [Verifies that the base64 encoded parts of a JWK is in fact base64url encoded and not just base64 encoded]
Done: status=OK
============================================================
RESULT: PASSED
./OP-scope-profile.txt 0000644 0000000 0000000 00000036405 13313424347 015011 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-scope-profile
Test description: Scope requesting profile claims
Timestamp: 2018-06-23T11:03:03Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.08 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.081 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.081 phase <--<-- 2 --- Registration -->-->
0.081 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.082 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#HYTijZVzKCPM7rhS"
],
"response_types": [
"code id_token token"
]
}
0.24 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.241 RegistrationResponse {
"client_id": "ae8b8fc8-a320-48a5-97d3-308dcd69d673",
"client_secret": "jKvoxNnsNwiP",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "ae8b8fc8-a320-48a5-97d3-308dcd69d673",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#HYTijZVzKCPM7rhS"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.241 phase <--<-- 3 --- AsyncAuthn -->-->
0.242 condition Check support: status=WARNING, message=No support for: scopes_supported=['profile']
0.242 AuthorizationRequest {
"client_id": "ae8b8fc8-a320-48a5-97d3-308dcd69d673",
"nonce": "uYIYaceNBjg5gNkk",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid profile",
"state": "rHPKCWZwe4RzYmH3"
}
0.242 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+profile&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=ae8b8fc8-a320-48a5-97d3-308dcd69d673&state=rHPKCWZwe4RzYmH3&response_type=code+id_token+token&nonce=uYIYaceNBjg5gNkk
0.242 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+profile&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=ae8b8fc8-a320-48a5-97d3-308dcd69d673&state=rHPKCWZwe4RzYmH3&response_type=code+id_token+token&nonce=uYIYaceNBjg5gNkk
3.226 http args {}
3.395 response URL with fragment
3.396 response access_token=2lnmVsasw1Ok-vveiFNJb-TkpCLCZQIW8fFy0TVI3AE.8G03XvAafUfagr8xus2AP-Pis_8LiVblRF-NFvAWVsU&code=cSK0LEJU8bDSND_vHxl7QSUw5IekSxMjg903fwi2Qeg.UmVJ6jNX6h4kqyk_Yb6vP-pNMakJz-C9XZhCwp89Sdk&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiZ25sdlZ2NnhZQ2o4VlBEWTFfem9nZyIsImF1ZCI6WyJhZThiOGZjOC1hMzIwLTQ4YTUtOTdkMy0zMDhkY2Q2OWQ2NzMiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiJuVzNKQUpMOFJRTkxNejNHYUZDdDBRIiwiZXhwIjoxNTI5NzU1MzgyLCJpYXQiOjE1Mjk3NTE3ODIsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjdkZWZkODViLWY4NDYtNDNiOS05ZjNmLWFhZDcwMjkwY2FhYyIsIm5vbmNlIjoidVlJWWFjZU5Camc1Z05rayIsInJhdCI6MTUyOTc1MTc3OSwic3ViIjoiZm9vQGJhci5jb20ifQ.QdzCndVkYfYZ4jLNLv3HQ6TXg4aYSEI5Cp0cO81tdOqc49MwXjZ38FL-Vx6a_22MjSlULTZiQs9EtlLW6-8KVlIKTTVH3L5ssdBew68AMBAK_T9TGrP_bElOZBoQnphC2PiOnDWDhmX0KgYAouNjuJUAh58qgU8uuvpjggahl-JG76GMgStW3-qhXPSUOWMhCDweRsy9dYX0X44jTyG3SvStOEUGBUbG_QPWP2Zmgq-qppNUb0lbyYWhii5Tja5sfII6CIHKRDcLTqhEB8nnorPlof9B8_BxD6FKtrqqVR09wcj4NGGPHqV8IOPxhL6uovJYltImYqJ-fnlROmZG5jQxFlI06u7RxebvGx0R1lQZKgUeW719Wz1AbwrAAZ_V2JWdz6_-jr0dZoUzyYrLkNtLE8t_i3DzSiDlVOdAtfcrpzdaWNtrhHq6hN8wbgdIcrKPMnyGUp0350QtOQm60m3htEHh_CAOM9M2UvHRLORNgPFHkVlC5Wsjur2BBTiEcr2cJ1hXONQfUMvRdyA0Ky3Ttmw1-mn1xNkBAyOv9i9K9N5QW9U7oxiHWagaik6wuK4ehAmr6tydFSRRYFLTmg_z-LPl0Cw23dw0pML5wwif_ATUFOSZB6Kr9tLW_9ElAo0wqkzNrIH6uzEsUJu7YFOAIV5FlbNSPTW4wjLXzOE&scope=openid%20profile&state=rHPKCWZwe4RzYmH3&token_type=bearer
3.396 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiZ25sdlZ2NnhZQ2o4VlBEWTFfem9nZyIsImF1ZCI6WyJhZThiOGZjOC1hMzIwLTQ4YTUtOTdkMy0zMDhkY2Q2OWQ2NzMiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiJuVzNKQUpMOFJRTkxNejNHYUZDdDBRIiwiZXhwIjoxNTI5NzU1MzgyLCJpYXQiOjE1Mjk3NTE3ODIsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjdkZWZkODViLWY4NDYtNDNiOS05ZjNmLWFhZDcwMjkwY2FhYyIsIm5vbmNlIjoidVlJWWFjZU5Camc1Z05rayIsInJhdCI6MTUyOTc1MTc3OSwic3ViIjoiZm9vQGJhci5jb20ifQ.QdzCndVkYfYZ4jLNLv3HQ6TXg4aYSEI5Cp0cO81tdOqc49MwXjZ38FL-Vx6a_22MjSlULTZiQs9EtlLW6-8KVlIKTTVH3L5ssdBew68AMBAK_T9TGrP_bElOZBoQnphC2PiOnDWDhmX0KgYAouNjuJUAh58qgU8uuvpjggahl-JG76GMgStW3-qhXPSUOWMhCDweRsy9dYX0X44jTyG3SvStOEUGBUbG_QPWP2Zmgq-qppNUb0lbyYWhii5Tja5sfII6CIHKRDcLTqhEB8nnorPlof9B8_BxD6FKtrqqVR09wcj4NGGPHqV8IOPxhL6uovJYltImYqJ-fnlROmZG5jQxFlI06u7RxebvGx0R1lQZKgUeW719Wz1AbwrAAZ_V2JWdz6_-jr0dZoUzyYrLkNtLE8t_i3DzSiDlVOdAtfcrpzdaWNtrhHq6hN8wbgdIcrKPMnyGUp0350QtOQm60m3htEHh_CAOM9M2UvHRLORNgPFHkVlC5Wsjur2BBTiEcr2cJ1hXONQfUMvRdyA0Ky3Ttmw1-mn1xNkBAyOv9i9K9N5QW9U7oxiHWagaik6wuK4ehAmr6tydFSRRYFLTmg_z-LPl0Cw23dw0pML5wwif_ATUFOSZB6Kr9tLW_9ElAo0wqkzNrIH6uzEsUJu7YFOAIV5FlbNSPTW4wjLXzOE', 'scope': 'openid profile', 'code': 'cSK0LEJU8bDSND_vHxl7QSUw5IekSxMjg903fwi2Qeg.UmVJ6jNX6h4kqyk_Yb6vP-pNMakJz-C9XZhCwp89Sdk', 'access_token': '2lnmVsasw1Ok-vveiFNJb-TkpCLCZQIW8fFy0TVI3AE.8G03XvAafUfagr8xus2AP-Pis_8LiVblRF-NFvAWVsU', 'state': 'rHPKCWZwe4RzYmH3', 'expires_in': 3599, 'token_type': 'bearer'}
3.475 AuthorizationResponse {
"access_token": "2lnmVsasw1Ok-vveiFNJb-TkpCLCZQIW8fFy0TVI3AE.8G03XvAafUfagr8xus2AP-Pis_8LiVblRF-NFvAWVsU",
"code": "cSK0LEJU8bDSND_vHxl7QSUw5IekSxMjg903fwi2Qeg.UmVJ6jNX6h4kqyk_Yb6vP-pNMakJz-C9XZhCwp89Sdk",
"expires_in": 3599,
"id_token": {
"at_hash": "gnlvVv6xYCj8VPDY1_zogg",
"aud": [
"ae8b8fc8-a320-48a5-97d3-308dcd69d673"
],
"auth_time": 1529751698,
"c_hash": "nW3JAJL8RQNLMz3GaFCt0Q",
"exp": 1529755382,
"iat": 1529751782,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "7defd85b-f846-43b9-9f3f-aad70290caac",
"nonce": "uYIYaceNBjg5gNkk",
"rat": 1529751779,
"sub": "[email protected]"
},
"scope": "openid profile",
"state": "rHPKCWZwe4RzYmH3",
"token_type": "bearer"
}
3.475 phase <--<-- 4 --- AccessToken -->-->
3.475 --> request op_args: {'state': 'rHPKCWZwe4RzYmH3'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.475 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'rHPKCWZwe4RzYmH3', 'code': 'cSK0LEJU8bDSND_vHxl7QSUw5IekSxMjg903fwi2Qeg.UmVJ6jNX6h4kqyk_Yb6vP-pNMakJz-C9XZhCwp89Sdk', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'ae8b8fc8-a320-48a5-97d3-308dcd69d673'}, 'state': 'rHPKCWZwe4RzYmH3'}
3.475 AccessTokenRequest {
"code": "cSK0LEJU8bDSND_vHxl7QSUw5IekSxMjg903fwi2Qeg.UmVJ6jNX6h4kqyk_Yb6vP-pNMakJz-C9XZhCwp89Sdk",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "rHPKCWZwe4RzYmH3"
}
3.475 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.475 request_http_args {'headers': {'Authorization': 'Basic YWU4YjhmYzgtYTMyMC00OGE1LTk3ZDMtMzA4ZGNkNjlkNjczOmpLdm94Tm5zTndpUA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
3.475 request code=cSK0LEJU8bDSND_vHxl7QSUw5IekSxMjg903fwi2Qeg.UmVJ6jNX6h4kqyk_Yb6vP-pNMakJz-C9XZhCwp89Sdk&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=rHPKCWZwe4RzYmH3
3.692 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.693 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiZ25sdlZ2NnhZQ2o4VlBEWTFfem9nZyIsImF1ZCI6WyJhZThiOGZjOC1hMzIwLTQ4YTUtOTdkMy0zMDhkY2Q2OWQ2NzMiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiJuVzNKQUpMOFJRTkxNejNHYUZDdDBRIiwiZXhwIjoxNTI5NzU1MzgyLCJpYXQiOjE1Mjk3NTE3ODMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjFlZTAyZjhkLTc3NzItNDVhMi05ZDU0LTM0ZjIxNjkwNDE3OCIsIm5vbmNlIjoidVlJWWFjZU5Camc1Z05rayIsInJhdCI6MTUyOTc1MTc3OSwic3ViIjoiZm9vQGJhci5jb20ifQ.omyhmirP3rSJlXBvqFQME2Mjts3bzqOHvRhX0KfJkeReGcx7cVi3aNj7FOBDGphTY9ZfhgAjEaRpxmvLzEZAKZ8yp7W142Y73hYRFsKKOhHutihIXPrFwKFM8CuCzBxqpFJruJOOteE4uMaJtTSyQfHSjFkLsIrk-hFoapKLoR0FqtHZsfh2xIxyZCO0OkDbC4KYNuJFDgHlyWze3SKXdLPY9JMK2QIA3SV5vl8USOgouVCw1sD_wYZUnIzRu_yvk6O_LaiLR4eLJgxS1I5nKn-utuBzKwti7esEEgFGNbeMBP87rzLgIvqkpMHiHasxoOLwGHz1TrJ51E599qITYcv1Q1g2x2MLo-9NrkCz0uSCqDfCXhZ5KkBb6WjYE89fVbJqhwntdFMWJaEFMtBTKrqbWSr_0vN6_ttrvc9O9q8-tZ4dy70tEx9cIc7YOPMNv-4ZuQgUu0mjh8UyygUb9Y4_rtvjWg747kylCV6u3OvUrxTWE9CMawIQ1gMbPVmQ4U6sUsQXdSTisCxM9dcbyHhNMgME25qqk3-G5fecjP3p1-bb3HsQFk0ZudvKQLgou7NNlyHklga_v2QbJJGXDtbV5qV19YnJfW1RPuvR1YQ9TKRJiLNhwXMPmVWrCP7DqxCXl7zZEqxDcGs0zBYZF2ZpW6ff0rDMjD0bsyf6h1o', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'bEkgTx8zMTSKJxUjlvi9kmR7rD6oeU_VpuhW7EzJowE.0F8mSf4MtUSHY_wT3f319D3_6frc9A81vlvWxZn2GPY', 'scope': 'openid profile'}
3.697 AccessTokenResponse {
"access_token": "bEkgTx8zMTSKJxUjlvi9kmR7rD6oeU_VpuhW7EzJowE.0F8mSf4MtUSHY_wT3f319D3_6frc9A81vlvWxZn2GPY",
"expires_in": 3599,
"id_token": {
"at_hash": "gnlvVv6xYCj8VPDY1_zogg",
"aud": [
"ae8b8fc8-a320-48a5-97d3-308dcd69d673"
],
"auth_time": 1529751698,
"c_hash": "nW3JAJL8RQNLMz3GaFCt0Q",
"exp": 1529755382,
"iat": 1529751783,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "1ee02f8d-7772-45a2-9d54-34f216904178",
"nonce": "uYIYaceNBjg5gNkk",
"rat": 1529751779,
"sub": "[email protected]"
},
"scope": "openid profile",
"token_type": "bearer"
}
3.697 phase <--<-- 5 --- UserInfo -->-->
3.697 do_user_info_request kwargs:{'state': 'rHPKCWZwe4RzYmH3', 'method': 'GET', 'authn_method': 'bearer_header'}
3.697 request {'body': None}
3.697 request_url https://oidc-certification.ory.sh:8443/userinfo
3.697 request_http_args {'headers': {'Authorization': 'Bearer bEkgTx8zMTSKJxUjlvi9kmR7rD6oeU_VpuhW7EzJowE.0F8mSf4MtUSHY_wT3f319D3_6frc9A81vlvWxZn2GPY'}}
3.769 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
3.769 OpenIDSchema {
"sub": "[email protected]"
}
3.769 OpenIDSchema {
"sub": "[email protected]"
}
3.769 phase <--<-- 6 --- Done -->-->
3.769 end
3.77 assertion CheckHTTPResponse
3.77 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
3.77 assertion VerifyResponse
3.77 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.771 assertion VerifyScopes
3.771 condition verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username'] [Verifies that the claims corresponding to the requested scopes are returned]
3.771 condition Done: status=OK
============================================================
Conditions
Check support: status=WARNING, message=No support for: scopes_supported=['profile']
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username'] [Verifies that the claims corresponding to the requested scopes are returned]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
No support for: scopes_supported=['profile']
The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username']
./OP-UserInfo-RS256.txt 0000644 0000000 0000000 00000034431 13313424153 014543 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-UserInfo-RS256
Test description: RP registers userinfo_signed_response_alg to signal that it wants signed UserInfo returned
Timestamp: 2018-06-23T11:00:59Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.076 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.077 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.077 phase <--<-- 2 --- Registration -->-->
0.077 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'userinfo_signed_response_alg': 'RS256'}
0.078 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#RowOB4UjqZB5KSwo"
],
"response_types": [
"code id_token token"
],
"userinfo_signed_response_alg": "RS256"
}
0.232 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.233 RegistrationResponse {
"client_id": "6b898607-9bf4-46b5-9fd1-b0c84bb4f933",
"client_secret": "RG35fJVy~xBP",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "6b898607-9bf4-46b5-9fd1-b0c84bb4f933",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#RowOB4UjqZB5KSwo"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "RS256"
}
0.233 phase <--<-- 3 --- AsyncAuthn -->-->
0.233 AuthorizationRequest {
"client_id": "6b898607-9bf4-46b5-9fd1-b0c84bb4f933",
"nonce": "RuKLv3xs7UyQPEl7",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid",
"state": "hdG2zzMmcbcj6ZlV"
}
0.234 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=6b898607-9bf4-46b5-9fd1-b0c84bb4f933&state=hdG2zzMmcbcj6ZlV&response_type=code+id_token+token&nonce=RuKLv3xs7UyQPEl7
0.234 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=6b898607-9bf4-46b5-9fd1-b0c84bb4f933&state=hdG2zzMmcbcj6ZlV&response_type=code+id_token+token&nonce=RuKLv3xs7UyQPEl7
6.252 http args {}
6.423 response URL with fragment
6.423 response access_token=d0y-92VuuGQRKwFDoHti5RMuecfEEHlsLueRo7WN2j4.5ofO7ft9ukhMQp0Aoscm407UECCTeGvW5vCDiUuDjQ0&code=lHsaSLpXS0z4kqdP96ny1oGsHsxuPWV-WtwBKEcbPPY.yuB530KzaThucVP5CJiBnWiyLCUb_Jv5erxAyw8AO3M&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiNUdleE1ILUhYSUl6TDBNcnZBb2NMdyIsImF1ZCI6WyI2Yjg5ODYwNy05YmY0LTQ2YjUtOWZkMS1iMGM4NGJiNGY5MzMiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJDLXRraVphaERHU2FQLWhGQk9QWkh3IiwiZXhwIjoxNTI5NzU1MjU5LCJpYXQiOjE1Mjk3NTE2NTksImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjlhZjljOTM3LTk1MzEtNDZlMS04OTg1LTNlNGUxOThmOWM1MSIsIm5vbmNlIjoiUnVLTHYzeHM3VXlRUEVsNyIsInJhdCI6MTUyOTc1MTY1Mywic3ViIjoiZm9vQGJhci5jb20ifQ.IxYGCcN6cSsaM6ov2LMRsWCCV6NcROkv5E3CAph3sxf9OQcIanMV5McrVOFIiIAX3woZFnKiwpwtJg786bNbHd5HbAMIVpYzYXvxZcd903XMmfAAgocBw7su-g-n73k2kGsRlifnuR9W2RjUQoeiYqwRlOiAl2NIHuAGmbzWo8G8GJxQM38qcqRyCYDZ2-5wr88uFkvKZtn9vq_fF9att4YtO-e3SRiXCGqwBc5j2vSNU9icZMnQCBciX4Jn6lP5AR1vEVN76tfNUGJohGhDbsSmDALFqloEcRXMwbrvo8DE8xjij0locXnS5Os8mGJjceHe-9CbiwgMJtQZFTbg9dEalpNBrBBv64o_IneYI3nky5n5KJA9DAzjneGpj6GOXkaX7qRXulZHZP7rPaUu8QEHiFZ7T7CE03mTA1u07FpBj5CidXnvZdkTGfpSUgjRxvUt8UR1AjWrsa_5YCPDUfNWfy-lTr3QMDfvkskXd2KiFFtlM1pL-SfOgg00qOc7Cav-5NEH4t8JqtmUqHJFMaBiRNe-cbgVXYRCbbN0EIbhSx-itqh7oexwKbTRYuSRZ-6KJWfvxdLwm8AOqZRUall2fVAC4Y9sL22607tYzE4t0aJgDlHIP781WHCJdk5cSXi_je0ordnKFjIrgOPK70gTCaN8-j-KdJZZytj7Kxc&scope=openid&state=hdG2zzMmcbcj6ZlV&token_type=bearer
6.424 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiNUdleE1ILUhYSUl6TDBNcnZBb2NMdyIsImF1ZCI6WyI2Yjg5ODYwNy05YmY0LTQ2YjUtOWZkMS1iMGM4NGJiNGY5MzMiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJDLXRraVphaERHU2FQLWhGQk9QWkh3IiwiZXhwIjoxNTI5NzU1MjU5LCJpYXQiOjE1Mjk3NTE2NTksImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjlhZjljOTM3LTk1MzEtNDZlMS04OTg1LTNlNGUxOThmOWM1MSIsIm5vbmNlIjoiUnVLTHYzeHM3VXlRUEVsNyIsInJhdCI6MTUyOTc1MTY1Mywic3ViIjoiZm9vQGJhci5jb20ifQ.IxYGCcN6cSsaM6ov2LMRsWCCV6NcROkv5E3CAph3sxf9OQcIanMV5McrVOFIiIAX3woZFnKiwpwtJg786bNbHd5HbAMIVpYzYXvxZcd903XMmfAAgocBw7su-g-n73k2kGsRlifnuR9W2RjUQoeiYqwRlOiAl2NIHuAGmbzWo8G8GJxQM38qcqRyCYDZ2-5wr88uFkvKZtn9vq_fF9att4YtO-e3SRiXCGqwBc5j2vSNU9icZMnQCBciX4Jn6lP5AR1vEVN76tfNUGJohGhDbsSmDALFqloEcRXMwbrvo8DE8xjij0locXnS5Os8mGJjceHe-9CbiwgMJtQZFTbg9dEalpNBrBBv64o_IneYI3nky5n5KJA9DAzjneGpj6GOXkaX7qRXulZHZP7rPaUu8QEHiFZ7T7CE03mTA1u07FpBj5CidXnvZdkTGfpSUgjRxvUt8UR1AjWrsa_5YCPDUfNWfy-lTr3QMDfvkskXd2KiFFtlM1pL-SfOgg00qOc7Cav-5NEH4t8JqtmUqHJFMaBiRNe-cbgVXYRCbbN0EIbhSx-itqh7oexwKbTRYuSRZ-6KJWfvxdLwm8AOqZRUall2fVAC4Y9sL22607tYzE4t0aJgDlHIP781WHCJdk5cSXi_je0ordnKFjIrgOPK70gTCaN8-j-KdJZZytj7Kxc', 'scope': 'openid', 'code': 'lHsaSLpXS0z4kqdP96ny1oGsHsxuPWV-WtwBKEcbPPY.yuB530KzaThucVP5CJiBnWiyLCUb_Jv5erxAyw8AO3M', 'access_token': 'd0y-92VuuGQRKwFDoHti5RMuecfEEHlsLueRo7WN2j4.5ofO7ft9ukhMQp0Aoscm407UECCTeGvW5vCDiUuDjQ0', 'state': 'hdG2zzMmcbcj6ZlV', 'expires_in': 3599, 'token_type': 'bearer'}
6.51 AuthorizationResponse {
"access_token": "d0y-92VuuGQRKwFDoHti5RMuecfEEHlsLueRo7WN2j4.5ofO7ft9ukhMQp0Aoscm407UECCTeGvW5vCDiUuDjQ0",
"code": "lHsaSLpXS0z4kqdP96ny1oGsHsxuPWV-WtwBKEcbPPY.yuB530KzaThucVP5CJiBnWiyLCUb_Jv5erxAyw8AO3M",
"expires_in": 3599,
"id_token": {
"at_hash": "5GexMH-HXIIzL0MrvAocLw",
"aud": [
"6b898607-9bf4-46b5-9fd1-b0c84bb4f933"
],
"auth_time": 1529751409,
"c_hash": "C-tkiZahDGSaP-hFBOPZHw",
"exp": 1529755259,
"iat": 1529751659,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "9af9c937-9531-46e1-8985-3e4e198f9c51",
"nonce": "RuKLv3xs7UyQPEl7",
"rat": 1529751653,
"sub": "[email protected]"
},
"scope": "openid",
"state": "hdG2zzMmcbcj6ZlV",
"token_type": "bearer"
}
6.51 phase <--<-- 4 --- AccessToken -->-->
6.51 --> request op_args: {'state': 'hdG2zzMmcbcj6ZlV'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
6.51 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'hdG2zzMmcbcj6ZlV', 'code': 'lHsaSLpXS0z4kqdP96ny1oGsHsxuPWV-WtwBKEcbPPY.yuB530KzaThucVP5CJiBnWiyLCUb_Jv5erxAyw8AO3M', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '6b898607-9bf4-46b5-9fd1-b0c84bb4f933'}, 'state': 'hdG2zzMmcbcj6ZlV'}
6.51 AccessTokenRequest {
"code": "lHsaSLpXS0z4kqdP96ny1oGsHsxuPWV-WtwBKEcbPPY.yuB530KzaThucVP5CJiBnWiyLCUb_Jv5erxAyw8AO3M",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "hdG2zzMmcbcj6ZlV"
}
6.51 request_url https://oidc-certification.ory.sh:8443/oauth2/token
6.51 request_http_args {'headers': {'Authorization': 'Basic NmI4OTg2MDctOWJmNC00NmI1LTlmZDEtYjBjODRiYjRmOTMzOlJHMzVmSlZ5JTdFeEJQ', 'Content-Type': 'application/x-www-form-urlencoded'}}
6.51 request code=lHsaSLpXS0z4kqdP96ny1oGsHsxuPWV-WtwBKEcbPPY.yuB530KzaThucVP5CJiBnWiyLCUb_Jv5erxAyw8AO3M&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=hdG2zzMmcbcj6ZlV
6.731 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
6.732 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiNUdleE1ILUhYSUl6TDBNcnZBb2NMdyIsImF1ZCI6WyI2Yjg5ODYwNy05YmY0LTQ2YjUtOWZkMS1iMGM4NGJiNGY5MzMiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJDLXRraVphaERHU2FQLWhGQk9QWkh3IiwiZXhwIjoxNTI5NzU1MjU5LCJpYXQiOjE1Mjk3NTE2NTksImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjJiZDJjYzJkLTJjNzUtNDNmNy1hYjRkLWZjYWZkZTVjODc1NSIsIm5vbmNlIjoiUnVLTHYzeHM3VXlRUEVsNyIsInJhdCI6MTUyOTc1MTY1Mywic3ViIjoiZm9vQGJhci5jb20ifQ.N7WydMmIeGZ5ARVy-90FLx-Wrzjl0KRGf53gPc9KaaqWQSKDubh2sw-xSH03cYLfgFuf4DrIZZiqGBpWq1iMhPtjNavKiT53icyUHM6YqSsAYVKLkTg0POhxq0-SkVHUp58eZ0ktS6G83KytOC8bFPIMeMaSJxjJwLJL_lZ8mdH4TtKx5qsQKsyqaks4YmsgnZS4DAQoomz63apEo13WzyzQ3Y_8KmyiV6Tu95YLRD2XRmP5XpYoYs9B5EzyW9VbBUHTPceWLNw3c2mFB2YgBCn9g2n92amgu39GK6r4CyELd2dQ4rVPX_E1DHatBQeZNRKv6ZkwbjbLRTgl5W936H3hDLuVGN9Ssu0pAORNZI6QZoSzcLypKbq8skdfHdP1S8_r_Dc1gdqQVnbFthwriqR4fIjk2xIR1LbGs9mXCavGc7VaeQAkDJiPT9_oNJsvNuwuRthXW0leAL5ia5VA2YAStUlsWCZCdtRjQZrnAxdCe4P8urf-ze6bZoKISLlOlAUvrtCRlDkJ3zxNMG5cFTar70fM3fbLPnND4szgQ24s6Rrsg-N01etOCdNp2bi22KaI6kQFmz4xM1PWiyXpk2nN5MXCwQXTYII2PB8nPYyR0cHdouvXP6Q36HCQ0fc8J6Cz7-ERiuSZOWyMxW1yA8fkBeL30iJrzct6qnAAuvw', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'HN3D8Jm3yYrt_XwM8U8dEpIcwvdAFE-HXwpz36gBIp4.xKFaRlcXDKh5qKwck9vMxU39PyH4_5-tybpWUDq7wPs', 'scope': 'openid'}
6.735 AccessTokenResponse {
"access_token": "HN3D8Jm3yYrt_XwM8U8dEpIcwvdAFE-HXwpz36gBIp4.xKFaRlcXDKh5qKwck9vMxU39PyH4_5-tybpWUDq7wPs",
"expires_in": 3599,
"id_token": {
"at_hash": "5GexMH-HXIIzL0MrvAocLw",
"aud": [
"6b898607-9bf4-46b5-9fd1-b0c84bb4f933"
],
"auth_time": 1529751409,
"c_hash": "C-tkiZahDGSaP-hFBOPZHw",
"exp": 1529755259,
"iat": 1529751659,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "2bd2cc2d-2c75-43f7-ab4d-fcafde5c8755",
"nonce": "RuKLv3xs7UyQPEl7",
"rat": 1529751653,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
6.735 phase <--<-- 5 --- UserInfo -->-->
6.735 do_user_info_request kwargs:{'state': 'hdG2zzMmcbcj6ZlV', 'method': 'GET', 'authn_method': 'bearer_header', 'ctype': 'jwt'}
6.736 request {'body': None}
6.736 request_url https://oidc-certification.ory.sh:8443/userinfo
6.736 request_http_args {'headers': {'Authorization': 'Bearer HN3D8Jm3yYrt_XwM8U8dEpIcwvdAFE-HXwpz36gBIp4.xKFaRlcXDKh5qKwck9vMxU39PyH4_5-tybpWUDq7wPs'}}
6.869 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
6.873 OpenIDSchema {
"aud": [
"6b898607-9bf4-46b5-9fd1-b0c84bb4f933"
],
"iss": "https://oidc-certification.ory.sh:8443/",
"sub": "[email protected]"
}
6.873 OpenIDSchema {
"aud": [
"6b898607-9bf4-46b5-9fd1-b0c84bb4f933"
],
"iss": "https://oidc-certification.ory.sh:8443/",
"sub": "[email protected]"
}
6.873 phase <--<-- 6 --- Done -->-->
6.873 end
6.873 assertion VerifyResponse
6.873 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
6.874 assertion CheckAsymSignedUserInfo
6.874 condition asym-signed-userinfo: status=OK [Verifies that the UserInfo was signed with a RSA key]
6.874 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
asym-signed-userinfo: status=OK [Verifies that the UserInfo was signed with a RSA key]
Done: status=OK
============================================================
RESULT: PASSED
./OP-UserInfo-Body.txt 0000644 0000000 0000000 00000033345 13313424126 014662 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-UserInfo-Body
Test description: UserInfo Endpoint access with POST and bearer body
Timestamp: 2018-06-23T11:00:38Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Registration -->-->
0.074 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.075 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#yxxfvUZbngfh7NbR"
],
"response_types": [
"code id_token token"
]
}
0.233 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.233 RegistrationResponse {
"client_id": "40ac42f3-7e4d-4cec-b4a1-b60c3ddcc801",
"client_secret": "2yV-E9~6mUSP",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "40ac42f3-7e4d-4cec-b4a1-b60c3ddcc801",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#yxxfvUZbngfh7NbR"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.234 phase <--<-- 3 --- AsyncAuthn -->-->
0.234 AuthorizationRequest {
"client_id": "40ac42f3-7e4d-4cec-b4a1-b60c3ddcc801",
"nonce": "RSSnwDsiSoe2dLnm",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid",
"state": "yIOY4YmHqYZS0H9k"
}
0.234 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=40ac42f3-7e4d-4cec-b4a1-b60c3ddcc801&state=yIOY4YmHqYZS0H9k&response_type=code+id_token+token&nonce=RSSnwDsiSoe2dLnm
0.234 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=40ac42f3-7e4d-4cec-b4a1-b60c3ddcc801&state=yIOY4YmHqYZS0H9k&response_type=code+id_token+token&nonce=RSSnwDsiSoe2dLnm
2.483 http args {}
2.656 response URL with fragment
2.656 response access_token=vtrlcwpYGRahuGyKFb_gh5bQaH3ufnm9o2RV0C664zc.LXxgo98fw-9eJ0SoJDG3XX-JzTb8D33raTjPZwNJdLA&code=LTCVJ2Hv-6gnK6jcdYUdiEKnmxjgE1jKQyZI0-dTSPM.vF5Ul2BEUp0bBOFboyFclb392yGwI0rrUVOlZOW0_zs&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiYV80Z0pCN2lvczVKcWpRT0ZNelJJZyIsImF1ZCI6WyI0MGFjNDJmMy03ZTRkLTRjZWMtYjRhMS1iNjBjM2RkY2M4MDEiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJWNXhOTUtpNFc3Ny1pWG85Ylp0NjJnIiwiZXhwIjoxNTI5NzU1MjM3LCJpYXQiOjE1Mjk3NTE2MzcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjdiOWU0YTMyLTliNWMtNDFjYS1iNTc4LTFhNjQ2Njc0NzZkYyIsIm5vbmNlIjoiUlNTbndEc2lTb2UyZExubSIsInJhdCI6MTUyOTc1MTYzNSwic3ViIjoiZm9vQGJhci5jb20ifQ.TW0RuKnyIHzPUhRHgxt4EXGc2j1FWXQFbMton2PFwMOhYdcUL0ViCBSnmqERLp5iTo24-_eBM75gMHlYdLZrfMWss4yxKMf_bbR03Q-f96JiE97wQjCDj402wmvwXeuo0sHlIhk1suFxZ2P9NsJebj9ti81mT5MNYu1EZxrONKvnd3dyGaGyU3c5fOLrWqF9LXMMqJCFEnvz6IUnug01MWCkyBhRUxaRXLVKrPA0exfQP1K6pZIcIc5iJ9sja1JqJOlkTYUKPW5q_GpNVg7jZ1bndTUueKwIamOBRb8UZQjs2gJfDsASqyT4I4d1gPDQi0xgUl-OMrRnOMU9YH1OV2gLf70AUUVy_OMtBH7HEdOrmgfVVCeEz_QemPGbAltmz8AU2VQpBmQPDd5sLxZxAiY6u2y9CQnvsLo4N-EECYWRzY-iW3HOUvacArZKag77SoxDgRe6KH-_IFIYn-Sb54lEwkpJMWCZaTdepPyV6J5ch8KrF6kRes75DNBKJ4_tHFZ1ob1_zdqC5HCN5c4nEPQLZfNmGfjN7kCPpo7W9bDirGPOSzJG8GmLrQqeMuSNbKj0hX-5HgduRduaIbMF1tZv2H2BI1Eli5Im_yYqYAC4N-CZOzq65M1qRDNsdtKTEyVEIhwAHG8Yq0deUC3DEnTwkQxKHiV83q5B3U3BYR8&scope=openid&state=yIOY4YmHqYZS0H9k&token_type=bearer
2.656 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiYV80Z0pCN2lvczVKcWpRT0ZNelJJZyIsImF1ZCI6WyI0MGFjNDJmMy03ZTRkLTRjZWMtYjRhMS1iNjBjM2RkY2M4MDEiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJWNXhOTUtpNFc3Ny1pWG85Ylp0NjJnIiwiZXhwIjoxNTI5NzU1MjM3LCJpYXQiOjE1Mjk3NTE2MzcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjdiOWU0YTMyLTliNWMtNDFjYS1iNTc4LTFhNjQ2Njc0NzZkYyIsIm5vbmNlIjoiUlNTbndEc2lTb2UyZExubSIsInJhdCI6MTUyOTc1MTYzNSwic3ViIjoiZm9vQGJhci5jb20ifQ.TW0RuKnyIHzPUhRHgxt4EXGc2j1FWXQFbMton2PFwMOhYdcUL0ViCBSnmqERLp5iTo24-_eBM75gMHlYdLZrfMWss4yxKMf_bbR03Q-f96JiE97wQjCDj402wmvwXeuo0sHlIhk1suFxZ2P9NsJebj9ti81mT5MNYu1EZxrONKvnd3dyGaGyU3c5fOLrWqF9LXMMqJCFEnvz6IUnug01MWCkyBhRUxaRXLVKrPA0exfQP1K6pZIcIc5iJ9sja1JqJOlkTYUKPW5q_GpNVg7jZ1bndTUueKwIamOBRb8UZQjs2gJfDsASqyT4I4d1gPDQi0xgUl-OMrRnOMU9YH1OV2gLf70AUUVy_OMtBH7HEdOrmgfVVCeEz_QemPGbAltmz8AU2VQpBmQPDd5sLxZxAiY6u2y9CQnvsLo4N-EECYWRzY-iW3HOUvacArZKag77SoxDgRe6KH-_IFIYn-Sb54lEwkpJMWCZaTdepPyV6J5ch8KrF6kRes75DNBKJ4_tHFZ1ob1_zdqC5HCN5c4nEPQLZfNmGfjN7kCPpo7W9bDirGPOSzJG8GmLrQqeMuSNbKj0hX-5HgduRduaIbMF1tZv2H2BI1Eli5Im_yYqYAC4N-CZOzq65M1qRDNsdtKTEyVEIhwAHG8Yq0deUC3DEnTwkQxKHiV83q5B3U3BYR8', 'scope': 'openid', 'code': 'LTCVJ2Hv-6gnK6jcdYUdiEKnmxjgE1jKQyZI0-dTSPM.vF5Ul2BEUp0bBOFboyFclb392yGwI0rrUVOlZOW0_zs', 'access_token': 'vtrlcwpYGRahuGyKFb_gh5bQaH3ufnm9o2RV0C664zc.LXxgo98fw-9eJ0SoJDG3XX-JzTb8D33raTjPZwNJdLA', 'state': 'yIOY4YmHqYZS0H9k', 'expires_in': 3599, 'token_type': 'bearer'}
2.738 AuthorizationResponse {
"access_token": "vtrlcwpYGRahuGyKFb_gh5bQaH3ufnm9o2RV0C664zc.LXxgo98fw-9eJ0SoJDG3XX-JzTb8D33raTjPZwNJdLA",
"code": "LTCVJ2Hv-6gnK6jcdYUdiEKnmxjgE1jKQyZI0-dTSPM.vF5Ul2BEUp0bBOFboyFclb392yGwI0rrUVOlZOW0_zs",
"expires_in": 3599,
"id_token": {
"at_hash": "a_4gJB7ios5JqjQOFMzRIg",
"aud": [
"40ac42f3-7e4d-4cec-b4a1-b60c3ddcc801"
],
"auth_time": 1529751409,
"c_hash": "V5xNMKi4W77-iXo9bZt62g",
"exp": 1529755237,
"iat": 1529751637,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "7b9e4a32-9b5c-41ca-b578-1a64667476dc",
"nonce": "RSSnwDsiSoe2dLnm",
"rat": 1529751635,
"sub": "[email protected]"
},
"scope": "openid",
"state": "yIOY4YmHqYZS0H9k",
"token_type": "bearer"
}
2.738 phase <--<-- 4 --- AccessToken -->-->
2.738 --> request op_args: {'state': 'yIOY4YmHqYZS0H9k'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.738 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'yIOY4YmHqYZS0H9k', 'code': 'LTCVJ2Hv-6gnK6jcdYUdiEKnmxjgE1jKQyZI0-dTSPM.vF5Ul2BEUp0bBOFboyFclb392yGwI0rrUVOlZOW0_zs', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '40ac42f3-7e4d-4cec-b4a1-b60c3ddcc801'}, 'state': 'yIOY4YmHqYZS0H9k'}
2.738 AccessTokenRequest {
"code": "LTCVJ2Hv-6gnK6jcdYUdiEKnmxjgE1jKQyZI0-dTSPM.vF5Ul2BEUp0bBOFboyFclb392yGwI0rrUVOlZOW0_zs",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "yIOY4YmHqYZS0H9k"
}
2.738 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.738 request_http_args {'headers': {'Authorization': 'Basic NDBhYzQyZjMtN2U0ZC00Y2VjLWI0YTEtYjYwYzNkZGNjODAxOjJ5Vi1FOSU3RTZtVVNQ', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.738 request code=LTCVJ2Hv-6gnK6jcdYUdiEKnmxjgE1jKQyZI0-dTSPM.vF5Ul2BEUp0bBOFboyFclb392yGwI0rrUVOlZOW0_zs&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=yIOY4YmHqYZS0H9k
2.949 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.95 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiYV80Z0pCN2lvczVKcWpRT0ZNelJJZyIsImF1ZCI6WyI0MGFjNDJmMy03ZTRkLTRjZWMtYjRhMS1iNjBjM2RkY2M4MDEiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJWNXhOTUtpNFc3Ny1pWG85Ylp0NjJnIiwiZXhwIjoxNTI5NzU1MjM3LCJpYXQiOjE1Mjk3NTE2MzcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjE0MjE2OTY0LTU3NzgtNGYzZC1hZDJjLTViODYzMzdiMzYxMCIsIm5vbmNlIjoiUlNTbndEc2lTb2UyZExubSIsInJhdCI6MTUyOTc1MTYzNSwic3ViIjoiZm9vQGJhci5jb20ifQ.BqMzN-Ss6zJnNvsl2aZtgZu818UxqMuHT1kac93PEgQVfFL-TgWhDYp6OLsSr5pEW4lJh-0EKzzXmUfDU8y-zZvs4vzCQXrB0dvQGJf4fdpL1yBt86cWUDfrxYCQBs7fA_AlAjxWybeypJNBlDUF2GzZ9HB7j-PAelffiDsI7hnKRYUvkg26cFkvh6rZlOmK-BZymiiZEzCDnjHLVjL2T7QtZtd1Owy2ADsKk9bO0h7Lx8SSuvVjWhy_62K94J01lMj7ZG1r3K-ogPpP-ONNzA96j8tWY3kbbmtG1NCDEikjTkQ2wpueAuBH9TBC_fFdHECgdE26dfE-TshvrqnNDwuWWoJSO75k0XSXr-RllsUgBjGSQGePrYloFPN5AEPWHxz4abOagQ-XQHDGABQIpiv_ov2KdtgG0xwN2ssMQh0Of1gruSxgMOLGoxxhKQAz61wfFbSdMO-uyuqi0O98USg4jJX2m3bQaOq6Q5XeZKWm_JTFNZefUapxjq8PCxlkRdT3vDQGtLLRhMBtJlzxTySxIZFS7WVuAIFe77846wbQXf7dME27_F7u_I8PjxG605t6eJmkowG4qCw1aA311zWleit-uRIlcgUmJs0ofvPA8zGC0cjhmKuVWjz_ZtKPixb0LQ_BvSwq_lHtlKICI4YUE8thGoYUTWd6GpoeBCo', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'Nu6WOJDhhIm-SX1ib6Ove5DAVOq3tZK0fBTedU8LG5E.GuEL0SF3B3HhaVDSQE1GgtOf8wJMhnQO3-8rUNZz4JM', 'scope': 'openid'}
2.954 AccessTokenResponse {
"access_token": "Nu6WOJDhhIm-SX1ib6Ove5DAVOq3tZK0fBTedU8LG5E.GuEL0SF3B3HhaVDSQE1GgtOf8wJMhnQO3-8rUNZz4JM",
"expires_in": 3599,
"id_token": {
"at_hash": "a_4gJB7ios5JqjQOFMzRIg",
"aud": [
"40ac42f3-7e4d-4cec-b4a1-b60c3ddcc801"
],
"auth_time": 1529751409,
"c_hash": "V5xNMKi4W77-iXo9bZt62g",
"exp": 1529755237,
"iat": 1529751637,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "14216964-5778-4f3d-ad2c-5b86337b3610",
"nonce": "RSSnwDsiSoe2dLnm",
"rat": 1529751635,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
2.954 phase <--<-- 5 --- UserInfo -->-->
2.954 do_user_info_request kwargs:{'state': 'yIOY4YmHqYZS0H9k', 'method': 'POST', 'authn_method': 'token_in_message_body'}
2.954 request {'body': 'access_token=Nu6WOJDhhIm-SX1ib6Ove5DAVOq3tZK0fBTedU8LG5E.GuEL0SF3B3HhaVDSQE1GgtOf8wJMhnQO3-8rUNZz4JM'}
2.954 request_url https://oidc-certification.ory.sh:8443/userinfo
2.954 request_http_args {'headers': {'Content-Type': 'application/x-www-form-urlencoded'}}
3.026 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
3.026 OpenIDSchema {
"sub": "[email protected]"
}
3.026 OpenIDSchema {
"sub": "[email protected]"
}
3.026 phase <--<-- 6 --- Done -->-->
3.027 end
3.027 assertion VerifyResponse
3.027 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.027 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-redirect_uri-Query-Mismatch.txt 0000644 0000000 0000000 00000011263 13313424274 017562 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-Query-Mismatch
Test description: Rejects redirect_uri when query parameter does not match what is registed
Timestamp: 2018-06-23T11:02:20Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.076 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.077 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.077 phase <--<-- 2 --- Registration -->-->
0.077 register kwargs:{'application_name': 'OIC test tool', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'redirect_uri': ['https://op.certification.openid.net:61353/authz_cb?foo=bar']}
0.078 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#jREouL0ZYVnfbFu9"
],
"response_types": [
"code id_token token"
]
}
0.233 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.234 RegistrationResponse {
"client_id": "4a1e8a0d-f313-4f3c-8501-0c706f3685db",
"client_secret": "V2sEdr_ztdqV",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "4a1e8a0d-f313-4f3c-8501-0c706f3685db",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#jREouL0ZYVnfbFu9"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.234 phase <--<-- 3 --- Note -->-->
============================================================
Conditions
============================================================
RESULT: PARTIAL RESULT
./OP-ClientAuth-SecretPost-Dynamic.txt 0000644 0000000 0000000 00000032607 13313424121 017743 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-ClientAuth-SecretPost-Dynamic
Test description: Access token request with client_secret_post authentication
Timestamp: 2018-06-23T11:00:33Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.074 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.076 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.076 phase <--<-- 2 --- Registration -->-->
0.076 register kwargs:{'application_name': 'OIC test tool', 'token_endpoint_auth_method': 'client_secret_post', 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'response_types': ['code id_token token'], 'url': 'https://oidc-certification.ory.sh:8443/clients', 'application_type': 'web'}
0.076 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#TO1tEDO7TpFOD1KW"
],
"response_types": [
"code id_token token"
],
"token_endpoint_auth_method": "client_secret_post"
}
0.243 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.244 RegistrationResponse {
"client_id": "9a8846f5-68bc-40d4-8b1d-901834914d78",
"client_secret": "_pHwNCTUrkUZ",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "9a8846f5-68bc-40d4-8b1d-901834914d78",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#TO1tEDO7TpFOD1KW"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_post",
"userinfo_signed_response_alg": "none"
}
0.244 phase <--<-- 3 --- AsyncAuthn -->-->
0.245 AuthorizationRequest {
"client_id": "9a8846f5-68bc-40d4-8b1d-901834914d78",
"nonce": "iOU6t78iy5ME9WDC",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid",
"state": "rGJN1UBhNG22xdNJ"
}
0.245 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=9a8846f5-68bc-40d4-8b1d-901834914d78&state=rGJN1UBhNG22xdNJ&response_type=code+id_token+token&nonce=iOU6t78iy5ME9WDC
0.245 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=9a8846f5-68bc-40d4-8b1d-901834914d78&state=rGJN1UBhNG22xdNJ&response_type=code+id_token+token&nonce=iOU6t78iy5ME9WDC
2.348 http args {}
2.516 response URL with fragment
2.516 response access_token=uQn18Uj8YMY5wrMCJUUVnb64RVyWOVF5nJ2xjG494y4.nxLR332UsNvoe-8PSMxZcoM3f-eraWbVKeIfXPyco58&code=7ua7izBX6FYD0-0NbwqvQamueMv7Tcr2U1TSYBIShAs.flI3imOE2DOqMjz7D01CS4XXGsvUXdvN_UqTzXin5nk&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiM0RoMzBqV0syYzhXVjRmcHJ0ZmpRQSIsImF1ZCI6WyI5YTg4NDZmNS02OGJjLTQwZDQtOGIxZC05MDE4MzQ5MTRkNzgiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJHTjVocW5ObkJEN051ODR4bUVtN25nIiwiZXhwIjoxNTI5NzU1MjMzLCJpYXQiOjE1Mjk3NTE2MzMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjUyMjgzZTliLTA5ZDQtNGFhNC1hMmViLTA5ZThiZmM2NzUyZSIsIm5vbmNlIjoiaU9VNnQ3OGl5NU1FOVdEQyIsInJhdCI6MTUyOTc1MTYzMSwic3ViIjoiZm9vQGJhci5jb20ifQ.mUNvKq6RHs4humotvaICSQwT-3jGqxmeoGf3JYWRD4fTVICnKzMxJINluEKWAJqQM-_AL2NVpXQc3X3bqFqBIHKUw_4KMBEls4gqJpIibbri4LY0GXDeVvJrbYqCr7f5amt_9IAJSeX4wO5zJ1UN8ixWNqjFkBDx5_tyhpQ1X4iZ0GSlx_qhdaA5pc6Nch-J5BB1fmEnjJ8BQK2iDfGuwVA2jKsgfz1rBpbcjNhBproU3jOPbNkqsx0FMkigRy5nFwJCVRhjROj_zBH-ZcHXWJS7y3GOi_xnmIlWVjFOuWtLmah3IrjIhPf357c6gE05gNjbifm8X5LuXm_lKUKQKMPDHWx_rO3R91-c7K90hjzbo1xB9KmiY5I-S00DhNMS68P1lpIV46ttaLOmYRvdosmqeaGAa3FmoTaG6Xbc_iki8Rg7yGChP6ngR79v0t-FX9-FGx2uA07Fmvk0T3s1-dr0_YXuSEVzZ4P69HqwjSjDUbDNv-fshPVloSZ-N0rXX_iyYaLJb_l8O42daMGdbaoLpHGIDR2pVHS80GfPvazrf8mBMGrX2w8lWweKWJ6m6_RiDzRIR66SsMWkct0DF0Vq9pqVE10EVo-QnuEdpvl9_1m5po4yT0mmytGhz9mCK8_lvc-tFyHfSWt3A-z8V4JN4H2tyPrlkidp6PaQ2lo&scope=openid&state=rGJN1UBhNG22xdNJ&token_type=bearer
2.517 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiM0RoMzBqV0syYzhXVjRmcHJ0ZmpRQSIsImF1ZCI6WyI5YTg4NDZmNS02OGJjLTQwZDQtOGIxZC05MDE4MzQ5MTRkNzgiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJHTjVocW5ObkJEN051ODR4bUVtN25nIiwiZXhwIjoxNTI5NzU1MjMzLCJpYXQiOjE1Mjk3NTE2MzMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjUyMjgzZTliLTA5ZDQtNGFhNC1hMmViLTA5ZThiZmM2NzUyZSIsIm5vbmNlIjoiaU9VNnQ3OGl5NU1FOVdEQyIsInJhdCI6MTUyOTc1MTYzMSwic3ViIjoiZm9vQGJhci5jb20ifQ.mUNvKq6RHs4humotvaICSQwT-3jGqxmeoGf3JYWRD4fTVICnKzMxJINluEKWAJqQM-_AL2NVpXQc3X3bqFqBIHKUw_4KMBEls4gqJpIibbri4LY0GXDeVvJrbYqCr7f5amt_9IAJSeX4wO5zJ1UN8ixWNqjFkBDx5_tyhpQ1X4iZ0GSlx_qhdaA5pc6Nch-J5BB1fmEnjJ8BQK2iDfGuwVA2jKsgfz1rBpbcjNhBproU3jOPbNkqsx0FMkigRy5nFwJCVRhjROj_zBH-ZcHXWJS7y3GOi_xnmIlWVjFOuWtLmah3IrjIhPf357c6gE05gNjbifm8X5LuXm_lKUKQKMPDHWx_rO3R91-c7K90hjzbo1xB9KmiY5I-S00DhNMS68P1lpIV46ttaLOmYRvdosmqeaGAa3FmoTaG6Xbc_iki8Rg7yGChP6ngR79v0t-FX9-FGx2uA07Fmvk0T3s1-dr0_YXuSEVzZ4P69HqwjSjDUbDNv-fshPVloSZ-N0rXX_iyYaLJb_l8O42daMGdbaoLpHGIDR2pVHS80GfPvazrf8mBMGrX2w8lWweKWJ6m6_RiDzRIR66SsMWkct0DF0Vq9pqVE10EVo-QnuEdpvl9_1m5po4yT0mmytGhz9mCK8_lvc-tFyHfSWt3A-z8V4JN4H2tyPrlkidp6PaQ2lo', 'scope': 'openid', 'code': '7ua7izBX6FYD0-0NbwqvQamueMv7Tcr2U1TSYBIShAs.flI3imOE2DOqMjz7D01CS4XXGsvUXdvN_UqTzXin5nk', 'access_token': 'uQn18Uj8YMY5wrMCJUUVnb64RVyWOVF5nJ2xjG494y4.nxLR332UsNvoe-8PSMxZcoM3f-eraWbVKeIfXPyco58', 'state': 'rGJN1UBhNG22xdNJ', 'expires_in': 3599, 'token_type': 'bearer'}
2.592 AuthorizationResponse {
"access_token": "uQn18Uj8YMY5wrMCJUUVnb64RVyWOVF5nJ2xjG494y4.nxLR332UsNvoe-8PSMxZcoM3f-eraWbVKeIfXPyco58",
"code": "7ua7izBX6FYD0-0NbwqvQamueMv7Tcr2U1TSYBIShAs.flI3imOE2DOqMjz7D01CS4XXGsvUXdvN_UqTzXin5nk",
"expires_in": 3599,
"id_token": {
"at_hash": "3Dh30jWK2c8WV4fprtfjQA",
"aud": [
"9a8846f5-68bc-40d4-8b1d-901834914d78"
],
"auth_time": 1529751409,
"c_hash": "GN5hqnNnBD7Nu84xmEm7ng",
"exp": 1529755233,
"iat": 1529751633,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "52283e9b-09d4-4aa4-a2eb-09e8bfc6752e",
"nonce": "iOU6t78iy5ME9WDC",
"rat": 1529751631,
"sub": "[email protected]"
},
"scope": "openid",
"state": "rGJN1UBhNG22xdNJ",
"token_type": "bearer"
}
2.592 phase <--<-- 4 --- AccessToken -->-->
2.592 --> request op_args: {'state': 'rGJN1UBhNG22xdNJ', 'authn_method': 'client_secret_post'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.592 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'rGJN1UBhNG22xdNJ', 'code': '7ua7izBX6FYD0-0NbwqvQamueMv7Tcr2U1TSYBIShAs.flI3imOE2DOqMjz7D01CS4XXGsvUXdvN_UqTzXin5nk', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '9a8846f5-68bc-40d4-8b1d-901834914d78'}, 'state': 'rGJN1UBhNG22xdNJ', 'authn_method': 'client_secret_post'}
2.592 AccessTokenRequest {
"client_id": "9a8846f5-68bc-40d4-8b1d-901834914d78",
"client_secret": "_pHwNCTUrkUZ",
"code": "7ua7izBX6FYD0-0NbwqvQamueMv7Tcr2U1TSYBIShAs.flI3imOE2DOqMjz7D01CS4XXGsvUXdvN_UqTzXin5nk",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "rGJN1UBhNG22xdNJ"
}
2.592 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.592 request_http_args {'headers': {'Content-Type': 'application/x-www-form-urlencoded'}}
2.592 request code=7ua7izBX6FYD0-0NbwqvQamueMv7Tcr2U1TSYBIShAs.flI3imOE2DOqMjz7D01CS4XXGsvUXdvN_UqTzXin5nk&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=9a8846f5-68bc-40d4-8b1d-901834914d78&grant_type=authorization_code&state=rGJN1UBhNG22xdNJ&client_secret=_pHwNCTUrkUZ
2.803 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.804 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiM0RoMzBqV0syYzhXVjRmcHJ0ZmpRQSIsImF1ZCI6WyI5YTg4NDZmNS02OGJjLTQwZDQtOGIxZC05MDE4MzQ5MTRkNzgiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJHTjVocW5ObkJEN051ODR4bUVtN25nIiwiZXhwIjoxNTI5NzU1MjMzLCJpYXQiOjE1Mjk3NTE2MzMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjFkYmYxNzYxLWQ3MTYtNDlmNy05NTVjLWI1NzMyZjQxZDBlYSIsIm5vbmNlIjoiaU9VNnQ3OGl5NU1FOVdEQyIsInJhdCI6MTUyOTc1MTYzMSwic3ViIjoiZm9vQGJhci5jb20ifQ.ZdzID1-zPykD932f9WFLHUe6FAiU_b5jM_ivQdvV-8JU2qxIaSbkxEbqHkzxu9hwDGIBzV0SpvZ2m-tcHCQZz_NmJ6AeLDuXC1Tk-4dDD7aPox5Hp7qRKBAM7b3Gy3pJOjQ23_672Q3n_dymvQ0MCyinO1Hx8tOOHn_xsVlseSslvpR4zfS0bFzZLVvIj-4Jb86shQUdt-9W9AUkjZ8tWSlrDooBSlqw8amgRDtIGKKBAIzYypAfiAhtUPat0u_DIYSiUsIpxIdfa3S1tEH57rgmSCcFr2nFqCsqwmcBmbc12e62jvoL935wXT8X3ZAQc6Pgc9RY78JShQXZIoEq58rfh9XAlwQxZGidRWSzQuXIHE8HxMc0n--KJJrnKuw0T_d8AzWwuygjB55amm-wbD-MFa-1dOlhw2GWWm6olznT2780tLcGQKqw5pQLVe8XHDKQN-Dya5kH4p1MfrEKMT2BgIpi2iOlrzu1tBYVlcOcWAbqg3Ba3lmShtiwFeZpSzSpIpNJOBq2HxMJJ4VAdPM3TaSDKCjxPELaZiS8xWxX7gvS9EQHdV4P7LTqP9NWw5YcLIwRzi4NrC8qwUBcSr7HaeC5yIv_s5nbQNHVQwQf26g3jKPOCjEdpN58MiW3TG5EQD9jqscwLWJu0HJcmvDWNOig9WdZxrjANok3kSE', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'GnNm_5yVe6H0d8AmN6ykDFbZhQgwGT2fotbhD0QuNqo.Kvjmg5j2M3Yhs_tUCoI-9injixymnTTDDmmtEfmVl-Y', 'scope': 'openid'}
2.807 AccessTokenResponse {
"access_token": "GnNm_5yVe6H0d8AmN6ykDFbZhQgwGT2fotbhD0QuNqo.Kvjmg5j2M3Yhs_tUCoI-9injixymnTTDDmmtEfmVl-Y",
"expires_in": 3599,
"id_token": {
"at_hash": "3Dh30jWK2c8WV4fprtfjQA",
"aud": [
"9a8846f5-68bc-40d4-8b1d-901834914d78"
],
"auth_time": 1529751409,
"c_hash": "GN5hqnNnBD7Nu84xmEm7ng",
"exp": 1529755233,
"iat": 1529751633,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "1dbf1761-d716-49f7-955c-b5732f41d0ea",
"nonce": "iOU6t78iy5ME9WDC",
"rat": 1529751631,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
2.807 phase <--<-- 5 --- Done -->-->
2.807 end
2.808 assertion VerifyResponse
2.808 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.808 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-nonce-noncode.txt 0000644 0000000 0000000 00000032665 13313424210 014760 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-nonce-noncode
Test description: Request with nonce, verifies it was returned in ID Token [Implicit, Hybrid]
Timestamp: 2018-06-23T11:01:28Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.152 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.153 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.153 phase <--<-- 2 --- Registration -->-->
0.153 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.154 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#NcEyN6ptlVjODiRA"
],
"response_types": [
"code id_token token"
]
}
0.314 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.315 RegistrationResponse {
"client_id": "51c36dfd-b11c-45e9-879f-bbcff638b941",
"client_secret": "Cgz5SCNDpL9W",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "51c36dfd-b11c-45e9-879f-bbcff638b941",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#NcEyN6ptlVjODiRA"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.315 phase <--<-- 3 --- AsyncAuthn -->-->
0.315 AuthorizationRequest {
"client_id": "51c36dfd-b11c-45e9-879f-bbcff638b941",
"nonce": "cYZuYYRsGbNAHjd5",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid",
"state": "PJnq1XY8VwfdyOFM"
}
0.316 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=51c36dfd-b11c-45e9-879f-bbcff638b941&state=PJnq1XY8VwfdyOFM&response_type=code+id_token+token&nonce=cYZuYYRsGbNAHjd5
0.316 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=51c36dfd-b11c-45e9-879f-bbcff638b941&state=PJnq1XY8VwfdyOFM&response_type=code+id_token+token&nonce=cYZuYYRsGbNAHjd5
2.293 http args {}
2.464 response URL with fragment
2.464 response access_token=dWzqn2SCDksUM9s6pGcGSEvRLCEUcAb8pKTNZTwXVq0.E7Ydpk_hper3i0OaoiJZnFh1zCLvweRW3S7kazC-PpU&code=zbtmly9LKOyQms-JRXnCeroF-wKN6KKTwtjHXBcruTY.YiMSpu4pR93GnC2VNh9FI0kxv9kX4vOQ_Z27YB-WAKU&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiX2daU3dxaTJHcnJwM2RheWlKMUFpZyIsImF1ZCI6WyI1MWMzNmRmZC1iMTFjLTQ1ZTktODc5Zi1iYmNmZjYzOGI5NDEiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJDZmgxUHF1c2dJS0JLc3Z3bnFocXl3IiwiZXhwIjoxNTI5NzU1Mjg3LCJpYXQiOjE1Mjk3NTE2ODcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjIyOWUzODU0LTQ1NGQtNDdjZi1iZGUwLTkzNWFhOWQ2NjJmMiIsIm5vbmNlIjoiY1ladVlZUnNHYk5BSGpkNSIsInJhdCI6MTUyOTc1MTY4Niwic3ViIjoiZm9vQGJhci5jb20ifQ.tY1h80uo9sf8KzJ09JMIoKOdDjsC8R41Mezr3Kou4tLz85L8waE_0ctPKEckQkfem-k3wvRUv1uZp20rlNybrjGjqYYR4QvgXQT1pb-qRCuEehfLeU_yi7V1d7srkoj9l5mPWRxqR5lQ57QDKtg0IakAtDn2lrdvkVwcyi2fAXXjN8lgii7D99zWXk9yNvQU_vU6aNln8-aTBuTVP_qEPqxymNEC3heMe_iqMx8m8-exBEVigUI-qcUCkk_TzQGyEv_TDWJoEI0fryMVpdPTR1FQzDWRr-QGBKr8ZKRSW3bGKdW7zuEAMWmroI5sVWhH08TRmhBWzlwZ3B4C8gYLv5UmD2w3ssC-YHJXysxxaerPmI1WD9ES2f5m0U6IJyld5U5KjsQHFiZ67YPFz291Z7ocTq5fKJpxmeSl2clW9sKoLFVqxnM6JkXZeE_Z_5owIfxf4quj05__rR_15YuH5Jkw-8lztq75VxVkSnGQ1c3b30_jfmCeCLxHE8c3Zglmlg7Z8XD0raf4AUtUJ28MPv1ji8fPlJpDz2FNEW5t-kqre49LQkdVLqUTyeC6c7ABcDTLp4fM0EU5_hwxYVrfBS_Yl_TCYSOwMOWneg-uN6MGRk4t4D6g1pAXkyoV2wbIGnJEz8zQknzbi2oExPxm51VnOw15uuJ4f_rTFC9L3oE&scope=openid&state=PJnq1XY8VwfdyOFM&token_type=bearer
2.464 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiX2daU3dxaTJHcnJwM2RheWlKMUFpZyIsImF1ZCI6WyI1MWMzNmRmZC1iMTFjLTQ1ZTktODc5Zi1iYmNmZjYzOGI5NDEiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJDZmgxUHF1c2dJS0JLc3Z3bnFocXl3IiwiZXhwIjoxNTI5NzU1Mjg3LCJpYXQiOjE1Mjk3NTE2ODcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjIyOWUzODU0LTQ1NGQtNDdjZi1iZGUwLTkzNWFhOWQ2NjJmMiIsIm5vbmNlIjoiY1ladVlZUnNHYk5BSGpkNSIsInJhdCI6MTUyOTc1MTY4Niwic3ViIjoiZm9vQGJhci5jb20ifQ.tY1h80uo9sf8KzJ09JMIoKOdDjsC8R41Mezr3Kou4tLz85L8waE_0ctPKEckQkfem-k3wvRUv1uZp20rlNybrjGjqYYR4QvgXQT1pb-qRCuEehfLeU_yi7V1d7srkoj9l5mPWRxqR5lQ57QDKtg0IakAtDn2lrdvkVwcyi2fAXXjN8lgii7D99zWXk9yNvQU_vU6aNln8-aTBuTVP_qEPqxymNEC3heMe_iqMx8m8-exBEVigUI-qcUCkk_TzQGyEv_TDWJoEI0fryMVpdPTR1FQzDWRr-QGBKr8ZKRSW3bGKdW7zuEAMWmroI5sVWhH08TRmhBWzlwZ3B4C8gYLv5UmD2w3ssC-YHJXysxxaerPmI1WD9ES2f5m0U6IJyld5U5KjsQHFiZ67YPFz291Z7ocTq5fKJpxmeSl2clW9sKoLFVqxnM6JkXZeE_Z_5owIfxf4quj05__rR_15YuH5Jkw-8lztq75VxVkSnGQ1c3b30_jfmCeCLxHE8c3Zglmlg7Z8XD0raf4AUtUJ28MPv1ji8fPlJpDz2FNEW5t-kqre49LQkdVLqUTyeC6c7ABcDTLp4fM0EU5_hwxYVrfBS_Yl_TCYSOwMOWneg-uN6MGRk4t4D6g1pAXkyoV2wbIGnJEz8zQknzbi2oExPxm51VnOw15uuJ4f_rTFC9L3oE', 'scope': 'openid', 'code': 'zbtmly9LKOyQms-JRXnCeroF-wKN6KKTwtjHXBcruTY.YiMSpu4pR93GnC2VNh9FI0kxv9kX4vOQ_Z27YB-WAKU', 'access_token': 'dWzqn2SCDksUM9s6pGcGSEvRLCEUcAb8pKTNZTwXVq0.E7Ydpk_hper3i0OaoiJZnFh1zCLvweRW3S7kazC-PpU', 'state': 'PJnq1XY8VwfdyOFM', 'expires_in': 3599, 'token_type': 'bearer'}
2.55 AuthorizationResponse {
"access_token": "dWzqn2SCDksUM9s6pGcGSEvRLCEUcAb8pKTNZTwXVq0.E7Ydpk_hper3i0OaoiJZnFh1zCLvweRW3S7kazC-PpU",
"code": "zbtmly9LKOyQms-JRXnCeroF-wKN6KKTwtjHXBcruTY.YiMSpu4pR93GnC2VNh9FI0kxv9kX4vOQ_Z27YB-WAKU",
"expires_in": 3599,
"id_token": {
"at_hash": "_gZSwqi2Grrp3dayiJ1Aig",
"aud": [
"51c36dfd-b11c-45e9-879f-bbcff638b941"
],
"auth_time": 1529751409,
"c_hash": "Cfh1PqusgIKBKsvwnqhqyw",
"exp": 1529755287,
"iat": 1529751687,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "229e3854-454d-47cf-bde0-935aa9d662f2",
"nonce": "cYZuYYRsGbNAHjd5",
"rat": 1529751686,
"sub": "[email protected]"
},
"scope": "openid",
"state": "PJnq1XY8VwfdyOFM",
"token_type": "bearer"
}
2.551 phase <--<-- 4 --- AccessToken -->-->
2.551 --> request op_args: {'state': 'PJnq1XY8VwfdyOFM'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.551 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'PJnq1XY8VwfdyOFM', 'code': 'zbtmly9LKOyQms-JRXnCeroF-wKN6KKTwtjHXBcruTY.YiMSpu4pR93GnC2VNh9FI0kxv9kX4vOQ_Z27YB-WAKU', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '51c36dfd-b11c-45e9-879f-bbcff638b941'}, 'state': 'PJnq1XY8VwfdyOFM'}
2.551 AccessTokenRequest {
"code": "zbtmly9LKOyQms-JRXnCeroF-wKN6KKTwtjHXBcruTY.YiMSpu4pR93GnC2VNh9FI0kxv9kX4vOQ_Z27YB-WAKU",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "PJnq1XY8VwfdyOFM"
}
2.551 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.551 request_http_args {'headers': {'Authorization': 'Basic NTFjMzZkZmQtYjExYy00NWU5LTg3OWYtYmJjZmY2MzhiOTQxOkNnejVTQ05EcEw5Vw==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.551 request code=zbtmly9LKOyQms-JRXnCeroF-wKN6KKTwtjHXBcruTY.YiMSpu4pR93GnC2VNh9FI0kxv9kX4vOQ_Z27YB-WAKU&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=PJnq1XY8VwfdyOFM
2.785 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.787 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiX2daU3dxaTJHcnJwM2RheWlKMUFpZyIsImF1ZCI6WyI1MWMzNmRmZC1iMTFjLTQ1ZTktODc5Zi1iYmNmZjYzOGI5NDEiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJDZmgxUHF1c2dJS0JLc3Z3bnFocXl3IiwiZXhwIjoxNTI5NzU1Mjg3LCJpYXQiOjE1Mjk3NTE2ODgsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjIyZTYzOTk1LWRkYjktNGIyNC1iZmFiLTIzZDkzMzFjZjc5ZCIsIm5vbmNlIjoiY1ladVlZUnNHYk5BSGpkNSIsInJhdCI6MTUyOTc1MTY4Niwic3ViIjoiZm9vQGJhci5jb20ifQ.xLr9bQjia7E0UczvBNLG22hr8FtnW5mqRGXyAmahqTgnGNegDCebSxdBg6h4ZhjfBqb0H-kQ4xmQ70NzX6rR4kGDK0oyjUfUrw_UJtcF7N4OLlLS7f-YYj_mqH6bz7z6StJZY1nq_LyFmX4ygm1FU9baz2CtKhtxgeUjNinw053XgLFPlH7ob0kdtvcVcDOOT3Svg1R4pjk5LY7Hsd4HI6NWVjLh4LtHVNSHqEkRHis_t9OQ1-YtoT-aZek8Pu8sceZAZGA_IdCxRQfTVTKnoAQ1dqqgzzhYHmjl4cWy68gLILo7dgEHMA_VOhRy4-T94A6NTjNay1BRNrHZLYVwRqk_VDve7jAEOry2nCSi6NSgzHeVR9ttK6_syAgn96nbBgH_5WT9VLVbMr0y8mD6lGkagTzqUXal0pH__2pcWGAkYjRnbvxnuLgAoe13XiO7_BTf3VxLv7qP4D6mh_VPIrHERnSV6tc3y6uYbd4K_e3IJwgOon6yyZdpxCi6naW4ZtdLLKoxkq_SIY9AESJ2rZfedAKuVj9Tv2WhwAEa_-6s3R3ZfVTchN2HUCyTeo4VwRaL2O8k4nBzmDYwJjqEoO3GB8BfobGMpgNoMrhPvLm10C_llM2BJ5CZ_nPHrEBqSihDCGEGaZGGhW1vNrVAxbs61XBr6oRQUgsMsIinb6Q', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': '-zA4yL5qyKsG73vSBsvdckcn2jtSXOjcyAyuNE-ceMQ.NKlGzwt9_s19flwPrMPFm1JJPyP0OpjL5o09RhLyugU', 'scope': 'openid'}
2.79 AccessTokenResponse {
"access_token": "-zA4yL5qyKsG73vSBsvdckcn2jtSXOjcyAyuNE-ceMQ.NKlGzwt9_s19flwPrMPFm1JJPyP0OpjL5o09RhLyugU",
"expires_in": 3599,
"id_token": {
"at_hash": "_gZSwqi2Grrp3dayiJ1Aig",
"aud": [
"51c36dfd-b11c-45e9-879f-bbcff638b941"
],
"auth_time": 1529751409,
"c_hash": "Cfh1PqusgIKBKsvwnqhqyw",
"exp": 1529755287,
"iat": 1529751688,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "22e63995-ddb9-4b24-bfab-23d9331cf79d",
"nonce": "cYZuYYRsGbNAHjd5",
"rat": 1529751686,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
2.79 phase <--<-- 5 --- Done -->-->
2.79 end
2.791 assertion VerifyResponse
2.791 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.791 assertion CheckIdTokenNonce
2.791 condition check-idtoken-nonce: status=OK [Verify that the nonce in the IDToken is the same that's included in the Authorization Request.]
2.791 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
check-idtoken-nonce: status=OK [Verify that the nonce in the IDToken is the same that's included in the Authorization Request.]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Registration-jwks.txt 0000644 0000000 0000000 00000046653 13313424024 015666 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-jwks
Test description: Uses keys registered with jwks value
Timestamp: 2018-06-23T10:59:32Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.118 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.12 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.12 phase <--<-- 2 --- Registration -->-->
0.12 register kwargs:{'application_name': 'OIC test tool', 'jwks': {'keys': [{'use': 'enc', 'kty': 'RSA', 'n': 'pKXuY5tuT9ibmEcq4B6VRx3MafdSsajrOndAk5FjJFedlA6qSpdqDUr9wWUkNeO8h_efdLfg43CHXk3mH6Fp1t2gbHzBQ4-SzT3_X5tsdG2PPqvngem7f5NHO6Kefhq11Zk5q4-FyTL9FUQQW6ZANbrU7GifSAs82Ck20ciIvFdv7cPCphk_THMVv14aW5w0eKEXumgx4Bc7HrQFXQUHSze3dVAKg8hKHDIQOGUU0fkolEFmOC4Gb-G57RpBJryZxXqgdUdEG66xl1f37tqpYgaLViFDWDiI8S7BMVHEbGHN4-f_MD9f6gMduaxrL6a6SfyIW1So2VqtvlAyanesTw', 'e': 'AQAB', 'kid': 'gtH4v3Yr2QqLreBSz0ByQQ8vkf8eFo1KIit3s-3Bbww'}, {'use': 'sig', 'kty': 'RSA', 'n': '1Z8lhYNb0tHZsVrzIQs-JetNCLIBWeOHXblcirxQgFLt6z4Rr-9vxPbEsrmRmZbPuuoL8nGehqOK11LAgqa1QfCR4TKxr2srlbTv4A4Gyf-suhO_KKt0JWv2q9olREZcoIE4FCwK0vuWTqD5q4qL_uqt_kHltzhdkJ4LySdCRCbxG1kcEcXoPNIhZERttqbZTIQviJxJ2HqC7CbwocmZMnbMAzP52bVX86vLxosmI-pqkG1RG8jMTZMhvc2GmYe6CfleW7bRxS0078sWDM_iACSQVOqLk5rcW_C-a61EYzNNN7BMw-VxFSDtoGgNgb6XGM6FTf9fkdJjIRL2VZAt0Q', 'e': 'AQAB', 'kid': 'wt25OgyR_nzG3OoQ7daa2rL6-gMnFdfRzBjhUVPu8RQ'}, {'x': 'aruz0ufjUGuEQwg2Q3ewyy5DnEIWWmIEO5stN8MfUTA', 'use': 'sig', 'kty': 'EC', 'y': 'dZnZMUOQAvzOD6q1f11PEho4-aX7nWdmive8zdxUbrA', 'crv': 'P-256', 'kid': 'AZXCzT401BtqezIxAdHOEez1ApQUu3O5hjcfRFKxXtQ'}, {'x': 'AeI9gyN_hcFae8vO2HgaH7Fh-MVX1YXJdWg-T16g1kM', 'use': 'enc', 'kty': 'EC', 'y': '5ASt8rCvPWTKMAh6wvR8_-OEbl_9TTkkgAd7LXW8H48', 'crv': 'P-256', 'kid': 'CrXNdVSdrZ-lOToSPso6OlcZnP-Et4U9CzOIZOZPvLw'}]}, 'token_endpoint_auth_method': 'private_key_jwt', 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'grant_types': ['authorization_code', 'implicit'], 'response_types': ['code id_token token'], 'url': 'https://oidc-certification.ory.sh:8443/clients', 'application_type': 'web'}
0.121 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks": {
"keys": [
{
"e": "AQAB",
"kid": "gtH4v3Yr2QqLreBSz0ByQQ8vkf8eFo1KIit3s-3Bbww",
"kty": "RSA",
"n": "pKXuY5tuT9ibmEcq4B6VRx3MafdSsajrOndAk5FjJFedlA6qSpdqDUr9wWUkNeO8h_efdLfg43CHXk3mH6Fp1t2gbHzBQ4-SzT3_X5tsdG2PPqvngem7f5NHO6Kefhq11Zk5q4-FyTL9FUQQW6ZANbrU7GifSAs82Ck20ciIvFdv7cPCphk_THMVv14aW5w0eKEXumgx4Bc7HrQFXQUHSze3dVAKg8hKHDIQOGUU0fkolEFmOC4Gb-G57RpBJryZxXqgdUdEG66xl1f37tqpYgaLViFDWDiI8S7BMVHEbGHN4-f_MD9f6gMduaxrL6a6SfyIW1So2VqtvlAyanesTw",
"use": "enc"
},
{
"e": "AQAB",
"kid": "wt25OgyR_nzG3OoQ7daa2rL6-gMnFdfRzBjhUVPu8RQ",
"kty": "RSA",
"n": "1Z8lhYNb0tHZsVrzIQs-JetNCLIBWeOHXblcirxQgFLt6z4Rr-9vxPbEsrmRmZbPuuoL8nGehqOK11LAgqa1QfCR4TKxr2srlbTv4A4Gyf-suhO_KKt0JWv2q9olREZcoIE4FCwK0vuWTqD5q4qL_uqt_kHltzhdkJ4LySdCRCbxG1kcEcXoPNIhZERttqbZTIQviJxJ2HqC7CbwocmZMnbMAzP52bVX86vLxosmI-pqkG1RG8jMTZMhvc2GmYe6CfleW7bRxS0078sWDM_iACSQVOqLk5rcW_C-a61EYzNNN7BMw-VxFSDtoGgNgb6XGM6FTf9fkdJjIRL2VZAt0Q",
"use": "sig"
},
{
"crv": "P-256",
"kid": "AZXCzT401BtqezIxAdHOEez1ApQUu3O5hjcfRFKxXtQ",
"kty": "EC",
"use": "sig",
"x": "aruz0ufjUGuEQwg2Q3ewyy5DnEIWWmIEO5stN8MfUTA",
"y": "dZnZMUOQAvzOD6q1f11PEho4-aX7nWdmive8zdxUbrA"
},
{
"crv": "P-256",
"kid": "CrXNdVSdrZ-lOToSPso6OlcZnP-Et4U9CzOIZOZPvLw",
"kty": "EC",
"use": "enc",
"x": "AeI9gyN_hcFae8vO2HgaH7Fh-MVX1YXJdWg-T16g1kM",
"y": "5ASt8rCvPWTKMAh6wvR8_-OEbl_9TTkkgAd7LXW8H48"
}
]
},
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#kQuC527YZPoBlXip"
],
"response_types": [
"code id_token token"
],
"token_endpoint_auth_method": "private_key_jwt"
}
0.317 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.318 RegistrationResponse {
"client_id": "63de405b-97f6-4cb3-acf5-e61bb1b388aa",
"client_secret": "hBOl-u.cc0xO",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "63de405b-97f6-4cb3-acf5-e61bb1b388aa",
"jwks": {
"keys": [
{
"e": "AQAB",
"kid": "gtH4v3Yr2QqLreBSz0ByQQ8vkf8eFo1KIit3s-3Bbww",
"kty": "RSA",
"n": "pKXuY5tuT9ibmEcq4B6VRx3MafdSsajrOndAk5FjJFedlA6qSpdqDUr9wWUkNeO8h_efdLfg43CHXk3mH6Fp1t2gbHzBQ4-SzT3_X5tsdG2PPqvngem7f5NHO6Kefhq11Zk5q4-FyTL9FUQQW6ZANbrU7GifSAs82Ck20ciIvFdv7cPCphk_THMVv14aW5w0eKEXumgx4Bc7HrQFXQUHSze3dVAKg8hKHDIQOGUU0fkolEFmOC4Gb-G57RpBJryZxXqgdUdEG66xl1f37tqpYgaLViFDWDiI8S7BMVHEbGHN4-f_MD9f6gMduaxrL6a6SfyIW1So2VqtvlAyanesTw",
"use": "enc"
},
{
"e": "AQAB",
"kid": "wt25OgyR_nzG3OoQ7daa2rL6-gMnFdfRzBjhUVPu8RQ",
"kty": "RSA",
"n": "1Z8lhYNb0tHZsVrzIQs-JetNCLIBWeOHXblcirxQgFLt6z4Rr-9vxPbEsrmRmZbPuuoL8nGehqOK11LAgqa1QfCR4TKxr2srlbTv4A4Gyf-suhO_KKt0JWv2q9olREZcoIE4FCwK0vuWTqD5q4qL_uqt_kHltzhdkJ4LySdCRCbxG1kcEcXoPNIhZERttqbZTIQviJxJ2HqC7CbwocmZMnbMAzP52bVX86vLxosmI-pqkG1RG8jMTZMhvc2GmYe6CfleW7bRxS0078sWDM_iACSQVOqLk5rcW_C-a61EYzNNN7BMw-VxFSDtoGgNgb6XGM6FTf9fkdJjIRL2VZAt0Q",
"use": "sig"
},
{
"crv": "P-256",
"kid": "AZXCzT401BtqezIxAdHOEez1ApQUu3O5hjcfRFKxXtQ",
"kty": "EC",
"use": "sig",
"x": "aruz0ufjUGuEQwg2Q3ewyy5DnEIWWmIEO5stN8MfUTA",
"y": "dZnZMUOQAvzOD6q1f11PEho4-aX7nWdmive8zdxUbrA"
},
{
"crv": "P-256",
"kid": "CrXNdVSdrZ-lOToSPso6OlcZnP-Et4U9CzOIZOZPvLw",
"kty": "EC",
"use": "enc",
"x": "AeI9gyN_hcFae8vO2HgaH7Fh-MVX1YXJdWg-T16g1kM",
"y": "5ASt8rCvPWTKMAh6wvR8_-OEbl_9TTkkgAd7LXW8H48"
}
]
},
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#kQuC527YZPoBlXip"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "private_key_jwt",
"userinfo_signed_response_alg": "none"
}
0.318 phase <--<-- 3 --- AsyncAuthn -->-->
0.318 AuthorizationRequest {
"client_id": "63de405b-97f6-4cb3-acf5-e61bb1b388aa",
"nonce": "OUVO0VVTqBWqGOHP",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid",
"state": "omIvyMXYPcQJmb05"
}
0.319 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=63de405b-97f6-4cb3-acf5-e61bb1b388aa&state=omIvyMXYPcQJmb05&response_type=code+id_token+token&nonce=OUVO0VVTqBWqGOHP
0.319 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=63de405b-97f6-4cb3-acf5-e61bb1b388aa&state=omIvyMXYPcQJmb05&response_type=code+id_token+token&nonce=OUVO0VVTqBWqGOHP
3.117 http args {}
3.321 response URL with fragment
3.322 response access_token=buWAqgHUnchDAvScZTu41FmUjcDiYOH-9lKCWtYxH3k.nVYU1e4oyR7XeYCnE31EXOmFFUNZl1oX_T4KYrbD7rk&code=FUGYCLujnEt7r8i1BMj7xoYdy0HbbbZABBUAFJJcPto.0Ch_JcygYNdHySi1-GQPX0a5l0u6UmwAL1o5d83fhNA&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiRzVmTmJYOWVOc3pJZEhnWHdXVzZRdyIsImF1ZCI6WyI2M2RlNDA1Yi05N2Y2LTRjYjMtYWNmNS1lNjFiYjFiMzg4YWEiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJxNkI4VzUxNlpiXzViYWtRV2kxajhBIiwiZXhwIjoxNTI5NzU1MTcxLCJpYXQiOjE1Mjk3NTE1NzEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjYyYWMxOGIzLTJkMjktNDVmZC05OWUxLTU4YTIwMmM5MGY0NyIsIm5vbmNlIjoiT1VWTzBWVlRxQldxR09IUCIsInJhdCI6MTUyOTc1MTU2OCwic3ViIjoiZm9vQGJhci5jb20ifQ.LU9lZSGu2lrkRtFLrMzNVMqgMQwnef60Avr7gQWvP6vbugY0buoQA3mZNlO5ORYFamFmvYzFSNEByepHblQYj1A4MND7m8fvSe09PV8k3uQDczE75UREFhWNvgSBZD4RRooiYd41umyVOeSLWdx2iHi8xQvfVDrw0DHKoy0R5zsdfiK5r5ZivsYgIL0Y--kpW7tEbv0b-LtM56OAtlxGbcWYoS8Fjf7TAJIKux7deGWcv7voFc_wx8O22WKLMgwT7MytoMT49W1xMo2ji22SaP4TuPmkMrY9DQh3GsqWauB6TNlw97eAHejcSOK6qkrNSuMZu6gEOAaDgvReskG_gXEoeJ0FZfuTmCkrVhjp-r0y-EHXBRmZfZfl2wyE-0RJ90GxsR3DjARbuOjQCcflYS2JlvSqyabBsiuAggaaLZBwfkEbHf3NO8bNue4c8WiWh7Y0yJQBKw6NkxtNWVo4E-r9LIy-XS4dvE6akSfC5Dgr6n2qvYclA9DYXlIUIHjZIjC005dyWQU7WmKOpWrFgQaTbWR7V4VZUXGV9Vj8zs4AnLQgL6EcdhRcOnqAX4xjrqNxSc0_dAb7By09mpUbO8vjUUjvU238FFQaBKuch4nDSG-2zJ6Gm0GEYaaK7pFFCkrH5Grh05qf5fIOh8bbx_T4gnRwdmjPYhOsGAksMy0&scope=openid&state=omIvyMXYPcQJmb05&token_type=bearer
3.322 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiRzVmTmJYOWVOc3pJZEhnWHdXVzZRdyIsImF1ZCI6WyI2M2RlNDA1Yi05N2Y2LTRjYjMtYWNmNS1lNjFiYjFiMzg4YWEiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJxNkI4VzUxNlpiXzViYWtRV2kxajhBIiwiZXhwIjoxNTI5NzU1MTcxLCJpYXQiOjE1Mjk3NTE1NzEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjYyYWMxOGIzLTJkMjktNDVmZC05OWUxLTU4YTIwMmM5MGY0NyIsIm5vbmNlIjoiT1VWTzBWVlRxQldxR09IUCIsInJhdCI6MTUyOTc1MTU2OCwic3ViIjoiZm9vQGJhci5jb20ifQ.LU9lZSGu2lrkRtFLrMzNVMqgMQwnef60Avr7gQWvP6vbugY0buoQA3mZNlO5ORYFamFmvYzFSNEByepHblQYj1A4MND7m8fvSe09PV8k3uQDczE75UREFhWNvgSBZD4RRooiYd41umyVOeSLWdx2iHi8xQvfVDrw0DHKoy0R5zsdfiK5r5ZivsYgIL0Y--kpW7tEbv0b-LtM56OAtlxGbcWYoS8Fjf7TAJIKux7deGWcv7voFc_wx8O22WKLMgwT7MytoMT49W1xMo2ji22SaP4TuPmkMrY9DQh3GsqWauB6TNlw97eAHejcSOK6qkrNSuMZu6gEOAaDgvReskG_gXEoeJ0FZfuTmCkrVhjp-r0y-EHXBRmZfZfl2wyE-0RJ90GxsR3DjARbuOjQCcflYS2JlvSqyabBsiuAggaaLZBwfkEbHf3NO8bNue4c8WiWh7Y0yJQBKw6NkxtNWVo4E-r9LIy-XS4dvE6akSfC5Dgr6n2qvYclA9DYXlIUIHjZIjC005dyWQU7WmKOpWrFgQaTbWR7V4VZUXGV9Vj8zs4AnLQgL6EcdhRcOnqAX4xjrqNxSc0_dAb7By09mpUbO8vjUUjvU238FFQaBKuch4nDSG-2zJ6Gm0GEYaaK7pFFCkrH5Grh05qf5fIOh8bbx_T4gnRwdmjPYhOsGAksMy0', 'scope': 'openid', 'code': 'FUGYCLujnEt7r8i1BMj7xoYdy0HbbbZABBUAFJJcPto.0Ch_JcygYNdHySi1-GQPX0a5l0u6UmwAL1o5d83fhNA', 'access_token': 'buWAqgHUnchDAvScZTu41FmUjcDiYOH-9lKCWtYxH3k.nVYU1e4oyR7XeYCnE31EXOmFFUNZl1oX_T4KYrbD7rk', 'state': 'omIvyMXYPcQJmb05', 'expires_in': 3599, 'token_type': 'bearer'}
3.4 AuthorizationResponse {
"access_token": "buWAqgHUnchDAvScZTu41FmUjcDiYOH-9lKCWtYxH3k.nVYU1e4oyR7XeYCnE31EXOmFFUNZl1oX_T4KYrbD7rk",
"code": "FUGYCLujnEt7r8i1BMj7xoYdy0HbbbZABBUAFJJcPto.0Ch_JcygYNdHySi1-GQPX0a5l0u6UmwAL1o5d83fhNA",
"expires_in": 3599,
"id_token": {
"at_hash": "G5fNbX9eNszIdHgXwWW6Qw",
"aud": [
"63de405b-97f6-4cb3-acf5-e61bb1b388aa"
],
"auth_time": 1529751409,
"c_hash": "q6B8W516Zb_5bakQWi1j8A",
"exp": 1529755171,
"iat": 1529751571,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "62ac18b3-2d29-45fd-99e1-58a202c90f47",
"nonce": "OUVO0VVTqBWqGOHP",
"rat": 1529751568,
"sub": "[email protected]"
},
"scope": "openid",
"state": "omIvyMXYPcQJmb05",
"token_type": "bearer"
}
3.4 phase <--<-- 4 --- AccessToken -->-->
3.4 --> request op_args: {'state': 'omIvyMXYPcQJmb05', 'authn_method': 'private_key_jwt'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.4 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'omIvyMXYPcQJmb05', 'code': 'FUGYCLujnEt7r8i1BMj7xoYdy0HbbbZABBUAFJJcPto.0Ch_JcygYNdHySi1-GQPX0a5l0u6UmwAL1o5d83fhNA', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '63de405b-97f6-4cb3-acf5-e61bb1b388aa'}, 'state': 'omIvyMXYPcQJmb05', 'authn_method': 'private_key_jwt'}
3.4 AccessTokenRequest {
"client_assertion": "eyJhbGciOiJSUzI1NiIsImtpZCI6Ind0MjVPZ3lSX256RzNPb1E3ZGFhMnJMNi1nTW5GZGZSekJqaFVWUHU4UlEifQ.eyJpc3MiOiAiNjNkZTQwNWItOTdmNi00Y2IzLWFjZjUtZTYxYmIxYjM4OGFhIiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiNjNkZTQwNWItOTdmNi00Y2IzLWFjZjUtZTYxYmIxYjM4OGFhIiwgImlhdCI6IDE1Mjk3NTE1NzEsICJqdGkiOiAiUUkyYTZIOGdiaVRtQjVzdDJaRE5aRTFaWmVCMVJDWUciLCAiZXhwIjogMTUyOTc1MjE3MX0.ZjsRV5Szy8lbogqFN8fbADZ45eRu5euqR3R2tpglbCC8hd6KCtDMWe7HoGKgGDK5iScSADWiiklXSMeAIevmgm_M8S7V2ua5Qe-Q-8CrCbysWd3DTz_yITpFuS-DebX5FbNpnAWHMiFLHzOVoOHu3fY2Kat_xcr_9p_MRH-Xh4-K1h6oIsPwgEd2yj3B9Nx7eoUqwkmRK7y2_XCl_WyKQmQW8WsMEUg2Igbp1epxBX_sOvYuwxaEvlismBF88e6-eFjPFcZAdTJ2bwE2tzKB6xQeumdbvZMehSl22si4KLpMk13SRcswpLm9apgDNZLuxWxY4TtZ_y07c2WM0rwKnQ",
"client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer",
"code": "FUGYCLujnEt7r8i1BMj7xoYdy0HbbbZABBUAFJJcPto.0Ch_JcygYNdHySi1-GQPX0a5l0u6UmwAL1o5d83fhNA",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "omIvyMXYPcQJmb05"
}
3.403 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.403 request_http_args {'headers': {'Content-Type': 'application/x-www-form-urlencoded'}}
3.403 request code=FUGYCLujnEt7r8i1BMj7xoYdy0HbbbZABBUAFJJcPto.0Ch_JcygYNdHySi1-GQPX0a5l0u6UmwAL1o5d83fhNA&client_assertion_type=urn%3Aietf%3Aparams%3Aoauth%3Aclient-assertion-type%3Ajwt-bearer&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=omIvyMXYPcQJmb05&client_assertion=eyJhbGciOiJSUzI1NiIsImtpZCI6Ind0MjVPZ3lSX256RzNPb1E3ZGFhMnJMNi1nTW5GZGZSekJqaFVWUHU4UlEifQ.eyJpc3MiOiAiNjNkZTQwNWItOTdmNi00Y2IzLWFjZjUtZTYxYmIxYjM4OGFhIiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiNjNkZTQwNWItOTdmNi00Y2IzLWFjZjUtZTYxYmIxYjM4OGFhIiwgImlhdCI6IDE1Mjk3NTE1NzEsICJqdGkiOiAiUUkyYTZIOGdiaVRtQjVzdDJaRE5aRTFaWmVCMVJDWUciLCAiZXhwIjogMTUyOTc1MjE3MX0.ZjsRV5Szy8lbogqFN8fbADZ45eRu5euqR3R2tpglbCC8hd6KCtDMWe7HoGKgGDK5iScSADWiiklXSMeAIevmgm_M8S7V2ua5Qe-Q-8CrCbysWd3DTz_yITpFuS-DebX5FbNpnAWHMiFLHzOVoOHu3fY2Kat_xcr_9p_MRH-Xh4-K1h6oIsPwgEd2yj3B9Nx7eoUqwkmRK7y2_XCl_WyKQmQW8WsMEUg2Igbp1epxBX_sOvYuwxaEvlismBF88e6-eFjPFcZAdTJ2bwE2tzKB6xQeumdbvZMehSl22si4KLpMk13SRcswpLm9apgDNZLuxWxY4TtZ_y07c2WM0rwKnQ
3.53 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.531 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiRzVmTmJYOWVOc3pJZEhnWHdXVzZRdyIsImF1ZCI6WyI2M2RlNDA1Yi05N2Y2LTRjYjMtYWNmNS1lNjFiYjFiMzg4YWEiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJxNkI4VzUxNlpiXzViYWtRV2kxajhBIiwiZXhwIjoxNTI5NzU1MTcxLCJpYXQiOjE1Mjk3NTE1NzEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImQ2ZDY2NGRmLTMyMmQtNDU3ZC1hNGQzLTE4YzgyMTJjMzNlOCIsIm5vbmNlIjoiT1VWTzBWVlRxQldxR09IUCIsInJhdCI6MTUyOTc1MTU2OCwic3ViIjoiZm9vQGJhci5jb20ifQ.ze1IBjZgeP74EcJHxzJGprciZOJgKkZugeLWDjMze-805rZ8t_HsjrYJot3GWaHNK_rk607l3WCtUPWexJ_HgKP6o4xMma5mYvWLtx1gsHeR8bNTwKXHMRzqsTF2A2NY-tNrxiB1vlHOOiPJAltCjx17Zct8co5Eiu-L2JyxUKGPtyqfhLMfifqwehRQ0Q_BfWTEE0zmdifYGAKHB4pBBs_-AkE9SPu1HR1vNecsoSojB-0doextpSbbTnUr1levs05OQy5h0vZ2mkouum-Dyn8Izzq7NbMYLFYjRg0Q96bTqxCuxouh4p-dB8OyC2t_x-iGt_ETKyzzMvi1mqXxMhue-SNjgnpTH33E_x9Nq4nRPpoQA46cHcVRzcXummJDpSh-dG6Xj6U7q47puXckrRvB9cTehdta5Zgx6XBBMgP4Zi1pIJPZmNOzJwWgRy4cZbwGhVops9sb7mXiGx01NRA63oX0xYncpBEzv7o0JaKYanRRhWonoFwUq4Qhcpi9OkUOcrQGCy1DVMvkqNP1nM0OeJGCRAEm_swMHyQs94MpugONtOQB7f6PHRlg6futqTIDOPF0lsemNeLii_wbcnlquKmB3i2evkdBandYFmDvvbBzwWTN-u5R8IIE9F1tw72kztsVK4wEcXDHH3SSZgHXuJHepTiudzX8L7KsZIM', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'rmPgQ0Mk6jCeUOlQnzmEKkGk7qBk6qS7_0cH9tnOcg8.W5xCERprKuoC0DPAqJB1vvYjvAlw857OEEHEs9AUBqA', 'scope': 'openid'}
3.535 AccessTokenResponse {
"access_token": "rmPgQ0Mk6jCeUOlQnzmEKkGk7qBk6qS7_0cH9tnOcg8.W5xCERprKuoC0DPAqJB1vvYjvAlw857OEEHEs9AUBqA",
"expires_in": 3599,
"id_token": {
"at_hash": "G5fNbX9eNszIdHgXwWW6Qw",
"aud": [
"63de405b-97f6-4cb3-acf5-e61bb1b388aa"
],
"auth_time": 1529751409,
"c_hash": "q6B8W516Zb_5bakQWi1j8A",
"exp": 1529755171,
"iat": 1529751571,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "d6d664df-322d-457d-a4d3-18c8212c33e8",
"nonce": "OUVO0VVTqBWqGOHP",
"rat": 1529751568,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.535 phase <--<-- 5 --- Done -->-->
3.535 end
3.536 assertion VerifyResponse
3.536 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.536 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Rotation-OP-Sig.txt 0000644 0000000 0000000 00000011572 13313424616 015072 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Rotation-OP-Sig
Test description: Can rotate OP signing keys
Timestamp: 2018-06-23T11:05:50Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.094 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.095 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.095 phase <--<-- 2 --- FetchKeys -->-->
0.161 phase <--<-- 3 --- Note -->-->
10.714 phase <--<-- 4 --- Webfinger -->-->
10.714 not expected to do WebFinger
10.714 phase <--<-- 5 --- Discovery -->-->
10.714 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
10.824 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
10.825 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
10.825 phase <--<-- 6 --- FetchKeys -->-->
10.926 phase <--<-- 7 --- Done -->-->
10.926 end
10.927 assertion CheckHTTPResponse
10.927 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
10.927 assertion NewSigningKeys
10.927 condition new-signing-keys: status=OK [Verifies that two set of signing keys are not the same]
10.927 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
new-signing-keys: status=OK [Verifies that two set of signing keys are not the same]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Registration-jwks_uri.txt 0000644 0000000 0000000 00000035560 13313424031 016536 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-jwks_uri
Test description: Uses keys registered with jwks_uri value
Timestamp: 2018-06-23T10:59:37Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.074 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.076 phase <--<-- 2 --- Registration -->-->
0.076 register kwargs:{'application_name': 'OIC test tool', 'token_endpoint_auth_method': 'private_key_jwt', 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'response_types': ['code id_token token'], 'url': 'https://oidc-certification.ory.sh:8443/clients', 'application_type': 'web'}
0.076 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#DukjQPmwZBfVuR3u"
],
"response_types": [
"code id_token token"
],
"token_endpoint_auth_method": "private_key_jwt"
}
0.27 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.271 RegistrationResponse {
"client_id": "32d4d474-f1b2-46d7-9668-c18c5ea95e5d",
"client_secret": "6NATzZu9RoAV",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "32d4d474-f1b2-46d7-9668-c18c5ea95e5d",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#DukjQPmwZBfVuR3u"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "private_key_jwt",
"userinfo_signed_response_alg": "none"
}
0.271 phase <--<-- 3 --- AsyncAuthn -->-->
0.272 AuthorizationRequest {
"client_id": "32d4d474-f1b2-46d7-9668-c18c5ea95e5d",
"nonce": "8N7UM1iqQb9NZRli",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid",
"state": "FFhRorFpsIsaoJNs"
}
0.272 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=32d4d474-f1b2-46d7-9668-c18c5ea95e5d&state=FFhRorFpsIsaoJNs&response_type=code+id_token+token&nonce=8N7UM1iqQb9NZRli
0.272 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=32d4d474-f1b2-46d7-9668-c18c5ea95e5d&state=FFhRorFpsIsaoJNs&response_type=code+id_token+token&nonce=8N7UM1iqQb9NZRli
3.199 http args {}
3.379 response URL with fragment
3.379 response access_token=omeL0oLmDIqCndvVallxQvsg9yAiZFRczs4oD6MwG7k.nLKyzH6SlwThHVk7lFoIpfy5fk_IBNdY8cX7PXK-XvQ&code=KB3TVhQh-K_bHme-4m-vwNB8F9fxq7JNwioTUccMDAE.7MhhRJIiWjaSO9v0JHIu33L_7rkNWrJvACqzeRm0_4E&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiNVgzUFhjTGNDbVlrWXNzVllYOWpuUSIsImF1ZCI6WyIzMmQ0ZDQ3NC1mMWIyLTQ2ZDctOTY2OC1jMThjNWVhOTVlNWQiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJpd29oejFzUXg4cFZ2dTFQTDF2aHlBIiwiZXhwIjoxNTI5NzU1MTc2LCJpYXQiOjE1Mjk3NTE1NzYsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjQ3NTQ5MTVkLTU2NmMtNDljZi1hNTY0LWUyNGIwMmUwZGM0YyIsIm5vbmNlIjoiOE43VU0xaXFRYjlOWlJsaSIsInJhdCI6MTUyOTc1MTU3Mywic3ViIjoiZm9vQGJhci5jb20ifQ.vsdVRQkoWmlFv7OLouX0vNP1tp_4jDDOfJ11NLpKsMeOJI9ZUMwLVxoSbRpeB1tGwjfUDd64heC1qSNUh8XAWaBevHxB0bj0aNHMHkurvyRDaT6Naa-kSjSkNE687-cif2rVTM33PQY2qwlGJKLiEfy6m7hHCEkhuWM2f32lrdY1Av08gtE-eB8_-XuBnYswsGLYBOXtqzFc44uzj13ndRdK8IYpQt4nDkentf49wBCv1iwhfqWCITVaGTJmSS8qEiBkTege5YfM-wSZJkxyM3VcWN-7RwsXSKkJhbn5KyW91IYfAfqKIi5P71-vcqauvj6Eu-6BYxxw5JJbhzbW-uOXdkJLFYsV13aMmnPgjK5DcGbrWiJJoGxXK4f8BKg88YNMBHKWyvnhSepBZ2eYCbaArw0T8lBUsZzr0V3NCdD1vPurWqC97XYVDXBzdMg7hhTz6Tl1nhw25-xDngoYvtj3v00Idx0OamJzMOPQqBmDuDSPEHcn0ps8jESBFV1ohiTqN-f_9lld1BgCuA4rQBIN93QaYJhmo1KnGcSUvyeQzC00BgtIH2L5kodvJGPmpogDEY2zRZ-Fg1coIDTbDrPSye0poAqVJSyeKB3Y0RW_gmmcSV_ZmkDylTQ3fwqEKxU4C_wz82Cr5V3Fxc4QJd1RWBycuNN4QwQkQAJQUUs&scope=openid&state=FFhRorFpsIsaoJNs&token_type=bearer
3.38 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiNVgzUFhjTGNDbVlrWXNzVllYOWpuUSIsImF1ZCI6WyIzMmQ0ZDQ3NC1mMWIyLTQ2ZDctOTY2OC1jMThjNWVhOTVlNWQiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJpd29oejFzUXg4cFZ2dTFQTDF2aHlBIiwiZXhwIjoxNTI5NzU1MTc2LCJpYXQiOjE1Mjk3NTE1NzYsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjQ3NTQ5MTVkLTU2NmMtNDljZi1hNTY0LWUyNGIwMmUwZGM0YyIsIm5vbmNlIjoiOE43VU0xaXFRYjlOWlJsaSIsInJhdCI6MTUyOTc1MTU3Mywic3ViIjoiZm9vQGJhci5jb20ifQ.vsdVRQkoWmlFv7OLouX0vNP1tp_4jDDOfJ11NLpKsMeOJI9ZUMwLVxoSbRpeB1tGwjfUDd64heC1qSNUh8XAWaBevHxB0bj0aNHMHkurvyRDaT6Naa-kSjSkNE687-cif2rVTM33PQY2qwlGJKLiEfy6m7hHCEkhuWM2f32lrdY1Av08gtE-eB8_-XuBnYswsGLYBOXtqzFc44uzj13ndRdK8IYpQt4nDkentf49wBCv1iwhfqWCITVaGTJmSS8qEiBkTege5YfM-wSZJkxyM3VcWN-7RwsXSKkJhbn5KyW91IYfAfqKIi5P71-vcqauvj6Eu-6BYxxw5JJbhzbW-uOXdkJLFYsV13aMmnPgjK5DcGbrWiJJoGxXK4f8BKg88YNMBHKWyvnhSepBZ2eYCbaArw0T8lBUsZzr0V3NCdD1vPurWqC97XYVDXBzdMg7hhTz6Tl1nhw25-xDngoYvtj3v00Idx0OamJzMOPQqBmDuDSPEHcn0ps8jESBFV1ohiTqN-f_9lld1BgCuA4rQBIN93QaYJhmo1KnGcSUvyeQzC00BgtIH2L5kodvJGPmpogDEY2zRZ-Fg1coIDTbDrPSye0poAqVJSyeKB3Y0RW_gmmcSV_ZmkDylTQ3fwqEKxU4C_wz82Cr5V3Fxc4QJd1RWBycuNN4QwQkQAJQUUs', 'scope': 'openid', 'code': 'KB3TVhQh-K_bHme-4m-vwNB8F9fxq7JNwioTUccMDAE.7MhhRJIiWjaSO9v0JHIu33L_7rkNWrJvACqzeRm0_4E', 'access_token': 'omeL0oLmDIqCndvVallxQvsg9yAiZFRczs4oD6MwG7k.nLKyzH6SlwThHVk7lFoIpfy5fk_IBNdY8cX7PXK-XvQ', 'state': 'FFhRorFpsIsaoJNs', 'expires_in': 3599, 'token_type': 'bearer'}
3.548 AuthorizationResponse {
"access_token": "omeL0oLmDIqCndvVallxQvsg9yAiZFRczs4oD6MwG7k.nLKyzH6SlwThHVk7lFoIpfy5fk_IBNdY8cX7PXK-XvQ",
"code": "KB3TVhQh-K_bHme-4m-vwNB8F9fxq7JNwioTUccMDAE.7MhhRJIiWjaSO9v0JHIu33L_7rkNWrJvACqzeRm0_4E",
"expires_in": 3599,
"id_token": {
"at_hash": "5X3PXcLcCmYkYssVYX9jnQ",
"aud": [
"32d4d474-f1b2-46d7-9668-c18c5ea95e5d"
],
"auth_time": 1529751409,
"c_hash": "iwohz1sQx8pVvu1PL1vhyA",
"exp": 1529755176,
"iat": 1529751576,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "4754915d-566c-49cf-a564-e24b02e0dc4c",
"nonce": "8N7UM1iqQb9NZRli",
"rat": 1529751573,
"sub": "[email protected]"
},
"scope": "openid",
"state": "FFhRorFpsIsaoJNs",
"token_type": "bearer"
}
3.548 phase <--<-- 4 --- AccessToken -->-->
3.548 --> request op_args: {'state': 'FFhRorFpsIsaoJNs', 'authn_method': 'private_key_jwt'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.548 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'FFhRorFpsIsaoJNs', 'code': 'KB3TVhQh-K_bHme-4m-vwNB8F9fxq7JNwioTUccMDAE.7MhhRJIiWjaSO9v0JHIu33L_7rkNWrJvACqzeRm0_4E', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '32d4d474-f1b2-46d7-9668-c18c5ea95e5d'}, 'state': 'FFhRorFpsIsaoJNs', 'authn_method': 'private_key_jwt'}
3.548 AccessTokenRequest {
"client_assertion": "eyJhbGciOiJSUzI1NiIsImtpZCI6Ind0MjVPZ3lSX256RzNPb1E3ZGFhMnJMNi1nTW5GZGZSekJqaFVWUHU4UlEifQ.eyJpc3MiOiAiMzJkNGQ0NzQtZjFiMi00NmQ3LTk2NjgtYzE4YzVlYTk1ZTVkIiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiMzJkNGQ0NzQtZjFiMi00NmQ3LTk2NjgtYzE4YzVlYTk1ZTVkIiwgImlhdCI6IDE1Mjk3NTE1NzYsICJqdGkiOiAiQWdCdHUyU0ZwaE55V2pmdGdzenZkMDE3YUVlNjRWOVoiLCAiZXhwIjogMTUyOTc1MjE3Nn0.jFxAEyCJNV6Gr4WvKFMn4ROs9el8obyfeNS7X2yqHxhIggtniR8nMsM9syx9Dip7Izm6MG_5ilxAarX_GD3NwCgxWQzUc49UB_YfyVPz-aS_IrA2kg58J7HkwUIJ-x9PxR39O_xqa7mPOf6tfhJI2haEEEOAYNCtk-_rAHKMFAAz_ov2-s_i7tWQORNf8_pt-KqSbNjyAnSBTtK0vgOkA-unhFw8a0GvY4zmc2m_TT9stIbtUsn8qTKsPtQpD6LNB8UMTSb9ph4Z4cp28nZoJ1LCeEdk8J7fnF-C3XWMqaEsxak5dSxrbPl6j4vzJ03YfBL1-XSx8hcawvpVgVSBPQ",
"client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer",
"code": "KB3TVhQh-K_bHme-4m-vwNB8F9fxq7JNwioTUccMDAE.7MhhRJIiWjaSO9v0JHIu33L_7rkNWrJvACqzeRm0_4E",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "FFhRorFpsIsaoJNs"
}
3.551 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.551 request_http_args {'headers': {'Content-Type': 'application/x-www-form-urlencoded'}}
3.551 request code=KB3TVhQh-K_bHme-4m-vwNB8F9fxq7JNwioTUccMDAE.7MhhRJIiWjaSO9v0JHIu33L_7rkNWrJvACqzeRm0_4E&client_assertion_type=urn%3Aietf%3Aparams%3Aoauth%3Aclient-assertion-type%3Ajwt-bearer&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=FFhRorFpsIsaoJNs&client_assertion=eyJhbGciOiJSUzI1NiIsImtpZCI6Ind0MjVPZ3lSX256RzNPb1E3ZGFhMnJMNi1nTW5GZGZSekJqaFVWUHU4UlEifQ.eyJpc3MiOiAiMzJkNGQ0NzQtZjFiMi00NmQ3LTk2NjgtYzE4YzVlYTk1ZTVkIiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiMzJkNGQ0NzQtZjFiMi00NmQ3LTk2NjgtYzE4YzVlYTk1ZTVkIiwgImlhdCI6IDE1Mjk3NTE1NzYsICJqdGkiOiAiQWdCdHUyU0ZwaE55V2pmdGdzenZkMDE3YUVlNjRWOVoiLCAiZXhwIjogMTUyOTc1MjE3Nn0.jFxAEyCJNV6Gr4WvKFMn4ROs9el8obyfeNS7X2yqHxhIggtniR8nMsM9syx9Dip7Izm6MG_5ilxAarX_GD3NwCgxWQzUc49UB_YfyVPz-aS_IrA2kg58J7HkwUIJ-x9PxR39O_xqa7mPOf6tfhJI2haEEEOAYNCtk-_rAHKMFAAz_ov2-s_i7tWQORNf8_pt-KqSbNjyAnSBTtK0vgOkA-unhFw8a0GvY4zmc2m_TT9stIbtUsn8qTKsPtQpD6LNB8UMTSb9ph4Z4cp28nZoJ1LCeEdk8J7fnF-C3XWMqaEsxak5dSxrbPl6j4vzJ03YfBL1-XSx8hcawvpVgVSBPQ
3.72 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.721 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiNVgzUFhjTGNDbVlrWXNzVllYOWpuUSIsImF1ZCI6WyIzMmQ0ZDQ3NC1mMWIyLTQ2ZDctOTY2OC1jMThjNWVhOTVlNWQiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJpd29oejFzUXg4cFZ2dTFQTDF2aHlBIiwiZXhwIjoxNTI5NzU1MTc2LCJpYXQiOjE1Mjk3NTE1NzYsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjQ0ZmZiZDNlLWIzMmEtNGQ3My1hNjhjLTMxMmE0NDA3NzEwNyIsIm5vbmNlIjoiOE43VU0xaXFRYjlOWlJsaSIsInJhdCI6MTUyOTc1MTU3Mywic3ViIjoiZm9vQGJhci5jb20ifQ.wqS92kOZMdIV-ltXtB9DhbZJynFSA1boa1sWLNKyubfwLa061q1FUq0tTeNs34Tc15l8ri2ZhdJpYVA51B2ApvItVdDY7bBM6z-99F0yHQUX5fWxlELKSbEL1I3hK8W2BMwS5YEbkGf6Rl46EJc1481NBaHsgS2Tde0xUdQbEmSIX80EuCwWcjDXRpDcTbIc71xRJviXd9NKfeNyvi2TW7bOFo54oZ5mDQ3qjgLcKT6uYz7kddP8PRADIBE-y47II_CjXOHBcjae6C0MK86eqFVzD5J9p6_v5f4erLS3DMqHbi_nar3Yh_G_WCudE7OnzHncE15QDm1X2baaHeG7O7arJAKkxuvFr2E83N63ghlOpi3pYnJ64HgDb_S2gSreH7xBpNvs2s_tqYfJdzgN9Ohu93GuOw7fTyRlz4lQrxGbubOI5zYOwgiEJc3v5C_Aq5xhWlNASdjBwl1PSmRg0Y-gEZRcuCCqisXsjQkQ-07GvdfsIwc_rfrjOuFzjAR-GMv2AmFcdFBMxcRNMAUwfhilJPCfozLC5Dzi_8W7OlRcAFZGhfrvIHlxyY7MEK3z-5DSmi-lsK9eLDfl7oKozRlCgPsmbfxh8E0gwoiivFjv4pvl7aRwHfOUjWOXc5w9mW0XSDEuhnxjYimJ6ZIvL0P5mnwQgHvABVFV5mDYHxk', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'Ys3eY0mvbPAwrc6SpcTHOAQRrIEgu78yfwfYUijTvFk.BGKPQoXl-20ZmqBpaNULuLo361npMpqeRxupJKTfZTU', 'scope': 'openid'}
3.724 AccessTokenResponse {
"access_token": "Ys3eY0mvbPAwrc6SpcTHOAQRrIEgu78yfwfYUijTvFk.BGKPQoXl-20ZmqBpaNULuLo361npMpqeRxupJKTfZTU",
"expires_in": 3599,
"id_token": {
"at_hash": "5X3PXcLcCmYkYssVYX9jnQ",
"aud": [
"32d4d474-f1b2-46d7-9668-c18c5ea95e5d"
],
"auth_time": 1529751409,
"c_hash": "iwohz1sQx8pVvu1PL1vhyA",
"exp": 1529755176,
"iat": 1529751576,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "44ffbd3e-b32a-4d73-a68c-312a44077107",
"nonce": "8N7UM1iqQb9NZRli",
"rat": 1529751573,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.724 phase <--<-- 5 --- Done -->-->
3.724 end
3.725 assertion VerifyResponse
3.725 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.725 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Req-max_age=10000.txt 0000644 0000000 0000000 00000054050 13313424431 015034 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-max_age=10000
Test description: Requesting ID Token with max_age=10000 seconds restriction
Timestamp: 2018-06-23T11:03:53Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.078 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.08 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.08 phase <--<-- 2 --- Registration -->-->
0.08 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.08 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#ADFXqA45SJZNRAdz"
],
"response_types": [
"code id_token token"
]
}
0.236 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.237 RegistrationResponse {
"client_id": "9d81e5d4-b558-4f29-b9d3-6a6a8013b50a",
"client_secret": "zymkltNhNbwM",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "9d81e5d4-b558-4f29-b9d3-6a6a8013b50a",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#ADFXqA45SJZNRAdz"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.237 phase <--<-- 3 --- AsyncAuthn -->-->
0.237 AuthorizationRequest {
"client_id": "9d81e5d4-b558-4f29-b9d3-6a6a8013b50a",
"nonce": "yK3P7qUrBtlDhjOD",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid",
"state": "Ds4CWNKsdQWkdQCL"
}
0.238 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=9d81e5d4-b558-4f29-b9d3-6a6a8013b50a&state=Ds4CWNKsdQWkdQCL&response_type=code+id_token+token&nonce=yK3P7qUrBtlDhjOD
0.238 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=9d81e5d4-b558-4f29-b9d3-6a6a8013b50a&state=Ds4CWNKsdQWkdQCL&response_type=code+id_token+token&nonce=yK3P7qUrBtlDhjOD
2.827 http args {}
3.003 response URL with fragment
3.004 response access_token=lBEpdGfLmZbYyN22tiKQXOQqrkurarXAEk07kHahcxE.m4S3s0XzwPZ--m7sH7dDpOVtNO_aQ_7O0SlidBr8bg8&code=f5rZWO1Z8q-VsQpwOO19V6KaLr4dzeAocIcue0PYegk.PGHlVHr4wlTTRDnG5Gf57dc3TUj5qwDPBfKvzvfnJNA&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoicDJ2WTBDUk14QWVweTVJSk1jakp5USIsImF1ZCI6WyI5ZDgxZTVkNC1iNTU4LTRmMjktYjlkMy02YTZhODAxM2I1MGEiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiJkYmkzUGNUamIwcHppSVJhV19mSG9BIiwiZXhwIjoxNTI5NzU1NDMwLCJpYXQiOjE1Mjk3NTE4MzAsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6Ijg1MjcyZmYzLTU1NTMtNDQ2Ni05MDdlLTA1MGZmYTEwMmI5ZCIsIm5vbmNlIjoieUszUDdxVXJCdGxEaGpPRCIsInJhdCI6MTUyOTc1MTgyOCwic3ViIjoiZm9vQGJhci5jb20ifQ.MO-_QPVtGFlnrzp1_enlFJ0ePBtHXZcVRBUuukaGA3yUeCIW8Ng_vHu0O5vEVa_OwLLWw0CjVMKHLhDrdxag7B1FEgnuNo5FXYAWwR2dvLXOkqtne7HLlC6tf4XyRvvXwwdmAO_HNpsE-HPw-LUrJjLJlG7y60GLJmCrV3_irHqkC50dTbCUP9D9D-0MAbAO83p-udT9v1GypdVAzweuuBY7mhkqjy6S2M4ipERiRAY8Pn2tsKryDEn0P-lh-ZF5jaCj9PfCWmSxiwHQz6LeeBUPjEOaKpUXdrpOG752FU7rqXONCSdxSZaCIJb4mXCwXEQCVDy1fFhRgx7dB7TuajX7Ma4EpTes0NRcqKZhW3888I9IqIlBbMnI3rtVV30_Qn5A5QPz-RE-m8wVmiSCxOlW_RqZT77h2ERzQVhJ6bbw3u1A-xEd5-o0ypLv1PZ1c8zeynd7IgB6cUZ-cZ56lxdpmhnptSKfpUOJjHBJDMQLV6V-Mv20vRsVq6pl7y9yo2aA58u9CoXgrCqOFx7869YXaeJkAk1C270j9FwDWjBavT8-EJaeeUIV1wFRjJuJ1BfOS3MCPlk-vHFRh3E_xo28UOvgcmhdMaQreV7gdx2xxr5z-CRaQkkh9Tq_TtyMxLNNf7_3aGhOQCdPJElfc3SKjOWyDPgG2mjbL6mqkxE&scope=openid&state=Ds4CWNKsdQWkdQCL&token_type=bearer
3.004 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoicDJ2WTBDUk14QWVweTVJSk1jakp5USIsImF1ZCI6WyI5ZDgxZTVkNC1iNTU4LTRmMjktYjlkMy02YTZhODAxM2I1MGEiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiJkYmkzUGNUamIwcHppSVJhV19mSG9BIiwiZXhwIjoxNTI5NzU1NDMwLCJpYXQiOjE1Mjk3NTE4MzAsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6Ijg1MjcyZmYzLTU1NTMtNDQ2Ni05MDdlLTA1MGZmYTEwMmI5ZCIsIm5vbmNlIjoieUszUDdxVXJCdGxEaGpPRCIsInJhdCI6MTUyOTc1MTgyOCwic3ViIjoiZm9vQGJhci5jb20ifQ.MO-_QPVtGFlnrzp1_enlFJ0ePBtHXZcVRBUuukaGA3yUeCIW8Ng_vHu0O5vEVa_OwLLWw0CjVMKHLhDrdxag7B1FEgnuNo5FXYAWwR2dvLXOkqtne7HLlC6tf4XyRvvXwwdmAO_HNpsE-HPw-LUrJjLJlG7y60GLJmCrV3_irHqkC50dTbCUP9D9D-0MAbAO83p-udT9v1GypdVAzweuuBY7mhkqjy6S2M4ipERiRAY8Pn2tsKryDEn0P-lh-ZF5jaCj9PfCWmSxiwHQz6LeeBUPjEOaKpUXdrpOG752FU7rqXONCSdxSZaCIJb4mXCwXEQCVDy1fFhRgx7dB7TuajX7Ma4EpTes0NRcqKZhW3888I9IqIlBbMnI3rtVV30_Qn5A5QPz-RE-m8wVmiSCxOlW_RqZT77h2ERzQVhJ6bbw3u1A-xEd5-o0ypLv1PZ1c8zeynd7IgB6cUZ-cZ56lxdpmhnptSKfpUOJjHBJDMQLV6V-Mv20vRsVq6pl7y9yo2aA58u9CoXgrCqOFx7869YXaeJkAk1C270j9FwDWjBavT8-EJaeeUIV1wFRjJuJ1BfOS3MCPlk-vHFRh3E_xo28UOvgcmhdMaQreV7gdx2xxr5z-CRaQkkh9Tq_TtyMxLNNf7_3aGhOQCdPJElfc3SKjOWyDPgG2mjbL6mqkxE', 'scope': 'openid', 'code': 'f5rZWO1Z8q-VsQpwOO19V6KaLr4dzeAocIcue0PYegk.PGHlVHr4wlTTRDnG5Gf57dc3TUj5qwDPBfKvzvfnJNA', 'access_token': 'lBEpdGfLmZbYyN22tiKQXOQqrkurarXAEk07kHahcxE.m4S3s0XzwPZ--m7sH7dDpOVtNO_aQ_7O0SlidBr8bg8', 'state': 'Ds4CWNKsdQWkdQCL', 'expires_in': 3599, 'token_type': 'bearer'}
3.085 AuthorizationResponse {
"access_token": "lBEpdGfLmZbYyN22tiKQXOQqrkurarXAEk07kHahcxE.m4S3s0XzwPZ--m7sH7dDpOVtNO_aQ_7O0SlidBr8bg8",
"code": "f5rZWO1Z8q-VsQpwOO19V6KaLr4dzeAocIcue0PYegk.PGHlVHr4wlTTRDnG5Gf57dc3TUj5qwDPBfKvzvfnJNA",
"expires_in": 3599,
"id_token": {
"at_hash": "p2vY0CRMxAepy5IJMcjJyQ",
"aud": [
"9d81e5d4-b558-4f29-b9d3-6a6a8013b50a"
],
"auth_time": 1529751824,
"c_hash": "dbi3PcTjb0pziIRaW_fHoA",
"exp": 1529755430,
"iat": 1529751830,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "85272ff3-5553-4466-907e-050ffa102b9d",
"nonce": "yK3P7qUrBtlDhjOD",
"rat": 1529751828,
"sub": "[email protected]"
},
"scope": "openid",
"state": "Ds4CWNKsdQWkdQCL",
"token_type": "bearer"
}
3.086 phase <--<-- 4 --- AccessToken -->-->
3.086 --> request op_args: {'state': 'Ds4CWNKsdQWkdQCL'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.086 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'Ds4CWNKsdQWkdQCL', 'code': 'f5rZWO1Z8q-VsQpwOO19V6KaLr4dzeAocIcue0PYegk.PGHlVHr4wlTTRDnG5Gf57dc3TUj5qwDPBfKvzvfnJNA', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '9d81e5d4-b558-4f29-b9d3-6a6a8013b50a'}, 'state': 'Ds4CWNKsdQWkdQCL'}
3.086 AccessTokenRequest {
"code": "f5rZWO1Z8q-VsQpwOO19V6KaLr4dzeAocIcue0PYegk.PGHlVHr4wlTTRDnG5Gf57dc3TUj5qwDPBfKvzvfnJNA",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "Ds4CWNKsdQWkdQCL"
}
3.086 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.086 request_http_args {'headers': {'Authorization': 'Basic OWQ4MWU1ZDQtYjU1OC00ZjI5LWI5ZDMtNmE2YTgwMTNiNTBhOnp5bWtsdE5oTmJ3TQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
3.086 request code=f5rZWO1Z8q-VsQpwOO19V6KaLr4dzeAocIcue0PYegk.PGHlVHr4wlTTRDnG5Gf57dc3TUj5qwDPBfKvzvfnJNA&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=Ds4CWNKsdQWkdQCL
3.334 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.335 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoicDJ2WTBDUk14QWVweTVJSk1jakp5USIsImF1ZCI6WyI5ZDgxZTVkNC1iNTU4LTRmMjktYjlkMy02YTZhODAxM2I1MGEiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiJkYmkzUGNUamIwcHppSVJhV19mSG9BIiwiZXhwIjoxNTI5NzU1NDMwLCJpYXQiOjE1Mjk3NTE4MzEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjU4NGQ3NjA3LTRhNTEtNGJmNy04NjYwLWUyZjAyMTBiZWM1ZiIsIm5vbmNlIjoieUszUDdxVXJCdGxEaGpPRCIsInJhdCI6MTUyOTc1MTgyOCwic3ViIjoiZm9vQGJhci5jb20ifQ.qlB-CZsFuBFgrG1egcMbiv70R3Pcp7qK11pjUO0EhmsHg7w6X1ARoepFjhUYONBRiGIIfm9yaFAbTnsd7LhytZ4K5BGcsLIrMxtU1BG2VaFad78wEtpKYv8DpaBQtFTtl40U4aqIkXKR5Fwxg3NXdbUtKi2ED1Nx3xUR6p0EN1kbPbna24ldfdU7s39ZDjKzFTwuxmq2iefhtooxfeu-TSRpa_kISwIQlU__n6G3udxGF_jYWsJpCYay5hNvikF4ezY0lYe6JXeX27kImkUFji6_H6dSlbbqGBinb8mb9zH2B5J9i5apbw8n2mQJhZ0ojwGTjYDK7yTPMbJYnPGjhSszmRgfRljnXibY2X55X5wqzmytXvVVMpVGcB-EpxB40OZy4rrQYjYLF9kiFIirzf7Bl-TYzQDz7nMRgkZ2Tp-_NfY1DyzOrjVa-dAd-6Y2FtYtZJ90GaHsfLIRDlUbbD7mzfBO6sTl8tM6FQ52gm-_5FUc24O2iVhrXoGwfinbKZruX6MpEz1qtVue_xzleZTOo_nhTonwXRg1cJY7KvlL1Xbx0-sfAUlI0PCQ9XgOI-o2R2h4dfS3CDtO7vJEXmx5SUks_OOwzeSqMQiRo8i63eYqwW2A0CU58g8Eq7M_adXjWwWrCTYfB8d-lYD5jSN8xC8jZI9c6DrbYHqPOAs', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': '9bUR05_V-YX0wCflJqkf-ndlUett7fVSEYs-CYMa_Qw.wVy5dkU5O5RFO-NkabRs7vEtRj9_dETiKJW6YqudqPk', 'scope': 'openid'}
3.339 AccessTokenResponse {
"access_token": "9bUR05_V-YX0wCflJqkf-ndlUett7fVSEYs-CYMa_Qw.wVy5dkU5O5RFO-NkabRs7vEtRj9_dETiKJW6YqudqPk",
"expires_in": 3599,
"id_token": {
"at_hash": "p2vY0CRMxAepy5IJMcjJyQ",
"aud": [
"9d81e5d4-b558-4f29-b9d3-6a6a8013b50a"
],
"auth_time": 1529751824,
"c_hash": "dbi3PcTjb0pziIRaW_fHoA",
"exp": 1529755430,
"iat": 1529751831,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "584d7607-4a51-4bf7-8660-e2f0210bec5f",
"nonce": "yK3P7qUrBtlDhjOD",
"rat": 1529751828,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.339 phase <--<-- 5 --- AsyncAuthn -->-->
3.339 AuthorizationRequest {
"client_id": "9d81e5d4-b558-4f29-b9d3-6a6a8013b50a",
"max_age": 10000,
"nonce": "HXkgJbBgqc93kKLM",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid",
"state": "OyRf64Z4xxo7MM3R"
}
3.34 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?max_age=10000&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=9d81e5d4-b558-4f29-b9d3-6a6a8013b50a&state=OyRf64Z4xxo7MM3R&response_type=code+id_token+token&nonce=HXkgJbBgqc93kKLM
3.34 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?max_age=10000&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=9d81e5d4-b558-4f29-b9d3-6a6a8013b50a&state=OyRf64Z4xxo7MM3R&response_type=code+id_token+token&nonce=HXkgJbBgqc93kKLM
4.425 http args {}
4.577 response URL with fragment
4.577 response access_token=1YFUmJ3XXiy8WMtVA-4LGIMuthSeeWmMD2v6Aqt5xcA.6Zw1tzgJhGvL-bwjQoFJDR5GOuck4MJqXJac-b-9hks&code=rReQX-cGtwCGoTImJJ-TXiplKX7vd4QqDNE4cIo2F6s.CWiUJudTI8E_aLQ3cfMeI2DWNyTguYhXm8_jCgRKwjw&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiR2ZvN1ctSGtEVDl2NlhhalRFVVhIZyIsImF1ZCI6WyI5ZDgxZTVkNC1iNTU4LTRmMjktYjlkMy02YTZhODAxM2I1MGEiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiJSbTFCalM2cXFUSnVmWWhoeHBPRmR3IiwiZXhwIjoxNTI5NzU1NDMyLCJpYXQiOjE1Mjk3NTE4MzIsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjgxZjk2ZGI0LTViOTgtNDRmYS1hYWM5LTczZjk3NTRmOTlkNyIsIm5vbmNlIjoiSFhrZ0piQmdxYzkza0tMTSIsInJhdCI6MTUyOTc1MTgzMSwic3ViIjoiZm9vQGJhci5jb20ifQ.iUQxYTF9i38Pwcol4c33CGQoA2whoedDs_qpF4DdhplG9xbE5SXLrvRLxwK_0XdiYnibozHZ6NQi4qEhI_tJZoZekiURHuaa_BZXF4aUnTjhzHH210eEgiAcX9GaqswbmwSKjmEodR7sf33k-NKnaB5BGh2Uf_5IUEqK5cT1fZKYsda45zYR8EtC1L85JgnTYhUHRGttAHyPjUvtdBLyZWCXtkk2g3HW-3HhKA0j1cSu2heJsHS8yHtyE55ZcXrka7DrUMkIq0Y8VZuKZyWgJfaQ3El7ja2YObkawQSQhdBkBvexeIrvsPYpcYplGwJOw0fvoE8k3iuT6LvwtIcmKjT1TfBvGTrTSWtwRcNwmv5SUrxlpiZDlPxIssHnGHmRdoBba1PBUSOcxTjM0JMnDf0Et4XxDj0j1-Sj9ETUIQu_S7DwMeJY2wWVspi1gx62b7sR3oNtW35i85u0UgRJy2tznrwiVl0722-b4FgGUTECqMQS_DDixEV3E7xANaHjoQz0qPbDALTnQAFONgvI8963r2ybrNalG4-905T8SzrDn38w9cBaYc4HIUu-uNQxz3F0UBNkxLcgrAgcO4O1DH54O1F4qz9d4Uejv3XPhrCnCqIuv4glyGPuqx2BMBBuJ-6HVHTidEOwVeY3nLo3oVa_UJCd7jrmCYtBMHnyQjs&scope=openid&state=OyRf64Z4xxo7MM3R&token_type=bearer
4.578 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiR2ZvN1ctSGtEVDl2NlhhalRFVVhIZyIsImF1ZCI6WyI5ZDgxZTVkNC1iNTU4LTRmMjktYjlkMy02YTZhODAxM2I1MGEiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiJSbTFCalM2cXFUSnVmWWhoeHBPRmR3IiwiZXhwIjoxNTI5NzU1NDMyLCJpYXQiOjE1Mjk3NTE4MzIsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjgxZjk2ZGI0LTViOTgtNDRmYS1hYWM5LTczZjk3NTRmOTlkNyIsIm5vbmNlIjoiSFhrZ0piQmdxYzkza0tMTSIsInJhdCI6MTUyOTc1MTgzMSwic3ViIjoiZm9vQGJhci5jb20ifQ.iUQxYTF9i38Pwcol4c33CGQoA2whoedDs_qpF4DdhplG9xbE5SXLrvRLxwK_0XdiYnibozHZ6NQi4qEhI_tJZoZekiURHuaa_BZXF4aUnTjhzHH210eEgiAcX9GaqswbmwSKjmEodR7sf33k-NKnaB5BGh2Uf_5IUEqK5cT1fZKYsda45zYR8EtC1L85JgnTYhUHRGttAHyPjUvtdBLyZWCXtkk2g3HW-3HhKA0j1cSu2heJsHS8yHtyE55ZcXrka7DrUMkIq0Y8VZuKZyWgJfaQ3El7ja2YObkawQSQhdBkBvexeIrvsPYpcYplGwJOw0fvoE8k3iuT6LvwtIcmKjT1TfBvGTrTSWtwRcNwmv5SUrxlpiZDlPxIssHnGHmRdoBba1PBUSOcxTjM0JMnDf0Et4XxDj0j1-Sj9ETUIQu_S7DwMeJY2wWVspi1gx62b7sR3oNtW35i85u0UgRJy2tznrwiVl0722-b4FgGUTECqMQS_DDixEV3E7xANaHjoQz0qPbDALTnQAFONgvI8963r2ybrNalG4-905T8SzrDn38w9cBaYc4HIUu-uNQxz3F0UBNkxLcgrAgcO4O1DH54O1F4qz9d4Uejv3XPhrCnCqIuv4glyGPuqx2BMBBuJ-6HVHTidEOwVeY3nLo3oVa_UJCd7jrmCYtBMHnyQjs', 'scope': 'openid', 'code': 'rReQX-cGtwCGoTImJJ-TXiplKX7vd4QqDNE4cIo2F6s.CWiUJudTI8E_aLQ3cfMeI2DWNyTguYhXm8_jCgRKwjw', 'access_token': '1YFUmJ3XXiy8WMtVA-4LGIMuthSeeWmMD2v6Aqt5xcA.6Zw1tzgJhGvL-bwjQoFJDR5GOuck4MJqXJac-b-9hks', 'state': 'OyRf64Z4xxo7MM3R', 'expires_in': 3599, 'token_type': 'bearer'}
4.581 AuthorizationResponse {
"access_token": "1YFUmJ3XXiy8WMtVA-4LGIMuthSeeWmMD2v6Aqt5xcA.6Zw1tzgJhGvL-bwjQoFJDR5GOuck4MJqXJac-b-9hks",
"code": "rReQX-cGtwCGoTImJJ-TXiplKX7vd4QqDNE4cIo2F6s.CWiUJudTI8E_aLQ3cfMeI2DWNyTguYhXm8_jCgRKwjw",
"expires_in": 3599,
"id_token": {
"at_hash": "Gfo7W-HkDT9v6XajTEUXHg",
"aud": [
"9d81e5d4-b558-4f29-b9d3-6a6a8013b50a"
],
"auth_time": 1529751824,
"c_hash": "Rm1BjS6qqTJufYhhxpOFdw",
"exp": 1529755432,
"iat": 1529751832,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "81f96db4-5b98-44fa-aac9-73f9754f99d7",
"nonce": "HXkgJbBgqc93kKLM",
"rat": 1529751831,
"sub": "[email protected]"
},
"scope": "openid",
"state": "OyRf64Z4xxo7MM3R",
"token_type": "bearer"
}
4.581 phase <--<-- 6 --- AccessToken -->-->
4.582 --> request op_args: {'state': 'OyRf64Z4xxo7MM3R'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
4.582 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'OyRf64Z4xxo7MM3R', 'code': 'rReQX-cGtwCGoTImJJ-TXiplKX7vd4QqDNE4cIo2F6s.CWiUJudTI8E_aLQ3cfMeI2DWNyTguYhXm8_jCgRKwjw', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '9d81e5d4-b558-4f29-b9d3-6a6a8013b50a'}, 'state': 'OyRf64Z4xxo7MM3R'}
4.582 AccessTokenRequest {
"code": "rReQX-cGtwCGoTImJJ-TXiplKX7vd4QqDNE4cIo2F6s.CWiUJudTI8E_aLQ3cfMeI2DWNyTguYhXm8_jCgRKwjw",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "OyRf64Z4xxo7MM3R"
}
4.582 request_url https://oidc-certification.ory.sh:8443/oauth2/token
4.582 request_http_args {'headers': {'Authorization': 'Basic OWQ4MWU1ZDQtYjU1OC00ZjI5LWI5ZDMtNmE2YTgwMTNiNTBhOnp5bWtsdE5oTmJ3TQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
4.582 request code=rReQX-cGtwCGoTImJJ-TXiplKX7vd4QqDNE4cIo2F6s.CWiUJudTI8E_aLQ3cfMeI2DWNyTguYhXm8_jCgRKwjw&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=OyRf64Z4xxo7MM3R
4.797 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
4.798 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiR2ZvN1ctSGtEVDl2NlhhalRFVVhIZyIsImF1ZCI6WyI5ZDgxZTVkNC1iNTU4LTRmMjktYjlkMy02YTZhODAxM2I1MGEiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiJSbTFCalM2cXFUSnVmWWhoeHBPRmR3IiwiZXhwIjoxNTI5NzU1NDMyLCJpYXQiOjE1Mjk3NTE4MzMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjJlYjJmY2Y0LTZlNzctNDBkNy1hZDNjLTg5NGI0NjJjMmZmZiIsIm5vbmNlIjoiSFhrZ0piQmdxYzkza0tMTSIsInJhdCI6MTUyOTc1MTgzMSwic3ViIjoiZm9vQGJhci5jb20ifQ.V7CD5RMnMv_mofIp79wB_jJBYkeMy_B0I7hjeFlx4P2k1XtLk1ScITwT92KYxseOsPZbZVw8kXwJ3-mftx16zLz8VfxKyj2dtUs1Osxuet-L-09BUma8GwvU-C3dmlhNe1osF_roiRKMjgfar2rhAYmYVAHV7WFCFi9WJ4WTyOAS0JQ26uhbPzo2pAmdWezYiN6iyn-j9DZMK_tUzYHt3wUbVG7pstadZFeu1UFKocmiGJZ-V_rVHStMyVA8h8F4LNBqk4gpH2xYE86MKt1fAEHJFfZ-5mwZhmtdpPByxL6pIeuO4DOOMC9bmPUEJrZZ_JWjfcFj7VwTpImYVDeZwb5khx17krW1JY4AGgdlZz9MZIhJfNyA6e72UA73dYrNAetXJ7v8t9uaQ68pVHRWG3XDBksfaj75IBB-H0q8l1nV7u-n9Sjggq8CB35Z6xmqa414rkTBxDr8AYy9XnJ4e2C0ctwh6bjqGSjT0O1ivC28dhhcCFjHr7rkWkoMOBsuIjwYotcNOGzW_kmaFSX55hPnTm4GEy4G7qZ-qCsZcy-HXDiwT8wCElhMmSeBs8VLSj5yRhLMhrDcPa8cADqP-g_Jw1NDm1M4byRzCpjWarFmnlT2T5oE7fojiSfWqlBsTLR0qGE8OxTrbNdp7HjjO5qHknJuSdrvTz5UIw7c9yc', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'XdXb3pz90--yhIbwKTxOgdQkIuSTgzAD1sH96YfzA6Q.OiunsLeaNVa-JOu12kIfYl3WMCJzWzY76hXtI7OSpzc', 'scope': 'openid'}
4.802 AccessTokenResponse {
"access_token": "XdXb3pz90--yhIbwKTxOgdQkIuSTgzAD1sH96YfzA6Q.OiunsLeaNVa-JOu12kIfYl3WMCJzWzY76hXtI7OSpzc",
"expires_in": 3599,
"id_token": {
"at_hash": "Gfo7W-HkDT9v6XajTEUXHg",
"aud": [
"9d81e5d4-b558-4f29-b9d3-6a6a8013b50a"
],
"auth_time": 1529751824,
"c_hash": "Rm1BjS6qqTJufYhhxpOFdw",
"exp": 1529755432,
"iat": 1529751833,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "2eb2fcf4-6e77-40d7-ad3c-894b462c2fff",
"nonce": "HXkgJbBgqc93kKLM",
"rat": 1529751831,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
4.802 phase <--<-- 7 --- Done -->-->
4.802 end
4.802 assertion AuthTimeCheck
4.802 condition auth_time-check: status=OK [Check that the auth_time returned in the ID Token is in the expected range.]
4.803 assertion VerifyResponse
4.803 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.803 assertion SameAuthn
4.803 condition same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
4.803 assertion ClaimsCheck
4.803 condition claims-check: status=OK [Checks if specific claims is present or not]
4.803 condition Done: status=OK
============================================================
Conditions
auth_time-check: status=OK [Check that the auth_time returned in the ID Token is in the expected range.]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
claims-check: status=OK [Checks if specific claims is present or not]
Done: status=OK
============================================================
RESULT: PASSED
./OP-request-Unsigned.txt 0000644 0000000 0000000 00000025513 13313424302 015471 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-request-Unsigned
Test description: Support request request parameter with unsigned request
Timestamp: 2018-06-23T11:02:26Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.083 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.084 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.084 phase <--<-- 2 --- Registration -->-->
0.084 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'request_object_signing_alg': 'none'}
0.085 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "none",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Jgpit5C681p0Q5TD"
],
"response_types": [
"code id_token token"
]
}
0.242 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.243 RegistrationResponse {
"client_id": "4445f89b-3b92-4e87-bfbe-3c48972bcfd3",
"client_secret": "n3cKSxKcrzTf",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "4445f89b-3b92-4e87-bfbe-3c48972bcfd3",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "none",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Jgpit5C681p0Q5TD"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.243 phase <--<-- 3 --- AsyncAuthn -->-->
0.244 AuthorizationRequest {
"client_id": "4445f89b-3b92-4e87-bfbe-3c48972bcfd3",
"nonce": "9cchKzO573Jpikhj",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"request": "eyJhbGciOiJub25lIn0.eyJzY29wZSI6ICJvcGVuaWQiLCAicmVkaXJlY3RfdXJpIjogImh0dHBzOi8vb3AuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0OjYxMzUzL2F1dGh6X2NiIiwgImNsaWVudF9pZCI6ICI0NDQ1Zjg5Yi0zYjkyLTRlODctYmZiZS0zYzQ4OTcyYmNmZDMiLCAic3RhdGUiOiAiQkVOamdnbm9FUTV4Z0hpYyIsICJyZXNwb25zZV90eXBlIjogImNvZGUgaWRfdG9rZW4gdG9rZW4iLCAibm9uY2UiOiAiOWNjaEt6TzU3M0pwaWtoaiJ9.",
"response_type": "code id_token token",
"scope": "openid",
"state": "BENjggnoEQ5xgHic"
}
0.245 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=4445f89b-3b92-4e87-bfbe-3c48972bcfd3&response_type=code+id_token+token&state=BENjggnoEQ5xgHic&request=eyJhbGciOiJub25lIn0.eyJzY29wZSI6ICJvcGVuaWQiLCAicmVkaXJlY3RfdXJpIjogImh0dHBzOi8vb3AuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0OjYxMzUzL2F1dGh6X2NiIiwgImNsaWVudF9pZCI6ICI0NDQ1Zjg5Yi0zYjkyLTRlODctYmZiZS0zYzQ4OTcyYmNmZDMiLCAic3RhdGUiOiAiQkVOamdnbm9FUTV4Z0hpYyIsICJyZXNwb25zZV90eXBlIjogImNvZGUgaWRfdG9rZW4gdG9rZW4iLCAibm9uY2UiOiAiOWNjaEt6TzU3M0pwaWtoaiJ9.&nonce=9cchKzO573Jpikhj
0.245 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=4445f89b-3b92-4e87-bfbe-3c48972bcfd3&response_type=code+id_token+token&state=BENjggnoEQ5xgHic&request=eyJhbGciOiJub25lIn0.eyJzY29wZSI6ICJvcGVuaWQiLCAicmVkaXJlY3RfdXJpIjogImh0dHBzOi8vb3AuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0OjYxMzUzL2F1dGh6X2NiIiwgImNsaWVudF9pZCI6ICI0NDQ1Zjg5Yi0zYjkyLTRlODctYmZiZS0zYzQ4OTcyYmNmZDMiLCAic3RhdGUiOiAiQkVOamdnbm9FUTV4Z0hpYyIsICJyZXNwb25zZV90eXBlIjogImNvZGUgaWRfdG9rZW4gdG9rZW4iLCAibm9uY2UiOiAiOWNjaEt6TzU3M0pwaWtoaiJ9.&nonce=9cchKzO573Jpikhj
2.517 http args {}
2.733 response URL with fragment
2.734 response access_token=awUOxXIgzutBJR97OUaaywfh2iOODNxDqtMJnlEpADE.KfbPEzAMobQzmKVGF_U0HEWbDYC9W9VQiD1dP3W-New&code=8nSISRX2IX2tH0lQCuafVa3NaoSvYvESgMhIpphzNuE.Ywg6QZRgCUZ9UbMXZ7f3s_fydvq51DtLwUPVj0cz6QU&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiT0ZGajZEYnJpbDZpbThVUmt1dzRLdyIsImF1ZCI6WyI0NDQ1Zjg5Yi0zYjkyLTRlODctYmZiZS0zYzQ4OTcyYmNmZDMiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiJEMXJUSlBLUnJKSFY1TW1FUUVtWkFBIiwiZXhwIjoxNTI5NzU1MzQ2LCJpYXQiOjE1Mjk3NTE3NDYsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6Ijk5ZDYyZmUxLTI0OWEtNDBlMC1iODkyLTVlZjdhMDU3ZWUwOSIsIm5vbmNlIjoiOWNjaEt6TzU3M0pwaWtoaiIsInJhdCI6MTUyOTc1MTc0NCwic3ViIjoiZm9vQGJhci5jb20ifQ.iUWLuggeVTnlYkK0RQFTAZXrTTgvbEGZhTY3Ti51YKu-YIousIrTP37ydp6rEEBC_R7Tk-cHV3SErAUBUiC-AJZt-ztigbne3XytWT44ZQbA4Ymyxo0JvJXE4_AmMQtOxZjtzoWTrZIiTNAbeF3tgGCKacIhhnb0ssxahyInbpKLYulsof6YpH5cNo6CLJxMRA8DTaGRTG74wMOHbPjMEDD6IU2rZMYAgNnFvAqtD6dZpnROItv4_w6yrtlh6u5h718uMmtTGoNZiG7KuvyBVySKsArwY-pt_UbkUylehs0yaelpLdSXOrBPxIjm0ue2k12iIcRbkxB-LVIKY0A2bDMsmjsPSnBLB7IzTIEO3AegVlMJ_BP7v5upwWYnb_QEBT0E1LCKIuXW57mvcENgbM5n8M3o2nO-m4c5TeeqruxN0aIQbrcAd-btKQ6EjsWACUqm6J0qA1IpqBSlXCep6pC2WO78YIlShW9YriaiQgvIvEGZUfKtE9V6bdZvO_A4Pq6tx965B7DjemU_yNAanrKnaPudX0ZG7bYEGjd2erJqGTakFgc0MUwYa9g6vIzDz0FewoVnvX5QoX4YU3edNmIq-FWeM6ZXRhA2GKn-mV1EeE1jKt0KqwOm0mTkRnumKnaOvdm2Cr_D7XdEjz7ZlbCLfs3qC6QNm4DhCKmt3kc&scope=openid&state=BENjggnoEQ5xgHic&token_type=bearer
2.734 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiT0ZGajZEYnJpbDZpbThVUmt1dzRLdyIsImF1ZCI6WyI0NDQ1Zjg5Yi0zYjkyLTRlODctYmZiZS0zYzQ4OTcyYmNmZDMiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiJEMXJUSlBLUnJKSFY1TW1FUUVtWkFBIiwiZXhwIjoxNTI5NzU1MzQ2LCJpYXQiOjE1Mjk3NTE3NDYsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6Ijk5ZDYyZmUxLTI0OWEtNDBlMC1iODkyLTVlZjdhMDU3ZWUwOSIsIm5vbmNlIjoiOWNjaEt6TzU3M0pwaWtoaiIsInJhdCI6MTUyOTc1MTc0NCwic3ViIjoiZm9vQGJhci5jb20ifQ.iUWLuggeVTnlYkK0RQFTAZXrTTgvbEGZhTY3Ti51YKu-YIousIrTP37ydp6rEEBC_R7Tk-cHV3SErAUBUiC-AJZt-ztigbne3XytWT44ZQbA4Ymyxo0JvJXE4_AmMQtOxZjtzoWTrZIiTNAbeF3tgGCKacIhhnb0ssxahyInbpKLYulsof6YpH5cNo6CLJxMRA8DTaGRTG74wMOHbPjMEDD6IU2rZMYAgNnFvAqtD6dZpnROItv4_w6yrtlh6u5h718uMmtTGoNZiG7KuvyBVySKsArwY-pt_UbkUylehs0yaelpLdSXOrBPxIjm0ue2k12iIcRbkxB-LVIKY0A2bDMsmjsPSnBLB7IzTIEO3AegVlMJ_BP7v5upwWYnb_QEBT0E1LCKIuXW57mvcENgbM5n8M3o2nO-m4c5TeeqruxN0aIQbrcAd-btKQ6EjsWACUqm6J0qA1IpqBSlXCep6pC2WO78YIlShW9YriaiQgvIvEGZUfKtE9V6bdZvO_A4Pq6tx965B7DjemU_yNAanrKnaPudX0ZG7bYEGjd2erJqGTakFgc0MUwYa9g6vIzDz0FewoVnvX5QoX4YU3edNmIq-FWeM6ZXRhA2GKn-mV1EeE1jKt0KqwOm0mTkRnumKnaOvdm2Cr_D7XdEjz7ZlbCLfs3qC6QNm4DhCKmt3kc', 'scope': 'openid', 'code': '8nSISRX2IX2tH0lQCuafVa3NaoSvYvESgMhIpphzNuE.Ywg6QZRgCUZ9UbMXZ7f3s_fydvq51DtLwUPVj0cz6QU', 'access_token': 'awUOxXIgzutBJR97OUaaywfh2iOODNxDqtMJnlEpADE.KfbPEzAMobQzmKVGF_U0HEWbDYC9W9VQiD1dP3W-New', 'state': 'BENjggnoEQ5xgHic', 'expires_in': 3599, 'token_type': 'bearer'}
2.816 AuthorizationResponse {
"access_token": "awUOxXIgzutBJR97OUaaywfh2iOODNxDqtMJnlEpADE.KfbPEzAMobQzmKVGF_U0HEWbDYC9W9VQiD1dP3W-New",
"code": "8nSISRX2IX2tH0lQCuafVa3NaoSvYvESgMhIpphzNuE.Ywg6QZRgCUZ9UbMXZ7f3s_fydvq51DtLwUPVj0cz6QU",
"expires_in": 3599,
"id_token": {
"at_hash": "OFFj6Dbril6im8URkuw4Kw",
"aud": [
"4445f89b-3b92-4e87-bfbe-3c48972bcfd3"
],
"auth_time": 1529751698,
"c_hash": "D1rTJPKRrJHV5MmEQEmZAA",
"exp": 1529755346,
"iat": 1529751746,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "99d62fe1-249a-40e0-b892-5ef7a057ee09",
"nonce": "9cchKzO573Jpikhj",
"rat": 1529751744,
"sub": "[email protected]"
},
"scope": "openid",
"state": "BENjggnoEQ5xgHic",
"token_type": "bearer"
}
2.817 phase <--<-- 4 --- Done -->-->
2.817 end
2.817 assertion VerifyAuthnOrErrorResponse
2.817 condition authn-response-or-error: status=OK [Checks that the last response was a JSON encoded authentication or error message]
2.817 condition Done: status=OK
============================================================
Conditions
authn-response-or-error: status=OK [Checks that the last response was a JSON encoded authentication or error message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-ClientAuth-Basic-Dynamic.txt 0000644 0000000 0000000 00000032461 13313424115 016672 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-ClientAuth-Basic-Dynamic
Test description: Access token request with client_secret_basic authentication
Timestamp: 2018-06-23T11:00:29Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.107 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.109 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.109 phase <--<-- 2 --- Registration -->-->
0.109 register kwargs:{'application_name': 'OIC test tool', 'token_endpoint_auth_method': 'client_secret_basic', 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'response_types': ['code id_token token'], 'url': 'https://oidc-certification.ory.sh:8443/clients', 'application_type': 'web'}
0.109 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#vrG8fmWyWsA5Jjw8"
],
"response_types": [
"code id_token token"
],
"token_endpoint_auth_method": "client_secret_basic"
}
0.266 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.267 RegistrationResponse {
"client_id": "e2f6f9c6-a235-48bf-9da5-715463e3f2c1",
"client_secret": "zyjT.7W3XsZ8",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "e2f6f9c6-a235-48bf-9da5-715463e3f2c1",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#vrG8fmWyWsA5Jjw8"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.267 phase <--<-- 3 --- AsyncAuthn -->-->
0.268 AuthorizationRequest {
"client_id": "e2f6f9c6-a235-48bf-9da5-715463e3f2c1",
"nonce": "S1a4iRX23I2JjIAT",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid",
"state": "U04lTGCPBUfrwQHI"
}
0.268 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=e2f6f9c6-a235-48bf-9da5-715463e3f2c1&state=U04lTGCPBUfrwQHI&response_type=code+id_token+token&nonce=S1a4iRX23I2JjIAT
0.268 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=e2f6f9c6-a235-48bf-9da5-715463e3f2c1&state=U04lTGCPBUfrwQHI&response_type=code+id_token+token&nonce=S1a4iRX23I2JjIAT
2.553 http args {}
2.723 response URL with fragment
2.723 response access_token=0dOjOllOc5yy9VvwaydDqKbJhYHxJ5XpgNDMp-UmSzc.Ud4b7_pwL3Z5auloaOOC0Pq2bYxBogGVUpOFEJnHiCc&code=3Z0dA7R_BoLtWO4XCVA4W31_6kWO4DpsGdFBRdbi3-I.JCE4aMNm8PvP6JHvumvri_a-F3SBzcJpYfJwA9t0l4g&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoicm1vTi1tbTFwX0pMMEJIc1JQbnVLUSIsImF1ZCI6WyJlMmY2ZjljNi1hMjM1LTQ4YmYtOWRhNS03MTU0NjNlM2YyYzEiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJJTEhvXzFTLUt0bWw5V2ZzbnVKUjFBIiwiZXhwIjoxNTI5NzU1MjI5LCJpYXQiOjE1Mjk3NTE2MjksImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjUyOTk1ZGRjLTQ3ZDEtNGViMC1hN2VlLTc5MDE0NTE2YTllMCIsIm5vbmNlIjoiUzFhNGlSWDIzSTJKaklBVCIsInJhdCI6MTUyOTc1MTYyNywic3ViIjoiZm9vQGJhci5jb20ifQ.O_gfPIv2DMaQA0z-n0d6YZEaPAlMBM8pW6djSh7DTPUG01Fxpb66Lz4mhTYtXZVPjjVZ50hwCWG5OJCAr24Rg1Gj6PGmTQR-0oWxhLCUF4vHZ4ucfCYTMzlJiBHcJz4vuqYzW5997kd7D_GPHRhXruXneQkhruYrf6_1kJ0dfL1oI-Vq_mbTSSwTte_JwyVz5LciRbR0_pbr4MkuQR2m7zcsR3lej8I_LJ9mBXU2S74ZOKLr2zXQmrZRk_agO1Pspq8VADJktMap0JDrRMpak7eJ_ADCtH3TP6jIxo5I35yjPLb3lH3g8myiJrg7boR5RDsJEYgjHPDaC2f1xdB4xUqV7ULbkX7mTWm3BsGPkmr6t85PcCUbJ2vTmeCOF_wkcPSBKLEULh4FV-uIpCfG__D10geXK7CPc5XYtuuT2PmILfJWyZhPN6mCEFCenRrSBYc0TxUzPGUj0C7fgNTtHwJ4k9QEL6KPDeaUBRX1bpsyAQ5EtqXzhJzE9jPLIAN9a_Zbdi3vvM2KGQSG0RwaGT-va4AdoAC10TixcnFZ_sq0Dpl9NBMq-SDq0elDVc0TiHHwXcSuTSXe9zcu94sO14PXL38btFgddhGko3Z5g6t308bY2F5LbVV4kCR6YiuezIkwwMlpB_RIctOg7iummfBvKwHMJiyTEbhSrX7JT8o&scope=openid&state=U04lTGCPBUfrwQHI&token_type=bearer
2.723 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoicm1vTi1tbTFwX0pMMEJIc1JQbnVLUSIsImF1ZCI6WyJlMmY2ZjljNi1hMjM1LTQ4YmYtOWRhNS03MTU0NjNlM2YyYzEiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJJTEhvXzFTLUt0bWw5V2ZzbnVKUjFBIiwiZXhwIjoxNTI5NzU1MjI5LCJpYXQiOjE1Mjk3NTE2MjksImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjUyOTk1ZGRjLTQ3ZDEtNGViMC1hN2VlLTc5MDE0NTE2YTllMCIsIm5vbmNlIjoiUzFhNGlSWDIzSTJKaklBVCIsInJhdCI6MTUyOTc1MTYyNywic3ViIjoiZm9vQGJhci5jb20ifQ.O_gfPIv2DMaQA0z-n0d6YZEaPAlMBM8pW6djSh7DTPUG01Fxpb66Lz4mhTYtXZVPjjVZ50hwCWG5OJCAr24Rg1Gj6PGmTQR-0oWxhLCUF4vHZ4ucfCYTMzlJiBHcJz4vuqYzW5997kd7D_GPHRhXruXneQkhruYrf6_1kJ0dfL1oI-Vq_mbTSSwTte_JwyVz5LciRbR0_pbr4MkuQR2m7zcsR3lej8I_LJ9mBXU2S74ZOKLr2zXQmrZRk_agO1Pspq8VADJktMap0JDrRMpak7eJ_ADCtH3TP6jIxo5I35yjPLb3lH3g8myiJrg7boR5RDsJEYgjHPDaC2f1xdB4xUqV7ULbkX7mTWm3BsGPkmr6t85PcCUbJ2vTmeCOF_wkcPSBKLEULh4FV-uIpCfG__D10geXK7CPc5XYtuuT2PmILfJWyZhPN6mCEFCenRrSBYc0TxUzPGUj0C7fgNTtHwJ4k9QEL6KPDeaUBRX1bpsyAQ5EtqXzhJzE9jPLIAN9a_Zbdi3vvM2KGQSG0RwaGT-va4AdoAC10TixcnFZ_sq0Dpl9NBMq-SDq0elDVc0TiHHwXcSuTSXe9zcu94sO14PXL38btFgddhGko3Z5g6t308bY2F5LbVV4kCR6YiuezIkwwMlpB_RIctOg7iummfBvKwHMJiyTEbhSrX7JT8o', 'scope': 'openid', 'code': '3Z0dA7R_BoLtWO4XCVA4W31_6kWO4DpsGdFBRdbi3-I.JCE4aMNm8PvP6JHvumvri_a-F3SBzcJpYfJwA9t0l4g', 'access_token': '0dOjOllOc5yy9VvwaydDqKbJhYHxJ5XpgNDMp-UmSzc.Ud4b7_pwL3Z5auloaOOC0Pq2bYxBogGVUpOFEJnHiCc', 'state': 'U04lTGCPBUfrwQHI', 'expires_in': 3599, 'token_type': 'bearer'}
2.799 AuthorizationResponse {
"access_token": "0dOjOllOc5yy9VvwaydDqKbJhYHxJ5XpgNDMp-UmSzc.Ud4b7_pwL3Z5auloaOOC0Pq2bYxBogGVUpOFEJnHiCc",
"code": "3Z0dA7R_BoLtWO4XCVA4W31_6kWO4DpsGdFBRdbi3-I.JCE4aMNm8PvP6JHvumvri_a-F3SBzcJpYfJwA9t0l4g",
"expires_in": 3599,
"id_token": {
"at_hash": "rmoN-mm1p_JL0BHsRPnuKQ",
"aud": [
"e2f6f9c6-a235-48bf-9da5-715463e3f2c1"
],
"auth_time": 1529751409,
"c_hash": "ILHo_1S-Ktml9WfsnuJR1A",
"exp": 1529755229,
"iat": 1529751629,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "52995ddc-47d1-4eb0-a7ee-79014516a9e0",
"nonce": "S1a4iRX23I2JjIAT",
"rat": 1529751627,
"sub": "[email protected]"
},
"scope": "openid",
"state": "U04lTGCPBUfrwQHI",
"token_type": "bearer"
}
2.8 phase <--<-- 4 --- AccessToken -->-->
2.8 --> request op_args: {'state': 'U04lTGCPBUfrwQHI', 'authn_method': 'client_secret_basic'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.8 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'U04lTGCPBUfrwQHI', 'code': '3Z0dA7R_BoLtWO4XCVA4W31_6kWO4DpsGdFBRdbi3-I.JCE4aMNm8PvP6JHvumvri_a-F3SBzcJpYfJwA9t0l4g', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'e2f6f9c6-a235-48bf-9da5-715463e3f2c1'}, 'state': 'U04lTGCPBUfrwQHI', 'authn_method': 'client_secret_basic'}
2.8 AccessTokenRequest {
"code": "3Z0dA7R_BoLtWO4XCVA4W31_6kWO4DpsGdFBRdbi3-I.JCE4aMNm8PvP6JHvumvri_a-F3SBzcJpYfJwA9t0l4g",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "U04lTGCPBUfrwQHI"
}
2.8 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.8 request_http_args {'headers': {'Authorization': 'Basic ZTJmNmY5YzYtYTIzNS00OGJmLTlkYTUtNzE1NDYzZTNmMmMxOnp5alQuN1czWHNaOA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.8 request code=3Z0dA7R_BoLtWO4XCVA4W31_6kWO4DpsGdFBRdbi3-I.JCE4aMNm8PvP6JHvumvri_a-F3SBzcJpYfJwA9t0l4g&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=U04lTGCPBUfrwQHI
3.017 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.018 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoicm1vTi1tbTFwX0pMMEJIc1JQbnVLUSIsImF1ZCI6WyJlMmY2ZjljNi1hMjM1LTQ4YmYtOWRhNS03MTU0NjNlM2YyYzEiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJJTEhvXzFTLUt0bWw5V2ZzbnVKUjFBIiwiZXhwIjoxNTI5NzU1MjI5LCJpYXQiOjE1Mjk3NTE2MjksImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjM2MTBjNWZjLTA5N2MtNGE5NS1hMmFkLWUwMDZkNWMyNjY1YyIsIm5vbmNlIjoiUzFhNGlSWDIzSTJKaklBVCIsInJhdCI6MTUyOTc1MTYyNywic3ViIjoiZm9vQGJhci5jb20ifQ.NLckEiahTAiwCX9vHFp63qryXumJcpTc1cBnHMrG51R_YL8n-6CiLlldS1cBw4c4E8v2hkd426tGC0YPmizzu2uqA_2z7gLWFX4tP3RT2oh8oyMAWo0UyV_89PpYC0xLv8z_c2qCYLbc7LMc20onNl_eUtH5kq2OHQrP9CPkt5w7-hEsGR_tFUzoDGgK-5sPv5bqwwUQemNs5ZhuUfXqpmmwtgacHy0qg2oK-GfLzJuI-B9nwkoHE9Fucvhsfnma0knbHkNvT9uosuVnd6HBE0J1-0spWsiObw7Jtn53CAO0uKjQFBYaedjerZLiFkgT2BotW8Ffs7Yzkr3jj_XvdMLrD_JQAmjkEYZSSHfrGP_yjyYIIsPsisWcTAymlWHAetantPuVm3bb4GI1rVWPU8P9Vd1IcMVF2ZMVt5g5EF610OR9RmiVsz2gJaiFiCjrOrol_NwjpRbpHj97BqEuTlCfxxDledS_FG9zHkqjEhZhFDchIyZ8uZIgvb7Gkqxq73WnPxrfj4asi7H6gnOpXPxpnH2FFQnZC-m_ZrIErE7Bxg2ZNwcxZl9IgNo0OVXE5eMU6rbTDPcfSuTuKFypN1SbN220pHLi_bcEKE0i4eefwGtXkvBzLJ7CqFLALlAkldr3w4uFtLbj_GYTEXIa-S0u9wp8qrDpXN31Yu1Nci8', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'xDzfvf1JLoLapdotmos3CEFZXrVN_NaJr8nLNnZDlf8.0Hw1dDRTGp2OTl67YRuDd-8Ug4heX46ytbuUk4pLTGU', 'scope': 'openid'}
3.022 AccessTokenResponse {
"access_token": "xDzfvf1JLoLapdotmos3CEFZXrVN_NaJr8nLNnZDlf8.0Hw1dDRTGp2OTl67YRuDd-8Ug4heX46ytbuUk4pLTGU",
"expires_in": 3599,
"id_token": {
"at_hash": "rmoN-mm1p_JL0BHsRPnuKQ",
"aud": [
"e2f6f9c6-a235-48bf-9da5-715463e3f2c1"
],
"auth_time": 1529751409,
"c_hash": "ILHo_1S-Ktml9WfsnuJR1A",
"exp": 1529755229,
"iat": 1529751629,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "3610c5fc-097c-4a95-a2ad-e006d5c2665c",
"nonce": "S1a4iRX23I2JjIAT",
"rat": 1529751627,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.022 phase <--<-- 5 --- Done -->-->
3.022 end
3.022 assertion VerifyResponse
3.023 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.023 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Discovery-claims_supported.txt 0000644 0000000 0000000 00000005777 13313424012 017561 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Discovery-claims_supported
Test description: Verify that claims_supported is published
Timestamp: 2018-06-23T10:59:22Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.071 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.072 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.073 phase <--<-- 2 --- Done -->-->
0.073 end
0.073 assertion CheckHTTPResponse
0.073 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.073 assertion CheckHasClaimsSupported
0.074 condition providerinfo-has-claims_supported: status=OK [Check that the claims_supported discovery metadata value is in the provider_info]
0.074 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
providerinfo-has-claims_supported: status=OK [Check that the claims_supported discovery metadata value is in the provider_info]
Done: status=OK
============================================================
RESULT: PASSED
./OP-IDToken-c_hash.txt 0000644 0000000 0000000 00000023272 13313424104 014747 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-IDToken-c_hash
Test description: ID Token has c_hash when ID Token and Authorization Code returned from Authorization Endpoint [Hybrid]
Timestamp: 2018-06-23T11:00:20Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.079 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.08 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.081 phase <--<-- 2 --- Registration -->-->
0.081 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.081 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#23k05zNbuS14gp86"
],
"response_types": [
"code id_token token"
]
}
0.238 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.239 RegistrationResponse {
"client_id": "3585667c-c4f3-45d3-a8f6-5d0e67905042",
"client_secret": "LDKDB20OHpjb",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "3585667c-c4f3-45d3-a8f6-5d0e67905042",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#23k05zNbuS14gp86"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.239 phase <--<-- 3 --- AsyncAuthn -->-->
0.239 AuthorizationRequest {
"client_id": "3585667c-c4f3-45d3-a8f6-5d0e67905042",
"nonce": "llAGjXafkGFpTuNE",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid",
"state": "4miD0Ms97LR1cHHR"
}
0.24 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=3585667c-c4f3-45d3-a8f6-5d0e67905042&state=4miD0Ms97LR1cHHR&response_type=code+id_token+token&nonce=llAGjXafkGFpTuNE
0.24 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=3585667c-c4f3-45d3-a8f6-5d0e67905042&state=4miD0Ms97LR1cHHR&response_type=code+id_token+token&nonce=llAGjXafkGFpTuNE
3.233 http args {}
3.442 response URL with fragment
3.442 response access_token=E2cfbDPuuc_O5_B1RUohlQkZYcckpmYYLOoI59Fvv3o.pWu_2wCJSv2m8oQoh7YwAVb-crhHeujv76wsH9zFB84&code=DLORc9LRGRvCLmolDuD9MzxuhKa7-G65SD0r3OxLzto.7RDA0o_JVfen8hP3ggEB705-aLVJAL1zmH9eFlswItc&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiNzVUQ0F5MkMwN3J6dWFLelRxcjZCUSIsImF1ZCI6WyIzNTg1NjY3Yy1jNGYzLTQ1ZDMtYThmNi01ZDBlNjc5MDUwNDIiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJoa0t5VWhsUmVqak1pR3hMMDB5am9BIiwiZXhwIjoxNTI5NzU1MjE5LCJpYXQiOjE1Mjk3NTE2MTksImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjY0MmFlY2ZkLWE1YmEtNDJjNS1iODRlLTgwNmYwMzBiZTA2ZiIsIm5vbmNlIjoibGxBR2pYYWZrR0ZwVHVORSIsInJhdCI6MTUyOTc1MTYxNywic3ViIjoiZm9vQGJhci5jb20ifQ.CDk6rZoWxuwk2d_D0qhWXIRQHXU2Yg6UbgpsoPHuu5sSU31M30KAyxkdWsYK2E5wUZkqPdBv4xroO5_p0IJfaVvyebFCZ3vqqE0hca640-j1euE7xR_QUgYCZtf6umasF7829Ezr0cHhbh81EuzZWPr6d6QdB3Z1BV2NX2OhZ6eXZTQ7PCGyabTYEldb17ahYMU1TRnO7BUBt0Sra2vMuSQcbmx6p-DDi1bMNT4nO2vV0-gwny1IPcJYm3DaQJDDsdi8elTR5OlEEQeCSeTIuamEUZ4O5YjwZ34nPf6wumotQtr0NQR_KTHjJDnw_7nZdA6NB1ATfLi1d_2d6iTfiWsUzaSDN57F1RFjERjaaccsgvstHdbdlzW8ad2WPhUfBJCYeJNnK5LJ-asZ2XlaLA2d39MVbTr3h0KeFrJBNKTwsfwALJ7tWX2R4guIYIdfREcDWx5Dn8qUF5stnnCapZsJQQfX0I-uFz4uvzVtNQqo5ZfPyW1IEGqSXARvRs_Gtj3GItUkx-hoDDlH-NwL8II-JnGWnc2wONLdR7p-Th6qE6wBbyR3UVQBGfZ8IztZimPhQpDtSJxIzYZbwZDTIJqz8J53OtvAvoYmrEU2a8_pl0RXQ1rlcMbYO7OdbHtJqd-IMMyVaRxvhUBOgjR_CraLOxCNpgOdTHImETMMvt0&scope=openid&state=4miD0Ms97LR1cHHR&token_type=bearer
3.443 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiNzVUQ0F5MkMwN3J6dWFLelRxcjZCUSIsImF1ZCI6WyIzNTg1NjY3Yy1jNGYzLTQ1ZDMtYThmNi01ZDBlNjc5MDUwNDIiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJoa0t5VWhsUmVqak1pR3hMMDB5am9BIiwiZXhwIjoxNTI5NzU1MjE5LCJpYXQiOjE1Mjk3NTE2MTksImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjY0MmFlY2ZkLWE1YmEtNDJjNS1iODRlLTgwNmYwMzBiZTA2ZiIsIm5vbmNlIjoibGxBR2pYYWZrR0ZwVHVORSIsInJhdCI6MTUyOTc1MTYxNywic3ViIjoiZm9vQGJhci5jb20ifQ.CDk6rZoWxuwk2d_D0qhWXIRQHXU2Yg6UbgpsoPHuu5sSU31M30KAyxkdWsYK2E5wUZkqPdBv4xroO5_p0IJfaVvyebFCZ3vqqE0hca640-j1euE7xR_QUgYCZtf6umasF7829Ezr0cHhbh81EuzZWPr6d6QdB3Z1BV2NX2OhZ6eXZTQ7PCGyabTYEldb17ahYMU1TRnO7BUBt0Sra2vMuSQcbmx6p-DDi1bMNT4nO2vV0-gwny1IPcJYm3DaQJDDsdi8elTR5OlEEQeCSeTIuamEUZ4O5YjwZ34nPf6wumotQtr0NQR_KTHjJDnw_7nZdA6NB1ATfLi1d_2d6iTfiWsUzaSDN57F1RFjERjaaccsgvstHdbdlzW8ad2WPhUfBJCYeJNnK5LJ-asZ2XlaLA2d39MVbTr3h0KeFrJBNKTwsfwALJ7tWX2R4guIYIdfREcDWx5Dn8qUF5stnnCapZsJQQfX0I-uFz4uvzVtNQqo5ZfPyW1IEGqSXARvRs_Gtj3GItUkx-hoDDlH-NwL8II-JnGWnc2wONLdR7p-Th6qE6wBbyR3UVQBGfZ8IztZimPhQpDtSJxIzYZbwZDTIJqz8J53OtvAvoYmrEU2a8_pl0RXQ1rlcMbYO7OdbHtJqd-IMMyVaRxvhUBOgjR_CraLOxCNpgOdTHImETMMvt0', 'scope': 'openid', 'code': 'DLORc9LRGRvCLmolDuD9MzxuhKa7-G65SD0r3OxLzto.7RDA0o_JVfen8hP3ggEB705-aLVJAL1zmH9eFlswItc', 'access_token': 'E2cfbDPuuc_O5_B1RUohlQkZYcckpmYYLOoI59Fvv3o.pWu_2wCJSv2m8oQoh7YwAVb-crhHeujv76wsH9zFB84', 'state': '4miD0Ms97LR1cHHR', 'expires_in': 3599, 'token_type': 'bearer'}
3.525 AuthorizationResponse {
"access_token": "E2cfbDPuuc_O5_B1RUohlQkZYcckpmYYLOoI59Fvv3o.pWu_2wCJSv2m8oQoh7YwAVb-crhHeujv76wsH9zFB84",
"code": "DLORc9LRGRvCLmolDuD9MzxuhKa7-G65SD0r3OxLzto.7RDA0o_JVfen8hP3ggEB705-aLVJAL1zmH9eFlswItc",
"expires_in": 3599,
"id_token": {
"at_hash": "75TCAy2C07rzuaKzTqr6BQ",
"aud": [
"3585667c-c4f3-45d3-a8f6-5d0e67905042"
],
"auth_time": 1529751409,
"c_hash": "hkKyUhlRejjMiGxL00yjoA",
"exp": 1529755219,
"iat": 1529751619,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "642aecfd-a5ba-42c5-b84e-806f030be06f",
"nonce": "llAGjXafkGFpTuNE",
"rat": 1529751617,
"sub": "[email protected]"
},
"scope": "openid",
"state": "4miD0Ms97LR1cHHR",
"token_type": "bearer"
}
3.526 phase <--<-- 4 --- Done -->-->
3.526 end
3.526 assertion VerifyAuthnResponse
3.526 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
3.526 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Registration-logo_uri.txt 0000644 0000000 0000000 00000023605 13313424036 016522 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-logo_uri
Test description: Registration with logo_uri
Timestamp: 2018-06-23T10:59:42Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
0.944 phase <--<-- 1 --- Webfinger -->-->
0.944 not expected to do WebFinger
0.944 phase <--<-- 2 --- Discovery -->-->
0.944 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.034 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.036 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.036 phase <--<-- 3 --- Registration -->-->
1.036 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'logo_uri': 'https://op.certification.openid.net:61353/static/logo.png'}
1.036 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"logo_uri": "https://op.certification.openid.net:61353/static/logo.png",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#ezVX2YEycA84VE1l"
],
"response_types": [
"code id_token token"
]
}
1.191 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.192 RegistrationResponse {
"client_id": "faac0e16-096e-4825-ba94-997f6fe86661",
"client_secret": "_JV0rQe.WL6b",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "faac0e16-096e-4825-ba94-997f6fe86661",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"logo_uri": "https://op.certification.openid.net:61353/static/logo.png",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#ezVX2YEycA84VE1l"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.192 phase <--<-- 4 --- AsyncAuthn -->-->
1.193 AuthorizationRequest {
"client_id": "faac0e16-096e-4825-ba94-997f6fe86661",
"nonce": "HFlGdjv9BxcMPX15",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid",
"state": "ubkFmbu99yN2YQHj"
}
1.193 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=faac0e16-096e-4825-ba94-997f6fe86661&state=ubkFmbu99yN2YQHj&response_type=code+id_token+token&nonce=HFlGdjv9BxcMPX15
1.193 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=faac0e16-096e-4825-ba94-997f6fe86661&state=ubkFmbu99yN2YQHj&response_type=code+id_token+token&nonce=HFlGdjv9BxcMPX15
3.76 http args {}
3.935 response URL with fragment
3.935 response access_token=glpHPlrCWt8DKRlpFG11gz6z-ZHnFdY8NowwEkp2Dk4.RIZi3XegRHDcRt5bMejezTb01Yi7ci2AhVyPWsED7LY&code=ErKoprjy0M5Hz5etX0qzqmsd9f7p2ey4TrzGXPYyHXU.x3uR_-GHTiAcjsGbfdtl4CuVqcG9UtJeE0APkoFH09w&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiR01jd25fdFp6ajVCaEtWT29QcHp3dyIsImF1ZCI6WyJmYWFjMGUxNi0wOTZlLTQ4MjUtYmE5NC05OTdmNmZlODY2NjEiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJiNjlMX2ljU1BXSHRIWWZ2cldlQXB3IiwiZXhwIjoxNTI5NzU1MTgxLCJpYXQiOjE1Mjk3NTE1ODEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjY3MWRmOGNhLWZmOGEtNDYzZC1iNGY2LTVkYzFiYjQ2YzRjYyIsIm5vbmNlIjoiSEZsR2RqdjlCeGNNUFgxNSIsInJhdCI6MTUyOTc1MTU3OSwic3ViIjoiZm9vQGJhci5jb20ifQ.woENdJOPcXaS4JC5EN8G4cl-c_JbqAXXJuUEWZula6-kBLzdXNxSElI2X1BQTtwN8XYp29pOlAhK_ctAtukuFHbAFtPWbk7iS-fVmgo38uqPEom4y9ZV_kq0jkMQ_FG9crlJ2tS7R8KVMCztjFejGJNYlCN97ykM8zFJm2o_ykQWsQuDrvGal1MOcu-n0lH-mfcnrfy160f2WZneWK1C4J9_-yhx4sYL5h7VJNNpl7-7GlrRNI9Yh6mkXSQeIofZmC34cEf7YddmEtXEhyy5oElkdzs0Kz1UDqNBTFMT_Tk1l0wm23AGdGmWfEXMc9AJTbACclR8KzoG_6zVinCc_jM65HM2uQokHbEeijd_uvh1-yo6iDbe_HkbP-9OAu8ntUlCiYCx2sk_etqjD1aMKxogdLbE6PbMHDXyK_pin7gPh0jyPH3DBdSvdFprzbcXfdotT_AenjRFFGH6sgdgnmA_N-jtS4xsFTyDCxHl02CP8kMpj_0jHpHbctKUci1G2Y9EnNl0m0o0ER4e5b0iO3FAF20oIbPma0dMUxhxcRcQ2kOBmrBxs0DreRg2MQOpEEkXq2SFnl5BLmsge9EoaeVpU5jiPxPjpyeEI6yKkDq0Qvq8Cs2R8DwaZvhz2fiPuv8T5s0k3ebWpMAIyo4hXxrLiv4VTldJT-tq5HD4ssw&scope=openid&state=ubkFmbu99yN2YQHj&token_type=bearer
3.936 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiR01jd25fdFp6ajVCaEtWT29QcHp3dyIsImF1ZCI6WyJmYWFjMGUxNi0wOTZlLTQ4MjUtYmE5NC05OTdmNmZlODY2NjEiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJiNjlMX2ljU1BXSHRIWWZ2cldlQXB3IiwiZXhwIjoxNTI5NzU1MTgxLCJpYXQiOjE1Mjk3NTE1ODEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjY3MWRmOGNhLWZmOGEtNDYzZC1iNGY2LTVkYzFiYjQ2YzRjYyIsIm5vbmNlIjoiSEZsR2RqdjlCeGNNUFgxNSIsInJhdCI6MTUyOTc1MTU3OSwic3ViIjoiZm9vQGJhci5jb20ifQ.woENdJOPcXaS4JC5EN8G4cl-c_JbqAXXJuUEWZula6-kBLzdXNxSElI2X1BQTtwN8XYp29pOlAhK_ctAtukuFHbAFtPWbk7iS-fVmgo38uqPEom4y9ZV_kq0jkMQ_FG9crlJ2tS7R8KVMCztjFejGJNYlCN97ykM8zFJm2o_ykQWsQuDrvGal1MOcu-n0lH-mfcnrfy160f2WZneWK1C4J9_-yhx4sYL5h7VJNNpl7-7GlrRNI9Yh6mkXSQeIofZmC34cEf7YddmEtXEhyy5oElkdzs0Kz1UDqNBTFMT_Tk1l0wm23AGdGmWfEXMc9AJTbACclR8KzoG_6zVinCc_jM65HM2uQokHbEeijd_uvh1-yo6iDbe_HkbP-9OAu8ntUlCiYCx2sk_etqjD1aMKxogdLbE6PbMHDXyK_pin7gPh0jyPH3DBdSvdFprzbcXfdotT_AenjRFFGH6sgdgnmA_N-jtS4xsFTyDCxHl02CP8kMpj_0jHpHbctKUci1G2Y9EnNl0m0o0ER4e5b0iO3FAF20oIbPma0dMUxhxcRcQ2kOBmrBxs0DreRg2MQOpEEkXq2SFnl5BLmsge9EoaeVpU5jiPxPjpyeEI6yKkDq0Qvq8Cs2R8DwaZvhz2fiPuv8T5s0k3ebWpMAIyo4hXxrLiv4VTldJT-tq5HD4ssw', 'scope': 'openid', 'code': 'ErKoprjy0M5Hz5etX0qzqmsd9f7p2ey4TrzGXPYyHXU.x3uR_-GHTiAcjsGbfdtl4CuVqcG9UtJeE0APkoFH09w', 'access_token': 'glpHPlrCWt8DKRlpFG11gz6z-ZHnFdY8NowwEkp2Dk4.RIZi3XegRHDcRt5bMejezTb01Yi7ci2AhVyPWsED7LY', 'state': 'ubkFmbu99yN2YQHj', 'expires_in': 3599, 'token_type': 'bearer'}
4.017 AuthorizationResponse {
"access_token": "glpHPlrCWt8DKRlpFG11gz6z-ZHnFdY8NowwEkp2Dk4.RIZi3XegRHDcRt5bMejezTb01Yi7ci2AhVyPWsED7LY",
"code": "ErKoprjy0M5Hz5etX0qzqmsd9f7p2ey4TrzGXPYyHXU.x3uR_-GHTiAcjsGbfdtl4CuVqcG9UtJeE0APkoFH09w",
"expires_in": 3599,
"id_token": {
"at_hash": "GMcwn_tZzj5BhKVOoPpzww",
"aud": [
"faac0e16-096e-4825-ba94-997f6fe86661"
],
"auth_time": 1529751409,
"c_hash": "b69L_icSPWHtHYfvrWeApw",
"exp": 1529755181,
"iat": 1529751581,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "671df8ca-ff8a-463d-b4f6-5dc1bb46c4cc",
"nonce": "HFlGdjv9BxcMPX15",
"rat": 1529751579,
"sub": "[email protected]"
},
"scope": "openid",
"state": "ubkFmbu99yN2YQHj",
"token_type": "bearer"
}
4.017 phase <--<-- 5 --- Done -->-->
4.017 end
4.017 assertion VerifyAuthnResponse
4.018 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
4.018 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-redirect_uri-Query-OK.txt 0000644 0000000 0000000 00000024116 13313424272 016325 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-Query-OK
Test description: Request with a redirect_uri with a query component when a redirect_uri with the same query component is registered
Timestamp: 2018-06-23T11:02:18Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.078 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.079 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.079 phase <--<-- 2 --- Registration -->-->
0.08 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb?foo=bar'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.08 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb?foo=bar"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Af86ILma6fQ9Nze9"
],
"response_types": [
"code id_token token"
]
}
0.237 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.238 RegistrationResponse {
"client_id": "59200b7d-46a2-445b-8c08-787faba6571e",
"client_secret": "xq8wfW6GpgQW",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "59200b7d-46a2-445b-8c08-787faba6571e",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb?foo=bar"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Af86ILma6fQ9Nze9"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.238 phase <--<-- 3 --- AsyncAuthn -->-->
0.239 AuthorizationRequest {
"client_id": "59200b7d-46a2-445b-8c08-787faba6571e",
"nonce": "BWDF9iBLjKsE0ovF",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb?foo=bar",
"response_type": "code id_token token",
"scope": "openid",
"state": "eIClgg4iLy43SioT"
}
0.239 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb%3Ffoo%3Dbar&client_id=59200b7d-46a2-445b-8c08-787faba6571e&state=eIClgg4iLy43SioT&response_type=code+id_token+token&nonce=BWDF9iBLjKsE0ovF
0.239 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb%3Ffoo%3Dbar&client_id=59200b7d-46a2-445b-8c08-787faba6571e&state=eIClgg4iLy43SioT&response_type=code+id_token+token&nonce=BWDF9iBLjKsE0ovF
2.443 http args {'foo': 'bar'}
2.611 response URL with fragment
2.611 response access_token=p6FZGRUpGoF7KiRbXS0DYrE86WRL1P4NKyW341JDhm8.TkPCJXZP1k27yOBbDyr0OQnIK2gReg7NOYRv13BRV2M&code=XYFYPLybXfqaqXlRAd3EU0bKPWgPiH_zRoPdARv2kcY.tumj0Kx52t767e_CoeW2dVNBEQlPzrctVD0EMU6j-ek&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiTXM4SGJ3a0RtVFNPREg3U3lrRlR6ZyIsImF1ZCI6WyI1OTIwMGI3ZC00NmEyLTQ0NWItOGMwOC03ODdmYWJhNjU3MWUiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiJ4Vnl6TUFyS1NmaDdtNG05TjVXTE93IiwiZXhwIjoxNTI5NzU1MzM3LCJpYXQiOjE1Mjk3NTE3MzcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjVmMGE1ZDM5LTdlYjktNGQ2OC05ZjdhLWUwYjcyOWRiYjljOSIsIm5vbmNlIjoiQldERjlpQkxqS3NFMG92RiIsInJhdCI6MTUyOTc1MTczNSwic3ViIjoiZm9vQGJhci5jb20ifQ.IcMVfSF6c1fccRJj3fanIj7bkZ1XjAeUzm3keQpivFwGU4XjvnBBb_aJb5TFibxX2Rs7FdYxP6fUePYZ4I5zCiNroFj_oKgyJrsobpi5rpG0LEibjf-xnrlXarPMtf5fHF_fzSV5FAgRivOf2AP1V7j0HJhnD-xw58bANMtLx_bQTSrQIx67SGiT3oPuSU8ibzS2YyvNsS0XmHx0TPIHaPSIiqVtDDieMmsCprFq97MFwqfLJteozL6IzEmLbL0EAW5WwlYkHLFocXYokINOrOnaspsCekNqIg06CO3_xB1eSaX2-ezBOMHML08xDkkBIAodVWU24ejiY19KXwxGQckFL6igwTybJutpf_rhFYkatXMdhQZqGdhGdr0X9KqUi6zsGkfBc0rrPZhg46YiiwKTj6LjWJx03yv56XHC6FdPIBZCcjtFiZsrG-gv_xhRqxi9xxaZB57uMAEIYRnhoQehA6UHckhwhUOjMb-i-PfrjaQH5xmKt3vMw8I_Jehi76rrYO9hDL2ctOBlPj5sSL-gbjRsyKxRs0_NaZqQxVMNKf7hc7Soob3BfM5nr95H20Z4lprsrAhaDIG7QO_J3UNRt1Zezg3Ez5UDGww5jQyo3QToc65gV6la9EsBvcOehdQqiDjDJAz2icVLt2Wf1XP8nKWrEYMAXRePQ9eoyrQ&scope=openid&state=eIClgg4iLy43SioT&token_type=bearer
2.612 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiTXM4SGJ3a0RtVFNPREg3U3lrRlR6ZyIsImF1ZCI6WyI1OTIwMGI3ZC00NmEyLTQ0NWItOGMwOC03ODdmYWJhNjU3MWUiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiJ4Vnl6TUFyS1NmaDdtNG05TjVXTE93IiwiZXhwIjoxNTI5NzU1MzM3LCJpYXQiOjE1Mjk3NTE3MzcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjVmMGE1ZDM5LTdlYjktNGQ2OC05ZjdhLWUwYjcyOWRiYjljOSIsIm5vbmNlIjoiQldERjlpQkxqS3NFMG92RiIsInJhdCI6MTUyOTc1MTczNSwic3ViIjoiZm9vQGJhci5jb20ifQ.IcMVfSF6c1fccRJj3fanIj7bkZ1XjAeUzm3keQpivFwGU4XjvnBBb_aJb5TFibxX2Rs7FdYxP6fUePYZ4I5zCiNroFj_oKgyJrsobpi5rpG0LEibjf-xnrlXarPMtf5fHF_fzSV5FAgRivOf2AP1V7j0HJhnD-xw58bANMtLx_bQTSrQIx67SGiT3oPuSU8ibzS2YyvNsS0XmHx0TPIHaPSIiqVtDDieMmsCprFq97MFwqfLJteozL6IzEmLbL0EAW5WwlYkHLFocXYokINOrOnaspsCekNqIg06CO3_xB1eSaX2-ezBOMHML08xDkkBIAodVWU24ejiY19KXwxGQckFL6igwTybJutpf_rhFYkatXMdhQZqGdhGdr0X9KqUi6zsGkfBc0rrPZhg46YiiwKTj6LjWJx03yv56XHC6FdPIBZCcjtFiZsrG-gv_xhRqxi9xxaZB57uMAEIYRnhoQehA6UHckhwhUOjMb-i-PfrjaQH5xmKt3vMw8I_Jehi76rrYO9hDL2ctOBlPj5sSL-gbjRsyKxRs0_NaZqQxVMNKf7hc7Soob3BfM5nr95H20Z4lprsrAhaDIG7QO_J3UNRt1Zezg3Ez5UDGww5jQyo3QToc65gV6la9EsBvcOehdQqiDjDJAz2icVLt2Wf1XP8nKWrEYMAXRePQ9eoyrQ', 'scope': 'openid', 'code': 'XYFYPLybXfqaqXlRAd3EU0bKPWgPiH_zRoPdARv2kcY.tumj0Kx52t767e_CoeW2dVNBEQlPzrctVD0EMU6j-ek', 'access_token': 'p6FZGRUpGoF7KiRbXS0DYrE86WRL1P4NKyW341JDhm8.TkPCJXZP1k27yOBbDyr0OQnIK2gReg7NOYRv13BRV2M', 'state': 'eIClgg4iLy43SioT', 'expires_in': 3599, 'token_type': 'bearer'}
2.691 AuthorizationResponse {
"access_token": "p6FZGRUpGoF7KiRbXS0DYrE86WRL1P4NKyW341JDhm8.TkPCJXZP1k27yOBbDyr0OQnIK2gReg7NOYRv13BRV2M",
"code": "XYFYPLybXfqaqXlRAd3EU0bKPWgPiH_zRoPdARv2kcY.tumj0Kx52t767e_CoeW2dVNBEQlPzrctVD0EMU6j-ek",
"expires_in": 3599,
"id_token": {
"at_hash": "Ms8HbwkDmTSODH7SykFTzg",
"aud": [
"59200b7d-46a2-445b-8c08-787faba6571e"
],
"auth_time": 1529751698,
"c_hash": "xVyzMArKSfh7m4m9N5WLOw",
"exp": 1529755337,
"iat": 1529751737,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "5f0a5d39-7eb9-4d68-9f7a-e0b729dbb9c9",
"nonce": "BWDF9iBLjKsE0ovF",
"rat": 1529751735,
"sub": "[email protected]"
},
"scope": "openid",
"state": "eIClgg4iLy43SioT",
"token_type": "bearer"
}
2.691 phase <--<-- 4 --- Done -->-->
2.691 end
2.691 assertion VerifyResponse
2.691 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.692 assertion CheckQueryPart
2.692 condition check-query-part: status=OK [Check that a query part send in the Authorization Request is returned in the Authorization response.]
2.692 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
check-query-part: status=OK [Check that a query part send in the Authorization Request is returned in the Authorization response.]
Done: status=OK
============================================================
RESULT: PASSED
./OP-IDToken-kid.txt 0000644 0000000 0000000 00000032563 13313424111 014272 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-IDToken-kid
Test description: IDToken has kid [Basic, Implicit, Hybrid]
Timestamp: 2018-06-23T11:00:25Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.072 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Registration -->-->
0.074 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.074 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#md7s1MeGBcFB16vi"
],
"response_types": [
"code id_token token"
]
}
0.265 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.266 RegistrationResponse {
"client_id": "3fdf1d2c-bbf1-41b1-8885-a0fb8ff443e3",
"client_secret": "iTZ.8xwkopbZ",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "3fdf1d2c-bbf1-41b1-8885-a0fb8ff443e3",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#md7s1MeGBcFB16vi"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.266 phase <--<-- 3 --- AsyncAuthn -->-->
0.267 AuthorizationRequest {
"client_id": "3fdf1d2c-bbf1-41b1-8885-a0fb8ff443e3",
"nonce": "vZf6JveaAQSZOkHp",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid",
"state": "xzBY7z58FlDH7au4"
}
0.267 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=3fdf1d2c-bbf1-41b1-8885-a0fb8ff443e3&state=xzBY7z58FlDH7au4&response_type=code+id_token+token&nonce=vZf6JveaAQSZOkHp
0.267 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=3fdf1d2c-bbf1-41b1-8885-a0fb8ff443e3&state=xzBY7z58FlDH7au4&response_type=code+id_token+token&nonce=vZf6JveaAQSZOkHp
2.933 http args {}
3.14 response URL with fragment
3.141 response access_token=k5YKP1cNnBx2ZTRBTsuBisvRo55bq_qgQHcyPpjyctQ.jRX2MG3V_R5WGliG9zgbpQDK1vS7ikNM8u8sk3AnKDc&code=lJVva3ANNY12_wl9Q1MhHEU5nbD2V4gLFPyoObftVt0.ItncuYaY_Z7GeWbVA5uRMmBudIu4X3kVFI9VD7bhMvI&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiQlZOQjZOeFJXcGxTMkVEVFNabDEtZyIsImF1ZCI6WyIzZmRmMWQyYy1iYmYxLTQxYjEtODg4NS1hMGZiOGZmNDQzZTMiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJ0RU1JTWdnMGZST3h5Vk51T2ttaHNRIiwiZXhwIjoxNTI5NzU1MjI0LCJpYXQiOjE1Mjk3NTE2MjQsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjBiZmJiOGRmLWIxZTAtNGQxZi1hNWU3LTNiYmJlZjA4MTQ4NiIsIm5vbmNlIjoidlpmNkp2ZWFBUVNaT2tIcCIsInJhdCI6MTUyOTc1MTYyMiwic3ViIjoiZm9vQGJhci5jb20ifQ.m5oFHl-I3BlazZnHXzILXS3LHSJBFJOOC_FgnlL8hk9j4wtE5lLnv6G5t0ZZ6hncdVaxoZqKRcDFskjFJzTnqV3OaNezgprW25oJ418jyh2BRZckGaJ8RgIG03p14QvnnU4w10ImluhFzeGpyH3k95UBMUSeA7x7mJFzFeATK4s1TOIfP4jLD7V20WauP9dckDdsV5_kL94kK8Jz7vj1BqYch1mxmB5_wRd0JFnlyBx6gpCOo3DKFayBa9azF73L1JTt1dZueArw5_SyguKmcHzhhBZcYwbULfPFigZxw3N6F9a4vI5nwarOknub0nL7d93AB-aTSL32V_MNC4Yt09hjrqqubeiRw0lRp71HjBmnHNpevfE5k54Wl_GwKNaoRapQ3OulFmXevVLA8gbdwt4lhpYSJuX4iTKWEbJBQJHfIyjMWwEe_U8L0wDKbLmsv4eTWNelHxJwqPQbHVL0SvuNPTjR_ADdzpw0qTVigAjZdtoIJ4MX2aUZiC_3Bv6ZTjzS4S_jSf3sBJSEGbNgw6fVAIe6eUsIgkGjyNjqu42IjwpELOh1i90QXXzeR0jjHJU15ZYjybiq7UUwjnTZCxUfI3EzroF1dKKUucyoz4hFkEFcftO3snFwXwQbjH56-QN64noE9OkhP5s4uQ-9oVI1iYQjwL4s6MmXDx8eCTo&scope=openid&state=xzBY7z58FlDH7au4&token_type=bearer
3.141 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiQlZOQjZOeFJXcGxTMkVEVFNabDEtZyIsImF1ZCI6WyIzZmRmMWQyYy1iYmYxLTQxYjEtODg4NS1hMGZiOGZmNDQzZTMiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJ0RU1JTWdnMGZST3h5Vk51T2ttaHNRIiwiZXhwIjoxNTI5NzU1MjI0LCJpYXQiOjE1Mjk3NTE2MjQsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjBiZmJiOGRmLWIxZTAtNGQxZi1hNWU3LTNiYmJlZjA4MTQ4NiIsIm5vbmNlIjoidlpmNkp2ZWFBUVNaT2tIcCIsInJhdCI6MTUyOTc1MTYyMiwic3ViIjoiZm9vQGJhci5jb20ifQ.m5oFHl-I3BlazZnHXzILXS3LHSJBFJOOC_FgnlL8hk9j4wtE5lLnv6G5t0ZZ6hncdVaxoZqKRcDFskjFJzTnqV3OaNezgprW25oJ418jyh2BRZckGaJ8RgIG03p14QvnnU4w10ImluhFzeGpyH3k95UBMUSeA7x7mJFzFeATK4s1TOIfP4jLD7V20WauP9dckDdsV5_kL94kK8Jz7vj1BqYch1mxmB5_wRd0JFnlyBx6gpCOo3DKFayBa9azF73L1JTt1dZueArw5_SyguKmcHzhhBZcYwbULfPFigZxw3N6F9a4vI5nwarOknub0nL7d93AB-aTSL32V_MNC4Yt09hjrqqubeiRw0lRp71HjBmnHNpevfE5k54Wl_GwKNaoRapQ3OulFmXevVLA8gbdwt4lhpYSJuX4iTKWEbJBQJHfIyjMWwEe_U8L0wDKbLmsv4eTWNelHxJwqPQbHVL0SvuNPTjR_ADdzpw0qTVigAjZdtoIJ4MX2aUZiC_3Bv6ZTjzS4S_jSf3sBJSEGbNgw6fVAIe6eUsIgkGjyNjqu42IjwpELOh1i90QXXzeR0jjHJU15ZYjybiq7UUwjnTZCxUfI3EzroF1dKKUucyoz4hFkEFcftO3snFwXwQbjH56-QN64noE9OkhP5s4uQ-9oVI1iYQjwL4s6MmXDx8eCTo', 'scope': 'openid', 'code': 'lJVva3ANNY12_wl9Q1MhHEU5nbD2V4gLFPyoObftVt0.ItncuYaY_Z7GeWbVA5uRMmBudIu4X3kVFI9VD7bhMvI', 'access_token': 'k5YKP1cNnBx2ZTRBTsuBisvRo55bq_qgQHcyPpjyctQ.jRX2MG3V_R5WGliG9zgbpQDK1vS7ikNM8u8sk3AnKDc', 'state': 'xzBY7z58FlDH7au4', 'expires_in': 3599, 'token_type': 'bearer'}
3.219 AuthorizationResponse {
"access_token": "k5YKP1cNnBx2ZTRBTsuBisvRo55bq_qgQHcyPpjyctQ.jRX2MG3V_R5WGliG9zgbpQDK1vS7ikNM8u8sk3AnKDc",
"code": "lJVva3ANNY12_wl9Q1MhHEU5nbD2V4gLFPyoObftVt0.ItncuYaY_Z7GeWbVA5uRMmBudIu4X3kVFI9VD7bhMvI",
"expires_in": 3599,
"id_token": {
"at_hash": "BVNB6NxRWplS2EDTSZl1-g",
"aud": [
"3fdf1d2c-bbf1-41b1-8885-a0fb8ff443e3"
],
"auth_time": 1529751409,
"c_hash": "tEMIMgg0fROxyVNuOkmhsQ",
"exp": 1529755224,
"iat": 1529751624,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "0bfbb8df-b1e0-4d1f-a5e7-3bbbef081486",
"nonce": "vZf6JveaAQSZOkHp",
"rat": 1529751622,
"sub": "[email protected]"
},
"scope": "openid",
"state": "xzBY7z58FlDH7au4",
"token_type": "bearer"
}
3.219 phase <--<-- 4 --- AccessToken -->-->
3.219 --> request op_args: {'state': 'xzBY7z58FlDH7au4'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.219 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'xzBY7z58FlDH7au4', 'code': 'lJVva3ANNY12_wl9Q1MhHEU5nbD2V4gLFPyoObftVt0.ItncuYaY_Z7GeWbVA5uRMmBudIu4X3kVFI9VD7bhMvI', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '3fdf1d2c-bbf1-41b1-8885-a0fb8ff443e3'}, 'state': 'xzBY7z58FlDH7au4'}
3.219 AccessTokenRequest {
"code": "lJVva3ANNY12_wl9Q1MhHEU5nbD2V4gLFPyoObftVt0.ItncuYaY_Z7GeWbVA5uRMmBudIu4X3kVFI9VD7bhMvI",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "xzBY7z58FlDH7au4"
}
3.219 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.219 request_http_args {'headers': {'Authorization': 'Basic M2ZkZjFkMmMtYmJmMS00MWIxLTg4ODUtYTBmYjhmZjQ0M2UzOmlUWi44eHdrb3BiWg==', 'Content-Type': 'application/x-www-form-urlencoded'}}
3.219 request code=lJVva3ANNY12_wl9Q1MhHEU5nbD2V4gLFPyoObftVt0.ItncuYaY_Z7GeWbVA5uRMmBudIu4X3kVFI9VD7bhMvI&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=xzBY7z58FlDH7au4
3.445 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.446 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiQlZOQjZOeFJXcGxTMkVEVFNabDEtZyIsImF1ZCI6WyIzZmRmMWQyYy1iYmYxLTQxYjEtODg4NS1hMGZiOGZmNDQzZTMiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJ0RU1JTWdnMGZST3h5Vk51T2ttaHNRIiwiZXhwIjoxNTI5NzU1MjI0LCJpYXQiOjE1Mjk3NTE2MjUsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjFiOGJkNjcxLTI5ZjctNGM1NC04ZDgwLWRiZmEyNGRmYTRhMSIsIm5vbmNlIjoidlpmNkp2ZWFBUVNaT2tIcCIsInJhdCI6MTUyOTc1MTYyMiwic3ViIjoiZm9vQGJhci5jb20ifQ.r89SXGPrt4tKhtDNS9LzyKPWkoS7i7KqwZ6M1vRZ5ZvZ2Q2zWfpw610VeY3GodAr6FLEfKXdS8oOJUxyA9pyfv9SolS1i_CMGMPeB8f6CKhM9Ig-BYHcXHMmrCazhaN_V-EtFNGcOauWEUhL34kwbEqbCe-BBCC0jEZ8uUcfB98zYq31bflqYP2nwb_CinIcakbRQzzTWfVVkPG-8i6dMKP56SmdaiKIEj3f0qfEjx95ObqIUWpciFreaQc4KxttZbCfozyis3N61dMWAcxQCR8zPJn-Q5FAfrZorEVLiMUCliwpnvKwAV7BzmkKyhpDsaCZ8stybmuXffhmWQ-5VwJTWis1FpY8BJWSJDqaP4FOmElJzGna_mgBlOy9ICuMb6IPTbWzaeR4HzCCfJ8bk5ITnu6H3PqrvMkQV2mq74iMAOdjckQPp4nOy0Q72wLomjWcUv6TOrCzRFwoGrIJFGtSAWDoO3vewCH6WmV74YfXYAFB4sd3aotgWwKbV5fCGvRTV-P5cDEYrpvxyBofAXSmBcP1E62P2fDckjKDhHUGlNzX4Y99VD2icmiyNB40Bjemgflz3waLpeYyltjkKH6-6sIzg5oxau_Es-s5HTrjQX0nSed2MhkX5Iyk0yccbemju6-gNy8IFgI82N1jVY4mUHnE40KtN_I1qzhXrws', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': '4SqIQu8ptYnyrHUng7Bny9X7OmFjRug1fAKxZ7stZ28.N3FbqDZA90oFiONM0LG1lCQeCx86xTK-vbGlwumLOcc', 'scope': 'openid'}
3.45 AccessTokenResponse {
"access_token": "4SqIQu8ptYnyrHUng7Bny9X7OmFjRug1fAKxZ7stZ28.N3FbqDZA90oFiONM0LG1lCQeCx86xTK-vbGlwumLOcc",
"expires_in": 3599,
"id_token": {
"at_hash": "BVNB6NxRWplS2EDTSZl1-g",
"aud": [
"3fdf1d2c-bbf1-41b1-8885-a0fb8ff443e3"
],
"auth_time": 1529751409,
"c_hash": "tEMIMgg0fROxyVNuOkmhsQ",
"exp": 1529755224,
"iat": 1529751625,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "1b8bd671-29f7-4c54-8d80-dbfa24dfa4a1",
"nonce": "vZf6JveaAQSZOkHp",
"rat": 1529751622,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.45 phase <--<-- 5 --- Done -->-->
3.45 end
3.45 assertion VerifySignedIdTokenHasKID
3.45 condition verify-signed-idtoken-has-kid: status=OK [Verifies that the header of a signed IDToken includes a kid claim.]
3.451 assertion VerifyResponse
3.451 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.451 condition Done: status=OK
============================================================
Conditions
verify-signed-idtoken-has-kid: status=OK [Verifies that the header of a signed IDToken includes a kid claim.]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Req-claims_locales.txt 0000644 0000000 0000000 00000033556 13313424367 015747 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-claims_locales
Test description: Providing claims_locales
Timestamp: 2018-06-23T11:03:19Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.263 phase <--<-- 1 --- Webfinger -->-->
1.263 not expected to do WebFinger
1.263 phase <--<-- 2 --- Discovery -->-->
1.264 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.345 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.347 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.347 phase <--<-- 3 --- Registration -->-->
1.347 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.347 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#pyU4HlSb3ojHgOiL"
],
"response_types": [
"code id_token token"
]
}
1.504 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.505 RegistrationResponse {
"client_id": "4ddc87ba-7ee4-43c4-9736-753a116b18c8",
"client_secret": "M1jHXybW8m6v",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "4ddc87ba-7ee4-43c4-9736-753a116b18c8",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#pyU4HlSb3ojHgOiL"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.505 phase <--<-- 4 --- AsyncAuthn -->-->
1.506 AuthorizationRequest {
"claims_locales": "se",
"client_id": "4ddc87ba-7ee4-43c4-9736-753a116b18c8",
"nonce": "sJoX9J8f75kuTb6z",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid",
"state": "RyTP0REkUif0Gfhn"
}
1.506 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=4ddc87ba-7ee4-43c4-9736-753a116b18c8&state=RyTP0REkUif0Gfhn&response_type=code+id_token+token&nonce=sJoX9J8f75kuTb6z&claims_locales=se
1.506 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=4ddc87ba-7ee4-43c4-9736-753a116b18c8&state=RyTP0REkUif0Gfhn&response_type=code+id_token+token&nonce=sJoX9J8f75kuTb6z&claims_locales=se
4.229 http args {}
4.441 response URL with fragment
4.441 response access_token=ashmt2TAwt3kUif8H-ymSNgznUTEIL6D2NJbwBF0W4I.0wnOC5V6AhlSnWcJGXg8kgpPbO4eR4cmtt4R1B3axvY&code=7qK3p2ldr7YF6eDgLWwohGy5X4Uca4m_IDEdVY1qwkU.8Z3XtkuCgAZH3U6ZdATvDB2fCzLoxw3F-IL2d-coBD0&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiV1RDNzFaQXNqcjBGRkFMVmJzQVMyQSIsImF1ZCI6WyI0ZGRjODdiYS03ZWU0LTQzYzQtOTczNi03NTNhMTE2YjE4YzgiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiJFM3hRMThKZnNRM2d4T1ZZMlR2OFpRIiwiZXhwIjoxNTI5NzU1Mzk4LCJpYXQiOjE1Mjk3NTE3OTgsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjBhMjg1YzUxLTUzZDYtNDc1Yy04OTUxLWZjODI1Y2YwMWNkZSIsIm5vbmNlIjoic0pvWDlKOGY3NWt1VGI2eiIsInJhdCI6MTUyOTc1MTc5Niwic3ViIjoiZm9vQGJhci5jb20ifQ.Hvfnk324mvAAfoedSLyarNz_9qQQYJwbf4RJehZtg5zc4L_L8a81mSirKtmzZQEbweREHWwBCNUlD-IKYsXh2cMlkf3phZgDgMYprNmXo9-uC6gEvTUa6JMsNrzyDgYneIuKYlcZuEwMqyVuA9pjNO4n7mJpJUlvpswPyky5mUvIgXdgn0CRBeTpFDFGrCE4VdBf6LUM3iVMnwejrIqHsaaMhdaGX3PqRmOLCJUH1uqmpq_eoXqYfQJdpituOEwThiB8zwImuBzrtchG07tyZI7NumUZ2xlHURhoqA-WHAlfLnwvo6a5SuhcorFTYE-OZAjZK_0QmX4Nk4E2brR5tQ_2mtrswVy8jHEdD_fNpESv_5JwuH-XdINvRqOlnGXbgC6s4H26rr4GXtnf0JHbRI3f5g3BkBJYZ9EexWJW_t1Fe3AogLjnWERkbDmrm08I64fEZNPla2gJMlEQAnxzuBACYRFQ2AkbRAp8taQ-bC13LY2h88v08WNQXEPWpdQvjgrGy4USnmTX1NJILmm4SdPvXhXoofk2DtRl87gQO2jb5Ajupnjo3FB_S3aZFDkDVFM6sOdU3Th1l88OU-gOVDea7g5pLoHMrXS34Y5mmCcmFl5ZnuKzqv0tJL_FOZS4RMGFU82ou5uAH365-BxT5S_RCcY1ij9Y6nv6r1OxhfY&scope=openid&state=RyTP0REkUif0Gfhn&token_type=bearer
4.442 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiV1RDNzFaQXNqcjBGRkFMVmJzQVMyQSIsImF1ZCI6WyI0ZGRjODdiYS03ZWU0LTQzYzQtOTczNi03NTNhMTE2YjE4YzgiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiJFM3hRMThKZnNRM2d4T1ZZMlR2OFpRIiwiZXhwIjoxNTI5NzU1Mzk4LCJpYXQiOjE1Mjk3NTE3OTgsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjBhMjg1YzUxLTUzZDYtNDc1Yy04OTUxLWZjODI1Y2YwMWNkZSIsIm5vbmNlIjoic0pvWDlKOGY3NWt1VGI2eiIsInJhdCI6MTUyOTc1MTc5Niwic3ViIjoiZm9vQGJhci5jb20ifQ.Hvfnk324mvAAfoedSLyarNz_9qQQYJwbf4RJehZtg5zc4L_L8a81mSirKtmzZQEbweREHWwBCNUlD-IKYsXh2cMlkf3phZgDgMYprNmXo9-uC6gEvTUa6JMsNrzyDgYneIuKYlcZuEwMqyVuA9pjNO4n7mJpJUlvpswPyky5mUvIgXdgn0CRBeTpFDFGrCE4VdBf6LUM3iVMnwejrIqHsaaMhdaGX3PqRmOLCJUH1uqmpq_eoXqYfQJdpituOEwThiB8zwImuBzrtchG07tyZI7NumUZ2xlHURhoqA-WHAlfLnwvo6a5SuhcorFTYE-OZAjZK_0QmX4Nk4E2brR5tQ_2mtrswVy8jHEdD_fNpESv_5JwuH-XdINvRqOlnGXbgC6s4H26rr4GXtnf0JHbRI3f5g3BkBJYZ9EexWJW_t1Fe3AogLjnWERkbDmrm08I64fEZNPla2gJMlEQAnxzuBACYRFQ2AkbRAp8taQ-bC13LY2h88v08WNQXEPWpdQvjgrGy4USnmTX1NJILmm4SdPvXhXoofk2DtRl87gQO2jb5Ajupnjo3FB_S3aZFDkDVFM6sOdU3Th1l88OU-gOVDea7g5pLoHMrXS34Y5mmCcmFl5ZnuKzqv0tJL_FOZS4RMGFU82ou5uAH365-BxT5S_RCcY1ij9Y6nv6r1OxhfY', 'scope': 'openid', 'code': '7qK3p2ldr7YF6eDgLWwohGy5X4Uca4m_IDEdVY1qwkU.8Z3XtkuCgAZH3U6ZdATvDB2fCzLoxw3F-IL2d-coBD0', 'access_token': 'ashmt2TAwt3kUif8H-ymSNgznUTEIL6D2NJbwBF0W4I.0wnOC5V6AhlSnWcJGXg8kgpPbO4eR4cmtt4R1B3axvY', 'state': 'RyTP0REkUif0Gfhn', 'expires_in': 3599, 'token_type': 'bearer'}
4.554 AuthorizationResponse {
"access_token": "ashmt2TAwt3kUif8H-ymSNgznUTEIL6D2NJbwBF0W4I.0wnOC5V6AhlSnWcJGXg8kgpPbO4eR4cmtt4R1B3axvY",
"code": "7qK3p2ldr7YF6eDgLWwohGy5X4Uca4m_IDEdVY1qwkU.8Z3XtkuCgAZH3U6ZdATvDB2fCzLoxw3F-IL2d-coBD0",
"expires_in": 3599,
"id_token": {
"at_hash": "WTC71ZAsjr0FFALVbsAS2A",
"aud": [
"4ddc87ba-7ee4-43c4-9736-753a116b18c8"
],
"auth_time": 1529751698,
"c_hash": "E3xQ18JfsQ3gxOVY2Tv8ZQ",
"exp": 1529755398,
"iat": 1529751798,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "0a285c51-53d6-475c-8951-fc825cf01cde",
"nonce": "sJoX9J8f75kuTb6z",
"rat": 1529751796,
"sub": "[email protected]"
},
"scope": "openid",
"state": "RyTP0REkUif0Gfhn",
"token_type": "bearer"
}
4.555 phase <--<-- 5 --- AccessToken -->-->
4.555 --> request op_args: {'state': 'RyTP0REkUif0Gfhn'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
4.555 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'RyTP0REkUif0Gfhn', 'code': '7qK3p2ldr7YF6eDgLWwohGy5X4Uca4m_IDEdVY1qwkU.8Z3XtkuCgAZH3U6ZdATvDB2fCzLoxw3F-IL2d-coBD0', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '4ddc87ba-7ee4-43c4-9736-753a116b18c8'}, 'state': 'RyTP0REkUif0Gfhn'}
4.555 AccessTokenRequest {
"code": "7qK3p2ldr7YF6eDgLWwohGy5X4Uca4m_IDEdVY1qwkU.8Z3XtkuCgAZH3U6ZdATvDB2fCzLoxw3F-IL2d-coBD0",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "RyTP0REkUif0Gfhn"
}
4.555 request_url https://oidc-certification.ory.sh:8443/oauth2/token
4.555 request_http_args {'headers': {'Authorization': 'Basic NGRkYzg3YmEtN2VlNC00M2M0LTk3MzYtNzUzYTExNmIxOGM4Ok0xakhYeWJXOG02dg==', 'Content-Type': 'application/x-www-form-urlencoded'}}
4.555 request code=7qK3p2ldr7YF6eDgLWwohGy5X4Uca4m_IDEdVY1qwkU.8Z3XtkuCgAZH3U6ZdATvDB2fCzLoxw3F-IL2d-coBD0&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=RyTP0REkUif0Gfhn
4.814 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
4.816 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiV1RDNzFaQXNqcjBGRkFMVmJzQVMyQSIsImF1ZCI6WyI0ZGRjODdiYS03ZWU0LTQzYzQtOTczNi03NTNhMTE2YjE4YzgiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiJFM3hRMThKZnNRM2d4T1ZZMlR2OFpRIiwiZXhwIjoxNTI5NzU1Mzk4LCJpYXQiOjE1Mjk3NTE3OTksImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImQ5MGY1ZTJkLTFmZDgtNGVjMi1hY2U2LWFkM2ExODViNTU4ZiIsIm5vbmNlIjoic0pvWDlKOGY3NWt1VGI2eiIsInJhdCI6MTUyOTc1MTc5Niwic3ViIjoiZm9vQGJhci5jb20ifQ.c29v0CjMEJaiK643aWpy5V5_bEtR7FLPfX7q4rFV2tC3ryjvUXnMynbyy-0b97nGokjaFT75uK7ytqsgrfbBgG330wD8TucntcycBC0kBrkkCpLesaT_hJNqXAcaqce0K5ZUU_qa8awrmES6FX_wUs1i79sJfjYpfrGRTQ7BBNrhX9AFiv4e8laSl_maLtMXFUmjUga9YZ4uQYeJb_COsHWUsb138fK0TuupOjmIUiz9R3Npe1e7EDVc1ixYEbSbDGY77zsM22itTjQtsKqAoLozIkxFebvNQeOE4bKPtllectFvzpJbHL8aswSFB-ECJuNA16tMKZqDgqtKxbf3z9V5tg5myP5q1eA_JZ9HSdnnLXjZxGQWxGKnwi1pNiHf1IYQKHNLueIpzd9hLDSxaTdqRkIgaX9kso4domRkW5Cy8FJ7b2MYrVBmQtgh5LA8YVYfCZ5IPEnk0q839ZFuSmv6fg8gRfsg-mOooB3B7Bdwo1_96qDbRFQdm-eiWiSNjW7qLG5Uk3gA8SYO2YRbMIuoA7sJ0RURZyGQAU2TYPBCDtGth2QhUo4NMvbpAQexxAqvalUqA0_XZSgjNKBCqI1sw7xdDYNogVw_vrsPjc-xw6uhwROTW9eoI_FH1kIuGdeVCSwexhl-xGvI7fWgttWEAXu2HiNAUXuwgRiaftE', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': '8GGEGKImvK2x8YwzuS6h27RyyLIB3As6S09sGDFaiEM.5R0U2vrrKXNfjzMWG0vEmymllSclU90N96-eJE3atsA', 'scope': 'openid'}
4.819 AccessTokenResponse {
"access_token": "8GGEGKImvK2x8YwzuS6h27RyyLIB3As6S09sGDFaiEM.5R0U2vrrKXNfjzMWG0vEmymllSclU90N96-eJE3atsA",
"expires_in": 3599,
"id_token": {
"at_hash": "WTC71ZAsjr0FFALVbsAS2A",
"aud": [
"4ddc87ba-7ee4-43c4-9736-753a116b18c8"
],
"auth_time": 1529751698,
"c_hash": "E3xQ18JfsQ3gxOVY2Tv8ZQ",
"exp": 1529755398,
"iat": 1529751799,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "d90f5e2d-1fd8-4ec2-ace6-ad3a185b558f",
"nonce": "sJoX9J8f75kuTb6z",
"rat": 1529751796,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
4.819 phase <--<-- 6 --- UserInfo -->-->
4.819 do_user_info_request kwargs:{'state': 'RyTP0REkUif0Gfhn', 'method': 'GET', 'authn_method': 'bearer_header'}
4.819 request {'body': None}
4.819 request_url https://oidc-certification.ory.sh:8443/userinfo
4.819 request_http_args {'headers': {'Authorization': 'Bearer 8GGEGKImvK2x8YwzuS6h27RyyLIB3As6S09sGDFaiEM.5R0U2vrrKXNfjzMWG0vEmymllSclU90N96-eJE3atsA'}}
4.894 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
4.895 OpenIDSchema {
"sub": "[email protected]"
}
4.895 OpenIDSchema {
"sub": "[email protected]"
}
4.895 phase <--<-- 7 --- DisplayUserInfo -->-->
4.895 phase <--<-- 8 --- Done -->-->
4.895 end
4.896 assertion CheckHTTPResponse
4.896 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
4.896 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Rotation-RP-Sig.txt 0000644 0000000 0000000 00000050400 13313424624 015065 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Rotation-RP-Sig
Test description: Request access token, change RSA signing key and request another access token
Timestamp: 2018-06-23T11:05:56Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.108 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.11 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.11 phase <--<-- 2 --- Registration -->-->
0.11 register kwargs:{'application_name': 'OIC test tool', 'token_endpoint_auth_method': 'private_key_jwt', 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'refresh_token'], 'response_types': ['code id_token token'], 'url': 'https://oidc-certification.ory.sh:8443/clients', 'application_type': 'web'}
0.11 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit",
"refresh_token"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Rp4bYsORwLFuvpUd"
],
"response_types": [
"code id_token token"
],
"token_endpoint_auth_method": "private_key_jwt"
}
0.302 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.303 RegistrationResponse {
"client_id": "2dc6d043-f5b6-43c0-90a9-bd1dd7e98ccf",
"client_secret": "0up.9w~Q.L9F",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit",
"refresh_token"
],
"id": "2dc6d043-f5b6-43c0-90a9-bd1dd7e98ccf",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Rp4bYsORwLFuvpUd"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "private_key_jwt",
"userinfo_signed_response_alg": "none"
}
0.303 phase <--<-- 3 --- AsyncAuthn -->-->
0.303 AuthorizationRequest {
"client_id": "2dc6d043-f5b6-43c0-90a9-bd1dd7e98ccf",
"nonce": "YfvpmLaxbEhAysNS",
"prompt": [
"consent"
],
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid offline_access",
"state": "xeWP5db6x7nsntz4"
}
0.304 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=consent&scope=openid+offline_access&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=2dc6d043-f5b6-43c0-90a9-bd1dd7e98ccf&state=xeWP5db6x7nsntz4&response_type=code+id_token+token&nonce=YfvpmLaxbEhAysNS
0.304 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=consent&scope=openid+offline_access&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=2dc6d043-f5b6-43c0-90a9-bd1dd7e98ccf&state=xeWP5db6x7nsntz4&response_type=code+id_token+token&nonce=YfvpmLaxbEhAysNS
3.931 http args {}
4.132 response URL with fragment
4.132 response access_token=Ov4B9x9o16ZAkKOgge7S3xEAXkl5k_8YOt0G5qgXW9w.Bimh1qDv9um0n2imI3S6NPX3S8MzstUcM1Vr95oHgsU&code=wTs31ITczgvIAz8fKZjJpDAVk2oqhgd8kzl5jk9E0xA.Ybz4plFgZf28MSjlqe8VNOjuIfMMRf2fkh6WGPfiz_A&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiZlpNMF81dXdFeTJQV3JZQWNMSUQ1dyIsImF1ZCI6WyIyZGM2ZDA0My1mNWI2LTQzYzAtOTBhOS1iZDFkZDdlOThjY2YiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiIwdUxzR2tKSU9TQ3ptWWdfRXJ0MVN3IiwiZXhwIjoxNTI5NzU1NTU1LCJpYXQiOjE1Mjk3NTE5NTUsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6Ijk4NmJiNzFlLWEzYjAtNDk0NS05YTYzLWMyNjUwYmFkYTBkMyIsIm5vbmNlIjoiWWZ2cG1MYXhiRWhBeXNOUyIsInJhdCI6MTUyOTc1MTk1Miwic3ViIjoiZm9vQGJhci5jb20ifQ.d-a5jtRHtofno5_oA_cZK5-pWifkNYewymgQOQrCvm4M3UQ4mivw0szxkQVMvOAVluWIAVprRFjOleQIT0ZKRDAYPylkXlK_Gyitb25PvPuuFiarOgbHpHeifFSe6HbI3tYVvbyZxsQRLe6OA3ZSeIT7Z7b9tsIu8AKKenx7k16Yp5vyYo5KHbbUEMleujDL9xKaXG14p4p-CGW6ot2HK_FPGcdp5vpEA9jBVTdn0zTadpqDtukyQUflrRASRiXTytlMVkAf6YedASk6aLAMvAcAKZfzSC-y9f1xmxY7UJbwnuWtAK6NK-TP7c2gHy4-s0je3lhes-yuVYTwIapLPqMlyM5Se6_Q59cz1M7vkrj1hvbBX2RnB0FkDBj6zORJjGfQevxga-KXgTXW8fNuEUFg-gU5pCSGIM7G7ldHFNK8L15rIQa115UtR6aGH29YweO_qgcmX-TPFVfdzjUGjqHaUTEccnp3cCh2GCwy1ZNIyBQd7rZc3wq-qNDsyQ1wuqnZ221u93a1DW38VCSdvfLVTRTPCIeRfL9hvUUUkLuC8az4kEbcU5D5GvbqHmHrzx0c_EQwVLE9TToaYsSTTCZLjho73JeE5XrPXJ-Az-4GULlb_rD5IgKESddqe2teBBuJhspo72Eyp4l9HdHVHsHPexkiOlw-lhoCsniwUXQ&scope=openid%20offline_access&state=xeWP5db6x7nsntz4&token_type=bearer
4.133 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiZlpNMF81dXdFeTJQV3JZQWNMSUQ1dyIsImF1ZCI6WyIyZGM2ZDA0My1mNWI2LTQzYzAtOTBhOS1iZDFkZDdlOThjY2YiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiIwdUxzR2tKSU9TQ3ptWWdfRXJ0MVN3IiwiZXhwIjoxNTI5NzU1NTU1LCJpYXQiOjE1Mjk3NTE5NTUsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6Ijk4NmJiNzFlLWEzYjAtNDk0NS05YTYzLWMyNjUwYmFkYTBkMyIsIm5vbmNlIjoiWWZ2cG1MYXhiRWhBeXNOUyIsInJhdCI6MTUyOTc1MTk1Miwic3ViIjoiZm9vQGJhci5jb20ifQ.d-a5jtRHtofno5_oA_cZK5-pWifkNYewymgQOQrCvm4M3UQ4mivw0szxkQVMvOAVluWIAVprRFjOleQIT0ZKRDAYPylkXlK_Gyitb25PvPuuFiarOgbHpHeifFSe6HbI3tYVvbyZxsQRLe6OA3ZSeIT7Z7b9tsIu8AKKenx7k16Yp5vyYo5KHbbUEMleujDL9xKaXG14p4p-CGW6ot2HK_FPGcdp5vpEA9jBVTdn0zTadpqDtukyQUflrRASRiXTytlMVkAf6YedASk6aLAMvAcAKZfzSC-y9f1xmxY7UJbwnuWtAK6NK-TP7c2gHy4-s0je3lhes-yuVYTwIapLPqMlyM5Se6_Q59cz1M7vkrj1hvbBX2RnB0FkDBj6zORJjGfQevxga-KXgTXW8fNuEUFg-gU5pCSGIM7G7ldHFNK8L15rIQa115UtR6aGH29YweO_qgcmX-TPFVfdzjUGjqHaUTEccnp3cCh2GCwy1ZNIyBQd7rZc3wq-qNDsyQ1wuqnZ221u93a1DW38VCSdvfLVTRTPCIeRfL9hvUUUkLuC8az4kEbcU5D5GvbqHmHrzx0c_EQwVLE9TToaYsSTTCZLjho73JeE5XrPXJ-Az-4GULlb_rD5IgKESddqe2teBBuJhspo72Eyp4l9HdHVHsHPexkiOlw-lhoCsniwUXQ', 'scope': 'openid offline_access', 'code': 'wTs31ITczgvIAz8fKZjJpDAVk2oqhgd8kzl5jk9E0xA.Ybz4plFgZf28MSjlqe8VNOjuIfMMRf2fkh6WGPfiz_A', 'access_token': 'Ov4B9x9o16ZAkKOgge7S3xEAXkl5k_8YOt0G5qgXW9w.Bimh1qDv9um0n2imI3S6NPX3S8MzstUcM1Vr95oHgsU', 'state': 'xeWP5db6x7nsntz4', 'expires_in': 3599, 'token_type': 'bearer'}
4.215 AuthorizationResponse {
"access_token": "Ov4B9x9o16ZAkKOgge7S3xEAXkl5k_8YOt0G5qgXW9w.Bimh1qDv9um0n2imI3S6NPX3S8MzstUcM1Vr95oHgsU",
"code": "wTs31ITczgvIAz8fKZjJpDAVk2oqhgd8kzl5jk9E0xA.Ybz4plFgZf28MSjlqe8VNOjuIfMMRf2fkh6WGPfiz_A",
"expires_in": 3599,
"id_token": {
"at_hash": "fZM0_5uwEy2PWrYAcLID5w",
"aud": [
"2dc6d043-f5b6-43c0-90a9-bd1dd7e98ccf"
],
"auth_time": 1529751824,
"c_hash": "0uLsGkJIOSCzmYg_Ert1Sw",
"exp": 1529755555,
"iat": 1529751955,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "986bb71e-a3b0-4945-9a63-c2650bada0d3",
"nonce": "YfvpmLaxbEhAysNS",
"rat": 1529751952,
"sub": "[email protected]"
},
"scope": "openid offline_access",
"state": "xeWP5db6x7nsntz4",
"token_type": "bearer"
}
4.216 phase <--<-- 4 --- AccessToken -->-->
4.216 --> request op_args: {'state': 'xeWP5db6x7nsntz4', 'authn_method': 'private_key_jwt'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
4.216 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'xeWP5db6x7nsntz4', 'code': 'wTs31ITczgvIAz8fKZjJpDAVk2oqhgd8kzl5jk9E0xA.Ybz4plFgZf28MSjlqe8VNOjuIfMMRf2fkh6WGPfiz_A', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '2dc6d043-f5b6-43c0-90a9-bd1dd7e98ccf'}, 'state': 'xeWP5db6x7nsntz4', 'authn_method': 'private_key_jwt'}
4.216 AccessTokenRequest {
"client_assertion": "eyJhbGciOiJSUzI1NiIsImtpZCI6Ind0MjVPZ3lSX256RzNPb1E3ZGFhMnJMNi1nTW5GZGZSekJqaFVWUHU4UlEifQ.eyJpc3MiOiAiMmRjNmQwNDMtZjViNi00M2MwLTkwYTktYmQxZGQ3ZTk4Y2NmIiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiMmRjNmQwNDMtZjViNi00M2MwLTkwYTktYmQxZGQ3ZTk4Y2NmIiwgImlhdCI6IDE1Mjk3NTE5NTYsICJqdGkiOiAick5BZDl1MVlqWFpqcnZZNVdvREtMM2poWGNiSVl5SFMiLCAiZXhwIjogMTUyOTc1MjU1Nn0.qvTx51ICsRZlWOqE9ylhYdY0AEzDF_pNZ2d7_edlyUV-m71paZtGbsS8aAY3SYMHUgYxU4SPS7pKVvDoDYHbAo-V1QDcxSPktfnO_hZdsHJOh__FlvgWdmTpxqbdP2rBIuxJ7HuLN-BzathMNbqbHCr8Lf3rNbx2RuOk2sAWNRLIiWyIlged3UaIv1s7KVgDdKdgXW4M4gyGzJIcCle2g1KcptrG8inOC-4JUGsKOXLbikxg4LGnFdAitYp1j0-JIJTB5uAcBsvoAAeW8aPGyBGafHB9KagRTs0-AoNn_c6GtCQFlB_u8kyKgCKQ-mQfKlAz7V9mSvSfOr6uQJYvUg",
"client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer",
"code": "wTs31ITczgvIAz8fKZjJpDAVk2oqhgd8kzl5jk9E0xA.Ybz4plFgZf28MSjlqe8VNOjuIfMMRf2fkh6WGPfiz_A",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "xeWP5db6x7nsntz4"
}
4.219 request_url https://oidc-certification.ory.sh:8443/oauth2/token
4.219 request_http_args {'headers': {'Content-Type': 'application/x-www-form-urlencoded'}}
4.219 request code=wTs31ITczgvIAz8fKZjJpDAVk2oqhgd8kzl5jk9E0xA.Ybz4plFgZf28MSjlqe8VNOjuIfMMRf2fkh6WGPfiz_A&client_assertion_type=urn%3Aietf%3Aparams%3Aoauth%3Aclient-assertion-type%3Ajwt-bearer&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=xeWP5db6x7nsntz4&client_assertion=eyJhbGciOiJSUzI1NiIsImtpZCI6Ind0MjVPZ3lSX256RzNPb1E3ZGFhMnJMNi1nTW5GZGZSekJqaFVWUHU4UlEifQ.eyJpc3MiOiAiMmRjNmQwNDMtZjViNi00M2MwLTkwYTktYmQxZGQ3ZTk4Y2NmIiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiMmRjNmQwNDMtZjViNi00M2MwLTkwYTktYmQxZGQ3ZTk4Y2NmIiwgImlhdCI6IDE1Mjk3NTE5NTYsICJqdGkiOiAick5BZDl1MVlqWFpqcnZZNVdvREtMM2poWGNiSVl5SFMiLCAiZXhwIjogMTUyOTc1MjU1Nn0.qvTx51ICsRZlWOqE9ylhYdY0AEzDF_pNZ2d7_edlyUV-m71paZtGbsS8aAY3SYMHUgYxU4SPS7pKVvDoDYHbAo-V1QDcxSPktfnO_hZdsHJOh__FlvgWdmTpxqbdP2rBIuxJ7HuLN-BzathMNbqbHCr8Lf3rNbx2RuOk2sAWNRLIiWyIlged3UaIv1s7KVgDdKdgXW4M4gyGzJIcCle2g1KcptrG8inOC-4JUGsKOXLbikxg4LGnFdAitYp1j0-JIJTB5uAcBsvoAAeW8aPGyBGafHB9KagRTs0-AoNn_c6GtCQFlB_u8kyKgCKQ-mQfKlAz7V9mSvSfOr6uQJYvUg
4.357 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
4.358 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiZlpNMF81dXdFeTJQV3JZQWNMSUQ1dyIsImF1ZCI6WyIyZGM2ZDA0My1mNWI2LTQzYzAtOTBhOS1iZDFkZDdlOThjY2YiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiIwdUxzR2tKSU9TQ3ptWWdfRXJ0MVN3IiwiZXhwIjoxNTI5NzU1NTU1LCJpYXQiOjE1Mjk3NTE5NTYsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjM3ODc4NThlLTlhNGMtNDI1NC04Y2QxLWNkN2Q4ZjZlOTZkMyIsIm5vbmNlIjoiWWZ2cG1MYXhiRWhBeXNOUyIsInJhdCI6MTUyOTc1MTk1Miwic3ViIjoiZm9vQGJhci5jb20ifQ.RB1lCxnuP6my7MGIfyJmM0QrHIUa5S-tl5x_LTQ23gwzHFPVOAgDcCTJ7v-Z9Fzwomps2csMIDo-snl-4omBOqSjshoEdJcdWRghL3oNc4mhvZtO8fHIlMnsRvGrP2DvZXvZQ3FyIR0c7mWwe8CnJcn57Ce50YsNRcWH1KUTFVx7kCj7uX4PYaluYtW_CgLlND1U3qYsG08s6VKcO5_4qO-DQz5BjqEiaDs8q556TjM3GfuHp7hfcNJv_VWp9lEvUg7UDsfjGhB1o61c6zrp2AWy39aShMCVSlnnNS3aSI_2pR0fYJw1_P47xTeQC7BhaOlu2hBSwvWlRsdqIab61QUtJ0I-nXwj1YiYS5cPTwmvU1BWwfDI_-EdmVtpb1IQnNoEVx1Sv8P65WFebjX8J7bYUQbksJUzHXKkP8cI2RGk_9zfO5W4SoLH1xVgOKNxNiKeex-99FejjRGDmDdXvTPEmIfpgK8of6Uq2HzaVsCB8QygrVjFLCHCMfTbW7U56a01sn22rtYxQX-nc2EhZDWE28-mqKWxScnyVDhbuzzI5Dj767b4F9OGuF1G9uNmAOmtZZX-cn_IdLUJqv_-pTVACIjSHJfNQmIEkeaydt9fSLYWYvQJo0pYsVGgo5aS3eSOJufoZppF22DlAlpiL9rJ89LvUWAVChpyVUyIWFc', 'scope': 'openid offline_access', 'access_token': 'NHl7vY1q33X6M_gisuMTGGOXnXlsSGZ9pkYvsNBz_N0.gdGeHKkhRnkQXn9yGi_wteUS17yYsgVYJPMvhnroS8U', 'refresh_token': 'IhtgScLAUWKRgKkXvbqUrf4ObRck3hEXQInSphWB8KU.sz2vgQGQQBHuEHQX5QmoO2w51qXbwDeU0Lxf4pEzQN0', 'token_type': 'bearer', 'expires_in': 3599}
4.361 AccessTokenResponse {
"access_token": "NHl7vY1q33X6M_gisuMTGGOXnXlsSGZ9pkYvsNBz_N0.gdGeHKkhRnkQXn9yGi_wteUS17yYsgVYJPMvhnroS8U",
"expires_in": 3599,
"id_token": {
"at_hash": "fZM0_5uwEy2PWrYAcLID5w",
"aud": [
"2dc6d043-f5b6-43c0-90a9-bd1dd7e98ccf"
],
"auth_time": 1529751824,
"c_hash": "0uLsGkJIOSCzmYg_Ert1Sw",
"exp": 1529755555,
"iat": 1529751956,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "3787858e-9a4c-4254-8cd1-cd7d8f6e96d3",
"nonce": "YfvpmLaxbEhAysNS",
"rat": 1529751952,
"sub": "[email protected]"
},
"refresh_token": "IhtgScLAUWKRgKkXvbqUrf4ObRck3hEXQInSphWB8KU.sz2vgQGQQBHuEHQX5QmoO2w51qXbwDeU0Lxf4pEzQN0",
"scope": "openid offline_access",
"token_type": "bearer"
}
4.361 phase <--<-- 5 --- RotateSigKeys -->-->
4.407 phase <--<-- 6 --- RefreshAccessToken -->-->
4.408 RefreshAccessTokenRequest {
"client_assertion": "eyJhbGciOiJSUzI1NiIsImtpZCI6IkJlYTFmMHRNOWFhRmpkTU5YSmk4RXJhbDhFR0dWdjducF9NVjdUdlJ0UFEifQ.eyJpc3MiOiAiMmRjNmQwNDMtZjViNi00M2MwLTkwYTktYmQxZGQ3ZTk4Y2NmIiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiMmRjNmQwNDMtZjViNi00M2MwLTkwYTktYmQxZGQ3ZTk4Y2NmIiwgImlhdCI6IDE1Mjk3NTE5NTYsICJqdGkiOiAiZUpNSG85UmI2dUFXa2M1Q3hxOVZkbDFDbmxDanRyUXYiLCAiZXhwIjogMTUyOTc1MjU1Nn0.Xra_lPsIop-9vNiIMZLKy3hDuy0Bfr_D1l01Ux1xG2bjnFFF2-kyNUxB91Z1dx6dgG0fULvgio6dAeIp2MoAMrHNw-Yd4gg6pV4b1mOl6VDypxiQCfuBHlS_mNVjhVKi8TJUrAcUio7AZC9qRMm6ad5PQvxwMaojRx3JmrJ283z5wfhXa-4RrxLQ2aZzMHrJA7kaZgTLa5rRW9eg8-Rq_v3LSq07PRGKt7QQA3Pa7eWrEtGTZkuRaQuov-pxDmH3szVBM9Mi6fU-h8E43O7kNuDQaCnpRIR33CgLrmw3sIgcTBLvwtpUzDcXChBBgO7WSD5UdS5o3eVC-jiPW2FK4w",
"client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer",
"grant_type": "refresh_token",
"refresh_token": "IhtgScLAUWKRgKkXvbqUrf4ObRck3hEXQInSphWB8KU.sz2vgQGQQBHuEHQX5QmoO2w51qXbwDeU0Lxf4pEzQN0",
"scope": "openid offline_access"
}
4.411 request {'client_assertion': 'eyJhbGciOiJSUzI1NiIsImtpZCI6IkJlYTFmMHRNOWFhRmpkTU5YSmk4RXJhbDhFR0dWdjducF9NVjdUdlJ0UFEifQ.eyJpc3MiOiAiMmRjNmQwNDMtZjViNi00M2MwLTkwYTktYmQxZGQ3ZTk4Y2NmIiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiMmRjNmQwNDMtZjViNi00M2MwLTkwYTktYmQxZGQ3ZTk4Y2NmIiwgImlhdCI6IDE1Mjk3NTE5NTYsICJqdGkiOiAiZUpNSG85UmI2dUFXa2M1Q3hxOVZkbDFDbmxDanRyUXYiLCAiZXhwIjogMTUyOTc1MjU1Nn0.Xra_lPsIop-9vNiIMZLKy3hDuy0Bfr_D1l01Ux1xG2bjnFFF2-kyNUxB91Z1dx6dgG0fULvgio6dAeIp2MoAMrHNw-Yd4gg6pV4b1mOl6VDypxiQCfuBHlS_mNVjhVKi8TJUrAcUio7AZC9qRMm6ad5PQvxwMaojRx3JmrJ283z5wfhXa-4RrxLQ2aZzMHrJA7kaZgTLa5rRW9eg8-Rq_v3LSq07PRGKt7QQA3Pa7eWrEtGTZkuRaQuov-pxDmH3szVBM9Mi6fU-h8E43O7kNuDQaCnpRIR33CgLrmw3sIgcTBLvwtpUzDcXChBBgO7WSD5UdS5o3eVC-jiPW2FK4w', 'scope': 'openid offline_access', 'grant_type': 'refresh_token', 'client_assertion_type': 'urn:ietf:params:oauth:client-assertion-type:jwt-bearer', 'refresh_token': 'IhtgScLAUWKRgKkXvbqUrf4ObRck3hEXQInSphWB8KU.sz2vgQGQQBHuEHQX5QmoO2w51qXbwDeU0Lxf4pEzQN0'}
4.547 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
4.547 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
4.547 handle_response kwargs:{'r': <Response [200]>, 'csi': <oic.oic.message.RefreshAccessTokenRequest object at 0x7f2440021f60>}
4.547 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiZlpNMF81dXdFeTJQV3JZQWNMSUQ1dyIsImF1ZCI6WyIyZGM2ZDA0My1mNWI2LTQzYzAtOTBhOS1iZDFkZDdlOThjY2YiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiIwdUxzR2tKSU9TQ3ptWWdfRXJ0MVN3IiwiZXhwIjoxNTI5NzU1NTU2LCJpYXQiOjE1Mjk3NTE5NTYsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6Ijk3MDExNTIzLWUyMDItNDBlMC05ZDU3LTcxZmU1Njc2N2MzZiIsIm5vbmNlIjoiIiwicmF0IjoxNTI5NzUxOTUyLCJzdWIiOiJmb29AYmFyLmNvbSJ9.jFrZnvQxM0Waxs0IiR6lG2uUzuc_nMJSE6oKW2ReVBDQzbZdVdOqEOV8xcw--S60XFwimrK8i07uFv-B3tqTeFDOtp2sRwejYlbyv39ov6yXJv_TCgcb9reIjLElIUGz0bKrCiYfnh2fqIdziJTSKnjWPT8NZYWdjReHVz7_WPcgR-uiEeejI3YexrXvgDyHS4TcpfyB5swhD5kWITGTvVfIzTThS-BwPUJrJPPNhhS-cK27MwKPCtA2EqavWBO9ATX9EtzOzukFIf207eXn2SyN2Tfk0MlT9lWuQwV8vhhXF0GagVdfiPkwNqmEq-tgmKVZIC35TRagjVXFZsCW2-Fg6RhoRiGkhSi9rDXhweHSQrGAv3l5Cb8qww6nzhZ3QjMzoSN6GJw49AIAfIkhLWGkjpIwjM5IcsP7-OfnttMDXVqToPhma2FtYx1DRa-WVSOI2RMINPH9dP5DZn-uqbQZs8I_qId5mXzz11ojDFAZX0uOFdvWF51Wjg9jdK5OC5ZOgl3Onq1izb8VoGW7mvZ6JQUIF3v44-Op9SlLGmImqT7KUHBhuxjb7dMT7wLcAgWxQ1HJpCAfkRnjxLXAzQAwG4yEPoEFh9Z_tUfkc-gA9d0ZK0JHbw-nwC0TaHCM2LgHyQVG5AZFUcFgkuBkcjVOuZ3zAKkkDuf1ubfLBPg', 'scope': 'openid offline_access', 'access_token': 'I61b5-9hyrAY-ow3qTfaNh-1irK058ZU2SsR7ffy3KY.iUITC153Rub-Mg75qKFGKf6M-kHtFh9-2KO4l2Yal4o', 'refresh_token': 'wiAPnMqxgzd6dqxJsukS8WgfE7aXpZ_FVLU7eqzvhlU.xPdi5bj6qYo1-L27Ob_3SCf-pQBKxIG9A7sjgJZPews', 'token_type': 'bearer', 'expires_in': 3599}
4.55 jws header {'typ': 'JWT', 'alg': 'RS256', 'kid': 'public:5198db5b-878c-4635-a538-e627f98de93e'}
4.551 AccessTokenResponse {
"access_token": "I61b5-9hyrAY-ow3qTfaNh-1irK058ZU2SsR7ffy3KY.iUITC153Rub-Mg75qKFGKf6M-kHtFh9-2KO4l2Yal4o",
"expires_in": 3599,
"id_token": {
"at_hash": "fZM0_5uwEy2PWrYAcLID5w",
"aud": [
"2dc6d043-f5b6-43c0-90a9-bd1dd7e98ccf"
],
"auth_time": 1529751824,
"c_hash": "0uLsGkJIOSCzmYg_Ert1Sw",
"exp": 1529755556,
"iat": 1529751956,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "97011523-e202-40e0-9d57-71fe56767c3f",
"rat": 1529751952,
"sub": "[email protected]"
},
"refresh_token": "wiAPnMqxgzd6dqxJsukS8WgfE7aXpZ_FVLU7eqzvhlU.xPdi5bj6qYo1-L27Ob_3SCf-pQBKxIG9A7sjgJZPews",
"scope": "openid offline_access",
"token_type": "bearer"
}
4.551 phase <--<-- 7 --- Done -->-->
4.551 end
4.551 assertion CheckHTTPResponse
4.551 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
4.551 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
Done: status=OK
============================================================
RESULT: PASSED
./OP-OAuth-2nd-Revokes.txt 0000644 0000000 0000000 00000042544 13313424602 015352 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-OAuth-2nd-Revokes
Test description: Trying to use authorization code twice should result in revoking previously issued access tokens
Timestamp: 2018-06-23T11:05:38Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.114 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.116 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.116 phase <--<-- 2 --- Registration -->-->
0.116 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.116 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#fbGNHHM64RX17pLF"
],
"response_types": [
"code id_token token"
]
}
0.314 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.314 RegistrationResponse {
"client_id": "2d12d5b7-cdac-40b2-92af-0d7eae866149",
"client_secret": "iRkfTprEtxM3",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "2d12d5b7-cdac-40b2-92af-0d7eae866149",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#fbGNHHM64RX17pLF"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.315 phase <--<-- 3 --- Note -->-->
1.772 phase <--<-- 4 --- AsyncAuthn -->-->
1.772 AuthorizationRequest {
"client_id": "2d12d5b7-cdac-40b2-92af-0d7eae866149",
"nonce": "KkvbhcodcfJzYZ88",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid",
"state": "XzfFpj7HlOY5mLtz"
}
1.772 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=2d12d5b7-cdac-40b2-92af-0d7eae866149&state=XzfFpj7HlOY5mLtz&response_type=code+id_token+token&nonce=KkvbhcodcfJzYZ88
1.772 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=2d12d5b7-cdac-40b2-92af-0d7eae866149&state=XzfFpj7HlOY5mLtz&response_type=code+id_token+token&nonce=KkvbhcodcfJzYZ88
5.856 http args {}
6.04 response URL with fragment
6.04 response access_token=c3MrAuevrVdOz1bJTS1fp_GCvOABWhfIp_RMERpq7go.cZ8OIoBOJan0DK-qzpRm8X3Y7dcg6mOKZap_yIGQ3us&code=lOAK9v6m-fTIAQ8BmD4l6skeItwsZSLHlUC5neZEvNc.aBa5K8Wy65LkCTmvNXWewWdEVa6VauQLwBmv_gRKM_o&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiZ3RZRTNTWElxU0hwd2dqX3RQMHJyQSIsImF1ZCI6WyIyZDEyZDViNy1jZGFjLTQwYjItOTJhZi0wZDdlYWU4NjYxNDkiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiIweHE2VnlVRVc3ZXhHanZneGx4WG1nIiwiZXhwIjoxNTI5NzU1NTM3LCJpYXQiOjE1Mjk3NTE5MzcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImU3NjcyNDc5LWVmYWEtNDgwNC05NGExLTA3NDU1ODU3NjhlNyIsIm5vbmNlIjoiS2t2Ymhjb2RjZkp6WVo4OCIsInJhdCI6MTUyOTc1MTkzMywic3ViIjoiZm9vQGJhci5jb20ifQ.OhnPGTTVBbgnYQUYfLjvRXlKtNuDQY8DesYp6ubMY3SAfQ7Fk2-_HChXuEAQIVYcChtdjSrSrn5pfL6WmDxO_dFB4X__AHyQU7Pb0jpSIpPOMrQkPHrwlNfv1bb-ojrnOTEde-HCGfpW6rhwrU5WJOOrsgsXpTm63DBe1Kv4DW3yhh1VYvFb9HpwaiGOopjagpFYpS5ZmvRnji0eVMtmojBOR9lphlzRRY9qIOwC7ip9WY80n27Yh7wxEJU1jgrDk3sMbtjLX4625OCyGmkk06OGYgAL5xzE2SbZLuqg9RTu9xBOybI1Lmui7Wbqc8-uHEWXmVTOWW9RkNfVRUxgjvBGgcPFIhnGfOyLcdTIV0JTBmuYm5eive93V0uf_DrbdKeK6IIiWNQ62eGE9na4lgrZRLewiC_ctDkba8eO4YxWX9t_wEFtL7wImPuNQY3oYy3OFu2CS_SQiNNPeKIANVvC4Dn_Q3xxWp-1JfcDqzMdwUHjczhw1DRO10eiMuxVishFW42C4uMETdqYcfVq_l7FuxUzm-tht6k4j0ItzC2JCVNg8ku24aHtQpjvU7ErIPCoEqMIxABVCgdxPZTS5yyMPt9EMoM2T9ctnGgL_6EzBL60cTQ2QbEVoSML8cqCFnfdWCXGuZ8jWuImuV548ET_nv85QmQSG-E77tBiEms&scope=openid&state=XzfFpj7HlOY5mLtz&token_type=bearer
6.04 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiZ3RZRTNTWElxU0hwd2dqX3RQMHJyQSIsImF1ZCI6WyIyZDEyZDViNy1jZGFjLTQwYjItOTJhZi0wZDdlYWU4NjYxNDkiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiIweHE2VnlVRVc3ZXhHanZneGx4WG1nIiwiZXhwIjoxNTI5NzU1NTM3LCJpYXQiOjE1Mjk3NTE5MzcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImU3NjcyNDc5LWVmYWEtNDgwNC05NGExLTA3NDU1ODU3NjhlNyIsIm5vbmNlIjoiS2t2Ymhjb2RjZkp6WVo4OCIsInJhdCI6MTUyOTc1MTkzMywic3ViIjoiZm9vQGJhci5jb20ifQ.OhnPGTTVBbgnYQUYfLjvRXlKtNuDQY8DesYp6ubMY3SAfQ7Fk2-_HChXuEAQIVYcChtdjSrSrn5pfL6WmDxO_dFB4X__AHyQU7Pb0jpSIpPOMrQkPHrwlNfv1bb-ojrnOTEde-HCGfpW6rhwrU5WJOOrsgsXpTm63DBe1Kv4DW3yhh1VYvFb9HpwaiGOopjagpFYpS5ZmvRnji0eVMtmojBOR9lphlzRRY9qIOwC7ip9WY80n27Yh7wxEJU1jgrDk3sMbtjLX4625OCyGmkk06OGYgAL5xzE2SbZLuqg9RTu9xBOybI1Lmui7Wbqc8-uHEWXmVTOWW9RkNfVRUxgjvBGgcPFIhnGfOyLcdTIV0JTBmuYm5eive93V0uf_DrbdKeK6IIiWNQ62eGE9na4lgrZRLewiC_ctDkba8eO4YxWX9t_wEFtL7wImPuNQY3oYy3OFu2CS_SQiNNPeKIANVvC4Dn_Q3xxWp-1JfcDqzMdwUHjczhw1DRO10eiMuxVishFW42C4uMETdqYcfVq_l7FuxUzm-tht6k4j0ItzC2JCVNg8ku24aHtQpjvU7ErIPCoEqMIxABVCgdxPZTS5yyMPt9EMoM2T9ctnGgL_6EzBL60cTQ2QbEVoSML8cqCFnfdWCXGuZ8jWuImuV548ET_nv85QmQSG-E77tBiEms', 'scope': 'openid', 'code': 'lOAK9v6m-fTIAQ8BmD4l6skeItwsZSLHlUC5neZEvNc.aBa5K8Wy65LkCTmvNXWewWdEVa6VauQLwBmv_gRKM_o', 'access_token': 'c3MrAuevrVdOz1bJTS1fp_GCvOABWhfIp_RMERpq7go.cZ8OIoBOJan0DK-qzpRm8X3Y7dcg6mOKZap_yIGQ3us', 'state': 'XzfFpj7HlOY5mLtz', 'expires_in': 3599, 'token_type': 'bearer'}
6.155 AuthorizationResponse {
"access_token": "c3MrAuevrVdOz1bJTS1fp_GCvOABWhfIp_RMERpq7go.cZ8OIoBOJan0DK-qzpRm8X3Y7dcg6mOKZap_yIGQ3us",
"code": "lOAK9v6m-fTIAQ8BmD4l6skeItwsZSLHlUC5neZEvNc.aBa5K8Wy65LkCTmvNXWewWdEVa6VauQLwBmv_gRKM_o",
"expires_in": 3599,
"id_token": {
"at_hash": "gtYE3SXIqSHpwgj_tP0rrA",
"aud": [
"2d12d5b7-cdac-40b2-92af-0d7eae866149"
],
"auth_time": 1529751824,
"c_hash": "0xq6VyUEW7exGjvgxlxXmg",
"exp": 1529755537,
"iat": 1529751937,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "e7672479-efaa-4804-94a1-0745585768e7",
"nonce": "KkvbhcodcfJzYZ88",
"rat": 1529751933,
"sub": "[email protected]"
},
"scope": "openid",
"state": "XzfFpj7HlOY5mLtz",
"token_type": "bearer"
}
6.155 phase <--<-- 5 --- AccessToken -->-->
6.155 --> request op_args: {'state': 'XzfFpj7HlOY5mLtz'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
6.155 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'XzfFpj7HlOY5mLtz', 'code': 'lOAK9v6m-fTIAQ8BmD4l6skeItwsZSLHlUC5neZEvNc.aBa5K8Wy65LkCTmvNXWewWdEVa6VauQLwBmv_gRKM_o', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '2d12d5b7-cdac-40b2-92af-0d7eae866149'}, 'state': 'XzfFpj7HlOY5mLtz'}
6.155 AccessTokenRequest {
"code": "lOAK9v6m-fTIAQ8BmD4l6skeItwsZSLHlUC5neZEvNc.aBa5K8Wy65LkCTmvNXWewWdEVa6VauQLwBmv_gRKM_o",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "XzfFpj7HlOY5mLtz"
}
6.155 request_url https://oidc-certification.ory.sh:8443/oauth2/token
6.155 request_http_args {'headers': {'Authorization': 'Basic MmQxMmQ1YjctY2RhYy00MGIyLTkyYWYtMGQ3ZWFlODY2MTQ5OmlSa2ZUcHJFdHhNMw==', 'Content-Type': 'application/x-www-form-urlencoded'}}
6.155 request code=lOAK9v6m-fTIAQ8BmD4l6skeItwsZSLHlUC5neZEvNc.aBa5K8Wy65LkCTmvNXWewWdEVa6VauQLwBmv_gRKM_o&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=XzfFpj7HlOY5mLtz
6.366 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
6.367 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiZ3RZRTNTWElxU0hwd2dqX3RQMHJyQSIsImF1ZCI6WyIyZDEyZDViNy1jZGFjLTQwYjItOTJhZi0wZDdlYWU4NjYxNDkiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiIweHE2VnlVRVc3ZXhHanZneGx4WG1nIiwiZXhwIjoxNTI5NzU1NTM3LCJpYXQiOjE1Mjk3NTE5MzgsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjAzYmU4NjkzLWNmZGMtNDQ1Zi1hZWM4LTkzZjVhYTEwYjQ3ZCIsIm5vbmNlIjoiS2t2Ymhjb2RjZkp6WVo4OCIsInJhdCI6MTUyOTc1MTkzMywic3ViIjoiZm9vQGJhci5jb20ifQ.M_Kj-oBHWs8UttJ08fZTGRD7ApN9c4jwf-xuuz3IvQSaySE73Oa2-BczVmKIiIH7StBGmb5qIl2uciTlj0a9gRajlzQcxgu403LVOL54hbGo395AEpeQcLKxCpFKmjfoTGK7Y0F5_RBHRihVcBcFvMFBlPdR4c1XjfXC6ARo4vU0mPi9_uqMB-VeH6-Wmle0gUVLKjXsrBV3a2M1P4j_yLfEBbGIdYTCssargc7VScxNU3fu3QIiw66Pyj0hZdC10qbdOX2cl6024M7ujMsmGvIAcxRYlcvilCxpYBCjX2OkbES1ioAs6d1xFvChbKjPGcoKTfSqSF2wcPfosyX0BbV7gJz6uRNhrh6-Di_il_1LsWcR0zUihVTRyWLR48R8TMNF95tl7oOu2OiDN2JbkwqnqymMdsrPhmdVA0giDOZop6-Ihw7AWVAU8RsmETInS8kYa751evGU1YS9VE50gJ5KVCMG5jyjxCU5mzUCQ4daitz2GO6kqp3jxn6bB9Ri27jLO5icP_DxiCXzdKpRMh7WWOAbHZqIFPIGACRlsb1q5Rl13xkW2_jbHw_NDfAeeSDNyFmWL0hC1eKMN_iMyM-7G977kPzDnvp2hIGg8AIsEKa2AoswND5_5g374Fi0cFcX58yt5tQ4T97ikCH1Q_prJPKu_GxclWrdxtBrDKI', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'ZpYJXQu88xgi6NgtzMjB5eo8jNURGUpJkWskemKwNqE.oHvHgWkUg50fdn1HcR1FukMeidgaAKrUM6dL46lSUZU', 'scope': 'openid'}
6.371 AccessTokenResponse {
"access_token": "ZpYJXQu88xgi6NgtzMjB5eo8jNURGUpJkWskemKwNqE.oHvHgWkUg50fdn1HcR1FukMeidgaAKrUM6dL46lSUZU",
"expires_in": 3599,
"id_token": {
"at_hash": "gtYE3SXIqSHpwgj_tP0rrA",
"aud": [
"2d12d5b7-cdac-40b2-92af-0d7eae866149"
],
"auth_time": 1529751824,
"c_hash": "0xq6VyUEW7exGjvgxlxXmg",
"exp": 1529755537,
"iat": 1529751938,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "03be8693-cfdc-445f-aec8-93f5aa10b47d",
"nonce": "KkvbhcodcfJzYZ88",
"rat": 1529751933,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
6.371 phase <--<-- 6 --- AccessToken -->-->
6.371 --> request op_args: {'state': 'XzfFpj7HlOY5mLtz'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
6.371 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'XzfFpj7HlOY5mLtz', 'code': 'lOAK9v6m-fTIAQ8BmD4l6skeItwsZSLHlUC5neZEvNc.aBa5K8Wy65LkCTmvNXWewWdEVa6VauQLwBmv_gRKM_o', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '2d12d5b7-cdac-40b2-92af-0d7eae866149'}, 'state': 'XzfFpj7HlOY5mLtz'}
6.371 AccessTokenRequest {
"code": "lOAK9v6m-fTIAQ8BmD4l6skeItwsZSLHlUC5neZEvNc.aBa5K8Wy65LkCTmvNXWewWdEVa6VauQLwBmv_gRKM_o",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "XzfFpj7HlOY5mLtz"
}
6.371 request_url https://oidc-certification.ory.sh:8443/oauth2/token
6.371 request_http_args {'headers': {'Authorization': 'Basic MmQxMmQ1YjctY2RhYy00MGIyLTkyYWYtMGQ3ZWFlODY2MTQ5OmlSa2ZUcHJFdHhNMw==', 'Content-Type': 'application/x-www-form-urlencoded'}}
6.371 request code=lOAK9v6m-fTIAQ8BmD4l6skeItwsZSLHlUC5neZEvNc.aBa5K8Wy65LkCTmvNXWewWdEVa6VauQLwBmv_gRKM_o&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=XzfFpj7HlOY5mLtz
6.534 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:400 message:{"error":"invalid_grant","error_description":"The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client","status_code":400,"error_debug":"The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found."}
6.535 response {'error_debug': 'The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found.', 'error_description': 'The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client', 'error': 'invalid_grant', 'status_code': 400}
6.535 event Got expected error
6.535 TokenErrorResponse {
"error": "invalid_grant",
"error_debug": "The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found.",
"error_description": "The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client",
"status_code": 400
}
6.535 phase <--<-- 7 --- UserInfo -->-->
6.535 do_user_info_request kwargs:{'state': 'XzfFpj7HlOY5mLtz', 'method': 'GET', 'authn_method': 'bearer_header'}
6.536 request {'body': None}
6.536 request_url https://oidc-certification.ory.sh:8443/userinfo
6.536 request_http_args {'headers': {'Authorization': 'Bearer ZpYJXQu88xgi6NgtzMjB5eo8jNURGUpJkWskemKwNqE.oHvHgWkUg50fdn1HcR1FukMeidgaAKrUM6dL46lSUZU'}}
6.611 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:401 message:{"error":"request_unauthorized","error_description":"The request could not be authorized","error_hint":"Check that you provided valid credentials in the right format.","status_code":401,"error_debug":"A validator returned an error"}
6.611 event Expected error not received: got request_unauthorized
6.611 ErrorResponse {
"error": "request_unauthorized",
"error_debug": "A validator returned an error",
"error_description": "The request could not be authorized",
"error_hint": "Check that you provided valid credentials in the right format.",
"status_code": 401
}
6.611 ErrorResponse {
"error": "request_unauthorized",
"error_debug": "A validator returned an error",
"error_description": "The request could not be authorized",
"error_hint": "Check that you provided valid credentials in the right format.",
"status_code": 401
}
6.611 phase <--<-- 8 --- Done -->-->
6.611 end
6.612 assertion VerifyResponse
6.612 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
6.612 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Discovery-Config.txt 0000644 0000000 0000000 00000006700 13313424007 015400 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Discovery-Config
Test description: Publishes openid-configuration discovery information
Timestamp: 2018-06-23T10:59:19Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.075 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.076 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.076 phase <--<-- 2 --- Done -->-->
0.076 end
0.077 assertion CheckHTTPResponse
0.077 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.077 assertion VerifyIdTokenSigningAlgorithmIsSupported
0.077 condition verify-id_token_signing-algorithm-is-supported: status=OK [Verify that required algorithms in id_token_signing_alg_values_supported]
0.078 assertion VerifyHTTPSUsage
0.078 condition verify-https-usage: status=OK [Verify that specific endpoints uses https]
0.078 assertion VerifyOPEndpointsUseHTTPS
0.078 condition verify-op-endpoints-use-https: status=OK [Verify that all OP endpoints uses https]
0.078 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-id_token_signing-algorithm-is-supported: status=OK [Verify that required algorithms in id_token_signing_alg_values_supported]
verify-https-usage: status=OK [Verify that specific endpoints uses https]
verify-op-endpoints-use-https: status=OK [Verify that all OP endpoints uses https]
Done: status=OK
============================================================
RESULT: PASSED
./OP-scope-All.txt 0000644 0000000 0000000 00000037353 13313424321 014054 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-scope-All
Test description: Scope requesting all claims
Timestamp: 2018-06-23T11:02:41Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.076 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.078 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.078 phase <--<-- 2 --- Registration -->-->
0.078 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.078 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#h4gObuPjRe12vsUJ"
],
"response_types": [
"code id_token token"
]
}
0.233 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.234 RegistrationResponse {
"client_id": "c053926c-f8a2-48cf-9c28-a20dcdb2ba73",
"client_secret": "1-4skp9Y2CP5",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "c053926c-f8a2-48cf-9c28-a20dcdb2ba73",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#h4gObuPjRe12vsUJ"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.235 phase <--<-- 3 --- AsyncAuthn -->-->
0.235 condition Check support: status=WARNING, message=No support for: scopes_supported=['profile', 'email', 'address', 'phone']
0.235 AuthorizationRequest {
"client_id": "c053926c-f8a2-48cf-9c28-a20dcdb2ba73",
"nonce": "Gfyq0ENo610HKHHc",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid profile email address phone",
"state": "kZYchunMnarr8MUH"
}
0.235 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+profile+email+address+phone&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=c053926c-f8a2-48cf-9c28-a20dcdb2ba73&state=kZYchunMnarr8MUH&response_type=code+id_token+token&nonce=Gfyq0ENo610HKHHc
0.235 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+profile+email+address+phone&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=c053926c-f8a2-48cf-9c28-a20dcdb2ba73&state=kZYchunMnarr8MUH&response_type=code+id_token+token&nonce=Gfyq0ENo610HKHHc
4.014 http args {}
4.184 response URL with fragment
4.184 response access_token=HQxnNGpFHSexgWvhA_7Ko2PR75aeRZNSqym2JTsvrIA._wd-NlQGJO49u40mogl5141JUFoPV_6qoP874tvgHDQ&code=Fou-IsBe6PKcnk1jIjR8T-8f_DaXH_Yv2PxsigWnuB8.xXHXRVB6zOFZ4RxzSeHF9SPi803h9lejdoHw0fJixkA&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiZk1BeW9LZXFVVjV4T05qS0l1NExkUSIsImF1ZCI6WyJjMDUzOTI2Yy1mOGEyLTQ4Y2YtOWMyOC1hMjBkY2RiMmJhNzMiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiJxT0N6RFZXWUVvdzM4aERVZ0lfLTJRIiwiZXhwIjoxNTI5NzU1MzYxLCJpYXQiOjE1Mjk3NTE3NjEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjkyN2RlOWZhLTRiYmEtNDljYi04MDgyLTkzMWQ1NjBhZmMzYyIsIm5vbmNlIjoiR2Z5cTBFTm82MTBIS0hIYyIsInJhdCI6MTUyOTc1MTc1Nywic3ViIjoiZm9vQGJhci5jb20ifQ.xjWGCvJ_lD0c75oHL5XxjA15lSuGSmGOtECSW1KKjKDLRXZdIWfkh0m_X8XDK8mbagkDCzMAw0Z5Tc3kNFF7AY7je4Lp6fndETBfDqc5Ll3bWx3pjFFxG46MNXy8CVyRdR2dWaixpgdbq0GWOfBUcIg7QQiWEi4BQVBYXd_jUYcMLP-236J-14Cko8hLUQaMg-PgjAtIDdh2i7p0YEEbCVTX_lVal-oYk3sug1jqBDSUMN5pWARdKn65vUtEF3vaOBBDrqDD3fgMBUbzCaL-tvaZnOvF_fFWATVYwls2ai_nkjww1hxfpIX2aKtFxysWtVEB2JneUVKu-DAA7jt5gd3fz9Otcs4_4xumNkM1lutqeqG-si9cjeL564ELdBPMGglpB2c5_ThA_yrhIi_f6mr3rVpi1I-cODHvl38fYmK1pFRPRd0uULO2kyFKKU0e0b_yA1T2J9NXweTOlrk0rtfdNQmRy19SjkFG06ZtcDGvZHU31pdj5kx0pWth1AnNK1XGGogVvUXHYlzaOh22oc0C83vicG6jpWhpVoQ_XZsfTRX4o6iUbeFUVKtPdYe4NYAdWP-ES8BhZXjcRpC_iOM7TFcoWMM_oZJef-Fx5no3OZqHikFMG2WCn0Ll1JmRai-D5hXyZN6h1-V4gGITRFOVEHmXx71VDsgALhXQZHE&scope=openid%20profile%20email%20address%20phone&state=kZYchunMnarr8MUH&token_type=bearer
4.184 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiZk1BeW9LZXFVVjV4T05qS0l1NExkUSIsImF1ZCI6WyJjMDUzOTI2Yy1mOGEyLTQ4Y2YtOWMyOC1hMjBkY2RiMmJhNzMiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiJxT0N6RFZXWUVvdzM4aERVZ0lfLTJRIiwiZXhwIjoxNTI5NzU1MzYxLCJpYXQiOjE1Mjk3NTE3NjEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjkyN2RlOWZhLTRiYmEtNDljYi04MDgyLTkzMWQ1NjBhZmMzYyIsIm5vbmNlIjoiR2Z5cTBFTm82MTBIS0hIYyIsInJhdCI6MTUyOTc1MTc1Nywic3ViIjoiZm9vQGJhci5jb20ifQ.xjWGCvJ_lD0c75oHL5XxjA15lSuGSmGOtECSW1KKjKDLRXZdIWfkh0m_X8XDK8mbagkDCzMAw0Z5Tc3kNFF7AY7je4Lp6fndETBfDqc5Ll3bWx3pjFFxG46MNXy8CVyRdR2dWaixpgdbq0GWOfBUcIg7QQiWEi4BQVBYXd_jUYcMLP-236J-14Cko8hLUQaMg-PgjAtIDdh2i7p0YEEbCVTX_lVal-oYk3sug1jqBDSUMN5pWARdKn65vUtEF3vaOBBDrqDD3fgMBUbzCaL-tvaZnOvF_fFWATVYwls2ai_nkjww1hxfpIX2aKtFxysWtVEB2JneUVKu-DAA7jt5gd3fz9Otcs4_4xumNkM1lutqeqG-si9cjeL564ELdBPMGglpB2c5_ThA_yrhIi_f6mr3rVpi1I-cODHvl38fYmK1pFRPRd0uULO2kyFKKU0e0b_yA1T2J9NXweTOlrk0rtfdNQmRy19SjkFG06ZtcDGvZHU31pdj5kx0pWth1AnNK1XGGogVvUXHYlzaOh22oc0C83vicG6jpWhpVoQ_XZsfTRX4o6iUbeFUVKtPdYe4NYAdWP-ES8BhZXjcRpC_iOM7TFcoWMM_oZJef-Fx5no3OZqHikFMG2WCn0Ll1JmRai-D5hXyZN6h1-V4gGITRFOVEHmXx71VDsgALhXQZHE', 'scope': 'openid profile email address phone', 'code': 'Fou-IsBe6PKcnk1jIjR8T-8f_DaXH_Yv2PxsigWnuB8.xXHXRVB6zOFZ4RxzSeHF9SPi803h9lejdoHw0fJixkA', 'access_token': 'HQxnNGpFHSexgWvhA_7Ko2PR75aeRZNSqym2JTsvrIA._wd-NlQGJO49u40mogl5141JUFoPV_6qoP874tvgHDQ', 'state': 'kZYchunMnarr8MUH', 'expires_in': 3599, 'token_type': 'bearer'}
4.289 AuthorizationResponse {
"access_token": "HQxnNGpFHSexgWvhA_7Ko2PR75aeRZNSqym2JTsvrIA._wd-NlQGJO49u40mogl5141JUFoPV_6qoP874tvgHDQ",
"code": "Fou-IsBe6PKcnk1jIjR8T-8f_DaXH_Yv2PxsigWnuB8.xXHXRVB6zOFZ4RxzSeHF9SPi803h9lejdoHw0fJixkA",
"expires_in": 3599,
"id_token": {
"at_hash": "fMAyoKeqUV5xONjKIu4LdQ",
"aud": [
"c053926c-f8a2-48cf-9c28-a20dcdb2ba73"
],
"auth_time": 1529751698,
"c_hash": "qOCzDVWYEow38hDUgI_-2Q",
"exp": 1529755361,
"iat": 1529751761,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "927de9fa-4bba-49cb-8082-931d560afc3c",
"nonce": "Gfyq0ENo610HKHHc",
"rat": 1529751757,
"sub": "[email protected]"
},
"scope": "openid profile email address phone",
"state": "kZYchunMnarr8MUH",
"token_type": "bearer"
}
4.289 phase <--<-- 4 --- AccessToken -->-->
4.289 --> request op_args: {'state': 'kZYchunMnarr8MUH'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
4.289 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'kZYchunMnarr8MUH', 'code': 'Fou-IsBe6PKcnk1jIjR8T-8f_DaXH_Yv2PxsigWnuB8.xXHXRVB6zOFZ4RxzSeHF9SPi803h9lejdoHw0fJixkA', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'c053926c-f8a2-48cf-9c28-a20dcdb2ba73'}, 'state': 'kZYchunMnarr8MUH'}
4.289 AccessTokenRequest {
"code": "Fou-IsBe6PKcnk1jIjR8T-8f_DaXH_Yv2PxsigWnuB8.xXHXRVB6zOFZ4RxzSeHF9SPi803h9lejdoHw0fJixkA",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "kZYchunMnarr8MUH"
}
4.289 request_url https://oidc-certification.ory.sh:8443/oauth2/token
4.289 request_http_args {'headers': {'Authorization': 'Basic YzA1MzkyNmMtZjhhMi00OGNmLTljMjgtYTIwZGNkYjJiYTczOjEtNHNrcDlZMkNQNQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
4.289 request code=Fou-IsBe6PKcnk1jIjR8T-8f_DaXH_Yv2PxsigWnuB8.xXHXRVB6zOFZ4RxzSeHF9SPi803h9lejdoHw0fJixkA&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=kZYchunMnarr8MUH
4.5 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
4.501 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiZk1BeW9LZXFVVjV4T05qS0l1NExkUSIsImF1ZCI6WyJjMDUzOTI2Yy1mOGEyLTQ4Y2YtOWMyOC1hMjBkY2RiMmJhNzMiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiJxT0N6RFZXWUVvdzM4aERVZ0lfLTJRIiwiZXhwIjoxNTI5NzU1MzYxLCJpYXQiOjE1Mjk3NTE3NjEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjdlZTUxY2I5LWJhNjYtNDFkZC1hZGIxLWRkM2UyZDU0NmUyMiIsIm5vbmNlIjoiR2Z5cTBFTm82MTBIS0hIYyIsInJhdCI6MTUyOTc1MTc1Nywic3ViIjoiZm9vQGJhci5jb20ifQ.N_OmytJDpRdvGSy8l8C8q1-q1sn94iUDvo-ZdCyeiqNOHCuIxotxcCgMPBer8rC2IX6wM7nWxhj5noIv5932j-7OdoTBkyfpsRjDULmwIlaxy7vQiCap46LVIa7KPRt-9WwjxzQZjVc_yCGPMONqWdjpQs_XhqhpHQn3fLp_Ut2eK-QUTFOU1qItfFz1eyqWpI8OOWvkC7zk8u1yVup-zO3CN6aXcKjB1OjXioSHMEwzv68lhEiuV3eHZyKDE20SXC9Zu9maIt1O62NvjiE09QYogpDM0LCmbhB-93sRiF33lDFG5CWzRy-vWk6543otUua83a4vLCUWMuvoIE6sRXXUMHoygJgVh_3KMdSoXeA-iknVwMj4V9SMBqptmLxmkzebHRmeVEgtRdLnwPOMrq78xR7nyhHt35ZMamV7qZu_HhibxawnVZy91rFeyWQCjpdd6HnRThiNJBR7X_M3oaqmP3uByg21Y7knck5YqGj6RPU8Ide4FM9B8fC1x5bcMU0MJJLt_FNiHhPvB6sam8SCTHuTMrmuXoU3eU3YE6XH2lCwy13pExFgP5cHow7ts8t_TKXgSOILLJcJ_P9wlQsWtu3X1up3mZJ2uaEJ5XkpEHBex23klFbnB-tsqfjyCQyzn1JluhqOJpJ2LG6gTUWBg8KGjkFs-TS88_oQ-aw', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'b9e0nY9bRXUdnNNQ3X3xBSTo9qiwryc553G-5pW3CWU.NC0ig5segDbhz7fwc6s9PpVMXG2_IF3TX7QDCr-bVWU', 'scope': 'openid profile email address phone'}
4.505 AccessTokenResponse {
"access_token": "b9e0nY9bRXUdnNNQ3X3xBSTo9qiwryc553G-5pW3CWU.NC0ig5segDbhz7fwc6s9PpVMXG2_IF3TX7QDCr-bVWU",
"expires_in": 3599,
"id_token": {
"at_hash": "fMAyoKeqUV5xONjKIu4LdQ",
"aud": [
"c053926c-f8a2-48cf-9c28-a20dcdb2ba73"
],
"auth_time": 1529751698,
"c_hash": "qOCzDVWYEow38hDUgI_-2Q",
"exp": 1529755361,
"iat": 1529751761,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "7ee51cb9-ba66-41dd-adb1-dd3e2d546e22",
"nonce": "Gfyq0ENo610HKHHc",
"rat": 1529751757,
"sub": "[email protected]"
},
"scope": "openid profile email address phone",
"token_type": "bearer"
}
4.505 phase <--<-- 5 --- UserInfo -->-->
4.505 do_user_info_request kwargs:{'state': 'kZYchunMnarr8MUH', 'method': 'GET', 'authn_method': 'bearer_header'}
4.505 request {'body': None}
4.505 request_url https://oidc-certification.ory.sh:8443/userinfo
4.505 request_http_args {'headers': {'Authorization': 'Bearer b9e0nY9bRXUdnNNQ3X3xBSTo9qiwryc553G-5pW3CWU.NC0ig5segDbhz7fwc6s9PpVMXG2_IF3TX7QDCr-bVWU'}}
4.576 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
4.577 OpenIDSchema {
"sub": "[email protected]"
}
4.577 OpenIDSchema {
"sub": "[email protected]"
}
4.577 phase <--<-- 6 --- Done -->-->
4.577 end
4.578 assertion CheckHTTPResponse
4.578 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
4.578 assertion VerifyResponse
4.578 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.579 assertion VerifyScopes
4.579 condition verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username', 'email', 'email_verified', 'address', 'phone_number', 'phone_number_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
4.579 condition Done: status=OK
============================================================
Conditions
Check support: status=WARNING, message=No support for: scopes_supported=['profile', 'email', 'address', 'phone']
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username', 'email', 'email_verified', 'address', 'phone_number', 'phone_number_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
No support for: scopes_supported=['profile', 'email', 'address', 'phone']
The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username', 'email', 'email_verified', 'address', 'phone_number', 'phone_number_verified']
./OP-IDToken-at_hash.txt 0000644 0000000 0000000 00000023266 13313424077 015145 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-IDToken-at_hash
Test description: ID Token has at_hash when ID Token and Access Token are returned from the Authorization Endpoint
Timestamp: 2018-06-23T11:00:15Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.076 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.077 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.077 phase <--<-- 2 --- Registration -->-->
0.077 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.077 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Udackfm7SL04I6go"
],
"response_types": [
"code id_token token"
]
}
0.239 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.24 RegistrationResponse {
"client_id": "ee4cca5b-4cad-47e0-97bd-aa0ae208d205",
"client_secret": "SWithZrLUcsu",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "ee4cca5b-4cad-47e0-97bd-aa0ae208d205",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Udackfm7SL04I6go"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.24 phase <--<-- 3 --- AsyncAuthn -->-->
0.241 AuthorizationRequest {
"client_id": "ee4cca5b-4cad-47e0-97bd-aa0ae208d205",
"nonce": "VLvczsY3zAQt52SZ",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid",
"state": "Y7AR3BEtLHOSR9bL"
}
0.241 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=ee4cca5b-4cad-47e0-97bd-aa0ae208d205&state=Y7AR3BEtLHOSR9bL&response_type=code+id_token+token&nonce=VLvczsY3zAQt52SZ
0.241 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=ee4cca5b-4cad-47e0-97bd-aa0ae208d205&state=Y7AR3BEtLHOSR9bL&response_type=code+id_token+token&nonce=VLvczsY3zAQt52SZ
2.515 http args {}
2.713 response URL with fragment
2.713 response access_token=FH9bhJdda9dhASOWuebln5TbvtZwFMfBmosUmvPxF5A.9QdRU_hR8eVTfFBcA_5tv-FQTMEg4pZtmdNXQtZ3o5I&code=PtHhV-Q8zWbdTwFJ3yxizkYzvz35kOxBvkvte48KrkU.iT0hPovz81QhSrZTQQGpVB-sF9poplbaVn5lulHLv5I&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiRE1MOXJCZWIzNjhlMzNZNVRIOHE2dyIsImF1ZCI6WyJlZTRjY2E1Yi00Y2FkLTQ3ZTAtOTdiZC1hYTBhZTIwOGQyMDUiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiI4Ukd3cExhUWxLY2xDWjlQWFYxU3JBIiwiZXhwIjoxNTI5NzU1MjE0LCJpYXQiOjE1Mjk3NTE2MTQsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImJhYmY2YWY3LTY1M2MtNGFhMC05YTUzLWFiNDFjNmEyMTg4MyIsIm5vbmNlIjoiVkx2Y3pzWTN6QVF0NTJTWiIsInJhdCI6MTUyOTc1MTYxMywic3ViIjoiZm9vQGJhci5jb20ifQ.sIOSW2_yIHMG-XLVPezBsjldQ1EphMaKHdk1dVZ_rc7ZcSVPjKvOaCUqAjmsIEC-kUYNyVnbI8Kdj-ICmw3zzUsVa31QQcG-Q73hP1pB0ytGCyCm2GbM2OyQViV51ouzHlJ0h-m8rNJYNLb4JgbMUkRaaLWlHwqf9uvDX_Sg7E8R-g05TcQujLZeDzXbUGp5K_6S-88yiqPs_D76shLzLe7-bj3R-MN2vbhkPVA3dQcfjEoW3vLbZoH4bbPvWvggMlB9TAxiQRPlxTEXLo9ZlgUHsUo_Xi3GzB8APHXfLtCv8NUpRfy4d3HF7z-9RK4RFuJYbPZxZYM3AYBFCy9orKZwZtNQRbRInl5HZdzQpPNhghc9DdEgwpBV_sYEPiytEmRKgnoxqp313V2IH7_PJLcr_AeZ7LGJ67raoZqkDkrY5BOHp2ubpcM8gaho2IAmUNtG_3qngG9Npb1sPPK0iabhSSpeyTcS7I7B4lmIjEjFL0gBy6Uldd9kyCmH-nkHeQTxbRuSP01NKezEkBEyUD9webiDxUUT9vyd7I7Z3nAnIbwsPcU4AHV5Kcs9fGPDT23jjCv4rYfz5QjxrnbPH2MoHDsGoPxYOHm136HGcrD6-WA1wjouXaX_ONAeQbrG_6sUYllDHYUBi7RXtLLPK42Yu3no7WN0s3_RtzymCiQ&scope=openid&state=Y7AR3BEtLHOSR9bL&token_type=bearer
2.713 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiRE1MOXJCZWIzNjhlMzNZNVRIOHE2dyIsImF1ZCI6WyJlZTRjY2E1Yi00Y2FkLTQ3ZTAtOTdiZC1hYTBhZTIwOGQyMDUiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiI4Ukd3cExhUWxLY2xDWjlQWFYxU3JBIiwiZXhwIjoxNTI5NzU1MjE0LCJpYXQiOjE1Mjk3NTE2MTQsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImJhYmY2YWY3LTY1M2MtNGFhMC05YTUzLWFiNDFjNmEyMTg4MyIsIm5vbmNlIjoiVkx2Y3pzWTN6QVF0NTJTWiIsInJhdCI6MTUyOTc1MTYxMywic3ViIjoiZm9vQGJhci5jb20ifQ.sIOSW2_yIHMG-XLVPezBsjldQ1EphMaKHdk1dVZ_rc7ZcSVPjKvOaCUqAjmsIEC-kUYNyVnbI8Kdj-ICmw3zzUsVa31QQcG-Q73hP1pB0ytGCyCm2GbM2OyQViV51ouzHlJ0h-m8rNJYNLb4JgbMUkRaaLWlHwqf9uvDX_Sg7E8R-g05TcQujLZeDzXbUGp5K_6S-88yiqPs_D76shLzLe7-bj3R-MN2vbhkPVA3dQcfjEoW3vLbZoH4bbPvWvggMlB9TAxiQRPlxTEXLo9ZlgUHsUo_Xi3GzB8APHXfLtCv8NUpRfy4d3HF7z-9RK4RFuJYbPZxZYM3AYBFCy9orKZwZtNQRbRInl5HZdzQpPNhghc9DdEgwpBV_sYEPiytEmRKgnoxqp313V2IH7_PJLcr_AeZ7LGJ67raoZqkDkrY5BOHp2ubpcM8gaho2IAmUNtG_3qngG9Npb1sPPK0iabhSSpeyTcS7I7B4lmIjEjFL0gBy6Uldd9kyCmH-nkHeQTxbRuSP01NKezEkBEyUD9webiDxUUT9vyd7I7Z3nAnIbwsPcU4AHV5Kcs9fGPDT23jjCv4rYfz5QjxrnbPH2MoHDsGoPxYOHm136HGcrD6-WA1wjouXaX_ONAeQbrG_6sUYllDHYUBi7RXtLLPK42Yu3no7WN0s3_RtzymCiQ', 'scope': 'openid', 'code': 'PtHhV-Q8zWbdTwFJ3yxizkYzvz35kOxBvkvte48KrkU.iT0hPovz81QhSrZTQQGpVB-sF9poplbaVn5lulHLv5I', 'access_token': 'FH9bhJdda9dhASOWuebln5TbvtZwFMfBmosUmvPxF5A.9QdRU_hR8eVTfFBcA_5tv-FQTMEg4pZtmdNXQtZ3o5I', 'state': 'Y7AR3BEtLHOSR9bL', 'expires_in': 3599, 'token_type': 'bearer'}
2.815 AuthorizationResponse {
"access_token": "FH9bhJdda9dhASOWuebln5TbvtZwFMfBmosUmvPxF5A.9QdRU_hR8eVTfFBcA_5tv-FQTMEg4pZtmdNXQtZ3o5I",
"code": "PtHhV-Q8zWbdTwFJ3yxizkYzvz35kOxBvkvte48KrkU.iT0hPovz81QhSrZTQQGpVB-sF9poplbaVn5lulHLv5I",
"expires_in": 3599,
"id_token": {
"at_hash": "DML9rBeb368e33Y5TH8q6w",
"aud": [
"ee4cca5b-4cad-47e0-97bd-aa0ae208d205"
],
"auth_time": 1529751409,
"c_hash": "8RGwpLaQlKclCZ9PXV1SrA",
"exp": 1529755214,
"iat": 1529751614,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "babf6af7-653c-4aa0-9a53-ab41c6a21883",
"nonce": "VLvczsY3zAQt52SZ",
"rat": 1529751613,
"sub": "[email protected]"
},
"scope": "openid",
"state": "Y7AR3BEtLHOSR9bL",
"token_type": "bearer"
}
2.815 phase <--<-- 4 --- Done -->-->
2.815 end
2.816 assertion VerifyAuthnResponse
2.816 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
2.816 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-redirect_uri-Query-Added.txt 0000644 0000000 0000000 00000011170 13313424265 017013 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-Query-Added
Test description: Request with redirect_uri with query component when registered redirect_uri has no query component
Timestamp: 2018-06-23T11:02:13Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.09 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.091 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.091 phase <--<-- 2 --- Registration -->-->
0.091 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.091 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#tT66PBtCXisVrQmD"
],
"response_types": [
"code id_token token"
]
}
0.246 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.247 RegistrationResponse {
"client_id": "ffd72e2e-a404-4abe-9087-c77220729fb0",
"client_secret": "BRPR54FnHE2m",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "ffd72e2e-a404-4abe-9087-c77220729fb0",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#tT66PBtCXisVrQmD"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.248 phase <--<-- 3 --- Note -->-->
============================================================
Conditions
============================================================
RESULT: PARTIAL RESULT
./OP-redirect_uri-Missing.txt 0000644 0000000 0000000 00000011357 13313424257 016330 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-Missing
Test description: Reject request without redirect_uri when multiple registered
Timestamp: 2018-06-23T11:02:07Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.072 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Registration -->-->
0.074 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb', 'https://op.certification.openid.net:61353/cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.074 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb",
"https://op.certification.openid.net:61353/cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#xaa8FQQ6ymrgPdCw"
],
"response_types": [
"code id_token token"
]
}
0.264 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.265 RegistrationResponse {
"client_id": "9e6408dc-eab8-46ea-80d0-63c8d182ece6",
"client_secret": "pYonF9WZVpWU",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "9e6408dc-eab8-46ea-80d0-63c8d182ece6",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb",
"https://op.certification.openid.net:61353/cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#xaa8FQQ6ymrgPdCw"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.265 phase <--<-- 3 --- Note -->-->
============================================================
Conditions
============================================================
RESULT: PARTIAL RESULT
./OP-redirect_uri-NotReg.txt 0000644 0000000 0000000 00000011114 13313424262 016100 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-NotReg
Test description: Sent redirect_uri does not match a registered redirect_uri
Timestamp: 2018-06-23T11:02:10Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.119 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.121 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.121 phase <--<-- 2 --- Registration -->-->
0.121 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.121 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#QXa497ySSJlZi9sa"
],
"response_types": [
"code id_token token"
]
}
0.281 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.282 RegistrationResponse {
"client_id": "017194d7-9a22-4c57-8278-27a6df58653d",
"client_secret": ".qQIIRZ0V.Ew",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "017194d7-9a22-4c57-8278-27a6df58653d",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#QXa497ySSJlZi9sa"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.282 phase <--<-- 3 --- Note -->-->
============================================================
Conditions
============================================================
RESULT: PARTIAL RESULT
./OP-Req-ui_locales.txt 0000644 0000000 0000000 00000023305 13313424442 015075 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-ui_locales
Test description: Providing ui_locales
Timestamp: 2018-06-23T11:04:02Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
3.615 phase <--<-- 1 --- Webfinger -->-->
3.616 not expected to do WebFinger
3.616 phase <--<-- 2 --- Discovery -->-->
3.616 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
3.69 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
3.691 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
3.691 phase <--<-- 3 --- Registration -->-->
3.691 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
3.692 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#gLcwUVFE1yubjhVd"
],
"response_types": [
"code id_token token"
]
}
3.848 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
3.849 RegistrationResponse {
"client_id": "063bc93d-de47-426e-b88c-ab3649832055",
"client_secret": "JdlK.UV1y~G8",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "063bc93d-de47-426e-b88c-ab3649832055",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#gLcwUVFE1yubjhVd"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
3.849 phase <--<-- 4 --- AsyncAuthn -->-->
3.849 AuthorizationRequest {
"client_id": "063bc93d-de47-426e-b88c-ab3649832055",
"nonce": "BwGjpG3xWILtdmgS",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid",
"state": "rvguX9WOrY7ELhy5",
"ui_locales": "se"
}
3.849 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?ui_locales=se&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=063bc93d-de47-426e-b88c-ab3649832055&state=rvguX9WOrY7ELhy5&response_type=code+id_token+token&nonce=BwGjpG3xWILtdmgS
3.85 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?ui_locales=se&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=063bc93d-de47-426e-b88c-ab3649832055&state=rvguX9WOrY7ELhy5&response_type=code+id_token+token&nonce=BwGjpG3xWILtdmgS
6.886 http args {}
7.056 response URL with fragment
7.056 response access_token=uQIPwNIbtI3h-6osErT_ZT_bhOUpljUSF2KVD0l0Z6A.GSyI7PJCAYWq5V-E93C1L-apecsWDtQvm_OamSrH5wk&code=DvdQQA4xGOFwZpuv0VM7cEg5vRFiL_kdyGl7YR6Q_M0.WhmJiMRasxebf68j_Ror3HXVmJjxHp34cygWb2QYKBk&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiYU1XdmJuOHdaNnZoRml1ZWNheTR1ZyIsImF1ZCI6WyIwNjNiYzkzZC1kZTQ3LTQyNmUtYjg4Yy1hYjM2NDk4MzIwNTUiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiIzZ285eFVMcGphYjhJU3ZQVzNZOFh3IiwiZXhwIjoxNTI5NzU1NDQxLCJpYXQiOjE1Mjk3NTE4NDEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImE1MTA1YzA3LWU4NDctNDI3Yi05OTUxLWE3ZmEzYTUxMWE0YiIsIm5vbmNlIjoiQndHanBHM3hXSUx0ZG1nUyIsInJhdCI6MTUyOTc1MTgzOSwic3ViIjoiZm9vQGJhci5jb20ifQ.0Y3NnRTYwjfaeXNI4nXvERyOOjTAoSk4w8UoHgzSQcZ8HbRKcUv3vE1oSNVv7yf0gygGdo5tmfJv8rEHomUE1ELE0OMUWl6zUasObRf5L4SmQyN4kubUIqXwGPfUifsyRT2SwIUODALVBYXdpi7Q1wGyAwb1JthfbDio5mgONRD_ytqK9WBLTrkfNUnqBRAm626-I8ziQoioRJHhYHNHRh-rEviVbidS4Bpxsb1OUVkvH1-Roaw0J_L-oO-o-d8_ZAnb6suiLBIH7QS1QcbPNPyOG9espYfjoZXf7alOLOUHJ62Y18EIR7QwLdBYFi9YeTA78uc24XHFSt_2u-QxsuLu9FFxTs1PnW3AVUKYonhD06nsJNt4HRIkrWHC-4daXivXzD6gklpP_epgwABrNYQOYnNULNPhMl5BBB7XjkLSJERnJa0xHK8wZgfji48VPEIQWLvAj2KxgC0QOquhW4D0lwN8gZqZgaAUq9WheNvofw5Qk-jEGU18crzxtdne2c8p0f9fUCh5s7JUFoCAh0AOKW5VnU5ZMsySN1WSNUtz-ULXvyXTlOczoyXbbpbIuCNWMaAqqaqwSuhkpbnypsQyORgPpg2cnULkEbl_jcSgkOPm_0t00fVHdAQ7beHHZ9sOLl6LsgrmWpUocuAr5bCfR2WRhIQry1uG-WRJb2U&scope=openid&state=rvguX9WOrY7ELhy5&token_type=bearer
7.056 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiYU1XdmJuOHdaNnZoRml1ZWNheTR1ZyIsImF1ZCI6WyIwNjNiYzkzZC1kZTQ3LTQyNmUtYjg4Yy1hYjM2NDk4MzIwNTUiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiIzZ285eFVMcGphYjhJU3ZQVzNZOFh3IiwiZXhwIjoxNTI5NzU1NDQxLCJpYXQiOjE1Mjk3NTE4NDEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImE1MTA1YzA3LWU4NDctNDI3Yi05OTUxLWE3ZmEzYTUxMWE0YiIsIm5vbmNlIjoiQndHanBHM3hXSUx0ZG1nUyIsInJhdCI6MTUyOTc1MTgzOSwic3ViIjoiZm9vQGJhci5jb20ifQ.0Y3NnRTYwjfaeXNI4nXvERyOOjTAoSk4w8UoHgzSQcZ8HbRKcUv3vE1oSNVv7yf0gygGdo5tmfJv8rEHomUE1ELE0OMUWl6zUasObRf5L4SmQyN4kubUIqXwGPfUifsyRT2SwIUODALVBYXdpi7Q1wGyAwb1JthfbDio5mgONRD_ytqK9WBLTrkfNUnqBRAm626-I8ziQoioRJHhYHNHRh-rEviVbidS4Bpxsb1OUVkvH1-Roaw0J_L-oO-o-d8_ZAnb6suiLBIH7QS1QcbPNPyOG9espYfjoZXf7alOLOUHJ62Y18EIR7QwLdBYFi9YeTA78uc24XHFSt_2u-QxsuLu9FFxTs1PnW3AVUKYonhD06nsJNt4HRIkrWHC-4daXivXzD6gklpP_epgwABrNYQOYnNULNPhMl5BBB7XjkLSJERnJa0xHK8wZgfji48VPEIQWLvAj2KxgC0QOquhW4D0lwN8gZqZgaAUq9WheNvofw5Qk-jEGU18crzxtdne2c8p0f9fUCh5s7JUFoCAh0AOKW5VnU5ZMsySN1WSNUtz-ULXvyXTlOczoyXbbpbIuCNWMaAqqaqwSuhkpbnypsQyORgPpg2cnULkEbl_jcSgkOPm_0t00fVHdAQ7beHHZ9sOLl6LsgrmWpUocuAr5bCfR2WRhIQry1uG-WRJb2U', 'scope': 'openid', 'code': 'DvdQQA4xGOFwZpuv0VM7cEg5vRFiL_kdyGl7YR6Q_M0.WhmJiMRasxebf68j_Ror3HXVmJjxHp34cygWb2QYKBk', 'access_token': 'uQIPwNIbtI3h-6osErT_ZT_bhOUpljUSF2KVD0l0Z6A.GSyI7PJCAYWq5V-E93C1L-apecsWDtQvm_OamSrH5wk', 'state': 'rvguX9WOrY7ELhy5', 'expires_in': 3599, 'token_type': 'bearer'}
7.14 AuthorizationResponse {
"access_token": "uQIPwNIbtI3h-6osErT_ZT_bhOUpljUSF2KVD0l0Z6A.GSyI7PJCAYWq5V-E93C1L-apecsWDtQvm_OamSrH5wk",
"code": "DvdQQA4xGOFwZpuv0VM7cEg5vRFiL_kdyGl7YR6Q_M0.WhmJiMRasxebf68j_Ror3HXVmJjxHp34cygWb2QYKBk",
"expires_in": 3599,
"id_token": {
"at_hash": "aMWvbn8wZ6vhFiuecay4ug",
"aud": [
"063bc93d-de47-426e-b88c-ab3649832055"
],
"auth_time": 1529751824,
"c_hash": "3go9xULpjab8ISvPW3Y8Xw",
"exp": 1529755441,
"iat": 1529751841,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "a5105c07-e847-427b-9951-a7fa3a511a4b",
"nonce": "BwGjpG3xWILtdmgS",
"rat": 1529751839,
"sub": "[email protected]"
},
"scope": "openid",
"state": "rvguX9WOrY7ELhy5",
"token_type": "bearer"
}
7.14 phase <--<-- 5 --- Done -->-->
7.14 end
7.141 assertion VerifyAuthnResponse
7.141 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
7.141 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-prompt-login.txt 0000644 0000000 0000000 00000053211 13313424225 014656 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-prompt-login
Test description: Request with prompt=login
Timestamp: 2018-06-23T11:01:41Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.076 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.078 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.078 phase <--<-- 2 --- Registration -->-->
0.078 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.078 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#YRIQkCkCA8nRLT7D"
],
"response_types": [
"code id_token token"
]
}
0.234 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.234 RegistrationResponse {
"client_id": "ac97af8d-4a02-41c8-9c40-20a90cbc88c2",
"client_secret": "GBAzBcue_eZM",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "ac97af8d-4a02-41c8-9c40-20a90cbc88c2",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#YRIQkCkCA8nRLT7D"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.234 phase <--<-- 3 --- AsyncAuthn -->-->
0.235 AuthorizationRequest {
"client_id": "ac97af8d-4a02-41c8-9c40-20a90cbc88c2",
"nonce": "kCbhEOvp689kpIy5",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid",
"state": "eU9tXVw4xA1T5V2N"
}
0.235 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=ac97af8d-4a02-41c8-9c40-20a90cbc88c2&state=eU9tXVw4xA1T5V2N&response_type=code+id_token+token&nonce=kCbhEOvp689kpIy5
0.235 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=ac97af8d-4a02-41c8-9c40-20a90cbc88c2&state=eU9tXVw4xA1T5V2N&response_type=code+id_token+token&nonce=kCbhEOvp689kpIy5
2.399 http args {}
2.572 response URL with fragment
2.572 response access_token=G1BZhcgHWu48T3RI1iYNDRITZQ2YKvBZSXPvSU2lZiE.-mD3NRDZjEqaGeGd8CXmhVmoeXPDmhvZSIZJdrAV6zA&code=dOERApDG4FLe_QFH7APmHFFwrFW_e4l5ToXaBzVfw6I.mNsli4B2rRHEppMjJyll6U3kGSiDZJf6M7QBT9FTIzE&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiSndmTzhhZUNJTDJCQmhnUFhJTVMwQSIsImF1ZCI6WyJhYzk3YWY4ZC00YTAyLTQxYzgtOWM0MC0yMGE5MGNiYzg4YzIiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJKek9QV2VkWEMwc29NdDB3cTBIQ25RIiwiZXhwIjoxNTI5NzU1MjkzLCJpYXQiOjE1Mjk3NTE2OTMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6Ijk2ZDc4NDdkLTFhYWItNDNiZS1hYjRiLWFlYjdhMjgxNDc2NCIsIm5vbmNlIjoia0NiaEVPdnA2ODlrcEl5NSIsInJhdCI6MTUyOTc1MTY5MSwic3ViIjoiZm9vQGJhci5jb20ifQ.WD6j1Q-ZGXM-KJ2D-8m9lscA8ewgORIZ3EFWGeZ1_a3__G6k2CsRGZfY0ViFJFuIzJk1ikMJmMPF2B2RqZ8IvtOC-pPGmfRTCoEJUJu2T1rg2BmhqVYFCeIeDy4VPlc_cq81SBeIOtdA0mAx0zYe8chMW_otNh8hOJkaTALbEJ_Gu2J8oE6guvbiB0rUSzNVcaUjSpMYA8QfkPRDD9J7zHtWCJHEIFNP6crSD2uPMhZcMLgKyLSwIWYH3mOI0qtKtyv-QON6bqA8YsccHEZZZCTEFRNa8PNrqofjJ-UNJwUeR2XRt_7mA1rs2y7LxG9JrsM7Th2aG76cMkF5QICN8pxbPsZX8ocRpMZpiJ1OTVYm48qMAKW2T87DbqbCQ9kKXMUHe2CNHEM5ZeU3_wrEBWzjpiE-TMTOZDDwaG9lRNt7YZ7Xaj3O1pW6jxWnL5Di2wWBztUOxVeu3XJwFwwEOCWN7jIwcFSDqcAh2D2XDBA3B5EWb-RtzX3K4Cv-9UHiv9pFpmiYWpHRkClJ0na39UuqXMNMlpmH7LORG3OHpI-c3Vbg7QIDg8hWUbqiXCe7R9wPONtDkoM_jNC6YPaMWvuea-1xRY4MpItx9EJ4w91dHAXNn8rG-xB2rMsr9S3Rb-ENwJIJ9Cr3rf62-FhY6vmxfIXgj9tvMH5JbB511A8&scope=openid&state=eU9tXVw4xA1T5V2N&token_type=bearer
2.573 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiSndmTzhhZUNJTDJCQmhnUFhJTVMwQSIsImF1ZCI6WyJhYzk3YWY4ZC00YTAyLTQxYzgtOWM0MC0yMGE5MGNiYzg4YzIiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJKek9QV2VkWEMwc29NdDB3cTBIQ25RIiwiZXhwIjoxNTI5NzU1MjkzLCJpYXQiOjE1Mjk3NTE2OTMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6Ijk2ZDc4NDdkLTFhYWItNDNiZS1hYjRiLWFlYjdhMjgxNDc2NCIsIm5vbmNlIjoia0NiaEVPdnA2ODlrcEl5NSIsInJhdCI6MTUyOTc1MTY5MSwic3ViIjoiZm9vQGJhci5jb20ifQ.WD6j1Q-ZGXM-KJ2D-8m9lscA8ewgORIZ3EFWGeZ1_a3__G6k2CsRGZfY0ViFJFuIzJk1ikMJmMPF2B2RqZ8IvtOC-pPGmfRTCoEJUJu2T1rg2BmhqVYFCeIeDy4VPlc_cq81SBeIOtdA0mAx0zYe8chMW_otNh8hOJkaTALbEJ_Gu2J8oE6guvbiB0rUSzNVcaUjSpMYA8QfkPRDD9J7zHtWCJHEIFNP6crSD2uPMhZcMLgKyLSwIWYH3mOI0qtKtyv-QON6bqA8YsccHEZZZCTEFRNa8PNrqofjJ-UNJwUeR2XRt_7mA1rs2y7LxG9JrsM7Th2aG76cMkF5QICN8pxbPsZX8ocRpMZpiJ1OTVYm48qMAKW2T87DbqbCQ9kKXMUHe2CNHEM5ZeU3_wrEBWzjpiE-TMTOZDDwaG9lRNt7YZ7Xaj3O1pW6jxWnL5Di2wWBztUOxVeu3XJwFwwEOCWN7jIwcFSDqcAh2D2XDBA3B5EWb-RtzX3K4Cv-9UHiv9pFpmiYWpHRkClJ0na39UuqXMNMlpmH7LORG3OHpI-c3Vbg7QIDg8hWUbqiXCe7R9wPONtDkoM_jNC6YPaMWvuea-1xRY4MpItx9EJ4w91dHAXNn8rG-xB2rMsr9S3Rb-ENwJIJ9Cr3rf62-FhY6vmxfIXgj9tvMH5JbB511A8', 'scope': 'openid', 'code': 'dOERApDG4FLe_QFH7APmHFFwrFW_e4l5ToXaBzVfw6I.mNsli4B2rRHEppMjJyll6U3kGSiDZJf6M7QBT9FTIzE', 'access_token': 'G1BZhcgHWu48T3RI1iYNDRITZQ2YKvBZSXPvSU2lZiE.-mD3NRDZjEqaGeGd8CXmhVmoeXPDmhvZSIZJdrAV6zA', 'state': 'eU9tXVw4xA1T5V2N', 'expires_in': 3599, 'token_type': 'bearer'}
2.652 AuthorizationResponse {
"access_token": "G1BZhcgHWu48T3RI1iYNDRITZQ2YKvBZSXPvSU2lZiE.-mD3NRDZjEqaGeGd8CXmhVmoeXPDmhvZSIZJdrAV6zA",
"code": "dOERApDG4FLe_QFH7APmHFFwrFW_e4l5ToXaBzVfw6I.mNsli4B2rRHEppMjJyll6U3kGSiDZJf6M7QBT9FTIzE",
"expires_in": 3599,
"id_token": {
"at_hash": "JwfO8aeCIL2BBhgPXIMS0A",
"aud": [
"ac97af8d-4a02-41c8-9c40-20a90cbc88c2"
],
"auth_time": 1529751409,
"c_hash": "JzOPWedXC0soMt0wq0HCnQ",
"exp": 1529755293,
"iat": 1529751693,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "96d7847d-1aab-43be-ab4b-aeb7a2814764",
"nonce": "kCbhEOvp689kpIy5",
"rat": 1529751691,
"sub": "[email protected]"
},
"scope": "openid",
"state": "eU9tXVw4xA1T5V2N",
"token_type": "bearer"
}
2.652 phase <--<-- 4 --- AccessToken -->-->
2.652 --> request op_args: {'state': 'eU9tXVw4xA1T5V2N'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.652 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'eU9tXVw4xA1T5V2N', 'code': 'dOERApDG4FLe_QFH7APmHFFwrFW_e4l5ToXaBzVfw6I.mNsli4B2rRHEppMjJyll6U3kGSiDZJf6M7QBT9FTIzE', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'ac97af8d-4a02-41c8-9c40-20a90cbc88c2'}, 'state': 'eU9tXVw4xA1T5V2N'}
2.652 AccessTokenRequest {
"code": "dOERApDG4FLe_QFH7APmHFFwrFW_e4l5ToXaBzVfw6I.mNsli4B2rRHEppMjJyll6U3kGSiDZJf6M7QBT9FTIzE",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "eU9tXVw4xA1T5V2N"
}
2.652 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.652 request_http_args {'headers': {'Authorization': 'Basic YWM5N2FmOGQtNGEwMi00MWM4LTljNDAtMjBhOTBjYmM4OGMyOkdCQXpCY3VlX2VaTQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.652 request code=dOERApDG4FLe_QFH7APmHFFwrFW_e4l5ToXaBzVfw6I.mNsli4B2rRHEppMjJyll6U3kGSiDZJf6M7QBT9FTIzE&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=eU9tXVw4xA1T5V2N
2.872 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.873 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiSndmTzhhZUNJTDJCQmhnUFhJTVMwQSIsImF1ZCI6WyJhYzk3YWY4ZC00YTAyLTQxYzgtOWM0MC0yMGE5MGNiYzg4YzIiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJKek9QV2VkWEMwc29NdDB3cTBIQ25RIiwiZXhwIjoxNTI5NzU1MjkzLCJpYXQiOjE1Mjk3NTE2OTQsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjEwNjM3M2EzLWI3MzktNDA3NC1iNTBmLTQ5ZDU4NTNkMTUzNyIsIm5vbmNlIjoia0NiaEVPdnA2ODlrcEl5NSIsInJhdCI6MTUyOTc1MTY5MSwic3ViIjoiZm9vQGJhci5jb20ifQ.VMwWDWCseiju03Wqxo8mG01JzaxBy3_elLEWis6resN0PpBztDKXKbBXnNlvIw4GL-KMA2O3iW6JRu70wNXuISq1MmHblgFUcq1XW7Hg66512V2NhywzN_vvLuE3OgcTr7rxa72WDLROGjjQ9ppIyU-Z5sTatQTh1X40kAcHokEZbgWy4rr52hBrjnu4NTL536_lV4x12i0W6BT_bqgKK-wywNiqKUA_jVWYkFVkEmBA5FXaEy0qDnIrm79ta0anhJ-1XrWdmG7mxfyVTYPg9SoXN4BSeTWOTkzxOGXd1dADvCft0kNSk8yh6zynTZWq-psFR-87YPURusYAxIHJUs2b-qO6KdR6MBfmIvg2U8X5Lkmo49MtO00oVOch9qrudzQsjS0iJIDJEnW5g2YiVbNdB2P3PIktzhGTqNoGREQvMGaN-fCZ9CvWem7_-VBFv98WVP4vQz3aV9WmuHQKnu4gfVTaWq17ikdiQmWcGufHjmqhP6MGWRWLKcDCozSiInwwOPwUJXvtW6HCPCERrO3JVdiDo3QD1LdeRBil3MpQGjxHtH7yiJnHi-9O16KNFM_uNzVWwpTcvXD3_bpAcBONJvJhSrbzKyOinuuD0BTYKlmlPSdjVpXi5_DXkD1sEJcbByZQIC3azagBHO-YiJkJAeyMl0CWdl5yJiS1n_g', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': '4EG5JwCWQY5QPEqMis_H4JtcoWffladzg-wPLlBFSa4.Be4_uc905NMr4nkZ1R-oXkEf7G0_sEoLZfMCP9F-rXY', 'scope': 'openid'}
2.877 AccessTokenResponse {
"access_token": "4EG5JwCWQY5QPEqMis_H4JtcoWffladzg-wPLlBFSa4.Be4_uc905NMr4nkZ1R-oXkEf7G0_sEoLZfMCP9F-rXY",
"expires_in": 3599,
"id_token": {
"at_hash": "JwfO8aeCIL2BBhgPXIMS0A",
"aud": [
"ac97af8d-4a02-41c8-9c40-20a90cbc88c2"
],
"auth_time": 1529751409,
"c_hash": "JzOPWedXC0soMt0wq0HCnQ",
"exp": 1529755293,
"iat": 1529751694,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "106373a3-b739-4074-b50f-49d5853d1537",
"nonce": "kCbhEOvp689kpIy5",
"rat": 1529751691,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
2.877 phase <--<-- 5 --- Note -->-->
4.251 phase <--<-- 6 --- AsyncAuthn -->-->
4.252 AuthorizationRequest {
"client_id": "ac97af8d-4a02-41c8-9c40-20a90cbc88c2",
"nonce": "a2SgEc0OcVFDfOMO",
"prompt": [
"login"
],
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid",
"state": "O1VUb7s4BM85MKtq"
}
4.252 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=login&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=ac97af8d-4a02-41c8-9c40-20a90cbc88c2&state=O1VUb7s4BM85MKtq&response_type=code+id_token+token&nonce=a2SgEc0OcVFDfOMO
4.252 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=login&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=ac97af8d-4a02-41c8-9c40-20a90cbc88c2&state=O1VUb7s4BM85MKtq&response_type=code+id_token+token&nonce=a2SgEc0OcVFDfOMO
9.555 http args {}
9.726 response URL with fragment
9.727 response access_token=Ay8_RmgqyIs7PV83DpO0QDqagfvgUnWkSvEf9m9r-BE.LsJHo7b493DmvwVbW2aspYBJiBmDKjFCmw_q78vAZP8&code=geaJF-AgvcvPBXPuaYya8gvpYMMxm4ehytnD4xnDjnQ.UGDse3fYXwTpMvnCNP6bFuanNOfJVpqqBe44Eq98MoQ&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiZ2dDekN5Nml1UWNTQ29ULTY4YkJIUSIsImF1ZCI6WyJhYzk3YWY4ZC00YTAyLTQxYzgtOWM0MC0yMGE5MGNiYzg4YzIiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiJqN25JLThNU2VCRDhPbEEtVXpMV3V3IiwiZXhwIjoxNTI5NzU1MzAwLCJpYXQiOjE1Mjk3NTE3MDAsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImFiZjgyNGM0LTcwNzktNDNkOS04ODBlLTc2OTQ1Zjc1ZTI5MSIsIm5vbmNlIjoiYTJTZ0VjME9jVkZEZk9NTyIsInJhdCI6MTUyOTc1MTY5NSwic3ViIjoiZm9vQGJhci5jb20ifQ.svnHMZsF_6o4neu5j0pV9MusbFMD5ykUhAF12SwG7WtaXTikCUSZ7b3kJU4NYNPQ5yAA0NmIturyHkDi-KSDnnyvvMi5-C21hbbzjQAizT7zNvCaAFpAi8Ry7FGeyzPQZORa0y1F0KkpB3ZrODKwNy_-AzZlerjyAe8zAMe6sKcPA8JMd5-OgFBewYLKM6IRLsbhO3YD_gCATOnH8tufIEgtpTSEriBCIK06A74K_xtOV9syNZ56C5dtu_Obcv5AfzKfYjftpGB5su77SLdr17bEUtW1tUGiDv6iAteWRawLBgWFZrhPJFfJkfqlgnUrr0j4Bh18O2dpKCTUmGQIGDman2_sGrtlcAVNE2OX3HhWUFw-sqrasB7AJk261tHHByxkkomPU_1V_cr8XN2x3Zy4jg7FMY6CHGCi9_psQlKuozl8YKWcBOqFZE_BlXSaj1DF0BcUOXz2COGcNuHbDJeEjblANY_zuCmyZfXQxxlJyS4bpdENnI_1rGfR90XfSngH9pNS_6WJFKjtnn5cJ8zkQua6UXNJDzW6efxUx83elNprh81bTh4bUNlrLHECIzWqRnr3bm3MuHJ9kbLiNhEdlAczGsX5h_PHKsA-3aNP__Y9qarZoPON_jT17PHP1rdHpV5I7FZJxy2Iv3gj8J0pgQrSUib4rxWiXUXEwws&scope=openid&state=O1VUb7s4BM85MKtq&token_type=bearer
9.727 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiZ2dDekN5Nml1UWNTQ29ULTY4YkJIUSIsImF1ZCI6WyJhYzk3YWY4ZC00YTAyLTQxYzgtOWM0MC0yMGE5MGNiYzg4YzIiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiJqN25JLThNU2VCRDhPbEEtVXpMV3V3IiwiZXhwIjoxNTI5NzU1MzAwLCJpYXQiOjE1Mjk3NTE3MDAsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImFiZjgyNGM0LTcwNzktNDNkOS04ODBlLTc2OTQ1Zjc1ZTI5MSIsIm5vbmNlIjoiYTJTZ0VjME9jVkZEZk9NTyIsInJhdCI6MTUyOTc1MTY5NSwic3ViIjoiZm9vQGJhci5jb20ifQ.svnHMZsF_6o4neu5j0pV9MusbFMD5ykUhAF12SwG7WtaXTikCUSZ7b3kJU4NYNPQ5yAA0NmIturyHkDi-KSDnnyvvMi5-C21hbbzjQAizT7zNvCaAFpAi8Ry7FGeyzPQZORa0y1F0KkpB3ZrODKwNy_-AzZlerjyAe8zAMe6sKcPA8JMd5-OgFBewYLKM6IRLsbhO3YD_gCATOnH8tufIEgtpTSEriBCIK06A74K_xtOV9syNZ56C5dtu_Obcv5AfzKfYjftpGB5su77SLdr17bEUtW1tUGiDv6iAteWRawLBgWFZrhPJFfJkfqlgnUrr0j4Bh18O2dpKCTUmGQIGDman2_sGrtlcAVNE2OX3HhWUFw-sqrasB7AJk261tHHByxkkomPU_1V_cr8XN2x3Zy4jg7FMY6CHGCi9_psQlKuozl8YKWcBOqFZE_BlXSaj1DF0BcUOXz2COGcNuHbDJeEjblANY_zuCmyZfXQxxlJyS4bpdENnI_1rGfR90XfSngH9pNS_6WJFKjtnn5cJ8zkQua6UXNJDzW6efxUx83elNprh81bTh4bUNlrLHECIzWqRnr3bm3MuHJ9kbLiNhEdlAczGsX5h_PHKsA-3aNP__Y9qarZoPON_jT17PHP1rdHpV5I7FZJxy2Iv3gj8J0pgQrSUib4rxWiXUXEwws', 'scope': 'openid', 'code': 'geaJF-AgvcvPBXPuaYya8gvpYMMxm4ehytnD4xnDjnQ.UGDse3fYXwTpMvnCNP6bFuanNOfJVpqqBe44Eq98MoQ', 'access_token': 'Ay8_RmgqyIs7PV83DpO0QDqagfvgUnWkSvEf9m9r-BE.LsJHo7b493DmvwVbW2aspYBJiBmDKjFCmw_q78vAZP8', 'state': 'O1VUb7s4BM85MKtq', 'expires_in': 3599, 'token_type': 'bearer'}
9.731 AuthorizationResponse {
"access_token": "Ay8_RmgqyIs7PV83DpO0QDqagfvgUnWkSvEf9m9r-BE.LsJHo7b493DmvwVbW2aspYBJiBmDKjFCmw_q78vAZP8",
"code": "geaJF-AgvcvPBXPuaYya8gvpYMMxm4ehytnD4xnDjnQ.UGDse3fYXwTpMvnCNP6bFuanNOfJVpqqBe44Eq98MoQ",
"expires_in": 3599,
"id_token": {
"at_hash": "ggCzCy6iuQcSCoT-68bBHQ",
"aud": [
"ac97af8d-4a02-41c8-9c40-20a90cbc88c2"
],
"auth_time": 1529751698,
"c_hash": "j7nI-8MSeBD8OlA-UzLWuw",
"exp": 1529755300,
"iat": 1529751700,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "abf824c4-7079-43d9-880e-76945f75e291",
"nonce": "a2SgEc0OcVFDfOMO",
"rat": 1529751695,
"sub": "[email protected]"
},
"scope": "openid",
"state": "O1VUb7s4BM85MKtq",
"token_type": "bearer"
}
9.731 phase <--<-- 7 --- AccessToken -->-->
9.731 --> request op_args: {'state': 'O1VUb7s4BM85MKtq'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
9.731 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'O1VUb7s4BM85MKtq', 'code': 'geaJF-AgvcvPBXPuaYya8gvpYMMxm4ehytnD4xnDjnQ.UGDse3fYXwTpMvnCNP6bFuanNOfJVpqqBe44Eq98MoQ', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'ac97af8d-4a02-41c8-9c40-20a90cbc88c2'}, 'state': 'O1VUb7s4BM85MKtq'}
9.731 AccessTokenRequest {
"code": "geaJF-AgvcvPBXPuaYya8gvpYMMxm4ehytnD4xnDjnQ.UGDse3fYXwTpMvnCNP6bFuanNOfJVpqqBe44Eq98MoQ",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "O1VUb7s4BM85MKtq"
}
9.731 request_url https://oidc-certification.ory.sh:8443/oauth2/token
9.731 request_http_args {'headers': {'Authorization': 'Basic YWM5N2FmOGQtNGEwMi00MWM4LTljNDAtMjBhOTBjYmM4OGMyOkdCQXpCY3VlX2VaTQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
9.731 request code=geaJF-AgvcvPBXPuaYya8gvpYMMxm4ehytnD4xnDjnQ.UGDse3fYXwTpMvnCNP6bFuanNOfJVpqqBe44Eq98MoQ&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=O1VUb7s4BM85MKtq
9.967 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
9.968 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiZ2dDekN5Nml1UWNTQ29ULTY4YkJIUSIsImF1ZCI6WyJhYzk3YWY4ZC00YTAyLTQxYzgtOWM0MC0yMGE5MGNiYzg4YzIiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiJqN25JLThNU2VCRDhPbEEtVXpMV3V3IiwiZXhwIjoxNTI5NzU1MzAwLCJpYXQiOjE1Mjk3NTE3MDEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImQzOGMyMGQ2LTQ3N2UtNDJhMS05ZWY1LWNkYmQxODllMmFkMCIsIm5vbmNlIjoiYTJTZ0VjME9jVkZEZk9NTyIsInJhdCI6MTUyOTc1MTY5NSwic3ViIjoiZm9vQGJhci5jb20ifQ.fFUQnNAoVSxXDENoXWEh8diS3yuxCiOOqT5Nq0yxH5jG5RHNsLxwmWmNjWml9wCbl4JvN7l_vmEeElcDdTNFLkwdjRbdu1U5oyK3v-kwG13Nk6fCikBFzfqwTDcyMbkfQjggcrTIuWaejma2krwLVahmV_kbS9G01hZ56PEwFAmtvHa8OMCaG-jvbp6Tt7fr9pLfWOrpW2KuGSwbuJaSIuMN28znZ7tOjzbvyyYbQlSTQTnFr2nZDZ4Cm3YRvCUVBdBw2nS8LrfeVK_PNGbcgc_oFt_qc9bDmPYik6EQj7gUhr5bfuffd7qu-MQ1z0cShLy3AH7kMDeVb7aGjZnD_yhH5KH1aDOogkolVNOASZBRrItA2rjaOlp7lLu3SGnNyYEeZcuaXKjUcYa9LwVwnaXPWHweLMcR-zv7bkcP8HpWONAEhqPNRnPPElkY685K3yn6t2YHcQqmG6JTuf1JtXcVvcc-o7HVU8kSJL5pzuDQLjBu-d82Qs90QhQcsMvJ73tO0LNs5O9c_mgT1J-p0qfwy5g2eGeAw7MQ1LNwHM7yNlLqSP9yak100bUn9AzvTsEKdquyZlWtGUU6r0aTEBtHTF_4PjqFcG6DvmHOqbdAgVwl8NAIQa4AbWjL3dp7wCUUm3cNQJeZprLzU_uJZgn7m_IDi99TCiGVBLewi7M', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'YkMZozaOPQCg0uO3Ll8VyGHcgR53UpsBGdXayTg-mVE.LYptdSAeCFBdVXyvPOTr5THRXGC1jZVTR6tK19uAhPY', 'scope': 'openid'}
9.972 AccessTokenResponse {
"access_token": "YkMZozaOPQCg0uO3Ll8VyGHcgR53UpsBGdXayTg-mVE.LYptdSAeCFBdVXyvPOTr5THRXGC1jZVTR6tK19uAhPY",
"expires_in": 3599,
"id_token": {
"at_hash": "ggCzCy6iuQcSCoT-68bBHQ",
"aud": [
"ac97af8d-4a02-41c8-9c40-20a90cbc88c2"
],
"auth_time": 1529751698,
"c_hash": "j7nI-8MSeBD8OlA-UzLWuw",
"exp": 1529755300,
"iat": 1529751701,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "d38c20d6-477e-42a1-9ef5-cdbd189e2ad0",
"nonce": "a2SgEc0OcVFDfOMO",
"rat": 1529751695,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
9.972 phase <--<-- 8 --- Done -->-->
9.972 end
9.972 assertion VerifyResponse
9.972 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
9.973 assertion MultipleSignOn
9.973 condition multiple-sign-on: status=OK [Verifies that multiple authentications was used in the flow]
9.973 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
multiple-sign-on: status=OK [Verifies that multiple authentications was used in the flow]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Response-Missing.txt 0000644 0000000 0000000 00000015242 13313424001 015426 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Response-Missing
Test description: Authorization request missing the response_type parameter
Timestamp: 2018-06-23T10:59:13Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.095 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.096 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.097 phase <--<-- 2 --- Registration -->-->
0.097 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.097 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#x8FjbawIr5trj7V4"
],
"response_types": [
"code id_token token"
]
}
0.255 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.255 RegistrationResponse {
"client_id": "4867f60d-a992-4112-98cf-06a1b8217d96",
"client_secret": "4nx8p~rULR_S",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "4867f60d-a992-4112-98cf-06a1b8217d96",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#x8FjbawIr5trj7V4"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.256 phase <--<-- 3 --- Note -->-->
1.512 phase <--<-- 4 --- AsyncAuthn -->-->
1.513 AuthorizationRequest {
"client_id": "4867f60d-a992-4112-98cf-06a1b8217d96",
"nonce": "J0vf8VFRHFIcUVmA",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"scope": "openid",
"state": "480ziEZYOh2fP3zw"
}
1.513 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?state=480ziEZYOh2fP3zw&scope=openid&nonce=J0vf8VFRHFIcUVmA&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=4867f60d-a992-4112-98cf-06a1b8217d96
1.513 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?state=480ziEZYOh2fP3zw&scope=openid&nonce=J0vf8VFRHFIcUVmA&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=4867f60d-a992-4112-98cf-06a1b8217d96
1.789 response Response URL with query part
1.789 response {'error_debug': 'The request is missing the response_type parameter', 'error_description': 'The authorization server does not support obtaining a token using this method', 'state': '', 'error': 'unsupported_response_type'}
1.789 response {'error_debug': 'The request is missing the response_type parameter', 'error_description': 'The authorization server does not support obtaining a token using this method', 'error': 'unsupported_response_type'}
1.79 AuthorizationErrorResponse {
"error": "unsupported_response_type",
"error_debug": "The request is missing the response_type parameter",
"error_description": "The authorization server does not support obtaining a token using this method"
}
1.79 AuthorizationErrorResponse {
"error": "unsupported_response_type",
"error_debug": "The request is missing the response_type parameter",
"error_description": "The authorization server does not support obtaining a token using this method"
}
1.79 phase <--<-- 5 --- Done -->-->
1.79 end
1.79 assertion VerifyErrorMessage
1.79 condition verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
1.79 condition Done: status=OK
============================================================
Conditions
verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-UserInfo-Endpoint.txt 0000644 0000000 0000000 00000033275 13313424132 015544 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-UserInfo-Endpoint
Test description: UserInfo Endpoint access with GET and bearer header
Timestamp: 2018-06-23T11:00:42Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.094 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.095 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.095 phase <--<-- 2 --- Registration -->-->
0.095 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.096 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#9CELV7d0E64fe0qg"
],
"response_types": [
"code id_token token"
]
}
0.251 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.252 RegistrationResponse {
"client_id": "839318e0-3cdd-42e2-8ee8-a5405545b1a0",
"client_secret": "9vmKt3brThCI",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "839318e0-3cdd-42e2-8ee8-a5405545b1a0",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#9CELV7d0E64fe0qg"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.252 phase <--<-- 3 --- AsyncAuthn -->-->
0.253 AuthorizationRequest {
"client_id": "839318e0-3cdd-42e2-8ee8-a5405545b1a0",
"nonce": "yNvduBNa2LRtLBUF",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid",
"state": "DbCKKclnLdbMh9WG"
}
0.253 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=839318e0-3cdd-42e2-8ee8-a5405545b1a0&state=DbCKKclnLdbMh9WG&response_type=code+id_token+token&nonce=yNvduBNa2LRtLBUF
0.253 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=839318e0-3cdd-42e2-8ee8-a5405545b1a0&state=DbCKKclnLdbMh9WG&response_type=code+id_token+token&nonce=yNvduBNa2LRtLBUF
2.584 http args {}
2.815 response URL with fragment
2.815 response access_token=XKaVfG61Q7XPbphigl1S89SCIicPiAfH8vkhOQqVlTs.OvtY1-dARdDty5MMagsMDnew3fc2PEXGQwnRIQOw2H4&code=0HkXh9Pd3yMiG-5tQNcfnoLH-_cu-XjduAT1rd2oEAI.g-vRkH09khxfIKDYYnm849oVf8u8dngfxLL37QWsFeM&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiSWxZb19WUW1hV3prQU9uSEJQbk9MdyIsImF1ZCI6WyI4MzkzMThlMC0zY2RkLTQyZTItOGVlOC1hNTQwNTU0NWIxYTAiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJnYjFRcXRMOWs1ZWRKTkpSX0g0VmpRIiwiZXhwIjoxNTI5NzU1MjQxLCJpYXQiOjE1Mjk3NTE2NDEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjczMmRjMTQyLTE1NDUtNGQwOC1hMmY5LTZlZTYyYjc3NTBkNiIsIm5vbmNlIjoieU52ZHVCTmEyTFJ0TEJVRiIsInJhdCI6MTUyOTc1MTYzOSwic3ViIjoiZm9vQGJhci5jb20ifQ.VIF4M_xpcai1WzdfIL4T4znhhB2O2cVL8ZSeJoLQlRz3okOs9hFpQczNC_PG-7vkKQqNEOTb579Pz8R3CdecfO1d5J-z-Xnf2PivGNJppjjkoivGjo3rZBWS2Tl7lq0BniyD1HPpVFZ3AycM-YcL43u28YS-sH09qhTSZTDDdYpvAdRrOlJx03unvISn4OtQGCO1CiJfuBjXtmYcAiDHgKyA0L8o-vKzd6X9EdupIpPUuLZ9gq5xYw7jrLyw4iQckMksB-S8BEd0SZekO70mjwKGwlNuAnjhPXrDm0F03SQbY2I-k29kYmzYA_7QJzpEtFDBAeZluzzfUjC6x8ZAe-8bQ6ki-jzGvxv-J_YiVbIbwPB0DPexJ5-fpF7NTjcarNXvlgQVVDdhfNsybSV4tNPD5VIAh0o_GIGsPeuxna3h811yjWqqxqSJashjTxFdRAbtSH_d2j5LhSvzxGUBfCGPbl4DNKJIR8k9s97zcteJ8559bp1cDXxrk1GP5m2BYkk8eEvJqOwZSVXajx4FPz0odj8VDjXuWCLmhV3N-_ewiNQDJLbv1b4_dkqHB382qYngc4BoYqV0ZG5nHz5GrZdOPhZQpX9OzWTE89lYB2avR2NXSClNUsEP4lO0BtIT4qVqqqqy_0vuDPP7Vg25N1y5_hgbvjU-fUpKB1BaQVk&scope=openid&state=DbCKKclnLdbMh9WG&token_type=bearer
2.816 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiSWxZb19WUW1hV3prQU9uSEJQbk9MdyIsImF1ZCI6WyI4MzkzMThlMC0zY2RkLTQyZTItOGVlOC1hNTQwNTU0NWIxYTAiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJnYjFRcXRMOWs1ZWRKTkpSX0g0VmpRIiwiZXhwIjoxNTI5NzU1MjQxLCJpYXQiOjE1Mjk3NTE2NDEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjczMmRjMTQyLTE1NDUtNGQwOC1hMmY5LTZlZTYyYjc3NTBkNiIsIm5vbmNlIjoieU52ZHVCTmEyTFJ0TEJVRiIsInJhdCI6MTUyOTc1MTYzOSwic3ViIjoiZm9vQGJhci5jb20ifQ.VIF4M_xpcai1WzdfIL4T4znhhB2O2cVL8ZSeJoLQlRz3okOs9hFpQczNC_PG-7vkKQqNEOTb579Pz8R3CdecfO1d5J-z-Xnf2PivGNJppjjkoivGjo3rZBWS2Tl7lq0BniyD1HPpVFZ3AycM-YcL43u28YS-sH09qhTSZTDDdYpvAdRrOlJx03unvISn4OtQGCO1CiJfuBjXtmYcAiDHgKyA0L8o-vKzd6X9EdupIpPUuLZ9gq5xYw7jrLyw4iQckMksB-S8BEd0SZekO70mjwKGwlNuAnjhPXrDm0F03SQbY2I-k29kYmzYA_7QJzpEtFDBAeZluzzfUjC6x8ZAe-8bQ6ki-jzGvxv-J_YiVbIbwPB0DPexJ5-fpF7NTjcarNXvlgQVVDdhfNsybSV4tNPD5VIAh0o_GIGsPeuxna3h811yjWqqxqSJashjTxFdRAbtSH_d2j5LhSvzxGUBfCGPbl4DNKJIR8k9s97zcteJ8559bp1cDXxrk1GP5m2BYkk8eEvJqOwZSVXajx4FPz0odj8VDjXuWCLmhV3N-_ewiNQDJLbv1b4_dkqHB382qYngc4BoYqV0ZG5nHz5GrZdOPhZQpX9OzWTE89lYB2avR2NXSClNUsEP4lO0BtIT4qVqqqqy_0vuDPP7Vg25N1y5_hgbvjU-fUpKB1BaQVk', 'scope': 'openid', 'code': '0HkXh9Pd3yMiG-5tQNcfnoLH-_cu-XjduAT1rd2oEAI.g-vRkH09khxfIKDYYnm849oVf8u8dngfxLL37QWsFeM', 'access_token': 'XKaVfG61Q7XPbphigl1S89SCIicPiAfH8vkhOQqVlTs.OvtY1-dARdDty5MMagsMDnew3fc2PEXGQwnRIQOw2H4', 'state': 'DbCKKclnLdbMh9WG', 'expires_in': 3599, 'token_type': 'bearer'}
2.896 AuthorizationResponse {
"access_token": "XKaVfG61Q7XPbphigl1S89SCIicPiAfH8vkhOQqVlTs.OvtY1-dARdDty5MMagsMDnew3fc2PEXGQwnRIQOw2H4",
"code": "0HkXh9Pd3yMiG-5tQNcfnoLH-_cu-XjduAT1rd2oEAI.g-vRkH09khxfIKDYYnm849oVf8u8dngfxLL37QWsFeM",
"expires_in": 3599,
"id_token": {
"at_hash": "IlYo_VQmaWzkAOnHBPnOLw",
"aud": [
"839318e0-3cdd-42e2-8ee8-a5405545b1a0"
],
"auth_time": 1529751409,
"c_hash": "gb1QqtL9k5edJNJR_H4VjQ",
"exp": 1529755241,
"iat": 1529751641,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "732dc142-1545-4d08-a2f9-6ee62b7750d6",
"nonce": "yNvduBNa2LRtLBUF",
"rat": 1529751639,
"sub": "[email protected]"
},
"scope": "openid",
"state": "DbCKKclnLdbMh9WG",
"token_type": "bearer"
}
2.896 phase <--<-- 4 --- AccessToken -->-->
2.896 --> request op_args: {'state': 'DbCKKclnLdbMh9WG'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.896 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'DbCKKclnLdbMh9WG', 'code': '0HkXh9Pd3yMiG-5tQNcfnoLH-_cu-XjduAT1rd2oEAI.g-vRkH09khxfIKDYYnm849oVf8u8dngfxLL37QWsFeM', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '839318e0-3cdd-42e2-8ee8-a5405545b1a0'}, 'state': 'DbCKKclnLdbMh9WG'}
2.896 AccessTokenRequest {
"code": "0HkXh9Pd3yMiG-5tQNcfnoLH-_cu-XjduAT1rd2oEAI.g-vRkH09khxfIKDYYnm849oVf8u8dngfxLL37QWsFeM",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "DbCKKclnLdbMh9WG"
}
2.896 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.896 request_http_args {'headers': {'Authorization': 'Basic ODM5MzE4ZTAtM2NkZC00MmUyLThlZTgtYTU0MDU1NDViMWEwOjl2bUt0M2JyVGhDSQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.896 request code=0HkXh9Pd3yMiG-5tQNcfnoLH-_cu-XjduAT1rd2oEAI.g-vRkH09khxfIKDYYnm849oVf8u8dngfxLL37QWsFeM&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=DbCKKclnLdbMh9WG
3.11 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.111 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiSWxZb19WUW1hV3prQU9uSEJQbk9MdyIsImF1ZCI6WyI4MzkzMThlMC0zY2RkLTQyZTItOGVlOC1hNTQwNTU0NWIxYTAiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJnYjFRcXRMOWs1ZWRKTkpSX0g0VmpRIiwiZXhwIjoxNTI5NzU1MjQxLCJpYXQiOjE1Mjk3NTE2NDIsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjY2NjIyZTZiLTFiZWEtNGQyOS05NTM3LTk3ZjJhMWE5ODk2MyIsIm5vbmNlIjoieU52ZHVCTmEyTFJ0TEJVRiIsInJhdCI6MTUyOTc1MTYzOSwic3ViIjoiZm9vQGJhci5jb20ifQ.vGFLrrLfAfsJJVFG-Zg2VqiILvksfFIqZ_255kKn1Mmxf743Q01py3bDxfOi3CB8Ko0t_Br1v77Rwocvs8Zh--OAGIDFS6Jk5ZGn7o7Az8yRcm35zaFCbn7ZVjGFwPPDLMBREHVwKWVJo9mdMYiQ3T7c72b2HcTZhT5eLy0GIMamzvbK6fWajlVf8m8Q5Lo6_f_46-yVEEnAXrvu5i5UZtxv8JwduvpoKm1q0cDFRyhgt7LgBXYeXnqWoKDc486WpNtzCTzn5yBddxmckT6dHWnJPqXIkADxlal2hCcoqy2blLPrqp2mzKQ04tS79FDTktIf2DbzSjp8DQ8Q3RV2b2r9fSnLjzwOG4tVdaiX8DTCwP_h7pww_uiINUswcbR4VYMJhZOChw13XcK6PFAmYtc5El62OVfv-8YOdAW93_ZBPjb4TlizSNnNR_P7wm2WI4D7vfuOVMy7qXtEofRn_f8T16MHLiCH5NwUW-EisFdfz6CGzRugT3tknR3wRkUEexqd8gdXDDBzvRYFqio5MDKwaRNn_2nTGNfVR0qXl0uVHs4JbQCBype1z-5Gtup6hBdHCqbwLLdS-TbWZ9wv0NQCaiOZtIVDRZqVmt0f5VuVIGfAegiRC2D2H33fivcRllYG1lt7WNhAm21xeiLhyHfFeIhuG4tv3MK6d_lJzIs', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'NMm5MlTC08Dk9lxDTOjnV4SACSMKvIvBTbL611ZSL_g.-cqEELAmlDfbajTertVSsLhpu4lAignhSBLUcriXx9E', 'scope': 'openid'}
3.115 AccessTokenResponse {
"access_token": "NMm5MlTC08Dk9lxDTOjnV4SACSMKvIvBTbL611ZSL_g.-cqEELAmlDfbajTertVSsLhpu4lAignhSBLUcriXx9E",
"expires_in": 3599,
"id_token": {
"at_hash": "IlYo_VQmaWzkAOnHBPnOLw",
"aud": [
"839318e0-3cdd-42e2-8ee8-a5405545b1a0"
],
"auth_time": 1529751409,
"c_hash": "gb1QqtL9k5edJNJR_H4VjQ",
"exp": 1529755241,
"iat": 1529751642,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "66622e6b-1bea-4d29-9537-97f2a1a98963",
"nonce": "yNvduBNa2LRtLBUF",
"rat": 1529751639,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.115 phase <--<-- 5 --- UserInfo -->-->
3.115 do_user_info_request kwargs:{'state': 'DbCKKclnLdbMh9WG', 'method': 'GET', 'authn_method': 'bearer_header'}
3.115 request {'body': None}
3.115 request_url https://oidc-certification.ory.sh:8443/userinfo
3.115 request_http_args {'headers': {'Authorization': 'Bearer NMm5MlTC08Dk9lxDTOjnV4SACSMKvIvBTbL611ZSL_g.-cqEELAmlDfbajTertVSsLhpu4lAignhSBLUcriXx9E'}}
3.222 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
3.223 OpenIDSchema {
"sub": "[email protected]"
}
3.223 OpenIDSchema {
"sub": "[email protected]"
}
3.223 phase <--<-- 6 --- Done -->-->
3.223 end
3.224 assertion VerifyResponse
3.224 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.224 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Req-id_token_hint.txt 0000644 0000000 0000000 00000062446 13313424376 015613 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-id_token_hint
Test description: Using prompt=none with user hint through id_token_hint
Timestamp: 2018-06-23T11:03:26Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.076 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.077 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.078 phase <--<-- 2 --- Registration -->-->
0.078 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.078 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#TUpPPwsb8hEYmX2x"
],
"response_types": [
"code id_token token"
]
}
0.242 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.243 RegistrationResponse {
"client_id": "11cc2aab-116b-427d-839b-419e0850f749",
"client_secret": "FiimVjsV2ec9",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "11cc2aab-116b-427d-839b-419e0850f749",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#TUpPPwsb8hEYmX2x"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.243 phase <--<-- 3 --- AsyncAuthn -->-->
0.244 AuthorizationRequest {
"client_id": "11cc2aab-116b-427d-839b-419e0850f749",
"nonce": "RCh5WJMCL0QnfyL3",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid",
"state": "6W5dTVgh5VbxVb4y"
}
0.244 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=11cc2aab-116b-427d-839b-419e0850f749&state=6W5dTVgh5VbxVb4y&response_type=code+id_token+token&nonce=RCh5WJMCL0QnfyL3
0.244 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=11cc2aab-116b-427d-839b-419e0850f749&state=6W5dTVgh5VbxVb4y&response_type=code+id_token+token&nonce=RCh5WJMCL0QnfyL3
3.578 http args {}
3.75 response URL with fragment
3.751 response access_token=RSkMYW2HPRVFEoPqn5BFHfGbIneh_c0VVPCMSZchPFA.ClMnZEiZx0pxHf2DpSb9TKUkHDpsfg0Iw0Wy7fGNgTE&code=0aZSHYlhapRmIgyuM1CWMn3zhx7VfkGjWudTgJAWlYA.UYg8N77xaZ4iL3cibijPFkHnZULUvGVjQBtAb_CMoWs&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiN0pxeDk3Y19ZcUhYcE4zazBlVzFmQSIsImF1ZCI6WyIxMWNjMmFhYi0xMTZiLTQyN2QtODM5Yi00MTllMDg1MGY3NDkiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiIxX1ZVU0lLX1pEQUxLMVBPWTVHaWtRIiwiZXhwIjoxNTI5NzU1NDA0LCJpYXQiOjE1Mjk3NTE4MDQsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImM5NWQ0MzBiLTg3NmQtNDZhNy05MDIxLTllMTk4NjQwOWZlMCIsIm5vbmNlIjoiUkNoNVdKTUNMMFFuZnlMMyIsInJhdCI6MTUyOTc1MTgwMSwic3ViIjoiZm9vQGJhci5jb20ifQ.fTsimb3fCtTacMuwbXZoIB9THe8Ggf8Ld8PPdUHF66KgoETWliHxYA8slA6UQTqqBRp-BfrlsLHDheCXjCBqSWMv5gJBg1oJ0CaTaMXn54YYe4uV0Rv85hiiAZ9-8h447UE0xC0UHryYIg2ewfL0EudLgOAqo3Fj4ix21IhGHoacM906Ld6XJMtJFG0vpGnBifeXKoY3yOzdhmSdgpq0EoUXCb7JHQk8rNcWHGdTyabq70-4IN1udjCb4jyoRvnZ0MPtn0RxwUSDa_PYv_M5qTddXKURFlHC6rrLwxwjODAFvUijYRCX2qfpBW4-XKeg_f9bjIuLDZlWVy1ml1HyP24pB6xvDTOyFcc72a2uV7-PFKaoYFkcBBUWsB9SqZ9Z988sflGhvYADLISv3hmRakJVmGefVcs_VvKI0o8yiINYmM0hO6q52R4oYPjnDQU1B99ofKlPP-ks5Rsb4zj5QiI1-mlGPaINVvCq38BjduhYIgpLFN0zB2v5-f4eX8RI1VvAlY7g-qzw3bh-Z4d4aFAhS3quDFWEU4dBNk_hnkvCx-wNwRS5YGzGdhyhuCcULkGUykGDNxaFSey14ylclUmjtOmXkFMfcqAtHdpZQv0YcGrfJ3tcC8B02DF1wMwFVz69Mask8tqp4vqYGCSowU8xuHWYAPGKRl6gMXa7Bjc&scope=openid&state=6W5dTVgh5VbxVb4y&token_type=bearer
3.751 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiN0pxeDk3Y19ZcUhYcE4zazBlVzFmQSIsImF1ZCI6WyIxMWNjMmFhYi0xMTZiLTQyN2QtODM5Yi00MTllMDg1MGY3NDkiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiIxX1ZVU0lLX1pEQUxLMVBPWTVHaWtRIiwiZXhwIjoxNTI5NzU1NDA0LCJpYXQiOjE1Mjk3NTE4MDQsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImM5NWQ0MzBiLTg3NmQtNDZhNy05MDIxLTllMTk4NjQwOWZlMCIsIm5vbmNlIjoiUkNoNVdKTUNMMFFuZnlMMyIsInJhdCI6MTUyOTc1MTgwMSwic3ViIjoiZm9vQGJhci5jb20ifQ.fTsimb3fCtTacMuwbXZoIB9THe8Ggf8Ld8PPdUHF66KgoETWliHxYA8slA6UQTqqBRp-BfrlsLHDheCXjCBqSWMv5gJBg1oJ0CaTaMXn54YYe4uV0Rv85hiiAZ9-8h447UE0xC0UHryYIg2ewfL0EudLgOAqo3Fj4ix21IhGHoacM906Ld6XJMtJFG0vpGnBifeXKoY3yOzdhmSdgpq0EoUXCb7JHQk8rNcWHGdTyabq70-4IN1udjCb4jyoRvnZ0MPtn0RxwUSDa_PYv_M5qTddXKURFlHC6rrLwxwjODAFvUijYRCX2qfpBW4-XKeg_f9bjIuLDZlWVy1ml1HyP24pB6xvDTOyFcc72a2uV7-PFKaoYFkcBBUWsB9SqZ9Z988sflGhvYADLISv3hmRakJVmGefVcs_VvKI0o8yiINYmM0hO6q52R4oYPjnDQU1B99ofKlPP-ks5Rsb4zj5QiI1-mlGPaINVvCq38BjduhYIgpLFN0zB2v5-f4eX8RI1VvAlY7g-qzw3bh-Z4d4aFAhS3quDFWEU4dBNk_hnkvCx-wNwRS5YGzGdhyhuCcULkGUykGDNxaFSey14ylclUmjtOmXkFMfcqAtHdpZQv0YcGrfJ3tcC8B02DF1wMwFVz69Mask8tqp4vqYGCSowU8xuHWYAPGKRl6gMXa7Bjc', 'scope': 'openid', 'code': '0aZSHYlhapRmIgyuM1CWMn3zhx7VfkGjWudTgJAWlYA.UYg8N77xaZ4iL3cibijPFkHnZULUvGVjQBtAb_CMoWs', 'access_token': 'RSkMYW2HPRVFEoPqn5BFHfGbIneh_c0VVPCMSZchPFA.ClMnZEiZx0pxHf2DpSb9TKUkHDpsfg0Iw0Wy7fGNgTE', 'state': '6W5dTVgh5VbxVb4y', 'expires_in': 3599, 'token_type': 'bearer'}
3.837 AuthorizationResponse {
"access_token": "RSkMYW2HPRVFEoPqn5BFHfGbIneh_c0VVPCMSZchPFA.ClMnZEiZx0pxHf2DpSb9TKUkHDpsfg0Iw0Wy7fGNgTE",
"code": "0aZSHYlhapRmIgyuM1CWMn3zhx7VfkGjWudTgJAWlYA.UYg8N77xaZ4iL3cibijPFkHnZULUvGVjQBtAb_CMoWs",
"expires_in": 3599,
"id_token": {
"at_hash": "7Jqx97c_YqHXpN3k0eW1fA",
"aud": [
"11cc2aab-116b-427d-839b-419e0850f749"
],
"auth_time": 1529751698,
"c_hash": "1_VUSIK_ZDALK1POY5GikQ",
"exp": 1529755404,
"iat": 1529751804,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "c95d430b-876d-46a7-9021-9e1986409fe0",
"nonce": "RCh5WJMCL0QnfyL3",
"rat": 1529751801,
"sub": "[email protected]"
},
"scope": "openid",
"state": "6W5dTVgh5VbxVb4y",
"token_type": "bearer"
}
3.837 phase <--<-- 4 --- AccessToken -->-->
3.838 --> request op_args: {'state': '6W5dTVgh5VbxVb4y'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.838 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': '6W5dTVgh5VbxVb4y', 'code': '0aZSHYlhapRmIgyuM1CWMn3zhx7VfkGjWudTgJAWlYA.UYg8N77xaZ4iL3cibijPFkHnZULUvGVjQBtAb_CMoWs', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '11cc2aab-116b-427d-839b-419e0850f749'}, 'state': '6W5dTVgh5VbxVb4y'}
3.838 AccessTokenRequest {
"code": "0aZSHYlhapRmIgyuM1CWMn3zhx7VfkGjWudTgJAWlYA.UYg8N77xaZ4iL3cibijPFkHnZULUvGVjQBtAb_CMoWs",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "6W5dTVgh5VbxVb4y"
}
3.838 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.838 request_http_args {'headers': {'Authorization': 'Basic MTFjYzJhYWItMTE2Yi00MjdkLTgzOWItNDE5ZTA4NTBmNzQ5OkZpaW1WanNWMmVjOQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
3.838 request code=0aZSHYlhapRmIgyuM1CWMn3zhx7VfkGjWudTgJAWlYA.UYg8N77xaZ4iL3cibijPFkHnZULUvGVjQBtAb_CMoWs&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=6W5dTVgh5VbxVb4y
4.09 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
4.091 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiN0pxeDk3Y19ZcUhYcE4zazBlVzFmQSIsImF1ZCI6WyIxMWNjMmFhYi0xMTZiLTQyN2QtODM5Yi00MTllMDg1MGY3NDkiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiIxX1ZVU0lLX1pEQUxLMVBPWTVHaWtRIiwiZXhwIjoxNTI5NzU1NDA0LCJpYXQiOjE1Mjk3NTE4MDUsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImMyZDgxYjAyLWQ0OWItNGJjNi04N2M3LWQ5MmNhYmFiMzdlZCIsIm5vbmNlIjoiUkNoNVdKTUNMMFFuZnlMMyIsInJhdCI6MTUyOTc1MTgwMSwic3ViIjoiZm9vQGJhci5jb20ifQ.vDU16FG2LV3xbf874du_-24GSUvGkZKodEUCrfkasjyZE9Psw3opadna5u8XKqPRzvPkw9gFFcjma7NN5zTzTjZKOTgEkFDZAEXIxUAHLJQiqF32ZtfFz8jNyxxgatVEAeN_UJ_dgOXcL0sgfSRk0C1oDAPbn_Rhdcwom6RB3D1CGmCr_Vr_umBsAuadcpm81FUTBVQVwKlOsgSIluZ_kOmC8VYwdseyfTvAXJvAat4XrjDO3yja7bfx3GmClocBSjoJYfUb6ZDhZQfUwKQZcopmYc3QKNQo_Yx3jN6-tnm4GL_PryVsBH64EQAQfzBEBb_gC-Gy4ER9NTw6tHc1YPs1kjZ7uCstyxwE-Qs9V3NnRhlLJCFHCqK6Bd1p6R2sW5iCW_5SBucbt-hyxwft6I9HVShuRoCL0mI4wIOQt6FIwztwn7zV3z1Ls5n82M3_7FhFPPzHb3xeMWqBYKBZzojMBAdhoJ-CFRGQi5hV9xj1mdVWr2MaVWr6u_n5KYZ2yTMYim07FXLUT9SN4Vz3-NSfo7vkOmI-o9GGq2gafKB3TeBzjN0e79B1oueoLa6qfw5dmdA0nt9ZkaUpvIA65VB_Ikz4ZDwg6QqJ2Sf7_-lTtD6CUdsDt83nuO9cs78M8GbeNQTMe1VRRxrByVVukhCMCfL962htdVaaKYh7W44', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'BUwmBQIy5CyUuUijcnr2jLcT7AJxQL4AJYfyH48fPT0.31LlEGT5g11YufDtyNemrLtYObNz3bCVsBYB-eU2DqU', 'scope': 'openid'}
4.095 AccessTokenResponse {
"access_token": "BUwmBQIy5CyUuUijcnr2jLcT7AJxQL4AJYfyH48fPT0.31LlEGT5g11YufDtyNemrLtYObNz3bCVsBYB-eU2DqU",
"expires_in": 3599,
"id_token": {
"at_hash": "7Jqx97c_YqHXpN3k0eW1fA",
"aud": [
"11cc2aab-116b-427d-839b-419e0850f749"
],
"auth_time": 1529751698,
"c_hash": "1_VUSIK_ZDALK1POY5GikQ",
"exp": 1529755404,
"iat": 1529751805,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "c2d81b02-d49b-4bc6-87c7-d92cabab37ed",
"nonce": "RCh5WJMCL0QnfyL3",
"rat": 1529751801,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
4.095 phase <--<-- 5 --- AsyncAuthn -->-->
4.095 AuthorizationRequest {
"client_id": "11cc2aab-116b-427d-839b-419e0850f749",
"id_token_hint": "eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiN0pxeDk3Y19ZcUhYcE4zazBlVzFmQSIsImF1ZCI6WyIxMWNjMmFhYi0xMTZiLTQyN2QtODM5Yi00MTllMDg1MGY3NDkiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiIxX1ZVU0lLX1pEQUxLMVBPWTVHaWtRIiwiZXhwIjoxNTI5NzU1NDA0LCJpYXQiOjE1Mjk3NTE4MDQsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImM5NWQ0MzBiLTg3NmQtNDZhNy05MDIxLTllMTk4NjQwOWZlMCIsIm5vbmNlIjoiUkNoNVdKTUNMMFFuZnlMMyIsInJhdCI6MTUyOTc1MTgwMSwic3ViIjoiZm9vQGJhci5jb20ifQ.fTsimb3fCtTacMuwbXZoIB9THe8Ggf8Ld8PPdUHF66KgoETWliHxYA8slA6UQTqqBRp-BfrlsLHDheCXjCBqSWMv5gJBg1oJ0CaTaMXn54YYe4uV0Rv85hiiAZ9-8h447UE0xC0UHryYIg2ewfL0EudLgOAqo3Fj4ix21IhGHoacM906Ld6XJMtJFG0vpGnBifeXKoY3yOzdhmSdgpq0EoUXCb7JHQk8rNcWHGdTyabq70-4IN1udjCb4jyoRvnZ0MPtn0RxwUSDa_PYv_M5qTddXKURFlHC6rrLwxwjODAFvUijYRCX2qfpBW4-XKeg_f9bjIuLDZlWVy1ml1HyP24pB6xvDTOyFcc72a2uV7-PFKaoYFkcBBUWsB9SqZ9Z988sflGhvYADLISv3hmRakJVmGefVcs_VvKI0o8yiINYmM0hO6q52R4oYPjnDQU1B99ofKlPP-ks5Rsb4zj5QiI1-mlGPaINVvCq38BjduhYIgpLFN0zB2v5-f4eX8RI1VvAlY7g-qzw3bh-Z4d4aFAhS3quDFWEU4dBNk_hnkvCx-wNwRS5YGzGdhyhuCcULkGUykGDNxaFSey14ylclUmjtOmXkFMfcqAtHdpZQv0YcGrfJ3tcC8B02DF1wMwFVz69Mask8tqp4vqYGCSowU8xuHWYAPGKRl6gMXa7Bjc",
"nonce": "q0bDErjwn41YU3Zz",
"prompt": [
"none"
],
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid",
"state": "eeDZjD5FUTTF4W47"
}
4.096 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=11cc2aab-116b-427d-839b-419e0850f749&state=eeDZjD5FUTTF4W47&id_token_hint=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiN0pxeDk3Y19ZcUhYcE4zazBlVzFmQSIsImF1ZCI6WyIxMWNjMmFhYi0xMTZiLTQyN2QtODM5Yi00MTllMDg1MGY3NDkiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiIxX1ZVU0lLX1pEQUxLMVBPWTVHaWtRIiwiZXhwIjoxNTI5NzU1NDA0LCJpYXQiOjE1Mjk3NTE4MDQsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImM5NWQ0MzBiLTg3NmQtNDZhNy05MDIxLTllMTk4NjQwOWZlMCIsIm5vbmNlIjoiUkNoNVdKTUNMMFFuZnlMMyIsInJhdCI6MTUyOTc1MTgwMSwic3ViIjoiZm9vQGJhci5jb20ifQ.fTsimb3fCtTacMuwbXZoIB9THe8Ggf8Ld8PPdUHF66KgoETWliHxYA8slA6UQTqqBRp-BfrlsLHDheCXjCBqSWMv5gJBg1oJ0CaTaMXn54YYe4uV0Rv85hiiAZ9-8h447UE0xC0UHryYIg2ewfL0EudLgOAqo3Fj4ix21IhGHoacM906Ld6XJMtJFG0vpGnBifeXKoY3yOzdhmSdgpq0EoUXCb7JHQk8rNcWHGdTyabq70-4IN1udjCb4jyoRvnZ0MPtn0RxwUSDa_PYv_M5qTddXKURFlHC6rrLwxwjODAFvUijYRCX2qfpBW4-XKeg_f9bjIuLDZlWVy1ml1HyP24pB6xvDTOyFcc72a2uV7-PFKaoYFkcBBUWsB9SqZ9Z988sflGhvYADLISv3hmRakJVmGefVcs_VvKI0o8yiINYmM0hO6q52R4oYPjnDQU1B99ofKlPP-ks5Rsb4zj5QiI1-mlGPaINVvCq38BjduhYIgpLFN0zB2v5-f4eX8RI1VvAlY7g-qzw3bh-Z4d4aFAhS3quDFWEU4dBNk_hnkvCx-wNwRS5YGzGdhyhuCcULkGUykGDNxaFSey14ylclUmjtOmXkFMfcqAtHdpZQv0YcGrfJ3tcC8B02DF1wMwFVz69Mask8tqp4vqYGCSowU8xuHWYAPGKRl6gMXa7Bjc&response_type=code+id_token+token&nonce=q0bDErjwn41YU3Zz
4.096 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=11cc2aab-116b-427d-839b-419e0850f749&state=eeDZjD5FUTTF4W47&id_token_hint=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiN0pxeDk3Y19ZcUhYcE4zazBlVzFmQSIsImF1ZCI6WyIxMWNjMmFhYi0xMTZiLTQyN2QtODM5Yi00MTllMDg1MGY3NDkiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiIxX1ZVU0lLX1pEQUxLMVBPWTVHaWtRIiwiZXhwIjoxNTI5NzU1NDA0LCJpYXQiOjE1Mjk3NTE4MDQsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImM5NWQ0MzBiLTg3NmQtNDZhNy05MDIxLTllMTk4NjQwOWZlMCIsIm5vbmNlIjoiUkNoNVdKTUNMMFFuZnlMMyIsInJhdCI6MTUyOTc1MTgwMSwic3ViIjoiZm9vQGJhci5jb20ifQ.fTsimb3fCtTacMuwbXZoIB9THe8Ggf8Ld8PPdUHF66KgoETWliHxYA8slA6UQTqqBRp-BfrlsLHDheCXjCBqSWMv5gJBg1oJ0CaTaMXn54YYe4uV0Rv85hiiAZ9-8h447UE0xC0UHryYIg2ewfL0EudLgOAqo3Fj4ix21IhGHoacM906Ld6XJMtJFG0vpGnBifeXKoY3yOzdhmSdgpq0EoUXCb7JHQk8rNcWHGdTyabq70-4IN1udjCb4jyoRvnZ0MPtn0RxwUSDa_PYv_M5qTddXKURFlHC6rrLwxwjODAFvUijYRCX2qfpBW4-XKeg_f9bjIuLDZlWVy1ml1HyP24pB6xvDTOyFcc72a2uV7-PFKaoYFkcBBUWsB9SqZ9Z988sflGhvYADLISv3hmRakJVmGefVcs_VvKI0o8yiINYmM0hO6q52R4oYPjnDQU1B99ofKlPP-ks5Rsb4zj5QiI1-mlGPaINVvCq38BjduhYIgpLFN0zB2v5-f4eX8RI1VvAlY7g-qzw3bh-Z4d4aFAhS3quDFWEU4dBNk_hnkvCx-wNwRS5YGzGdhyhuCcULkGUykGDNxaFSey14ylclUmjtOmXkFMfcqAtHdpZQv0YcGrfJ3tcC8B02DF1wMwFVz69Mask8tqp4vqYGCSowU8xuHWYAPGKRl6gMXa7Bjc&response_type=code+id_token+token&nonce=q0bDErjwn41YU3Zz
5.133 http args {}
5.284 response URL with fragment
5.284 response access_token=L0wpu_U5HuP1npOQir32vullyNNdqBemtB2tsiDHJ4c.CvgRP3T8DDHKZLexQ05-plMHvaV81usGz84BUU0lark&code=JxIQ_OkuteFyZex4MuOHAnztmFUm7FqeY3U2fev8SH0.JXt-dt5lUpMIziJi9kZk7QeFFlybqLh2dLLnO4hFF88&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoicm9aRjVKckE1cnN0ZFdWenpmQklXZyIsImF1ZCI6WyIxMWNjMmFhYi0xMTZiLTQyN2QtODM5Yi00MTllMDg1MGY3NDkiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiJ3ZGdsMHZObnltT1VSM3ZIQmRLY0RBIiwiZXhwIjoxNTI5NzU1NDA1LCJpYXQiOjE1Mjk3NTE4MDUsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjYxNTM2YTQyLWZjODYtNDY5MC1iNGVlLTMyODAzNDZiYTFjYSIsIm5vbmNlIjoicTBiREVyanduNDFZVTNaeiIsInJhdCI6MTUyOTc1MTgwNSwic3ViIjoiZm9vQGJhci5jb20ifQ.MhW5ucFhMyej78UlQJcqibbgMZaISbo9FUYVXcyp7LTY3Um5JEdo3PFnsZjiGtuFLcTNNeq_hX1Mwe92z9RBIbHHwUUAgfCSJhz2aa6gL-uGv0cj-5zIwmmXf5JDHNt-Qk-s1Okc2-0Ep7O7SFF0cGMzDrP1W3Np0cqqHlm1ErbgcAZbFtif9Nzo5Bf2Wh1ff5zqeWlzsRl5NMNTZenNDcgyXLlKZMENxxYgUKj_l5GqSotUOslnpuT04YfifhV85OXGSorGbKrHLlElnNrUAYe1UW-iIY-DwbcHNFbGMc0ih5SZ3Io7L7JuwdRMsbOn3Grz2lvx-w3Wqbp0TxGP9Wmrec0L-EeSkUP_lpbH5jelbuQDEwvTgb46cTiNZLyxFLzNf44SnYU2onbQKE0kUqU0qRoOXkO4YdSwQoaZXzn7Qyi4f1AZPdkp2vIVUJRiogTklR9A-6E2hA7BUKTvUDUmbdS5DDxDjQ-2cmrplbExvEqlatX6jncw81kg25bnvYiqhT1jlo704OX9ljxhA7RkvGHvoRQ4t_ed0RL4vZQAF0Ex662awOSNOL_E3wp6sTZiDZXA1rSeiwgih5JnmJOKv2KSGyn7MOS9hrIBhAQM39sEEgqOlWTwiqpPQHxkdx4YpAXMf1ZjXmNHFEDWJd5nLtPxSLxWXtz1syAkMq4&scope=openid&state=eeDZjD5FUTTF4W47&token_type=bearer
5.284 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoicm9aRjVKckE1cnN0ZFdWenpmQklXZyIsImF1ZCI6WyIxMWNjMmFhYi0xMTZiLTQyN2QtODM5Yi00MTllMDg1MGY3NDkiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiJ3ZGdsMHZObnltT1VSM3ZIQmRLY0RBIiwiZXhwIjoxNTI5NzU1NDA1LCJpYXQiOjE1Mjk3NTE4MDUsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjYxNTM2YTQyLWZjODYtNDY5MC1iNGVlLTMyODAzNDZiYTFjYSIsIm5vbmNlIjoicTBiREVyanduNDFZVTNaeiIsInJhdCI6MTUyOTc1MTgwNSwic3ViIjoiZm9vQGJhci5jb20ifQ.MhW5ucFhMyej78UlQJcqibbgMZaISbo9FUYVXcyp7LTY3Um5JEdo3PFnsZjiGtuFLcTNNeq_hX1Mwe92z9RBIbHHwUUAgfCSJhz2aa6gL-uGv0cj-5zIwmmXf5JDHNt-Qk-s1Okc2-0Ep7O7SFF0cGMzDrP1W3Np0cqqHlm1ErbgcAZbFtif9Nzo5Bf2Wh1ff5zqeWlzsRl5NMNTZenNDcgyXLlKZMENxxYgUKj_l5GqSotUOslnpuT04YfifhV85OXGSorGbKrHLlElnNrUAYe1UW-iIY-DwbcHNFbGMc0ih5SZ3Io7L7JuwdRMsbOn3Grz2lvx-w3Wqbp0TxGP9Wmrec0L-EeSkUP_lpbH5jelbuQDEwvTgb46cTiNZLyxFLzNf44SnYU2onbQKE0kUqU0qRoOXkO4YdSwQoaZXzn7Qyi4f1AZPdkp2vIVUJRiogTklR9A-6E2hA7BUKTvUDUmbdS5DDxDjQ-2cmrplbExvEqlatX6jncw81kg25bnvYiqhT1jlo704OX9ljxhA7RkvGHvoRQ4t_ed0RL4vZQAF0Ex662awOSNOL_E3wp6sTZiDZXA1rSeiwgih5JnmJOKv2KSGyn7MOS9hrIBhAQM39sEEgqOlWTwiqpPQHxkdx4YpAXMf1ZjXmNHFEDWJd5nLtPxSLxWXtz1syAkMq4', 'scope': 'openid', 'code': 'JxIQ_OkuteFyZex4MuOHAnztmFUm7FqeY3U2fev8SH0.JXt-dt5lUpMIziJi9kZk7QeFFlybqLh2dLLnO4hFF88', 'access_token': 'L0wpu_U5HuP1npOQir32vullyNNdqBemtB2tsiDHJ4c.CvgRP3T8DDHKZLexQ05-plMHvaV81usGz84BUU0lark', 'state': 'eeDZjD5FUTTF4W47', 'expires_in': 3599, 'token_type': 'bearer'}
5.288 AuthorizationResponse {
"access_token": "L0wpu_U5HuP1npOQir32vullyNNdqBemtB2tsiDHJ4c.CvgRP3T8DDHKZLexQ05-plMHvaV81usGz84BUU0lark",
"code": "JxIQ_OkuteFyZex4MuOHAnztmFUm7FqeY3U2fev8SH0.JXt-dt5lUpMIziJi9kZk7QeFFlybqLh2dLLnO4hFF88",
"expires_in": 3599,
"id_token": {
"at_hash": "roZF5JrA5rstdWVzzfBIWg",
"aud": [
"11cc2aab-116b-427d-839b-419e0850f749"
],
"auth_time": 1529751698,
"c_hash": "wdgl0vNnymOUR3vHBdKcDA",
"exp": 1529755405,
"iat": 1529751805,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "61536a42-fc86-4690-b4ee-3280346ba1ca",
"nonce": "q0bDErjwn41YU3Zz",
"rat": 1529751805,
"sub": "[email protected]"
},
"scope": "openid",
"state": "eeDZjD5FUTTF4W47",
"token_type": "bearer"
}
5.288 phase <--<-- 6 --- AccessToken -->-->
5.288 --> request op_args: {'state': 'eeDZjD5FUTTF4W47'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
5.288 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'eeDZjD5FUTTF4W47', 'code': 'JxIQ_OkuteFyZex4MuOHAnztmFUm7FqeY3U2fev8SH0.JXt-dt5lUpMIziJi9kZk7QeFFlybqLh2dLLnO4hFF88', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '11cc2aab-116b-427d-839b-419e0850f749'}, 'state': 'eeDZjD5FUTTF4W47'}
5.288 AccessTokenRequest {
"code": "JxIQ_OkuteFyZex4MuOHAnztmFUm7FqeY3U2fev8SH0.JXt-dt5lUpMIziJi9kZk7QeFFlybqLh2dLLnO4hFF88",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "eeDZjD5FUTTF4W47"
}
5.288 request_url https://oidc-certification.ory.sh:8443/oauth2/token
5.288 request_http_args {'headers': {'Authorization': 'Basic MTFjYzJhYWItMTE2Yi00MjdkLTgzOWItNDE5ZTA4NTBmNzQ5OkZpaW1WanNWMmVjOQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
5.288 request code=JxIQ_OkuteFyZex4MuOHAnztmFUm7FqeY3U2fev8SH0.JXt-dt5lUpMIziJi9kZk7QeFFlybqLh2dLLnO4hFF88&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=eeDZjD5FUTTF4W47
5.501 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
5.502 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoicm9aRjVKckE1cnN0ZFdWenpmQklXZyIsImF1ZCI6WyIxMWNjMmFhYi0xMTZiLTQyN2QtODM5Yi00MTllMDg1MGY3NDkiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiJ3ZGdsMHZObnltT1VSM3ZIQmRLY0RBIiwiZXhwIjoxNTI5NzU1NDA1LCJpYXQiOjE1Mjk3NTE4MDYsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjMzNGRhYmY2LTZlYzUtNGZmYy05MGEyLThiNTlkYWIwYTdkZiIsIm5vbmNlIjoicTBiREVyanduNDFZVTNaeiIsInJhdCI6MTUyOTc1MTgwNSwic3ViIjoiZm9vQGJhci5jb20ifQ.mRc0nAcSW1hWH_NO9Cf4PSbPkXOmNth2ya0J0DJ_sO4lRi1S7A68yzCD-0k-l8jReUXHLCFJ6ICVKRd_v5kNpV7ZzbzA7LTExbjCY2yFI4oEkWxA8XSr_Qr_IXaYCwf2jkE4ISx6L0jQvthbQv3GRHvCUSuDaaYkVhWhpxTkPcmzSs0RffG2OVvIh_3PXNeXLFcaBv9OYg6HW9_YH9RQ7RY_mdMj4robQka2_9E9LXGDqZRjaoj9tloOWdSUYY5e5OS6w6PSUzuaKyRl7WRo0rIba4JKIp231fT51QEN3h3FH5gI3x-ySeQGoRvq9UvjVhnlKO5XqlhruuLN3ZwocD57vdRA0NWiecqzpd5jr9J7ibC91gKGCtsWZfyNoKoCEUQ40TB-KYDSxDzumsKLm9NEu-vd9ckguYFWfIKUAfZUdPz08Fk0kpmMhTZHb7XYtGnotBTvHszbtL4bZcLMb-POUfz3d_VttuLaATX8ByFUKgf6aTCvaZqL-5Q6UGG9AQXkSGmf27f2wx9HKbPcHCsr7kZAeySy0IMGklk814Bj4bX6J8MKzwJdzyboIhZclmjp7SvZxZ62QlJuqeAw6Sp-5_kv7vFDXXopztdzYFTJXI5TroiclsSHt0YzGpDzhEpNb0jG2_XWlhsJdxQgoMEl-OdMFSwoKi1LEPXTD8A', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': '0ppBjthENTPwFGMWIUxvzzzMGpmQzN3zA-UiaN79NeI.bFDyR1epyO55TCF_T593kCvUhCKGEf_-0BUxtM8sV7w', 'scope': 'openid'}
5.505 AccessTokenResponse {
"access_token": "0ppBjthENTPwFGMWIUxvzzzMGpmQzN3zA-UiaN79NeI.bFDyR1epyO55TCF_T593kCvUhCKGEf_-0BUxtM8sV7w",
"expires_in": 3599,
"id_token": {
"at_hash": "roZF5JrA5rstdWVzzfBIWg",
"aud": [
"11cc2aab-116b-427d-839b-419e0850f749"
],
"auth_time": 1529751698,
"c_hash": "wdgl0vNnymOUR3vHBdKcDA",
"exp": 1529755405,
"iat": 1529751806,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "334dabf6-6ec5-4ffc-90a2-8b59dab0a7df",
"nonce": "q0bDErjwn41YU3Zz",
"rat": 1529751805,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
5.505 phase <--<-- 7 --- Done -->-->
5.505 end
5.506 assertion VerifyResponse
5.506 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
5.506 assertion SameAuthn
5.506 condition same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
5.506 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Registration-tos_uri.txt 0000644 0000000 0000000 00000023573 13313424061 016371 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-tos_uri
Test description: Registration with tos_uri
Timestamp: 2018-06-23T11:00:01Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.254 phase <--<-- 1 --- Webfinger -->-->
1.254 not expected to do WebFinger
1.254 phase <--<-- 2 --- Discovery -->-->
1.254 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.324 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.326 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.326 phase <--<-- 3 --- Registration -->-->
1.326 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'tos_uri': 'https://op.certification.openid.net:61353/static/tos.html', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.326 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#KLmrUGFXIEvel309"
],
"response_types": [
"code id_token token"
],
"tos_uri": "https://op.certification.openid.net:61353/static/tos.html"
}
1.519 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.52 RegistrationResponse {
"client_id": "23efd7f9-5f19-465d-b5fe-5755b7e2a27f",
"client_secret": "CDOt_ZU.o_8n",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "23efd7f9-5f19-465d-b5fe-5755b7e2a27f",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#KLmrUGFXIEvel309"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"tos_uri": "https://op.certification.openid.net:61353/static/tos.html",
"userinfo_signed_response_alg": "none"
}
1.52 phase <--<-- 4 --- AsyncAuthn -->-->
1.521 AuthorizationRequest {
"client_id": "23efd7f9-5f19-465d-b5fe-5755b7e2a27f",
"nonce": "KBntpAWEJZQqQM8K",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid",
"state": "frf7wHQ2b9ESWr7f"
}
1.521 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=23efd7f9-5f19-465d-b5fe-5755b7e2a27f&state=frf7wHQ2b9ESWr7f&response_type=code+id_token+token&nonce=KBntpAWEJZQqQM8K
1.521 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=23efd7f9-5f19-465d-b5fe-5755b7e2a27f&state=frf7wHQ2b9ESWr7f&response_type=code+id_token+token&nonce=KBntpAWEJZQqQM8K
4.003 http args {}
4.209 response URL with fragment
4.209 response access_token=6zb5o_nwrwlY-BDKqJ9bqgl5tNW6i3uQKB_WSUlq05E.kgk9E7UDKKM8XodVxKbhrSlivm4NawZA25T4f3vVqhM&code=6glzWKat13oynW7ElRIwHMA1tcgcHhWukz2kRB-_-UY.83a7sEokRmCZJJ_RbdSJmOHr40VwvC9I2ckMnqWRROQ&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoieVB4YTFOd1U2akRneXhhYmdRM3pBZyIsImF1ZCI6WyIyM2VmZDdmOS01ZjE5LTQ2NWQtYjVmZS01NzU1YjdlMmEyN2YiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJzUUhKU0tncVJjQ25sbk5oMVZ6bzBnIiwiZXhwIjoxNTI5NzU1MjAxLCJpYXQiOjE1Mjk3NTE2MDEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjZkOTQzMDg3LTI0YmMtNDYxOC05YjJmLWViY2FlNTEzODgzMSIsIm5vbmNlIjoiS0JudHBBV0VKWlFxUU04SyIsInJhdCI6MTUyOTc1MTU5OSwic3ViIjoiZm9vQGJhci5jb20ifQ.o-moEo7oy9cXdcmjvWoqGPnn1L-CtTAe2AdlvajutYyS8pbrmKN2GiJFKQR31BsW30VGBbjWoTK9ayERi82hY-rreE6x7-sJxRglRLe-cPNfO_0Tl7sZ9NsrpyULOG0JWfFJfTu-A8SWREvLCTONhtlfPwEeSiJ3adlhIhzPm4U_RJc9J1DYb3KYVmuegWuyD2SFMwYet1qWheQpe3LsVizEfcanuHtC5tJlWaq-1MOFR37cVNDMwFJ-mJbSfSKWKYSJ1_iIZK1wXxV682mBnGUeGTk0MyLwhex3o_CG7BCMhypA9-yruEO7Ww9F_Iuz2IRTsVfjvSwxnA6qAOmjyLkPQ4maLcXW4K7FSaYOVxnOGCEU97fcr94z3CfGMZ2fa5Uw2LBFgDkhJpggG5NZQZX0A-iOx3RMeC4sx4wHcvqNt9KAg6O5499dMOjYK97p0GDQkqqBRMn144xmM5RUCLXSrebiaX31qBThG-GOFEvZICUN3wKODsCVTFsm4x_XAHooGuCw9TKYNOUNF9wB8vCT38OruofT9RhhfxcUUtWLntTHEffRu4prh2Y2ID9-CDSvvl8e-hAHGvL7wtsEsx8ksbCTja_O-exY6D9ZkGhGXkEUu_7r3htqms49MpsgAuT4kr5KbssRsifqaU-HfzkK-RMyFYFoyLO1ddjNHp4&scope=openid&state=frf7wHQ2b9ESWr7f&token_type=bearer
4.21 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoieVB4YTFOd1U2akRneXhhYmdRM3pBZyIsImF1ZCI6WyIyM2VmZDdmOS01ZjE5LTQ2NWQtYjVmZS01NzU1YjdlMmEyN2YiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJzUUhKU0tncVJjQ25sbk5oMVZ6bzBnIiwiZXhwIjoxNTI5NzU1MjAxLCJpYXQiOjE1Mjk3NTE2MDEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjZkOTQzMDg3LTI0YmMtNDYxOC05YjJmLWViY2FlNTEzODgzMSIsIm5vbmNlIjoiS0JudHBBV0VKWlFxUU04SyIsInJhdCI6MTUyOTc1MTU5OSwic3ViIjoiZm9vQGJhci5jb20ifQ.o-moEo7oy9cXdcmjvWoqGPnn1L-CtTAe2AdlvajutYyS8pbrmKN2GiJFKQR31BsW30VGBbjWoTK9ayERi82hY-rreE6x7-sJxRglRLe-cPNfO_0Tl7sZ9NsrpyULOG0JWfFJfTu-A8SWREvLCTONhtlfPwEeSiJ3adlhIhzPm4U_RJc9J1DYb3KYVmuegWuyD2SFMwYet1qWheQpe3LsVizEfcanuHtC5tJlWaq-1MOFR37cVNDMwFJ-mJbSfSKWKYSJ1_iIZK1wXxV682mBnGUeGTk0MyLwhex3o_CG7BCMhypA9-yruEO7Ww9F_Iuz2IRTsVfjvSwxnA6qAOmjyLkPQ4maLcXW4K7FSaYOVxnOGCEU97fcr94z3CfGMZ2fa5Uw2LBFgDkhJpggG5NZQZX0A-iOx3RMeC4sx4wHcvqNt9KAg6O5499dMOjYK97p0GDQkqqBRMn144xmM5RUCLXSrebiaX31qBThG-GOFEvZICUN3wKODsCVTFsm4x_XAHooGuCw9TKYNOUNF9wB8vCT38OruofT9RhhfxcUUtWLntTHEffRu4prh2Y2ID9-CDSvvl8e-hAHGvL7wtsEsx8ksbCTja_O-exY6D9ZkGhGXkEUu_7r3htqms49MpsgAuT4kr5KbssRsifqaU-HfzkK-RMyFYFoyLO1ddjNHp4', 'scope': 'openid', 'code': '6glzWKat13oynW7ElRIwHMA1tcgcHhWukz2kRB-_-UY.83a7sEokRmCZJJ_RbdSJmOHr40VwvC9I2ckMnqWRROQ', 'access_token': '6zb5o_nwrwlY-BDKqJ9bqgl5tNW6i3uQKB_WSUlq05E.kgk9E7UDKKM8XodVxKbhrSlivm4NawZA25T4f3vVqhM', 'state': 'frf7wHQ2b9ESWr7f', 'expires_in': 3599, 'token_type': 'bearer'}
4.29 AuthorizationResponse {
"access_token": "6zb5o_nwrwlY-BDKqJ9bqgl5tNW6i3uQKB_WSUlq05E.kgk9E7UDKKM8XodVxKbhrSlivm4NawZA25T4f3vVqhM",
"code": "6glzWKat13oynW7ElRIwHMA1tcgcHhWukz2kRB-_-UY.83a7sEokRmCZJJ_RbdSJmOHr40VwvC9I2ckMnqWRROQ",
"expires_in": 3599,
"id_token": {
"at_hash": "yPxa1NwU6jDgyxabgQ3zAg",
"aud": [
"23efd7f9-5f19-465d-b5fe-5755b7e2a27f"
],
"auth_time": 1529751409,
"c_hash": "sQHJSKgqRcCnlnNh1Vzo0g",
"exp": 1529755201,
"iat": 1529751601,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "6d943087-24bc-4618-9b2f-ebcae5138831",
"nonce": "KBntpAWEJZQqQM8K",
"rat": 1529751599,
"sub": "[email protected]"
},
"scope": "openid",
"state": "frf7wHQ2b9ESWr7f",
"token_type": "bearer"
}
4.29 phase <--<-- 5 --- Done -->-->
4.29 end
4.291 assertion VerifyAuthnResponse
4.291 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
4.291 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Response-code+id_token+token.txt 0000644 0000000 0000000 00000023220 13313424005 017632 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Response-code+id_token+token
Test description: Request with response_type=code id_token token
Timestamp: 2018-06-23T10:59:17Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.075 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.076 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.076 phase <--<-- 2 --- Registration -->-->
0.076 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.077 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#F82L9kMHtSe00Kxd"
],
"response_types": [
"code id_token token"
]
}
0.268 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.269 RegistrationResponse {
"client_id": "6ab0fc9e-3f79-40c2-bfc7-fb5251a4583a",
"client_secret": "dRUROMsTISDc",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "6ab0fc9e-3f79-40c2-bfc7-fb5251a4583a",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#F82L9kMHtSe00Kxd"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.269 phase <--<-- 3 --- AsyncAuthn -->-->
0.27 AuthorizationRequest {
"client_id": "6ab0fc9e-3f79-40c2-bfc7-fb5251a4583a",
"nonce": "UlBq8Wu0QYx6xzty",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid",
"state": "w29bqGDqx9jLjF1k"
}
0.27 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=6ab0fc9e-3f79-40c2-bfc7-fb5251a4583a&state=w29bqGDqx9jLjF1k&response_type=code+id_token+token&nonce=UlBq8Wu0QYx6xzty
0.27 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=6ab0fc9e-3f79-40c2-bfc7-fb5251a4583a&state=w29bqGDqx9jLjF1k&response_type=code+id_token+token&nonce=UlBq8Wu0QYx6xzty
2.594 http args {}
2.763 response URL with fragment
2.763 response access_token=Wggs557loevuQRouQYVcRoVlkXLXg3PcETv9zsdMO-Y.9nv80vYkYp1W5HFPSgsWwSvJaCcZiBmjk7hwaM4q92o&code=46VdmjRe6EmmkVGd6WVpmXJuJ0ojs80wUeQaGogmpmA.g2L8zGZZqYp4ZvYNaKofSSjhKJZ44EmLyllY8eHvEhM&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoieGlKMmoxYkJUTERPa3VLS3REWnpHQSIsImF1ZCI6WyI2YWIwZmM5ZS0zZjc5LTQwYzItYmZjNy1mYjUyNTFhNDU4M2EiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJ3eE5IMVVBWFA5SVFMaXY2LTAwdVpRIiwiZXhwIjoxNTI5NzU1MTU3LCJpYXQiOjE1Mjk3NTE1NTcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImRiYThlMGEyLWQzYmEtNDFkOC04MWVhLTlkN2RjYTRmZDZkNyIsIm5vbmNlIjoiVWxCcThXdTBRWXg2eHp0eSIsInJhdCI6MTUyOTc1MTU1NSwic3ViIjoiZm9vQGJhci5jb20ifQ.BbgYnAjC3AkTpDfL4R9gyT9VTcfVuZmU2blmmrYLK-OumkeesmoLc9OZoeitt8T33dH-dXkvY6Bm0FycmaKE0F7Avb6886c4t8B5W_eqAu57BodgnoH2jBdTPrXYJAeogkv9g8LYIO5tTQiZeCofctXrPt-GFK4H5pTWozEC_rVWmqoyHYhyij260JwkKbuNVNqup2uMtACP7D8-9HjEdbYe1Sz_zkZVo-vaBxIS-Yz4LmxVvyEa10VNk3yvKhum0FoAokjlavYq5_6ZtwpnY8qlWCOJWMUkoczQddHqJlZHAbZfn90_zQnORzPySHQ-8yAcX9FjQtGtlyqEBO1YHhWNmQc7o9OGiorqtFxcF5uQQ7gN3tAw0bfTLzHorfbatDo4iCqvd2sYnxvMYlY0KV8lGZAVsnp4jRESFjRk_Ewz1x1AHiQDmMF5bnaqkhSe7Vx0aH5W-DNAwvF-IEnMjKAxk3k2wPgJqxjM_-dGJFdETE8zL80ATHTjriusr6aR7luBVIm2r0X6cLtRoYKQs-RyqPMY0BoTLJeRTz4OMGinUxPdBqVCnVq4JNPMPDbY6G4EDgVIwvSl-jLkH_h9qZRnJBXAqccGTP62wE9ZcMkVfTnsUwkbahAkb6doY4n0J9zBT8qTPEX1zAnVwMPHGqEjTlD8T9qMf1UPIpJJrLs&scope=openid&state=w29bqGDqx9jLjF1k&token_type=bearer
2.763 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoieGlKMmoxYkJUTERPa3VLS3REWnpHQSIsImF1ZCI6WyI2YWIwZmM5ZS0zZjc5LTQwYzItYmZjNy1mYjUyNTFhNDU4M2EiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJ3eE5IMVVBWFA5SVFMaXY2LTAwdVpRIiwiZXhwIjoxNTI5NzU1MTU3LCJpYXQiOjE1Mjk3NTE1NTcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImRiYThlMGEyLWQzYmEtNDFkOC04MWVhLTlkN2RjYTRmZDZkNyIsIm5vbmNlIjoiVWxCcThXdTBRWXg2eHp0eSIsInJhdCI6MTUyOTc1MTU1NSwic3ViIjoiZm9vQGJhci5jb20ifQ.BbgYnAjC3AkTpDfL4R9gyT9VTcfVuZmU2blmmrYLK-OumkeesmoLc9OZoeitt8T33dH-dXkvY6Bm0FycmaKE0F7Avb6886c4t8B5W_eqAu57BodgnoH2jBdTPrXYJAeogkv9g8LYIO5tTQiZeCofctXrPt-GFK4H5pTWozEC_rVWmqoyHYhyij260JwkKbuNVNqup2uMtACP7D8-9HjEdbYe1Sz_zkZVo-vaBxIS-Yz4LmxVvyEa10VNk3yvKhum0FoAokjlavYq5_6ZtwpnY8qlWCOJWMUkoczQddHqJlZHAbZfn90_zQnORzPySHQ-8yAcX9FjQtGtlyqEBO1YHhWNmQc7o9OGiorqtFxcF5uQQ7gN3tAw0bfTLzHorfbatDo4iCqvd2sYnxvMYlY0KV8lGZAVsnp4jRESFjRk_Ewz1x1AHiQDmMF5bnaqkhSe7Vx0aH5W-DNAwvF-IEnMjKAxk3k2wPgJqxjM_-dGJFdETE8zL80ATHTjriusr6aR7luBVIm2r0X6cLtRoYKQs-RyqPMY0BoTLJeRTz4OMGinUxPdBqVCnVq4JNPMPDbY6G4EDgVIwvSl-jLkH_h9qZRnJBXAqccGTP62wE9ZcMkVfTnsUwkbahAkb6doY4n0J9zBT8qTPEX1zAnVwMPHGqEjTlD8T9qMf1UPIpJJrLs', 'scope': 'openid', 'code': '46VdmjRe6EmmkVGd6WVpmXJuJ0ojs80wUeQaGogmpmA.g2L8zGZZqYp4ZvYNaKofSSjhKJZ44EmLyllY8eHvEhM', 'access_token': 'Wggs557loevuQRouQYVcRoVlkXLXg3PcETv9zsdMO-Y.9nv80vYkYp1W5HFPSgsWwSvJaCcZiBmjk7hwaM4q92o', 'state': 'w29bqGDqx9jLjF1k', 'expires_in': 3599, 'token_type': 'bearer'}
2.894 AuthorizationResponse {
"access_token": "Wggs557loevuQRouQYVcRoVlkXLXg3PcETv9zsdMO-Y.9nv80vYkYp1W5HFPSgsWwSvJaCcZiBmjk7hwaM4q92o",
"code": "46VdmjRe6EmmkVGd6WVpmXJuJ0ojs80wUeQaGogmpmA.g2L8zGZZqYp4ZvYNaKofSSjhKJZ44EmLyllY8eHvEhM",
"expires_in": 3599,
"id_token": {
"at_hash": "xiJ2j1bBTLDOkuKKtDZzGA",
"aud": [
"6ab0fc9e-3f79-40c2-bfc7-fb5251a4583a"
],
"auth_time": 1529751409,
"c_hash": "wxNH1UAXP9IQLiv6-00uZQ",
"exp": 1529755157,
"iat": 1529751557,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "dba8e0a2-d3ba-41d8-81ea-9d7dca4fd6d7",
"nonce": "UlBq8Wu0QYx6xzty",
"rat": 1529751555,
"sub": "[email protected]"
},
"scope": "openid",
"state": "w29bqGDqx9jLjF1k",
"token_type": "bearer"
}
2.894 phase <--<-- 4 --- Done -->-->
2.894 end
2.895 assertion VerifyAuthnResponse
2.895 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
2.895 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-prompt-none-NotLoggedIn.txt 0000644 0000000 0000000 00000015631 13313424253 016661 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-prompt-none-NotLoggedIn
Test description: Request with prompt=none when not logged in
Timestamp: 2018-06-23T11:02:03Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.683 phase <--<-- 1 --- Webfinger -->-->
1.683 not expected to do WebFinger
1.683 phase <--<-- 2 --- Discovery -->-->
1.683 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.76 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.761 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.761 phase <--<-- 3 --- Registration -->-->
1.761 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.762 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#LwEs8dGsMmMAzSnd"
],
"response_types": [
"code id_token token"
]
}
1.921 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.922 RegistrationResponse {
"client_id": "af9a8767-a8db-45bc-83f5-f3298da0dee8",
"client_secret": "lsYMdfj9hwIP",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "af9a8767-a8db-45bc-83f5-f3298da0dee8",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#LwEs8dGsMmMAzSnd"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.922 phase <--<-- 4 --- AsyncAuthn -->-->
1.922 AuthorizationRequest {
"client_id": "af9a8767-a8db-45bc-83f5-f3298da0dee8",
"nonce": "XpfgzBcQohwujvDe",
"prompt": [
"none"
],
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid",
"state": "W9dexi8xI1HO6GsQ"
}
1.923 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=af9a8767-a8db-45bc-83f5-f3298da0dee8&state=W9dexi8xI1HO6GsQ&response_type=code+id_token+token&nonce=XpfgzBcQohwujvDe
1.923 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=af9a8767-a8db-45bc-83f5-f3298da0dee8&state=W9dexi8xI1HO6GsQ&response_type=code+id_token+token&nonce=XpfgzBcQohwujvDe
2.47 http args {}
2.69 response URL with fragment
2.69 response error=login_required&error_debug=Prompt+%2522none%2522+was+requested%252C+but+no+existing+login+session+was+found&error_description=The+Authorization+Server+requires+End-User+authentication&state=W9dexi8xI1HO6GsQ
2.69 response {'error_debug': 'Prompt %22none%22 was requested%2C but no existing login session was found', 'error_description': 'The Authorization Server requires End-User authentication', 'state': 'W9dexi8xI1HO6GsQ', 'error': 'login_required'}
2.691 AuthorizationErrorResponse {
"error": "login_required",
"error_debug": "Prompt %22none%22 was requested%2C but no existing login session was found",
"error_description": "The Authorization Server requires End-User authentication",
"state": "W9dexi8xI1HO6GsQ"
}
2.691 AuthorizationErrorResponse {
"error": "login_required",
"error_debug": "Prompt %22none%22 was requested%2C but no existing login session was found",
"error_description": "The Authorization Server requires End-User authentication",
"state": "W9dexi8xI1HO6GsQ"
}
2.691 phase <--<-- 5 --- Done -->-->
2.691 end
2.691 assertion VerifyErrorMessage
2.691 condition verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
2.691 condition Done: status=OK
============================================================
Conditions
verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-request_uri-Unsigned.txt 0000644 0000000 0000000 00000024362 13313424314 016354 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-request_uri-Unsigned
Test description: Support request_uri request parameter with unsigned request
Timestamp: 2018-06-23T11:02:36Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Registration -->-->
0.074 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'request_object_signing_alg': 'none'}
0.075 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "none",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#ZgD68e0cKgGrHi7O"
],
"response_types": [
"code id_token token"
]
}
0.232 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.233 RegistrationResponse {
"client_id": "e9cb8f06-cda9-4dc0-b700-0320d69b344e",
"client_secret": "sey1IkB7ZNZq",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "e9cb8f06-cda9-4dc0-b700-0320d69b344e",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "none",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#ZgD68e0cKgGrHi7O"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.233 phase <--<-- 3 --- AsyncAuthn -->-->
0.234 AuthorizationRequest {
"client_id": "e9cb8f06-cda9-4dc0-b700-0320d69b344e",
"nonce": "3fOyCs443U2Vemz8",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"request_uri": "https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#ZgD68e0cKgGrHi7O",
"response_type": "code id_token token",
"scope": "openid",
"state": "TCxVgt8xYQFhAPmx"
}
0.235 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?request_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Frequests%2Fe3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9%23ZgD68e0cKgGrHi7O&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=e9cb8f06-cda9-4dc0-b700-0320d69b344e&state=TCxVgt8xYQFhAPmx&response_type=code+id_token+token&nonce=3fOyCs443U2Vemz8
0.235 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?request_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Frequests%2Fe3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9%23ZgD68e0cKgGrHi7O&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=e9cb8f06-cda9-4dc0-b700-0320d69b344e&state=TCxVgt8xYQFhAPmx&response_type=code+id_token+token&nonce=3fOyCs443U2Vemz8
2.797 http args {}
3.013 response URL with fragment
3.013 response access_token=JUnZKUatYP6wokYI5m4LEE4M7Ihf3zDTPugIJo7wOps.PpKfVdPIRht-5SuguFqKWkrA-B4T1OZWf92NaGKGO9Q&code=yRCNPzO4varnJZ3BrAzxgjSHhHZu24PurgMwPF9fErs.tkHLTqwJDPRx3jCVZct0sqzWa6ApYsQ0lIAaDljwVyQ&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoienZPRlNrQVloSjZuaERMRjl4Y3kxZyIsImF1ZCI6WyJlOWNiOGYwNi1jZGE5LTRkYzAtYjcwMC0wMzIwZDY5YjM0NGUiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiJPQUZQSGZjWFBJRWJ3WFhJRU11ZFZRIiwiZXhwIjoxNTI5NzU1MzU1LCJpYXQiOjE1Mjk3NTE3NTUsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjczZGQ0MmQ0LTI4MTgtNDJhMy1iMDY0LTg3YmM3NjRlYjc5NSIsIm5vbmNlIjoiM2ZPeUNzNDQzVTJWZW16OCIsInJhdCI6MTUyOTc1MTc1Mywic3ViIjoiZm9vQGJhci5jb20ifQ.N4dKGu2W48yG3N1tNWGrW5u46Oy80dBk01jQ6LMszMJffEs8hIem7i0zwT38eaSd-Ye-Drdh617RjioiytdbYQBABwhVSkM7_9mocRFtFsw1EZCGZxUH2-Bpc_ludcEfZ9SiUJ6gdJbBAghOk6D1flLMRbUrLgf9gvtjcntOedZwcI5kxoFGx2AFQ3h3uCZ6gQ-XVhn1QaHFsoPv9asuU7Qu5-kmOl6qeg9QqSisrXl8-meQ9lNBnTFu2XkDTTdcng75IOt8Oyv1Eb1GxGrJzHb5RSzfF1oWScqOStdxujCC5K8FRcbtt0IzBBLH1dNxdHkC7_qHGmFw2a_iWwx92PZ5KEa66Jv-zx_kjniNGxqTlRf17n2H290CIV4_asmSfYEPSYyOtyV9QUdlAQ8Neu-Pgwuiata5rjWXbDT5mCEGen-LAdO5vODZTO4Jqc0E6I8w1Gk5OPpqurd1oNLAMC3Cb0hrWRULeTX3VepTD_ntA9OuWrHyr_2iF7FwLIAkYe9SAwzVGpVgEoeajy-dNrli2GX7Cuv-Ghx7-E-hl5qEDw4nI5NlJhbQb4t3FMiucppGalEiLrJ6CgLHBUBE7me9EZD1Y4KAmVErCGODuT6fPcNw1kD6K62P_bDXuFKN7RHhd9Zov59JXYpqDNrG-L9mPRPA3Bkfn0SOIqm-Tmo&scope=openid&state=TCxVgt8xYQFhAPmx&token_type=bearer
3.014 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoienZPRlNrQVloSjZuaERMRjl4Y3kxZyIsImF1ZCI6WyJlOWNiOGYwNi1jZGE5LTRkYzAtYjcwMC0wMzIwZDY5YjM0NGUiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiJPQUZQSGZjWFBJRWJ3WFhJRU11ZFZRIiwiZXhwIjoxNTI5NzU1MzU1LCJpYXQiOjE1Mjk3NTE3NTUsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjczZGQ0MmQ0LTI4MTgtNDJhMy1iMDY0LTg3YmM3NjRlYjc5NSIsIm5vbmNlIjoiM2ZPeUNzNDQzVTJWZW16OCIsInJhdCI6MTUyOTc1MTc1Mywic3ViIjoiZm9vQGJhci5jb20ifQ.N4dKGu2W48yG3N1tNWGrW5u46Oy80dBk01jQ6LMszMJffEs8hIem7i0zwT38eaSd-Ye-Drdh617RjioiytdbYQBABwhVSkM7_9mocRFtFsw1EZCGZxUH2-Bpc_ludcEfZ9SiUJ6gdJbBAghOk6D1flLMRbUrLgf9gvtjcntOedZwcI5kxoFGx2AFQ3h3uCZ6gQ-XVhn1QaHFsoPv9asuU7Qu5-kmOl6qeg9QqSisrXl8-meQ9lNBnTFu2XkDTTdcng75IOt8Oyv1Eb1GxGrJzHb5RSzfF1oWScqOStdxujCC5K8FRcbtt0IzBBLH1dNxdHkC7_qHGmFw2a_iWwx92PZ5KEa66Jv-zx_kjniNGxqTlRf17n2H290CIV4_asmSfYEPSYyOtyV9QUdlAQ8Neu-Pgwuiata5rjWXbDT5mCEGen-LAdO5vODZTO4Jqc0E6I8w1Gk5OPpqurd1oNLAMC3Cb0hrWRULeTX3VepTD_ntA9OuWrHyr_2iF7FwLIAkYe9SAwzVGpVgEoeajy-dNrli2GX7Cuv-Ghx7-E-hl5qEDw4nI5NlJhbQb4t3FMiucppGalEiLrJ6CgLHBUBE7me9EZD1Y4KAmVErCGODuT6fPcNw1kD6K62P_bDXuFKN7RHhd9Zov59JXYpqDNrG-L9mPRPA3Bkfn0SOIqm-Tmo', 'scope': 'openid', 'code': 'yRCNPzO4varnJZ3BrAzxgjSHhHZu24PurgMwPF9fErs.tkHLTqwJDPRx3jCVZct0sqzWa6ApYsQ0lIAaDljwVyQ', 'access_token': 'JUnZKUatYP6wokYI5m4LEE4M7Ihf3zDTPugIJo7wOps.PpKfVdPIRht-5SuguFqKWkrA-B4T1OZWf92NaGKGO9Q', 'state': 'TCxVgt8xYQFhAPmx', 'expires_in': 3599, 'token_type': 'bearer'}
3.094 AuthorizationResponse {
"access_token": "JUnZKUatYP6wokYI5m4LEE4M7Ihf3zDTPugIJo7wOps.PpKfVdPIRht-5SuguFqKWkrA-B4T1OZWf92NaGKGO9Q",
"code": "yRCNPzO4varnJZ3BrAzxgjSHhHZu24PurgMwPF9fErs.tkHLTqwJDPRx3jCVZct0sqzWa6ApYsQ0lIAaDljwVyQ",
"expires_in": 3599,
"id_token": {
"at_hash": "zvOFSkAYhJ6nhDLF9xcy1g",
"aud": [
"e9cb8f06-cda9-4dc0-b700-0320d69b344e"
],
"auth_time": 1529751698,
"c_hash": "OAFPHfcXPIEbwXXIEMudVQ",
"exp": 1529755355,
"iat": 1529751755,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "73dd42d4-2818-42a3-b064-87bc764eb795",
"nonce": "3fOyCs443U2Vemz8",
"rat": 1529751753,
"sub": "[email protected]"
},
"scope": "openid",
"state": "TCxVgt8xYQFhAPmx",
"token_type": "bearer"
}
3.094 phase <--<-- 4 --- Done -->-->
3.094 end
3.095 assertion VerifyResponse
3.095 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.095 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Req-acr_values.txt 0000644 0000000 0000000 00000033026 13313424361 015103 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-acr_values
Test description: Providing acr_values
Timestamp: 2018-06-23T11:03:13Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.072 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.073 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.073 phase <--<-- 2 --- Registration -->-->
0.074 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.074 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#XceklA2a85u3ST8x"
],
"response_types": [
"code id_token token"
]
}
0.239 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.24 RegistrationResponse {
"client_id": "c4d41867-5cf2-4e0c-bf13-d59e6108d727",
"client_secret": "qY-a9KyEixCB",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "c4d41867-5cf2-4e0c-bf13-d59e6108d727",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#XceklA2a85u3ST8x"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.24 phase <--<-- 3 --- AsyncAuthn -->-->
0.24 AuthorizationRequest {
"acr_values": "1 2",
"client_id": "c4d41867-5cf2-4e0c-bf13-d59e6108d727",
"nonce": "ioNZbBqsAW6MLa7D",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid",
"state": "GZXqq964grTH6mUV"
}
0.241 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=c4d41867-5cf2-4e0c-bf13-d59e6108d727&state=GZXqq964grTH6mUV&acr_values=1+2&response_type=code+id_token+token&nonce=ioNZbBqsAW6MLa7D
0.241 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=c4d41867-5cf2-4e0c-bf13-d59e6108d727&state=GZXqq964grTH6mUV&acr_values=1+2&response_type=code+id_token+token&nonce=ioNZbBqsAW6MLa7D
3.058 http args {}
3.274 response URL with fragment
3.275 response access_token=Lw6PrNdVahMptebT6w2dtG7g-0-i4bPlwhan7scJ2z0.voRTh5dahdGx2vnVlKValnVs1hyRTXNKXYfKmIFzmVs&code=Pip2y37S0MerxiixoyO2z59sidLzWlvlVyrbVLf337Q.xo7fq2-tfVMadQz-CP8qtY5uOeYlswuf6i_MiAi6Es0&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhY3IiOiIwIiwiYXRfaGFzaCI6IkVaTDNhMGZuTjJrLXNNY01USWt6N3ciLCJhdWQiOlsiYzRkNDE4NjctNWNmMi00ZTBjLWJmMTMtZDU5ZTYxMDhkNzI3Il0sImF1dGhfdGltZSI6MTUyOTc1MTY5OCwiY19oYXNoIjoiNGR1Nlo2TVpPUGI1cVNLTFdNYTFTUSIsImV4cCI6MTUyOTc1NTM5MiwiaWF0IjoxNTI5NzUxNzkyLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJiMGRjOWM4Zi1iOGIxLTQwZDItODE0Yy1mZWQwYWY5YWY5NTkiLCJub25jZSI6ImlvTlpiQnFzQVc2TUxhN0QiLCJyYXQiOjE1Mjk3NTE3OTAsInN1YiI6ImZvb0BiYXIuY29tIn0.SnlzpDZaZm9a4ZEkg5xhrKmfAIXKqNfpYXhY4cPiDbAXUdvesBxdECALV_6mofVUskCwCnxRgaUlZMnkBRmyX3ObNT9SZ7QGUZZrsKYSsQ44DP39PlJwgrNhwCzgd835sNNCwuYQ86eEi97o4HRKPFCaHjJQDJR_yUQ3LmTZh6rC0SPCmHIYqFrDgYkZopVTqrvYm65hFUAxpDswObaYjPWDuv0Ajn08ArKZ-4ID8uTDtw9EgC3cTdHgZPEyL8yGHZRC81S0cXqf5W7Fu0d1AWMlqtCdE13MjKVswpCPL9jzbM4_pyTPtw_1foh-BQRcdJ5yYsox15dWmaWrS82Eggk5Ok4plFAr_0-ss18hKe7j7Z14V7IeAxseJrha55HzdK9ApaiGEvfvPpognm1Gl3StoOk2XCXtXgY326PKrrUpC7lP2hZdETYOuA5vCrBt5Leogu6xgzUmnkSNoreAAHY1PzgWlcl5rApOHQLe0r4ogMU1KhOdnt3w1pEcSIlrREoyWTzEiyThas9wMFcVNWA4Ss2TJpfCNbp1UdH_NvKTBSp7FuxR3aUyrVGWfd1Ol9OQV8ypE6XSArIuqAdPTGKr6sCAkj4xnT2Zs1PRgVqZdmAfbQPa6H_o2jW5bc3tGFIM-wgRcnKCvJZ9wQ12kw8CjWRBVDqvqMD6gZiGK1c&scope=openid&state=GZXqq964grTH6mUV&token_type=bearer
3.276 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhY3IiOiIwIiwiYXRfaGFzaCI6IkVaTDNhMGZuTjJrLXNNY01USWt6N3ciLCJhdWQiOlsiYzRkNDE4NjctNWNmMi00ZTBjLWJmMTMtZDU5ZTYxMDhkNzI3Il0sImF1dGhfdGltZSI6MTUyOTc1MTY5OCwiY19oYXNoIjoiNGR1Nlo2TVpPUGI1cVNLTFdNYTFTUSIsImV4cCI6MTUyOTc1NTM5MiwiaWF0IjoxNTI5NzUxNzkyLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJiMGRjOWM4Zi1iOGIxLTQwZDItODE0Yy1mZWQwYWY5YWY5NTkiLCJub25jZSI6ImlvTlpiQnFzQVc2TUxhN0QiLCJyYXQiOjE1Mjk3NTE3OTAsInN1YiI6ImZvb0BiYXIuY29tIn0.SnlzpDZaZm9a4ZEkg5xhrKmfAIXKqNfpYXhY4cPiDbAXUdvesBxdECALV_6mofVUskCwCnxRgaUlZMnkBRmyX3ObNT9SZ7QGUZZrsKYSsQ44DP39PlJwgrNhwCzgd835sNNCwuYQ86eEi97o4HRKPFCaHjJQDJR_yUQ3LmTZh6rC0SPCmHIYqFrDgYkZopVTqrvYm65hFUAxpDswObaYjPWDuv0Ajn08ArKZ-4ID8uTDtw9EgC3cTdHgZPEyL8yGHZRC81S0cXqf5W7Fu0d1AWMlqtCdE13MjKVswpCPL9jzbM4_pyTPtw_1foh-BQRcdJ5yYsox15dWmaWrS82Eggk5Ok4plFAr_0-ss18hKe7j7Z14V7IeAxseJrha55HzdK9ApaiGEvfvPpognm1Gl3StoOk2XCXtXgY326PKrrUpC7lP2hZdETYOuA5vCrBt5Leogu6xgzUmnkSNoreAAHY1PzgWlcl5rApOHQLe0r4ogMU1KhOdnt3w1pEcSIlrREoyWTzEiyThas9wMFcVNWA4Ss2TJpfCNbp1UdH_NvKTBSp7FuxR3aUyrVGWfd1Ol9OQV8ypE6XSArIuqAdPTGKr6sCAkj4xnT2Zs1PRgVqZdmAfbQPa6H_o2jW5bc3tGFIM-wgRcnKCvJZ9wQ12kw8CjWRBVDqvqMD6gZiGK1c', 'scope': 'openid', 'code': 'Pip2y37S0MerxiixoyO2z59sidLzWlvlVyrbVLf337Q.xo7fq2-tfVMadQz-CP8qtY5uOeYlswuf6i_MiAi6Es0', 'access_token': 'Lw6PrNdVahMptebT6w2dtG7g-0-i4bPlwhan7scJ2z0.voRTh5dahdGx2vnVlKValnVs1hyRTXNKXYfKmIFzmVs', 'state': 'GZXqq964grTH6mUV', 'expires_in': 3599, 'token_type': 'bearer'}
3.378 AuthorizationResponse {
"access_token": "Lw6PrNdVahMptebT6w2dtG7g-0-i4bPlwhan7scJ2z0.voRTh5dahdGx2vnVlKValnVs1hyRTXNKXYfKmIFzmVs",
"code": "Pip2y37S0MerxiixoyO2z59sidLzWlvlVyrbVLf337Q.xo7fq2-tfVMadQz-CP8qtY5uOeYlswuf6i_MiAi6Es0",
"expires_in": 3599,
"id_token": {
"acr": "0",
"at_hash": "EZL3a0fnN2k-sMcMTIkz7w",
"aud": [
"c4d41867-5cf2-4e0c-bf13-d59e6108d727"
],
"auth_time": 1529751698,
"c_hash": "4du6Z6MZOPb5qSKLWMa1SQ",
"exp": 1529755392,
"iat": 1529751792,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "b0dc9c8f-b8b1-40d2-814c-fed0af9af959",
"nonce": "ioNZbBqsAW6MLa7D",
"rat": 1529751790,
"sub": "[email protected]"
},
"scope": "openid",
"state": "GZXqq964grTH6mUV",
"token_type": "bearer"
}
3.378 phase <--<-- 4 --- AccessToken -->-->
3.378 --> request op_args: {'state': 'GZXqq964grTH6mUV'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.378 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'GZXqq964grTH6mUV', 'code': 'Pip2y37S0MerxiixoyO2z59sidLzWlvlVyrbVLf337Q.xo7fq2-tfVMadQz-CP8qtY5uOeYlswuf6i_MiAi6Es0', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'c4d41867-5cf2-4e0c-bf13-d59e6108d727'}, 'state': 'GZXqq964grTH6mUV'}
3.378 AccessTokenRequest {
"code": "Pip2y37S0MerxiixoyO2z59sidLzWlvlVyrbVLf337Q.xo7fq2-tfVMadQz-CP8qtY5uOeYlswuf6i_MiAi6Es0",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "GZXqq964grTH6mUV"
}
3.378 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.378 request_http_args {'headers': {'Authorization': 'Basic YzRkNDE4NjctNWNmMi00ZTBjLWJmMTMtZDU5ZTYxMDhkNzI3OnFZLWE5S3lFaXhDQg==', 'Content-Type': 'application/x-www-form-urlencoded'}}
3.378 request code=Pip2y37S0MerxiixoyO2z59sidLzWlvlVyrbVLf337Q.xo7fq2-tfVMadQz-CP8qtY5uOeYlswuf6i_MiAi6Es0&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=GZXqq964grTH6mUV
3.589 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.59 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhY3IiOiIwIiwiYXRfaGFzaCI6IkVaTDNhMGZuTjJrLXNNY01USWt6N3ciLCJhdWQiOlsiYzRkNDE4NjctNWNmMi00ZTBjLWJmMTMtZDU5ZTYxMDhkNzI3Il0sImF1dGhfdGltZSI6MTUyOTc1MTY5OCwiY19oYXNoIjoiNGR1Nlo2TVpPUGI1cVNLTFdNYTFTUSIsImV4cCI6MTUyOTc1NTM5MiwiaWF0IjoxNTI5NzUxNzkzLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI2MDNkZTQ4MS01MTMyLTQ2OWYtOTA2Zi1lMzc4ZTA4MWU1ZDUiLCJub25jZSI6ImlvTlpiQnFzQVc2TUxhN0QiLCJyYXQiOjE1Mjk3NTE3OTAsInN1YiI6ImZvb0BiYXIuY29tIn0.y-PGqHNCqFjZuB_jgytEVHKD4sGIyO6Gp5H8Gup3kidkoqOKpecvfL2aEsibFy73zHVQYXWlHwT4Bg165il847A0wMGfJqyP9POTjenKEZNWkivIByDbnwBGHgYTzpUZiaBNoaS_LdwRJPixoyL7iZEVJzdaB-xPDf_MymiQY3Bw513p9j8eQ_BSjTCWBwY8r-E2MmujzW37MgrZRC2S0-bjAESwYoVCzlrVXMC1ErBmoPpFn7qKFMnMPmAoMOKh82g2W48YsvSwr1ZeAsJPUxy1RVmKjl6ySR3UnaKazguBXBNB25-umlr39WrNdcZL99c9qCSyGetKs04JGmRPz9lM5uXbyU6GDOj92r73umCekw_3oQlkP91Q6qnbcdioIyYp7Lk_J8POvwYT5oCvMy37rYMZeZSBzsLG5VM3vZrRL7YwUQqF6qIj5yRQD2K55WtrG6Vonnr-rhCmal5_YqZCbv4dp6jhQXqJTsjwvauxnQHnapTZrLPq3LWwA3lru0xddMQhRqol2E3b4ASrsSArabNj3mCSx6DvoNXSOsK2IyjY2ulfHEk-Cfn_o8vm0-MbHhNeS1bzMGZB2J8Zy8iCyVBZebn3SVS7VREb_v8nAYsNlmyU9ydeFyQyDuANu0zdD_JqaMehpyTEH35ZNUc4ke_Jb3T2v2QGtYDvgIs', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'THTRNfDytmy3u5_bJXLpQMVWYiO9w0DwVixtbc7e6LQ.4P0YqDctztemAKXL3RrIHHDZwB-rsvjHYcby7XJmiOM', 'scope': 'openid'}
3.594 AccessTokenResponse {
"access_token": "THTRNfDytmy3u5_bJXLpQMVWYiO9w0DwVixtbc7e6LQ.4P0YqDctztemAKXL3RrIHHDZwB-rsvjHYcby7XJmiOM",
"expires_in": 3599,
"id_token": {
"acr": "0",
"at_hash": "EZL3a0fnN2k-sMcMTIkz7w",
"aud": [
"c4d41867-5cf2-4e0c-bf13-d59e6108d727"
],
"auth_time": 1529751698,
"c_hash": "4du6Z6MZOPb5qSKLWMa1SQ",
"exp": 1529755392,
"iat": 1529751793,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "603de481-5132-469f-906f-e378e081e5d5",
"nonce": "ioNZbBqsAW6MLa7D",
"rat": 1529751790,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.594 phase <--<-- 5 --- Done -->-->
3.594 end
3.595 assertion VerifyResponse
3.595 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.595 assertion UsedAcrValue
3.595 condition used-acr-value: status=WARNING, message=Used acr value: 0, preferred: ['1', '2'] [The acr value in the ID Token]
3.595 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
used-acr-value: status=WARNING, message=Used acr value: 0, preferred: ['1', '2'] [The acr value in the ID Token]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
Used acr value: 0, preferred: ['1', '2']
./OP-scope-address.txt 0000644 0000000 0000000 00000035425 13313424327 014775 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-scope-address
Test description: Scope requesting address claims
Timestamp: 2018-06-23T11:02:47Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Registration -->-->
0.074 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.075 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#5kTzuP3Tw1TdmuUc"
],
"response_types": [
"code id_token token"
]
}
0.234 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.235 RegistrationResponse {
"client_id": "b5b35afe-251b-4eb1-bf5f-31961f00ad21",
"client_secret": ".TMo.BbNbTbj",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "b5b35afe-251b-4eb1-bf5f-31961f00ad21",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#5kTzuP3Tw1TdmuUc"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.235 phase <--<-- 3 --- AsyncAuthn -->-->
0.236 condition Check support: status=WARNING, message=No support for: scopes_supported=['address']
0.236 AuthorizationRequest {
"client_id": "b5b35afe-251b-4eb1-bf5f-31961f00ad21",
"nonce": "MsMxkvgMACl1Y3D3",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid address",
"state": "bveKxVsWeEnXp4eF"
}
0.236 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+address&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=b5b35afe-251b-4eb1-bf5f-31961f00ad21&state=bveKxVsWeEnXp4eF&response_type=code+id_token+token&nonce=MsMxkvgMACl1Y3D3
0.236 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+address&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=b5b35afe-251b-4eb1-bf5f-31961f00ad21&state=bveKxVsWeEnXp4eF&response_type=code+id_token+token&nonce=MsMxkvgMACl1Y3D3
2.677 http args {}
2.846 response URL with fragment
2.846 response access_token=weCW8usWoYePU6cAGQZsiPYc4pjViEWtaKza4MIH-4A.yd3ugRaDAFCNnZkxNu4jqyfp9i1V4xfGERBkzTNnmX4&code=9AvGa1KRHguuwXFwtnPgiIZzbAxl-fv07YcX2HmxB_8.YdarRA3452l8FzMjTXMoMFNb1AMG6KXfaxNxMowXBgw&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiQjhSRlRoSHNtSWlVRkhxdDBiLXJaQSIsImF1ZCI6WyJiNWIzNWFmZS0yNTFiLTRlYjEtYmY1Zi0zMTk2MWYwMGFkMjEiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiIxZm51ZWJBMGFFQTFZNzJmYkxwTE9BIiwiZXhwIjoxNTI5NzU1MzY1LCJpYXQiOjE1Mjk3NTE3NjUsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjhkNWYzYTFkLTYwYzktNGMyMS05M2ZmLTU0MGRlNDg3ZjFiNCIsIm5vbmNlIjoiTXNNeGt2Z01BQ2wxWTNEMyIsInJhdCI6MTUyOTc1MTc2Mywic3ViIjoiZm9vQGJhci5jb20ifQ.OQ93rEnKfcFviEclbhFjoIlkXoc2MqN33Qz1X1wV62Ngs9zqSAdnL_R5zczVOtpOqAuu0xbP8kEo4dpH1P8719hnGVYF-suGu89wmNRipotFTUydhg6BxCeXQe-CsCw3lWyk9S0Hr0l2pubs1ih3CsibHjU5jlucXhVJ4x1QOWJX_ZKvDBF0hyZUp-UyerfyFFxbfOVQAgps2U_340D-nXz3xO_wzk4I6WuUpBwoxgIFRcj7vLTOCkjmM5YVGPPgkmPDkcUYb8wr_DipzzfNDU9iDuse5SXQStJF-4oKyHgFJmmheCAFbSHxG1lYIhYcGnzZtrFxIFimc_l4j4_oeLrsj_KYytJyseWVwYrPO45Q3-4IDVs8odUB4lE5_bYsn1zxfFZTkJMKk0syy3RGpH2zMxy4Xig8EzoiLh_-802wt5eHNPtGb1tnSJkHvz-DRT_Vw8j1XskqiiQ1U_bVBKzokIVKdtit9xSmS-8J23vGUjXIlne_c_w-zxT_Xybbpih95Efh9E2ZIlSUjrMPpVCP7FLXKWbKqib7drUOyFnb27PaFmNeD_7IIvrrQQG1AWddLrhr64Umbq03j8saMt6WPpysIm_lY4GvBR4ibZtDgXSdcPZrnhVLwhS-EAwl2tnU9_0tmQc7-xDQKYpprQg_YewireO5omquukTyw3o&scope=openid%20address&state=bveKxVsWeEnXp4eF&token_type=bearer
2.846 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiQjhSRlRoSHNtSWlVRkhxdDBiLXJaQSIsImF1ZCI6WyJiNWIzNWFmZS0yNTFiLTRlYjEtYmY1Zi0zMTk2MWYwMGFkMjEiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiIxZm51ZWJBMGFFQTFZNzJmYkxwTE9BIiwiZXhwIjoxNTI5NzU1MzY1LCJpYXQiOjE1Mjk3NTE3NjUsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjhkNWYzYTFkLTYwYzktNGMyMS05M2ZmLTU0MGRlNDg3ZjFiNCIsIm5vbmNlIjoiTXNNeGt2Z01BQ2wxWTNEMyIsInJhdCI6MTUyOTc1MTc2Mywic3ViIjoiZm9vQGJhci5jb20ifQ.OQ93rEnKfcFviEclbhFjoIlkXoc2MqN33Qz1X1wV62Ngs9zqSAdnL_R5zczVOtpOqAuu0xbP8kEo4dpH1P8719hnGVYF-suGu89wmNRipotFTUydhg6BxCeXQe-CsCw3lWyk9S0Hr0l2pubs1ih3CsibHjU5jlucXhVJ4x1QOWJX_ZKvDBF0hyZUp-UyerfyFFxbfOVQAgps2U_340D-nXz3xO_wzk4I6WuUpBwoxgIFRcj7vLTOCkjmM5YVGPPgkmPDkcUYb8wr_DipzzfNDU9iDuse5SXQStJF-4oKyHgFJmmheCAFbSHxG1lYIhYcGnzZtrFxIFimc_l4j4_oeLrsj_KYytJyseWVwYrPO45Q3-4IDVs8odUB4lE5_bYsn1zxfFZTkJMKk0syy3RGpH2zMxy4Xig8EzoiLh_-802wt5eHNPtGb1tnSJkHvz-DRT_Vw8j1XskqiiQ1U_bVBKzokIVKdtit9xSmS-8J23vGUjXIlne_c_w-zxT_Xybbpih95Efh9E2ZIlSUjrMPpVCP7FLXKWbKqib7drUOyFnb27PaFmNeD_7IIvrrQQG1AWddLrhr64Umbq03j8saMt6WPpysIm_lY4GvBR4ibZtDgXSdcPZrnhVLwhS-EAwl2tnU9_0tmQc7-xDQKYpprQg_YewireO5omquukTyw3o', 'scope': 'openid address', 'code': '9AvGa1KRHguuwXFwtnPgiIZzbAxl-fv07YcX2HmxB_8.YdarRA3452l8FzMjTXMoMFNb1AMG6KXfaxNxMowXBgw', 'access_token': 'weCW8usWoYePU6cAGQZsiPYc4pjViEWtaKza4MIH-4A.yd3ugRaDAFCNnZkxNu4jqyfp9i1V4xfGERBkzTNnmX4', 'state': 'bveKxVsWeEnXp4eF', 'expires_in': 3599, 'token_type': 'bearer'}
2.943 AuthorizationResponse {
"access_token": "weCW8usWoYePU6cAGQZsiPYc4pjViEWtaKza4MIH-4A.yd3ugRaDAFCNnZkxNu4jqyfp9i1V4xfGERBkzTNnmX4",
"code": "9AvGa1KRHguuwXFwtnPgiIZzbAxl-fv07YcX2HmxB_8.YdarRA3452l8FzMjTXMoMFNb1AMG6KXfaxNxMowXBgw",
"expires_in": 3599,
"id_token": {
"at_hash": "B8RFThHsmIiUFHqt0b-rZA",
"aud": [
"b5b35afe-251b-4eb1-bf5f-31961f00ad21"
],
"auth_time": 1529751698,
"c_hash": "1fnuebA0aEA1Y72fbLpLOA",
"exp": 1529755365,
"iat": 1529751765,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "8d5f3a1d-60c9-4c21-93ff-540de487f1b4",
"nonce": "MsMxkvgMACl1Y3D3",
"rat": 1529751763,
"sub": "[email protected]"
},
"scope": "openid address",
"state": "bveKxVsWeEnXp4eF",
"token_type": "bearer"
}
2.943 phase <--<-- 4 --- AccessToken -->-->
2.943 --> request op_args: {'state': 'bveKxVsWeEnXp4eF'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.943 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'bveKxVsWeEnXp4eF', 'code': '9AvGa1KRHguuwXFwtnPgiIZzbAxl-fv07YcX2HmxB_8.YdarRA3452l8FzMjTXMoMFNb1AMG6KXfaxNxMowXBgw', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'b5b35afe-251b-4eb1-bf5f-31961f00ad21'}, 'state': 'bveKxVsWeEnXp4eF'}
2.943 AccessTokenRequest {
"code": "9AvGa1KRHguuwXFwtnPgiIZzbAxl-fv07YcX2HmxB_8.YdarRA3452l8FzMjTXMoMFNb1AMG6KXfaxNxMowXBgw",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "bveKxVsWeEnXp4eF"
}
2.943 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.943 request_http_args {'headers': {'Authorization': 'Basic YjViMzVhZmUtMjUxYi00ZWIxLWJmNWYtMzE5NjFmMDBhZDIxOi5UTW8uQmJOYlRiag==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.943 request code=9AvGa1KRHguuwXFwtnPgiIZzbAxl-fv07YcX2HmxB_8.YdarRA3452l8FzMjTXMoMFNb1AMG6KXfaxNxMowXBgw&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=bveKxVsWeEnXp4eF
4.506 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
4.507 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiQjhSRlRoSHNtSWlVRkhxdDBiLXJaQSIsImF1ZCI6WyJiNWIzNWFmZS0yNTFiLTRlYjEtYmY1Zi0zMTk2MWYwMGFkMjEiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiIxZm51ZWJBMGFFQTFZNzJmYkxwTE9BIiwiZXhwIjoxNTI5NzU1MzY1LCJpYXQiOjE1Mjk3NTE3NjcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImFmZTNjNDY2LWNiZWItNDVlMi1iNWQ3LWU5ZDdkNmE2NTY3MCIsIm5vbmNlIjoiTXNNeGt2Z01BQ2wxWTNEMyIsInJhdCI6MTUyOTc1MTc2Mywic3ViIjoiZm9vQGJhci5jb20ifQ.PFn4WvJRgy8ryeCTrhHNYp8wN0cQUMmd4DIwHHsBVMhQ_iFsxefGVhIFdBBgT-VvVhie5osPkV_RRkJEfa843GKLSsXDgwsuffePUJn6FRGFE1r7UsU0QGXyH6AD3kcIrfaMALfzr4gnXY0xduUk7rOFpBtglEiKRWo2dBlD9mQL3Drh7g62gbMGXCou1reYft-sU5wRBCerQGfNkPcFBfeVgwZDSN3aXXfbdOjnoc2SwX_Fl5CDKLP8y_2K9i4ugeFFIMEUSxBRluRBcQV_Uk_NjHm11R_m5dlMXuaq1_8BCjLQ49xTF-uQsI8c3H7wKSwqUAn4UuuhD3iNo07vTffEhpwBwjEozq3PBxt2N9z3Hvuzk1kB2NTzATjHgHAvYg75xKA3HRBo6ZWciVniLT2oQPzzRd9H7Uagerdn-oduoqqqCrwsoLmPUikln8CJZV1qdBwgOLw5vVooL7IbpI3IGWIHnRr0alH7j6w2E7N7CUITJKdqRN4NKcnK0RYa1SxK8NtIeSR5QIwFoEXuuBZ1jGhyRImV8TebcZNV6AGuH_f7nu6uVSH3tx9I1caQscUryTzWJlvKV78ABRhBx0LBC8f_YSAy5e7dRSghRq5Xqx-Y4JgP3SU1ZyDZjqAnWJ83llaOiXH0BkV6C9uU0TEkUqC5vzFyxYUXdHMlWQI', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 's2sqRrU10eF85opaalhV0TUy06eODfVk6yvLQHqUrQc.Af0QkHznrgxGZIJRvZClDbn687NGaooPhAqiudSAt0g', 'scope': 'openid address'}
4.51 AccessTokenResponse {
"access_token": "s2sqRrU10eF85opaalhV0TUy06eODfVk6yvLQHqUrQc.Af0QkHznrgxGZIJRvZClDbn687NGaooPhAqiudSAt0g",
"expires_in": 3599,
"id_token": {
"at_hash": "B8RFThHsmIiUFHqt0b-rZA",
"aud": [
"b5b35afe-251b-4eb1-bf5f-31961f00ad21"
],
"auth_time": 1529751698,
"c_hash": "1fnuebA0aEA1Y72fbLpLOA",
"exp": 1529755365,
"iat": 1529751767,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "afe3c466-cbeb-45e2-b5d7-e9d7d6a65670",
"nonce": "MsMxkvgMACl1Y3D3",
"rat": 1529751763,
"sub": "[email protected]"
},
"scope": "openid address",
"token_type": "bearer"
}
4.511 phase <--<-- 5 --- UserInfo -->-->
4.511 do_user_info_request kwargs:{'state': 'bveKxVsWeEnXp4eF', 'method': 'GET', 'authn_method': 'bearer_header'}
4.511 request {'body': None}
4.511 request_url https://oidc-certification.ory.sh:8443/userinfo
4.511 request_http_args {'headers': {'Authorization': 'Bearer s2sqRrU10eF85opaalhV0TUy06eODfVk6yvLQHqUrQc.Af0QkHznrgxGZIJRvZClDbn687NGaooPhAqiudSAt0g'}}
4.582 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
4.583 OpenIDSchema {
"sub": "[email protected]"
}
4.583 OpenIDSchema {
"sub": "[email protected]"
}
4.583 phase <--<-- 6 --- Done -->-->
4.583 end
4.584 assertion CheckHTTPResponse
4.584 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
4.584 assertion VerifyResponse
4.584 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.585 assertion VerifyScopes
4.585 condition verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['address'] [Verifies that the claims corresponding to the requested scopes are returned]
4.585 condition Done: status=OK
============================================================
Conditions
Check support: status=WARNING, message=No support for: scopes_supported=['address']
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['address'] [Verifies that the claims corresponding to the requested scopes are returned]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
No support for: scopes_supported=['address']
The following claims were missing from the returned information: ['address']
./OP-Req-NotUnderstood.txt 0000644 0000000 0000000 00000023251 13313424354 015567 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-NotUnderstood
Test description: Request with extra query component
Timestamp: 2018-06-23T11:03:08Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.075 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.077 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.077 phase <--<-- 2 --- Registration -->-->
0.077 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.077 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#3O2BFqVn2AwQftWY"
],
"response_types": [
"code id_token token"
]
}
0.238 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.239 RegistrationResponse {
"client_id": "145a88ce-4d2d-443d-a82a-48c46954760e",
"client_secret": "_EccVFV6IsAX",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "145a88ce-4d2d-443d-a82a-48c46954760e",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#3O2BFqVn2AwQftWY"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.239 phase <--<-- 3 --- AsyncAuthn -->-->
0.24 AuthorizationRequest {
"client_id": "145a88ce-4d2d-443d-a82a-48c46954760e",
"extra": "foobar",
"nonce": "Wr7IPiMAFhTqefPA",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid",
"state": "xVAIDCTinvtj8jkZ"
}
0.24 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?extra=foobar&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=145a88ce-4d2d-443d-a82a-48c46954760e&state=xVAIDCTinvtj8jkZ&response_type=code+id_token+token&nonce=Wr7IPiMAFhTqefPA
0.24 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?extra=foobar&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=145a88ce-4d2d-443d-a82a-48c46954760e&state=xVAIDCTinvtj8jkZ&response_type=code+id_token+token&nonce=Wr7IPiMAFhTqefPA
3.64 http args {}
3.856 response URL with fragment
3.856 response access_token=Chz3SQaw01HknFjW5ImGPwW40DgawHzkR3onCr8sEl0.4_BgJqOVT73u5M31ycCwDfGcCj50qNXfNC2U8REbYEc&code=UMrv7ejRj55xnhZmK7JPqgp20XYBuE1KKhGXqQXbVjI.PSllBWy2Cdx9I2zQNij0SRudu4eTO8Djc_im_VDkhKk&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiNHZCWWtpSERuUnB2Tm1vZFlzWFh6dyIsImF1ZCI6WyIxNDVhODhjZS00ZDJkLTQ0M2QtYTgyYS00OGM0Njk1NDc2MGUiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiJQZlE0ODc0Y01aU0tFUzhtNjFlX0dnIiwiZXhwIjoxNTI5NzU1Mzg4LCJpYXQiOjE1Mjk3NTE3ODgsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjM0OGM5ZTU1LTQ0M2UtNDFmYy1iM2U2LTliNDE2OGE4MjI1OCIsIm5vbmNlIjoiV3I3SVBpTUFGaFRxZWZQQSIsInJhdCI6MTUyOTc1MTc4NSwic3ViIjoiZm9vQGJhci5jb20ifQ.W9fk57885WiXe6VPYkAgIF2FdPYWwsaIc5UDYSQZeRo-FCsR3Ayy3g_UsTVbrDVcLkcz4ZCR2ixABCZwXe9Fafp7n2fmtJI4K13HFXQ9DapHNxOpBHhXHjqbAfBOLe6DfWNPueHtzqAyaSmOLM9uLYEYI9flYWZV22CpC3Gisl39Pxt6qstrEIPuK-tJ9hkUSYFZRuK18_1RpsIrJBHmP9Dd8RecPokzMY9MGWLrqhN0hF_7kSmX5gmvG3kC4FEbV69okzlPYHzqD1vCrA87naFvmX6914PCrJ2IfXoiqGoWr1_-WaNIbtxpJrK8-XDaESOzRVuAIUEK3XgURJBMuah44n0UxyE9XVdxbRiEVpYSnHQ-_p8DWdKsvLAEfwVdv0t0oQjRNe3F_GiEPQLkt4a2mfZ-N0iTSuG4r0dNpZzTHUcZcvgizJSVY2rydgXvAL36ttxUAquRy5ggzOpGggF-kHdW_6rqxtkEN-9LLoDwVi1N3TkBe64zc_qnSlsUFyHaM2k6XCuTwwJwmlNRG7yBV8pyhGcVFTw-cUbP2_3VhytJB-XCtxs98z_Ml7W1rXJnlckQpTRSuOGpxYM4j64T92ZWzDuIZEMEeCWYzOrTQxfkgzp7GcVhkWL0B9iRjBV29f0EdexTzCYCPNLhap5Wd2KqjCkqFkmsdCRFEvU&scope=openid&state=xVAIDCTinvtj8jkZ&token_type=bearer
3.857 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiNHZCWWtpSERuUnB2Tm1vZFlzWFh6dyIsImF1ZCI6WyIxNDVhODhjZS00ZDJkLTQ0M2QtYTgyYS00OGM0Njk1NDc2MGUiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiJQZlE0ODc0Y01aU0tFUzhtNjFlX0dnIiwiZXhwIjoxNTI5NzU1Mzg4LCJpYXQiOjE1Mjk3NTE3ODgsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjM0OGM5ZTU1LTQ0M2UtNDFmYy1iM2U2LTliNDE2OGE4MjI1OCIsIm5vbmNlIjoiV3I3SVBpTUFGaFRxZWZQQSIsInJhdCI6MTUyOTc1MTc4NSwic3ViIjoiZm9vQGJhci5jb20ifQ.W9fk57885WiXe6VPYkAgIF2FdPYWwsaIc5UDYSQZeRo-FCsR3Ayy3g_UsTVbrDVcLkcz4ZCR2ixABCZwXe9Fafp7n2fmtJI4K13HFXQ9DapHNxOpBHhXHjqbAfBOLe6DfWNPueHtzqAyaSmOLM9uLYEYI9flYWZV22CpC3Gisl39Pxt6qstrEIPuK-tJ9hkUSYFZRuK18_1RpsIrJBHmP9Dd8RecPokzMY9MGWLrqhN0hF_7kSmX5gmvG3kC4FEbV69okzlPYHzqD1vCrA87naFvmX6914PCrJ2IfXoiqGoWr1_-WaNIbtxpJrK8-XDaESOzRVuAIUEK3XgURJBMuah44n0UxyE9XVdxbRiEVpYSnHQ-_p8DWdKsvLAEfwVdv0t0oQjRNe3F_GiEPQLkt4a2mfZ-N0iTSuG4r0dNpZzTHUcZcvgizJSVY2rydgXvAL36ttxUAquRy5ggzOpGggF-kHdW_6rqxtkEN-9LLoDwVi1N3TkBe64zc_qnSlsUFyHaM2k6XCuTwwJwmlNRG7yBV8pyhGcVFTw-cUbP2_3VhytJB-XCtxs98z_Ml7W1rXJnlckQpTRSuOGpxYM4j64T92ZWzDuIZEMEeCWYzOrTQxfkgzp7GcVhkWL0B9iRjBV29f0EdexTzCYCPNLhap5Wd2KqjCkqFkmsdCRFEvU', 'scope': 'openid', 'code': 'UMrv7ejRj55xnhZmK7JPqgp20XYBuE1KKhGXqQXbVjI.PSllBWy2Cdx9I2zQNij0SRudu4eTO8Djc_im_VDkhKk', 'access_token': 'Chz3SQaw01HknFjW5ImGPwW40DgawHzkR3onCr8sEl0.4_BgJqOVT73u5M31ycCwDfGcCj50qNXfNC2U8REbYEc', 'state': 'xVAIDCTinvtj8jkZ', 'expires_in': 3599, 'token_type': 'bearer'}
3.936 AuthorizationResponse {
"access_token": "Chz3SQaw01HknFjW5ImGPwW40DgawHzkR3onCr8sEl0.4_BgJqOVT73u5M31ycCwDfGcCj50qNXfNC2U8REbYEc",
"code": "UMrv7ejRj55xnhZmK7JPqgp20XYBuE1KKhGXqQXbVjI.PSllBWy2Cdx9I2zQNij0SRudu4eTO8Djc_im_VDkhKk",
"expires_in": 3599,
"id_token": {
"at_hash": "4vBYkiHDnRpvNmodYsXXzw",
"aud": [
"145a88ce-4d2d-443d-a82a-48c46954760e"
],
"auth_time": 1529751698,
"c_hash": "PfQ4874cMZSKES8m61e_Gg",
"exp": 1529755388,
"iat": 1529751788,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "348c9e55-443e-41fc-b3e6-9b4168a82258",
"nonce": "Wr7IPiMAFhTqefPA",
"rat": 1529751785,
"sub": "[email protected]"
},
"scope": "openid",
"state": "xVAIDCTinvtj8jkZ",
"token_type": "bearer"
}
3.936 phase <--<-- 4 --- Done -->-->
3.936 end
3.937 assertion VerifyAuthnResponse
3.937 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
3.937 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-scope-email.txt 0000644 0000000 0000000 00000035452 13313424334 014435 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-scope-email
Test description: Scope requesting email claims
Timestamp: 2018-06-23T11:02:52Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.12 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.121 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.121 phase <--<-- 2 --- Registration -->-->
0.121 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.121 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#l4lgkwnYL1hUJgYi"
],
"response_types": [
"code id_token token"
]
}
0.28 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.281 RegistrationResponse {
"client_id": "c512b082-7399-42e8-b664-9bf8311c598f",
"client_secret": "6aqrNrVe-P-9",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "c512b082-7399-42e8-b664-9bf8311c598f",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#l4lgkwnYL1hUJgYi"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.281 phase <--<-- 3 --- AsyncAuthn -->-->
0.282 condition Check support: status=WARNING, message=No support for: scopes_supported=['email']
0.282 AuthorizationRequest {
"client_id": "c512b082-7399-42e8-b664-9bf8311c598f",
"nonce": "CrRd4J0Khphpq2lU",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid email",
"state": "kd0Xe4qTCYASLos8"
}
0.282 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+email&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=c512b082-7399-42e8-b664-9bf8311c598f&state=kd0Xe4qTCYASLos8&response_type=code+id_token+token&nonce=CrRd4J0Khphpq2lU
0.282 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+email&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=c512b082-7399-42e8-b664-9bf8311c598f&state=kd0Xe4qTCYASLos8&response_type=code+id_token+token&nonce=CrRd4J0Khphpq2lU
3.106 http args {}
3.307 response URL with fragment
3.308 response access_token=dIqTVmzQptfX-bbDweGMcekuyTbCfBbgck_UZBiCMNI.uuUi58K-MhtiBvQh36S66uee_R8OREDcac6N-dc8nl4&code=4xaPgV2UVXKBYLQn5EefDnbsLsdLMR4Zv7dB2f371hQ.331C8ZMnOQErAp7dg0jH07bu34YUP5nTUskekIzqy8w&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiY2RoOWZOVlVXUnB1VExwNWtzSGpEZyIsImF1ZCI6WyJjNTEyYjA4Mi03Mzk5LTQyZTgtYjY2NC05YmY4MzExYzU5OGYiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiJieE9iYlRmQ3lUT3YtTUZab0tYUUxnIiwiZXhwIjoxNTI5NzU1MzcxLCJpYXQiOjE1Mjk3NTE3NzEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjU5MWJhNTU5LTgwNGQtNDRhNC05ODJjLTlkYmQ4NTgwMmFiYSIsIm5vbmNlIjoiQ3JSZDRKMEtocGhwcTJsVSIsInJhdCI6MTUyOTc1MTc2OSwic3ViIjoiZm9vQGJhci5jb20ifQ.JLOOMgHamEGYIALz792rrpA6TCAP3kuJtWkxre9RflUbuEEnQNdZ9ykKQG7fWTgYSihnYzQajjXXf-ZlPQLqfQ7_xmX99C4CgPCS9lAk9bWOO9WHYwzkt1xJdWY3xVGlQ-j5YhX3PpvyxKHRMqypEKMfiX8HLQ8qGrE0b76vPk9Hi0NQ-Kg1Lq-yWGJCioz2jbChuqb8b2Ru-cZwHRCkSmStfZbw0c5Tcsvlz9vUl9pPUNcrzSnHDbx2TSmHBcItQa8WtTS5sBzI5T0Yzx0EJeOQDZaWRU4QL4Nk5gBMm4-4odR4pVlWfRpbd05SBUVMJJTq5FipYtaNMsiDuvloGWsrrKkIIad1CX1YOvDBiKjmMRmnbUproLpgtIwJSKjrWXgIQ322ffMwq8rbYYhX0RmG4ASV6D1knu0vCAsy46xz-kez_WdE_atunwthLDLoGo0DNPzG9-yF6rbsWZfbYPZS90eLaQogaCgOl0fD3-3nz0gWgPF7cT_x8y9YF5nSGNWCXH8GzafyZmYd4NGeTaB9i6XvJ5DMUfQ42hDobaa_54uvUhyFATAfwAq15tTI2k_Qfaz2h9csc85QNmban2DEWwj6CZG-0fHhzxDh_64ccFzle1oAYZKHRJzLXtk_U_kBIQwZfj2GdX_O872sQ8kIVsYMgU_jCsRohKh73Tg&scope=openid%20email&state=kd0Xe4qTCYASLos8&token_type=bearer
3.308 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiY2RoOWZOVlVXUnB1VExwNWtzSGpEZyIsImF1ZCI6WyJjNTEyYjA4Mi03Mzk5LTQyZTgtYjY2NC05YmY4MzExYzU5OGYiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiJieE9iYlRmQ3lUT3YtTUZab0tYUUxnIiwiZXhwIjoxNTI5NzU1MzcxLCJpYXQiOjE1Mjk3NTE3NzEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjU5MWJhNTU5LTgwNGQtNDRhNC05ODJjLTlkYmQ4NTgwMmFiYSIsIm5vbmNlIjoiQ3JSZDRKMEtocGhwcTJsVSIsInJhdCI6MTUyOTc1MTc2OSwic3ViIjoiZm9vQGJhci5jb20ifQ.JLOOMgHamEGYIALz792rrpA6TCAP3kuJtWkxre9RflUbuEEnQNdZ9ykKQG7fWTgYSihnYzQajjXXf-ZlPQLqfQ7_xmX99C4CgPCS9lAk9bWOO9WHYwzkt1xJdWY3xVGlQ-j5YhX3PpvyxKHRMqypEKMfiX8HLQ8qGrE0b76vPk9Hi0NQ-Kg1Lq-yWGJCioz2jbChuqb8b2Ru-cZwHRCkSmStfZbw0c5Tcsvlz9vUl9pPUNcrzSnHDbx2TSmHBcItQa8WtTS5sBzI5T0Yzx0EJeOQDZaWRU4QL4Nk5gBMm4-4odR4pVlWfRpbd05SBUVMJJTq5FipYtaNMsiDuvloGWsrrKkIIad1CX1YOvDBiKjmMRmnbUproLpgtIwJSKjrWXgIQ322ffMwq8rbYYhX0RmG4ASV6D1knu0vCAsy46xz-kez_WdE_atunwthLDLoGo0DNPzG9-yF6rbsWZfbYPZS90eLaQogaCgOl0fD3-3nz0gWgPF7cT_x8y9YF5nSGNWCXH8GzafyZmYd4NGeTaB9i6XvJ5DMUfQ42hDobaa_54uvUhyFATAfwAq15tTI2k_Qfaz2h9csc85QNmban2DEWwj6CZG-0fHhzxDh_64ccFzle1oAYZKHRJzLXtk_U_kBIQwZfj2GdX_O872sQ8kIVsYMgU_jCsRohKh73Tg', 'scope': 'openid email', 'code': '4xaPgV2UVXKBYLQn5EefDnbsLsdLMR4Zv7dB2f371hQ.331C8ZMnOQErAp7dg0jH07bu34YUP5nTUskekIzqy8w', 'access_token': 'dIqTVmzQptfX-bbDweGMcekuyTbCfBbgck_UZBiCMNI.uuUi58K-MhtiBvQh36S66uee_R8OREDcac6N-dc8nl4', 'state': 'kd0Xe4qTCYASLos8', 'expires_in': 3599, 'token_type': 'bearer'}
3.388 AuthorizationResponse {
"access_token": "dIqTVmzQptfX-bbDweGMcekuyTbCfBbgck_UZBiCMNI.uuUi58K-MhtiBvQh36S66uee_R8OREDcac6N-dc8nl4",
"code": "4xaPgV2UVXKBYLQn5EefDnbsLsdLMR4Zv7dB2f371hQ.331C8ZMnOQErAp7dg0jH07bu34YUP5nTUskekIzqy8w",
"expires_in": 3599,
"id_token": {
"at_hash": "cdh9fNVUWRpuTLp5ksHjDg",
"aud": [
"c512b082-7399-42e8-b664-9bf8311c598f"
],
"auth_time": 1529751698,
"c_hash": "bxObbTfCyTOv-MFZoKXQLg",
"exp": 1529755371,
"iat": 1529751771,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "591ba559-804d-44a4-982c-9dbd85802aba",
"nonce": "CrRd4J0Khphpq2lU",
"rat": 1529751769,
"sub": "[email protected]"
},
"scope": "openid email",
"state": "kd0Xe4qTCYASLos8",
"token_type": "bearer"
}
3.388 phase <--<-- 4 --- AccessToken -->-->
3.388 --> request op_args: {'state': 'kd0Xe4qTCYASLos8'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.388 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'kd0Xe4qTCYASLos8', 'code': '4xaPgV2UVXKBYLQn5EefDnbsLsdLMR4Zv7dB2f371hQ.331C8ZMnOQErAp7dg0jH07bu34YUP5nTUskekIzqy8w', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'c512b082-7399-42e8-b664-9bf8311c598f'}, 'state': 'kd0Xe4qTCYASLos8'}
3.388 AccessTokenRequest {
"code": "4xaPgV2UVXKBYLQn5EefDnbsLsdLMR4Zv7dB2f371hQ.331C8ZMnOQErAp7dg0jH07bu34YUP5nTUskekIzqy8w",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "kd0Xe4qTCYASLos8"
}
3.388 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.388 request_http_args {'headers': {'Authorization': 'Basic YzUxMmIwODItNzM5OS00MmU4LWI2NjQtOWJmODMxMWM1OThmOjZhcXJOclZlLVAtOQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
3.388 request code=4xaPgV2UVXKBYLQn5EefDnbsLsdLMR4Zv7dB2f371hQ.331C8ZMnOQErAp7dg0jH07bu34YUP5nTUskekIzqy8w&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=kd0Xe4qTCYASLos8
3.608 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.609 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiY2RoOWZOVlVXUnB1VExwNWtzSGpEZyIsImF1ZCI6WyJjNTEyYjA4Mi03Mzk5LTQyZTgtYjY2NC05YmY4MzExYzU5OGYiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiJieE9iYlRmQ3lUT3YtTUZab0tYUUxnIiwiZXhwIjoxNTI5NzU1MzcxLCJpYXQiOjE1Mjk3NTE3NzIsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjQyNjA5MWYzLWM2NjktNDlmNS1hNDUwLWEwODU2NGE2Njg1NCIsIm5vbmNlIjoiQ3JSZDRKMEtocGhwcTJsVSIsInJhdCI6MTUyOTc1MTc2OSwic3ViIjoiZm9vQGJhci5jb20ifQ.YU-JSIsEuyMIEX5iauMxvmF5o0M7h-s_tQcIECOjcgytsLTkOY54Us3tzL9jN02-GTK9LIXbhIlupgxU_y0tAs95RyIkBv0XeYA7y30u3tpwc4FOk4JpUevhzAo9LtzyfdrrJLmHqWfhde3d6c4S1uQYAWLXmOgGBJ001jwVd8oreeeW7K17QWROLWfqpGJuMIdJ4pXLjnX2Mc52CuPbns1BWH-DM04Lv4KPggtse4y6JTKJbdetYhrDYkEZyJeHbdxofxwAYvktO14gk5I7Hutz99VPWjTBHBu66MlAviqscAgiKvHNTfA37qqgyXvZx9p712i1QZU9kobs9PZfUqLD_TsfXoZ8Tih6An3jJptRtWSzGFSi1xLorSjbZ0dlKvIcBkwQrepQ3eP6kiqnrM6vpa4JLdT8vTj7p_zEELJzSizvZFUYGGg46-ENMZ9IGDONwMkKvdDHjHX2ozxP3s9hjPPOWJ8Od3QD9NEYebC2CPHW9Mjs9HlyVCwUtwifG0zL79FnnCV7Ak7lqI82vWCobHCNSuIlDFzfq7522sK6uO9N3Jz9Vqon8r4jiPoWT1s0b_Fy1nXXgrZuASrqiTmOEc8DHrR4yC0es0oDk0pFz_HJ6xCExLLgz_A5E2zneiGKZH7Q6UjK4mv_rnnbnTje8r4Zvgo6c_R11wNSgMk', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'Xmrj_ha_h2CYJv-NSV6l_ASyIuMupNexDorkk-TyHFQ.5IUegmUS_lxTrqc_T-XC3n9exhHAjbcyBfmjqqLInaw', 'scope': 'openid email'}
3.613 AccessTokenResponse {
"access_token": "Xmrj_ha_h2CYJv-NSV6l_ASyIuMupNexDorkk-TyHFQ.5IUegmUS_lxTrqc_T-XC3n9exhHAjbcyBfmjqqLInaw",
"expires_in": 3599,
"id_token": {
"at_hash": "cdh9fNVUWRpuTLp5ksHjDg",
"aud": [
"c512b082-7399-42e8-b664-9bf8311c598f"
],
"auth_time": 1529751698,
"c_hash": "bxObbTfCyTOv-MFZoKXQLg",
"exp": 1529755371,
"iat": 1529751772,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "426091f3-c669-49f5-a450-a08564a66854",
"nonce": "CrRd4J0Khphpq2lU",
"rat": 1529751769,
"sub": "[email protected]"
},
"scope": "openid email",
"token_type": "bearer"
}
3.613 phase <--<-- 5 --- UserInfo -->-->
3.613 do_user_info_request kwargs:{'state': 'kd0Xe4qTCYASLos8', 'method': 'GET', 'authn_method': 'bearer_header'}
3.613 request {'body': None}
3.613 request_url https://oidc-certification.ory.sh:8443/userinfo
3.613 request_http_args {'headers': {'Authorization': 'Bearer Xmrj_ha_h2CYJv-NSV6l_ASyIuMupNexDorkk-TyHFQ.5IUegmUS_lxTrqc_T-XC3n9exhHAjbcyBfmjqqLInaw'}}
3.684 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
3.684 OpenIDSchema {
"sub": "[email protected]"
}
3.684 OpenIDSchema {
"sub": "[email protected]"
}
3.684 phase <--<-- 6 --- Done -->-->
3.684 end
3.685 assertion CheckHTTPResponse
3.685 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
3.685 assertion VerifyResponse
3.686 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.686 assertion VerifyScopes
3.686 condition verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['email', 'email_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
3.686 condition Done: status=OK
============================================================
Conditions
Check support: status=WARNING, message=No support for: scopes_supported=['email']
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['email', 'email_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
No support for: scopes_supported=['email']
The following claims were missing from the returned information: ['email', 'email_verified']
./OP-scope-phone.txt 0000644 0000000 0000000 00000035526 13313424342 014460 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-scope-phone
Test description: Scope requesting phone claims
Timestamp: 2018-06-23T11:02:58Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.075 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.076 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.076 phase <--<-- 2 --- Registration -->-->
0.076 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.077 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#gT8hpARXDDspch9Q"
],
"response_types": [
"code id_token token"
]
}
0.232 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.232 RegistrationResponse {
"client_id": "d3930e5f-2c52-4d41-a3c0-de3e9375d99b",
"client_secret": "LPhGVl9~1BQ4",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "d3930e5f-2c52-4d41-a3c0-de3e9375d99b",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#gT8hpARXDDspch9Q"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.233 phase <--<-- 3 --- AsyncAuthn -->-->
0.233 condition Check support: status=WARNING, message=No support for: scopes_supported=['phone']
0.233 AuthorizationRequest {
"client_id": "d3930e5f-2c52-4d41-a3c0-de3e9375d99b",
"nonce": "zZ9sCt2ho5HuU4v6",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid phone",
"state": "mpA13oFKnroo8Ulq"
}
0.233 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+phone&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=d3930e5f-2c52-4d41-a3c0-de3e9375d99b&state=mpA13oFKnroo8Ulq&response_type=code+id_token+token&nonce=zZ9sCt2ho5HuU4v6
0.233 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+phone&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=d3930e5f-2c52-4d41-a3c0-de3e9375d99b&state=mpA13oFKnroo8Ulq&response_type=code+id_token+token&nonce=zZ9sCt2ho5HuU4v6
3.645 http args {}
3.818 response URL with fragment
3.819 response access_token=PBygq0of4EreBUGFmbZmbIBpqgAWRnFET_m_k-BEhzs.9j3JKGdvsUI649N_sBzVvRWF2NNz0XeKMvLg41I0HR0&code=Pc_5zYBcnrRQRxIkpEmp0aiJHyXbhKrNgDy9FyDtaio.7y1j2rxgel-nnB0zYEVwQdS-pVwQ4ulBd0emIlDnVt4&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiWUpvVFJ4eWVZN3psQnYyc2dKQVY2QSIsImF1ZCI6WyJkMzkzMGU1Zi0yYzUyLTRkNDEtYTNjMC1kZTNlOTM3NWQ5OWIiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiJzM2NRZ0xqWE9TVE1PY0J4cG1uYldnIiwiZXhwIjoxNTI5NzU1Mzc3LCJpYXQiOjE1Mjk3NTE3NzcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImE5ZTQ1MjdlLTA2ODMtNGFjMS1hYTgyLWMxNDU1NmI1NmIxNSIsIm5vbmNlIjoielo5c0N0MmhvNUh1VTR2NiIsInJhdCI6MTUyOTc1MTc3NCwic3ViIjoiZm9vQGJhci5jb20ifQ.jXmjguyBI7fACT3KauxibG9H5ICT9AsgDqXju3g-e6SgopFHouHt59DB1vrSs2v7xnhxI_dHz-okjeuSZiQ_EabzJg16tl0P-fhXTW2fQf5uFD2wge7bNzvwug-QmKlGWNZcnbHlmGIQvum_MN0GMq8K3Rfa2S_KxyGkgv2-uolVZIT9TMLAxB3qG_r5QHxSNrwfeuEg4C6bQundfHBwh4-BlnTwu0Fd3BLa0IpbII06GiucGT7KxKHSFqbVnzLZW2FMAJ2ZLF3wRfkaAO5x9kC6ia5gGkLPzydpr8OiwTTH7tn_nOLYCrciU1c2NTlGZV5JrG9sdcK5AnlxIwXzt-eslOHDXEvvwjGRvNblD2vAcbTLFD_m42itZYJrr_8YJTgBqYaVtHIHZSwciMp2j-JzT7Vx8Z6_n4jqSOEgnVWHMkz7bCs1ASzkVsLM2A5m2yOeHeMop1zczBBhin9kTTjkWAXKGERYAbE-0qOlgCSyv5vsU0y4ARu7HuZWBn2N6_v8pxOsGR_xxQ4dcP0yxXLxb6VhiwhV53HDFEemi103Ub2y1EabUnKgoO44ldm7oz8wfVeg1RGjpdhHBkUKKpP1Taj1DVMIyMolk48uoU0oPDoJ1gOL-m0SzalVCyiNyRBm9PINiZMa784-EqFPyIt2hq7LnOrSIJdu2TDMBZQ&scope=openid%20phone&state=mpA13oFKnroo8Ulq&token_type=bearer
3.819 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiWUpvVFJ4eWVZN3psQnYyc2dKQVY2QSIsImF1ZCI6WyJkMzkzMGU1Zi0yYzUyLTRkNDEtYTNjMC1kZTNlOTM3NWQ5OWIiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiJzM2NRZ0xqWE9TVE1PY0J4cG1uYldnIiwiZXhwIjoxNTI5NzU1Mzc3LCJpYXQiOjE1Mjk3NTE3NzcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImE5ZTQ1MjdlLTA2ODMtNGFjMS1hYTgyLWMxNDU1NmI1NmIxNSIsIm5vbmNlIjoielo5c0N0MmhvNUh1VTR2NiIsInJhdCI6MTUyOTc1MTc3NCwic3ViIjoiZm9vQGJhci5jb20ifQ.jXmjguyBI7fACT3KauxibG9H5ICT9AsgDqXju3g-e6SgopFHouHt59DB1vrSs2v7xnhxI_dHz-okjeuSZiQ_EabzJg16tl0P-fhXTW2fQf5uFD2wge7bNzvwug-QmKlGWNZcnbHlmGIQvum_MN0GMq8K3Rfa2S_KxyGkgv2-uolVZIT9TMLAxB3qG_r5QHxSNrwfeuEg4C6bQundfHBwh4-BlnTwu0Fd3BLa0IpbII06GiucGT7KxKHSFqbVnzLZW2FMAJ2ZLF3wRfkaAO5x9kC6ia5gGkLPzydpr8OiwTTH7tn_nOLYCrciU1c2NTlGZV5JrG9sdcK5AnlxIwXzt-eslOHDXEvvwjGRvNblD2vAcbTLFD_m42itZYJrr_8YJTgBqYaVtHIHZSwciMp2j-JzT7Vx8Z6_n4jqSOEgnVWHMkz7bCs1ASzkVsLM2A5m2yOeHeMop1zczBBhin9kTTjkWAXKGERYAbE-0qOlgCSyv5vsU0y4ARu7HuZWBn2N6_v8pxOsGR_xxQ4dcP0yxXLxb6VhiwhV53HDFEemi103Ub2y1EabUnKgoO44ldm7oz8wfVeg1RGjpdhHBkUKKpP1Taj1DVMIyMolk48uoU0oPDoJ1gOL-m0SzalVCyiNyRBm9PINiZMa784-EqFPyIt2hq7LnOrSIJdu2TDMBZQ', 'scope': 'openid phone', 'code': 'Pc_5zYBcnrRQRxIkpEmp0aiJHyXbhKrNgDy9FyDtaio.7y1j2rxgel-nnB0zYEVwQdS-pVwQ4ulBd0emIlDnVt4', 'access_token': 'PBygq0of4EreBUGFmbZmbIBpqgAWRnFET_m_k-BEhzs.9j3JKGdvsUI649N_sBzVvRWF2NNz0XeKMvLg41I0HR0', 'state': 'mpA13oFKnroo8Ulq', 'expires_in': 3599, 'token_type': 'bearer'}
3.898 AuthorizationResponse {
"access_token": "PBygq0of4EreBUGFmbZmbIBpqgAWRnFET_m_k-BEhzs.9j3JKGdvsUI649N_sBzVvRWF2NNz0XeKMvLg41I0HR0",
"code": "Pc_5zYBcnrRQRxIkpEmp0aiJHyXbhKrNgDy9FyDtaio.7y1j2rxgel-nnB0zYEVwQdS-pVwQ4ulBd0emIlDnVt4",
"expires_in": 3599,
"id_token": {
"at_hash": "YJoTRxyeY7zlBv2sgJAV6A",
"aud": [
"d3930e5f-2c52-4d41-a3c0-de3e9375d99b"
],
"auth_time": 1529751698,
"c_hash": "s3cQgLjXOSTMOcBxpmnbWg",
"exp": 1529755377,
"iat": 1529751777,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "a9e4527e-0683-4ac1-aa82-c14556b56b15",
"nonce": "zZ9sCt2ho5HuU4v6",
"rat": 1529751774,
"sub": "[email protected]"
},
"scope": "openid phone",
"state": "mpA13oFKnroo8Ulq",
"token_type": "bearer"
}
3.898 phase <--<-- 4 --- AccessToken -->-->
3.898 --> request op_args: {'state': 'mpA13oFKnroo8Ulq'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.898 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'mpA13oFKnroo8Ulq', 'code': 'Pc_5zYBcnrRQRxIkpEmp0aiJHyXbhKrNgDy9FyDtaio.7y1j2rxgel-nnB0zYEVwQdS-pVwQ4ulBd0emIlDnVt4', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'd3930e5f-2c52-4d41-a3c0-de3e9375d99b'}, 'state': 'mpA13oFKnroo8Ulq'}
3.898 AccessTokenRequest {
"code": "Pc_5zYBcnrRQRxIkpEmp0aiJHyXbhKrNgDy9FyDtaio.7y1j2rxgel-nnB0zYEVwQdS-pVwQ4ulBd0emIlDnVt4",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "mpA13oFKnroo8Ulq"
}
3.898 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.898 request_http_args {'headers': {'Authorization': 'Basic ZDM5MzBlNWYtMmM1Mi00ZDQxLWEzYzAtZGUzZTkzNzVkOTliOkxQaEdWbDklN0UxQlE0', 'Content-Type': 'application/x-www-form-urlencoded'}}
3.898 request code=Pc_5zYBcnrRQRxIkpEmp0aiJHyXbhKrNgDy9FyDtaio.7y1j2rxgel-nnB0zYEVwQdS-pVwQ4ulBd0emIlDnVt4&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=mpA13oFKnroo8Ulq
4.108 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
4.109 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiWUpvVFJ4eWVZN3psQnYyc2dKQVY2QSIsImF1ZCI6WyJkMzkzMGU1Zi0yYzUyLTRkNDEtYTNjMC1kZTNlOTM3NWQ5OWIiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiJzM2NRZ0xqWE9TVE1PY0J4cG1uYldnIiwiZXhwIjoxNTI5NzU1Mzc3LCJpYXQiOjE1Mjk3NTE3NzgsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImI2YjRkMWMxLWMwMjQtNDkzMi05YmM5LWU3MzAzNDJkNTY5NyIsIm5vbmNlIjoielo5c0N0MmhvNUh1VTR2NiIsInJhdCI6MTUyOTc1MTc3NCwic3ViIjoiZm9vQGJhci5jb20ifQ.JgiaL7_Avw8f5qIQKS46Zvb8mVjq8VqN6ARnC9zAK3TZ31XQzd7rtihUgpROrTmnHTHS6K6EJ1-fA5M-lFIFDfW4yJTji87BU0ti_mKdqZe3LFF3PqTe4G8tH-ClVmJ3X6J5jfRH03oAesuiNlCeVJBdiwD6JYgTa7MAQHn9BWg7c-5MZ6vNn68XqZkQBN7ad95JCmWXtwk2zA4bgImLEKrOV7TYKRC01VPGq3WDrB-AZK2zjqU9thFLI3LFiXJRRy9W4mTjHqDl3HpsWONvSPyNussX9wlOHzptNDI2sH_EpQqc5b_Pdtr84ZhL4PsJ7G_tao-VFetU5GpDt39JvsCI-1qfn0rMkfyWxWs0riwHXMksVbgdxcQ_aQ4muF5BA_q7u0vmmn1oIZ2xK1Qb9CnMDAA5mfsb4DL2yq9U7HDX4jRMAzEZ5TXOttKe8KP3VqRnyNgs8hIQNMrDKHiq0d_4WY-lceXbVwjpKZHmdj7c7a01xNR99LBhmvoF-xf4r-PDf-WNw2Yh57L2xugfRNEzapf_Y3m_2cz_1Fr_4qB7lh5yTlEH4JW1HjEw2g7e02Y3XRNYit8cJEil4h0A8G_tL96uYMvCowYupOekuP5AnLuG1kJjucfakiQBGkwqvZISOehs6CDlPOuzUGHT841VP1qqnq6hPjeNnffm5JA', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': '3Lg1Yyi3zGlf9Fy0iQXcWRKPGI5wepMEHZr--RWs2rA.c8kE6HyHJUCLW3Q-HVpQbocOW6vybD6ae343xlR0xgQ', 'scope': 'openid phone'}
4.112 AccessTokenResponse {
"access_token": "3Lg1Yyi3zGlf9Fy0iQXcWRKPGI5wepMEHZr--RWs2rA.c8kE6HyHJUCLW3Q-HVpQbocOW6vybD6ae343xlR0xgQ",
"expires_in": 3599,
"id_token": {
"at_hash": "YJoTRxyeY7zlBv2sgJAV6A",
"aud": [
"d3930e5f-2c52-4d41-a3c0-de3e9375d99b"
],
"auth_time": 1529751698,
"c_hash": "s3cQgLjXOSTMOcBxpmnbWg",
"exp": 1529755377,
"iat": 1529751778,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "b6b4d1c1-c024-4932-9bc9-e730342d5697",
"nonce": "zZ9sCt2ho5HuU4v6",
"rat": 1529751774,
"sub": "[email protected]"
},
"scope": "openid phone",
"token_type": "bearer"
}
4.113 phase <--<-- 5 --- UserInfo -->-->
4.113 do_user_info_request kwargs:{'state': 'mpA13oFKnroo8Ulq', 'method': 'GET', 'authn_method': 'bearer_header'}
4.113 request {'body': None}
4.113 request_url https://oidc-certification.ory.sh:8443/userinfo
4.113 request_http_args {'headers': {'Authorization': 'Bearer 3Lg1Yyi3zGlf9Fy0iQXcWRKPGI5wepMEHZr--RWs2rA.c8kE6HyHJUCLW3Q-HVpQbocOW6vybD6ae343xlR0xgQ'}}
4.185 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
4.185 OpenIDSchema {
"sub": "[email protected]"
}
4.185 OpenIDSchema {
"sub": "[email protected]"
}
4.185 phase <--<-- 6 --- Done -->-->
4.185 end
4.186 assertion CheckHTTPResponse
4.186 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
4.186 assertion VerifyResponse
4.186 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.187 assertion VerifyScopes
4.187 condition verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['phone_number', 'phone_number_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
4.187 condition Done: status=OK
============================================================
Conditions
Check support: status=WARNING, message=No support for: scopes_supported=['phone']
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['phone_number', 'phone_number_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
No support for: scopes_supported=['phone']
The following claims were missing from the returned information: ['phone_number', 'phone_number_verified']
./OP-Discovery-jwks_uri.txt 0000644 0000000 0000000 00000017757 13313424013 016043 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Discovery-jwks_uri
Test description: Verify that jwks_uri is published
Timestamp: 2018-06-23T10:59:23Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.105 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.107 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.107 phase <--<-- 2 --- Done -->-->
0.107 end
0.107 assertion CheckHTTPResponse
0.107 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.108 assertion BareKeys
0.172 http response url:https://oidc-certification.ory.sh:8443/.well-known/jwks.json status_code:200
0.172 jwks {'keys': [{'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': '1Kpv-wv6THhBggBy2793qierg_NDRod7pAT__caxzRd6OF9FmHgzklU2d03RqHris7y0freA7RGhmIZEAyPe-C4-O-hhjw3Afk3rp_UaG1wMbgVKStujOdrcobrO6_hLOoSY7lITA-BYqFl9R5DmBoCw9_C5DEsHYL82c_FD03qVBE2rB6rHLaE03j0coHbZn1yB-RzbQqABkafhxWIUADdQ_YqxE588UzjEDRyxm_QviKoUsfSjlu0R9OMwBeX3uHnUP8tkscmMVOctAktPqzxGlfzaorgvfVWDaSUzYvGHxUdkcloUwqrAeCW_MKRmUcUblYQV_xI7QGjXQK4scTWlt4bthHiZ5fYcWt2CFozBi9V9MjKdDejDuLDDPdGlgNLVAnbUp8OqB3w8eFUycni70qp5KrUa1ooG6Bzs4qxuAD7I7D-9NS9VVhRGDBynUtgUHlBWX908ndXNfrZGnfHUyiSyZGNwy2c6xXbH_F7N09Zu9jTDFQazj85B9fVVXZ-63kfCXeuRhRm5oqYoGCLSgs71f3qnqipu2zPukehGWRt3zqf8NWyNOJxnkwW_D9111MpcrRAyhn3cOzHML6rN4nTA-sdq-9bJNMaxr-WJtawuxQtwVMmQCRHOXuFxP0ZPSVjH0zq2Y3paujalyMGpDIJlvTcP4TT3pmnpJ80', 'alg': 'RS256', 'kid': 'public:e272a755-7ae2-490e-82f5-62e0678641b0'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': '16vFo3VXLypUERl1fqAWJEysIgKnJ15eEnc-5LOiFx7jK2L0zDKtj7q6ySr6rdwmgFjaV1vfG-VKmLHPMD_YuazQeb86blkDnUfNQvHfNID0g-U2G-xeLCqfdl54jzx5NAhMV6BVCUTOwsiUt3dgBaNWGJENo4gU0KGr0S2xEU38sJGUz3zROL6gOmUwqlSAk3YClnhyYYof0tj4j0dW7mXK7MaQ4CRAhq5rJq_VRrMCc4JiD7kAN104V5BmNU409uF4InE2Stugw8RSH4hXeBFp-dXtzQi6qmBLsnHd16_WEce76IxvthFnePqa3XMNg9G4-AJ36RVbH4IhMioQgvgHWGXR276pH1Vyga7V0dSakg8ohSD2vBD5OmlYquJ6krJ3uWUCez59YUeNEgOexn5XaBL0ZEnTQ-zNNHX39QZz9QaU2lftGhknRufg68bmshLWgXJexJS1ht1vFccFcmvpnYEnCTwKzo0kjlcY7IiBpWgJ1f4r1PTIKuh8CluNkitsbABcVx3-FOAhA4CMrQovAaNL_jfp6wKBA9Qy0W9LkESVsRQWFUSpQu_z4pJMOVfjbwJOsquxKwXphI2h1VczR-Hh8rTX7D2GL_4-GyG2nHfpF3jVq7raKnyGxJA8ZIK9kPh0JlQhR2FcBhFOWjvusFjoZ09Po6XtvWlP82E', 'alg': 'RS256', 'kid': 'public:0acf6c64-4d55-4888-abb9-b2a3f661ee7f'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': '0vvbIEitFVzY4o12elAZbZvpja5xTm5AOh9wi2UEiPEL6aKxAUn1ywpUaLyWKuEXdeuykHyybniLaThik7Gf-6xKk6S9IK9tjbbwfRqHVkn_Xkyul0ohFI3iTcjvFq5FPGr5vEhSB6eckdngUpzb-7S_Kt8yunkdhYTmkuAr2AXSbQcmCbOJXOsvkc5LOwpjmFIWrtBAHwILJ5cHjzIHtkK2QKMJRlknD8b4kmQ3x6vfxA7mtXREUXdQFn7ssnOVPzriPQp4kIi_TMczSmRLlX1PeeOeDGpTnYywQbsAfdBGZ20WdZlwP3lRUUJoKv1GpBU51GKm2xhHtyrzOkiRKE8pH_PD05gh1G9qXbFtBOoHMBWEaCxoxyJcW8_9iLXBPoC-Jhm47VO5T9hPlaISzDY6EUmgYktejS_mx_bR7emBcbtFUccYSVVqT3EZqAFuQlsPsvj8AT9NmEiVncB2Cy4z7ofLX_Wai_VFPCf7AEfmDZ8mzFZQfVGct74Q9KybwXm8YDq0TSszQGuqT0gtvU9In7CPSOytrVDbdk8Peyeg-Wn_ACMRh5T23wUbQ0jy0Wi9kBwIzN-dUpKu3uL6EZ3PmPSZItQHeAxpQbRZJ1vrrd2y-b6EGun3G9rlnOZ3L4_L4-NOKLt4VGPie7sphlND1pc4ZipaXBjZ9uC3bS8', 'alg': 'RS256', 'kid': 'public:490968e8-c6e5-441e-b42e-5053d6c67af2'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': '0WN9e_V2wEp33JZoN7zQ9J4E4Iz0l-dlx6GqIKdepcMjON3PKZHWFML1e0ZKAkuG2ZJRKoX1LaSNZT0NI9N6_wVAT9aNv53sHBJVC4Bww1zKHEvQseGwJbG0lZZHjDXaxCBPte9yQnquIRRp9Ab-uBeziRoaFQ02OV3LBMBSZ79AzFvZ4yTqpUS_xp-Ylfcmh5wXEppd6hoxs9h1tttPTPbnMLte3S_zxCZI4TQi8d1yBi39OvfZxtABQQbgqYPxiYehNdYbfmZ2CAmVlsTxByS3X-ANBe2nmLsOLgXTyVFZfvEZkzY7OgEwwq5zog5pScXJ-TGlj0guZd8nClHEV-GHvXonjb2hZB63dFEiUVMNh5cOblZX034GnlOkzYfAH8UZ_cvOqONHbvplzONuaYSSRMPRaZwj-0fpElhFNHwr1v1pqbE1i9XOxU_c-eSMr4XAm1VsWG3zJKymjoJmaDcW3AEawi3btL1N2tE3p27cHtcdFjcv5birnxMtPI9Vu806U0_WiGtH_kaWxz64Xk3A_yB-lIBQwXe61JME-K81wLLcHE9qoqpF5iUK4mDqMmI_DVIazUlVUzxY0-1iFkV790V95dBxeYFgXKX02g8NyxfnyzUDC12qUKKejJFbG5LPHaMUXWJIQ2ntwBX_XzeF4pGh0u0vYmfxAmfHWN0', 'alg': 'RS256', 'kid': 'public:a09f73cf-d685-4c5c-9312-60a13e57646f'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': 's_BEnyG0xHYDibtz9a4tE1IW8490BQ_z526Lg2d0PWRtHfcqKmPG0pd0DizPuLY2j1NAY4cCXLwNWMJ3Cp1TqddaMl08hElvNbilcTyQr96RQg9MnrWeR1EqpdXEzTjcx06DFDokvzs89YQVZTDzSh_-xY_m_0VkcFQ0RpDTBn1B0dkMh78dbTJVVSGXYSBgMpcKrGlrgDaPIRX7qp_SdvjNtkPStG_wCPkzd_IJAaTAHGrlyj27dyhOC6EqQjpZRhQvT-w7GalbObncCFox3hRiC8wbI9Toi5p7vEuJJ6yksaqtIwgbtPXXUChNTqwQgIc1RE8RVuhI8ExaT6FfStIVLq9Tow6Hd9mopdX_ydEHHbnbvSC0cCRPg8_G8zTk0ihFpiHE1yEDXBQSs6pZIQ8KZF2RG35j75Jh4ngsDyPbC7PmjE93SG25AkX0WZwoB3g8f6q2r4dZqNtemRX1lMDo0FUQyYcOU5mnOiW3E5oNs3g-VH5ISOiaSUSLX6AIxDfdk6Wj5t7FZUo4EcIwTnE3PI-0HxnLJaErwbYEX0hO1BuhfF7zYHxDjc085U7OyN0abZWbuVUMtIMRgq-4ASlM9fTECg3sMmOfTEJV9nrJZaSCxKvVWma9A01bvBPB6Qn92Gj1XNZ0E1RBLUp1V3iXLcS7MGJh7bAAk5kwKCM', 'alg': 'RS256', 'kid': 'public:8e8dab73-c9fe-42ef-9a7b-1e217abba9a9'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': '3cQ2ihjoElfFVnnkleo6ioUvZrkDfddEKOMCaemXP7umEhr8TC9_L3BKYbJqtE15jvkJiqT1vlHgTOKD5wWCFhFSmEa9PAWlt9Hw6BWddFEsiijR113yvj4eT0qfjseMYyiKst0kBxiTRmQdIzllY2Y2UU1IYIkaAP009nZSR7a5IrPYFydZ6SRARk9kZI90fmgRnzUuQKcv7C9HbkUqs7qiApfA17ACpnuKQP5p5lGL41t5ZnU1-5FvmmO6NnwtRZif34HL6WYuksi2RleLAKoHGh_l6P6ygP5v3ucHH0TmdLVBAHMmlLW4BKdVnWa2HEQCKIBiXJztu8EpYCVpZ_ThCaZLagcUM6VCD4nqvsXzQB7pnsBjq75tbo2jlqrGQJE9ekfGVyw7XDN45IkJFLgfVJ2anpyK4NeIAbkB7ZCYSXbR96_EC6h0uZSMHtPYVNIvbRCK6ysCdlDuDsWiQ01tP-lp90eWj1d7ZYlaYNws12OauBfgLyn0NZvjIz5EYXbOO_Hi0P5U6znS1Um-lU0nB1Gsj685Io-KLzN0shOqkfDP8Xcjfx_3EEg0aEPJWqCjiP9K6veNI896ZrIrH6Sd0V_o4TIzpSJimZlMZrTWS6dUm2j6q1WQOE2Z5JlDMC90yTGUC8MNt2AdMB0Z78Mf71rdSrpXpWLMh7rz_7k', 'alg': 'RS256', 'kid': 'public:6a09d4a3-a298-47bc-8bbd-50b64f653f2d'}]}
0.172 condition bare-keys: status=OK [Dynamic OPs MUST publish their public keys as bare JWK keys]
0.172 assertion CheckHasJwksURI
0.172 condition providerinfo-has-jwks_uri: status=OK [Check that the jwks_uri discovery metadata value is in the provider_info]
0.172 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
bare-keys: status=OK [Dynamic OPs MUST publish their public keys as bare JWK keys]
providerinfo-has-jwks_uri: status=OK [Check that the jwks_uri discovery metadata value is in the provider_info]
Done: status=OK
============================================================
RESULT: PASSED
./OP-request_uri-Sig.txt 0000644 0000000 0000000 00000024401 13313424307 015316 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-request_uri-Sig
Test description: Support request_uri request parameter with signed request
Timestamp: 2018-06-23T11:02:31Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.074 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Registration -->-->
0.075 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'request_object_signing_alg': 'RS256'}
0.076 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "RS256",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#eQMXdme3MTcjUHUq"
],
"response_types": [
"code id_token token"
]
}
0.234 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.235 RegistrationResponse {
"client_id": "d8117dd2-fc88-4fc2-929b-27f996dd9434",
"client_secret": ".OiK8a80Qlwp",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "d8117dd2-fc88-4fc2-929b-27f996dd9434",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "RS256",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#eQMXdme3MTcjUHUq"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.235 phase <--<-- 3 --- AsyncAuthn -->-->
0.239 AuthorizationRequest {
"client_id": "d8117dd2-fc88-4fc2-929b-27f996dd9434",
"nonce": "jCF9nKJZfYHMT9iH",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"request_uri": "https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#eQMXdme3MTcjUHUq",
"response_type": "code id_token token",
"scope": "openid",
"state": "ZtmYtAwXbmCsBuS9"
}
0.239 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?request_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Frequests%2Fe3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9%23eQMXdme3MTcjUHUq&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=d8117dd2-fc88-4fc2-929b-27f996dd9434&state=ZtmYtAwXbmCsBuS9&response_type=code+id_token+token&nonce=jCF9nKJZfYHMT9iH
0.239 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?request_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Frequests%2Fe3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9%23eQMXdme3MTcjUHUq&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=d8117dd2-fc88-4fc2-929b-27f996dd9434&state=ZtmYtAwXbmCsBuS9&response_type=code+id_token+token&nonce=jCF9nKJZfYHMT9iH
3.177 http args {}
3.391 response URL with fragment
3.391 response access_token=UB9krQ8XSEvPac0M2494KVtikQJj8UKI074a3IK6N6s.8MoLlgfdLjImfxRNR1d12TCUOhISJyRIhkVy3v7IfkQ&code=V13SUAw0mwcZRhlmMFCvjHLfbDLtkTOzjEcHlgAQC6Q.koyptKbVy8VE1S4YxwMXM3q9JX12WOSB6FvHZqu-VVo&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiNXFqLTZMLWlmNlVEU1NMVm9IR2lZQSIsImF1ZCI6WyJkODExN2RkMi1mYzg4LTRmYzItOTI5Yi0yN2Y5OTZkZDk0MzQiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiJXdTlMd1hvQ1J5OTBDaE1yRVdfWUR3IiwiZXhwIjoxNTI5NzU1MzUxLCJpYXQiOjE1Mjk3NTE3NTEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImQ5ZGM2YmI3LTQ1ZjMtNDM3Yi05YTU4LThiZmMzYzlkOWFhNyIsIm5vbmNlIjoiakNGOW5LSlpmWUhNVDlpSCIsInJhdCI6MTUyOTc1MTc0OCwic3ViIjoiZm9vQGJhci5jb20ifQ.pc-WCu6L50NoY0-_RYeh0devMaoSky4GvSRawBwzx3Dbt_RCaeqKnwAeBAhcjgzB6GpE1jyTITf5By8xYQpLjXgKYF2C-1gVuo_K1rxYauckfphGzFIDn-o4L_5Vl8hIozCG5ozYZARLgH3o4MPjlTvcVo3j8sQT2bbUwQ0NCaSaQwPW0PFjj8cKdTGe9OqTX2tQbXK4nroSF4oNxVfeF7XFeC2qecs9jlEnY9cDesMyyd4_th8yJ8PDN7AlXQbZw4vaPWvQkEEXikrp-VuxCsg0sIB2DqGpAB7jbVkIdllv1GIxIyVIswOkT0f8sbiZydAP8279RsVb4rNK35mVaBjSU0W94_22-oxi5ABYldC6S_GAKRV1PYEB3MCXiJ7HiOSpXQiJfE5ecnNJdvQ4IuhOAnfqr7dTIic5pP0s3_lABNWYY5CNKzAyBxyPXxmWbdVFgzr4mbWK68-FHMiFrrhYSUOemIajuUzXTf7AZ9fOgZ0ejVr7UYEP1WALCurDAw4aWN-WWy1FvQD-1D0k_-ZAMVUOMcYLGuaSRfVlrqsm5HIO-IZQXzWJu3Z8uSMk-hOEloVR6p4JlGMuaErJswFr_5FqxgJeAYKAzZ1hDEo0KCx30WgY_vl8q-7VRbKLO5vB_dv4sCQZQ0SSS1PgrZqDZztoYAKZ8aeT7JaaTbY&scope=openid&state=ZtmYtAwXbmCsBuS9&token_type=bearer
3.391 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiNXFqLTZMLWlmNlVEU1NMVm9IR2lZQSIsImF1ZCI6WyJkODExN2RkMi1mYzg4LTRmYzItOTI5Yi0yN2Y5OTZkZDk0MzQiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiJXdTlMd1hvQ1J5OTBDaE1yRVdfWUR3IiwiZXhwIjoxNTI5NzU1MzUxLCJpYXQiOjE1Mjk3NTE3NTEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImQ5ZGM2YmI3LTQ1ZjMtNDM3Yi05YTU4LThiZmMzYzlkOWFhNyIsIm5vbmNlIjoiakNGOW5LSlpmWUhNVDlpSCIsInJhdCI6MTUyOTc1MTc0OCwic3ViIjoiZm9vQGJhci5jb20ifQ.pc-WCu6L50NoY0-_RYeh0devMaoSky4GvSRawBwzx3Dbt_RCaeqKnwAeBAhcjgzB6GpE1jyTITf5By8xYQpLjXgKYF2C-1gVuo_K1rxYauckfphGzFIDn-o4L_5Vl8hIozCG5ozYZARLgH3o4MPjlTvcVo3j8sQT2bbUwQ0NCaSaQwPW0PFjj8cKdTGe9OqTX2tQbXK4nroSF4oNxVfeF7XFeC2qecs9jlEnY9cDesMyyd4_th8yJ8PDN7AlXQbZw4vaPWvQkEEXikrp-VuxCsg0sIB2DqGpAB7jbVkIdllv1GIxIyVIswOkT0f8sbiZydAP8279RsVb4rNK35mVaBjSU0W94_22-oxi5ABYldC6S_GAKRV1PYEB3MCXiJ7HiOSpXQiJfE5ecnNJdvQ4IuhOAnfqr7dTIic5pP0s3_lABNWYY5CNKzAyBxyPXxmWbdVFgzr4mbWK68-FHMiFrrhYSUOemIajuUzXTf7AZ9fOgZ0ejVr7UYEP1WALCurDAw4aWN-WWy1FvQD-1D0k_-ZAMVUOMcYLGuaSRfVlrqsm5HIO-IZQXzWJu3Z8uSMk-hOEloVR6p4JlGMuaErJswFr_5FqxgJeAYKAzZ1hDEo0KCx30WgY_vl8q-7VRbKLO5vB_dv4sCQZQ0SSS1PgrZqDZztoYAKZ8aeT7JaaTbY', 'scope': 'openid', 'code': 'V13SUAw0mwcZRhlmMFCvjHLfbDLtkTOzjEcHlgAQC6Q.koyptKbVy8VE1S4YxwMXM3q9JX12WOSB6FvHZqu-VVo', 'access_token': 'UB9krQ8XSEvPac0M2494KVtikQJj8UKI074a3IK6N6s.8MoLlgfdLjImfxRNR1d12TCUOhISJyRIhkVy3v7IfkQ', 'state': 'ZtmYtAwXbmCsBuS9', 'expires_in': 3599, 'token_type': 'bearer'}
3.47 AuthorizationResponse {
"access_token": "UB9krQ8XSEvPac0M2494KVtikQJj8UKI074a3IK6N6s.8MoLlgfdLjImfxRNR1d12TCUOhISJyRIhkVy3v7IfkQ",
"code": "V13SUAw0mwcZRhlmMFCvjHLfbDLtkTOzjEcHlgAQC6Q.koyptKbVy8VE1S4YxwMXM3q9JX12WOSB6FvHZqu-VVo",
"expires_in": 3599,
"id_token": {
"at_hash": "5qj-6L-if6UDSSLVoHGiYA",
"aud": [
"d8117dd2-fc88-4fc2-929b-27f996dd9434"
],
"auth_time": 1529751698,
"c_hash": "Wu9LwXoCRy90ChMrEW_YDw",
"exp": 1529755351,
"iat": 1529751751,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "d9dc6bb7-45f3-437b-9a58-8bfc3c9d9aa7",
"nonce": "jCF9nKJZfYHMT9iH",
"rat": 1529751748,
"sub": "[email protected]"
},
"scope": "openid",
"state": "ZtmYtAwXbmCsBuS9",
"token_type": "bearer"
}
3.47 phase <--<-- 4 --- Done -->-->
3.47 end
3.471 assertion VerifyAuthnOrErrorResponse
3.471 condition authn-response-or-error: status=OK [Checks that the last response was a JSON encoded authentication or error message]
3.471 condition Done: status=OK
============================================================
Conditions
authn-response-or-error: status=OK [Checks that the last response was a JSON encoded authentication or error message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-OAuth-2nd-30s.txt 0000644 0000000 0000000 00000040071 13313424570 014336 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-OAuth-2nd-30s
Test description: Trying to use authorization code twice with 30 seconds in between uses must result in an error
Timestamp: 2018-06-23T11:05:28Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.017 phase <--<-- 1 --- Webfinger -->-->
1.017 not expected to do WebFinger
1.017 phase <--<-- 2 --- Discovery -->-->
1.017 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.091 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.092 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.092 phase <--<-- 3 --- Registration -->-->
1.092 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.093 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#vAOmvaRdqd362FuL"
],
"response_types": [
"code id_token token"
]
}
1.253 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.254 RegistrationResponse {
"client_id": "bbb10108-f746-4593-830a-93fef9f95d85",
"client_secret": "G7KU-i8JYiMY",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "bbb10108-f746-4593-830a-93fef9f95d85",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#vAOmvaRdqd362FuL"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.254 phase <--<-- 4 --- AsyncAuthn -->-->
1.255 AuthorizationRequest {
"client_id": "bbb10108-f746-4593-830a-93fef9f95d85",
"nonce": "sWdflVLovEfLtiz2",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid",
"state": "ef7XzASOYeAGytVx"
}
1.255 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=bbb10108-f746-4593-830a-93fef9f95d85&state=ef7XzASOYeAGytVx&response_type=code+id_token+token&nonce=sWdflVLovEfLtiz2
1.255 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=bbb10108-f746-4593-830a-93fef9f95d85&state=ef7XzASOYeAGytVx&response_type=code+id_token+token&nonce=sWdflVLovEfLtiz2
3.893 http args {}
4.069 response URL with fragment
4.069 response access_token=742TgMo5SjRgOjMs_hlL1HDk3zRAx8gQOh-vQSwWzt0.ox-ksf3KnOrrqoZStLW4HeSaP4vsYGiMQbEPi9yTgdQ&code=xsiflTCjFrQmMQrpV1OfffsyAR3eVTnDM8ok2_GTe1w.j2g3KmLfVrl_WGyeWeapSd5KYv3TdBkPQXv7K-KaA1Y&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiZENDQkw2NlktY2JaUTFRaVpuQlNaUSIsImF1ZCI6WyJiYmIxMDEwOC1mNzQ2LTQ1OTMtODMwYS05M2ZlZjlmOTVkODUiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiI3WGZLTUZ4Z2lHWi1ja05wejY2eEtRIiwiZXhwIjoxNTI5NzU1NDk3LCJpYXQiOjE1Mjk3NTE4OTcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjQ2N2UwMDhlLTI0NGMtNDdiMS04YzY1LWY2OWViZjc4OWQ4MCIsIm5vbmNlIjoic1dkZmxWTG92RWZMdGl6MiIsInJhdCI6MTUyOTc1MTg5NCwic3ViIjoiZm9vQGJhci5jb20ifQ.VOhHotK-ZNEtUCR0aN6iu91f8kDupz9_Qcoou_u0hWepxmp7jiQM26CZJ6YayGaFew5dS1vYkPQw6L4iBo1NgmEKBx3x6gHrs_tGnnsZSgNnZWWk5Okf84Udd3lEjToquJIvSZGro9cGkoNVbPl0HYlegjzYAFFAj_O6Alxsi50I4dzQQF25WiIWZ-wMGZGgzEA0ijJTyGd9pp46cFu4PSRmP41QLpDXRRFo8EYcTiUlcl9E99fxFFniNWdfEsnSKYP1UK7Pit4tUibrkkuMVmv4fyB8NTsBUBt0oAZZ81ti8JxLkjHaLO2KpQDdTNRQH3VMAMrocmLf4LgAOFwIBPHpvDBVFaci1CN7XPIEmCzZLqiC3nzNHoS0ApLGGX4uxwke-LcRd9CBmK5mJpU-btJ-Kp10U2v2lc6W8YpW6_QXByfsWNsZqRuKaITT-bKyJjfHBUAT_KXz43ElRPQmP_wp9wdasfMoQFgI2xReFLUrOp2KEIR3Pl16TpaeHEmF4FKq60pfsxKY9eT4948oJsIpl8Tz41xrqKX_a6aB28-hUAb1sM8qF34VKpDppheY_y4nWb6JsZa1DHvToBqAFt3a6E75YovKJLxorNnzzyGq7KFN-mBCyDFeLrkZAhxrkBccbGvyjIkmhZxTe3ppI38HFPrqA75TbwcRsAARGaE&scope=openid&state=ef7XzASOYeAGytVx&token_type=bearer
4.07 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiZENDQkw2NlktY2JaUTFRaVpuQlNaUSIsImF1ZCI6WyJiYmIxMDEwOC1mNzQ2LTQ1OTMtODMwYS05M2ZlZjlmOTVkODUiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiI3WGZLTUZ4Z2lHWi1ja05wejY2eEtRIiwiZXhwIjoxNTI5NzU1NDk3LCJpYXQiOjE1Mjk3NTE4OTcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjQ2N2UwMDhlLTI0NGMtNDdiMS04YzY1LWY2OWViZjc4OWQ4MCIsIm5vbmNlIjoic1dkZmxWTG92RWZMdGl6MiIsInJhdCI6MTUyOTc1MTg5NCwic3ViIjoiZm9vQGJhci5jb20ifQ.VOhHotK-ZNEtUCR0aN6iu91f8kDupz9_Qcoou_u0hWepxmp7jiQM26CZJ6YayGaFew5dS1vYkPQw6L4iBo1NgmEKBx3x6gHrs_tGnnsZSgNnZWWk5Okf84Udd3lEjToquJIvSZGro9cGkoNVbPl0HYlegjzYAFFAj_O6Alxsi50I4dzQQF25WiIWZ-wMGZGgzEA0ijJTyGd9pp46cFu4PSRmP41QLpDXRRFo8EYcTiUlcl9E99fxFFniNWdfEsnSKYP1UK7Pit4tUibrkkuMVmv4fyB8NTsBUBt0oAZZ81ti8JxLkjHaLO2KpQDdTNRQH3VMAMrocmLf4LgAOFwIBPHpvDBVFaci1CN7XPIEmCzZLqiC3nzNHoS0ApLGGX4uxwke-LcRd9CBmK5mJpU-btJ-Kp10U2v2lc6W8YpW6_QXByfsWNsZqRuKaITT-bKyJjfHBUAT_KXz43ElRPQmP_wp9wdasfMoQFgI2xReFLUrOp2KEIR3Pl16TpaeHEmF4FKq60pfsxKY9eT4948oJsIpl8Tz41xrqKX_a6aB28-hUAb1sM8qF34VKpDppheY_y4nWb6JsZa1DHvToBqAFt3a6E75YovKJLxorNnzzyGq7KFN-mBCyDFeLrkZAhxrkBccbGvyjIkmhZxTe3ppI38HFPrqA75TbwcRsAARGaE', 'scope': 'openid', 'code': 'xsiflTCjFrQmMQrpV1OfffsyAR3eVTnDM8ok2_GTe1w.j2g3KmLfVrl_WGyeWeapSd5KYv3TdBkPQXv7K-KaA1Y', 'access_token': '742TgMo5SjRgOjMs_hlL1HDk3zRAx8gQOh-vQSwWzt0.ox-ksf3KnOrrqoZStLW4HeSaP4vsYGiMQbEPi9yTgdQ', 'state': 'ef7XzASOYeAGytVx', 'expires_in': 3599, 'token_type': 'bearer'}
4.22 AuthorizationResponse {
"access_token": "742TgMo5SjRgOjMs_hlL1HDk3zRAx8gQOh-vQSwWzt0.ox-ksf3KnOrrqoZStLW4HeSaP4vsYGiMQbEPi9yTgdQ",
"code": "xsiflTCjFrQmMQrpV1OfffsyAR3eVTnDM8ok2_GTe1w.j2g3KmLfVrl_WGyeWeapSd5KYv3TdBkPQXv7K-KaA1Y",
"expires_in": 3599,
"id_token": {
"at_hash": "dCCBL66Y-cbZQ1QiZnBSZQ",
"aud": [
"bbb10108-f746-4593-830a-93fef9f95d85"
],
"auth_time": 1529751824,
"c_hash": "7XfKMFxgiGZ-ckNpz66xKQ",
"exp": 1529755497,
"iat": 1529751897,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "467e008e-244c-47b1-8c65-f69ebf789d80",
"nonce": "sWdflVLovEfLtiz2",
"rat": 1529751894,
"sub": "[email protected]"
},
"scope": "openid",
"state": "ef7XzASOYeAGytVx",
"token_type": "bearer"
}
4.22 phase <--<-- 5 --- AccessToken -->-->
4.22 --> request op_args: {'state': 'ef7XzASOYeAGytVx'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
4.22 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'ef7XzASOYeAGytVx', 'code': 'xsiflTCjFrQmMQrpV1OfffsyAR3eVTnDM8ok2_GTe1w.j2g3KmLfVrl_WGyeWeapSd5KYv3TdBkPQXv7K-KaA1Y', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'bbb10108-f746-4593-830a-93fef9f95d85'}, 'state': 'ef7XzASOYeAGytVx'}
4.22 AccessTokenRequest {
"code": "xsiflTCjFrQmMQrpV1OfffsyAR3eVTnDM8ok2_GTe1w.j2g3KmLfVrl_WGyeWeapSd5KYv3TdBkPQXv7K-KaA1Y",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "ef7XzASOYeAGytVx"
}
4.22 request_url https://oidc-certification.ory.sh:8443/oauth2/token
4.22 request_http_args {'headers': {'Authorization': 'Basic YmJiMTAxMDgtZjc0Ni00NTkzLTgzMGEtOTNmZWY5Zjk1ZDg1Okc3S1UtaThKWWlNWQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
4.22 request code=xsiflTCjFrQmMQrpV1OfffsyAR3eVTnDM8ok2_GTe1w.j2g3KmLfVrl_WGyeWeapSd5KYv3TdBkPQXv7K-KaA1Y&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=ef7XzASOYeAGytVx
4.43 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
4.431 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiZENDQkw2NlktY2JaUTFRaVpuQlNaUSIsImF1ZCI6WyJiYmIxMDEwOC1mNzQ2LTQ1OTMtODMwYS05M2ZlZjlmOTVkODUiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiI3WGZLTUZ4Z2lHWi1ja05wejY2eEtRIiwiZXhwIjoxNTI5NzU1NDk3LCJpYXQiOjE1Mjk3NTE4OTcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjU5ZjNiNGIwLWNhYWMtNDdhMC04NWNmLTRhZWJjMDlmMjQxNyIsIm5vbmNlIjoic1dkZmxWTG92RWZMdGl6MiIsInJhdCI6MTUyOTc1MTg5NCwic3ViIjoiZm9vQGJhci5jb20ifQ.FsZdIWeAn_yhg2u6S-GeiG4gMn_iQVY0dVoNaz76ZZhKSbeA07FP-ZPD-QwS99Lc1JqW87VeW7Fxq14W0yfXbdazNSnBSyoJ_x9P_0X524Esh0z5JXB0OO1rq8zvh0dIyUsNhow0Aw5TV_J7cIQYKheN5EEWct_pK1IPnu2Ij1uCex-BUuRL8-19-2z0xMKUC80L8QlR9tCX1w76eUpYu_Cc_IygCk1m5C77_gOQzoOFMBv_5Cyx76GAkHwDcmCUxgm7l0nZVHl1h90cfDjEeRs_txODAbycqLhpDmGwJOW3iPL4xvz75lTSLpliHErR8kbHUzq1WMCXz6pKmG8L4KJZubOXq3Ck3Pgegtl4cAkEEiQqadFhAD865gRAbaX6Xot1o0ENIauKYQlaaChYVmgIyDnBA-WuqUoSGQje5y4Jel7FmeesVgj7-xl65WL61FMsy1dASLb7weEOV-FivgxQ_fT5O9ezvHdTSHFAm0E2TYjtzIA_qeoGa1s4dJ61wadUTd7XsuHufV0MrDN94lES9_L6pbQYNjDgObtbFLY_9wgS4RDpRWTIrblJu5jZwfg1oVtmFBOtGIE5LdbI_mn-zL04EzURn1UOj0gonKWJmDBMRxYXhJ4-EmFGVZWIMxUUPUxWdsqe0Xc0ZANIJkw1vi94RSYyJnb2yAJQe9k', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'STZB3UB4Bxh8-lf4N9s9ffshPymxNdyWFzKU-IKc7f8.Ncxt9P7lCjkXwOr-nof7gBsi3v2dVfV33SvSQJEbjdU', 'scope': 'openid'}
4.434 AccessTokenResponse {
"access_token": "STZB3UB4Bxh8-lf4N9s9ffshPymxNdyWFzKU-IKc7f8.Ncxt9P7lCjkXwOr-nof7gBsi3v2dVfV33SvSQJEbjdU",
"expires_in": 3599,
"id_token": {
"at_hash": "dCCBL66Y-cbZQ1QiZnBSZQ",
"aud": [
"bbb10108-f746-4593-830a-93fef9f95d85"
],
"auth_time": 1529751824,
"c_hash": "7XfKMFxgiGZ-ckNpz66xKQ",
"exp": 1529755497,
"iat": 1529751897,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "59f3b4b0-caac-47a0-85cf-4aebc09f2417",
"nonce": "sWdflVLovEfLtiz2",
"rat": 1529751894,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
4.435 phase <--<-- 6 --- TimeDelay -->-->
34.45 phase <--<-- 7 --- AccessToken -->-->
34.45 --> request op_args: {'state': 'ef7XzASOYeAGytVx'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
34.45 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'ef7XzASOYeAGytVx', 'code': 'xsiflTCjFrQmMQrpV1OfffsyAR3eVTnDM8ok2_GTe1w.j2g3KmLfVrl_WGyeWeapSd5KYv3TdBkPQXv7K-KaA1Y', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'bbb10108-f746-4593-830a-93fef9f95d85'}, 'state': 'ef7XzASOYeAGytVx'}
34.45 AccessTokenRequest {
"code": "xsiflTCjFrQmMQrpV1OfffsyAR3eVTnDM8ok2_GTe1w.j2g3KmLfVrl_WGyeWeapSd5KYv3TdBkPQXv7K-KaA1Y",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "ef7XzASOYeAGytVx"
}
34.45 request_url https://oidc-certification.ory.sh:8443/oauth2/token
34.45 request_http_args {'headers': {'Authorization': 'Basic YmJiMTAxMDgtZjc0Ni00NTkzLTgzMGEtOTNmZWY5Zjk1ZDg1Okc3S1UtaThKWWlNWQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
34.45 request code=xsiflTCjFrQmMQrpV1OfffsyAR3eVTnDM8ok2_GTe1w.j2g3KmLfVrl_WGyeWeapSd5KYv3TdBkPQXv7K-KaA1Y&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=ef7XzASOYeAGytVx
34.624 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:400 message:{"error":"invalid_grant","error_description":"The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client","status_code":400,"error_debug":"The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found."}
34.624 response {'error_debug': 'The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found.', 'error_description': 'The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client', 'error': 'invalid_grant', 'status_code': 400}
34.624 event Got expected error
34.625 TokenErrorResponse {
"error": "invalid_grant",
"error_debug": "The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found.",
"error_description": "The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client",
"status_code": 400
}
34.625 phase <--<-- 8 --- Done -->-->
34.625 end
34.625 assertion VerifyResponse
34.625 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
34.625 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Registration-policy_uri.txt 0000644 0000000 0000000 00000023631 13313424053 017057 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-policy_uri
Test description: Registration with policy_uri
Timestamp: 2018-06-23T10:59:55Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.462 phase <--<-- 1 --- Webfinger -->-->
1.462 not expected to do WebFinger
1.463 phase <--<-- 2 --- Discovery -->-->
1.463 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.575 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.577 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.577 phase <--<-- 3 --- Registration -->-->
1.577 register kwargs:{'application_name': 'OIC test tool', 'policy_uri': 'https://op.certification.openid.net:61353/static/policy.html', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.577 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"policy_uri": "https://op.certification.openid.net:61353/static/policy.html",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#VRcLn631EGhF7Jcu"
],
"response_types": [
"code id_token token"
]
}
1.733 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.734 RegistrationResponse {
"client_id": "ccc21c40-a650-42d3-9a31-8afab8705065",
"client_secret": "TAaY9D.29__O",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "ccc21c40-a650-42d3-9a31-8afab8705065",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"policy_uri": "https://op.certification.openid.net:61353/static/policy.html",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#VRcLn631EGhF7Jcu"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.734 phase <--<-- 4 --- AsyncAuthn -->-->
1.734 AuthorizationRequest {
"client_id": "ccc21c40-a650-42d3-9a31-8afab8705065",
"nonce": "tEIWUQSl3yqkbv3s",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid",
"state": "eIUUUtLS17Gw82PZ"
}
1.734 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=ccc21c40-a650-42d3-9a31-8afab8705065&state=eIUUUtLS17Gw82PZ&response_type=code+id_token+token&nonce=tEIWUQSl3yqkbv3s
1.734 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=ccc21c40-a650-42d3-9a31-8afab8705065&state=eIUUUtLS17Gw82PZ&response_type=code+id_token+token&nonce=tEIWUQSl3yqkbv3s
4.263 http args {}
4.468 response URL with fragment
4.469 response access_token=6SAWYLwJZ1nEXTMlOl9Xf3nmOowNRTqz2oYzCYi2vHM.oEe41RxNOwFuBtikUMELPwUieBhq2OSV4b_M49bLJIU&code=pMeCtysyNnv5kMIURTXlXLWeAN6uEGMvBYroXSUlMz8.ohsFTZWCp7ZlrvV-tEPiZAjQDXv5ncdRE0QI3enSIz4&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiX0c0REt1Q29WS0U4ck5reUh3MExpZyIsImF1ZCI6WyJjY2MyMWM0MC1hNjUwLTQyZDMtOWEzMS04YWZhYjg3MDUwNjUiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJPUmpXQmhmdkpmUU9GcDRVdG93U2pBIiwiZXhwIjoxNTI5NzU1MTk1LCJpYXQiOjE1Mjk3NTE1OTUsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6Ijc1ZDZjMjc5LWIyZWQtNDgyZi04NzcyLTJhYTEzNTRlYzM1OSIsIm5vbmNlIjoidEVJV1VRU2wzeXFrYnYzcyIsInJhdCI6MTUyOTc1MTU5Mywic3ViIjoiZm9vQGJhci5jb20ifQ.hR8z8H0ISgoGOJpjC3-dCIURB4oL5oRRupyuaNMQd11nBO554JX2NR2ho81IITDMEOKlv8jeBQEbyGqcKoVjK6DMzrofwzOEftOz1XaTzFqGr4hRhl13I0IIQCzUCRAp_9LVLonQ88VraAItBcyrRHGZ7xHdxocmdC5ocqxBIhWIH-Aw3F5aa8dIRAhis46S9n-Ee48CXgmYO6KR2GLCbLuzMKoX6sQAAHDHZDjgRx6sB7rAvPvMsWrloW1U-jscw0cNCNr5JEhT4FEpcOET7MncBSyF8TbDJdCc2KpUjDNg5ebKP5217GGy8ru2Rz_Y8szdCfQWHiAvT4YZMh6f0OsHSO92R4U4BKwvgy3VA7HK-w1zEoQIFW-vRceNXU61NwWQG0C3wjvfpK2ZSuYRFSSibWSSCsFgLIyRs5F-5IT2wjthwmDFpC0vm0Wu-Tx6VQm17FpJDLGx9PJjYexqd0dTDu56fQaKaPXeIYgexwBuWiMeARsHRtY9zpQMuELgt995IIwI1-v28-2awMiXB7-5eTS403e8Nt18sGdQPX6pqhxyKZd-fjMN4RxtgFdjTnF3NRdspY-d4N1oa93Al2ZMgq3dTos339cv7R8rcf-wgofWRt6g4_qhCfHTTdyX1UiU5dPKMkw2n2AM75kQHufYfG1gZ_pO3tGXa26slLE&scope=openid&state=eIUUUtLS17Gw82PZ&token_type=bearer
4.469 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiX0c0REt1Q29WS0U4ck5reUh3MExpZyIsImF1ZCI6WyJjY2MyMWM0MC1hNjUwLTQyZDMtOWEzMS04YWZhYjg3MDUwNjUiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJPUmpXQmhmdkpmUU9GcDRVdG93U2pBIiwiZXhwIjoxNTI5NzU1MTk1LCJpYXQiOjE1Mjk3NTE1OTUsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6Ijc1ZDZjMjc5LWIyZWQtNDgyZi04NzcyLTJhYTEzNTRlYzM1OSIsIm5vbmNlIjoidEVJV1VRU2wzeXFrYnYzcyIsInJhdCI6MTUyOTc1MTU5Mywic3ViIjoiZm9vQGJhci5jb20ifQ.hR8z8H0ISgoGOJpjC3-dCIURB4oL5oRRupyuaNMQd11nBO554JX2NR2ho81IITDMEOKlv8jeBQEbyGqcKoVjK6DMzrofwzOEftOz1XaTzFqGr4hRhl13I0IIQCzUCRAp_9LVLonQ88VraAItBcyrRHGZ7xHdxocmdC5ocqxBIhWIH-Aw3F5aa8dIRAhis46S9n-Ee48CXgmYO6KR2GLCbLuzMKoX6sQAAHDHZDjgRx6sB7rAvPvMsWrloW1U-jscw0cNCNr5JEhT4FEpcOET7MncBSyF8TbDJdCc2KpUjDNg5ebKP5217GGy8ru2Rz_Y8szdCfQWHiAvT4YZMh6f0OsHSO92R4U4BKwvgy3VA7HK-w1zEoQIFW-vRceNXU61NwWQG0C3wjvfpK2ZSuYRFSSibWSSCsFgLIyRs5F-5IT2wjthwmDFpC0vm0Wu-Tx6VQm17FpJDLGx9PJjYexqd0dTDu56fQaKaPXeIYgexwBuWiMeARsHRtY9zpQMuELgt995IIwI1-v28-2awMiXB7-5eTS403e8Nt18sGdQPX6pqhxyKZd-fjMN4RxtgFdjTnF3NRdspY-d4N1oa93Al2ZMgq3dTos339cv7R8rcf-wgofWRt6g4_qhCfHTTdyX1UiU5dPKMkw2n2AM75kQHufYfG1gZ_pO3tGXa26slLE', 'scope': 'openid', 'code': 'pMeCtysyNnv5kMIURTXlXLWeAN6uEGMvBYroXSUlMz8.ohsFTZWCp7ZlrvV-tEPiZAjQDXv5ncdRE0QI3enSIz4', 'access_token': '6SAWYLwJZ1nEXTMlOl9Xf3nmOowNRTqz2oYzCYi2vHM.oEe41RxNOwFuBtikUMELPwUieBhq2OSV4b_M49bLJIU', 'state': 'eIUUUtLS17Gw82PZ', 'expires_in': 3599, 'token_type': 'bearer'}
4.564 AuthorizationResponse {
"access_token": "6SAWYLwJZ1nEXTMlOl9Xf3nmOowNRTqz2oYzCYi2vHM.oEe41RxNOwFuBtikUMELPwUieBhq2OSV4b_M49bLJIU",
"code": "pMeCtysyNnv5kMIURTXlXLWeAN6uEGMvBYroXSUlMz8.ohsFTZWCp7ZlrvV-tEPiZAjQDXv5ncdRE0QI3enSIz4",
"expires_in": 3599,
"id_token": {
"at_hash": "_G4DKuCoVKE8rNkyHw0Lig",
"aud": [
"ccc21c40-a650-42d3-9a31-8afab8705065"
],
"auth_time": 1529751409,
"c_hash": "ORjWBhfvJfQOFp4UtowSjA",
"exp": 1529755195,
"iat": 1529751595,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "75d6c279-b2ed-482f-8772-2aa1354ec359",
"nonce": "tEIWUQSl3yqkbv3s",
"rat": 1529751593,
"sub": "[email protected]"
},
"scope": "openid",
"state": "eIUUUtLS17Gw82PZ",
"token_type": "bearer"
}
4.564 phase <--<-- 5 --- Done -->-->
4.564 end
4.565 assertion VerifyAuthnResponse
4.565 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
4.565 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-claims-essential.txt 0000644 0000000 0000000 00000034652 13313424161 015473 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-claims-essential
Test description: Claims request with essential name claim
Timestamp: 2018-06-23T11:01:05Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.075 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.077 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.077 phase <--<-- 2 --- Registration -->-->
0.077 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.077 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#kpIxxq22RSsD9h9q"
],
"response_types": [
"code id_token token"
]
}
0.239 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.24 RegistrationResponse {
"client_id": "1efdb402-e473-4421-9a54-2f9c68d17173",
"client_secret": "QCbNcNmRK3o~",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "1efdb402-e473-4421-9a54-2f9c68d17173",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#kpIxxq22RSsD9h9q"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.24 phase <--<-- 3 --- AsyncAuthn -->-->
0.24 AuthorizationRequest {
"claims": {
"userinfo": {
"name": {
"essential": true
}
}
},
"client_id": "1efdb402-e473-4421-9a54-2f9c68d17173",
"nonce": "nHoSUgrkCs8hgmyP",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid",
"state": "YU2UQXVw8I71maWq"
}
0.241 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=1efdb402-e473-4421-9a54-2f9c68d17173&claims=%7B%22userinfo%22%3A+%7B%22name%22%3A+%7B%22essential%22%3A+true%7D%7D%7D&state=YU2UQXVw8I71maWq&response_type=code+id_token+token&nonce=nHoSUgrkCs8hgmyP
0.241 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=1efdb402-e473-4421-9a54-2f9c68d17173&claims=%7B%22userinfo%22%3A+%7B%22name%22%3A+%7B%22essential%22%3A+true%7D%7D%7D&state=YU2UQXVw8I71maWq&response_type=code+id_token+token&nonce=nHoSUgrkCs8hgmyP
3.153 http args {}
3.35 response URL with fragment
3.351 response access_token=wZmh7uSO-21iONa8Wz5JiXM3qXXoa7TtDQbgxgwmskk.mKQiBf3K-my5jL5fJLuDM1sM2gfHwY0HrkT9ulgbcSg&code=NJJb4Jb0dRSRdhi2otw9t3tzNSxT0JDD2cSVhNWcLtw.SpJabZau0Sy-QoZOoU3E-bUXttzpsx1CKNVtawJGt5U&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiX0xNc3RueVFFdko0UGtNNFZWY0p5QSIsImF1ZCI6WyIxZWZkYjQwMi1lNDczLTQ0MjEtOWE1NC0yZjljNjhkMTcxNzMiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJoMTZVMDlPdWJwQWdMX0k3NmdMQnhRIiwiZXhwIjoxNTI5NzU1MjY0LCJpYXQiOjE1Mjk3NTE2NjQsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImVmYTBjMDFhLTU2NjgtNDBiMy1iMmY1LTAzZWQ1ZmM3YjlhYSIsIm5vbmNlIjoibkhvU1VncmtDczhoZ215UCIsInJhdCI6MTUyOTc1MTY2Miwic3ViIjoiZm9vQGJhci5jb20ifQ.1H8jHjHWfS2wWfLckUf1Gyipb6TIVM959lqFSiPj5x6AhDp-br1tzm9c-4wOp9MJ74p7J_8CgARyHJYL74-yJ1Bjq71YnLLOZP1aUZye9rF21sxtRSbZ4mu89hbfDcrVPpv3_-b6PwGDqfsjMxNlbjp9gzwszjTSqNek8rhAsP7iYkW2aqRnlzw2XszaKCCl0q6E9Z32veobELqBlkAKwIDzTl7VzBSUmfxdJ5h22oQcKpf2ThalLZM4TIAa1OIz3F6PO11PvDogHKD4boilmnTOt9Qqmymjf9UCv4SFIAglW2byyncHBp3C_JqJ4LxDGrS0H42ZZm38P-QSMf9QP68WW0-qESKnvQjnqIGJhR5LQFocMV1KmfJGpAcahnww4yWXDu0aSw6D9xA1MxT49T7EofXI6bMjtWsMl7s0m7VIJtAkRV_5iYBp6UjzShtWl3coTJ7fU9UoqAIWa1kHFKPI-fasYKSNWOBor5x8iReOMkH-7aH0giUW8iAvoSTcj9S9IRc8HEPj8xB4kuJcwW-fLgxMFYHdFU7B7_gyLgPYNeh8jg03IpQKF7cF11aJSmN8oM4GTFTfwciGgyjltrijKQ6Sdr_ty-LUGrAHt0Lw41cEGIx3g9XEYw22-yhvCOqmms-8obW_kbHqcI4rNBY7rEd9vahtFNGxU8WyzdY&scope=openid&state=YU2UQXVw8I71maWq&token_type=bearer
3.351 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiX0xNc3RueVFFdko0UGtNNFZWY0p5QSIsImF1ZCI6WyIxZWZkYjQwMi1lNDczLTQ0MjEtOWE1NC0yZjljNjhkMTcxNzMiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJoMTZVMDlPdWJwQWdMX0k3NmdMQnhRIiwiZXhwIjoxNTI5NzU1MjY0LCJpYXQiOjE1Mjk3NTE2NjQsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImVmYTBjMDFhLTU2NjgtNDBiMy1iMmY1LTAzZWQ1ZmM3YjlhYSIsIm5vbmNlIjoibkhvU1VncmtDczhoZ215UCIsInJhdCI6MTUyOTc1MTY2Miwic3ViIjoiZm9vQGJhci5jb20ifQ.1H8jHjHWfS2wWfLckUf1Gyipb6TIVM959lqFSiPj5x6AhDp-br1tzm9c-4wOp9MJ74p7J_8CgARyHJYL74-yJ1Bjq71YnLLOZP1aUZye9rF21sxtRSbZ4mu89hbfDcrVPpv3_-b6PwGDqfsjMxNlbjp9gzwszjTSqNek8rhAsP7iYkW2aqRnlzw2XszaKCCl0q6E9Z32veobELqBlkAKwIDzTl7VzBSUmfxdJ5h22oQcKpf2ThalLZM4TIAa1OIz3F6PO11PvDogHKD4boilmnTOt9Qqmymjf9UCv4SFIAglW2byyncHBp3C_JqJ4LxDGrS0H42ZZm38P-QSMf9QP68WW0-qESKnvQjnqIGJhR5LQFocMV1KmfJGpAcahnww4yWXDu0aSw6D9xA1MxT49T7EofXI6bMjtWsMl7s0m7VIJtAkRV_5iYBp6UjzShtWl3coTJ7fU9UoqAIWa1kHFKPI-fasYKSNWOBor5x8iReOMkH-7aH0giUW8iAvoSTcj9S9IRc8HEPj8xB4kuJcwW-fLgxMFYHdFU7B7_gyLgPYNeh8jg03IpQKF7cF11aJSmN8oM4GTFTfwciGgyjltrijKQ6Sdr_ty-LUGrAHt0Lw41cEGIx3g9XEYw22-yhvCOqmms-8obW_kbHqcI4rNBY7rEd9vahtFNGxU8WyzdY', 'scope': 'openid', 'code': 'NJJb4Jb0dRSRdhi2otw9t3tzNSxT0JDD2cSVhNWcLtw.SpJabZau0Sy-QoZOoU3E-bUXttzpsx1CKNVtawJGt5U', 'access_token': 'wZmh7uSO-21iONa8Wz5JiXM3qXXoa7TtDQbgxgwmskk.mKQiBf3K-my5jL5fJLuDM1sM2gfHwY0HrkT9ulgbcSg', 'state': 'YU2UQXVw8I71maWq', 'expires_in': 3599, 'token_type': 'bearer'}
3.436 AuthorizationResponse {
"access_token": "wZmh7uSO-21iONa8Wz5JiXM3qXXoa7TtDQbgxgwmskk.mKQiBf3K-my5jL5fJLuDM1sM2gfHwY0HrkT9ulgbcSg",
"code": "NJJb4Jb0dRSRdhi2otw9t3tzNSxT0JDD2cSVhNWcLtw.SpJabZau0Sy-QoZOoU3E-bUXttzpsx1CKNVtawJGt5U",
"expires_in": 3599,
"id_token": {
"at_hash": "_LMstnyQEvJ4PkM4VVcJyA",
"aud": [
"1efdb402-e473-4421-9a54-2f9c68d17173"
],
"auth_time": 1529751409,
"c_hash": "h16U09OubpAgL_I76gLBxQ",
"exp": 1529755264,
"iat": 1529751664,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "efa0c01a-5668-40b3-b2f5-03ed5fc7b9aa",
"nonce": "nHoSUgrkCs8hgmyP",
"rat": 1529751662,
"sub": "[email protected]"
},
"scope": "openid",
"state": "YU2UQXVw8I71maWq",
"token_type": "bearer"
}
3.436 phase <--<-- 4 --- AccessToken -->-->
3.436 --> request op_args: {'state': 'YU2UQXVw8I71maWq'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.436 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'YU2UQXVw8I71maWq', 'code': 'NJJb4Jb0dRSRdhi2otw9t3tzNSxT0JDD2cSVhNWcLtw.SpJabZau0Sy-QoZOoU3E-bUXttzpsx1CKNVtawJGt5U', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '1efdb402-e473-4421-9a54-2f9c68d17173'}, 'state': 'YU2UQXVw8I71maWq'}
3.436 AccessTokenRequest {
"code": "NJJb4Jb0dRSRdhi2otw9t3tzNSxT0JDD2cSVhNWcLtw.SpJabZau0Sy-QoZOoU3E-bUXttzpsx1CKNVtawJGt5U",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "YU2UQXVw8I71maWq"
}
3.436 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.436 request_http_args {'headers': {'Authorization': 'Basic MWVmZGI0MDItZTQ3My00NDIxLTlhNTQtMmY5YzY4ZDE3MTczOlFDYk5jTm1SSzNvJTdF', 'Content-Type': 'application/x-www-form-urlencoded'}}
3.436 request code=NJJb4Jb0dRSRdhi2otw9t3tzNSxT0JDD2cSVhNWcLtw.SpJabZau0Sy-QoZOoU3E-bUXttzpsx1CKNVtawJGt5U&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=YU2UQXVw8I71maWq
3.649 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.65 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiX0xNc3RueVFFdko0UGtNNFZWY0p5QSIsImF1ZCI6WyIxZWZkYjQwMi1lNDczLTQ0MjEtOWE1NC0yZjljNjhkMTcxNzMiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJoMTZVMDlPdWJwQWdMX0k3NmdMQnhRIiwiZXhwIjoxNTI5NzU1MjY0LCJpYXQiOjE1Mjk3NTE2NjUsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjgwODMzMGI0LTU1ZDgtNDA4My04ODVlLTcyZWEzOTRjNjc0NCIsIm5vbmNlIjoibkhvU1VncmtDczhoZ215UCIsInJhdCI6MTUyOTc1MTY2Miwic3ViIjoiZm9vQGJhci5jb20ifQ.SZo1nYIDFpakkDujmWtlt9AnUw8BFegqacWoE_7mLJDQnWumON5H9zpL5urVm5Y0HtY4SZYU6IJGV2vdkQjaRY6qw7gWJbeBwSaKU324IkPyLHhJTNrIcNSi6ldizmY8eG8mDEiG0uACqtlDoMnSWRAGq4lEFh3ggkqdvZzjxXHTEgU54I6uOvjy9N2My02Fo2D3l8ykjyas70vjK1VBD2y7jeaKP_bC5KsoU1ESgaz88rTKzbMmb_yOvv5CXHWoVDHDEza4I-vd9GTUGGR3VvEXPTxs7PjH9UpKo9NoKdl3KdKKlULpG278k00emoDiv1ZB7LMnJYD-GiF432AeFB1DxGYBVwbQiQvyBn_jpCZDCJRiVazyyObOvhSdzsheRgXpZhAIhwtwNeSP4zE9YiVB7m2ldyQYR3a9QXIyxWA54A9T674sGDKEIR0cPdgngwM8rtXQEzSHmiz_dxm449qawJfnuxWlTSarxSXi1WPgnfEYQJvtWE5POrcyI_eX90jX7awlLup1aLnNIJF8RuBddMtSFbWAsITqezEFWjTzbmkBrw_l99rithA1FtnMWoLm0aF2kOspd468Vd7Y8kIvwx6En55Le8vm1onAuBEu2DtYyHwWD4uVgS-bjOQfzhjuT0n7Nt_0uvyP-4vNlJ46BnqQI582o_D37rhpKgY', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'QxlS7yUCTQp0Xhvm43yofBwo7iLprqNzQXf5NaWwib4.ye63Oq3XSNraIYNoF0Gr2sQs339qe646GU9vYmGormM', 'scope': 'openid'}
3.653 AccessTokenResponse {
"access_token": "QxlS7yUCTQp0Xhvm43yofBwo7iLprqNzQXf5NaWwib4.ye63Oq3XSNraIYNoF0Gr2sQs339qe646GU9vYmGormM",
"expires_in": 3599,
"id_token": {
"at_hash": "_LMstnyQEvJ4PkM4VVcJyA",
"aud": [
"1efdb402-e473-4421-9a54-2f9c68d17173"
],
"auth_time": 1529751409,
"c_hash": "h16U09OubpAgL_I76gLBxQ",
"exp": 1529755264,
"iat": 1529751665,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "808330b4-55d8-4083-885e-72ea394c6744",
"nonce": "nHoSUgrkCs8hgmyP",
"rat": 1529751662,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.653 phase <--<-- 5 --- UserInfo -->-->
3.654 do_user_info_request kwargs:{'state': 'YU2UQXVw8I71maWq', 'method': 'GET', 'authn_method': 'bearer_header'}
3.654 request {'body': None}
3.654 request_url https://oidc-certification.ory.sh:8443/userinfo
3.654 request_http_args {'headers': {'Authorization': 'Bearer QxlS7yUCTQp0Xhvm43yofBwo7iLprqNzQXf5NaWwib4.ye63Oq3XSNraIYNoF0Gr2sQs339qe646GU9vYmGormM'}}
3.734 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
3.735 OpenIDSchema {
"sub": "[email protected]"
}
3.735 OpenIDSchema {
"sub": "[email protected]"
}
3.735 phase <--<-- 6 --- Done -->-->
3.735 end
3.735 assertion VerifyClaims
3.736 condition verify-claims: status=WARNING, message=Missing required claim: name [Verifies that the claims returned as UserInfo or in the ID Token is consistent with what was asked for]
3.736 assertion CheckHTTPResponse
3.736 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
3.736 condition Done: status=OK
============================================================
Conditions
verify-claims: status=WARNING, message=Missing required claim: name [Verifies that the claims returned as UserInfo or in the ID Token is consistent with what was asked for]
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
Missing required claim: name
./OP-prompt-none-LoggedIn.txt 0000644 0000000 0000000 00000053177 13313424243 016206 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-prompt-none-LoggedIn
Test description: Request with prompt=none when logged in [Basic, Implicit, Hybrid]
Timestamp: 2018-06-23T11:01:55Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.074 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.076 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.076 phase <--<-- 2 --- Registration -->-->
0.076 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.076 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#M273Gpr23SEbLMDq"
],
"response_types": [
"code id_token token"
]
}
0.247 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.247 RegistrationResponse {
"client_id": "97b70bf6-fa50-4f60-8418-d884561e8fb8",
"client_secret": "No93nkWL7-g6",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "97b70bf6-fa50-4f60-8418-d884561e8fb8",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#M273Gpr23SEbLMDq"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.248 phase <--<-- 3 --- AsyncAuthn -->-->
0.248 AuthorizationRequest {
"client_id": "97b70bf6-fa50-4f60-8418-d884561e8fb8",
"nonce": "vihegu9iKV5MezWA",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid",
"state": "h7DrddTXWFs1IGPr"
}
0.248 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=97b70bf6-fa50-4f60-8418-d884561e8fb8&state=h7DrddTXWFs1IGPr&response_type=code+id_token+token&nonce=vihegu9iKV5MezWA
0.248 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=97b70bf6-fa50-4f60-8418-d884561e8fb8&state=h7DrddTXWFs1IGPr&response_type=code+id_token+token&nonce=vihegu9iKV5MezWA
2.465 http args {}
2.638 response URL with fragment
2.638 response access_token=2hdFs3FFz-4HQB-Vj4u1G_QlI2x14mwE0FYVKCbmjw8.p51spcmRDQo63nMcauJA1LAUIiDlwU3VrPvpDTcGrHY&code=q6-9Fizr3rWH4apiIkANVl7VDDtv0u44PIknjiJIcDg.U_UTYlE9L1Qtd_AcJpKDx4hP3fhv3J8gIwjvBeAGTPU&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoibU5nV29CVFVoRTloM01qZGhodmtxZyIsImF1ZCI6WyI5N2I3MGJmNi1mYTUwLTRmNjAtODQxOC1kODg0NTYxZThmYjgiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiJ2WTFSUEctUTJDa2g2RDhma0oyRHpRIiwiZXhwIjoxNTI5NzU1MzEyLCJpYXQiOjE1Mjk3NTE3MTIsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImU5YTgyZWFjLWRjZWItNGQ0OS05NjljLTA3MzM5ZTVjM2Y2ZCIsIm5vbmNlIjoidmloZWd1OWlLVjVNZXpXQSIsInJhdCI6MTUyOTc1MTcxMCwic3ViIjoiZm9vQGJhci5jb20ifQ.f-FKlCJ5czCRONL537v_F9z73j0saBKgnQ_HAfa10EmSzJxnqjn3tHcrintoojPO_e7makK4KvIAy2oHGNyt1bDG4oJ8rZ3S-gfKRVQ1nNIB9gjN3SPWHNePUpEFoiKT9N9dTVAOn_SCznD_h1EMYWuclgNH-G0ISG0XI9BBNhV7porbX_v1XKvq9ozU6dAPOIQ7zJ2KQS6Ddpgoe6u7o_lh98sAtgCuf_0x5-QMVi-TU9cKB3qUK4EfejwUGFCohimxSwekE7qcT9eIEGQr8dgAe2mttbVj6Se4aSuD47-cJMf90UHY-ZZ8hb1rR6XQSwQi9LxTuUg7_X9bXQg2i0cDCDGyBa2YBZjSsSbcOJUJaFzG-kpVYrPn4r0aknauxP5mW2X3jABoIACqLjZJ0qkGYVM2BLWqRPuaYAGpDEh2iF6sStCtEC-fNRgfuodOkXY6T62qVTp1F8WwEZ0815yAVEwt3gVvIoL6n7cmT-0yLFlfqkXZADyLvkyASfy5XKSs1cHGD1eiD1-_t5ZP5L-w0pBidT2ZJ0Uk-kkCD_9gXY_AxYz4BNEIbre0xoePj-l1yJ2JiLYRdOPK45B8luXYd7t2GpZim0pxApQ3UK_yjRTOv6hE-U57D4f5zeSTirbR20o5S9xeoaqC2Mel4QBPn323SKDtKWMmD8W1A2o&scope=openid&state=h7DrddTXWFs1IGPr&token_type=bearer
2.639 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoibU5nV29CVFVoRTloM01qZGhodmtxZyIsImF1ZCI6WyI5N2I3MGJmNi1mYTUwLTRmNjAtODQxOC1kODg0NTYxZThmYjgiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiJ2WTFSUEctUTJDa2g2RDhma0oyRHpRIiwiZXhwIjoxNTI5NzU1MzEyLCJpYXQiOjE1Mjk3NTE3MTIsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImU5YTgyZWFjLWRjZWItNGQ0OS05NjljLTA3MzM5ZTVjM2Y2ZCIsIm5vbmNlIjoidmloZWd1OWlLVjVNZXpXQSIsInJhdCI6MTUyOTc1MTcxMCwic3ViIjoiZm9vQGJhci5jb20ifQ.f-FKlCJ5czCRONL537v_F9z73j0saBKgnQ_HAfa10EmSzJxnqjn3tHcrintoojPO_e7makK4KvIAy2oHGNyt1bDG4oJ8rZ3S-gfKRVQ1nNIB9gjN3SPWHNePUpEFoiKT9N9dTVAOn_SCznD_h1EMYWuclgNH-G0ISG0XI9BBNhV7porbX_v1XKvq9ozU6dAPOIQ7zJ2KQS6Ddpgoe6u7o_lh98sAtgCuf_0x5-QMVi-TU9cKB3qUK4EfejwUGFCohimxSwekE7qcT9eIEGQr8dgAe2mttbVj6Se4aSuD47-cJMf90UHY-ZZ8hb1rR6XQSwQi9LxTuUg7_X9bXQg2i0cDCDGyBa2YBZjSsSbcOJUJaFzG-kpVYrPn4r0aknauxP5mW2X3jABoIACqLjZJ0qkGYVM2BLWqRPuaYAGpDEh2iF6sStCtEC-fNRgfuodOkXY6T62qVTp1F8WwEZ0815yAVEwt3gVvIoL6n7cmT-0yLFlfqkXZADyLvkyASfy5XKSs1cHGD1eiD1-_t5ZP5L-w0pBidT2ZJ0Uk-kkCD_9gXY_AxYz4BNEIbre0xoePj-l1yJ2JiLYRdOPK45B8luXYd7t2GpZim0pxApQ3UK_yjRTOv6hE-U57D4f5zeSTirbR20o5S9xeoaqC2Mel4QBPn323SKDtKWMmD8W1A2o', 'scope': 'openid', 'code': 'q6-9Fizr3rWH4apiIkANVl7VDDtv0u44PIknjiJIcDg.U_UTYlE9L1Qtd_AcJpKDx4hP3fhv3J8gIwjvBeAGTPU', 'access_token': '2hdFs3FFz-4HQB-Vj4u1G_QlI2x14mwE0FYVKCbmjw8.p51spcmRDQo63nMcauJA1LAUIiDlwU3VrPvpDTcGrHY', 'state': 'h7DrddTXWFs1IGPr', 'expires_in': 3599, 'token_type': 'bearer'}
2.72 AuthorizationResponse {
"access_token": "2hdFs3FFz-4HQB-Vj4u1G_QlI2x14mwE0FYVKCbmjw8.p51spcmRDQo63nMcauJA1LAUIiDlwU3VrPvpDTcGrHY",
"code": "q6-9Fizr3rWH4apiIkANVl7VDDtv0u44PIknjiJIcDg.U_UTYlE9L1Qtd_AcJpKDx4hP3fhv3J8gIwjvBeAGTPU",
"expires_in": 3599,
"id_token": {
"at_hash": "mNgWoBTUhE9h3Mjdhhvkqg",
"aud": [
"97b70bf6-fa50-4f60-8418-d884561e8fb8"
],
"auth_time": 1529751698,
"c_hash": "vY1RPG-Q2Ckh6D8fkJ2DzQ",
"exp": 1529755312,
"iat": 1529751712,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "e9a82eac-dceb-4d49-969c-07339e5c3f6d",
"nonce": "vihegu9iKV5MezWA",
"rat": 1529751710,
"sub": "[email protected]"
},
"scope": "openid",
"state": "h7DrddTXWFs1IGPr",
"token_type": "bearer"
}
2.72 phase <--<-- 4 --- AccessToken -->-->
2.72 --> request op_args: {'state': 'h7DrddTXWFs1IGPr'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.72 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'h7DrddTXWFs1IGPr', 'code': 'q6-9Fizr3rWH4apiIkANVl7VDDtv0u44PIknjiJIcDg.U_UTYlE9L1Qtd_AcJpKDx4hP3fhv3J8gIwjvBeAGTPU', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '97b70bf6-fa50-4f60-8418-d884561e8fb8'}, 'state': 'h7DrddTXWFs1IGPr'}
2.72 AccessTokenRequest {
"code": "q6-9Fizr3rWH4apiIkANVl7VDDtv0u44PIknjiJIcDg.U_UTYlE9L1Qtd_AcJpKDx4hP3fhv3J8gIwjvBeAGTPU",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "h7DrddTXWFs1IGPr"
}
2.72 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.72 request_http_args {'headers': {'Authorization': 'Basic OTdiNzBiZjYtZmE1MC00ZjYwLTg0MTgtZDg4NDU2MWU4ZmI4Ok5vOTNua1dMNy1nNg==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.72 request code=q6-9Fizr3rWH4apiIkANVl7VDDtv0u44PIknjiJIcDg.U_UTYlE9L1Qtd_AcJpKDx4hP3fhv3J8gIwjvBeAGTPU&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=h7DrddTXWFs1IGPr
2.935 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.936 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoibU5nV29CVFVoRTloM01qZGhodmtxZyIsImF1ZCI6WyI5N2I3MGJmNi1mYTUwLTRmNjAtODQxOC1kODg0NTYxZThmYjgiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiJ2WTFSUEctUTJDa2g2RDhma0oyRHpRIiwiZXhwIjoxNTI5NzU1MzEyLCJpYXQiOjE1Mjk3NTE3MTIsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjRkZTViNzNkLTJiOGYtNDhhMC05YjIwLTY5ODk4MjBkOGU3MCIsIm5vbmNlIjoidmloZWd1OWlLVjVNZXpXQSIsInJhdCI6MTUyOTc1MTcxMCwic3ViIjoiZm9vQGJhci5jb20ifQ.RNRghaqU5dKkrOE0tU9GBtKm5qWCgrjkEOm788IYVZ_1vtGCuwg6JjGj3Pwg6dyeYXdxU0pOZkfo3An5Fb_kgZ-4lZIC8QejCIgQWaipyqdDab6YfOy6XbduIbaoj2ta9Z-kT4jRsjiW_aBx2L4evCujkuBWn09DlDEXTfTZD4cjcmAgiauH0EiAYLP5bhYmfWNhUbeLs-NQsOlr6vcOkhd_0iuKlF9Mlk6xV3Ev48dIZX6eZPVFlIvECCx292p2zcDvPIC4qbTT65JxDvBab5bEgs_2bjo2VCcEqy5BvFatD_xh7MVhOgRz-iS7KOo7vQbXfRshfIN3bsCTDSCaI_PQOswwL7xn9Nbg4G8SNMv1txFgK-ZrwdGijYhBGsJTouu59fhtiFaHFdtx05VXU-zSgnDo21rXO7oJfoCYpDg81JapSD2a-0VBHZ1AGQJAoW6w1BYX8R9rCJzkifGJDG1hvywOqlm9mEPh4HM49aZbTyBFNzfB5fbuhh-sbfDdUpon3P9jSF_NDqJacs1ln_V-PsVj5zf_SslGTyFFjESg9gAjg2BSQYJQw6Qj5CvXB2OElh8xfSUdaR4sYce_j4x7AKfeklZOSuTtpZtsL-8GZNNwcyYuD2HiT2aDXCCmmpeMpkElHIe7YAYuc639HywYp1blpPNrJev8s_w6_00', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'cg04rZmS2cf0BPQ9di4De4eft-lVGutM41csUBHmcFM.qhtaWQ-7i3KS9FIn_ibSTvmqBdhw2w18-__fuLCu2_s', 'scope': 'openid'}
2.94 AccessTokenResponse {
"access_token": "cg04rZmS2cf0BPQ9di4De4eft-lVGutM41csUBHmcFM.qhtaWQ-7i3KS9FIn_ibSTvmqBdhw2w18-__fuLCu2_s",
"expires_in": 3599,
"id_token": {
"at_hash": "mNgWoBTUhE9h3Mjdhhvkqg",
"aud": [
"97b70bf6-fa50-4f60-8418-d884561e8fb8"
],
"auth_time": 1529751698,
"c_hash": "vY1RPG-Q2Ckh6D8fkJ2DzQ",
"exp": 1529755312,
"iat": 1529751712,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "4de5b73d-2b8f-48a0-9b20-6989820d8e70",
"nonce": "vihegu9iKV5MezWA",
"rat": 1529751710,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
2.94 phase <--<-- 5 --- AsyncAuthn -->-->
2.94 AuthorizationRequest {
"client_id": "97b70bf6-fa50-4f60-8418-d884561e8fb8",
"nonce": "URPSKu2r4kAvz4J7",
"prompt": [
"none"
],
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid",
"state": "LIvRHlTYqtR1NyXn"
}
2.941 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=97b70bf6-fa50-4f60-8418-d884561e8fb8&state=LIvRHlTYqtR1NyXn&response_type=code+id_token+token&nonce=URPSKu2r4kAvz4J7
2.941 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=97b70bf6-fa50-4f60-8418-d884561e8fb8&state=LIvRHlTYqtR1NyXn&response_type=code+id_token+token&nonce=URPSKu2r4kAvz4J7
4.97 http args {}
5.127 response URL with fragment
5.127 response access_token=v4tq-rsf1QFqVne0sgo2ow8ybqGEBH0Wnf5xwKhuOwo.6k3vXZ0TxylkWVfDPIMMcx8frfK7tC8XESMYwPfUXNg&code=jSkE8swro2JAB_uvM2MLJW2oPFqf-jcqLIDplBb3NCk.sLBVFgq0HLjBGIS9M4pD-DVEr1V2o8BJQ_Najax_aWc&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiY2FDel9TRzNkdTRJaTR4R0JzTmZUUSIsImF1ZCI6WyI5N2I3MGJmNi1mYTUwLTRmNjAtODQxOC1kODg0NTYxZThmYjgiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiJZNmdmNTRfUVdYWnZxNTZYREVSOC1nIiwiZXhwIjoxNTI5NzU1MzE0LCJpYXQiOjE1Mjk3NTE3MTQsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImNkZDg5YmI4LTQ4YzYtNDc3MC1hZTUxLTVmMjNmYWZlOWQ0ZiIsIm5vbmNlIjoiVVJQU0t1MnI0a0F2ejRKNyIsInJhdCI6MTUyOTc1MTcxMywic3ViIjoiZm9vQGJhci5jb20ifQ.hiFJr01aBSM8mRG1KfKAPIte0Xl7TTpwDxOAL7KTEtLrScmCfdIvPvlfHuCH0tewFDvu-G5XhMcb5frCqMmSVdHtsci42M4LKCOn4sjZtmbxrAVZPKIoRSJVXGmWIfJXGndYUtvPjXKNR8hOPUtHGZcL6kTNcj1hy7-TPw0ZO_YI-oNuSwCx2h8TrpklMsmiSmj6vdOjjajxe_KmaKK11aO8cLTQsj9-lZk-TH1a23PlRaYMNGyWK_KZ0iqLuEl1DFkFxmQag5TYd6-xCQW06SgZwkGTbgcHmuZSvYeshkecCELb29CjjMsqFw3w3Aq3DcVPNlBm14re8BY5hcsV7j9stSwSrcoUHS0w2WD_2rQvL4iCOoFcVyoLEwwKcNkl27ul7Hv4ZsAa6otrj7y4TzVPoweVtoM7XcgXTeQmhFXzppMhkPB4LOHC-JBGT8zI9BhubwLv8FvlLpY_RrgpGljDW99683nI1n8N25pXEUr1OaRFEDQzocq1J7giLU9dEhf51xFRfc5Ycoqq2p8Y9h9voFBZiXZTolnDoIaJNAWUu7NChwBESMwT5nwSHYn_ga86wYhN4A4Z_Md4RoCyNpQOJpUdFsc_goDS4PwK2aVROwcYUJghfgZ_3SQNziX9rS5L1RrLpIuZtPXKcYH7hsUsJPviMeXsL00K3P0Jyck&scope=openid&state=LIvRHlTYqtR1NyXn&token_type=bearer
5.128 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiY2FDel9TRzNkdTRJaTR4R0JzTmZUUSIsImF1ZCI6WyI5N2I3MGJmNi1mYTUwLTRmNjAtODQxOC1kODg0NTYxZThmYjgiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiJZNmdmNTRfUVdYWnZxNTZYREVSOC1nIiwiZXhwIjoxNTI5NzU1MzE0LCJpYXQiOjE1Mjk3NTE3MTQsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImNkZDg5YmI4LTQ4YzYtNDc3MC1hZTUxLTVmMjNmYWZlOWQ0ZiIsIm5vbmNlIjoiVVJQU0t1MnI0a0F2ejRKNyIsInJhdCI6MTUyOTc1MTcxMywic3ViIjoiZm9vQGJhci5jb20ifQ.hiFJr01aBSM8mRG1KfKAPIte0Xl7TTpwDxOAL7KTEtLrScmCfdIvPvlfHuCH0tewFDvu-G5XhMcb5frCqMmSVdHtsci42M4LKCOn4sjZtmbxrAVZPKIoRSJVXGmWIfJXGndYUtvPjXKNR8hOPUtHGZcL6kTNcj1hy7-TPw0ZO_YI-oNuSwCx2h8TrpklMsmiSmj6vdOjjajxe_KmaKK11aO8cLTQsj9-lZk-TH1a23PlRaYMNGyWK_KZ0iqLuEl1DFkFxmQag5TYd6-xCQW06SgZwkGTbgcHmuZSvYeshkecCELb29CjjMsqFw3w3Aq3DcVPNlBm14re8BY5hcsV7j9stSwSrcoUHS0w2WD_2rQvL4iCOoFcVyoLEwwKcNkl27ul7Hv4ZsAa6otrj7y4TzVPoweVtoM7XcgXTeQmhFXzppMhkPB4LOHC-JBGT8zI9BhubwLv8FvlLpY_RrgpGljDW99683nI1n8N25pXEUr1OaRFEDQzocq1J7giLU9dEhf51xFRfc5Ycoqq2p8Y9h9voFBZiXZTolnDoIaJNAWUu7NChwBESMwT5nwSHYn_ga86wYhN4A4Z_Md4RoCyNpQOJpUdFsc_goDS4PwK2aVROwcYUJghfgZ_3SQNziX9rS5L1RrLpIuZtPXKcYH7hsUsJPviMeXsL00K3P0Jyck', 'scope': 'openid', 'code': 'jSkE8swro2JAB_uvM2MLJW2oPFqf-jcqLIDplBb3NCk.sLBVFgq0HLjBGIS9M4pD-DVEr1V2o8BJQ_Najax_aWc', 'access_token': 'v4tq-rsf1QFqVne0sgo2ow8ybqGEBH0Wnf5xwKhuOwo.6k3vXZ0TxylkWVfDPIMMcx8frfK7tC8XESMYwPfUXNg', 'state': 'LIvRHlTYqtR1NyXn', 'expires_in': 3599, 'token_type': 'bearer'}
5.131 AuthorizationResponse {
"access_token": "v4tq-rsf1QFqVne0sgo2ow8ybqGEBH0Wnf5xwKhuOwo.6k3vXZ0TxylkWVfDPIMMcx8frfK7tC8XESMYwPfUXNg",
"code": "jSkE8swro2JAB_uvM2MLJW2oPFqf-jcqLIDplBb3NCk.sLBVFgq0HLjBGIS9M4pD-DVEr1V2o8BJQ_Najax_aWc",
"expires_in": 3599,
"id_token": {
"at_hash": "caCz_SG3du4Ii4xGBsNfTQ",
"aud": [
"97b70bf6-fa50-4f60-8418-d884561e8fb8"
],
"auth_time": 1529751698,
"c_hash": "Y6gf54_QWXZvq56XDER8-g",
"exp": 1529755314,
"iat": 1529751714,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "cdd89bb8-48c6-4770-ae51-5f23fafe9d4f",
"nonce": "URPSKu2r4kAvz4J7",
"rat": 1529751713,
"sub": "[email protected]"
},
"scope": "openid",
"state": "LIvRHlTYqtR1NyXn",
"token_type": "bearer"
}
5.131 phase <--<-- 6 --- AccessToken -->-->
5.131 --> request op_args: {'state': 'LIvRHlTYqtR1NyXn'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
5.131 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'LIvRHlTYqtR1NyXn', 'code': 'jSkE8swro2JAB_uvM2MLJW2oPFqf-jcqLIDplBb3NCk.sLBVFgq0HLjBGIS9M4pD-DVEr1V2o8BJQ_Najax_aWc', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '97b70bf6-fa50-4f60-8418-d884561e8fb8'}, 'state': 'LIvRHlTYqtR1NyXn'}
5.132 AccessTokenRequest {
"code": "jSkE8swro2JAB_uvM2MLJW2oPFqf-jcqLIDplBb3NCk.sLBVFgq0HLjBGIS9M4pD-DVEr1V2o8BJQ_Najax_aWc",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "LIvRHlTYqtR1NyXn"
}
5.132 request_url https://oidc-certification.ory.sh:8443/oauth2/token
5.132 request_http_args {'headers': {'Authorization': 'Basic OTdiNzBiZjYtZmE1MC00ZjYwLTg0MTgtZDg4NDU2MWU4ZmI4Ok5vOTNua1dMNy1nNg==', 'Content-Type': 'application/x-www-form-urlencoded'}}
5.132 request code=jSkE8swro2JAB_uvM2MLJW2oPFqf-jcqLIDplBb3NCk.sLBVFgq0HLjBGIS9M4pD-DVEr1V2o8BJQ_Najax_aWc&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=LIvRHlTYqtR1NyXn
5.35 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
5.351 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiY2FDel9TRzNkdTRJaTR4R0JzTmZUUSIsImF1ZCI6WyI5N2I3MGJmNi1mYTUwLTRmNjAtODQxOC1kODg0NTYxZThmYjgiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiJZNmdmNTRfUVdYWnZxNTZYREVSOC1nIiwiZXhwIjoxNTI5NzU1MzE0LCJpYXQiOjE1Mjk3NTE3MTUsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjM3MzA3Mjc3LTA1OWMtNDRjZi04MGYwLTI3NzgwNzgzMjkyYyIsIm5vbmNlIjoiVVJQU0t1MnI0a0F2ejRKNyIsInJhdCI6MTUyOTc1MTcxMywic3ViIjoiZm9vQGJhci5jb20ifQ.eD90uMh19BEcSE3XgsoMikh6pYpmo8TSX_2V4cqYXoh8GVY-92OL8WrlmBprxvPG6N_HJeuhcMM2oRLn5tJATDmSPfy_t8Z8wXftIVnkiwuFMJTHKZZCiy5wIx4_xXyMyMq7EboQbGIvwuw8ZCfeAIfv0Ms01ojToqeA2aSBHW7Ug9EKi3jFzCMhNHu2zRPt01NUIsEwxjzjcxcfjlmgJXs-it0v4pNZlspprdgcgEZvFK_cQZ9Yf5uAFw7j6TytB6kN-1t3INKJeHytagRTGQzr7ajtcTHkzN16sAzFf100C4Zk3fhFT7xa6ge_1fVl9wjUit7eBsBlscGxkw_y2SNY1LcBCmH6khY923-JM_lLFZaJK72lO5NccBfmw6BeUxWuSIG8ulYEZmncRqld_XkT5Ynz1KZgQyI2gLvsUHJLFvoYF2TMR1-hwSWUNmOG_guSrfWKgRsO2gqemcdTmTi5zrpi_3pkqR0oN8klsZQU8GtC6HN2IXA7h4OLqaa6J2y-QyuEcWsx1aLzuEv2MLXonSMXuwE4W07DOsDEjzMm4O3R_pm4ZLyR9TDM5CvR1-DcdubtbxA7pSlYOEjjRGn0Ke1sjrigRUL_Yx2Gz051MA0tqdKEDScpk3vWE0Xe9v7h231Zc9d5509MDNeyupGIl_q8nZO_Je1HSk-Q0xs', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'rJLIwR8XVmiwfZy4eTSxst7l6Zeg_pZ--IVaBJkMDoE.UrtkxScyb2R5U39dcsINFOpIcLsXNVHiAPpxg5et3Ok', 'scope': 'openid'}
5.355 AccessTokenResponse {
"access_token": "rJLIwR8XVmiwfZy4eTSxst7l6Zeg_pZ--IVaBJkMDoE.UrtkxScyb2R5U39dcsINFOpIcLsXNVHiAPpxg5et3Ok",
"expires_in": 3599,
"id_token": {
"at_hash": "caCz_SG3du4Ii4xGBsNfTQ",
"aud": [
"97b70bf6-fa50-4f60-8418-d884561e8fb8"
],
"auth_time": 1529751698,
"c_hash": "Y6gf54_QWXZvq56XDER8-g",
"exp": 1529755314,
"iat": 1529751715,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "37307277-059c-44cf-80f0-27780783292c",
"nonce": "URPSKu2r4kAvz4J7",
"rat": 1529751713,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
5.355 phase <--<-- 7 --- Done -->-->
5.355 end
5.355 assertion VerifyResponse
5.355 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
5.356 assertion SameAuthn
5.356 condition same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
5.356 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Req-max_age=1.txt 0000644 0000000 0000000 00000064266 13313424423 014547 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-max_age=1
Test description: Requesting ID Token with max_age=1 seconds restriction
Timestamp: 2018-06-23T11:03:47Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Registration -->-->
0.075 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.075 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#EhfjHK0qTCI44CFt"
],
"response_types": [
"code id_token token"
]
}
0.229 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.23 RegistrationResponse {
"client_id": "212361e7-d369-49b9-9dd6-5c0d1aa38f4d",
"client_secret": "m-UZx7s9T2VW",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "212361e7-d369-49b9-9dd6-5c0d1aa38f4d",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#EhfjHK0qTCI44CFt"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.23 phase <--<-- 3 --- AsyncAuthn -->-->
0.231 AuthorizationRequest {
"client_id": "212361e7-d369-49b9-9dd6-5c0d1aa38f4d",
"nonce": "WoZ1sp3wvFnrzbVN",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid",
"state": "WhG7jR7LexRElDl5"
}
0.231 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=212361e7-d369-49b9-9dd6-5c0d1aa38f4d&state=WhG7jR7LexRElDl5&response_type=code+id_token+token&nonce=WoZ1sp3wvFnrzbVN
0.231 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=212361e7-d369-49b9-9dd6-5c0d1aa38f4d&state=WhG7jR7LexRElDl5&response_type=code+id_token+token&nonce=WoZ1sp3wvFnrzbVN
4.198 http args {}
4.374 response URL with fragment
4.374 response access_token=qIa6IhOipyGccY0vIMoM8G5yjonIyt3QsLu2yIHONjI.c-l_gmdXm7UnQTvuey2JNF2Ud2B9yi1oyyF5HHu1oYI&code=xc-ChvEYnJIFwttb25AYEi072Y1-nzBPpaVV1QWHvEk.ALfkWR5GKTZ9X1pY13-vkHAW_EQco66flCg0t9hWK9U&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiVDlPLVhKcFhDOGxxSGkyVDNuS2ZsZyIsImF1ZCI6WyIyMTIzNjFlNy1kMzY5LTQ5YjktOWRkNi01YzBkMWFhMzhmNGQiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiJZQTRTRjNsNWsxb0JtQm9zbWY1UjJ3IiwiZXhwIjoxNTI5NzU1NDE4LCJpYXQiOjE1Mjk3NTE4MTgsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjJlNWJlZWRmLWM2ODgtNDc2Ny04N2E2LTZmZWFiYzUyYWVlNCIsIm5vbmNlIjoiV29aMXNwM3d2Rm5yemJWTiIsInJhdCI6MTUyOTc1MTgxNCwic3ViIjoiZm9vQGJhci5jb20ifQ.FMG1PEWW8Zyqb_MfWZ0dr3HmjChcNk35kbvAc_Qoz68cUlX4ZjuT4zzbbNXrqXyvMECUOSxdXVPZe9cPXzSGV8OGaIwHBrQahMQZQImyILrEgImHqEGdOqLZ_gBXcEEop9DgWuA2Ag16bGLboDdo3ACFUG9KNemIbrKmX1wE-wSZmlp6l7jRfzsLuaFKfYzGLSPhv8hg94d25SDbnptLt1dKqOdyGe8gWU497XPNofGwZzZDwtui1xieaw-gGBk2az3SCzv1yjAy7LQfSgtfoSquU_e9iTkHF9ftUPbMZIbz2XUO-MtfUnF3e3_zW5NXmmtlVchf_th-xry0vLoZRSFhAvrhtMAT0sVngmwPI5nQcBM6pyAAGkTnEJ0JV9gf1Qf01gwKm-41ts_Y7xk_FBjfA6gEOF_Kk9ARxJmyu_SmCOR5-33KaVABxPomYfKMu342toWVPecgdfVFmPKL23cQKMRhxH_gROL1meYLSCpRGcnlqtTO2TjIJTP9OtBQ0VCILTNpqkWSD5BPm5OtuVpch_gpeBP0md613gcr4bw2_pp27XDK8U66MYClKKaPrOw7Glp7Zl6nigUuxcc8NXMWJpfTw1HNWh4QqPf-sIoPOMKSpY0XpqKbxnPqukKRu8GB34hpk6q-Ste7kEAum_KkbnkpFYPGGLvgZlqOUFQ&scope=openid&state=WhG7jR7LexRElDl5&token_type=bearer
4.375 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiVDlPLVhKcFhDOGxxSGkyVDNuS2ZsZyIsImF1ZCI6WyIyMTIzNjFlNy1kMzY5LTQ5YjktOWRkNi01YzBkMWFhMzhmNGQiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiJZQTRTRjNsNWsxb0JtQm9zbWY1UjJ3IiwiZXhwIjoxNTI5NzU1NDE4LCJpYXQiOjE1Mjk3NTE4MTgsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjJlNWJlZWRmLWM2ODgtNDc2Ny04N2E2LTZmZWFiYzUyYWVlNCIsIm5vbmNlIjoiV29aMXNwM3d2Rm5yemJWTiIsInJhdCI6MTUyOTc1MTgxNCwic3ViIjoiZm9vQGJhci5jb20ifQ.FMG1PEWW8Zyqb_MfWZ0dr3HmjChcNk35kbvAc_Qoz68cUlX4ZjuT4zzbbNXrqXyvMECUOSxdXVPZe9cPXzSGV8OGaIwHBrQahMQZQImyILrEgImHqEGdOqLZ_gBXcEEop9DgWuA2Ag16bGLboDdo3ACFUG9KNemIbrKmX1wE-wSZmlp6l7jRfzsLuaFKfYzGLSPhv8hg94d25SDbnptLt1dKqOdyGe8gWU497XPNofGwZzZDwtui1xieaw-gGBk2az3SCzv1yjAy7LQfSgtfoSquU_e9iTkHF9ftUPbMZIbz2XUO-MtfUnF3e3_zW5NXmmtlVchf_th-xry0vLoZRSFhAvrhtMAT0sVngmwPI5nQcBM6pyAAGkTnEJ0JV9gf1Qf01gwKm-41ts_Y7xk_FBjfA6gEOF_Kk9ARxJmyu_SmCOR5-33KaVABxPomYfKMu342toWVPecgdfVFmPKL23cQKMRhxH_gROL1meYLSCpRGcnlqtTO2TjIJTP9OtBQ0VCILTNpqkWSD5BPm5OtuVpch_gpeBP0md613gcr4bw2_pp27XDK8U66MYClKKaPrOw7Glp7Zl6nigUuxcc8NXMWJpfTw1HNWh4QqPf-sIoPOMKSpY0XpqKbxnPqukKRu8GB34hpk6q-Ste7kEAum_KkbnkpFYPGGLvgZlqOUFQ', 'scope': 'openid', 'code': 'xc-ChvEYnJIFwttb25AYEi072Y1-nzBPpaVV1QWHvEk.ALfkWR5GKTZ9X1pY13-vkHAW_EQco66flCg0t9hWK9U', 'access_token': 'qIa6IhOipyGccY0vIMoM8G5yjonIyt3QsLu2yIHONjI.c-l_gmdXm7UnQTvuey2JNF2Ud2B9yi1oyyF5HHu1oYI', 'state': 'WhG7jR7LexRElDl5', 'expires_in': 3599, 'token_type': 'bearer'}
4.455 AuthorizationResponse {
"access_token": "qIa6IhOipyGccY0vIMoM8G5yjonIyt3QsLu2yIHONjI.c-l_gmdXm7UnQTvuey2JNF2Ud2B9yi1oyyF5HHu1oYI",
"code": "xc-ChvEYnJIFwttb25AYEi072Y1-nzBPpaVV1QWHvEk.ALfkWR5GKTZ9X1pY13-vkHAW_EQco66flCg0t9hWK9U",
"expires_in": 3599,
"id_token": {
"at_hash": "T9O-XJpXC8lqHi2T3nKflg",
"aud": [
"212361e7-d369-49b9-9dd6-5c0d1aa38f4d"
],
"auth_time": 1529751698,
"c_hash": "YA4SF3l5k1oBmBosmf5R2w",
"exp": 1529755418,
"iat": 1529751818,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "2e5beedf-c688-4767-87a6-6feabc52aee4",
"nonce": "WoZ1sp3wvFnrzbVN",
"rat": 1529751814,
"sub": "[email protected]"
},
"scope": "openid",
"state": "WhG7jR7LexRElDl5",
"token_type": "bearer"
}
4.455 phase <--<-- 4 --- AccessToken -->-->
4.455 --> request op_args: {'state': 'WhG7jR7LexRElDl5'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
4.455 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'WhG7jR7LexRElDl5', 'code': 'xc-ChvEYnJIFwttb25AYEi072Y1-nzBPpaVV1QWHvEk.ALfkWR5GKTZ9X1pY13-vkHAW_EQco66flCg0t9hWK9U', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '212361e7-d369-49b9-9dd6-5c0d1aa38f4d'}, 'state': 'WhG7jR7LexRElDl5'}
4.455 AccessTokenRequest {
"code": "xc-ChvEYnJIFwttb25AYEi072Y1-nzBPpaVV1QWHvEk.ALfkWR5GKTZ9X1pY13-vkHAW_EQco66flCg0t9hWK9U",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "WhG7jR7LexRElDl5"
}
4.456 request_url https://oidc-certification.ory.sh:8443/oauth2/token
4.456 request_http_args {'headers': {'Authorization': 'Basic MjEyMzYxZTctZDM2OS00OWI5LTlkZDYtNWMwZDFhYTM4ZjRkOm0tVVp4N3M5VDJWVw==', 'Content-Type': 'application/x-www-form-urlencoded'}}
4.456 request code=xc-ChvEYnJIFwttb25AYEi072Y1-nzBPpaVV1QWHvEk.ALfkWR5GKTZ9X1pY13-vkHAW_EQco66flCg0t9hWK9U&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=WhG7jR7LexRElDl5
4.672 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
4.673 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiVDlPLVhKcFhDOGxxSGkyVDNuS2ZsZyIsImF1ZCI6WyIyMTIzNjFlNy1kMzY5LTQ5YjktOWRkNi01YzBkMWFhMzhmNGQiXSwiYXV0aF90aW1lIjoxNTI5NzUxNjk4LCJjX2hhc2giOiJZQTRTRjNsNWsxb0JtQm9zbWY1UjJ3IiwiZXhwIjoxNTI5NzU1NDE4LCJpYXQiOjE1Mjk3NTE4MTgsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjhlYTFiODQ1LTJkOTAtNDVlNC1iMTA3LWNhNTI5YjMyZDlmMSIsIm5vbmNlIjoiV29aMXNwM3d2Rm5yemJWTiIsInJhdCI6MTUyOTc1MTgxNCwic3ViIjoiZm9vQGJhci5jb20ifQ.HKASrmy2moyKIry0tR5rMeao41M08Aw5d6AzdpZNDwODlPjf8IPkBLZYStOVXS5608n-Qd0PJMYOQ5D0xQGYKfvVa_TuPwGPrvBAeewth49Mc-j5ufmQGeRYG0wJ35BUzH3OZbXwQWLLQG2IhIofiGX2OlSANfjsGlbLsr2Fnks3APh8-kJse8_sZIwYUbu23FDfdogxN4if7pkpcMyXD5O5185OxqeoSHsLjG2Qn5UQajdYmALdPDvaTrsltFp8lmG9NQmdgQlJQ3fnlM7BzwOBUApKYRIomFEkQawau4-Ah_rm7lHsiOf8YplNspbL2DpsxSwOJtPEiv26Ap7l4weV_iVtnxJ9gHNqy35aAaN9_6u3hONt3td1znmEs6gTgorqcq45i0ZbMTk2wle1DcjOFlwfKOjQ_bPhMLiFQyiOdMVoqFiMERRFZFyXhBHfXVZQm04svYQmKefFfu4VDi3LLKyiPkQWPsRtpyIw_CfREcXJk6LKUKz3lrysDg1IB0Km8ij7nBrnv06jG6tWn1b2GM6ojtjl5qckcYtaRCngKcPA8MLyqCSPhbMToPT5Hrlg1czPCx0Wi_f4Dc_VwGWqtSvji7KK64K_3Ffy19K9IZk8zm0o1aLGg9St3cJ8xkDtNCbOJkTgQSylaKuwzSBlEQiskMCxrSpaj9fQ5dE', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': '4CQtO51nrnVp2NgB4KSG-z95Q3-_K51zHxsSPdPwv-8._4qTkpvwe3ZPL5liaUwLodyipQZ_WulRA_dKjZ0ifGc', 'scope': 'openid'}
4.676 AccessTokenResponse {
"access_token": "4CQtO51nrnVp2NgB4KSG-z95Q3-_K51zHxsSPdPwv-8._4qTkpvwe3ZPL5liaUwLodyipQZ_WulRA_dKjZ0ifGc",
"expires_in": 3599,
"id_token": {
"at_hash": "T9O-XJpXC8lqHi2T3nKflg",
"aud": [
"212361e7-d369-49b9-9dd6-5c0d1aa38f4d"
],
"auth_time": 1529751698,
"c_hash": "YA4SF3l5k1oBmBosmf5R2w",
"exp": 1529755418,
"iat": 1529751818,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "8ea1b845-2d90-45e4-b107-ca529b32d9f1",
"nonce": "WoZ1sp3wvFnrzbVN",
"rat": 1529751814,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
4.676 phase <--<-- 5 --- Note -->-->
6.064 phase <--<-- 6 --- Webfinger -->-->
6.064 not expected to do WebFinger
6.064 phase <--<-- 7 --- Discovery -->-->
6.064 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
6.14 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
6.142 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
6.142 phase <--<-- 8 --- Registration -->-->
6.142 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
6.142 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#fbFB4nUTDVQoVc5Y"
],
"response_types": [
"code id_token token"
]
}
6.3 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
6.301 RegistrationResponse {
"client_id": "54a76e5f-9dee-4e93-bb6f-2381b54f11b2",
"client_secret": "zBARHsAlcKsY",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "54a76e5f-9dee-4e93-bb6f-2381b54f11b2",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#fbFB4nUTDVQoVc5Y"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
6.301 phase <--<-- 9 --- AsyncAuthn -->-->
6.302 AuthorizationRequest {
"client_id": "54a76e5f-9dee-4e93-bb6f-2381b54f11b2",
"max_age": 1,
"nonce": "8u2eqwV2sLcJ9Yw5",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid",
"state": "LlJclbnzQIrjStUv"
}
6.302 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?max_age=1&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=54a76e5f-9dee-4e93-bb6f-2381b54f11b2&state=LlJclbnzQIrjStUv&response_type=code+id_token+token&nonce=8u2eqwV2sLcJ9Yw5
6.302 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?max_age=1&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=54a76e5f-9dee-4e93-bb6f-2381b54f11b2&state=LlJclbnzQIrjStUv&response_type=code+id_token+token&nonce=8u2eqwV2sLcJ9Yw5
12.293 http args {}
12.472 response URL with fragment
12.472 response access_token=iPLWE_oyCvsPsExzPi1LJxixFEml2yFVkEwqcKUx-a0.xmal3wdoJ1tu2WU0n90_6wH-zQGnGiwmGXu2qf1WNjs&code=yNSpLrwR0TkFGnlohpgyYAi0BKjoQ3B94Q78zWs1eV4.YMv0YU0Svd16elOIAkbexK_MacSZfknwf1ymUcDrAfg&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiaTVWdHozLWkxNjJYOVdTMmtsc1YyZyIsImF1ZCI6WyI1NGE3NmU1Zi05ZGVlLTRlOTMtYmI2Zi0yMzgxYjU0ZjExYjIiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiJ3dnF0ZWN3ejR6cEU3aFVuTkctQ0l3IiwiZXhwIjoxNTI5NzU1NDI2LCJpYXQiOjE1Mjk3NTE4MjYsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjhkMWRkYWFjLWI3MDItNDFlNC04ODhjLTQxNDEyMTlkYWRkNCIsIm5vbmNlIjoiOHUyZXF3VjJzTGNKOVl3NSIsInJhdCI6MTUyOTc1MTgyMCwic3ViIjoiZm9vQGJhci5jb20ifQ.Dydk4pjuR2iX5PSE9fOmU71TxMp_EVptvD1Hr-Hbt7KTsxHZw6mzOqUrOliNBZS03oWQDf4giR8VuEwK4m5dkI3yDbL0BRNAlWlbFTkgcLNHTaIgptxPbe9ANpB33cwGD6goPJphTwtmsM4XRg93RBtfUqnzh8p9CShcEskGlnDT29c4QipJbKN2nnfjF_HNqxddFHFYuNLwAtD5lyf9w5Z2_rftOdFjUtlosoEBFU5rqQ6_wRBS8-q2oaBEb-wBAKbBy7CKOPvEeXxadTDKoxLM4hLOeNeXCpW6jU1ElRL7yuisCJ--lDuYJOGlSxMeDI69CbRHSFcWaXhpdFEqkAF7gV5jjUUxAhynnFtCicTgwoZih_mITduH-EXfUagJWX4HLPa6T-eKfbTdQCSVGlTH4N60AP0zOSj4szlHdkdX5_qp1HqHpuDRstfFxTJD_meo3mz9nSIYpyLVL4r5hXnLyWvkuxit0-PnnduW98-cRtGC5pr1e-a_MP1zZbv2fZFs-8e-AfGi3_3qCknHIcWj6kCpE1N8sCXoQQ4tbqjZdwF707d-fTq_7SGMDgMimCQZihyOBLEz3zIB50ungV_gDr4rCIvC_imvA8khvES9_xRRgH6ZBMRHZb1rR7DD-iJ0yfmXhUYjOtQw23o_doB3lySzF-6T7P7x0H1_opg&scope=openid&state=LlJclbnzQIrjStUv&token_type=bearer
12.472 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiaTVWdHozLWkxNjJYOVdTMmtsc1YyZyIsImF1ZCI6WyI1NGE3NmU1Zi05ZGVlLTRlOTMtYmI2Zi0yMzgxYjU0ZjExYjIiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiJ3dnF0ZWN3ejR6cEU3aFVuTkctQ0l3IiwiZXhwIjoxNTI5NzU1NDI2LCJpYXQiOjE1Mjk3NTE4MjYsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjhkMWRkYWFjLWI3MDItNDFlNC04ODhjLTQxNDEyMTlkYWRkNCIsIm5vbmNlIjoiOHUyZXF3VjJzTGNKOVl3NSIsInJhdCI6MTUyOTc1MTgyMCwic3ViIjoiZm9vQGJhci5jb20ifQ.Dydk4pjuR2iX5PSE9fOmU71TxMp_EVptvD1Hr-Hbt7KTsxHZw6mzOqUrOliNBZS03oWQDf4giR8VuEwK4m5dkI3yDbL0BRNAlWlbFTkgcLNHTaIgptxPbe9ANpB33cwGD6goPJphTwtmsM4XRg93RBtfUqnzh8p9CShcEskGlnDT29c4QipJbKN2nnfjF_HNqxddFHFYuNLwAtD5lyf9w5Z2_rftOdFjUtlosoEBFU5rqQ6_wRBS8-q2oaBEb-wBAKbBy7CKOPvEeXxadTDKoxLM4hLOeNeXCpW6jU1ElRL7yuisCJ--lDuYJOGlSxMeDI69CbRHSFcWaXhpdFEqkAF7gV5jjUUxAhynnFtCicTgwoZih_mITduH-EXfUagJWX4HLPa6T-eKfbTdQCSVGlTH4N60AP0zOSj4szlHdkdX5_qp1HqHpuDRstfFxTJD_meo3mz9nSIYpyLVL4r5hXnLyWvkuxit0-PnnduW98-cRtGC5pr1e-a_MP1zZbv2fZFs-8e-AfGi3_3qCknHIcWj6kCpE1N8sCXoQQ4tbqjZdwF707d-fTq_7SGMDgMimCQZihyOBLEz3zIB50ungV_gDr4rCIvC_imvA8khvES9_xRRgH6ZBMRHZb1rR7DD-iJ0yfmXhUYjOtQw23o_doB3lySzF-6T7P7x0H1_opg', 'scope': 'openid', 'code': 'yNSpLrwR0TkFGnlohpgyYAi0BKjoQ3B94Q78zWs1eV4.YMv0YU0Svd16elOIAkbexK_MacSZfknwf1ymUcDrAfg', 'access_token': 'iPLWE_oyCvsPsExzPi1LJxixFEml2yFVkEwqcKUx-a0.xmal3wdoJ1tu2WU0n90_6wH-zQGnGiwmGXu2qf1WNjs', 'state': 'LlJclbnzQIrjStUv', 'expires_in': 3599, 'token_type': 'bearer'}
12.476 AuthorizationResponse {
"access_token": "iPLWE_oyCvsPsExzPi1LJxixFEml2yFVkEwqcKUx-a0.xmal3wdoJ1tu2WU0n90_6wH-zQGnGiwmGXu2qf1WNjs",
"code": "yNSpLrwR0TkFGnlohpgyYAi0BKjoQ3B94Q78zWs1eV4.YMv0YU0Svd16elOIAkbexK_MacSZfknwf1ymUcDrAfg",
"expires_in": 3599,
"id_token": {
"at_hash": "i5Vtz3-i162X9WS2klsV2g",
"aud": [
"54a76e5f-9dee-4e93-bb6f-2381b54f11b2"
],
"auth_time": 1529751824,
"c_hash": "wvqtecwz4zpE7hUnNG-CIw",
"exp": 1529755426,
"iat": 1529751826,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "8d1ddaac-b702-41e4-888c-4141219dadd4",
"nonce": "8u2eqwV2sLcJ9Yw5",
"rat": 1529751820,
"sub": "[email protected]"
},
"scope": "openid",
"state": "LlJclbnzQIrjStUv",
"token_type": "bearer"
}
12.476 phase <--<-- 10 --- AccessToken -->-->
12.476 --> request op_args: {'state': 'LlJclbnzQIrjStUv'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
12.476 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'LlJclbnzQIrjStUv', 'code': 'yNSpLrwR0TkFGnlohpgyYAi0BKjoQ3B94Q78zWs1eV4.YMv0YU0Svd16elOIAkbexK_MacSZfknwf1ymUcDrAfg', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '54a76e5f-9dee-4e93-bb6f-2381b54f11b2'}, 'state': 'LlJclbnzQIrjStUv'}
12.476 AccessTokenRequest {
"code": "yNSpLrwR0TkFGnlohpgyYAi0BKjoQ3B94Q78zWs1eV4.YMv0YU0Svd16elOIAkbexK_MacSZfknwf1ymUcDrAfg",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "LlJclbnzQIrjStUv"
}
12.477 request_url https://oidc-certification.ory.sh:8443/oauth2/token
12.477 request_http_args {'headers': {'Authorization': 'Basic NTRhNzZlNWYtOWRlZS00ZTkzLWJiNmYtMjM4MWI1NGYxMWIyOnpCQVJIc0FsY0tzWQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
12.477 request code=yNSpLrwR0TkFGnlohpgyYAi0BKjoQ3B94Q78zWs1eV4.YMv0YU0Svd16elOIAkbexK_MacSZfknwf1ymUcDrAfg&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=LlJclbnzQIrjStUv
12.711 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
12.712 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiaTVWdHozLWkxNjJYOVdTMmtsc1YyZyIsImF1ZCI6WyI1NGE3NmU1Zi05ZGVlLTRlOTMtYmI2Zi0yMzgxYjU0ZjExYjIiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiJ3dnF0ZWN3ejR6cEU3aFVuTkctQ0l3IiwiZXhwIjoxNTI5NzU1NDI2LCJpYXQiOjE1Mjk3NTE4MjYsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImE3ZDI2MDE2LTEzY2YtNGMxNy04YWVkLWI2Zjk0MjcxNjk2MCIsIm5vbmNlIjoiOHUyZXF3VjJzTGNKOVl3NSIsInJhdCI6MTUyOTc1MTgyMCwic3ViIjoiZm9vQGJhci5jb20ifQ.ro_Bi8yxlfV61XClX2kQ-xb84Tg4gYWf6ZYuJVt4FQcxJRRj1cuD-yk06apRDE8O6ynvcCyOdxUG3P1gTHZy8rwLwB9lx5gSR4OU6SKf7XMj8W0IQPUeV4EgVxaIy7PMVv7kwfTe09nhixB3rMD5EIoLXTS9ERwCsYf4sceQKTJdiAZlG8Z4Db9mh4ua2O3lF0mlpl9AmWAkvGhEh-ZZ9nXHt5u1eKKYiVn9jiwkXUb7g7RF8De_87oVJYAEOvuMQY2-UqTBIgIpVlKGAU8VvktKZE8_qse0vXpEZ_BOF9TKCqVIol5ETxzKwUiEO0ZwEoTtz69oxK38G5vzz2gT7KTOEvIQr_0OcX5YLfgI2X1N6hsRh_jpx1nzRu3jY8P2RDUGgZbHvIEVpduqNG3-m6ib8mfGfl0iXKvl8AmMHeQdqFCotf06DURAsxHPOo-ca5iOYvAQB3BhI8vl3WU0KVO2eAM1pgrwqI8tTz_D12XeBQPsNb0xk9P2Y3VzMy7LKa9mDfgnBGtjf3wOCv50Eu6bemQtOw3HiKhvGD1XWSAxdPaaPOdwtQAEFPQ4urzp7SYWU6UN8aZ8lvAO-Vd6AtR4fPl9VprdejGj63VWNN7kEsKfW3bXSRjoeUaRfj5WA5kTQa1zxGX9LjOnvmi5Fzxnn7bOVWKolW9d36W41M0', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'uvD7NaKWZXBN7JbRxcPvNVf6u8XK9gdICDQ_O9f8nBk.R2Qp6MtAlIdd_9N37eJagyEpcqqmmAfHxLclL7MhloQ', 'scope': 'openid'}
12.716 AccessTokenResponse {
"access_token": "uvD7NaKWZXBN7JbRxcPvNVf6u8XK9gdICDQ_O9f8nBk.R2Qp6MtAlIdd_9N37eJagyEpcqqmmAfHxLclL7MhloQ",
"expires_in": 3599,
"id_token": {
"at_hash": "i5Vtz3-i162X9WS2klsV2g",
"aud": [
"54a76e5f-9dee-4e93-bb6f-2381b54f11b2"
],
"auth_time": 1529751824,
"c_hash": "wvqtecwz4zpE7hUnNG-CIw",
"exp": 1529755426,
"iat": 1529751826,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "a7d26016-13cf-4c17-8aed-b6f942716960",
"nonce": "8u2eqwV2sLcJ9Yw5",
"rat": 1529751820,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
12.716 phase <--<-- 11 --- Done -->-->
12.716 end
12.716 assertion AuthTimeCheck
12.716 condition auth_time-check: status=OK [Check that the auth_time returned in the ID Token is in the expected range.]
12.717 assertion VerifyResponse
12.717 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
12.717 assertion ClaimsCheck
12.717 condition claims-check: status=OK [Checks if specific claims is present or not]
12.717 assertion MultipleSignOn
12.718 condition multiple-sign-on: status=OK [Verifies that multiple authentications was used in the flow]
12.718 condition Done: status=OK
============================================================
Conditions
auth_time-check: status=OK [Check that the auth_time returned in the ID Token is in the expected range.]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
claims-check: status=OK [Checks if specific claims is present or not]
multiple-sign-on: status=OK [Verifies that multiple authentications was used in the flow]
Done: status=OK
============================================================
RESULT: PASSED
./OP-UserInfo-Header.txt 0000644 0000000 0000000 00000033362 13313424136 015155 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-UserInfo-Header
Test description: UserInfo Endpoint access with POST and bearer header
Timestamp: 2018-06-23T11:00:46Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.075 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.076 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.076 phase <--<-- 2 --- Registration -->-->
0.076 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.077 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#2U7AsmSagF4BBf1H"
],
"response_types": [
"code id_token token"
]
}
0.235 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.236 RegistrationResponse {
"client_id": "c3672415-bbe0-4f2e-84f1-0c41ec15e041",
"client_secret": "StJNCQLxaAOf",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "c3672415-bbe0-4f2e-84f1-0c41ec15e041",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#2U7AsmSagF4BBf1H"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.236 phase <--<-- 3 --- AsyncAuthn -->-->
0.236 AuthorizationRequest {
"client_id": "c3672415-bbe0-4f2e-84f1-0c41ec15e041",
"nonce": "xkJUsAbNWpsqxVMU",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid",
"state": "unyV49Mfc8YJyh0J"
}
0.236 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=c3672415-bbe0-4f2e-84f1-0c41ec15e041&state=unyV49Mfc8YJyh0J&response_type=code+id_token+token&nonce=xkJUsAbNWpsqxVMU
0.236 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=c3672415-bbe0-4f2e-84f1-0c41ec15e041&state=unyV49Mfc8YJyh0J&response_type=code+id_token+token&nonce=xkJUsAbNWpsqxVMU
2.307 http args {}
2.48 response URL with fragment
2.48 response access_token=aA2tWM_FC71CcPSgpFSDAUGnCm1Cw0oIYwN8xb1Pnls.ZlJsvnigIySCUhLYec89Isft4C75gb69RRXxq3cOTjA&code=5By4hoP1IdnRlVqxHWbtuL0PMdG07yVsdB3c_khtCCY.IDcCam6QOabVNB0UIXbqqhINYGgnd5Wbt2voF96gNdM&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoieTRiaHY0OTQ5cFp3cmwxQk8yRUV6QSIsImF1ZCI6WyJjMzY3MjQxNS1iYmUwLTRmMmUtODRmMS0wYzQxZWMxNWUwNDEiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiIxVEFCVXVib3hfQk5MRFdURUYwdnJ3IiwiZXhwIjoxNTI5NzU1MjQ1LCJpYXQiOjE1Mjk3NTE2NDUsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImM1ZmI5YjQ3LTM2MDMtNGNhNC04YTRlLTZmMjRlYzBlYzZjYSIsIm5vbmNlIjoieGtKVXNBYk5XcHNxeFZNVSIsInJhdCI6MTUyOTc1MTY0NCwic3ViIjoiZm9vQGJhci5jb20ifQ.H8CrnM8Ib7iwW6HYT8cJsnAAaHnL01lflWbr1NHx4krXqttki7VT6-IHz2ytaQ-eNrbhm7fOr-y_ImtOXSo1UwGNK4POJn6TZ3u-7QjeYFKeJxJ70NhItgsiBwD_l6hONWyLpx48WiISqTb9EAmstcfGjl4iJoRJPPbvU5q3Xjn0yt6qypXLe2OkISB5g9astO9Bc0FlgjqNy5is-OYDfc6DytGjvLZw9yJ5zg9WT3JDqJmHCv-NWFThA2nyKNCQ6S0HrbDy_NXxQKflhp_CtoZfCgFQ06yYLkRcjUFyO5roXuzwbTixDK7SWn_S22p9GFYcxOAu5Ldhm9d3GLEcLxzaAQZHEOxyQz5198DYo6Gvnj5N4RMcbAgl7OogE4VoygT8HYXebrhW6nRUbG8d-BjfuSzDI_qkIy57y59piojjaOiWaMy4oLO1nYksZGPiioNBE3hRH6T6_8TwTRG5tfPlGeXKs-1BH8EMWE-H2Co91Q_rVbqB5MF6rcq4bQGulcmqfAzENj6G9j4dRKw3ogAG6TuzZt__Ai-l9ypqAl0Z_gR3DoVVUbXzXQGb5G07ctiSrlFc82mMuC0K9fF36o6RptaHdj7MO5vKNeZNKZSq0McY5I_iEztDhZtz9oa6jxwuk-OMiF4egFKQVRaGgBIiuhpsp7z8J9qdQe8vIG0&scope=openid&state=unyV49Mfc8YJyh0J&token_type=bearer
2.48 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoieTRiaHY0OTQ5cFp3cmwxQk8yRUV6QSIsImF1ZCI6WyJjMzY3MjQxNS1iYmUwLTRmMmUtODRmMS0wYzQxZWMxNWUwNDEiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiIxVEFCVXVib3hfQk5MRFdURUYwdnJ3IiwiZXhwIjoxNTI5NzU1MjQ1LCJpYXQiOjE1Mjk3NTE2NDUsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImM1ZmI5YjQ3LTM2MDMtNGNhNC04YTRlLTZmMjRlYzBlYzZjYSIsIm5vbmNlIjoieGtKVXNBYk5XcHNxeFZNVSIsInJhdCI6MTUyOTc1MTY0NCwic3ViIjoiZm9vQGJhci5jb20ifQ.H8CrnM8Ib7iwW6HYT8cJsnAAaHnL01lflWbr1NHx4krXqttki7VT6-IHz2ytaQ-eNrbhm7fOr-y_ImtOXSo1UwGNK4POJn6TZ3u-7QjeYFKeJxJ70NhItgsiBwD_l6hONWyLpx48WiISqTb9EAmstcfGjl4iJoRJPPbvU5q3Xjn0yt6qypXLe2OkISB5g9astO9Bc0FlgjqNy5is-OYDfc6DytGjvLZw9yJ5zg9WT3JDqJmHCv-NWFThA2nyKNCQ6S0HrbDy_NXxQKflhp_CtoZfCgFQ06yYLkRcjUFyO5roXuzwbTixDK7SWn_S22p9GFYcxOAu5Ldhm9d3GLEcLxzaAQZHEOxyQz5198DYo6Gvnj5N4RMcbAgl7OogE4VoygT8HYXebrhW6nRUbG8d-BjfuSzDI_qkIy57y59piojjaOiWaMy4oLO1nYksZGPiioNBE3hRH6T6_8TwTRG5tfPlGeXKs-1BH8EMWE-H2Co91Q_rVbqB5MF6rcq4bQGulcmqfAzENj6G9j4dRKw3ogAG6TuzZt__Ai-l9ypqAl0Z_gR3DoVVUbXzXQGb5G07ctiSrlFc82mMuC0K9fF36o6RptaHdj7MO5vKNeZNKZSq0McY5I_iEztDhZtz9oa6jxwuk-OMiF4egFKQVRaGgBIiuhpsp7z8J9qdQe8vIG0', 'scope': 'openid', 'code': '5By4hoP1IdnRlVqxHWbtuL0PMdG07yVsdB3c_khtCCY.IDcCam6QOabVNB0UIXbqqhINYGgnd5Wbt2voF96gNdM', 'access_token': 'aA2tWM_FC71CcPSgpFSDAUGnCm1Cw0oIYwN8xb1Pnls.ZlJsvnigIySCUhLYec89Isft4C75gb69RRXxq3cOTjA', 'state': 'unyV49Mfc8YJyh0J', 'expires_in': 3599, 'token_type': 'bearer'}
2.566 AuthorizationResponse {
"access_token": "aA2tWM_FC71CcPSgpFSDAUGnCm1Cw0oIYwN8xb1Pnls.ZlJsvnigIySCUhLYec89Isft4C75gb69RRXxq3cOTjA",
"code": "5By4hoP1IdnRlVqxHWbtuL0PMdG07yVsdB3c_khtCCY.IDcCam6QOabVNB0UIXbqqhINYGgnd5Wbt2voF96gNdM",
"expires_in": 3599,
"id_token": {
"at_hash": "y4bhv4949pZwrl1BO2EEzA",
"aud": [
"c3672415-bbe0-4f2e-84f1-0c41ec15e041"
],
"auth_time": 1529751409,
"c_hash": "1TABUubox_BNLDWTEF0vrw",
"exp": 1529755245,
"iat": 1529751645,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "c5fb9b47-3603-4ca4-8a4e-6f24ec0ec6ca",
"nonce": "xkJUsAbNWpsqxVMU",
"rat": 1529751644,
"sub": "[email protected]"
},
"scope": "openid",
"state": "unyV49Mfc8YJyh0J",
"token_type": "bearer"
}
2.567 phase <--<-- 4 --- AccessToken -->-->
2.567 --> request op_args: {'state': 'unyV49Mfc8YJyh0J'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.567 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'unyV49Mfc8YJyh0J', 'code': '5By4hoP1IdnRlVqxHWbtuL0PMdG07yVsdB3c_khtCCY.IDcCam6QOabVNB0UIXbqqhINYGgnd5Wbt2voF96gNdM', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'c3672415-bbe0-4f2e-84f1-0c41ec15e041'}, 'state': 'unyV49Mfc8YJyh0J'}
2.567 AccessTokenRequest {
"code": "5By4hoP1IdnRlVqxHWbtuL0PMdG07yVsdB3c_khtCCY.IDcCam6QOabVNB0UIXbqqhINYGgnd5Wbt2voF96gNdM",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "unyV49Mfc8YJyh0J"
}
2.567 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.567 request_http_args {'headers': {'Authorization': 'Basic YzM2NzI0MTUtYmJlMC00ZjJlLTg0ZjEtMGM0MWVjMTVlMDQxOlN0Sk5DUUx4YUFPZg==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.567 request code=5By4hoP1IdnRlVqxHWbtuL0PMdG07yVsdB3c_khtCCY.IDcCam6QOabVNB0UIXbqqhINYGgnd5Wbt2voF96gNdM&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=unyV49Mfc8YJyh0J
2.785 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.786 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoieTRiaHY0OTQ5cFp3cmwxQk8yRUV6QSIsImF1ZCI6WyJjMzY3MjQxNS1iYmUwLTRmMmUtODRmMS0wYzQxZWMxNWUwNDEiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiIxVEFCVXVib3hfQk5MRFdURUYwdnJ3IiwiZXhwIjoxNTI5NzU1MjQ1LCJpYXQiOjE1Mjk3NTE2NDYsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjZiZDQ1Njc4LTBmZGEtNDBhYy05NTZjLTM1MzY4YTBkODQwNyIsIm5vbmNlIjoieGtKVXNBYk5XcHNxeFZNVSIsInJhdCI6MTUyOTc1MTY0NCwic3ViIjoiZm9vQGJhci5jb20ifQ.csqkVrS9C5_zPlH9QOTs_MrVeJV6s4t2P8eWmxkc8vcGx63EyZYwPVf-1sztQC9wHgP5yr1NNxxKFeY8pN5N7i9jRJxh2na8KV8aBRzjYorTpvqpSVYtU0oyrr77_pJ_GNGpRR0IKENtMhS8JDEZTBmdiHp6xhO0e2dYyuFwLaxHZbE9BOUKV2Ih0P_cVdMsnn5tgNKZfQvTUzuCIKmlnSzeP0B4vPCDB8FTOurm3F48slms3V-vL9lId3NiIWDzZ_1g4ULA7uMsiT2gVRKNtx0_oR4SrcgkeO0Pt8AGsHLK1u3L1Xaq69jnZD-DWWZfpwM5BwUf-hl4gwylAMG9pIQh3d8Df0SajfctlgzhRuTaoDDUWILW_69eP9bZwZy7aM24SXNSVKf16Y8NkTV-hD-75s1sW-eXsAfiL70g06Sx60hhRvKnplxz7PHEjbdHXEtQ9vxg4Ye1buO-WmJlXv2R9yAYZn0WAffgGAFXZg4AGtWckNIjvP0AEVCxNBty9pRAmRR6JMqlCUr62imv18AfN3TzlyesEThAQLmFSXqrGH1v0moKLHRgCH3rFkVmD0tXsoMkOkfW4O5C6binFYahV3Ka_Ap0A-wc1pcEFR9vJcfUotss6bRO4Yd48yrFKL53FPSzMlrAwicMkh0Q3d6EUJgtr4aVsUChYOZmLf4', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': '0HniwPyh3gTB0yo0FsjM6BtBbRdN61FC1bPIeYUMrbo.kXmeEvJ-_2Kx1Qp2nK_NVfaxAdUc_Gt-jeiEjJOrBlI', 'scope': 'openid'}
2.789 AccessTokenResponse {
"access_token": "0HniwPyh3gTB0yo0FsjM6BtBbRdN61FC1bPIeYUMrbo.kXmeEvJ-_2Kx1Qp2nK_NVfaxAdUc_Gt-jeiEjJOrBlI",
"expires_in": 3599,
"id_token": {
"at_hash": "y4bhv4949pZwrl1BO2EEzA",
"aud": [
"c3672415-bbe0-4f2e-84f1-0c41ec15e041"
],
"auth_time": 1529751409,
"c_hash": "1TABUubox_BNLDWTEF0vrw",
"exp": 1529755245,
"iat": 1529751646,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "6bd45678-0fda-40ac-956c-35368a0d8407",
"nonce": "xkJUsAbNWpsqxVMU",
"rat": 1529751644,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
2.789 phase <--<-- 5 --- UserInfo -->-->
2.789 do_user_info_request kwargs:{'state': 'unyV49Mfc8YJyh0J', 'method': 'POST', 'behavior': 'use_authorization_header'}
2.79 request {'body': ''}
2.79 request_url https://oidc-certification.ory.sh:8443/userinfo
2.79 request_http_args {'headers': {'Authorization': 'Bearer 0HniwPyh3gTB0yo0FsjM6BtBbRdN61FC1bPIeYUMrbo.kXmeEvJ-_2Kx1Qp2nK_NVfaxAdUc_Gt-jeiEjJOrBlI', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.861 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
2.862 OpenIDSchema {
"sub": "[email protected]"
}
2.862 OpenIDSchema {
"sub": "[email protected]"
}
2.862 phase <--<-- 6 --- Done -->-->
2.862 end
2.863 assertion VerifyResponse
2.863 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.863 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Registration-Dynamic.txt 0000644 0000000 0000000 00000011641 13313424014 016260 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-Dynamic
Test description: Client registration request
Timestamp: 2018-06-23T10:59:24Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.074 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Registration -->-->
0.076 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.076 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#q5Di5BpQDDpaCGQ9"
],
"response_types": [
"code id_token token"
]
}
0.234 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.235 RegistrationResponse {
"client_id": "ade08ff3-e7f5-4968-b76f-f4ef907f9e97",
"client_secret": "PCtR5HP1uh7P",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "ade08ff3-e7f5-4968-b76f-f4ef907f9e97",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#q5Di5BpQDDpaCGQ9"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.235 phase <--<-- 3 --- Done -->-->
0.235 end
0.235 assertion CheckHTTPResponse
0.235 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.235 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
Done: status=OK
============================================================
RESULT: PASSED
./OP-display-page.txt 0000644 0000000 0000000 00000023316 13313424167 014616 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-display-page
Test description: Request with display=page
Timestamp: 2018-06-23T11:01:11Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.341 phase <--<-- 1 --- Webfinger -->-->
1.341 not expected to do WebFinger
1.341 phase <--<-- 2 --- Discovery -->-->
1.341 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.419 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.42 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.42 phase <--<-- 3 --- Registration -->-->
1.42 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.421 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#L6DrXKgWJ6rcBmrI"
],
"response_types": [
"code id_token token"
]
}
1.585 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.586 RegistrationResponse {
"client_id": "1c6c88e5-b16a-4113-86a5-c8911f7af1bf",
"client_secret": "tcTvUEsJxCvM",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "1c6c88e5-b16a-4113-86a5-c8911f7af1bf",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#L6DrXKgWJ6rcBmrI"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.586 phase <--<-- 4 --- AsyncAuthn -->-->
1.587 AuthorizationRequest {
"client_id": "1c6c88e5-b16a-4113-86a5-c8911f7af1bf",
"display": "page",
"nonce": "uHdrgJYNNMZ3wYcY",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid",
"state": "0vwe74MYjyhnpv24"
}
1.587 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=1c6c88e5-b16a-4113-86a5-c8911f7af1bf&state=0vwe74MYjyhnpv24&response_type=code+id_token+token&nonce=uHdrgJYNNMZ3wYcY&display=page
1.587 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=1c6c88e5-b16a-4113-86a5-c8911f7af1bf&state=0vwe74MYjyhnpv24&response_type=code+id_token+token&nonce=uHdrgJYNNMZ3wYcY&display=page
4.009 http args {}
4.254 response URL with fragment
4.255 response access_token=EmOUqP1Y4qh5g0-N5YS8mbQx5J_p_IyoFL1QsuLqV9c.bhepCs5jPmXqSNsrq2U_CVxwlo1HrdWjKDgZh27L1mA&code=d6-xb0iFe4ao5rHTlDx6JuKGt0n2_pvPSBVEQwahsbM.do6rPNB33f-Dl_cbqqJIYppTDt9po81E39E22EyiqTo&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoianNPZTNUS0dNaEdlSF9IdVRWWnRaUSIsImF1ZCI6WyIxYzZjODhlNS1iMTZhLTQxMTMtODZhNS1jODkxMWY3YWYxYmYiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJmb2lpYi1rTDBSWTFwZFZSUnhSTzV3IiwiZXhwIjoxNTI5NzU1MjcxLCJpYXQiOjE1Mjk3NTE2NzEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjVkNDQyYjYxLTkwMmQtNDgyZC04NTU5LTI4MzU0YjU3OWZmNCIsIm5vbmNlIjoidUhkcmdKWU5OTVozd1ljWSIsInJhdCI6MTUyOTc1MTY2OSwic3ViIjoiZm9vQGJhci5jb20ifQ.mSAYsBazVqsaU9bUEPk_NjTWeIA4eydY40yjtOQcXoCyFNO_Wt9z-hCmz4mFY-DLZaKfiNKsc-NkMUVmr5j9nidWNnSY6iim-p285H0wNJA1gkh3yEwCD3soJYCEFBxem5yFe39JWO2wVNRl9Hi0blpy5Kkz_JNUFXPsClqLnk3uS55Mz4j3ifMQ5YMDd3F-YN-tGaA4-6vkZKcuMyQUAkEcyIM7t2vv005ffPYDAOdMtgLNi-n2Jd3SezOZHYth5X0hXKgjPXM-ARoFEsv9pIAtrqfBU4RSH1Pfm8hyxNojpGCh-fPOTyeFnQNft87wk9XG8y8nP4yAp0-GFV34pGD4bBK7AWoEdd93QVdPxvBn9_rJ42aUTt2sf9TzqGB8x0Yhetk9B92ckM8LdjlXkE_IHF3mxIYY0m-M6vdo5qYImurCrn6mERBY-S6mpPZYybA6r7vzOi7oqq3-ETPRbWGkPHyqSHmlSx47yJ-dFWmZGa4yFhY5DB6iSlz6_URyqJ4QI03NeYoKLfUa3I-VojrZ_ZpgS9RewPfzsuxNMvBzR_AkyMzrY7EcYJve2bWY0wuG-oxvX8a1dzHhGZqy-qVo6r3L3f95-YDNPuGWqqKOnj11mnRuuyZBSsPAo9ycASNJUHNOHFBMWiUKcckSlRNHiYY5l6pzNWceLHdCtLg&scope=openid&state=0vwe74MYjyhnpv24&token_type=bearer
4.255 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoianNPZTNUS0dNaEdlSF9IdVRWWnRaUSIsImF1ZCI6WyIxYzZjODhlNS1iMTZhLTQxMTMtODZhNS1jODkxMWY3YWYxYmYiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJmb2lpYi1rTDBSWTFwZFZSUnhSTzV3IiwiZXhwIjoxNTI5NzU1MjcxLCJpYXQiOjE1Mjk3NTE2NzEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjVkNDQyYjYxLTkwMmQtNDgyZC04NTU5LTI4MzU0YjU3OWZmNCIsIm5vbmNlIjoidUhkcmdKWU5OTVozd1ljWSIsInJhdCI6MTUyOTc1MTY2OSwic3ViIjoiZm9vQGJhci5jb20ifQ.mSAYsBazVqsaU9bUEPk_NjTWeIA4eydY40yjtOQcXoCyFNO_Wt9z-hCmz4mFY-DLZaKfiNKsc-NkMUVmr5j9nidWNnSY6iim-p285H0wNJA1gkh3yEwCD3soJYCEFBxem5yFe39JWO2wVNRl9Hi0blpy5Kkz_JNUFXPsClqLnk3uS55Mz4j3ifMQ5YMDd3F-YN-tGaA4-6vkZKcuMyQUAkEcyIM7t2vv005ffPYDAOdMtgLNi-n2Jd3SezOZHYth5X0hXKgjPXM-ARoFEsv9pIAtrqfBU4RSH1Pfm8hyxNojpGCh-fPOTyeFnQNft87wk9XG8y8nP4yAp0-GFV34pGD4bBK7AWoEdd93QVdPxvBn9_rJ42aUTt2sf9TzqGB8x0Yhetk9B92ckM8LdjlXkE_IHF3mxIYY0m-M6vdo5qYImurCrn6mERBY-S6mpPZYybA6r7vzOi7oqq3-ETPRbWGkPHyqSHmlSx47yJ-dFWmZGa4yFhY5DB6iSlz6_URyqJ4QI03NeYoKLfUa3I-VojrZ_ZpgS9RewPfzsuxNMvBzR_AkyMzrY7EcYJve2bWY0wuG-oxvX8a1dzHhGZqy-qVo6r3L3f95-YDNPuGWqqKOnj11mnRuuyZBSsPAo9ycASNJUHNOHFBMWiUKcckSlRNHiYY5l6pzNWceLHdCtLg', 'scope': 'openid', 'code': 'd6-xb0iFe4ao5rHTlDx6JuKGt0n2_pvPSBVEQwahsbM.do6rPNB33f-Dl_cbqqJIYppTDt9po81E39E22EyiqTo', 'access_token': 'EmOUqP1Y4qh5g0-N5YS8mbQx5J_p_IyoFL1QsuLqV9c.bhepCs5jPmXqSNsrq2U_CVxwlo1HrdWjKDgZh27L1mA', 'state': '0vwe74MYjyhnpv24', 'expires_in': 3599, 'token_type': 'bearer'}
4.355 AuthorizationResponse {
"access_token": "EmOUqP1Y4qh5g0-N5YS8mbQx5J_p_IyoFL1QsuLqV9c.bhepCs5jPmXqSNsrq2U_CVxwlo1HrdWjKDgZh27L1mA",
"code": "d6-xb0iFe4ao5rHTlDx6JuKGt0n2_pvPSBVEQwahsbM.do6rPNB33f-Dl_cbqqJIYppTDt9po81E39E22EyiqTo",
"expires_in": 3599,
"id_token": {
"at_hash": "jsOe3TKGMhGeH_HuTVZtZQ",
"aud": [
"1c6c88e5-b16a-4113-86a5-c8911f7af1bf"
],
"auth_time": 1529751409,
"c_hash": "foiib-kL0RY1pdVRRxRO5w",
"exp": 1529755271,
"iat": 1529751671,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "5d442b61-902d-482d-8559-28354b579ff4",
"nonce": "uHdrgJYNNMZ3wYcY",
"rat": 1529751669,
"sub": "[email protected]"
},
"scope": "openid",
"state": "0vwe74MYjyhnpv24",
"token_type": "bearer"
}
4.356 phase <--<-- 5 --- Done -->-->
4.356 end
4.356 assertion VerifyResponse
4.356 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.356 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Registration-Endpoint.txt 0000644 0000000 0000000 00000005204 13313424016 016454 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-Endpoint
Test description: Verify that registration_endpoint is published
Timestamp: 2018-06-23T10:59:26Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.068 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.069 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.069 phase <--<-- 2 --- Done -->-->
1.069 end
1.07 assertion VerifyOPHasRegistrationEndpoint
1.07 condition verify-op-has-registration-endpoint: status=OK [Verify that the OP has a registration endpoint]
1.07 condition Done: status=OK
============================================================
Conditions
verify-op-has-registration-endpoint: status=OK [Verify that the OP has a registration endpoint]
Done: status=OK
============================================================
RESULT: PASSED
./OP-IDToken-C-Signature.txt 0000644 0000000 0000000 00000032423 13313424066 015650 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-IDToken-C-Signature
Test description: Does the OP sign the ID Token and with what
Timestamp: 2018-06-23T11:00:06Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.072 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.073 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.073 phase <--<-- 2 --- Registration -->-->
0.073 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.074 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#WPzFB0DUWRcrjkWg"
],
"response_types": [
"code id_token token"
]
}
0.238 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.239 RegistrationResponse {
"client_id": "224be9ae-66f5-4a1b-91b5-194be505415a",
"client_secret": "e.tKFXdjZADh",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "224be9ae-66f5-4a1b-91b5-194be505415a",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#WPzFB0DUWRcrjkWg"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.239 phase <--<-- 3 --- AsyncAuthn -->-->
0.239 AuthorizationRequest {
"client_id": "224be9ae-66f5-4a1b-91b5-194be505415a",
"nonce": "pvE8oIrrzZiL5PZJ",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid",
"state": "6X0SKTezgza1TxJX"
}
0.24 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=224be9ae-66f5-4a1b-91b5-194be505415a&state=6X0SKTezgza1TxJX&response_type=code+id_token+token&nonce=pvE8oIrrzZiL5PZJ
0.24 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=224be9ae-66f5-4a1b-91b5-194be505415a&state=6X0SKTezgza1TxJX&response_type=code+id_token+token&nonce=pvE8oIrrzZiL5PZJ
2.944 http args {}
3.139 response URL with fragment
3.139 response access_token=0xRJOtBgHd0qn7dSRi8TDycpenXgVmE941psl8Ok028.SrcF0Qh6_cPQSCMeDv8BBg-LO0IXLWnTmuOQi5vptQs&code=gN4dvizSNQiYuZcCqm0grZT8zUyFNdzEiT481h8zmEc.SSxQpb1mKW8HGgqCdoAnRu7us2UaYkAhvdFtaF3KlTM&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoialg3SWY5YWwxdGNIcDJqZERRdE5zZyIsImF1ZCI6WyIyMjRiZTlhZS02NmY1LTRhMWItOTFiNS0xOTRiZTUwNTQxNWEiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiIxZktzMXR5bXUwMmhIemQxa2RlZWhRIiwiZXhwIjoxNTI5NzU1MjA1LCJpYXQiOjE1Mjk3NTE2MDUsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjA3MTUzYThiLTE0NzAtNDliMi1hYTNjLTE4OTY2MTIyOTZlYiIsIm5vbmNlIjoicHZFOG9JcnJ6WmlMNVBaSiIsInJhdCI6MTUyOTc1MTYwMywic3ViIjoiZm9vQGJhci5jb20ifQ.rrObZK3jc1j5OSm4UDbCUSem8JOnF4fPYM36jQzSgd6P1X8AY67NN5yhjSZQboaaM3nJYrxoP-y_JmOGp_fb_NW6Q7cxCUnpNf6P7IweJcv_Ji-Yvu3BmAOwKO_ab7axlCt4wjGQyWMv82cr2DngVHXfhDdQzypMfcSHtEYA0dIpnJHQwb5l39cu2BLErLf-z-SrM-GATEzDy7iGETtl245uUs2FHbi8l_ClmdUKlFqfiRQXAmD8vGE2U8AKLwaSg6F7aWdMcsbDuhLeQqS6I9H2Q5zyOfyy-J5qOKptBDa_DyIJBNqXo4yeDtLnOgET_dgSpkQrVh73Y2ky5E7TTqCT2V1OKI_uWiqBe3O1mHyXByruNvlnDuZzY6K9ziU_hvO0nF_HgwkNmKtnnCFwIc3hIy1Tvq4AMt0M2PZVlVHIpHCtPmhf3CFRJLw-zKemXlzJPTlPxSbMVeT7wQkho6WwxyjodrjDbKeOYdH2k1mEQHA45u8cKNL5fr7LtOqbTpjbLrKpVlI9bO4urzv0c3nXXLEgBtBc4lxq2T48_XeOaoGOc58-hNxtIsGcFsTYclUWXzO2FENXu-lULrnRsgnBBqn1XN0N3Y3Z2BkarsRkNejl3sZNiF7xQgp14YcFva1KITbXWQfpsT1iXokd-0InuUlzGYrbUmfnNxj3YUQ&scope=openid&state=6X0SKTezgza1TxJX&token_type=bearer
3.14 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoialg3SWY5YWwxdGNIcDJqZERRdE5zZyIsImF1ZCI6WyIyMjRiZTlhZS02NmY1LTRhMWItOTFiNS0xOTRiZTUwNTQxNWEiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiIxZktzMXR5bXUwMmhIemQxa2RlZWhRIiwiZXhwIjoxNTI5NzU1MjA1LCJpYXQiOjE1Mjk3NTE2MDUsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjA3MTUzYThiLTE0NzAtNDliMi1hYTNjLTE4OTY2MTIyOTZlYiIsIm5vbmNlIjoicHZFOG9JcnJ6WmlMNVBaSiIsInJhdCI6MTUyOTc1MTYwMywic3ViIjoiZm9vQGJhci5jb20ifQ.rrObZK3jc1j5OSm4UDbCUSem8JOnF4fPYM36jQzSgd6P1X8AY67NN5yhjSZQboaaM3nJYrxoP-y_JmOGp_fb_NW6Q7cxCUnpNf6P7IweJcv_Ji-Yvu3BmAOwKO_ab7axlCt4wjGQyWMv82cr2DngVHXfhDdQzypMfcSHtEYA0dIpnJHQwb5l39cu2BLErLf-z-SrM-GATEzDy7iGETtl245uUs2FHbi8l_ClmdUKlFqfiRQXAmD8vGE2U8AKLwaSg6F7aWdMcsbDuhLeQqS6I9H2Q5zyOfyy-J5qOKptBDa_DyIJBNqXo4yeDtLnOgET_dgSpkQrVh73Y2ky5E7TTqCT2V1OKI_uWiqBe3O1mHyXByruNvlnDuZzY6K9ziU_hvO0nF_HgwkNmKtnnCFwIc3hIy1Tvq4AMt0M2PZVlVHIpHCtPmhf3CFRJLw-zKemXlzJPTlPxSbMVeT7wQkho6WwxyjodrjDbKeOYdH2k1mEQHA45u8cKNL5fr7LtOqbTpjbLrKpVlI9bO4urzv0c3nXXLEgBtBc4lxq2T48_XeOaoGOc58-hNxtIsGcFsTYclUWXzO2FENXu-lULrnRsgnBBqn1XN0N3Y3Z2BkarsRkNejl3sZNiF7xQgp14YcFva1KITbXWQfpsT1iXokd-0InuUlzGYrbUmfnNxj3YUQ', 'scope': 'openid', 'code': 'gN4dvizSNQiYuZcCqm0grZT8zUyFNdzEiT481h8zmEc.SSxQpb1mKW8HGgqCdoAnRu7us2UaYkAhvdFtaF3KlTM', 'access_token': '0xRJOtBgHd0qn7dSRi8TDycpenXgVmE941psl8Ok028.SrcF0Qh6_cPQSCMeDv8BBg-LO0IXLWnTmuOQi5vptQs', 'state': '6X0SKTezgza1TxJX', 'expires_in': 3599, 'token_type': 'bearer'}
3.439 AuthorizationResponse {
"access_token": "0xRJOtBgHd0qn7dSRi8TDycpenXgVmE941psl8Ok028.SrcF0Qh6_cPQSCMeDv8BBg-LO0IXLWnTmuOQi5vptQs",
"code": "gN4dvizSNQiYuZcCqm0grZT8zUyFNdzEiT481h8zmEc.SSxQpb1mKW8HGgqCdoAnRu7us2UaYkAhvdFtaF3KlTM",
"expires_in": 3599,
"id_token": {
"at_hash": "jX7If9al1tcHp2jdDQtNsg",
"aud": [
"224be9ae-66f5-4a1b-91b5-194be505415a"
],
"auth_time": 1529751409,
"c_hash": "1fKs1tymu02hHzd1kdeehQ",
"exp": 1529755205,
"iat": 1529751605,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "07153a8b-1470-49b2-aa3c-1896612296eb",
"nonce": "pvE8oIrrzZiL5PZJ",
"rat": 1529751603,
"sub": "[email protected]"
},
"scope": "openid",
"state": "6X0SKTezgza1TxJX",
"token_type": "bearer"
}
3.44 phase <--<-- 4 --- AccessToken -->-->
3.44 --> request op_args: {'state': '6X0SKTezgza1TxJX'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.44 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': '6X0SKTezgza1TxJX', 'code': 'gN4dvizSNQiYuZcCqm0grZT8zUyFNdzEiT481h8zmEc.SSxQpb1mKW8HGgqCdoAnRu7us2UaYkAhvdFtaF3KlTM', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '224be9ae-66f5-4a1b-91b5-194be505415a'}, 'state': '6X0SKTezgza1TxJX'}
3.44 AccessTokenRequest {
"code": "gN4dvizSNQiYuZcCqm0grZT8zUyFNdzEiT481h8zmEc.SSxQpb1mKW8HGgqCdoAnRu7us2UaYkAhvdFtaF3KlTM",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "6X0SKTezgza1TxJX"
}
3.44 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.44 request_http_args {'headers': {'Authorization': 'Basic MjI0YmU5YWUtNjZmNS00YTFiLTkxYjUtMTk0YmU1MDU0MTVhOmUudEtGWGRqWkFEaA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
3.44 request code=gN4dvizSNQiYuZcCqm0grZT8zUyFNdzEiT481h8zmEc.SSxQpb1mKW8HGgqCdoAnRu7us2UaYkAhvdFtaF3KlTM&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=6X0SKTezgza1TxJX
3.656 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.657 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoialg3SWY5YWwxdGNIcDJqZERRdE5zZyIsImF1ZCI6WyIyMjRiZTlhZS02NmY1LTRhMWItOTFiNS0xOTRiZTUwNTQxNWEiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiIxZktzMXR5bXUwMmhIemQxa2RlZWhRIiwiZXhwIjoxNTI5NzU1MjA1LCJpYXQiOjE1Mjk3NTE2MDYsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImE0ZjkxYjNmLWUxOWUtNGEyZC1hODg3LTU2NzVjYWM4OTlmOCIsIm5vbmNlIjoicHZFOG9JcnJ6WmlMNVBaSiIsInJhdCI6MTUyOTc1MTYwMywic3ViIjoiZm9vQGJhci5jb20ifQ.A-7vfiMFoDiX5GdeZJPE7GtM05CNANd33-fhIM8Y5E2ulNtd831m0RKZcrCnc_9xNUbw3ljwx1OB3fiBUtK3zbLcwJ45fp_LyUdZRVWrXzz4hDoYFZEl4rQMZg1FotFtb2F7xLmFUKM8sdFoWnEBdUkUvoXkDaVu30z-jIRsGmdPXGivHL5mkE7gNBHptXPPsIyoevtpyQaiJ0tOfWrP-6FUchYguPn5FrZGZvlK6QaRdWhr2CVKmVwNI3krnTM3LqYSfq4L9Yrb72QdmYQmP6nf2J1plpgQKxX6pkA7ymbEtPb6WrXa8ZnT3SG2o1-4BI5ZVf9A0FrmuFBvkdMgppnEK_E1Z1Nej0gHxSgm-SLNwTcijNrq53dRkif6i9xYk-MNYD5B5Bv3L1h4mxRYoV7cXEYhAscv5Hrq10VWY_IG6Esxc9YKg75QqA4e3oHm8Cuz5px0Me5WQsLO5IO_uaO3a--cyU1Y9jF8CJMp2rgZTBXNkuehMROIFGym2rSuTZkKpIvNPuijWJNFKg_FyipGkYPanMwe9ETk9FxpHUjmjLs7oD2wNxBtHM1QYIj8tRhLiWpE4KmbUEvFi7u6zA7RPYvCS0u-z9kJZAv9MIGDgx8NXOXkWTI7OyqFMR9YOb98U34j2PibDD_Y0sTluTuP7Odhij_-44qcz-ga5LM', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'Tmzwl9W99sQoDz0ZQlTEARmfUQE-MeJKLLIy2eyVX4Y.htJRfOkE3Yhoo3Nbw5YpN6bYCQpCeiTA1RHbxKN6bnU', 'scope': 'openid'}
3.661 AccessTokenResponse {
"access_token": "Tmzwl9W99sQoDz0ZQlTEARmfUQE-MeJKLLIy2eyVX4Y.htJRfOkE3Yhoo3Nbw5YpN6bYCQpCeiTA1RHbxKN6bnU",
"expires_in": 3599,
"id_token": {
"at_hash": "jX7If9al1tcHp2jdDQtNsg",
"aud": [
"224be9ae-66f5-4a1b-91b5-194be505415a"
],
"auth_time": 1529751409,
"c_hash": "1fKs1tymu02hHzd1kdeehQ",
"exp": 1529755205,
"iat": 1529751606,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "a4f91b3f-e19e-4a2d-a887-5675cac899f8",
"nonce": "pvE8oIrrzZiL5PZJ",
"rat": 1529751603,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.661 phase <--<-- 5 --- Done -->-->
3.661 end
3.661 assertion VerifyResponse
3.661 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.662 assertion IsIDTokenSigned
3.662 condition is-idtoken-signed: status=OK [Checks if the id_token is signed]
3.662 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
is-idtoken-signed: status=OK [Checks if the id_token is signed]
Done: status=OK
============================================================
RESULT: PASSED
|
|
hydra/internal/certification/CT.F.T.T.s.tar | ./OP-Req-login_hint.txt 0000644 0000000 0000000 00000015525 13313425437 015122 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-login_hint
Test description: Providing login_hint
Timestamp: 2018-06-23T11:12:31Z
============================================================
Trace output
0.0 phase <--<-- 0 --- VerifyConfiguration -->-->
0.0 phase <--<-- 1 --- Note -->-->
47.686 phase <--<-- 2 --- Webfinger -->-->
47.686 not expected to do WebFinger
47.686 phase <--<-- 3 --- Discovery -->-->
47.686 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
47.809 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
47.81 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
47.81 phase <--<-- 4 --- Registration -->-->
47.81 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
47.811 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#ahC0t2jhBEOMCFq9"
],
"response_types": [
"code token"
]
}
47.968 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
47.969 RegistrationResponse {
"client_id": "951eda20-df5f-46c3-938f-878b289a5579",
"client_secret": "eH8HkRE_imLo",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "951eda20-df5f-46c3-938f-878b289a5579",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#ahC0t2jhBEOMCFq9"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
47.969 phase <--<-- 5 --- AsyncAuthn -->-->
47.97 AuthorizationRequest {
"client_id": "951eda20-df5f-46c3-938f-878b289a5579",
"login_hint": "[email protected]",
"nonce": "09sPr2CA1ZhdD5vn",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "xrnSHlTUyRUKkFnQ"
}
47.97 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=951eda20-df5f-46c3-938f-878b289a5579&state=xrnSHlTUyRUKkFnQ&response_type=code+token&nonce=09sPr2CA1ZhdD5vn&login_hint=foo%40bar.com
47.97 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=951eda20-df5f-46c3-938f-878b289a5579&state=xrnSHlTUyRUKkFnQ&response_type=code+token&nonce=09sPr2CA1ZhdD5vn&login_hint=foo%40bar.com
51.24 http args {}
51.402 response URL with fragment
51.403 response access_token=BS7quGhguh_RACXG5zRxDxZz6DOxVynS0HSQLIw7VLI.wtfacVTSRjaXCUXaVD-RvSR0kk4BpMGodDz8dY-mzfU&code=IpAc69-L-ct4vHUpixEiZNY-VgBTfobHkn6TRfPqeaA.nGRyYir1BKZAW-lLwhEyi-cYfqbKy5tmLzKZ8ZKwxvg&expires_in=3599&scope=openid&state=xrnSHlTUyRUKkFnQ&token_type=bearer
51.403 response {'scope': 'openid', 'code': 'IpAc69-L-ct4vHUpixEiZNY-VgBTfobHkn6TRfPqeaA.nGRyYir1BKZAW-lLwhEyi-cYfqbKy5tmLzKZ8ZKwxvg', 'access_token': 'BS7quGhguh_RACXG5zRxDxZz6DOxVynS0HSQLIw7VLI.wtfacVTSRjaXCUXaVD-RvSR0kk4BpMGodDz8dY-mzfU', 'state': 'xrnSHlTUyRUKkFnQ', 'expires_in': 3599, 'token_type': 'bearer'}
51.403 AuthorizationResponse {
"access_token": "BS7quGhguh_RACXG5zRxDxZz6DOxVynS0HSQLIw7VLI.wtfacVTSRjaXCUXaVD-RvSR0kk4BpMGodDz8dY-mzfU",
"code": "IpAc69-L-ct4vHUpixEiZNY-VgBTfobHkn6TRfPqeaA.nGRyYir1BKZAW-lLwhEyi-cYfqbKy5tmLzKZ8ZKwxvg",
"expires_in": 3599,
"scope": "openid",
"state": "xrnSHlTUyRUKkFnQ",
"token_type": "bearer"
}
51.404 phase <--<-- 6 --- Done -->-->
51.404 end
51.404 assertion VerifyAuthnResponse
51.404 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
51.404 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Response-code+token.txt 0000644 0000000 0000000 00000015251 13313424660 016056 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Response-code+token
Test description: Request with response_type=code token
Timestamp: 2018-06-23T11:06:24Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.072 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Registration -->-->
0.074 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.074 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#xLtILbgi3pdICxVA"
],
"response_types": [
"code token"
]
}
0.277 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.277 RegistrationResponse {
"client_id": "78b353b7-0441-42e7-a7c1-dd78e5c33715",
"client_secret": "rL2.deQ9iYEh",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "78b353b7-0441-42e7-a7c1-dd78e5c33715",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#xLtILbgi3pdICxVA"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.277 phase <--<-- 3 --- AsyncAuthn -->-->
0.278 AuthorizationRequest {
"client_id": "78b353b7-0441-42e7-a7c1-dd78e5c33715",
"nonce": "aG8nNcr8rAs9UKuF",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "E82yQ5pvicLKwDxL"
}
0.278 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=78b353b7-0441-42e7-a7c1-dd78e5c33715&state=E82yQ5pvicLKwDxL&response_type=code+token&nonce=aG8nNcr8rAs9UKuF
0.278 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=78b353b7-0441-42e7-a7c1-dd78e5c33715&state=E82yQ5pvicLKwDxL&response_type=code+token&nonce=aG8nNcr8rAs9UKuF
3.371 http args {}
3.563 response URL with fragment
3.563 response access_token=lwN8EJ8musMpRZCLIDmiNDxPl4z1uLc-N2-Vo4jqXI0.RGIyBOdCeHYZVkOhfZo7bdwbaeecLCxMvANgD-elEP4&code=o7VQmDDy5JZXlChwkJC7pf7vL5-3efnE0FrCVqxQp8E.usdZjDe-vUmGUHkt-BPKOaXaI_eCz2NT47PTqNVnbfk&expires_in=3599&scope=openid&state=E82yQ5pvicLKwDxL&token_type=bearer
3.564 response {'scope': 'openid', 'code': 'o7VQmDDy5JZXlChwkJC7pf7vL5-3efnE0FrCVqxQp8E.usdZjDe-vUmGUHkt-BPKOaXaI_eCz2NT47PTqNVnbfk', 'access_token': 'lwN8EJ8musMpRZCLIDmiNDxPl4z1uLc-N2-Vo4jqXI0.RGIyBOdCeHYZVkOhfZo7bdwbaeecLCxMvANgD-elEP4', 'state': 'E82yQ5pvicLKwDxL', 'expires_in': 3599, 'token_type': 'bearer'}
3.564 AuthorizationResponse {
"access_token": "lwN8EJ8musMpRZCLIDmiNDxPl4z1uLc-N2-Vo4jqXI0.RGIyBOdCeHYZVkOhfZo7bdwbaeecLCxMvANgD-elEP4",
"code": "o7VQmDDy5JZXlChwkJC7pf7vL5-3efnE0FrCVqxQp8E.usdZjDe-vUmGUHkt-BPKOaXaI_eCz2NT47PTqNVnbfk",
"expires_in": 3599,
"scope": "openid",
"state": "E82yQ5pvicLKwDxL",
"token_type": "bearer"
}
3.564 phase <--<-- 4 --- Done -->-->
3.564 end
3.565 assertion VerifyAuthnResponse
3.565 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
3.565 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-nonce-NoReq-noncode.txt 0000644 0000000 0000000 00000017630 13313425106 016002 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-nonce-NoReq-noncode
Test description: Reject requests without nonce unless using the code flow
Timestamp: 2018-06-23T11:08:54Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Note -->-->
1.141 phase <--<-- 3 --- Registration -->-->
1.142 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.142 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#yjVhIEqXD51ydehK"
],
"response_types": [
"code token"
]
}
1.297 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.298 RegistrationResponse {
"client_id": "77db7959-4cf4-4434-a4b3-63c228d5d2d3",
"client_secret": ".XHzi-XBjr2m",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "77db7959-4cf4-4434-a4b3-63c228d5d2d3",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#yjVhIEqXD51ydehK"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.298 phase <--<-- 4 --- AsyncAuthn -->-->
1.298 AuthorizationRequest {
"client_id": "77db7959-4cf4-4434-a4b3-63c228d5d2d3",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "75AkgMVNwY4v0iB9"
}
1.298 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?state=75AkgMVNwY4v0iB9&scope=openid&response_type=code+token&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=77db7959-4cf4-4434-a4b3-63c228d5d2d3
1.298 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?state=75AkgMVNwY4v0iB9&scope=openid&response_type=code+token&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=77db7959-4cf4-4434-a4b3-63c228d5d2d3
4.111 http args {}
4.323 response URL with fragment
4.323 response error=invalid_request&error_debug=Parameter+nonce+must+be+set+when+using+the+hybrid+flow&error_description=The+request+is+missing+a+required+parameter%252C+includes+an+invalid+parameter+value%252C+includes+a+parameter+more+than+once%252C+or+is+otherwise+malformed&error_hint=Make+sure+that+the+various+parameters+are+correct%252C+be+aware+of+case+sensitivity+and+trim+your+parameters.+Make+sure+that+the+client+you+are+using+has+exactly+whitelisted+the+redirect_uri+you+specified.&state=75AkgMVNwY4v0iB9
4.324 response {'error_debug': 'Parameter nonce must be set when using the hybrid flow', 'error_description': 'The request is missing a required parameter%2C includes an invalid parameter value%2C includes a parameter more than once%2C or is otherwise malformed', 'state': '75AkgMVNwY4v0iB9', 'error': 'invalid_request', 'error_hint': 'Make sure that the various parameters are correct%2C be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.'}
4.324 AuthorizationErrorResponse {
"error": "invalid_request",
"error_debug": "Parameter nonce must be set when using the hybrid flow",
"error_description": "The request is missing a required parameter%2C includes an invalid parameter value%2C includes a parameter more than once%2C or is otherwise malformed",
"error_hint": "Make sure that the various parameters are correct%2C be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.",
"state": "75AkgMVNwY4v0iB9"
}
4.324 AuthorizationErrorResponse {
"error": "invalid_request",
"error_debug": "Parameter nonce must be set when using the hybrid flow",
"error_description": "The request is missing a required parameter%2C includes an invalid parameter value%2C includes a parameter more than once%2C or is otherwise malformed",
"error_hint": "Make sure that the various parameters are correct%2C be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.",
"state": "75AkgMVNwY4v0iB9"
}
4.324 phase <--<-- 5 --- Done -->-->
4.324 end
4.325 assertion VerifyResponse
4.325 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.325 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-IDToken-RS256.txt 0000644 0000000 0000000 00000024652 13313424734 014317 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-IDToken-RS256
Test description: Asymmetric ID Token signature with RS256
Timestamp: 2018-06-23T11:07:08Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.075 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.077 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.077 phase <--<-- 2 --- Registration -->-->
0.077 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'id_token_signed_response_alg': 'RS256', 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.077 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id_token_signed_response_alg": "RS256",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#h8ySopkYJFw2Dw72"
],
"response_types": [
"code token"
]
}
0.235 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.236 RegistrationResponse {
"client_id": "eec0912e-ca3d-45d5-94a7-9b2d09fba475",
"client_secret": "BdTMFPstUJnR",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "eec0912e-ca3d-45d5-94a7-9b2d09fba475",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#h8ySopkYJFw2Dw72"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.236 phase <--<-- 3 --- AsyncAuthn -->-->
0.237 AuthorizationRequest {
"client_id": "eec0912e-ca3d-45d5-94a7-9b2d09fba475",
"nonce": "KAxCPVjj04OwwiWm",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "k1o9v2Qbg6vwc4BM"
}
0.237 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=eec0912e-ca3d-45d5-94a7-9b2d09fba475&state=k1o9v2Qbg6vwc4BM&response_type=code+token&nonce=KAxCPVjj04OwwiWm
0.237 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=eec0912e-ca3d-45d5-94a7-9b2d09fba475&state=k1o9v2Qbg6vwc4BM&response_type=code+token&nonce=KAxCPVjj04OwwiWm
2.668 http args {}
2.832 response URL with fragment
2.832 response access_token=7EAGurHSfQVP4z_u7qD_BctMr21fy1Tcy-UFebX5qjU.Kn_Kg_Sv86csNLKCKcH5WrGJSyf4pJKNPfqAdrYE9DY&code=Y6FMmy8BL0316zZUsjXXTz3KBa3A9uPTp5kgNoyaU4c.1p3CxIHumdtkJKfIGb3_4fepzqnf7Yrem9_gnrMD5dI&expires_in=3599&scope=openid&state=k1o9v2Qbg6vwc4BM&token_type=bearer
2.833 response {'scope': 'openid', 'code': 'Y6FMmy8BL0316zZUsjXXTz3KBa3A9uPTp5kgNoyaU4c.1p3CxIHumdtkJKfIGb3_4fepzqnf7Yrem9_gnrMD5dI', 'access_token': '7EAGurHSfQVP4z_u7qD_BctMr21fy1Tcy-UFebX5qjU.Kn_Kg_Sv86csNLKCKcH5WrGJSyf4pJKNPfqAdrYE9DY', 'state': 'k1o9v2Qbg6vwc4BM', 'expires_in': 3599, 'token_type': 'bearer'}
2.833 AuthorizationResponse {
"access_token": "7EAGurHSfQVP4z_u7qD_BctMr21fy1Tcy-UFebX5qjU.Kn_Kg_Sv86csNLKCKcH5WrGJSyf4pJKNPfqAdrYE9DY",
"code": "Y6FMmy8BL0316zZUsjXXTz3KBa3A9uPTp5kgNoyaU4c.1p3CxIHumdtkJKfIGb3_4fepzqnf7Yrem9_gnrMD5dI",
"expires_in": 3599,
"scope": "openid",
"state": "k1o9v2Qbg6vwc4BM",
"token_type": "bearer"
}
2.833 phase <--<-- 4 --- AccessToken -->-->
2.833 --> request op_args: {'state': 'k1o9v2Qbg6vwc4BM'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.833 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'k1o9v2Qbg6vwc4BM', 'code': 'Y6FMmy8BL0316zZUsjXXTz3KBa3A9uPTp5kgNoyaU4c.1p3CxIHumdtkJKfIGb3_4fepzqnf7Yrem9_gnrMD5dI', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'eec0912e-ca3d-45d5-94a7-9b2d09fba475'}, 'state': 'k1o9v2Qbg6vwc4BM'}
2.833 AccessTokenRequest {
"code": "Y6FMmy8BL0316zZUsjXXTz3KBa3A9uPTp5kgNoyaU4c.1p3CxIHumdtkJKfIGb3_4fepzqnf7Yrem9_gnrMD5dI",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "k1o9v2Qbg6vwc4BM"
}
2.833 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.833 request_http_args {'headers': {'Authorization': 'Basic ZWVjMDkxMmUtY2EzZC00NWQ1LTk0YTctOWIyZDA5ZmJhNDc1OkJkVE1GUHN0VUpuUg==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.833 request code=Y6FMmy8BL0316zZUsjXXTz3KBa3A9uPTp5kgNoyaU4c.1p3CxIHumdtkJKfIGb3_4fepzqnf7Yrem9_gnrMD5dI&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=k1o9v2Qbg6vwc4BM
3.058 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.059 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiSDUtZjJOZl8wT0JKN0J4X2xycEtMdyIsImF1ZCI6WyJlZWMwOTEyZS1jYTNkLTQ1ZDUtOTRhNy05YjJkMDlmYmE0NzUiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiJ0U2FlZ0xRNUFlOG9Ia1VzeFE4a1NnIiwiZXhwIjoxNTI5NzU1NjI3LCJpYXQiOjE1Mjk3NTIwMjcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjNhZjY2MDlkLWVhZjktNGM0My1hYTgyLWEwMmEwNjIzMTBjYyIsIm5vbmNlIjoiS0F4Q1BWamowNE93d2lXbSIsInJhdCI6MTUyOTc1MjAyNSwic3ViIjoiZm9vQGJhci5jb20ifQ.ThjMVyfgYnCtT0NShizGrpRu1GBYxiPqHJ5BaOOO3W8GbxP8jQ8AfduE9QdFnwVY-9VX9JEitF37dbp66686CKeMuXypUkI8Q-DDhE-1UgudI-G2SjUTIqwIt4XJh3XzmSZaAogGPdCAktjkwlQEPibzG6vmXgndXscX0FGrow6rM0G-fXOLaGIgze_P783K6RDAJzEVHIICclNlSUgYNYN2nwCCYocBq1Gvtk9w_Kus0j4f4QfAV65OXTyzDLhKslcVKPU7B6m1d_tbI_IOzagDnHg_BIU16a3Z7aKQZMHEObA2Iu_jqL9sACKVxwgJ8QFED5dnwjxd_JWDpmU3p-5xdHwBH_r3JnDdmkWP6JRsqjShxr2pw1k5Bb2ttc3yIpDUmZ4DgPqpOnbxSlL_o265f-QYB2LjOoxMDdeBR-b7uQjEBPxz0bd08fA2q56C56Mpqo_eb6UrdHK3a0kiR2jLXoorXor3Br733Yhk1SnfshQiLdp281r3ShhR1k6QXsD2JByxwcQtkMt3C3rnNgOhDyVcw7LR0FtFKdxzeDRk1h2SQR2wNnt1ctmtd8Ii5fgKxfR2_tl5At8M7dDZMHqmx5mebgVt0bZQOdzRJKPc__PS-CxIE2YRop8kHWQYYTKmhmXvb1LwS9_2WJ1Trn24hcHhA4beiuaIOoGHmYE', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'rk4LVQnDGdc5nKPAJzl3UHWc7CvH1xBx-KQACGTRL6o.IqpdTJMHBDIz32rey604bhCMm6TH5Ex75NupgYslPb0', 'scope': 'openid'}
3.143 AccessTokenResponse {
"access_token": "rk4LVQnDGdc5nKPAJzl3UHWc7CvH1xBx-KQACGTRL6o.IqpdTJMHBDIz32rey604bhCMm6TH5Ex75NupgYslPb0",
"expires_in": 3599,
"id_token": {
"at_hash": "H5-f2Nf_0OBJ7Bx_lrpKLw",
"aud": [
"eec0912e-ca3d-45d5-94a7-9b2d09fba475"
],
"auth_time": 1529751824,
"c_hash": "tSaegLQ5Ae8oHkUsxQ8kSg",
"exp": 1529755627,
"iat": 1529752027,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "3af6609d-eaf9-4c43-aa82-a02a062310cc",
"nonce": "KAxCPVjj04OwwiWm",
"rat": 1529752025,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.143 phase <--<-- 5 --- Done -->-->
3.143 end
3.144 assertion VerifyResponse
3.144 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.144 assertion VerifySignedIdToken
3.144 condition verify-idtoken-is-signed: status=OK [Verifies that an ID Token is signed]
3.144 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-idtoken-is-signed: status=OK [Verifies that an ID Token is signed]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Registration-Sector-Bad.txt 0000644 0000000 0000000 00000013232 13313424670 016625 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-Sector-Bad
Test description: Incorrect registration of sector_identifier_uri
Timestamp: 2018-06-23T11:06:32Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.078 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.079 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.079 phase <--<-- 2 --- Registration -->-->
0.08 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'sector_identifier_uri': 'https://op.certification.openid.net:61353/export/siu.json', 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.08 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#6uhHkstboS9jvzvC"
],
"response_types": [
"code token"
],
"sector_identifier_uri": "https://op.certification.openid.net:61353/export/siu.json"
}
0.287 http response url:https://oidc-certification.ory.sh:8443/clients status_code:400 message:{"error":"invalid_request","error_description":"The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed","error_hint":"Make sure that the various parameters are correct, be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.","status_code":400,"error_debug":"Redirect URL \"https://op.certification.openid.net:61353/authz_cb\" does not match values from sector_identifier_uri."}
0.288 ErrorResponse {
"error": "invalid_request",
"error_debug": "Redirect URL \"https://op.certification.openid.net:61353/authz_cb\" does not match values from sector_identifier_uri.",
"error_description": "The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed",
"error_hint": "Make sure that the various parameters are correct, be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.",
"status_code": 400
}
0.288 exception RegistrationError:{'error_debug': 'Redirect URL "https://op.certification.openid.net:61353/authz_cb" does not match values from sector_identifier_uri.', 'error_description': 'The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed', 'status_code': 400, 'error': 'invalid_request', 'error_hint': 'Make sure that the various parameters are correct, be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.'}
0.288 event got expected exception RegistrationError
0.288 phase <--<-- 3 --- Done -->-->
0.288 end
0.289 condition Done: status=OK
============================================================
Conditions
Done: status=OK
============================================================
RESULT: PASSED
./OP-display-popup.txt 0000644 0000000 0000000 00000015372 13313425101 015035 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-display-popup
Test description: Request with display=popup
Timestamp: 2018-06-23T11:08:49Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.324 phase <--<-- 1 --- Webfinger -->-->
1.324 not expected to do WebFinger
1.324 phase <--<-- 2 --- Discovery -->-->
1.325 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.434 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.435 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.435 phase <--<-- 3 --- Registration -->-->
1.435 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.436 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#14au77Sdb8zanByU"
],
"response_types": [
"code token"
]
}
1.595 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.596 RegistrationResponse {
"client_id": "412c5f9c-62ec-4368-9443-38ac3db74cb2",
"client_secret": "UO3Hq1gkT1KA",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "412c5f9c-62ec-4368-9443-38ac3db74cb2",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#14au77Sdb8zanByU"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.596 phase <--<-- 4 --- AsyncAuthn -->-->
1.597 AuthorizationRequest {
"client_id": "412c5f9c-62ec-4368-9443-38ac3db74cb2",
"display": "popup",
"nonce": "MGKvdTxxejWg0M4X",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "rWSlhmvA5MCrt8iL"
}
1.597 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=412c5f9c-62ec-4368-9443-38ac3db74cb2&state=rWSlhmvA5MCrt8iL&response_type=code+token&nonce=MGKvdTxxejWg0M4X&display=popup
1.597 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=412c5f9c-62ec-4368-9443-38ac3db74cb2&state=rWSlhmvA5MCrt8iL&response_type=code+token&nonce=MGKvdTxxejWg0M4X&display=popup
4.81 http args {}
4.98 response URL with fragment
4.98 response access_token=zGHkXQWpMDAQMJSlQeHu8TOb4HHC5KoG9IsRFlMhRHw.O9-3m7Hx9T5A2_Wv0lMplyp6lqqEbh24c9YzLbBFiLk&code=Btl-KgeYkM2nw9UOdWg7AmQyFPTfzB2jvk83NWbTMzw.WXTlyv4woDr8845MFs1Bno4FX3D4TqYN4-mhDAl2fj0&expires_in=3599&scope=openid&state=rWSlhmvA5MCrt8iL&token_type=bearer
4.98 response {'scope': 'openid', 'code': 'Btl-KgeYkM2nw9UOdWg7AmQyFPTfzB2jvk83NWbTMzw.WXTlyv4woDr8845MFs1Bno4FX3D4TqYN4-mhDAl2fj0', 'access_token': 'zGHkXQWpMDAQMJSlQeHu8TOb4HHC5KoG9IsRFlMhRHw.O9-3m7Hx9T5A2_Wv0lMplyp6lqqEbh24c9YzLbBFiLk', 'state': 'rWSlhmvA5MCrt8iL', 'expires_in': 3599, 'token_type': 'bearer'}
4.981 AuthorizationResponse {
"access_token": "zGHkXQWpMDAQMJSlQeHu8TOb4HHC5KoG9IsRFlMhRHw.O9-3m7Hx9T5A2_Wv0lMplyp6lqqEbh24c9YzLbBFiLk",
"code": "Btl-KgeYkM2nw9UOdWg7AmQyFPTfzB2jvk83NWbTMzw.WXTlyv4woDr8845MFs1Bno4FX3D4TqYN4-mhDAl2fj0",
"expires_in": 3599,
"scope": "openid",
"state": "rWSlhmvA5MCrt8iL",
"token_type": "bearer"
}
4.981 phase <--<-- 5 --- Done -->-->
4.981 end
4.981 assertion VerifyResponse
4.981 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.981 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-redirect_uri-RegFrag.txt 0000644 0000000 0000000 00000011607 13313425240 016223 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-RegFrag
Test description: Reject registration where a redirect_uri has a fragment
Timestamp: 2018-06-23T11:10:24Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Registration -->-->
0.075 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb#foobar'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.075 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb#foobar"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#tnH7frFliJbD8ra6"
],
"response_types": [
"code token"
]
}
0.152 http response url:https://oidc-certification.ory.sh:8443/clients status_code:400 message:{"error":"invalid_request","error_description":"The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed","error_hint":"Redirect URIs must not contain fragments (#)","status_code":400}
0.153 ErrorResponse {
"error": "invalid_request",
"error_description": "The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed",
"error_hint": "Redirect URIs must not contain fragments (#)",
"status_code": 400
}
0.153 exception RegistrationError:{'error_description': 'The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed', 'status_code': 400, 'error': 'invalid_request', 'error_hint': 'Redirect URIs must not contain fragments (#)'}
0.153 event got expected exception RegistrationError
0.153 phase <--<-- 3 --- Done -->-->
0.153 end
0.153 assertion VerifyErrorMessage
0.153 condition verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
0.153 condition Done: status=OK
============================================================
Conditions
verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-OAuth-2nd.txt 0000644 0000000 0000000 00000032010 13313425512 013722 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-OAuth-2nd
Test description: Trying to use authorization code twice should result in an error
Timestamp: 2018-06-23T11:13:14Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Registration -->-->
0.074 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.075 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#NHcINjpjqJb2NAAC"
],
"response_types": [
"code token"
]
}
0.23 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.231 RegistrationResponse {
"client_id": "067e554b-8c35-498f-b62a-89fd2714734c",
"client_secret": "LTVaLgmZ.sx1",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "067e554b-8c35-498f-b62a-89fd2714734c",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#NHcINjpjqJb2NAAC"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.231 phase <--<-- 3 --- Note -->-->
1.396 phase <--<-- 4 --- AsyncAuthn -->-->
1.397 AuthorizationRequest {
"client_id": "067e554b-8c35-498f-b62a-89fd2714734c",
"nonce": "Lbm6TxMWupcBULhy",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "5kOSP1Szu9sSUcww"
}
1.397 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=067e554b-8c35-498f-b62a-89fd2714734c&state=5kOSP1Szu9sSUcww&response_type=code+token&nonce=Lbm6TxMWupcBULhy
1.397 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=067e554b-8c35-498f-b62a-89fd2714734c&state=5kOSP1Szu9sSUcww&response_type=code+token&nonce=Lbm6TxMWupcBULhy
4.733 http args {}
4.912 response URL with fragment
4.912 response access_token=V_PZr89J7ppQZPgzy6bwqZ48Bv19RwH9lYgvSIRypq0.Mm5uq9Gnb6WCdZunKHvq7pOx6ct5NVgSdv_bLALGsHA&code=J5ECtZMNR8RNPhDSn-2mCIYCdYBLK8cNpST0uuT7qDM.jO3CmvR0C1ryUEhrbJl29J3sN5WmMDs2vv1ExYfKBCk&expires_in=3599&scope=openid&state=5kOSP1Szu9sSUcww&token_type=bearer
4.912 response {'scope': 'openid', 'code': 'J5ECtZMNR8RNPhDSn-2mCIYCdYBLK8cNpST0uuT7qDM.jO3CmvR0C1ryUEhrbJl29J3sN5WmMDs2vv1ExYfKBCk', 'access_token': 'V_PZr89J7ppQZPgzy6bwqZ48Bv19RwH9lYgvSIRypq0.Mm5uq9Gnb6WCdZunKHvq7pOx6ct5NVgSdv_bLALGsHA', 'state': '5kOSP1Szu9sSUcww', 'expires_in': 3599, 'token_type': 'bearer'}
4.913 AuthorizationResponse {
"access_token": "V_PZr89J7ppQZPgzy6bwqZ48Bv19RwH9lYgvSIRypq0.Mm5uq9Gnb6WCdZunKHvq7pOx6ct5NVgSdv_bLALGsHA",
"code": "J5ECtZMNR8RNPhDSn-2mCIYCdYBLK8cNpST0uuT7qDM.jO3CmvR0C1ryUEhrbJl29J3sN5WmMDs2vv1ExYfKBCk",
"expires_in": 3599,
"scope": "openid",
"state": "5kOSP1Szu9sSUcww",
"token_type": "bearer"
}
4.913 phase <--<-- 5 --- AccessToken -->-->
4.913 --> request op_args: {'state': '5kOSP1Szu9sSUcww'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
4.913 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': '5kOSP1Szu9sSUcww', 'code': 'J5ECtZMNR8RNPhDSn-2mCIYCdYBLK8cNpST0uuT7qDM.jO3CmvR0C1ryUEhrbJl29J3sN5WmMDs2vv1ExYfKBCk', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '067e554b-8c35-498f-b62a-89fd2714734c'}, 'state': '5kOSP1Szu9sSUcww'}
4.913 AccessTokenRequest {
"code": "J5ECtZMNR8RNPhDSn-2mCIYCdYBLK8cNpST0uuT7qDM.jO3CmvR0C1ryUEhrbJl29J3sN5WmMDs2vv1ExYfKBCk",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "5kOSP1Szu9sSUcww"
}
4.913 request_url https://oidc-certification.ory.sh:8443/oauth2/token
4.913 request_http_args {'headers': {'Authorization': 'Basic MDY3ZTU1NGItOGMzNS00OThmLWI2MmEtODlmZDI3MTQ3MzRjOkxUVmFMZ21aLnN4MQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
4.913 request code=J5ECtZMNR8RNPhDSn-2mCIYCdYBLK8cNpST0uuT7qDM.jO3CmvR0C1ryUEhrbJl29J3sN5WmMDs2vv1ExYfKBCk&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=5kOSP1Szu9sSUcww
5.129 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
5.13 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiRWJJVHA0VWQzLWxraFBXSmVnRmJSQSIsImF1ZCI6WyIwNjdlNTU0Yi04YzM1LTQ5OGYtYjYyYS04OWZkMjcxNDczNGMiXSwiYXV0aF90aW1lIjoxNTI5NzUyMzcxLCJjX2hhc2giOiJadWlJdThpZFdLTVVkUU1kM0lrM013IiwiZXhwIjoxNTI5NzU1OTkzLCJpYXQiOjE1Mjk3NTIzOTMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImJjYzViMDI1LTk4YmUtNDdiOS04MTNiLThkNjcyMGJkZjVjZSIsIm5vbmNlIjoiTGJtNlR4TVd1cGNCVUxoeSIsInJhdCI6MTUyOTc1MjM5MCwic3ViIjoiZm9vQGJhci5jb20ifQ.h0xvCaBMHTd6WiWBsbFRHHWr6pXWOQZkPIXzBIF-2CM2zHVmFhzl-pJ4ZUNI1Tbg8Wz_9MAPkypecEIT0LYTV1Kz5xDIoaNXYzV4jB9Zv26fZ1esxu2MyYecmYK7uM5Cah8LRHvblBPVoZkMNq0vyc6S_JJi1F3xWevvhisul24NjOKTv3rgAMIPjADgQQ0we3oQ8d5Inhq5-uHU57XiLJJ8HhcXVp9pKNrYTpMk7lFZDK4OZw6NR6H-sKn9-xwWFrf3PvV1YWEflmABRGVROKIGYEDLDOpaerT2LCoFN28idRdV2hFTJ-y8pcVLX3SJ_agV0PiY-fUBqz9MtQWitmLh8JioG2i-jNpCz9cE4hKYrP6CZaVuTF8yXCQm7GvY_jG1jDCAtsttUOaajSwlIfdRHENZy-kbFX_AFolMG4RAc1bCzdWPvZJdSRjF8XVJyD0VQCI1eU6c2BIsN1i0ebX7zmcD2Q_MCEhxEmpxvYb6ZWOlMi4O9Og1d8_NCrBLtylIa4wGRJCnlL3g9x9jD6E1oBsMxZVp3FEi2JqBNnTxY6NJFQT9-g3Ms5hIaRNT3GGk8XUMSWUWNba9qinnE_Kqb1tsqF3MesfAM1qLQja9RmYFsXJ9kQwVZPRvc38lQT8vq74_dz_sS1v4-vOlN-ZF4_7FWAfn6XAavzTAXSg', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'GJUAp7cW1YoX7rsW84qgM7f0wSmSTsQDEAT0Z4teO1s.VQq5_R7uBMfxPPz_XfE8fzRdsSywqPez_NHHfZ8QgwQ', 'scope': 'openid'}
5.22 AccessTokenResponse {
"access_token": "GJUAp7cW1YoX7rsW84qgM7f0wSmSTsQDEAT0Z4teO1s.VQq5_R7uBMfxPPz_XfE8fzRdsSywqPez_NHHfZ8QgwQ",
"expires_in": 3599,
"id_token": {
"at_hash": "EbITp4Ud3-lkhPWJegFbRA",
"aud": [
"067e554b-8c35-498f-b62a-89fd2714734c"
],
"auth_time": 1529752371,
"c_hash": "ZuiIu8idWKMUdQMd3Ik3Mw",
"exp": 1529755993,
"iat": 1529752393,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "bcc5b025-98be-47b9-813b-8d6720bdf5ce",
"nonce": "Lbm6TxMWupcBULhy",
"rat": 1529752390,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
5.221 phase <--<-- 6 --- AccessToken -->-->
5.221 --> request op_args: {'state': '5kOSP1Szu9sSUcww'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
5.221 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': '5kOSP1Szu9sSUcww', 'code': 'J5ECtZMNR8RNPhDSn-2mCIYCdYBLK8cNpST0uuT7qDM.jO3CmvR0C1ryUEhrbJl29J3sN5WmMDs2vv1ExYfKBCk', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '067e554b-8c35-498f-b62a-89fd2714734c'}, 'state': '5kOSP1Szu9sSUcww'}
5.221 AccessTokenRequest {
"code": "J5ECtZMNR8RNPhDSn-2mCIYCdYBLK8cNpST0uuT7qDM.jO3CmvR0C1ryUEhrbJl29J3sN5WmMDs2vv1ExYfKBCk",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "5kOSP1Szu9sSUcww"
}
5.221 request_url https://oidc-certification.ory.sh:8443/oauth2/token
5.221 request_http_args {'headers': {'Authorization': 'Basic MDY3ZTU1NGItOGMzNS00OThmLWI2MmEtODlmZDI3MTQ3MzRjOkxUVmFMZ21aLnN4MQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
5.221 request code=J5ECtZMNR8RNPhDSn-2mCIYCdYBLK8cNpST0uuT7qDM.jO3CmvR0C1ryUEhrbJl29J3sN5WmMDs2vv1ExYfKBCk&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=5kOSP1Szu9sSUcww
5.389 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:400 message:{"error":"invalid_grant","error_description":"The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client","status_code":400,"error_debug":"The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found."}
5.389 response {'error_debug': 'The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found.', 'error_description': 'The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client', 'error': 'invalid_grant', 'status_code': 400}
5.389 event Got expected error
5.389 TokenErrorResponse {
"error": "invalid_grant",
"error_debug": "The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found.",
"error_description": "The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client",
"status_code": 400
}
5.39 phase <--<-- 7 --- Done -->-->
5.39 end
5.39 assertion VerifyResponse
5.39 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
5.39 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Discovery-JWKs.txt 0000644 0000000 0000000 00000006120 13313424663 015015 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Discovery-JWKs
Test description: Keys in OP JWKs well formed
Timestamp: 2018-06-23T11:06:27Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.075 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.076 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.076 phase <--<-- 2 --- Done -->-->
0.076 end
0.077 assertion CheckHTTPResponse
0.077 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.077 assertion VerifyBase64URL
0.176 http response url:https://oidc-certification.ory.sh:8443/.well-known/jwks.json status_code:200
0.177 condition verify-base64url: status=OK [Verifies that the base64 encoded parts of a JWK is in fact base64url encoded and not just base64 encoded]
0.177 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-base64url: status=OK [Verifies that the base64 encoded parts of a JWK is in fact base64url encoded and not just base64 encoded]
Done: status=OK
============================================================
RESULT: PASSED
./OP-scope-profile.txt 0000644 0000000 0000000 00000030447 13313425316 015006 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-scope-profile
Test description: Scope requesting profile claims
Timestamp: 2018-06-23T11:11:10Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.074 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.076 phase <--<-- 2 --- Registration -->-->
0.076 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.076 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#S7E7nBaxY8WnrXBZ"
],
"response_types": [
"code token"
]
}
0.232 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.233 RegistrationResponse {
"client_id": "22df820e-293a-47ff-8d16-3760d0089b12",
"client_secret": "2ikzpjLWcTZ2",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "22df820e-293a-47ff-8d16-3760d0089b12",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#S7E7nBaxY8WnrXBZ"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.233 phase <--<-- 3 --- AsyncAuthn -->-->
0.233 condition Check support: status=WARNING, message=No support for: scopes_supported=['profile']
0.233 AuthorizationRequest {
"client_id": "22df820e-293a-47ff-8d16-3760d0089b12",
"nonce": "VJ9D5Y0xZfSPiROl",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid profile",
"state": "x5eQEVSjrLBtEZcM"
}
0.233 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+profile&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=22df820e-293a-47ff-8d16-3760d0089b12&state=x5eQEVSjrLBtEZcM&response_type=code+token&nonce=VJ9D5Y0xZfSPiROl
0.233 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+profile&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=22df820e-293a-47ff-8d16-3760d0089b12&state=x5eQEVSjrLBtEZcM&response_type=code+token&nonce=VJ9D5Y0xZfSPiROl
3.237 http args {}
3.4 response URL with fragment
3.4 response access_token=DzqYMpL5m502shwBGZFZkHW_2VXONcsG1SPTLY4jBtA.IbAsDM6Buf1aieH-vKnx-2eUXE1-a3z-ljG3ecdQosw&code=_T3qKwUpPAagujRn41y-HJppPJQYlgxjywhkBhMB5u0.tPwD3fgOyoDOoiTSkcNwSrAMJ5UGYQDyX1ZXeXzdg2E&expires_in=3599&scope=openid%20profile&state=x5eQEVSjrLBtEZcM&token_type=bearer
3.4 response {'scope': 'openid profile', 'code': '_T3qKwUpPAagujRn41y-HJppPJQYlgxjywhkBhMB5u0.tPwD3fgOyoDOoiTSkcNwSrAMJ5UGYQDyX1ZXeXzdg2E', 'access_token': 'DzqYMpL5m502shwBGZFZkHW_2VXONcsG1SPTLY4jBtA.IbAsDM6Buf1aieH-vKnx-2eUXE1-a3z-ljG3ecdQosw', 'state': 'x5eQEVSjrLBtEZcM', 'expires_in': 3599, 'token_type': 'bearer'}
3.401 AuthorizationResponse {
"access_token": "DzqYMpL5m502shwBGZFZkHW_2VXONcsG1SPTLY4jBtA.IbAsDM6Buf1aieH-vKnx-2eUXE1-a3z-ljG3ecdQosw",
"code": "_T3qKwUpPAagujRn41y-HJppPJQYlgxjywhkBhMB5u0.tPwD3fgOyoDOoiTSkcNwSrAMJ5UGYQDyX1ZXeXzdg2E",
"expires_in": 3599,
"scope": "openid profile",
"state": "x5eQEVSjrLBtEZcM",
"token_type": "bearer"
}
3.401 phase <--<-- 4 --- AccessToken -->-->
3.401 --> request op_args: {'state': 'x5eQEVSjrLBtEZcM'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.401 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'x5eQEVSjrLBtEZcM', 'code': '_T3qKwUpPAagujRn41y-HJppPJQYlgxjywhkBhMB5u0.tPwD3fgOyoDOoiTSkcNwSrAMJ5UGYQDyX1ZXeXzdg2E', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '22df820e-293a-47ff-8d16-3760d0089b12'}, 'state': 'x5eQEVSjrLBtEZcM'}
3.401 AccessTokenRequest {
"code": "_T3qKwUpPAagujRn41y-HJppPJQYlgxjywhkBhMB5u0.tPwD3fgOyoDOoiTSkcNwSrAMJ5UGYQDyX1ZXeXzdg2E",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "x5eQEVSjrLBtEZcM"
}
3.401 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.401 request_http_args {'headers': {'Authorization': 'Basic MjJkZjgyMGUtMjkzYS00N2ZmLThkMTYtMzc2MGQwMDg5YjEyOjJpa3pwakxXY1RaMg==', 'Content-Type': 'application/x-www-form-urlencoded'}}
3.401 request code=_T3qKwUpPAagujRn41y-HJppPJQYlgxjywhkBhMB5u0.tPwD3fgOyoDOoiTSkcNwSrAMJ5UGYQDyX1ZXeXzdg2E&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=x5eQEVSjrLBtEZcM
3.637 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.638 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiUG50NmNtdndWdGFpMVVQQzhkbzFldyIsImF1ZCI6WyIyMmRmODIwZS0yOTNhLTQ3ZmYtOGQxNi0zNzYwZDAwODliMTIiXSwiYXV0aF90aW1lIjoxNTI5NzUyMTgwLCJjX2hhc2giOiI0c21wdkpUQUdiNG8tY2VodWxiZ0NRIiwiZXhwIjoxNTI5NzU1ODY5LCJpYXQiOjE1Mjk3NTIyNjksImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjIxNjQyOWRjLTE2MmUtNGRmYi05NzFmLTlhOWUwNTVmZGU1NSIsIm5vbmNlIjoiVko5RDVZMHhaZlNQaVJPbCIsInJhdCI6MTUyOTc1MjI2Niwic3ViIjoiZm9vQGJhci5jb20ifQ.W3mhqr6uQQ4u0Tn82k7YZzmsnXtVCFuksGt2WEJ-JL27N-2twLXMIEY39N9Y_XoXqjeO7pf9X4-81Lp8G1hfNAvbuCDv2RoNgpIxUWh4Ke7Wk9YJU6PPPPa_zJ8O_eaqls7TzH_vLhYqWkDAst4piVZ7ObnBzMxSAXOGUwLbQTF1RfMSpzUNBkUFzsrZfkKbZlvZMT0jFZb5w6aPp50dqcMsGcDfAiVTCLdsxVYGUvOfP0yfdc389sgbGgetnohoflev6K8-UzYTQKWmN1PThVif6UwKvheXeUqorGHEWGVdfM-yoCwY_2m_VDmy1IBdVDbqOmjvinVregkXPviGJS6ZJNtA62c7CsuoLhYp3j4RvibeAsAwkvi_I55YRdEsd3xsrrC7HbJ2YhY4I6qXky3_q-0poU51f5Ur7BIIyeN0LrEHgh-QtclmkeGEUPBThzvtRrFeGiQtnwldWec33bcaiJF1P6RozRmyvWBAGH7vsJ-0y5LtHpxKbuXoi8Ghb39rHIbyt3iztuDYNQh6fARmkx4Obzqa6wUGiuQbCCO-zWEGFw-Ur__LgkpvhnqJ8kUSKcm34EdxBJ5By4hIZTIU1CnFiDlbz7NWiivS1mjFll20TbBlC-kpkLlIJ9qTKl1AC-9b1w3_EFkohx7tKtvr7vF0loDIfpLJ5IY4bRE', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': '5PSc1dOewdOiIRlf_Rgu9LEssMT-UDA_htBwBou8CAc.5Vv9Y2mLINmrLwv4b4dt8ZxUzEi7wMpGDorLEGtpQ34', 'scope': 'openid profile'}
3.719 AccessTokenResponse {
"access_token": "5PSc1dOewdOiIRlf_Rgu9LEssMT-UDA_htBwBou8CAc.5Vv9Y2mLINmrLwv4b4dt8ZxUzEi7wMpGDorLEGtpQ34",
"expires_in": 3599,
"id_token": {
"at_hash": "Pnt6cmvwVtai1UPC8do1ew",
"aud": [
"22df820e-293a-47ff-8d16-3760d0089b12"
],
"auth_time": 1529752180,
"c_hash": "4smpvJTAGb4o-cehulbgCQ",
"exp": 1529755869,
"iat": 1529752269,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "216429dc-162e-4dfb-971f-9a9e055fde55",
"nonce": "VJ9D5Y0xZfSPiROl",
"rat": 1529752266,
"sub": "[email protected]"
},
"scope": "openid profile",
"token_type": "bearer"
}
3.719 phase <--<-- 5 --- UserInfo -->-->
3.72 do_user_info_request kwargs:{'state': 'x5eQEVSjrLBtEZcM', 'method': 'GET', 'authn_method': 'bearer_header'}
3.72 request {'body': None}
3.72 request_url https://oidc-certification.ory.sh:8443/userinfo
3.72 request_http_args {'headers': {'Authorization': 'Bearer 5PSc1dOewdOiIRlf_Rgu9LEssMT-UDA_htBwBou8CAc.5Vv9Y2mLINmrLwv4b4dt8ZxUzEi7wMpGDorLEGtpQ34'}}
3.8 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
3.801 OpenIDSchema {
"sub": "[email protected]"
}
3.801 OpenIDSchema {
"sub": "[email protected]"
}
3.801 phase <--<-- 6 --- Done -->-->
3.801 end
3.801 assertion CheckHTTPResponse
3.802 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
3.802 assertion VerifyResponse
3.802 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.802 assertion VerifyScopes
3.803 condition verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username'] [Verifies that the claims corresponding to the requested scopes are returned]
3.803 condition Done: status=OK
============================================================
Conditions
Check support: status=WARNING, message=No support for: scopes_supported=['profile']
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username'] [Verifies that the claims corresponding to the requested scopes are returned]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
No support for: scopes_supported=['profile']
The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username']
./OP-UserInfo-RS256.txt 0000644 0000000 0000000 00000026477 13313425060 014554 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-UserInfo-RS256
Test description: RP registers userinfo_signed_response_alg to signal that it wants signed UserInfo returned
Timestamp: 2018-06-23T11:08:32Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.106 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.108 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.108 phase <--<-- 2 --- Registration -->-->
0.108 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'userinfo_signed_response_alg': 'RS256'}
0.108 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#rTtI7IgFbvw3XQ6r"
],
"response_types": [
"code token"
],
"userinfo_signed_response_alg": "RS256"
}
0.268 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.269 RegistrationResponse {
"client_id": "17f03a0d-90b0-4a4e-9040-1b076d98881e",
"client_secret": "g5-M~A9FBzkU",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "17f03a0d-90b0-4a4e-9040-1b076d98881e",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#rTtI7IgFbvw3XQ6r"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "RS256"
}
0.269 phase <--<-- 3 --- AsyncAuthn -->-->
0.27 AuthorizationRequest {
"client_id": "17f03a0d-90b0-4a4e-9040-1b076d98881e",
"nonce": "4KG6LnQZNCHfEaA7",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "UQsYq7sjYQcSmfnj"
}
0.27 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=17f03a0d-90b0-4a4e-9040-1b076d98881e&state=UQsYq7sjYQcSmfnj&response_type=code+token&nonce=4KG6LnQZNCHfEaA7
0.27 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=17f03a0d-90b0-4a4e-9040-1b076d98881e&state=UQsYq7sjYQcSmfnj&response_type=code+token&nonce=4KG6LnQZNCHfEaA7
2.925 http args {}
3.138 response URL with fragment
3.139 response access_token=VD0pbbAcV2zqbr27nLQ0XzkI8sqRTRAJatA1UyMUFN0.Q5erxRWxh9FV_d4nYc8rQaRcEEacwXcS26QRDBRpPlM&code=wwgFB6YD5pPyVVcKlA0Re9GG4BqV77qqlNtU8JbyoUs.DKO4xcJ6eKEM9FTVPs5B3Fn0QcRHOkUCg5yRWPmHRs0&expires_in=3599&scope=openid&state=UQsYq7sjYQcSmfnj&token_type=bearer
3.139 response {'scope': 'openid', 'code': 'wwgFB6YD5pPyVVcKlA0Re9GG4BqV77qqlNtU8JbyoUs.DKO4xcJ6eKEM9FTVPs5B3Fn0QcRHOkUCg5yRWPmHRs0', 'access_token': 'VD0pbbAcV2zqbr27nLQ0XzkI8sqRTRAJatA1UyMUFN0.Q5erxRWxh9FV_d4nYc8rQaRcEEacwXcS26QRDBRpPlM', 'state': 'UQsYq7sjYQcSmfnj', 'expires_in': 3599, 'token_type': 'bearer'}
3.139 AuthorizationResponse {
"access_token": "VD0pbbAcV2zqbr27nLQ0XzkI8sqRTRAJatA1UyMUFN0.Q5erxRWxh9FV_d4nYc8rQaRcEEacwXcS26QRDBRpPlM",
"code": "wwgFB6YD5pPyVVcKlA0Re9GG4BqV77qqlNtU8JbyoUs.DKO4xcJ6eKEM9FTVPs5B3Fn0QcRHOkUCg5yRWPmHRs0",
"expires_in": 3599,
"scope": "openid",
"state": "UQsYq7sjYQcSmfnj",
"token_type": "bearer"
}
3.139 phase <--<-- 4 --- AccessToken -->-->
3.14 --> request op_args: {'state': 'UQsYq7sjYQcSmfnj'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.14 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'UQsYq7sjYQcSmfnj', 'code': 'wwgFB6YD5pPyVVcKlA0Re9GG4BqV77qqlNtU8JbyoUs.DKO4xcJ6eKEM9FTVPs5B3Fn0QcRHOkUCg5yRWPmHRs0', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '17f03a0d-90b0-4a4e-9040-1b076d98881e'}, 'state': 'UQsYq7sjYQcSmfnj'}
3.14 AccessTokenRequest {
"code": "wwgFB6YD5pPyVVcKlA0Re9GG4BqV77qqlNtU8JbyoUs.DKO4xcJ6eKEM9FTVPs5B3Fn0QcRHOkUCg5yRWPmHRs0",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "UQsYq7sjYQcSmfnj"
}
3.14 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.14 request_http_args {'headers': {'Authorization': 'Basic MTdmMDNhMGQtOTBiMC00YTRlLTkwNDAtMWIwNzZkOTg4ODFlOmc1LU0lN0VBOUZCemtV', 'Content-Type': 'application/x-www-form-urlencoded'}}
3.14 request code=wwgFB6YD5pPyVVcKlA0Re9GG4BqV77qqlNtU8JbyoUs.DKO4xcJ6eKEM9FTVPs5B3Fn0QcRHOkUCg5yRWPmHRs0&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=UQsYq7sjYQcSmfnj
3.369 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.37 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoibzIxVk55SUtuV1E0TFctVjJycm52QSIsImF1ZCI6WyIxN2YwM2EwZC05MGIwLTRhNGUtOTA0MC0xYjA3NmQ5ODg4MWUiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiJmSjVab1lub25EZ1pid0d3QzRxcDJnIiwiZXhwIjoxNTI5NzU1NzExLCJpYXQiOjE1Mjk3NTIxMTEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImZlNWNkMzllLTJhMTEtNDBlNi1iYTA5LWMwMDRiZjhkMTgyMCIsIm5vbmNlIjoiNEtHNkxuUVpOQ0hmRWFBNyIsInJhdCI6MTUyOTc1MjEwOCwic3ViIjoiZm9vQGJhci5jb20ifQ.ro1k10JfmDPrP5PT7-qexiCEjyLW_8rN5jeU61HyuWaY8E7dWBxIw3Oly_buUKNOlLtDgfCtAlNvaetQ7r3zXl9KH7JgV6Q3vMHDFL-B2wsgnrzBDh-3_v8EOcQ9POZwMWs64EIllF61MEElU54DcGBKIZh7RSeHZB8pZQqr8Y4quLASYunRwvpwt7xN9nx8SsOS2HQE4B8p-f2F0aFfCJx1tDrsfW6jV02SlUrhhEZlidohjz84Y5rFoOmz38_w-7ZvkpQC-pLT8QDOQMffeAUoQ_ZYGlAkndjeC7W16zxr8BVmx2lDeM-vaTq43-jfvRqH-_MkUg5Iw9KfoDWJdNNBlhebrON8UQuF-pIdBGU4ThONnYc74gcBlG7Ij0UYFx11hL3Ga6M-uRXBaYChT3qLO_SvDjNY-E-jIpow8363n4N1XeAL8FsCaNWKbMIrDAbvTtepX8Ch8_7f1kOqr2Xa6XIfcBrN5AzMeqEKbbc6C3B2xsSp5YC98xh520ydcnX_KXJShKFeZVHz2WG4Riqitd2TTqUho4IV0MAC3alqwYsDku2_yUESdwQlHYaV6cQ2OH0S43QxJ-Gx3EV1stft6jnq1ipsYEHkITXli8iTY35n7_2JnpF1UcuqaIL4ssl9bwhM4JsLs3oIDj_dPREkrD51UofhJ2M8unDsQnE', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'T4M4_HQqKusB_ISiMmV0SLEIq2N5-A9nXHJh7wX8zro.CNRv6imNp6mJ53laH10oSPGF7k9CPid8ealgsBbfteA', 'scope': 'openid'}
3.492 AccessTokenResponse {
"access_token": "T4M4_HQqKusB_ISiMmV0SLEIq2N5-A9nXHJh7wX8zro.CNRv6imNp6mJ53laH10oSPGF7k9CPid8ealgsBbfteA",
"expires_in": 3599,
"id_token": {
"at_hash": "o21VNyIKnWQ4LW-V2rrnvA",
"aud": [
"17f03a0d-90b0-4a4e-9040-1b076d98881e"
],
"auth_time": 1529751824,
"c_hash": "fJ5ZoYnonDgZbwGwC4qp2g",
"exp": 1529755711,
"iat": 1529752111,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "fe5cd39e-2a11-40e6-ba09-c004bf8d1820",
"nonce": "4KG6LnQZNCHfEaA7",
"rat": 1529752108,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.492 phase <--<-- 5 --- UserInfo -->-->
3.492 do_user_info_request kwargs:{'state': 'UQsYq7sjYQcSmfnj', 'method': 'GET', 'authn_method': 'bearer_header', 'ctype': 'jwt'}
3.492 request {'body': None}
3.492 request_url https://oidc-certification.ory.sh:8443/userinfo
3.492 request_http_args {'headers': {'Authorization': 'Bearer T4M4_HQqKusB_ISiMmV0SLEIq2N5-A9nXHJh7wX8zro.CNRv6imNp6mJ53laH10oSPGF7k9CPid8ealgsBbfteA'}}
3.654 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
3.658 OpenIDSchema {
"aud": [
"17f03a0d-90b0-4a4e-9040-1b076d98881e"
],
"iss": "https://oidc-certification.ory.sh:8443/",
"sub": "[email protected]"
}
3.658 OpenIDSchema {
"aud": [
"17f03a0d-90b0-4a4e-9040-1b076d98881e"
],
"iss": "https://oidc-certification.ory.sh:8443/",
"sub": "[email protected]"
}
3.658 phase <--<-- 6 --- Done -->-->
3.658 end
3.659 assertion VerifyResponse
3.659 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.659 assertion CheckAsymSignedUserInfo
3.659 condition asym-signed-userinfo: status=OK [Verifies that the UserInfo was signed with a RSA key]
3.659 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
asym-signed-userinfo: status=OK [Verifies that the UserInfo was signed with a RSA key]
Done: status=OK
============================================================
RESULT: PASSED
./OP-UserInfo-Body.txt 0000644 0000000 0000000 00000025444 13313425024 014661 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-UserInfo-Body
Test description: UserInfo Endpoint access with POST and bearer body
Timestamp: 2018-06-23T11:08:04Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.08 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.081 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.082 phase <--<-- 2 --- Registration -->-->
0.082 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.082 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#UXgcwJIXPzKovtYO"
],
"response_types": [
"code token"
]
}
0.24 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.241 RegistrationResponse {
"client_id": "a5810084-2bd0-4044-bade-1bc5177c2bce",
"client_secret": "oAvqAqc5SURS",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "a5810084-2bd0-4044-bade-1bc5177c2bce",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#UXgcwJIXPzKovtYO"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.241 phase <--<-- 3 --- AsyncAuthn -->-->
0.241 AuthorizationRequest {
"client_id": "a5810084-2bd0-4044-bade-1bc5177c2bce",
"nonce": "oIbU1D0miFZcscuz",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "jr0Dj6EjOUUh7R1K"
}
0.242 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=a5810084-2bd0-4044-bade-1bc5177c2bce&state=jr0Dj6EjOUUh7R1K&response_type=code+token&nonce=oIbU1D0miFZcscuz
0.242 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=a5810084-2bd0-4044-bade-1bc5177c2bce&state=jr0Dj6EjOUUh7R1K&response_type=code+token&nonce=oIbU1D0miFZcscuz
38.682 http args {}
38.849 response URL with fragment
38.849 response access_token=VmH95yKDqRuqyG6SImNL3A__MtZySNtOx-Ol86pe6uc.TtXQBJVP7PQZ_r5atej3xOtThdzBF8QRiI9sr_JmnDY&code=L3bRpyVG0Uq4fJlkA0ccsKsxpItnBP4BxEPJDNCFUlI.gfncyMYYkdzdDTFwXB-zFiaAMqpcOvkpLaeXvK_glKg&expires_in=3599&scope=openid&state=jr0Dj6EjOUUh7R1K&token_type=bearer
38.85 response {'scope': 'openid', 'code': 'L3bRpyVG0Uq4fJlkA0ccsKsxpItnBP4BxEPJDNCFUlI.gfncyMYYkdzdDTFwXB-zFiaAMqpcOvkpLaeXvK_glKg', 'access_token': 'VmH95yKDqRuqyG6SImNL3A__MtZySNtOx-Ol86pe6uc.TtXQBJVP7PQZ_r5atej3xOtThdzBF8QRiI9sr_JmnDY', 'state': 'jr0Dj6EjOUUh7R1K', 'expires_in': 3599, 'token_type': 'bearer'}
38.85 AuthorizationResponse {
"access_token": "VmH95yKDqRuqyG6SImNL3A__MtZySNtOx-Ol86pe6uc.TtXQBJVP7PQZ_r5atej3xOtThdzBF8QRiI9sr_JmnDY",
"code": "L3bRpyVG0Uq4fJlkA0ccsKsxpItnBP4BxEPJDNCFUlI.gfncyMYYkdzdDTFwXB-zFiaAMqpcOvkpLaeXvK_glKg",
"expires_in": 3599,
"scope": "openid",
"state": "jr0Dj6EjOUUh7R1K",
"token_type": "bearer"
}
38.85 phase <--<-- 4 --- AccessToken -->-->
38.851 --> request op_args: {'state': 'jr0Dj6EjOUUh7R1K'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
38.851 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'jr0Dj6EjOUUh7R1K', 'code': 'L3bRpyVG0Uq4fJlkA0ccsKsxpItnBP4BxEPJDNCFUlI.gfncyMYYkdzdDTFwXB-zFiaAMqpcOvkpLaeXvK_glKg', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'a5810084-2bd0-4044-bade-1bc5177c2bce'}, 'state': 'jr0Dj6EjOUUh7R1K'}
38.851 AccessTokenRequest {
"code": "L3bRpyVG0Uq4fJlkA0ccsKsxpItnBP4BxEPJDNCFUlI.gfncyMYYkdzdDTFwXB-zFiaAMqpcOvkpLaeXvK_glKg",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "jr0Dj6EjOUUh7R1K"
}
38.851 request_url https://oidc-certification.ory.sh:8443/oauth2/token
38.851 request_http_args {'headers': {'Authorization': 'Basic YTU4MTAwODQtMmJkMC00MDQ0LWJhZGUtMWJjNTE3N2MyYmNlOm9BdnFBcWM1U1VSUw==', 'Content-Type': 'application/x-www-form-urlencoded'}}
38.851 request code=L3bRpyVG0Uq4fJlkA0ccsKsxpItnBP4BxEPJDNCFUlI.gfncyMYYkdzdDTFwXB-zFiaAMqpcOvkpLaeXvK_glKg&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=jr0Dj6EjOUUh7R1K
39.089 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
39.09 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiQ29LMmlFU2pxSl9rVF9UbnNWMmdOQSIsImF1ZCI6WyJhNTgxMDA4NC0yYmQwLTQwNDQtYmFkZS0xYmM1MTc3YzJiY2UiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiI2REhJS2FvZnFKNVlZcTVKeW8zRG93IiwiZXhwIjoxNTI5NzU1NjgzLCJpYXQiOjE1Mjk3NTIwODMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjY2ODg5YjYzLTJmYTktNDRmNi1hZTNhLWNjZWU4M2FlZDM0OCIsIm5vbmNlIjoib0liVTFEMG1pRlpjc2N1eiIsInJhdCI6MTUyOTc1MjA0NSwic3ViIjoiZm9vQGJhci5jb20ifQ.We2h2dt083Em1i_H3luywV2Q-VN1g9HYpI6pUkq9yImGb0mScSSwN_diXF1I8v1W5Ros1YhhJj6BK3JMd_ddS_AA7ZHy2so69TxEG9-2y3rJdWzJD7G9ghDfPImL0zGposDT8CQincNT0jKOsUXJArvBkUzQdVCtbDQ2limSefrNuLxn6ybU8_XTxX7kZbs8lMdo1a3Pi31SkX7qWaHR_mc6tkpfDyjP3Hs0GnnBkQKFRdr3yqtYTByxlhc6hd9xpKBnaTyGuAfuOmopPZ3ACx4gcwwq0U_lygiLvPAQOS2bzgYGJHDsPZ7K6mVHOlUpLxmh9wQHPn2J3V58TOD0zrPKm9Ax63TJp9tWgUKpvxLczLeEgTPjYqVd1YrcA-HIbZ-6H3FGXP-rXGOZblqI-6xJhyQpAGIzTBEHS-McgBYADyIlrCrnVhllqTiUCX862Td5s5e5iJn0S1l3azLFXDa_ZiJMoQxiUH-ZUxSFGRZ6pOUWp51KhbWRau082nS9184RAw1t9YdoWEUqFHnho18sQFAIxKAcl7awaemcR4a9HUaPD-2S5KfQ0AyKHz12gk0m55AKhX65YAvQI5dj_EdHRxlVtE8uuZLU46y9WE40i0zkGhhod5LMHbRetPGejICqBUhUmLBWqXPg9f8qpMNM0jxFyHbs4SwJd3woGtc', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'yqPT4I2FpstAtR1FBKilfh-6ypi_6ehIGI1DAz_eZ_A.WIHJvZv8Saw839DOlCCQAaUFyz2hS6EzUG2gQ_2va04', 'scope': 'openid'}
39.204 AccessTokenResponse {
"access_token": "yqPT4I2FpstAtR1FBKilfh-6ypi_6ehIGI1DAz_eZ_A.WIHJvZv8Saw839DOlCCQAaUFyz2hS6EzUG2gQ_2va04",
"expires_in": 3599,
"id_token": {
"at_hash": "CoK2iESjqJ_kT_TnsV2gNA",
"aud": [
"a5810084-2bd0-4044-bade-1bc5177c2bce"
],
"auth_time": 1529751824,
"c_hash": "6DHIKaofqJ5YYq5Jyo3Dow",
"exp": 1529755683,
"iat": 1529752083,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "66889b63-2fa9-44f6-ae3a-ccee83aed348",
"nonce": "oIbU1D0miFZcscuz",
"rat": 1529752045,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
39.204 phase <--<-- 5 --- UserInfo -->-->
39.204 do_user_info_request kwargs:{'state': 'jr0Dj6EjOUUh7R1K', 'method': 'POST', 'authn_method': 'token_in_message_body'}
39.204 request {'body': 'access_token=yqPT4I2FpstAtR1FBKilfh-6ypi_6ehIGI1DAz_eZ_A.WIHJvZv8Saw839DOlCCQAaUFyz2hS6EzUG2gQ_2va04'}
39.204 request_url https://oidc-certification.ory.sh:8443/userinfo
39.204 request_http_args {'headers': {'Content-Type': 'application/x-www-form-urlencoded'}}
39.313 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
39.314 OpenIDSchema {
"sub": "[email protected]"
}
39.314 OpenIDSchema {
"sub": "[email protected]"
}
39.314 phase <--<-- 6 --- Done -->-->
39.314 end
39.315 assertion VerifyResponse
39.315 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
39.315 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-redirect_uri-Query-Mismatch.txt 0000644 0000000 0000000 00000011226 13313425231 017553 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-Query-Mismatch
Test description: Rejects redirect_uri when query parameter does not match what is registed
Timestamp: 2018-06-23T11:10:18Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.128 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.129 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.129 phase <--<-- 2 --- Registration -->-->
0.13 register kwargs:{'application_name': 'OIC test tool', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'redirect_uri': ['https://op.certification.openid.net:61353/authz_cb?foo=bar']}
0.13 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#NB1APxePYRhOjh9r"
],
"response_types": [
"code token"
]
}
0.294 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.295 RegistrationResponse {
"client_id": "3f1f3670-92b2-4d46-b6df-521cbd8223b1",
"client_secret": "gxcU9tLFj862",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "3f1f3670-92b2-4d46-b6df-521cbd8223b1",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#NB1APxePYRhOjh9r"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.295 phase <--<-- 3 --- Note -->-->
============================================================
Conditions
============================================================
RESULT: PARTIAL RESULT
./OP-ClientAuth-SecretPost-Dynamic.txt 0000644 0000000 0000000 00000024654 13313424752 017760 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-ClientAuth-SecretPost-Dynamic
Test description: Access token request with client_secret_post authentication
Timestamp: 2018-06-23T11:07:22Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Registration -->-->
0.074 register kwargs:{'application_name': 'OIC test tool', 'token_endpoint_auth_method': 'client_secret_post', 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'response_types': ['code token'], 'url': 'https://oidc-certification.ory.sh:8443/clients', 'application_type': 'web'}
0.075 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#WBVlXK2EdRUcbG1x"
],
"response_types": [
"code token"
],
"token_endpoint_auth_method": "client_secret_post"
}
0.231 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.232 RegistrationResponse {
"client_id": "0d638862-42df-47f5-b588-d62db83f0a7f",
"client_secret": "DTmxnBU1BaI4",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "0d638862-42df-47f5-b588-d62db83f0a7f",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#WBVlXK2EdRUcbG1x"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_post",
"userinfo_signed_response_alg": "none"
}
0.232 phase <--<-- 3 --- AsyncAuthn -->-->
0.232 AuthorizationRequest {
"client_id": "0d638862-42df-47f5-b588-d62db83f0a7f",
"nonce": "xcFLWZG6URAUH2kt",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "qIpEz2Wxk76jubfJ"
}
0.232 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=0d638862-42df-47f5-b588-d62db83f0a7f&state=qIpEz2Wxk76jubfJ&response_type=code+token&nonce=xcFLWZG6URAUH2kt
0.232 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=0d638862-42df-47f5-b588-d62db83f0a7f&state=qIpEz2Wxk76jubfJ&response_type=code+token&nonce=xcFLWZG6URAUH2kt
2.895 http args {}
3.068 response URL with fragment
3.068 response access_token=7bO0mCN_wppSMROjKh_4eJaSank4LKgEVG8tGLkM98k.vitGmgr2WL6JpC65oYv6KLSJNOEwjQIHcagt3TtKlPM&code=emXbUX86qmB70a1N-d1vQz7Dw3kAQzdOav13R_7G71U.DuOt6Kt2GStkF03MORYPQ3ofNxKzt2WLqbKZawMEhRU&expires_in=3599&scope=openid&state=qIpEz2Wxk76jubfJ&token_type=bearer
3.069 response {'scope': 'openid', 'code': 'emXbUX86qmB70a1N-d1vQz7Dw3kAQzdOav13R_7G71U.DuOt6Kt2GStkF03MORYPQ3ofNxKzt2WLqbKZawMEhRU', 'access_token': '7bO0mCN_wppSMROjKh_4eJaSank4LKgEVG8tGLkM98k.vitGmgr2WL6JpC65oYv6KLSJNOEwjQIHcagt3TtKlPM', 'state': 'qIpEz2Wxk76jubfJ', 'expires_in': 3599, 'token_type': 'bearer'}
3.069 AuthorizationResponse {
"access_token": "7bO0mCN_wppSMROjKh_4eJaSank4LKgEVG8tGLkM98k.vitGmgr2WL6JpC65oYv6KLSJNOEwjQIHcagt3TtKlPM",
"code": "emXbUX86qmB70a1N-d1vQz7Dw3kAQzdOav13R_7G71U.DuOt6Kt2GStkF03MORYPQ3ofNxKzt2WLqbKZawMEhRU",
"expires_in": 3599,
"scope": "openid",
"state": "qIpEz2Wxk76jubfJ",
"token_type": "bearer"
}
3.069 phase <--<-- 4 --- AccessToken -->-->
3.069 --> request op_args: {'state': 'qIpEz2Wxk76jubfJ', 'authn_method': 'client_secret_post'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.069 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'qIpEz2Wxk76jubfJ', 'code': 'emXbUX86qmB70a1N-d1vQz7Dw3kAQzdOav13R_7G71U.DuOt6Kt2GStkF03MORYPQ3ofNxKzt2WLqbKZawMEhRU', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '0d638862-42df-47f5-b588-d62db83f0a7f'}, 'state': 'qIpEz2Wxk76jubfJ', 'authn_method': 'client_secret_post'}
3.069 AccessTokenRequest {
"client_id": "0d638862-42df-47f5-b588-d62db83f0a7f",
"client_secret": "DTmxnBU1BaI4",
"code": "emXbUX86qmB70a1N-d1vQz7Dw3kAQzdOav13R_7G71U.DuOt6Kt2GStkF03MORYPQ3ofNxKzt2WLqbKZawMEhRU",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "qIpEz2Wxk76jubfJ"
}
3.07 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.07 request_http_args {'headers': {'Content-Type': 'application/x-www-form-urlencoded'}}
3.07 request code=emXbUX86qmB70a1N-d1vQz7Dw3kAQzdOav13R_7G71U.DuOt6Kt2GStkF03MORYPQ3ofNxKzt2WLqbKZawMEhRU&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=0d638862-42df-47f5-b588-d62db83f0a7f&grant_type=authorization_code&state=qIpEz2Wxk76jubfJ&client_secret=DTmxnBU1BaI4
3.288 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.289 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiUGNhcFUxQ3ZYd09FbHlHOTRqU0dOUSIsImF1ZCI6WyIwZDYzODg2Mi00MmRmLTQ3ZjUtYjU4OC1kNjJkYjgzZjBhN2YiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiI2cWNha09SajZJMmU4ckljNVVGdWtRIiwiZXhwIjoxNTI5NzU1NjQyLCJpYXQiOjE1Mjk3NTIwNDIsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjNjODJjZWM5LTYyMWEtNDhmNi1hNmEwLTUwZmUzMTYzMjJhZiIsIm5vbmNlIjoieGNGTFdaRzZVUkFVSDJrdCIsInJhdCI6MTUyOTc1MjAzOSwic3ViIjoiZm9vQGJhci5jb20ifQ.m-8ow1mgD9v0SDUR95Asadr6wmXupPuebaUV2zWBhrjKe32a1cvAHVy4OejVH6_D_TQ_G13JkfRKMG-I_7F9LX5ViyXhrRFfhXM8LTrXMNzJAZlrOUDs_PbVmUh5z_Xczjc82_I01hjfvcTOufpG6REZsI-5gdvVfAnfr13lHyCIGnzdk0lyaThkbsf0ZF7Lh1dL2qGWQOKeef6cZ4zECwvNZWbQkDTt8fwWSqdsyzpLl9eaXYD-S2JpflS_H3e5NjHG0rxXA80Ab-AWVYanDTIIlcS6QBMoG_owtk6K8sS6EBKijaqxsbVbQoNrdtG_RvQRXVZqJ61IfiOKwcaDfXvPu7S2O4iX1JVQwTrTqmcoZuejWGxYKrY_aqc8j3bzVOwUqu6hgMiId7hbh7JF-lablxc99FgNGi4S6KyqamEsX-R9IgS-KJgbnYFMuH5czo9-wTURz2E8M4YRmR2vg6nO5PCU4eISXwWygcDPv6H97Yl_UVYwFtJJzYdbvQeRRcwGFOFU6z7EZ2rjcWJjRopzWCd3TdLyGCTfsRcKfqqbl7_a9EuV2-l1x-fPC_pxpps6hhkckRba_wWOLITTg-XG19iLgzG7B7cNRQsQOHJAmt672Lj1e8eY0N4LBAuooF-Mf2YDQLPSXiGrB-hB0y3k4KzcW5Lu8Z-kxD4sl_U', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'fB22VZ0sovnXFOXXDwKdIGjxlH3V3ERLm7mZ2OtsBlQ.QKgbgEGqpmQmxGO6ZxbGPhJ7xWy4YpoJt3q0TkA9D08', 'scope': 'openid'}
3.373 AccessTokenResponse {
"access_token": "fB22VZ0sovnXFOXXDwKdIGjxlH3V3ERLm7mZ2OtsBlQ.QKgbgEGqpmQmxGO6ZxbGPhJ7xWy4YpoJt3q0TkA9D08",
"expires_in": 3599,
"id_token": {
"at_hash": "PcapU1CvXwOElyG94jSGNQ",
"aud": [
"0d638862-42df-47f5-b588-d62db83f0a7f"
],
"auth_time": 1529751824,
"c_hash": "6qcakORj6I2e8rIc5UFukQ",
"exp": 1529755642,
"iat": 1529752042,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "3c82cec9-621a-48f6-a6a0-50fe316322af",
"nonce": "xcFLWZG6URAUH2kt",
"rat": 1529752039,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.373 phase <--<-- 5 --- Done -->-->
3.373 end
3.374 assertion VerifyResponse
3.374 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.374 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-nonce-noncode.txt 0000644 0000000 0000000 00000024766 13313425153 014772 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-nonce-noncode
Test description: Request with nonce, verifies it was returned in ID Token [Implicit, Hybrid]
Timestamp: 2018-06-23T11:09:31Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.079 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.081 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.081 phase <--<-- 2 --- Registration -->-->
0.081 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.081 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#UeKVOtLjrfWqweFu"
],
"response_types": [
"code token"
]
}
0.235 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.236 RegistrationResponse {
"client_id": "6d7ad1a2-3641-4a1c-b763-d3d474cb46da",
"client_secret": "WN8zQ75Kvm_K",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "6d7ad1a2-3641-4a1c-b763-d3d474cb46da",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#UeKVOtLjrfWqweFu"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.236 phase <--<-- 3 --- AsyncAuthn -->-->
0.236 AuthorizationRequest {
"client_id": "6d7ad1a2-3641-4a1c-b763-d3d474cb46da",
"nonce": "IeQLF1N3sKy81Zs0",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "sJ73SXCnQINan2ib"
}
0.237 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=6d7ad1a2-3641-4a1c-b763-d3d474cb46da&state=sJ73SXCnQINan2ib&response_type=code+token&nonce=IeQLF1N3sKy81Zs0
0.237 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=6d7ad1a2-3641-4a1c-b763-d3d474cb46da&state=sJ73SXCnQINan2ib&response_type=code+token&nonce=IeQLF1N3sKy81Zs0
34.611 http args {}
34.773 response URL with fragment
34.774 response access_token=DEdGHhgsH-y8L4wwNJGFrkYENdqVCGPqSqGfwAtFOro.yER_dwjalTAG-LBvMfWkm74zunnGJq4qP_CEEL7P-Ts&code=Y9HyRBMLfZd3xmY2fd-wtNj3L9GLMF2A7hc9NgEO9SI.d9SwnmCj_Wyj_9s4aUWRe501EblFXSY7kdR1V0NJWSg&expires_in=3599&scope=openid&state=sJ73SXCnQINan2ib&token_type=bearer
34.774 response {'scope': 'openid', 'code': 'Y9HyRBMLfZd3xmY2fd-wtNj3L9GLMF2A7hc9NgEO9SI.d9SwnmCj_Wyj_9s4aUWRe501EblFXSY7kdR1V0NJWSg', 'access_token': 'DEdGHhgsH-y8L4wwNJGFrkYENdqVCGPqSqGfwAtFOro.yER_dwjalTAG-LBvMfWkm74zunnGJq4qP_CEEL7P-Ts', 'state': 'sJ73SXCnQINan2ib', 'expires_in': 3599, 'token_type': 'bearer'}
34.775 AuthorizationResponse {
"access_token": "DEdGHhgsH-y8L4wwNJGFrkYENdqVCGPqSqGfwAtFOro.yER_dwjalTAG-LBvMfWkm74zunnGJq4qP_CEEL7P-Ts",
"code": "Y9HyRBMLfZd3xmY2fd-wtNj3L9GLMF2A7hc9NgEO9SI.d9SwnmCj_Wyj_9s4aUWRe501EblFXSY7kdR1V0NJWSg",
"expires_in": 3599,
"scope": "openid",
"state": "sJ73SXCnQINan2ib",
"token_type": "bearer"
}
34.775 phase <--<-- 4 --- AccessToken -->-->
34.775 --> request op_args: {'state': 'sJ73SXCnQINan2ib'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
34.775 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'sJ73SXCnQINan2ib', 'code': 'Y9HyRBMLfZd3xmY2fd-wtNj3L9GLMF2A7hc9NgEO9SI.d9SwnmCj_Wyj_9s4aUWRe501EblFXSY7kdR1V0NJWSg', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '6d7ad1a2-3641-4a1c-b763-d3d474cb46da'}, 'state': 'sJ73SXCnQINan2ib'}
34.775 AccessTokenRequest {
"code": "Y9HyRBMLfZd3xmY2fd-wtNj3L9GLMF2A7hc9NgEO9SI.d9SwnmCj_Wyj_9s4aUWRe501EblFXSY7kdR1V0NJWSg",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "sJ73SXCnQINan2ib"
}
34.775 request_url https://oidc-certification.ory.sh:8443/oauth2/token
34.775 request_http_args {'headers': {'Authorization': 'Basic NmQ3YWQxYTItMzY0MS00YTFjLWI3NjMtZDNkNDc0Y2I0NmRhOldOOHpRNzVLdm1fSw==', 'Content-Type': 'application/x-www-form-urlencoded'}}
34.775 request code=Y9HyRBMLfZd3xmY2fd-wtNj3L9GLMF2A7hc9NgEO9SI.d9SwnmCj_Wyj_9s4aUWRe501EblFXSY7kdR1V0NJWSg&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=sJ73SXCnQINan2ib
35.009 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
35.01 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoidGVqajFrdzR6WjBDSHdTLW8wSFlvZyIsImF1ZCI6WyI2ZDdhZDFhMi0zNjQxLTRhMWMtYjc2My1kM2Q0NzRjYjQ2ZGEiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiJkVnZjZ1ZoRTEtSDl6LWxiNThWTWxBIiwiZXhwIjoxNTI5NzU1NzcwLCJpYXQiOjE1Mjk3NTIxNzEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjZhMzM3ZTI1LTA3NzctNGVjMS05MDYzLTI3MGEzOWU5NmJjZSIsIm5vbmNlIjoiSWVRTEYxTjNzS3k4MVpzMCIsInJhdCI6MTUyOTc1MjEzNiwic3ViIjoiZm9vQGJhci5jb20ifQ.h1DEmXH7F65nTly7dIyK76f_MKbzY05Y0noqVhTOQlvMaCo9KkyIcYUp3rtNRmMFvcV2hJGFNKBwUvIg5LGZyjKoTGNLkmeIL6aMgysal3BAMwp2l-guFtsNpgoN5VM0-gMYsTBvsif1_UJm-qi13zjd807x1LCvxks44Uy-SHMyhWyQtcC5gvEf5aBUSlk53u1CiwZaYt9QT8RA6FvQ51Sy_BhxUAqxjZ_xXsuHu2So6trzqjAq0sxInLysKwSL13f1jThTV0PAppIK1K-VCVxNFjbhPobyGY2UvgFwTMpfixuJoAWOgKN_9v6cyEGqXv4EuPsL0Vg99RXtMagNqRNuOIXooBZIyGbGmWsP66ueN9L43d5uz8SCqvzpgEfPeaRqjG27EAL8UtHDCk4c_bGEu4n9VHtqRx7OoClR2b4lX-wQLnmU_hIDtTKlft_fIf2wvTL38Kie_EnowiauNOdvrKteYEmWDE4xPUCBn5NPKA8Rz55VoikyGH8yjiR--nOJETvFOWKz2N8TTnkBJwChHMtH3IAgeP3Qq4sxQopdskpmbI1RlRo7pOsAAteVW-kix30DAKRYP74J_VqqanawnZ9kqJpi98NIxUchcFaXQDDsEjowVhyO96iIZ1tmE4EHjueB8M7IKZVED8mLsAFXysgn2w3EOdYMZbnERrY', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'AdD7cAZiciUGy7tsI9KR6kXocmewXYXayd3c44UnIqA.IOZBOS0PFmGopeli4DpQuiLcHTPEdDVfxC78IIM3aBI', 'scope': 'openid'}
35.091 AccessTokenResponse {
"access_token": "AdD7cAZiciUGy7tsI9KR6kXocmewXYXayd3c44UnIqA.IOZBOS0PFmGopeli4DpQuiLcHTPEdDVfxC78IIM3aBI",
"expires_in": 3599,
"id_token": {
"at_hash": "tejj1kw4zZ0CHwS-o0HYog",
"aud": [
"6d7ad1a2-3641-4a1c-b763-d3d474cb46da"
],
"auth_time": 1529751824,
"c_hash": "dVvcgVhE1-H9z-lb58VMlA",
"exp": 1529755770,
"iat": 1529752171,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "6a337e25-0777-4ec1-9063-270a39e96bce",
"nonce": "IeQLF1N3sKy81Zs0",
"rat": 1529752136,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
35.091 phase <--<-- 5 --- Done -->-->
35.091 end
35.092 assertion VerifyResponse
35.092 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
35.092 assertion CheckIdTokenNonce
35.092 condition check-idtoken-nonce: status=OK [Verify that the nonce in the IDToken is the same that's included in the Authorization Request.]
35.092 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
check-idtoken-nonce: status=OK [Verify that the nonce in the IDToken is the same that's included in the Authorization Request.]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Registration-jwks.txt 0000644 0000000 0000000 00000040741 13313424675 015672 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-jwks
Test description: Uses keys registered with jwks value
Timestamp: 2018-06-23T11:06:37Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.075 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.076 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.076 phase <--<-- 2 --- Registration -->-->
0.077 register kwargs:{'application_name': 'OIC test tool', 'jwks': {'keys': [{'use': 'enc', 'kty': 'RSA', 'n': 'pKXuY5tuT9ibmEcq4B6VRx3MafdSsajrOndAk5FjJFedlA6qSpdqDUr9wWUkNeO8h_efdLfg43CHXk3mH6Fp1t2gbHzBQ4-SzT3_X5tsdG2PPqvngem7f5NHO6Kefhq11Zk5q4-FyTL9FUQQW6ZANbrU7GifSAs82Ck20ciIvFdv7cPCphk_THMVv14aW5w0eKEXumgx4Bc7HrQFXQUHSze3dVAKg8hKHDIQOGUU0fkolEFmOC4Gb-G57RpBJryZxXqgdUdEG66xl1f37tqpYgaLViFDWDiI8S7BMVHEbGHN4-f_MD9f6gMduaxrL6a6SfyIW1So2VqtvlAyanesTw', 'e': 'AQAB', 'kid': 'gtH4v3Yr2QqLreBSz0ByQQ8vkf8eFo1KIit3s-3Bbww'}, {'use': 'sig', 'kty': 'RSA', 'n': '1Z8lhYNb0tHZsVrzIQs-JetNCLIBWeOHXblcirxQgFLt6z4Rr-9vxPbEsrmRmZbPuuoL8nGehqOK11LAgqa1QfCR4TKxr2srlbTv4A4Gyf-suhO_KKt0JWv2q9olREZcoIE4FCwK0vuWTqD5q4qL_uqt_kHltzhdkJ4LySdCRCbxG1kcEcXoPNIhZERttqbZTIQviJxJ2HqC7CbwocmZMnbMAzP52bVX86vLxosmI-pqkG1RG8jMTZMhvc2GmYe6CfleW7bRxS0078sWDM_iACSQVOqLk5rcW_C-a61EYzNNN7BMw-VxFSDtoGgNgb6XGM6FTf9fkdJjIRL2VZAt0Q', 'e': 'AQAB', 'kid': 'wt25OgyR_nzG3OoQ7daa2rL6-gMnFdfRzBjhUVPu8RQ'}, {'x': 'aruz0ufjUGuEQwg2Q3ewyy5DnEIWWmIEO5stN8MfUTA', 'use': 'sig', 'kty': 'EC', 'y': 'dZnZMUOQAvzOD6q1f11PEho4-aX7nWdmive8zdxUbrA', 'crv': 'P-256', 'kid': 'AZXCzT401BtqezIxAdHOEez1ApQUu3O5hjcfRFKxXtQ'}, {'x': 'AeI9gyN_hcFae8vO2HgaH7Fh-MVX1YXJdWg-T16g1kM', 'use': 'enc', 'kty': 'EC', 'y': '5ASt8rCvPWTKMAh6wvR8_-OEbl_9TTkkgAd7LXW8H48', 'crv': 'P-256', 'kid': 'CrXNdVSdrZ-lOToSPso6OlcZnP-Et4U9CzOIZOZPvLw'}]}, 'token_endpoint_auth_method': 'private_key_jwt', 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'grant_types': ['authorization_code', 'implicit'], 'response_types': ['code token'], 'url': 'https://oidc-certification.ory.sh:8443/clients', 'application_type': 'web'}
0.078 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks": {
"keys": [
{
"e": "AQAB",
"kid": "gtH4v3Yr2QqLreBSz0ByQQ8vkf8eFo1KIit3s-3Bbww",
"kty": "RSA",
"n": "pKXuY5tuT9ibmEcq4B6VRx3MafdSsajrOndAk5FjJFedlA6qSpdqDUr9wWUkNeO8h_efdLfg43CHXk3mH6Fp1t2gbHzBQ4-SzT3_X5tsdG2PPqvngem7f5NHO6Kefhq11Zk5q4-FyTL9FUQQW6ZANbrU7GifSAs82Ck20ciIvFdv7cPCphk_THMVv14aW5w0eKEXumgx4Bc7HrQFXQUHSze3dVAKg8hKHDIQOGUU0fkolEFmOC4Gb-G57RpBJryZxXqgdUdEG66xl1f37tqpYgaLViFDWDiI8S7BMVHEbGHN4-f_MD9f6gMduaxrL6a6SfyIW1So2VqtvlAyanesTw",
"use": "enc"
},
{
"e": "AQAB",
"kid": "wt25OgyR_nzG3OoQ7daa2rL6-gMnFdfRzBjhUVPu8RQ",
"kty": "RSA",
"n": "1Z8lhYNb0tHZsVrzIQs-JetNCLIBWeOHXblcirxQgFLt6z4Rr-9vxPbEsrmRmZbPuuoL8nGehqOK11LAgqa1QfCR4TKxr2srlbTv4A4Gyf-suhO_KKt0JWv2q9olREZcoIE4FCwK0vuWTqD5q4qL_uqt_kHltzhdkJ4LySdCRCbxG1kcEcXoPNIhZERttqbZTIQviJxJ2HqC7CbwocmZMnbMAzP52bVX86vLxosmI-pqkG1RG8jMTZMhvc2GmYe6CfleW7bRxS0078sWDM_iACSQVOqLk5rcW_C-a61EYzNNN7BMw-VxFSDtoGgNgb6XGM6FTf9fkdJjIRL2VZAt0Q",
"use": "sig"
},
{
"crv": "P-256",
"kid": "AZXCzT401BtqezIxAdHOEez1ApQUu3O5hjcfRFKxXtQ",
"kty": "EC",
"use": "sig",
"x": "aruz0ufjUGuEQwg2Q3ewyy5DnEIWWmIEO5stN8MfUTA",
"y": "dZnZMUOQAvzOD6q1f11PEho4-aX7nWdmive8zdxUbrA"
},
{
"crv": "P-256",
"kid": "CrXNdVSdrZ-lOToSPso6OlcZnP-Et4U9CzOIZOZPvLw",
"kty": "EC",
"use": "enc",
"x": "AeI9gyN_hcFae8vO2HgaH7Fh-MVX1YXJdWg-T16g1kM",
"y": "5ASt8rCvPWTKMAh6wvR8_-OEbl_9TTkkgAd7LXW8H48"
}
]
},
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#bM8OSfFM3LCukR0z"
],
"response_types": [
"code token"
],
"token_endpoint_auth_method": "private_key_jwt"
}
0.232 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.233 RegistrationResponse {
"client_id": "00b815c9-9f8b-40a7-8469-ce57e30605c9",
"client_secret": "IoYVxiPx4n8y",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "00b815c9-9f8b-40a7-8469-ce57e30605c9",
"jwks": {
"keys": [
{
"e": "AQAB",
"kid": "gtH4v3Yr2QqLreBSz0ByQQ8vkf8eFo1KIit3s-3Bbww",
"kty": "RSA",
"n": "pKXuY5tuT9ibmEcq4B6VRx3MafdSsajrOndAk5FjJFedlA6qSpdqDUr9wWUkNeO8h_efdLfg43CHXk3mH6Fp1t2gbHzBQ4-SzT3_X5tsdG2PPqvngem7f5NHO6Kefhq11Zk5q4-FyTL9FUQQW6ZANbrU7GifSAs82Ck20ciIvFdv7cPCphk_THMVv14aW5w0eKEXumgx4Bc7HrQFXQUHSze3dVAKg8hKHDIQOGUU0fkolEFmOC4Gb-G57RpBJryZxXqgdUdEG66xl1f37tqpYgaLViFDWDiI8S7BMVHEbGHN4-f_MD9f6gMduaxrL6a6SfyIW1So2VqtvlAyanesTw",
"use": "enc"
},
{
"e": "AQAB",
"kid": "wt25OgyR_nzG3OoQ7daa2rL6-gMnFdfRzBjhUVPu8RQ",
"kty": "RSA",
"n": "1Z8lhYNb0tHZsVrzIQs-JetNCLIBWeOHXblcirxQgFLt6z4Rr-9vxPbEsrmRmZbPuuoL8nGehqOK11LAgqa1QfCR4TKxr2srlbTv4A4Gyf-suhO_KKt0JWv2q9olREZcoIE4FCwK0vuWTqD5q4qL_uqt_kHltzhdkJ4LySdCRCbxG1kcEcXoPNIhZERttqbZTIQviJxJ2HqC7CbwocmZMnbMAzP52bVX86vLxosmI-pqkG1RG8jMTZMhvc2GmYe6CfleW7bRxS0078sWDM_iACSQVOqLk5rcW_C-a61EYzNNN7BMw-VxFSDtoGgNgb6XGM6FTf9fkdJjIRL2VZAt0Q",
"use": "sig"
},
{
"crv": "P-256",
"kid": "AZXCzT401BtqezIxAdHOEez1ApQUu3O5hjcfRFKxXtQ",
"kty": "EC",
"use": "sig",
"x": "aruz0ufjUGuEQwg2Q3ewyy5DnEIWWmIEO5stN8MfUTA",
"y": "dZnZMUOQAvzOD6q1f11PEho4-aX7nWdmive8zdxUbrA"
},
{
"crv": "P-256",
"kid": "CrXNdVSdrZ-lOToSPso6OlcZnP-Et4U9CzOIZOZPvLw",
"kty": "EC",
"use": "enc",
"x": "AeI9gyN_hcFae8vO2HgaH7Fh-MVX1YXJdWg-T16g1kM",
"y": "5ASt8rCvPWTKMAh6wvR8_-OEbl_9TTkkgAd7LXW8H48"
}
]
},
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#bM8OSfFM3LCukR0z"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "private_key_jwt",
"userinfo_signed_response_alg": "none"
}
0.233 phase <--<-- 3 --- AsyncAuthn -->-->
0.234 AuthorizationRequest {
"client_id": "00b815c9-9f8b-40a7-8469-ce57e30605c9",
"nonce": "mug4qP85Fw1nhFro",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "PROvBUYpKZvVylwO"
}
0.234 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=00b815c9-9f8b-40a7-8469-ce57e30605c9&state=PROvBUYpKZvVylwO&response_type=code+token&nonce=mug4qP85Fw1nhFro
0.234 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=00b815c9-9f8b-40a7-8469-ce57e30605c9&state=PROvBUYpKZvVylwO&response_type=code+token&nonce=mug4qP85Fw1nhFro
3.531 http args {}
3.697 response URL with fragment
3.698 response access_token=3D0JOpzLRt9-sLPXvqTrkNuGCJYL50lygwLShemWv_o.xHCP7Vy-cJDSkZ401l47i8wyHAWWaIc3-cxO2RTnnDs&code=OWCoxwdFVUhLJ2YOH5q1n3utxjnwsIauj2kjh25wlSI.UJwoPLAFzNAmTHS5Tq5PlqinIm1l2WBxjraI4zkYB9I&expires_in=3599&scope=openid&state=PROvBUYpKZvVylwO&token_type=bearer
3.698 response {'scope': 'openid', 'code': 'OWCoxwdFVUhLJ2YOH5q1n3utxjnwsIauj2kjh25wlSI.UJwoPLAFzNAmTHS5Tq5PlqinIm1l2WBxjraI4zkYB9I', 'access_token': '3D0JOpzLRt9-sLPXvqTrkNuGCJYL50lygwLShemWv_o.xHCP7Vy-cJDSkZ401l47i8wyHAWWaIc3-cxO2RTnnDs', 'state': 'PROvBUYpKZvVylwO', 'expires_in': 3599, 'token_type': 'bearer'}
3.698 AuthorizationResponse {
"access_token": "3D0JOpzLRt9-sLPXvqTrkNuGCJYL50lygwLShemWv_o.xHCP7Vy-cJDSkZ401l47i8wyHAWWaIc3-cxO2RTnnDs",
"code": "OWCoxwdFVUhLJ2YOH5q1n3utxjnwsIauj2kjh25wlSI.UJwoPLAFzNAmTHS5Tq5PlqinIm1l2WBxjraI4zkYB9I",
"expires_in": 3599,
"scope": "openid",
"state": "PROvBUYpKZvVylwO",
"token_type": "bearer"
}
3.699 phase <--<-- 4 --- AccessToken -->-->
3.699 --> request op_args: {'state': 'PROvBUYpKZvVylwO', 'authn_method': 'private_key_jwt'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.699 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'PROvBUYpKZvVylwO', 'code': 'OWCoxwdFVUhLJ2YOH5q1n3utxjnwsIauj2kjh25wlSI.UJwoPLAFzNAmTHS5Tq5PlqinIm1l2WBxjraI4zkYB9I', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '00b815c9-9f8b-40a7-8469-ce57e30605c9'}, 'state': 'PROvBUYpKZvVylwO', 'authn_method': 'private_key_jwt'}
3.699 AccessTokenRequest {
"client_assertion": "eyJhbGciOiJSUzI1NiIsImtpZCI6Ind0MjVPZ3lSX256RzNPb1E3ZGFhMnJMNi1nTW5GZGZSekJqaFVWUHU4UlEifQ.eyJpc3MiOiAiMDBiODE1YzktOWY4Yi00MGE3LTg0NjktY2U1N2UzMDYwNWM5IiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiMDBiODE1YzktOWY4Yi00MGE3LTg0NjktY2U1N2UzMDYwNWM5IiwgImlhdCI6IDE1Mjk3NTE5OTcsICJqdGkiOiAiY0gzcGliY3lhR1dCbkxXb1dvWWthWUxJbDVlTHJlRmwiLCAiZXhwIjogMTUyOTc1MjU5N30.0cE1IaDYVvNVxQAiuaTbbp9HNMXWoBhMF-ENw914yWPHm7XiGmizUh1un2c5KIh2uwNP8RuYaM3OueKkHn6EdPdxiuys6keSZv2dwWIyj0A4najU307QgzJRhhBZsWTOeZrQ2orIvRXuh0Jxrvi_LF403T9ZfhVsJzOefR0S7DPDi6E-B6VFCLEXJI2NLrRtKauCVGLLrb9SWvGvKZBiALaG1uOTv4NNnvfrjcf-l6E3pT3dPcDateWfvnwpVN5RrZfXTetoedK0hrI6CH4T8p0VE0NvALSGNnezUzzVCJQswycZeJ0hn8s-bj7WS5o7QD_ojjcUCOj-LRcLSli04g",
"client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer",
"code": "OWCoxwdFVUhLJ2YOH5q1n3utxjnwsIauj2kjh25wlSI.UJwoPLAFzNAmTHS5Tq5PlqinIm1l2WBxjraI4zkYB9I",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "PROvBUYpKZvVylwO"
}
3.702 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.702 request_http_args {'headers': {'Content-Type': 'application/x-www-form-urlencoded'}}
3.702 request code=OWCoxwdFVUhLJ2YOH5q1n3utxjnwsIauj2kjh25wlSI.UJwoPLAFzNAmTHS5Tq5PlqinIm1l2WBxjraI4zkYB9I&client_assertion_type=urn%3Aietf%3Aparams%3Aoauth%3Aclient-assertion-type%3Ajwt-bearer&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=PROvBUYpKZvVylwO&client_assertion=eyJhbGciOiJSUzI1NiIsImtpZCI6Ind0MjVPZ3lSX256RzNPb1E3ZGFhMnJMNi1nTW5GZGZSekJqaFVWUHU4UlEifQ.eyJpc3MiOiAiMDBiODE1YzktOWY4Yi00MGE3LTg0NjktY2U1N2UzMDYwNWM5IiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiMDBiODE1YzktOWY4Yi00MGE3LTg0NjktY2U1N2UzMDYwNWM5IiwgImlhdCI6IDE1Mjk3NTE5OTcsICJqdGkiOiAiY0gzcGliY3lhR1dCbkxXb1dvWWthWUxJbDVlTHJlRmwiLCAiZXhwIjogMTUyOTc1MjU5N30.0cE1IaDYVvNVxQAiuaTbbp9HNMXWoBhMF-ENw914yWPHm7XiGmizUh1un2c5KIh2uwNP8RuYaM3OueKkHn6EdPdxiuys6keSZv2dwWIyj0A4najU307QgzJRhhBZsWTOeZrQ2orIvRXuh0Jxrvi_LF403T9ZfhVsJzOefR0S7DPDi6E-B6VFCLEXJI2NLrRtKauCVGLLrb9SWvGvKZBiALaG1uOTv4NNnvfrjcf-l6E3pT3dPcDateWfvnwpVN5RrZfXTetoedK0hrI6CH4T8p0VE0NvALSGNnezUzzVCJQswycZeJ0hn8s-bj7WS5o7QD_ojjcUCOj-LRcLSli04g
3.835 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.836 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiMU9pZUJZeVBNbFIxNWxrQnpORWlqUSIsImF1ZCI6WyIwMGI4MTVjOS05ZjhiLTQwYTctODQ2OS1jZTU3ZTMwNjA1YzkiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiJIZmJwMnI2QWR1OGVBeUdGNEVtUHh3IiwiZXhwIjoxNTI5NzU1NTk3LCJpYXQiOjE1Mjk3NTE5OTcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImI0YjkwODhjLThkZWMtNDZmMC1hN2JhLWE2YzY2ODA1NTZkOSIsIm5vbmNlIjoibXVnNHFQODVGdzFuaEZybyIsInJhdCI6MTUyOTc1MTk5NCwic3ViIjoiZm9vQGJhci5jb20ifQ.Ck5D4YwmXct16P5zJtRZidZK8yU0hm4GPgpNLm3uD1bDgV2aG1-W5fBYJC76415wjy5eFVRgK-83htvuZQIoC09_RtDjRpInjHnQocX4XUuSWKlbFDJBmrEZEIiaKoVaFaqUqE8jpNiJ96K8VSG30fFwnN_jftEZD_wAgjq5flWoetcpExeS09DCeFgCzAAjVHdw2EU3vhytb3c_OqjaIwxn6Nfl0CUvzSfP9cFCFGaAvO6fGr4DpNIcu9EJobD3-OtA4Rp9-vdcuASmbc742f3JkhhT6wgWH5uXzVMd0yb5J61S-BySZCpHNtji-G2i3DelS1_WETDcCizyug5SWjZYwQWYiZM5UzWIItjbbAcmmCPphNWzvrz5dDODK3NXmTf9NGYvPvEo8Q2uDjeGEkcVSjueyMSFUGP617h8dKU5aT_RkmXer9RZuOLCwNcN78Ltz2poiJxBVahb77Yxr75PbHLHmE5LcDIxV3BP0OE7U4TdINTk4e0Xjf9zeV9u5E9aULYZ-334AwXoiBEdQKr8i3gq7p1ayZ08NY1ajBPOZdmrSm3LyQYj4v7Q3GFJcjhafn3LGNtHXUhVEWv22KjNd5Dun-VhD3mkN99gHc0vTnw9vCimGAJThqiTY79PZWno5TWoCOShuff61tcwZqfbx1Vo8MaEPXJcOlDBZso', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'jFqhHg-9i-ajJf_DP8ZVX8Fc0hj5GpGX28PErfGVLas.Va14m95ztFfe3eQ1JBVlRe3wuDAIqL6uqq3IBZB58RI', 'scope': 'openid'}
3.915 AccessTokenResponse {
"access_token": "jFqhHg-9i-ajJf_DP8ZVX8Fc0hj5GpGX28PErfGVLas.Va14m95ztFfe3eQ1JBVlRe3wuDAIqL6uqq3IBZB58RI",
"expires_in": 3599,
"id_token": {
"at_hash": "1OieBYyPMlR15lkBzNEijQ",
"aud": [
"00b815c9-9f8b-40a7-8469-ce57e30605c9"
],
"auth_time": 1529751824,
"c_hash": "Hfbp2r6Adu8eAyGF4EmPxw",
"exp": 1529755597,
"iat": 1529751997,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "b4b9088c-8dec-46f0-a7ba-a6c6680556d9",
"nonce": "mug4qP85Fw1nhFro",
"rat": 1529751994,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.915 phase <--<-- 5 --- Done -->-->
3.915 end
3.915 assertion VerifyResponse
3.915 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.915 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Rotation-OP-Sig.txt 0000644 0000000 0000000 00000011554 13313425602 015066 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Rotation-OP-Sig
Test description: Can rotate OP signing keys
Timestamp: 2018-06-23T11:14:10Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- FetchKeys -->-->
0.143 phase <--<-- 3 --- Note -->-->
7.295 phase <--<-- 4 --- Webfinger -->-->
7.295 not expected to do WebFinger
7.295 phase <--<-- 5 --- Discovery -->-->
7.295 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
7.416 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
7.417 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
7.417 phase <--<-- 6 --- FetchKeys -->-->
7.496 phase <--<-- 7 --- Done -->-->
7.496 end
7.497 assertion CheckHTTPResponse
7.497 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
7.497 assertion NewSigningKeys
7.498 condition new-signing-keys: status=OK [Verifies that two set of signing keys are not the same]
7.498 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
new-signing-keys: status=OK [Verifies that two set of signing keys are not the same]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Registration-jwks_uri.txt 0000644 0000000 0000000 00000027633 13313424701 016544 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-jwks_uri
Test description: Uses keys registered with jwks_uri value
Timestamp: 2018-06-23T11:06:41Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.081 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.083 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.083 phase <--<-- 2 --- Registration -->-->
0.083 register kwargs:{'application_name': 'OIC test tool', 'token_endpoint_auth_method': 'private_key_jwt', 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'response_types': ['code token'], 'url': 'https://oidc-certification.ory.sh:8443/clients', 'application_type': 'web'}
0.083 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#b3useWcsPceKDj2m"
],
"response_types": [
"code token"
],
"token_endpoint_auth_method": "private_key_jwt"
}
0.276 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.277 RegistrationResponse {
"client_id": "ae658ea8-ca6c-4ad6-97ad-2e84b481c273",
"client_secret": "JK3PTCfW0Hs6",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "ae658ea8-ca6c-4ad6-97ad-2e84b481c273",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#b3useWcsPceKDj2m"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "private_key_jwt",
"userinfo_signed_response_alg": "none"
}
0.277 phase <--<-- 3 --- AsyncAuthn -->-->
0.277 AuthorizationRequest {
"client_id": "ae658ea8-ca6c-4ad6-97ad-2e84b481c273",
"nonce": "l2A8pLihXmPIkgSR",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "KG18MI3TxjLnwMtU"
}
0.277 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=ae658ea8-ca6c-4ad6-97ad-2e84b481c273&state=KG18MI3TxjLnwMtU&response_type=code+token&nonce=l2A8pLihXmPIkgSR
0.277 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=ae658ea8-ca6c-4ad6-97ad-2e84b481c273&state=KG18MI3TxjLnwMtU&response_type=code+token&nonce=l2A8pLihXmPIkgSR
2.521 http args {}
2.683 response URL with fragment
2.683 response access_token=sb7G8-EPNwUbcv8Iy9spALnTBJxntWWq1W-ROo_nw3Y.LGciaeqTQMRVI5rpkeE8jT1plW-SmF1tiMqtu-dy6_4&code=95OPoLdh9cOGld0LpS7d-iYpR-HV5gwAwUl40EjoYY4.4rgwS8vx1VDZwvSXcR4U-EuFZ0GWNnQse3FSyVJ_vRs&expires_in=3599&scope=openid&state=KG18MI3TxjLnwMtU&token_type=bearer
2.684 response {'scope': 'openid', 'code': '95OPoLdh9cOGld0LpS7d-iYpR-HV5gwAwUl40EjoYY4.4rgwS8vx1VDZwvSXcR4U-EuFZ0GWNnQse3FSyVJ_vRs', 'access_token': 'sb7G8-EPNwUbcv8Iy9spALnTBJxntWWq1W-ROo_nw3Y.LGciaeqTQMRVI5rpkeE8jT1plW-SmF1tiMqtu-dy6_4', 'state': 'KG18MI3TxjLnwMtU', 'expires_in': 3599, 'token_type': 'bearer'}
2.684 AuthorizationResponse {
"access_token": "sb7G8-EPNwUbcv8Iy9spALnTBJxntWWq1W-ROo_nw3Y.LGciaeqTQMRVI5rpkeE8jT1plW-SmF1tiMqtu-dy6_4",
"code": "95OPoLdh9cOGld0LpS7d-iYpR-HV5gwAwUl40EjoYY4.4rgwS8vx1VDZwvSXcR4U-EuFZ0GWNnQse3FSyVJ_vRs",
"expires_in": 3599,
"scope": "openid",
"state": "KG18MI3TxjLnwMtU",
"token_type": "bearer"
}
2.684 phase <--<-- 4 --- AccessToken -->-->
2.684 --> request op_args: {'state': 'KG18MI3TxjLnwMtU', 'authn_method': 'private_key_jwt'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.684 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'KG18MI3TxjLnwMtU', 'code': '95OPoLdh9cOGld0LpS7d-iYpR-HV5gwAwUl40EjoYY4.4rgwS8vx1VDZwvSXcR4U-EuFZ0GWNnQse3FSyVJ_vRs', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'ae658ea8-ca6c-4ad6-97ad-2e84b481c273'}, 'state': 'KG18MI3TxjLnwMtU', 'authn_method': 'private_key_jwt'}
2.684 AccessTokenRequest {
"client_assertion": "eyJhbGciOiJSUzI1NiIsImtpZCI6Ind0MjVPZ3lSX256RzNPb1E3ZGFhMnJMNi1nTW5GZGZSekJqaFVWUHU4UlEifQ.eyJpc3MiOiAiYWU2NThlYTgtY2E2Yy00YWQ2LTk3YWQtMmU4NGI0ODFjMjczIiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiYWU2NThlYTgtY2E2Yy00YWQ2LTk3YWQtMmU4NGI0ODFjMjczIiwgImlhdCI6IDE1Mjk3NTIwMDEsICJqdGkiOiAiTE8xaUwxQnNwaWp6OUxlMndKQXJkNnpDREo4bU5GWTciLCAiZXhwIjogMTUyOTc1MjYwMX0.uZY9ajg3yT3xS0cjNruKmlnnR5-8GLCVmlngcJ04TfaLeoWKpYLal4qw3B6_rd9tFHqslLZSSvBnmifTp9A586mhRSGpIOnVG6mGIeByP-MK5lBVQcv8F3osZtoDjB99u7cTgmhi_OPVXQ_jI44KPPa-EZvdomoetlJ4nO3lFmZS1AHImQhiuLVcChu53dBl4t288QvV7c_NrvDafKhYI4IvcQ2bg940BAnaDx88TfD0qAvr0DTL08jT5HzoM8nG9ll6e6FzkrAkqWi3NtTyGUtLy_1vP2-wyz2N8gfrPhUtvmtIRNTiGTqRI0SMLWKyYoY6EIsn55cGwMD7xxWz4A",
"client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer",
"code": "95OPoLdh9cOGld0LpS7d-iYpR-HV5gwAwUl40EjoYY4.4rgwS8vx1VDZwvSXcR4U-EuFZ0GWNnQse3FSyVJ_vRs",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "KG18MI3TxjLnwMtU"
}
2.688 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.688 request_http_args {'headers': {'Content-Type': 'application/x-www-form-urlencoded'}}
2.688 request code=95OPoLdh9cOGld0LpS7d-iYpR-HV5gwAwUl40EjoYY4.4rgwS8vx1VDZwvSXcR4U-EuFZ0GWNnQse3FSyVJ_vRs&client_assertion_type=urn%3Aietf%3Aparams%3Aoauth%3Aclient-assertion-type%3Ajwt-bearer&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=KG18MI3TxjLnwMtU&client_assertion=eyJhbGciOiJSUzI1NiIsImtpZCI6Ind0MjVPZ3lSX256RzNPb1E3ZGFhMnJMNi1nTW5GZGZSekJqaFVWUHU4UlEifQ.eyJpc3MiOiAiYWU2NThlYTgtY2E2Yy00YWQ2LTk3YWQtMmU4NGI0ODFjMjczIiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiYWU2NThlYTgtY2E2Yy00YWQ2LTk3YWQtMmU4NGI0ODFjMjczIiwgImlhdCI6IDE1Mjk3NTIwMDEsICJqdGkiOiAiTE8xaUwxQnNwaWp6OUxlMndKQXJkNnpDREo4bU5GWTciLCAiZXhwIjogMTUyOTc1MjYwMX0.uZY9ajg3yT3xS0cjNruKmlnnR5-8GLCVmlngcJ04TfaLeoWKpYLal4qw3B6_rd9tFHqslLZSSvBnmifTp9A586mhRSGpIOnVG6mGIeByP-MK5lBVQcv8F3osZtoDjB99u7cTgmhi_OPVXQ_jI44KPPa-EZvdomoetlJ4nO3lFmZS1AHImQhiuLVcChu53dBl4t288QvV7c_NrvDafKhYI4IvcQ2bg940BAnaDx88TfD0qAvr0DTL08jT5HzoM8nG9ll6e6FzkrAkqWi3NtTyGUtLy_1vP2-wyz2N8gfrPhUtvmtIRNTiGTqRI0SMLWKyYoY6EIsn55cGwMD7xxWz4A
2.834 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.835 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiQzN4SER2bUI3RHIzSmVGTTFSTWxsdyIsImF1ZCI6WyJhZTY1OGVhOC1jYTZjLTRhZDYtOTdhZC0yZTg0YjQ4MWMyNzMiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiJVbC1zNl9xYkpObE5UTjJXdExOSWtnIiwiZXhwIjoxNTI5NzU1NjAxLCJpYXQiOjE1Mjk3NTIwMDEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjgzMDNhNmI1LTIxMTAtNGU0NC05MjMyLTg1ZDdmYjFlNzE2YyIsIm5vbmNlIjoibDJBOHBMaWhYbVBJa2dTUiIsInJhdCI6MTUyOTc1MTk5OSwic3ViIjoiZm9vQGJhci5jb20ifQ.UOH5xgwxm606iCtG_Tea7hyXu7z1xhmsiF0Y3Rc-gNqGSAHW-Gy35TKG66Ovb40ivDGnjsI5DEQEFOP2mhCmIS6c_ZeyfM0qZ1j5vF7-6XlT6gGeByn5bQT6SYlHkJiZ5hcNrWXHwMWGGl04gvbYVFzntgMjK45D1IHsZRaf7lvC28DQyWXxoCvzJYImeZocwkJygfRvh52wyFnJXdKwneJo2YyPMWI5K7_C6FQ7hrOvIGXtGyxRn1LDw6uJ7sIdctF6bfr26J-DprZqUw31avR7rNIyuAJPHb-CFTCVgnfAKv-D9y69LlcELckzeWzh6fI3k8PDfKekHw-J20Lp1tyczyKXZdhDIU7S6AQpsG1qn2d6_Od9VhtZ9EYbtlGUy8ydULH7ykxfjErkFQB2j2YmbMlUKF_zEV0QFjeMn49zbxfFyCc-MYA7TeUYHUQcgJnZxTPThWnoJt8oOoq1wsLqPWgaTBt9-yYk8ITRgonpO5xhPOoQJW2WdwQEuhtNmAPfTSek2NFI5MGBmY_6SU4U8VgV-1ItYZsY2iSdR75wZRUq9De0N3_-TlpJ0evagVed9bCsko5hTup8QB4YolQ8TvfQe8_T8Qj6oxhPSCD0uT_frZTjp2n1m7E0spl70zYU8HsULY6hFnLaGaRTt9WeR2TZY7kuzQet64_MCcc', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'pQCZT6QV09O3vHEmlx0l5wNoDxotO7b8T3LMp3N4Dmc.Y4JpgdZmGl9e3ZmZTpEqTqO7o2OivyUqHbtJo4vGP8Q', 'scope': 'openid'}
2.913 AccessTokenResponse {
"access_token": "pQCZT6QV09O3vHEmlx0l5wNoDxotO7b8T3LMp3N4Dmc.Y4JpgdZmGl9e3ZmZTpEqTqO7o2OivyUqHbtJo4vGP8Q",
"expires_in": 3599,
"id_token": {
"at_hash": "C3xHDvmB7Dr3JeFM1RMllw",
"aud": [
"ae658ea8-ca6c-4ad6-97ad-2e84b481c273"
],
"auth_time": 1529751824,
"c_hash": "Ul-s6_qbJNlNTN2WtLNIkg",
"exp": 1529755601,
"iat": 1529752001,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "8303a6b5-2110-4e44-9232-85d7fb1e716c",
"nonce": "l2A8pLihXmPIkgSR",
"rat": 1529751999,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
2.913 phase <--<-- 5 --- Done -->-->
2.914 end
2.914 assertion VerifyResponse
2.914 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.914 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Req-max_age=10000.txt 0000644 0000000 0000000 00000040230 13313425474 015037 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-max_age=10000
Test description: Requesting ID Token with max_age=10000 seconds restriction
Timestamp: 2018-06-23T11:13:00Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.082 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.083 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.084 phase <--<-- 2 --- Registration -->-->
0.084 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.084 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Jx1OlyrrqFHhR8UC"
],
"response_types": [
"code token"
]
}
0.287 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.288 RegistrationResponse {
"client_id": "dc2b876e-8680-48e6-b9db-82ba670029d2",
"client_secret": "-B3-V~tupdsc",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "dc2b876e-8680-48e6-b9db-82ba670029d2",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Jx1OlyrrqFHhR8UC"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.288 phase <--<-- 3 --- AsyncAuthn -->-->
0.289 AuthorizationRequest {
"client_id": "dc2b876e-8680-48e6-b9db-82ba670029d2",
"nonce": "xTZS2RwFP42nyeSM",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "NBBgojuSfzA6hmwS"
}
0.289 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=dc2b876e-8680-48e6-b9db-82ba670029d2&state=NBBgojuSfzA6hmwS&response_type=code+token&nonce=xTZS2RwFP42nyeSM
0.289 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=dc2b876e-8680-48e6-b9db-82ba670029d2&state=NBBgojuSfzA6hmwS&response_type=code+token&nonce=xTZS2RwFP42nyeSM
2.71 http args {}
2.872 response URL with fragment
2.873 response access_token=c0iAsG99EIBqdnOj2S0bh5-bcLG4c52pjMFhRmzWMys._PiwAEAvMxI8wrd7Rq0g-5v41psIOFyDXmANomo0TwY&code=iqK2RIBNItQm4uP2q1oOWoJQFLR3yDfS2dRY-g19zdk.ucgGfF5aM1Q1gXFRuaZHK_7FylKy5kHJZZc2kJyKyfE&expires_in=3599&scope=openid&state=NBBgojuSfzA6hmwS&token_type=bearer
2.873 response {'scope': 'openid', 'code': 'iqK2RIBNItQm4uP2q1oOWoJQFLR3yDfS2dRY-g19zdk.ucgGfF5aM1Q1gXFRuaZHK_7FylKy5kHJZZc2kJyKyfE', 'access_token': 'c0iAsG99EIBqdnOj2S0bh5-bcLG4c52pjMFhRmzWMys._PiwAEAvMxI8wrd7Rq0g-5v41psIOFyDXmANomo0TwY', 'state': 'NBBgojuSfzA6hmwS', 'expires_in': 3599, 'token_type': 'bearer'}
2.873 AuthorizationResponse {
"access_token": "c0iAsG99EIBqdnOj2S0bh5-bcLG4c52pjMFhRmzWMys._PiwAEAvMxI8wrd7Rq0g-5v41psIOFyDXmANomo0TwY",
"code": "iqK2RIBNItQm4uP2q1oOWoJQFLR3yDfS2dRY-g19zdk.ucgGfF5aM1Q1gXFRuaZHK_7FylKy5kHJZZc2kJyKyfE",
"expires_in": 3599,
"scope": "openid",
"state": "NBBgojuSfzA6hmwS",
"token_type": "bearer"
}
2.874 phase <--<-- 4 --- AccessToken -->-->
2.874 --> request op_args: {'state': 'NBBgojuSfzA6hmwS'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.874 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'NBBgojuSfzA6hmwS', 'code': 'iqK2RIBNItQm4uP2q1oOWoJQFLR3yDfS2dRY-g19zdk.ucgGfF5aM1Q1gXFRuaZHK_7FylKy5kHJZZc2kJyKyfE', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'dc2b876e-8680-48e6-b9db-82ba670029d2'}, 'state': 'NBBgojuSfzA6hmwS'}
2.874 AccessTokenRequest {
"code": "iqK2RIBNItQm4uP2q1oOWoJQFLR3yDfS2dRY-g19zdk.ucgGfF5aM1Q1gXFRuaZHK_7FylKy5kHJZZc2kJyKyfE",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "NBBgojuSfzA6hmwS"
}
2.874 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.874 request_http_args {'headers': {'Authorization': 'Basic ZGMyYjg3NmUtODY4MC00OGU2LWI5ZGItODJiYTY3MDAyOWQyOi1CMy1WJTdFdHVwZHNj', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.874 request code=iqK2RIBNItQm4uP2q1oOWoJQFLR3yDfS2dRY-g19zdk.ucgGfF5aM1Q1gXFRuaZHK_7FylKy5kHJZZc2kJyKyfE&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=NBBgojuSfzA6hmwS
3.124 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.125 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiQlQ5S0VOY3EzSVY5VWRtNFo2MUpjdyIsImF1ZCI6WyJkYzJiODc2ZS04NjgwLTQ4ZTYtYjlkYi04MmJhNjcwMDI5ZDIiXSwiYXV0aF90aW1lIjoxNTI5NzUyMzcxLCJjX2hhc2giOiJraGNaN1VEVkZqZWhjR1BiWVJPVVlnIiwiZXhwIjoxNTI5NzU1OTc4LCJpYXQiOjE1Mjk3NTIzNzksImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImFmMmVjZTNjLWYyMzQtNDk1Ni1iYTkwLWQ5NDdhYjU1OWMzMCIsIm5vbmNlIjoieFRaUzJSd0ZQNDJueWVTTSIsInJhdCI6MTUyOTc1MjM3Niwic3ViIjoiZm9vQGJhci5jb20ifQ.r0Fubk37ZozT_ELrOOvcAWQPS-LM0AJHDQNMVxptbQYznHRgOfCKH4p4By-Cz_bk-zkqtRF1JT-nLVqj9eVjQQ5xIBF0SAqOGe3sVShDBAat28PoGZmPpRFIFENNnZv8OwQQDCDYKjnDsdABdgtuyum7eVVrleHgA84Z-oV0n7ZdqdzKO6tekijMNoz7IV4-NolTh0iVqMmUz7KfX9ZBYFw4P0R6xQRwQtp4W1SQ-jyALQWFEdYVUagn5YAbJoFdJMRhxmSF9l7QjGCf-l4vDtnli6Q27xZa13mJqgdOCU6Pws9z-gqJJicEFszxdlSIcoTRHGfTxGQm1XVrf_E5ew3C8Y2PdH64KdM6gM3hR58s5wleCxb0VDRhsa8GkTugQzBYr6Kv0wh5eaXGs6kzw-F_rNUIH2urFU7sLOVL6CoUl4BT1qyLVMoxJpIebHrmPIgIXLw-LuQ9QqNThlbMBwk-uShSWsiEPbPUG2yxG1hbCEgyCmr7jTc-kuFodT7ubgbTkMldzFIXeVPkCRelAd8nEm8Xu91FjHujzV0nNreKgyl6fiHScPvEhDjiLSsK_JUlBGPt43flxdcHbF5gQMBFF4-AXGU7TWuRPQzeK3bTyucdtNHbS3ll0LXMUHtFsPnFwin_a9vNdAFFNZkzThjE0yVbPC488I8e1wZJ00g', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': '3r613cZpB0Z-pOCrADf5rZpoqdEZdQFO31hNsNvWjPU.4fij7Nd-Ky9Gp8Q1X6g98thifKX4KNZII9kAQpER3uw', 'scope': 'openid'}
3.205 AccessTokenResponse {
"access_token": "3r613cZpB0Z-pOCrADf5rZpoqdEZdQFO31hNsNvWjPU.4fij7Nd-Ky9Gp8Q1X6g98thifKX4KNZII9kAQpER3uw",
"expires_in": 3599,
"id_token": {
"at_hash": "BT9KENcq3IV9Udm4Z61Jcw",
"aud": [
"dc2b876e-8680-48e6-b9db-82ba670029d2"
],
"auth_time": 1529752371,
"c_hash": "khcZ7UDVFjehcGPbYROUYg",
"exp": 1529755978,
"iat": 1529752379,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "af2ece3c-f234-4956-ba90-d947ab559c30",
"nonce": "xTZS2RwFP42nyeSM",
"rat": 1529752376,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.205 phase <--<-- 5 --- AsyncAuthn -->-->
3.206 AuthorizationRequest {
"client_id": "dc2b876e-8680-48e6-b9db-82ba670029d2",
"max_age": 10000,
"nonce": "12VrTux4IV1Fo2PE",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "G6dGukDwhfsy7WW6"
}
3.206 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?max_age=10000&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=dc2b876e-8680-48e6-b9db-82ba670029d2&state=G6dGukDwhfsy7WW6&response_type=code+token&nonce=12VrTux4IV1Fo2PE
3.206 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?max_age=10000&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=dc2b876e-8680-48e6-b9db-82ba670029d2&state=G6dGukDwhfsy7WW6&response_type=code+token&nonce=12VrTux4IV1Fo2PE
4.078 http args {}
4.223 response URL with fragment
4.223 response access_token=_Ka9bUHPooAdHGRf16U-Z7d6J4yEaEGhvbdPNObpxJU.jAwMgHR0wOm7rdE35YLj3Ti74rA8N3mVlTdfXYDJ0gA&code=6YkIelHH_I971MKrjPQx-nLisuO8UWc60wiRAXkbYM0.OtcuhLClFHkVH1rC8aIKI5x5V_yGccoUwdZJrtT6ILs&expires_in=3599&scope=openid&state=G6dGukDwhfsy7WW6&token_type=bearer
4.223 response {'scope': 'openid', 'code': '6YkIelHH_I971MKrjPQx-nLisuO8UWc60wiRAXkbYM0.OtcuhLClFHkVH1rC8aIKI5x5V_yGccoUwdZJrtT6ILs', 'access_token': '_Ka9bUHPooAdHGRf16U-Z7d6J4yEaEGhvbdPNObpxJU.jAwMgHR0wOm7rdE35YLj3Ti74rA8N3mVlTdfXYDJ0gA', 'state': 'G6dGukDwhfsy7WW6', 'expires_in': 3599, 'token_type': 'bearer'}
4.224 AuthorizationResponse {
"access_token": "_Ka9bUHPooAdHGRf16U-Z7d6J4yEaEGhvbdPNObpxJU.jAwMgHR0wOm7rdE35YLj3Ti74rA8N3mVlTdfXYDJ0gA",
"code": "6YkIelHH_I971MKrjPQx-nLisuO8UWc60wiRAXkbYM0.OtcuhLClFHkVH1rC8aIKI5x5V_yGccoUwdZJrtT6ILs",
"expires_in": 3599,
"scope": "openid",
"state": "G6dGukDwhfsy7WW6",
"token_type": "bearer"
}
4.224 phase <--<-- 6 --- AccessToken -->-->
4.224 --> request op_args: {'state': 'G6dGukDwhfsy7WW6'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
4.224 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'G6dGukDwhfsy7WW6', 'code': '6YkIelHH_I971MKrjPQx-nLisuO8UWc60wiRAXkbYM0.OtcuhLClFHkVH1rC8aIKI5x5V_yGccoUwdZJrtT6ILs', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'dc2b876e-8680-48e6-b9db-82ba670029d2'}, 'state': 'G6dGukDwhfsy7WW6'}
4.224 AccessTokenRequest {
"code": "6YkIelHH_I971MKrjPQx-nLisuO8UWc60wiRAXkbYM0.OtcuhLClFHkVH1rC8aIKI5x5V_yGccoUwdZJrtT6ILs",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "G6dGukDwhfsy7WW6"
}
4.224 request_url https://oidc-certification.ory.sh:8443/oauth2/token
4.224 request_http_args {'headers': {'Authorization': 'Basic ZGMyYjg3NmUtODY4MC00OGU2LWI5ZGItODJiYTY3MDAyOWQyOi1CMy1WJTdFdHVwZHNj', 'Content-Type': 'application/x-www-form-urlencoded'}}
4.224 request code=6YkIelHH_I971MKrjPQx-nLisuO8UWc60wiRAXkbYM0.OtcuhLClFHkVH1rC8aIKI5x5V_yGccoUwdZJrtT6ILs&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=G6dGukDwhfsy7WW6
4.472 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
4.473 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoia2swdGZFYWt0N2UycnFMaGNiZEoxdyIsImF1ZCI6WyJkYzJiODc2ZS04NjgwLTQ4ZTYtYjlkYi04MmJhNjcwMDI5ZDIiXSwiYXV0aF90aW1lIjoxNTI5NzUyMzcxLCJjX2hhc2giOiJKbXYySzR2ajJ1VWJpQnBwdTY4bjdBIiwiZXhwIjoxNTI5NzU1OTgwLCJpYXQiOjE1Mjk3NTIzODAsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6Ijg0NzgyZDE4LTk3YWUtNDU0Mi04N2VjLTg3ZjBkNjZiMGFkOCIsIm5vbmNlIjoiMTJWclR1eDRJVjFGbzJQRSIsInJhdCI6MTUyOTc1MjM3OSwic3ViIjoiZm9vQGJhci5jb20ifQ.LD0aQvY3tLxMhgRnyOdJU6AdD54guCjDmJ2Nij1vJ4RW4U1l9l3uW1j76Khi6t9kv3Jnfd1xZiuBLbn4Y1lyieY5ISGorWxOrb1-6C4Q-ufA1TJw7xBAkwtguXtbDqxkSTrXgoWLhLr2QmU40ktQ-r4OGvJxXcNMRtXYSCeYmC0LPNND0O5V9KLHx0fVkpWYji8US7W1UhYBBP2klazVjL0vPZsbJPtvLJLZi3UwrV4rCSgXKt7w-vKWG_teAl3M2h4Ef4ZqH79AzJNEICUclAWdkI39OXqQ99Ej9JAmP-7PMv8zBCYhUz9kL4UDlmnJ6ucwSQw9j9_TVzWhNMMFyMJw01lWyb_e2CoaMg7l-MBUhDHC78VYsVprNHiQG8io51ABC25kPvOauBHIH1tWaYaEKoOVLEzTqHlr6_l-GqnkdsHjrUJYDn03Jbl0zqbxBPxN83v1guQVap0MWBO_EL63LEnWZfJEu9t6gQt9LptVJStSyKFrmRiUJw59DT1nVyDoEGpsQmqRL1ZMaXkyi7MhLV6c11bT9SiqFEK0_Grm0JUElX6ozLyqS3AYHN5olkEx513cTV-MhQFO5TDLkhjCCUrRVOHTHWAyVJmkhXaVi-55ewB-WLOKhOKYVP2hTONAMGvXfTQxWVhU03uUYHIExoQFKvqL20oH7wIPpVI', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'UOqvY8RiB_fWpSgHiWcIeky-rJlC-XlvB0p2BIZtQGQ.WRFD3RGh86oQRuFnKOlFeq5Mu9zVIHfNXAwL4iNQ2HE', 'scope': 'openid'}
4.477 AccessTokenResponse {
"access_token": "UOqvY8RiB_fWpSgHiWcIeky-rJlC-XlvB0p2BIZtQGQ.WRFD3RGh86oQRuFnKOlFeq5Mu9zVIHfNXAwL4iNQ2HE",
"expires_in": 3599,
"id_token": {
"at_hash": "kk0tfEakt7e2rqLhcbdJ1w",
"aud": [
"dc2b876e-8680-48e6-b9db-82ba670029d2"
],
"auth_time": 1529752371,
"c_hash": "Jmv2K4vj2uUbiBppu68n7A",
"exp": 1529755980,
"iat": 1529752380,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "84782d18-97ae-4542-87ec-87f0d66b0ad8",
"nonce": "12VrTux4IV1Fo2PE",
"rat": 1529752379,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
4.477 phase <--<-- 7 --- Done -->-->
4.477 end
4.477 assertion AuthTimeCheck
4.477 condition auth_time-check: status=OK [Check that the auth_time returned in the ID Token is in the expected range.]
4.478 assertion VerifyResponse
4.478 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.478 assertion SameAuthn
4.478 condition same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
4.478 assertion ClaimsCheck
4.478 condition claims-check: status=OK [Checks if specific claims is present or not]
4.479 condition Done: status=OK
============================================================
Conditions
auth_time-check: status=OK [Check that the auth_time returned in the ID Token is in the expected range.]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
claims-check: status=OK [Checks if specific claims is present or not]
Done: status=OK
============================================================
RESULT: PASSED
./OP-request-Unsigned.txt 0000644 0000000 0000000 00000017512 13313425245 015500 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-request-Unsigned
Test description: Support request request parameter with unsigned request
Timestamp: 2018-06-23T11:10:29Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.108 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.11 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.11 phase <--<-- 2 --- Registration -->-->
0.11 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'request_object_signing_alg': 'none'}
0.11 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "none",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#pQmtuWHoH825QBS1"
],
"response_types": [
"code token"
]
}
0.291 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.292 RegistrationResponse {
"client_id": "6beef9ea-edc6-41b8-9489-bba23c59c704",
"client_secret": "OPstLUZwxN3P",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "6beef9ea-edc6-41b8-9489-bba23c59c704",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "none",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#pQmtuWHoH825QBS1"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.292 phase <--<-- 3 --- AsyncAuthn -->-->
0.293 AuthorizationRequest {
"client_id": "6beef9ea-edc6-41b8-9489-bba23c59c704",
"nonce": "FljXgeAW8A9Ih7P6",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"request": "eyJhbGciOiJub25lIn0.eyJzY29wZSI6ICJvcGVuaWQiLCAicmVkaXJlY3RfdXJpIjogImh0dHBzOi8vb3AuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0OjYxMzUzL2F1dGh6X2NiIiwgImNsaWVudF9pZCI6ICI2YmVlZjllYS1lZGM2LTQxYjgtOTQ4OS1iYmEyM2M1OWM3MDQiLCAic3RhdGUiOiAiOUtjUWpvbFRSczlGOUo5OSIsICJyZXNwb25zZV90eXBlIjogImNvZGUgdG9rZW4iLCAibm9uY2UiOiAiRmxqWGdlQVc4QTlJaDdQNiJ9.",
"response_type": "code token",
"scope": "openid",
"state": "9KcQjolTRs9F9J99"
}
0.294 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=6beef9ea-edc6-41b8-9489-bba23c59c704&response_type=code+token&state=9KcQjolTRs9F9J99&request=eyJhbGciOiJub25lIn0.eyJzY29wZSI6ICJvcGVuaWQiLCAicmVkaXJlY3RfdXJpIjogImh0dHBzOi8vb3AuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0OjYxMzUzL2F1dGh6X2NiIiwgImNsaWVudF9pZCI6ICI2YmVlZjllYS1lZGM2LTQxYjgtOTQ4OS1iYmEyM2M1OWM3MDQiLCAic3RhdGUiOiAiOUtjUWpvbFRSczlGOUo5OSIsICJyZXNwb25zZV90eXBlIjogImNvZGUgdG9rZW4iLCAibm9uY2UiOiAiRmxqWGdlQVc4QTlJaDdQNiJ9.&nonce=FljXgeAW8A9Ih7P6
0.294 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=6beef9ea-edc6-41b8-9489-bba23c59c704&response_type=code+token&state=9KcQjolTRs9F9J99&request=eyJhbGciOiJub25lIn0.eyJzY29wZSI6ICJvcGVuaWQiLCAicmVkaXJlY3RfdXJpIjogImh0dHBzOi8vb3AuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0OjYxMzUzL2F1dGh6X2NiIiwgImNsaWVudF9pZCI6ICI2YmVlZjllYS1lZGM2LTQxYjgtOTQ4OS1iYmEyM2M1OWM3MDQiLCAic3RhdGUiOiAiOUtjUWpvbFRSczlGOUo5OSIsICJyZXNwb25zZV90eXBlIjogImNvZGUgdG9rZW4iLCAibm9uY2UiOiAiRmxqWGdlQVc4QTlJaDdQNiJ9.&nonce=FljXgeAW8A9Ih7P6
3.18 http args {}
3.342 response URL with fragment
3.343 response access_token=ei3volV4gKEZzjx4V0WrQgAAmPv8IZUdxpcfBoR8Dsw.lwJ1vNroQavtgmlh-9ubW6lDA2JwNsjUJFoMvWw6kOE&code=D_f5GDz8csVfQKyRjPk4G1sgZAb8gfhKc_4MGBuA3-I.lIREPJSFQ4Ec7T-Rx9yJ9ym2uqHIvgJwa79-M6ggFvM&expires_in=3599&scope=openid&state=9KcQjolTRs9F9J99&token_type=bearer
3.343 response {'scope': 'openid', 'code': 'D_f5GDz8csVfQKyRjPk4G1sgZAb8gfhKc_4MGBuA3-I.lIREPJSFQ4Ec7T-Rx9yJ9ym2uqHIvgJwa79-M6ggFvM', 'access_token': 'ei3volV4gKEZzjx4V0WrQgAAmPv8IZUdxpcfBoR8Dsw.lwJ1vNroQavtgmlh-9ubW6lDA2JwNsjUJFoMvWw6kOE', 'state': '9KcQjolTRs9F9J99', 'expires_in': 3599, 'token_type': 'bearer'}
3.343 AuthorizationResponse {
"access_token": "ei3volV4gKEZzjx4V0WrQgAAmPv8IZUdxpcfBoR8Dsw.lwJ1vNroQavtgmlh-9ubW6lDA2JwNsjUJFoMvWw6kOE",
"code": "D_f5GDz8csVfQKyRjPk4G1sgZAb8gfhKc_4MGBuA3-I.lIREPJSFQ4Ec7T-Rx9yJ9ym2uqHIvgJwa79-M6ggFvM",
"expires_in": 3599,
"scope": "openid",
"state": "9KcQjolTRs9F9J99",
"token_type": "bearer"
}
3.344 phase <--<-- 4 --- Done -->-->
3.344 end
3.344 assertion VerifyAuthnOrErrorResponse
3.344 condition authn-response-or-error: status=OK [Checks that the last response was a JSON encoded authentication or error message]
3.344 condition Done: status=OK
============================================================
Conditions
authn-response-or-error: status=OK [Checks that the last response was a JSON encoded authentication or error message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-ClientAuth-Basic-Dynamic.txt 0000644 0000000 0000000 00000024542 13313424746 016705 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-ClientAuth-Basic-Dynamic
Test description: Access token request with client_secret_basic authentication
Timestamp: 2018-06-23T11:07:18Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.165 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.167 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.167 phase <--<-- 2 --- Registration -->-->
0.167 register kwargs:{'application_name': 'OIC test tool', 'token_endpoint_auth_method': 'client_secret_basic', 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'response_types': ['code token'], 'url': 'https://oidc-certification.ory.sh:8443/clients', 'application_type': 'web'}
0.167 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#nQgEIISvVJP7bKjU"
],
"response_types": [
"code token"
],
"token_endpoint_auth_method": "client_secret_basic"
}
0.326 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.327 RegistrationResponse {
"client_id": "e5df08d9-323b-4692-89da-04145b4e188a",
"client_secret": "IT4bX0fz4Lmr",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "e5df08d9-323b-4692-89da-04145b4e188a",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#nQgEIISvVJP7bKjU"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.327 phase <--<-- 3 --- AsyncAuthn -->-->
0.327 AuthorizationRequest {
"client_id": "e5df08d9-323b-4692-89da-04145b4e188a",
"nonce": "vakVAQdCIYQ51KVp",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "M9zLvwMo9CelSRPg"
}
0.328 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=e5df08d9-323b-4692-89da-04145b4e188a&state=M9zLvwMo9CelSRPg&response_type=code+token&nonce=vakVAQdCIYQ51KVp
0.328 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=e5df08d9-323b-4692-89da-04145b4e188a&state=M9zLvwMo9CelSRPg&response_type=code+token&nonce=vakVAQdCIYQ51KVp
3.999 http args {}
4.166 response URL with fragment
4.167 response access_token=s762vKbzAri0CX3YFmgFMP2n-TxXQUGP7vu_0_WO4-s._S9Oqm2cYyfLuSX76stJHEnuJw463-YmVsZvsF_9kiA&code=n-zYm3hQ7no4lQiPOftA280en6Vjf-RAg7Mgmgk0yTU.AtjXtz5Q_V7Nq185JCEf9_Gt7QEYV5e44IPz0vg-1_c&expires_in=3599&scope=openid&state=M9zLvwMo9CelSRPg&token_type=bearer
4.167 response {'scope': 'openid', 'code': 'n-zYm3hQ7no4lQiPOftA280en6Vjf-RAg7Mgmgk0yTU.AtjXtz5Q_V7Nq185JCEf9_Gt7QEYV5e44IPz0vg-1_c', 'access_token': 's762vKbzAri0CX3YFmgFMP2n-TxXQUGP7vu_0_WO4-s._S9Oqm2cYyfLuSX76stJHEnuJw463-YmVsZvsF_9kiA', 'state': 'M9zLvwMo9CelSRPg', 'expires_in': 3599, 'token_type': 'bearer'}
4.167 AuthorizationResponse {
"access_token": "s762vKbzAri0CX3YFmgFMP2n-TxXQUGP7vu_0_WO4-s._S9Oqm2cYyfLuSX76stJHEnuJw463-YmVsZvsF_9kiA",
"code": "n-zYm3hQ7no4lQiPOftA280en6Vjf-RAg7Mgmgk0yTU.AtjXtz5Q_V7Nq185JCEf9_Gt7QEYV5e44IPz0vg-1_c",
"expires_in": 3599,
"scope": "openid",
"state": "M9zLvwMo9CelSRPg",
"token_type": "bearer"
}
4.168 phase <--<-- 4 --- AccessToken -->-->
4.168 --> request op_args: {'state': 'M9zLvwMo9CelSRPg', 'authn_method': 'client_secret_basic'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
4.168 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'M9zLvwMo9CelSRPg', 'code': 'n-zYm3hQ7no4lQiPOftA280en6Vjf-RAg7Mgmgk0yTU.AtjXtz5Q_V7Nq185JCEf9_Gt7QEYV5e44IPz0vg-1_c', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'e5df08d9-323b-4692-89da-04145b4e188a'}, 'state': 'M9zLvwMo9CelSRPg', 'authn_method': 'client_secret_basic'}
4.168 AccessTokenRequest {
"code": "n-zYm3hQ7no4lQiPOftA280en6Vjf-RAg7Mgmgk0yTU.AtjXtz5Q_V7Nq185JCEf9_Gt7QEYV5e44IPz0vg-1_c",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "M9zLvwMo9CelSRPg"
}
4.168 request_url https://oidc-certification.ory.sh:8443/oauth2/token
4.168 request_http_args {'headers': {'Authorization': 'Basic ZTVkZjA4ZDktMzIzYi00NjkyLTg5ZGEtMDQxNDViNGUxODhhOklUNGJYMGZ6NExtcg==', 'Content-Type': 'application/x-www-form-urlencoded'}}
4.168 request code=n-zYm3hQ7no4lQiPOftA280en6Vjf-RAg7Mgmgk0yTU.AtjXtz5Q_V7Nq185JCEf9_Gt7QEYV5e44IPz0vg-1_c&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=M9zLvwMo9CelSRPg
4.533 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
4.534 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiWi10MnFiMmxySFU2RlNpd3pObFczUSIsImF1ZCI6WyJlNWRmMDhkOS0zMjNiLTQ2OTItODlkYS0wNDE0NWI0ZTE4OGEiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiJGOGVlLWtETEtrb1JXUGZkUnVEOHFBIiwiZXhwIjoxNTI5NzU1NjM3LCJpYXQiOjE1Mjk3NTIwMzgsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjEzY2U3Y2VhLTgyM2EtNDFkMC1hNzk3LTIxYWQ5Y2I0M2E1MyIsIm5vbmNlIjoidmFrVkFRZENJWVE1MUtWcCIsInJhdCI6MTUyOTc1MjAzNCwic3ViIjoiZm9vQGJhci5jb20ifQ.Fu0AKdgjTfoUa1HFrtyjW1vil_zEjSgtOkh2mbZyNY4Bdjl6PT9SI626uld2c2bw0uK8u4ufJtodpzigyqzBVLN-L7WqFbgAo0VN0KzPuCOCiO7hDNPi_yWGaA28jop8mZrQEF1Fbo16-H8MomVkkrc3ACMtKv3V9FqFoyNKpkq9gej0Of0jwPUOjJWI1o-IwOhLWjmWqvtlNtkMehJkgWVCbDnUonPIKNIbJFc1jZpxhmZv6YHTUOZ8SVQ1_41fXtbhAjQL4DPvms7AszHOD6NURgI6u3DOy6fWKbvW_TWUnjo0N36quFzOkg7SyyiwstKjmmtSb2jS-aVv260pxePO8vD9wlkDehhnyU6IQIs2zvalf50EB-65Y4VzEUvi3w863fyKyTfUQdMiKnsgYu0UMP5zPPR8cPXvBLy0HLOgBwKmguHBdzU7Hb-pdRsaX1hVQe_dqjtr59pUXJGRPUon_g2xO6g1A3BgAPMEBry0aLoM8bpd7SqZFmDDFNTOOocNBK5Vkzjx2Ks0PGeih67Hm87eJmC1zF2nD8U9Qkv-Styrow6uYJ6ELmiV4D5eg39ro5PaAASHQ2_5xzKr7XurNKjZdqbXOIkgDKbtH8StnUu1HCTTuZRSxU6g1Tmv3xBvNr0x28TUDz3sY1ZcUrT7UKdcZqWD0OGQysFUH0c', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'VIkKR-VJuwTkaDeDIPJkekh5R4uZYJuNKeutJoaekM8.WMOa4fwDzRPh9h7_crOSyNEW8uTWnPxIQEqlOO4iAO4', 'scope': 'openid'}
4.669 AccessTokenResponse {
"access_token": "VIkKR-VJuwTkaDeDIPJkekh5R4uZYJuNKeutJoaekM8.WMOa4fwDzRPh9h7_crOSyNEW8uTWnPxIQEqlOO4iAO4",
"expires_in": 3599,
"id_token": {
"at_hash": "Z-t2qb2lrHU6FSiwzNlW3Q",
"aud": [
"e5df08d9-323b-4692-89da-04145b4e188a"
],
"auth_time": 1529751824,
"c_hash": "F8ee-kDLKkoRWPfdRuD8qA",
"exp": 1529755637,
"iat": 1529752038,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "13ce7cea-823a-41d0-a797-21ad9cb43a53",
"nonce": "vakVAQdCIYQ51KVp",
"rat": 1529752034,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
4.67 phase <--<-- 5 --- Done -->-->
4.67 end
4.67 assertion VerifyResponse
4.67 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.67 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Discovery-claims_supported.txt 0000644 0000000 0000000 00000005777 13313424664 017576 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Discovery-claims_supported
Test description: Verify that claims_supported is published
Timestamp: 2018-06-23T11:06:28Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Done -->-->
0.075 end
0.075 assertion CheckHTTPResponse
0.075 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.076 assertion CheckHasClaimsSupported
0.076 condition providerinfo-has-claims_supported: status=OK [Check that the claims_supported discovery metadata value is in the provider_info]
0.076 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
providerinfo-has-claims_supported: status=OK [Check that the claims_supported discovery metadata value is in the provider_info]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Registration-logo_uri.txt 0000644 0000000 0000000 00000015656 13313424710 016530 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-logo_uri
Test description: Registration with logo_uri
Timestamp: 2018-06-23T11:06:48Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.876 phase <--<-- 1 --- Webfinger -->-->
1.876 not expected to do WebFinger
1.876 phase <--<-- 2 --- Discovery -->-->
1.876 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.952 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.953 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.953 phase <--<-- 3 --- Registration -->-->
1.954 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'logo_uri': 'https://op.certification.openid.net:61353/static/logo.png'}
1.954 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"logo_uri": "https://op.certification.openid.net:61353/static/logo.png",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#NHT9RIfrnKzVfKD8"
],
"response_types": [
"code token"
]
}
2.113 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
2.114 RegistrationResponse {
"client_id": "04ccbb42-d222-4b1d-80b1-a0954aad2922",
"client_secret": "Xcxyix6eA9tx",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "04ccbb42-d222-4b1d-80b1-a0954aad2922",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"logo_uri": "https://op.certification.openid.net:61353/static/logo.png",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#NHT9RIfrnKzVfKD8"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
2.114 phase <--<-- 4 --- AsyncAuthn -->-->
2.114 AuthorizationRequest {
"client_id": "04ccbb42-d222-4b1d-80b1-a0954aad2922",
"nonce": "lu7LGkesORBOZnH1",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "zj9SOAP7Uf9zPTO0"
}
2.115 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=04ccbb42-d222-4b1d-80b1-a0954aad2922&state=zj9SOAP7Uf9zPTO0&response_type=code+token&nonce=lu7LGkesORBOZnH1
2.115 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=04ccbb42-d222-4b1d-80b1-a0954aad2922&state=zj9SOAP7Uf9zPTO0&response_type=code+token&nonce=lu7LGkesORBOZnH1
4.605 http args {}
4.816 response URL with fragment
4.816 response access_token=ikmMx7MxZRltKTrIMkHvn-IoafWdAb6sYI3Hm8_Dqe4.m9Bc8PN7ycXDdhIvmgo-yYlDK_zrxZU7AQuUU_EgO20&code=9rOpUja08gcmLc5NsFDpU19PWeyGpkSGGvhebMZh3is.Up18Ypf0hTpRwCcGBBeoY-M2W36yoLi8sA7Vq31qD_4&expires_in=3599&scope=openid&state=zj9SOAP7Uf9zPTO0&token_type=bearer
4.817 response {'scope': 'openid', 'code': '9rOpUja08gcmLc5NsFDpU19PWeyGpkSGGvhebMZh3is.Up18Ypf0hTpRwCcGBBeoY-M2W36yoLi8sA7Vq31qD_4', 'access_token': 'ikmMx7MxZRltKTrIMkHvn-IoafWdAb6sYI3Hm8_Dqe4.m9Bc8PN7ycXDdhIvmgo-yYlDK_zrxZU7AQuUU_EgO20', 'state': 'zj9SOAP7Uf9zPTO0', 'expires_in': 3599, 'token_type': 'bearer'}
4.817 AuthorizationResponse {
"access_token": "ikmMx7MxZRltKTrIMkHvn-IoafWdAb6sYI3Hm8_Dqe4.m9Bc8PN7ycXDdhIvmgo-yYlDK_zrxZU7AQuUU_EgO20",
"code": "9rOpUja08gcmLc5NsFDpU19PWeyGpkSGGvhebMZh3is.Up18Ypf0hTpRwCcGBBeoY-M2W36yoLi8sA7Vq31qD_4",
"expires_in": 3599,
"scope": "openid",
"state": "zj9SOAP7Uf9zPTO0",
"token_type": "bearer"
}
4.817 phase <--<-- 5 --- Done -->-->
4.817 end
4.818 assertion VerifyAuthnResponse
4.818 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
4.818 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-redirect_uri-Query-OK.txt 0000644 0000000 0000000 00000016164 13313425237 016333 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-Query-OK
Test description: Request with a redirect_uri with a query component when a redirect_uri with the same query component is registered
Timestamp: 2018-06-23T11:10:23Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Registration -->-->
0.074 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb?foo=bar'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.075 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb?foo=bar"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#LTnmU7BNcenhVEXW"
],
"response_types": [
"code token"
]
}
0.263 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.264 RegistrationResponse {
"client_id": "618ca6bf-64b9-44f8-8b03-21918799226d",
"client_secret": "rg3eQ.AtUZgH",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "618ca6bf-64b9-44f8-8b03-21918799226d",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb?foo=bar"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#LTnmU7BNcenhVEXW"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.264 phase <--<-- 3 --- AsyncAuthn -->-->
0.265 AuthorizationRequest {
"client_id": "618ca6bf-64b9-44f8-8b03-21918799226d",
"nonce": "VoO5o83qN2ll7V1I",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb?foo=bar",
"response_type": "code token",
"scope": "openid",
"state": "QrOslzfc6AL19yfd"
}
0.265 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb%3Ffoo%3Dbar&client_id=618ca6bf-64b9-44f8-8b03-21918799226d&state=QrOslzfc6AL19yfd&response_type=code+token&nonce=VoO5o83qN2ll7V1I
0.265 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb%3Ffoo%3Dbar&client_id=618ca6bf-64b9-44f8-8b03-21918799226d&state=QrOslzfc6AL19yfd&response_type=code+token&nonce=VoO5o83qN2ll7V1I
2.696 http args {'foo': 'bar'}
2.857 response URL with fragment
2.858 response access_token=KwsY84KZ6XB9r-KKgFX369oVKYj5ny8UggEiub4O__0.tVulsPUeI3o46vKKSJVY5GK0o_600BGYYnQTUxnjbGc&code=ra_JS4fX04G8-wfglJUjy1daKqks-i-Xw1UqVHIB52M.EHRpRguWwoJJPU9wNLb3Mx4Cjpkq62AwH3V3vktAYK4&expires_in=3599&scope=openid&state=QrOslzfc6AL19yfd&token_type=bearer
2.858 response {'scope': 'openid', 'code': 'ra_JS4fX04G8-wfglJUjy1daKqks-i-Xw1UqVHIB52M.EHRpRguWwoJJPU9wNLb3Mx4Cjpkq62AwH3V3vktAYK4', 'access_token': 'KwsY84KZ6XB9r-KKgFX369oVKYj5ny8UggEiub4O__0.tVulsPUeI3o46vKKSJVY5GK0o_600BGYYnQTUxnjbGc', 'state': 'QrOslzfc6AL19yfd', 'expires_in': 3599, 'token_type': 'bearer'}
2.858 AuthorizationResponse {
"access_token": "KwsY84KZ6XB9r-KKgFX369oVKYj5ny8UggEiub4O__0.tVulsPUeI3o46vKKSJVY5GK0o_600BGYYnQTUxnjbGc",
"code": "ra_JS4fX04G8-wfglJUjy1daKqks-i-Xw1UqVHIB52M.EHRpRguWwoJJPU9wNLb3Mx4Cjpkq62AwH3V3vktAYK4",
"expires_in": 3599,
"scope": "openid",
"state": "QrOslzfc6AL19yfd",
"token_type": "bearer"
}
2.859 phase <--<-- 4 --- Done -->-->
2.859 end
2.859 assertion VerifyResponse
2.86 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.86 assertion CheckQueryPart
2.86 condition check-query-part: status=OK [Check that a query part send in the Authorization Request is returned in the Authorization response.]
2.86 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
check-query-part: status=OK [Check that a query part send in the Authorization Request is returned in the Authorization response.]
Done: status=OK
============================================================
RESULT: PASSED
./OP-IDToken-kid.txt 0000644 0000000 0000000 00000024630 13313424740 014276 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-IDToken-kid
Test description: IDToken has kid [Basic, Implicit, Hybrid]
Timestamp: 2018-06-23T11:07:12Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.112 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.114 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.114 phase <--<-- 2 --- Registration -->-->
0.114 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.114 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#fUmLwk3dEITj0bjx"
],
"response_types": [
"code token"
]
}
0.27 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.271 RegistrationResponse {
"client_id": "866043b5-676d-439c-bcdd-4f4db990f0ad",
"client_secret": "6Q7N5wLdVAa-",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "866043b5-676d-439c-bcdd-4f4db990f0ad",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#fUmLwk3dEITj0bjx"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.271 phase <--<-- 3 --- AsyncAuthn -->-->
0.272 AuthorizationRequest {
"client_id": "866043b5-676d-439c-bcdd-4f4db990f0ad",
"nonce": "NoXQVip3NmJ5xYMD",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "VmUy3Nlm8MidMzIA"
}
0.272 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=866043b5-676d-439c-bcdd-4f4db990f0ad&state=VmUy3Nlm8MidMzIA&response_type=code+token&nonce=NoXQVip3NmJ5xYMD
0.272 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=866043b5-676d-439c-bcdd-4f4db990f0ad&state=VmUy3Nlm8MidMzIA&response_type=code+token&nonce=NoXQVip3NmJ5xYMD
2.575 http args {}
2.768 response URL with fragment
2.769 response access_token=bqHNExI6Mo0HAGHr8qLZTd08UhJ48L-PsJFoiEcNKIQ.J71zLdOWCO_-wDDVuefLNmP8FwYut9PTd_DS9q5ToFs&code=x0Spy4o5CrPDp0LmcWH1EOIKbolx7hxIoeozMjtZc_k.qX05RZtBvYYLVQVVig8JfjWWQtohk9vkMDs-dOniNJc&expires_in=3599&scope=openid&state=VmUy3Nlm8MidMzIA&token_type=bearer
2.769 response {'scope': 'openid', 'code': 'x0Spy4o5CrPDp0LmcWH1EOIKbolx7hxIoeozMjtZc_k.qX05RZtBvYYLVQVVig8JfjWWQtohk9vkMDs-dOniNJc', 'access_token': 'bqHNExI6Mo0HAGHr8qLZTd08UhJ48L-PsJFoiEcNKIQ.J71zLdOWCO_-wDDVuefLNmP8FwYut9PTd_DS9q5ToFs', 'state': 'VmUy3Nlm8MidMzIA', 'expires_in': 3599, 'token_type': 'bearer'}
2.77 AuthorizationResponse {
"access_token": "bqHNExI6Mo0HAGHr8qLZTd08UhJ48L-PsJFoiEcNKIQ.J71zLdOWCO_-wDDVuefLNmP8FwYut9PTd_DS9q5ToFs",
"code": "x0Spy4o5CrPDp0LmcWH1EOIKbolx7hxIoeozMjtZc_k.qX05RZtBvYYLVQVVig8JfjWWQtohk9vkMDs-dOniNJc",
"expires_in": 3599,
"scope": "openid",
"state": "VmUy3Nlm8MidMzIA",
"token_type": "bearer"
}
2.77 phase <--<-- 4 --- AccessToken -->-->
2.77 --> request op_args: {'state': 'VmUy3Nlm8MidMzIA'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.77 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'VmUy3Nlm8MidMzIA', 'code': 'x0Spy4o5CrPDp0LmcWH1EOIKbolx7hxIoeozMjtZc_k.qX05RZtBvYYLVQVVig8JfjWWQtohk9vkMDs-dOniNJc', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '866043b5-676d-439c-bcdd-4f4db990f0ad'}, 'state': 'VmUy3Nlm8MidMzIA'}
2.77 AccessTokenRequest {
"code": "x0Spy4o5CrPDp0LmcWH1EOIKbolx7hxIoeozMjtZc_k.qX05RZtBvYYLVQVVig8JfjWWQtohk9vkMDs-dOniNJc",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "VmUy3Nlm8MidMzIA"
}
2.77 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.77 request_http_args {'headers': {'Authorization': 'Basic ODY2MDQzYjUtNjc2ZC00MzljLWJjZGQtNGY0ZGI5OTBmMGFkOjZRN041d0xkVkFhLQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.77 request code=x0Spy4o5CrPDp0LmcWH1EOIKbolx7hxIoeozMjtZc_k.qX05RZtBvYYLVQVVig8JfjWWQtohk9vkMDs-dOniNJc&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=VmUy3Nlm8MidMzIA
2.983 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.984 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiVkFydkVlZmRPeW10SWxrZ01wbHFndyIsImF1ZCI6WyI4NjYwNDNiNS02NzZkLTQzOWMtYmNkZC00ZjRkYjk5MGYwYWQiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiItdDE3TW9nV0REQ0o2ek41cUkyOUpRIiwiZXhwIjoxNTI5NzU1NjMxLCJpYXQiOjE1Mjk3NTIwMzIsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImVkZTc2MWViLWM3NGYtNGMzYy1hY2I0LTkwYTMzNzUzNzRjNSIsIm5vbmNlIjoiTm9YUVZpcDNObUo1eFlNRCIsInJhdCI6MTUyOTc1MjAyOSwic3ViIjoiZm9vQGJhci5jb20ifQ.aXH5kC3x754ViwCHtBLQ_Zhstap4FZpaP3OHVUJ4IhOxgGDhUNYk1vGi9VrAgjmTxZDLrwaVB0_D4KshohCNL7bRvE-4wMLZEVCGwvv_wr6pweV9wAIGCDhQtQY5DKpNvib_NtXwQ9fnH2Bf3xk5POH9qZrVtyGA7YfBLtn9brLgEqMH20IKsvUKWJQP8FYObEKn9Ry6ZE51uGlPTWCWH-1mw3N2jPVR7l7X6Yt6U7jz9wYfwWIRFdl_Um8eba2eOHCaxAPUucIFKVcjDJvyZGZDW9fdcEnFGnVeRda0boEMIdY62EZ5r1rZ3pQ6FIGjJzOeLTax5jlRxCjw_VnY-iEXhvrJA4jq-MLo2GJSy7KAGzKb43fVD_kx2e7A-XN6PyCDTRC4NkUIy63YjonHpgFbobI0k0FXNMAAXedK2LKcGxQPeejEE9n2H1US7LMiTwbHW1_2yrANTpVltZcDX5VXUjq0uJjriydkjDYX1Il9iPXpeksp4OhgDlx0L3nECynLUGRhdl93jmx-kqWm_NpuHH5Y8Yz-f2UDJcTdpt9uCenNcloIUWeA2vn1RPa1vfh01AMHmrrBYa1D1zNsHQ0dL_1aRdNZpEmxX7MjnRWNs41Bv2zE2Gloh0xF1H7grS_dhXwO5OBstBDu22a6j5VGo9nPwAMKOwCs6gcQ6EI', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'XiCSCm7Ydou4dCL93_5ErtnJ8O-Y0e1Rha0Zb4-DhuE.KS23SYnKn4Vt0-rWHw3v5hT9umJBpDGjYufMdWmGZ1A', 'scope': 'openid'}
3.102 AccessTokenResponse {
"access_token": "XiCSCm7Ydou4dCL93_5ErtnJ8O-Y0e1Rha0Zb4-DhuE.KS23SYnKn4Vt0-rWHw3v5hT9umJBpDGjYufMdWmGZ1A",
"expires_in": 3599,
"id_token": {
"at_hash": "VArvEefdOymtIlkgMplqgw",
"aud": [
"866043b5-676d-439c-bcdd-4f4db990f0ad"
],
"auth_time": 1529751824,
"c_hash": "-t17MogWDDCJ6zN5qI29JQ",
"exp": 1529755631,
"iat": 1529752032,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "ede761eb-c74f-4c3c-acb4-90a3375374c5",
"nonce": "NoXQVip3NmJ5xYMD",
"rat": 1529752029,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.102 phase <--<-- 5 --- Done -->-->
3.102 end
3.102 assertion VerifySignedIdTokenHasKID
3.102 condition verify-signed-idtoken-has-kid: status=OK [Verifies that the header of a signed IDToken includes a kid claim.]
3.103 assertion VerifyResponse
3.103 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.103 condition Done: status=OK
============================================================
Conditions
verify-signed-idtoken-has-kid: status=OK [Verifies that the header of a signed IDToken includes a kid claim.]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Req-claims_locales.txt 0000644 0000000 0000000 00000025622 13313425333 015734 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-claims_locales
Test description: Providing claims_locales
Timestamp: 2018-06-23T11:11:23Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.24 phase <--<-- 1 --- Webfinger -->-->
1.24 not expected to do WebFinger
1.24 phase <--<-- 2 --- Discovery -->-->
1.24 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.311 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.313 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.313 phase <--<-- 3 --- Registration -->-->
1.313 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.313 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Xp4kU3cjiqwAHmkS"
],
"response_types": [
"code token"
]
}
1.472 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.473 RegistrationResponse {
"client_id": "2c46c0e2-cd78-4671-b1d9-20cdd5372fc7",
"client_secret": "6sO6._kr1Mws",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "2c46c0e2-cd78-4671-b1d9-20cdd5372fc7",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Xp4kU3cjiqwAHmkS"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.473 phase <--<-- 4 --- AsyncAuthn -->-->
1.473 AuthorizationRequest {
"claims_locales": "se",
"client_id": "2c46c0e2-cd78-4671-b1d9-20cdd5372fc7",
"nonce": "6jVpzZRydg7OACU3",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "kvbdCBZOgjgR8H6V"
}
1.473 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=2c46c0e2-cd78-4671-b1d9-20cdd5372fc7&state=kvbdCBZOgjgR8H6V&response_type=code+token&nonce=6jVpzZRydg7OACU3&claims_locales=se
1.473 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=2c46c0e2-cd78-4671-b1d9-20cdd5372fc7&state=kvbdCBZOgjgR8H6V&response_type=code+token&nonce=6jVpzZRydg7OACU3&claims_locales=se
3.499 http args {}
3.701 response URL with fragment
3.701 response access_token=fDABN5I9jU5LPmylmSiPzLzn0IStQPlBmBBF-CdcFBQ.ne1hBRxrTLDK7tKSKEE4TywkikLr-ABes7VuiySeHmw&code=vEYo4i2295wc5LscsGKlNUcv0GhbkEu7cVTy6s9wwJo.TnfiqvFOrtke8X-TG39kyQMhdomzqOtCDIF1EFokT78&expires_in=3599&scope=openid&state=kvbdCBZOgjgR8H6V&token_type=bearer
3.701 response {'scope': 'openid', 'code': 'vEYo4i2295wc5LscsGKlNUcv0GhbkEu7cVTy6s9wwJo.TnfiqvFOrtke8X-TG39kyQMhdomzqOtCDIF1EFokT78', 'access_token': 'fDABN5I9jU5LPmylmSiPzLzn0IStQPlBmBBF-CdcFBQ.ne1hBRxrTLDK7tKSKEE4TywkikLr-ABes7VuiySeHmw', 'state': 'kvbdCBZOgjgR8H6V', 'expires_in': 3599, 'token_type': 'bearer'}
3.702 AuthorizationResponse {
"access_token": "fDABN5I9jU5LPmylmSiPzLzn0IStQPlBmBBF-CdcFBQ.ne1hBRxrTLDK7tKSKEE4TywkikLr-ABes7VuiySeHmw",
"code": "vEYo4i2295wc5LscsGKlNUcv0GhbkEu7cVTy6s9wwJo.TnfiqvFOrtke8X-TG39kyQMhdomzqOtCDIF1EFokT78",
"expires_in": 3599,
"scope": "openid",
"state": "kvbdCBZOgjgR8H6V",
"token_type": "bearer"
}
3.702 phase <--<-- 5 --- AccessToken -->-->
3.702 --> request op_args: {'state': 'kvbdCBZOgjgR8H6V'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.702 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'kvbdCBZOgjgR8H6V', 'code': 'vEYo4i2295wc5LscsGKlNUcv0GhbkEu7cVTy6s9wwJo.TnfiqvFOrtke8X-TG39kyQMhdomzqOtCDIF1EFokT78', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '2c46c0e2-cd78-4671-b1d9-20cdd5372fc7'}, 'state': 'kvbdCBZOgjgR8H6V'}
3.702 AccessTokenRequest {
"code": "vEYo4i2295wc5LscsGKlNUcv0GhbkEu7cVTy6s9wwJo.TnfiqvFOrtke8X-TG39kyQMhdomzqOtCDIF1EFokT78",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "kvbdCBZOgjgR8H6V"
}
3.702 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.702 request_http_args {'headers': {'Authorization': 'Basic MmM0NmMwZTItY2Q3OC00NjcxLWIxZDktMjBjZGQ1MzcyZmM3OjZzTzYuX2tyMU13cw==', 'Content-Type': 'application/x-www-form-urlencoded'}}
3.702 request code=vEYo4i2295wc5LscsGKlNUcv0GhbkEu7cVTy6s9wwJo.TnfiqvFOrtke8X-TG39kyQMhdomzqOtCDIF1EFokT78&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=kvbdCBZOgjgR8H6V
3.917 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.918 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiSFVkTnFSdG9tcV94Q2J2ZXN2T0hYUSIsImF1ZCI6WyIyYzQ2YzBlMi1jZDc4LTQ2NzEtYjFkOS0yMGNkZDUzNzJmYzciXSwiYXV0aF90aW1lIjoxNTI5NzUyMTgwLCJjX2hhc2giOiJtTlA0VGtIWFdwaTBtRDhTVFl4V1R3IiwiZXhwIjoxNTI5NzU1ODgzLCJpYXQiOjE1Mjk3NTIyODMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjQyMWZiY2U2LTAxNjMtNGYyNi04NWZiLWQ2NTM2MTM5MDMwMiIsIm5vbmNlIjoiNmpWcHpaUnlkZzdPQUNVMyIsInJhdCI6MTUyOTc1MjI4MSwic3ViIjoiZm9vQGJhci5jb20ifQ.N2P0i0-OwtlbcYgDrX5U_Fg2dSRqZwjx-xHkBwBkbvEp0HKp2KONu9LqcrJjGCi0H5t09BZzrffJ0hP20OI-QRK4cMpAN7bh_9XS7bikADVOXyKMi9i1H-AyJ5mUQPJ2lF0qHEpNd5ZELuRI0bap64K5Yg7wS4VBxX9ZFpjJdJqQ1CBYXNt5ilKW9Qqg_EVzVJshPpMhaiD2WKP96lVRZgNrdCHm7SULOJQbXenDxYqwOlLGw_D8Kb0wijmiidvG9CrTeDfdVtBIYOfmzEhgg2lFr_-RnIkI4hPjCJz93gPNb86Hm8KHdNxyxWngDEQ1Qz02QuIxFkLVXrcWMi6jz3dDlqjWft00ZlrdYoGtHmWIhzwTjAUpUql7EbgjTKKsI3-hzfycv1m32lq7iCd4ynSbmP8ApeBuCdXauaX_KfeT7sKrQrbVVQYKjxx7q4hwdeaPHSjXVhaNLFTOoHebYCLLx9gL5xIaiYFo06efEN8Rk-UFPQi08NiNfujw5ePd5753ZPkyyjIYBZLpAFWQH7z96uyW9a6aNpP0pxofQugpr-7uDkYKObMQBunhSIkaI05sRHgbk4oIfVGTANjLUKc-mL2lZkuYmuw4M2V3pdbURCAGf6aBbwHdn29dgm0bdgyh4CbV-C9Du5gX2mM-2FANcDI0MF_DsRWupQrgl8U', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'SP6szqNklDWi8DKD3N6L_01uC7gZmRefVclz2uexwOw.HUoqbEijBMKJE4y9F5JYok-eZQ-oMKy1YrA-EH1tXCI', 'scope': 'openid'}
4.019 AccessTokenResponse {
"access_token": "SP6szqNklDWi8DKD3N6L_01uC7gZmRefVclz2uexwOw.HUoqbEijBMKJE4y9F5JYok-eZQ-oMKy1YrA-EH1tXCI",
"expires_in": 3599,
"id_token": {
"at_hash": "HUdNqRtomq_xCbvesvOHXQ",
"aud": [
"2c46c0e2-cd78-4671-b1d9-20cdd5372fc7"
],
"auth_time": 1529752180,
"c_hash": "mNP4TkHXWpi0mD8STYxWTw",
"exp": 1529755883,
"iat": 1529752283,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "421fbce6-0163-4f26-85fb-d65361390302",
"nonce": "6jVpzZRydg7OACU3",
"rat": 1529752281,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
4.019 phase <--<-- 6 --- UserInfo -->-->
4.019 do_user_info_request kwargs:{'state': 'kvbdCBZOgjgR8H6V', 'method': 'GET', 'authn_method': 'bearer_header'}
4.019 request {'body': None}
4.019 request_url https://oidc-certification.ory.sh:8443/userinfo
4.019 request_http_args {'headers': {'Authorization': 'Bearer SP6szqNklDWi8DKD3N6L_01uC7gZmRefVclz2uexwOw.HUoqbEijBMKJE4y9F5JYok-eZQ-oMKy1YrA-EH1tXCI'}}
4.103 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
4.103 OpenIDSchema {
"sub": "[email protected]"
}
4.103 OpenIDSchema {
"sub": "[email protected]"
}
4.104 phase <--<-- 7 --- DisplayUserInfo -->-->
4.104 phase <--<-- 8 --- Done -->-->
4.104 end
4.104 assertion CheckHTTPResponse
4.104 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
4.104 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Rotation-RP-Sig.txt 0000644 0000000 0000000 00000042446 13313425607 015102 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Rotation-RP-Sig
Test description: Request access token, change RSA signing key and request another access token
Timestamp: 2018-06-23T11:14:15Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.075 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.076 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.076 phase <--<-- 2 --- Registration -->-->
0.076 register kwargs:{'application_name': 'OIC test tool', 'token_endpoint_auth_method': 'private_key_jwt', 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'refresh_token'], 'response_types': ['code token'], 'url': 'https://oidc-certification.ory.sh:8443/clients', 'application_type': 'web'}
0.076 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit",
"refresh_token"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#ZnwPLJk6WfZG1fJw"
],
"response_types": [
"code token"
],
"token_endpoint_auth_method": "private_key_jwt"
}
0.279 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.28 RegistrationResponse {
"client_id": "24f935b0-1cc1-45e7-baa6-744772c5ea32",
"client_secret": "sIe1S7VSV.SM",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit",
"refresh_token"
],
"id": "24f935b0-1cc1-45e7-baa6-744772c5ea32",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#ZnwPLJk6WfZG1fJw"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "private_key_jwt",
"userinfo_signed_response_alg": "none"
}
0.28 phase <--<-- 3 --- AsyncAuthn -->-->
0.28 AuthorizationRequest {
"client_id": "24f935b0-1cc1-45e7-baa6-744772c5ea32",
"nonce": "g0xUehWftdkuqpZA",
"prompt": [
"consent"
],
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid offline_access",
"state": "l7TJGQrQlcsJwmSg"
}
0.281 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=consent&scope=openid+offline_access&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=24f935b0-1cc1-45e7-baa6-744772c5ea32&state=l7TJGQrQlcsJwmSg&response_type=code+token&nonce=g0xUehWftdkuqpZA
0.281 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=consent&scope=openid+offline_access&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=24f935b0-1cc1-45e7-baa6-744772c5ea32&state=l7TJGQrQlcsJwmSg&response_type=code+token&nonce=g0xUehWftdkuqpZA
3.563 http args {}
3.728 response URL with fragment
3.729 response access_token=v-B2pcRJVjIpl9wi38BSRdRAy9MjlP3O0ZD0Jz75aq8.AK3mkQw_rKrPHqdsHxv2uzqdWty3HbkugL0nHSZ_TUY&code=DMEqFepa8HmxP13y3SqiA8MhOpGjH_bidx3WxLwfnjs.siXO4tx7D9ffL3fx5WLrPtkSHtNh3qjw2TyPfxymV1o&expires_in=3599&scope=openid%20offline_access&state=l7TJGQrQlcsJwmSg&token_type=bearer
3.729 response {'scope': 'openid offline_access', 'code': 'DMEqFepa8HmxP13y3SqiA8MhOpGjH_bidx3WxLwfnjs.siXO4tx7D9ffL3fx5WLrPtkSHtNh3qjw2TyPfxymV1o', 'access_token': 'v-B2pcRJVjIpl9wi38BSRdRAy9MjlP3O0ZD0Jz75aq8.AK3mkQw_rKrPHqdsHxv2uzqdWty3HbkugL0nHSZ_TUY', 'state': 'l7TJGQrQlcsJwmSg', 'expires_in': 3599, 'token_type': 'bearer'}
3.729 AuthorizationResponse {
"access_token": "v-B2pcRJVjIpl9wi38BSRdRAy9MjlP3O0ZD0Jz75aq8.AK3mkQw_rKrPHqdsHxv2uzqdWty3HbkugL0nHSZ_TUY",
"code": "DMEqFepa8HmxP13y3SqiA8MhOpGjH_bidx3WxLwfnjs.siXO4tx7D9ffL3fx5WLrPtkSHtNh3qjw2TyPfxymV1o",
"expires_in": 3599,
"scope": "openid offline_access",
"state": "l7TJGQrQlcsJwmSg",
"token_type": "bearer"
}
3.73 phase <--<-- 4 --- AccessToken -->-->
3.73 --> request op_args: {'state': 'l7TJGQrQlcsJwmSg', 'authn_method': 'private_key_jwt'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.73 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'l7TJGQrQlcsJwmSg', 'code': 'DMEqFepa8HmxP13y3SqiA8MhOpGjH_bidx3WxLwfnjs.siXO4tx7D9ffL3fx5WLrPtkSHtNh3qjw2TyPfxymV1o', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '24f935b0-1cc1-45e7-baa6-744772c5ea32'}, 'state': 'l7TJGQrQlcsJwmSg', 'authn_method': 'private_key_jwt'}
3.73 AccessTokenRequest {
"client_assertion": "eyJhbGciOiJSUzI1NiIsImtpZCI6Ind0MjVPZ3lSX256RzNPb1E3ZGFhMnJMNi1nTW5GZGZSekJqaFVWUHU4UlEifQ.eyJpc3MiOiAiMjRmOTM1YjAtMWNjMS00NWU3LWJhYTYtNzQ0NzcyYzVlYTMyIiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiMjRmOTM1YjAtMWNjMS00NWU3LWJhYTYtNzQ0NzcyYzVlYTMyIiwgImlhdCI6IDE1Mjk3NTI0NTUsICJqdGkiOiAiNUlHZTVjNUFMOUtkTjhhcXNoV3YzWlhrY0NoQVNBMGkiLCAiZXhwIjogMTUyOTc1MzA1NX0.wWCtKWhfKJusv1FFruyb6ZWKnnXBko31166q8cIONggfjuedMj7xuLu978t1t6n8rz7jrNcyJUuZs5hJ1v1n1Dr7qiSGIirtRSewWGcZU2ib80c8SczoapmIbDJJHztcK6sE6E5cGDKEE90pL_nh2-10b5KjEl2QdJBYhS19yIxQk06Ube5vSThWE9-DWBq_8ueHt8AJFIKy2R43v44A1TMfQHwfi6kN-JwnQIBVTEnJ9YEbRIHU4VHEK4BmTRuXZunp_VIG-IqUljWWfp2JCX4ZKzIQ8DYIaEAm_KM1OLbC5NrBMM5YfEygoWJItpTCpusWajAsFbjmEjSp-YkhJg",
"client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer",
"code": "DMEqFepa8HmxP13y3SqiA8MhOpGjH_bidx3WxLwfnjs.siXO4tx7D9ffL3fx5WLrPtkSHtNh3qjw2TyPfxymV1o",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "l7TJGQrQlcsJwmSg"
}
3.733 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.733 request_http_args {'headers': {'Content-Type': 'application/x-www-form-urlencoded'}}
3.733 request code=DMEqFepa8HmxP13y3SqiA8MhOpGjH_bidx3WxLwfnjs.siXO4tx7D9ffL3fx5WLrPtkSHtNh3qjw2TyPfxymV1o&client_assertion_type=urn%3Aietf%3Aparams%3Aoauth%3Aclient-assertion-type%3Ajwt-bearer&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=l7TJGQrQlcsJwmSg&client_assertion=eyJhbGciOiJSUzI1NiIsImtpZCI6Ind0MjVPZ3lSX256RzNPb1E3ZGFhMnJMNi1nTW5GZGZSekJqaFVWUHU4UlEifQ.eyJpc3MiOiAiMjRmOTM1YjAtMWNjMS00NWU3LWJhYTYtNzQ0NzcyYzVlYTMyIiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiMjRmOTM1YjAtMWNjMS00NWU3LWJhYTYtNzQ0NzcyYzVlYTMyIiwgImlhdCI6IDE1Mjk3NTI0NTUsICJqdGkiOiAiNUlHZTVjNUFMOUtkTjhhcXNoV3YzWlhrY0NoQVNBMGkiLCAiZXhwIjogMTUyOTc1MzA1NX0.wWCtKWhfKJusv1FFruyb6ZWKnnXBko31166q8cIONggfjuedMj7xuLu978t1t6n8rz7jrNcyJUuZs5hJ1v1n1Dr7qiSGIirtRSewWGcZU2ib80c8SczoapmIbDJJHztcK6sE6E5cGDKEE90pL_nh2-10b5KjEl2QdJBYhS19yIxQk06Ube5vSThWE9-DWBq_8ueHt8AJFIKy2R43v44A1TMfQHwfi6kN-JwnQIBVTEnJ9YEbRIHU4VHEK4BmTRuXZunp_VIG-IqUljWWfp2JCX4ZKzIQ8DYIaEAm_KM1OLbC5NrBMM5YfEygoWJItpTCpusWajAsFbjmEjSp-YkhJg
3.914 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.915 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplODdmZjk4Ny1lZTYzLTRmM2UtOGJmMy00MDk5YTYxNDhmNzgiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiVldtY2xndEc5cTBSOVNOUjBLUkJoZyIsImF1ZCI6WyIyNGY5MzViMC0xY2MxLTQ1ZTctYmFhNi03NDQ3NzJjNWVhMzIiXSwiYXV0aF90aW1lIjoxNTI5NzUyMzcxLCJjX2hhc2giOiJ3dFpDQkxmUFd2ZjJmNVl0c3FUeUtRIiwiZXhwIjoxNTI5NzU2MDU0LCJpYXQiOjE1Mjk3NTI0NTUsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjJiOWEwNjE2LTI2NzEtNGU1Ni04MmQ2LWJhNWRmODliMWY4ZSIsIm5vbmNlIjoiZzB4VWVoV2Z0ZGt1cXBaQSIsInJhdCI6MTUyOTc1MjQ1MSwic3ViIjoiZm9vQGJhci5jb20ifQ.aeYW4L6J4DOcrI3QjSnasXW-feF3TfLa8IvlD-swPl6u0n62wB23I9GXmdEtko1UkNgvjKrqAn_bHtouxvDYqyuVLNzwEkUoFzRF-Yg0e40fxxn_VxqiVd6I1Fql9fuJVAJtvLfR5xXjiMSXgBSO-0nnkqT89k7ekGTDn9BoMwqN5WwvdBL9pi-TVfFFxWceVbT1UZmFXMoj7QxGLNRQHyhDOpWGziADd_6fLO4Qtyzi-IdbkC60e13fNoxxz23ukc_bymhV_Q9ALhLtRkgOkcYT05knFntL4jmmAwIsb52yQ04VUJ3tm_MdiJM3roXQYx0YjUgLLI3SWWqJXjTfb7dvyuHI9vHIS9Wsx1bHAudzDJqafV63BT6p-ulFUjwNrkct6PcNFPsu0ii-1uZqKgN3KiLcuNbRQ1d5hnQQP-e8eKaC0Ks7GgPrFe3kZvpVNTA8T8oq1GhXnIDajn1czr1y5NZNnQxZz20Dy8dEJxZ81es0wzimaIbPcoF4zof8xOrhMh4y5BU4XPTO11lceBwvu2Ft4zgvC3DFE6xmf4Hwy9KeZv2Wowdr6iYVZWqX-y6WNBh3ecsEeLfML5_kptBzxkieUc23hfK_kCsQTDXXsHKMbAcvtWp36CKraiFaIJw8PlYQJvQsVsjuY5YJwQVJ536fbLMth_8W0JV8I_0', 'scope': 'openid offline_access', 'access_token': 'mjJzzI7Wwy_MDjRYbk6NTgVyzs_vndra2TnqEGmV4yI.1s0hMKCbRnIHMGdqQygvlq-UnmPS1KO0LbKXf4jRCUo', 'refresh_token': 'bvCRuzNLh--ABrmqEn2Qj3Vki2NrXLqVZEk5pVQx1rA.1echXA9AFbebKtqM9JG0w5ZJKbb5uVWiO2Blbar0JuY', 'token_type': 'bearer', 'expires_in': 3599}
3.996 AccessTokenResponse {
"access_token": "mjJzzI7Wwy_MDjRYbk6NTgVyzs_vndra2TnqEGmV4yI.1s0hMKCbRnIHMGdqQygvlq-UnmPS1KO0LbKXf4jRCUo",
"expires_in": 3599,
"id_token": {
"at_hash": "VWmclgtG9q0R9SNR0KRBhg",
"aud": [
"24f935b0-1cc1-45e7-baa6-744772c5ea32"
],
"auth_time": 1529752371,
"c_hash": "wtZCBLfPWvf2f5YtsqTyKQ",
"exp": 1529756054,
"iat": 1529752455,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "2b9a0616-2671-4e56-82d6-ba5df89b1f8e",
"nonce": "g0xUehWftdkuqpZA",
"rat": 1529752451,
"sub": "[email protected]"
},
"refresh_token": "bvCRuzNLh--ABrmqEn2Qj3Vki2NrXLqVZEk5pVQx1rA.1echXA9AFbebKtqM9JG0w5ZJKbb5uVWiO2Blbar0JuY",
"scope": "openid offline_access",
"token_type": "bearer"
}
3.996 phase <--<-- 5 --- RotateSigKeys -->-->
4.043 phase <--<-- 6 --- RefreshAccessToken -->-->
4.043 RefreshAccessTokenRequest {
"client_assertion": "eyJhbGciOiJSUzI1NiIsImtpZCI6IkJlYTFmMHRNOWFhRmpkTU5YSmk4RXJhbDhFR0dWdjducF9NVjdUdlJ0UFEifQ.eyJpc3MiOiAiMjRmOTM1YjAtMWNjMS00NWU3LWJhYTYtNzQ0NzcyYzVlYTMyIiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiMjRmOTM1YjAtMWNjMS00NWU3LWJhYTYtNzQ0NzcyYzVlYTMyIiwgImlhdCI6IDE1Mjk3NTI0NTUsICJqdGkiOiAiWFVXYnVKdU0yRlBGa3I1UUxtSUkyTExQVVBxQUZEOXciLCAiZXhwIjogMTUyOTc1MzA1NX0.mCddHD1bBT56_EG2Rj6dC-MovwXoFsX5uiGkvVmNs0LynVDnRzKZpG1RWxVP9WEadKaPZt9JoPTTaPtMYyD2b4Jd7s9zkU3l4gooRwsy_gjbCJeyqqfv3PoBY_-kiaM3mPiWXUZ2033wyy6blTcksAOHVCk4p8lPamuKmRxdPPcUm3FiW8PP465BwooAKhU0HVP-XlphTyRmc0n1G9yiNYM4rIRH-ZmR2taDuXtqJeV3mfhtDI0MVFOJM2uh7cFSRXegUbplzB2TVsxnyT6c47BqlAOQlx90ii7K4isAgizMcSHxXaiLTMT87iSdGobwuZb2uac3ZebANZSfuL529g",
"client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer",
"grant_type": "refresh_token",
"refresh_token": "bvCRuzNLh--ABrmqEn2Qj3Vki2NrXLqVZEk5pVQx1rA.1echXA9AFbebKtqM9JG0w5ZJKbb5uVWiO2Blbar0JuY",
"scope": "openid offline_access"
}
4.046 request {'client_assertion': 'eyJhbGciOiJSUzI1NiIsImtpZCI6IkJlYTFmMHRNOWFhRmpkTU5YSmk4RXJhbDhFR0dWdjducF9NVjdUdlJ0UFEifQ.eyJpc3MiOiAiMjRmOTM1YjAtMWNjMS00NWU3LWJhYTYtNzQ0NzcyYzVlYTMyIiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiMjRmOTM1YjAtMWNjMS00NWU3LWJhYTYtNzQ0NzcyYzVlYTMyIiwgImlhdCI6IDE1Mjk3NTI0NTUsICJqdGkiOiAiWFVXYnVKdU0yRlBGa3I1UUxtSUkyTExQVVBxQUZEOXciLCAiZXhwIjogMTUyOTc1MzA1NX0.mCddHD1bBT56_EG2Rj6dC-MovwXoFsX5uiGkvVmNs0LynVDnRzKZpG1RWxVP9WEadKaPZt9JoPTTaPtMYyD2b4Jd7s9zkU3l4gooRwsy_gjbCJeyqqfv3PoBY_-kiaM3mPiWXUZ2033wyy6blTcksAOHVCk4p8lPamuKmRxdPPcUm3FiW8PP465BwooAKhU0HVP-XlphTyRmc0n1G9yiNYM4rIRH-ZmR2taDuXtqJeV3mfhtDI0MVFOJM2uh7cFSRXegUbplzB2TVsxnyT6c47BqlAOQlx90ii7K4isAgizMcSHxXaiLTMT87iSdGobwuZb2uac3ZebANZSfuL529g', 'scope': 'openid offline_access', 'grant_type': 'refresh_token', 'client_assertion_type': 'urn:ietf:params:oauth:client-assertion-type:jwt-bearer', 'refresh_token': 'bvCRuzNLh--ABrmqEn2Qj3Vki2NrXLqVZEk5pVQx1rA.1echXA9AFbebKtqM9JG0w5ZJKbb5uVWiO2Blbar0JuY'}
4.181 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
4.181 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
4.181 handle_response kwargs:{'r': <Response [200]>, 'csi': <oic.oic.message.RefreshAccessTokenRequest object at 0x7f2440219828>}
4.181 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplODdmZjk4Ny1lZTYzLTRmM2UtOGJmMy00MDk5YTYxNDhmNzgiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiVldtY2xndEc5cTBSOVNOUjBLUkJoZyIsImF1ZCI6WyIyNGY5MzViMC0xY2MxLTQ1ZTctYmFhNi03NDQ3NzJjNWVhMzIiXSwiYXV0aF90aW1lIjoxNTI5NzUyMzcxLCJjX2hhc2giOiJ3dFpDQkxmUFd2ZjJmNVl0c3FUeUtRIiwiZXhwIjoxNTI5NzU2MDU1LCJpYXQiOjE1Mjk3NTI0NTUsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjUxMGExYWUxLTNlZjUtNGRiZi1iMTYxLTUxYjYwMDgxODY4ZSIsIm5vbmNlIjoiIiwicmF0IjoxNTI5NzUyNDUxLCJzdWIiOiJmb29AYmFyLmNvbSJ9.lmwWwhT8tSnW8RksJgaNqpw34uOz4DwpOhEsaMsklexMZuIUN9x8URThBssURQIooiogqvFWDAtNQ6qaiGOw_dj2pvuk1yMEWAhzyQAhb_TVuxnaYeUEPFfZJpsEhb-bkqmSaG_DvsEeXRzKszgMVLTcv8Co5KxElSo898hwFQ-YZQAVa9Tbti3o3LsiT7MbG08IUhK1ugclCiAvEVid2IBRhXUfMQrpEIrjwtXiAXTvi9E7PxLptFAGbCM8fNTLh1asTw25TNW4uJz6vYU930fCydXrNO6rk_5nNxXJmWsQUIAvznhKR2LqgTuIzG2ggJcIWStrf9vLWi5aSuM_KFyrjwbGQciHMl4iD8WTIRTm4ZDB75ZT6WuY5lFM_Iyz-1Ns5YfIWcvG4Y82vfJeoMVvbATMQhJtflNcRKbZBbuQoF4lhyxcOSGEtakihHqRGnZpCXS7BO1P4yoFtHaAhk04lAJ6CNmIya-0AHQ0609f3Pjo8EKV9a1Oow71odBjmnxljhVEM1lHvr25OVHHJu7xOUI7VDeDu0LV63wcabPM-3xLajKrERl5Swp4LI_LfQI-sAdutlgpxElKjz00g_AbMrdx9s1_vyC4o8CVyCUPK2sCpyrkK1kWu8okrka1AvcVBkyuXD1FgvRyRd2gTByM7CL8owW6DRfOTD0EmQg', 'scope': 'openid offline_access', 'access_token': 'd6EkeamwEdI4HmSNiUwLarydu9bHThhAI-o8xK772zk.yUFf36pPwJhR9_WgOCJXlSGkcorV9hqAMglbYLS5EsA', 'refresh_token': 'xIQWvp6rkVx47sNA4XjHnbzSc61UUzDbhBa2FlqFLJA.rnGcfIxkYpM-FBiEQbbntJGl3IQZW3gATqrvUQrQnbQ', 'token_type': 'bearer', 'expires_in': 3599}
4.185 jws header {'typ': 'JWT', 'alg': 'RS256', 'kid': 'public:e87ff987-ee63-4f3e-8bf3-4099a6148f78'}
4.185 AccessTokenResponse {
"access_token": "d6EkeamwEdI4HmSNiUwLarydu9bHThhAI-o8xK772zk.yUFf36pPwJhR9_WgOCJXlSGkcorV9hqAMglbYLS5EsA",
"expires_in": 3599,
"id_token": {
"at_hash": "VWmclgtG9q0R9SNR0KRBhg",
"aud": [
"24f935b0-1cc1-45e7-baa6-744772c5ea32"
],
"auth_time": 1529752371,
"c_hash": "wtZCBLfPWvf2f5YtsqTyKQ",
"exp": 1529756055,
"iat": 1529752455,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "510a1ae1-3ef5-4dbf-b161-51b60081868e",
"rat": 1529752451,
"sub": "[email protected]"
},
"refresh_token": "xIQWvp6rkVx47sNA4XjHnbzSc61UUzDbhBa2FlqFLJA.rnGcfIxkYpM-FBiEQbbntJGl3IQZW3gATqrvUQrQnbQ",
"scope": "openid offline_access",
"token_type": "bearer"
}
4.185 phase <--<-- 7 --- Done -->-->
4.185 end
4.186 assertion CheckHTTPResponse
4.186 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
4.186 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
Done: status=OK
============================================================
RESULT: PASSED
./OP-OAuth-2nd-Revokes.txt 0000644 0000000 0000000 00000034621 13313425570 015354 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-OAuth-2nd-Revokes
Test description: Trying to use authorization code twice should result in revoking previously issued access tokens
Timestamp: 2018-06-23T11:14:00Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.001 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.083 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.084 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.084 phase <--<-- 2 --- Registration -->-->
0.084 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.085 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#TO9u8AB4TvCRTg8S"
],
"response_types": [
"code token"
]
}
0.242 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.243 RegistrationResponse {
"client_id": "0a335476-15b2-4b37-9c97-874e06d02837",
"client_secret": "vkyAwLiSg5Qm",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "0a335476-15b2-4b37-9c97-874e06d02837",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#TO9u8AB4TvCRTg8S"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.243 phase <--<-- 3 --- Note -->-->
1.362 phase <--<-- 4 --- AsyncAuthn -->-->
1.363 AuthorizationRequest {
"client_id": "0a335476-15b2-4b37-9c97-874e06d02837",
"nonce": "xuTCpTR2l1MbpyAp",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "qYwZo4ytMEDViTvb"
}
1.363 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=0a335476-15b2-4b37-9c97-874e06d02837&state=qYwZo4ytMEDViTvb&response_type=code+token&nonce=xuTCpTR2l1MbpyAp
1.363 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=0a335476-15b2-4b37-9c97-874e06d02837&state=qYwZo4ytMEDViTvb&response_type=code+token&nonce=xuTCpTR2l1MbpyAp
5.556 http args {}
5.721 response URL with fragment
5.721 response access_token=Ps5IZDxvWzylOq5MLH1hrDItBkY2gJ_YY3JuVCpu2o0.mKNHY6voLebyXgVf3i94CRo4YMk0eEevoYsbNWEEOF0&code=LULXxF4WvDIwGvfDKFIVe1a5IX76JQbXXXfgWwl7_Qo.fqu6AFFkSq1HIVTwHWFdelKcAh1mnOJ3CI0nFQv5L30&expires_in=3599&scope=openid&state=qYwZo4ytMEDViTvb&token_type=bearer
5.722 response {'scope': 'openid', 'code': 'LULXxF4WvDIwGvfDKFIVe1a5IX76JQbXXXfgWwl7_Qo.fqu6AFFkSq1HIVTwHWFdelKcAh1mnOJ3CI0nFQv5L30', 'access_token': 'Ps5IZDxvWzylOq5MLH1hrDItBkY2gJ_YY3JuVCpu2o0.mKNHY6voLebyXgVf3i94CRo4YMk0eEevoYsbNWEEOF0', 'state': 'qYwZo4ytMEDViTvb', 'expires_in': 3599, 'token_type': 'bearer'}
5.722 AuthorizationResponse {
"access_token": "Ps5IZDxvWzylOq5MLH1hrDItBkY2gJ_YY3JuVCpu2o0.mKNHY6voLebyXgVf3i94CRo4YMk0eEevoYsbNWEEOF0",
"code": "LULXxF4WvDIwGvfDKFIVe1a5IX76JQbXXXfgWwl7_Qo.fqu6AFFkSq1HIVTwHWFdelKcAh1mnOJ3CI0nFQv5L30",
"expires_in": 3599,
"scope": "openid",
"state": "qYwZo4ytMEDViTvb",
"token_type": "bearer"
}
5.722 phase <--<-- 5 --- AccessToken -->-->
5.722 --> request op_args: {'state': 'qYwZo4ytMEDViTvb'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
5.722 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'qYwZo4ytMEDViTvb', 'code': 'LULXxF4WvDIwGvfDKFIVe1a5IX76JQbXXXfgWwl7_Qo.fqu6AFFkSq1HIVTwHWFdelKcAh1mnOJ3CI0nFQv5L30', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '0a335476-15b2-4b37-9c97-874e06d02837'}, 'state': 'qYwZo4ytMEDViTvb'}
5.722 AccessTokenRequest {
"code": "LULXxF4WvDIwGvfDKFIVe1a5IX76JQbXXXfgWwl7_Qo.fqu6AFFkSq1HIVTwHWFdelKcAh1mnOJ3CI0nFQv5L30",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "qYwZo4ytMEDViTvb"
}
5.723 request_url https://oidc-certification.ory.sh:8443/oauth2/token
5.723 request_http_args {'headers': {'Authorization': 'Basic MGEzMzU0NzYtMTViMi00YjM3LTljOTctODc0ZTA2ZDAyODM3OnZreUF3TGlTZzVRbQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
5.723 request code=LULXxF4WvDIwGvfDKFIVe1a5IX76JQbXXXfgWwl7_Qo.fqu6AFFkSq1HIVTwHWFdelKcAh1mnOJ3CI0nFQv5L30&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=qYwZo4ytMEDViTvb
5.946 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
5.947 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiN19aLXRfV0RsNkkwMmw1THF3amtfUSIsImF1ZCI6WyIwYTMzNTQ3Ni0xNWIyLTRiMzctOWM5Ny04NzRlMDZkMDI4MzciXSwiYXV0aF90aW1lIjoxNTI5NzUyMzcxLCJjX2hhc2giOiJnRHFnMWxuajV2SWFFNV9OaWRLZHhBIiwiZXhwIjoxNTI5NzU2MDM5LCJpYXQiOjE1Mjk3NTI0NDAsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImExN2YxODc1LWU3NTEtNDI0NC05ODcyLTY5N2QxNGYzMjc2YyIsIm5vbmNlIjoieHVUQ3BUUjJsMU1icHlBcCIsInJhdCI6MTUyOTc1MjQzNiwic3ViIjoiZm9vQGJhci5jb20ifQ.IeEkSyPgq2zgbfgiSpqdWIfM7Go5TkeDdfXLM5btDPDS0I-cK78fEyCB58cs-oGjFmxKQz0aVvWfvK57PDTYYx8IQILnXhIRqxXsI7gT4BM_0sl70if13FshWiJQIkEaQcrVxca8EWOk7q5pgQmRxC056_Hz4kdvmlrhS7AhIpbq6___4D-A6MldNIKx1Bia12U8pcdCXlQazRYituHDxn1nVhDUhzQ8Gv6O0sIBsSNayVqjIsr-O7m7MiWi_mdB2mKjtXodI7EUzOtmSvjb3otz71N8QQvR6Q8CRvgiULcu3UchJ_83RIjYhPFDAcRV9Gxe7TN93FG6h2H71gZZKZupXkwl2IHCeT-5EBw2VDm-5_v7JukGKZ57jNUhJmKt7mp7pKus1QNw-5KVLF8a1hL72XiR1KM_Tej58-CmUIeor7luUIeT9oWUTxnGgf43NIu_Rdk1qJtGQdhCtXiqunyQx_kdMmfbTlu1D9_aAEPtNH6R9p8_u71fgXWFpq_Fx5T6wnqFeV3JTJA1TO_ij81DkyA9D0EtLVpLMfXvy6KjUAeEwdVvXBr626_TIR413RInrN_ZJxXZngcETgSeNPhG-u2qS2C5n6w0mhJ_STRD2YrmMQcl2-rs4AYb3B9TZEuL7FQ8Bu_xmV0e-19T4toVDi2v3H8noWLdnoLoiNo', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': '5jNbpI04MgkXaCaAUVeqRLTj6GFs_ZyCrJuXNrFlMnU.qDfHOomlBCkWmovNMqsY5Li93ey5t1TNuMFGRWYxfV8', 'scope': 'openid'}
6.034 AccessTokenResponse {
"access_token": "5jNbpI04MgkXaCaAUVeqRLTj6GFs_ZyCrJuXNrFlMnU.qDfHOomlBCkWmovNMqsY5Li93ey5t1TNuMFGRWYxfV8",
"expires_in": 3599,
"id_token": {
"at_hash": "7_Z-t_WDl6I02l5Lqwjk_Q",
"aud": [
"0a335476-15b2-4b37-9c97-874e06d02837"
],
"auth_time": 1529752371,
"c_hash": "gDqg1lnj5vIaE5_NidKdxA",
"exp": 1529756039,
"iat": 1529752440,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "a17f1875-e751-4244-9872-697d14f3276c",
"nonce": "xuTCpTR2l1MbpyAp",
"rat": 1529752436,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
6.034 phase <--<-- 6 --- AccessToken -->-->
6.034 --> request op_args: {'state': 'qYwZo4ytMEDViTvb'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
6.034 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'qYwZo4ytMEDViTvb', 'code': 'LULXxF4WvDIwGvfDKFIVe1a5IX76JQbXXXfgWwl7_Qo.fqu6AFFkSq1HIVTwHWFdelKcAh1mnOJ3CI0nFQv5L30', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '0a335476-15b2-4b37-9c97-874e06d02837'}, 'state': 'qYwZo4ytMEDViTvb'}
6.035 AccessTokenRequest {
"code": "LULXxF4WvDIwGvfDKFIVe1a5IX76JQbXXXfgWwl7_Qo.fqu6AFFkSq1HIVTwHWFdelKcAh1mnOJ3CI0nFQv5L30",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "qYwZo4ytMEDViTvb"
}
6.035 request_url https://oidc-certification.ory.sh:8443/oauth2/token
6.035 request_http_args {'headers': {'Authorization': 'Basic MGEzMzU0NzYtMTViMi00YjM3LTljOTctODc0ZTA2ZDAyODM3OnZreUF3TGlTZzVRbQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
6.035 request code=LULXxF4WvDIwGvfDKFIVe1a5IX76JQbXXXfgWwl7_Qo.fqu6AFFkSq1HIVTwHWFdelKcAh1mnOJ3CI0nFQv5L30&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=qYwZo4ytMEDViTvb
6.194 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:400 message:{"error":"invalid_grant","error_description":"The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client","status_code":400,"error_debug":"The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found."}
6.195 response {'error_debug': 'The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found.', 'error_description': 'The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client', 'error': 'invalid_grant', 'status_code': 400}
6.195 event Got expected error
6.195 TokenErrorResponse {
"error": "invalid_grant",
"error_debug": "The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found.",
"error_description": "The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client",
"status_code": 400
}
6.195 phase <--<-- 7 --- UserInfo -->-->
6.196 do_user_info_request kwargs:{'state': 'qYwZo4ytMEDViTvb', 'method': 'GET', 'authn_method': 'bearer_header'}
6.196 request {'body': None}
6.196 request_url https://oidc-certification.ory.sh:8443/userinfo
6.196 request_http_args {'headers': {'Authorization': 'Bearer 5jNbpI04MgkXaCaAUVeqRLTj6GFs_ZyCrJuXNrFlMnU.qDfHOomlBCkWmovNMqsY5Li93ey5t1TNuMFGRWYxfV8'}}
6.301 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:401 message:{"error":"request_unauthorized","error_description":"The request could not be authorized","error_hint":"Check that you provided valid credentials in the right format.","status_code":401,"error_debug":"A validator returned an error"}
6.301 event Expected error not received: got request_unauthorized
6.302 ErrorResponse {
"error": "request_unauthorized",
"error_debug": "A validator returned an error",
"error_description": "The request could not be authorized",
"error_hint": "Check that you provided valid credentials in the right format.",
"status_code": 401
}
6.302 ErrorResponse {
"error": "request_unauthorized",
"error_debug": "A validator returned an error",
"error_description": "The request could not be authorized",
"error_hint": "Check that you provided valid credentials in the right format.",
"status_code": 401
}
6.302 phase <--<-- 8 --- Done -->-->
6.302 end
6.302 assertion VerifyResponse
6.303 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
6.303 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Discovery-Config.txt 0000644 0000000 0000000 00000006700 13313424661 015406 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Discovery-Config
Test description: Publishes openid-configuration discovery information
Timestamp: 2018-06-23T11:06:25Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.113 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.115 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.115 phase <--<-- 2 --- Done -->-->
0.115 end
0.115 assertion CheckHTTPResponse
0.115 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.116 assertion VerifyIdTokenSigningAlgorithmIsSupported
0.116 condition verify-id_token_signing-algorithm-is-supported: status=OK [Verify that required algorithms in id_token_signing_alg_values_supported]
0.116 assertion VerifyHTTPSUsage
0.116 condition verify-https-usage: status=OK [Verify that specific endpoints uses https]
0.116 assertion VerifyOPEndpointsUseHTTPS
0.116 condition verify-op-endpoints-use-https: status=OK [Verify that all OP endpoints uses https]
0.116 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-id_token_signing-algorithm-is-supported: status=OK [Verify that required algorithms in id_token_signing_alg_values_supported]
verify-https-usage: status=OK [Verify that specific endpoints uses https]
verify-op-endpoints-use-https: status=OK [Verify that all OP endpoints uses https]
Done: status=OK
============================================================
RESULT: PASSED
./OP-scope-All.txt 0000644 0000000 0000000 00000031424 13313425270 014051 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-scope-All
Test description: Scope requesting all claims
Timestamp: 2018-06-23T11:10:48Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.081 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.082 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.082 phase <--<-- 2 --- Registration -->-->
0.082 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.082 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#KxG8nkKoV2xfFr0w"
],
"response_types": [
"code token"
]
}
0.238 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.239 RegistrationResponse {
"client_id": "7a203f41-fe72-4346-bb4d-78a722560135",
"client_secret": "YANPUne85k8f",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "7a203f41-fe72-4346-bb4d-78a722560135",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#KxG8nkKoV2xfFr0w"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.239 phase <--<-- 3 --- AsyncAuthn -->-->
0.239 condition Check support: status=WARNING, message=No support for: scopes_supported=['profile', 'email', 'address', 'phone']
0.239 AuthorizationRequest {
"client_id": "7a203f41-fe72-4346-bb4d-78a722560135",
"nonce": "VyM2Ni0AYZN9ZXvC",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid profile email address phone",
"state": "DSrHDfJbxgUv4pFP"
}
0.239 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+profile+email+address+phone&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=7a203f41-fe72-4346-bb4d-78a722560135&state=DSrHDfJbxgUv4pFP&response_type=code+token&nonce=VyM2Ni0AYZN9ZXvC
0.24 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+profile+email+address+phone&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=7a203f41-fe72-4346-bb4d-78a722560135&state=DSrHDfJbxgUv4pFP&response_type=code+token&nonce=VyM2Ni0AYZN9ZXvC
4.435 http args {}
4.597 response URL with fragment
4.597 response access_token=pBBGytVvMsmFW517lTivmc4kwD-b6wFSTju9Z0p75A8.6RQTcNrpfBM0NaSO4wo4TT9hJ0E5dLCJ9mEMwyhuGII&code=0NHuh4TFFVYnrTQlR_dKvPQdK1LBegnEIEuqu5DaoVA.CFtDbF8ugawgZwLAUD2kp1uJxcKgMYlcpD4SDst4D0Q&expires_in=3599&scope=openid%20profile%20email%20address%20phone&state=DSrHDfJbxgUv4pFP&token_type=bearer
4.598 response {'scope': 'openid profile email address phone', 'code': '0NHuh4TFFVYnrTQlR_dKvPQdK1LBegnEIEuqu5DaoVA.CFtDbF8ugawgZwLAUD2kp1uJxcKgMYlcpD4SDst4D0Q', 'access_token': 'pBBGytVvMsmFW517lTivmc4kwD-b6wFSTju9Z0p75A8.6RQTcNrpfBM0NaSO4wo4TT9hJ0E5dLCJ9mEMwyhuGII', 'state': 'DSrHDfJbxgUv4pFP', 'expires_in': 3599, 'token_type': 'bearer'}
4.598 AuthorizationResponse {
"access_token": "pBBGytVvMsmFW517lTivmc4kwD-b6wFSTju9Z0p75A8.6RQTcNrpfBM0NaSO4wo4TT9hJ0E5dLCJ9mEMwyhuGII",
"code": "0NHuh4TFFVYnrTQlR_dKvPQdK1LBegnEIEuqu5DaoVA.CFtDbF8ugawgZwLAUD2kp1uJxcKgMYlcpD4SDst4D0Q",
"expires_in": 3599,
"scope": "openid profile email address phone",
"state": "DSrHDfJbxgUv4pFP",
"token_type": "bearer"
}
4.598 phase <--<-- 4 --- AccessToken -->-->
4.598 --> request op_args: {'state': 'DSrHDfJbxgUv4pFP'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
4.598 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'DSrHDfJbxgUv4pFP', 'code': '0NHuh4TFFVYnrTQlR_dKvPQdK1LBegnEIEuqu5DaoVA.CFtDbF8ugawgZwLAUD2kp1uJxcKgMYlcpD4SDst4D0Q', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '7a203f41-fe72-4346-bb4d-78a722560135'}, 'state': 'DSrHDfJbxgUv4pFP'}
4.598 AccessTokenRequest {
"code": "0NHuh4TFFVYnrTQlR_dKvPQdK1LBegnEIEuqu5DaoVA.CFtDbF8ugawgZwLAUD2kp1uJxcKgMYlcpD4SDst4D0Q",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "DSrHDfJbxgUv4pFP"
}
4.598 request_url https://oidc-certification.ory.sh:8443/oauth2/token
4.598 request_http_args {'headers': {'Authorization': 'Basic N2EyMDNmNDEtZmU3Mi00MzQ2LWJiNGQtNzhhNzIyNTYwMTM1OllBTlBVbmU4NWs4Zg==', 'Content-Type': 'application/x-www-form-urlencoded'}}
4.598 request code=0NHuh4TFFVYnrTQlR_dKvPQdK1LBegnEIEuqu5DaoVA.CFtDbF8ugawgZwLAUD2kp1uJxcKgMYlcpD4SDst4D0Q&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=DSrHDfJbxgUv4pFP
4.816 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
4.817 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiTElZWi14MENQNXdxYmM0N2toSUtDUSIsImF1ZCI6WyI3YTIwM2Y0MS1mZTcyLTQzNDYtYmI0ZC03OGE3MjI1NjAxMzUiXSwiYXV0aF90aW1lIjoxNTI5NzUyMTgwLCJjX2hhc2giOiJaVURLMURHcU94aFFpQzFKWWtQUFNnIiwiZXhwIjoxNTI5NzU1ODQ4LCJpYXQiOjE1Mjk3NTIyNDgsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImEzYjJjZTdkLTk0MjQtNDFkMS05YTEyLThjMWVkZTZkNzE1MyIsIm5vbmNlIjoiVnlNMk5pMEFZWk45Wlh2QyIsInJhdCI6MTUyOTc1MjI0NCwic3ViIjoiZm9vQGJhci5jb20ifQ.nLC0L5FENwiLCriTV3atfRczrc2LF8_PzojBgtlm6t0A5ibHxX4BjYKSo92D1hWuvkfxPILAqsUvhh4k2VznvXD8U1TJr88taCZSZ0MXx8knd7dRNzO-GmwrPWr4EluPuKhZdSQCER4j5tjKym1hQggiYMAa1zMoOHtLFBRiDfPka-FO2uLve1ItcAlcEk-5sS2Zbr5Lh61DYZhaL9fTfv7VVARDlhuVMe5IeIgvZP9Er-ww75SYpjKx1eN5Qe_Kq7tOIqaUHnxDTI3xlNsySeVKY1HnIf2J2FmuKenoSbOJaN59d313LlDQdw12U_2eCJ_u2VYzQuGN5zu13gbQSD5nLHBGV1v-o4pdrs29eSv4Mt2ZR6ESh12ZV3SHRV_k5ddoigyKH2Vth4vAtzfJAEeQTU5386VMwsIW_7lgvpsgJKa75lrLXYuMQenCQGyDXRCoqf2CxNgW9twpY7uzCtvXvYOeDLt-TkEezDjDySCsBcqkF_x42wRk9W1_eJQRILjt2V4R8Mwz91urN-Aw8f2AEbNlckE7_T6sHOSwutTnJotLarWaRYWWmCZ4uBzrmh4WlW1yhIrdqdv5UfLZkxG7FWPZE_TfeA0qxL-abB5LWCT2p1S0Z5RFGr4TDVffSSTRwE7zN8C-vI35tHiopyB1BpX7BFFYnYTpsQZBPrA', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'TWvz7KOD6jjgDW8xOn8GU0xGNOhoagpPJ5zgCG6XpI8.5GGHNP8bjCL-Qm6GmFGymdryVXlE5yHjzXpfvKl0z7g', 'scope': 'openid profile email address phone'}
4.896 AccessTokenResponse {
"access_token": "TWvz7KOD6jjgDW8xOn8GU0xGNOhoagpPJ5zgCG6XpI8.5GGHNP8bjCL-Qm6GmFGymdryVXlE5yHjzXpfvKl0z7g",
"expires_in": 3599,
"id_token": {
"at_hash": "LIYZ-x0CP5wqbc47khIKCQ",
"aud": [
"7a203f41-fe72-4346-bb4d-78a722560135"
],
"auth_time": 1529752180,
"c_hash": "ZUDK1DGqOxhQiC1JYkPPSg",
"exp": 1529755848,
"iat": 1529752248,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "a3b2ce7d-9424-41d1-9a12-8c1ede6d7153",
"nonce": "VyM2Ni0AYZN9ZXvC",
"rat": 1529752244,
"sub": "[email protected]"
},
"scope": "openid profile email address phone",
"token_type": "bearer"
}
4.896 phase <--<-- 5 --- UserInfo -->-->
4.896 do_user_info_request kwargs:{'state': 'DSrHDfJbxgUv4pFP', 'method': 'GET', 'authn_method': 'bearer_header'}
4.897 request {'body': None}
4.897 request_url https://oidc-certification.ory.sh:8443/userinfo
4.897 request_http_args {'headers': {'Authorization': 'Bearer TWvz7KOD6jjgDW8xOn8GU0xGNOhoagpPJ5zgCG6XpI8.5GGHNP8bjCL-Qm6GmFGymdryVXlE5yHjzXpfvKl0z7g'}}
5.014 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
5.015 OpenIDSchema {
"sub": "[email protected]"
}
5.015 OpenIDSchema {
"sub": "[email protected]"
}
5.015 phase <--<-- 6 --- Done -->-->
5.015 end
5.016 assertion CheckHTTPResponse
5.016 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
5.016 assertion VerifyResponse
5.016 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
5.016 assertion VerifyScopes
5.017 condition verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username', 'email', 'email_verified', 'address', 'phone_number', 'phone_number_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
5.017 condition Done: status=OK
============================================================
Conditions
Check support: status=WARNING, message=No support for: scopes_supported=['profile', 'email', 'address', 'phone']
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username', 'email', 'email_verified', 'address', 'phone_number', 'phone_number_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
No support for: scopes_supported=['profile', 'email', 'address', 'phone']
The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username', 'email', 'email_verified', 'address', 'phone_number', 'phone_number_verified']
./OP-redirect_uri-Query-Added.txt 0000644 0000000 0000000 00000011136 13313425226 017013 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-Query-Added
Test description: Request with redirect_uri with query component when registered redirect_uri has no query component
Timestamp: 2018-06-23T11:10:14Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.074 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Registration -->-->
0.075 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.075 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#AW4aIvOzMRk7Kttx"
],
"response_types": [
"code token"
]
}
0.231 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.232 RegistrationResponse {
"client_id": "df6b1516-674e-45ee-bec9-bfe1191dcc79",
"client_secret": "j5LiuCwl-5lB",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "df6b1516-674e-45ee-bec9-bfe1191dcc79",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#AW4aIvOzMRk7Kttx"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.232 phase <--<-- 3 --- Note -->-->
============================================================
Conditions
============================================================
RESULT: PARTIAL RESULT
./OP-redirect_uri-Missing.txt 0000644 0000000 0000000 00000011323 13313425217 016316 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-Missing
Test description: Reject request without redirect_uri when multiple registered
Timestamp: 2018-06-23T11:10:07Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.082 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.083 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.083 phase <--<-- 2 --- Registration -->-->
0.083 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb', 'https://op.certification.openid.net:61353/cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.083 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb",
"https://op.certification.openid.net:61353/cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#msWrcQUIcj1Rtxpv"
],
"response_types": [
"code token"
]
}
0.29 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.291 RegistrationResponse {
"client_id": "2049baf9-fb14-4025-b7fd-518edaa7c290",
"client_secret": "DfWTu-QypP3h",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "2049baf9-fb14-4025-b7fd-518edaa7c290",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb",
"https://op.certification.openid.net:61353/cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#msWrcQUIcj1Rtxpv"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.291 phase <--<-- 3 --- Note -->-->
============================================================
Conditions
============================================================
RESULT: PARTIAL RESULT
./OP-redirect_uri-NotReg.txt 0000644 0000000 0000000 00000011060 13313425223 016076 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-NotReg
Test description: Sent redirect_uri does not match a registered redirect_uri
Timestamp: 2018-06-23T11:10:11Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.112 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.113 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.113 phase <--<-- 2 --- Registration -->-->
0.113 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.114 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#OJVLW8A01ZidfGzS"
],
"response_types": [
"code token"
]
}
0.27 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.271 RegistrationResponse {
"client_id": "158a15ea-9292-4580-a32a-58b9d15253fe",
"client_secret": "qQstNct7Xwcg",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "158a15ea-9292-4580-a32a-58b9d15253fe",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#OJVLW8A01ZidfGzS"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.271 phase <--<-- 3 --- Note -->-->
============================================================
Conditions
============================================================
RESULT: PARTIAL RESULT
./OP-Req-ui_locales.txt 0000644 0000000 0000000 00000015362 13313425503 015100 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-ui_locales
Test description: Providing ui_locales
Timestamp: 2018-06-23T11:13:07Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.172 phase <--<-- 1 --- Webfinger -->-->
1.172 not expected to do WebFinger
1.173 phase <--<-- 2 --- Discovery -->-->
1.173 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.281 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.282 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.282 phase <--<-- 3 --- Registration -->-->
1.282 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.283 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#ZiyG3laB9C82yvIz"
],
"response_types": [
"code token"
]
}
1.441 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.442 RegistrationResponse {
"client_id": "1fe9bfc7-0a2c-429e-a7ce-38a4e184a374",
"client_secret": "kiC7_Bfwj7vS",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "1fe9bfc7-0a2c-429e-a7ce-38a4e184a374",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#ZiyG3laB9C82yvIz"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.442 phase <--<-- 4 --- AsyncAuthn -->-->
1.442 AuthorizationRequest {
"client_id": "1fe9bfc7-0a2c-429e-a7ce-38a4e184a374",
"nonce": "nVN4luXlnJLH499Y",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "G75f6KjpDwmXp8CW",
"ui_locales": "se"
}
1.443 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?ui_locales=se&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=1fe9bfc7-0a2c-429e-a7ce-38a4e184a374&state=G75f6KjpDwmXp8CW&response_type=code+token&nonce=nVN4luXlnJLH499Y
1.443 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?ui_locales=se&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=1fe9bfc7-0a2c-429e-a7ce-38a4e184a374&state=G75f6KjpDwmXp8CW&response_type=code+token&nonce=nVN4luXlnJLH499Y
5.069 http args {}
5.231 response URL with fragment
5.231 response access_token=Nx2FLU_xiQOurSzS59ekeCMQrBYXUUDF2S1vVmxP7NQ.AYoypUuNHr4MORpNzVCdYQ0i0yRkjUOv3trHu5Dox1U&code=FqTxCnPcMohzGftTWO3tw-efLNDZjfhVPWNfOi_W1DI.8Ht4PZgoK6JIUZm4IpnnRW3i9av8spBxoOUxmKjRTx8&expires_in=3599&scope=openid&state=G75f6KjpDwmXp8CW&token_type=bearer
5.232 response {'scope': 'openid', 'code': 'FqTxCnPcMohzGftTWO3tw-efLNDZjfhVPWNfOi_W1DI.8Ht4PZgoK6JIUZm4IpnnRW3i9av8spBxoOUxmKjRTx8', 'access_token': 'Nx2FLU_xiQOurSzS59ekeCMQrBYXUUDF2S1vVmxP7NQ.AYoypUuNHr4MORpNzVCdYQ0i0yRkjUOv3trHu5Dox1U', 'state': 'G75f6KjpDwmXp8CW', 'expires_in': 3599, 'token_type': 'bearer'}
5.232 AuthorizationResponse {
"access_token": "Nx2FLU_xiQOurSzS59ekeCMQrBYXUUDF2S1vVmxP7NQ.AYoypUuNHr4MORpNzVCdYQ0i0yRkjUOv3trHu5Dox1U",
"code": "FqTxCnPcMohzGftTWO3tw-efLNDZjfhVPWNfOi_W1DI.8Ht4PZgoK6JIUZm4IpnnRW3i9av8spBxoOUxmKjRTx8",
"expires_in": 3599,
"scope": "openid",
"state": "G75f6KjpDwmXp8CW",
"token_type": "bearer"
}
5.232 phase <--<-- 5 --- Done -->-->
5.232 end
5.233 assertion VerifyAuthnResponse
5.233 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
5.233 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-prompt-login.txt 0000644 0000000 0000000 00000037412 13313425167 014671 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-prompt-login
Test description: Request with prompt=login
Timestamp: 2018-06-23T11:09:43Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.074 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Registration -->-->
0.075 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.076 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#apXOC3OsrsDK4AdK"
],
"response_types": [
"code token"
]
}
0.265 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.266 RegistrationResponse {
"client_id": "46129dfb-46de-4ce5-b4b3-2fc9bb0d277a",
"client_secret": "XvyjqE-MZ1vS",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "46129dfb-46de-4ce5-b4b3-2fc9bb0d277a",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#apXOC3OsrsDK4AdK"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.266 phase <--<-- 3 --- AsyncAuthn -->-->
0.267 AuthorizationRequest {
"client_id": "46129dfb-46de-4ce5-b4b3-2fc9bb0d277a",
"nonce": "iOLag6g7ApsPGGIC",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "OxJonVCISKJ4sXea"
}
0.267 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=46129dfb-46de-4ce5-b4b3-2fc9bb0d277a&state=OxJonVCISKJ4sXea&response_type=code+token&nonce=iOLag6g7ApsPGGIC
0.267 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=46129dfb-46de-4ce5-b4b3-2fc9bb0d277a&state=OxJonVCISKJ4sXea&response_type=code+token&nonce=iOLag6g7ApsPGGIC
3.102 http args {}
3.267 response URL with fragment
3.267 response access_token=TgJaoA1C4IMLuilHPMxJyY010vTUhsI42YVJD0RcK4c.SNBvg6Jh7g-0LYSRetKDiv9nM5eI7ygEJAt1q6FnwVI&code=hyQrdNXgUqzRupJeArU1QnhlbRvHze82lU1unLgt-f4.0cSlW7ILAfGe1SPHroXbMDjOPngPA3ZZ4QU5EUwqn4s&expires_in=3599&scope=openid&state=OxJonVCISKJ4sXea&token_type=bearer
3.267 response {'scope': 'openid', 'code': 'hyQrdNXgUqzRupJeArU1QnhlbRvHze82lU1unLgt-f4.0cSlW7ILAfGe1SPHroXbMDjOPngPA3ZZ4QU5EUwqn4s', 'access_token': 'TgJaoA1C4IMLuilHPMxJyY010vTUhsI42YVJD0RcK4c.SNBvg6Jh7g-0LYSRetKDiv9nM5eI7ygEJAt1q6FnwVI', 'state': 'OxJonVCISKJ4sXea', 'expires_in': 3599, 'token_type': 'bearer'}
3.268 AuthorizationResponse {
"access_token": "TgJaoA1C4IMLuilHPMxJyY010vTUhsI42YVJD0RcK4c.SNBvg6Jh7g-0LYSRetKDiv9nM5eI7ygEJAt1q6FnwVI",
"code": "hyQrdNXgUqzRupJeArU1QnhlbRvHze82lU1unLgt-f4.0cSlW7ILAfGe1SPHroXbMDjOPngPA3ZZ4QU5EUwqn4s",
"expires_in": 3599,
"scope": "openid",
"state": "OxJonVCISKJ4sXea",
"token_type": "bearer"
}
3.268 phase <--<-- 4 --- AccessToken -->-->
3.268 --> request op_args: {'state': 'OxJonVCISKJ4sXea'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.268 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'OxJonVCISKJ4sXea', 'code': 'hyQrdNXgUqzRupJeArU1QnhlbRvHze82lU1unLgt-f4.0cSlW7ILAfGe1SPHroXbMDjOPngPA3ZZ4QU5EUwqn4s', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '46129dfb-46de-4ce5-b4b3-2fc9bb0d277a'}, 'state': 'OxJonVCISKJ4sXea'}
3.269 AccessTokenRequest {
"code": "hyQrdNXgUqzRupJeArU1QnhlbRvHze82lU1unLgt-f4.0cSlW7ILAfGe1SPHroXbMDjOPngPA3ZZ4QU5EUwqn4s",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "OxJonVCISKJ4sXea"
}
3.269 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.269 request_http_args {'headers': {'Authorization': 'Basic NDYxMjlkZmItNDZkZS00Y2U1LWI0YjMtMmZjOWJiMGQyNzdhOlh2eWpxRS1NWjF2Uw==', 'Content-Type': 'application/x-www-form-urlencoded'}}
3.269 request code=hyQrdNXgUqzRupJeArU1QnhlbRvHze82lU1unLgt-f4.0cSlW7ILAfGe1SPHroXbMDjOPngPA3ZZ4QU5EUwqn4s&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=OxJonVCISKJ4sXea
3.493 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.494 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiQll0Nmgtampub25NNnVxbkFUSHpXZyIsImF1ZCI6WyI0NjEyOWRmYi00NmRlLTRjZTUtYjRiMy0yZmM5YmIwZDI3N2EiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiJGYXU1SC1nQUZ0SGxRREpFOU9SRERBIiwiZXhwIjoxNTI5NzU1Nzc1LCJpYXQiOjE1Mjk3NTIxNzYsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjY1ZDMwNWY5LTgzYjEtNDBhNi1hMzUwLTViYWQyMzA2ZGUyNCIsIm5vbmNlIjoiaU9MYWc2ZzdBcHNQR0dJQyIsInJhdCI6MTUyOTc1MjE3Mywic3ViIjoiZm9vQGJhci5jb20ifQ.iHYA-WUzduyd2acTVNm6-7SYyM0jLRFtC7vg1EwnqxpOkXjBBNk_2ufC6ApJgpG76Rwr_oCSyCTLwM7zc8DftlrsX33OK3-VQymY7yKu3woxRMK3fKhIIo9w41H28Ww1BPRDORb0WQeagHtD9x_cAkrRNTRr9DbFPyk4BO2IEmlLt6gF-aUDctuh8Lu5iab_Lwv9ShSmg1z4WHrgkFwaankPpGwrSCh_kH5v9JsQoM6rSpzj3qUpSs4VZVbBmCtjX7jh1ptIgGbzqRkgtd8tqu4v1jHp2Ca6MLs0hjfGLgyRx_NXgCOvWPAu3jwqlRhrcWVFztpjH-OhD9PBWqc5ayDFEK6_E95J3DsrqhlZBLaZPS1cetF0twpwV_ixFta4GYAnoxRgRQpf4LE9-0d2D7Jn_nLxzBFVUUsbhYwVPT0zEsPgz2tP_BZPZYEh_c282aXhbQxv-eNLVCeTWhpNqak6V6Z5kPnAh6hJk88dN1HapAY7nQb5xerlCKVVZVj4v6BTNG_bsXsNxRbBvRgtgRba0wKeaW-HoKg_vJAg8n7L1cxVqf_p24kKZl4z9P4JotwO2nUtRvyphz1mc_QoxXN477qPcY-fsCaNu_bS_aXfZE-YtAQMqRSy5LY6UmQ4tqNNUYIbQzW9J3p1zV5r0xqY-QiI8_RpQ6ehNqZcUh4', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'zuI4-to027AyzbpRYXE94xcvjIaNgROr9NnyqdVQrZk.qY06G82A45RCtVIEOMta15weQOrP_yHaNtK2impXru4', 'scope': 'openid'}
3.578 AccessTokenResponse {
"access_token": "zuI4-to027AyzbpRYXE94xcvjIaNgROr9NnyqdVQrZk.qY06G82A45RCtVIEOMta15weQOrP_yHaNtK2impXru4",
"expires_in": 3599,
"id_token": {
"at_hash": "BYt6h-jjnonM6uqnATHzWg",
"aud": [
"46129dfb-46de-4ce5-b4b3-2fc9bb0d277a"
],
"auth_time": 1529751824,
"c_hash": "Fau5H-gAFtHlQDJE9ORDDA",
"exp": 1529755775,
"iat": 1529752176,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "65d305f9-83b1-40a6-a350-5bad2306de24",
"nonce": "iOLag6g7ApsPGGIC",
"rat": 1529752173,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.578 phase <--<-- 5 --- Note -->-->
5.202 phase <--<-- 6 --- AsyncAuthn -->-->
5.203 AuthorizationRequest {
"client_id": "46129dfb-46de-4ce5-b4b3-2fc9bb0d277a",
"nonce": "m9WEakyAVyeDBYe2",
"prompt": [
"login"
],
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "erD64EP0yuZD53Mr"
}
5.203 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=login&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=46129dfb-46de-4ce5-b4b3-2fc9bb0d277a&state=erD64EP0yuZD53Mr&response_type=code+token&nonce=m9WEakyAVyeDBYe2
5.203 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=login&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=46129dfb-46de-4ce5-b4b3-2fc9bb0d277a&state=erD64EP0yuZD53Mr&response_type=code+token&nonce=m9WEakyAVyeDBYe2
10.247 http args {}
10.412 response URL with fragment
10.412 response access_token=u1MSz7I4ZGlyzo6b8QM7GJBa5eZlB1DC1N86xSL2Sk4.ZxnXCbq_Oo0MvUmeMilHE-kJNAvlFijYR_awdq47Ciw&code=K-JATHbuFAeRJyqSuZJtwkUwsmi05mvCuzVwQUdfUGU.Bl2Ts0YiPZeuPwuLQarNbnilJzLpFDanDPYeBhyrgEo&expires_in=3599&scope=openid&state=erD64EP0yuZD53Mr&token_type=bearer
10.413 response {'scope': 'openid', 'code': 'K-JATHbuFAeRJyqSuZJtwkUwsmi05mvCuzVwQUdfUGU.Bl2Ts0YiPZeuPwuLQarNbnilJzLpFDanDPYeBhyrgEo', 'access_token': 'u1MSz7I4ZGlyzo6b8QM7GJBa5eZlB1DC1N86xSL2Sk4.ZxnXCbq_Oo0MvUmeMilHE-kJNAvlFijYR_awdq47Ciw', 'state': 'erD64EP0yuZD53Mr', 'expires_in': 3599, 'token_type': 'bearer'}
10.413 AuthorizationResponse {
"access_token": "u1MSz7I4ZGlyzo6b8QM7GJBa5eZlB1DC1N86xSL2Sk4.ZxnXCbq_Oo0MvUmeMilHE-kJNAvlFijYR_awdq47Ciw",
"code": "K-JATHbuFAeRJyqSuZJtwkUwsmi05mvCuzVwQUdfUGU.Bl2Ts0YiPZeuPwuLQarNbnilJzLpFDanDPYeBhyrgEo",
"expires_in": 3599,
"scope": "openid",
"state": "erD64EP0yuZD53Mr",
"token_type": "bearer"
}
10.413 phase <--<-- 7 --- AccessToken -->-->
10.414 --> request op_args: {'state': 'erD64EP0yuZD53Mr'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
10.414 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'erD64EP0yuZD53Mr', 'code': 'K-JATHbuFAeRJyqSuZJtwkUwsmi05mvCuzVwQUdfUGU.Bl2Ts0YiPZeuPwuLQarNbnilJzLpFDanDPYeBhyrgEo', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '46129dfb-46de-4ce5-b4b3-2fc9bb0d277a'}, 'state': 'erD64EP0yuZD53Mr'}
10.414 AccessTokenRequest {
"code": "K-JATHbuFAeRJyqSuZJtwkUwsmi05mvCuzVwQUdfUGU.Bl2Ts0YiPZeuPwuLQarNbnilJzLpFDanDPYeBhyrgEo",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "erD64EP0yuZD53Mr"
}
10.414 request_url https://oidc-certification.ory.sh:8443/oauth2/token
10.414 request_http_args {'headers': {'Authorization': 'Basic NDYxMjlkZmItNDZkZS00Y2U1LWI0YjMtMmZjOWJiMGQyNzdhOlh2eWpxRS1NWjF2Uw==', 'Content-Type': 'application/x-www-form-urlencoded'}}
10.414 request code=K-JATHbuFAeRJyqSuZJtwkUwsmi05mvCuzVwQUdfUGU.Bl2Ts0YiPZeuPwuLQarNbnilJzLpFDanDPYeBhyrgEo&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=erD64EP0yuZD53Mr
10.629 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
10.631 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoieG1UMlNIZ0d0MDlzNm14ZnVSckhnUSIsImF1ZCI6WyI0NjEyOWRmYi00NmRlLTRjZTUtYjRiMy0yZmM5YmIwZDI3N2EiXSwiYXV0aF90aW1lIjoxNTI5NzUyMTgwLCJjX2hhc2giOiJ0VTJBbDFvZlRFbWoxcWhqcjlHZU93IiwiZXhwIjoxNTI5NzU1NzgyLCJpYXQiOjE1Mjk3NTIxODMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImJmOGQ1ZWJhLWRkZWQtNDhiMi1iNWMzLWQ1MjkxYmY2OTFlMyIsIm5vbmNlIjoibTlXRWFreUFWeWVEQlllMiIsInJhdCI6MTUyOTc1MjE3OCwic3ViIjoiZm9vQGJhci5jb20ifQ.oszdUgDh87_vssed3cxeMyY1MI1INzaM2m096WeRtGduR4kRWR48M8Le1WEbRNebs4zPwXc_AK5Z6Ptc-_aeJSsveSBaKiREW3l_eY0ids4LnCyY4hgn-wSxYI61uki25fbXBIUtzudCbF8E2iQGYMNaNtIENflhfggj8laceOhti3zvqIzGzYJ4e7ZpSTAFcra0JKiy-7e3Xj_k7emPCZRgknApZNvdSqh2Su9ZATWlP6Kw_nhj9Jq_f6cZYPxE-kZJq7B2kkt2aE8w3lGKdIPckyIkT5qxvdGTsxcQTgce62Auwo9HZCT857_OMYhzlgpUlKNJmptwkbKpcTKHXzUtOhoJLS76z4Ojaxcjl64OreUz3UD0pno7klClsB6s-N__lpJWl8ppRktf7vnbXXMCmKERCad0nrVMLfQ2uP-ILczUHDaMXx_xqli0fFLHtbOhsa8VrkTnOxHRMnBTKt8X4Ahxn6AYtBY602ifUsBz0GewZRUTI2f6oQVUBwGem_CckXt_aX0NrOa9wT8N8bp_A0jsd4NRAfmtIQiikHG6pZc1swC8S_xkansH3ZPLPKLtu41hEbFc_AcmcS0Axu3GIrHPeCS6VAOzsW222jd-zSvbRQk1IDMURpf5mn9883d0ZKIUCWg36Ru5wDlS942R5G-K9aBroph-kXdHiiY', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'qnjfvcCk1AN2abJCo01DuPgOH2kcOg64zB1fMH-yiPk.73vJqGoDhRwDnoCyvU5aaHHkAj-g1THxNv8O5QsIANE', 'scope': 'openid'}
10.634 AccessTokenResponse {
"access_token": "qnjfvcCk1AN2abJCo01DuPgOH2kcOg64zB1fMH-yiPk.73vJqGoDhRwDnoCyvU5aaHHkAj-g1THxNv8O5QsIANE",
"expires_in": 3599,
"id_token": {
"at_hash": "xmT2SHgGt09s6mxfuRrHgQ",
"aud": [
"46129dfb-46de-4ce5-b4b3-2fc9bb0d277a"
],
"auth_time": 1529752180,
"c_hash": "tU2Al1ofTEmj1qhjr9GeOw",
"exp": 1529755782,
"iat": 1529752183,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "bf8d5eba-dded-48b2-b5c3-d5291bf691e3",
"nonce": "m9WEakyAVyeDBYe2",
"rat": 1529752178,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
10.634 phase <--<-- 8 --- Done -->-->
10.634 end
10.635 assertion VerifyResponse
10.635 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
10.635 assertion MultipleSignOn
10.635 condition multiple-sign-on: status=OK [Verifies that multiple authentications was used in the flow]
10.635 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
multiple-sign-on: status=OK [Verifies that multiple authentications was used in the flow]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Response-Missing.txt 0000644 0000000 0000000 00000015216 13313424653 015444 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Response-Missing
Test description: Authorization request missing the response_type parameter
Timestamp: 2018-06-23T11:06:19Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.107 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.109 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.109 phase <--<-- 2 --- Registration -->-->
0.109 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.109 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#X0erYuCC0lTVuc7W"
],
"response_types": [
"code token"
]
}
0.308 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.309 RegistrationResponse {
"client_id": "39b5cf0b-fb7e-4238-af4d-8bf9a3d2416d",
"client_secret": "sq-nhSsiezmI",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "39b5cf0b-fb7e-4238-af4d-8bf9a3d2416d",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#X0erYuCC0lTVuc7W"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.309 phase <--<-- 3 --- Note -->-->
1.416 phase <--<-- 4 --- AsyncAuthn -->-->
1.417 AuthorizationRequest {
"client_id": "39b5cf0b-fb7e-4238-af4d-8bf9a3d2416d",
"nonce": "Sz8ZDZUIzi1tAxky",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"scope": "openid",
"state": "IVvvvIQUfM7XRzuO"
}
1.417 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?state=IVvvvIQUfM7XRzuO&scope=openid&nonce=Sz8ZDZUIzi1tAxky&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=39b5cf0b-fb7e-4238-af4d-8bf9a3d2416d
1.417 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?state=IVvvvIQUfM7XRzuO&scope=openid&nonce=Sz8ZDZUIzi1tAxky&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=39b5cf0b-fb7e-4238-af4d-8bf9a3d2416d
2.137 response Response URL with query part
2.137 response {'error_debug': 'The request is missing the response_type parameter', 'error_description': 'The authorization server does not support obtaining a token using this method', 'state': '', 'error': 'unsupported_response_type'}
2.138 response {'error_debug': 'The request is missing the response_type parameter', 'error_description': 'The authorization server does not support obtaining a token using this method', 'error': 'unsupported_response_type'}
2.138 AuthorizationErrorResponse {
"error": "unsupported_response_type",
"error_debug": "The request is missing the response_type parameter",
"error_description": "The authorization server does not support obtaining a token using this method"
}
2.138 AuthorizationErrorResponse {
"error": "unsupported_response_type",
"error_debug": "The request is missing the response_type parameter",
"error_description": "The authorization server does not support obtaining a token using this method"
}
2.138 phase <--<-- 5 --- Done -->-->
2.138 end
2.138 assertion VerifyErrorMessage
2.138 condition verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
2.138 condition Done: status=OK
============================================================
Conditions
verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-UserInfo-Endpoint.txt 0000644 0000000 0000000 00000025404 13313425046 015544 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-UserInfo-Endpoint
Test description: UserInfo Endpoint access with GET and bearer header
Timestamp: 2018-06-23T11:08:22Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.001 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.072 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Registration -->-->
0.074 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.074 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#od6lD4Nmrk9NA8kF"
],
"response_types": [
"code token"
]
}
0.236 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.237 RegistrationResponse {
"client_id": "7f30c015-dd3c-4d1d-aef2-c5aa326774bc",
"client_secret": "_MmS~MUZKAsx",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "7f30c015-dd3c-4d1d-aef2-c5aa326774bc",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#od6lD4Nmrk9NA8kF"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.237 phase <--<-- 3 --- AsyncAuthn -->-->
0.238 AuthorizationRequest {
"client_id": "7f30c015-dd3c-4d1d-aef2-c5aa326774bc",
"nonce": "pYgmVPqw8hx7T5sE",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "iozT608I9ClYnIFy"
}
0.238 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=7f30c015-dd3c-4d1d-aef2-c5aa326774bc&state=iozT608I9ClYnIFy&response_type=code+token&nonce=pYgmVPqw8hx7T5sE
0.238 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=7f30c015-dd3c-4d1d-aef2-c5aa326774bc&state=iozT608I9ClYnIFy&response_type=code+token&nonce=pYgmVPqw8hx7T5sE
16.637 http args {}
16.821 response URL with fragment
16.822 response access_token=NjYrjNrD02y_S8_zm2JTvC47gWocx9OzBJ192HxKkaA.9cy7fuwUnUJTCkSeOg49HjQhUB_lIHDJWJ9QGDWB39E&code=jM9YojMf7VYjmpyWbQvE6j60isgbZ8v8BXkGAvEjhv0.xt4VAB4QQtOKhMdvvX1mNbvXOUMkp15pjC3uSPX9ZB8&expires_in=3599&scope=openid&state=iozT608I9ClYnIFy&token_type=bearer
16.822 response {'scope': 'openid', 'code': 'jM9YojMf7VYjmpyWbQvE6j60isgbZ8v8BXkGAvEjhv0.xt4VAB4QQtOKhMdvvX1mNbvXOUMkp15pjC3uSPX9ZB8', 'access_token': 'NjYrjNrD02y_S8_zm2JTvC47gWocx9OzBJ192HxKkaA.9cy7fuwUnUJTCkSeOg49HjQhUB_lIHDJWJ9QGDWB39E', 'state': 'iozT608I9ClYnIFy', 'expires_in': 3599, 'token_type': 'bearer'}
16.822 AuthorizationResponse {
"access_token": "NjYrjNrD02y_S8_zm2JTvC47gWocx9OzBJ192HxKkaA.9cy7fuwUnUJTCkSeOg49HjQhUB_lIHDJWJ9QGDWB39E",
"code": "jM9YojMf7VYjmpyWbQvE6j60isgbZ8v8BXkGAvEjhv0.xt4VAB4QQtOKhMdvvX1mNbvXOUMkp15pjC3uSPX9ZB8",
"expires_in": 3599,
"scope": "openid",
"state": "iozT608I9ClYnIFy",
"token_type": "bearer"
}
16.823 phase <--<-- 4 --- AccessToken -->-->
16.823 --> request op_args: {'state': 'iozT608I9ClYnIFy'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
16.823 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'iozT608I9ClYnIFy', 'code': 'jM9YojMf7VYjmpyWbQvE6j60isgbZ8v8BXkGAvEjhv0.xt4VAB4QQtOKhMdvvX1mNbvXOUMkp15pjC3uSPX9ZB8', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '7f30c015-dd3c-4d1d-aef2-c5aa326774bc'}, 'state': 'iozT608I9ClYnIFy'}
16.823 AccessTokenRequest {
"code": "jM9YojMf7VYjmpyWbQvE6j60isgbZ8v8BXkGAvEjhv0.xt4VAB4QQtOKhMdvvX1mNbvXOUMkp15pjC3uSPX9ZB8",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "iozT608I9ClYnIFy"
}
16.823 request_url https://oidc-certification.ory.sh:8443/oauth2/token
16.823 request_http_args {'headers': {'Authorization': 'Basic N2YzMGMwMTUtZGQzYy00ZDFkLWFlZjItYzVhYTMyNjc3NGJjOl9NbVMlN0VNVVpLQXN4', 'Content-Type': 'application/x-www-form-urlencoded'}}
16.823 request code=jM9YojMf7VYjmpyWbQvE6j60isgbZ8v8BXkGAvEjhv0.xt4VAB4QQtOKhMdvvX1mNbvXOUMkp15pjC3uSPX9ZB8&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=iozT608I9ClYnIFy
17.055 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
17.056 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiMU1saXpKNWRGTWtpMUFYYkRtbnBOUSIsImF1ZCI6WyI3ZjMwYzAxNS1kZDNjLTRkMWQtYWVmMi1jNWFhMzI2Nzc0YmMiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiJ0VXp4ck1EdzBFMlh5eERqa0NnNGJBIiwiZXhwIjoxNTI5NzU1NzAxLCJpYXQiOjE1Mjk3NTIxMDIsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjQ5YTYwMzdlLTIyMTAtNGYxZS1hMWRiLTIwZDIxOWQwYTk4YyIsIm5vbmNlIjoicFlnbVZQcXc4aHg3VDVzRSIsInJhdCI6MTUyOTc1MjA4NSwic3ViIjoiZm9vQGJhci5jb20ifQ.F2mylAksfo7Z444TIha2MpAagLXR0i0nRYAGxoqxQoCjkrDL84c2MsGuuoMNwA9-pArsVRxtEGTNkdQVmxXDf0bNJNCr7wV9GetYR02lJN899wrBWzJK7Ug61V8G7yMkJpWf-PG-5aKLKCbNoEYQxJBHoBRdIl4xe2-LqTJYNgg5ZeFe9v7RdqJ54rfiovdRsySviFkY1sG9IF6L_YeHNq0liwBgOvfcdFSGjHBEt8skLJPhSVnO-RT1nhlx3TElq4VUzeh86K2kut-2LMM1L5zV9HjW5TV0g1ZfAWRfyc5QGgrIXI4gHAVltSDkQblafBir2RCDT-Vms4M60bb9gC-QT4fvIytir8QIWkfRjsxkQTluKuoNxZRXjD366mtPWN9p-TqRVydMw1Y2kVUXbE1pGuta7IubZ9aYyuEedSZ7L3BCQtosZnBdSuWJLTFyxAG1iY7mIsLUEMf3SYErBVBPT8CarrPwqaoxZg4pP6Lu8gowlgRy_AUOgpl6spmxja4bPz7kP0QNP_a0aeYJKSAG78KUZEx0AOgDv5Z4036CcuWmSTberk6xZuXSB8AA8cAj9J9mpP_sAh05WF25e-H7uDEpJFwUOdOBFHWc7aasE7CXJ8UddfREj2aGsOnJTo-ulaSCgUbO9eMP5EnuY56gvmX_qht5QMsNN5j9lRw', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'YWIoU6LUh1G6XM41rgEYWKEcTPUfUhga28w9SLwf9hk.3La9YDd83S2x-ZI9-GYdsbhsDH16xCgxm7OCgwDfBgo', 'scope': 'openid'}
17.172 AccessTokenResponse {
"access_token": "YWIoU6LUh1G6XM41rgEYWKEcTPUfUhga28w9SLwf9hk.3La9YDd83S2x-ZI9-GYdsbhsDH16xCgxm7OCgwDfBgo",
"expires_in": 3599,
"id_token": {
"at_hash": "1MlizJ5dFMki1AXbDmnpNQ",
"aud": [
"7f30c015-dd3c-4d1d-aef2-c5aa326774bc"
],
"auth_time": 1529751824,
"c_hash": "tUzxrMDw0E2XyxDjkCg4bA",
"exp": 1529755701,
"iat": 1529752102,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "49a6037e-2210-4f1e-a1db-20d219d0a98c",
"nonce": "pYgmVPqw8hx7T5sE",
"rat": 1529752085,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
17.172 phase <--<-- 5 --- UserInfo -->-->
17.172 do_user_info_request kwargs:{'state': 'iozT608I9ClYnIFy', 'method': 'GET', 'authn_method': 'bearer_header'}
17.173 request {'body': None}
17.173 request_url https://oidc-certification.ory.sh:8443/userinfo
17.173 request_http_args {'headers': {'Authorization': 'Bearer YWIoU6LUh1G6XM41rgEYWKEcTPUfUhga28w9SLwf9hk.3La9YDd83S2x-ZI9-GYdsbhsDH16xCgxm7OCgwDfBgo'}}
17.257 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
17.258 OpenIDSchema {
"sub": "[email protected]"
}
17.258 OpenIDSchema {
"sub": "[email protected]"
}
17.258 phase <--<-- 6 --- Done -->-->
17.258 end
17.259 assertion VerifyResponse
17.259 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
17.259 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Req-id_token_hint.txt 0000644 0000000 0000000 00000046617 13313425352 015610 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-id_token_hint
Test description: Using prompt=none with user hint through id_token_hint
Timestamp: 2018-06-23T11:11:38Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.098 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.099 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.099 phase <--<-- 2 --- Registration -->-->
0.099 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.1 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#FlQBfwSfBjr9sS7g"
],
"response_types": [
"code token"
]
}
0.26 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.261 RegistrationResponse {
"client_id": "0548df7e-a572-4d22-82c5-7956e17eeedb",
"client_secret": "zsol7Hd13k6S",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "0548df7e-a572-4d22-82c5-7956e17eeedb",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#FlQBfwSfBjr9sS7g"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.261 phase <--<-- 3 --- AsyncAuthn -->-->
0.262 AuthorizationRequest {
"client_id": "0548df7e-a572-4d22-82c5-7956e17eeedb",
"nonce": "gKKOrMFOjNYMEWew",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "DphsZnehedOLT5Oq"
}
0.262 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=0548df7e-a572-4d22-82c5-7956e17eeedb&state=DphsZnehedOLT5Oq&response_type=code+token&nonce=gKKOrMFOjNYMEWew
0.262 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=0548df7e-a572-4d22-82c5-7956e17eeedb&state=DphsZnehedOLT5Oq&response_type=code+token&nonce=gKKOrMFOjNYMEWew
3.191 http args {}
3.352 response URL with fragment
3.353 response access_token=m6jX7_4Up8yZLxb7Z8zcQGA6zb7oCTJ8nJqdOLKSf2A.0baIwCM1Bybj0N9NlUiBF696INJzGu2_hPfpQZZQt4w&code=9B4TIyDOncM1Q3a64_RuFKdk0eJLCQbYzGzRtQtehMU.JaEwuZcARP_mM09wqNJLR3q4IABYjhHmf2V0VJnbjHE&expires_in=3599&scope=openid&state=DphsZnehedOLT5Oq&token_type=bearer
3.353 response {'scope': 'openid', 'code': '9B4TIyDOncM1Q3a64_RuFKdk0eJLCQbYzGzRtQtehMU.JaEwuZcARP_mM09wqNJLR3q4IABYjhHmf2V0VJnbjHE', 'access_token': 'm6jX7_4Up8yZLxb7Z8zcQGA6zb7oCTJ8nJqdOLKSf2A.0baIwCM1Bybj0N9NlUiBF696INJzGu2_hPfpQZZQt4w', 'state': 'DphsZnehedOLT5Oq', 'expires_in': 3599, 'token_type': 'bearer'}
3.354 AuthorizationResponse {
"access_token": "m6jX7_4Up8yZLxb7Z8zcQGA6zb7oCTJ8nJqdOLKSf2A.0baIwCM1Bybj0N9NlUiBF696INJzGu2_hPfpQZZQt4w",
"code": "9B4TIyDOncM1Q3a64_RuFKdk0eJLCQbYzGzRtQtehMU.JaEwuZcARP_mM09wqNJLR3q4IABYjhHmf2V0VJnbjHE",
"expires_in": 3599,
"scope": "openid",
"state": "DphsZnehedOLT5Oq",
"token_type": "bearer"
}
3.354 phase <--<-- 4 --- AccessToken -->-->
3.354 --> request op_args: {'state': 'DphsZnehedOLT5Oq'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.354 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'DphsZnehedOLT5Oq', 'code': '9B4TIyDOncM1Q3a64_RuFKdk0eJLCQbYzGzRtQtehMU.JaEwuZcARP_mM09wqNJLR3q4IABYjhHmf2V0VJnbjHE', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '0548df7e-a572-4d22-82c5-7956e17eeedb'}, 'state': 'DphsZnehedOLT5Oq'}
3.354 AccessTokenRequest {
"code": "9B4TIyDOncM1Q3a64_RuFKdk0eJLCQbYzGzRtQtehMU.JaEwuZcARP_mM09wqNJLR3q4IABYjhHmf2V0VJnbjHE",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "DphsZnehedOLT5Oq"
}
3.354 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.354 request_http_args {'headers': {'Authorization': 'Basic MDU0OGRmN2UtYTU3Mi00ZDIyLTgyYzUtNzk1NmUxN2VlZWRiOnpzb2w3SGQxM2s2Uw==', 'Content-Type': 'application/x-www-form-urlencoded'}}
3.354 request code=9B4TIyDOncM1Q3a64_RuFKdk0eJLCQbYzGzRtQtehMU.JaEwuZcARP_mM09wqNJLR3q4IABYjhHmf2V0VJnbjHE&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=DphsZnehedOLT5Oq
3.566 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.567 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiUWMyNjRuTG40cVpwbjZZSjlsT2Z1USIsImF1ZCI6WyIwNTQ4ZGY3ZS1hNTcyLTRkMjItODJjNS03OTU2ZTE3ZWVlZGIiXSwiYXV0aF90aW1lIjoxNTI5NzUyMTgwLCJjX2hhc2giOiJyTF93Z0Y2aE45Y3BEOW04NUh3eHV3IiwiZXhwIjoxNTI5NzU1ODk2LCJpYXQiOjE1Mjk3NTIyOTcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6Ijc0ZDZlZTNhLTc1MTAtNGMyYS1iNGMwLTQ5ZGUyY2ZlNmFlNiIsIm5vbmNlIjoiZ0tLT3JNRk9qTllNRVdldyIsInJhdCI6MTUyOTc1MjI5NCwic3ViIjoiZm9vQGJhci5jb20ifQ.VdoM4L96Xew8hIdSbF5hfhKa7v8rIipSVov47aXJFUFtfxd1wvsj5S09374gHGNI4fopelWzDT2b0qX2bZQ6b8wlL2ihxUWaflJU00d2nPVO3P7gshtFMHrN7QPW4EGGe08YnqI6B8O0rT2CVfYF2UVcW9PlLTlrFMmjrPyhoDAJNK5Ow7vEZm-5J7G8Ho_Bua_tuUaBNV0R8Ohda8d9BT_in7CZ_JrsB7YbTOAwy2IRavHTyjmanezfHYdNI63B-SnG32KVb_gbERNYwIM-GY9JQoQOnjbzc4O71kSnQ14v6wMdg7moqIFsZiiJBCWN_ukug5UZxI0V0hq_FcUxenf_kBoIGWUIZh2AiX8u34A9m4rEpMfU56HYy2J7U-tmXRxKW_3GcAEFF7jPr_qabudhIm3uRwh97vyoFneEz1QxQGtimg1j12PU51vO_dpt2tGNDG1QRRveqUUiYuBCrzRGgQPvPozUfl-Ot6t2XdhxStAPmlyY-aoLEONekUOeMpBwS6giyGki0otVWIfPhJDmF2Qgef8_69NiuwDivg03eSxU6-qHCYOs0L7wLE_9Sg96fCBR0H9JzbnUNobM6qj_YvQFCccRXkKni9bbDfp-vGRlnC7jEx-Fb0QyvYOHZaTmph4MwPMcjBM3Ayt2uwI6xF6g_IAe0mLwFiB_5qw', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'xQqvFSCxuceHYVAw1EUHocqcTbMhbe5BSf2P-adM7P8.t5GChD6tSkVuPZ03K7ZqqDz2rM71LnaqFSqtYQKOOaQ', 'scope': 'openid'}
3.647 AccessTokenResponse {
"access_token": "xQqvFSCxuceHYVAw1EUHocqcTbMhbe5BSf2P-adM7P8.t5GChD6tSkVuPZ03K7ZqqDz2rM71LnaqFSqtYQKOOaQ",
"expires_in": 3599,
"id_token": {
"at_hash": "Qc264nLn4qZpn6YJ9lOfuQ",
"aud": [
"0548df7e-a572-4d22-82c5-7956e17eeedb"
],
"auth_time": 1529752180,
"c_hash": "rL_wgF6hN9cpD9m85Hwxuw",
"exp": 1529755896,
"iat": 1529752297,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "74d6ee3a-7510-4c2a-b4c0-49de2cfe6ae6",
"nonce": "gKKOrMFOjNYMEWew",
"rat": 1529752294,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.647 phase <--<-- 5 --- AsyncAuthn -->-->
3.648 AuthorizationRequest {
"client_id": "0548df7e-a572-4d22-82c5-7956e17eeedb",
"id_token_hint": "eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiUWMyNjRuTG40cVpwbjZZSjlsT2Z1USIsImF1ZCI6WyIwNTQ4ZGY3ZS1hNTcyLTRkMjItODJjNS03OTU2ZTE3ZWVlZGIiXSwiYXV0aF90aW1lIjoxNTI5NzUyMTgwLCJjX2hhc2giOiJyTF93Z0Y2aE45Y3BEOW04NUh3eHV3IiwiZXhwIjoxNTI5NzU1ODk2LCJpYXQiOjE1Mjk3NTIyOTcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6Ijc0ZDZlZTNhLTc1MTAtNGMyYS1iNGMwLTQ5ZGUyY2ZlNmFlNiIsIm5vbmNlIjoiZ0tLT3JNRk9qTllNRVdldyIsInJhdCI6MTUyOTc1MjI5NCwic3ViIjoiZm9vQGJhci5jb20ifQ.VdoM4L96Xew8hIdSbF5hfhKa7v8rIipSVov47aXJFUFtfxd1wvsj5S09374gHGNI4fopelWzDT2b0qX2bZQ6b8wlL2ihxUWaflJU00d2nPVO3P7gshtFMHrN7QPW4EGGe08YnqI6B8O0rT2CVfYF2UVcW9PlLTlrFMmjrPyhoDAJNK5Ow7vEZm-5J7G8Ho_Bua_tuUaBNV0R8Ohda8d9BT_in7CZ_JrsB7YbTOAwy2IRavHTyjmanezfHYdNI63B-SnG32KVb_gbERNYwIM-GY9JQoQOnjbzc4O71kSnQ14v6wMdg7moqIFsZiiJBCWN_ukug5UZxI0V0hq_FcUxenf_kBoIGWUIZh2AiX8u34A9m4rEpMfU56HYy2J7U-tmXRxKW_3GcAEFF7jPr_qabudhIm3uRwh97vyoFneEz1QxQGtimg1j12PU51vO_dpt2tGNDG1QRRveqUUiYuBCrzRGgQPvPozUfl-Ot6t2XdhxStAPmlyY-aoLEONekUOeMpBwS6giyGki0otVWIfPhJDmF2Qgef8_69NiuwDivg03eSxU6-qHCYOs0L7wLE_9Sg96fCBR0H9JzbnUNobM6qj_YvQFCccRXkKni9bbDfp-vGRlnC7jEx-Fb0QyvYOHZaTmph4MwPMcjBM3Ayt2uwI6xF6g_IAe0mLwFiB_5qw",
"nonce": "EKtmEA7RmKnrelfg",
"prompt": [
"none"
],
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "LTHgvz8QdDq0YfjV"
}
3.648 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=0548df7e-a572-4d22-82c5-7956e17eeedb&state=LTHgvz8QdDq0YfjV&id_token_hint=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiUWMyNjRuTG40cVpwbjZZSjlsT2Z1USIsImF1ZCI6WyIwNTQ4ZGY3ZS1hNTcyLTRkMjItODJjNS03OTU2ZTE3ZWVlZGIiXSwiYXV0aF90aW1lIjoxNTI5NzUyMTgwLCJjX2hhc2giOiJyTF93Z0Y2aE45Y3BEOW04NUh3eHV3IiwiZXhwIjoxNTI5NzU1ODk2LCJpYXQiOjE1Mjk3NTIyOTcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6Ijc0ZDZlZTNhLTc1MTAtNGMyYS1iNGMwLTQ5ZGUyY2ZlNmFlNiIsIm5vbmNlIjoiZ0tLT3JNRk9qTllNRVdldyIsInJhdCI6MTUyOTc1MjI5NCwic3ViIjoiZm9vQGJhci5jb20ifQ.VdoM4L96Xew8hIdSbF5hfhKa7v8rIipSVov47aXJFUFtfxd1wvsj5S09374gHGNI4fopelWzDT2b0qX2bZQ6b8wlL2ihxUWaflJU00d2nPVO3P7gshtFMHrN7QPW4EGGe08YnqI6B8O0rT2CVfYF2UVcW9PlLTlrFMmjrPyhoDAJNK5Ow7vEZm-5J7G8Ho_Bua_tuUaBNV0R8Ohda8d9BT_in7CZ_JrsB7YbTOAwy2IRavHTyjmanezfHYdNI63B-SnG32KVb_gbERNYwIM-GY9JQoQOnjbzc4O71kSnQ14v6wMdg7moqIFsZiiJBCWN_ukug5UZxI0V0hq_FcUxenf_kBoIGWUIZh2AiX8u34A9m4rEpMfU56HYy2J7U-tmXRxKW_3GcAEFF7jPr_qabudhIm3uRwh97vyoFneEz1QxQGtimg1j12PU51vO_dpt2tGNDG1QRRveqUUiYuBCrzRGgQPvPozUfl-Ot6t2XdhxStAPmlyY-aoLEONekUOeMpBwS6giyGki0otVWIfPhJDmF2Qgef8_69NiuwDivg03eSxU6-qHCYOs0L7wLE_9Sg96fCBR0H9JzbnUNobM6qj_YvQFCccRXkKni9bbDfp-vGRlnC7jEx-Fb0QyvYOHZaTmph4MwPMcjBM3Ayt2uwI6xF6g_IAe0mLwFiB_5qw&response_type=code+token&nonce=EKtmEA7RmKnrelfg
3.648 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=0548df7e-a572-4d22-82c5-7956e17eeedb&state=LTHgvz8QdDq0YfjV&id_token_hint=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiUWMyNjRuTG40cVpwbjZZSjlsT2Z1USIsImF1ZCI6WyIwNTQ4ZGY3ZS1hNTcyLTRkMjItODJjNS03OTU2ZTE3ZWVlZGIiXSwiYXV0aF90aW1lIjoxNTI5NzUyMTgwLCJjX2hhc2giOiJyTF93Z0Y2aE45Y3BEOW04NUh3eHV3IiwiZXhwIjoxNTI5NzU1ODk2LCJpYXQiOjE1Mjk3NTIyOTcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6Ijc0ZDZlZTNhLTc1MTAtNGMyYS1iNGMwLTQ5ZGUyY2ZlNmFlNiIsIm5vbmNlIjoiZ0tLT3JNRk9qTllNRVdldyIsInJhdCI6MTUyOTc1MjI5NCwic3ViIjoiZm9vQGJhci5jb20ifQ.VdoM4L96Xew8hIdSbF5hfhKa7v8rIipSVov47aXJFUFtfxd1wvsj5S09374gHGNI4fopelWzDT2b0qX2bZQ6b8wlL2ihxUWaflJU00d2nPVO3P7gshtFMHrN7QPW4EGGe08YnqI6B8O0rT2CVfYF2UVcW9PlLTlrFMmjrPyhoDAJNK5Ow7vEZm-5J7G8Ho_Bua_tuUaBNV0R8Ohda8d9BT_in7CZ_JrsB7YbTOAwy2IRavHTyjmanezfHYdNI63B-SnG32KVb_gbERNYwIM-GY9JQoQOnjbzc4O71kSnQ14v6wMdg7moqIFsZiiJBCWN_ukug5UZxI0V0hq_FcUxenf_kBoIGWUIZh2AiX8u34A9m4rEpMfU56HYy2J7U-tmXRxKW_3GcAEFF7jPr_qabudhIm3uRwh97vyoFneEz1QxQGtimg1j12PU51vO_dpt2tGNDG1QRRveqUUiYuBCrzRGgQPvPozUfl-Ot6t2XdhxStAPmlyY-aoLEONekUOeMpBwS6giyGki0otVWIfPhJDmF2Qgef8_69NiuwDivg03eSxU6-qHCYOs0L7wLE_9Sg96fCBR0H9JzbnUNobM6qj_YvQFCccRXkKni9bbDfp-vGRlnC7jEx-Fb0QyvYOHZaTmph4MwPMcjBM3Ayt2uwI6xF6g_IAe0mLwFiB_5qw&response_type=code+token&nonce=EKtmEA7RmKnrelfg
4.485 http args {}
4.63 response URL with fragment
4.631 response access_token=ep8oUbS08mDylbhYXdwebT-ZSI1QBnkA9t53Tq2JVqQ.kkVaNRxZRbdyMguLeHEvg_0JxcqHe4BEkBivzsJdgUg&code=NYr0cJ63ufyDwjUHW4peG5EnjiQILivYlpVYHE0fvQo.TcoDpou4W4LfooD3qukXx4t2GYZsP0E55MzaW0j3qnc&expires_in=3599&scope=openid&state=LTHgvz8QdDq0YfjV&token_type=bearer
4.631 response {'scope': 'openid', 'code': 'NYr0cJ63ufyDwjUHW4peG5EnjiQILivYlpVYHE0fvQo.TcoDpou4W4LfooD3qukXx4t2GYZsP0E55MzaW0j3qnc', 'access_token': 'ep8oUbS08mDylbhYXdwebT-ZSI1QBnkA9t53Tq2JVqQ.kkVaNRxZRbdyMguLeHEvg_0JxcqHe4BEkBivzsJdgUg', 'state': 'LTHgvz8QdDq0YfjV', 'expires_in': 3599, 'token_type': 'bearer'}
4.631 AuthorizationResponse {
"access_token": "ep8oUbS08mDylbhYXdwebT-ZSI1QBnkA9t53Tq2JVqQ.kkVaNRxZRbdyMguLeHEvg_0JxcqHe4BEkBivzsJdgUg",
"code": "NYr0cJ63ufyDwjUHW4peG5EnjiQILivYlpVYHE0fvQo.TcoDpou4W4LfooD3qukXx4t2GYZsP0E55MzaW0j3qnc",
"expires_in": 3599,
"scope": "openid",
"state": "LTHgvz8QdDq0YfjV",
"token_type": "bearer"
}
4.632 phase <--<-- 6 --- AccessToken -->-->
4.632 --> request op_args: {'state': 'LTHgvz8QdDq0YfjV'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
4.632 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'LTHgvz8QdDq0YfjV', 'code': 'NYr0cJ63ufyDwjUHW4peG5EnjiQILivYlpVYHE0fvQo.TcoDpou4W4LfooD3qukXx4t2GYZsP0E55MzaW0j3qnc', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '0548df7e-a572-4d22-82c5-7956e17eeedb'}, 'state': 'LTHgvz8QdDq0YfjV'}
4.632 AccessTokenRequest {
"code": "NYr0cJ63ufyDwjUHW4peG5EnjiQILivYlpVYHE0fvQo.TcoDpou4W4LfooD3qukXx4t2GYZsP0E55MzaW0j3qnc",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "LTHgvz8QdDq0YfjV"
}
4.632 request_url https://oidc-certification.ory.sh:8443/oauth2/token
4.632 request_http_args {'headers': {'Authorization': 'Basic MDU0OGRmN2UtYTU3Mi00ZDIyLTgyYzUtNzk1NmUxN2VlZWRiOnpzb2w3SGQxM2s2Uw==', 'Content-Type': 'application/x-www-form-urlencoded'}}
4.632 request code=NYr0cJ63ufyDwjUHW4peG5EnjiQILivYlpVYHE0fvQo.TcoDpou4W4LfooD3qukXx4t2GYZsP0E55MzaW0j3qnc&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=LTHgvz8QdDq0YfjV
4.853 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
4.854 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiaEJuUS1wNkNfV2ZTSmNPd0ItVG9jdyIsImF1ZCI6WyIwNTQ4ZGY3ZS1hNTcyLTRkMjItODJjNS03OTU2ZTE3ZWVlZGIiXSwiYXV0aF90aW1lIjoxNTI5NzUyMTgwLCJjX2hhc2giOiJPbEtnMXBSdXZ0NTJjQnpuLTM3MlF3IiwiZXhwIjoxNTI5NzU1ODk4LCJpYXQiOjE1Mjk3NTIyOTgsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjM1MDBhNmE1LTkyZDMtNDhhMC04ZjMwLTRjODFhZjhmZTc0YSIsIm5vbmNlIjoiRUt0bUVBN1JtS25yZWxmZyIsInJhdCI6MTUyOTc1MjI5Nywic3ViIjoiZm9vQGJhci5jb20ifQ.SBIzkWaiTOZ1wrNlhs-mE6vrUo7WmMGWDZFaACdJ2SLcY2rvOxvHWVKXjlg3UdP2QDP7AZZ_IdHH9L1D0mzUG1eKVFnZk6GkDwlk_70eB7Mt0nh0wSE6lCyOs2LpypQDrn1fDFPEPbl7RJb6vLi04r__hQay4ZmNmliwkY_usUMVNZNgwXi5cXF6JlgV6dmdT19fWm3y3kiOr_rMigRze5CogE5kFvtr8iJWYfcTGEByRrx0s2DMB6XFChwnfBQspCUASdutBKeN7feUWSoy0sJze_K5DeSJBnoDmoxxLAjYkSGmRcdDL0jlDWgkKDhp7P7cWjJkzWVR4auJP7rf-pmOlvPeHWm-WAxffv0pVGaEYtwLyGjUKuaUJmaeH4ewf5caQDZ8wXT8jK0kOzlLRAE5DLW8WBJTWztePH8bfokFon2yTPwJbwcNMnKuzV9PKpZEVgCVMZ5QbIZ8THjk78zC6LDecSZIriFh4wJ_OCrI1G7Hkl1STD6sciPu3VUesyoadUUnxmM-aVOA-1jFey7kauxhhcMZAwgwBn_iOiyeI_fVRYyaG5kVRWdbGNsxnhhgNTJZtKDl7clSjHONi1-yYyWFcI8l7RH_SYSC7vSlNJbUGMKkHH96jih5BNRV8t9XjSJ479lsyPc2t2T-BXIBSmKMugsKFWNDMRUOgR8', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'ct47I8bX3JyI4pM4kzJUQdZ68xR829dowPYf-jJA6lk.VXwu4fRhEypFOyoiFEe7rqsqgQVEvCCmWqR_XNfpTQ8', 'scope': 'openid'}
4.857 AccessTokenResponse {
"access_token": "ct47I8bX3JyI4pM4kzJUQdZ68xR829dowPYf-jJA6lk.VXwu4fRhEypFOyoiFEe7rqsqgQVEvCCmWqR_XNfpTQ8",
"expires_in": 3599,
"id_token": {
"at_hash": "hBnQ-p6C_WfSJcOwB-Tocw",
"aud": [
"0548df7e-a572-4d22-82c5-7956e17eeedb"
],
"auth_time": 1529752180,
"c_hash": "OlKg1pRuvt52cBzn-372Qw",
"exp": 1529755898,
"iat": 1529752298,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "3500a6a5-92d3-48a0-8f30-4c81af8fe74a",
"nonce": "EKtmEA7RmKnrelfg",
"rat": 1529752297,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
4.857 phase <--<-- 7 --- Done -->-->
4.857 end
4.858 assertion VerifyResponse
4.858 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.858 assertion SameAuthn
4.858 condition same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
4.858 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Registration-tos_uri.txt 0000644 0000000 0000000 00000015650 13313424722 016372 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-tos_uri
Test description: Registration with tos_uri
Timestamp: 2018-06-23T11:06:58Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.129 phase <--<-- 1 --- Webfinger -->-->
1.129 not expected to do WebFinger
1.129 phase <--<-- 2 --- Discovery -->-->
1.129 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.204 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.205 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.205 phase <--<-- 3 --- Registration -->-->
1.206 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'tos_uri': 'https://op.certification.openid.net:61353/static/tos.html', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.206 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Zn4FC5mPZYbj1xWe"
],
"response_types": [
"code token"
],
"tos_uri": "https://op.certification.openid.net:61353/static/tos.html"
}
1.364 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.365 RegistrationResponse {
"client_id": "3c2d5d65-ac26-4b4a-96a6-8dad047122ce",
"client_secret": "Z~1zPi37agsQ",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "3c2d5d65-ac26-4b4a-96a6-8dad047122ce",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Zn4FC5mPZYbj1xWe"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"tos_uri": "https://op.certification.openid.net:61353/static/tos.html",
"userinfo_signed_response_alg": "none"
}
1.365 phase <--<-- 4 --- AsyncAuthn -->-->
1.365 AuthorizationRequest {
"client_id": "3c2d5d65-ac26-4b4a-96a6-8dad047122ce",
"nonce": "4Mki3Yw1Ku1zIu1r",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "uhOFO1y3KL5JzRcH"
}
1.365 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=3c2d5d65-ac26-4b4a-96a6-8dad047122ce&state=uhOFO1y3KL5JzRcH&response_type=code+token&nonce=4Mki3Yw1Ku1zIu1r
1.365 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=3c2d5d65-ac26-4b4a-96a6-8dad047122ce&state=uhOFO1y3KL5JzRcH&response_type=code+token&nonce=4Mki3Yw1Ku1zIu1r
3.198 http args {}
3.36 response URL with fragment
3.361 response access_token=J_qcyg9_qFcMCp6WTBHzAavmtM9ZMzUfxdG9F_I8K-M.z3Ksc7yj0tTL9P8Eh_ujh8mfnlVCxn65Smu9KI5SaGM&code=hqkK9bY3OlcevAruLdcajO1F_KcTCT1yX94_LvgJsd8.Y83YdFV7rbUWpcGwmIDJzo_ACakTu_hPAvmLECI9byQ&expires_in=3599&scope=openid&state=uhOFO1y3KL5JzRcH&token_type=bearer
3.361 response {'scope': 'openid', 'code': 'hqkK9bY3OlcevAruLdcajO1F_KcTCT1yX94_LvgJsd8.Y83YdFV7rbUWpcGwmIDJzo_ACakTu_hPAvmLECI9byQ', 'access_token': 'J_qcyg9_qFcMCp6WTBHzAavmtM9ZMzUfxdG9F_I8K-M.z3Ksc7yj0tTL9P8Eh_ujh8mfnlVCxn65Smu9KI5SaGM', 'state': 'uhOFO1y3KL5JzRcH', 'expires_in': 3599, 'token_type': 'bearer'}
3.361 AuthorizationResponse {
"access_token": "J_qcyg9_qFcMCp6WTBHzAavmtM9ZMzUfxdG9F_I8K-M.z3Ksc7yj0tTL9P8Eh_ujh8mfnlVCxn65Smu9KI5SaGM",
"code": "hqkK9bY3OlcevAruLdcajO1F_KcTCT1yX94_LvgJsd8.Y83YdFV7rbUWpcGwmIDJzo_ACakTu_hPAvmLECI9byQ",
"expires_in": 3599,
"scope": "openid",
"state": "uhOFO1y3KL5JzRcH",
"token_type": "bearer"
}
3.362 phase <--<-- 5 --- Done -->-->
3.362 end
3.362 assertion VerifyAuthnResponse
3.362 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
3.362 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-prompt-none-NotLoggedIn.txt 0000644 0000000 0000000 00000015543 13313425210 016655 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-prompt-none-NotLoggedIn
Test description: Request with prompt=none when not logged in
Timestamp: 2018-06-23T11:10:00Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.319 phase <--<-- 1 --- Webfinger -->-->
1.32 not expected to do WebFinger
1.32 phase <--<-- 2 --- Discovery -->-->
1.32 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.427 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.429 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.429 phase <--<-- 3 --- Registration -->-->
1.429 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.429 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#R5N4FB4YvdyYPvg1"
],
"response_types": [
"code token"
]
}
1.594 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.595 RegistrationResponse {
"client_id": "8ba3a1af-39ee-401a-9eaf-bf2afb787334",
"client_secret": "DGQJ6KqrSXaD",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "8ba3a1af-39ee-401a-9eaf-bf2afb787334",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#R5N4FB4YvdyYPvg1"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.595 phase <--<-- 4 --- AsyncAuthn -->-->
1.596 AuthorizationRequest {
"client_id": "8ba3a1af-39ee-401a-9eaf-bf2afb787334",
"nonce": "lycmpiUZCLQi69Q6",
"prompt": [
"none"
],
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "X4W2AL2JjZTUAkRz"
}
1.596 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=8ba3a1af-39ee-401a-9eaf-bf2afb787334&state=X4W2AL2JjZTUAkRz&response_type=code+token&nonce=lycmpiUZCLQi69Q6
1.596 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=8ba3a1af-39ee-401a-9eaf-bf2afb787334&state=X4W2AL2JjZTUAkRz&response_type=code+token&nonce=lycmpiUZCLQi69Q6
1.986 http args {}
2.17 response URL with fragment
2.17 response error=login_required&error_debug=Prompt+%2522none%2522+was+requested%252C+but+no+existing+login+session+was+found&error_description=The+Authorization+Server+requires+End-User+authentication&state=X4W2AL2JjZTUAkRz
2.171 response {'error_debug': 'Prompt %22none%22 was requested%2C but no existing login session was found', 'error_description': 'The Authorization Server requires End-User authentication', 'state': 'X4W2AL2JjZTUAkRz', 'error': 'login_required'}
2.171 AuthorizationErrorResponse {
"error": "login_required",
"error_debug": "Prompt %22none%22 was requested%2C but no existing login session was found",
"error_description": "The Authorization Server requires End-User authentication",
"state": "X4W2AL2JjZTUAkRz"
}
2.171 AuthorizationErrorResponse {
"error": "login_required",
"error_debug": "Prompt %22none%22 was requested%2C but no existing login session was found",
"error_description": "The Authorization Server requires End-User authentication",
"state": "X4W2AL2JjZTUAkRz"
}
2.171 phase <--<-- 5 --- Done -->-->
2.171 end
2.172 assertion VerifyErrorMessage
2.172 condition verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
2.172 condition Done: status=OK
============================================================
Conditions
verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-request_uri-Unsigned.txt 0000644 0000000 0000000 00000016427 13313425262 016362 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-request_uri-Unsigned
Test description: Support request_uri request parameter with unsigned request
Timestamp: 2018-06-23T11:10:42Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.074 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Registration -->-->
0.076 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'request_object_signing_alg': 'none'}
0.076 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "none",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#rkbUFJmcrFB4kDug"
],
"response_types": [
"code token"
]
}
0.271 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.272 RegistrationResponse {
"client_id": "de28c848-5f77-45a6-8e4d-e02213ed1d3e",
"client_secret": "3fz6THG8YkNw",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "de28c848-5f77-45a6-8e4d-e02213ed1d3e",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "none",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#rkbUFJmcrFB4kDug"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.272 phase <--<-- 3 --- AsyncAuthn -->-->
0.274 AuthorizationRequest {
"client_id": "de28c848-5f77-45a6-8e4d-e02213ed1d3e",
"nonce": "mrTyKpFkj1qCmPaT",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"request_uri": "https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#rkbUFJmcrFB4kDug",
"response_type": "code token",
"scope": "openid",
"state": "EO9D6oMrFAI6XIDr"
}
0.274 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?request_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Frequests%2Fe3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9%23rkbUFJmcrFB4kDug&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=de28c848-5f77-45a6-8e4d-e02213ed1d3e&state=EO9D6oMrFAI6XIDr&response_type=code+token&nonce=mrTyKpFkj1qCmPaT
0.274 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?request_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Frequests%2Fe3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9%23rkbUFJmcrFB4kDug&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=de28c848-5f77-45a6-8e4d-e02213ed1d3e&state=EO9D6oMrFAI6XIDr&response_type=code+token&nonce=mrTyKpFkj1qCmPaT
4.674 http args {}
4.838 response URL with fragment
4.838 response access_token=0M8OF9EHeJC6mcEwY9MhCoNCZhlarw_b8sFxsJmYxew.un6TAUNjzTWT_R_uERkv0_722MLCDNi5KN30CLR8SUI&code=XZAzv-blQbY92tdy_AjE8kYVYwyy-LV91tRVwiaGeQ8.Xi9pW6-oTviiONx_ObxsA1o7W3virKH4RYHulSdAxdQ&expires_in=3599&scope=openid&state=EO9D6oMrFAI6XIDr&token_type=bearer
4.839 response {'scope': 'openid', 'code': 'XZAzv-blQbY92tdy_AjE8kYVYwyy-LV91tRVwiaGeQ8.Xi9pW6-oTviiONx_ObxsA1o7W3virKH4RYHulSdAxdQ', 'access_token': '0M8OF9EHeJC6mcEwY9MhCoNCZhlarw_b8sFxsJmYxew.un6TAUNjzTWT_R_uERkv0_722MLCDNi5KN30CLR8SUI', 'state': 'EO9D6oMrFAI6XIDr', 'expires_in': 3599, 'token_type': 'bearer'}
4.839 AuthorizationResponse {
"access_token": "0M8OF9EHeJC6mcEwY9MhCoNCZhlarw_b8sFxsJmYxew.un6TAUNjzTWT_R_uERkv0_722MLCDNi5KN30CLR8SUI",
"code": "XZAzv-blQbY92tdy_AjE8kYVYwyy-LV91tRVwiaGeQ8.Xi9pW6-oTviiONx_ObxsA1o7W3virKH4RYHulSdAxdQ",
"expires_in": 3599,
"scope": "openid",
"state": "EO9D6oMrFAI6XIDr",
"token_type": "bearer"
}
4.839 phase <--<-- 4 --- Done -->-->
4.839 end
4.84 assertion VerifyResponse
4.84 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.84 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Req-acr_values.txt 0000644 0000000 0000000 00000025024 13313425326 015104 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-acr_values
Test description: Providing acr_values
Timestamp: 2018-06-23T11:11:18Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Registration -->-->
0.075 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.075 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#4etS93WUc1O9ZRj2"
],
"response_types": [
"code token"
]
}
0.263 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.264 RegistrationResponse {
"client_id": "b3b718f2-e6ff-4de3-8e0c-19edb28fc438",
"client_secret": "O77FOxVfaRed",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "b3b718f2-e6ff-4de3-8e0c-19edb28fc438",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#4etS93WUc1O9ZRj2"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.264 phase <--<-- 3 --- AsyncAuthn -->-->
0.265 AuthorizationRequest {
"acr_values": "1 2",
"client_id": "b3b718f2-e6ff-4de3-8e0c-19edb28fc438",
"nonce": "OlsnhuwrzcgQKa6x",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "FCQXkhvOU1VdPRNf"
}
0.265 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=b3b718f2-e6ff-4de3-8e0c-19edb28fc438&state=FCQXkhvOU1VdPRNf&acr_values=1+2&response_type=code+token&nonce=OlsnhuwrzcgQKa6x
0.265 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=b3b718f2-e6ff-4de3-8e0c-19edb28fc438&state=FCQXkhvOU1VdPRNf&acr_values=1+2&response_type=code+token&nonce=OlsnhuwrzcgQKa6x
2.429 http args {}
2.632 response URL with fragment
2.632 response access_token=uSRZF9O0_gkwwsrc-AdsOc48ZE6YKi8oIwbd9Kz1YqA.oW-4_VAfeeXnz1kX_HvY7htyJKTNWV0rsSDTzzhsm-8&code=8RTUX96jYKy7MnLbeqpt-h-zMBEMRnSnJCXEA3ETjUM.l_BMrtxpAbC2rBVpuUnx4ioYNUCCMgNUjMHPvFK68fo&expires_in=3599&scope=openid&state=FCQXkhvOU1VdPRNf&token_type=bearer
2.633 response {'scope': 'openid', 'code': '8RTUX96jYKy7MnLbeqpt-h-zMBEMRnSnJCXEA3ETjUM.l_BMrtxpAbC2rBVpuUnx4ioYNUCCMgNUjMHPvFK68fo', 'access_token': 'uSRZF9O0_gkwwsrc-AdsOc48ZE6YKi8oIwbd9Kz1YqA.oW-4_VAfeeXnz1kX_HvY7htyJKTNWV0rsSDTzzhsm-8', 'state': 'FCQXkhvOU1VdPRNf', 'expires_in': 3599, 'token_type': 'bearer'}
2.633 AuthorizationResponse {
"access_token": "uSRZF9O0_gkwwsrc-AdsOc48ZE6YKi8oIwbd9Kz1YqA.oW-4_VAfeeXnz1kX_HvY7htyJKTNWV0rsSDTzzhsm-8",
"code": "8RTUX96jYKy7MnLbeqpt-h-zMBEMRnSnJCXEA3ETjUM.l_BMrtxpAbC2rBVpuUnx4ioYNUCCMgNUjMHPvFK68fo",
"expires_in": 3599,
"scope": "openid",
"state": "FCQXkhvOU1VdPRNf",
"token_type": "bearer"
}
2.633 phase <--<-- 4 --- AccessToken -->-->
2.633 --> request op_args: {'state': 'FCQXkhvOU1VdPRNf'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.633 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'FCQXkhvOU1VdPRNf', 'code': '8RTUX96jYKy7MnLbeqpt-h-zMBEMRnSnJCXEA3ETjUM.l_BMrtxpAbC2rBVpuUnx4ioYNUCCMgNUjMHPvFK68fo', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'b3b718f2-e6ff-4de3-8e0c-19edb28fc438'}, 'state': 'FCQXkhvOU1VdPRNf'}
2.633 AccessTokenRequest {
"code": "8RTUX96jYKy7MnLbeqpt-h-zMBEMRnSnJCXEA3ETjUM.l_BMrtxpAbC2rBVpuUnx4ioYNUCCMgNUjMHPvFK68fo",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "FCQXkhvOU1VdPRNf"
}
2.633 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.633 request_http_args {'headers': {'Authorization': 'Basic YjNiNzE4ZjItZTZmZi00ZGUzLThlMGMtMTllZGIyOGZjNDM4Ok83N0ZPeFZmYVJlZA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.633 request code=8RTUX96jYKy7MnLbeqpt-h-zMBEMRnSnJCXEA3ETjUM.l_BMrtxpAbC2rBVpuUnx4ioYNUCCMgNUjMHPvFK68fo&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=FCQXkhvOU1VdPRNf
2.854 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.856 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhY3IiOiIwIiwiYXRfaGFzaCI6IlhFZGlmaXE3TzJPZkNpX3dvZkcwSFEiLCJhdWQiOlsiYjNiNzE4ZjItZTZmZi00ZGUzLThlMGMtMTllZGIyOGZjNDM4Il0sImF1dGhfdGltZSI6MTUyOTc1MjE4MCwiY19oYXNoIjoiR3Y0SkpNYjdTWnZ2Z2YwVm96aEI2USIsImV4cCI6MTUyOTc1NTg3NywiaWF0IjoxNTI5NzUyMjc4LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJiNjk3YmY4OS00MGM0LTRlNjItYjU2MS02OWQwZDU0M2E1NTQiLCJub25jZSI6Ik9sc25odXdyemNnUUthNngiLCJyYXQiOjE1Mjk3NTIyNzYsInN1YiI6ImZvb0BiYXIuY29tIn0.UD8vj0X_YmZEQ-IKFbiqVm-yBMYcKIXDW0CFD9j3UysqSSEtZW-rDU3TK3eNw1M1RnOOOokyLsH-ZRhChGHjFeNIDPb8XhwrhSmvOT-aZYznwMJIZlEnFsofVfgZZIP73zHqeKAz3T496Fisl67cTA8ecMdYmREbLTqhhJovQksYRFn6QbIp7oFM5io87CjssFwaB7DwMTCt6oeu0FjxpGSJ8EqPt7AoLLkKb9NgOzNPyI8w0TreHTjo9S5LB5msgm-lIFn3TXrExmzPF_WUj8aQvrw0gqgpQaT6OUp57eXUHW9KIJ11EJ2rKwLztTZgwKtN6vIJIZSUSADTB89K3rkN-M9OY-_jtZ_9eM0feHKdGFy6Yfbz0QNSmPIZLCYVdxhXwaBkVhppT-V8z_GfHRPI4BfrtAYPbX8rq7fYj65u5TwEKtivQlCblM0kseV_Kq1IXVkQNVQMs-FoPAFaXruf_AGsmFlgviN_hDut-i0sFxNljdjdIFJtqFwHi0Qfxc94tzXIHqUOrLtgXhXL7L_1Lb0ZLXMXKNxq--rpiy7tXnJzxQoXJE5TGhkkoBKm2niwfDBnOSeriuVOBParuw12LGaLXrzAcdYGrsXUkWF0rUzHAMgGBgBK-u0xIODS901X6x_8oZ8qXl6W8V7j5AJwJsUWgzQz-t1QGgfv54o', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'onhK5V488OeZUD8JPOmyF8W6IHmQYgzjR73RPdF4nyo.0wXwzAAcSwxcv_D24bY7zigBuREA8uWNEWa4-45dAO4', 'scope': 'openid'}
2.935 AccessTokenResponse {
"access_token": "onhK5V488OeZUD8JPOmyF8W6IHmQYgzjR73RPdF4nyo.0wXwzAAcSwxcv_D24bY7zigBuREA8uWNEWa4-45dAO4",
"expires_in": 3599,
"id_token": {
"acr": "0",
"at_hash": "XEdifiq7O2OfCi_wofG0HQ",
"aud": [
"b3b718f2-e6ff-4de3-8e0c-19edb28fc438"
],
"auth_time": 1529752180,
"c_hash": "Gv4JJMb7SZvvgf0VozhB6Q",
"exp": 1529755877,
"iat": 1529752278,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "b697bf89-40c4-4e62-b561-69d0d543a554",
"nonce": "OlsnhuwrzcgQKa6x",
"rat": 1529752276,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
2.935 phase <--<-- 5 --- Done -->-->
2.935 end
2.936 assertion VerifyResponse
2.936 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.936 assertion UsedAcrValue
2.937 condition used-acr-value: status=WARNING, message=Used acr value: 0, preferred: ['1', '2'] [The acr value in the ID Token]
2.937 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
used-acr-value: status=WARNING, message=Used acr value: 0, preferred: ['1', '2'] [The acr value in the ID Token]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
Used acr value: 0, preferred: ['1', '2']
./OP-scope-address.txt 0000644 0000000 0000000 00000027474 13313425276 015006 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-scope-address
Test description: Scope requesting address claims
Timestamp: 2018-06-23T11:10:54Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.107 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.108 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.108 phase <--<-- 2 --- Registration -->-->
0.108 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.108 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#4mQlESh6H9jhI5CQ"
],
"response_types": [
"code token"
]
}
0.264 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.265 RegistrationResponse {
"client_id": "79d1666b-6b39-4f3d-b3e2-2ea11f8ab585",
"client_secret": "OV38la9FS1QU",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "79d1666b-6b39-4f3d-b3e2-2ea11f8ab585",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#4mQlESh6H9jhI5CQ"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.265 phase <--<-- 3 --- AsyncAuthn -->-->
0.266 condition Check support: status=WARNING, message=No support for: scopes_supported=['address']
0.266 AuthorizationRequest {
"client_id": "79d1666b-6b39-4f3d-b3e2-2ea11f8ab585",
"nonce": "x2cDZ4m96t9agPeo",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid address",
"state": "oMp4DvwhdVamni2R"
}
0.266 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+address&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=79d1666b-6b39-4f3d-b3e2-2ea11f8ab585&state=oMp4DvwhdVamni2R&response_type=code+token&nonce=x2cDZ4m96t9agPeo
0.266 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+address&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=79d1666b-6b39-4f3d-b3e2-2ea11f8ab585&state=oMp4DvwhdVamni2R&response_type=code+token&nonce=x2cDZ4m96t9agPeo
3.8 http args {}
3.967 response URL with fragment
3.968 response access_token=kEJ8qHtdObUjS0st9mHr9xgA_6Hk2uc7x5lLpoOvCXI.8XedPRVn3mzKYJAfVzKhaFKV6rjC5nitS4aCcRrYJ-c&code=lrELk7_W5ZVscX2Gebx4hS52ibE9HQfvIsGUQRCmgt4.kh4XL-ngL2pFIL4EAjIVZPxVFB0bjXne643CxDxsxSA&expires_in=3599&scope=openid%20address&state=oMp4DvwhdVamni2R&token_type=bearer
3.968 response {'scope': 'openid address', 'code': 'lrELk7_W5ZVscX2Gebx4hS52ibE9HQfvIsGUQRCmgt4.kh4XL-ngL2pFIL4EAjIVZPxVFB0bjXne643CxDxsxSA', 'access_token': 'kEJ8qHtdObUjS0st9mHr9xgA_6Hk2uc7x5lLpoOvCXI.8XedPRVn3mzKYJAfVzKhaFKV6rjC5nitS4aCcRrYJ-c', 'state': 'oMp4DvwhdVamni2R', 'expires_in': 3599, 'token_type': 'bearer'}
3.968 AuthorizationResponse {
"access_token": "kEJ8qHtdObUjS0st9mHr9xgA_6Hk2uc7x5lLpoOvCXI.8XedPRVn3mzKYJAfVzKhaFKV6rjC5nitS4aCcRrYJ-c",
"code": "lrELk7_W5ZVscX2Gebx4hS52ibE9HQfvIsGUQRCmgt4.kh4XL-ngL2pFIL4EAjIVZPxVFB0bjXne643CxDxsxSA",
"expires_in": 3599,
"scope": "openid address",
"state": "oMp4DvwhdVamni2R",
"token_type": "bearer"
}
3.969 phase <--<-- 4 --- AccessToken -->-->
3.969 --> request op_args: {'state': 'oMp4DvwhdVamni2R'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.969 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'oMp4DvwhdVamni2R', 'code': 'lrELk7_W5ZVscX2Gebx4hS52ibE9HQfvIsGUQRCmgt4.kh4XL-ngL2pFIL4EAjIVZPxVFB0bjXne643CxDxsxSA', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '79d1666b-6b39-4f3d-b3e2-2ea11f8ab585'}, 'state': 'oMp4DvwhdVamni2R'}
3.969 AccessTokenRequest {
"code": "lrELk7_W5ZVscX2Gebx4hS52ibE9HQfvIsGUQRCmgt4.kh4XL-ngL2pFIL4EAjIVZPxVFB0bjXne643CxDxsxSA",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "oMp4DvwhdVamni2R"
}
3.969 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.969 request_http_args {'headers': {'Authorization': 'Basic NzlkMTY2NmItNmIzOS00ZjNkLWIzZTItMmVhMTFmOGFiNTg1Ok9WMzhsYTlGUzFRVQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
3.969 request code=lrELk7_W5ZVscX2Gebx4hS52ibE9HQfvIsGUQRCmgt4.kh4XL-ngL2pFIL4EAjIVZPxVFB0bjXne643CxDxsxSA&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=oMp4DvwhdVamni2R
4.184 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
4.186 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiNllma2tDaUw1THg3cDdNaGx6VE5xdyIsImF1ZCI6WyI3OWQxNjY2Yi02YjM5LTRmM2QtYjNlMi0yZWExMWY4YWI1ODUiXSwiYXV0aF90aW1lIjoxNTI5NzUyMTgwLCJjX2hhc2giOiJvUHRWcHFHZUZyVWRsOE53cnExZDV3IiwiZXhwIjoxNTI5NzU1ODUzLCJpYXQiOjE1Mjk3NTIyNTQsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjA1MGJhYmFlLWQwZGMtNGIwNy1iNjQ5LWUzN2NkNTVkZjQ5MiIsIm5vbmNlIjoieDJjRFo0bTk2dDlhZ1BlbyIsInJhdCI6MTUyOTc1MjI1MCwic3ViIjoiZm9vQGJhci5jb20ifQ.bcw63IOjNuCO99YC-2CQ1RQZ2-qMU6-lR5HBgiN74rj3AznF7-QFk1vdhgJ1ZoADf1XOlV7FyerQjyB_uqdfUKrXPZk1p9aDAzdECrv_vza50xy7-0STzo-QDjIUnwEPkqP_sb-kMM57J-7lx2uPhNN6bO46D3VH10O4Lmk_RKy7Z7xiXBPXqwmJI0U2ve-alDMECIdVnSijiENZ-TckEqax_GvxwG6-W2bBd7RY8DvMgEPJoCQ78D5QaopVQPtoXkFQ7V8h6J3_niSu6QpsRoHqdzZE1pIaf18B-07jtmSoMoM8mxpMJKw4m8vk5JxAxP6ZyWJRpaM9XXIq83wXlqLcvWiUhQQ5XMeJNc8NW3mkLAC1DNJ9GzRKKYfD_SW5_OA_qTUENTub4GjIOejwgOmcemIrW5q8Yf5ej5dbuk7P9manMhJOSrgVEXkvLbqFJXl1go98BPT0YbpGVqRItWy3X3-5i_SWw1RuMlhNGbnWILNMCrIuom8UqjnsvHhfcvXyM1HPpfhJkg0VJU6A9jpRdtSNl2LsYiUPcwyuJLuFMA3yKlCFL8_Sm044PFg_4sC4-0ta7Azmn2HgEpzoTKEXarb_7Sz0ZV7O3d88WseXjcKY2oBB4iLthl1Crh-_AFcNReiasuwq3CMB10KG1r-qV4etu4gCmQnnk1yNKBc', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'oyZgKcwk0g84Bv_ITQQKFvdl8CAiI43mkIS1Eyvb_xc.umbJPcevQLTLClZR-VuTNmIoTrRjfKU9Sic8sQ1E_3M', 'scope': 'openid address'}
4.298 AccessTokenResponse {
"access_token": "oyZgKcwk0g84Bv_ITQQKFvdl8CAiI43mkIS1Eyvb_xc.umbJPcevQLTLClZR-VuTNmIoTrRjfKU9Sic8sQ1E_3M",
"expires_in": 3599,
"id_token": {
"at_hash": "6YfkkCiL5Lx7p7MhlzTNqw",
"aud": [
"79d1666b-6b39-4f3d-b3e2-2ea11f8ab585"
],
"auth_time": 1529752180,
"c_hash": "oPtVpqGeFrUdl8Nwrq1d5w",
"exp": 1529755853,
"iat": 1529752254,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "050babae-d0dc-4b07-b649-e37cd55df492",
"nonce": "x2cDZ4m96t9agPeo",
"rat": 1529752250,
"sub": "[email protected]"
},
"scope": "openid address",
"token_type": "bearer"
}
4.298 phase <--<-- 5 --- UserInfo -->-->
4.298 do_user_info_request kwargs:{'state': 'oMp4DvwhdVamni2R', 'method': 'GET', 'authn_method': 'bearer_header'}
4.299 request {'body': None}
4.299 request_url https://oidc-certification.ory.sh:8443/userinfo
4.299 request_http_args {'headers': {'Authorization': 'Bearer oyZgKcwk0g84Bv_ITQQKFvdl8CAiI43mkIS1Eyvb_xc.umbJPcevQLTLClZR-VuTNmIoTrRjfKU9Sic8sQ1E_3M'}}
4.383 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
4.384 OpenIDSchema {
"sub": "[email protected]"
}
4.384 OpenIDSchema {
"sub": "[email protected]"
}
4.384 phase <--<-- 6 --- Done -->-->
4.384 end
4.384 assertion CheckHTTPResponse
4.384 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
4.385 assertion VerifyResponse
4.385 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.385 assertion VerifyScopes
4.385 condition verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['address'] [Verifies that the claims corresponding to the requested scopes are returned]
4.385 condition Done: status=OK
============================================================
Conditions
Check support: status=WARNING, message=No support for: scopes_supported=['address']
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['address'] [Verifies that the claims corresponding to the requested scopes are returned]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
No support for: scopes_supported=['address']
The following claims were missing from the returned information: ['address']
./OP-Req-NotUnderstood.txt 0000644 0000000 0000000 00000015317 13313425322 015567 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-NotUnderstood
Test description: Request with extra query component
Timestamp: 2018-06-23T11:11:14Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.077 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.078 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.078 phase <--<-- 2 --- Registration -->-->
0.078 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.079 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#0zxc3aBbCCpYPcQm"
],
"response_types": [
"code token"
]
}
0.234 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.235 RegistrationResponse {
"client_id": "68687fed-9612-41af-ba75-5edc498f6e17",
"client_secret": "TACkPebLu_Fa",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "68687fed-9612-41af-ba75-5edc498f6e17",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#0zxc3aBbCCpYPcQm"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.235 phase <--<-- 3 --- AsyncAuthn -->-->
0.236 AuthorizationRequest {
"client_id": "68687fed-9612-41af-ba75-5edc498f6e17",
"extra": "foobar",
"nonce": "2sxDCJYBI9PDOK1M",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "NgzbZjEKumwjEc7B"
}
0.236 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?extra=foobar&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=68687fed-9612-41af-ba75-5edc498f6e17&state=NgzbZjEKumwjEc7B&response_type=code+token&nonce=2sxDCJYBI9PDOK1M
0.236 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?extra=foobar&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=68687fed-9612-41af-ba75-5edc498f6e17&state=NgzbZjEKumwjEc7B&response_type=code+token&nonce=2sxDCJYBI9PDOK1M
2.817 http args {}
3.029 response URL with fragment
3.029 response access_token=RD90HxLQ1btCu5yOD2-U1p9u6txX-eMl9xNG_rNs6es.tStsH9XL6mkcOp9A8wqvPVp2_nCICKvLkafXa4jvgTU&code=eYkQiZVNofmc0bGjlCzNUqAy2YZXxTyUh2vMkQR9ox8.z3OGeWOG_qxiEG_6CZ0sFhgVG-3XmxlSZ8tSTHSiG9Q&expires_in=3599&scope=openid&state=NgzbZjEKumwjEc7B&token_type=bearer
3.029 response {'scope': 'openid', 'code': 'eYkQiZVNofmc0bGjlCzNUqAy2YZXxTyUh2vMkQR9ox8.z3OGeWOG_qxiEG_6CZ0sFhgVG-3XmxlSZ8tSTHSiG9Q', 'access_token': 'RD90HxLQ1btCu5yOD2-U1p9u6txX-eMl9xNG_rNs6es.tStsH9XL6mkcOp9A8wqvPVp2_nCICKvLkafXa4jvgTU', 'state': 'NgzbZjEKumwjEc7B', 'expires_in': 3599, 'token_type': 'bearer'}
3.03 AuthorizationResponse {
"access_token": "RD90HxLQ1btCu5yOD2-U1p9u6txX-eMl9xNG_rNs6es.tStsH9XL6mkcOp9A8wqvPVp2_nCICKvLkafXa4jvgTU",
"code": "eYkQiZVNofmc0bGjlCzNUqAy2YZXxTyUh2vMkQR9ox8.z3OGeWOG_qxiEG_6CZ0sFhgVG-3XmxlSZ8tSTHSiG9Q",
"expires_in": 3599,
"scope": "openid",
"state": "NgzbZjEKumwjEc7B",
"token_type": "bearer"
}
3.03 phase <--<-- 4 --- Done -->-->
3.03 end
3.03 assertion VerifyAuthnResponse
3.03 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
3.03 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-scope-email.txt 0000644 0000000 0000000 00000027516 13313425303 014434 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-scope-email
Test description: Scope requesting email claims
Timestamp: 2018-06-23T11:10:59Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.107 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.109 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.109 phase <--<-- 2 --- Registration -->-->
0.109 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.109 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#h0zetVQIrPOly50r"
],
"response_types": [
"code token"
]
}
0.267 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.268 RegistrationResponse {
"client_id": "9b8173ed-498e-4660-a5cb-b2858aac6d22",
"client_secret": "sESnug0mmad4",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "9b8173ed-498e-4660-a5cb-b2858aac6d22",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#h0zetVQIrPOly50r"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.268 phase <--<-- 3 --- AsyncAuthn -->-->
0.269 condition Check support: status=WARNING, message=No support for: scopes_supported=['email']
0.269 AuthorizationRequest {
"client_id": "9b8173ed-498e-4660-a5cb-b2858aac6d22",
"nonce": "aoN1acO8YjrM9V53",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid email",
"state": "AjdN1o6PmHlOEYyX"
}
0.269 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+email&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=9b8173ed-498e-4660-a5cb-b2858aac6d22&state=AjdN1o6PmHlOEYyX&response_type=code+token&nonce=aoN1acO8YjrM9V53
0.269 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+email&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=9b8173ed-498e-4660-a5cb-b2858aac6d22&state=AjdN1o6PmHlOEYyX&response_type=code+token&nonce=aoN1acO8YjrM9V53
3.32 http args {}
3.491 response URL with fragment
3.492 response access_token=Uq-Vyev6OdwRFHL9sop6hmhPxdl10nbkL2btfY7I6QE.rgus_vuMw3s6OcwI5UyILRaUi_mXNahK76Aij4IX7Rc&code=agwk7zQGm33X-NxhcjcMCRx3uqk2IwvYQ7c7jZR5WKQ.2CDI-yujQ6fLxYUCpOllv0wTuBTl2I365wncjGfldFk&expires_in=3599&scope=openid%20email&state=AjdN1o6PmHlOEYyX&token_type=bearer
3.492 response {'scope': 'openid email', 'code': 'agwk7zQGm33X-NxhcjcMCRx3uqk2IwvYQ7c7jZR5WKQ.2CDI-yujQ6fLxYUCpOllv0wTuBTl2I365wncjGfldFk', 'access_token': 'Uq-Vyev6OdwRFHL9sop6hmhPxdl10nbkL2btfY7I6QE.rgus_vuMw3s6OcwI5UyILRaUi_mXNahK76Aij4IX7Rc', 'state': 'AjdN1o6PmHlOEYyX', 'expires_in': 3599, 'token_type': 'bearer'}
3.492 AuthorizationResponse {
"access_token": "Uq-Vyev6OdwRFHL9sop6hmhPxdl10nbkL2btfY7I6QE.rgus_vuMw3s6OcwI5UyILRaUi_mXNahK76Aij4IX7Rc",
"code": "agwk7zQGm33X-NxhcjcMCRx3uqk2IwvYQ7c7jZR5WKQ.2CDI-yujQ6fLxYUCpOllv0wTuBTl2I365wncjGfldFk",
"expires_in": 3599,
"scope": "openid email",
"state": "AjdN1o6PmHlOEYyX",
"token_type": "bearer"
}
3.493 phase <--<-- 4 --- AccessToken -->-->
3.493 --> request op_args: {'state': 'AjdN1o6PmHlOEYyX'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.493 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'AjdN1o6PmHlOEYyX', 'code': 'agwk7zQGm33X-NxhcjcMCRx3uqk2IwvYQ7c7jZR5WKQ.2CDI-yujQ6fLxYUCpOllv0wTuBTl2I365wncjGfldFk', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '9b8173ed-498e-4660-a5cb-b2858aac6d22'}, 'state': 'AjdN1o6PmHlOEYyX'}
3.493 AccessTokenRequest {
"code": "agwk7zQGm33X-NxhcjcMCRx3uqk2IwvYQ7c7jZR5WKQ.2CDI-yujQ6fLxYUCpOllv0wTuBTl2I365wncjGfldFk",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "AjdN1o6PmHlOEYyX"
}
3.493 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.493 request_http_args {'headers': {'Authorization': 'Basic OWI4MTczZWQtNDk4ZS00NjYwLWE1Y2ItYjI4NThhYWM2ZDIyOnNFU251ZzBtbWFkNA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
3.493 request code=agwk7zQGm33X-NxhcjcMCRx3uqk2IwvYQ7c7jZR5WKQ.2CDI-yujQ6fLxYUCpOllv0wTuBTl2I365wncjGfldFk&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=AjdN1o6PmHlOEYyX
3.705 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.707 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiMG5JYV9sSXN3bGNEbFlkbWVnajBiZyIsImF1ZCI6WyI5YjgxNzNlZC00OThlLTQ2NjAtYTVjYi1iMjg1OGFhYzZkMjIiXSwiYXV0aF90aW1lIjoxNTI5NzUyMTgwLCJjX2hhc2giOiJPdnViZHMzTnc4Q1RvMDZiRlk1V1JRIiwiZXhwIjoxNTI5NzU1ODU4LCJpYXQiOjE1Mjk3NTIyNTksImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjI5N2M4OGJkLTMxMzEtNGM0ZC1hN2FiLTI0ZDYzNmVkYzVhNSIsIm5vbmNlIjoiYW9OMWFjTzhZanJNOVY1MyIsInJhdCI6MTUyOTc1MjI1NSwic3ViIjoiZm9vQGJhci5jb20ifQ.p5VeVL7k4BUj_0AsmRGXtg_J67-N07QQH0ns4nP924NXTvkRUf2nEy0G9JFkQC9HbuGLWAPlxCfAS9721RAq9Kdk_mzmBF0HlQ_TxZ7pJ1i7b_vabkTnsrSxGo_go_HrgmHJfshFwqoB5Jw08R1J9Jso2tccBIuUuTAn3YYwd_vXkyuSGpTpOgKMm-l9zEjfDOm1qI3haPqhEeZEsi5qnaSnk06tIeqZTuSFefKfpXdW0IlgQMVFHBYFw1rmwaZ87pKfwE1IgiCc9qaIYgJh1JcWDONEhJiXR4JPQbJzf9AgGK5plJNHyQQOGFPL_axx7ZbkNh1w1GxbwSmosvjrnO7M9knbkDpkdRgMUW4iuv4YXYb-47oM_EG2yUrFUGtzt46_oksni33ifrZLDy7KtPpwc7Yey6YUo6OddSBgBcV4FS1ruGtNJmFbDYdf7tLuC1NPArtRiyEht4tISsjf5Hbz4AdtCf7Duhvv0b0JPcl-o4vtQIqsK-6AmH7bUaQxBsor6HXNoAM4RDG0J2S_JkArj3qipINyce9VdAYp1RultAvrBEjp5XgABKkOPubhc09SM8_CH8yPoCGTrCHE-znQXwvg8RVD_QDkFBr1kREYi7ypVcnN-3Exv-439k46vo9Vgv_dessAfhd0vmZhtFAiBbwAd27OyC2aBWHkxag', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': '71eJ3DMGvnuMKRCK0UWjrwGOA3tPEozhhCyPeJeinZ4.Boa7mK4jFFSTqI_u-V5qnvKDBI7Lpk3dt8GYy7TnYMs', 'scope': 'openid email'}
3.787 AccessTokenResponse {
"access_token": "71eJ3DMGvnuMKRCK0UWjrwGOA3tPEozhhCyPeJeinZ4.Boa7mK4jFFSTqI_u-V5qnvKDBI7Lpk3dt8GYy7TnYMs",
"expires_in": 3599,
"id_token": {
"at_hash": "0nIa_lIswlcDlYdmegj0bg",
"aud": [
"9b8173ed-498e-4660-a5cb-b2858aac6d22"
],
"auth_time": 1529752180,
"c_hash": "Ovubds3Nw8CTo06bFY5WRQ",
"exp": 1529755858,
"iat": 1529752259,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "297c88bd-3131-4c4d-a7ab-24d636edc5a5",
"nonce": "aoN1acO8YjrM9V53",
"rat": 1529752255,
"sub": "[email protected]"
},
"scope": "openid email",
"token_type": "bearer"
}
3.787 phase <--<-- 5 --- UserInfo -->-->
3.787 do_user_info_request kwargs:{'state': 'AjdN1o6PmHlOEYyX', 'method': 'GET', 'authn_method': 'bearer_header'}
3.787 request {'body': None}
3.787 request_url https://oidc-certification.ory.sh:8443/userinfo
3.787 request_http_args {'headers': {'Authorization': 'Bearer 71eJ3DMGvnuMKRCK0UWjrwGOA3tPEozhhCyPeJeinZ4.Boa7mK4jFFSTqI_u-V5qnvKDBI7Lpk3dt8GYy7TnYMs'}}
3.858 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
3.859 OpenIDSchema {
"sub": "[email protected]"
}
3.859 OpenIDSchema {
"sub": "[email protected]"
}
3.859 phase <--<-- 6 --- Done -->-->
3.859 end
3.859 assertion CheckHTTPResponse
3.859 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
3.86 assertion VerifyResponse
3.86 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.86 assertion VerifyScopes
3.86 condition verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['email', 'email_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
3.86 condition Done: status=OK
============================================================
Conditions
Check support: status=WARNING, message=No support for: scopes_supported=['email']
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['email', 'email_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
No support for: scopes_supported=['email']
The following claims were missing from the returned information: ['email', 'email_verified']
./OP-scope-phone.txt 0000644 0000000 0000000 00000027563 13313425310 014456 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-scope-phone
Test description: Scope requesting phone claims
Timestamp: 2018-06-23T11:11:04Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Registration -->-->
0.075 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.075 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#wrFk2ivysy3OvUOc"
],
"response_types": [
"code token"
]
}
0.233 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.234 RegistrationResponse {
"client_id": "c85a427b-7743-43e2-97ba-77f0b5ad87b5",
"client_secret": "8dgQSALrZgGQ",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "c85a427b-7743-43e2-97ba-77f0b5ad87b5",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#wrFk2ivysy3OvUOc"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.234 phase <--<-- 3 --- AsyncAuthn -->-->
0.234 condition Check support: status=WARNING, message=No support for: scopes_supported=['phone']
0.234 AuthorizationRequest {
"client_id": "c85a427b-7743-43e2-97ba-77f0b5ad87b5",
"nonce": "Y9GkrGpO3ZRyOMa8",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid phone",
"state": "M5KiwUVZ0oLxGfAn"
}
0.235 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+phone&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=c85a427b-7743-43e2-97ba-77f0b5ad87b5&state=M5KiwUVZ0oLxGfAn&response_type=code+token&nonce=Y9GkrGpO3ZRyOMa8
0.235 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+phone&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=c85a427b-7743-43e2-97ba-77f0b5ad87b5&state=M5KiwUVZ0oLxGfAn&response_type=code+token&nonce=Y9GkrGpO3ZRyOMa8
3.76 http args {}
3.925 response URL with fragment
3.925 response access_token=JZ4pLkyJ7u1BrDHUX_RZGb_CH59MpQaGoTThRVMtj1Q.PULJoWiqqWshIP0t5bFvyNTW_QOKSat1pTfxcBIXKEQ&code=uRNy08JYiORXuCasypMroiW8WatmJC-GVMrUb5FfcsY.OjquwJL_JSM3t3zYEOWj1_R7FnsBDc9ZXz9s9E13eE0&expires_in=3599&scope=openid%20phone&state=M5KiwUVZ0oLxGfAn&token_type=bearer
3.926 response {'scope': 'openid phone', 'code': 'uRNy08JYiORXuCasypMroiW8WatmJC-GVMrUb5FfcsY.OjquwJL_JSM3t3zYEOWj1_R7FnsBDc9ZXz9s9E13eE0', 'access_token': 'JZ4pLkyJ7u1BrDHUX_RZGb_CH59MpQaGoTThRVMtj1Q.PULJoWiqqWshIP0t5bFvyNTW_QOKSat1pTfxcBIXKEQ', 'state': 'M5KiwUVZ0oLxGfAn', 'expires_in': 3599, 'token_type': 'bearer'}
3.926 AuthorizationResponse {
"access_token": "JZ4pLkyJ7u1BrDHUX_RZGb_CH59MpQaGoTThRVMtj1Q.PULJoWiqqWshIP0t5bFvyNTW_QOKSat1pTfxcBIXKEQ",
"code": "uRNy08JYiORXuCasypMroiW8WatmJC-GVMrUb5FfcsY.OjquwJL_JSM3t3zYEOWj1_R7FnsBDc9ZXz9s9E13eE0",
"expires_in": 3599,
"scope": "openid phone",
"state": "M5KiwUVZ0oLxGfAn",
"token_type": "bearer"
}
3.926 phase <--<-- 4 --- AccessToken -->-->
3.926 --> request op_args: {'state': 'M5KiwUVZ0oLxGfAn'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.926 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'M5KiwUVZ0oLxGfAn', 'code': 'uRNy08JYiORXuCasypMroiW8WatmJC-GVMrUb5FfcsY.OjquwJL_JSM3t3zYEOWj1_R7FnsBDc9ZXz9s9E13eE0', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'c85a427b-7743-43e2-97ba-77f0b5ad87b5'}, 'state': 'M5KiwUVZ0oLxGfAn'}
3.927 AccessTokenRequest {
"code": "uRNy08JYiORXuCasypMroiW8WatmJC-GVMrUb5FfcsY.OjquwJL_JSM3t3zYEOWj1_R7FnsBDc9ZXz9s9E13eE0",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "M5KiwUVZ0oLxGfAn"
}
3.927 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.927 request_http_args {'headers': {'Authorization': 'Basic Yzg1YTQyN2ItNzc0My00M2UyLTk3YmEtNzdmMGI1YWQ4N2I1OjhkZ1FTQUxyWmdHUQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
3.927 request code=uRNy08JYiORXuCasypMroiW8WatmJC-GVMrUb5FfcsY.OjquwJL_JSM3t3zYEOWj1_R7FnsBDc9ZXz9s9E13eE0&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=M5KiwUVZ0oLxGfAn
4.143 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
4.144 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiTmdFSXU0RnIzNklvN1R2bGoyU2NSdyIsImF1ZCI6WyJjODVhNDI3Yi03NzQzLTQzZTItOTdiYS03N2YwYjVhZDg3YjUiXSwiYXV0aF90aW1lIjoxNTI5NzUyMTgwLCJjX2hhc2giOiJ1VjZ3MGo5S1RtTG93b2J4UzF1RDBBIiwiZXhwIjoxNTI5NzU1ODY0LCJpYXQiOjE1Mjk3NTIyNjQsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6Ijk0NDA2MzMyLThjZjktNGQwNi1hNDE3LWEwNTc5NjFiMjdjMyIsIm5vbmNlIjoiWTlHa3JHcE8zWlJ5T01hOCIsInJhdCI6MTUyOTc1MjI2MSwic3ViIjoiZm9vQGJhci5jb20ifQ.XxNNyGavlbp1oZhEsJGEUYpVUgKFZOo2I4ihJV_InYfDJE4q7l3dFV3KckGrKVruXOjWeOzNCYce4tD4otkv78wzr3N2i_VNaz17p9R84ATd5rLE09to8rQ4e40wjuEehLSx_tVFsKKFyVwhVKTGVxoCWdWblziN8mwJ2FStEjNMVhGElENyMCgEP3LHJCV_GRMcMuD9gpqZt6JX1Cw0Ht_OvKcc2ztkxq7oVsMgEIzvJrCpWpfZJZYKYKtdYwYTA35Uw2CBVXF1VsehECGzwdr_Qw5arz6ZPn6AjqIbbEZM35-wHSgZsyxhp6NpE4o8RQttH1PZ1WJIs8dgGRakvvbUWR0AYl3vEB3aAyA_ez1S6yQI1b4u7WnVxnFtDEX3VBlOJh5xqPFyK4-YdMMcDH2oKuJxunoJGtGHXG7HqMRx9_dqcCnfrd6D-Wm2M9UQYnSCs0U32eeAmCT_iCp2xxl1luEOXpBY75lSqVClk_RbC__1EaxZ29gocsfKuvecX-sHwPdoDtigNFm6j67qXlkrGPwdjxV35OyezBCyCF2K3rdzH_MTQr-9SEzJgM6-dWmKxcjz4XIzLXEY6v9AA_Pd4Q_dEK5nV_M62CqyL9Fjhgtz7PLZJcF_N5sBHPLIEi_cPwl0ed68eGOx3WjY2EU4asbpYE415RS64vZPRdw', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'iSkVeXC5xQT6Ba-U0Ah02K070-M9kPONrK9KCZp8v7U.NIhzAuggMIDOAxD89WRbxlFCbhUOu0x-9VhukFkG0II', 'scope': 'openid phone'}
4.223 AccessTokenResponse {
"access_token": "iSkVeXC5xQT6Ba-U0Ah02K070-M9kPONrK9KCZp8v7U.NIhzAuggMIDOAxD89WRbxlFCbhUOu0x-9VhukFkG0II",
"expires_in": 3599,
"id_token": {
"at_hash": "NgEIu4Fr36Io7Tvlj2ScRw",
"aud": [
"c85a427b-7743-43e2-97ba-77f0b5ad87b5"
],
"auth_time": 1529752180,
"c_hash": "uV6w0j9KTmLowobxS1uD0A",
"exp": 1529755864,
"iat": 1529752264,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "94406332-8cf9-4d06-a417-a057961b27c3",
"nonce": "Y9GkrGpO3ZRyOMa8",
"rat": 1529752261,
"sub": "[email protected]"
},
"scope": "openid phone",
"token_type": "bearer"
}
4.224 phase <--<-- 5 --- UserInfo -->-->
4.224 do_user_info_request kwargs:{'state': 'M5KiwUVZ0oLxGfAn', 'method': 'GET', 'authn_method': 'bearer_header'}
4.224 request {'body': None}
4.224 request_url https://oidc-certification.ory.sh:8443/userinfo
4.224 request_http_args {'headers': {'Authorization': 'Bearer iSkVeXC5xQT6Ba-U0Ah02K070-M9kPONrK9KCZp8v7U.NIhzAuggMIDOAxD89WRbxlFCbhUOu0x-9VhukFkG0II'}}
4.298 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
4.299 OpenIDSchema {
"sub": "[email protected]"
}
4.299 OpenIDSchema {
"sub": "[email protected]"
}
4.299 phase <--<-- 6 --- Done -->-->
4.299 end
4.299 assertion CheckHTTPResponse
4.299 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
4.3 assertion VerifyResponse
4.3 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.3 assertion VerifyScopes
4.3 condition verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['phone_number', 'phone_number_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
4.3 condition Done: status=OK
============================================================
Conditions
Check support: status=WARNING, message=No support for: scopes_supported=['phone']
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['phone_number', 'phone_number_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
No support for: scopes_supported=['phone']
The following claims were missing from the returned information: ['phone_number', 'phone_number_verified']
./OP-Discovery-jwks_uri.txt 0000644 0000000 0000000 00000021424 13313424665 016042 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Discovery-jwks_uri
Test description: Verify that jwks_uri is published
Timestamp: 2018-06-23T11:06:29Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.074 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Done -->-->
0.076 end
0.076 assertion CheckHTTPResponse
0.076 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.076 assertion BareKeys
0.158 http response url:https://oidc-certification.ory.sh:8443/.well-known/jwks.json status_code:200
0.158 jwks {'keys': [{'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': 'spxcDzycfjLukN1KJCopwI6s4bPjlQbA-fDA0qn4ntd-nCPieqq6KdXkpCtthr0jPhg6_NKHpL9CWTqJBCyaVvtgZbw1Q2saRXIyCxnYMlw8akMnYLtSsDVrJRmQMH5NTASnIbx0G_J6pZ6OvQ30c2q8xRkOOwgtGn6E85oNrdf_wbuklksIERzxsoZKpjamgxOKZsssz0x6v0mm0RFOTEPD20eOVUqRPhskBtY7W-swCavX5YVy7PYd14dJ7iiHNn4npe2XZLIwSC-zWts7z_N7RChaQYQCQk6e5q19G6DJMSYZOhsg98P8j4XpfD3m7uutGjSYURIVI2XYFv7EWTwGR_RD8QljM6f5s_JPy3A6_BE6zMgi95D6QB5NJUbQ615hBgYprf6lW-vTc6psER_4NjChA_F10eYFEkroDTO014qhGPm9xe--krH4vksfLwnv-_AsUJUg8nMiDmldrvMU4s8JMlEjTYy99zzhXgqQTRU_w_2C4-UKb0PZQi5IeKPqMygtGs7nqgN_rv1lpcWJ2YZ6VEFPnsSnHU7pMxBA04GeSAs6614FMATjWJW5o080_AFnggQRcHouSFTClvP5dUVC_OGJPFbRblHHPlJibXebdTJRX5jxB6o7KQjw7ua3dW3CfGoizS3iLJgQYENJLMDwUY1rjg37Kwm8JE0', 'alg': 'RS256', 'kid': 'public:5198db5b-878c-4635-a538-e627f98de93e'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': '1Kpv-wv6THhBggBy2793qierg_NDRod7pAT__caxzRd6OF9FmHgzklU2d03RqHris7y0freA7RGhmIZEAyPe-C4-O-hhjw3Afk3rp_UaG1wMbgVKStujOdrcobrO6_hLOoSY7lITA-BYqFl9R5DmBoCw9_C5DEsHYL82c_FD03qVBE2rB6rHLaE03j0coHbZn1yB-RzbQqABkafhxWIUADdQ_YqxE588UzjEDRyxm_QviKoUsfSjlu0R9OMwBeX3uHnUP8tkscmMVOctAktPqzxGlfzaorgvfVWDaSUzYvGHxUdkcloUwqrAeCW_MKRmUcUblYQV_xI7QGjXQK4scTWlt4bthHiZ5fYcWt2CFozBi9V9MjKdDejDuLDDPdGlgNLVAnbUp8OqB3w8eFUycni70qp5KrUa1ooG6Bzs4qxuAD7I7D-9NS9VVhRGDBynUtgUHlBWX908ndXNfrZGnfHUyiSyZGNwy2c6xXbH_F7N09Zu9jTDFQazj85B9fVVXZ-63kfCXeuRhRm5oqYoGCLSgs71f3qnqipu2zPukehGWRt3zqf8NWyNOJxnkwW_D9111MpcrRAyhn3cOzHML6rN4nTA-sdq-9bJNMaxr-WJtawuxQtwVMmQCRHOXuFxP0ZPSVjH0zq2Y3paujalyMGpDIJlvTcP4TT3pmnpJ80', 'alg': 'RS256', 'kid': 'public:e272a755-7ae2-490e-82f5-62e0678641b0'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': '16vFo3VXLypUERl1fqAWJEysIgKnJ15eEnc-5LOiFx7jK2L0zDKtj7q6ySr6rdwmgFjaV1vfG-VKmLHPMD_YuazQeb86blkDnUfNQvHfNID0g-U2G-xeLCqfdl54jzx5NAhMV6BVCUTOwsiUt3dgBaNWGJENo4gU0KGr0S2xEU38sJGUz3zROL6gOmUwqlSAk3YClnhyYYof0tj4j0dW7mXK7MaQ4CRAhq5rJq_VRrMCc4JiD7kAN104V5BmNU409uF4InE2Stugw8RSH4hXeBFp-dXtzQi6qmBLsnHd16_WEce76IxvthFnePqa3XMNg9G4-AJ36RVbH4IhMioQgvgHWGXR276pH1Vyga7V0dSakg8ohSD2vBD5OmlYquJ6krJ3uWUCez59YUeNEgOexn5XaBL0ZEnTQ-zNNHX39QZz9QaU2lftGhknRufg68bmshLWgXJexJS1ht1vFccFcmvpnYEnCTwKzo0kjlcY7IiBpWgJ1f4r1PTIKuh8CluNkitsbABcVx3-FOAhA4CMrQovAaNL_jfp6wKBA9Qy0W9LkESVsRQWFUSpQu_z4pJMOVfjbwJOsquxKwXphI2h1VczR-Hh8rTX7D2GL_4-GyG2nHfpF3jVq7raKnyGxJA8ZIK9kPh0JlQhR2FcBhFOWjvusFjoZ09Po6XtvWlP82E', 'alg': 'RS256', 'kid': 'public:0acf6c64-4d55-4888-abb9-b2a3f661ee7f'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': '0vvbIEitFVzY4o12elAZbZvpja5xTm5AOh9wi2UEiPEL6aKxAUn1ywpUaLyWKuEXdeuykHyybniLaThik7Gf-6xKk6S9IK9tjbbwfRqHVkn_Xkyul0ohFI3iTcjvFq5FPGr5vEhSB6eckdngUpzb-7S_Kt8yunkdhYTmkuAr2AXSbQcmCbOJXOsvkc5LOwpjmFIWrtBAHwILJ5cHjzIHtkK2QKMJRlknD8b4kmQ3x6vfxA7mtXREUXdQFn7ssnOVPzriPQp4kIi_TMczSmRLlX1PeeOeDGpTnYywQbsAfdBGZ20WdZlwP3lRUUJoKv1GpBU51GKm2xhHtyrzOkiRKE8pH_PD05gh1G9qXbFtBOoHMBWEaCxoxyJcW8_9iLXBPoC-Jhm47VO5T9hPlaISzDY6EUmgYktejS_mx_bR7emBcbtFUccYSVVqT3EZqAFuQlsPsvj8AT9NmEiVncB2Cy4z7ofLX_Wai_VFPCf7AEfmDZ8mzFZQfVGct74Q9KybwXm8YDq0TSszQGuqT0gtvU9In7CPSOytrVDbdk8Peyeg-Wn_ACMRh5T23wUbQ0jy0Wi9kBwIzN-dUpKu3uL6EZ3PmPSZItQHeAxpQbRZJ1vrrd2y-b6EGun3G9rlnOZ3L4_L4-NOKLt4VGPie7sphlND1pc4ZipaXBjZ9uC3bS8', 'alg': 'RS256', 'kid': 'public:490968e8-c6e5-441e-b42e-5053d6c67af2'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': '0WN9e_V2wEp33JZoN7zQ9J4E4Iz0l-dlx6GqIKdepcMjON3PKZHWFML1e0ZKAkuG2ZJRKoX1LaSNZT0NI9N6_wVAT9aNv53sHBJVC4Bww1zKHEvQseGwJbG0lZZHjDXaxCBPte9yQnquIRRp9Ab-uBeziRoaFQ02OV3LBMBSZ79AzFvZ4yTqpUS_xp-Ylfcmh5wXEppd6hoxs9h1tttPTPbnMLte3S_zxCZI4TQi8d1yBi39OvfZxtABQQbgqYPxiYehNdYbfmZ2CAmVlsTxByS3X-ANBe2nmLsOLgXTyVFZfvEZkzY7OgEwwq5zog5pScXJ-TGlj0guZd8nClHEV-GHvXonjb2hZB63dFEiUVMNh5cOblZX034GnlOkzYfAH8UZ_cvOqONHbvplzONuaYSSRMPRaZwj-0fpElhFNHwr1v1pqbE1i9XOxU_c-eSMr4XAm1VsWG3zJKymjoJmaDcW3AEawi3btL1N2tE3p27cHtcdFjcv5birnxMtPI9Vu806U0_WiGtH_kaWxz64Xk3A_yB-lIBQwXe61JME-K81wLLcHE9qoqpF5iUK4mDqMmI_DVIazUlVUzxY0-1iFkV790V95dBxeYFgXKX02g8NyxfnyzUDC12qUKKejJFbG5LPHaMUXWJIQ2ntwBX_XzeF4pGh0u0vYmfxAmfHWN0', 'alg': 'RS256', 'kid': 'public:a09f73cf-d685-4c5c-9312-60a13e57646f'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': 's_BEnyG0xHYDibtz9a4tE1IW8490BQ_z526Lg2d0PWRtHfcqKmPG0pd0DizPuLY2j1NAY4cCXLwNWMJ3Cp1TqddaMl08hElvNbilcTyQr96RQg9MnrWeR1EqpdXEzTjcx06DFDokvzs89YQVZTDzSh_-xY_m_0VkcFQ0RpDTBn1B0dkMh78dbTJVVSGXYSBgMpcKrGlrgDaPIRX7qp_SdvjNtkPStG_wCPkzd_IJAaTAHGrlyj27dyhOC6EqQjpZRhQvT-w7GalbObncCFox3hRiC8wbI9Toi5p7vEuJJ6yksaqtIwgbtPXXUChNTqwQgIc1RE8RVuhI8ExaT6FfStIVLq9Tow6Hd9mopdX_ydEHHbnbvSC0cCRPg8_G8zTk0ihFpiHE1yEDXBQSs6pZIQ8KZF2RG35j75Jh4ngsDyPbC7PmjE93SG25AkX0WZwoB3g8f6q2r4dZqNtemRX1lMDo0FUQyYcOU5mnOiW3E5oNs3g-VH5ISOiaSUSLX6AIxDfdk6Wj5t7FZUo4EcIwTnE3PI-0HxnLJaErwbYEX0hO1BuhfF7zYHxDjc085U7OyN0abZWbuVUMtIMRgq-4ASlM9fTECg3sMmOfTEJV9nrJZaSCxKvVWma9A01bvBPB6Qn92Gj1XNZ0E1RBLUp1V3iXLcS7MGJh7bAAk5kwKCM', 'alg': 'RS256', 'kid': 'public:8e8dab73-c9fe-42ef-9a7b-1e217abba9a9'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': '3cQ2ihjoElfFVnnkleo6ioUvZrkDfddEKOMCaemXP7umEhr8TC9_L3BKYbJqtE15jvkJiqT1vlHgTOKD5wWCFhFSmEa9PAWlt9Hw6BWddFEsiijR113yvj4eT0qfjseMYyiKst0kBxiTRmQdIzllY2Y2UU1IYIkaAP009nZSR7a5IrPYFydZ6SRARk9kZI90fmgRnzUuQKcv7C9HbkUqs7qiApfA17ACpnuKQP5p5lGL41t5ZnU1-5FvmmO6NnwtRZif34HL6WYuksi2RleLAKoHGh_l6P6ygP5v3ucHH0TmdLVBAHMmlLW4BKdVnWa2HEQCKIBiXJztu8EpYCVpZ_ThCaZLagcUM6VCD4nqvsXzQB7pnsBjq75tbo2jlqrGQJE9ekfGVyw7XDN45IkJFLgfVJ2anpyK4NeIAbkB7ZCYSXbR96_EC6h0uZSMHtPYVNIvbRCK6ysCdlDuDsWiQ01tP-lp90eWj1d7ZYlaYNws12OauBfgLyn0NZvjIz5EYXbOO_Hi0P5U6znS1Um-lU0nB1Gsj685Io-KLzN0shOqkfDP8Xcjfx_3EEg0aEPJWqCjiP9K6veNI896ZrIrH6Sd0V_o4TIzpSJimZlMZrTWS6dUm2j6q1WQOE2Z5JlDMC90yTGUC8MNt2AdMB0Z78Mf71rdSrpXpWLMh7rz_7k', 'alg': 'RS256', 'kid': 'public:6a09d4a3-a298-47bc-8bbd-50b64f653f2d'}]}
0.158 condition bare-keys: status=OK [Dynamic OPs MUST publish their public keys as bare JWK keys]
0.158 assertion CheckHasJwksURI
0.158 condition providerinfo-has-jwks_uri: status=OK [Check that the jwks_uri discovery metadata value is in the provider_info]
0.158 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
bare-keys: status=OK [Dynamic OPs MUST publish their public keys as bare JWK keys]
providerinfo-has-jwks_uri: status=OK [Check that the jwks_uri discovery metadata value is in the provider_info]
Done: status=OK
============================================================
RESULT: PASSED
./OP-request_uri-Sig.txt 0000644 0000000 0000000 00000016442 13313425254 015326 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-request_uri-Sig
Test description: Support request_uri request parameter with signed request
Timestamp: 2018-06-23T11:10:36Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.098 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.1 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.1 phase <--<-- 2 --- Registration -->-->
0.1 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'request_object_signing_alg': 'RS256'}
0.1 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "RS256",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#h2tAmKmNtbE4nrmn"
],
"response_types": [
"code token"
]
}
0.254 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.255 RegistrationResponse {
"client_id": "8534fa6a-196b-4be0-8b6d-1da3fc1d3f74",
"client_secret": "9CPgyFjHjgXu",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "8534fa6a-196b-4be0-8b6d-1da3fc1d3f74",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "RS256",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#h2tAmKmNtbE4nrmn"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.255 phase <--<-- 3 --- AsyncAuthn -->-->
0.259 AuthorizationRequest {
"client_id": "8534fa6a-196b-4be0-8b6d-1da3fc1d3f74",
"nonce": "JEN4PRR0gzcU2vS7",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"request_uri": "https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#h2tAmKmNtbE4nrmn",
"response_type": "code token",
"scope": "openid",
"state": "Jar60VVZJBamNOLt"
}
0.259 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?request_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Frequests%2Fe3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9%23h2tAmKmNtbE4nrmn&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=8534fa6a-196b-4be0-8b6d-1da3fc1d3f74&state=Jar60VVZJBamNOLt&response_type=code+token&nonce=JEN4PRR0gzcU2vS7
0.26 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?request_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Frequests%2Fe3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9%23h2tAmKmNtbE4nrmn&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=8534fa6a-196b-4be0-8b6d-1da3fc1d3f74&state=Jar60VVZJBamNOLt&response_type=code+token&nonce=JEN4PRR0gzcU2vS7
4.12 http args {}
4.286 response URL with fragment
4.286 response access_token=1QOdyIPh4a8RMINcQxMOELfQvctByaWnXUXZtsVJvKU.RaRrrZEoraFjSEueATlhfdfwHaZ61Q57ZyuukI-DnwY&code=7MjG66jJ-hwVNZv-19LKPERoG9UYwE4HMDMrkJ0wWgg.FjJGyViKcUFPxyQvgmJJkRaaqyd0luW8-Pu0uidxjIM&expires_in=3599&scope=openid&state=Jar60VVZJBamNOLt&token_type=bearer
4.287 response {'scope': 'openid', 'code': '7MjG66jJ-hwVNZv-19LKPERoG9UYwE4HMDMrkJ0wWgg.FjJGyViKcUFPxyQvgmJJkRaaqyd0luW8-Pu0uidxjIM', 'access_token': '1QOdyIPh4a8RMINcQxMOELfQvctByaWnXUXZtsVJvKU.RaRrrZEoraFjSEueATlhfdfwHaZ61Q57ZyuukI-DnwY', 'state': 'Jar60VVZJBamNOLt', 'expires_in': 3599, 'token_type': 'bearer'}
4.287 AuthorizationResponse {
"access_token": "1QOdyIPh4a8RMINcQxMOELfQvctByaWnXUXZtsVJvKU.RaRrrZEoraFjSEueATlhfdfwHaZ61Q57ZyuukI-DnwY",
"code": "7MjG66jJ-hwVNZv-19LKPERoG9UYwE4HMDMrkJ0wWgg.FjJGyViKcUFPxyQvgmJJkRaaqyd0luW8-Pu0uidxjIM",
"expires_in": 3599,
"scope": "openid",
"state": "Jar60VVZJBamNOLt",
"token_type": "bearer"
}
4.287 phase <--<-- 4 --- Done -->-->
4.287 end
4.288 assertion VerifyAuthnOrErrorResponse
4.288 condition authn-response-or-error: status=OK [Checks that the last response was a JSON encoded authentication or error message]
4.288 condition Done: status=OK
============================================================
Conditions
authn-response-or-error: status=OK [Checks that the last response was a JSON encoded authentication or error message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-OAuth-2nd-30s.txt 0000644 0000000 0000000 00000032156 13313425560 014343 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-OAuth-2nd-30s
Test description: Trying to use authorization code twice with 30 seconds in between uses must result in an error
Timestamp: 2018-06-23T11:13:52Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.252 phase <--<-- 1 --- Webfinger -->-->
1.252 not expected to do WebFinger
1.252 phase <--<-- 2 --- Discovery -->-->
1.252 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.36 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.361 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.361 phase <--<-- 3 --- Registration -->-->
1.362 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.362 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#kb6WL7hKEbvVio6r"
],
"response_types": [
"code token"
]
}
1.519 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.52 RegistrationResponse {
"client_id": "cef74664-dc43-432c-a3d2-6c6fb7513308",
"client_secret": "APB88CzhP.QF",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "cef74664-dc43-432c-a3d2-6c6fb7513308",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#kb6WL7hKEbvVio6r"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.52 phase <--<-- 4 --- AsyncAuthn -->-->
1.521 AuthorizationRequest {
"client_id": "cef74664-dc43-432c-a3d2-6c6fb7513308",
"nonce": "RaeLXcfjTaIsmeIg",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "zf92pM1RToLEe9KS"
}
1.521 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=cef74664-dc43-432c-a3d2-6c6fb7513308&state=zf92pM1RToLEe9KS&response_type=code+token&nonce=RaeLXcfjTaIsmeIg
1.521 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=cef74664-dc43-432c-a3d2-6c6fb7513308&state=zf92pM1RToLEe9KS&response_type=code+token&nonce=RaeLXcfjTaIsmeIg
4.603 http args {}
4.771 response URL with fragment
4.771 response access_token=RereK80v103elsUvzT7LXHul3RDmDhZ1pIbxJ6fomGs.wxrMoFyTmugjNRm_1n7BP8HvZS9s0NFj3jgeSSy9n_s&code=9Ck4767MTXSfcN_bEKGwgtC8myCtMuSUXvaZksa1Z5I.CpkrBguCSNOpbbBrEyTjtJVhrilPcl3cZik9ZW8zBV4&expires_in=3599&scope=openid&state=zf92pM1RToLEe9KS&token_type=bearer
4.772 response {'scope': 'openid', 'code': '9Ck4767MTXSfcN_bEKGwgtC8myCtMuSUXvaZksa1Z5I.CpkrBguCSNOpbbBrEyTjtJVhrilPcl3cZik9ZW8zBV4', 'access_token': 'RereK80v103elsUvzT7LXHul3RDmDhZ1pIbxJ6fomGs.wxrMoFyTmugjNRm_1n7BP8HvZS9s0NFj3jgeSSy9n_s', 'state': 'zf92pM1RToLEe9KS', 'expires_in': 3599, 'token_type': 'bearer'}
4.772 AuthorizationResponse {
"access_token": "RereK80v103elsUvzT7LXHul3RDmDhZ1pIbxJ6fomGs.wxrMoFyTmugjNRm_1n7BP8HvZS9s0NFj3jgeSSy9n_s",
"code": "9Ck4767MTXSfcN_bEKGwgtC8myCtMuSUXvaZksa1Z5I.CpkrBguCSNOpbbBrEyTjtJVhrilPcl3cZik9ZW8zBV4",
"expires_in": 3599,
"scope": "openid",
"state": "zf92pM1RToLEe9KS",
"token_type": "bearer"
}
4.772 phase <--<-- 5 --- AccessToken -->-->
4.773 --> request op_args: {'state': 'zf92pM1RToLEe9KS'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
4.773 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'zf92pM1RToLEe9KS', 'code': '9Ck4767MTXSfcN_bEKGwgtC8myCtMuSUXvaZksa1Z5I.CpkrBguCSNOpbbBrEyTjtJVhrilPcl3cZik9ZW8zBV4', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'cef74664-dc43-432c-a3d2-6c6fb7513308'}, 'state': 'zf92pM1RToLEe9KS'}
4.773 AccessTokenRequest {
"code": "9Ck4767MTXSfcN_bEKGwgtC8myCtMuSUXvaZksa1Z5I.CpkrBguCSNOpbbBrEyTjtJVhrilPcl3cZik9ZW8zBV4",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "zf92pM1RToLEe9KS"
}
4.773 request_url https://oidc-certification.ory.sh:8443/oauth2/token
4.773 request_http_args {'headers': {'Authorization': 'Basic Y2VmNzQ2NjQtZGM0My00MzJjLWEzZDItNmM2ZmI3NTEzMzA4OkFQQjg4Q3poUC5RRg==', 'Content-Type': 'application/x-www-form-urlencoded'}}
4.773 request code=9Ck4767MTXSfcN_bEKGwgtC8myCtMuSUXvaZksa1Z5I.CpkrBguCSNOpbbBrEyTjtJVhrilPcl3cZik9ZW8zBV4&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=zf92pM1RToLEe9KS
5.039 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
5.04 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoibUFXVzJtNGxnVWxXQ0ctRXFobHVkZyIsImF1ZCI6WyJjZWY3NDY2NC1kYzQzLTQzMmMtYTNkMi02YzZmYjc1MTMzMDgiXSwiYXV0aF90aW1lIjoxNTI5NzUyMzcxLCJjX2hhc2giOiJjcndSQ2hLSE1mVE9RaHRneHRkNEJnIiwiZXhwIjoxNTI5NzU2MDAxLCJpYXQiOjE1Mjk3NTI0MDIsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjhiOTJmNjY5LTEzYWMtNDFhOS1iY2FlLTA4NDk2YTNjMjcxMiIsIm5vbmNlIjoiUmFlTFhjZmpUYUlzbWVJZyIsInJhdCI6MTUyOTc1MjM5OCwic3ViIjoiZm9vQGJhci5jb20ifQ.YOfjjcNkpuBO8RMLv1kYSNblPu9KyNdeamMKDxsmaHMGtSROtWT7PTG4uKp2zw5TduFIFC-z5Gc41oNwdq4mY21OP1M4VK3o0ThBe7jGEcmP42RgWDuShTmJ2kyO40DYVpB4wCsCPjeKBezgLcBlqLHvXic3sMoFLgrSvzzVj4indEbIGFJ0RhVeGdNPZ1s3w6YoWHUSt0xZnhhbC4OvmidWAQJvFkD5Q5MeKCImnkslofArULTdskRhf9kwCLU1Q6-nvRBnO8wXw-o0Wea9jy9EDU7zz0oRUy3tEgJMgoKa_wltDj-2Z-8iYMW_S7qYTjX7JrEAuj8uGfHCbMbBvpbSqzqjc76MVyQKd3FDAqsmWqLzLj5Csuv004H8MHvsqa7DGKOhpODgXU9OL1l_c2lHqylr7-NVgrtFkc8EiIq3iIzhqwDUcb-ZWT_RE67Dqb1hiOFBj3wOCj7Zv1zZuFeeT5K2fPdFHEdoickhl1UtMvvuzF4haoCkOmc_Alx-H6-ZtvrGov6E_BK_JiUsoSmdDiPXzzr0npX1TePXIDfS_AcoHZzkwlCp2X_TIuwwYfyFlry2nCgeSl3JVPo97Us27i9VUS4mLUJROvenDxnA1_ebmBC0LXU49VnhCTKBZ3G4z5o8tmC8AVKD4_G178Mm5_ReZ0hEmo0dKY0msr8', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'zx1RrBlt-Ye-nqkJvz76ojOHOHGuF-5j01rWB3H2-4U.uYMdKxk25XjXuDaQim2it91DBYYC6Tz8jn_UdSqC7Y0', 'scope': 'openid'}
5.119 AccessTokenResponse {
"access_token": "zx1RrBlt-Ye-nqkJvz76ojOHOHGuF-5j01rWB3H2-4U.uYMdKxk25XjXuDaQim2it91DBYYC6Tz8jn_UdSqC7Y0",
"expires_in": 3599,
"id_token": {
"at_hash": "mAWW2m4lgUlWCG-Eqhludg",
"aud": [
"cef74664-dc43-432c-a3d2-6c6fb7513308"
],
"auth_time": 1529752371,
"c_hash": "crwRChKHMfTOQhtgxtd4Bg",
"exp": 1529756001,
"iat": 1529752402,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "8b92f669-13ac-41a9-bcae-08496a3c2712",
"nonce": "RaeLXcfjTaIsmeIg",
"rat": 1529752398,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
5.119 phase <--<-- 6 --- TimeDelay -->-->
35.149 phase <--<-- 7 --- AccessToken -->-->
35.149 --> request op_args: {'state': 'zf92pM1RToLEe9KS'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
35.149 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'zf92pM1RToLEe9KS', 'code': '9Ck4767MTXSfcN_bEKGwgtC8myCtMuSUXvaZksa1Z5I.CpkrBguCSNOpbbBrEyTjtJVhrilPcl3cZik9ZW8zBV4', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'cef74664-dc43-432c-a3d2-6c6fb7513308'}, 'state': 'zf92pM1RToLEe9KS'}
35.149 AccessTokenRequest {
"code": "9Ck4767MTXSfcN_bEKGwgtC8myCtMuSUXvaZksa1Z5I.CpkrBguCSNOpbbBrEyTjtJVhrilPcl3cZik9ZW8zBV4",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "zf92pM1RToLEe9KS"
}
35.149 request_url https://oidc-certification.ory.sh:8443/oauth2/token
35.149 request_http_args {'headers': {'Authorization': 'Basic Y2VmNzQ2NjQtZGM0My00MzJjLWEzZDItNmM2ZmI3NTEzMzA4OkFQQjg4Q3poUC5RRg==', 'Content-Type': 'application/x-www-form-urlencoded'}}
35.149 request code=9Ck4767MTXSfcN_bEKGwgtC8myCtMuSUXvaZksa1Z5I.CpkrBguCSNOpbbBrEyTjtJVhrilPcl3cZik9ZW8zBV4&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=zf92pM1RToLEe9KS
35.363 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:400 message:{"error":"invalid_grant","error_description":"The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client","status_code":400,"error_debug":"The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found."}
35.363 response {'error_debug': 'The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found.', 'error_description': 'The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client', 'error': 'invalid_grant', 'status_code': 400}
35.363 event Got expected error
35.364 TokenErrorResponse {
"error": "invalid_grant",
"error_debug": "The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found.",
"error_description": "The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client",
"status_code": 400
}
35.364 phase <--<-- 8 --- Done -->-->
35.364 end
35.364 assertion VerifyResponse
35.364 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
35.364 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Registration-policy_uri.txt 0000644 0000000 0000000 00000015701 13313424715 017063 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-policy_uri
Test description: Registration with policy_uri
Timestamp: 2018-06-23T11:06:53Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.048 phase <--<-- 1 --- Webfinger -->-->
1.048 not expected to do WebFinger
1.048 phase <--<-- 2 --- Discovery -->-->
1.049 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.121 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.123 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.123 phase <--<-- 3 --- Registration -->-->
1.123 register kwargs:{'application_name': 'OIC test tool', 'policy_uri': 'https://op.certification.openid.net:61353/static/policy.html', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.123 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"policy_uri": "https://op.certification.openid.net:61353/static/policy.html",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#hfEHDDZZ1b6gDAfd"
],
"response_types": [
"code token"
]
}
1.281 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.282 RegistrationResponse {
"client_id": "bf9b1be8-13cf-490c-a5a2-d64d9b202ed4",
"client_secret": "BG4GsvYESIqt",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "bf9b1be8-13cf-490c-a5a2-d64d9b202ed4",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"policy_uri": "https://op.certification.openid.net:61353/static/policy.html",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#hfEHDDZZ1b6gDAfd"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.282 phase <--<-- 4 --- AsyncAuthn -->-->
1.283 AuthorizationRequest {
"client_id": "bf9b1be8-13cf-490c-a5a2-d64d9b202ed4",
"nonce": "zq6NTRsMVKVPYNPv",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "GiKQugcVSxAe6YOF"
}
1.283 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=bf9b1be8-13cf-490c-a5a2-d64d9b202ed4&state=GiKQugcVSxAe6YOF&response_type=code+token&nonce=zq6NTRsMVKVPYNPv
1.283 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=bf9b1be8-13cf-490c-a5a2-d64d9b202ed4&state=GiKQugcVSxAe6YOF&response_type=code+token&nonce=zq6NTRsMVKVPYNPv
3.773 http args {}
3.983 response URL with fragment
3.984 response access_token=PCzWm46XW0fQ79PiwgOlCEy-kuKRyfU4q6zrOZIlQ3o.-0KyptYMWid68nYu1dGSvRt1QzslNDeletsG5BjkL8w&code=eQCEPmffioMnVWneprpRPrs5yR1b3GfYbS7GAexfYqs.2X6DDK3-Z2SjztALgiGP5n-5uy79GSq1XOHz4N8rNto&expires_in=3599&scope=openid&state=GiKQugcVSxAe6YOF&token_type=bearer
3.984 response {'scope': 'openid', 'code': 'eQCEPmffioMnVWneprpRPrs5yR1b3GfYbS7GAexfYqs.2X6DDK3-Z2SjztALgiGP5n-5uy79GSq1XOHz4N8rNto', 'access_token': 'PCzWm46XW0fQ79PiwgOlCEy-kuKRyfU4q6zrOZIlQ3o.-0KyptYMWid68nYu1dGSvRt1QzslNDeletsG5BjkL8w', 'state': 'GiKQugcVSxAe6YOF', 'expires_in': 3599, 'token_type': 'bearer'}
3.984 AuthorizationResponse {
"access_token": "PCzWm46XW0fQ79PiwgOlCEy-kuKRyfU4q6zrOZIlQ3o.-0KyptYMWid68nYu1dGSvRt1QzslNDeletsG5BjkL8w",
"code": "eQCEPmffioMnVWneprpRPrs5yR1b3GfYbS7GAexfYqs.2X6DDK3-Z2SjztALgiGP5n-5uy79GSq1XOHz4N8rNto",
"expires_in": 3599,
"scope": "openid",
"state": "GiKQugcVSxAe6YOF",
"token_type": "bearer"
}
3.985 phase <--<-- 5 --- Done -->-->
3.985 end
3.985 assertion VerifyAuthnResponse
3.985 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
3.985 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-claims-essential.txt 0000644 0000000 0000000 00000026723 13313425064 015476 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-claims-essential
Test description: Claims request with essential name claim
Timestamp: 2018-06-23T11:08:37Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.082 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.083 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.083 phase <--<-- 2 --- Registration -->-->
0.083 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.084 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#3vvDQrQPZC4vUhJg"
],
"response_types": [
"code token"
]
}
0.242 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.242 RegistrationResponse {
"client_id": "8724edc2-dcf3-43ac-a609-9dbfaaaf3d70",
"client_secret": "KQDALCc9FRUt",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "8724edc2-dcf3-43ac-a609-9dbfaaaf3d70",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#3vvDQrQPZC4vUhJg"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.243 phase <--<-- 3 --- AsyncAuthn -->-->
0.243 AuthorizationRequest {
"claims": {
"userinfo": {
"name": {
"essential": true
}
}
},
"client_id": "8724edc2-dcf3-43ac-a609-9dbfaaaf3d70",
"nonce": "kf8emIvj9SmNuvxB",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "0Yuh6P7OEuKaDMz2"
}
0.244 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=8724edc2-dcf3-43ac-a609-9dbfaaaf3d70&claims=%7B%22userinfo%22%3A+%7B%22name%22%3A+%7B%22essential%22%3A+true%7D%7D%7D&state=0Yuh6P7OEuKaDMz2&response_type=code+token&nonce=kf8emIvj9SmNuvxB
0.244 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=8724edc2-dcf3-43ac-a609-9dbfaaaf3d70&claims=%7B%22userinfo%22%3A+%7B%22name%22%3A+%7B%22essential%22%3A+true%7D%7D%7D&state=0Yuh6P7OEuKaDMz2&response_type=code+token&nonce=kf8emIvj9SmNuvxB
2.897 http args {}
3.098 response URL with fragment
3.098 response access_token=rNwpzhgSt9pYR8dI3zpDKTKsS0crXrCaIJthGBddnPg.XxE4awsYB-w69P8hWnucB1sxUvKbIniRRM4npfPgy3Y&code=wbGYimmVmQnZ9DC6m4_OjZRAnNpVuy8TSuniEvkYeC8.PYSsmkXdn0yealyj6pFvBcQFiw79besufo5oolzbHys&expires_in=3599&scope=openid&state=0Yuh6P7OEuKaDMz2&token_type=bearer
3.099 response {'scope': 'openid', 'code': 'wbGYimmVmQnZ9DC6m4_OjZRAnNpVuy8TSuniEvkYeC8.PYSsmkXdn0yealyj6pFvBcQFiw79besufo5oolzbHys', 'access_token': 'rNwpzhgSt9pYR8dI3zpDKTKsS0crXrCaIJthGBddnPg.XxE4awsYB-w69P8hWnucB1sxUvKbIniRRM4npfPgy3Y', 'state': '0Yuh6P7OEuKaDMz2', 'expires_in': 3599, 'token_type': 'bearer'}
3.099 AuthorizationResponse {
"access_token": "rNwpzhgSt9pYR8dI3zpDKTKsS0crXrCaIJthGBddnPg.XxE4awsYB-w69P8hWnucB1sxUvKbIniRRM4npfPgy3Y",
"code": "wbGYimmVmQnZ9DC6m4_OjZRAnNpVuy8TSuniEvkYeC8.PYSsmkXdn0yealyj6pFvBcQFiw79besufo5oolzbHys",
"expires_in": 3599,
"scope": "openid",
"state": "0Yuh6P7OEuKaDMz2",
"token_type": "bearer"
}
3.099 phase <--<-- 4 --- AccessToken -->-->
3.099 --> request op_args: {'state': '0Yuh6P7OEuKaDMz2'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.099 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': '0Yuh6P7OEuKaDMz2', 'code': 'wbGYimmVmQnZ9DC6m4_OjZRAnNpVuy8TSuniEvkYeC8.PYSsmkXdn0yealyj6pFvBcQFiw79besufo5oolzbHys', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '8724edc2-dcf3-43ac-a609-9dbfaaaf3d70'}, 'state': '0Yuh6P7OEuKaDMz2'}
3.099 AccessTokenRequest {
"code": "wbGYimmVmQnZ9DC6m4_OjZRAnNpVuy8TSuniEvkYeC8.PYSsmkXdn0yealyj6pFvBcQFiw79besufo5oolzbHys",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "0Yuh6P7OEuKaDMz2"
}
3.099 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.099 request_http_args {'headers': {'Authorization': 'Basic ODcyNGVkYzItZGNmMy00M2FjLWE2MDktOWRiZmFhYWYzZDcwOktRREFMQ2M5RlJVdA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
3.099 request code=wbGYimmVmQnZ9DC6m4_OjZRAnNpVuy8TSuniEvkYeC8.PYSsmkXdn0yealyj6pFvBcQFiw79besufo5oolzbHys&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=0Yuh6P7OEuKaDMz2
3.313 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.314 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiWHpvdTVOSDZTN0o4R2UwR1RrVWZ0ZyIsImF1ZCI6WyI4NzI0ZWRjMi1kY2YzLTQzYWMtYTYwOS05ZGJmYWFhZjNkNzAiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiJnejZ2a1pqVzhTNDJBTWJkOV80ZmV3IiwiZXhwIjoxNTI5NzU1NzE2LCJpYXQiOjE1Mjk3NTIxMTYsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImY3ZTg0ZDZjLWM2OTItNGRlMi1hYWE0LTU3N2Y5YmQ2OTIyMyIsIm5vbmNlIjoia2Y4ZW1Jdmo5U21OdXZ4QiIsInJhdCI6MTUyOTc1MjExMywic3ViIjoiZm9vQGJhci5jb20ifQ.Chi0UqhtiUq--SZ-5UJJDJ4IJqEbBUHa6JNmd7L73hM_FOTE_fIbIiCRaAI29fvrJrJYsfds3SNodeS2-4800n5nekUKSh1oFyMSIVrvRV7lTx46G55MdlqzP1hlFyvsBAJuTI2lKzxoU6BntgWl-SFVDnVFvQq4ptgac70LIlOGeXCvKmfxPPQLwqt3ExclU5MbZDjoz5g8aCqnmDsc7IYOaOY30vs5SY9_NgE3OQVa99E95BV64G9m-9_c2KMQVQPMiaT2c-vcRrr9ekQ7IJ6-fOF8O7T0vJy25WrAgOD7lhMJCFZTUPbmkF1mzlcVDDz_lOxey-wQkLwwDJYBJtWCoV5tWhISneoF7KsZsS4ipETWz6n5LUbJarafMuBhrCB79V-ZO9wp5R9Y0NLNRzucrxREwLIoHm7GdZxAHaG-Sk5aZeMd80cjCIRvgrI21N6RcIlY9NPk5DdZJMGU17nZQ6elIcXEpmPkB6UTBZxVHkjFOXpmRgNgjPNcdxdIBiJWAX3WV2uMuANAg4Tm9aYM75EzM1G6tL9mZymix7Fdu5jfopUtUFu8ei1GLlIBvc5A7J_njhyKEaD2TOXkZ1H2_PYHKDL57AoA8dcHJ0pOR-Iy9TvAhTJh9IAEREbhaKPtLhdLKWRnUuoti43p3fJ-UbtjW88-ARhvLFsOG7o', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'M4BnNXufeL-ZmOPLWQLzgRuoIh3aZWBBybGcgN13fzs.kQ2CIT7Wd5rSXjWdlr_tVG-qjRctT9gFZL4QoCdLJRk', 'scope': 'openid'}
3.396 AccessTokenResponse {
"access_token": "M4BnNXufeL-ZmOPLWQLzgRuoIh3aZWBBybGcgN13fzs.kQ2CIT7Wd5rSXjWdlr_tVG-qjRctT9gFZL4QoCdLJRk",
"expires_in": 3599,
"id_token": {
"at_hash": "Xzou5NH6S7J8Ge0GTkUftg",
"aud": [
"8724edc2-dcf3-43ac-a609-9dbfaaaf3d70"
],
"auth_time": 1529751824,
"c_hash": "gz6vkZjW8S42AMbd9_4few",
"exp": 1529755716,
"iat": 1529752116,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "f7e84d6c-c692-4de2-aaa4-577f9bd69223",
"nonce": "kf8emIvj9SmNuvxB",
"rat": 1529752113,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.396 phase <--<-- 5 --- UserInfo -->-->
3.396 do_user_info_request kwargs:{'state': '0Yuh6P7OEuKaDMz2', 'method': 'GET', 'authn_method': 'bearer_header'}
3.396 request {'body': None}
3.396 request_url https://oidc-certification.ory.sh:8443/userinfo
3.396 request_http_args {'headers': {'Authorization': 'Bearer M4BnNXufeL-ZmOPLWQLzgRuoIh3aZWBBybGcgN13fzs.kQ2CIT7Wd5rSXjWdlr_tVG-qjRctT9gFZL4QoCdLJRk'}}
3.469 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
3.47 OpenIDSchema {
"sub": "[email protected]"
}
3.47 OpenIDSchema {
"sub": "[email protected]"
}
3.47 phase <--<-- 6 --- Done -->-->
3.47 end
3.471 assertion VerifyClaims
3.471 condition verify-claims: status=WARNING, message=Missing required claim: name [Verifies that the claims returned as UserInfo or in the ID Token is consistent with what was asked for]
3.471 assertion CheckHTTPResponse
3.471 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
3.471 condition Done: status=OK
============================================================
Conditions
verify-claims: status=WARNING, message=Missing required claim: name [Verifies that the claims returned as UserInfo or in the ID Token is consistent with what was asked for]
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
Missing required claim: name
./OP-prompt-none-LoggedIn.txt 0000644 0000000 0000000 00000037362 13313425176 016212 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-prompt-none-LoggedIn
Test description: Request with prompt=none when logged in [Basic, Implicit, Hybrid]
Timestamp: 2018-06-23T11:09:50Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.074 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Registration -->-->
0.076 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.076 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#QHz8PAN4mAwfTljs"
],
"response_types": [
"code token"
]
}
0.249 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.25 RegistrationResponse {
"client_id": "8616b2ed-eb41-423e-8d4e-080b94121381",
"client_secret": "Tr-~sK6hK9UM",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "8616b2ed-eb41-423e-8d4e-080b94121381",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#QHz8PAN4mAwfTljs"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.25 phase <--<-- 3 --- AsyncAuthn -->-->
0.251 AuthorizationRequest {
"client_id": "8616b2ed-eb41-423e-8d4e-080b94121381",
"nonce": "ptpOxE41QHnFN3jV",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "jHgw5n1ivdkZwNJs"
}
0.251 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=8616b2ed-eb41-423e-8d4e-080b94121381&state=jHgw5n1ivdkZwNJs&response_type=code+token&nonce=ptpOxE41QHnFN3jV
0.251 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=8616b2ed-eb41-423e-8d4e-080b94121381&state=jHgw5n1ivdkZwNJs&response_type=code+token&nonce=ptpOxE41QHnFN3jV
2.397 http args {}
2.562 response URL with fragment
2.562 response access_token=41aA7XZ4nFKZCWw_gA9y2MfJqd40gDBD8GsuPuTE9zg.bP6hjkp4cya44FEH2EenK5pZDc16wEs05Rizn4xwDss&code=NZeUWsP4nC1jZm0wx8-C2ZqIpLeldV4boPzWQDrPfNY.eoBxi7S3jNVlnYfrfImcO59VwtS9q0Hi8ssIlpm6P4M&expires_in=3599&scope=openid&state=jHgw5n1ivdkZwNJs&token_type=bearer
2.562 response {'scope': 'openid', 'code': 'NZeUWsP4nC1jZm0wx8-C2ZqIpLeldV4boPzWQDrPfNY.eoBxi7S3jNVlnYfrfImcO59VwtS9q0Hi8ssIlpm6P4M', 'access_token': '41aA7XZ4nFKZCWw_gA9y2MfJqd40gDBD8GsuPuTE9zg.bP6hjkp4cya44FEH2EenK5pZDc16wEs05Rizn4xwDss', 'state': 'jHgw5n1ivdkZwNJs', 'expires_in': 3599, 'token_type': 'bearer'}
2.562 AuthorizationResponse {
"access_token": "41aA7XZ4nFKZCWw_gA9y2MfJqd40gDBD8GsuPuTE9zg.bP6hjkp4cya44FEH2EenK5pZDc16wEs05Rizn4xwDss",
"code": "NZeUWsP4nC1jZm0wx8-C2ZqIpLeldV4boPzWQDrPfNY.eoBxi7S3jNVlnYfrfImcO59VwtS9q0Hi8ssIlpm6P4M",
"expires_in": 3599,
"scope": "openid",
"state": "jHgw5n1ivdkZwNJs",
"token_type": "bearer"
}
2.563 phase <--<-- 4 --- AccessToken -->-->
2.563 --> request op_args: {'state': 'jHgw5n1ivdkZwNJs'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.563 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'jHgw5n1ivdkZwNJs', 'code': 'NZeUWsP4nC1jZm0wx8-C2ZqIpLeldV4boPzWQDrPfNY.eoBxi7S3jNVlnYfrfImcO59VwtS9q0Hi8ssIlpm6P4M', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '8616b2ed-eb41-423e-8d4e-080b94121381'}, 'state': 'jHgw5n1ivdkZwNJs'}
2.563 AccessTokenRequest {
"code": "NZeUWsP4nC1jZm0wx8-C2ZqIpLeldV4boPzWQDrPfNY.eoBxi7S3jNVlnYfrfImcO59VwtS9q0Hi8ssIlpm6P4M",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "jHgw5n1ivdkZwNJs"
}
2.563 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.563 request_http_args {'headers': {'Authorization': 'Basic ODYxNmIyZWQtZWI0MS00MjNlLThkNGUtMDgwYjk0MTIxMzgxOlRyLSU3RXNLNmhLOVVN', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.563 request code=NZeUWsP4nC1jZm0wx8-C2ZqIpLeldV4boPzWQDrPfNY.eoBxi7S3jNVlnYfrfImcO59VwtS9q0Hi8ssIlpm6P4M&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=jHgw5n1ivdkZwNJs
2.775 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.776 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiR21MdVhBRUY0ZXlyS1RJM0dWQ3l4dyIsImF1ZCI6WyI4NjE2YjJlZC1lYjQxLTQyM2UtOGQ0ZS0wODBiOTQxMjEzODEiXSwiYXV0aF90aW1lIjoxNTI5NzUyMTgwLCJjX2hhc2giOiJ5YUppcGJ1VTBpV01XbUdHb0xRb1R3IiwiZXhwIjoxNTI5NzU1Nzg4LCJpYXQiOjE1Mjk3NTIxODgsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjExY2VlMGQxLTQ0YTYtNDkxMy1iMjFiLTE1ZGJiZDM5MTBiMSIsIm5vbmNlIjoicHRwT3hFNDFRSG5GTjNqViIsInJhdCI6MTUyOTc1MjE4Niwic3ViIjoiZm9vQGJhci5jb20ifQ.a4mzXh0v_5rwpF2I1V8-twU8GK3Vqa9BFaPZ9L1sraMD4rFiX6tSzKz0ezMa8TDmUtB8CsbQgrGbbkR6HzUn0GqWH81oIy34EgaEhYGXhDl8if7-dRFDEp2dzrZc10ZOsU38Yg5cjctZeAuUgfu84zaTlEuk3iR_DJO10do4gCWH88xgmNNCJngOfYkW_HQV4pL86T_y9IqrrKMDVqCZfVTqQA5xkYHbft-3lWAXNeK8xKBn-4jUZSt4fH4QjWYSUppnoWoSxVLOMIPXQ5D2gfHndPAaKTs9nCpZEeFC8n3S1Vkr6k0PML2-weEz-94z-HZygCmTT4mk-Nvth1flZm6ORlSFOri1XkEizsOlecM3A7naCQfsudj1OnpCA_G84-k1MEzb742BfYgbgeRhVD80AZcn0_tG9wt8qQpebi3YaTBcUI-wsOUtrUJn6jTTF-C599rEMc_WeEcsiGxY0H0VdCDfc6c_p6Z_mBR0vyodqvAm4HO_INyo0eE11lBmF5WcpqrGTjJtJNc7vLYvCeoYIDeP06205PAGycdhUoQXWXFfdl_k_ukamel-T5UNxwUmJB3lJtUVf2ahXMNhG5lRjwZSt7GRTHVOoiCjfw9MsuRA5CoGXyO9Ca5EYJ9P8fh6IzEqwmGtyFzKyjcQT66KXhMYUWKWzcd3oW6Luxs', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'wcaMkhqM_VIF9V59UB4zM5ULZZbf7Hiz20v-xHefn7g.D8Jo4Hh7DaRoOzOhhGKeS_SMQHCFpa2P2ALaQzpFg5A', 'scope': 'openid'}
2.854 AccessTokenResponse {
"access_token": "wcaMkhqM_VIF9V59UB4zM5ULZZbf7Hiz20v-xHefn7g.D8Jo4Hh7DaRoOzOhhGKeS_SMQHCFpa2P2ALaQzpFg5A",
"expires_in": 3599,
"id_token": {
"at_hash": "GmLuXAEF4eyrKTI3GVCyxw",
"aud": [
"8616b2ed-eb41-423e-8d4e-080b94121381"
],
"auth_time": 1529752180,
"c_hash": "yaJipbuU0iWMWmGGoLQoTw",
"exp": 1529755788,
"iat": 1529752188,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "11cee0d1-44a6-4913-b21b-15dbbd3910b1",
"nonce": "ptpOxE41QHnFN3jV",
"rat": 1529752186,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
2.854 phase <--<-- 5 --- AsyncAuthn -->-->
2.854 AuthorizationRequest {
"client_id": "8616b2ed-eb41-423e-8d4e-080b94121381",
"nonce": "P1s15HmhPqqo9Vqa",
"prompt": [
"none"
],
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "ksubE9NSygqtC2Pb"
}
2.854 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=8616b2ed-eb41-423e-8d4e-080b94121381&state=ksubE9NSygqtC2Pb&response_type=code+token&nonce=P1s15HmhPqqo9Vqa
2.854 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=8616b2ed-eb41-423e-8d4e-080b94121381&state=ksubE9NSygqtC2Pb&response_type=code+token&nonce=P1s15HmhPqqo9Vqa
3.726 http args {}
3.896 response URL with fragment
3.896 response access_token=xDBfhkgUhrtbLjYvrdRmE1rJW57AMUITr9usVut_m5w.zVE5l20JBIeHrNePMS3ekwzl9vWblMRLAhMB_FNRBSY&code=kuqq-BujRSOFqK8D-fvgqB-vl9Ae981SsVQsvDHdEws.ioBl-4Qpm4CZ1Eh_wdqH00mKPKB43EjnXpFXP_CnoQM&expires_in=3599&scope=openid&state=ksubE9NSygqtC2Pb&token_type=bearer
3.897 response {'scope': 'openid', 'code': 'kuqq-BujRSOFqK8D-fvgqB-vl9Ae981SsVQsvDHdEws.ioBl-4Qpm4CZ1Eh_wdqH00mKPKB43EjnXpFXP_CnoQM', 'access_token': 'xDBfhkgUhrtbLjYvrdRmE1rJW57AMUITr9usVut_m5w.zVE5l20JBIeHrNePMS3ekwzl9vWblMRLAhMB_FNRBSY', 'state': 'ksubE9NSygqtC2Pb', 'expires_in': 3599, 'token_type': 'bearer'}
3.897 AuthorizationResponse {
"access_token": "xDBfhkgUhrtbLjYvrdRmE1rJW57AMUITr9usVut_m5w.zVE5l20JBIeHrNePMS3ekwzl9vWblMRLAhMB_FNRBSY",
"code": "kuqq-BujRSOFqK8D-fvgqB-vl9Ae981SsVQsvDHdEws.ioBl-4Qpm4CZ1Eh_wdqH00mKPKB43EjnXpFXP_CnoQM",
"expires_in": 3599,
"scope": "openid",
"state": "ksubE9NSygqtC2Pb",
"token_type": "bearer"
}
3.897 phase <--<-- 6 --- AccessToken -->-->
3.898 --> request op_args: {'state': 'ksubE9NSygqtC2Pb'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.898 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'ksubE9NSygqtC2Pb', 'code': 'kuqq-BujRSOFqK8D-fvgqB-vl9Ae981SsVQsvDHdEws.ioBl-4Qpm4CZ1Eh_wdqH00mKPKB43EjnXpFXP_CnoQM', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '8616b2ed-eb41-423e-8d4e-080b94121381'}, 'state': 'ksubE9NSygqtC2Pb'}
3.898 AccessTokenRequest {
"code": "kuqq-BujRSOFqK8D-fvgqB-vl9Ae981SsVQsvDHdEws.ioBl-4Qpm4CZ1Eh_wdqH00mKPKB43EjnXpFXP_CnoQM",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "ksubE9NSygqtC2Pb"
}
3.898 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.898 request_http_args {'headers': {'Authorization': 'Basic ODYxNmIyZWQtZWI0MS00MjNlLThkNGUtMDgwYjk0MTIxMzgxOlRyLSU3RXNLNmhLOVVN', 'Content-Type': 'application/x-www-form-urlencoded'}}
3.898 request code=kuqq-BujRSOFqK8D-fvgqB-vl9Ae981SsVQsvDHdEws.ioBl-4Qpm4CZ1Eh_wdqH00mKPKB43EjnXpFXP_CnoQM&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=ksubE9NSygqtC2Pb
4.124 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
4.125 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiWGdqUnBianI2SkZEVlBsZ0gxTDloQSIsImF1ZCI6WyI4NjE2YjJlZC1lYjQxLTQyM2UtOGQ0ZS0wODBiOTQxMjEzODEiXSwiYXV0aF90aW1lIjoxNTI5NzUyMTgwLCJjX2hhc2giOiJpcFR1YVNmZVRjVjJlaVhPREZqNWZ3IiwiZXhwIjoxNTI5NzU1Nzg5LCJpYXQiOjE1Mjk3NTIxODksImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjY2ZDEwZDcxLTI1NmItNDVlNS1hMjAwLTc5ZjczYWE2ZTRjNyIsIm5vbmNlIjoiUDFzMTVIbWhQcXFvOVZxYSIsInJhdCI6MTUyOTc1MjE4OCwic3ViIjoiZm9vQGJhci5jb20ifQ.hmbYqaIgjCw6hZz1lzsQfH5OUVIyQEHtMBbzwmxUN9nGmXlEZQiZRHOi4KilqKzPxKtzFz_rauvVWH3pB2VO60Cp46nmUriayw5MQaQgd0Jzs9UgtcAUW2KZEV-cWJ8rG2Y5WBrw_audnPXp36WcpYSiveIHdTTRR_m3bhEziQQuXsBreZMfsJpSupoZWhzs7x23uXW8mDdm3oIXsIzbr4gAQLoFGHFUKb3e4btR0ytoPZdVmjxfz7J4ZcuSGb4_wKG_p7L6RsQh_1WfV9CDvCt9EdlvMocz8XNwavtEqtXrrgj-Lfb3QCP6ia7_1A6UNeH0RMv9Ycn1SgWafkr4KIZRgaB-4-8xME5f7Gl-PpHcvhFrB6bsMnHOXaxys1HM47BhQ4QbNjv5s-h8yLwOBVb2w22pIFBUHza2jixIYnyhicVeYitnSrMtR2ZkUShIrpOnXgEua-uqWSAnT4HI7sKtCs3s4RsqiDI19Z2pkexAxbj-Ooc1CRDPiLqBn1Po9bmab_X2vE6EMiAK9BxdnaGfZ4-PfKKVTN-Q70MhUXsnobkDwt0xBwRSTzTmxiknrwzLOcYb0lu_FHZ4ygAbkycWu6-ceemHVplF4aqa4YRa6w3_stu8S_jX15M_Qj2eBVp6D2tUPxCK9TEvECDYhaHyjdqW6zZobqCIERbzvJI', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'cwehpIVHPMzNBjR9469DA96PMZPdAwBq-UMzWuZ5knU.IzuPRzaKYY9BVcO0mBa3HEXyGvxnNKrVtw_A_Bb5kS4', 'scope': 'openid'}
4.128 AccessTokenResponse {
"access_token": "cwehpIVHPMzNBjR9469DA96PMZPdAwBq-UMzWuZ5knU.IzuPRzaKYY9BVcO0mBa3HEXyGvxnNKrVtw_A_Bb5kS4",
"expires_in": 3599,
"id_token": {
"at_hash": "XgjRpbjr6JFDVPlgH1L9hA",
"aud": [
"8616b2ed-eb41-423e-8d4e-080b94121381"
],
"auth_time": 1529752180,
"c_hash": "ipTuaSfeTcV2eiXODFj5fw",
"exp": 1529755789,
"iat": 1529752189,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "66d10d71-256b-45e5-a200-79f73aa6e4c7",
"nonce": "P1s15HmhPqqo9Vqa",
"rat": 1529752188,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
4.129 phase <--<-- 7 --- Done -->-->
4.129 end
4.129 assertion VerifyResponse
4.129 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.13 assertion SameAuthn
4.13 condition same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
4.13 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Req-max_age=1.txt 0000644 0000000 0000000 00000050410 13313425466 014541 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-max_age=1
Test description: Requesting ID Token with max_age=1 seconds restriction
Timestamp: 2018-06-23T11:12:54Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.161 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.162 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.162 phase <--<-- 2 --- Registration -->-->
0.163 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.163 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#s9ZlOS7F3vVLykyD"
],
"response_types": [
"code token"
]
}
0.326 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.327 RegistrationResponse {
"client_id": "db9a45f4-7bc4-4efc-8d0a-e6670fb32982",
"client_secret": "AT.1Yc2v~6un",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "db9a45f4-7bc4-4efc-8d0a-e6670fb32982",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#s9ZlOS7F3vVLykyD"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.327 phase <--<-- 3 --- AsyncAuthn -->-->
0.328 AuthorizationRequest {
"client_id": "db9a45f4-7bc4-4efc-8d0a-e6670fb32982",
"nonce": "pFp9BnpnIDkYoMU1",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "ldjLmjyvb38loz24"
}
0.328 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=db9a45f4-7bc4-4efc-8d0a-e6670fb32982&state=ldjLmjyvb38loz24&response_type=code+token&nonce=pFp9BnpnIDkYoMU1
0.328 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=db9a45f4-7bc4-4efc-8d0a-e6670fb32982&state=ldjLmjyvb38loz24&response_type=code+token&nonce=pFp9BnpnIDkYoMU1
3.479 http args {}
3.642 response URL with fragment
3.642 response access_token=VSlcokdXxAQ33rWDDrU69CHUovFZ-z6cyfQbkduJW1k.jp5dB7kbOLe4uY_535iHHrck8cfj3QrzgX_Y9pYJFiA&code=Zf1NLPwsCqQrSbP2xXD2haSk6RvbmxEXK2y9AZ0CC48.wL8LJfCopk9mL3HwFdSfTbo26JRB7LMC6ntZu5kLvSw&expires_in=3599&scope=openid&state=ldjLmjyvb38loz24&token_type=bearer
3.642 response {'scope': 'openid', 'code': 'Zf1NLPwsCqQrSbP2xXD2haSk6RvbmxEXK2y9AZ0CC48.wL8LJfCopk9mL3HwFdSfTbo26JRB7LMC6ntZu5kLvSw', 'access_token': 'VSlcokdXxAQ33rWDDrU69CHUovFZ-z6cyfQbkduJW1k.jp5dB7kbOLe4uY_535iHHrck8cfj3QrzgX_Y9pYJFiA', 'state': 'ldjLmjyvb38loz24', 'expires_in': 3599, 'token_type': 'bearer'}
3.643 AuthorizationResponse {
"access_token": "VSlcokdXxAQ33rWDDrU69CHUovFZ-z6cyfQbkduJW1k.jp5dB7kbOLe4uY_535iHHrck8cfj3QrzgX_Y9pYJFiA",
"code": "Zf1NLPwsCqQrSbP2xXD2haSk6RvbmxEXK2y9AZ0CC48.wL8LJfCopk9mL3HwFdSfTbo26JRB7LMC6ntZu5kLvSw",
"expires_in": 3599,
"scope": "openid",
"state": "ldjLmjyvb38loz24",
"token_type": "bearer"
}
3.643 phase <--<-- 4 --- AccessToken -->-->
3.643 --> request op_args: {'state': 'ldjLmjyvb38loz24'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.643 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'ldjLmjyvb38loz24', 'code': 'Zf1NLPwsCqQrSbP2xXD2haSk6RvbmxEXK2y9AZ0CC48.wL8LJfCopk9mL3HwFdSfTbo26JRB7LMC6ntZu5kLvSw', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'db9a45f4-7bc4-4efc-8d0a-e6670fb32982'}, 'state': 'ldjLmjyvb38loz24'}
3.643 AccessTokenRequest {
"code": "Zf1NLPwsCqQrSbP2xXD2haSk6RvbmxEXK2y9AZ0CC48.wL8LJfCopk9mL3HwFdSfTbo26JRB7LMC6ntZu5kLvSw",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "ldjLmjyvb38loz24"
}
3.643 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.643 request_http_args {'headers': {'Authorization': 'Basic ZGI5YTQ1ZjQtN2JjNC00ZWZjLThkMGEtZTY2NzBmYjMyOTgyOkFULjFZYzJ2JTdFNnVu', 'Content-Type': 'application/x-www-form-urlencoded'}}
3.643 request code=Zf1NLPwsCqQrSbP2xXD2haSk6RvbmxEXK2y9AZ0CC48.wL8LJfCopk9mL3HwFdSfTbo26JRB7LMC6ntZu5kLvSw&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=ldjLmjyvb38loz24
3.906 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.907 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiNjJ3QlVwMU5NUURzdG0xVXR4OGVYQSIsImF1ZCI6WyJkYjlhNDVmNC03YmM0LTRlZmMtOGQwYS1lNjY3MGZiMzI5ODIiXSwiYXV0aF90aW1lIjoxNTI5NzUyMTgwLCJjX2hhc2giOiJjbjJfTHQzVlRqYUdfckNfTU4zeWhnIiwiZXhwIjoxNTI5NzU1OTY2LCJpYXQiOjE1Mjk3NTIzNjYsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjkxM2QzMjIwLTYxNWMtNGY3My04NDk0LTU1MDgyNGMyMWEzZSIsIm5vbmNlIjoicEZwOUJucG5JRGtZb01VMSIsInJhdCI6MTUyOTc1MjM2Mywic3ViIjoiZm9vQGJhci5jb20ifQ.dpyipHQyLhuLP-wsfnYVnwFTK42tIYToRPS93_MyeClMt2N_blkPGjT3JC4g9hcjk-U6VhYliwcHKwYtbQoEljcvrRIN3iCcpixi1W29f3R6KV4jcF9K1GnrudxyZ6Fici3h-tjsVuzLZgEvGueMrWg8EapUyuiq44cnYso9qAWL4Qx5vkj2mfFBabc9qWlpiyVnvWNhbByeJzUWKXg1WidgNlsbIRYilKOKfCYreulHqp4pC3Ii9voov93Czzpr8qx4XvsPrTYC4HLkLYPqqYMNefy7dGAKUtfsVNdAD25GJeuX7VofBzqZifk23jGdVfLaOBWAo8gl5oJKNB4xUP4-RdGMegWIbkR4Mpd9VkMN7b9zWhz_LW2Fmo7a8wmRuI6NfKTF_OctY9NOgbgd-6Yzb5Amf6fV31vwCgd-d4uMZjpft-qiaCxkmdxS6UA7WiLgmL6B-rdIYmwUXLDk7tfFOYASHGMxDAvZYR_jdEgtx1HRQR25URW4IxapiecGJxvhox7dxkbWOIXlYKrXPcDZFb2eoRU1DU3bnevKYEK-HH0dvD6Zl5B1aye-MUyPCzISc712NYEm6ozHRXL-Mk1w--N55paqs9A3_nv3nsxxPBTnnSlgquWibleFk5RCT5xisJuBAKt1ChE0a-aYymGhTSirlamZBkR1-AUbj2s', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'bIURbHGAMaM1y4YWSdPZqkOoYtPS_60M4sGP6GcUUiM.wUHWlUOeB-z53BRmXXHhno6WWD4Pvk-XmXoZSSL5QeU', 'scope': 'openid'}
4.023 AccessTokenResponse {
"access_token": "bIURbHGAMaM1y4YWSdPZqkOoYtPS_60M4sGP6GcUUiM.wUHWlUOeB-z53BRmXXHhno6WWD4Pvk-XmXoZSSL5QeU",
"expires_in": 3599,
"id_token": {
"at_hash": "62wBUp1NMQDstm1Utx8eXA",
"aud": [
"db9a45f4-7bc4-4efc-8d0a-e6670fb32982"
],
"auth_time": 1529752180,
"c_hash": "cn2_Lt3VTjaG_rC_MN3yhg",
"exp": 1529755966,
"iat": 1529752366,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "913d3220-615c-4f73-8494-550824c21a3e",
"nonce": "pFp9BnpnIDkYoMU1",
"rat": 1529752363,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
4.023 phase <--<-- 5 --- Note -->-->
5.56 phase <--<-- 6 --- Webfinger -->-->
5.561 not expected to do WebFinger
5.561 phase <--<-- 7 --- Discovery -->-->
5.561 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
5.634 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
5.635 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
5.635 phase <--<-- 8 --- Registration -->-->
5.635 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
5.636 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#1XqBToJzhWtTeugi"
],
"response_types": [
"code token"
]
}
5.829 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
5.83 RegistrationResponse {
"client_id": "c7f68612-5ccd-45de-90e9-eaaa17327512",
"client_secret": "B2.1KsZ_SDjP",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "c7f68612-5ccd-45de-90e9-eaaa17327512",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#1XqBToJzhWtTeugi"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
5.83 phase <--<-- 9 --- AsyncAuthn -->-->
5.831 AuthorizationRequest {
"client_id": "c7f68612-5ccd-45de-90e9-eaaa17327512",
"max_age": 1,
"nonce": "82r66Ba9gmwV3fEU",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "ZQQ7I1PGBvWbuTR2"
}
5.831 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?max_age=1&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=c7f68612-5ccd-45de-90e9-eaaa17327512&state=ZQQ7I1PGBvWbuTR2&response_type=code+token&nonce=82r66Ba9gmwV3fEU
5.831 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?max_age=1&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=c7f68612-5ccd-45de-90e9-eaaa17327512&state=ZQQ7I1PGBvWbuTR2&response_type=code+token&nonce=82r66Ba9gmwV3fEU
11.437 http args {}
11.602 response URL with fragment
11.602 response access_token=GaglfypfWM30QPNHrSs2m1OwjPWLwqRgk6KQ_D8tjrI.t_e77Vy505NhTGTQpahyAJpNfJO98SvK4ofOaL-xlHs&code=Jv_TtSgO9lew-aWfsLkdimZEJC5sNpYhfX7VFaDU7Fg.SqacRA3_-bl9vMlUlfFL8wl4cB8oqII4eybDtE3uSpg&expires_in=3599&scope=openid&state=ZQQ7I1PGBvWbuTR2&token_type=bearer
11.603 response {'scope': 'openid', 'code': 'Jv_TtSgO9lew-aWfsLkdimZEJC5sNpYhfX7VFaDU7Fg.SqacRA3_-bl9vMlUlfFL8wl4cB8oqII4eybDtE3uSpg', 'access_token': 'GaglfypfWM30QPNHrSs2m1OwjPWLwqRgk6KQ_D8tjrI.t_e77Vy505NhTGTQpahyAJpNfJO98SvK4ofOaL-xlHs', 'state': 'ZQQ7I1PGBvWbuTR2', 'expires_in': 3599, 'token_type': 'bearer'}
11.603 AuthorizationResponse {
"access_token": "GaglfypfWM30QPNHrSs2m1OwjPWLwqRgk6KQ_D8tjrI.t_e77Vy505NhTGTQpahyAJpNfJO98SvK4ofOaL-xlHs",
"code": "Jv_TtSgO9lew-aWfsLkdimZEJC5sNpYhfX7VFaDU7Fg.SqacRA3_-bl9vMlUlfFL8wl4cB8oqII4eybDtE3uSpg",
"expires_in": 3599,
"scope": "openid",
"state": "ZQQ7I1PGBvWbuTR2",
"token_type": "bearer"
}
11.603 phase <--<-- 10 --- AccessToken -->-->
11.603 --> request op_args: {'state': 'ZQQ7I1PGBvWbuTR2'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
11.603 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'ZQQ7I1PGBvWbuTR2', 'code': 'Jv_TtSgO9lew-aWfsLkdimZEJC5sNpYhfX7VFaDU7Fg.SqacRA3_-bl9vMlUlfFL8wl4cB8oqII4eybDtE3uSpg', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'c7f68612-5ccd-45de-90e9-eaaa17327512'}, 'state': 'ZQQ7I1PGBvWbuTR2'}
11.603 AccessTokenRequest {
"code": "Jv_TtSgO9lew-aWfsLkdimZEJC5sNpYhfX7VFaDU7Fg.SqacRA3_-bl9vMlUlfFL8wl4cB8oqII4eybDtE3uSpg",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "ZQQ7I1PGBvWbuTR2"
}
11.603 request_url https://oidc-certification.ory.sh:8443/oauth2/token
11.603 request_http_args {'headers': {'Authorization': 'Basic YzdmNjg2MTItNWNjZC00NWRlLTkwZTktZWFhYTE3MzI3NTEyOkIyLjFLc1pfU0RqUA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
11.603 request code=Jv_TtSgO9lew-aWfsLkdimZEJC5sNpYhfX7VFaDU7Fg.SqacRA3_-bl9vMlUlfFL8wl4cB8oqII4eybDtE3uSpg&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=ZQQ7I1PGBvWbuTR2
11.816 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
11.817 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiN0FOakpubVBoOVIwMEJrQllSaWNkUSIsImF1ZCI6WyJjN2Y2ODYxMi01Y2NkLTQ1ZGUtOTBlOS1lYWFhMTczMjc1MTIiXSwiYXV0aF90aW1lIjoxNTI5NzUyMzcxLCJjX2hhc2giOiJOTjMtQW1ERUk3SUpyNUhBX214OUt3IiwiZXhwIjoxNTI5NzU1OTc0LCJpYXQiOjE1Mjk3NTIzNzQsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjJlZjA5YjA2LTBmY2ItNDZjMi1iODNkLWQxZDgxYWZmZTZkMiIsIm5vbmNlIjoiODJyNjZCYTlnbXdWM2ZFVSIsInJhdCI6MTUyOTc1MjM2OCwic3ViIjoiZm9vQGJhci5jb20ifQ.ldRC1IbPN70RFJn89J7_LeFPjzx5Bq95OrMtbmRmjJu3WQ-w5ns3WLeg9SJzBA0D22F-MOIauPJe_dA_X5M1HNlBKSkoB2r0Iy6LXFxBvNzwf8e4hWmM7ZwiW-Jlw15q1-KDoOLVJLI5wYI9iuvnFaC0V3Jw_-uyE_qsTfprxPZM2XNoWd0-tgTy_L-Ri7VgnW2j_ZrR50Y6dDeGIXF6CJr9oRlBEQyvILqA1ivIfHlCgkZtwD_RvJC_Ecnjf7IhcfhVe84yP5M86vOXNnoMyZPpkDKwdJXx4h0r0d8VZ-h6X_ZTx3IYLE6YiSb2RIclYAy-ZKdPAf9Wb_eYR5K9OcxreJRvylqwgkhNNsYQPLhNJapQjTD97Dn5FAan5cfa71Gm2EwmZpFVTNnkXKfRL9FQ3iUZ4ZSywO5kBAxpesWutcphPRAvtBe2uY-yb00j6V1Z0brVrvFztgwxBQihbPBsbWcU05tQ_P2JDeiyKiEqu7b9mrXMva4PtMeRRT4lBHdq4oQ_X7NX_iVLwe832fSjZimYeEXaJiquSyq71ciQ4IJVIRN283FBh6Up1S5g04mkc0Vs5GMhnbTzY8X9_UvcI-laSuqWO7ORSTkGrqMaIfR2o6SD78EUoQt7LNXpbQL1ilvg-Cv8p1SZEHM3AjZNqGDbtLnyhTv6JnfFXKY', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': '8LBHDAAzuOOZlLQAZQtldK0X3iRBy-JjjHFnL9dnMAg.yr8E711A0bZasuscihSGIgjbUlK3I4fLrIAuyGNqx6U', 'scope': 'openid'}
11.821 AccessTokenResponse {
"access_token": "8LBHDAAzuOOZlLQAZQtldK0X3iRBy-JjjHFnL9dnMAg.yr8E711A0bZasuscihSGIgjbUlK3I4fLrIAuyGNqx6U",
"expires_in": 3599,
"id_token": {
"at_hash": "7ANjJnmPh9R00BkBYRicdQ",
"aud": [
"c7f68612-5ccd-45de-90e9-eaaa17327512"
],
"auth_time": 1529752371,
"c_hash": "NN3-AmDEI7IJr5HA_mx9Kw",
"exp": 1529755974,
"iat": 1529752374,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "2ef09b06-0fcb-46c2-b83d-d1d81affe6d2",
"nonce": "82r66Ba9gmwV3fEU",
"rat": 1529752368,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
11.821 phase <--<-- 11 --- Done -->-->
11.821 end
11.821 assertion AuthTimeCheck
11.821 condition auth_time-check: status=OK [Check that the auth_time returned in the ID Token is in the expected range.]
11.822 assertion VerifyResponse
11.822 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
11.822 assertion ClaimsCheck
11.822 condition claims-check: status=OK [Checks if specific claims is present or not]
11.822 assertion MultipleSignOn
11.822 condition multiple-sign-on: status=OK [Verifies that multiple authentications was used in the flow]
11.822 condition Done: status=OK
============================================================
Conditions
auth_time-check: status=OK [Check that the auth_time returned in the ID Token is in the expected range.]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
claims-check: status=OK [Checks if specific claims is present or not]
multiple-sign-on: status=OK [Verifies that multiple authentications was used in the flow]
Done: status=OK
============================================================
RESULT: PASSED
./OP-UserInfo-Header.txt 0000644 0000000 0000000 00000025440 13313425053 015152 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-UserInfo-Header
Test description: UserInfo Endpoint access with POST and bearer header
Timestamp: 2018-06-23T11:08:27Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.076 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.077 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.077 phase <--<-- 2 --- Registration -->-->
0.077 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.078 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#rTWyARLTe5tp5l4M"
],
"response_types": [
"code token"
]
}
0.266 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.267 RegistrationResponse {
"client_id": "25254ff4-82c7-4afe-9ec0-6a3761e088cb",
"client_secret": "hxW-O.xp8zX0",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "25254ff4-82c7-4afe-9ec0-6a3761e088cb",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#rTWyARLTe5tp5l4M"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.267 phase <--<-- 3 --- AsyncAuthn -->-->
0.268 AuthorizationRequest {
"client_id": "25254ff4-82c7-4afe-9ec0-6a3761e088cb",
"nonce": "4LIs8YstAq2hJ4Oa",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "qMUX1EuDzDzwkkIp"
}
0.268 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=25254ff4-82c7-4afe-9ec0-6a3761e088cb&state=qMUX1EuDzDzwkkIp&response_type=code+token&nonce=4LIs8YstAq2hJ4Oa
0.268 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=25254ff4-82c7-4afe-9ec0-6a3761e088cb&state=qMUX1EuDzDzwkkIp&response_type=code+token&nonce=4LIs8YstAq2hJ4Oa
2.727 http args {}
2.893 response URL with fragment
2.893 response access_token=sOGMff3DpmeNWVZ_d7t4b2mSGjVoVHOrh0Xgg-bYjgk.4EVNzj-AQxFpgFmFVJoamvD-CCFPORFgb6kydlP4fk4&code=hpvNG1dKG5hgXBe0CDHYDDfwG6CeCz8jyeaGRxmIuFA.2y_So9KdsRrWWolnbwkvTgKuox3N5lVcjnXsgqMbSW0&expires_in=3599&scope=openid&state=qMUX1EuDzDzwkkIp&token_type=bearer
2.894 response {'scope': 'openid', 'code': 'hpvNG1dKG5hgXBe0CDHYDDfwG6CeCz8jyeaGRxmIuFA.2y_So9KdsRrWWolnbwkvTgKuox3N5lVcjnXsgqMbSW0', 'access_token': 'sOGMff3DpmeNWVZ_d7t4b2mSGjVoVHOrh0Xgg-bYjgk.4EVNzj-AQxFpgFmFVJoamvD-CCFPORFgb6kydlP4fk4', 'state': 'qMUX1EuDzDzwkkIp', 'expires_in': 3599, 'token_type': 'bearer'}
2.894 AuthorizationResponse {
"access_token": "sOGMff3DpmeNWVZ_d7t4b2mSGjVoVHOrh0Xgg-bYjgk.4EVNzj-AQxFpgFmFVJoamvD-CCFPORFgb6kydlP4fk4",
"code": "hpvNG1dKG5hgXBe0CDHYDDfwG6CeCz8jyeaGRxmIuFA.2y_So9KdsRrWWolnbwkvTgKuox3N5lVcjnXsgqMbSW0",
"expires_in": 3599,
"scope": "openid",
"state": "qMUX1EuDzDzwkkIp",
"token_type": "bearer"
}
2.894 phase <--<-- 4 --- AccessToken -->-->
2.894 --> request op_args: {'state': 'qMUX1EuDzDzwkkIp'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.894 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'qMUX1EuDzDzwkkIp', 'code': 'hpvNG1dKG5hgXBe0CDHYDDfwG6CeCz8jyeaGRxmIuFA.2y_So9KdsRrWWolnbwkvTgKuox3N5lVcjnXsgqMbSW0', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '25254ff4-82c7-4afe-9ec0-6a3761e088cb'}, 'state': 'qMUX1EuDzDzwkkIp'}
2.894 AccessTokenRequest {
"code": "hpvNG1dKG5hgXBe0CDHYDDfwG6CeCz8jyeaGRxmIuFA.2y_So9KdsRrWWolnbwkvTgKuox3N5lVcjnXsgqMbSW0",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "qMUX1EuDzDzwkkIp"
}
2.894 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.894 request_http_args {'headers': {'Authorization': 'Basic MjUyNTRmZjQtODJjNy00YWZlLTllYzAtNmEzNzYxZTA4OGNiOmh4Vy1PLnhwOHpYMA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.894 request code=hpvNG1dKG5hgXBe0CDHYDDfwG6CeCz8jyeaGRxmIuFA.2y_So9KdsRrWWolnbwkvTgKuox3N5lVcjnXsgqMbSW0&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=qMUX1EuDzDzwkkIp
3.145 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.147 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiX1lVN0VPX2ZmUGk5Qi1tcWY1ekZlQSIsImF1ZCI6WyIyNTI1NGZmNC04MmM3LTRhZmUtOWVjMC02YTM3NjFlMDg4Y2IiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiJsUEZMdUxXWFZ3Y3AtbWhZZ3BBUUtnIiwiZXhwIjoxNTI5NzU1NzA2LCJpYXQiOjE1Mjk3NTIxMDcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjY5MjIzMWQ3LTIzYjUtNDA2Ny04ODA1LTM3M2QxNmNlZmM5OSIsIm5vbmNlIjoiNExJczhZc3RBcTJoSjRPYSIsInJhdCI6MTUyOTc1MjEwNCwic3ViIjoiZm9vQGJhci5jb20ifQ.jPy39kjJDOFEZSEMrzL8Hu6IywfxQHcWf5j6pZmTnyPanYNG_vRo99ONe6w606GXUFswQnCpKFtBnYlNj3V3j_jKhW4zf9ITx1AdyF-IPHfT63jS7f59hbD1ePh5lXQx7vqJiYfKKzg7UplHp4DQmKyvSu8Lu4P7q3GMW2X3AXweBZ-7c1ShTupTrAvRApW0i3hG63tVL8ZHxqBwlHT-Y_jz31S64co3gWOzb_HD870X3W0j5MwMl0l1igU9z7CUD_mF4hGQQKo0tu1NHPXF55UvxhruBz3Y9IMj9vtfKEUPoYl7FlymXEbbqv2H4jBrUsMbExFOO8IjWOHyuKc82XtfvnWy_jzapICI0Mu2bKe8dAGMuyGzlAruVLoHootMFdtx_rLcMB9YWmkFBrfn6vMjTeLRl0j41lwUBDdaHVFrGIGpwdAaA2syb3cqSWCmce4oDa-VGlt1x5idA65QlQXq1JyZQY7hrMwBAfTdwaWe88JV-4HkGrldmhY8KkuKwmOnHWDdf5sC5E-lTZtOHzgLrIvnHR1FSnkMkovDiB-tDiwOMuYAWtKsRqBXI5FYh5S4R0TWEa5HNPec42Jg8p2TTKWtJrXOYitkHm7bxDkiIbaCI162NUIWrcpvx17ZDxNk0WO5IphqjA5xOgyYKUgjjBaahC-D1JXtd9Dt_aM', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'OOAmbH8bfsV_2UYHMV5F79ThrUexsV1_53ILW8CNN2E.ao-eyJxzyz2yNPcnJfRX9uiB9NrOMcsvHi_TcqOoI9U', 'scope': 'openid'}
3.262 AccessTokenResponse {
"access_token": "OOAmbH8bfsV_2UYHMV5F79ThrUexsV1_53ILW8CNN2E.ao-eyJxzyz2yNPcnJfRX9uiB9NrOMcsvHi_TcqOoI9U",
"expires_in": 3599,
"id_token": {
"at_hash": "_YU7EO_ffPi9B-mqf5zFeA",
"aud": [
"25254ff4-82c7-4afe-9ec0-6a3761e088cb"
],
"auth_time": 1529751824,
"c_hash": "lPFLuLWXVwcp-mhYgpAQKg",
"exp": 1529755706,
"iat": 1529752107,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "692231d7-23b5-4067-8805-373d16cefc99",
"nonce": "4LIs8YstAq2hJ4Oa",
"rat": 1529752104,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.262 phase <--<-- 5 --- UserInfo -->-->
3.262 do_user_info_request kwargs:{'state': 'qMUX1EuDzDzwkkIp', 'method': 'POST', 'behavior': 'use_authorization_header'}
3.262 request {'body': ''}
3.262 request_url https://oidc-certification.ory.sh:8443/userinfo
3.262 request_http_args {'headers': {'Authorization': 'Bearer OOAmbH8bfsV_2UYHMV5F79ThrUexsV1_53ILW8CNN2E.ao-eyJxzyz2yNPcnJfRX9uiB9NrOMcsvHi_TcqOoI9U', 'Content-Type': 'application/x-www-form-urlencoded'}}
3.346 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
3.347 OpenIDSchema {
"sub": "[email protected]"
}
3.347 OpenIDSchema {
"sub": "[email protected]"
}
3.347 phase <--<-- 6 --- Done -->-->
3.347 end
3.347 assertion VerifyResponse
3.347 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.347 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Registration-Dynamic.txt 0000644 0000000 0000000 00000011603 13313424666 016273 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-Dynamic
Test description: Client registration request
Timestamp: 2018-06-23T11:06:30Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Registration -->-->
0.075 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.075 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#vm3vFJ5nwj4aMCVk"
],
"response_types": [
"code token"
]
}
0.268 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.269 RegistrationResponse {
"client_id": "cf931555-2216-46c8-95ad-abfa2a51f367",
"client_secret": "gIvZC~UX-7E7",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "cf931555-2216-46c8-95ad-abfa2a51f367",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#vm3vFJ5nwj4aMCVk"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.269 phase <--<-- 3 --- Done -->-->
0.269 end
0.27 assertion CheckHTTPResponse
0.27 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.27 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
Done: status=OK
============================================================
RESULT: PASSED
./OP-display-page.txt 0000644 0000000 0000000 00000015364 13313425072 014616 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-display-page
Test description: Request with display=page
Timestamp: 2018-06-23T11:08:42Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.395 phase <--<-- 1 --- Webfinger -->-->
1.395 not expected to do WebFinger
1.395 phase <--<-- 2 --- Discovery -->-->
1.395 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.47 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.472 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.472 phase <--<-- 3 --- Registration -->-->
1.472 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.472 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#6ddkOZx5W5xtXGMF"
],
"response_types": [
"code token"
]
}
1.629 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.63 RegistrationResponse {
"client_id": "c6c8f1ae-dc09-4301-a75e-8c909e7d0c9a",
"client_secret": "2DVvdhhNAYF6",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "c6c8f1ae-dc09-4301-a75e-8c909e7d0c9a",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#6ddkOZx5W5xtXGMF"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.63 phase <--<-- 4 --- AsyncAuthn -->-->
1.63 AuthorizationRequest {
"client_id": "c6c8f1ae-dc09-4301-a75e-8c909e7d0c9a",
"display": "page",
"nonce": "52sUvDRGPENOMrz8",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "SLzthiGlOeD1cP9U"
}
1.63 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=c6c8f1ae-dc09-4301-a75e-8c909e7d0c9a&state=SLzthiGlOeD1cP9U&response_type=code+token&nonce=52sUvDRGPENOMrz8&display=page
1.631 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=c6c8f1ae-dc09-4301-a75e-8c909e7d0c9a&state=SLzthiGlOeD1cP9U&response_type=code+token&nonce=52sUvDRGPENOMrz8&display=page
4.123 http args {}
4.288 response URL with fragment
4.288 response access_token=ckRSRmD3Jd9sMHpdUm_h2Nd20HmA8iHygCu2hgX1LCA.f6BCkWZF0eXLO_WwPj6j-IaQmsOxprejJGzigurUyPM&code=sW_QpOZdUgxt4kht9Q-UpI9iwHNe7XUbxtXGLlTU1m4.v4gFwof9u04CQAaI2K3IjzvRUxqb-S1nI8GmUxNf_JY&expires_in=3599&scope=openid&state=SLzthiGlOeD1cP9U&token_type=bearer
4.288 response {'scope': 'openid', 'code': 'sW_QpOZdUgxt4kht9Q-UpI9iwHNe7XUbxtXGLlTU1m4.v4gFwof9u04CQAaI2K3IjzvRUxqb-S1nI8GmUxNf_JY', 'access_token': 'ckRSRmD3Jd9sMHpdUm_h2Nd20HmA8iHygCu2hgX1LCA.f6BCkWZF0eXLO_WwPj6j-IaQmsOxprejJGzigurUyPM', 'state': 'SLzthiGlOeD1cP9U', 'expires_in': 3599, 'token_type': 'bearer'}
4.289 AuthorizationResponse {
"access_token": "ckRSRmD3Jd9sMHpdUm_h2Nd20HmA8iHygCu2hgX1LCA.f6BCkWZF0eXLO_WwPj6j-IaQmsOxprejJGzigurUyPM",
"code": "sW_QpOZdUgxt4kht9Q-UpI9iwHNe7XUbxtXGLlTU1m4.v4gFwof9u04CQAaI2K3IjzvRUxqb-S1nI8GmUxNf_JY",
"expires_in": 3599,
"scope": "openid",
"state": "SLzthiGlOeD1cP9U",
"token_type": "bearer"
}
4.289 phase <--<-- 5 --- Done -->-->
4.289 end
4.289 assertion VerifyResponse
4.289 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.289 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Registration-Endpoint.txt 0000644 0000000 0000000 00000005207 13313424667 016473 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-Endpoint
Test description: Verify that registration_endpoint is published
Timestamp: 2018-06-23T11:06:31Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.071 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.073 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.073 phase <--<-- 2 --- Done -->-->
0.073 end
0.073 assertion VerifyOPHasRegistrationEndpoint
0.073 condition verify-op-has-registration-endpoint: status=OK [Verify that the OP has a registration endpoint]
0.073 condition Done: status=OK
============================================================
Conditions
verify-op-has-registration-endpoint: status=OK [Verify that the OP has a registration endpoint]
Done: status=OK
============================================================
RESULT: PASSED
./OP-IDToken-C-Signature.txt 0000644 0000000 0000000 00000024504 13313424727 015655 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-IDToken-C-Signature
Test description: Does the OP sign the ID Token and with what
Timestamp: 2018-06-23T11:07:03Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.15 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.152 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.152 phase <--<-- 2 --- Registration -->-->
0.152 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.152 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#03incLZEP10iIW1e"
],
"response_types": [
"code token"
]
}
0.344 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.345 RegistrationResponse {
"client_id": "e597126c-ce10-45b6-b1c9-4d85c05f1408",
"client_secret": "Sh-eR5qx7sgH",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "e597126c-ce10-45b6-b1c9-4d85c05f1408",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#03incLZEP10iIW1e"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.345 phase <--<-- 3 --- AsyncAuthn -->-->
0.346 AuthorizationRequest {
"client_id": "e597126c-ce10-45b6-b1c9-4d85c05f1408",
"nonce": "UEcTaZYjyJOCnEsz",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "0qRjyljdpGsq77jb"
}
0.346 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=e597126c-ce10-45b6-b1c9-4d85c05f1408&state=0qRjyljdpGsq77jb&response_type=code+token&nonce=UEcTaZYjyJOCnEsz
0.346 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=e597126c-ce10-45b6-b1c9-4d85c05f1408&state=0qRjyljdpGsq77jb&response_type=code+token&nonce=UEcTaZYjyJOCnEsz
2.932 http args {}
3.093 response URL with fragment
3.094 response access_token=69gDbz51b2vJndGtdClBBg6RXkgtkfhv9LfQh8-2h8w.VMCGnnlZM36T0iNNMuDsbkuaIjycmraVF31SheZqnpc&code=MXuWQ2I_pq9NEi2x1GoyQYMLsHa-R0zxL_g19CR_gfA.cu7hKNwvVbd4hosB_CXL1MqSD5CXL4Es7eZu16rdhDY&expires_in=3599&scope=openid&state=0qRjyljdpGsq77jb&token_type=bearer
3.094 response {'scope': 'openid', 'code': 'MXuWQ2I_pq9NEi2x1GoyQYMLsHa-R0zxL_g19CR_gfA.cu7hKNwvVbd4hosB_CXL1MqSD5CXL4Es7eZu16rdhDY', 'access_token': '69gDbz51b2vJndGtdClBBg6RXkgtkfhv9LfQh8-2h8w.VMCGnnlZM36T0iNNMuDsbkuaIjycmraVF31SheZqnpc', 'state': '0qRjyljdpGsq77jb', 'expires_in': 3599, 'token_type': 'bearer'}
3.094 AuthorizationResponse {
"access_token": "69gDbz51b2vJndGtdClBBg6RXkgtkfhv9LfQh8-2h8w.VMCGnnlZM36T0iNNMuDsbkuaIjycmraVF31SheZqnpc",
"code": "MXuWQ2I_pq9NEi2x1GoyQYMLsHa-R0zxL_g19CR_gfA.cu7hKNwvVbd4hosB_CXL1MqSD5CXL4Es7eZu16rdhDY",
"expires_in": 3599,
"scope": "openid",
"state": "0qRjyljdpGsq77jb",
"token_type": "bearer"
}
3.094 phase <--<-- 4 --- AccessToken -->-->
3.095 --> request op_args: {'state': '0qRjyljdpGsq77jb'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.095 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': '0qRjyljdpGsq77jb', 'code': 'MXuWQ2I_pq9NEi2x1GoyQYMLsHa-R0zxL_g19CR_gfA.cu7hKNwvVbd4hosB_CXL1MqSD5CXL4Es7eZu16rdhDY', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'e597126c-ce10-45b6-b1c9-4d85c05f1408'}, 'state': '0qRjyljdpGsq77jb'}
3.095 AccessTokenRequest {
"code": "MXuWQ2I_pq9NEi2x1GoyQYMLsHa-R0zxL_g19CR_gfA.cu7hKNwvVbd4hosB_CXL1MqSD5CXL4Es7eZu16rdhDY",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "0qRjyljdpGsq77jb"
}
3.095 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.095 request_http_args {'headers': {'Authorization': 'Basic ZTU5NzEyNmMtY2UxMC00NWI2LWIxYzktNGQ4NWMwNWYxNDA4OlNoLWVSNXF4N3NnSA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
3.095 request code=MXuWQ2I_pq9NEi2x1GoyQYMLsHa-R0zxL_g19CR_gfA.cu7hKNwvVbd4hosB_CXL1MqSD5CXL4Es7eZu16rdhDY&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=0qRjyljdpGsq77jb
3.315 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.316 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiYWlXODR6SXRWemN0dTdhUXVYem5yQSIsImF1ZCI6WyJlNTk3MTI2Yy1jZTEwLTQ1YjYtYjFjOS00ZDg1YzA1ZjE0MDgiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiJaWmVWRDVsT1VKbndnQno4WFN4M19RIiwiZXhwIjoxNTI5NzU1NjIyLCJpYXQiOjE1Mjk3NTIwMjIsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImNmMzEwNTk4LTQ0ZjItNGIxZi1iNWI0LTgwMjcwOWY1M2JhZSIsIm5vbmNlIjoiVUVjVGFaWWp5Sk9DbkVzeiIsInJhdCI6MTUyOTc1MjAyMCwic3ViIjoiZm9vQGJhci5jb20ifQ.As7bIZn1zVPg_lOWyD-nYEm_HsNuhKM7FQik9IZV0TJxEYT510hoAnteMyOIqcIfWlVARb1HSG8Rb8EvQjKs6xDs0EFTqzzz3eQMWLAQT2kKhi7woiQ_QiaUJqNR6wCJ7vPSj5J1WgtGSzDwRvsi7ghx-1cqxChMzYUhksSbiCtR87b-4H5EUpEcoMEc0rcab4GEXtW6xuJI2AYuA6RoHLJttTMT2jL6Zh6o3b1beQWh4Z_ht1E23497Ozzt2GFfB2DcujJkDefTONKFrbV5WcVusg1dQoiSjY4bXHGVoNSD9HIlEQwBGvKkQtyBZYzv-TjNjYPve6E8Bme9d4n9FQ_AHepPxMQrwjSC6b8lzOidiF83KmeqXvqwd0xQycIVuhjoFoK98povNf2nrlOs-oC-QO7qzBC5KQilHOnGzfWF7z_FpEdza1aShoCc3vsCSMAy01KHPiZK5wtDOOqckB3oER2cEVL1VGa2Dz0jd8DnxZjuDnG1v-ON1fO0EQb0gl9Bsr0WsBIZtrdeKu28dzgR4QLkio1MTwvvgBQ8GQWMSDIRhKi7LBDtemyYukzvYJH-KHM9kK9hIvvrr2KY8mK4vdI6QeY2wVBhb0UewwDKeE4K5S7QvPuEC_0nEn5v8pXsW5y7NY4_ST049GlDXsSpPwMt6WzlUtlERoHEVUA', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'Vv_bjZxGzA1b8f2EtkOtUImY5pmnGDy_FhS95bLZ0Kg.EiamaRquwiN5Vruxx51oMbj2MtC6U7Zq7vwBFy6gvAk', 'scope': 'openid'}
3.397 AccessTokenResponse {
"access_token": "Vv_bjZxGzA1b8f2EtkOtUImY5pmnGDy_FhS95bLZ0Kg.EiamaRquwiN5Vruxx51oMbj2MtC6U7Zq7vwBFy6gvAk",
"expires_in": 3599,
"id_token": {
"at_hash": "aiW84zItVzctu7aQuXznrA",
"aud": [
"e597126c-ce10-45b6-b1c9-4d85c05f1408"
],
"auth_time": 1529751824,
"c_hash": "ZZeVD5lOUJnwgBz8XSx3_Q",
"exp": 1529755622,
"iat": 1529752022,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "cf310598-44f2-4b1f-b5b4-802709f53bae",
"nonce": "UEcTaZYjyJOCnEsz",
"rat": 1529752020,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.397 phase <--<-- 5 --- Done -->-->
3.397 end
3.398 assertion VerifyResponse
3.398 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.398 assertion IsIDTokenSigned
3.398 condition is-idtoken-signed: status=OK [Checks if the id_token is signed]
3.398 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
is-idtoken-signed: status=OK [Checks if the id_token is signed]
Done: status=OK
============================================================
RESULT: PASSED
|
|
hydra/internal/certification/I.F.T.T.s.tar | ./OP-Req-login_hint.txt 0000644 0000000 0000000 00000021124 13313427475 015116 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-login_hint
Test description: Providing login_hint
Timestamp: 2018-06-23T11:30:05Z
============================================================
Trace output
0.0 phase <--<-- 0 --- VerifyConfiguration -->-->
0.0 phase <--<-- 1 --- Note -->-->
1.35 phase <--<-- 2 --- Webfinger -->-->
1.351 not expected to do WebFinger
1.351 phase <--<-- 3 --- Discovery -->-->
1.351 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.426 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.428 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.428 phase <--<-- 4 --- Registration -->-->
1.428 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.428 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#CHKyD3trWj3Lunq6"
],
"response_types": [
"id_token"
]
}
1.592 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.593 RegistrationResponse {
"client_id": "3fea58d3-9f75-4c2f-8f4a-eca8b3c839f9",
"client_secret": "kNqCf8pQikfY",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "3fea58d3-9f75-4c2f-8f4a-eca8b3c839f9",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#CHKyD3trWj3Lunq6"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.593 phase <--<-- 5 --- AsyncAuthn -->-->
1.594 AuthorizationRequest {
"client_id": "3fea58d3-9f75-4c2f-8f4a-eca8b3c839f9",
"login_hint": "[email protected]",
"nonce": "nY94usd7XlCMCaEM",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "EH3iZQKez1ZJoaYt"
}
1.594 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=3fea58d3-9f75-4c2f-8f4a-eca8b3c839f9&state=EH3iZQKez1ZJoaYt&response_type=id_token&nonce=nY94usd7XlCMCaEM&login_hint=foo%40bar.com
1.594 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=3fea58d3-9f75-4c2f-8f4a-eca8b3c839f9&state=EH3iZQKez1ZJoaYt&response_type=id_token&nonce=nY94usd7XlCMCaEM&login_hint=foo%40bar.com
4.263 http args {}
4.429 response URL with fragment
4.43 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiM2ZlYTU4ZDMtOWY3NS00YzJmLThmNGEtZWNhOGIzYzgzOWY5Il0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU3MDA1LCJpYXQiOjE1Mjk3NTM0MDUsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjdmMDgxYWZhLWQ1NjYtNDI5MC04ZmM2LTBjNDQ2NjhiZWIwZiIsIm5vbmNlIjoiblk5NHVzZDdYbENNQ2FFTSIsInJhdCI6MTUyOTc1MzQwMiwic3ViIjoiZm9vQGJhci5jb20ifQ.Pc97eDjzFkQkcI3Li-rQJiL5yXYmLV9ulRf2UxKRAyugDg8KLxuB8zINF55Ct7LK--5Px-CaFbuI5KT0p2ugm05kwT0hoMZWmoRTCfbOhGeFSZxCxsSAWHmHfIumzthpwjQ73ROJkI3pNzrTDSYYntveq2Tboxt6R9HbtcGXtUt53pNEu632m4kX17C7X47MaRISCRxgTSt36COU7WHi52Z9VGHwXTs33WNBf3wI1uiyLEY8n-XFd8XdTT1yBgAOVCmv9gu26porFThvtyeE7SQWNthcjVAHPOjg8lNyacCpYbrRYkT3VBruvm3jcbqk4HpWxEB8NWsEluB4nMgFA-BWHb43C_RpdiRV8eBBDapFJaZSiwiflSO1g9Xa6JzCD8FHy3os5bW59Ga4jkBG8Upovh3ejbijGPl_Ea_j47W-Gv3OgQ47X9iShmO00uvf_4G3Ek7WtH8c-8mpeZHFP-RDxPafqskMAeMhaFvmtqQN-E2NxHrTJZueNfALB-jg04FA6XfeBVCgYFSIe5ZduOUjD2RzQVLW_TpnPt5rrBhApnhU7SMwYWSR8rxNqQEnyP6VgtUOzSfxcNYfbGaKWGB2Dt5kOVma966ysUkposFhi2Zq-ITORkgV3eHRif_VOpFS4Togk0IMVVOmhI6HMytwRPFTkRB4JAWu9TA4n-Q&state=EH3iZQKez1ZJoaYt
4.43 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiM2ZlYTU4ZDMtOWY3NS00YzJmLThmNGEtZWNhOGIzYzgzOWY5Il0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU3MDA1LCJpYXQiOjE1Mjk3NTM0MDUsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjdmMDgxYWZhLWQ1NjYtNDI5MC04ZmM2LTBjNDQ2NjhiZWIwZiIsIm5vbmNlIjoiblk5NHVzZDdYbENNQ2FFTSIsInJhdCI6MTUyOTc1MzQwMiwic3ViIjoiZm9vQGJhci5jb20ifQ.Pc97eDjzFkQkcI3Li-rQJiL5yXYmLV9ulRf2UxKRAyugDg8KLxuB8zINF55Ct7LK--5Px-CaFbuI5KT0p2ugm05kwT0hoMZWmoRTCfbOhGeFSZxCxsSAWHmHfIumzthpwjQ73ROJkI3pNzrTDSYYntveq2Tboxt6R9HbtcGXtUt53pNEu632m4kX17C7X47MaRISCRxgTSt36COU7WHi52Z9VGHwXTs33WNBf3wI1uiyLEY8n-XFd8XdTT1yBgAOVCmv9gu26porFThvtyeE7SQWNthcjVAHPOjg8lNyacCpYbrRYkT3VBruvm3jcbqk4HpWxEB8NWsEluB4nMgFA-BWHb43C_RpdiRV8eBBDapFJaZSiwiflSO1g9Xa6JzCD8FHy3os5bW59Ga4jkBG8Upovh3ejbijGPl_Ea_j47W-Gv3OgQ47X9iShmO00uvf_4G3Ek7WtH8c-8mpeZHFP-RDxPafqskMAeMhaFvmtqQN-E2NxHrTJZueNfALB-jg04FA6XfeBVCgYFSIe5ZduOUjD2RzQVLW_TpnPt5rrBhApnhU7SMwYWSR8rxNqQEnyP6VgtUOzSfxcNYfbGaKWGB2Dt5kOVma966ysUkposFhi2Zq-ITORkgV3eHRif_VOpFS4Togk0IMVVOmhI6HMytwRPFTkRB4JAWu9TA4n-Q', 'state': 'EH3iZQKez1ZJoaYt'}
4.514 AuthorizationResponse {
"id_token": {
"aud": [
"3fea58d3-9f75-4c2f-8f4a-eca8b3c839f9"
],
"auth_time": 1529753285,
"exp": 1529757005,
"iat": 1529753405,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "7f081afa-d566-4290-8fc6-0c44668beb0f",
"nonce": "nY94usd7XlCMCaEM",
"rat": 1529753402,
"sub": "[email protected]"
},
"state": "EH3iZQKez1ZJoaYt"
}
4.514 phase <--<-- 6 --- Done -->-->
4.514 end
4.515 assertion VerifyAuthnResponse
4.515 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
4.515 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-nonce-NoReq-noncode.txt 0000644 0000000 0000000 00000017502 13313427271 016005 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-nonce-NoReq-noncode
Test description: Reject requests without nonce unless using the code flow
Timestamp: 2018-06-23T11:27:53Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.107 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.108 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.108 phase <--<-- 2 --- Note -->-->
1.135 phase <--<-- 3 --- Registration -->-->
1.135 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.135 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#9ncfy7X8MW0M1NhQ"
],
"response_types": [
"id_token"
]
}
1.294 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.295 RegistrationResponse {
"client_id": "116536fa-946b-4353-a177-1d91598edb7a",
"client_secret": "txBMlXgmdNLC",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "116536fa-946b-4353-a177-1d91598edb7a",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#9ncfy7X8MW0M1NhQ"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.295 phase <--<-- 4 --- AsyncAuthn -->-->
1.296 AuthorizationRequest {
"client_id": "116536fa-946b-4353-a177-1d91598edb7a",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "jbly23LFhnPgawEy"
}
1.296 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?state=jbly23LFhnPgawEy&scope=openid&response_type=id_token&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=116536fa-946b-4353-a177-1d91598edb7a
1.296 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?state=jbly23LFhnPgawEy&scope=openid&response_type=id_token&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=116536fa-946b-4353-a177-1d91598edb7a
4.116 http args {}
4.285 response URL with fragment
4.285 response error=invalid_request&error_debug=Parameter+nonce+must+be+set+when+using+the+implicit+flow&error_description=The+request+is+missing+a+required+parameter%252C+includes+an+invalid+parameter+value%252C+includes+a+parameter+more+than+once%252C+or+is+otherwise+malformed&error_hint=Make+sure+that+the+various+parameters+are+correct%252C+be+aware+of+case+sensitivity+and+trim+your+parameters.+Make+sure+that+the+client+you+are+using+has+exactly+whitelisted+the+redirect_uri+you+specified.&state=jbly23LFhnPgawEy
4.285 response {'error_debug': 'Parameter nonce must be set when using the implicit flow', 'error_description': 'The request is missing a required parameter%2C includes an invalid parameter value%2C includes a parameter more than once%2C or is otherwise malformed', 'state': 'jbly23LFhnPgawEy', 'error': 'invalid_request', 'error_hint': 'Make sure that the various parameters are correct%2C be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.'}
4.286 AuthorizationErrorResponse {
"error": "invalid_request",
"error_debug": "Parameter nonce must be set when using the implicit flow",
"error_description": "The request is missing a required parameter%2C includes an invalid parameter value%2C includes a parameter more than once%2C or is otherwise malformed",
"error_hint": "Make sure that the various parameters are correct%2C be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.",
"state": "jbly23LFhnPgawEy"
}
4.286 AuthorizationErrorResponse {
"error": "invalid_request",
"error_debug": "Parameter nonce must be set when using the implicit flow",
"error_description": "The request is missing a required parameter%2C includes an invalid parameter value%2C includes a parameter more than once%2C or is otherwise malformed",
"error_hint": "Make sure that the various parameters are correct%2C be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.",
"state": "jbly23LFhnPgawEy"
}
4.286 phase <--<-- 5 --- Done -->-->
4.286 end
4.286 assertion VerifyResponse
4.286 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.286 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-IDToken-RS256.txt 0000644 0000000 0000000 00000021413 13313427237 014310 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-IDToken-RS256
Test description: Asymmetric ID Token signature with RS256
Timestamp: 2018-06-23T11:27:27Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.072 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Registration -->-->
0.074 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'id_token_signed_response_alg': 'RS256', 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.074 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id_token_signed_response_alg": "RS256",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#3f59vUTe64XKUVmp"
],
"response_types": [
"id_token"
]
}
0.266 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.267 RegistrationResponse {
"client_id": "9e423a6d-943e-490c-8207-988c05938638",
"client_secret": "BugeQLach7XY",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "9e423a6d-943e-490c-8207-988c05938638",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#3f59vUTe64XKUVmp"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.267 phase <--<-- 3 --- AsyncAuthn -->-->
0.268 AuthorizationRequest {
"client_id": "9e423a6d-943e-490c-8207-988c05938638",
"nonce": "RU2IFAAdjdSsAG22",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "QVDUaF72pZLG8o5E"
}
0.268 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=9e423a6d-943e-490c-8207-988c05938638&state=QVDUaF72pZLG8o5E&response_type=id_token&nonce=RU2IFAAdjdSsAG22
0.268 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=9e423a6d-943e-490c-8207-988c05938638&state=QVDUaF72pZLG8o5E&response_type=id_token&nonce=RU2IFAAdjdSsAG22
2.193 http args {}
2.365 response URL with fragment
2.365 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiOWU0MjNhNmQtOTQzZS00OTBjLTgyMDctOTg4YzA1OTM4NjM4Il0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODQ3LCJpYXQiOjE1Mjk3NTMyNDcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjQ4YjlhNmFiLWMyODEtNDM0Yy1hNWNmLTMxYjc3MjkzOGNjMyIsIm5vbmNlIjoiUlUySUZBQWRqZFNzQUcyMiIsInJhdCI6MTUyOTc1MzI0NSwic3ViIjoiZm9vQGJhci5jb20ifQ.j0t-d4nhI8k-CGoUEKFfKTFC4Ga38rXO1nHNoz7Mt9eterRM2fC7CUHhuGeCeVlfS3V007dwelqRG1VqW_v77tDY_N94Ymt8l1mxcWqjhKNmuJouMvsBoReNvO9uBwGZKL_7YpQbuFRir7oXcIkLvVfArPlzZFGdTvRFxeKGsMOjf1yOyg42smFxbb8k8sEUAWzuZ-SHI9OAJFJTwFFa4AuaqoNNv5bKV_1ySSaMoDlEw3cxXQ0BOZd7t-CtRm5ZlsRBs6MCkB9IgqJYVLgf7Vhifn30MepWFjwnJY64EwZFYqoqjygWfYox6mJMjm-53oEUZuHkSNN7D72Vt_YtNDI4JAnWs-44iaags9eVk3z6SQPDBFRkrY5q4mGpcEzqf0PVXnfGwGd9ybVpyyrJ7WH-uVshlcbgbXxOZ3BNcvzkskaJL2qmYsyf_6_QSOhRaNtKR_e-sCCjaYRmpsffJ6APdIhuvyVZwf-AY_pmsFcHtruDmULtpdcGSQThcGrOpwe0nLwiuAsXTTw-HcTX7Ea69wwHzE-U0sDKaaBmNHjbIBSJhNPgbkoOtx1JfV102LEYoWEyHitxL2mzt1E8vi2abQIq_VWX1604O7gP5ES0XwT5XU7lTzfJHo6y1MnwTzqDCQPF8iqTMllFwo8h2hPSSRMVQQxExgNu_G-AbEE&state=QVDUaF72pZLG8o5E
2.365 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiOWU0MjNhNmQtOTQzZS00OTBjLTgyMDctOTg4YzA1OTM4NjM4Il0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODQ3LCJpYXQiOjE1Mjk3NTMyNDcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjQ4YjlhNmFiLWMyODEtNDM0Yy1hNWNmLTMxYjc3MjkzOGNjMyIsIm5vbmNlIjoiUlUySUZBQWRqZFNzQUcyMiIsInJhdCI6MTUyOTc1MzI0NSwic3ViIjoiZm9vQGJhci5jb20ifQ.j0t-d4nhI8k-CGoUEKFfKTFC4Ga38rXO1nHNoz7Mt9eterRM2fC7CUHhuGeCeVlfS3V007dwelqRG1VqW_v77tDY_N94Ymt8l1mxcWqjhKNmuJouMvsBoReNvO9uBwGZKL_7YpQbuFRir7oXcIkLvVfArPlzZFGdTvRFxeKGsMOjf1yOyg42smFxbb8k8sEUAWzuZ-SHI9OAJFJTwFFa4AuaqoNNv5bKV_1ySSaMoDlEw3cxXQ0BOZd7t-CtRm5ZlsRBs6MCkB9IgqJYVLgf7Vhifn30MepWFjwnJY64EwZFYqoqjygWfYox6mJMjm-53oEUZuHkSNN7D72Vt_YtNDI4JAnWs-44iaags9eVk3z6SQPDBFRkrY5q4mGpcEzqf0PVXnfGwGd9ybVpyyrJ7WH-uVshlcbgbXxOZ3BNcvzkskaJL2qmYsyf_6_QSOhRaNtKR_e-sCCjaYRmpsffJ6APdIhuvyVZwf-AY_pmsFcHtruDmULtpdcGSQThcGrOpwe0nLwiuAsXTTw-HcTX7Ea69wwHzE-U0sDKaaBmNHjbIBSJhNPgbkoOtx1JfV102LEYoWEyHitxL2mzt1E8vi2abQIq_VWX1604O7gP5ES0XwT5XU7lTzfJHo6y1MnwTzqDCQPF8iqTMllFwo8h2hPSSRMVQQxExgNu_G-AbEE', 'state': 'QVDUaF72pZLG8o5E'}
2.456 AuthorizationResponse {
"id_token": {
"aud": [
"9e423a6d-943e-490c-8207-988c05938638"
],
"auth_time": 1529753136,
"exp": 1529756847,
"iat": 1529753247,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "48b9a6ab-c281-434c-a5cf-31b772938cc3",
"nonce": "RU2IFAAdjdSsAG22",
"rat": 1529753245,
"sub": "[email protected]"
},
"state": "QVDUaF72pZLG8o5E"
}
2.456 phase <--<-- 4 --- AccessToken -->-->
2.456 phase <--<-- 5 --- Done -->-->
2.456 end
2.457 assertion VerifyResponse
2.457 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.457 assertion VerifySignedIdToken
2.457 condition verify-idtoken-is-signed: status=OK [Verifies that an ID Token is signed]
2.457 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-idtoken-is-signed: status=OK [Verifies that an ID Token is signed]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Registration-Sector-Bad.txt 0000644 0000000 0000000 00000013142 13313427206 016623 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-Sector-Bad
Test description: Incorrect registration of sector_identifier_uri
Timestamp: 2018-06-23T11:27:02Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.108 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.109 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.109 phase <--<-- 2 --- Registration -->-->
0.11 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'sector_identifier_uri': 'https://op.certification.openid.net:61353/export/siu.json', 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.11 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#17iLbzPCPFY2UkLz"
],
"response_types": [
"id_token"
],
"sector_identifier_uri": "https://op.certification.openid.net:61353/export/siu.json"
}
0.327 http response url:https://oidc-certification.ory.sh:8443/clients status_code:400 message:{"error":"invalid_request","error_description":"The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed","error_hint":"Make sure that the various parameters are correct, be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.","status_code":400,"error_debug":"Redirect URL \"https://op.certification.openid.net:61353/authz_cb\" does not match values from sector_identifier_uri."}
0.327 ErrorResponse {
"error": "invalid_request",
"error_debug": "Redirect URL \"https://op.certification.openid.net:61353/authz_cb\" does not match values from sector_identifier_uri.",
"error_description": "The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed",
"error_hint": "Make sure that the various parameters are correct, be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.",
"status_code": 400
}
0.328 exception RegistrationError:{'error_debug': 'Redirect URL "https://op.certification.openid.net:61353/authz_cb" does not match values from sector_identifier_uri.', 'error_description': 'The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed', 'status_code': 400, 'error': 'invalid_request', 'error_hint': 'Make sure that the various parameters are correct, be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.'}
0.328 event got expected exception RegistrationError
0.328 phase <--<-- 3 --- Done -->-->
0.328 end
0.328 condition Done: status=OK
============================================================
Conditions
Done: status=OK
============================================================
RESULT: PASSED
./OP-display-popup.txt 0000644 0000000 0000000 00000021014 13313427263 015036 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-display-popup
Test description: Request with display=popup
Timestamp: 2018-06-23T11:27:47Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.466 phase <--<-- 1 --- Webfinger -->-->
1.466 not expected to do WebFinger
1.466 phase <--<-- 2 --- Discovery -->-->
1.466 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.561 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.563 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.563 phase <--<-- 3 --- Registration -->-->
1.563 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.563 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#VsKzM39eonsgNweI"
],
"response_types": [
"id_token"
]
}
1.723 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.724 RegistrationResponse {
"client_id": "4578d270-468d-41cf-8057-96db32b42fc0",
"client_secret": "UwfWV7ukLIBy",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "4578d270-468d-41cf-8057-96db32b42fc0",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#VsKzM39eonsgNweI"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.724 phase <--<-- 4 --- AsyncAuthn -->-->
1.724 AuthorizationRequest {
"client_id": "4578d270-468d-41cf-8057-96db32b42fc0",
"display": "popup",
"nonce": "RrWeMPfuwt0ZTMU8",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "jjV6HkftTFiZllwE"
}
1.724 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=4578d270-468d-41cf-8057-96db32b42fc0&state=jjV6HkftTFiZllwE&response_type=id_token&nonce=RrWeMPfuwt0ZTMU8&display=popup
1.725 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=4578d270-468d-41cf-8057-96db32b42fc0&state=jjV6HkftTFiZllwE&response_type=id_token&nonce=RrWeMPfuwt0ZTMU8&display=popup
4.465 http args {}
4.634 response URL with fragment
4.635 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNDU3OGQyNzAtNDY4ZC00MWNmLTgwNTctOTZkYjMyYjQyZmMwIl0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODY3LCJpYXQiOjE1Mjk3NTMyNjcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjUwNTg2ODY5LTQ4NmItNDg4ZS05ZjJlLTljMzc2OTE5ZjU4MyIsIm5vbmNlIjoiUnJXZU1QZnV3dDBaVE1VOCIsInJhdCI6MTUyOTc1MzI2NCwic3ViIjoiZm9vQGJhci5jb20ifQ.FKt2f_tszRIDmGdUYyx9qsaQK05vsu42xEGR94flzEY65P_F35gdrfoiAE4u3LrMGV-WLFm7Cix5W6c6LFiNz1WVxSAnF1QrbR60dx6r_Jc7MxkElS6nZe0mw2J27BDQxUMaK71pq6IhYz6u3B2TZUXYlITSYFupMPGp4aXGjxeaGmqMGzA6JpOS8xR-IB7JX3K5WhckzHSoXb-WRRwU5_gFs24sTDpImyTNdYw3sTlyOq-NirRKcC6M_wG8U4jOnHPJ4MR5DTnJSoclmIf_l2KBIm3XUIaViapjlYxANt888IIEE_C6-0AWri3XMtXaK3OYZjbwTj6hJiS7-E4Gek2VSC6aH7GIb83bPXOibateTNhfr_jmoNuRg3wTrlCy-lrNBRRam3R4ajkZoeub3D6_JbHWcFPBGp6GAlHgMA48vu1OrrjU7maU-Xzl4WpVvMY-zgvCe9e49wX4ump5bONK6-aZxVrX_7KhgwsF0us0Ik-BVncB1DSGYbH5EAaE8PTpi7hyRXulB5pnYI1tOqBLFZkfwgBMXePcZa61vettwoghHZSVvtp7lhfxb-gwd_TaeLtzDqaM0tarLf1pwDBLy3W5jFwxx87f0F_a1zn_XaUt7vTtbPg_xsSUweJ1ebpm8nabievcb3qhb0gRFJIfSi6QX7d0QtgtsX-qjHI&state=jjV6HkftTFiZllwE
4.635 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNDU3OGQyNzAtNDY4ZC00MWNmLTgwNTctOTZkYjMyYjQyZmMwIl0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODY3LCJpYXQiOjE1Mjk3NTMyNjcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjUwNTg2ODY5LTQ4NmItNDg4ZS05ZjJlLTljMzc2OTE5ZjU4MyIsIm5vbmNlIjoiUnJXZU1QZnV3dDBaVE1VOCIsInJhdCI6MTUyOTc1MzI2NCwic3ViIjoiZm9vQGJhci5jb20ifQ.FKt2f_tszRIDmGdUYyx9qsaQK05vsu42xEGR94flzEY65P_F35gdrfoiAE4u3LrMGV-WLFm7Cix5W6c6LFiNz1WVxSAnF1QrbR60dx6r_Jc7MxkElS6nZe0mw2J27BDQxUMaK71pq6IhYz6u3B2TZUXYlITSYFupMPGp4aXGjxeaGmqMGzA6JpOS8xR-IB7JX3K5WhckzHSoXb-WRRwU5_gFs24sTDpImyTNdYw3sTlyOq-NirRKcC6M_wG8U4jOnHPJ4MR5DTnJSoclmIf_l2KBIm3XUIaViapjlYxANt888IIEE_C6-0AWri3XMtXaK3OYZjbwTj6hJiS7-E4Gek2VSC6aH7GIb83bPXOibateTNhfr_jmoNuRg3wTrlCy-lrNBRRam3R4ajkZoeub3D6_JbHWcFPBGp6GAlHgMA48vu1OrrjU7maU-Xzl4WpVvMY-zgvCe9e49wX4ump5bONK6-aZxVrX_7KhgwsF0us0Ik-BVncB1DSGYbH5EAaE8PTpi7hyRXulB5pnYI1tOqBLFZkfwgBMXePcZa61vettwoghHZSVvtp7lhfxb-gwd_TaeLtzDqaM0tarLf1pwDBLy3W5jFwxx87f0F_a1zn_XaUt7vTtbPg_xsSUweJ1ebpm8nabievcb3qhb0gRFJIfSi6QX7d0QtgtsX-qjHI', 'state': 'jjV6HkftTFiZllwE'}
4.72 AuthorizationResponse {
"id_token": {
"aud": [
"4578d270-468d-41cf-8057-96db32b42fc0"
],
"auth_time": 1529753136,
"exp": 1529756867,
"iat": 1529753267,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "50586869-486b-488e-9f2e-9c376919f583",
"nonce": "RrWeMPfuwt0ZTMU8",
"rat": 1529753264,
"sub": "[email protected]"
},
"state": "jjV6HkftTFiZllwE"
}
4.72 phase <--<-- 5 --- Done -->-->
4.72 end
4.72 assertion VerifyResponse
4.72 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.72 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-redirect_uri-RegFrag.txt 0000644 0000000 0000000 00000011523 13313427372 016230 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-RegFrag
Test description: Reject registration where a redirect_uri has a fragment
Timestamp: 2018-06-23T11:28:58Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.001 phase <--<-- 1 --- Discovery -->-->
0.001 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Registration -->-->
0.075 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb#foobar'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.075 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb#foobar"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#s9hMCI8H4YGxdNGk"
],
"response_types": [
"id_token"
]
}
0.183 http response url:https://oidc-certification.ory.sh:8443/clients status_code:400 message:{"error":"invalid_request","error_description":"The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed","error_hint":"Redirect URIs must not contain fragments (#)","status_code":400}
0.183 ErrorResponse {
"error": "invalid_request",
"error_description": "The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed",
"error_hint": "Redirect URIs must not contain fragments (#)",
"status_code": 400
}
0.183 exception RegistrationError:{'error_description': 'The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed', 'status_code': 400, 'error': 'invalid_request', 'error_hint': 'Redirect URIs must not contain fragments (#)'}
0.183 event got expected exception RegistrationError
0.184 phase <--<-- 3 --- Done -->-->
0.184 end
0.184 assertion VerifyErrorMessage
0.184 condition verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
0.184 condition Done: status=OK
============================================================
Conditions
verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Discovery-JWKs.txt 0000644 0000000 0000000 00000006120 13313427201 015004 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Discovery-JWKs
Test description: Keys in OP JWKs well formed
Timestamp: 2018-06-23T11:26:57Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.113 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.114 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.114 phase <--<-- 2 --- Done -->-->
0.114 end
0.115 assertion CheckHTTPResponse
0.115 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.115 assertion VerifyBase64URL
0.182 http response url:https://oidc-certification.ory.sh:8443/.well-known/jwks.json status_code:200
0.184 condition verify-base64url: status=OK [Verifies that the base64 encoded parts of a JWK is in fact base64url encoded and not just base64 encoded]
0.184 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-base64url: status=OK [Verifies that the base64 encoded parts of a JWK is in fact base64url encoded and not just base64 encoded]
Done: status=OK
============================================================
RESULT: PASSED
./OP-scope-profile.txt 0000644 0000000 0000000 00000024101 13313427435 015000 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-scope-profile
Test description: Scope requesting profile claims
Timestamp: 2018-06-23T11:29:33Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.083 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.084 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.084 phase <--<-- 2 --- Registration -->-->
0.084 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.085 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#P1jXjgkCQ50Wm9Zr"
],
"response_types": [
"id_token"
]
}
0.249 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.25 RegistrationResponse {
"client_id": "a3e6ea96-d80c-4cb7-9eec-59f33867ca07",
"client_secret": "9198DV6yHPFD",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "a3e6ea96-d80c-4cb7-9eec-59f33867ca07",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#P1jXjgkCQ50Wm9Zr"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.25 phase <--<-- 3 --- AsyncAuthn -->-->
0.25 condition Check support: status=WARNING, message=No support for: scopes_supported=['profile']
0.25 AuthorizationRequest {
"client_id": "a3e6ea96-d80c-4cb7-9eec-59f33867ca07",
"nonce": "QX0vGUJEgtaGgrxE",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid profile",
"state": "JRDqRbC31o8vxVYc"
}
0.251 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+profile&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=a3e6ea96-d80c-4cb7-9eec-59f33867ca07&state=JRDqRbC31o8vxVYc&response_type=id_token&nonce=QX0vGUJEgtaGgrxE
0.251 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+profile&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=a3e6ea96-d80c-4cb7-9eec-59f33867ca07&state=JRDqRbC31o8vxVYc&response_type=id_token&nonce=QX0vGUJEgtaGgrxE
2.473 http args {}
2.637 response URL with fragment
2.637 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYTNlNmVhOTYtZDgwYy00Y2I3LTllZWMtNTlmMzM4NjdjYTA3Il0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTczLCJpYXQiOjE1Mjk3NTMzNzMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImQ2YmFiZmFmLTYyNzUtNDAzYS1hNTZiLTAyMjcxZDFlZTNjOCIsIm5vbmNlIjoiUVgwdkdVSkVndGFHZ3J4RSIsInJhdCI6MTUyOTc1MzM3MSwic3ViIjoiZm9vQGJhci5jb20ifQ.mamUjexFuthwsDdDhYtprxCvzl5Wrj228qmInvrySt67-x4IRUo3H3FN3Kp04rGHODtuo_yx64l_GxkyW40Yr3wmwgHkblBe6riupC4Zxxs35oRPRbkUMdnCTDVxKh2bSp8ZlALZMub7MS6O6b-f2sF4z8tEcvqnNeiObb77NJ0ClrahHy3rDLNhBYHWBWVlMC3NgGLlo_vgUwKfEGmuHE-BfwWNXNPhr8JMGtDANCsSJVEu4sfWNxL-Ik1zTraszxiaBJ5RVktcuMyajcTd4P0q3tgNO9RYejZvUhYHzZ-Df5e_VgOIc6a6Nn1lTdQY7XYmu5EGRBGhFko7trQvMhZ3O2ifh41QBHPjs6_MdspgzyKqkd5Nhws1s5gBEgU6R8aNp_gF0ehMZKkSfm7SspcH-4c1PxSX7lmFLocYU149JpBksYNl0Q9uY-Rp_KZWyJ3qLGoJsMBVW5_cJIt0PkZs7On0vg6dXKqolfqpSorIVZCdLF4yqbS2OAxzX1KtLQ7Qy_WDlktsrg_QyCUlCI9CDdMm2KQ6vd56CIi-Ag5KWeo3AynJMZufUgsWc7o-G8fok8DuRPEEIhtMVsyq3a9xEw1sgzJT8XuImir_dUW92J5jaD_99GiXZhl5vu9TFI0tPLuMOmIvjEyKsqh1BN8lRgQvedCeg7lLzRfnnZs&state=JRDqRbC31o8vxVYc
2.637 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYTNlNmVhOTYtZDgwYy00Y2I3LTllZWMtNTlmMzM4NjdjYTA3Il0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTczLCJpYXQiOjE1Mjk3NTMzNzMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImQ2YmFiZmFmLTYyNzUtNDAzYS1hNTZiLTAyMjcxZDFlZTNjOCIsIm5vbmNlIjoiUVgwdkdVSkVndGFHZ3J4RSIsInJhdCI6MTUyOTc1MzM3MSwic3ViIjoiZm9vQGJhci5jb20ifQ.mamUjexFuthwsDdDhYtprxCvzl5Wrj228qmInvrySt67-x4IRUo3H3FN3Kp04rGHODtuo_yx64l_GxkyW40Yr3wmwgHkblBe6riupC4Zxxs35oRPRbkUMdnCTDVxKh2bSp8ZlALZMub7MS6O6b-f2sF4z8tEcvqnNeiObb77NJ0ClrahHy3rDLNhBYHWBWVlMC3NgGLlo_vgUwKfEGmuHE-BfwWNXNPhr8JMGtDANCsSJVEu4sfWNxL-Ik1zTraszxiaBJ5RVktcuMyajcTd4P0q3tgNO9RYejZvUhYHzZ-Df5e_VgOIc6a6Nn1lTdQY7XYmu5EGRBGhFko7trQvMhZ3O2ifh41QBHPjs6_MdspgzyKqkd5Nhws1s5gBEgU6R8aNp_gF0ehMZKkSfm7SspcH-4c1PxSX7lmFLocYU149JpBksYNl0Q9uY-Rp_KZWyJ3qLGoJsMBVW5_cJIt0PkZs7On0vg6dXKqolfqpSorIVZCdLF4yqbS2OAxzX1KtLQ7Qy_WDlktsrg_QyCUlCI9CDdMm2KQ6vd56CIi-Ag5KWeo3AynJMZufUgsWc7o-G8fok8DuRPEEIhtMVsyq3a9xEw1sgzJT8XuImir_dUW92J5jaD_99GiXZhl5vu9TFI0tPLuMOmIvjEyKsqh1BN8lRgQvedCeg7lLzRfnnZs', 'state': 'JRDqRbC31o8vxVYc'}
2.718 AuthorizationResponse {
"id_token": {
"aud": [
"a3e6ea96-d80c-4cb7-9eec-59f33867ca07"
],
"auth_time": 1529753285,
"exp": 1529756973,
"iat": 1529753373,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "d6babfaf-6275-403a-a56b-02271d1ee3c8",
"nonce": "QX0vGUJEgtaGgrxE",
"rat": 1529753371,
"sub": "[email protected]"
},
"state": "JRDqRbC31o8vxVYc"
}
2.718 phase <--<-- 4 --- AccessToken -->-->
2.718 phase <--<-- 5 --- UserInfo -->-->
2.718 phase <--<-- 6 --- Done -->-->
2.718 end
2.719 assertion CheckHTTPResponse
2.719 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
2.719 assertion VerifyResponse
2.719 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.72 assertion VerifyScopes
2.72 condition verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username'] [Verifies that the claims corresponding to the requested scopes are returned]
2.72 condition Done: status=OK
============================================================
Conditions
Check support: status=WARNING, message=No support for: scopes_supported=['profile']
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username'] [Verifies that the claims corresponding to the requested scopes are returned]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
No support for: scopes_supported=['profile']
The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username']
./OP-redirect_uri-Query-Mismatch.txt 0000644 0000000 0000000 00000011075 13313427363 017565 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-Query-Mismatch
Test description: Rejects redirect_uri when query parameter does not match what is registed
Timestamp: 2018-06-23T11:28:51Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.079 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.08 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.08 phase <--<-- 2 --- Registration -->-->
0.08 register kwargs:{'application_name': 'OIC test tool', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'redirect_uri': ['https://op.certification.openid.net:61353/authz_cb?foo=bar']}
0.081 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#9jkQsZoejhh95VxB"
],
"response_types": [
"id_token"
]
}
0.283 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.284 RegistrationResponse {
"client_id": "6849593a-90ea-4d53-9507-c0beca40add9",
"client_secret": "kzTM9UvkYz9P",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "6849593a-90ea-4d53-9507-c0beca40add9",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#9jkQsZoejhh95VxB"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.284 phase <--<-- 3 --- Note -->-->
============================================================
Conditions
============================================================
RESULT: PARTIAL RESULT
./OP-nonce-noncode.txt 0000644 0000000 0000000 00000021502 13313427275 014762 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-nonce-noncode
Test description: Request with nonce, verifies it was returned in ID Token [Implicit, Hybrid]
Timestamp: 2018-06-23T11:27:57Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.114 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.115 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.115 phase <--<-- 2 --- Registration -->-->
0.115 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.116 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#jfMQN53pPWreCiSE"
],
"response_types": [
"id_token"
]
}
0.272 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.273 RegistrationResponse {
"client_id": "6c7f57c7-695a-4963-8455-2e013ca8ca54",
"client_secret": "d6dII5njj3Wi",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "6c7f57c7-695a-4963-8455-2e013ca8ca54",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#jfMQN53pPWreCiSE"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.273 phase <--<-- 3 --- AsyncAuthn -->-->
0.274 AuthorizationRequest {
"client_id": "6c7f57c7-695a-4963-8455-2e013ca8ca54",
"nonce": "lSChZpbwZ3eqChYb",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "oRvATxqAZueTGZlz"
}
0.274 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=6c7f57c7-695a-4963-8455-2e013ca8ca54&state=oRvATxqAZueTGZlz&response_type=id_token&nonce=lSChZpbwZ3eqChYb
0.274 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=6c7f57c7-695a-4963-8455-2e013ca8ca54&state=oRvATxqAZueTGZlz&response_type=id_token&nonce=lSChZpbwZ3eqChYb
2.445 http args {}
2.663 response URL with fragment
2.663 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNmM3ZjU3YzctNjk1YS00OTYzLTg0NTUtMmUwMTNjYThjYTU0Il0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODc2LCJpYXQiOjE1Mjk3NTMyNzYsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjVmNTE4NGE1LWM5OTgtNGU0My04ZjQ2LWU2MjQyZWRkNmU2OCIsIm5vbmNlIjoibFNDaFpwYndaM2VxQ2hZYiIsInJhdCI6MTUyOTc1MzI3NSwic3ViIjoiZm9vQGJhci5jb20ifQ.JAyLpgLrWAuWU4j8H35ZtaJiy7Hy-AkSocV9X9WdzRyUSixwqbyYCF2nX_UUS4WTWRYh4RstQyHVjvkMU0OLnf4VuCcM71wk4_yxnWxxBYeu8YIZa9hBLm6lyQNbHjwxSs0BOubq9-nYaqs_GOm-0cJ43mvjF5olw7vyOSSebRtp2RwPjEJknb-9ls3CCKXbZUpEaCSbpZJViSOAV2heGiI8FXz0VYWAa6cN-7AhTc-FCNUN5DaZ0boXAhNXLsTVuIpgN0Ma7XP5xp2HR42JGBooB8XP4jv5iaHZJnv6WG0Kw2xeaKKtpmEBlZAugMMPj-N_o0BCmg8ZhuGhvNnwi0v9u0_bpi48i5O-wjS64-7WCmysq1JywOv_jLYJnCSN1Q1Bej6qhzzvKNFMGSv-xk9ThF64YMx-as9Kuj1xr4-Jw1GT0TcowkcY7njN16nhGLpMFUcFJeC7R_-pQwMJGc8cgUeG60Rmw6G14klRymStc-p6Mpsie6VGcNyzIjmEN2LmF3QI7GvyDyvxyXkQk9a5cg8R510KDbLefXsiIhq6fssfDF9j9JtKExTgYOKQ5v90U2Imt6quCkOi40Yu0uiFuevAyuihhcaJUcbuBmgZO747xQhN6OCDj1nTi0S3SDLYcL0orlSPBEW-f9mm_V4AulUho8P9RysjkWzgNKU&state=oRvATxqAZueTGZlz
2.663 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNmM3ZjU3YzctNjk1YS00OTYzLTg0NTUtMmUwMTNjYThjYTU0Il0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODc2LCJpYXQiOjE1Mjk3NTMyNzYsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjVmNTE4NGE1LWM5OTgtNGU0My04ZjQ2LWU2MjQyZWRkNmU2OCIsIm5vbmNlIjoibFNDaFpwYndaM2VxQ2hZYiIsInJhdCI6MTUyOTc1MzI3NSwic3ViIjoiZm9vQGJhci5jb20ifQ.JAyLpgLrWAuWU4j8H35ZtaJiy7Hy-AkSocV9X9WdzRyUSixwqbyYCF2nX_UUS4WTWRYh4RstQyHVjvkMU0OLnf4VuCcM71wk4_yxnWxxBYeu8YIZa9hBLm6lyQNbHjwxSs0BOubq9-nYaqs_GOm-0cJ43mvjF5olw7vyOSSebRtp2RwPjEJknb-9ls3CCKXbZUpEaCSbpZJViSOAV2heGiI8FXz0VYWAa6cN-7AhTc-FCNUN5DaZ0boXAhNXLsTVuIpgN0Ma7XP5xp2HR42JGBooB8XP4jv5iaHZJnv6WG0Kw2xeaKKtpmEBlZAugMMPj-N_o0BCmg8ZhuGhvNnwi0v9u0_bpi48i5O-wjS64-7WCmysq1JywOv_jLYJnCSN1Q1Bej6qhzzvKNFMGSv-xk9ThF64YMx-as9Kuj1xr4-Jw1GT0TcowkcY7njN16nhGLpMFUcFJeC7R_-pQwMJGc8cgUeG60Rmw6G14klRymStc-p6Mpsie6VGcNyzIjmEN2LmF3QI7GvyDyvxyXkQk9a5cg8R510KDbLefXsiIhq6fssfDF9j9JtKExTgYOKQ5v90U2Imt6quCkOi40Yu0uiFuevAyuihhcaJUcbuBmgZO747xQhN6OCDj1nTi0S3SDLYcL0orlSPBEW-f9mm_V4AulUho8P9RysjkWzgNKU', 'state': 'oRvATxqAZueTGZlz'}
2.745 AuthorizationResponse {
"id_token": {
"aud": [
"6c7f57c7-695a-4963-8455-2e013ca8ca54"
],
"auth_time": 1529753136,
"exp": 1529756876,
"iat": 1529753276,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "5f5184a5-c998-4e43-8f46-e6242edd6e68",
"nonce": "lSChZpbwZ3eqChYb",
"rat": 1529753275,
"sub": "[email protected]"
},
"state": "oRvATxqAZueTGZlz"
}
2.745 phase <--<-- 4 --- AccessToken -->-->
2.745 phase <--<-- 5 --- Done -->-->
2.745 end
2.746 assertion VerifyResponse
2.746 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.746 assertion CheckIdTokenNonce
2.746 condition check-idtoken-nonce: status=OK [Verify that the nonce in the IDToken is the same that's included in the Authorization Request.]
2.746 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
check-idtoken-nonce: status=OK [Verify that the nonce in the IDToken is the same that's included in the Authorization Request.]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Rotation-OP-Sig.txt 0000644 0000000 0000000 00000011554 13313427536 015076 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Rotation-OP-Sig
Test description: Can rotate OP signing keys
Timestamp: 2018-06-23T11:30:38Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.075 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.076 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.076 phase <--<-- 2 --- FetchKeys -->-->
0.149 phase <--<-- 3 --- Note -->-->
6.637 phase <--<-- 4 --- Webfinger -->-->
6.637 not expected to do WebFinger
6.637 phase <--<-- 5 --- Discovery -->-->
6.637 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
7.667 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
7.668 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
7.668 phase <--<-- 6 --- FetchKeys -->-->
7.741 phase <--<-- 7 --- Done -->-->
7.741 end
7.742 assertion CheckHTTPResponse
7.742 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
7.742 assertion NewSigningKeys
7.742 condition new-signing-keys: status=OK [Verifies that two set of signing keys are not the same]
7.742 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
new-signing-keys: status=OK [Verifies that two set of signing keys are not the same]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Req-max_age=10000.txt 0000644 0000000 0000000 00000031656 13313427517 015053 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-max_age=10000
Test description: Requesting ID Token with max_age=10000 seconds restriction
Timestamp: 2018-06-23T11:30:23Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.084 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.085 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.085 phase <--<-- 2 --- Registration -->-->
0.085 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.086 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#X7wVXJDD4XCjHqI9"
],
"response_types": [
"id_token"
]
}
0.241 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.242 RegistrationResponse {
"client_id": "d93fcd38-9333-4af2-a146-706de067980f",
"client_secret": "xIeavEm~9.cu",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "d93fcd38-9333-4af2-a146-706de067980f",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#X7wVXJDD4XCjHqI9"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.242 phase <--<-- 3 --- AsyncAuthn -->-->
0.242 AuthorizationRequest {
"client_id": "d93fcd38-9333-4af2-a146-706de067980f",
"nonce": "yNBCcMfHnBMlyia0",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "5KeF3wNMSUgRmzdD"
}
0.243 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=d93fcd38-9333-4af2-a146-706de067980f&state=5KeF3wNMSUgRmzdD&response_type=id_token&nonce=yNBCcMfHnBMlyia0
0.243 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=d93fcd38-9333-4af2-a146-706de067980f&state=5KeF3wNMSUgRmzdD&response_type=id_token&nonce=yNBCcMfHnBMlyia0
2.599 http args {}
2.805 response URL with fragment
2.805 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZDkzZmNkMzgtOTMzMy00YWYyLWExNDYtNzA2ZGUwNjc5ODBmIl0sImF1dGhfdGltZSI6MTUyOTc1MzQxNCwiZXhwIjoxNTI5NzU3MDIxLCJpYXQiOjE1Mjk3NTM0MjEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImNlZDhiZjlhLTU2OTItNGViNi1hYzg5LTRiZTZmOTFiNzA0YyIsIm5vbmNlIjoieU5CQ2NNZkhuQk1seWlhMCIsInJhdCI6MTUyOTc1MzQxOSwic3ViIjoiZm9vQGJhci5jb20ifQ.hKol9yGZN04e8pI1TuhmVRpN6ovc3IGrSwjac50DRfJlrwLsFh4ayfdWaUZsgRAYIYerldhBHUCxy98mWYr-SgJZ5t5jI8M-l441OvSnoOvyuY2oNqafe7d7uokaEMToc6Jrg8leT0GxN-8eh0FMAbLvCaM4lvUwSbh3ziEmB3bzwJy812pKZYZ_PLXP41czPeQokEc5b4axV4ub83oa8O05_k599r2zBUH9Zd1gtNb_t-P0-ZrcR0a9Y8HYRzAyvBoNy9qkeQdj8311FMKSwEU41oQwF3DtaLPfLfnKAg1oPffirm1M52oPVLyGZKpf-0tv4H-_KI-9gWSUD4CMDXr1dHZsX1avIHSw92_ja1uPpVqgessYQnraO2-ZsyMvL7al9keX_G0XdDfbh9WC-u_IdmVcL71oJ4h89yfKqPtgYZFHCe2IQqUKM2GFdfK3yr03J2CbbHK0Q3hfsQnEcjVuuWuJUJrdGG5dXfe5P14qjUCigZHBj7exriPF5sIohWzWxJOhT1h4KKtjlZdOrXxr6l-nDTg8PsU2FF_GMpd7DgXK_kw4V7sXyMYkBG9lgPhrYUmwOs6nM7F4ZOocnbQapT175kAKqZgLwY1tCeIvFWn28jHTNFU0GvvkzS22AlQtskce_OVc3uKozE5PPk6d1NH-a3kBBm6J78uexdg&state=5KeF3wNMSUgRmzdD
2.806 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZDkzZmNkMzgtOTMzMy00YWYyLWExNDYtNzA2ZGUwNjc5ODBmIl0sImF1dGhfdGltZSI6MTUyOTc1MzQxNCwiZXhwIjoxNTI5NzU3MDIxLCJpYXQiOjE1Mjk3NTM0MjEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImNlZDhiZjlhLTU2OTItNGViNi1hYzg5LTRiZTZmOTFiNzA0YyIsIm5vbmNlIjoieU5CQ2NNZkhuQk1seWlhMCIsInJhdCI6MTUyOTc1MzQxOSwic3ViIjoiZm9vQGJhci5jb20ifQ.hKol9yGZN04e8pI1TuhmVRpN6ovc3IGrSwjac50DRfJlrwLsFh4ayfdWaUZsgRAYIYerldhBHUCxy98mWYr-SgJZ5t5jI8M-l441OvSnoOvyuY2oNqafe7d7uokaEMToc6Jrg8leT0GxN-8eh0FMAbLvCaM4lvUwSbh3ziEmB3bzwJy812pKZYZ_PLXP41czPeQokEc5b4axV4ub83oa8O05_k599r2zBUH9Zd1gtNb_t-P0-ZrcR0a9Y8HYRzAyvBoNy9qkeQdj8311FMKSwEU41oQwF3DtaLPfLfnKAg1oPffirm1M52oPVLyGZKpf-0tv4H-_KI-9gWSUD4CMDXr1dHZsX1avIHSw92_ja1uPpVqgessYQnraO2-ZsyMvL7al9keX_G0XdDfbh9WC-u_IdmVcL71oJ4h89yfKqPtgYZFHCe2IQqUKM2GFdfK3yr03J2CbbHK0Q3hfsQnEcjVuuWuJUJrdGG5dXfe5P14qjUCigZHBj7exriPF5sIohWzWxJOhT1h4KKtjlZdOrXxr6l-nDTg8PsU2FF_GMpd7DgXK_kw4V7sXyMYkBG9lgPhrYUmwOs6nM7F4ZOocnbQapT175kAKqZgLwY1tCeIvFWn28jHTNFU0GvvkzS22AlQtskce_OVc3uKozE5PPk6d1NH-a3kBBm6J78uexdg', 'state': '5KeF3wNMSUgRmzdD'}
2.925 AuthorizationResponse {
"id_token": {
"aud": [
"d93fcd38-9333-4af2-a146-706de067980f"
],
"auth_time": 1529753414,
"exp": 1529757021,
"iat": 1529753421,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "ced8bf9a-5692-4eb6-ac89-4be6f91b704c",
"nonce": "yNBCcMfHnBMlyia0",
"rat": 1529753419,
"sub": "[email protected]"
},
"state": "5KeF3wNMSUgRmzdD"
}
2.925 phase <--<-- 4 --- AccessToken -->-->
2.926 phase <--<-- 5 --- AsyncAuthn -->-->
2.926 AuthorizationRequest {
"client_id": "d93fcd38-9333-4af2-a146-706de067980f",
"max_age": 10000,
"nonce": "o2WTfATrVZ49dvLW",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "WRpNzRqUYRIuUO94"
}
2.926 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?max_age=10000&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=d93fcd38-9333-4af2-a146-706de067980f&state=WRpNzRqUYRIuUO94&response_type=id_token&nonce=o2WTfATrVZ49dvLW
2.926 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?max_age=10000&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=d93fcd38-9333-4af2-a146-706de067980f&state=WRpNzRqUYRIuUO94&response_type=id_token&nonce=o2WTfATrVZ49dvLW
4.354 http args {}
4.534 response URL with fragment
4.534 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZDkzZmNkMzgtOTMzMy00YWYyLWExNDYtNzA2ZGUwNjc5ODBmIl0sImF1dGhfdGltZSI6MTUyOTc1MzQxNCwiZXhwIjoxNTI5NzU3MDIzLCJpYXQiOjE1Mjk3NTM0MjMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjBlYzllYmMyLWY1NjQtNDVmMi05OWUzLWU5ODcyNGRiZTI0YiIsIm5vbmNlIjoibzJXVGZBVHJWWjQ5ZHZMVyIsInJhdCI6MTUyOTc1MzQyMiwic3ViIjoiZm9vQGJhci5jb20ifQ.hs-1amxk9bHk3OZ-tsz3-41eD-HEMiuBmhI6vBFKi13bfr27ztW75odSHAdUhBoSBaKt5tbUwPsfR_lVBQ5E28ExRA4KCToELNrt6jfCorIVxsikqgr7TRMGqEXvwCZqXG-eKzWKma1nuR5jEx_7jDjCKUZuqgDSgPFVB2qzINQJiJKL1P-6rFaFOnL5phvL0Rz91kZGCw0-7v6moDb4KL0cPXcp784GmPMVOeXNjGyzex6-cM9GAJfPAIVkc-6eSnhc4f7xUOH2m607BLqPm-ue5xniyYJat00mbO528kWMshmv-51ZB-3Owg2kaD83hL_fXW_suDqHrLvi6jNL9RjP3-s43pH4DXUrrNNeyHwv7PUdrmXa9B6x8U30KKI21RkiA3xj0iNHqN08b-zpB_dWZey_gqU1UfHDeZRQ_ZTpTkvNqIamQVHtomGquwnbdIlXiDenbpOUghBCfmbSXgCA-0TD6gUTD1jvbvfZ-IVVWg2pllAnIlTFuNvqrUpCfe6OhSG-q-zWMzMHdzc5QIzTGh04D4A7pndodKuFwV5FmT62ltu-wOLKivzWk1KmgGaTIEGmvuAfbN1iQYutLlRlCJGIwaKfY5B_WyWruxmr6i0ZQEmK09Wnpdb2WveGArb_5wzC80EFA1LuFefg1TAsSCrwPjZnCY9AYsbic20&state=WRpNzRqUYRIuUO94
4.535 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZDkzZmNkMzgtOTMzMy00YWYyLWExNDYtNzA2ZGUwNjc5ODBmIl0sImF1dGhfdGltZSI6MTUyOTc1MzQxNCwiZXhwIjoxNTI5NzU3MDIzLCJpYXQiOjE1Mjk3NTM0MjMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjBlYzllYmMyLWY1NjQtNDVmMi05OWUzLWU5ODcyNGRiZTI0YiIsIm5vbmNlIjoibzJXVGZBVHJWWjQ5ZHZMVyIsInJhdCI6MTUyOTc1MzQyMiwic3ViIjoiZm9vQGJhci5jb20ifQ.hs-1amxk9bHk3OZ-tsz3-41eD-HEMiuBmhI6vBFKi13bfr27ztW75odSHAdUhBoSBaKt5tbUwPsfR_lVBQ5E28ExRA4KCToELNrt6jfCorIVxsikqgr7TRMGqEXvwCZqXG-eKzWKma1nuR5jEx_7jDjCKUZuqgDSgPFVB2qzINQJiJKL1P-6rFaFOnL5phvL0Rz91kZGCw0-7v6moDb4KL0cPXcp784GmPMVOeXNjGyzex6-cM9GAJfPAIVkc-6eSnhc4f7xUOH2m607BLqPm-ue5xniyYJat00mbO528kWMshmv-51ZB-3Owg2kaD83hL_fXW_suDqHrLvi6jNL9RjP3-s43pH4DXUrrNNeyHwv7PUdrmXa9B6x8U30KKI21RkiA3xj0iNHqN08b-zpB_dWZey_gqU1UfHDeZRQ_ZTpTkvNqIamQVHtomGquwnbdIlXiDenbpOUghBCfmbSXgCA-0TD6gUTD1jvbvfZ-IVVWg2pllAnIlTFuNvqrUpCfe6OhSG-q-zWMzMHdzc5QIzTGh04D4A7pndodKuFwV5FmT62ltu-wOLKivzWk1KmgGaTIEGmvuAfbN1iQYutLlRlCJGIwaKfY5B_WyWruxmr6i0ZQEmK09Wnpdb2WveGArb_5wzC80EFA1LuFefg1TAsSCrwPjZnCY9AYsbic20', 'state': 'WRpNzRqUYRIuUO94'}
4.538 AuthorizationResponse {
"id_token": {
"aud": [
"d93fcd38-9333-4af2-a146-706de067980f"
],
"auth_time": 1529753414,
"exp": 1529757023,
"iat": 1529753423,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "0ec9ebc2-f564-45f2-99e3-e98724dbe24b",
"nonce": "o2WTfATrVZ49dvLW",
"rat": 1529753422,
"sub": "[email protected]"
},
"state": "WRpNzRqUYRIuUO94"
}
4.538 phase <--<-- 6 --- AccessToken -->-->
4.538 phase <--<-- 7 --- Done -->-->
4.538 end
4.539 assertion AuthTimeCheck
4.539 condition auth_time-check: status=OK [Check that the auth_time returned in the ID Token is in the expected range.]
4.539 assertion VerifyResponse
4.539 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.54 assertion SameAuthn
4.54 condition same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
4.54 assertion ClaimsCheck
4.54 condition claims-check: status=OK [Checks if specific claims is present or not]
4.54 condition Done: status=OK
============================================================
Conditions
auth_time-check: status=OK [Check that the auth_time returned in the ID Token is in the expected range.]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
claims-check: status=OK [Checks if specific claims is present or not]
Done: status=OK
============================================================
RESULT: PASSED
./OP-request-Unsigned.txt 0000644 0000000 0000000 00000023134 13313427377 015505 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-request-Unsigned
Test description: Support request request parameter with unsigned request
Timestamp: 2018-06-23T11:29:03Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.074 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Registration -->-->
0.076 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'request_object_signing_alg': 'none'}
0.076 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "none",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#0ckDfLlAM3qUCZ9r"
],
"response_types": [
"id_token"
]
}
0.25 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.251 RegistrationResponse {
"client_id": "cbe8c563-34fd-4650-89da-4b80ada2faae",
"client_secret": "ZK~rCxnYcTUu",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "cbe8c563-34fd-4650-89da-4b80ada2faae",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "none",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#0ckDfLlAM3qUCZ9r"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.251 phase <--<-- 3 --- AsyncAuthn -->-->
0.252 AuthorizationRequest {
"client_id": "cbe8c563-34fd-4650-89da-4b80ada2faae",
"nonce": "iN2lT3uQKDh3j5zT",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"request": "eyJhbGciOiJub25lIn0.eyJzY29wZSI6ICJvcGVuaWQiLCAicmVkaXJlY3RfdXJpIjogImh0dHBzOi8vb3AuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0OjYxMzUzL2F1dGh6X2NiIiwgImNsaWVudF9pZCI6ICJjYmU4YzU2My0zNGZkLTQ2NTAtODlkYS00YjgwYWRhMmZhYWUiLCAic3RhdGUiOiAiOG5xTlFROGRPR3VHd2cwZyIsICJyZXNwb25zZV90eXBlIjogImlkX3Rva2VuIiwgIm5vbmNlIjogImlOMmxUM3VRS0RoM2o1elQifQ.",
"response_type": "id_token",
"scope": "openid",
"state": "8nqNQQ8dOGuGwg0g"
}
0.253 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=cbe8c563-34fd-4650-89da-4b80ada2faae&response_type=id_token&state=8nqNQQ8dOGuGwg0g&request=eyJhbGciOiJub25lIn0.eyJzY29wZSI6ICJvcGVuaWQiLCAicmVkaXJlY3RfdXJpIjogImh0dHBzOi8vb3AuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0OjYxMzUzL2F1dGh6X2NiIiwgImNsaWVudF9pZCI6ICJjYmU4YzU2My0zNGZkLTQ2NTAtODlkYS00YjgwYWRhMmZhYWUiLCAic3RhdGUiOiAiOG5xTlFROGRPR3VHd2cwZyIsICJyZXNwb25zZV90eXBlIjogImlkX3Rva2VuIiwgIm5vbmNlIjogImlOMmxUM3VRS0RoM2o1elQifQ.&nonce=iN2lT3uQKDh3j5zT
0.253 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=cbe8c563-34fd-4650-89da-4b80ada2faae&response_type=id_token&state=8nqNQQ8dOGuGwg0g&request=eyJhbGciOiJub25lIn0.eyJzY29wZSI6ICJvcGVuaWQiLCAicmVkaXJlY3RfdXJpIjogImh0dHBzOi8vb3AuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0OjYxMzUzL2F1dGh6X2NiIiwgImNsaWVudF9pZCI6ICJjYmU4YzU2My0zNGZkLTQ2NTAtODlkYS00YjgwYWRhMmZhYWUiLCAic3RhdGUiOiAiOG5xTlFROGRPR3VHd2cwZyIsICJyZXNwb25zZV90eXBlIjogImlkX3Rva2VuIiwgIm5vbmNlIjogImlOMmxUM3VRS0RoM2o1elQifQ.&nonce=iN2lT3uQKDh3j5zT
2.791 http args {}
3.006 response URL with fragment
3.006 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiY2JlOGM1NjMtMzRmZC00NjUwLTg5ZGEtNGI4MGFkYTJmYWFlIl0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTQyLCJpYXQiOjE1Mjk3NTMzNDIsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImZkMzU2MDZjLTc4YjEtNDMxZC04YjMwLTliNzVlNDFmN2YzOCIsIm5vbmNlIjoiaU4ybFQzdVFLRGgzajV6VCIsInJhdCI6MTUyOTc1MzM0MCwic3ViIjoiZm9vQGJhci5jb20ifQ.VHippiEH_d1e1o1WfXIDpK9ILolLFO-So_LvxzfMH5mGeX6oDwhGm9zDPXWaKaeKoPQHNmk2EmK-egdC76jEhS9yEJQNOWSz3SJ4Gc5tXIzvEehFxdBn1oi-TmvxxsWRMuGMs9XDd_x64RycaikOz-NYcclPEdVzx4rDvBhMVJzRkha4ki5Kcv-P_hAlwPIcvpFAy_X7ThPZxLnFor9hYfMgEZ-tZ__BwqrLly9FZU47rKgYuRbO7qG39YGN2y2S9l5V64oQX3kdXpvzzWOG7FCp2SombK0o6il2xz-zC6AZou2TWVO6PyNmmwFuKx1TVqvbB3IhqDvmzMZA_HBpUCWclWdW-R6euvV66QQm0gNgKaRhqEeycfnNuKLCPCHFawh1gYOeF6p3pXC1ajbPvLgAxVdX4rLPkGDup8gPdB6INnkrWz4EhFJNRaJ_q-vnmygDhZDIY8Qkf5NYKBxGsyDVGLBxkR202hYM-JB1b653Nf6OUj2qfnwde0UD4MZNV94-BERv8kAd_ZcwKSrFBE7pBEgCexY1xQ1tWiUBzKb0hGNqF5cWPPvINbUCx2Vm8PAmEfmNXZXfOyfWfHL-m5cLR1f4uUeXp_c46xreD5Aff7_pKRmok24HwVxNpRLub3no14VU_F6e52vf40UeAO-Vkh5EdfELREOIqzPGSsQ&state=8nqNQQ8dOGuGwg0g
3.006 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiY2JlOGM1NjMtMzRmZC00NjUwLTg5ZGEtNGI4MGFkYTJmYWFlIl0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTQyLCJpYXQiOjE1Mjk3NTMzNDIsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImZkMzU2MDZjLTc4YjEtNDMxZC04YjMwLTliNzVlNDFmN2YzOCIsIm5vbmNlIjoiaU4ybFQzdVFLRGgzajV6VCIsInJhdCI6MTUyOTc1MzM0MCwic3ViIjoiZm9vQGJhci5jb20ifQ.VHippiEH_d1e1o1WfXIDpK9ILolLFO-So_LvxzfMH5mGeX6oDwhGm9zDPXWaKaeKoPQHNmk2EmK-egdC76jEhS9yEJQNOWSz3SJ4Gc5tXIzvEehFxdBn1oi-TmvxxsWRMuGMs9XDd_x64RycaikOz-NYcclPEdVzx4rDvBhMVJzRkha4ki5Kcv-P_hAlwPIcvpFAy_X7ThPZxLnFor9hYfMgEZ-tZ__BwqrLly9FZU47rKgYuRbO7qG39YGN2y2S9l5V64oQX3kdXpvzzWOG7FCp2SombK0o6il2xz-zC6AZou2TWVO6PyNmmwFuKx1TVqvbB3IhqDvmzMZA_HBpUCWclWdW-R6euvV66QQm0gNgKaRhqEeycfnNuKLCPCHFawh1gYOeF6p3pXC1ajbPvLgAxVdX4rLPkGDup8gPdB6INnkrWz4EhFJNRaJ_q-vnmygDhZDIY8Qkf5NYKBxGsyDVGLBxkR202hYM-JB1b653Nf6OUj2qfnwde0UD4MZNV94-BERv8kAd_ZcwKSrFBE7pBEgCexY1xQ1tWiUBzKb0hGNqF5cWPPvINbUCx2Vm8PAmEfmNXZXfOyfWfHL-m5cLR1f4uUeXp_c46xreD5Aff7_pKRmok24HwVxNpRLub3no14VU_F6e52vf40UeAO-Vkh5EdfELREOIqzPGSsQ', 'state': '8nqNQQ8dOGuGwg0g'}
3.088 AuthorizationResponse {
"id_token": {
"aud": [
"cbe8c563-34fd-4650-89da-4b80ada2faae"
],
"auth_time": 1529753285,
"exp": 1529756942,
"iat": 1529753342,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "fd35606c-78b1-431d-8b30-9b75e41f7f38",
"nonce": "iN2lT3uQKDh3j5zT",
"rat": 1529753340,
"sub": "[email protected]"
},
"state": "8nqNQQ8dOGuGwg0g"
}
3.088 phase <--<-- 4 --- Done -->-->
3.088 end
3.089 assertion VerifyAuthnOrErrorResponse
3.089 condition authn-response-or-error: status=OK [Checks that the last response was a JSON encoded authentication or error message]
3.089 condition Done: status=OK
============================================================
Conditions
authn-response-or-error: status=OK [Checks that the last response was a JSON encoded authentication or error message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Discovery-claims_supported.txt 0000644 0000000 0000000 00000005777 13313427202 017565 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Discovery-claims_supported
Test description: Verify that claims_supported is published
Timestamp: 2018-06-23T11:26:58Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.106 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.108 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.108 phase <--<-- 2 --- Done -->-->
0.108 end
0.108 assertion CheckHTTPResponse
0.109 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.109 assertion CheckHasClaimsSupported
0.109 condition providerinfo-has-claims_supported: status=OK [Check that the claims_supported discovery metadata value is in the provider_info]
0.109 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
providerinfo-has-claims_supported: status=OK [Check that the claims_supported discovery metadata value is in the provider_info]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Registration-logo_uri.txt 0000644 0000000 0000000 00000021301 13313427214 016512 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-logo_uri
Test description: Registration with logo_uri
Timestamp: 2018-06-23T11:27:08Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.352 phase <--<-- 1 --- Webfinger -->-->
1.352 not expected to do WebFinger
1.352 phase <--<-- 2 --- Discovery -->-->
1.352 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.48 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.481 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.481 phase <--<-- 3 --- Registration -->-->
1.481 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'logo_uri': 'https://op.certification.openid.net:61353/static/logo.png'}
1.482 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"logo_uri": "https://op.certification.openid.net:61353/static/logo.png",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#eAsB2gJ7Ol2ZxVhF"
],
"response_types": [
"id_token"
]
}
1.641 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.642 RegistrationResponse {
"client_id": "4034ce6b-b298-4152-9726-9eaadf0bebec",
"client_secret": "aFYB1ALLgpto",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "4034ce6b-b298-4152-9726-9eaadf0bebec",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"logo_uri": "https://op.certification.openid.net:61353/static/logo.png",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#eAsB2gJ7Ol2ZxVhF"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.642 phase <--<-- 4 --- AsyncAuthn -->-->
1.642 AuthorizationRequest {
"client_id": "4034ce6b-b298-4152-9726-9eaadf0bebec",
"nonce": "UmVbFc02d3W3l3vo",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "2mWYQyqZuIDCVnrR"
}
1.643 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=4034ce6b-b298-4152-9726-9eaadf0bebec&state=2mWYQyqZuIDCVnrR&response_type=id_token&nonce=UmVbFc02d3W3l3vo
1.643 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=4034ce6b-b298-4152-9726-9eaadf0bebec&state=2mWYQyqZuIDCVnrR&response_type=id_token&nonce=UmVbFc02d3W3l3vo
3.849 http args {}
4.046 response URL with fragment
4.046 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNDAzNGNlNmItYjI5OC00MTUyLTk3MjYtOWVhYWRmMGJlYmVjIl0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODI3LCJpYXQiOjE1Mjk3NTMyMjcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjYzOTk1YzQ4LTIxZmItNDVlYy1iZmQ5LWY2MjA4MTI1MjRlMiIsIm5vbmNlIjoiVW1WYkZjMDJkM1czbDN2byIsInJhdCI6MTUyOTc1MzIyNSwic3ViIjoiZm9vQGJhci5jb20ifQ.aD4272wdBdtvf7U9sm0-2gEP6zqlsc8M8ugip5-ae8z70Kr1vn6PntbkSgKAvEx5LEAUzPfIUnoLf-z-g91NtrAbr3fAFXjcP67zNcUQaYwExe_6ZQuD-9_cWqDJ0IvmYev-63yIcrebG-wp2UADRwfqEp9eGUiIczTvo1Uo4AotaCnd8ZsIBpXD8hGEldc8PKixfLnqVyKQsK63IGmpHMSVbK0_l_TYYCjLPlUiQnZylDyRqHBhUFG4AA3JMKSQYfuO6LGw16VQIk3_yvIYagsAILSxWNyP4eJ4hu7oMH43Sm6XAyb8tFvZvdsC4cWDN8TEVOnPYZ_8IlwYaSvv8Hky-GUnAi5RVmAFriH8mGjFxbMVFkCDjbrpmSun2vLLTBEfBF9iBQZ2fRU5IIPbQzp5bzSNWEW-0huoQgn0-SS660_zQRl0d88XEtnjUdpxRo76Trs2dn0owOshZxfWyNEMn0hkfFKTrnB2y5dAJbrwt8TL-fGk0PzLrpXshMO7BSuDTOpch4ggxm9sL_PoYUwwLuJYBH3-uVnKN5DtAktRwcnOcA28C3tKV44EOCL_zZrXBOzK42xOvmQehI2wVy8jTRAfKt-Rwx6eWElvVEaz1WlQHl2Wo2IPnlKeQ-Z8LuZZ0dsUmetqKLfd6fdKEGQPWVv-1nVReCigXFXhzFs&state=2mWYQyqZuIDCVnrR
4.047 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNDAzNGNlNmItYjI5OC00MTUyLTk3MjYtOWVhYWRmMGJlYmVjIl0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODI3LCJpYXQiOjE1Mjk3NTMyMjcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjYzOTk1YzQ4LTIxZmItNDVlYy1iZmQ5LWY2MjA4MTI1MjRlMiIsIm5vbmNlIjoiVW1WYkZjMDJkM1czbDN2byIsInJhdCI6MTUyOTc1MzIyNSwic3ViIjoiZm9vQGJhci5jb20ifQ.aD4272wdBdtvf7U9sm0-2gEP6zqlsc8M8ugip5-ae8z70Kr1vn6PntbkSgKAvEx5LEAUzPfIUnoLf-z-g91NtrAbr3fAFXjcP67zNcUQaYwExe_6ZQuD-9_cWqDJ0IvmYev-63yIcrebG-wp2UADRwfqEp9eGUiIczTvo1Uo4AotaCnd8ZsIBpXD8hGEldc8PKixfLnqVyKQsK63IGmpHMSVbK0_l_TYYCjLPlUiQnZylDyRqHBhUFG4AA3JMKSQYfuO6LGw16VQIk3_yvIYagsAILSxWNyP4eJ4hu7oMH43Sm6XAyb8tFvZvdsC4cWDN8TEVOnPYZ_8IlwYaSvv8Hky-GUnAi5RVmAFriH8mGjFxbMVFkCDjbrpmSun2vLLTBEfBF9iBQZ2fRU5IIPbQzp5bzSNWEW-0huoQgn0-SS660_zQRl0d88XEtnjUdpxRo76Trs2dn0owOshZxfWyNEMn0hkfFKTrnB2y5dAJbrwt8TL-fGk0PzLrpXshMO7BSuDTOpch4ggxm9sL_PoYUwwLuJYBH3-uVnKN5DtAktRwcnOcA28C3tKV44EOCL_zZrXBOzK42xOvmQehI2wVy8jTRAfKt-Rwx6eWElvVEaz1WlQHl2Wo2IPnlKeQ-Z8LuZZ0dsUmetqKLfd6fdKEGQPWVv-1nVReCigXFXhzFs', 'state': '2mWYQyqZuIDCVnrR'}
4.133 AuthorizationResponse {
"id_token": {
"aud": [
"4034ce6b-b298-4152-9726-9eaadf0bebec"
],
"auth_time": 1529753136,
"exp": 1529756827,
"iat": 1529753227,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "63995c48-21fb-45ec-bfd9-f620812524e2",
"nonce": "UmVbFc02d3W3l3vo",
"rat": 1529753225,
"sub": "[email protected]"
},
"state": "2mWYQyqZuIDCVnrR"
}
4.133 phase <--<-- 5 --- Done -->-->
4.134 end
4.134 assertion VerifyAuthnResponse
4.134 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
4.134 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-redirect_uri-Query-OK.txt 0000644 0000000 0000000 00000021612 13313427370 016325 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-Query-OK
Test description: Request with a redirect_uri with a query component when a redirect_uri with the same query component is registered
Timestamp: 2018-06-23T11:28:56Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.081 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.083 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.083 phase <--<-- 2 --- Registration -->-->
0.083 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb?foo=bar'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.083 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb?foo=bar"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#9RHtaIv7JmbMCIIr"
],
"response_types": [
"id_token"
]
}
0.239 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.24 RegistrationResponse {
"client_id": "e8fc3075-3b6c-4df0-8ec8-1ad25934d9d0",
"client_secret": "opKHhzsU-XXY",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "e8fc3075-3b6c-4df0-8ec8-1ad25934d9d0",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb?foo=bar"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#9RHtaIv7JmbMCIIr"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.24 phase <--<-- 3 --- AsyncAuthn -->-->
0.241 AuthorizationRequest {
"client_id": "e8fc3075-3b6c-4df0-8ec8-1ad25934d9d0",
"nonce": "T2JJyIRFNMpEloX9",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb?foo=bar",
"response_type": "id_token",
"scope": "openid",
"state": "DDnISWJTEcFlXmNG"
}
0.241 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb%3Ffoo%3Dbar&client_id=e8fc3075-3b6c-4df0-8ec8-1ad25934d9d0&state=DDnISWJTEcFlXmNG&response_type=id_token&nonce=T2JJyIRFNMpEloX9
0.241 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb%3Ffoo%3Dbar&client_id=e8fc3075-3b6c-4df0-8ec8-1ad25934d9d0&state=DDnISWJTEcFlXmNG&response_type=id_token&nonce=T2JJyIRFNMpEloX9
3.419 http args {'foo': 'bar'}
3.592 response URL with fragment
3.592 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZThmYzMwNzUtM2I2Yy00ZGYwLThlYzgtMWFkMjU5MzRkOWQwIl0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTM2LCJpYXQiOjE1Mjk3NTMzMzYsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjM1NWQxYzZjLTkwN2QtNGQzNi1iZTM4LTA2OTgwZDk5OTAzMyIsIm5vbmNlIjoiVDJKSnlJUkZOTXBFbG9YOSIsInJhdCI6MTUyOTc1MzMzMywic3ViIjoiZm9vQGJhci5jb20ifQ.dL0u0alIeaRzue0UxvOmY2GGD5n_S1rdDwuIWmUkXxl9UmUBxv9G8dyzdZy0aUTnhQJKFOqpDYKN8sHgNMpuPqH0i-nNI_S_bx278yqJJwZ9Difs_Cf-vNw4YcEcUaUfeH_yhNCCJVXBUsvU67QY47ZH2HCYP7g0w4uXqVnwwbDJgHxnN4SbofRze0sIsYnsO8uI5SV_h0eMQxndDat17B4xZpZVVK9Dzc2UZtq8PUTuJgw_MAy94YcCkQSVSjt44S8dXevU8IP2dSt6FFj-5SuDa7vM7OPcccC9KJ8unTwEPlw_EyXqDVYiMoR8gtjdyn9idwku-Un77TTx_WSNRep48KvCet5amPlH4V_3fMpuUoQegvvbAE3ENofctgL1DHv_2F9JZ4sBaB3WDmxOSf2JoE94WY9w6pwiEFwNafiCFlGUACsY2lx1NIOb2tYcst-k21-ivIa2HaJoHX2v05HL1vX_1Qu_5hspI12v2T9m3i4U89z2WVq8QutCSNewygbcmVAGNTKli_eoAtJxF5G_8b5cpa-ifAZL3Idd9juLUrgswSJdahXYoj88Iy8NlHtCWuV63rdPZG0l8nM8sMvW9bLcBVCtBBy8AD4Zlnol_zONyzCfoqxtMrNzUaa6l3dlqFMbAsJlqHVHmOyUHeHU8DE-eOOundOCJBW3VsI&state=DDnISWJTEcFlXmNG
3.593 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZThmYzMwNzUtM2I2Yy00ZGYwLThlYzgtMWFkMjU5MzRkOWQwIl0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTM2LCJpYXQiOjE1Mjk3NTMzMzYsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjM1NWQxYzZjLTkwN2QtNGQzNi1iZTM4LTA2OTgwZDk5OTAzMyIsIm5vbmNlIjoiVDJKSnlJUkZOTXBFbG9YOSIsInJhdCI6MTUyOTc1MzMzMywic3ViIjoiZm9vQGJhci5jb20ifQ.dL0u0alIeaRzue0UxvOmY2GGD5n_S1rdDwuIWmUkXxl9UmUBxv9G8dyzdZy0aUTnhQJKFOqpDYKN8sHgNMpuPqH0i-nNI_S_bx278yqJJwZ9Difs_Cf-vNw4YcEcUaUfeH_yhNCCJVXBUsvU67QY47ZH2HCYP7g0w4uXqVnwwbDJgHxnN4SbofRze0sIsYnsO8uI5SV_h0eMQxndDat17B4xZpZVVK9Dzc2UZtq8PUTuJgw_MAy94YcCkQSVSjt44S8dXevU8IP2dSt6FFj-5SuDa7vM7OPcccC9KJ8unTwEPlw_EyXqDVYiMoR8gtjdyn9idwku-Un77TTx_WSNRep48KvCet5amPlH4V_3fMpuUoQegvvbAE3ENofctgL1DHv_2F9JZ4sBaB3WDmxOSf2JoE94WY9w6pwiEFwNafiCFlGUACsY2lx1NIOb2tYcst-k21-ivIa2HaJoHX2v05HL1vX_1Qu_5hspI12v2T9m3i4U89z2WVq8QutCSNewygbcmVAGNTKli_eoAtJxF5G_8b5cpa-ifAZL3Idd9juLUrgswSJdahXYoj88Iy8NlHtCWuV63rdPZG0l8nM8sMvW9bLcBVCtBBy8AD4Zlnol_zONyzCfoqxtMrNzUaa6l3dlqFMbAsJlqHVHmOyUHeHU8DE-eOOundOCJBW3VsI', 'state': 'DDnISWJTEcFlXmNG'}
3.681 AuthorizationResponse {
"id_token": {
"aud": [
"e8fc3075-3b6c-4df0-8ec8-1ad25934d9d0"
],
"auth_time": 1529753285,
"exp": 1529756936,
"iat": 1529753336,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "355d1c6c-907d-4d36-be38-06980d999033",
"nonce": "T2JJyIRFNMpEloX9",
"rat": 1529753333,
"sub": "[email protected]"
},
"state": "DDnISWJTEcFlXmNG"
}
3.681 phase <--<-- 4 --- Done -->-->
3.681 end
3.682 assertion VerifyResponse
3.682 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.682 assertion CheckQueryPart
3.682 condition check-query-part: status=OK [Check that a query part send in the Authorization Request is returned in the Authorization response.]
3.682 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
check-query-part: status=OK [Check that a query part send in the Authorization Request is returned in the Authorization response.]
Done: status=OK
============================================================
RESULT: PASSED
./OP-IDToken-kid.txt 0000644 0000000 0000000 00000021376 13313427243 014303 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-IDToken-kid
Test description: IDToken has kid [Basic, Implicit, Hybrid]
Timestamp: 2018-06-23T11:27:31Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.069 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.07 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.071 phase <--<-- 2 --- Registration -->-->
0.071 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.071 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#g0ViUCvhj5tF5Yrw"
],
"response_types": [
"id_token"
]
}
0.228 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.229 RegistrationResponse {
"client_id": "68197139-9629-476b-bd5e-d07813fab440",
"client_secret": "I.gpXcTKggBq",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "68197139-9629-476b-bd5e-d07813fab440",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#g0ViUCvhj5tF5Yrw"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.229 phase <--<-- 3 --- AsyncAuthn -->-->
0.23 AuthorizationRequest {
"client_id": "68197139-9629-476b-bd5e-d07813fab440",
"nonce": "bnt29kABZT8zfEr8",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "oS5phYIjWtMnhlIn"
}
0.23 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=68197139-9629-476b-bd5e-d07813fab440&state=oS5phYIjWtMnhlIn&response_type=id_token&nonce=bnt29kABZT8zfEr8
0.23 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=68197139-9629-476b-bd5e-d07813fab440&state=oS5phYIjWtMnhlIn&response_type=id_token&nonce=bnt29kABZT8zfEr8
2.505 http args {}
2.676 response URL with fragment
2.676 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNjgxOTcxMzktOTYyOS00NzZiLWJkNWUtZDA3ODEzZmFiNDQwIl0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODUwLCJpYXQiOjE1Mjk3NTMyNTAsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImE4ZDE2NzRjLTVjNzktNGJiNS05Y2M2LWY2ODZiNTVmZmJlMiIsIm5vbmNlIjoiYm50MjlrQUJaVDh6ZkVyOCIsInJhdCI6MTUyOTc1MzI0OCwic3ViIjoiZm9vQGJhci5jb20ifQ.LaVDzjm5XUAkSbFQwNNb7iv8xi7gTz5p454P08fdW_ZoUwTBJr2Mkux_XCKKxOI4B6LNZlep8lXfzz8tM6P7rUFB-enoxxkf6xEq8s9hM0Yv5Bb9UvEWKmmeZ6Idkcd7Odbb4xsovg0dAEzkvel2rW9u6L-Ml3aI04iJjijP_E61VhJ1GbSN7OzSKLadSh-hb4iFdXci39_DkTcJSFlhEaFL9l5bI2cn2KAnUF08lSFzVxz-406XyHClJq-zJoeJDDlm9lDCL5U8TzD4chCyWD_uO9wiOO7ir0etCkxxmz4Pb_yeD2vTew_vBhhzrQy-uwPbOTu4cF9O-TrWUoSNPOVR1C6urRdxMQomGK-LwUYFh67fw9NFB-X2Qvn49n4ocY7t3mm_ubFUgjvmrh8By0Xro__OD_Z5a3Y5iQMozonTLL1ihg2TMb91DGdhN2GwHrr2X4i6NnNqhDx-DvHWeFaul7tCrUZExnDsDbkQkZhg0GNv6OgvhtYmcwkDF526pCQ8WskMBodlvOW0_euCBJY3KELl_1It4Twr42nRdmBpzUBfHIau35o9atWvOYLvjwyFFo5iJiJ9Sr6Um5erDVL5GHJFwTta28wqvTPZu9tkUn8vUjpspRNLi141a-U-NDCejKRuB8rNrO8uGmgXluZbo4TXrcIOWucS0JVpLeU&state=oS5phYIjWtMnhlIn
2.677 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNjgxOTcxMzktOTYyOS00NzZiLWJkNWUtZDA3ODEzZmFiNDQwIl0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODUwLCJpYXQiOjE1Mjk3NTMyNTAsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImE4ZDE2NzRjLTVjNzktNGJiNS05Y2M2LWY2ODZiNTVmZmJlMiIsIm5vbmNlIjoiYm50MjlrQUJaVDh6ZkVyOCIsInJhdCI6MTUyOTc1MzI0OCwic3ViIjoiZm9vQGJhci5jb20ifQ.LaVDzjm5XUAkSbFQwNNb7iv8xi7gTz5p454P08fdW_ZoUwTBJr2Mkux_XCKKxOI4B6LNZlep8lXfzz8tM6P7rUFB-enoxxkf6xEq8s9hM0Yv5Bb9UvEWKmmeZ6Idkcd7Odbb4xsovg0dAEzkvel2rW9u6L-Ml3aI04iJjijP_E61VhJ1GbSN7OzSKLadSh-hb4iFdXci39_DkTcJSFlhEaFL9l5bI2cn2KAnUF08lSFzVxz-406XyHClJq-zJoeJDDlm9lDCL5U8TzD4chCyWD_uO9wiOO7ir0etCkxxmz4Pb_yeD2vTew_vBhhzrQy-uwPbOTu4cF9O-TrWUoSNPOVR1C6urRdxMQomGK-LwUYFh67fw9NFB-X2Qvn49n4ocY7t3mm_ubFUgjvmrh8By0Xro__OD_Z5a3Y5iQMozonTLL1ihg2TMb91DGdhN2GwHrr2X4i6NnNqhDx-DvHWeFaul7tCrUZExnDsDbkQkZhg0GNv6OgvhtYmcwkDF526pCQ8WskMBodlvOW0_euCBJY3KELl_1It4Twr42nRdmBpzUBfHIau35o9atWvOYLvjwyFFo5iJiJ9Sr6Um5erDVL5GHJFwTta28wqvTPZu9tkUn8vUjpspRNLi141a-U-NDCejKRuB8rNrO8uGmgXluZbo4TXrcIOWucS0JVpLeU', 'state': 'oS5phYIjWtMnhlIn'}
2.758 AuthorizationResponse {
"id_token": {
"aud": [
"68197139-9629-476b-bd5e-d07813fab440"
],
"auth_time": 1529753136,
"exp": 1529756850,
"iat": 1529753250,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "a8d1674c-5c79-4bb5-9cc6-f686b55ffbe2",
"nonce": "bnt29kABZT8zfEr8",
"rat": 1529753248,
"sub": "[email protected]"
},
"state": "oS5phYIjWtMnhlIn"
}
2.758 phase <--<-- 4 --- AccessToken -->-->
2.758 phase <--<-- 5 --- Done -->-->
2.758 end
2.758 assertion VerifySignedIdTokenHasKID
2.759 condition verify-signed-idtoken-has-kid: status=OK [Verifies that the header of a signed IDToken includes a kid claim.]
2.759 assertion VerifyResponse
2.759 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.759 condition Done: status=OK
============================================================
Conditions
verify-signed-idtoken-has-kid: status=OK [Verifies that the header of a signed IDToken includes a kid claim.]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Req-claims_locales.txt 0000644 0000000 0000000 00000021321 13313427461 015730 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-claims_locales
Test description: Providing claims_locales
Timestamp: 2018-06-23T11:29:53Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.074 phase <--<-- 1 --- Webfinger -->-->
1.074 not expected to do WebFinger
1.074 phase <--<-- 2 --- Discovery -->-->
1.074 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.149 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.151 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.151 phase <--<-- 3 --- Registration -->-->
1.151 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.151 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#3MXmzXaxMUp6lg7g"
],
"response_types": [
"id_token"
]
}
1.309 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.309 RegistrationResponse {
"client_id": "0840b78b-fc5d-472d-8870-8fe5fa1c3b55",
"client_secret": "W-YuXB4YjCqZ",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "0840b78b-fc5d-472d-8870-8fe5fa1c3b55",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#3MXmzXaxMUp6lg7g"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.31 phase <--<-- 4 --- AsyncAuthn -->-->
1.31 AuthorizationRequest {
"claims_locales": "se",
"client_id": "0840b78b-fc5d-472d-8870-8fe5fa1c3b55",
"nonce": "cc2krWFpfo62JqYQ",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "gKHZGMkbBWZXQSQD"
}
1.31 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=0840b78b-fc5d-472d-8870-8fe5fa1c3b55&state=gKHZGMkbBWZXQSQD&response_type=id_token&nonce=cc2krWFpfo62JqYQ&claims_locales=se
1.31 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=0840b78b-fc5d-472d-8870-8fe5fa1c3b55&state=gKHZGMkbBWZXQSQD&response_type=id_token&nonce=cc2krWFpfo62JqYQ&claims_locales=se
3.707 http args {}
3.876 response URL with fragment
3.876 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMDg0MGI3OGItZmM1ZC00NzJkLTg4NzAtOGZlNWZhMWMzYjU1Il0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTkzLCJpYXQiOjE1Mjk3NTMzOTMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImQwZTliYjIyLTI5NTUtNDRjMi1iM2VhLTg1NjRkNjcxOTJkOCIsIm5vbmNlIjoiY2Mya3JXRnBmbzYySnFZUSIsInJhdCI6MTUyOTc1MzM5MSwic3ViIjoiZm9vQGJhci5jb20ifQ.XBuRIKY-lJMqET8AVczaG0uOA6nl8YLWrxGfQjZPtKICKKhkvqMwEqttBP_-bpPD3KWgz5gZlV6xWeElnMYGbt2KH0mneotvHMieHbpQB9YONI7uTqH0Rbw_z7SW9iZfbqQf8oSFwIDvyYKr37sLxsM7wQAORWiny8FNPomae362qlEkDP1nkD1V96P1P9-fE0y4Dzgsu0GYiSu_X7wpRo28YhSEtZApzMWgfRgDf__yP3cSpWTRKfhPVnj0wMqqtULIkUwy1zNwDhM3nV69pCGUpMcceYUuy2OCLbCwkFr9vC5I_Fydd8yQ0RtZyT8D8ngvw-QP67lAQX0i8CqOVijs7F0AEcIupW-i4Ww7lvBzpg15xZezVfbwduFIMT1xa2_dUXu7hDAe9YykXZMzEkgG5AOWz7IOJskt5pAt1vbTaBY6OS_9hTvSmYty-Uulf8vU6PG_v4G9F2toZsjFj7o2d74EVkTl5JiTDqfGcKG5BZgYGG7qzOAgak5WfD4U9IJvZUHAFUxtlclMZli_HfL1Dr0-3naGlcWOD2ZEiyCGRDvUBDJa9LMqMGg2vDEq5JWMGdCOzOK1k_WEpYWG7LL966810u4b5XSVBAxXye5YecJsE7Ne4gVGYLeTV1NRod1r9GbwGr_9NxYPsdlh0RymFE1mMEZI3TPAB56qhRw&state=gKHZGMkbBWZXQSQD
3.877 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMDg0MGI3OGItZmM1ZC00NzJkLTg4NzAtOGZlNWZhMWMzYjU1Il0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTkzLCJpYXQiOjE1Mjk3NTMzOTMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImQwZTliYjIyLTI5NTUtNDRjMi1iM2VhLTg1NjRkNjcxOTJkOCIsIm5vbmNlIjoiY2Mya3JXRnBmbzYySnFZUSIsInJhdCI6MTUyOTc1MzM5MSwic3ViIjoiZm9vQGJhci5jb20ifQ.XBuRIKY-lJMqET8AVczaG0uOA6nl8YLWrxGfQjZPtKICKKhkvqMwEqttBP_-bpPD3KWgz5gZlV6xWeElnMYGbt2KH0mneotvHMieHbpQB9YONI7uTqH0Rbw_z7SW9iZfbqQf8oSFwIDvyYKr37sLxsM7wQAORWiny8FNPomae362qlEkDP1nkD1V96P1P9-fE0y4Dzgsu0GYiSu_X7wpRo28YhSEtZApzMWgfRgDf__yP3cSpWTRKfhPVnj0wMqqtULIkUwy1zNwDhM3nV69pCGUpMcceYUuy2OCLbCwkFr9vC5I_Fydd8yQ0RtZyT8D8ngvw-QP67lAQX0i8CqOVijs7F0AEcIupW-i4Ww7lvBzpg15xZezVfbwduFIMT1xa2_dUXu7hDAe9YykXZMzEkgG5AOWz7IOJskt5pAt1vbTaBY6OS_9hTvSmYty-Uulf8vU6PG_v4G9F2toZsjFj7o2d74EVkTl5JiTDqfGcKG5BZgYGG7qzOAgak5WfD4U9IJvZUHAFUxtlclMZli_HfL1Dr0-3naGlcWOD2ZEiyCGRDvUBDJa9LMqMGg2vDEq5JWMGdCOzOK1k_WEpYWG7LL966810u4b5XSVBAxXye5YecJsE7Ne4gVGYLeTV1NRod1r9GbwGr_9NxYPsdlh0RymFE1mMEZI3TPAB56qhRw', 'state': 'gKHZGMkbBWZXQSQD'}
3.957 AuthorizationResponse {
"id_token": {
"aud": [
"0840b78b-fc5d-472d-8870-8fe5fa1c3b55"
],
"auth_time": 1529753285,
"exp": 1529756993,
"iat": 1529753393,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "d0e9bb22-2955-44c2-b3ea-8564d67192d8",
"nonce": "cc2krWFpfo62JqYQ",
"rat": 1529753391,
"sub": "[email protected]"
},
"state": "gKHZGMkbBWZXQSQD"
}
3.957 phase <--<-- 5 --- AccessToken -->-->
3.957 phase <--<-- 6 --- UserInfo -->-->
3.957 phase <--<-- 7 --- DisplayUserInfo -->-->
3.957 phase <--<-- 8 --- Done -->-->
3.957 end
3.958 assertion CheckHTTPResponse
3.958 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
3.958 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Discovery-Config.txt 0000644 0000000 0000000 00000006673 13313427177 015424 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Discovery-Config
Test description: Publishes openid-configuration discovery information
Timestamp: 2018-06-23T11:26:55Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.108 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.109 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.109 phase <--<-- 2 --- Done -->-->
0.11 end
0.11 assertion CheckHTTPResponse
0.11 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.11 assertion VerifyIdTokenSigningAlgorithmIsSupported
0.11 condition verify-id_token_signing-algorithm-is-supported: status=OK [Verify that required algorithms in id_token_signing_alg_values_supported]
0.111 assertion VerifyHTTPSUsage
0.111 condition verify-https-usage: status=OK [Verify that specific endpoints uses https]
0.111 assertion VerifyOPEndpointsUseHTTPS
0.111 condition verify-op-endpoints-use-https: status=OK [Verify that all OP endpoints uses https]
0.111 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-id_token_signing-algorithm-is-supported: status=OK [Verify that required algorithms in id_token_signing_alg_values_supported]
verify-https-usage: status=OK [Verify that specific endpoints uses https]
verify-op-endpoints-use-https: status=OK [Verify that all OP endpoints uses https]
Done: status=OK
============================================================
RESULT: PASSED
./OP-scope-All.txt 0000644 0000000 0000000 00000024700 13313427415 014053 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-scope-All
Test description: Scope requesting all claims
Timestamp: 2018-06-23T11:29:17Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.076 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.078 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.078 phase <--<-- 2 --- Registration -->-->
0.078 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.078 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#WpQ32Kvxon5aEIH9"
],
"response_types": [
"id_token"
]
}
0.234 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.235 RegistrationResponse {
"client_id": "b3817216-0bbf-4217-b710-bc55e8f78fe6",
"client_secret": "zSsyXgr6QfrA",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "b3817216-0bbf-4217-b710-bc55e8f78fe6",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#WpQ32Kvxon5aEIH9"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.235 phase <--<-- 3 --- AsyncAuthn -->-->
0.236 condition Check support: status=WARNING, message=No support for: scopes_supported=['profile', 'email', 'address', 'phone']
0.236 AuthorizationRequest {
"client_id": "b3817216-0bbf-4217-b710-bc55e8f78fe6",
"nonce": "ToiQzwkh3FEORE8D",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid profile email address phone",
"state": "hdCfQ6SIz2ypfcL4"
}
0.236 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+profile+email+address+phone&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=b3817216-0bbf-4217-b710-bc55e8f78fe6&state=hdCfQ6SIz2ypfcL4&response_type=id_token&nonce=ToiQzwkh3FEORE8D
0.236 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+profile+email+address+phone&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=b3817216-0bbf-4217-b710-bc55e8f78fe6&state=hdCfQ6SIz2ypfcL4&response_type=id_token&nonce=ToiQzwkh3FEORE8D
3.279 http args {}
3.446 response URL with fragment
3.446 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYjM4MTcyMTYtMGJiZi00MjE3LWI3MTAtYmM1NWU4Zjc4ZmU2Il0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTU2LCJpYXQiOjE1Mjk3NTMzNTYsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjczODBlYzZjLTI1MTctNDFhOC05NDI3LWY5ZTAxZjBhMzQ4ZCIsIm5vbmNlIjoiVG9pUXp3a2gzRkVPUkU4RCIsInJhdCI6MTUyOTc1MzM1NCwic3ViIjoiZm9vQGJhci5jb20ifQ.BTq0FUfj-yHiZn9cxVPPz06ajWzBc1Ywiu937ZH21P-YvZzZwFFriyBSYr2CR2LO9P7OxYxqIN86Wb9FAmXZo1e1nrFL6lxryyFBoMtaRosZ0ejLNhMQeM7idfQDFp-PrTDGExE2A9yW3v1TYkHpVC3N4N60qNcmN-EKtcbMHn46A4SEf_xpvjMwSpfCipEx-AeZxxSmw4PLbOib7lOYonrJc2E4AiF483OvMrPaN2hiDtPKCVoRE00m5oXtARbSzN_WdCUD5xOs2iIND_pvg1I4BIIElX2w2PljV-cbt7-r9c6sWcd21KyPPqe5u0rfIewyNynOSMld1_dwX9xIvZSY_-tgGguR5JggDovfwoxrGqBJRxoQcNS-X2cIFvRWja0WXzcf00EAfKFUtJFCOSdxjoqt46aA35WMQZmXmI3hFzJx3XCbYg8n_PDUpfkSlmEqZlIQN6dJNM_hR5JNxKOl24euPNlP-Gz_bl12ONOVg0sXKMMfiAdMzBAdmrn61N6JGSHws7PQ2U6xzbP9WVGib5TKKSoa9J-x0SdJGA7Hsb6RjkbVacJ2lWcyYsaweTD9Uv7mRupYbDfJNb3j6sM4uEA847QMGnGDQgK4oTV1kV7_OMiK537RVdIzkkDSXK_qSO4wwrnuz5Q-Bq6wRE2zr09FKb3R61zo9PiMxJ0&state=hdCfQ6SIz2ypfcL4
3.447 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYjM4MTcyMTYtMGJiZi00MjE3LWI3MTAtYmM1NWU4Zjc4ZmU2Il0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTU2LCJpYXQiOjE1Mjk3NTMzNTYsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjczODBlYzZjLTI1MTctNDFhOC05NDI3LWY5ZTAxZjBhMzQ4ZCIsIm5vbmNlIjoiVG9pUXp3a2gzRkVPUkU4RCIsInJhdCI6MTUyOTc1MzM1NCwic3ViIjoiZm9vQGJhci5jb20ifQ.BTq0FUfj-yHiZn9cxVPPz06ajWzBc1Ywiu937ZH21P-YvZzZwFFriyBSYr2CR2LO9P7OxYxqIN86Wb9FAmXZo1e1nrFL6lxryyFBoMtaRosZ0ejLNhMQeM7idfQDFp-PrTDGExE2A9yW3v1TYkHpVC3N4N60qNcmN-EKtcbMHn46A4SEf_xpvjMwSpfCipEx-AeZxxSmw4PLbOib7lOYonrJc2E4AiF483OvMrPaN2hiDtPKCVoRE00m5oXtARbSzN_WdCUD5xOs2iIND_pvg1I4BIIElX2w2PljV-cbt7-r9c6sWcd21KyPPqe5u0rfIewyNynOSMld1_dwX9xIvZSY_-tgGguR5JggDovfwoxrGqBJRxoQcNS-X2cIFvRWja0WXzcf00EAfKFUtJFCOSdxjoqt46aA35WMQZmXmI3hFzJx3XCbYg8n_PDUpfkSlmEqZlIQN6dJNM_hR5JNxKOl24euPNlP-Gz_bl12ONOVg0sXKMMfiAdMzBAdmrn61N6JGSHws7PQ2U6xzbP9WVGib5TKKSoa9J-x0SdJGA7Hsb6RjkbVacJ2lWcyYsaweTD9Uv7mRupYbDfJNb3j6sM4uEA847QMGnGDQgK4oTV1kV7_OMiK537RVdIzkkDSXK_qSO4wwrnuz5Q-Bq6wRE2zr09FKb3R61zo9PiMxJ0', 'state': 'hdCfQ6SIz2ypfcL4'}
3.537 AuthorizationResponse {
"id_token": {
"aud": [
"b3817216-0bbf-4217-b710-bc55e8f78fe6"
],
"auth_time": 1529753285,
"exp": 1529756956,
"iat": 1529753356,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "7380ec6c-2517-41a8-9427-f9e01f0a348d",
"nonce": "ToiQzwkh3FEORE8D",
"rat": 1529753354,
"sub": "[email protected]"
},
"state": "hdCfQ6SIz2ypfcL4"
}
3.537 phase <--<-- 4 --- AccessToken -->-->
3.537 phase <--<-- 5 --- UserInfo -->-->
3.537 phase <--<-- 6 --- Done -->-->
3.537 end
3.538 assertion CheckHTTPResponse
3.538 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
3.538 assertion VerifyResponse
3.538 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.539 assertion VerifyScopes
3.539 condition verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username', 'email', 'email_verified', 'address', 'phone_number', 'phone_number_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
3.539 condition Done: status=OK
============================================================
Conditions
Check support: status=WARNING, message=No support for: scopes_supported=['profile', 'email', 'address', 'phone']
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username', 'email', 'email_verified', 'address', 'phone_number', 'phone_number_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
No support for: scopes_supported=['profile', 'email', 'address', 'phone']
The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username', 'email', 'email_verified', 'address', 'phone_number', 'phone_number_verified']
./OP-redirect_uri-Query-Added.txt 0000644 0000000 0000000 00000011004 13313427360 017006 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-Query-Added
Test description: Request with redirect_uri with query component when registered redirect_uri has no query component
Timestamp: 2018-06-23T11:28:48Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.092 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.093 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.093 phase <--<-- 2 --- Registration -->-->
0.093 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.093 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#e0BI4jpM2zMv2ZmL"
],
"response_types": [
"id_token"
]
}
0.249 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.25 RegistrationResponse {
"client_id": "d2496162-aff8-486c-a9d1-374d3e73fa3a",
"client_secret": "_8QErLmVqlhm",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "d2496162-aff8-486c-a9d1-374d3e73fa3a",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#e0BI4jpM2zMv2ZmL"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.25 phase <--<-- 3 --- Note -->-->
============================================================
Conditions
============================================================
RESULT: PARTIAL RESULT
./OP-redirect_uri-Missing.txt 0000644 0000000 0000000 00000011174 13313427342 016323 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-Missing
Test description: Reject request without redirect_uri when multiple registered
Timestamp: 2018-06-23T11:28:34Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.082 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.083 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.084 phase <--<-- 2 --- Registration -->-->
0.084 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb', 'https://op.certification.openid.net:61353/cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.084 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb",
"https://op.certification.openid.net:61353/cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#skPQSqMl8N64N4NA"
],
"response_types": [
"id_token"
]
}
0.243 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.244 RegistrationResponse {
"client_id": "f50dd4d4-d2de-49da-bf8b-cda63737b498",
"client_secret": "G2.fU3cua9rY",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "f50dd4d4-d2de-49da-bf8b-cda63737b498",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb",
"https://op.certification.openid.net:61353/cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#skPQSqMl8N64N4NA"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.244 phase <--<-- 3 --- Note -->-->
============================================================
Conditions
============================================================
RESULT: PARTIAL RESULT
./OP-redirect_uri-NotReg.txt 0000644 0000000 0000000 00000010731 13313427345 016111 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-NotReg
Test description: Sent redirect_uri does not match a registered redirect_uri
Timestamp: 2018-06-23T11:28:37Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.074 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.076 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.076 phase <--<-- 2 --- Registration -->-->
0.076 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.076 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#7WYT4hJnkpLPGLx0"
],
"response_types": [
"id_token"
]
}
0.282 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.283 RegistrationResponse {
"client_id": "f2248d9f-1149-4b83-bc84-a451076eb410",
"client_secret": "4xeSK1Sm-OKa",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "f2248d9f-1149-4b83-bc84-a451076eb410",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#7WYT4hJnkpLPGLx0"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.283 phase <--<-- 3 --- Note -->-->
============================================================
Conditions
============================================================
RESULT: PARTIAL RESULT
./OP-Req-ui_locales.txt 0000644 0000000 0000000 00000021005 13313427525 015075 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-ui_locales
Test description: Providing ui_locales
Timestamp: 2018-06-23T11:30:29Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.339 phase <--<-- 1 --- Webfinger -->-->
1.339 not expected to do WebFinger
1.339 phase <--<-- 2 --- Discovery -->-->
1.34 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.414 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.415 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.415 phase <--<-- 3 --- Registration -->-->
1.415 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.415 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#iqA7LLbvAbBrCifI"
],
"response_types": [
"id_token"
]
}
1.574 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.575 RegistrationResponse {
"client_id": "8a1f018d-0736-4777-a31c-e6863b1aad06",
"client_secret": "~~E8o16kj4M3",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "8a1f018d-0736-4777-a31c-e6863b1aad06",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#iqA7LLbvAbBrCifI"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.575 phase <--<-- 4 --- AsyncAuthn -->-->
1.575 AuthorizationRequest {
"client_id": "8a1f018d-0736-4777-a31c-e6863b1aad06",
"nonce": "zFEENkQ7u46b7FUQ",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "ghQaB79F1Dpi61XV",
"ui_locales": "se"
}
1.576 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?ui_locales=se&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=8a1f018d-0736-4777-a31c-e6863b1aad06&state=ghQaB79F1Dpi61XV&response_type=id_token&nonce=zFEENkQ7u46b7FUQ
1.576 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?ui_locales=se&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=8a1f018d-0736-4777-a31c-e6863b1aad06&state=ghQaB79F1Dpi61XV&response_type=id_token&nonce=zFEENkQ7u46b7FUQ
3.769 http args {}
3.939 response URL with fragment
3.939 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiOGExZjAxOGQtMDczNi00Nzc3LWEzMWMtZTY4NjNiMWFhZDA2Il0sImF1dGhfdGltZSI6MTUyOTc1MzQxNCwiZXhwIjoxNTI5NzU3MDI4LCJpYXQiOjE1Mjk3NTM0MjgsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImYxOGM5YzEwLTZlMGItNDM1ZC04ODAyLWI3NDRmNDViM2M4ZCIsIm5vbmNlIjoiekZFRU5rUTd1NDZiN0ZVUSIsInJhdCI6MTUyOTc1MzQyNiwic3ViIjoiZm9vQGJhci5jb20ifQ.MLrjAHJFkXRvb9G3LvfaK2cKu2i7Sp1yuFdk2KgQRMzOKdmJQ0y4CVEUo_qK0hnbq3qK8syw690e-pLUCUKH9XQKSbHOrepfmPmLr-E4zyE3coo6f3YflfKjQ3EiGdSWARYA8vOLa1TFonvVwtyPCRU05YZwUp0cG59U_4DLPDPpN6ChESiaDPhFqUD5Ds7kWbsucLW_zs8H_V1LADkC3qjRszHpatjpLejU0Xumaq_3JmgfSFsrCbOx2TLuF3uF4cDy9QhZ1ppQfCbxk9qbyRmju9rFPx9Fm7bDUCoROnNq0rLWuAGspVQ-k81uMlU21_7itqBcdQ4dRhG3SnuFzHDcjxuPD7eVPF1ghRLn0BFccEu4GJyPud3kvGkWxXSsgmh9L5P-5PWcaUorCxwHwWKDM4XaAcbetzU9UsvBVrjP1_Iwok-EMm5PBTC3jLBfOr-8H5fueNgNTPZE6GW2jsvQC3Hf0YuMkbETvINd-TbvNVG1WVj77SYogzELgKfHrsOUIk2sIcDqqe6-fcS5zv_OKz7PrBBWReQZUU4r_bG8dEIvThIUd88hhH1RFlOXneDGNqEi0Y71l267JS9Yrgp6f0JH-ewJJY9bVWpcSUJetOa0EF6JcsTERJOUToiqGM7b6HHWMBxm6krEn6I5ylBlGZWhn2bZIqOVhyH804A&state=ghQaB79F1Dpi61XV
3.939 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiOGExZjAxOGQtMDczNi00Nzc3LWEzMWMtZTY4NjNiMWFhZDA2Il0sImF1dGhfdGltZSI6MTUyOTc1MzQxNCwiZXhwIjoxNTI5NzU3MDI4LCJpYXQiOjE1Mjk3NTM0MjgsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImYxOGM5YzEwLTZlMGItNDM1ZC04ODAyLWI3NDRmNDViM2M4ZCIsIm5vbmNlIjoiekZFRU5rUTd1NDZiN0ZVUSIsInJhdCI6MTUyOTc1MzQyNiwic3ViIjoiZm9vQGJhci5jb20ifQ.MLrjAHJFkXRvb9G3LvfaK2cKu2i7Sp1yuFdk2KgQRMzOKdmJQ0y4CVEUo_qK0hnbq3qK8syw690e-pLUCUKH9XQKSbHOrepfmPmLr-E4zyE3coo6f3YflfKjQ3EiGdSWARYA8vOLa1TFonvVwtyPCRU05YZwUp0cG59U_4DLPDPpN6ChESiaDPhFqUD5Ds7kWbsucLW_zs8H_V1LADkC3qjRszHpatjpLejU0Xumaq_3JmgfSFsrCbOx2TLuF3uF4cDy9QhZ1ppQfCbxk9qbyRmju9rFPx9Fm7bDUCoROnNq0rLWuAGspVQ-k81uMlU21_7itqBcdQ4dRhG3SnuFzHDcjxuPD7eVPF1ghRLn0BFccEu4GJyPud3kvGkWxXSsgmh9L5P-5PWcaUorCxwHwWKDM4XaAcbetzU9UsvBVrjP1_Iwok-EMm5PBTC3jLBfOr-8H5fueNgNTPZE6GW2jsvQC3Hf0YuMkbETvINd-TbvNVG1WVj77SYogzELgKfHrsOUIk2sIcDqqe6-fcS5zv_OKz7PrBBWReQZUU4r_bG8dEIvThIUd88hhH1RFlOXneDGNqEi0Y71l267JS9Yrgp6f0JH-ewJJY9bVWpcSUJetOa0EF6JcsTERJOUToiqGM7b6HHWMBxm6krEn6I5ylBlGZWhn2bZIqOVhyH804A', 'state': 'ghQaB79F1Dpi61XV'}
4.057 AuthorizationResponse {
"id_token": {
"aud": [
"8a1f018d-0736-4777-a31c-e6863b1aad06"
],
"auth_time": 1529753414,
"exp": 1529757028,
"iat": 1529753428,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "f18c9c10-6e0b-435d-8802-b744f45b3c8d",
"nonce": "zFEENkQ7u46b7FUQ",
"rat": 1529753426,
"sub": "[email protected]"
},
"state": "ghQaB79F1Dpi61XV"
}
4.057 phase <--<-- 5 --- Done -->-->
4.057 end
4.057 assertion VerifyAuthnResponse
4.057 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
4.058 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-prompt-login.txt 0000644 0000000 0000000 00000031012 13313427306 014654 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-prompt-login
Test description: Request with prompt=login
Timestamp: 2018-06-23T11:28:06Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.083 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.084 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.085 phase <--<-- 2 --- Registration -->-->
0.085 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.085 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#wV5UX6AmILhdAdRS"
],
"response_types": [
"id_token"
]
}
0.241 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.242 RegistrationResponse {
"client_id": "5d8e8dee-199a-4c18-9770-a4de00297eaa",
"client_secret": "mDZh4Ha-6Q-E",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "5d8e8dee-199a-4c18-9770-a4de00297eaa",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#wV5UX6AmILhdAdRS"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.242 phase <--<-- 3 --- AsyncAuthn -->-->
0.243 AuthorizationRequest {
"client_id": "5d8e8dee-199a-4c18-9770-a4de00297eaa",
"nonce": "bh35XzxKBe0i9q52",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "q63Q8gHumf5VASnx"
}
0.243 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=5d8e8dee-199a-4c18-9770-a4de00297eaa&state=q63Q8gHumf5VASnx&response_type=id_token&nonce=bh35XzxKBe0i9q52
0.243 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=5d8e8dee-199a-4c18-9770-a4de00297eaa&state=q63Q8gHumf5VASnx&response_type=id_token&nonce=bh35XzxKBe0i9q52
3.084 http args {}
3.285 response URL with fragment
3.285 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNWQ4ZThkZWUtMTk5YS00YzE4LTk3NzAtYTRkZTAwMjk3ZWFhIl0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODgxLCJpYXQiOjE1Mjk3NTMyODEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImY5NGRiZTRhLTI3MjYtNDc1Yy1hZWM0LTM0ZjM1M2I5YTM2MSIsIm5vbmNlIjoiYmgzNVh6eEtCZTBpOXE1MiIsInJhdCI6MTUyOTc1MzI3OSwic3ViIjoiZm9vQGJhci5jb20ifQ.MGXP0mg310E3QEyc0i7ELxEW3YMYTI3zsIal36olhkXtU7RxRpDz9UnIzWMS3roJAqaibYhGhHGU0fz6GG9ktN3pmKCsrB5zfPYckiNmFaYax6AIpVi13LwnCC3QwwvJWaMiF28-poY4CC6Kc4wIuRE43e5dd0VtfDEaecLLLgoNGIuq9y1R-xvJ3LQHcDZvu3f2aQdF664ybXZEl80aSuXkRHFHz1j9DfQPUxHGsEO7KhwJXBZz_05YKP7_0FRCjKVNriXTJJpYRgplX-68aYyDlTc2wwlOIGEO9AEgyfQhJo2rC0y0I044T3p-H7eGPkePiTORjYL5UzW7qEP5YiC3tMr-Kaf2e98ilWwksAl9eDHayLnYgXmyJu6PpFV6HlMeebmfAXrIWCP-ujIPniy5M2t51s9GrwsjAnO9zP_7eNvP9xa6YLX4GNuSHOg3mxzwR-lV7SYGxRzrxk01kIUEFwcNGYWzoygBdqmHxkuFMlgtZbH1xWPsaP043rTGT9Iinjceo2Sz7mNztHmqCi8UnypBUed2_8Lyb7se0sjz9bKq2ZuRX-15t9_-KQpv8DIWrfbfi_RDx_UIi_JPxJYkRWWoZRaCgK033z_xLqolYjn04TCFHUlWC_mwCFJXWvhR_S1lIWcN7wBe-MVfIPUrcpDwH38uLdtInYUwY00&state=q63Q8gHumf5VASnx
3.285 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNWQ4ZThkZWUtMTk5YS00YzE4LTk3NzAtYTRkZTAwMjk3ZWFhIl0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODgxLCJpYXQiOjE1Mjk3NTMyODEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImY5NGRiZTRhLTI3MjYtNDc1Yy1hZWM0LTM0ZjM1M2I5YTM2MSIsIm5vbmNlIjoiYmgzNVh6eEtCZTBpOXE1MiIsInJhdCI6MTUyOTc1MzI3OSwic3ViIjoiZm9vQGJhci5jb20ifQ.MGXP0mg310E3QEyc0i7ELxEW3YMYTI3zsIal36olhkXtU7RxRpDz9UnIzWMS3roJAqaibYhGhHGU0fz6GG9ktN3pmKCsrB5zfPYckiNmFaYax6AIpVi13LwnCC3QwwvJWaMiF28-poY4CC6Kc4wIuRE43e5dd0VtfDEaecLLLgoNGIuq9y1R-xvJ3LQHcDZvu3f2aQdF664ybXZEl80aSuXkRHFHz1j9DfQPUxHGsEO7KhwJXBZz_05YKP7_0FRCjKVNriXTJJpYRgplX-68aYyDlTc2wwlOIGEO9AEgyfQhJo2rC0y0I044T3p-H7eGPkePiTORjYL5UzW7qEP5YiC3tMr-Kaf2e98ilWwksAl9eDHayLnYgXmyJu6PpFV6HlMeebmfAXrIWCP-ujIPniy5M2t51s9GrwsjAnO9zP_7eNvP9xa6YLX4GNuSHOg3mxzwR-lV7SYGxRzrxk01kIUEFwcNGYWzoygBdqmHxkuFMlgtZbH1xWPsaP043rTGT9Iinjceo2Sz7mNztHmqCi8UnypBUed2_8Lyb7se0sjz9bKq2ZuRX-15t9_-KQpv8DIWrfbfi_RDx_UIi_JPxJYkRWWoZRaCgK033z_xLqolYjn04TCFHUlWC_mwCFJXWvhR_S1lIWcN7wBe-MVfIPUrcpDwH38uLdtInYUwY00', 'state': 'q63Q8gHumf5VASnx'}
3.38 AuthorizationResponse {
"id_token": {
"aud": [
"5d8e8dee-199a-4c18-9770-a4de00297eaa"
],
"auth_time": 1529753136,
"exp": 1529756881,
"iat": 1529753281,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "f94dbe4a-2726-475c-aec4-34f353b9a361",
"nonce": "bh35XzxKBe0i9q52",
"rat": 1529753279,
"sub": "[email protected]"
},
"state": "q63Q8gHumf5VASnx"
}
3.38 phase <--<-- 4 --- AccessToken -->-->
3.38 phase <--<-- 5 --- Note -->-->
4.62 phase <--<-- 6 --- AsyncAuthn -->-->
4.621 AuthorizationRequest {
"client_id": "5d8e8dee-199a-4c18-9770-a4de00297eaa",
"nonce": "8NH7tfCZCMAk8Uuh",
"prompt": [
"login"
],
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "Oi62iUjKaj9lVmHZ"
}
4.621 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=login&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=5d8e8dee-199a-4c18-9770-a4de00297eaa&state=Oi62iUjKaj9lVmHZ&response_type=id_token&nonce=8NH7tfCZCMAk8Uuh
4.621 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=login&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=5d8e8dee-199a-4c18-9770-a4de00297eaa&state=Oi62iUjKaj9lVmHZ&response_type=id_token&nonce=8NH7tfCZCMAk8Uuh
7.854 http args {}
8.072 response URL with fragment
8.073 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNWQ4ZThkZWUtMTk5YS00YzE4LTk3NzAtYTRkZTAwMjk3ZWFhIl0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2ODg2LCJpYXQiOjE1Mjk3NTMyODYsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImEzZThiN2NjLTVlYjMtNDkwOS05NGYyLTViMjM3Y2I0OWQwZSIsIm5vbmNlIjoiOE5IN3RmQ1pDTUFrOFV1aCIsInJhdCI6MTUyOTc1MzI4Mywic3ViIjoiZm9vQGJhci5jb20ifQ.OFVq2z7cpHknZ1yT_fihl5tKWX860IDHy3NzXufsHQtttDaEYVCBsjTyBX1pMLTQ23ikWOrkIR1lfLozt9xbi7hcAPNEinnLydD4YLOk4Jai4qqWoaKUim2XVK0PwhcZVCNlfPPsDh2rw8lJucr2rfqxRq1oMTMeK6BXk98KBP4oZA1rmQiOMINR4l8zGWRAYjneb5SORTbTmxuqU2aYer5XnQSP7xxJMLhBI8AOGWi3jUC5H4lOJDwQqQDqzMddnGI52bpSGzjhcDIJpAZG1dLqPz2ZLLc7gSEMEFxtkjPoZR77FCCNDqr38mtO-1VVsfPQguiBSLnyKuf4ggFR8FmQJGdLCNf_XDvHZfvkl4MU3bIg52fcq0Qyh7ZJVSaayZeeaq91t8CfsjBFAEsi-14UEbuoSEsLLdqOoD1ADn0m5oNZ5YKFgtPaHPNll-DI40EV014EXl8nQVI5Nzhdecf7LTtuSsXDYOcuAoi30dpDJqbQr1jrFn6fsddSevMYAVjGuMLB-dvXGWxJPY0x0FsfofgC4f7Ez6M42xRbbnVnmwqRThNybV_1forr4cSiZ3PncQq8bjABjgXwFSRmbcsIYP66-93CgCeaW6B7luDcbuCtivx_4FotKBkaf6VFrnr9Wj7Iu_qwtu5sJJKreR0aUSf1vS7_NK8D9x-kC8E&state=Oi62iUjKaj9lVmHZ
8.073 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNWQ4ZThkZWUtMTk5YS00YzE4LTk3NzAtYTRkZTAwMjk3ZWFhIl0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2ODg2LCJpYXQiOjE1Mjk3NTMyODYsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImEzZThiN2NjLTVlYjMtNDkwOS05NGYyLTViMjM3Y2I0OWQwZSIsIm5vbmNlIjoiOE5IN3RmQ1pDTUFrOFV1aCIsInJhdCI6MTUyOTc1MzI4Mywic3ViIjoiZm9vQGJhci5jb20ifQ.OFVq2z7cpHknZ1yT_fihl5tKWX860IDHy3NzXufsHQtttDaEYVCBsjTyBX1pMLTQ23ikWOrkIR1lfLozt9xbi7hcAPNEinnLydD4YLOk4Jai4qqWoaKUim2XVK0PwhcZVCNlfPPsDh2rw8lJucr2rfqxRq1oMTMeK6BXk98KBP4oZA1rmQiOMINR4l8zGWRAYjneb5SORTbTmxuqU2aYer5XnQSP7xxJMLhBI8AOGWi3jUC5H4lOJDwQqQDqzMddnGI52bpSGzjhcDIJpAZG1dLqPz2ZLLc7gSEMEFxtkjPoZR77FCCNDqr38mtO-1VVsfPQguiBSLnyKuf4ggFR8FmQJGdLCNf_XDvHZfvkl4MU3bIg52fcq0Qyh7ZJVSaayZeeaq91t8CfsjBFAEsi-14UEbuoSEsLLdqOoD1ADn0m5oNZ5YKFgtPaHPNll-DI40EV014EXl8nQVI5Nzhdecf7LTtuSsXDYOcuAoi30dpDJqbQr1jrFn6fsddSevMYAVjGuMLB-dvXGWxJPY0x0FsfofgC4f7Ez6M42xRbbnVnmwqRThNybV_1forr4cSiZ3PncQq8bjABjgXwFSRmbcsIYP66-93CgCeaW6B7luDcbuCtivx_4FotKBkaf6VFrnr9Wj7Iu_qwtu5sJJKreR0aUSf1vS7_NK8D9x-kC8E', 'state': 'Oi62iUjKaj9lVmHZ'}
8.076 AuthorizationResponse {
"id_token": {
"aud": [
"5d8e8dee-199a-4c18-9770-a4de00297eaa"
],
"auth_time": 1529753285,
"exp": 1529756886,
"iat": 1529753286,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "a3e8b7cc-5eb3-4909-94f2-5b237cb49d0e",
"nonce": "8NH7tfCZCMAk8Uuh",
"rat": 1529753283,
"sub": "[email protected]"
},
"state": "Oi62iUjKaj9lVmHZ"
}
8.077 phase <--<-- 7 --- AccessToken -->-->
8.077 phase <--<-- 8 --- Done -->-->
8.077 end
8.077 assertion VerifyResponse
8.077 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
8.078 assertion MultipleSignOn
8.078 condition multiple-sign-on: status=OK [Verifies that multiple authentications was used in the flow]
8.078 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
multiple-sign-on: status=OK [Verifies that multiple authentications was used in the flow]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Response-Missing.txt 0000644 0000000 0000000 00000015066 13313427166 015451 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Response-Missing
Test description: Authorization request missing the response_type parameter
Timestamp: 2018-06-23T11:26:46Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.094 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.096 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.096 phase <--<-- 2 --- Registration -->-->
0.096 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.096 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#xDgnCRhOzo8HyBQP"
],
"response_types": [
"id_token"
]
}
0.273 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.274 RegistrationResponse {
"client_id": "245fadf4-c6fa-4e7a-8c5f-202b4cd5cfb3",
"client_secret": "oAfgzd3nde6L",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "245fadf4-c6fa-4e7a-8c5f-202b4cd5cfb3",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#xDgnCRhOzo8HyBQP"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.274 phase <--<-- 3 --- Note -->-->
2.635 phase <--<-- 4 --- AsyncAuthn -->-->
2.635 AuthorizationRequest {
"client_id": "245fadf4-c6fa-4e7a-8c5f-202b4cd5cfb3",
"nonce": "em14nMtjLm4bu9jx",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"scope": "openid",
"state": "6r6DUdRl8bt9rxrQ"
}
2.636 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?state=6r6DUdRl8bt9rxrQ&scope=openid&nonce=em14nMtjLm4bu9jx&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=245fadf4-c6fa-4e7a-8c5f-202b4cd5cfb3
2.636 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?state=6r6DUdRl8bt9rxrQ&scope=openid&nonce=em14nMtjLm4bu9jx&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=245fadf4-c6fa-4e7a-8c5f-202b4cd5cfb3
2.913 response Response URL with query part
2.913 response {'error_debug': 'The request is missing the response_type parameter', 'error_description': 'The authorization server does not support obtaining a token using this method', 'state': '', 'error': 'unsupported_response_type'}
2.913 response {'error_debug': 'The request is missing the response_type parameter', 'error_description': 'The authorization server does not support obtaining a token using this method', 'error': 'unsupported_response_type'}
2.914 AuthorizationErrorResponse {
"error": "unsupported_response_type",
"error_debug": "The request is missing the response_type parameter",
"error_description": "The authorization server does not support obtaining a token using this method"
}
2.914 AuthorizationErrorResponse {
"error": "unsupported_response_type",
"error_debug": "The request is missing the response_type parameter",
"error_description": "The authorization server does not support obtaining a token using this method"
}
2.914 phase <--<-- 5 --- Done -->-->
2.914 end
2.914 assertion VerifyErrorMessage
2.914 condition verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
2.914 condition Done: status=OK
============================================================
Conditions
verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Req-id_token_hint.txt 0000644 0000000 0000000 00000037631 13313427466 015614 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-id_token_hint
Test description: Using prompt=none with user hint through id_token_hint
Timestamp: 2018-06-23T11:29:58Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.109 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.111 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.111 phase <--<-- 2 --- Registration -->-->
0.111 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.111 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#cqH3AiT1GrFItzaz"
],
"response_types": [
"id_token"
]
}
0.267 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.268 RegistrationResponse {
"client_id": "1f9bbb8d-defe-4eed-b71c-6d13c64fd6a0",
"client_secret": "hCmZUmRpWK4M",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "1f9bbb8d-defe-4eed-b71c-6d13c64fd6a0",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#cqH3AiT1GrFItzaz"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.268 phase <--<-- 3 --- AsyncAuthn -->-->
0.268 AuthorizationRequest {
"client_id": "1f9bbb8d-defe-4eed-b71c-6d13c64fd6a0",
"nonce": "uTYiNzNl2Ann5W5e",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "q17ASFGh2mPGxhcv"
}
0.268 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=1f9bbb8d-defe-4eed-b71c-6d13c64fd6a0&state=q17ASFGh2mPGxhcv&response_type=id_token&nonce=uTYiNzNl2Ann5W5e
0.268 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=1f9bbb8d-defe-4eed-b71c-6d13c64fd6a0&state=q17ASFGh2mPGxhcv&response_type=id_token&nonce=uTYiNzNl2Ann5W5e
2.359 http args {}
2.571 response URL with fragment
2.572 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMWY5YmJiOGQtZGVmZS00ZWVkLWI3MWMtNmQxM2M2NGZkNmEwIl0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTk3LCJpYXQiOjE1Mjk3NTMzOTcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjM2YmU0Y2JiLWIzMWEtNDhkNy1iMDk4LWFkYzM3YTM1OTc3ZCIsIm5vbmNlIjoidVRZaU56TmwyQW5uNVc1ZSIsInJhdCI6MTUyOTc1MzM5NSwic3ViIjoiZm9vQGJhci5jb20ifQ.OtG1MSljW6FFSvHRZsa-peKlqlmCkhE2paJruVAvgoaBuYf1mR4lQnrpQiMdU57k55ngkyZXDFMkj6bU_gtMepTtkSNayGf4yO0fgV2xr6ywAUfQcceGVVbaSEYGPRkOD16BKIcM6-Z9XoTre6FyWFDbOiQyK6LVmzARW4dKHrUNGg1RJ_OmBbi-Nd6GbEyUvhU3MfNjF67StKkNz164WHNXf7kBuwVobIPDjwM2Q7cBDvjk_TYhOjpLiE5Z-GFx0Lf1mcn2i_k6GwKCBAd_6kaB-cM-At9vpsdCgWFoVpgMM6SPUE4ZQ7aPu23XtNzYhMrhTxO7khIqJaddbKmSBpv93Q0thFnq3YXW61FGjg4VpW7MaWhMqFIF68c48kJwAARC3wItNhYL0aTedFodQQxi7uCjcoAPw0EJ_tVQptjj6VL9-WjmWY8jnNTQU9XWYA6wM5PyPJmbHb40YuM36TM4VjURobcPcqKixYh6Ce1tjTZ2BwfHuaCikWieKkZNXGtdn7NFU5fm0iLx4y_mWepq6FVngIDrQYP8aOggnplCk8G6sAXskL1ve7jx6Tc1idVdNVcEhMX4l5o_YtP41ByEhVWIkCTOLB713elDSO2ltge75W_f9Gwd5xJybBTZCKi049Eh0IKz4pOOzauwBJNk9qbnzUI3_33bbl4q2WQ&state=q17ASFGh2mPGxhcv
2.572 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMWY5YmJiOGQtZGVmZS00ZWVkLWI3MWMtNmQxM2M2NGZkNmEwIl0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTk3LCJpYXQiOjE1Mjk3NTMzOTcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjM2YmU0Y2JiLWIzMWEtNDhkNy1iMDk4LWFkYzM3YTM1OTc3ZCIsIm5vbmNlIjoidVRZaU56TmwyQW5uNVc1ZSIsInJhdCI6MTUyOTc1MzM5NSwic3ViIjoiZm9vQGJhci5jb20ifQ.OtG1MSljW6FFSvHRZsa-peKlqlmCkhE2paJruVAvgoaBuYf1mR4lQnrpQiMdU57k55ngkyZXDFMkj6bU_gtMepTtkSNayGf4yO0fgV2xr6ywAUfQcceGVVbaSEYGPRkOD16BKIcM6-Z9XoTre6FyWFDbOiQyK6LVmzARW4dKHrUNGg1RJ_OmBbi-Nd6GbEyUvhU3MfNjF67StKkNz164WHNXf7kBuwVobIPDjwM2Q7cBDvjk_TYhOjpLiE5Z-GFx0Lf1mcn2i_k6GwKCBAd_6kaB-cM-At9vpsdCgWFoVpgMM6SPUE4ZQ7aPu23XtNzYhMrhTxO7khIqJaddbKmSBpv93Q0thFnq3YXW61FGjg4VpW7MaWhMqFIF68c48kJwAARC3wItNhYL0aTedFodQQxi7uCjcoAPw0EJ_tVQptjj6VL9-WjmWY8jnNTQU9XWYA6wM5PyPJmbHb40YuM36TM4VjURobcPcqKixYh6Ce1tjTZ2BwfHuaCikWieKkZNXGtdn7NFU5fm0iLx4y_mWepq6FVngIDrQYP8aOggnplCk8G6sAXskL1ve7jx6Tc1idVdNVcEhMX4l5o_YtP41ByEhVWIkCTOLB713elDSO2ltge75W_f9Gwd5xJybBTZCKi049Eh0IKz4pOOzauwBJNk9qbnzUI3_33bbl4q2WQ', 'state': 'q17ASFGh2mPGxhcv'}
2.655 AuthorizationResponse {
"id_token": {
"aud": [
"1f9bbb8d-defe-4eed-b71c-6d13c64fd6a0"
],
"auth_time": 1529753285,
"exp": 1529756997,
"iat": 1529753397,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "36be4cbb-b31a-48d7-b098-adc37a35977d",
"nonce": "uTYiNzNl2Ann5W5e",
"rat": 1529753395,
"sub": "[email protected]"
},
"state": "q17ASFGh2mPGxhcv"
}
2.655 phase <--<-- 4 --- AccessToken -->-->
2.655 phase <--<-- 5 --- AsyncAuthn -->-->
2.656 AuthorizationRequest {
"client_id": "1f9bbb8d-defe-4eed-b71c-6d13c64fd6a0",
"id_token_hint": "eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMWY5YmJiOGQtZGVmZS00ZWVkLWI3MWMtNmQxM2M2NGZkNmEwIl0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTk3LCJpYXQiOjE1Mjk3NTMzOTcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjM2YmU0Y2JiLWIzMWEtNDhkNy1iMDk4LWFkYzM3YTM1OTc3ZCIsIm5vbmNlIjoidVRZaU56TmwyQW5uNVc1ZSIsInJhdCI6MTUyOTc1MzM5NSwic3ViIjoiZm9vQGJhci5jb20ifQ.OtG1MSljW6FFSvHRZsa-peKlqlmCkhE2paJruVAvgoaBuYf1mR4lQnrpQiMdU57k55ngkyZXDFMkj6bU_gtMepTtkSNayGf4yO0fgV2xr6ywAUfQcceGVVbaSEYGPRkOD16BKIcM6-Z9XoTre6FyWFDbOiQyK6LVmzARW4dKHrUNGg1RJ_OmBbi-Nd6GbEyUvhU3MfNjF67StKkNz164WHNXf7kBuwVobIPDjwM2Q7cBDvjk_TYhOjpLiE5Z-GFx0Lf1mcn2i_k6GwKCBAd_6kaB-cM-At9vpsdCgWFoVpgMM6SPUE4ZQ7aPu23XtNzYhMrhTxO7khIqJaddbKmSBpv93Q0thFnq3YXW61FGjg4VpW7MaWhMqFIF68c48kJwAARC3wItNhYL0aTedFodQQxi7uCjcoAPw0EJ_tVQptjj6VL9-WjmWY8jnNTQU9XWYA6wM5PyPJmbHb40YuM36TM4VjURobcPcqKixYh6Ce1tjTZ2BwfHuaCikWieKkZNXGtdn7NFU5fm0iLx4y_mWepq6FVngIDrQYP8aOggnplCk8G6sAXskL1ve7jx6Tc1idVdNVcEhMX4l5o_YtP41ByEhVWIkCTOLB713elDSO2ltge75W_f9Gwd5xJybBTZCKi049Eh0IKz4pOOzauwBJNk9qbnzUI3_33bbl4q2WQ",
"nonce": "TKLsI4OV39q78kdu",
"prompt": [
"none"
],
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "R4siYJqTinyTqTtc"
}
2.656 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=1f9bbb8d-defe-4eed-b71c-6d13c64fd6a0&state=R4siYJqTinyTqTtc&id_token_hint=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMWY5YmJiOGQtZGVmZS00ZWVkLWI3MWMtNmQxM2M2NGZkNmEwIl0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTk3LCJpYXQiOjE1Mjk3NTMzOTcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjM2YmU0Y2JiLWIzMWEtNDhkNy1iMDk4LWFkYzM3YTM1OTc3ZCIsIm5vbmNlIjoidVRZaU56TmwyQW5uNVc1ZSIsInJhdCI6MTUyOTc1MzM5NSwic3ViIjoiZm9vQGJhci5jb20ifQ.OtG1MSljW6FFSvHRZsa-peKlqlmCkhE2paJruVAvgoaBuYf1mR4lQnrpQiMdU57k55ngkyZXDFMkj6bU_gtMepTtkSNayGf4yO0fgV2xr6ywAUfQcceGVVbaSEYGPRkOD16BKIcM6-Z9XoTre6FyWFDbOiQyK6LVmzARW4dKHrUNGg1RJ_OmBbi-Nd6GbEyUvhU3MfNjF67StKkNz164WHNXf7kBuwVobIPDjwM2Q7cBDvjk_TYhOjpLiE5Z-GFx0Lf1mcn2i_k6GwKCBAd_6kaB-cM-At9vpsdCgWFoVpgMM6SPUE4ZQ7aPu23XtNzYhMrhTxO7khIqJaddbKmSBpv93Q0thFnq3YXW61FGjg4VpW7MaWhMqFIF68c48kJwAARC3wItNhYL0aTedFodQQxi7uCjcoAPw0EJ_tVQptjj6VL9-WjmWY8jnNTQU9XWYA6wM5PyPJmbHb40YuM36TM4VjURobcPcqKixYh6Ce1tjTZ2BwfHuaCikWieKkZNXGtdn7NFU5fm0iLx4y_mWepq6FVngIDrQYP8aOggnplCk8G6sAXskL1ve7jx6Tc1idVdNVcEhMX4l5o_YtP41ByEhVWIkCTOLB713elDSO2ltge75W_f9Gwd5xJybBTZCKi049Eh0IKz4pOOzauwBJNk9qbnzUI3_33bbl4q2WQ&response_type=id_token&nonce=TKLsI4OV39q78kdu
2.656 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=1f9bbb8d-defe-4eed-b71c-6d13c64fd6a0&state=R4siYJqTinyTqTtc&id_token_hint=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMWY5YmJiOGQtZGVmZS00ZWVkLWI3MWMtNmQxM2M2NGZkNmEwIl0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTk3LCJpYXQiOjE1Mjk3NTMzOTcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjM2YmU0Y2JiLWIzMWEtNDhkNy1iMDk4LWFkYzM3YTM1OTc3ZCIsIm5vbmNlIjoidVRZaU56TmwyQW5uNVc1ZSIsInJhdCI6MTUyOTc1MzM5NSwic3ViIjoiZm9vQGJhci5jb20ifQ.OtG1MSljW6FFSvHRZsa-peKlqlmCkhE2paJruVAvgoaBuYf1mR4lQnrpQiMdU57k55ngkyZXDFMkj6bU_gtMepTtkSNayGf4yO0fgV2xr6ywAUfQcceGVVbaSEYGPRkOD16BKIcM6-Z9XoTre6FyWFDbOiQyK6LVmzARW4dKHrUNGg1RJ_OmBbi-Nd6GbEyUvhU3MfNjF67StKkNz164WHNXf7kBuwVobIPDjwM2Q7cBDvjk_TYhOjpLiE5Z-GFx0Lf1mcn2i_k6GwKCBAd_6kaB-cM-At9vpsdCgWFoVpgMM6SPUE4ZQ7aPu23XtNzYhMrhTxO7khIqJaddbKmSBpv93Q0thFnq3YXW61FGjg4VpW7MaWhMqFIF68c48kJwAARC3wItNhYL0aTedFodQQxi7uCjcoAPw0EJ_tVQptjj6VL9-WjmWY8jnNTQU9XWYA6wM5PyPJmbHb40YuM36TM4VjURobcPcqKixYh6Ce1tjTZ2BwfHuaCikWieKkZNXGtdn7NFU5fm0iLx4y_mWepq6FVngIDrQYP8aOggnplCk8G6sAXskL1ve7jx6Tc1idVdNVcEhMX4l5o_YtP41ByEhVWIkCTOLB713elDSO2ltge75W_f9Gwd5xJybBTZCKi049Eh0IKz4pOOzauwBJNk9qbnzUI3_33bbl4q2WQ&response_type=id_token&nonce=TKLsI4OV39q78kdu
3.615 http args {}
3.828 response URL with fragment
3.828 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMWY5YmJiOGQtZGVmZS00ZWVkLWI3MWMtNmQxM2M2NGZkNmEwIl0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTk4LCJpYXQiOjE1Mjk3NTMzOTgsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImZlNThhNjY4LWE2YjYtNDFkOS1iZWMwLWU3ODczYzM1NWI1ZiIsIm5vbmNlIjoiVEtMc0k0T1YzOXE3OGtkdSIsInJhdCI6MTUyOTc1MzM5Nywic3ViIjoiZm9vQGJhci5jb20ifQ.IfhGaIUDXbNa2SPENqMDw9qq14YFyHFwOo-J0bNx0P2eYUajMzpIlPw3yGegRhD-OhlxvDBiAOx_u958u7hFPgWgRSrNsTBDu0shw8VRE_mHgQSd8uxZvxY4O8U1ThOIVnOE8IQsYqSdLaWYMUam4lEDKri3YCDmx8LTmqOTxjS8c8QP04-MImiSnf4pMQdgKGd2-qxSrtyaQ35B9Ii7qvhKGxJI4xE-K7e-kqUe5JPASAKtgO5NuHN8P3-CVtVaIGyM-tzVIOsRh1AAOudSFwCLLkZ_hSfO7sEusJ4ECF4bHP1T_nweIVWywRjqKbZyo_q7cvgjAO_z4eIIYu7ZPi2szf8vxa7-8TT_MNuu8xNR-i15ve2r8ANnsJtNqL16m6nOST6lXPdUhCRz3bLZrRH_m49OX1PbIfh0RFJbj0BWA23V7Dgy6NIs6jS7wCDhBNzO3MK1axyVMY6P2TvLleeqFSsASJvfRJ-e_18DzrPbwsQh-IU4PC2_A_Ba-72UKRydKC6HTwaSV3ahOu6zAXxPhvk4cXNzZKLhSvQHq-fKL7F3rDwpufku5EoVVIXzXMoF_7Katv1_oLO0OAc5ZI1n_O1yt41GZpuTMmnn8SOI8R9ZUTJExGPtbc_T53dDoWTZ1_PSlREFmgERZjaRe7pLzWTVPWFBS3ZFax__xuQ&state=R4siYJqTinyTqTtc
3.829 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMWY5YmJiOGQtZGVmZS00ZWVkLWI3MWMtNmQxM2M2NGZkNmEwIl0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTk4LCJpYXQiOjE1Mjk3NTMzOTgsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImZlNThhNjY4LWE2YjYtNDFkOS1iZWMwLWU3ODczYzM1NWI1ZiIsIm5vbmNlIjoiVEtMc0k0T1YzOXE3OGtkdSIsInJhdCI6MTUyOTc1MzM5Nywic3ViIjoiZm9vQGJhci5jb20ifQ.IfhGaIUDXbNa2SPENqMDw9qq14YFyHFwOo-J0bNx0P2eYUajMzpIlPw3yGegRhD-OhlxvDBiAOx_u958u7hFPgWgRSrNsTBDu0shw8VRE_mHgQSd8uxZvxY4O8U1ThOIVnOE8IQsYqSdLaWYMUam4lEDKri3YCDmx8LTmqOTxjS8c8QP04-MImiSnf4pMQdgKGd2-qxSrtyaQ35B9Ii7qvhKGxJI4xE-K7e-kqUe5JPASAKtgO5NuHN8P3-CVtVaIGyM-tzVIOsRh1AAOudSFwCLLkZ_hSfO7sEusJ4ECF4bHP1T_nweIVWywRjqKbZyo_q7cvgjAO_z4eIIYu7ZPi2szf8vxa7-8TT_MNuu8xNR-i15ve2r8ANnsJtNqL16m6nOST6lXPdUhCRz3bLZrRH_m49OX1PbIfh0RFJbj0BWA23V7Dgy6NIs6jS7wCDhBNzO3MK1axyVMY6P2TvLleeqFSsASJvfRJ-e_18DzrPbwsQh-IU4PC2_A_Ba-72UKRydKC6HTwaSV3ahOu6zAXxPhvk4cXNzZKLhSvQHq-fKL7F3rDwpufku5EoVVIXzXMoF_7Katv1_oLO0OAc5ZI1n_O1yt41GZpuTMmnn8SOI8R9ZUTJExGPtbc_T53dDoWTZ1_PSlREFmgERZjaRe7pLzWTVPWFBS3ZFax__xuQ', 'state': 'R4siYJqTinyTqTtc'}
3.832 AuthorizationResponse {
"id_token": {
"aud": [
"1f9bbb8d-defe-4eed-b71c-6d13c64fd6a0"
],
"auth_time": 1529753285,
"exp": 1529756998,
"iat": 1529753398,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "fe58a668-a6b6-41d9-bec0-e7873c355b5f",
"nonce": "TKLsI4OV39q78kdu",
"rat": 1529753397,
"sub": "[email protected]"
},
"state": "R4siYJqTinyTqTtc"
}
3.832 phase <--<-- 6 --- AccessToken -->-->
3.833 phase <--<-- 7 --- Done -->-->
3.833 end
3.833 assertion VerifyResponse
3.833 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.833 assertion SameAuthn
3.834 condition same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
3.834 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Registration-tos_uri.txt 0000644 0000000 0000000 00000021271 13313427227 016371 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-tos_uri
Test description: Registration with tos_uri
Timestamp: 2018-06-23T11:27:19Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.594 phase <--<-- 1 --- Webfinger -->-->
1.595 not expected to do WebFinger
1.595 phase <--<-- 2 --- Discovery -->-->
1.595 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.708 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.709 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.709 phase <--<-- 3 --- Registration -->-->
1.709 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'tos_uri': 'https://op.certification.openid.net:61353/static/tos.html', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.71 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#N9ykU5l9adMGbSbA"
],
"response_types": [
"id_token"
],
"tos_uri": "https://op.certification.openid.net:61353/static/tos.html"
}
1.864 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.865 RegistrationResponse {
"client_id": "4ac92663-2547-4661-976d-f2aa2c6d8059",
"client_secret": "lqbnPdYiAPjX",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "4ac92663-2547-4661-976d-f2aa2c6d8059",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#N9ykU5l9adMGbSbA"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"tos_uri": "https://op.certification.openid.net:61353/static/tos.html",
"userinfo_signed_response_alg": "none"
}
1.865 phase <--<-- 4 --- AsyncAuthn -->-->
1.866 AuthorizationRequest {
"client_id": "4ac92663-2547-4661-976d-f2aa2c6d8059",
"nonce": "yGmMqghpluqW1AYU",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "OOG78CudGb4aOV91"
}
1.866 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=4ac92663-2547-4661-976d-f2aa2c6d8059&state=OOG78CudGb4aOV91&response_type=id_token&nonce=yGmMqghpluqW1AYU
1.866 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=4ac92663-2547-4661-976d-f2aa2c6d8059&state=OOG78CudGb4aOV91&response_type=id_token&nonce=yGmMqghpluqW1AYU
4.631 http args {}
4.803 response URL with fragment
4.803 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNGFjOTI2NjMtMjU0Ny00NjYxLTk3NmQtZjJhYTJjNmQ4MDU5Il0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODM5LCJpYXQiOjE1Mjk3NTMyMzksImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjU2MDU3Y2VjLWZlMTYtNDhmMy04OWE4LWU2M2UyNjJhZjZmYyIsIm5vbmNlIjoieUdtTXFnaHBsdXFXMUFZVSIsInJhdCI6MTUyOTc1MzIzNywic3ViIjoiZm9vQGJhci5jb20ifQ.jyEX4QvUpZFtxFdtwXVeHHKXqbnFMU8K8CoU0QFp3MgfpgC6wLTlvJUoDd0bNc7_BGTQS2F8jIv7nx93Q_X1HVLtq_gN4ZvAIh31CjvHeyWMzqOXKscMNPU3Ewdn71hXZ_RzsUJcyiNQtDx-mo8tHvppt1z55sLMJiXGg-JPbXRfiB--W7OwvNPpU-Rz7S0tEOIpgrJc2PHF79WMq8YgHf3N7Nnen8fMJAhHk9iKavF8-d6IswQqrRQRFmHh4d3rz2Dvo1OFgRROLyFQXmGCP1_efnTuDtQWkQNfnH9EMgnwpxGeJOJzSA01vU72-f4Z45Dfnq0NwMu6RhpQ4Un7CykaQehF1dNeVZ9j5Dr8BYX8V1O7S-O9UPV1gxWsBKgCHBK8kyyv_p8gEtocjlD9TON1AWLoDVMuQ8YygAeFdbLDxb4zxOe0QpHNH_jmcmBhPdOyrG-FlrP-O6-5FyIGgt7J5VhvPpuSo1CXdVtYYH3Ik_WTolyIG1_EkummbGzA5RIezX9zKPr9cpoQmhlENwflKk7LssggGgCjZ4hNUquPGY9U4SbSGM6hA8No_06RxrcCArBLH3-JB6-6V2hxIdSQFPyA9DMiFnX6Ayv0ZciRfDmNMdDfj9hbgKu8Fr3NafWMsX-S67uuYS7O9rMXLgLLmpRNbXcL-xptU6nEiL8&state=OOG78CudGb4aOV91
4.804 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNGFjOTI2NjMtMjU0Ny00NjYxLTk3NmQtZjJhYTJjNmQ4MDU5Il0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODM5LCJpYXQiOjE1Mjk3NTMyMzksImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjU2MDU3Y2VjLWZlMTYtNDhmMy04OWE4LWU2M2UyNjJhZjZmYyIsIm5vbmNlIjoieUdtTXFnaHBsdXFXMUFZVSIsInJhdCI6MTUyOTc1MzIzNywic3ViIjoiZm9vQGJhci5jb20ifQ.jyEX4QvUpZFtxFdtwXVeHHKXqbnFMU8K8CoU0QFp3MgfpgC6wLTlvJUoDd0bNc7_BGTQS2F8jIv7nx93Q_X1HVLtq_gN4ZvAIh31CjvHeyWMzqOXKscMNPU3Ewdn71hXZ_RzsUJcyiNQtDx-mo8tHvppt1z55sLMJiXGg-JPbXRfiB--W7OwvNPpU-Rz7S0tEOIpgrJc2PHF79WMq8YgHf3N7Nnen8fMJAhHk9iKavF8-d6IswQqrRQRFmHh4d3rz2Dvo1OFgRROLyFQXmGCP1_efnTuDtQWkQNfnH9EMgnwpxGeJOJzSA01vU72-f4Z45Dfnq0NwMu6RhpQ4Un7CykaQehF1dNeVZ9j5Dr8BYX8V1O7S-O9UPV1gxWsBKgCHBK8kyyv_p8gEtocjlD9TON1AWLoDVMuQ8YygAeFdbLDxb4zxOe0QpHNH_jmcmBhPdOyrG-FlrP-O6-5FyIGgt7J5VhvPpuSo1CXdVtYYH3Ik_WTolyIG1_EkummbGzA5RIezX9zKPr9cpoQmhlENwflKk7LssggGgCjZ4hNUquPGY9U4SbSGM6hA8No_06RxrcCArBLH3-JB6-6V2hxIdSQFPyA9DMiFnX6Ayv0ZciRfDmNMdDfj9hbgKu8Fr3NafWMsX-S67uuYS7O9rMXLgLLmpRNbXcL-xptU6nEiL8', 'state': 'OOG78CudGb4aOV91'}
4.919 AuthorizationResponse {
"id_token": {
"aud": [
"4ac92663-2547-4661-976d-f2aa2c6d8059"
],
"auth_time": 1529753136,
"exp": 1529756839,
"iat": 1529753239,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "56057cec-fe16-48f3-89a8-e63e262af6fc",
"nonce": "yGmMqghpluqW1AYU",
"rat": 1529753237,
"sub": "[email protected]"
},
"state": "OOG78CudGb4aOV91"
}
4.919 phase <--<-- 5 --- Done -->-->
4.919 end
4.92 assertion VerifyAuthnResponse
4.92 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
4.92 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-prompt-none-NotLoggedIn.txt 0000644 0000000 0000000 00000015406 13313427330 016660 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-prompt-none-NotLoggedIn
Test description: Request with prompt=none when not logged in
Timestamp: 2018-06-23T11:28:24Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.775 phase <--<-- 1 --- Webfinger -->-->
1.775 not expected to do WebFinger
1.775 phase <--<-- 2 --- Discovery -->-->
1.776 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.858 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.86 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.86 phase <--<-- 3 --- Registration -->-->
1.86 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.86 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#vwfMQfEj5lDgJzQp"
],
"response_types": [
"id_token"
]
}
2.015 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
2.016 RegistrationResponse {
"client_id": "fe215734-4d32-4246-ba54-776d76e636fa",
"client_secret": "r~hhZn-jPj~D",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "fe215734-4d32-4246-ba54-776d76e636fa",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#vwfMQfEj5lDgJzQp"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
2.016 phase <--<-- 4 --- AsyncAuthn -->-->
2.017 AuthorizationRequest {
"client_id": "fe215734-4d32-4246-ba54-776d76e636fa",
"nonce": "okBftjQHtpTfl80W",
"prompt": [
"none"
],
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "SsiBgfXm8MQcD1Nh"
}
2.017 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=fe215734-4d32-4246-ba54-776d76e636fa&state=SsiBgfXm8MQcD1Nh&response_type=id_token&nonce=okBftjQHtpTfl80W
2.017 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=fe215734-4d32-4246-ba54-776d76e636fa&state=SsiBgfXm8MQcD1Nh&response_type=id_token&nonce=okBftjQHtpTfl80W
2.372 http args {}
2.576 response URL with fragment
2.577 response error=login_required&error_debug=Prompt+%2522none%2522+was+requested%252C+but+no+existing+login+session+was+found&error_description=The+Authorization+Server+requires+End-User+authentication&state=SsiBgfXm8MQcD1Nh
2.577 response {'error_debug': 'Prompt %22none%22 was requested%2C but no existing login session was found', 'error_description': 'The Authorization Server requires End-User authentication', 'state': 'SsiBgfXm8MQcD1Nh', 'error': 'login_required'}
2.577 AuthorizationErrorResponse {
"error": "login_required",
"error_debug": "Prompt %22none%22 was requested%2C but no existing login session was found",
"error_description": "The Authorization Server requires End-User authentication",
"state": "SsiBgfXm8MQcD1Nh"
}
2.577 AuthorizationErrorResponse {
"error": "login_required",
"error_debug": "Prompt %22none%22 was requested%2C but no existing login session was found",
"error_description": "The Authorization Server requires End-User authentication",
"state": "SsiBgfXm8MQcD1Nh"
}
2.578 phase <--<-- 5 --- Done -->-->
2.578 end
2.578 assertion VerifyErrorMessage
2.578 condition verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
2.578 condition Done: status=OK
============================================================
Conditions
verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-request_uri-Unsigned.txt 0000644 0000000 0000000 00000022054 13313427410 016350 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-request_uri-Unsigned
Test description: Support request_uri request parameter with unsigned request
Timestamp: 2018-06-23T11:29:12Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Registration -->-->
0.074 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'request_object_signing_alg': 'none'}
0.074 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "none",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#6cKkT30n0qCXKm3d"
],
"response_types": [
"id_token"
]
}
0.231 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.231 RegistrationResponse {
"client_id": "65d246b1-6eb5-43e2-ad5e-f481f8eb7585",
"client_secret": "ZKd~pawuaklA",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "65d246b1-6eb5-43e2-ad5e-f481f8eb7585",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "none",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#6cKkT30n0qCXKm3d"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.232 phase <--<-- 3 --- AsyncAuthn -->-->
0.233 AuthorizationRequest {
"client_id": "65d246b1-6eb5-43e2-ad5e-f481f8eb7585",
"nonce": "E9VHQfhMyvbwM1xq",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"request_uri": "https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#6cKkT30n0qCXKm3d",
"response_type": "id_token",
"scope": "openid",
"state": "gCXWUqjbI6XP07Hi"
}
0.233 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?request_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Frequests%2Fe3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9%236cKkT30n0qCXKm3d&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=65d246b1-6eb5-43e2-ad5e-f481f8eb7585&state=gCXWUqjbI6XP07Hi&response_type=id_token&nonce=E9VHQfhMyvbwM1xq
0.233 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?request_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Frequests%2Fe3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9%236cKkT30n0qCXKm3d&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=65d246b1-6eb5-43e2-ad5e-f481f8eb7585&state=gCXWUqjbI6XP07Hi&response_type=id_token&nonce=E9VHQfhMyvbwM1xq
3.068 http args {}
3.239 response URL with fragment
3.24 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNjVkMjQ2YjEtNmViNS00M2UyLWFkNWUtZjQ4MWY4ZWI3NTg1Il0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTUxLCJpYXQiOjE1Mjk3NTMzNTEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImE0MGVkOWVjLWVhZDktNDJhYS04MGQxLTViNTU1NjRjNGQwMSIsIm5vbmNlIjoiRTlWSFFmaE15dmJ3TTF4cSIsInJhdCI6MTUyOTc1MzM0OSwic3ViIjoiZm9vQGJhci5jb20ifQ.Ac7Et293_H1ztW2uOwHYHWnz3lvSytmwspBfMwtakC6WtadduvJofCIX4MOMiE0Tfv6GI6B2iwHVBg30fSPLpHuufE3zoor3SyLa0V4UJzTOA5FmDixd0GODLHUcdbQz_ABGNBPd5ugUNLnxuZxM0Oud-HnJvU7GHOooL4Hiw_o5dA2y6gu2mpIoygnKek8xhgaxXY3w1ZZrCqubvVl8Wd0LZ3j-3lOVzAJY8Pr3KM_wbPa2HRgGb5i-cptbLcymvGmEoYL1TrRzztWl17ojAFZZMfgQRngJKO5UfzqR7nfZDVd5ELm1iP0pszO-aafuLrn0tuhI-WAUtD9Q8Tfyfk-bnjsuW6k2eoFfo_YGvnSBeKbcZ-FHJzsKJ6HddzScY7mtieml00sxO9J7tZvBNnLBTjAw8Lyx6FD2nc9wTifLDYnvmHL53esPe07o7lgDTmwdfN9OybpPwF8iEe3iJojR2lDObfNC1l2ZjmPxUw_dpw1hCGyOHMHgpg5YeWVp2_nHRmK15IYaMMIaoPmWY_1nCTsdxlBG9hpIysmBwVyvJvgl4QjVehzD7bkIl7VBfp1ZRDe8qLOxIi6T4ZhMvlF8N9rCQpqFYQB_O-U4a7sOeO5gns0an42aT_v5uAha6GfY0Pc06ceOipuLsqBctzaJWzzp6wc-uH7StP4eakk&state=gCXWUqjbI6XP07Hi
3.24 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNjVkMjQ2YjEtNmViNS00M2UyLWFkNWUtZjQ4MWY4ZWI3NTg1Il0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTUxLCJpYXQiOjE1Mjk3NTMzNTEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImE0MGVkOWVjLWVhZDktNDJhYS04MGQxLTViNTU1NjRjNGQwMSIsIm5vbmNlIjoiRTlWSFFmaE15dmJ3TTF4cSIsInJhdCI6MTUyOTc1MzM0OSwic3ViIjoiZm9vQGJhci5jb20ifQ.Ac7Et293_H1ztW2uOwHYHWnz3lvSytmwspBfMwtakC6WtadduvJofCIX4MOMiE0Tfv6GI6B2iwHVBg30fSPLpHuufE3zoor3SyLa0V4UJzTOA5FmDixd0GODLHUcdbQz_ABGNBPd5ugUNLnxuZxM0Oud-HnJvU7GHOooL4Hiw_o5dA2y6gu2mpIoygnKek8xhgaxXY3w1ZZrCqubvVl8Wd0LZ3j-3lOVzAJY8Pr3KM_wbPa2HRgGb5i-cptbLcymvGmEoYL1TrRzztWl17ojAFZZMfgQRngJKO5UfzqR7nfZDVd5ELm1iP0pszO-aafuLrn0tuhI-WAUtD9Q8Tfyfk-bnjsuW6k2eoFfo_YGvnSBeKbcZ-FHJzsKJ6HddzScY7mtieml00sxO9J7tZvBNnLBTjAw8Lyx6FD2nc9wTifLDYnvmHL53esPe07o7lgDTmwdfN9OybpPwF8iEe3iJojR2lDObfNC1l2ZjmPxUw_dpw1hCGyOHMHgpg5YeWVp2_nHRmK15IYaMMIaoPmWY_1nCTsdxlBG9hpIysmBwVyvJvgl4QjVehzD7bkIl7VBfp1ZRDe8qLOxIi6T4ZhMvlF8N9rCQpqFYQB_O-U4a7sOeO5gns0an42aT_v5uAha6GfY0Pc06ceOipuLsqBctzaJWzzp6wc-uH7StP4eakk', 'state': 'gCXWUqjbI6XP07Hi'}
3.327 AuthorizationResponse {
"id_token": {
"aud": [
"65d246b1-6eb5-43e2-ad5e-f481f8eb7585"
],
"auth_time": 1529753285,
"exp": 1529756951,
"iat": 1529753351,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "a40ed9ec-ead9-42aa-80d1-5b55564c4d01",
"nonce": "E9VHQfhMyvbwM1xq",
"rat": 1529753349,
"sub": "[email protected]"
},
"state": "gCXWUqjbI6XP07Hi"
}
3.327 phase <--<-- 4 --- Done -->-->
3.327 end
3.328 assertion VerifyResponse
3.328 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.328 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Req-acr_values.txt 0000644 0000000 0000000 00000021602 13313427454 015106 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-acr_values
Test description: Providing acr_values
Timestamp: 2018-06-23T11:29:48Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.075 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.076 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.076 phase <--<-- 2 --- Registration -->-->
0.077 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.077 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#qDK9QUsXDiQrcEuo"
],
"response_types": [
"id_token"
]
}
0.233 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.234 RegistrationResponse {
"client_id": "cd153016-0b5e-474e-93d7-fcc9599e486f",
"client_secret": "OQOQOFsdY19O",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "cd153016-0b5e-474e-93d7-fcc9599e486f",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#qDK9QUsXDiQrcEuo"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.234 phase <--<-- 3 --- AsyncAuthn -->-->
0.235 AuthorizationRequest {
"acr_values": "1 2",
"client_id": "cd153016-0b5e-474e-93d7-fcc9599e486f",
"nonce": "r80gT4uBXdjhtLMy",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "Bdtv4p8SF7u0VR85"
}
0.235 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=cd153016-0b5e-474e-93d7-fcc9599e486f&state=Bdtv4p8SF7u0VR85&acr_values=1+2&response_type=id_token&nonce=r80gT4uBXdjhtLMy
0.235 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=cd153016-0b5e-474e-93d7-fcc9599e486f&state=Bdtv4p8SF7u0VR85&acr_values=1+2&response_type=id_token&nonce=r80gT4uBXdjhtLMy
9.396 http args {}
9.566 response URL with fragment
9.566 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhY3IiOiIwIiwiYXVkIjpbImNkMTUzMDE2LTBiNWUtNDc0ZS05M2Q3LWZjYzk1OTllNDg2ZiJdLCJhdXRoX3RpbWUiOjE1Mjk3NTMyODUsImV4cCI6MTUyOTc1Njk4OCwiaWF0IjoxNTI5NzUzMzg4LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJiYjM2YTBjOC03OGE0LTRlYmYtYjY5Ny1jNzkwNGNlMmUwNGIiLCJub25jZSI6InI4MGdUNHVCWGRqaHRMTXkiLCJyYXQiOjE1Mjk3NTMzODAsInN1YiI6ImZvb0BiYXIuY29tIn0.S_elmG86S8xHe6HCILsLr3IBtqxc6OdcroH-lrw65E0ANRT-mBemcD0XerxzDWRsoT8m08GMpgf4oXeDhNfNEfxio3I3G31ngYPPaZO6XIprRTfHsAg4Vx_jP67TsTrlhZt167c_QjE4lxsRfm7iCrNqg52_hm4zHkmcL8r2yDrVcjEKWbjcfzzu2PFnQM7spISD4p69obxem9CFH1AvSShh7PctdsvGjn587w6Em4r_cPA7nnnp3wNjyBix9aYCK1nr2vr8sqmZzQj9TzviQ-LcqQfcwTnY8VSx10VIKdH2yMLIVdCwfsrjFjFEsiKm4ozS1MKEs4cWHA6k31f72sucDieLbF4g6eZ5ezPrtTQ6hRr3VM1mnplYUQH0zQK44cfrpBbWe9Epbu5ogiAO3RYHWZs3ln1E8kD6LmELDHMXrfNt6xb-obg-XNzB39pHhzCDYEiGmKpsc1SK3fE2Un8LyIY8KLmJb-Xk9NikHx-Kcd_RpKCCZVDMME_CrvDoZCHZJCpt0bm-E-p2yaPNEu2R6-_qiQxQzuj1LIlIBJmrD4Ev_gwz-nga01WAq78s9vA0YT1ekRyL2wJz_jlqmvusxr2DIsqOGAr7s9FpX98MJV0HxpFWMvh3q09UsX4P7mTXqVLhsf7PbV3mAK4qN-IiXCXAPVMBJkelM15QZwk&state=Bdtv4p8SF7u0VR85
9.566 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhY3IiOiIwIiwiYXVkIjpbImNkMTUzMDE2LTBiNWUtNDc0ZS05M2Q3LWZjYzk1OTllNDg2ZiJdLCJhdXRoX3RpbWUiOjE1Mjk3NTMyODUsImV4cCI6MTUyOTc1Njk4OCwiaWF0IjoxNTI5NzUzMzg4LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJiYjM2YTBjOC03OGE0LTRlYmYtYjY5Ny1jNzkwNGNlMmUwNGIiLCJub25jZSI6InI4MGdUNHVCWGRqaHRMTXkiLCJyYXQiOjE1Mjk3NTMzODAsInN1YiI6ImZvb0BiYXIuY29tIn0.S_elmG86S8xHe6HCILsLr3IBtqxc6OdcroH-lrw65E0ANRT-mBemcD0XerxzDWRsoT8m08GMpgf4oXeDhNfNEfxio3I3G31ngYPPaZO6XIprRTfHsAg4Vx_jP67TsTrlhZt167c_QjE4lxsRfm7iCrNqg52_hm4zHkmcL8r2yDrVcjEKWbjcfzzu2PFnQM7spISD4p69obxem9CFH1AvSShh7PctdsvGjn587w6Em4r_cPA7nnnp3wNjyBix9aYCK1nr2vr8sqmZzQj9TzviQ-LcqQfcwTnY8VSx10VIKdH2yMLIVdCwfsrjFjFEsiKm4ozS1MKEs4cWHA6k31f72sucDieLbF4g6eZ5ezPrtTQ6hRr3VM1mnplYUQH0zQK44cfrpBbWe9Epbu5ogiAO3RYHWZs3ln1E8kD6LmELDHMXrfNt6xb-obg-XNzB39pHhzCDYEiGmKpsc1SK3fE2Un8LyIY8KLmJb-Xk9NikHx-Kcd_RpKCCZVDMME_CrvDoZCHZJCpt0bm-E-p2yaPNEu2R6-_qiQxQzuj1LIlIBJmrD4Ev_gwz-nga01WAq78s9vA0YT1ekRyL2wJz_jlqmvusxr2DIsqOGAr7s9FpX98MJV0HxpFWMvh3q09UsX4P7mTXqVLhsf7PbV3mAK4qN-IiXCXAPVMBJkelM15QZwk', 'state': 'Bdtv4p8SF7u0VR85'}
9.666 AuthorizationResponse {
"id_token": {
"acr": "0",
"aud": [
"cd153016-0b5e-474e-93d7-fcc9599e486f"
],
"auth_time": 1529753285,
"exp": 1529756988,
"iat": 1529753388,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "bb36a0c8-78a4-4ebf-b697-c7904ce2e04b",
"nonce": "r80gT4uBXdjhtLMy",
"rat": 1529753380,
"sub": "[email protected]"
},
"state": "Bdtv4p8SF7u0VR85"
}
9.666 phase <--<-- 4 --- AccessToken -->-->
9.666 phase <--<-- 5 --- Done -->-->
9.666 end
9.667 assertion VerifyResponse
9.667 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
9.667 assertion UsedAcrValue
9.667 condition used-acr-value: status=WARNING, message=Used acr value: 0, preferred: ['1', '2'] [The acr value in the ID Token]
9.667 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
used-acr-value: status=WARNING, message=Used acr value: 0, preferred: ['1', '2'] [The acr value in the ID Token]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
Used acr value: 0, preferred: ['1', '2']
./OP-scope-address.txt 0000644 0000000 0000000 00000023122 13313427421 014762 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-scope-address
Test description: Scope requesting address claims
Timestamp: 2018-06-23T11:29:21Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.076 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.077 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.078 phase <--<-- 2 --- Registration -->-->
0.078 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.078 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#w1e7nyWuCEDBlwNd"
],
"response_types": [
"id_token"
]
}
0.273 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.274 RegistrationResponse {
"client_id": "99ef1cd9-eaf7-4bdd-a8b8-1874a2e82d49",
"client_secret": "23uHMqYbQ8iQ",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "99ef1cd9-eaf7-4bdd-a8b8-1874a2e82d49",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#w1e7nyWuCEDBlwNd"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.275 phase <--<-- 3 --- AsyncAuthn -->-->
0.275 condition Check support: status=WARNING, message=No support for: scopes_supported=['address']
0.275 AuthorizationRequest {
"client_id": "99ef1cd9-eaf7-4bdd-a8b8-1874a2e82d49",
"nonce": "moXExPhDPUvwB6MY",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid address",
"state": "vvticZrHNcuEe333"
}
0.275 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+address&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=99ef1cd9-eaf7-4bdd-a8b8-1874a2e82d49&state=vvticZrHNcuEe333&response_type=id_token&nonce=moXExPhDPUvwB6MY
0.275 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+address&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=99ef1cd9-eaf7-4bdd-a8b8-1874a2e82d49&state=vvticZrHNcuEe333&response_type=id_token&nonce=moXExPhDPUvwB6MY
2.28 http args {}
2.448 response URL with fragment
2.448 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiOTllZjFjZDktZWFmNy00YmRkLWE4YjgtMTg3NGEyZTgyZDQ5Il0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTYwLCJpYXQiOjE1Mjk3NTMzNjAsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImI4YzFiZGQ4LTAwNDQtNDA1My1iNmZlLTY1NTA4YmJiYzBhYiIsIm5vbmNlIjoibW9YRXhQaERQVXZ3QjZNWSIsInJhdCI6MTUyOTc1MzM1OCwic3ViIjoiZm9vQGJhci5jb20ifQ.TOJFQGoZ6q6AIgavAuBCJRPeMQ1Gz7UUP_CTYCUrgGBJKmazW4xz64BlfpLL52J_-G1kGQKB7qVjF2yOMNU2wmhaZovT-nxNW7Pbt6xQ38G63T12BjmOqxuy4jzG7x4gLsxUd1RJkmHneAP9YSDTcBmFbGgxMi2LSo8bQbuZpWUKMKmR2VWTgfJuTUPkyNGFzajAmb-Dhe6QLGt9USM59ezVg_W9DPo1veBfhi4mZI1BHvYV_Ibz_jRszKJFXeKC77-1Ph7kdsaF__GNWknE4GttqrTzDpknZVBZmmcOzTfY31kTdr01voF7_vadYKOTXNc9cP7Z5LF6nrV6E3m0zSQT3FbASxdnKfR5mMfzwYnvjtjzUcroDhKskprb7oQDMz_NzQAwylKeaJ3HMvNuA9EDlZPK_0BiPbyKsVsK74kvP4LfWfWGxfq1QtlIbVIw4W985dZhNVkwIK-VX6EyP64qI6UKgBodblPbDst869_LJzGChddlfl9FVAAC6zZOu3p2kOhxZH-jsh9NDF8erOItSDUjIQiymS_E1SdNw95-Jbm8IXqiBe3zGgvrgU7kJzylCN4hJU8jqcYGDIC8zLuaQYS8gV9g47Q4LKL2-E9rrtUuu5OosYzIZVj0ksvLTNNO760YNeBBp49TBYRekaiTjM7oauTWwF6y05Jbl_M&state=vvticZrHNcuEe333
2.448 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiOTllZjFjZDktZWFmNy00YmRkLWE4YjgtMTg3NGEyZTgyZDQ5Il0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTYwLCJpYXQiOjE1Mjk3NTMzNjAsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImI4YzFiZGQ4LTAwNDQtNDA1My1iNmZlLTY1NTA4YmJiYzBhYiIsIm5vbmNlIjoibW9YRXhQaERQVXZ3QjZNWSIsInJhdCI6MTUyOTc1MzM1OCwic3ViIjoiZm9vQGJhci5jb20ifQ.TOJFQGoZ6q6AIgavAuBCJRPeMQ1Gz7UUP_CTYCUrgGBJKmazW4xz64BlfpLL52J_-G1kGQKB7qVjF2yOMNU2wmhaZovT-nxNW7Pbt6xQ38G63T12BjmOqxuy4jzG7x4gLsxUd1RJkmHneAP9YSDTcBmFbGgxMi2LSo8bQbuZpWUKMKmR2VWTgfJuTUPkyNGFzajAmb-Dhe6QLGt9USM59ezVg_W9DPo1veBfhi4mZI1BHvYV_Ibz_jRszKJFXeKC77-1Ph7kdsaF__GNWknE4GttqrTzDpknZVBZmmcOzTfY31kTdr01voF7_vadYKOTXNc9cP7Z5LF6nrV6E3m0zSQT3FbASxdnKfR5mMfzwYnvjtjzUcroDhKskprb7oQDMz_NzQAwylKeaJ3HMvNuA9EDlZPK_0BiPbyKsVsK74kvP4LfWfWGxfq1QtlIbVIw4W985dZhNVkwIK-VX6EyP64qI6UKgBodblPbDst869_LJzGChddlfl9FVAAC6zZOu3p2kOhxZH-jsh9NDF8erOItSDUjIQiymS_E1SdNw95-Jbm8IXqiBe3zGgvrgU7kJzylCN4hJU8jqcYGDIC8zLuaQYS8gV9g47Q4LKL2-E9rrtUuu5OosYzIZVj0ksvLTNNO760YNeBBp49TBYRekaiTjM7oauTWwF6y05Jbl_M', 'state': 'vvticZrHNcuEe333'}
2.533 AuthorizationResponse {
"id_token": {
"aud": [
"99ef1cd9-eaf7-4bdd-a8b8-1874a2e82d49"
],
"auth_time": 1529753285,
"exp": 1529756960,
"iat": 1529753360,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "b8c1bdd8-0044-4053-b6fe-65508bbbc0ab",
"nonce": "moXExPhDPUvwB6MY",
"rat": 1529753358,
"sub": "[email protected]"
},
"state": "vvticZrHNcuEe333"
}
2.533 phase <--<-- 4 --- AccessToken -->-->
2.533 phase <--<-- 5 --- UserInfo -->-->
2.533 phase <--<-- 6 --- Done -->-->
2.533 end
2.534 assertion CheckHTTPResponse
2.534 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
2.534 assertion VerifyResponse
2.534 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.534 assertion VerifyScopes
2.535 condition verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['address'] [Verifies that the claims corresponding to the requested scopes are returned]
2.535 condition Done: status=OK
============================================================
Conditions
Check support: status=WARNING, message=No support for: scopes_supported=['address']
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['address'] [Verifies that the claims corresponding to the requested scopes are returned]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
No support for: scopes_supported=['address']
The following claims were missing from the returned information: ['address']
./OP-Req-NotUnderstood.txt 0000644 0000000 0000000 00000020750 13313427441 015570 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-NotUnderstood
Test description: Request with extra query component
Timestamp: 2018-06-23T11:29:37Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.077 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.078 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.079 phase <--<-- 2 --- Registration -->-->
0.079 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.079 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#0DuikWdP5OmelY9p"
],
"response_types": [
"id_token"
]
}
0.257 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.258 RegistrationResponse {
"client_id": "f874e5fe-71c0-4506-9450-9ecc8b59f61f",
"client_secret": "zeM2inh-fcVr",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "f874e5fe-71c0-4506-9450-9ecc8b59f61f",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#0DuikWdP5OmelY9p"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.259 phase <--<-- 3 --- AsyncAuthn -->-->
0.259 AuthorizationRequest {
"client_id": "f874e5fe-71c0-4506-9450-9ecc8b59f61f",
"extra": "foobar",
"nonce": "9lrETMbAPjMZSB5Y",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "cIGXH5gu8WuWbbyD"
}
0.259 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?extra=foobar&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=f874e5fe-71c0-4506-9450-9ecc8b59f61f&state=cIGXH5gu8WuWbbyD&response_type=id_token&nonce=9lrETMbAPjMZSB5Y
0.259 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?extra=foobar&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=f874e5fe-71c0-4506-9450-9ecc8b59f61f&state=cIGXH5gu8WuWbbyD&response_type=id_token&nonce=9lrETMbAPjMZSB5Y
2.598 http args {}
2.788 response URL with fragment
2.788 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZjg3NGU1ZmUtNzFjMC00NTA2LTk0NTAtOWVjYzhiNTlmNjFmIl0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTc3LCJpYXQiOjE1Mjk3NTMzNzcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjBlZmI2MjUwLTFhODUtNGRmNC1hN2I2LTdiNTBkNzkyOGE3MCIsIm5vbmNlIjoiOWxyRVRNYkFQak1aU0I1WSIsInJhdCI6MTUyOTc1MzM3NSwic3ViIjoiZm9vQGJhci5jb20ifQ.guGbaCVWpAjxxr17512Y4vHyiyCLUoioJqHAd80sz0oikDxnDqWzHCC9Bxg9SIlVP0lzjykBuGYjeDQEBqPzMtkvwzVHQbMYycUApYgpxNZ6qRrr95qWb8WEo92b_rt8vO50-X0bGQWpiraBc2VuN0dbX92i9hu074d0hNVwmPrCOVzEJDmCpKRKyNMQ0a85RXr4tqT6hieXYgVZrRIBjCik30BeA3vM4Syw2Ab7NuHe7yYZmaolffH2cCC0oLG1Ftl7XqRzhT8qT1lHW7-yQs7Le3YAJW4xdC30QLKp1-4sXFfPtltu013ouGlM8A42sPMvDrI-BR6jIGtR4SHO6wI8qTvVafelMlvcFFqmg2CilAfkgutRKfLuuvGg5Q1_9quWlfZH6mhAAKt5kt9oR2BzSNI1Ot_C_TC_H4729wj1_cPiQ9SrVudsSpx5b09TXzPKkdpe7zoGjeQ5Luqezo-NERS4TuhkRswMfmsxk1NGSWQ-anWBIZZImq6qnZSlwpVKcLTOLe-VzvNW5-MDk2dH7eDhg4Y4LD94A4MAtdwcrtn5DY9OsQQNafhpoyk8AwNpmJ7JqjnKVIqjlHC-bp0txp8CyuuAtnYrG6cCqtVGSAvQsMp_BN4o4O9JTg_rmwuLPWO2lFB06noyyI0KwMHr3ayPdSJaIX6TTgm-4Sw&state=cIGXH5gu8WuWbbyD
2.788 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZjg3NGU1ZmUtNzFjMC00NTA2LTk0NTAtOWVjYzhiNTlmNjFmIl0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTc3LCJpYXQiOjE1Mjk3NTMzNzcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjBlZmI2MjUwLTFhODUtNGRmNC1hN2I2LTdiNTBkNzkyOGE3MCIsIm5vbmNlIjoiOWxyRVRNYkFQak1aU0I1WSIsInJhdCI6MTUyOTc1MzM3NSwic3ViIjoiZm9vQGJhci5jb20ifQ.guGbaCVWpAjxxr17512Y4vHyiyCLUoioJqHAd80sz0oikDxnDqWzHCC9Bxg9SIlVP0lzjykBuGYjeDQEBqPzMtkvwzVHQbMYycUApYgpxNZ6qRrr95qWb8WEo92b_rt8vO50-X0bGQWpiraBc2VuN0dbX92i9hu074d0hNVwmPrCOVzEJDmCpKRKyNMQ0a85RXr4tqT6hieXYgVZrRIBjCik30BeA3vM4Syw2Ab7NuHe7yYZmaolffH2cCC0oLG1Ftl7XqRzhT8qT1lHW7-yQs7Le3YAJW4xdC30QLKp1-4sXFfPtltu013ouGlM8A42sPMvDrI-BR6jIGtR4SHO6wI8qTvVafelMlvcFFqmg2CilAfkgutRKfLuuvGg5Q1_9quWlfZH6mhAAKt5kt9oR2BzSNI1Ot_C_TC_H4729wj1_cPiQ9SrVudsSpx5b09TXzPKkdpe7zoGjeQ5Luqezo-NERS4TuhkRswMfmsxk1NGSWQ-anWBIZZImq6qnZSlwpVKcLTOLe-VzvNW5-MDk2dH7eDhg4Y4LD94A4MAtdwcrtn5DY9OsQQNafhpoyk8AwNpmJ7JqjnKVIqjlHC-bp0txp8CyuuAtnYrG6cCqtVGSAvQsMp_BN4o4O9JTg_rmwuLPWO2lFB06noyyI0KwMHr3ayPdSJaIX6TTgm-4Sw', 'state': 'cIGXH5gu8WuWbbyD'}
2.87 AuthorizationResponse {
"id_token": {
"aud": [
"f874e5fe-71c0-4506-9450-9ecc8b59f61f"
],
"auth_time": 1529753285,
"exp": 1529756977,
"iat": 1529753377,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "0efb6250-1a85-4df4-a7b6-7b50d7928a70",
"nonce": "9lrETMbAPjMZSB5Y",
"rat": 1529753375,
"sub": "[email protected]"
},
"state": "cIGXH5gu8WuWbbyD"
}
2.871 phase <--<-- 4 --- Done -->-->
2.871 end
2.871 assertion VerifyAuthnResponse
2.871 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
2.871 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-scope-email.txt 0000644 0000000 0000000 00000023162 13313427425 014434 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-scope-email
Test description: Scope requesting email claims
Timestamp: 2018-06-23T11:29:25Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Registration -->-->
0.074 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.074 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#CUXz6ajAOL97M8PO"
],
"response_types": [
"id_token"
]
}
0.266 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.267 RegistrationResponse {
"client_id": "0968e2ca-49bb-4dfd-a5cb-b2cbd2b511ad",
"client_secret": "oNXp8wJt5XL5",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "0968e2ca-49bb-4dfd-a5cb-b2cbd2b511ad",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#CUXz6ajAOL97M8PO"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.267 phase <--<-- 3 --- AsyncAuthn -->-->
0.268 condition Check support: status=WARNING, message=No support for: scopes_supported=['email']
0.268 AuthorizationRequest {
"client_id": "0968e2ca-49bb-4dfd-a5cb-b2cbd2b511ad",
"nonce": "PIje7xkQnmWjZ6iz",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid email",
"state": "W8U3CrUpsyaROVUf"
}
0.268 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+email&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=0968e2ca-49bb-4dfd-a5cb-b2cbd2b511ad&state=W8U3CrUpsyaROVUf&response_type=id_token&nonce=PIje7xkQnmWjZ6iz
0.268 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+email&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=0968e2ca-49bb-4dfd-a5cb-b2cbd2b511ad&state=W8U3CrUpsyaROVUf&response_type=id_token&nonce=PIje7xkQnmWjZ6iz
2.91 http args {}
3.079 response URL with fragment
3.079 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMDk2OGUyY2EtNDliYi00ZGZkLWE1Y2ItYjJjYmQyYjUxMWFkIl0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTY0LCJpYXQiOjE1Mjk3NTMzNjQsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImU5NGZkMzYzLTViZjAtNDBhMS05ZTE5LWRjZjkxYTYxNGY4YSIsIm5vbmNlIjoiUElqZTd4a1FubVdqWjZpeiIsInJhdCI6MTUyOTc1MzM2Miwic3ViIjoiZm9vQGJhci5jb20ifQ.X3WQUpvXm8czbPhTbLEA_Q9r7VhpJy9e26qdnaNgexeZ6csJQTIKbrGwfApT8vWEi5OgbyRxYf6DuWDMwEFBA_1EzO94iHEeCOFgJGiHMyUyZ3ayYafK27mECUK-r000f_NI-MVn-fyrCQFQKgmGhTu9eG2Dj78XMSHBNddC3kSkWaOGehsJ0V6YO6Z2108akJvgwljm6n_iqsP9kYotujBZD7pzVCh8mTvy8sXPEKwBdB8Z17N0bYAMAVxrShxkorE8ufPiVjwgaQ_EdiHaxDEgz1S6WSua6HqERufN6HTLNGoAzTJWtp0UHxrS0vT4aFm1NWj5CYsBi3Vh4Gf2fGXdNvUioit41pFegEZ9JYuz32QDSq71_myAxnaLzMmHLN_kTQtHVT2BK7B01LfxxZVrgoFD7aB4fKgzu3NLoS2aMiHvfbtI_ZVAY8Ad39hfkJUqvdmnYPe1ptPIizh7G-R1l3o6uxP191zGym5iFWCteZ90JhS-YTL40Krs4PxK2aZZm0Xu5HKHfWy2-x8mU_MQkzjMYIkNYVr_vYTWz4K9U7tXKVqDQADgNoDSd6sPvb-LWshja1WKjhNVRQ1J-wRc4DCG79blCz-dSXv-pohOEllKx0vPoJJT3hawMP98ZDzGoqy92vsDYiuccSPq_kTj5Dsrnj-erWa6JkIhw-8&state=W8U3CrUpsyaROVUf
3.079 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMDk2OGUyY2EtNDliYi00ZGZkLWE1Y2ItYjJjYmQyYjUxMWFkIl0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTY0LCJpYXQiOjE1Mjk3NTMzNjQsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImU5NGZkMzYzLTViZjAtNDBhMS05ZTE5LWRjZjkxYTYxNGY4YSIsIm5vbmNlIjoiUElqZTd4a1FubVdqWjZpeiIsInJhdCI6MTUyOTc1MzM2Miwic3ViIjoiZm9vQGJhci5jb20ifQ.X3WQUpvXm8czbPhTbLEA_Q9r7VhpJy9e26qdnaNgexeZ6csJQTIKbrGwfApT8vWEi5OgbyRxYf6DuWDMwEFBA_1EzO94iHEeCOFgJGiHMyUyZ3ayYafK27mECUK-r000f_NI-MVn-fyrCQFQKgmGhTu9eG2Dj78XMSHBNddC3kSkWaOGehsJ0V6YO6Z2108akJvgwljm6n_iqsP9kYotujBZD7pzVCh8mTvy8sXPEKwBdB8Z17N0bYAMAVxrShxkorE8ufPiVjwgaQ_EdiHaxDEgz1S6WSua6HqERufN6HTLNGoAzTJWtp0UHxrS0vT4aFm1NWj5CYsBi3Vh4Gf2fGXdNvUioit41pFegEZ9JYuz32QDSq71_myAxnaLzMmHLN_kTQtHVT2BK7B01LfxxZVrgoFD7aB4fKgzu3NLoS2aMiHvfbtI_ZVAY8Ad39hfkJUqvdmnYPe1ptPIizh7G-R1l3o6uxP191zGym5iFWCteZ90JhS-YTL40Krs4PxK2aZZm0Xu5HKHfWy2-x8mU_MQkzjMYIkNYVr_vYTWz4K9U7tXKVqDQADgNoDSd6sPvb-LWshja1WKjhNVRQ1J-wRc4DCG79blCz-dSXv-pohOEllKx0vPoJJT3hawMP98ZDzGoqy92vsDYiuccSPq_kTj5Dsrnj-erWa6JkIhw-8', 'state': 'W8U3CrUpsyaROVUf'}
3.205 AuthorizationResponse {
"id_token": {
"aud": [
"0968e2ca-49bb-4dfd-a5cb-b2cbd2b511ad"
],
"auth_time": 1529753285,
"exp": 1529756964,
"iat": 1529753364,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "e94fd363-5bf0-40a1-9e19-dcf91a614f8a",
"nonce": "PIje7xkQnmWjZ6iz",
"rat": 1529753362,
"sub": "[email protected]"
},
"state": "W8U3CrUpsyaROVUf"
}
3.205 phase <--<-- 4 --- AccessToken -->-->
3.205 phase <--<-- 5 --- UserInfo -->-->
3.205 phase <--<-- 6 --- Done -->-->
3.205 end
3.206 assertion CheckHTTPResponse
3.206 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
3.206 assertion VerifyResponse
3.206 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.206 assertion VerifyScopes
3.207 condition verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['email', 'email_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
3.207 condition Done: status=OK
============================================================
Conditions
Check support: status=WARNING, message=No support for: scopes_supported=['email']
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['email', 'email_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
No support for: scopes_supported=['email']
The following claims were missing from the returned information: ['email', 'email_verified']
./OP-scope-phone.txt 0000644 0000000 0000000 00000023235 13313427431 014454 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-scope-phone
Test description: Scope requesting phone claims
Timestamp: 2018-06-23T11:29:29Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.083 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.084 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.084 phase <--<-- 2 --- Registration -->-->
0.085 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.085 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#vP1P23AwaKkqjKU7"
],
"response_types": [
"id_token"
]
}
0.243 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.244 RegistrationResponse {
"client_id": "0d4e240d-defb-42a2-a8ca-c663e0993bd9",
"client_secret": "Ukq86khUGCRT",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "0d4e240d-defb-42a2-a8ca-c663e0993bd9",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#vP1P23AwaKkqjKU7"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.244 phase <--<-- 3 --- AsyncAuthn -->-->
0.245 condition Check support: status=WARNING, message=No support for: scopes_supported=['phone']
0.245 AuthorizationRequest {
"client_id": "0d4e240d-defb-42a2-a8ca-c663e0993bd9",
"nonce": "sUpQfjvPB3FKfHTX",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid phone",
"state": "RFHF9IB8uGLDWapn"
}
0.245 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+phone&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=0d4e240d-defb-42a2-a8ca-c663e0993bd9&state=RFHF9IB8uGLDWapn&response_type=id_token&nonce=sUpQfjvPB3FKfHTX
0.245 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+phone&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=0d4e240d-defb-42a2-a8ca-c663e0993bd9&state=RFHF9IB8uGLDWapn&response_type=id_token&nonce=sUpQfjvPB3FKfHTX
2.352 http args {}
2.522 response URL with fragment
2.522 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMGQ0ZTI0MGQtZGVmYi00MmEyLWE4Y2EtYzY2M2UwOTkzYmQ5Il0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTY4LCJpYXQiOjE1Mjk3NTMzNjgsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImJmOTI4MjU0LWNmNzMtNDJlZC05OTA3LWIyZTQ4MDQ2NDgxOSIsIm5vbmNlIjoic1VwUWZqdlBCM0ZLZkhUWCIsInJhdCI6MTUyOTc1MzM2Nywic3ViIjoiZm9vQGJhci5jb20ifQ.uPjCmpIVBzVKV0yzTo4sgmPLCLkNCMQQeD9UFtIOOQ4IKxtnM18DY7PuGK_Qe39ROkF0jn_cSXJeLwITIjJejA6dCq5fW26plqxAlPz3RqPauuC6aJTQThZZ8aak4XCPoH1mUe3CvT6yxxO5ulMQk_97616MSBmTCI_EyuDclsUIkABJlV54kgyoH-WojA1ze3fm0OHyv33wD_p0_mUIhUJC5Zey6TtUB4BWxhSS4YmeNcnSjy6O9AVbT2HPgQWn-vE5L4JCJ97neqgCD1ie-At2Vfnsa0glSzJaXrRTMDE-28r4R3W7Vv2h2fgYPLWMCravlurR50rJgGjBXfu_APlYpvL_WAH3_qW_m_KG5XF5-g7GpY4IBEdzy8K93mEFbU_RHRd90TNfnsY7bwEsPQ49idh9EgcHxgLA0NN3frsKcBhTKQDCaJDmYUCplCCeOPzLCd2_bQGFPyvF5n6PyS6Xr589wvGnRFuFuJUgL2DFlZ7CrBmtlRF4_xnKSCWR-tIshRm9WeVRMVGGwD2ErgwU5ecKb7IL8IopWyxlPm-XlKXlnVkAWVSxLH04WAcTeZKeDs_2AGmhLpjwqwk-L-AUHjz0crWaK8f4sn7vi9o4yTZC8fxSr3axc6_enF9p06jmVcN3N9maPwiFb_FF5xNKE3bzjvFRcBg8N8Pl4O4&state=RFHF9IB8uGLDWapn
2.522 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMGQ0ZTI0MGQtZGVmYi00MmEyLWE4Y2EtYzY2M2UwOTkzYmQ5Il0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTY4LCJpYXQiOjE1Mjk3NTMzNjgsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImJmOTI4MjU0LWNmNzMtNDJlZC05OTA3LWIyZTQ4MDQ2NDgxOSIsIm5vbmNlIjoic1VwUWZqdlBCM0ZLZkhUWCIsInJhdCI6MTUyOTc1MzM2Nywic3ViIjoiZm9vQGJhci5jb20ifQ.uPjCmpIVBzVKV0yzTo4sgmPLCLkNCMQQeD9UFtIOOQ4IKxtnM18DY7PuGK_Qe39ROkF0jn_cSXJeLwITIjJejA6dCq5fW26plqxAlPz3RqPauuC6aJTQThZZ8aak4XCPoH1mUe3CvT6yxxO5ulMQk_97616MSBmTCI_EyuDclsUIkABJlV54kgyoH-WojA1ze3fm0OHyv33wD_p0_mUIhUJC5Zey6TtUB4BWxhSS4YmeNcnSjy6O9AVbT2HPgQWn-vE5L4JCJ97neqgCD1ie-At2Vfnsa0glSzJaXrRTMDE-28r4R3W7Vv2h2fgYPLWMCravlurR50rJgGjBXfu_APlYpvL_WAH3_qW_m_KG5XF5-g7GpY4IBEdzy8K93mEFbU_RHRd90TNfnsY7bwEsPQ49idh9EgcHxgLA0NN3frsKcBhTKQDCaJDmYUCplCCeOPzLCd2_bQGFPyvF5n6PyS6Xr589wvGnRFuFuJUgL2DFlZ7CrBmtlRF4_xnKSCWR-tIshRm9WeVRMVGGwD2ErgwU5ecKb7IL8IopWyxlPm-XlKXlnVkAWVSxLH04WAcTeZKeDs_2AGmhLpjwqwk-L-AUHjz0crWaK8f4sn7vi9o4yTZC8fxSr3axc6_enF9p06jmVcN3N9maPwiFb_FF5xNKE3bzjvFRcBg8N8Pl4O4', 'state': 'RFHF9IB8uGLDWapn'}
2.614 AuthorizationResponse {
"id_token": {
"aud": [
"0d4e240d-defb-42a2-a8ca-c663e0993bd9"
],
"auth_time": 1529753285,
"exp": 1529756968,
"iat": 1529753368,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "bf928254-cf73-42ed-9907-b2e480464819",
"nonce": "sUpQfjvPB3FKfHTX",
"rat": 1529753367,
"sub": "[email protected]"
},
"state": "RFHF9IB8uGLDWapn"
}
2.614 phase <--<-- 4 --- AccessToken -->-->
2.614 phase <--<-- 5 --- UserInfo -->-->
2.614 phase <--<-- 6 --- Done -->-->
2.614 end
2.615 assertion CheckHTTPResponse
2.615 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
2.615 assertion VerifyResponse
2.615 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.615 assertion VerifyScopes
2.616 condition verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['phone_number', 'phone_number_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
2.616 condition Done: status=OK
============================================================
Conditions
Check support: status=WARNING, message=No support for: scopes_supported=['phone']
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['phone_number', 'phone_number_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
No support for: scopes_supported=['phone']
The following claims were missing from the returned information: ['phone_number', 'phone_number_verified']
./OP-Discovery-jwks_uri.txt 0000644 0000000 0000000 00000026203 13313427203 016031 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Discovery-jwks_uri
Test description: Verify that jwks_uri is published
Timestamp: 2018-06-23T11:26:59Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.076 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.077 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.077 phase <--<-- 2 --- Done -->-->
0.077 end
0.078 assertion CheckHTTPResponse
0.078 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.078 assertion BareKeys
0.178 http response url:https://oidc-certification.ory.sh:8443/.well-known/jwks.json status_code:200
0.179 jwks {'keys': [{'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': 'vMfGr0V9ndTUZhWYdQg4LNJ-ef_K3DaRa9u_h3rdugU-ONPP6eK6D9Jj8z--awCQJR3IWlFvP1jwnEVIlSgyBDoj8jobIIPMPRfgY8pJeriuhxzriqrxAueuksE-mAsGE9t_5gGRKIWf1q2kS8TLrC8j3fyCBwkA7uriF6d5QpZxe34YihMaSaAf9dyGHYEvfTf7vhWZlKdfZUssePWQF0P7bvF309LUqffaBynPSlRzmwH3fTYlHn_dvBpXpyRYM35eTjrz36xpJrKgyumyW8gI2VU1RFImIDp4zRQRgzKBUF-qc_th5OSAp-BU3w1mx47pvhuJ44kedEvb9TZReIOzYfU8DbbspyDD90gf0b7B5d7sgd5vtMlGiooK_j-xpHclS1VkaWtTGeLFzbFuQHcgjoa908Dt3eQWYa-nNhco5z0CMZl_CKSU2qHjwxtKy0hZPrwP7XCDnQ6QQlghfyElYf4c6zkNgy_7zEUpBVsFd1qklmXsLxkN7emj6GCyYbL-Q51DF1bwwZPCQXQYO4bseYfEOgdXkXFq01b7jPzrakKUXw8USYjgU8K9G5eywzZWNER8o-p0OW1tafWLApWTSPrBFuvh0HCUcYT8K7RG0RPdLlrIeTftDt3XuefUNs03mNhYOaFevs4ifMX2oYTfwADL9fH3OlMrja42czs', 'alg': 'RS256', 'kid': 'public:05c2478d-63ed-47c8-ad92-75181a567fa0'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': 'wFhdHCpPOd_H73YRTAyD8XHLxrYoaWlBWInPL-XkcIEOig3_9SzLzf8fL4Kv-tUFJwsUt9EmiKNLvRczFQddW5tgzW-ZLA4RaGQ1rBGDlmVbLBq9D7z_2UkTFrLiz1KY9YRrraNENtmS2DFmBbuQXIOBaX_n9mjgOK2GsLLSPrpm3IV3C_YWov1XibNpFuMIfEw0OhpvFMiQRkdkpf5bgFuEx7LK-rbALl_bul15TSltegQsjQyJkKwyJ4L_PaFSBz5Zltmpm6zD8VgcHhMFuLOKoA4mm2MSrfUE-p2UUM1xN9MTICKFcY3Sx6PW4k1Lb88wu8huJ4yytWNVIXSRsR4YPuuP4KvNY3xpBHfeHGdC9m9qSC1KKMUbrYl7xOexvxY8f1WqD4_B6MG5ihPdgP5rENKDF77pXHEGqdek5KEb_u0XlLmnYXK2fkyLQWP24_x7-hGjIgE4F_zox9onWi-ki3lUhBYbL8AZcbjq3o9CgQF2aACmgv6hPZ8ngbboU4ZLGnPte2qCW1S3ryx2tMweBTpDwAE_Jg3ZHlK7R-SoGspw0MNCuE7vHwnaHmDI8gKFqOEYCGG-tgYnniOkD2_KJ4ZBM20KKV2V66ANnwZERMn6exh_sbGjU6S3c8t-SI2MeQjOD1PyS4itl5Dxz60P9krYR6OeMoego0hOjys', 'alg': 'RS256', 'kid': 'public:4ae49bf4-9da0-4a82-bcce-893c3729f22a'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': 'wF5o__54njdCumCJeSzYxnE6GCJ9JZtYfsNKKeOcf1jPL_hFt1M5uf47WKs1YSWJJhibDWg31mkf18j77sO_KLXh3GBUAfl9O8VZtmm519TPBsSAridq-XiRqXXB_etvrTCeCgIJBupwZn7k9-_4HyZvrwn_l_ik16UY70nLkropxXwn4Jj7-tB_ZzzNMl4l5lSueMyw3VuAcpglwhiX4bPrJd3OMc9DefD42e8UworVqKeArt0SEwx33QP9XU43d83dUlv4Ha1LgsX96KWcan3qn7hxxP1oRhgcPxXqFeoN8sHohCPvLMSISdaqtdMkBdcaZI8aVPHx8J2JxN4aTF0l3cy-t7JB54z6f-3pHeE_bUnj4ghgqZLeU967sS0Y1R6NBRxMnqDb7qEO5_saA1zRfxKaDSbAaFVRhgjvknSoqBx5qyYCCRGnfX3Ax5leL-bvo_M4wszbBAvxoeGY-hwn_s_Nz705kDHIzJfem_XURbv2LjjvdjgUXtRqZJkeTzc9_pXcsoEZX9Xm1gLbAsI2geHQNLI_z1KzWcLsz1uitYEpfndBBYBS3DoFFqo-13qk9WaqBJX9vA7MiFBVPmpWSsNAmYT_-6YxvO9P_OVNDPyLSbOSl1PMbaSK5-sPXw5n7mtkw2rkgPoquEqrmhPQnTVrf876qh571YJgfFs', 'alg': 'RS256', 'kid': 'public:e87ff987-ee63-4f3e-8bf3-4099a6148f78'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': 'spxcDzycfjLukN1KJCopwI6s4bPjlQbA-fDA0qn4ntd-nCPieqq6KdXkpCtthr0jPhg6_NKHpL9CWTqJBCyaVvtgZbw1Q2saRXIyCxnYMlw8akMnYLtSsDVrJRmQMH5NTASnIbx0G_J6pZ6OvQ30c2q8xRkOOwgtGn6E85oNrdf_wbuklksIERzxsoZKpjamgxOKZsssz0x6v0mm0RFOTEPD20eOVUqRPhskBtY7W-swCavX5YVy7PYd14dJ7iiHNn4npe2XZLIwSC-zWts7z_N7RChaQYQCQk6e5q19G6DJMSYZOhsg98P8j4XpfD3m7uutGjSYURIVI2XYFv7EWTwGR_RD8QljM6f5s_JPy3A6_BE6zMgi95D6QB5NJUbQ615hBgYprf6lW-vTc6psER_4NjChA_F10eYFEkroDTO014qhGPm9xe--krH4vksfLwnv-_AsUJUg8nMiDmldrvMU4s8JMlEjTYy99zzhXgqQTRU_w_2C4-UKb0PZQi5IeKPqMygtGs7nqgN_rv1lpcWJ2YZ6VEFPnsSnHU7pMxBA04GeSAs6614FMATjWJW5o080_AFnggQRcHouSFTClvP5dUVC_OGJPFbRblHHPlJibXebdTJRX5jxB6o7KQjw7ua3dW3CfGoizS3iLJgQYENJLMDwUY1rjg37Kwm8JE0', 'alg': 'RS256', 'kid': 'public:5198db5b-878c-4635-a538-e627f98de93e'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': '1Kpv-wv6THhBggBy2793qierg_NDRod7pAT__caxzRd6OF9FmHgzklU2d03RqHris7y0freA7RGhmIZEAyPe-C4-O-hhjw3Afk3rp_UaG1wMbgVKStujOdrcobrO6_hLOoSY7lITA-BYqFl9R5DmBoCw9_C5DEsHYL82c_FD03qVBE2rB6rHLaE03j0coHbZn1yB-RzbQqABkafhxWIUADdQ_YqxE588UzjEDRyxm_QviKoUsfSjlu0R9OMwBeX3uHnUP8tkscmMVOctAktPqzxGlfzaorgvfVWDaSUzYvGHxUdkcloUwqrAeCW_MKRmUcUblYQV_xI7QGjXQK4scTWlt4bthHiZ5fYcWt2CFozBi9V9MjKdDejDuLDDPdGlgNLVAnbUp8OqB3w8eFUycni70qp5KrUa1ooG6Bzs4qxuAD7I7D-9NS9VVhRGDBynUtgUHlBWX908ndXNfrZGnfHUyiSyZGNwy2c6xXbH_F7N09Zu9jTDFQazj85B9fVVXZ-63kfCXeuRhRm5oqYoGCLSgs71f3qnqipu2zPukehGWRt3zqf8NWyNOJxnkwW_D9111MpcrRAyhn3cOzHML6rN4nTA-sdq-9bJNMaxr-WJtawuxQtwVMmQCRHOXuFxP0ZPSVjH0zq2Y3paujalyMGpDIJlvTcP4TT3pmnpJ80', 'alg': 'RS256', 'kid': 'public:e272a755-7ae2-490e-82f5-62e0678641b0'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': '16vFo3VXLypUERl1fqAWJEysIgKnJ15eEnc-5LOiFx7jK2L0zDKtj7q6ySr6rdwmgFjaV1vfG-VKmLHPMD_YuazQeb86blkDnUfNQvHfNID0g-U2G-xeLCqfdl54jzx5NAhMV6BVCUTOwsiUt3dgBaNWGJENo4gU0KGr0S2xEU38sJGUz3zROL6gOmUwqlSAk3YClnhyYYof0tj4j0dW7mXK7MaQ4CRAhq5rJq_VRrMCc4JiD7kAN104V5BmNU409uF4InE2Stugw8RSH4hXeBFp-dXtzQi6qmBLsnHd16_WEce76IxvthFnePqa3XMNg9G4-AJ36RVbH4IhMioQgvgHWGXR276pH1Vyga7V0dSakg8ohSD2vBD5OmlYquJ6krJ3uWUCez59YUeNEgOexn5XaBL0ZEnTQ-zNNHX39QZz9QaU2lftGhknRufg68bmshLWgXJexJS1ht1vFccFcmvpnYEnCTwKzo0kjlcY7IiBpWgJ1f4r1PTIKuh8CluNkitsbABcVx3-FOAhA4CMrQovAaNL_jfp6wKBA9Qy0W9LkESVsRQWFUSpQu_z4pJMOVfjbwJOsquxKwXphI2h1VczR-Hh8rTX7D2GL_4-GyG2nHfpF3jVq7raKnyGxJA8ZIK9kPh0JlQhR2FcBhFOWjvusFjoZ09Po6XtvWlP82E', 'alg': 'RS256', 'kid': 'public:0acf6c64-4d55-4888-abb9-b2a3f661ee7f'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': '0vvbIEitFVzY4o12elAZbZvpja5xTm5AOh9wi2UEiPEL6aKxAUn1ywpUaLyWKuEXdeuykHyybniLaThik7Gf-6xKk6S9IK9tjbbwfRqHVkn_Xkyul0ohFI3iTcjvFq5FPGr5vEhSB6eckdngUpzb-7S_Kt8yunkdhYTmkuAr2AXSbQcmCbOJXOsvkc5LOwpjmFIWrtBAHwILJ5cHjzIHtkK2QKMJRlknD8b4kmQ3x6vfxA7mtXREUXdQFn7ssnOVPzriPQp4kIi_TMczSmRLlX1PeeOeDGpTnYywQbsAfdBGZ20WdZlwP3lRUUJoKv1GpBU51GKm2xhHtyrzOkiRKE8pH_PD05gh1G9qXbFtBOoHMBWEaCxoxyJcW8_9iLXBPoC-Jhm47VO5T9hPlaISzDY6EUmgYktejS_mx_bR7emBcbtFUccYSVVqT3EZqAFuQlsPsvj8AT9NmEiVncB2Cy4z7ofLX_Wai_VFPCf7AEfmDZ8mzFZQfVGct74Q9KybwXm8YDq0TSszQGuqT0gtvU9In7CPSOytrVDbdk8Peyeg-Wn_ACMRh5T23wUbQ0jy0Wi9kBwIzN-dUpKu3uL6EZ3PmPSZItQHeAxpQbRZJ1vrrd2y-b6EGun3G9rlnOZ3L4_L4-NOKLt4VGPie7sphlND1pc4ZipaXBjZ9uC3bS8', 'alg': 'RS256', 'kid': 'public:490968e8-c6e5-441e-b42e-5053d6c67af2'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': '0WN9e_V2wEp33JZoN7zQ9J4E4Iz0l-dlx6GqIKdepcMjON3PKZHWFML1e0ZKAkuG2ZJRKoX1LaSNZT0NI9N6_wVAT9aNv53sHBJVC4Bww1zKHEvQseGwJbG0lZZHjDXaxCBPte9yQnquIRRp9Ab-uBeziRoaFQ02OV3LBMBSZ79AzFvZ4yTqpUS_xp-Ylfcmh5wXEppd6hoxs9h1tttPTPbnMLte3S_zxCZI4TQi8d1yBi39OvfZxtABQQbgqYPxiYehNdYbfmZ2CAmVlsTxByS3X-ANBe2nmLsOLgXTyVFZfvEZkzY7OgEwwq5zog5pScXJ-TGlj0guZd8nClHEV-GHvXonjb2hZB63dFEiUVMNh5cOblZX034GnlOkzYfAH8UZ_cvOqONHbvplzONuaYSSRMPRaZwj-0fpElhFNHwr1v1pqbE1i9XOxU_c-eSMr4XAm1VsWG3zJKymjoJmaDcW3AEawi3btL1N2tE3p27cHtcdFjcv5birnxMtPI9Vu806U0_WiGtH_kaWxz64Xk3A_yB-lIBQwXe61JME-K81wLLcHE9qoqpF5iUK4mDqMmI_DVIazUlVUzxY0-1iFkV790V95dBxeYFgXKX02g8NyxfnyzUDC12qUKKejJFbG5LPHaMUXWJIQ2ntwBX_XzeF4pGh0u0vYmfxAmfHWN0', 'alg': 'RS256', 'kid': 'public:a09f73cf-d685-4c5c-9312-60a13e57646f'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': 's_BEnyG0xHYDibtz9a4tE1IW8490BQ_z526Lg2d0PWRtHfcqKmPG0pd0DizPuLY2j1NAY4cCXLwNWMJ3Cp1TqddaMl08hElvNbilcTyQr96RQg9MnrWeR1EqpdXEzTjcx06DFDokvzs89YQVZTDzSh_-xY_m_0VkcFQ0RpDTBn1B0dkMh78dbTJVVSGXYSBgMpcKrGlrgDaPIRX7qp_SdvjNtkPStG_wCPkzd_IJAaTAHGrlyj27dyhOC6EqQjpZRhQvT-w7GalbObncCFox3hRiC8wbI9Toi5p7vEuJJ6yksaqtIwgbtPXXUChNTqwQgIc1RE8RVuhI8ExaT6FfStIVLq9Tow6Hd9mopdX_ydEHHbnbvSC0cCRPg8_G8zTk0ihFpiHE1yEDXBQSs6pZIQ8KZF2RG35j75Jh4ngsDyPbC7PmjE93SG25AkX0WZwoB3g8f6q2r4dZqNtemRX1lMDo0FUQyYcOU5mnOiW3E5oNs3g-VH5ISOiaSUSLX6AIxDfdk6Wj5t7FZUo4EcIwTnE3PI-0HxnLJaErwbYEX0hO1BuhfF7zYHxDjc085U7OyN0abZWbuVUMtIMRgq-4ASlM9fTECg3sMmOfTEJV9nrJZaSCxKvVWma9A01bvBPB6Qn92Gj1XNZ0E1RBLUp1V3iXLcS7MGJh7bAAk5kwKCM', 'alg': 'RS256', 'kid': 'public:8e8dab73-c9fe-42ef-9a7b-1e217abba9a9'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': '3cQ2ihjoElfFVnnkleo6ioUvZrkDfddEKOMCaemXP7umEhr8TC9_L3BKYbJqtE15jvkJiqT1vlHgTOKD5wWCFhFSmEa9PAWlt9Hw6BWddFEsiijR113yvj4eT0qfjseMYyiKst0kBxiTRmQdIzllY2Y2UU1IYIkaAP009nZSR7a5IrPYFydZ6SRARk9kZI90fmgRnzUuQKcv7C9HbkUqs7qiApfA17ACpnuKQP5p5lGL41t5ZnU1-5FvmmO6NnwtRZif34HL6WYuksi2RleLAKoHGh_l6P6ygP5v3ucHH0TmdLVBAHMmlLW4BKdVnWa2HEQCKIBiXJztu8EpYCVpZ_ThCaZLagcUM6VCD4nqvsXzQB7pnsBjq75tbo2jlqrGQJE9ekfGVyw7XDN45IkJFLgfVJ2anpyK4NeIAbkB7ZCYSXbR96_EC6h0uZSMHtPYVNIvbRCK6ysCdlDuDsWiQ01tP-lp90eWj1d7ZYlaYNws12OauBfgLyn0NZvjIz5EYXbOO_Hi0P5U6znS1Um-lU0nB1Gsj685Io-KLzN0shOqkfDP8Xcjfx_3EEg0aEPJWqCjiP9K6veNI896ZrIrH6Sd0V_o4TIzpSJimZlMZrTWS6dUm2j6q1WQOE2Z5JlDMC90yTGUC8MNt2AdMB0Z78Mf71rdSrpXpWLMh7rz_7k', 'alg': 'RS256', 'kid': 'public:6a09d4a3-a298-47bc-8bbd-50b64f653f2d'}]}
0.179 condition bare-keys: status=OK [Dynamic OPs MUST publish their public keys as bare JWK keys]
0.179 assertion CheckHasJwksURI
0.179 condition providerinfo-has-jwks_uri: status=OK [Check that the jwks_uri discovery metadata value is in the provider_info]
0.179 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
bare-keys: status=OK [Dynamic OPs MUST publish their public keys as bare JWK keys]
providerinfo-has-jwks_uri: status=OK [Check that the jwks_uri discovery metadata value is in the provider_info]
Done: status=OK
============================================================
RESULT: PASSED
./OP-request_uri-Sig.txt 0000644 0000000 0000000 00000022075 13313427403 015323 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-request_uri-Sig
Test description: Support request_uri request parameter with signed request
Timestamp: 2018-06-23T11:29:07Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.114 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.115 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.115 phase <--<-- 2 --- Registration -->-->
0.115 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'request_object_signing_alg': 'RS256'}
0.116 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "RS256",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#2wYfiTH1XUlJQN0c"
],
"response_types": [
"id_token"
]
}
0.28 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.281 RegistrationResponse {
"client_id": "79deb0a8-c9be-4c97-9e93-75345cbfe09f",
"client_secret": "vmPEgHPFcZw8",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "79deb0a8-c9be-4c97-9e93-75345cbfe09f",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "RS256",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#2wYfiTH1XUlJQN0c"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.281 phase <--<-- 3 --- AsyncAuthn -->-->
0.284 AuthorizationRequest {
"client_id": "79deb0a8-c9be-4c97-9e93-75345cbfe09f",
"nonce": "ZhQi2rLhkOwngbG9",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"request_uri": "https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#2wYfiTH1XUlJQN0c",
"response_type": "id_token",
"scope": "openid",
"state": "1MfbJpMFqwE20YkP"
}
0.285 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?request_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Frequests%2Fe3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9%232wYfiTH1XUlJQN0c&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=79deb0a8-c9be-4c97-9e93-75345cbfe09f&state=1MfbJpMFqwE20YkP&response_type=id_token&nonce=ZhQi2rLhkOwngbG9
0.285 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?request_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Frequests%2Fe3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9%232wYfiTH1XUlJQN0c&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=79deb0a8-c9be-4c97-9e93-75345cbfe09f&state=1MfbJpMFqwE20YkP&response_type=id_token&nonce=ZhQi2rLhkOwngbG9
2.815 http args {}
3.03 response URL with fragment
3.03 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNzlkZWIwYTgtYzliZS00Yzk3LTllOTMtNzUzNDVjYmZlMDlmIl0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTQ3LCJpYXQiOjE1Mjk3NTMzNDcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjY0NTdmMmZhLTUxODQtNGE1ZS04ZGIwLTQzMmZiMDM2N2I4OSIsIm5vbmNlIjoiWmhRaTJyTGhrT3duZ2JHOSIsInJhdCI6MTUyOTc1MzM0NSwic3ViIjoiZm9vQGJhci5jb20ifQ.mcY-oIBXvnVm-qNe3OscohC8DfqahLRj-_lmp6ONdiyD5kjy0ASVRKkHaGToXqY36-a27AmeB6_4ks-I1_lv2yGDHjkigDtMlflqBHncrVI-FBNDcgr0bXL2kJ8qGwb7aQ7LHqptofIVXVYn9zPkjxpjuI3kzU3dZhcLd8W_7JI2szgMSoj9moMmUA9gg3bVz4rO9Y3QjFT26amjnXFtgqcp-en69L3E9na49L6sW5o3ftku85VsFysllwsVCifvRyrYF48_poNgtN_zQ8iKHMswB28cMrpUuZ5RR9Gotut646_IbOSHHW7hVN0kEXHCX01veMTj1Kg510VutH7ybO7YN5lS2SQvRTA_6q6-a5BM5MikxhK9q4Egi6vYmGjGsKprPIrSNirVtOQQ28rJYQaepHShRwfYPjKnwIyWO1WDv5k1mccNSoSc2vDY8nLiFT6_C1qpc1TkfnhnhVmX9tI3VXrOwQJdh-66XjpV2x5o9wu_d5m8v_8IN2NrGClg9GSsVpkK5XC_1FcUp0IKPW3YXwX0azF_w1n9zYIUWjiilhjvrkEGX0jtQNaQ1ZdEdmoHSLVxwq2eC92SevNh6K0TO2yMb5kg9f1nALdq9uXxbyQ7XI2Yigs4hAytRNWf0LK_ueJO8x0TSyt5IIRhbOjdJX_RiHeYxhpbjXxcqk4&state=1MfbJpMFqwE20YkP
3.031 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNzlkZWIwYTgtYzliZS00Yzk3LTllOTMtNzUzNDVjYmZlMDlmIl0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTQ3LCJpYXQiOjE1Mjk3NTMzNDcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjY0NTdmMmZhLTUxODQtNGE1ZS04ZGIwLTQzMmZiMDM2N2I4OSIsIm5vbmNlIjoiWmhRaTJyTGhrT3duZ2JHOSIsInJhdCI6MTUyOTc1MzM0NSwic3ViIjoiZm9vQGJhci5jb20ifQ.mcY-oIBXvnVm-qNe3OscohC8DfqahLRj-_lmp6ONdiyD5kjy0ASVRKkHaGToXqY36-a27AmeB6_4ks-I1_lv2yGDHjkigDtMlflqBHncrVI-FBNDcgr0bXL2kJ8qGwb7aQ7LHqptofIVXVYn9zPkjxpjuI3kzU3dZhcLd8W_7JI2szgMSoj9moMmUA9gg3bVz4rO9Y3QjFT26amjnXFtgqcp-en69L3E9na49L6sW5o3ftku85VsFysllwsVCifvRyrYF48_poNgtN_zQ8iKHMswB28cMrpUuZ5RR9Gotut646_IbOSHHW7hVN0kEXHCX01veMTj1Kg510VutH7ybO7YN5lS2SQvRTA_6q6-a5BM5MikxhK9q4Egi6vYmGjGsKprPIrSNirVtOQQ28rJYQaepHShRwfYPjKnwIyWO1WDv5k1mccNSoSc2vDY8nLiFT6_C1qpc1TkfnhnhVmX9tI3VXrOwQJdh-66XjpV2x5o9wu_d5m8v_8IN2NrGClg9GSsVpkK5XC_1FcUp0IKPW3YXwX0azF_w1n9zYIUWjiilhjvrkEGX0jtQNaQ1ZdEdmoHSLVxwq2eC92SevNh6K0TO2yMb5kg9f1nALdq9uXxbyQ7XI2Yigs4hAytRNWf0LK_ueJO8x0TSyt5IIRhbOjdJX_RiHeYxhpbjXxcqk4', 'state': '1MfbJpMFqwE20YkP'}
3.114 AuthorizationResponse {
"id_token": {
"aud": [
"79deb0a8-c9be-4c97-9e93-75345cbfe09f"
],
"auth_time": 1529753285,
"exp": 1529756947,
"iat": 1529753347,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "6457f2fa-5184-4a5e-8db0-432fb0367b89",
"nonce": "ZhQi2rLhkOwngbG9",
"rat": 1529753345,
"sub": "[email protected]"
},
"state": "1MfbJpMFqwE20YkP"
}
3.114 phase <--<-- 4 --- Done -->-->
3.114 end
3.114 assertion VerifyAuthnOrErrorResponse
3.114 condition authn-response-or-error: status=OK [Checks that the last response was a JSON encoded authentication or error message]
3.114 condition Done: status=OK
============================================================
Conditions
authn-response-or-error: status=OK [Checks that the last response was a JSON encoded authentication or error message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Registration-policy_uri.txt 0000644 0000000 0000000 00000021317 13313427221 017056 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-policy_uri
Test description: Registration with policy_uri
Timestamp: 2018-06-23T11:27:13Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
0.99 phase <--<-- 1 --- Webfinger -->-->
0.99 not expected to do WebFinger
0.99 phase <--<-- 2 --- Discovery -->-->
0.99 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.065 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.067 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.067 phase <--<-- 3 --- Registration -->-->
1.067 register kwargs:{'application_name': 'OIC test tool', 'policy_uri': 'https://op.certification.openid.net:61353/static/policy.html', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.067 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"policy_uri": "https://op.certification.openid.net:61353/static/policy.html",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#U9xLTrHtq372wUTA"
],
"response_types": [
"id_token"
]
}
1.256 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.257 RegistrationResponse {
"client_id": "c8b7f7fa-9322-431c-95d0-70f0c689343c",
"client_secret": "T7kISiPlG5DT",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "c8b7f7fa-9322-431c-95d0-70f0c689343c",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"policy_uri": "https://op.certification.openid.net:61353/static/policy.html",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#U9xLTrHtq372wUTA"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.257 phase <--<-- 4 --- AsyncAuthn -->-->
1.257 AuthorizationRequest {
"client_id": "c8b7f7fa-9322-431c-95d0-70f0c689343c",
"nonce": "jWNEXypomelHmRyv",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "W0XLn0WL33ENJPd8"
}
1.258 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=c8b7f7fa-9322-431c-95d0-70f0c689343c&state=W0XLn0WL33ENJPd8&response_type=id_token&nonce=jWNEXypomelHmRyv
1.258 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=c8b7f7fa-9322-431c-95d0-70f0c689343c&state=W0XLn0WL33ENJPd8&response_type=id_token&nonce=jWNEXypomelHmRyv
3.699 http args {}
3.869 response URL with fragment
3.87 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYzhiN2Y3ZmEtOTMyMi00MzFjLTk1ZDAtNzBmMGM2ODkzNDNjIl0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODMzLCJpYXQiOjE1Mjk3NTMyMzMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjRiMjM5YjM2LWI3NzctNDlmOS1hZTMwLTRhM2JlODVmYWM2MiIsIm5vbmNlIjoialdORVh5cG9tZWxIbVJ5diIsInJhdCI6MTUyOTc1MzIzMCwic3ViIjoiZm9vQGJhci5jb20ifQ.RfzfRlzV_uQcpQlVwNJ3q-5eWpGWopQOssHQTuczBh8OylZWR_jRYO6F_XQaChB4Q23P60y8-QShe9A0Vz50kUfOvRL6QHSyMYdwOY1KUwVLBTp9ajEDs3SLkBi5-1P8OTv7eHPu-TvERvjzGZ_wOxoobIKo4VXLRgiRYwkKAASpz2ySPxkZKv92RpyH-UB9KQCHLGvAPBm4f-5ELNoNygFArWM2zlP63wnWZDtPRhooIDNMBns33sKtFptqC0iRNOJB11O8Iov1A-2eMD8StGzCAxK19OKiWus9O4Wy5c-dopAr27gpFXMQEbU-Of5sILheUNy6vuZmab10JO-fx1nDziacJ4T4pT1H-oJYzR8-wvvV1BWw8u9ZCPwkKARhuUp-ZstaQ7QkvTvipoMLL1zXley52YKQTMGgxdqqIBc80sbacg--KbAjOxZgsYAeVgNrjyzXwRtxIOFMZKJC1tWYJToEUCFYtSGVjDnU3y7M_iTmhlvAoyhlJm4zO7raz2UShhDjX65-EbJPWe_J46-JK5HDAA7QaBgJY802OuhQP1lT8xOi_6NqrKuG9QePcjMqFR0EZlMg4mueV3ljIheJo_mOxU55IbrVccNw0PeYPnl0bxZG5PpAGFfdvRGLma5yji7s4lrrkc3ntjMNNZrROiF-ArnuprVBUJVxveM&state=W0XLn0WL33ENJPd8
3.87 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYzhiN2Y3ZmEtOTMyMi00MzFjLTk1ZDAtNzBmMGM2ODkzNDNjIl0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODMzLCJpYXQiOjE1Mjk3NTMyMzMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjRiMjM5YjM2LWI3NzctNDlmOS1hZTMwLTRhM2JlODVmYWM2MiIsIm5vbmNlIjoialdORVh5cG9tZWxIbVJ5diIsInJhdCI6MTUyOTc1MzIzMCwic3ViIjoiZm9vQGJhci5jb20ifQ.RfzfRlzV_uQcpQlVwNJ3q-5eWpGWopQOssHQTuczBh8OylZWR_jRYO6F_XQaChB4Q23P60y8-QShe9A0Vz50kUfOvRL6QHSyMYdwOY1KUwVLBTp9ajEDs3SLkBi5-1P8OTv7eHPu-TvERvjzGZ_wOxoobIKo4VXLRgiRYwkKAASpz2ySPxkZKv92RpyH-UB9KQCHLGvAPBm4f-5ELNoNygFArWM2zlP63wnWZDtPRhooIDNMBns33sKtFptqC0iRNOJB11O8Iov1A-2eMD8StGzCAxK19OKiWus9O4Wy5c-dopAr27gpFXMQEbU-Of5sILheUNy6vuZmab10JO-fx1nDziacJ4T4pT1H-oJYzR8-wvvV1BWw8u9ZCPwkKARhuUp-ZstaQ7QkvTvipoMLL1zXley52YKQTMGgxdqqIBc80sbacg--KbAjOxZgsYAeVgNrjyzXwRtxIOFMZKJC1tWYJToEUCFYtSGVjDnU3y7M_iTmhlvAoyhlJm4zO7raz2UShhDjX65-EbJPWe_J46-JK5HDAA7QaBgJY802OuhQP1lT8xOi_6NqrKuG9QePcjMqFR0EZlMg4mueV3ljIheJo_mOxU55IbrVccNw0PeYPnl0bxZG5PpAGFfdvRGLma5yji7s4lrrkc3ntjMNNZrROiF-ArnuprVBUJVxveM', 'state': 'W0XLn0WL33ENJPd8'}
3.953 AuthorizationResponse {
"id_token": {
"aud": [
"c8b7f7fa-9322-431c-95d0-70f0c689343c"
],
"auth_time": 1529753136,
"exp": 1529756833,
"iat": 1529753233,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "4b239b36-b777-49f9-ae30-4a3be85fac62",
"nonce": "jWNEXypomelHmRyv",
"rat": 1529753230,
"sub": "[email protected]"
},
"state": "W0XLn0WL33ENJPd8"
}
3.953 phase <--<-- 5 --- Done -->-->
3.953 end
3.954 assertion VerifyAuthnResponse
3.954 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
3.954 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-claims-essential.txt 0000644 0000000 0000000 00000021104 13313427247 015467 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-claims-essential
Test description: Claims request with essential name claim
Timestamp: 2018-06-23T11:27:35Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.076 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.077 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.077 phase <--<-- 2 --- Registration -->-->
0.078 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.078 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#qY0iNQBQtTcZ9O8v"
],
"response_types": [
"id_token"
]
}
0.236 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.237 RegistrationResponse {
"client_id": "e0ac5c96-42e5-4966-9fc4-80da2a77a836",
"client_secret": "V1hyCLSwAn89",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "e0ac5c96-42e5-4966-9fc4-80da2a77a836",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#qY0iNQBQtTcZ9O8v"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.237 phase <--<-- 3 --- AsyncAuthn -->-->
0.238 AuthorizationRequest {
"claims": {
"id_token": {
"name": {
"essential": true
}
}
},
"client_id": "e0ac5c96-42e5-4966-9fc4-80da2a77a836",
"nonce": "jrA4gEAMUV6cqyjU",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "vCvPsy9j4fk6nOhc"
}
0.238 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=e0ac5c96-42e5-4966-9fc4-80da2a77a836&claims=%7B%22id_token%22%3A+%7B%22name%22%3A+%7B%22essential%22%3A+true%7D%7D%7D&state=vCvPsy9j4fk6nOhc&response_type=id_token&nonce=jrA4gEAMUV6cqyjU
0.238 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=e0ac5c96-42e5-4966-9fc4-80da2a77a836&claims=%7B%22id_token%22%3A+%7B%22name%22%3A+%7B%22essential%22%3A+true%7D%7D%7D&state=vCvPsy9j4fk6nOhc&response_type=id_token&nonce=jrA4gEAMUV6cqyjU
2.838 http args {}
3.047 response URL with fragment
3.047 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZTBhYzVjOTYtNDJlNS00OTY2LTlmYzQtODBkYTJhNzdhODM2Il0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODU1LCJpYXQiOjE1Mjk3NTMyNTUsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6Ijk3MzIwY2ZmLTkwM2UtNDIzNC05M2FiLWM2NTlhMGNjMTcxOCIsIm5vbmNlIjoianJBNGdFQU1VVjZjcXlqVSIsInJhdCI6MTUyOTc1MzI1Miwic3ViIjoiZm9vQGJhci5jb20ifQ.Vt-sC3QA1dGf2WSta3e0lnUbXnTvb7ToqUDDLzlTLUlaPjoCxjyvHY1-fTqlm6qcXj7EH2NRnaAXzbzwPaqeph9e4pQbKi7rgpZSwDjJGGWcsTHUTNAELUKyKsUoMj1Bf4VYCXb-rQCWLnFfieagIICe1_cqh1c1GevgBOAH4DbEXgCzss2LQqQSjjD1UBJgqzwvmocvVpuUcMZQsGQmapJdGuAnKVLffWpU3SJcOcg93-8E-j3jiO62wgL3MWbT-dursSTBwrUijNc0zHKv5Q0r42GwOnWndvVsAtTJBqpEowxY4ggYH3GRQMKFXOuS88CnkEfIpVq1rwhxsMCcCiTusRfkkEP3BKKAIM3IvF_vBHraoHQra6sLggxRSnVL9IMdStwRpyoR0d79vXlznySFNhLkMeyWWrwhK00kheyZRZ7-h3GRU9tcdpVEY6DtteYvVDiOli2py28miLJPou5jPJZq_-Lm9De4t1pHzGGvXMbqIRmmA2aWGYFSfMbOOSh7CACYMAzHv6MfG0iKGF0R5GXl_2uS1TGelRDQ3BYxeA8v7cvhoB_O6uul7NWww79Nd73-wKTeOA1vaGhrrYsgr6Lsykye4k3fqfBV9RH80AqVYff1JLkj10o3kaqT9BjxQxdxOCIyGCXGvJI_fTv61F64Qhnc0Y_iC4YFK1Y&state=vCvPsy9j4fk6nOhc
3.047 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZTBhYzVjOTYtNDJlNS00OTY2LTlmYzQtODBkYTJhNzdhODM2Il0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODU1LCJpYXQiOjE1Mjk3NTMyNTUsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6Ijk3MzIwY2ZmLTkwM2UtNDIzNC05M2FiLWM2NTlhMGNjMTcxOCIsIm5vbmNlIjoianJBNGdFQU1VVjZjcXlqVSIsInJhdCI6MTUyOTc1MzI1Miwic3ViIjoiZm9vQGJhci5jb20ifQ.Vt-sC3QA1dGf2WSta3e0lnUbXnTvb7ToqUDDLzlTLUlaPjoCxjyvHY1-fTqlm6qcXj7EH2NRnaAXzbzwPaqeph9e4pQbKi7rgpZSwDjJGGWcsTHUTNAELUKyKsUoMj1Bf4VYCXb-rQCWLnFfieagIICe1_cqh1c1GevgBOAH4DbEXgCzss2LQqQSjjD1UBJgqzwvmocvVpuUcMZQsGQmapJdGuAnKVLffWpU3SJcOcg93-8E-j3jiO62wgL3MWbT-dursSTBwrUijNc0zHKv5Q0r42GwOnWndvVsAtTJBqpEowxY4ggYH3GRQMKFXOuS88CnkEfIpVq1rwhxsMCcCiTusRfkkEP3BKKAIM3IvF_vBHraoHQra6sLggxRSnVL9IMdStwRpyoR0d79vXlznySFNhLkMeyWWrwhK00kheyZRZ7-h3GRU9tcdpVEY6DtteYvVDiOli2py28miLJPou5jPJZq_-Lm9De4t1pHzGGvXMbqIRmmA2aWGYFSfMbOOSh7CACYMAzHv6MfG0iKGF0R5GXl_2uS1TGelRDQ3BYxeA8v7cvhoB_O6uul7NWww79Nd73-wKTeOA1vaGhrrYsgr6Lsykye4k3fqfBV9RH80AqVYff1JLkj10o3kaqT9BjxQxdxOCIyGCXGvJI_fTv61F64Qhnc0Y_iC4YFK1Y', 'state': 'vCvPsy9j4fk6nOhc'}
3.155 AuthorizationResponse {
"id_token": {
"aud": [
"e0ac5c96-42e5-4966-9fc4-80da2a77a836"
],
"auth_time": 1529753136,
"exp": 1529756855,
"iat": 1529753255,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "97320cff-903e-4234-93ab-c659a0cc1718",
"nonce": "jrA4gEAMUV6cqyjU",
"rat": 1529753252,
"sub": "[email protected]"
},
"state": "vCvPsy9j4fk6nOhc"
}
3.155 phase <--<-- 4 --- AccessToken -->-->
3.155 phase <--<-- 5 --- UserInfo -->-->
3.155 phase <--<-- 6 --- Done -->-->
3.155 end
3.155 assertion VerifyClaims
3.156 condition Done: status=OK
============================================================
Conditions
Done: status=OK
============================================================
RESULT: PASSED
./OP-prompt-none-LoggedIn.txt 0000644 0000000 0000000 00000031014 13313427315 016173 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-prompt-none-LoggedIn
Test description: Request with prompt=none when logged in [Basic, Implicit, Hybrid]
Timestamp: 2018-06-23T11:28:13Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.076 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.077 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.077 phase <--<-- 2 --- Registration -->-->
0.077 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.078 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#keYVPGE2rh7Il4Jq"
],
"response_types": [
"id_token"
]
}
0.234 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.235 RegistrationResponse {
"client_id": "a2e474ae-8bc0-41e8-9e5b-754fb1e17cd7",
"client_secret": "kef6Bp-5Tfap",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "a2e474ae-8bc0-41e8-9e5b-754fb1e17cd7",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#keYVPGE2rh7Il4Jq"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.235 phase <--<-- 3 --- AsyncAuthn -->-->
0.235 AuthorizationRequest {
"client_id": "a2e474ae-8bc0-41e8-9e5b-754fb1e17cd7",
"nonce": "dyaFrRmNRQ5OUjh0",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "jZyVoiKv0puunL5l"
}
0.236 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=a2e474ae-8bc0-41e8-9e5b-754fb1e17cd7&state=jZyVoiKv0puunL5l&response_type=id_token&nonce=dyaFrRmNRQ5OUjh0
0.236 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=a2e474ae-8bc0-41e8-9e5b-754fb1e17cd7&state=jZyVoiKv0puunL5l&response_type=id_token&nonce=dyaFrRmNRQ5OUjh0
3.1 http args {}
3.314 response URL with fragment
3.314 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYTJlNDc0YWUtOGJjMC00MWU4LTllNWItNzU0ZmIxZTE3Y2Q3Il0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2ODkxLCJpYXQiOjE1Mjk3NTMyOTEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImI4OWI3ZTc5LTdkYTItNDM5ZC04YWMzLWIyMzY1NjM4MWE0OCIsIm5vbmNlIjoiZHlhRnJSbU5SUTVPVWpoMCIsInJhdCI6MTUyOTc1MzI4OSwic3ViIjoiZm9vQGJhci5jb20ifQ.hQ8bFPjR7dV6MUIT0t7tUHjsGUhJwd5KRH4jU0cU1ljoNiuMGAbkz56CIAGn25uidN3BvNn4Teb-zEcIF8oEI4NIP2LNxQMEoG6O6SzKDcLX80wsh_Ank4h5KxExnu3Q-sARtZnqAsU_S7jcD-yGVpcI3IeVGoDqJA_FV1WFfy38_jre5csSVXhCw7p1QL5RPU9y1T_jXydXw1nLVKTUld2S21qGn8cER-MgwPm4dCX56Qz-FFtEAxptS9h7KnwI9TfHtaCeaFOrMJ95181dy7H8ayqnTsiV6TfEytsJsaBmClLdvnGNOZ2df74RokIRG9B7C4gLXW15BhVKbzmcsJMjpIxetb2jTZfzYmFrBO4h3m5_HmtkuHZixEAjXuMdsn8yMtl7ZewnKFzOvB23bt-MrxPt-OTzBEjl2vZnDU3LXIRd1ZsEJOO9aBMakb7xsWubFRhanzI2rL03XNw-Hz2fMNYWIxaj71bEkm2QutYNzayiPo0bye-ZYREecI0z_qQSdiCVqZf8gMuUT0WaOFR-BGI3DzVUaQhzIQDqOPyReIbdgRzGsxMnwtzsLzkcENZuDngSvUYDQ7JG0ecXzFa6is5KwpxCcOHN36Y_JbCgh88W-raL3Z0fEbmgg3HpaW7-MMB9ZCtHp2shKYe9np07FuS_ojBsM4NQ00x-SXo&state=jZyVoiKv0puunL5l
3.314 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYTJlNDc0YWUtOGJjMC00MWU4LTllNWItNzU0ZmIxZTE3Y2Q3Il0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2ODkxLCJpYXQiOjE1Mjk3NTMyOTEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImI4OWI3ZTc5LTdkYTItNDM5ZC04YWMzLWIyMzY1NjM4MWE0OCIsIm5vbmNlIjoiZHlhRnJSbU5SUTVPVWpoMCIsInJhdCI6MTUyOTc1MzI4OSwic3ViIjoiZm9vQGJhci5jb20ifQ.hQ8bFPjR7dV6MUIT0t7tUHjsGUhJwd5KRH4jU0cU1ljoNiuMGAbkz56CIAGn25uidN3BvNn4Teb-zEcIF8oEI4NIP2LNxQMEoG6O6SzKDcLX80wsh_Ank4h5KxExnu3Q-sARtZnqAsU_S7jcD-yGVpcI3IeVGoDqJA_FV1WFfy38_jre5csSVXhCw7p1QL5RPU9y1T_jXydXw1nLVKTUld2S21qGn8cER-MgwPm4dCX56Qz-FFtEAxptS9h7KnwI9TfHtaCeaFOrMJ95181dy7H8ayqnTsiV6TfEytsJsaBmClLdvnGNOZ2df74RokIRG9B7C4gLXW15BhVKbzmcsJMjpIxetb2jTZfzYmFrBO4h3m5_HmtkuHZixEAjXuMdsn8yMtl7ZewnKFzOvB23bt-MrxPt-OTzBEjl2vZnDU3LXIRd1ZsEJOO9aBMakb7xsWubFRhanzI2rL03XNw-Hz2fMNYWIxaj71bEkm2QutYNzayiPo0bye-ZYREecI0z_qQSdiCVqZf8gMuUT0WaOFR-BGI3DzVUaQhzIQDqOPyReIbdgRzGsxMnwtzsLzkcENZuDngSvUYDQ7JG0ecXzFa6is5KwpxCcOHN36Y_JbCgh88W-raL3Z0fEbmgg3HpaW7-MMB9ZCtHp2shKYe9np07FuS_ojBsM4NQ00x-SXo', 'state': 'jZyVoiKv0puunL5l'}
3.41 AuthorizationResponse {
"id_token": {
"aud": [
"a2e474ae-8bc0-41e8-9e5b-754fb1e17cd7"
],
"auth_time": 1529753285,
"exp": 1529756891,
"iat": 1529753291,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "b89b7e79-7da2-439d-8ac3-b23656381a48",
"nonce": "dyaFrRmNRQ5OUjh0",
"rat": 1529753289,
"sub": "[email protected]"
},
"state": "jZyVoiKv0puunL5l"
}
3.41 phase <--<-- 4 --- AccessToken -->-->
3.41 phase <--<-- 5 --- AsyncAuthn -->-->
3.411 AuthorizationRequest {
"client_id": "a2e474ae-8bc0-41e8-9e5b-754fb1e17cd7",
"nonce": "GBWUgE1RMnERXM9C",
"prompt": [
"none"
],
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "Z0XkShIap0l0WnrQ"
}
3.411 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=a2e474ae-8bc0-41e8-9e5b-754fb1e17cd7&state=Z0XkShIap0l0WnrQ&response_type=id_token&nonce=GBWUgE1RMnERXM9C
3.411 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=a2e474ae-8bc0-41e8-9e5b-754fb1e17cd7&state=Z0XkShIap0l0WnrQ&response_type=id_token&nonce=GBWUgE1RMnERXM9C
4.563 http args {}
4.753 response URL with fragment
4.753 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYTJlNDc0YWUtOGJjMC00MWU4LTllNWItNzU0ZmIxZTE3Y2Q3Il0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2ODkzLCJpYXQiOjE1Mjk3NTMyOTMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImYwZmIxNjhjLTQ3NWQtNGI5NS04ZDhjLTZiNGE2MzJhYjk1ZSIsIm5vbmNlIjoiR0JXVWdFMVJNbkVSWE05QyIsInJhdCI6MTUyOTc1MzI5Miwic3ViIjoiZm9vQGJhci5jb20ifQ.T8dmx09S9lovB6NUac2TMOC4w1MThhzGTV8rp2NFeLwCX1rsGtYlRmpsMyYQIq_KfUcgaHRHvlLWRK9JCLfk3YOCW165c1-7zTB3rtjDjJIoghddLPW7nmC-p9-sg1WtLtFroa-oYQR5habXw8JMT1XczSUvcraDF8mn2LnY2670CtSQaPb8hzpZlFRTyn2ybfr522zkNRGuDtTUCQ3Kkf_OHo1ihIAY9DnHd_yuwaPNu2LgfdvoP5AeJ3bgNA5hYvy0G7z5lzjDtNzhWsaK8YhluLNo4gXGQw8bp5sAnBf1iaupKfNxCx2aB2I9qE9WqBfTn9u4a_9TpvTksVP10x70SoY2r4wy7ntU_JYWVYwmtcd5FCab8R26UPjjcJSHLVFuYld29XmTzi3LncM1R9CBbEfQGxlSeoqYhsJaFURgEldMyIjEJpg7ts6go5igaD3RrSm1Vn0JG3u_-QD2pehHViNdir8FvquD3b64tBWNlOaUwL-rmyl4Z2420eJhH5sP5DnTKIeuCikHFUE0RqlW9M3xzNRw_ShG4nn277-aQLVPnEkz64_2pdCpfDZ1NAtlMKOnFKlsVkGvPF464Tf73ZZZY2-Z-Vr3XYn_S5RjOS86am7NzOS34lcRsFnO0KklUUfp9OUOstniawlqvYiDdqnU1LFG_eV0V_7xoUw&state=Z0XkShIap0l0WnrQ
4.753 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYTJlNDc0YWUtOGJjMC00MWU4LTllNWItNzU0ZmIxZTE3Y2Q3Il0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2ODkzLCJpYXQiOjE1Mjk3NTMyOTMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImYwZmIxNjhjLTQ3NWQtNGI5NS04ZDhjLTZiNGE2MzJhYjk1ZSIsIm5vbmNlIjoiR0JXVWdFMVJNbkVSWE05QyIsInJhdCI6MTUyOTc1MzI5Miwic3ViIjoiZm9vQGJhci5jb20ifQ.T8dmx09S9lovB6NUac2TMOC4w1MThhzGTV8rp2NFeLwCX1rsGtYlRmpsMyYQIq_KfUcgaHRHvlLWRK9JCLfk3YOCW165c1-7zTB3rtjDjJIoghddLPW7nmC-p9-sg1WtLtFroa-oYQR5habXw8JMT1XczSUvcraDF8mn2LnY2670CtSQaPb8hzpZlFRTyn2ybfr522zkNRGuDtTUCQ3Kkf_OHo1ihIAY9DnHd_yuwaPNu2LgfdvoP5AeJ3bgNA5hYvy0G7z5lzjDtNzhWsaK8YhluLNo4gXGQw8bp5sAnBf1iaupKfNxCx2aB2I9qE9WqBfTn9u4a_9TpvTksVP10x70SoY2r4wy7ntU_JYWVYwmtcd5FCab8R26UPjjcJSHLVFuYld29XmTzi3LncM1R9CBbEfQGxlSeoqYhsJaFURgEldMyIjEJpg7ts6go5igaD3RrSm1Vn0JG3u_-QD2pehHViNdir8FvquD3b64tBWNlOaUwL-rmyl4Z2420eJhH5sP5DnTKIeuCikHFUE0RqlW9M3xzNRw_ShG4nn277-aQLVPnEkz64_2pdCpfDZ1NAtlMKOnFKlsVkGvPF464Tf73ZZZY2-Z-Vr3XYn_S5RjOS86am7NzOS34lcRsFnO0KklUUfp9OUOstniawlqvYiDdqnU1LFG_eV0V_7xoUw', 'state': 'Z0XkShIap0l0WnrQ'}
4.757 AuthorizationResponse {
"id_token": {
"aud": [
"a2e474ae-8bc0-41e8-9e5b-754fb1e17cd7"
],
"auth_time": 1529753285,
"exp": 1529756893,
"iat": 1529753293,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "f0fb168c-475d-4b95-8d8c-6b4a632ab95e",
"nonce": "GBWUgE1RMnERXM9C",
"rat": 1529753292,
"sub": "[email protected]"
},
"state": "Z0XkShIap0l0WnrQ"
}
4.757 phase <--<-- 6 --- AccessToken -->-->
4.757 phase <--<-- 7 --- Done -->-->
4.757 end
4.758 assertion VerifyResponse
4.758 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.758 assertion SameAuthn
4.758 condition same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
4.758 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Response-id_token.txt 0000644 0000000 0000000 00000020663 13313427176 015634 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Response-id_token
Test description: Request with response_type=id_token
Timestamp: 2018-06-23T11:26:54Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.078 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.079 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.08 phase <--<-- 2 --- Registration -->-->
0.08 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.08 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#1HfT3WM7iwIS5S3M"
],
"response_types": [
"id_token"
]
}
0.272 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.273 RegistrationResponse {
"client_id": "062adc82-0d5f-4a7e-af3b-f239387f6209",
"client_secret": "hVYH6i9bgIU0",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "062adc82-0d5f-4a7e-af3b-f239387f6209",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#1HfT3WM7iwIS5S3M"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.273 phase <--<-- 3 --- AsyncAuthn -->-->
0.274 AuthorizationRequest {
"client_id": "062adc82-0d5f-4a7e-af3b-f239387f6209",
"nonce": "1uxW1NUbuPLxErFI",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "3UyBEw51liIGjF9l"
}
0.274 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=062adc82-0d5f-4a7e-af3b-f239387f6209&state=3UyBEw51liIGjF9l&response_type=id_token&nonce=1uxW1NUbuPLxErFI
0.274 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=062adc82-0d5f-4a7e-af3b-f239387f6209&state=3UyBEw51liIGjF9l&response_type=id_token&nonce=1uxW1NUbuPLxErFI
6.102 http args {}
6.271 response URL with fragment
6.271 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMDYyYWRjODItMGQ1Zi00YTdlLWFmM2ItZjIzOTM4N2Y2MjA5Il0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODE0LCJpYXQiOjE1Mjk3NTMyMTQsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImVlODBlNTdmLWEzM2ItNGUyMC04NmM0LWExNDY5N2YyZjE0ZSIsIm5vbmNlIjoiMXV4VzFOVWJ1UEx4RXJGSSIsInJhdCI6MTUyOTc1MzIwOCwic3ViIjoiZm9vQGJhci5jb20ifQ.d8CjDLh3clByWP2_DeLh9Y07Q50FfpCPVfOJhbQ1NrSzLBkD7nByy940DuFI4mZn5_OHJ5G3ADeefohL6hZoH2nHOiUFnwWcItt-w4WSf3vtoz937R0ZTPfrxbOr7W4_2j7zaTL_lrNE9MQgK6oe86DaIjLq-2Qj4IpqDTltHowJgTmtbQavtvO2_QjufoKSw35mi6xQt3TEHU6pabDtIg5X1b3GWdCkeJRPUdxXmyQdDcyVLyiaI_DWmGymteujIbRPc9GxW2mbiPLmL14SPZhynJHMYk3lqwg14SFEtoko6uKLX9Qeu6m4MmBeUOCna5O3U0ZrtybqmI4k_d4XF-QAE3dT0HM78N1-wiAP2s9kHnSMzkq-Uz_otddFa7xKEf7xpS_uKp6u4IdOZ4uGdU2frqsWoe9qTmdGmclIPC6sYNCpNOrY618v_alV3pyUi_i6jp-LMQYwtbrFfkkqajJX7lueZgYnbuMwd-XsBCjwE2IsZgD1XofzGltFyJYfKA8R53vVF8FOMqAWkNVZpyAFMD6DMKLaMje783bQo0ZV0pkaNC_Dd95Czbd8HLEGA3WKDt1PnZ4rEoKbpcE31sny2kkzzXiDfxuiThqMaSKCon5miRFNtCLFjzGlkIv7J1N0xVdxjPeLCdUuwcpzVlEWr4aiG7YgEzgYg3_2Q_0&state=3UyBEw51liIGjF9l
6.271 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMDYyYWRjODItMGQ1Zi00YTdlLWFmM2ItZjIzOTM4N2Y2MjA5Il0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODE0LCJpYXQiOjE1Mjk3NTMyMTQsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImVlODBlNTdmLWEzM2ItNGUyMC04NmM0LWExNDY5N2YyZjE0ZSIsIm5vbmNlIjoiMXV4VzFOVWJ1UEx4RXJGSSIsInJhdCI6MTUyOTc1MzIwOCwic3ViIjoiZm9vQGJhci5jb20ifQ.d8CjDLh3clByWP2_DeLh9Y07Q50FfpCPVfOJhbQ1NrSzLBkD7nByy940DuFI4mZn5_OHJ5G3ADeefohL6hZoH2nHOiUFnwWcItt-w4WSf3vtoz937R0ZTPfrxbOr7W4_2j7zaTL_lrNE9MQgK6oe86DaIjLq-2Qj4IpqDTltHowJgTmtbQavtvO2_QjufoKSw35mi6xQt3TEHU6pabDtIg5X1b3GWdCkeJRPUdxXmyQdDcyVLyiaI_DWmGymteujIbRPc9GxW2mbiPLmL14SPZhynJHMYk3lqwg14SFEtoko6uKLX9Qeu6m4MmBeUOCna5O3U0ZrtybqmI4k_d4XF-QAE3dT0HM78N1-wiAP2s9kHnSMzkq-Uz_otddFa7xKEf7xpS_uKp6u4IdOZ4uGdU2frqsWoe9qTmdGmclIPC6sYNCpNOrY618v_alV3pyUi_i6jp-LMQYwtbrFfkkqajJX7lueZgYnbuMwd-XsBCjwE2IsZgD1XofzGltFyJYfKA8R53vVF8FOMqAWkNVZpyAFMD6DMKLaMje783bQo0ZV0pkaNC_Dd95Czbd8HLEGA3WKDt1PnZ4rEoKbpcE31sny2kkzzXiDfxuiThqMaSKCon5miRFNtCLFjzGlkIv7J1N0xVdxjPeLCdUuwcpzVlEWr4aiG7YgEzgYg3_2Q_0', 'state': '3UyBEw51liIGjF9l'}
6.389 AuthorizationResponse {
"id_token": {
"aud": [
"062adc82-0d5f-4a7e-af3b-f239387f6209"
],
"auth_time": 1529753136,
"exp": 1529756814,
"iat": 1529753214,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "ee80e57f-a33b-4e20-86c4-a14697f2f14e",
"nonce": "1uxW1NUbuPLxErFI",
"rat": 1529753208,
"sub": "[email protected]"
},
"state": "3UyBEw51liIGjF9l"
}
6.389 phase <--<-- 4 --- Done -->-->
6.389 end
6.39 assertion VerifyAuthnResponse
6.39 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
6.39 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Req-max_age=1.txt 0000644 0000000 0000000 00000041700 13313427511 014534 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-max_age=1
Test description: Requesting ID Token with max_age=1 seconds restriction
Timestamp: 2018-06-23T11:30:17Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.001 phase <--<-- 1 --- Discovery -->-->
0.001 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.12 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.121 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.121 phase <--<-- 2 --- Registration -->-->
0.121 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.121 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#S2gOoy6mf2fC6SHg"
],
"response_types": [
"id_token"
]
}
0.276 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.277 RegistrationResponse {
"client_id": "b3df4c71-3898-42cd-9591-1acd47a57e54",
"client_secret": "OkwvzZtu0GNq",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "b3df4c71-3898-42cd-9591-1acd47a57e54",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#S2gOoy6mf2fC6SHg"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.277 phase <--<-- 3 --- AsyncAuthn -->-->
0.278 AuthorizationRequest {
"client_id": "b3df4c71-3898-42cd-9591-1acd47a57e54",
"nonce": "IhUEFjk0V16sWpmL",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "BUH8pXRZrbAsEcpt"
}
0.278 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=b3df4c71-3898-42cd-9591-1acd47a57e54&state=BUH8pXRZrbAsEcpt&response_type=id_token&nonce=IhUEFjk0V16sWpmL
0.278 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=b3df4c71-3898-42cd-9591-1acd47a57e54&state=BUH8pXRZrbAsEcpt&response_type=id_token&nonce=IhUEFjk0V16sWpmL
2.59 http args {}
2.758 response URL with fragment
2.759 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYjNkZjRjNzEtMzg5OC00MmNkLTk1OTEtMWFjZDQ3YTU3ZTU0Il0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU3MDA5LCJpYXQiOjE1Mjk3NTM0MDksImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImJjZTNkYTVjLWVjNjQtNGFjOS1iNDlmLTRmNmYwNDA1OTQyMiIsIm5vbmNlIjoiSWhVRUZqazBWMTZzV3BtTCIsInJhdCI6MTUyOTc1MzQwNywic3ViIjoiZm9vQGJhci5jb20ifQ.QE_01o9ppxIlsbc4nSljqMaWfsTlKE9J6UfYZEKnVBvdP2t3CZ-2LWHA2R5jmJTKRytClqAWWrljco4dg-qtltHMka6koLgNnoS4ADMjnL_5n-X-3MSvyS-qEakSJIG734ZkU_lZn9Ap6WQnbHStF1HTYqsdGXO59EufwJDgq1U40yUn61lQgx_A9_0Cys_7ofNDoOwmXEXGsGujql3_qZpwtwsz0WEZJ1spwPat9Rnd0LJPDCV1SdWgy0XT3ZIed4sKpiikLy2d3f5bDfPqu6HexT73dKcQofjNPHVWkBkQYJtO2283Upr8bksaj0UIep8YydNNYYtdGWKr0fPT1cpQGBcgthO_H_SeM0Dj_CklTvp1gQyxt8FzBMzKwdowg34pXZ-rEm8oBfMcDn29q1httDOp3npwPcHmEBN0pClUgVkH6LM_VgzGlaIJAEKeK_-18RvrDBvOms6jPYoUHljB7ydJJEz4WnowZ4Q9PFAIQJ1PMqvrj8fdsW3ESbKymWRPeIJXO0ZQKr_ydos5zqYvMQXZTIqRFy4og5lTLI76fDALhFpcpiL2_IgpzUSgrD1dcMzUSDRGVtNrkN28uKFREPjpvD1gk6B7PQBv_4rFqXBpkfSwpBaxqA5oUlEdVCmDOkaAf-9VgeEiBqg3r_sQw09kiwAT3FUFVvqC7nk&state=BUH8pXRZrbAsEcpt
2.759 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYjNkZjRjNzEtMzg5OC00MmNkLTk1OTEtMWFjZDQ3YTU3ZTU0Il0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU3MDA5LCJpYXQiOjE1Mjk3NTM0MDksImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImJjZTNkYTVjLWVjNjQtNGFjOS1iNDlmLTRmNmYwNDA1OTQyMiIsIm5vbmNlIjoiSWhVRUZqazBWMTZzV3BtTCIsInJhdCI6MTUyOTc1MzQwNywic3ViIjoiZm9vQGJhci5jb20ifQ.QE_01o9ppxIlsbc4nSljqMaWfsTlKE9J6UfYZEKnVBvdP2t3CZ-2LWHA2R5jmJTKRytClqAWWrljco4dg-qtltHMka6koLgNnoS4ADMjnL_5n-X-3MSvyS-qEakSJIG734ZkU_lZn9Ap6WQnbHStF1HTYqsdGXO59EufwJDgq1U40yUn61lQgx_A9_0Cys_7ofNDoOwmXEXGsGujql3_qZpwtwsz0WEZJ1spwPat9Rnd0LJPDCV1SdWgy0XT3ZIed4sKpiikLy2d3f5bDfPqu6HexT73dKcQofjNPHVWkBkQYJtO2283Upr8bksaj0UIep8YydNNYYtdGWKr0fPT1cpQGBcgthO_H_SeM0Dj_CklTvp1gQyxt8FzBMzKwdowg34pXZ-rEm8oBfMcDn29q1httDOp3npwPcHmEBN0pClUgVkH6LM_VgzGlaIJAEKeK_-18RvrDBvOms6jPYoUHljB7ydJJEz4WnowZ4Q9PFAIQJ1PMqvrj8fdsW3ESbKymWRPeIJXO0ZQKr_ydos5zqYvMQXZTIqRFy4og5lTLI76fDALhFpcpiL2_IgpzUSgrD1dcMzUSDRGVtNrkN28uKFREPjpvD1gk6B7PQBv_4rFqXBpkfSwpBaxqA5oUlEdVCmDOkaAf-9VgeEiBqg3r_sQw09kiwAT3FUFVvqC7nk', 'state': 'BUH8pXRZrbAsEcpt'}
2.84 AuthorizationResponse {
"id_token": {
"aud": [
"b3df4c71-3898-42cd-9591-1acd47a57e54"
],
"auth_time": 1529753285,
"exp": 1529757009,
"iat": 1529753409,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "bce3da5c-ec64-4ac9-b49f-4f6f04059422",
"nonce": "IhUEFjk0V16sWpmL",
"rat": 1529753407,
"sub": "[email protected]"
},
"state": "BUH8pXRZrbAsEcpt"
}
2.84 phase <--<-- 4 --- AccessToken -->-->
2.841 phase <--<-- 5 --- Note -->-->
4.15 phase <--<-- 6 --- Webfinger -->-->
4.15 not expected to do WebFinger
4.15 phase <--<-- 7 --- Discovery -->-->
4.15 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
4.456 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
4.457 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
4.457 phase <--<-- 8 --- Registration -->-->
4.457 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
4.458 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#ADtymy9NTcvprsd4"
],
"response_types": [
"id_token"
]
}
4.622 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
4.623 RegistrationResponse {
"client_id": "77bafc37-7c29-436e-979e-a24cacf4befb",
"client_secret": "S_-XXC0uCccT",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "77bafc37-7c29-436e-979e-a24cacf4befb",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#ADtymy9NTcvprsd4"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
4.623 phase <--<-- 9 --- AsyncAuthn -->-->
4.623 AuthorizationRequest {
"client_id": "77bafc37-7c29-436e-979e-a24cacf4befb",
"max_age": 1,
"nonce": "DPMogWlNSUuo5G4Y",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "72KCwf0G4nmJ71tU"
}
4.624 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?max_age=1&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=77bafc37-7c29-436e-979e-a24cacf4befb&state=72KCwf0G4nmJ71tU&response_type=id_token&nonce=DPMogWlNSUuo5G4Y
4.624 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?max_age=1&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=77bafc37-7c29-436e-979e-a24cacf4befb&state=72KCwf0G4nmJ71tU&response_type=id_token&nonce=DPMogWlNSUuo5G4Y
10.594 http args {}
10.762 response URL with fragment
10.763 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNzdiYWZjMzctN2MyOS00MzZlLTk3OWUtYTI0Y2FjZjRiZWZiIl0sImF1dGhfdGltZSI6MTUyOTc1MzQxNCwiZXhwIjoxNTI5NzU3MDE3LCJpYXQiOjE1Mjk3NTM0MTcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjJhYzE4MzRkLTVlYjYtNDZlYS1iNGI1LWViNmY2MDUwZTIzZCIsIm5vbmNlIjoiRFBNb2dXbE5TVXVvNUc0WSIsInJhdCI6MTUyOTc1MzQxMSwic3ViIjoiZm9vQGJhci5jb20ifQ.tQNjX7uYZS7gt9x592Eh7bcxFStEEjuS2Iv-yEzKY0q0gYq35WctblHkO1R5Od0XMWvje9O7gR9mzVsdQUjSoa-BBf-hmKj6FyZvAJoGBhwXbcU1fCCAFEQ3Qxha93-G4PGUDe6GR-XiKWfc5ruW78eeFLVBAaSyBha13kHOx-8bN73sKA9Myv_klLaH0cZIf7dAbRJjz4ZvVocY9v_1cFg1hr_m3TDRm4pKO3logiS3gIkhcMq6Wclc7ZEik-E8HVsOJz8y2qZRKkg2IDr9PYTvn2ttl35GFtSWYiCm2XLuI6uMqpxrCkMSkgEI7Q8ACtcxUHK-IZdZWyhgGfjzQHVuoARaIPW3DWnuHkfWFgFC_I-oj3jHnfjpiMmAgQMWDPNrRLUu69ngn07MzIiQeiNVBWVkdMom9Hv5ZmF12HYy_9DH7vyZ0SU-gsjUeP6yB0IcO7q8gz8CEtRUwPjqURFjWcW8xRqCEhjRsQ3SgAIM7j8_L5DttkQo-kVYugg-8onyEfLxuN3GVuAcZ5QPLT10G7k1Wfyuk_jKUAtwAZe12EjE7r3jcTGgd0Ge1AJXHJ8UIM87MbAiaNUrFrNR8ku0p9tr65bB08Glnj1qSDDYJK9lbsmDnbYv0AAzFtNfu5ruFJmmxoNSA0cYRP3UUSkHoaW_86kc2DaMqp4PRf8&state=72KCwf0G4nmJ71tU
10.763 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNzdiYWZjMzctN2MyOS00MzZlLTk3OWUtYTI0Y2FjZjRiZWZiIl0sImF1dGhfdGltZSI6MTUyOTc1MzQxNCwiZXhwIjoxNTI5NzU3MDE3LCJpYXQiOjE1Mjk3NTM0MTcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjJhYzE4MzRkLTVlYjYtNDZlYS1iNGI1LWViNmY2MDUwZTIzZCIsIm5vbmNlIjoiRFBNb2dXbE5TVXVvNUc0WSIsInJhdCI6MTUyOTc1MzQxMSwic3ViIjoiZm9vQGJhci5jb20ifQ.tQNjX7uYZS7gt9x592Eh7bcxFStEEjuS2Iv-yEzKY0q0gYq35WctblHkO1R5Od0XMWvje9O7gR9mzVsdQUjSoa-BBf-hmKj6FyZvAJoGBhwXbcU1fCCAFEQ3Qxha93-G4PGUDe6GR-XiKWfc5ruW78eeFLVBAaSyBha13kHOx-8bN73sKA9Myv_klLaH0cZIf7dAbRJjz4ZvVocY9v_1cFg1hr_m3TDRm4pKO3logiS3gIkhcMq6Wclc7ZEik-E8HVsOJz8y2qZRKkg2IDr9PYTvn2ttl35GFtSWYiCm2XLuI6uMqpxrCkMSkgEI7Q8ACtcxUHK-IZdZWyhgGfjzQHVuoARaIPW3DWnuHkfWFgFC_I-oj3jHnfjpiMmAgQMWDPNrRLUu69ngn07MzIiQeiNVBWVkdMom9Hv5ZmF12HYy_9DH7vyZ0SU-gsjUeP6yB0IcO7q8gz8CEtRUwPjqURFjWcW8xRqCEhjRsQ3SgAIM7j8_L5DttkQo-kVYugg-8onyEfLxuN3GVuAcZ5QPLT10G7k1Wfyuk_jKUAtwAZe12EjE7r3jcTGgd0Ge1AJXHJ8UIM87MbAiaNUrFrNR8ku0p9tr65bB08Glnj1qSDDYJK9lbsmDnbYv0AAzFtNfu5ruFJmmxoNSA0cYRP3UUSkHoaW_86kc2DaMqp4PRf8', 'state': '72KCwf0G4nmJ71tU'}
10.766 AuthorizationResponse {
"id_token": {
"aud": [
"77bafc37-7c29-436e-979e-a24cacf4befb"
],
"auth_time": 1529753414,
"exp": 1529757017,
"iat": 1529753417,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "2ac1834d-5eb6-46ea-b4b5-eb6f6050e23d",
"nonce": "DPMogWlNSUuo5G4Y",
"rat": 1529753411,
"sub": "[email protected]"
},
"state": "72KCwf0G4nmJ71tU"
}
10.767 phase <--<-- 10 --- AccessToken -->-->
10.767 phase <--<-- 11 --- Done -->-->
10.767 end
10.767 assertion AuthTimeCheck
10.767 condition auth_time-check: status=OK [Check that the auth_time returned in the ID Token is in the expected range.]
10.768 assertion VerifyResponse
10.768 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
10.768 assertion ClaimsCheck
10.768 condition claims-check: status=OK [Checks if specific claims is present or not]
10.769 assertion MultipleSignOn
10.769 condition multiple-sign-on: status=OK [Verifies that multiple authentications was used in the flow]
10.769 condition Done: status=OK
============================================================
Conditions
auth_time-check: status=OK [Check that the auth_time returned in the ID Token is in the expected range.]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
claims-check: status=OK [Checks if specific claims is present or not]
multiple-sign-on: status=OK [Verifies that multiple authentications was used in the flow]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Registration-Dynamic.txt 0000644 0000000 0000000 00000011445 13313427204 016266 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-Dynamic
Test description: Client registration request
Timestamp: 2018-06-23T11:27:00Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.088 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.09 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.09 phase <--<-- 2 --- Registration -->-->
0.09 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.09 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#zbrFNxSPgMX1iqWC"
],
"response_types": [
"id_token"
]
}
0.249 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.249 RegistrationResponse {
"client_id": "26e6c86b-2453-4819-a7a1-a3449436b059",
"client_secret": "Fci0YbLUz0aE",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "26e6c86b-2453-4819-a7a1-a3449436b059",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#zbrFNxSPgMX1iqWC"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.25 phase <--<-- 3 --- Done -->-->
0.25 end
0.25 assertion CheckHTTPResponse
0.25 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.25 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
Done: status=OK
============================================================
RESULT: PASSED
./OP-display-page.txt 0000644 0000000 0000000 00000021015 13313427255 014611 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-display-page
Test description: Request with display=page
Timestamp: 2018-06-23T11:27:41Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.074 phase <--<-- 1 --- Webfinger -->-->
1.074 not expected to do WebFinger
1.074 phase <--<-- 2 --- Discovery -->-->
1.074 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.149 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.151 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.151 phase <--<-- 3 --- Registration -->-->
1.151 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.151 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#RXtzDHWjjugMGHTA"
],
"response_types": [
"id_token"
]
}
1.312 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.313 RegistrationResponse {
"client_id": "51097748-f027-4017-ba45-8588829e7ca7",
"client_secret": "UHnJJ3Vrt_Xu",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "51097748-f027-4017-ba45-8588829e7ca7",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#RXtzDHWjjugMGHTA"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.313 phase <--<-- 4 --- AsyncAuthn -->-->
1.313 AuthorizationRequest {
"client_id": "51097748-f027-4017-ba45-8588829e7ca7",
"display": "page",
"nonce": "KM3S5sJIjy40ELre",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "DYFCxtUg8DrY6mEX"
}
1.314 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=51097748-f027-4017-ba45-8588829e7ca7&state=DYFCxtUg8DrY6mEX&response_type=id_token&nonce=KM3S5sJIjy40ELre&display=page
1.314 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=51097748-f027-4017-ba45-8588829e7ca7&state=DYFCxtUg8DrY6mEX&response_type=id_token&nonce=KM3S5sJIjy40ELre&display=page
3.823 http args {}
4.034 response URL with fragment
4.034 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNTEwOTc3NDgtZjAyNy00MDE3LWJhNDUtODU4ODgyOWU3Y2E3Il0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODYwLCJpYXQiOjE1Mjk3NTMyNjAsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImE4NGM3ZDMyLTc5OWEtNGY2Yi05Njc1LTk0NDI4ZDU3YjRlNyIsIm5vbmNlIjoiS00zUzVzSklqeTQwRUxyZSIsInJhdCI6MTUyOTc1MzI1OCwic3ViIjoiZm9vQGJhci5jb20ifQ.NJI8zemvoiv4g3MQYVMzuepf01mLS9zJCxzXP4tO_37RngslRK-RIx-D6-PqKhW1-VIza7PvqNKfSp7rm39ChNayqc9KYKGBEhFKtzn4PqJgqRiMZ3M6_THXx3p-O5f_yvugXL1uKT5zkRWuC4fioTCqnW-ktlXU7RYhf8DxH8i-FleO1f41qiMKS3Jecc07-SKBP9GWaGyiOHOZLuGgdAbuy2MzTLmUOaU_MZTqn0v2QZNtSh3xarZ9bpAnekh-Mhb2jxspBrFggds6XA5ARsG8u-FEfY0-_yWCfHTA0hTd_Gpuo444hlLfK2brQiRNFmaWMNZmHU8CciagR7cbObFY7Vk1A7j1OIC2G_vcmayRI0SRVX2YMV6gOK2K2XntWhAUVqbgb59MzGpI6krhYtPKEyXKUBj9H7OxousUGcRLWJg5Tixf9AWBaKAHKvJImlSfi64icK0qeKALDFBFWS8IaepnYSo073lNtE2oY9jsYYyNmmmHg6sUi97R1BGu2yyarpf5q97Gc7BM_j1XpJbvrvLk-q-XBAkxKIB02izIOe-mtih0w2lTB5RiYB4pzR6xoonlyedQNBL2Qkg6KWrQRdjxu-M5qr87B5ZD0DTwR8ufXhUDltwwyCWTD5WlSkJwyTUUyamj-Mv4cgQM0YgdZCmVvkCvGu0SEWe2yK4&state=DYFCxtUg8DrY6mEX
4.034 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNTEwOTc3NDgtZjAyNy00MDE3LWJhNDUtODU4ODgyOWU3Y2E3Il0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODYwLCJpYXQiOjE1Mjk3NTMyNjAsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImE4NGM3ZDMyLTc5OWEtNGY2Yi05Njc1LTk0NDI4ZDU3YjRlNyIsIm5vbmNlIjoiS00zUzVzSklqeTQwRUxyZSIsInJhdCI6MTUyOTc1MzI1OCwic3ViIjoiZm9vQGJhci5jb20ifQ.NJI8zemvoiv4g3MQYVMzuepf01mLS9zJCxzXP4tO_37RngslRK-RIx-D6-PqKhW1-VIza7PvqNKfSp7rm39ChNayqc9KYKGBEhFKtzn4PqJgqRiMZ3M6_THXx3p-O5f_yvugXL1uKT5zkRWuC4fioTCqnW-ktlXU7RYhf8DxH8i-FleO1f41qiMKS3Jecc07-SKBP9GWaGyiOHOZLuGgdAbuy2MzTLmUOaU_MZTqn0v2QZNtSh3xarZ9bpAnekh-Mhb2jxspBrFggds6XA5ARsG8u-FEfY0-_yWCfHTA0hTd_Gpuo444hlLfK2brQiRNFmaWMNZmHU8CciagR7cbObFY7Vk1A7j1OIC2G_vcmayRI0SRVX2YMV6gOK2K2XntWhAUVqbgb59MzGpI6krhYtPKEyXKUBj9H7OxousUGcRLWJg5Tixf9AWBaKAHKvJImlSfi64icK0qeKALDFBFWS8IaepnYSo073lNtE2oY9jsYYyNmmmHg6sUi97R1BGu2yyarpf5q97Gc7BM_j1XpJbvrvLk-q-XBAkxKIB02izIOe-mtih0w2lTB5RiYB4pzR6xoonlyedQNBL2Qkg6KWrQRdjxu-M5qr87B5ZD0DTwR8ufXhUDltwwyCWTD5WlSkJwyTUUyamj-Mv4cgQM0YgdZCmVvkCvGu0SEWe2yK4', 'state': 'DYFCxtUg8DrY6mEX'}
4.126 AuthorizationResponse {
"id_token": {
"aud": [
"51097748-f027-4017-ba45-8588829e7ca7"
],
"auth_time": 1529753136,
"exp": 1529756860,
"iat": 1529753260,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "a84c7d32-799a-4f6b-9675-94428d57b4e7",
"nonce": "KM3S5sJIjy40ELre",
"rat": 1529753258,
"sub": "[email protected]"
},
"state": "DYFCxtUg8DrY6mEX"
}
4.126 phase <--<-- 5 --- Done -->-->
4.126 end
4.127 assertion VerifyResponse
4.127 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.127 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Registration-Endpoint.txt 0000644 0000000 0000000 00000005207 13313427205 016462 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-Endpoint
Test description: Verify that registration_endpoint is published
Timestamp: 2018-06-23T11:27:01Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.075 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.076 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.076 phase <--<-- 2 --- Done -->-->
0.076 end
0.076 assertion VerifyOPHasRegistrationEndpoint
0.076 condition verify-op-has-registration-endpoint: status=OK [Verify that the OP has a registration endpoint]
0.076 condition Done: status=OK
============================================================
Conditions
verify-op-has-registration-endpoint: status=OK [Verify that the OP has a registration endpoint]
Done: status=OK
============================================================
RESULT: PASSED
./OP-IDToken-C-Signature.txt 0000644 0000000 0000000 00000021245 13313427233 015647 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-IDToken-C-Signature
Test description: Does the OP sign the ID Token and with what
Timestamp: 2018-06-23T11:27:23Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Registration -->-->
0.074 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.074 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#7TZRzTkxBMg2El4J"
],
"response_types": [
"id_token"
]
}
0.276 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.277 RegistrationResponse {
"client_id": "080a936c-3a62-468a-aed3-f9d63363e1b5",
"client_secret": "UTAoHi0M7sid",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "080a936c-3a62-468a-aed3-f9d63363e1b5",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#7TZRzTkxBMg2El4J"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.277 phase <--<-- 3 --- AsyncAuthn -->-->
0.278 AuthorizationRequest {
"client_id": "080a936c-3a62-468a-aed3-f9d63363e1b5",
"nonce": "zJDpC75FiJnuuzNN",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "Z90VwTNosGIB7lR3"
}
0.278 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=080a936c-3a62-468a-aed3-f9d63363e1b5&state=Z90VwTNosGIB7lR3&response_type=id_token&nonce=zJDpC75FiJnuuzNN
0.278 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=080a936c-3a62-468a-aed3-f9d63363e1b5&state=Z90VwTNosGIB7lR3&response_type=id_token&nonce=zJDpC75FiJnuuzNN
2.346 http args {}
2.53 response URL with fragment
2.531 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMDgwYTkzNmMtM2E2Mi00NjhhLWFlZDMtZjlkNjMzNjNlMWI1Il0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODQzLCJpYXQiOjE1Mjk3NTMyNDMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjRlMzM1OThlLTIyYWItNGVhNy1hNjBiLTE0NDg2NGYxNTlkMyIsIm5vbmNlIjoiekpEcEM3NUZpSm51dXpOTiIsInJhdCI6MTUyOTc1MzI0MSwic3ViIjoiZm9vQGJhci5jb20ifQ.FRxNNp-QtcKEjGjN2NonWPcfPsl5Zm-n31VqfcG0HKrcVXSg32MW_bVoepXryvp5F-nv_eCMuVz7qJ4NC7dlgF01BODczk-X8P1J3C-GZh0mee-TqqwjkfwWiiffiiEw-zTTzsXbr0oLMNw_RFLW1KqJtLaofWC9dhqWmUmaPKSO4bV5DyNACSoY89EWYmOS17XE6axSx2tufsCJPSwjPIPsZ2dMV6LXeJHb_05d_E8fTMnqMJ9rL2wNwRwfgf4aYRjuyhg3sjN61DXERi0PSfeUFxQa08SvC8yv15FxUMWxjpDVvvWM_rV7ybxTUOgaSQ44qzZ-HkvSc4P4VT35mzPwHuZtc2NtF6e6Vvf2dEFlPvSJ_-LJGyWdEYukYj0cvhItG54e__na1pYI6drmhzj5BYbvvKVYqJ0RCuqaCOllRSU1QsOKaqZcTC17LgdGQK3zwqBmKRRizeablvo4bNlTNOsQNbEAVC0hStdemsbFu1yldorBq2LCpSSe_ZAou9B3jbLmMTDyf1h0fJnUHTwT90l0NGWa4EoRdk-DLgJiIBs8ym6dQAOPGwiCB-cAMWZ9_jod1G89SvnhhqRofCBGeaSWGmIbTMBZgEVRYvSbqgzy8dG1J91ySjkOb2pmV34ZCQUyo3dC63miKcdpoD0vj5ND62adoyCFI5XXm5E&state=Z90VwTNosGIB7lR3
2.531 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMDgwYTkzNmMtM2E2Mi00NjhhLWFlZDMtZjlkNjMzNjNlMWI1Il0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODQzLCJpYXQiOjE1Mjk3NTMyNDMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjRlMzM1OThlLTIyYWItNGVhNy1hNjBiLTE0NDg2NGYxNTlkMyIsIm5vbmNlIjoiekpEcEM3NUZpSm51dXpOTiIsInJhdCI6MTUyOTc1MzI0MSwic3ViIjoiZm9vQGJhci5jb20ifQ.FRxNNp-QtcKEjGjN2NonWPcfPsl5Zm-n31VqfcG0HKrcVXSg32MW_bVoepXryvp5F-nv_eCMuVz7qJ4NC7dlgF01BODczk-X8P1J3C-GZh0mee-TqqwjkfwWiiffiiEw-zTTzsXbr0oLMNw_RFLW1KqJtLaofWC9dhqWmUmaPKSO4bV5DyNACSoY89EWYmOS17XE6axSx2tufsCJPSwjPIPsZ2dMV6LXeJHb_05d_E8fTMnqMJ9rL2wNwRwfgf4aYRjuyhg3sjN61DXERi0PSfeUFxQa08SvC8yv15FxUMWxjpDVvvWM_rV7ybxTUOgaSQ44qzZ-HkvSc4P4VT35mzPwHuZtc2NtF6e6Vvf2dEFlPvSJ_-LJGyWdEYukYj0cvhItG54e__na1pYI6drmhzj5BYbvvKVYqJ0RCuqaCOllRSU1QsOKaqZcTC17LgdGQK3zwqBmKRRizeablvo4bNlTNOsQNbEAVC0hStdemsbFu1yldorBq2LCpSSe_ZAou9B3jbLmMTDyf1h0fJnUHTwT90l0NGWa4EoRdk-DLgJiIBs8ym6dQAOPGwiCB-cAMWZ9_jod1G89SvnhhqRofCBGeaSWGmIbTMBZgEVRYvSbqgzy8dG1J91ySjkOb2pmV34ZCQUyo3dC63miKcdpoD0vj5ND62adoyCFI5XXm5E', 'state': 'Z90VwTNosGIB7lR3'}
2.611 AuthorizationResponse {
"id_token": {
"aud": [
"080a936c-3a62-468a-aed3-f9d63363e1b5"
],
"auth_time": 1529753136,
"exp": 1529756843,
"iat": 1529753243,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "4e33598e-22ab-4ea7-a60b-144864f159d3",
"nonce": "zJDpC75FiJnuuzNN",
"rat": 1529753241,
"sub": "[email protected]"
},
"state": "Z90VwTNosGIB7lR3"
}
2.612 phase <--<-- 4 --- AccessToken -->-->
2.612 phase <--<-- 5 --- Done -->-->
2.612 end
2.612 assertion VerifyResponse
2.612 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.613 assertion IsIDTokenSigned
2.613 condition is-idtoken-signed: status=OK [Checks if the id_token is signed]
2.613 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
is-idtoken-signed: status=OK [Checks if the id_token is signed]
Done: status=OK
============================================================
RESULT: PASSED
|
|
hydra/internal/certification/IT.F.T.T.s.tar | ./OP-Req-login_hint.txt 0000644 0000000 0000000 00000022373 13313427047 015120 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-login_hint
Test description: Providing login_hint
Timestamp: 2018-06-23T11:25:27Z
============================================================
Trace output
0.0 phase <--<-- 0 --- VerifyConfiguration -->-->
0.0 phase <--<-- 1 --- Note -->-->
1.651 phase <--<-- 2 --- Webfinger -->-->
1.651 not expected to do WebFinger
1.652 phase <--<-- 3 --- Discovery -->-->
1.652 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.78 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.782 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.782 phase <--<-- 4 --- Registration -->-->
1.782 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.782 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#6NcqaSRObMd84U0m"
],
"response_types": [
"id_token token"
]
}
1.943 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.944 RegistrationResponse {
"client_id": "4c65997e-b17a-41e4-a91a-48171f6ce4d2",
"client_secret": "HzLxUDDrQKC9",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "4c65997e-b17a-41e4-a91a-48171f6ce4d2",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#6NcqaSRObMd84U0m"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.944 phase <--<-- 5 --- AsyncAuthn -->-->
1.945 AuthorizationRequest {
"client_id": "4c65997e-b17a-41e4-a91a-48171f6ce4d2",
"login_hint": "[email protected]",
"nonce": "LrWXtgCkFiOPUeME",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token token",
"scope": "openid",
"state": "wFPFoFc9dgXpE24d"
}
1.945 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=4c65997e-b17a-41e4-a91a-48171f6ce4d2&state=wFPFoFc9dgXpE24d&response_type=id_token+token&nonce=LrWXtgCkFiOPUeME&login_hint=foo%40bar.com
1.945 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=4c65997e-b17a-41e4-a91a-48171f6ce4d2&state=wFPFoFc9dgXpE24d&response_type=id_token+token&nonce=LrWXtgCkFiOPUeME&login_hint=foo%40bar.com
4.884 http args {}
5.054 response URL with fragment
5.055 response access_token=lsN3qaAXbnIl7Dq2YkN5GX-4ucb6OhEQbVQGVo2s8Fg.0zYKViA-lBa96qDqzrHUE8EgBRqYyj_FrWoAW1T759w&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiYmo5MVZzTnFJNEo0Wk9rQk1OLVVCZyIsImF1ZCI6WyI0YzY1OTk3ZS1iMTdhLTQxZTQtYTkxYS00ODE3MWY2Y2U0ZDIiXSwiYXV0aF90aW1lIjoxNTI5NzUzMDA5LCJleHAiOjE1Mjk3NTY3MjYsImlhdCI6MTUyOTc1MzEyNiwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiYjgxMGJmM2ItNjhhMi00NWQ4LTkxNjUtMzY4N2FkZjE1ZjY5Iiwibm9uY2UiOiJMcldYdGdDa0ZpT1BVZU1FIiwicmF0IjoxNTI5NzUzMTI0LCJzdWIiOiJmb29AYmFyLmNvbSJ9.vZlm91ZR4quxwH3199e4ffcfiOUJJ8I6zU_6J4aRc-_wtZm7LNGLJTG5oHHNVqP80hBJr5Sg2SOa1EQw9uOy3enJXEjB85SeBQls7EeeatLdpqIPaeBDdb5qZ79kdt2DKfzPptGfYPcsZl-RxZerrCgLnUcDtFfls_nRm0Y0prqwz06vcd5gaWUcJ0NdPhdjsWOIIJlZh7ud926d-yyUmXOqZjVhoRZnlHJIweyGqg6CqA8kWSDQiKFxP9Ym9rNOOI0pJD-rajn7LIPCC1kiNT61qnejJOXeJgzZMvWosKniw8gSFoMofQCHogqVFwTtLEsJKXkdRfR5kvZSEIXqjad2WB3Db6Vj2uJSspSsPz8PYfjc3LD4ZHpKy2nESey119AjuSLkOxWcb36rVyDJKFxakIc1JuAZr82TTy0I0E8YUAFZ4WWYnQryepj_KnwFHEtQSlimO-bZVpMsJWJQOcGKl-qq_Dj_-JoZhBng6ABc7IHTFK4QI4RTn7ourDxrFSRM1fGJ2bgehUD5vjdsmKBjGYykxZ63GWAM6As5WbbHhwVTzUDeXEaMpMeH077yMagV5g8zNw90woY4jJqgMKUm1fV_dsYY5izHt7fUEdTK4124ImZqRzBTZWUYMfgBfZqzimfBV61n8wvYyCfZ4661_7tW8on6JYJiegpwhyM&scope=openid&state=wFPFoFc9dgXpE24d&token_type=bearer
5.055 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiYmo5MVZzTnFJNEo0Wk9rQk1OLVVCZyIsImF1ZCI6WyI0YzY1OTk3ZS1iMTdhLTQxZTQtYTkxYS00ODE3MWY2Y2U0ZDIiXSwiYXV0aF90aW1lIjoxNTI5NzUzMDA5LCJleHAiOjE1Mjk3NTY3MjYsImlhdCI6MTUyOTc1MzEyNiwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiYjgxMGJmM2ItNjhhMi00NWQ4LTkxNjUtMzY4N2FkZjE1ZjY5Iiwibm9uY2UiOiJMcldYdGdDa0ZpT1BVZU1FIiwicmF0IjoxNTI5NzUzMTI0LCJzdWIiOiJmb29AYmFyLmNvbSJ9.vZlm91ZR4quxwH3199e4ffcfiOUJJ8I6zU_6J4aRc-_wtZm7LNGLJTG5oHHNVqP80hBJr5Sg2SOa1EQw9uOy3enJXEjB85SeBQls7EeeatLdpqIPaeBDdb5qZ79kdt2DKfzPptGfYPcsZl-RxZerrCgLnUcDtFfls_nRm0Y0prqwz06vcd5gaWUcJ0NdPhdjsWOIIJlZh7ud926d-yyUmXOqZjVhoRZnlHJIweyGqg6CqA8kWSDQiKFxP9Ym9rNOOI0pJD-rajn7LIPCC1kiNT61qnejJOXeJgzZMvWosKniw8gSFoMofQCHogqVFwTtLEsJKXkdRfR5kvZSEIXqjad2WB3Db6Vj2uJSspSsPz8PYfjc3LD4ZHpKy2nESey119AjuSLkOxWcb36rVyDJKFxakIc1JuAZr82TTy0I0E8YUAFZ4WWYnQryepj_KnwFHEtQSlimO-bZVpMsJWJQOcGKl-qq_Dj_-JoZhBng6ABc7IHTFK4QI4RTn7ourDxrFSRM1fGJ2bgehUD5vjdsmKBjGYykxZ63GWAM6As5WbbHhwVTzUDeXEaMpMeH077yMagV5g8zNw90woY4jJqgMKUm1fV_dsYY5izHt7fUEdTK4124ImZqRzBTZWUYMfgBfZqzimfBV61n8wvYyCfZ4661_7tW8on6JYJiegpwhyM', 'scope': 'openid', 'access_token': 'lsN3qaAXbnIl7Dq2YkN5GX-4ucb6OhEQbVQGVo2s8Fg.0zYKViA-lBa96qDqzrHUE8EgBRqYyj_FrWoAW1T759w', 'state': 'wFPFoFc9dgXpE24d', 'expires_in': 3599, 'token_type': 'bearer'}
5.134 AuthorizationResponse {
"access_token": "lsN3qaAXbnIl7Dq2YkN5GX-4ucb6OhEQbVQGVo2s8Fg.0zYKViA-lBa96qDqzrHUE8EgBRqYyj_FrWoAW1T759w",
"expires_in": 3599,
"id_token": {
"at_hash": "bj91VsNqI4J4ZOkBMN-UBg",
"aud": [
"4c65997e-b17a-41e4-a91a-48171f6ce4d2"
],
"auth_time": 1529753009,
"exp": 1529756726,
"iat": 1529753126,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "b810bf3b-68a2-45d8-9165-3687adf15f69",
"nonce": "LrWXtgCkFiOPUeME",
"rat": 1529753124,
"sub": "[email protected]"
},
"scope": "openid",
"state": "wFPFoFc9dgXpE24d",
"token_type": "bearer"
}
5.134 phase <--<-- 6 --- Done -->-->
5.134 end
5.135 assertion VerifyAuthnResponse
5.135 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
5.135 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-nonce-NoReq-noncode.txt 0000644 0000000 0000000 00000017546 13313426644 016020 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-nonce-NoReq-noncode
Test description: Reject requests without nonce unless using the code flow
Timestamp: 2018-06-23T11:23:16Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Note -->-->
1.032 phase <--<-- 3 --- Registration -->-->
1.032 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.032 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#AMdEkBWQ8p5EKqtN"
],
"response_types": [
"id_token token"
]
}
1.191 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.192 RegistrationResponse {
"client_id": "9cb862dd-13fe-49bf-9d59-765d9a8eb6e7",
"client_secret": "PQePmdz6Lcf_",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "9cb862dd-13fe-49bf-9d59-765d9a8eb6e7",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#AMdEkBWQ8p5EKqtN"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.192 phase <--<-- 4 --- AsyncAuthn -->-->
1.193 AuthorizationRequest {
"client_id": "9cb862dd-13fe-49bf-9d59-765d9a8eb6e7",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token token",
"scope": "openid",
"state": "MorpGgTIIb9fGDf8"
}
1.193 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?state=MorpGgTIIb9fGDf8&scope=openid&response_type=id_token+token&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=9cb862dd-13fe-49bf-9d59-765d9a8eb6e7
1.193 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?state=MorpGgTIIb9fGDf8&scope=openid&response_type=id_token+token&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=9cb862dd-13fe-49bf-9d59-765d9a8eb6e7
3.396 http args {}
3.563 response URL with fragment
3.563 response error=invalid_request&error_debug=Parameter+nonce+must+be+set+when+using+the+implicit+flow&error_description=The+request+is+missing+a+required+parameter%252C+includes+an+invalid+parameter+value%252C+includes+a+parameter+more+than+once%252C+or+is+otherwise+malformed&error_hint=Make+sure+that+the+various+parameters+are+correct%252C+be+aware+of+case+sensitivity+and+trim+your+parameters.+Make+sure+that+the+client+you+are+using+has+exactly+whitelisted+the+redirect_uri+you+specified.&state=MorpGgTIIb9fGDf8
3.564 response {'error_debug': 'Parameter nonce must be set when using the implicit flow', 'error_description': 'The request is missing a required parameter%2C includes an invalid parameter value%2C includes a parameter more than once%2C or is otherwise malformed', 'state': 'MorpGgTIIb9fGDf8', 'error': 'invalid_request', 'error_hint': 'Make sure that the various parameters are correct%2C be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.'}
3.564 AuthorizationErrorResponse {
"error": "invalid_request",
"error_debug": "Parameter nonce must be set when using the implicit flow",
"error_description": "The request is missing a required parameter%2C includes an invalid parameter value%2C includes a parameter more than once%2C or is otherwise malformed",
"error_hint": "Make sure that the various parameters are correct%2C be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.",
"state": "MorpGgTIIb9fGDf8"
}
3.564 AuthorizationErrorResponse {
"error": "invalid_request",
"error_debug": "Parameter nonce must be set when using the implicit flow",
"error_description": "The request is missing a required parameter%2C includes an invalid parameter value%2C includes a parameter more than once%2C or is otherwise malformed",
"error_hint": "Make sure that the various parameters are correct%2C be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.",
"state": "MorpGgTIIb9fGDf8"
}
3.564 phase <--<-- 5 --- Done -->-->
3.564 end
3.565 assertion VerifyResponse
3.565 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.565 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-IDToken-RS256.txt 0000644 0000000 0000000 00000022655 13313426552 014320 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-IDToken-RS256
Test description: Asymmetric ID Token signature with RS256
Timestamp: 2018-06-23T11:22:18Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.072 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Registration -->-->
0.074 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'id_token_signed_response_alg': 'RS256', 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.074 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id_token_signed_response_alg": "RS256",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#IIPjTRaD6gZAXcb6"
],
"response_types": [
"id_token token"
]
}
0.233 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.234 RegistrationResponse {
"client_id": "5b207098-cb58-4241-a5ad-7924cf643b32",
"client_secret": "q6TbwI4m_Ako",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "5b207098-cb58-4241-a5ad-7924cf643b32",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#IIPjTRaD6gZAXcb6"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.234 phase <--<-- 3 --- AsyncAuthn -->-->
0.234 AuthorizationRequest {
"client_id": "5b207098-cb58-4241-a5ad-7924cf643b32",
"nonce": "VXVDemH4HpSOfAgK",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token token",
"scope": "openid",
"state": "zbMYNfePOXDH6URY"
}
0.234 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=5b207098-cb58-4241-a5ad-7924cf643b32&state=zbMYNfePOXDH6URY&response_type=id_token+token&nonce=VXVDemH4HpSOfAgK
0.234 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=5b207098-cb58-4241-a5ad-7924cf643b32&state=zbMYNfePOXDH6URY&response_type=id_token+token&nonce=VXVDemH4HpSOfAgK
2.194 http args {}
2.373 response URL with fragment
2.373 response access_token=j2KZ2lOB9DjkkMQzljh9p0XNWOLtUkTYUwEHU1sBoKU.GBnCm04h5tuS2It1-4dx16rimYV-_bkjD7c-U41aGDA&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiNHpYdDFaRk1tWDEzNklFU2VxWThtUSIsImF1ZCI6WyI1YjIwNzA5OC1jYjU4LTQyNDEtYTVhZC03OTI0Y2Y2NDNiMzIiXSwiYXV0aF90aW1lIjoxNTI5NzUyODIwLCJleHAiOjE1Mjk3NTY1MzgsImlhdCI6MTUyOTc1MjkzOCwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiYzAzMWY4NjgtMDUzNS00NWE5LWI0YjktMzJmMGRiYjZlZTcxIiwibm9uY2UiOiJWWFZEZW1INEhwU09mQWdLIiwicmF0IjoxNTI5NzUyOTM2LCJzdWIiOiJmb29AYmFyLmNvbSJ9.XExP-DCozmjWUotykST2CGnFnobw22aJ3KZcaVr83DP-zkz1AYBd3TtHPC9Jdq8nZ4y_1nYC3ryuDWg-anodMvkTeFx-SEl5yJEoYAJYFMkRTkVM9UW4j6bdK_xD1S_FK-jfxyj9u2ejmHM8LigogD7D0DJ85Z6bNE8rOY38G5XW6_XDQoqba4qcWEJxy1VA_zjAMgxs5xo6igPvVtixbHmmloV96wLky5Bh-wHuvOvJ0PK9RqS5D2GmpCzD3iabejWwq280wh8x3UF38rsucNeN-kIShzWUe7LGX28O4_5lzwsBLRh3kVoOdFAQvn1FFrvkB4sB72-ZKCkplMq7JuBnN102hdcWm5Yw7EaXtPgC9EkL7MaUmZ2HiB2S-77zqtqTPdE8YWiEg7MMBHKlaJXCerDtjAy7gJ8-tPjWd5M8uiJsj7Hp87Rw8S9kz4HiZ5ZM3DGXgXQNS_tRY2xfquEIABvwMCUF23sSk7AGO7GSCzx113hHGR4tTTOnCOSM3gv5V80Dxr04z9iwKxkH0MtO1fdfoQHCgjHM61smT9FmBWQy4xv_ujwvBEHKjsHxunkp1VgHzu1mev8KjStOU415i6RNfNUu7jWvDxxnrhRYfrUkIZW4-0GCxhjj9ArXqeA1pm4kJKI9_g7BYWMfCcpgFOI01nyNnETguTIgY6c&scope=openid&state=zbMYNfePOXDH6URY&token_type=bearer
2.373 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiNHpYdDFaRk1tWDEzNklFU2VxWThtUSIsImF1ZCI6WyI1YjIwNzA5OC1jYjU4LTQyNDEtYTVhZC03OTI0Y2Y2NDNiMzIiXSwiYXV0aF90aW1lIjoxNTI5NzUyODIwLCJleHAiOjE1Mjk3NTY1MzgsImlhdCI6MTUyOTc1MjkzOCwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiYzAzMWY4NjgtMDUzNS00NWE5LWI0YjktMzJmMGRiYjZlZTcxIiwibm9uY2UiOiJWWFZEZW1INEhwU09mQWdLIiwicmF0IjoxNTI5NzUyOTM2LCJzdWIiOiJmb29AYmFyLmNvbSJ9.XExP-DCozmjWUotykST2CGnFnobw22aJ3KZcaVr83DP-zkz1AYBd3TtHPC9Jdq8nZ4y_1nYC3ryuDWg-anodMvkTeFx-SEl5yJEoYAJYFMkRTkVM9UW4j6bdK_xD1S_FK-jfxyj9u2ejmHM8LigogD7D0DJ85Z6bNE8rOY38G5XW6_XDQoqba4qcWEJxy1VA_zjAMgxs5xo6igPvVtixbHmmloV96wLky5Bh-wHuvOvJ0PK9RqS5D2GmpCzD3iabejWwq280wh8x3UF38rsucNeN-kIShzWUe7LGX28O4_5lzwsBLRh3kVoOdFAQvn1FFrvkB4sB72-ZKCkplMq7JuBnN102hdcWm5Yw7EaXtPgC9EkL7MaUmZ2HiB2S-77zqtqTPdE8YWiEg7MMBHKlaJXCerDtjAy7gJ8-tPjWd5M8uiJsj7Hp87Rw8S9kz4HiZ5ZM3DGXgXQNS_tRY2xfquEIABvwMCUF23sSk7AGO7GSCzx113hHGR4tTTOnCOSM3gv5V80Dxr04z9iwKxkH0MtO1fdfoQHCgjHM61smT9FmBWQy4xv_ujwvBEHKjsHxunkp1VgHzu1mev8KjStOU415i6RNfNUu7jWvDxxnrhRYfrUkIZW4-0GCxhjj9ArXqeA1pm4kJKI9_g7BYWMfCcpgFOI01nyNnETguTIgY6c', 'scope': 'openid', 'access_token': 'j2KZ2lOB9DjkkMQzljh9p0XNWOLtUkTYUwEHU1sBoKU.GBnCm04h5tuS2It1-4dx16rimYV-_bkjD7c-U41aGDA', 'state': 'zbMYNfePOXDH6URY', 'expires_in': 3599, 'token_type': 'bearer'}
2.458 AuthorizationResponse {
"access_token": "j2KZ2lOB9DjkkMQzljh9p0XNWOLtUkTYUwEHU1sBoKU.GBnCm04h5tuS2It1-4dx16rimYV-_bkjD7c-U41aGDA",
"expires_in": 3599,
"id_token": {
"at_hash": "4zXt1ZFMmX136IESeqY8mQ",
"aud": [
"5b207098-cb58-4241-a5ad-7924cf643b32"
],
"auth_time": 1529752820,
"exp": 1529756538,
"iat": 1529752938,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "c031f868-0535-45a9-b4b9-32f0dbb6ee71",
"nonce": "VXVDemH4HpSOfAgK",
"rat": 1529752936,
"sub": "[email protected]"
},
"scope": "openid",
"state": "zbMYNfePOXDH6URY",
"token_type": "bearer"
}
2.459 phase <--<-- 4 --- AccessToken -->-->
2.459 phase <--<-- 5 --- Done -->-->
2.459 end
2.459 assertion VerifyResponse
2.459 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.46 assertion VerifySignedIdToken
2.46 condition verify-idtoken-is-signed: status=OK [Verifies that an ID Token is signed]
2.46 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-idtoken-is-signed: status=OK [Verifies that an ID Token is signed]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Registration-Sector-Bad.txt 0000644 0000000 0000000 00000013160 13313426515 016625 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-Sector-Bad
Test description: Incorrect registration of sector_identifier_uri
Timestamp: 2018-06-23T11:21:49Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.072 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.073 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.073 phase <--<-- 2 --- Registration -->-->
0.073 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'sector_identifier_uri': 'https://op.certification.openid.net:61353/export/siu.json', 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.074 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#sMKCdUeqXIu3bsk7"
],
"response_types": [
"id_token token"
],
"sector_identifier_uri": "https://op.certification.openid.net:61353/export/siu.json"
}
0.298 http response url:https://oidc-certification.ory.sh:8443/clients status_code:400 message:{"error":"invalid_request","error_description":"The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed","error_hint":"Make sure that the various parameters are correct, be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.","status_code":400,"error_debug":"Redirect URL \"https://op.certification.openid.net:61353/authz_cb\" does not match values from sector_identifier_uri."}
0.299 ErrorResponse {
"error": "invalid_request",
"error_debug": "Redirect URL \"https://op.certification.openid.net:61353/authz_cb\" does not match values from sector_identifier_uri.",
"error_description": "The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed",
"error_hint": "Make sure that the various parameters are correct, be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.",
"status_code": 400
}
0.299 exception RegistrationError:{'error_debug': 'Redirect URL "https://op.certification.openid.net:61353/authz_cb" does not match values from sector_identifier_uri.', 'error_description': 'The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed', 'status_code': 400, 'error': 'invalid_request', 'error_hint': 'Make sure that the various parameters are correct, be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.'}
0.299 event got expected exception RegistrationError
0.299 phase <--<-- 3 --- Done -->-->
0.299 end
0.299 condition Done: status=OK
============================================================
Conditions
Done: status=OK
============================================================
RESULT: PASSED
./OP-display-popup.txt 0000644 0000000 0000000 00000022264 13313426637 015052 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-display-popup
Test description: Request with display=popup
Timestamp: 2018-06-23T11:23:11Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.254 phase <--<-- 1 --- Webfinger -->-->
1.254 not expected to do WebFinger
1.254 phase <--<-- 2 --- Discovery -->-->
1.254 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.363 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.364 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.364 phase <--<-- 3 --- Registration -->-->
1.364 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.365 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#iFAYpU9RBkDoWhPm"
],
"response_types": [
"id_token token"
]
}
1.523 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.524 RegistrationResponse {
"client_id": "f8925b67-7722-4e28-8e6e-05eabac15c0c",
"client_secret": "CWfWp_mQE6fk",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "f8925b67-7722-4e28-8e6e-05eabac15c0c",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#iFAYpU9RBkDoWhPm"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.524 phase <--<-- 4 --- AsyncAuthn -->-->
1.525 AuthorizationRequest {
"client_id": "f8925b67-7722-4e28-8e6e-05eabac15c0c",
"display": "popup",
"nonce": "6h3mpd697pAQFE0G",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token token",
"scope": "openid",
"state": "2loLkZePAqdzI0xA"
}
1.525 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=f8925b67-7722-4e28-8e6e-05eabac15c0c&state=2loLkZePAqdzI0xA&response_type=id_token+token&nonce=6h3mpd697pAQFE0G&display=popup
1.525 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=f8925b67-7722-4e28-8e6e-05eabac15c0c&state=2loLkZePAqdzI0xA&response_type=id_token+token&nonce=6h3mpd697pAQFE0G&display=popup
4.521 http args {}
4.691 response URL with fragment
4.691 response access_token=hb2LVqeBctnj-TD4KHbZpF3F19tDGO2TD3dJGaJwhUQ.4w9ih93caS5a-hkm31IXhCJg1_d5rlTTp4MNAnjRUcA&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoibFJpQnhXbEtCUy14WWFkcGtFZXZ0QSIsImF1ZCI6WyJmODkyNWI2Ny03NzIyLTRlMjgtOGU2ZS0wNWVhYmFjMTVjMGMiXSwiYXV0aF90aW1lIjoxNTI5NzUyODIwLCJleHAiOjE1Mjk3NTY1OTEsImlhdCI6MTUyOTc1Mjk5MSwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiOWFhZDBkMTEtMzM3YS00Y2ZkLTkxMTctMmIzZTU4NjM4OTdlIiwibm9uY2UiOiI2aDNtcGQ2OTdwQVFGRTBHIiwicmF0IjoxNTI5NzUyOTg4LCJzdWIiOiJmb29AYmFyLmNvbSJ9.mriBmR1kC7GMqvVOTxjlNbpJDGnNAQ-tft5acR3yJ1ZVIv-qW36OIuNi-y7-9aW3M7gTuQkHAYtGeOh0--U3zcv8Dy77psUd4yuyBZ003AyT-aMnYVerk1Bp40tloKMWrOBgvty6H7aIA-ZkB34Y8we2Y7j9KG2sEHZfZ3hQ4Jpw11aZFuHwS8A2giGddxfy-Z6StNudo2VaQgFGSRkC8acLzis7sSVVgkQBBRaw59V9OsvCPrnJsgkIDLsy50In9UrHRw3Y62Fo1RsQbOnMdXMEWWUsZCGj01co6o7ilay9x9PqRQJr__8Fi-PnOfiz_w_dZb4Xm5kvvnyjGSkdSrRKVDaka1Cns-ws-FRXvKWr_dztQjEhQ_X8Pynhz7dCpXRgbCqkPLY58bcWiW5vYgeDaFiQackuL_IAysOKwrxo1c5C4WONjpcTkAVIuWoutrSZ-fcqabqg_zH2zrzOSIWk9HPAJealu8daFx2XRpFCvCtpWSvWU3_tWK7e-hxQgklOZRVIh1ydbcXki1tbKle8be1dvsepdDdL17iRpqln0NN4GdCiBw-txGJnEZoaU87cnvQ_HpR3Xi9w2w8gv0otCTo2uMldyHeNidDfoODrZc48ZYhYpxvxO-JzQ-t7AbAyDgysc--ENfvto7lQqxMPvo1bn5_6NhPslmY2Tm4&scope=openid&state=2loLkZePAqdzI0xA&token_type=bearer
4.692 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoibFJpQnhXbEtCUy14WWFkcGtFZXZ0QSIsImF1ZCI6WyJmODkyNWI2Ny03NzIyLTRlMjgtOGU2ZS0wNWVhYmFjMTVjMGMiXSwiYXV0aF90aW1lIjoxNTI5NzUyODIwLCJleHAiOjE1Mjk3NTY1OTEsImlhdCI6MTUyOTc1Mjk5MSwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiOWFhZDBkMTEtMzM3YS00Y2ZkLTkxMTctMmIzZTU4NjM4OTdlIiwibm9uY2UiOiI2aDNtcGQ2OTdwQVFGRTBHIiwicmF0IjoxNTI5NzUyOTg4LCJzdWIiOiJmb29AYmFyLmNvbSJ9.mriBmR1kC7GMqvVOTxjlNbpJDGnNAQ-tft5acR3yJ1ZVIv-qW36OIuNi-y7-9aW3M7gTuQkHAYtGeOh0--U3zcv8Dy77psUd4yuyBZ003AyT-aMnYVerk1Bp40tloKMWrOBgvty6H7aIA-ZkB34Y8we2Y7j9KG2sEHZfZ3hQ4Jpw11aZFuHwS8A2giGddxfy-Z6StNudo2VaQgFGSRkC8acLzis7sSVVgkQBBRaw59V9OsvCPrnJsgkIDLsy50In9UrHRw3Y62Fo1RsQbOnMdXMEWWUsZCGj01co6o7ilay9x9PqRQJr__8Fi-PnOfiz_w_dZb4Xm5kvvnyjGSkdSrRKVDaka1Cns-ws-FRXvKWr_dztQjEhQ_X8Pynhz7dCpXRgbCqkPLY58bcWiW5vYgeDaFiQackuL_IAysOKwrxo1c5C4WONjpcTkAVIuWoutrSZ-fcqabqg_zH2zrzOSIWk9HPAJealu8daFx2XRpFCvCtpWSvWU3_tWK7e-hxQgklOZRVIh1ydbcXki1tbKle8be1dvsepdDdL17iRpqln0NN4GdCiBw-txGJnEZoaU87cnvQ_HpR3Xi9w2w8gv0otCTo2uMldyHeNidDfoODrZc48ZYhYpxvxO-JzQ-t7AbAyDgysc--ENfvto7lQqxMPvo1bn5_6NhPslmY2Tm4', 'scope': 'openid', 'access_token': 'hb2LVqeBctnj-TD4KHbZpF3F19tDGO2TD3dJGaJwhUQ.4w9ih93caS5a-hkm31IXhCJg1_d5rlTTp4MNAnjRUcA', 'state': '2loLkZePAqdzI0xA', 'expires_in': 3599, 'token_type': 'bearer'}
4.77 AuthorizationResponse {
"access_token": "hb2LVqeBctnj-TD4KHbZpF3F19tDGO2TD3dJGaJwhUQ.4w9ih93caS5a-hkm31IXhCJg1_d5rlTTp4MNAnjRUcA",
"expires_in": 3599,
"id_token": {
"at_hash": "lRiBxWlKBS-xYadpkEevtA",
"aud": [
"f8925b67-7722-4e28-8e6e-05eabac15c0c"
],
"auth_time": 1529752820,
"exp": 1529756591,
"iat": 1529752991,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "9aad0d11-337a-4cfd-9117-2b3e5863897e",
"nonce": "6h3mpd697pAQFE0G",
"rat": 1529752988,
"sub": "[email protected]"
},
"scope": "openid",
"state": "2loLkZePAqdzI0xA",
"token_type": "bearer"
}
4.77 phase <--<-- 5 --- Done -->-->
4.77 end
4.773 assertion VerifyResponse
4.773 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.773 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-redirect_uri-RegFrag.txt 0000644 0000000 0000000 00000011533 13313426747 016236 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-RegFrag
Test description: Reject registration where a redirect_uri has a fragment
Timestamp: 2018-06-23T11:24:23Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.109 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.111 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.111 phase <--<-- 2 --- Registration -->-->
0.111 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb#foobar'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.111 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb#foobar"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#qu1CrUnskG87QYv4"
],
"response_types": [
"id_token token"
]
}
0.186 http response url:https://oidc-certification.ory.sh:8443/clients status_code:400 message:{"error":"invalid_request","error_description":"The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed","error_hint":"Redirect URIs must not contain fragments (#)","status_code":400}
0.187 ErrorResponse {
"error": "invalid_request",
"error_description": "The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed",
"error_hint": "Redirect URIs must not contain fragments (#)",
"status_code": 400
}
0.187 exception RegistrationError:{'error_description': 'The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed', 'status_code': 400, 'error': 'invalid_request', 'error_hint': 'Redirect URIs must not contain fragments (#)'}
0.187 event got expected exception RegistrationError
0.187 phase <--<-- 3 --- Done -->-->
0.187 end
0.187 assertion VerifyErrorMessage
0.188 condition verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
0.188 condition Done: status=OK
============================================================
Conditions
verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Discovery-JWKs.txt 0000644 0000000 0000000 00000006117 13313426507 015022 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Discovery-JWKs
Test description: Keys in OP JWKs well formed
Timestamp: 2018-06-23T11:21:43Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Done -->-->
0.074 end
0.075 assertion CheckHTTPResponse
0.075 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.075 assertion VerifyBase64URL
0.14 http response url:https://oidc-certification.ory.sh:8443/.well-known/jwks.json status_code:200
0.142 condition verify-base64url: status=OK [Verifies that the base64 encoded parts of a JWK is in fact base64url encoded and not just base64 encoded]
0.142 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-base64url: status=OK [Verifies that the base64 encoded parts of a JWK is in fact base64url encoded and not just base64 encoded]
Done: status=OK
============================================================
RESULT: PASSED
./OP-scope-profile.txt 0000644 0000000 0000000 00000026445 13313427014 015006 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-scope-profile
Test description: Scope requesting profile claims
Timestamp: 2018-06-23T11:25:00Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.074 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.076 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.076 phase <--<-- 2 --- Registration -->-->
0.076 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.076 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#RhttwRMa8jPNFTFG"
],
"response_types": [
"id_token token"
]
}
0.268 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.269 RegistrationResponse {
"client_id": "db0a70da-0fe9-4e51-a3c8-b231d6eab4ba",
"client_secret": "bte5w8SbBuu5",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "db0a70da-0fe9-4e51-a3c8-b231d6eab4ba",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#RhttwRMa8jPNFTFG"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.269 phase <--<-- 3 --- AsyncAuthn -->-->
0.269 condition Check support: status=WARNING, message=No support for: scopes_supported=['profile']
0.269 AuthorizationRequest {
"client_id": "db0a70da-0fe9-4e51-a3c8-b231d6eab4ba",
"nonce": "r6CGOk4IYITMes5l",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token token",
"scope": "openid profile",
"state": "2gSKdcE9yftQQC7k"
}
0.269 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+profile&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=db0a70da-0fe9-4e51-a3c8-b231d6eab4ba&state=2gSKdcE9yftQQC7k&response_type=id_token+token&nonce=r6CGOk4IYITMes5l
0.269 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+profile&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=db0a70da-0fe9-4e51-a3c8-b231d6eab4ba&state=2gSKdcE9yftQQC7k&response_type=id_token+token&nonce=r6CGOk4IYITMes5l
2.634 http args {}
2.808 response URL with fragment
2.808 response access_token=UUq_jnvP3KR0u88xAGIPtVLf2LxgEs8w1fexBXsYek8.JLFdtUXtee9cn1nrmTYDwZjEgdUeB3OvoK52af9ZQhQ&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoibTRJb1FzbUFqdFB3UVI5YllwTGI3ZyIsImF1ZCI6WyJkYjBhNzBkYS0wZmU5LTRlNTEtYTNjOC1iMjMxZDZlYWI0YmEiXSwiYXV0aF90aW1lIjoxNTI5NzUzMDA5LCJleHAiOjE1Mjk3NTY2OTksImlhdCI6MTUyOTc1MzA5OSwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiNjUzMTU4OTAtNzUzMS00YTA3LTkwM2EtMWJhMzljZWM0NzM3Iiwibm9uY2UiOiJyNkNHT2s0SVlJVE1lczVsIiwicmF0IjoxNTI5NzUzMDk3LCJzdWIiOiJmb29AYmFyLmNvbSJ9.E_VnZnt91QlLFyk0tad_26U6x0C_Y6DLSeXTVofYiHnbzyoqbozhxR9uSSWAT_m-_EGy6ahOyRK31_j31fII5BsfwJB911En2puSfxLZd2FGu5YHAWn9HQyQ_zYrFnI1Ly6uP3ZuWU22xGru8eBhq5hD72td3oHJQ_yoyQBhF9eRAzL72fjcPb9OwphypqaYx_7ofI9iew9cM41qoygMJdzKkaz2xlhzf3JnF6yIuf28XNeKKBxXwBMeDk6iWNWOtw6TvYatcJjBRGmdW_V6pxBJJkoxGZ7wTNWY9MORD1giGsiW3wpwwKx1WPWdHgqcvglN0NUIrse_DmWiEWeejcIGJlVzd_5lMfICBucQocG30sVqWHF3pRMhrAT3ytN6dR8SVFb_o_LNj8q_fC2sixEadVV0NaGOpCSaZfQKTQmFNs1AYmtNqP_X5TYAqBYARLxHAHhlHI6fUyP5H4GqTn5CMOQ--6peax72dgg4Yr_iPwm7j1JKGSlWEJEb0taXcNl5iDwVWyVPCMHiOYUL2ghKJPWJ_mMOy2nAmK1vQ_RSZc1nTO873vY5IRRJdmZrPxkac480EQhTaJAsZ_o-oiBLfrmvpnLgwnTZTkCjTmLEH0zFnEzValX-Z9A-CLf3C0Vg_ufQFUmuWzngvDfbjaZWfMwhpzLXfivlgPacAH4&scope=openid%20profile&state=2gSKdcE9yftQQC7k&token_type=bearer
2.809 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoibTRJb1FzbUFqdFB3UVI5YllwTGI3ZyIsImF1ZCI6WyJkYjBhNzBkYS0wZmU5LTRlNTEtYTNjOC1iMjMxZDZlYWI0YmEiXSwiYXV0aF90aW1lIjoxNTI5NzUzMDA5LCJleHAiOjE1Mjk3NTY2OTksImlhdCI6MTUyOTc1MzA5OSwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiNjUzMTU4OTAtNzUzMS00YTA3LTkwM2EtMWJhMzljZWM0NzM3Iiwibm9uY2UiOiJyNkNHT2s0SVlJVE1lczVsIiwicmF0IjoxNTI5NzUzMDk3LCJzdWIiOiJmb29AYmFyLmNvbSJ9.E_VnZnt91QlLFyk0tad_26U6x0C_Y6DLSeXTVofYiHnbzyoqbozhxR9uSSWAT_m-_EGy6ahOyRK31_j31fII5BsfwJB911En2puSfxLZd2FGu5YHAWn9HQyQ_zYrFnI1Ly6uP3ZuWU22xGru8eBhq5hD72td3oHJQ_yoyQBhF9eRAzL72fjcPb9OwphypqaYx_7ofI9iew9cM41qoygMJdzKkaz2xlhzf3JnF6yIuf28XNeKKBxXwBMeDk6iWNWOtw6TvYatcJjBRGmdW_V6pxBJJkoxGZ7wTNWY9MORD1giGsiW3wpwwKx1WPWdHgqcvglN0NUIrse_DmWiEWeejcIGJlVzd_5lMfICBucQocG30sVqWHF3pRMhrAT3ytN6dR8SVFb_o_LNj8q_fC2sixEadVV0NaGOpCSaZfQKTQmFNs1AYmtNqP_X5TYAqBYARLxHAHhlHI6fUyP5H4GqTn5CMOQ--6peax72dgg4Yr_iPwm7j1JKGSlWEJEb0taXcNl5iDwVWyVPCMHiOYUL2ghKJPWJ_mMOy2nAmK1vQ_RSZc1nTO873vY5IRRJdmZrPxkac480EQhTaJAsZ_o-oiBLfrmvpnLgwnTZTkCjTmLEH0zFnEzValX-Z9A-CLf3C0Vg_ufQFUmuWzngvDfbjaZWfMwhpzLXfivlgPacAH4', 'scope': 'openid profile', 'access_token': 'UUq_jnvP3KR0u88xAGIPtVLf2LxgEs8w1fexBXsYek8.JLFdtUXtee9cn1nrmTYDwZjEgdUeB3OvoK52af9ZQhQ', 'state': '2gSKdcE9yftQQC7k', 'expires_in': 3599, 'token_type': 'bearer'}
2.899 AuthorizationResponse {
"access_token": "UUq_jnvP3KR0u88xAGIPtVLf2LxgEs8w1fexBXsYek8.JLFdtUXtee9cn1nrmTYDwZjEgdUeB3OvoK52af9ZQhQ",
"expires_in": 3599,
"id_token": {
"at_hash": "m4IoQsmAjtPwQR9bYpLb7g",
"aud": [
"db0a70da-0fe9-4e51-a3c8-b231d6eab4ba"
],
"auth_time": 1529753009,
"exp": 1529756699,
"iat": 1529753099,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "65315890-7531-4a07-903a-1ba39cec4737",
"nonce": "r6CGOk4IYITMes5l",
"rat": 1529753097,
"sub": "[email protected]"
},
"scope": "openid profile",
"state": "2gSKdcE9yftQQC7k",
"token_type": "bearer"
}
2.899 phase <--<-- 4 --- AccessToken -->-->
2.899 phase <--<-- 5 --- UserInfo -->-->
2.899 do_user_info_request kwargs:{'state': '2gSKdcE9yftQQC7k', 'method': 'GET', 'authn_method': 'bearer_header'}
2.899 request {'body': None}
2.899 request_url https://oidc-certification.ory.sh:8443/userinfo
2.899 request_http_args {'headers': {'Authorization': 'Bearer UUq_jnvP3KR0u88xAGIPtVLf2LxgEs8w1fexBXsYek8.JLFdtUXtee9cn1nrmTYDwZjEgdUeB3OvoK52af9ZQhQ'}}
3.008 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
3.009 OpenIDSchema {
"sub": "[email protected]"
}
3.009 OpenIDSchema {
"sub": "[email protected]"
}
3.009 phase <--<-- 6 --- Done -->-->
3.009 end
3.01 assertion CheckHTTPResponse
3.01 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
3.01 assertion VerifyResponse
3.01 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.011 assertion VerifyScopes
3.011 condition verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username'] [Verifies that the claims corresponding to the requested scopes are returned]
3.011 condition Done: status=OK
============================================================
Conditions
Check support: status=WARNING, message=No support for: scopes_supported=['profile']
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username'] [Verifies that the claims corresponding to the requested scopes are returned]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
No support for: scopes_supported=['profile']
The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username']
./OP-UserInfo-RS256.txt 0000644 0000000 0000000 00000024512 13313426615 014547 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-UserInfo-RS256
Test description: RP registers userinfo_signed_response_alg to signal that it wants signed UserInfo returned
Timestamp: 2018-06-23T11:22:53Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.122 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.123 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.123 phase <--<-- 2 --- Registration -->-->
0.123 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'userinfo_signed_response_alg': 'RS256'}
0.124 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#1sdxJWFEWbh2VEkg"
],
"response_types": [
"id_token token"
],
"userinfo_signed_response_alg": "RS256"
}
0.278 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.279 RegistrationResponse {
"client_id": "0cb1e97c-5e97-4ec3-a5a8-e43ae248d77c",
"client_secret": "7.mD4FfYd9zJ",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "0cb1e97c-5e97-4ec3-a5a8-e43ae248d77c",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#1sdxJWFEWbh2VEkg"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "RS256"
}
0.279 phase <--<-- 3 --- AsyncAuthn -->-->
0.279 AuthorizationRequest {
"client_id": "0cb1e97c-5e97-4ec3-a5a8-e43ae248d77c",
"nonce": "oawTskMp0CwhrTh5",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token token",
"scope": "openid",
"state": "a4aa5FzBJJMWNEKw"
}
0.28 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=0cb1e97c-5e97-4ec3-a5a8-e43ae248d77c&state=a4aa5FzBJJMWNEKw&response_type=id_token+token&nonce=oawTskMp0CwhrTh5
0.28 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=0cb1e97c-5e97-4ec3-a5a8-e43ae248d77c&state=a4aa5FzBJJMWNEKw&response_type=id_token+token&nonce=oawTskMp0CwhrTh5
3.212 http args {}
3.402 response URL with fragment
3.402 response access_token=HCwgggs40Gg6XSmygQkfvpp93kf-V1iCtDLCjE9pkqk.8jm5aY61ULS4m9ChxcsWjPmFju41LJhw4xxJj85aceo&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoidHVxREE2bzhSZEhKbTdaTEROV3BFQSIsImF1ZCI6WyIwY2IxZTk3Yy01ZTk3LTRlYzMtYTVhOC1lNDNhZTI0OGQ3N2MiXSwiYXV0aF90aW1lIjoxNTI5NzUyODIwLCJleHAiOjE1Mjk3NTY1NzIsImlhdCI6MTUyOTc1Mjk3MiwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiZWI2NTExMDUtYTlhOC00M2M1LTk3NzYtZGNlMTlhZjA4ZTdiIiwibm9uY2UiOiJvYXdUc2tNcDBDd2hyVGg1IiwicmF0IjoxNTI5NzUyOTY5LCJzdWIiOiJmb29AYmFyLmNvbSJ9.eBJtQKyBp34JVRVkKGa8NSw_WKIHyiZYqcUmnFPquOT3RxM3Qa0Kvz3hobYM9dRLF2nmYnFBxMioyW4YsjD3yEtLOB6c9HKe38RDFVgqxUedzFNjsdsgVUF6s8gNKOikLvPxFG-pD8UT7jTXezWiPQSyHDuC7r8Cgn-emhPTSA2rx7cArYPrT8ABJmSa5J8d0MjhtrQ1lDvWCGtNoiJi0ZdFFZVs277vSH177FkhSsZaz4gbe27KX0YCa9D9KdVMsjXB3hjGGFKNFYV4W0dIVMnqdx_zx9kca4XeD-_B8bB-ahRD9Ek9T9Dlyryp-cOtHikXUOxSDJfKNbeZWllmIrP1DCyJfkevvZiKwZy6JyY0VWQ0MqJK0MaBWnPstPVrHYjO68NYqZTUuHkmm_xqZBSCNo2wXGgDXiz5Gn1JwvNR2xdvJQc1zMPMKsngZWqIDAcaKIBiIkU0uOtOeNDAIZ25hbcc8ONU9Kch5U0iDgi-hWV0t5LWQBEuMCSMW5BYf8QjmEiVoe87kyEZmks2AHlyjAgsR3SGjdss8geAl_PQFX2a1zYvE_RIv9ocjYC0D7TEGcMBn6JZNzVFiDrgM3PpvgLO-0jo1HHAfZ1VU0gLgYQiw1Yu9legdeTPURqwbIF_9BTQMsHmkyeEl3C0-5JoZyYaxXK49a40czHcl7o&scope=openid&state=a4aa5FzBJJMWNEKw&token_type=bearer
3.403 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoidHVxREE2bzhSZEhKbTdaTEROV3BFQSIsImF1ZCI6WyIwY2IxZTk3Yy01ZTk3LTRlYzMtYTVhOC1lNDNhZTI0OGQ3N2MiXSwiYXV0aF90aW1lIjoxNTI5NzUyODIwLCJleHAiOjE1Mjk3NTY1NzIsImlhdCI6MTUyOTc1Mjk3MiwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiZWI2NTExMDUtYTlhOC00M2M1LTk3NzYtZGNlMTlhZjA4ZTdiIiwibm9uY2UiOiJvYXdUc2tNcDBDd2hyVGg1IiwicmF0IjoxNTI5NzUyOTY5LCJzdWIiOiJmb29AYmFyLmNvbSJ9.eBJtQKyBp34JVRVkKGa8NSw_WKIHyiZYqcUmnFPquOT3RxM3Qa0Kvz3hobYM9dRLF2nmYnFBxMioyW4YsjD3yEtLOB6c9HKe38RDFVgqxUedzFNjsdsgVUF6s8gNKOikLvPxFG-pD8UT7jTXezWiPQSyHDuC7r8Cgn-emhPTSA2rx7cArYPrT8ABJmSa5J8d0MjhtrQ1lDvWCGtNoiJi0ZdFFZVs277vSH177FkhSsZaz4gbe27KX0YCa9D9KdVMsjXB3hjGGFKNFYV4W0dIVMnqdx_zx9kca4XeD-_B8bB-ahRD9Ek9T9Dlyryp-cOtHikXUOxSDJfKNbeZWllmIrP1DCyJfkevvZiKwZy6JyY0VWQ0MqJK0MaBWnPstPVrHYjO68NYqZTUuHkmm_xqZBSCNo2wXGgDXiz5Gn1JwvNR2xdvJQc1zMPMKsngZWqIDAcaKIBiIkU0uOtOeNDAIZ25hbcc8ONU9Kch5U0iDgi-hWV0t5LWQBEuMCSMW5BYf8QjmEiVoe87kyEZmks2AHlyjAgsR3SGjdss8geAl_PQFX2a1zYvE_RIv9ocjYC0D7TEGcMBn6JZNzVFiDrgM3PpvgLO-0jo1HHAfZ1VU0gLgYQiw1Yu9legdeTPURqwbIF_9BTQMsHmkyeEl3C0-5JoZyYaxXK49a40czHcl7o', 'scope': 'openid', 'access_token': 'HCwgggs40Gg6XSmygQkfvpp93kf-V1iCtDLCjE9pkqk.8jm5aY61ULS4m9ChxcsWjPmFju41LJhw4xxJj85aceo', 'state': 'a4aa5FzBJJMWNEKw', 'expires_in': 3599, 'token_type': 'bearer'}
3.49 AuthorizationResponse {
"access_token": "HCwgggs40Gg6XSmygQkfvpp93kf-V1iCtDLCjE9pkqk.8jm5aY61ULS4m9ChxcsWjPmFju41LJhw4xxJj85aceo",
"expires_in": 3599,
"id_token": {
"at_hash": "tuqDA6o8RdHJm7ZLDNWpEA",
"aud": [
"0cb1e97c-5e97-4ec3-a5a8-e43ae248d77c"
],
"auth_time": 1529752820,
"exp": 1529756572,
"iat": 1529752972,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "eb651105-a9a8-43c5-9776-dce19af08e7b",
"nonce": "oawTskMp0CwhrTh5",
"rat": 1529752969,
"sub": "[email protected]"
},
"scope": "openid",
"state": "a4aa5FzBJJMWNEKw",
"token_type": "bearer"
}
3.49 phase <--<-- 4 --- AccessToken -->-->
3.49 phase <--<-- 5 --- UserInfo -->-->
3.491 do_user_info_request kwargs:{'state': 'a4aa5FzBJJMWNEKw', 'method': 'GET', 'authn_method': 'bearer_header', 'ctype': 'jwt'}
3.491 request {'body': None}
3.491 request_url https://oidc-certification.ory.sh:8443/userinfo
3.491 request_http_args {'headers': {'Authorization': 'Bearer HCwgggs40Gg6XSmygQkfvpp93kf-V1iCtDLCjE9pkqk.8jm5aY61ULS4m9ChxcsWjPmFju41LJhw4xxJj85aceo'}}
3.617 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
3.621 OpenIDSchema {
"aud": [
"0cb1e97c-5e97-4ec3-a5a8-e43ae248d77c"
],
"iss": "https://oidc-certification.ory.sh:8443/",
"sub": "[email protected]"
}
3.621 OpenIDSchema {
"aud": [
"0cb1e97c-5e97-4ec3-a5a8-e43ae248d77c"
],
"iss": "https://oidc-certification.ory.sh:8443/",
"sub": "[email protected]"
}
3.621 phase <--<-- 6 --- Done -->-->
3.621 end
3.622 assertion VerifyResponse
3.622 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.622 assertion CheckAsymSignedUserInfo
3.622 condition asym-signed-userinfo: status=OK [Verifies that the UserInfo was signed with a RSA key]
3.622 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
asym-signed-userinfo: status=OK [Verifies that the UserInfo was signed with a RSA key]
Done: status=OK
============================================================
RESULT: PASSED
./OP-UserInfo-Body.txt 0000644 0000000 0000000 00000023423 13313426566 014670 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-UserInfo-Body
Test description: UserInfo Endpoint access with POST and bearer body
Timestamp: 2018-06-23T11:22:30Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.075 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.076 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.077 phase <--<-- 2 --- Registration -->-->
0.077 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.077 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#RTSm22k0Q0gSMkwA"
],
"response_types": [
"id_token token"
]
}
0.236 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.237 RegistrationResponse {
"client_id": "53c2e340-6dd2-4c14-8075-d057d52ec5c4",
"client_secret": "UPoaoy8bV2x4",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "53c2e340-6dd2-4c14-8075-d057d52ec5c4",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#RTSm22k0Q0gSMkwA"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.237 phase <--<-- 3 --- AsyncAuthn -->-->
0.238 AuthorizationRequest {
"client_id": "53c2e340-6dd2-4c14-8075-d057d52ec5c4",
"nonce": "6dVzL1PmcogMDNqp",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token token",
"scope": "openid",
"state": "FjaNENasHBYkbjoT"
}
0.238 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=53c2e340-6dd2-4c14-8075-d057d52ec5c4&state=FjaNENasHBYkbjoT&response_type=id_token+token&nonce=6dVzL1PmcogMDNqp
0.238 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=53c2e340-6dd2-4c14-8075-d057d52ec5c4&state=FjaNENasHBYkbjoT&response_type=id_token+token&nonce=6dVzL1PmcogMDNqp
2.18 http args {}
2.398 response URL with fragment
2.398 response access_token=oAjEPqKKOXb125pc3vYoopxMst-N5dHGB23NY4AKOfI.3-fY_uLwbHEIN0_Qd6o-RXUek1DtrxAFnWOhp7Zx9mw&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiZEZRaWpCbU9ncDY4UVMxaVdITGRqUSIsImF1ZCI6WyI1M2MyZTM0MC02ZGQyLTRjMTQtODA3NS1kMDU3ZDUyZWM1YzQiXSwiYXV0aF90aW1lIjoxNTI5NzUyODIwLCJleHAiOjE1Mjk3NTY1NDksImlhdCI6MTUyOTc1Mjk0OSwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiNDAwNGYzZmItYmQ5MC00NDdmLWFiMWQtYWVlYjI1OGZjNTI1Iiwibm9uY2UiOiI2ZFZ6TDFQbWNvZ01ETnFwIiwicmF0IjoxNTI5NzUyOTQ4LCJzdWIiOiJmb29AYmFyLmNvbSJ9.j3m8mfJZ835q69KA3-Mk2jRuJlMZ1C8w4bNesbtlMNSajX8V3W-J_z2JP9Jr6tRpDVKj0BnK6M1BYDpzVDIhIEsbJ5JHZJUjqaIlUddAmbZipeOImG37J7Lzz-i677si7oFmDZY4tQ9N1q0JEKxHIAkEuIkkmFT4-3O_1JwsULB0rN9j7KK-TGs6aEyrJTvrPdWqOuUwcqB98GMCXBbn_mbiI9TgteDskkxvydrRWPiQipFqO-yf7tHfKYhsUUNZiC2yykbB7QPhO1Q6NBjz_eU1eHlS9c1fS3o9iT8mb32k6GKi7kqir636yu2OzgezzfTaUHrKGHlERJg9V8EMq0hQIEoPA5T8t_jUfHKw0_VvMJN-hC2yyGx7NXv2-hWznNsAfdeZUqSC494CKE8wSpmEVgZ8qBQYUh6UWCqC9EIDHyVBXG5iwLswcLSieGY42oQs9-OoqIbcH25sIDm4gEDnyxVMZfXJ5vWMBjoXoay-Qy_8oWGrAfHQ9jbytA0wRV26kUkoaR4ybJ_5MmwMlUgScckFltn38kQ5dfgTE8luNWCISmx6WmNCjsIi1YPJ3T3dEGi7d6jOsVbRiyxb08YsJQfNLGdFZTlNbuSMU3mhoJ4WLFKwO6OuXbIOmiLXW2CUgd4oYMFuQrrBuE9boCna6DWq9A5Knz2cPSgm5XQ&scope=openid&state=FjaNENasHBYkbjoT&token_type=bearer
2.399 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiZEZRaWpCbU9ncDY4UVMxaVdITGRqUSIsImF1ZCI6WyI1M2MyZTM0MC02ZGQyLTRjMTQtODA3NS1kMDU3ZDUyZWM1YzQiXSwiYXV0aF90aW1lIjoxNTI5NzUyODIwLCJleHAiOjE1Mjk3NTY1NDksImlhdCI6MTUyOTc1Mjk0OSwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiNDAwNGYzZmItYmQ5MC00NDdmLWFiMWQtYWVlYjI1OGZjNTI1Iiwibm9uY2UiOiI2ZFZ6TDFQbWNvZ01ETnFwIiwicmF0IjoxNTI5NzUyOTQ4LCJzdWIiOiJmb29AYmFyLmNvbSJ9.j3m8mfJZ835q69KA3-Mk2jRuJlMZ1C8w4bNesbtlMNSajX8V3W-J_z2JP9Jr6tRpDVKj0BnK6M1BYDpzVDIhIEsbJ5JHZJUjqaIlUddAmbZipeOImG37J7Lzz-i677si7oFmDZY4tQ9N1q0JEKxHIAkEuIkkmFT4-3O_1JwsULB0rN9j7KK-TGs6aEyrJTvrPdWqOuUwcqB98GMCXBbn_mbiI9TgteDskkxvydrRWPiQipFqO-yf7tHfKYhsUUNZiC2yykbB7QPhO1Q6NBjz_eU1eHlS9c1fS3o9iT8mb32k6GKi7kqir636yu2OzgezzfTaUHrKGHlERJg9V8EMq0hQIEoPA5T8t_jUfHKw0_VvMJN-hC2yyGx7NXv2-hWznNsAfdeZUqSC494CKE8wSpmEVgZ8qBQYUh6UWCqC9EIDHyVBXG5iwLswcLSieGY42oQs9-OoqIbcH25sIDm4gEDnyxVMZfXJ5vWMBjoXoay-Qy_8oWGrAfHQ9jbytA0wRV26kUkoaR4ybJ_5MmwMlUgScckFltn38kQ5dfgTE8luNWCISmx6WmNCjsIi1YPJ3T3dEGi7d6jOsVbRiyxb08YsJQfNLGdFZTlNbuSMU3mhoJ4WLFKwO6OuXbIOmiLXW2CUgd4oYMFuQrrBuE9boCna6DWq9A5Knz2cPSgm5XQ', 'scope': 'openid', 'access_token': 'oAjEPqKKOXb125pc3vYoopxMst-N5dHGB23NY4AKOfI.3-fY_uLwbHEIN0_Qd6o-RXUek1DtrxAFnWOhp7Zx9mw', 'state': 'FjaNENasHBYkbjoT', 'expires_in': 3599, 'token_type': 'bearer'}
2.484 AuthorizationResponse {
"access_token": "oAjEPqKKOXb125pc3vYoopxMst-N5dHGB23NY4AKOfI.3-fY_uLwbHEIN0_Qd6o-RXUek1DtrxAFnWOhp7Zx9mw",
"expires_in": 3599,
"id_token": {
"at_hash": "dFQijBmOgp68QS1iWHLdjQ",
"aud": [
"53c2e340-6dd2-4c14-8075-d057d52ec5c4"
],
"auth_time": 1529752820,
"exp": 1529756549,
"iat": 1529752949,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "4004f3fb-bd90-447f-ab1d-aeeb258fc525",
"nonce": "6dVzL1PmcogMDNqp",
"rat": 1529752948,
"sub": "[email protected]"
},
"scope": "openid",
"state": "FjaNENasHBYkbjoT",
"token_type": "bearer"
}
2.484 phase <--<-- 4 --- AccessToken -->-->
2.484 phase <--<-- 5 --- UserInfo -->-->
2.484 do_user_info_request kwargs:{'state': 'FjaNENasHBYkbjoT', 'method': 'POST', 'authn_method': 'token_in_message_body'}
2.485 request {'body': 'access_token=oAjEPqKKOXb125pc3vYoopxMst-N5dHGB23NY4AKOfI.3-fY_uLwbHEIN0_Qd6o-RXUek1DtrxAFnWOhp7Zx9mw'}
2.485 request_url https://oidc-certification.ory.sh:8443/userinfo
2.485 request_http_args {'headers': {'Content-Type': 'application/x-www-form-urlencoded'}}
2.554 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
2.555 OpenIDSchema {
"sub": "[email protected]"
}
2.555 OpenIDSchema {
"sub": "[email protected]"
}
2.555 phase <--<-- 6 --- Done -->-->
2.555 end
2.556 assertion VerifyResponse
2.556 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.556 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-redirect_uri-Query-Mismatch.txt 0000644 0000000 0000000 00000011121 13313426736 017560 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-Query-Mismatch
Test description: Rejects redirect_uri when query parameter does not match what is registed
Timestamp: 2018-06-23T11:24:14Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.08 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.081 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.081 phase <--<-- 2 --- Registration -->-->
0.082 register kwargs:{'application_name': 'OIC test tool', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'redirect_uri': ['https://op.certification.openid.net:61353/authz_cb?foo=bar']}
0.082 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#75pavYiN1NBRpiP3"
],
"response_types": [
"id_token token"
]
}
0.274 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.275 RegistrationResponse {
"client_id": "226ad5ad-c7e5-4075-9a60-6ca34ebcf7bf",
"client_secret": "2Sd6valERlj8",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "226ad5ad-c7e5-4075-9a60-6ca34ebcf7bf",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#75pavYiN1NBRpiP3"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.275 phase <--<-- 3 --- Note -->-->
============================================================
Conditions
============================================================
RESULT: PARTIAL RESULT
./OP-nonce-noncode.txt 0000644 0000000 0000000 00000022746 13313426651 014772 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-nonce-noncode
Test description: Request with nonce, verifies it was returned in ID Token [Implicit, Hybrid]
Timestamp: 2018-06-23T11:23:21Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.07 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.072 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.072 phase <--<-- 2 --- Registration -->-->
0.072 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.072 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#PbgCX9iEQSOLOUAH"
],
"response_types": [
"id_token token"
]
}
0.235 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.236 RegistrationResponse {
"client_id": "466c4db2-b4d8-4eb7-a1ee-763eca4d3947",
"client_secret": "OXBYQwHx~E6q",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "466c4db2-b4d8-4eb7-a1ee-763eca4d3947",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#PbgCX9iEQSOLOUAH"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.236 phase <--<-- 3 --- AsyncAuthn -->-->
0.237 AuthorizationRequest {
"client_id": "466c4db2-b4d8-4eb7-a1ee-763eca4d3947",
"nonce": "XSjQVny0GBwKqmoc",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token token",
"scope": "openid",
"state": "9LhxUOaMb0hly6Lq"
}
0.237 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=466c4db2-b4d8-4eb7-a1ee-763eca4d3947&state=9LhxUOaMb0hly6Lq&response_type=id_token+token&nonce=XSjQVny0GBwKqmoc
0.237 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=466c4db2-b4d8-4eb7-a1ee-763eca4d3947&state=9LhxUOaMb0hly6Lq&response_type=id_token+token&nonce=XSjQVny0GBwKqmoc
2.711 http args {}
2.884 response URL with fragment
2.884 response access_token=SmDLMPmShDimnCreK5tuJSqdtST64cjBh13oCgXzzUE.mf7VJJAamUwy702f69rDRkI3zVAFj40fGSda88bQVMM&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoid2Y4MlRXUkQwRXJ2T0hRWUhjTENkZyIsImF1ZCI6WyI0NjZjNGRiMi1iNGQ4LTRlYjctYTFlZS03NjNlY2E0ZDM5NDciXSwiYXV0aF90aW1lIjoxNTI5NzUyODIwLCJleHAiOjE1Mjk3NTY2MDAsImlhdCI6MTUyOTc1MzAwMCwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiNWE2Nzg5MGItMjFhNi00OTlmLThiNDctMjM4YjE4M2NmOTMxIiwibm9uY2UiOiJYU2pRVm55MEdCd0txbW9jIiwicmF0IjoxNTI5NzUyOTk4LCJzdWIiOiJmb29AYmFyLmNvbSJ9.TrSai9Ylz2cuN5IgPgUVh0MUHINSSHCw5toWZ1BV0Jyp_yBNQ3ZUCMfHVpoTq8nwV2s5rXZ3OD6aMdN8GimLc7rb0nBjyWO60i6WJP6le4cHGfCLIz6fcl4PZGRNyZHIoulXDVb2gfd0YUMCoFIhGDZrCH-fqGikFlN3qvu7wecWrxCMDCFbhRmO4kBp4I76adLdtEWfn0LVw-n6Yj6ORgNrVowRjllasDdFAkcOzz2vd7Eb4soEp9SUA-4XDVMGDJ_og9wDcoRrmBIMbYGt4iwt1Rv24D9lcT5KoUuN9k15cnkZeqn5e4g800LTL-2qXMEAGITsUGjUxjgus1J7jWhJTWbjccGECp6KntBuUPNFiI6KZCzuvvCwYJRyR_9U_UR1Yrt9OOtip5_vL6tjQgVgMv3nCVGATcV7oAdVVQ56dk__TY79ZWbj97BnSKZjHGlnKLtN3sH2ctU6O5FXh9sTw-hV4wPhUqeBxb1BNnfWWWtbsiC1LDM5-dJEKi1uHKycBHFeGzUXM1p_cCD_58a8yzD0hxqdBRNr4mM55uYCv2jtD49wRqOyKmOI5wfMbHa_2zF00zq7TQKayd0CZ9ek-lwvLYWsnfrGijetWJc9ihZv7egnsCRtfsoGWrd8Mv_OKMlLyDSaV5VMbMarux2Pei7do6fXU2mHSeqGywk&scope=openid&state=9LhxUOaMb0hly6Lq&token_type=bearer
2.885 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoid2Y4MlRXUkQwRXJ2T0hRWUhjTENkZyIsImF1ZCI6WyI0NjZjNGRiMi1iNGQ4LTRlYjctYTFlZS03NjNlY2E0ZDM5NDciXSwiYXV0aF90aW1lIjoxNTI5NzUyODIwLCJleHAiOjE1Mjk3NTY2MDAsImlhdCI6MTUyOTc1MzAwMCwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiNWE2Nzg5MGItMjFhNi00OTlmLThiNDctMjM4YjE4M2NmOTMxIiwibm9uY2UiOiJYU2pRVm55MEdCd0txbW9jIiwicmF0IjoxNTI5NzUyOTk4LCJzdWIiOiJmb29AYmFyLmNvbSJ9.TrSai9Ylz2cuN5IgPgUVh0MUHINSSHCw5toWZ1BV0Jyp_yBNQ3ZUCMfHVpoTq8nwV2s5rXZ3OD6aMdN8GimLc7rb0nBjyWO60i6WJP6le4cHGfCLIz6fcl4PZGRNyZHIoulXDVb2gfd0YUMCoFIhGDZrCH-fqGikFlN3qvu7wecWrxCMDCFbhRmO4kBp4I76adLdtEWfn0LVw-n6Yj6ORgNrVowRjllasDdFAkcOzz2vd7Eb4soEp9SUA-4XDVMGDJ_og9wDcoRrmBIMbYGt4iwt1Rv24D9lcT5KoUuN9k15cnkZeqn5e4g800LTL-2qXMEAGITsUGjUxjgus1J7jWhJTWbjccGECp6KntBuUPNFiI6KZCzuvvCwYJRyR_9U_UR1Yrt9OOtip5_vL6tjQgVgMv3nCVGATcV7oAdVVQ56dk__TY79ZWbj97BnSKZjHGlnKLtN3sH2ctU6O5FXh9sTw-hV4wPhUqeBxb1BNnfWWWtbsiC1LDM5-dJEKi1uHKycBHFeGzUXM1p_cCD_58a8yzD0hxqdBRNr4mM55uYCv2jtD49wRqOyKmOI5wfMbHa_2zF00zq7TQKayd0CZ9ek-lwvLYWsnfrGijetWJc9ihZv7egnsCRtfsoGWrd8Mv_OKMlLyDSaV5VMbMarux2Pei7do6fXU2mHSeqGywk', 'scope': 'openid', 'access_token': 'SmDLMPmShDimnCreK5tuJSqdtST64cjBh13oCgXzzUE.mf7VJJAamUwy702f69rDRkI3zVAFj40fGSda88bQVMM', 'state': '9LhxUOaMb0hly6Lq', 'expires_in': 3599, 'token_type': 'bearer'}
2.974 AuthorizationResponse {
"access_token": "SmDLMPmShDimnCreK5tuJSqdtST64cjBh13oCgXzzUE.mf7VJJAamUwy702f69rDRkI3zVAFj40fGSda88bQVMM",
"expires_in": 3599,
"id_token": {
"at_hash": "wf82TWRD0ErvOHQYHcLCdg",
"aud": [
"466c4db2-b4d8-4eb7-a1ee-763eca4d3947"
],
"auth_time": 1529752820,
"exp": 1529756600,
"iat": 1529753000,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "5a67890b-21a6-499f-8b47-238b183cf931",
"nonce": "XSjQVny0GBwKqmoc",
"rat": 1529752998,
"sub": "[email protected]"
},
"scope": "openid",
"state": "9LhxUOaMb0hly6Lq",
"token_type": "bearer"
}
2.974 phase <--<-- 4 --- AccessToken -->-->
2.974 phase <--<-- 5 --- Done -->-->
2.974 end
2.974 assertion VerifyResponse
2.974 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.975 assertion CheckIdTokenNonce
2.975 condition check-idtoken-nonce: status=OK [Verify that the nonce in the IDToken is the same that's included in the Authorization Request.]
2.975 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
check-idtoken-nonce: status=OK [Verify that the nonce in the IDToken is the same that's included in the Authorization Request.]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Rotation-OP-Sig.txt 0000644 0000000 0000000 00000011554 13313427107 015070 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Rotation-OP-Sig
Test description: Can rotate OP signing keys
Timestamp: 2018-06-23T11:25:59Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.072 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.073 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.073 phase <--<-- 2 --- FetchKeys -->-->
0.145 phase <--<-- 3 --- Note -->-->
3.526 phase <--<-- 4 --- Webfinger -->-->
3.526 not expected to do WebFinger
3.527 phase <--<-- 5 --- Discovery -->-->
3.527 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
3.604 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
3.606 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
3.606 phase <--<-- 6 --- FetchKeys -->-->
3.674 phase <--<-- 7 --- Done -->-->
3.674 end
3.675 assertion CheckHTTPResponse
3.675 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
3.675 assertion NewSigningKeys
3.675 condition new-signing-keys: status=OK [Verifies that two set of signing keys are not the same]
3.675 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
new-signing-keys: status=OK [Verifies that two set of signing keys are not the same]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Req-max_age=10000.txt 0000644 0000000 0000000 00000034347 13313427073 015050 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-max_age=10000
Test description: Requesting ID Token with max_age=10000 seconds restriction
Timestamp: 2018-06-23T11:25:47Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.076 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.077 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.077 phase <--<-- 2 --- Registration -->-->
0.077 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.077 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#MnyILC1IHcBw0p73"
],
"response_types": [
"id_token token"
]
}
0.233 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.233 RegistrationResponse {
"client_id": "2dd2d3b4-19c5-454f-99d3-0ced9a4f62c9",
"client_secret": "sM0WVJxmch7Y",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "2dd2d3b4-19c5-454f-99d3-0ced9a4f62c9",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#MnyILC1IHcBw0p73"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.234 phase <--<-- 3 --- AsyncAuthn -->-->
0.234 AuthorizationRequest {
"client_id": "2dd2d3b4-19c5-454f-99d3-0ced9a4f62c9",
"nonce": "NcXFVldfHvTA1YPB",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token token",
"scope": "openid",
"state": "ClWCuc8QI2b6X9c1"
}
0.234 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=2dd2d3b4-19c5-454f-99d3-0ced9a4f62c9&state=ClWCuc8QI2b6X9c1&response_type=id_token+token&nonce=NcXFVldfHvTA1YPB
0.234 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=2dd2d3b4-19c5-454f-99d3-0ced9a4f62c9&state=ClWCuc8QI2b6X9c1&response_type=id_token+token&nonce=NcXFVldfHvTA1YPB
2.535 http args {}
2.744 response URL with fragment
2.745 response access_token=RmEektn7y-gaBfCOgVyaiihgfwXT55YPAqWjkuBarGI.Fsu5ljeJb9hvTOsVoGLCMX-BttxrvHW-FYq1PNN-wdY&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiaHZwSG5ZVTZYbkpVSUw4OHhYdHV5dyIsImF1ZCI6WyIyZGQyZDNiNC0xOWM1LTQ1NGYtOTlkMy0wY2VkOWE0ZjYyYzkiXSwiYXV0aF90aW1lIjoxNTI5NzUzMTM2LCJleHAiOjE1Mjk3NTY3NDUsImlhdCI6MTUyOTc1MzE0NSwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiYmUyMDU2OTktZGYzMC00ZDJiLWI3OGEtNTFmNDcyZjFmOThmIiwibm9uY2UiOiJOY1hGVmxkZkh2VEExWVBCIiwicmF0IjoxNTI5NzUzMTQzLCJzdWIiOiJmb29AYmFyLmNvbSJ9.hwrjymLYG4ejKPFv2KtIZQlj9VuWtLO9weHzWK-hC9E6zu8tqLNNM4kExN9d8PCTSpRmWUUM5PDXnjTou41XFd55E14KStLhVv9YMK2MFCmBwfC-AIsJ7rG_1CUdH7UgXAowfzreCG2_cOxdcH9Z49A-W9HCwmOz6kCgHvuTHmwC_4FoCtux1Wvy3UgF14LBjZGQuqFCgbFQCry5ed6v7a9T8Ax3YM3gbIw7TLTIRTLumKJ5v4NNZ_R_jMCY6ydlF6PwoQ8_wELnU1Op0Qiu5jOxJj9XsO-KHLi77080ndf6YJ5_oVZcU-GJ7U4TGITRuT2NIi0KtW_bXOdtsQNh2KGe1ldd50smkH-2VfNA3kh4KJ_IjFlCRLQcDkcfs9DFhZtblam0nI516fE7jRZFlkhFNBovhoZNnL7Th4TcBSVaU9_3nHOyFavQ2bTSYy3_E4_YnBbaIzXPv_tV6j8paDB7HvD3HrYHwfdKv4ZLg9rK_seHWceszKoLimySsNqU0hV229mgS0iWOSohXL32GnYyz4dXdVJY9icvyv1CkcZpvxie7RNybcbwGwpu3MlcDq_1HjX1DxAQJP9slRfLczgf6qUy5Idepx3FKrs4w3TOtMyOlBZ8tkx9AdbktsKoK2bw11qsOLxqvhP61h9c8BQm-PwuQMkGl8SmlWoWwPg&scope=openid&state=ClWCuc8QI2b6X9c1&token_type=bearer
2.745 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiaHZwSG5ZVTZYbkpVSUw4OHhYdHV5dyIsImF1ZCI6WyIyZGQyZDNiNC0xOWM1LTQ1NGYtOTlkMy0wY2VkOWE0ZjYyYzkiXSwiYXV0aF90aW1lIjoxNTI5NzUzMTM2LCJleHAiOjE1Mjk3NTY3NDUsImlhdCI6MTUyOTc1MzE0NSwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiYmUyMDU2OTktZGYzMC00ZDJiLWI3OGEtNTFmNDcyZjFmOThmIiwibm9uY2UiOiJOY1hGVmxkZkh2VEExWVBCIiwicmF0IjoxNTI5NzUzMTQzLCJzdWIiOiJmb29AYmFyLmNvbSJ9.hwrjymLYG4ejKPFv2KtIZQlj9VuWtLO9weHzWK-hC9E6zu8tqLNNM4kExN9d8PCTSpRmWUUM5PDXnjTou41XFd55E14KStLhVv9YMK2MFCmBwfC-AIsJ7rG_1CUdH7UgXAowfzreCG2_cOxdcH9Z49A-W9HCwmOz6kCgHvuTHmwC_4FoCtux1Wvy3UgF14LBjZGQuqFCgbFQCry5ed6v7a9T8Ax3YM3gbIw7TLTIRTLumKJ5v4NNZ_R_jMCY6ydlF6PwoQ8_wELnU1Op0Qiu5jOxJj9XsO-KHLi77080ndf6YJ5_oVZcU-GJ7U4TGITRuT2NIi0KtW_bXOdtsQNh2KGe1ldd50smkH-2VfNA3kh4KJ_IjFlCRLQcDkcfs9DFhZtblam0nI516fE7jRZFlkhFNBovhoZNnL7Th4TcBSVaU9_3nHOyFavQ2bTSYy3_E4_YnBbaIzXPv_tV6j8paDB7HvD3HrYHwfdKv4ZLg9rK_seHWceszKoLimySsNqU0hV229mgS0iWOSohXL32GnYyz4dXdVJY9icvyv1CkcZpvxie7RNybcbwGwpu3MlcDq_1HjX1DxAQJP9slRfLczgf6qUy5Idepx3FKrs4w3TOtMyOlBZ8tkx9AdbktsKoK2bw11qsOLxqvhP61h9c8BQm-PwuQMkGl8SmlWoWwPg', 'scope': 'openid', 'access_token': 'RmEektn7y-gaBfCOgVyaiihgfwXT55YPAqWjkuBarGI.Fsu5ljeJb9hvTOsVoGLCMX-BttxrvHW-FYq1PNN-wdY', 'state': 'ClWCuc8QI2b6X9c1', 'expires_in': 3599, 'token_type': 'bearer'}
2.826 AuthorizationResponse {
"access_token": "RmEektn7y-gaBfCOgVyaiihgfwXT55YPAqWjkuBarGI.Fsu5ljeJb9hvTOsVoGLCMX-BttxrvHW-FYq1PNN-wdY",
"expires_in": 3599,
"id_token": {
"at_hash": "hvpHnYU6XnJUIL88xXtuyw",
"aud": [
"2dd2d3b4-19c5-454f-99d3-0ced9a4f62c9"
],
"auth_time": 1529753136,
"exp": 1529756745,
"iat": 1529753145,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "be205699-df30-4d2b-b78a-51f472f1f98f",
"nonce": "NcXFVldfHvTA1YPB",
"rat": 1529753143,
"sub": "[email protected]"
},
"scope": "openid",
"state": "ClWCuc8QI2b6X9c1",
"token_type": "bearer"
}
2.826 phase <--<-- 4 --- AccessToken -->-->
2.826 phase <--<-- 5 --- AsyncAuthn -->-->
2.827 AuthorizationRequest {
"client_id": "2dd2d3b4-19c5-454f-99d3-0ced9a4f62c9",
"max_age": 10000,
"nonce": "ScOso8MJzxX2pTz5",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token token",
"scope": "openid",
"state": "Fz4JT2Ohv7VoMCQ5"
}
2.827 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?max_age=10000&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=2dd2d3b4-19c5-454f-99d3-0ced9a4f62c9&state=Fz4JT2Ohv7VoMCQ5&response_type=id_token+token&nonce=ScOso8MJzxX2pTz5
2.827 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?max_age=10000&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=2dd2d3b4-19c5-454f-99d3-0ced9a4f62c9&state=Fz4JT2Ohv7VoMCQ5&response_type=id_token+token&nonce=ScOso8MJzxX2pTz5
3.854 http args {}
4.046 response URL with fragment
4.046 response access_token=fzzYsA4QkVpNY3vX_kSAnkeUPygdSB5APHpGHchyGgQ.FwZloHIFWzhQv9u3A5TBmmTgfJgvioOASzRRiTy2WWM&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoidFRfMlk3c3JndUZIWGJQQ0ZNbm03dyIsImF1ZCI6WyIyZGQyZDNiNC0xOWM1LTQ1NGYtOTlkMy0wY2VkOWE0ZjYyYzkiXSwiYXV0aF90aW1lIjoxNTI5NzUzMTM2LCJleHAiOjE1Mjk3NTY3NDYsImlhdCI6MTUyOTc1MzE0NiwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiNTc3OGZkYWQtYjA3YS00MzMwLWFjYjctMmU3NTgxZDk2OTU3Iiwibm9uY2UiOiJTY09zbzhNSnp4WDJwVHo1IiwicmF0IjoxNTI5NzUzMTQ1LCJzdWIiOiJmb29AYmFyLmNvbSJ9.VAGSv-tiETwB7GBMP3PiWhARgw551J_LyyW1l6yA8_ms04iOeRLd-KN6A5w45SSgvpwMQnyxypQRC33TlJQBT2p3a8JvvXKFfVVZjQ4XkmUYBXMzTnc6yz2ReVcmEceeL4h8Fm8Ghf4-Bi15uC9r1tDxWTFI96rwZohI179nKS3a_08xCsgvtPYg5NUMDwyYCA1MLcHw1ETuU9wRAHgKDbNY-CjHGSBB3Qlpdv1EV08wnvvKWUIoBmTWNBwjoKn_XZ7jCAbzjdAk9qIlZlEqrcfKkb3sirm2Eys2sbKRcAeafcViZqW25O5b24uO0Qjk1BOs2T4VdIV0TQLiSO4KcLm-5fQ2V5LGv3nA7U4Czsv7-21Ntnv8jtGR5Mg7hS64MCqnxbYfk3jFDMahT9eNXfCR8pTCZ8SarAIzfJbabXcN-gwRPPRDRZNYSfpNpv7Q6e6GQJp0CJN2y3jpbsfkc9KmTxJB3NCB1t1W7St67grD-BqCuOkEH0xvgSeT3-kqEr6VwxKssdE4JDOhDmDxDhhHZNSVlK3F5iJpLQchz_r4rGqeCZs-pqQTvnrLSHFhhAEl0X9TtTrByX8-bzXMgECaYDTaopJ8ODNOJIo477jRRl3y_NrppNrtIxjxe7fDWd5QTh_fxEzvvVoRcWslAs7HI6Q0zpGXqeB46N3qeRg&scope=openid&state=Fz4JT2Ohv7VoMCQ5&token_type=bearer
4.047 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoidFRfMlk3c3JndUZIWGJQQ0ZNbm03dyIsImF1ZCI6WyIyZGQyZDNiNC0xOWM1LTQ1NGYtOTlkMy0wY2VkOWE0ZjYyYzkiXSwiYXV0aF90aW1lIjoxNTI5NzUzMTM2LCJleHAiOjE1Mjk3NTY3NDYsImlhdCI6MTUyOTc1MzE0NiwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiNTc3OGZkYWQtYjA3YS00MzMwLWFjYjctMmU3NTgxZDk2OTU3Iiwibm9uY2UiOiJTY09zbzhNSnp4WDJwVHo1IiwicmF0IjoxNTI5NzUzMTQ1LCJzdWIiOiJmb29AYmFyLmNvbSJ9.VAGSv-tiETwB7GBMP3PiWhARgw551J_LyyW1l6yA8_ms04iOeRLd-KN6A5w45SSgvpwMQnyxypQRC33TlJQBT2p3a8JvvXKFfVVZjQ4XkmUYBXMzTnc6yz2ReVcmEceeL4h8Fm8Ghf4-Bi15uC9r1tDxWTFI96rwZohI179nKS3a_08xCsgvtPYg5NUMDwyYCA1MLcHw1ETuU9wRAHgKDbNY-CjHGSBB3Qlpdv1EV08wnvvKWUIoBmTWNBwjoKn_XZ7jCAbzjdAk9qIlZlEqrcfKkb3sirm2Eys2sbKRcAeafcViZqW25O5b24uO0Qjk1BOs2T4VdIV0TQLiSO4KcLm-5fQ2V5LGv3nA7U4Czsv7-21Ntnv8jtGR5Mg7hS64MCqnxbYfk3jFDMahT9eNXfCR8pTCZ8SarAIzfJbabXcN-gwRPPRDRZNYSfpNpv7Q6e6GQJp0CJN2y3jpbsfkc9KmTxJB3NCB1t1W7St67grD-BqCuOkEH0xvgSeT3-kqEr6VwxKssdE4JDOhDmDxDhhHZNSVlK3F5iJpLQchz_r4rGqeCZs-pqQTvnrLSHFhhAEl0X9TtTrByX8-bzXMgECaYDTaopJ8ODNOJIo477jRRl3y_NrppNrtIxjxe7fDWd5QTh_fxEzvvVoRcWslAs7HI6Q0zpGXqeB46N3qeRg', 'scope': 'openid', 'access_token': 'fzzYsA4QkVpNY3vX_kSAnkeUPygdSB5APHpGHchyGgQ.FwZloHIFWzhQv9u3A5TBmmTgfJgvioOASzRRiTy2WWM', 'state': 'Fz4JT2Ohv7VoMCQ5', 'expires_in': 3599, 'token_type': 'bearer'}
4.05 AuthorizationResponse {
"access_token": "fzzYsA4QkVpNY3vX_kSAnkeUPygdSB5APHpGHchyGgQ.FwZloHIFWzhQv9u3A5TBmmTgfJgvioOASzRRiTy2WWM",
"expires_in": 3599,
"id_token": {
"at_hash": "tT_2Y7srguFHXbPCFMnm7w",
"aud": [
"2dd2d3b4-19c5-454f-99d3-0ced9a4f62c9"
],
"auth_time": 1529753136,
"exp": 1529756746,
"iat": 1529753146,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "5778fdad-b07a-4330-acb7-2e7581d96957",
"nonce": "ScOso8MJzxX2pTz5",
"rat": 1529753145,
"sub": "[email protected]"
},
"scope": "openid",
"state": "Fz4JT2Ohv7VoMCQ5",
"token_type": "bearer"
}
4.05 phase <--<-- 6 --- AccessToken -->-->
4.05 phase <--<-- 7 --- Done -->-->
4.05 end
4.051 assertion AuthTimeCheck
4.051 condition auth_time-check: status=OK [Check that the auth_time returned in the ID Token is in the expected range.]
4.051 assertion VerifyResponse
4.051 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.052 assertion SameAuthn
4.052 condition same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
4.052 assertion ClaimsCheck
4.052 condition claims-check: status=OK [Checks if specific claims is present or not]
4.052 condition Done: status=OK
============================================================
Conditions
auth_time-check: status=OK [Check that the auth_time returned in the ID Token is in the expected range.]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
claims-check: status=OK [Checks if specific claims is present or not]
Done: status=OK
============================================================
RESULT: PASSED
./OP-request-Unsigned.txt 0000644 0000000 0000000 00000024432 13313426754 015505 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-request-Unsigned
Test description: Support request request parameter with unsigned request
Timestamp: 2018-06-23T11:24:28Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.075 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.077 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.077 phase <--<-- 2 --- Registration -->-->
0.077 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'request_object_signing_alg': 'none'}
0.077 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "none",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#psYiPxSPbGlARfs9"
],
"response_types": [
"id_token token"
]
}
0.245 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.246 RegistrationResponse {
"client_id": "e5472f01-9ae3-4bbb-9aea-ed8e6fa69683",
"client_secret": "NRg63dTE_XEA",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "e5472f01-9ae3-4bbb-9aea-ed8e6fa69683",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "none",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#psYiPxSPbGlARfs9"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.246 phase <--<-- 3 --- AsyncAuthn -->-->
0.247 AuthorizationRequest {
"client_id": "e5472f01-9ae3-4bbb-9aea-ed8e6fa69683",
"nonce": "bK6rp1RBAwqs3EFG",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"request": "eyJhbGciOiJub25lIn0.eyJzY29wZSI6ICJvcGVuaWQiLCAicmVkaXJlY3RfdXJpIjogImh0dHBzOi8vb3AuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0OjYxMzUzL2F1dGh6X2NiIiwgImNsaWVudF9pZCI6ICJlNTQ3MmYwMS05YWUzLTRiYmItOWFlYS1lZDhlNmZhNjk2ODMiLCAic3RhdGUiOiAiUGVFTDFtSXRQREs1UzZMMiIsICJyZXNwb25zZV90eXBlIjogImlkX3Rva2VuIHRva2VuIiwgIm5vbmNlIjogImJLNnJwMVJCQXdxczNFRkcifQ.",
"response_type": "id_token token",
"scope": "openid",
"state": "PeEL1mItPDK5S6L2"
}
0.247 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=e5472f01-9ae3-4bbb-9aea-ed8e6fa69683&response_type=id_token+token&state=PeEL1mItPDK5S6L2&request=eyJhbGciOiJub25lIn0.eyJzY29wZSI6ICJvcGVuaWQiLCAicmVkaXJlY3RfdXJpIjogImh0dHBzOi8vb3AuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0OjYxMzUzL2F1dGh6X2NiIiwgImNsaWVudF9pZCI6ICJlNTQ3MmYwMS05YWUzLTRiYmItOWFlYS1lZDhlNmZhNjk2ODMiLCAic3RhdGUiOiAiUGVFTDFtSXRQREs1UzZMMiIsICJyZXNwb25zZV90eXBlIjogImlkX3Rva2VuIHRva2VuIiwgIm5vbmNlIjogImJLNnJwMVJCQXdxczNFRkcifQ.&nonce=bK6rp1RBAwqs3EFG
0.247 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=e5472f01-9ae3-4bbb-9aea-ed8e6fa69683&response_type=id_token+token&state=PeEL1mItPDK5S6L2&request=eyJhbGciOiJub25lIn0.eyJzY29wZSI6ICJvcGVuaWQiLCAicmVkaXJlY3RfdXJpIjogImh0dHBzOi8vb3AuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0OjYxMzUzL2F1dGh6X2NiIiwgImNsaWVudF9pZCI6ICJlNTQ3MmYwMS05YWUzLTRiYmItOWFlYS1lZDhlNmZhNjk2ODMiLCAic3RhdGUiOiAiUGVFTDFtSXRQREs1UzZMMiIsICJyZXNwb25zZV90eXBlIjogImlkX3Rva2VuIHRva2VuIiwgIm5vbmNlIjogImJLNnJwMVJCQXdxczNFRkcifQ.&nonce=bK6rp1RBAwqs3EFG
3.071 http args {}
3.241 response URL with fragment
3.241 response access_token=u12FExgpEQAowqlYkZG1c2X-XeSWQ3x-E8m8NvhbnZI.-FcTeBqBgaqkBAJtnxJaRzpyvbnuQLgIgXDiMQ5Sv28&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiSzlzeGF6N0JpV1FiZm1qU3U5V3NPZyIsImF1ZCI6WyJlNTQ3MmYwMS05YWUzLTRiYmItOWFlYS1lZDhlNmZhNjk2ODMiXSwiYXV0aF90aW1lIjoxNTI5NzUzMDA5LCJleHAiOjE1Mjk3NTY2NjgsImlhdCI6MTUyOTc1MzA2OCwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiNzg4Y2MyMDItODRiNy00YTZhLTliNmQtOGVlZmM5MzgxMjRjIiwibm9uY2UiOiJiSzZycDFSQkF3cXMzRUZHIiwicmF0IjoxNTI5NzUzMDY1LCJzdWIiOiJmb29AYmFyLmNvbSJ9.H3jhBx0hZdEUYTnABRC65wcHFwQDT4YfYZWrgFGT-DicqzsKw1J7PF5B1jVMsagzmeiObhiVqgEEIXPsh6o3dcQnOEihcA78CzjBf6FkDYPIVQudBwPofEV-Me9FiIyJ_PXnzo29EM9S5Py4ABhWJGcZL6Kbgep2KJ_Z5TGQ9NgZPO4TrH9Ss1AB1SyFvETDn2cXVD3MbZAvabloZST_4JBtvHA14ORA9TRkhp4zG6h9xJ6_L-rfcpBUMLB1knz7RBIHobOnXO7Bk3EqHHg7aOaZJj7jFAteb3KQfWp9AvxZYMXzWnAXp3JX3BXy6k6UCNcLF_BXMmBAQUeMFgc9DAvztJmXYA4FurdJdjrFLeWOcoWWZ8ZiCw8psdFLUZjy6toKT_Geunh6Wq4mx9eOSGd4PMGTGS9SEqvJEIL_U9_AEdX1ZWpF1k0lsD0eJ3DNUIPMI5PWodGGjA3Xd2w_xS9T5UPshMS8xbxVt2MYwOdCzk31jBB5tUGtwCvu4U6SQGLejEo7aIU_Tij1izhuHpbrfrj_VtdbqiGMps-rxekLF6mZ89rZu0XtUWbu48iZqUeA2azQAZqQrxNxQ-tVRn9Mmov5XNde87TJf5oMcg3lL0kFJy8CvUmdX0XsNAoYwTJNdwaCpOVGs100fYB2afxwkY_rKyn01Jj9B6dcdhY&scope=openid&state=PeEL1mItPDK5S6L2&token_type=bearer
3.241 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiSzlzeGF6N0JpV1FiZm1qU3U5V3NPZyIsImF1ZCI6WyJlNTQ3MmYwMS05YWUzLTRiYmItOWFlYS1lZDhlNmZhNjk2ODMiXSwiYXV0aF90aW1lIjoxNTI5NzUzMDA5LCJleHAiOjE1Mjk3NTY2NjgsImlhdCI6MTUyOTc1MzA2OCwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiNzg4Y2MyMDItODRiNy00YTZhLTliNmQtOGVlZmM5MzgxMjRjIiwibm9uY2UiOiJiSzZycDFSQkF3cXMzRUZHIiwicmF0IjoxNTI5NzUzMDY1LCJzdWIiOiJmb29AYmFyLmNvbSJ9.H3jhBx0hZdEUYTnABRC65wcHFwQDT4YfYZWrgFGT-DicqzsKw1J7PF5B1jVMsagzmeiObhiVqgEEIXPsh6o3dcQnOEihcA78CzjBf6FkDYPIVQudBwPofEV-Me9FiIyJ_PXnzo29EM9S5Py4ABhWJGcZL6Kbgep2KJ_Z5TGQ9NgZPO4TrH9Ss1AB1SyFvETDn2cXVD3MbZAvabloZST_4JBtvHA14ORA9TRkhp4zG6h9xJ6_L-rfcpBUMLB1knz7RBIHobOnXO7Bk3EqHHg7aOaZJj7jFAteb3KQfWp9AvxZYMXzWnAXp3JX3BXy6k6UCNcLF_BXMmBAQUeMFgc9DAvztJmXYA4FurdJdjrFLeWOcoWWZ8ZiCw8psdFLUZjy6toKT_Geunh6Wq4mx9eOSGd4PMGTGS9SEqvJEIL_U9_AEdX1ZWpF1k0lsD0eJ3DNUIPMI5PWodGGjA3Xd2w_xS9T5UPshMS8xbxVt2MYwOdCzk31jBB5tUGtwCvu4U6SQGLejEo7aIU_Tij1izhuHpbrfrj_VtdbqiGMps-rxekLF6mZ89rZu0XtUWbu48iZqUeA2azQAZqQrxNxQ-tVRn9Mmov5XNde87TJf5oMcg3lL0kFJy8CvUmdX0XsNAoYwTJNdwaCpOVGs100fYB2afxwkY_rKyn01Jj9B6dcdhY', 'scope': 'openid', 'access_token': 'u12FExgpEQAowqlYkZG1c2X-XeSWQ3x-E8m8NvhbnZI.-FcTeBqBgaqkBAJtnxJaRzpyvbnuQLgIgXDiMQ5Sv28', 'state': 'PeEL1mItPDK5S6L2', 'expires_in': 3599, 'token_type': 'bearer'}
3.334 AuthorizationResponse {
"access_token": "u12FExgpEQAowqlYkZG1c2X-XeSWQ3x-E8m8NvhbnZI.-FcTeBqBgaqkBAJtnxJaRzpyvbnuQLgIgXDiMQ5Sv28",
"expires_in": 3599,
"id_token": {
"at_hash": "K9sxaz7BiWQbfmjSu9WsOg",
"aud": [
"e5472f01-9ae3-4bbb-9aea-ed8e6fa69683"
],
"auth_time": 1529753009,
"exp": 1529756668,
"iat": 1529753068,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "788cc202-84b7-4a6a-9b6d-8eefc938124c",
"nonce": "bK6rp1RBAwqs3EFG",
"rat": 1529753065,
"sub": "[email protected]"
},
"scope": "openid",
"state": "PeEL1mItPDK5S6L2",
"token_type": "bearer"
}
3.334 phase <--<-- 4 --- Done -->-->
3.334 end
3.335 assertion VerifyAuthnOrErrorResponse
3.335 condition authn-response-or-error: status=OK [Checks that the last response was a JSON encoded authentication or error message]
3.335 condition Done: status=OK
============================================================
Conditions
authn-response-or-error: status=OK [Checks that the last response was a JSON encoded authentication or error message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Discovery-claims_supported.txt 0000644 0000000 0000000 00000005777 13313426507 017574 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Discovery-claims_supported
Test description: Verify that claims_supported is published
Timestamp: 2018-06-23T11:21:43Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.074 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Done -->-->
0.075 end
0.076 assertion CheckHTTPResponse
0.076 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.076 assertion CheckHasClaimsSupported
0.076 condition providerinfo-has-claims_supported: status=OK [Check that the claims_supported discovery metadata value is in the provider_info]
0.076 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
providerinfo-has-claims_supported: status=OK [Check that the claims_supported discovery metadata value is in the provider_info]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Response-id_token+token.txt 0000644 0000000 0000000 00000022151 13313426504 016734 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Response-id_token+token
Test description: Request with response_type=id_token token
Timestamp: 2018-06-23T11:21:40Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.434 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.436 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.436 phase <--<-- 2 --- Registration -->-->
0.436 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.436 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#D0ZHxpdw7CYePHse"
],
"response_types": [
"id_token token"
]
}
0.656 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.657 RegistrationResponse {
"client_id": "eaa7ef2d-f729-445e-af60-b25ab1655ba9",
"client_secret": "z915PoHwaL-s",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "eaa7ef2d-f729-445e-af60-b25ab1655ba9",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#D0ZHxpdw7CYePHse"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.657 phase <--<-- 3 --- AsyncAuthn -->-->
0.658 AuthorizationRequest {
"client_id": "eaa7ef2d-f729-445e-af60-b25ab1655ba9",
"nonce": "4NYPEpq5MIoAttgJ",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token token",
"scope": "openid",
"state": "bIryac8DwZNcSQsq"
}
0.658 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=eaa7ef2d-f729-445e-af60-b25ab1655ba9&state=bIryac8DwZNcSQsq&response_type=id_token+token&nonce=4NYPEpq5MIoAttgJ
0.658 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=eaa7ef2d-f729-445e-af60-b25ab1655ba9&state=bIryac8DwZNcSQsq&response_type=id_token+token&nonce=4NYPEpq5MIoAttgJ
3.357 http args {}
3.53 response URL with fragment
3.531 response access_token=SYqFfh5omnTHkpTpNvY7Xc8PuKHOp-H5qD_V_2L-c34.TCiF3Br3rQtattdngBeyqKjP71NqH2dgyEm9aUjl1pY&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiTTdjM19sYlU2OW1ZY201eDRTTFZLdyIsImF1ZCI6WyJlYWE3ZWYyZC1mNzI5LTQ0NWUtYWY2MC1iMjVhYjE2NTViYTkiXSwiYXV0aF90aW1lIjoxNTI5NzUyODIwLCJleHAiOjE1Mjk3NTY1MDAsImlhdCI6MTUyOTc1MjkwMCwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiYWQ4MTUxYjYtMTlhYi00ZGFjLTlhMWMtZjNiMTYyZjM1MTlmIiwibm9uY2UiOiI0TllQRXBxNU1Jb0F0dGdKIiwicmF0IjoxNTI5NzUyODk3LCJzdWIiOiJmb29AYmFyLmNvbSJ9.MHcQbDoJ6HsFMtLf4cOEJz6yICTk_T4sKRMrkNA0VY9FA2y5qef1tQWiJo52AP-7w2VRW_s84IGDH9gdNb-6EZJZV9sfxD4iqdnwiSOqqZpr0yFEb-1tomsBGXUy9Y73mpLa3oJYPWtjm9hKnu724YJ0GqOE2VQLZG1flZr0Z2bBOcbtjZBPhb7-KDSCJvHLPlLM6hlo86au5Vhj5FGyEYWoc2df9y1sXrKNjeX80z7YjlITphiSwSeDL3hzrMHONl9Cl7I5_r-R2JcN2kEHvk9b0Dj61IC9gjvgDf8dqnE6mu1SHXZFXcif4e6gGH5ogEjuAGndKMkceKZw9qCxK2A0LB05l8jLRCAWtb2gTE1LKJ3x9MXb8OkYMtsvEzekw6Ox2qpYULEwyV5qdAyJT3SDhipoH5toUWsGxCTMo_nEuqapX5a27HCNaBOYSdJDR6-v2xr383lHYAJEdcKl93lvNCoNmEOaw1U_jjSGU8ri4j_dSfmzLaY2dIVPZToJGmoIZ5qrJACsnUrJVE1BHVrdzlJx6dJcKWauYajMLaPVTuRkGYVUvWkmyRTTOOlDSxesnfIfp6K9cc4FRothbjfNZiMcTzspbqpalcn51Q48PtsrtHTowcDoAoMTrl9rKmQoZo6-2E-WAjWKoyuXwIsDGxd2Xw40t_GbGozSwpU&scope=openid&state=bIryac8DwZNcSQsq&token_type=bearer
3.531 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiTTdjM19sYlU2OW1ZY201eDRTTFZLdyIsImF1ZCI6WyJlYWE3ZWYyZC1mNzI5LTQ0NWUtYWY2MC1iMjVhYjE2NTViYTkiXSwiYXV0aF90aW1lIjoxNTI5NzUyODIwLCJleHAiOjE1Mjk3NTY1MDAsImlhdCI6MTUyOTc1MjkwMCwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiYWQ4MTUxYjYtMTlhYi00ZGFjLTlhMWMtZjNiMTYyZjM1MTlmIiwibm9uY2UiOiI0TllQRXBxNU1Jb0F0dGdKIiwicmF0IjoxNTI5NzUyODk3LCJzdWIiOiJmb29AYmFyLmNvbSJ9.MHcQbDoJ6HsFMtLf4cOEJz6yICTk_T4sKRMrkNA0VY9FA2y5qef1tQWiJo52AP-7w2VRW_s84IGDH9gdNb-6EZJZV9sfxD4iqdnwiSOqqZpr0yFEb-1tomsBGXUy9Y73mpLa3oJYPWtjm9hKnu724YJ0GqOE2VQLZG1flZr0Z2bBOcbtjZBPhb7-KDSCJvHLPlLM6hlo86au5Vhj5FGyEYWoc2df9y1sXrKNjeX80z7YjlITphiSwSeDL3hzrMHONl9Cl7I5_r-R2JcN2kEHvk9b0Dj61IC9gjvgDf8dqnE6mu1SHXZFXcif4e6gGH5ogEjuAGndKMkceKZw9qCxK2A0LB05l8jLRCAWtb2gTE1LKJ3x9MXb8OkYMtsvEzekw6Ox2qpYULEwyV5qdAyJT3SDhipoH5toUWsGxCTMo_nEuqapX5a27HCNaBOYSdJDR6-v2xr383lHYAJEdcKl93lvNCoNmEOaw1U_jjSGU8ri4j_dSfmzLaY2dIVPZToJGmoIZ5qrJACsnUrJVE1BHVrdzlJx6dJcKWauYajMLaPVTuRkGYVUvWkmyRTTOOlDSxesnfIfp6K9cc4FRothbjfNZiMcTzspbqpalcn51Q48PtsrtHTowcDoAoMTrl9rKmQoZo6-2E-WAjWKoyuXwIsDGxd2Xw40t_GbGozSwpU', 'scope': 'openid', 'access_token': 'SYqFfh5omnTHkpTpNvY7Xc8PuKHOp-H5qD_V_2L-c34.TCiF3Br3rQtattdngBeyqKjP71NqH2dgyEm9aUjl1pY', 'state': 'bIryac8DwZNcSQsq', 'expires_in': 3599, 'token_type': 'bearer'}
3.646 AuthorizationResponse {
"access_token": "SYqFfh5omnTHkpTpNvY7Xc8PuKHOp-H5qD_V_2L-c34.TCiF3Br3rQtattdngBeyqKjP71NqH2dgyEm9aUjl1pY",
"expires_in": 3599,
"id_token": {
"at_hash": "M7c3_lbU69mYcm5x4SLVKw",
"aud": [
"eaa7ef2d-f729-445e-af60-b25ab1655ba9"
],
"auth_time": 1529752820,
"exp": 1529756500,
"iat": 1529752900,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "ad8151b6-19ab-4dac-9a1c-f3b162f3519f",
"nonce": "4NYPEpq5MIoAttgJ",
"rat": 1529752897,
"sub": "[email protected]"
},
"scope": "openid",
"state": "bIryac8DwZNcSQsq",
"token_type": "bearer"
}
3.647 phase <--<-- 4 --- Done -->-->
3.647 end
3.647 assertion VerifyAuthnResponse
3.647 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
3.647 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Registration-logo_uri.txt 0000644 0000000 0000000 00000022544 13313426525 016530 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-logo_uri
Test description: Registration with logo_uri
Timestamp: 2018-06-23T11:21:57Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.266 phase <--<-- 1 --- Webfinger -->-->
1.266 not expected to do WebFinger
1.266 phase <--<-- 2 --- Discovery -->-->
1.266 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.344 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.345 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.345 phase <--<-- 3 --- Registration -->-->
1.345 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'logo_uri': 'https://op.certification.openid.net:61353/static/logo.png'}
1.346 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"logo_uri": "https://op.certification.openid.net:61353/static/logo.png",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#89RBawEeZwmFCMcE"
],
"response_types": [
"id_token token"
]
}
1.538 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.539 RegistrationResponse {
"client_id": "89a8aa38-497f-4113-a08b-a3f376464db3",
"client_secret": "n5n.CWFBAM9R",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "89a8aa38-497f-4113-a08b-a3f376464db3",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"logo_uri": "https://op.certification.openid.net:61353/static/logo.png",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#89RBawEeZwmFCMcE"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.539 phase <--<-- 4 --- AsyncAuthn -->-->
1.54 AuthorizationRequest {
"client_id": "89a8aa38-497f-4113-a08b-a3f376464db3",
"nonce": "Hx2m0oTJex8soKX8",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token token",
"scope": "openid",
"state": "UDrgwrFmn2loOCYj"
}
1.54 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=89a8aa38-497f-4113-a08b-a3f376464db3&state=UDrgwrFmn2loOCYj&response_type=id_token+token&nonce=Hx2m0oTJex8soKX8
1.54 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=89a8aa38-497f-4113-a08b-a3f376464db3&state=UDrgwrFmn2loOCYj&response_type=id_token+token&nonce=Hx2m0oTJex8soKX8
6.994 http args {}
7.167 response URL with fragment
7.168 response access_token=aKUfv6yL9jVy7bFOaxy5BMV-p8ilXGDB1tkcYJ5ImFE.weB1RNxINn7iDW78AAi163d1EYsjkTWKOkySC4oQzRw&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiY2FWUl9NeEl5MUYydHVOZXBUNnl4QSIsImF1ZCI6WyI4OWE4YWEzOC00OTdmLTQxMTMtYTA4Yi1hM2YzNzY0NjRkYjMiXSwiYXV0aF90aW1lIjoxNTI5NzUyODIwLCJleHAiOjE1Mjk3NTY1MTYsImlhdCI6MTUyOTc1MjkxNiwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiMzJiZDJjMWMtN2JhMy00NWRmLWJjNDAtYmM1ZTRkYzM2N2Q5Iiwibm9uY2UiOiJIeDJtMG9USmV4OHNvS1g4IiwicmF0IjoxNTI5NzUyOTEyLCJzdWIiOiJmb29AYmFyLmNvbSJ9.ZQxsF_7jzy_3V2yDCwkUzF33-QF31QVK1OyoFmPFrEGyzU5MM_MnPqtheAXCHFJjllMy73niqIjz2eO-gYMrM6MK8Hr5a61B4Sn3b9WjsfGN-M7DSIDInb0kEHffXTIwI262U9tpD5jIroB-yTo7PH0BopX3o_onVMlc70ZyQVKEpHZag7ZG6o7WTmJmSXC90XTqfdn3RxMVAS9bhjBTVYcK893wAvRzxumqVYFFjUwtUsgMQOVNAQmwjdpT6ksJyUbi8MfeOYmN7adxyZK0wJJ8mfS6-hZSAvbwSgVedbsw7KijkkyRVt1h7m98vUERZhRutd5Vc69hu4JCdRwOl2cJipIT-3EaFP214ynwazWxMoI22jy-gMybCdO7wX6PAJpr6wIi_oQm97ZJD1BVCNlejORB7zaN0N3A55fwCNwGWc6n8TWmPWcMPrMqukcsZM87nFXrPLNWIP7OEppBMK_yL0wWrk0GIekFZbpWeeO50vS8EczUdC1QqMF8u2CDPMJko6dCp5YaLvTpVTCDUVyBy6ZCNIcqOjCplwZGW6k9o0gASqDMSDWIinhMDPJRtXJ8sqrY7l7tY0YAZDBoilslkRrx9U4vR8mHvCSkKDHbwmGID5w5xdpqlhMz6Vhju-A4pkKUkl_wLq9g0SDp8L5Ul89EnoYX2jelHzfV-FM&scope=openid&state=UDrgwrFmn2loOCYj&token_type=bearer
7.168 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiY2FWUl9NeEl5MUYydHVOZXBUNnl4QSIsImF1ZCI6WyI4OWE4YWEzOC00OTdmLTQxMTMtYTA4Yi1hM2YzNzY0NjRkYjMiXSwiYXV0aF90aW1lIjoxNTI5NzUyODIwLCJleHAiOjE1Mjk3NTY1MTYsImlhdCI6MTUyOTc1MjkxNiwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiMzJiZDJjMWMtN2JhMy00NWRmLWJjNDAtYmM1ZTRkYzM2N2Q5Iiwibm9uY2UiOiJIeDJtMG9USmV4OHNvS1g4IiwicmF0IjoxNTI5NzUyOTEyLCJzdWIiOiJmb29AYmFyLmNvbSJ9.ZQxsF_7jzy_3V2yDCwkUzF33-QF31QVK1OyoFmPFrEGyzU5MM_MnPqtheAXCHFJjllMy73niqIjz2eO-gYMrM6MK8Hr5a61B4Sn3b9WjsfGN-M7DSIDInb0kEHffXTIwI262U9tpD5jIroB-yTo7PH0BopX3o_onVMlc70ZyQVKEpHZag7ZG6o7WTmJmSXC90XTqfdn3RxMVAS9bhjBTVYcK893wAvRzxumqVYFFjUwtUsgMQOVNAQmwjdpT6ksJyUbi8MfeOYmN7adxyZK0wJJ8mfS6-hZSAvbwSgVedbsw7KijkkyRVt1h7m98vUERZhRutd5Vc69hu4JCdRwOl2cJipIT-3EaFP214ynwazWxMoI22jy-gMybCdO7wX6PAJpr6wIi_oQm97ZJD1BVCNlejORB7zaN0N3A55fwCNwGWc6n8TWmPWcMPrMqukcsZM87nFXrPLNWIP7OEppBMK_yL0wWrk0GIekFZbpWeeO50vS8EczUdC1QqMF8u2CDPMJko6dCp5YaLvTpVTCDUVyBy6ZCNIcqOjCplwZGW6k9o0gASqDMSDWIinhMDPJRtXJ8sqrY7l7tY0YAZDBoilslkRrx9U4vR8mHvCSkKDHbwmGID5w5xdpqlhMz6Vhju-A4pkKUkl_wLq9g0SDp8L5Ul89EnoYX2jelHzfV-FM', 'scope': 'openid', 'access_token': 'aKUfv6yL9jVy7bFOaxy5BMV-p8ilXGDB1tkcYJ5ImFE.weB1RNxINn7iDW78AAi163d1EYsjkTWKOkySC4oQzRw', 'state': 'UDrgwrFmn2loOCYj', 'expires_in': 3599, 'token_type': 'bearer'}
7.283 AuthorizationResponse {
"access_token": "aKUfv6yL9jVy7bFOaxy5BMV-p8ilXGDB1tkcYJ5ImFE.weB1RNxINn7iDW78AAi163d1EYsjkTWKOkySC4oQzRw",
"expires_in": 3599,
"id_token": {
"at_hash": "caVR_MxIy1F2tuNepT6yxA",
"aud": [
"89a8aa38-497f-4113-a08b-a3f376464db3"
],
"auth_time": 1529752820,
"exp": 1529756516,
"iat": 1529752916,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "32bd2c1c-7ba3-45df-bc40-bc5e4dc367d9",
"nonce": "Hx2m0oTJex8soKX8",
"rat": 1529752912,
"sub": "[email protected]"
},
"scope": "openid",
"state": "UDrgwrFmn2loOCYj",
"token_type": "bearer"
}
7.283 phase <--<-- 5 --- Done -->-->
7.283 end
7.283 assertion VerifyAuthnResponse
7.284 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
7.284 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-redirect_uri-Query-OK.txt 0000644 0000000 0000000 00000023054 13313426746 016335 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-Query-OK
Test description: Request with a redirect_uri with a query component when a redirect_uri with the same query component is registered
Timestamp: 2018-06-23T11:24:22Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.072 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.073 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.073 phase <--<-- 2 --- Registration -->-->
0.074 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb?foo=bar'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.074 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb?foo=bar"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Xpw6liMANFUkrX3O"
],
"response_types": [
"id_token token"
]
}
0.231 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.232 RegistrationResponse {
"client_id": "87f0ee4e-f5fa-4fbb-b53d-238019a1ae25",
"client_secret": "vNS2wXvsoCGc",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "87f0ee4e-f5fa-4fbb-b53d-238019a1ae25",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb?foo=bar"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Xpw6liMANFUkrX3O"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.232 phase <--<-- 3 --- AsyncAuthn -->-->
0.233 AuthorizationRequest {
"client_id": "87f0ee4e-f5fa-4fbb-b53d-238019a1ae25",
"nonce": "OzGa8wrLwsuzNkfl",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb?foo=bar",
"response_type": "id_token token",
"scope": "openid",
"state": "c8YakmmJsiN9ZwTw"
}
0.233 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb%3Ffoo%3Dbar&client_id=87f0ee4e-f5fa-4fbb-b53d-238019a1ae25&state=c8YakmmJsiN9ZwTw&response_type=id_token+token&nonce=OzGa8wrLwsuzNkfl
0.233 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb%3Ffoo%3Dbar&client_id=87f0ee4e-f5fa-4fbb-b53d-238019a1ae25&state=c8YakmmJsiN9ZwTw&response_type=id_token+token&nonce=OzGa8wrLwsuzNkfl
5.472 http args {'foo': 'bar'}
5.643 response URL with fragment
5.644 response access_token=lkAitM-U-V8FWgMClSV-ZAfqYFnJwE1LXphjqhP4Cgg.qe4Jl7EQNFvF7BPPcVrJw9GSSRfKD2A3OCtTdunBICg&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiNjg5eHd0dEdkejNKN2hlTGYxMG9RUSIsImF1ZCI6WyI4N2YwZWU0ZS1mNWZhLTRmYmItYjUzZC0yMzgwMTlhMWFlMjUiXSwiYXV0aF90aW1lIjoxNTI5NzUzMDA5LCJleHAiOjE1Mjk3NTY2NjEsImlhdCI6MTUyOTc1MzA2MSwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiYjhmOGMwMTctZDdiNy00OTQwLThhMTktYThmOWUwZWZiZTg3Iiwibm9uY2UiOiJPekdhOHdyTHdzdXpOa2ZsIiwicmF0IjoxNTI5NzUzMDU2LCJzdWIiOiJmb29AYmFyLmNvbSJ9.nzm3CD1QQ8CBLfDHB1gRASIC5GtvQ22bNu3aXm_C7Hy6wPaO6LQdiZI5gK_wI092QVIWcP4l5Opyq2JYKEJ9mfoPUTV1iKFx7B7t7og6BBolCWiaC1uwb4TZOIbj4UYZa_-b6UH_V-syZOjaW9aJ-WFB38hAMoFNA6FvC9f73Vkv4FgshsYVgkNtvSMgc4URDXI6MW4oHr_0Vz7Yf8pYx4l4QRysWZGWm4U2fE9O5Tk3WEaNHlffrYM831-E7V6Dql5I_4PBrdaYtJqjF4LsZvxStMDQD0mP0nx_zvVx8Sauu20DPFKPiRQFMRsNMKbCFezHe6TSnfhepeRXWUlFLw5eF6extzcIIL9YmoEHj_eKrn_S7mOVF1RcoUzQTHJneB0IoazseGFk50sKPKu8NVkSYR-1-SEdi3QJ2KPizuxGygtq_btYhAU5AoqN3wQEKJhO3Q6EJJz5SgeOnGDvPsR_IEgKykq-e_g5_7mVo8zjjr6bofsWQHXisQv4Dd4CErOzCZQ6Plm6WLRnnq1zjarigr5AA_xFrecujAcws74WtPNa8pXEsJnibEauyWgl9IVByTn-Ms8GiAtdHQwdiphWuST35mG-uh_-AKPrzMnjcDhP_XqfCAhZrJ-T4rc8KsYUzQ2LziyOAhNu8CDVftLonYMXXlmD1LdL7yt0uHo&scope=openid&state=c8YakmmJsiN9ZwTw&token_type=bearer
5.644 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiNjg5eHd0dEdkejNKN2hlTGYxMG9RUSIsImF1ZCI6WyI4N2YwZWU0ZS1mNWZhLTRmYmItYjUzZC0yMzgwMTlhMWFlMjUiXSwiYXV0aF90aW1lIjoxNTI5NzUzMDA5LCJleHAiOjE1Mjk3NTY2NjEsImlhdCI6MTUyOTc1MzA2MSwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiYjhmOGMwMTctZDdiNy00OTQwLThhMTktYThmOWUwZWZiZTg3Iiwibm9uY2UiOiJPekdhOHdyTHdzdXpOa2ZsIiwicmF0IjoxNTI5NzUzMDU2LCJzdWIiOiJmb29AYmFyLmNvbSJ9.nzm3CD1QQ8CBLfDHB1gRASIC5GtvQ22bNu3aXm_C7Hy6wPaO6LQdiZI5gK_wI092QVIWcP4l5Opyq2JYKEJ9mfoPUTV1iKFx7B7t7og6BBolCWiaC1uwb4TZOIbj4UYZa_-b6UH_V-syZOjaW9aJ-WFB38hAMoFNA6FvC9f73Vkv4FgshsYVgkNtvSMgc4URDXI6MW4oHr_0Vz7Yf8pYx4l4QRysWZGWm4U2fE9O5Tk3WEaNHlffrYM831-E7V6Dql5I_4PBrdaYtJqjF4LsZvxStMDQD0mP0nx_zvVx8Sauu20DPFKPiRQFMRsNMKbCFezHe6TSnfhepeRXWUlFLw5eF6extzcIIL9YmoEHj_eKrn_S7mOVF1RcoUzQTHJneB0IoazseGFk50sKPKu8NVkSYR-1-SEdi3QJ2KPizuxGygtq_btYhAU5AoqN3wQEKJhO3Q6EJJz5SgeOnGDvPsR_IEgKykq-e_g5_7mVo8zjjr6bofsWQHXisQv4Dd4CErOzCZQ6Plm6WLRnnq1zjarigr5AA_xFrecujAcws74WtPNa8pXEsJnibEauyWgl9IVByTn-Ms8GiAtdHQwdiphWuST35mG-uh_-AKPrzMnjcDhP_XqfCAhZrJ-T4rc8KsYUzQ2LziyOAhNu8CDVftLonYMXXlmD1LdL7yt0uHo', 'scope': 'openid', 'access_token': 'lkAitM-U-V8FWgMClSV-ZAfqYFnJwE1LXphjqhP4Cgg.qe4Jl7EQNFvF7BPPcVrJw9GSSRfKD2A3OCtTdunBICg', 'state': 'c8YakmmJsiN9ZwTw', 'expires_in': 3599, 'token_type': 'bearer'}
5.73 AuthorizationResponse {
"access_token": "lkAitM-U-V8FWgMClSV-ZAfqYFnJwE1LXphjqhP4Cgg.qe4Jl7EQNFvF7BPPcVrJw9GSSRfKD2A3OCtTdunBICg",
"expires_in": 3599,
"id_token": {
"at_hash": "689xwttGdz3J7heLf10oQQ",
"aud": [
"87f0ee4e-f5fa-4fbb-b53d-238019a1ae25"
],
"auth_time": 1529753009,
"exp": 1529756661,
"iat": 1529753061,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "b8f8c017-d7b7-4940-8a19-a8f9e0efbe87",
"nonce": "OzGa8wrLwsuzNkfl",
"rat": 1529753056,
"sub": "[email protected]"
},
"scope": "openid",
"state": "c8YakmmJsiN9ZwTw",
"token_type": "bearer"
}
5.73 phase <--<-- 4 --- Done -->-->
5.73 end
5.73 assertion VerifyResponse
5.73 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
5.731 assertion CheckQueryPart
5.731 condition check-query-part: status=OK [Check that a query part send in the Authorization Request is returned in the Authorization response.]
5.731 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
check-query-part: status=OK [Check that a query part send in the Authorization Request is returned in the Authorization response.]
Done: status=OK
============================================================
RESULT: PASSED
./OP-IDToken-kid.txt 0000644 0000000 0000000 00000022647 13313426562 014310 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-IDToken-kid
Test description: IDToken has kid [Basic, Implicit, Hybrid]
Timestamp: 2018-06-23T11:22:26Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.106 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.107 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.107 phase <--<-- 2 --- Registration -->-->
0.108 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.108 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#eg7t8MiHCWdNfSRW"
],
"response_types": [
"id_token token"
]
}
0.268 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.269 RegistrationResponse {
"client_id": "e2af1881-a08b-4b88-a1e5-8ac449f0f7bf",
"client_secret": "F1FCulCZz9vx",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "e2af1881-a08b-4b88-a1e5-8ac449f0f7bf",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#eg7t8MiHCWdNfSRW"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.269 phase <--<-- 3 --- AsyncAuthn -->-->
0.269 AuthorizationRequest {
"client_id": "e2af1881-a08b-4b88-a1e5-8ac449f0f7bf",
"nonce": "tu8hE9uZiaSR48ME",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token token",
"scope": "openid",
"state": "fLScikek5jj9FFlB"
}
0.269 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=e2af1881-a08b-4b88-a1e5-8ac449f0f7bf&state=fLScikek5jj9FFlB&response_type=id_token+token&nonce=tu8hE9uZiaSR48ME
0.269 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=e2af1881-a08b-4b88-a1e5-8ac449f0f7bf&state=fLScikek5jj9FFlB&response_type=id_token+token&nonce=tu8hE9uZiaSR48ME
2.611 http args {}
2.784 response URL with fragment
2.784 response access_token=CODOHN0j_Yz9Sc8ZWfKRie75FblRFQP3i4l018r0084.VWgBhO20rEeI3sNvZz2xF-rrfekWyUUvA_JkY-GTBrs&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiRTVRcXpRWHpYTHpvRVpPVTAxeTdrQSIsImF1ZCI6WyJlMmFmMTg4MS1hMDhiLTRiODgtYTFlNS04YWM0NDlmMGY3YmYiXSwiYXV0aF90aW1lIjoxNTI5NzUyODIwLCJleHAiOjE1Mjk3NTY1NDYsImlhdCI6MTUyOTc1Mjk0NiwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiMGFmMjk3MzgtMWEwYy00YjI3LWEzMTItMDIyMDE1OTkyYTk0Iiwibm9uY2UiOiJ0dThoRTl1WmlhU1I0OE1FIiwicmF0IjoxNTI5NzUyOTQ0LCJzdWIiOiJmb29AYmFyLmNvbSJ9.tKO-3UXspdCn8FmDFKTnBg89W6fXqKsPof2tIDG_ysvzXcDvqOtMRn6Sq3AFufv4O1UT2uElkPXTrNiQ1qZDqZeGXNttEcp04jzhPZX6G7jJh11WLv0BDLpSkknEym32nx_QD48F2az7X_jacVhqU6bul841r-24Tx1pV09b2dGXUiVfWHylsyz0ytDOvmWHYy6E9ya2x84U6FODU6fBjVa2DtY6s8_4usicQbxK194vVCovGkXKfrayH90JwKZ1HFCkW-lDlhWI3Cy5PApGxhLqaiIrvhG6Ry0n2Hs6MyMEYm1xMSif5j3TOH-xaXtKs_NxxdmPiJJvqSxKh1fHLrVCVzFzeZInAtwrrE7Far13QgR1SEHjSgBqMaecZY6YSI4gf45QzoXRufmNLpIqslflm6QaN1Hc8rRQYvtg04kg55gwYzB9nyMw2R-DgaGJre2JzM2Nu9IGE3u4AY4k_NtP41UB0QEmbi-JtceOqipKtv4sZ0z8JUfoBgvKT9SgblVyFXVCmlFpNSBQUDq4L-FMBVEPDynImzDnF1rV29gx5_w4DuYQe-Vl4jaLmGfvq0Zbk4dG3WWDonrFzBu1zItCFRSOngojBob4Q4RHl_nBJF22oXX5g9a5P3oYcMA1-WK215IYAH5Eah9QIIh4MV3v2S4BvolU2II5y0ixJxU&scope=openid&state=fLScikek5jj9FFlB&token_type=bearer
2.784 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiRTVRcXpRWHpYTHpvRVpPVTAxeTdrQSIsImF1ZCI6WyJlMmFmMTg4MS1hMDhiLTRiODgtYTFlNS04YWM0NDlmMGY3YmYiXSwiYXV0aF90aW1lIjoxNTI5NzUyODIwLCJleHAiOjE1Mjk3NTY1NDYsImlhdCI6MTUyOTc1Mjk0NiwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiMGFmMjk3MzgtMWEwYy00YjI3LWEzMTItMDIyMDE1OTkyYTk0Iiwibm9uY2UiOiJ0dThoRTl1WmlhU1I0OE1FIiwicmF0IjoxNTI5NzUyOTQ0LCJzdWIiOiJmb29AYmFyLmNvbSJ9.tKO-3UXspdCn8FmDFKTnBg89W6fXqKsPof2tIDG_ysvzXcDvqOtMRn6Sq3AFufv4O1UT2uElkPXTrNiQ1qZDqZeGXNttEcp04jzhPZX6G7jJh11WLv0BDLpSkknEym32nx_QD48F2az7X_jacVhqU6bul841r-24Tx1pV09b2dGXUiVfWHylsyz0ytDOvmWHYy6E9ya2x84U6FODU6fBjVa2DtY6s8_4usicQbxK194vVCovGkXKfrayH90JwKZ1HFCkW-lDlhWI3Cy5PApGxhLqaiIrvhG6Ry0n2Hs6MyMEYm1xMSif5j3TOH-xaXtKs_NxxdmPiJJvqSxKh1fHLrVCVzFzeZInAtwrrE7Far13QgR1SEHjSgBqMaecZY6YSI4gf45QzoXRufmNLpIqslflm6QaN1Hc8rRQYvtg04kg55gwYzB9nyMw2R-DgaGJre2JzM2Nu9IGE3u4AY4k_NtP41UB0QEmbi-JtceOqipKtv4sZ0z8JUfoBgvKT9SgblVyFXVCmlFpNSBQUDq4L-FMBVEPDynImzDnF1rV29gx5_w4DuYQe-Vl4jaLmGfvq0Zbk4dG3WWDonrFzBu1zItCFRSOngojBob4Q4RHl_nBJF22oXX5g9a5P3oYcMA1-WK215IYAH5Eah9QIIh4MV3v2S4BvolU2II5y0ixJxU', 'scope': 'openid', 'access_token': 'CODOHN0j_Yz9Sc8ZWfKRie75FblRFQP3i4l018r0084.VWgBhO20rEeI3sNvZz2xF-rrfekWyUUvA_JkY-GTBrs', 'state': 'fLScikek5jj9FFlB', 'expires_in': 3599, 'token_type': 'bearer'}
2.865 AuthorizationResponse {
"access_token": "CODOHN0j_Yz9Sc8ZWfKRie75FblRFQP3i4l018r0084.VWgBhO20rEeI3sNvZz2xF-rrfekWyUUvA_JkY-GTBrs",
"expires_in": 3599,
"id_token": {
"at_hash": "E5QqzQXzXLzoEZOU01y7kA",
"aud": [
"e2af1881-a08b-4b88-a1e5-8ac449f0f7bf"
],
"auth_time": 1529752820,
"exp": 1529756546,
"iat": 1529752946,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "0af29738-1a0c-4b27-a312-022015992a94",
"nonce": "tu8hE9uZiaSR48ME",
"rat": 1529752944,
"sub": "[email protected]"
},
"scope": "openid",
"state": "fLScikek5jj9FFlB",
"token_type": "bearer"
}
2.865 phase <--<-- 4 --- AccessToken -->-->
2.865 phase <--<-- 5 --- Done -->-->
2.865 end
2.866 assertion VerifySignedIdTokenHasKID
2.866 condition verify-signed-idtoken-has-kid: status=OK [Verifies that the header of a signed IDToken includes a kid claim.]
2.866 assertion VerifyResponse
2.866 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.866 condition Done: status=OK
============================================================
Conditions
verify-signed-idtoken-has-kid: status=OK [Verifies that the header of a signed IDToken includes a kid claim.]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Req-claims_locales.txt 0000644 0000000 0000000 00000022572 13313427033 015734 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-claims_locales
Test description: Providing claims_locales
Timestamp: 2018-06-23T11:25:15Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.357 phase <--<-- 1 --- Webfinger -->-->
1.357 not expected to do WebFinger
1.357 phase <--<-- 2 --- Discovery -->-->
1.357 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.429 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.431 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.431 phase <--<-- 3 --- Registration -->-->
1.431 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.431 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#kIWCkztdpYk4wjRZ"
],
"response_types": [
"id_token token"
]
}
1.598 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.599 RegistrationResponse {
"client_id": "2e5a8eea-8fff-49d4-80f3-54b865c10ff7",
"client_secret": "ZFj_fTrsyayr",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "2e5a8eea-8fff-49d4-80f3-54b865c10ff7",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#kIWCkztdpYk4wjRZ"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.599 phase <--<-- 4 --- AsyncAuthn -->-->
1.599 AuthorizationRequest {
"claims_locales": "se",
"client_id": "2e5a8eea-8fff-49d4-80f3-54b865c10ff7",
"nonce": "4f6PtKyYlwWe1hRr",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token token",
"scope": "openid",
"state": "hC6EZXARIDp9qeZ5"
}
1.599 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=2e5a8eea-8fff-49d4-80f3-54b865c10ff7&state=hC6EZXARIDp9qeZ5&response_type=id_token+token&nonce=4f6PtKyYlwWe1hRr&claims_locales=se
1.599 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=2e5a8eea-8fff-49d4-80f3-54b865c10ff7&state=hC6EZXARIDp9qeZ5&response_type=id_token+token&nonce=4f6PtKyYlwWe1hRr&claims_locales=se
4.197 http args {}
4.374 response URL with fragment
4.374 response access_token=_qbydJLKnrMj6bSB1t6zfQYEnq1qSuKG7gItAClUuo0.jSV7bsECckA6Yzus50Scq9S8TS3kr88rMqrnKaM5NJ4&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiNXc3NG1uYmRKb1NFMlFFeG84UzVudyIsImF1ZCI6WyIyZTVhOGVlYS04ZmZmLTQ5ZDQtODBmMy01NGI4NjVjMTBmZjciXSwiYXV0aF90aW1lIjoxNTI5NzUzMDA5LCJleHAiOjE1Mjk3NTY3MTUsImlhdCI6MTUyOTc1MzExNSwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiMWI4ZDRlMDYtY2VkNC00NzRjLWJiNGItYjM4MTM1ZGJhYTYzIiwibm9uY2UiOiI0ZjZQdEt5WWx3V2UxaFJyIiwicmF0IjoxNTI5NzUzMTEyLCJzdWIiOiJmb29AYmFyLmNvbSJ9.CkqKxTZpolzt1yo0de4hIc9r-4uO9n5VxX4DbYDNU0VOBAya_DNiXV2kzR5q180f9j28IfhlYjuGp9cbtcLnx7zQKki4xkseMefCkFFySa1ycQK3Bnj6bxIlyE_DzwHnOgS1EOJjrppp58evb0AshKPURbLbNMvZ5U46OV1dk2wI2VoqpbYFa8u3F-xdN-dM5qzm-1cqbpKoW3_6xya4tLw4K11LqQ78BBLoaF-GsczxygzzBHpWAapv6a6qddS08BmiG9SR815JxoU6zg3Xn7yY9uoJHOsWzUhFnbAEFjvn0cPoKiEsXwRTWWBzf1gGNMoTLonGcLgxjNK21ZZBOMeBdhf70BwTVDi6RXA6XZtscBO7cgfxxqbhR8ITMH-bgehFjqNkQEOtkwZLj0PKIYV2AGpcdmIs1WBtBUbDxDAyUWd_zLOgYA6ghlkLaucyUE3GP3N_7Pm0YP-WCOunhTqW1XamnqngrZCOrkgEc_jf2Hl-zzOMRyv8kTlSDV7GBEaBcMpuuQhrWbSHDPsXLMFcOIbtlvC00pIwrj407e4Vht2sHZFKAj2-_3VWvvx5_O8r_exlq4iuTrQtxIYzkrmT3AhdhJulwbVjsp2ISm50zchYn-uraamttW4Cw9Vcn9gM8ctGrhOLDN8lBRtSnJ84DXJKIVvY-YUX9t56EI8&scope=openid&state=hC6EZXARIDp9qeZ5&token_type=bearer
4.374 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiNXc3NG1uYmRKb1NFMlFFeG84UzVudyIsImF1ZCI6WyIyZTVhOGVlYS04ZmZmLTQ5ZDQtODBmMy01NGI4NjVjMTBmZjciXSwiYXV0aF90aW1lIjoxNTI5NzUzMDA5LCJleHAiOjE1Mjk3NTY3MTUsImlhdCI6MTUyOTc1MzExNSwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiMWI4ZDRlMDYtY2VkNC00NzRjLWJiNGItYjM4MTM1ZGJhYTYzIiwibm9uY2UiOiI0ZjZQdEt5WWx3V2UxaFJyIiwicmF0IjoxNTI5NzUzMTEyLCJzdWIiOiJmb29AYmFyLmNvbSJ9.CkqKxTZpolzt1yo0de4hIc9r-4uO9n5VxX4DbYDNU0VOBAya_DNiXV2kzR5q180f9j28IfhlYjuGp9cbtcLnx7zQKki4xkseMefCkFFySa1ycQK3Bnj6bxIlyE_DzwHnOgS1EOJjrppp58evb0AshKPURbLbNMvZ5U46OV1dk2wI2VoqpbYFa8u3F-xdN-dM5qzm-1cqbpKoW3_6xya4tLw4K11LqQ78BBLoaF-GsczxygzzBHpWAapv6a6qddS08BmiG9SR815JxoU6zg3Xn7yY9uoJHOsWzUhFnbAEFjvn0cPoKiEsXwRTWWBzf1gGNMoTLonGcLgxjNK21ZZBOMeBdhf70BwTVDi6RXA6XZtscBO7cgfxxqbhR8ITMH-bgehFjqNkQEOtkwZLj0PKIYV2AGpcdmIs1WBtBUbDxDAyUWd_zLOgYA6ghlkLaucyUE3GP3N_7Pm0YP-WCOunhTqW1XamnqngrZCOrkgEc_jf2Hl-zzOMRyv8kTlSDV7GBEaBcMpuuQhrWbSHDPsXLMFcOIbtlvC00pIwrj407e4Vht2sHZFKAj2-_3VWvvx5_O8r_exlq4iuTrQtxIYzkrmT3AhdhJulwbVjsp2ISm50zchYn-uraamttW4Cw9Vcn9gM8ctGrhOLDN8lBRtSnJ84DXJKIVvY-YUX9t56EI8', 'scope': 'openid', 'access_token': '_qbydJLKnrMj6bSB1t6zfQYEnq1qSuKG7gItAClUuo0.jSV7bsECckA6Yzus50Scq9S8TS3kr88rMqrnKaM5NJ4', 'state': 'hC6EZXARIDp9qeZ5', 'expires_in': 3599, 'token_type': 'bearer'}
4.455 AuthorizationResponse {
"access_token": "_qbydJLKnrMj6bSB1t6zfQYEnq1qSuKG7gItAClUuo0.jSV7bsECckA6Yzus50Scq9S8TS3kr88rMqrnKaM5NJ4",
"expires_in": 3599,
"id_token": {
"at_hash": "5w74mnbdJoSE2QExo8S5nw",
"aud": [
"2e5a8eea-8fff-49d4-80f3-54b865c10ff7"
],
"auth_time": 1529753009,
"exp": 1529756715,
"iat": 1529753115,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "1b8d4e06-ced4-474c-bb4b-b38135dbaa63",
"nonce": "4f6PtKyYlwWe1hRr",
"rat": 1529753112,
"sub": "[email protected]"
},
"scope": "openid",
"state": "hC6EZXARIDp9qeZ5",
"token_type": "bearer"
}
4.455 phase <--<-- 5 --- AccessToken -->-->
4.455 phase <--<-- 6 --- UserInfo -->-->
4.455 phase <--<-- 7 --- DisplayUserInfo -->-->
4.455 phase <--<-- 8 --- Done -->-->
4.455 end
4.456 assertion CheckHTTPResponse
4.456 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
4.456 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Discovery-Config.txt 0000644 0000000 0000000 00000006700 13313426505 015405 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Discovery-Config
Test description: Publishes openid-configuration discovery information
Timestamp: 2018-06-23T11:21:41Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.074 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Done -->-->
0.075 end
0.076 assertion CheckHTTPResponse
0.076 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.076 assertion VerifyIdTokenSigningAlgorithmIsSupported
0.076 condition verify-id_token_signing-algorithm-is-supported: status=OK [Verify that required algorithms in id_token_signing_alg_values_supported]
0.077 assertion VerifyHTTPSUsage
0.077 condition verify-https-usage: status=OK [Verify that specific endpoints uses https]
0.077 assertion VerifyOPEndpointsUseHTTPS
0.077 condition verify-op-endpoints-use-https: status=OK [Verify that all OP endpoints uses https]
0.077 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-id_token_signing-algorithm-is-supported: status=OK [Verify that required algorithms in id_token_signing_alg_values_supported]
verify-https-usage: status=OK [Verify that specific endpoints uses https]
verify-op-endpoints-use-https: status=OK [Verify that all OP endpoints uses https]
Done: status=OK
============================================================
RESULT: PASSED
./OP-scope-All.txt 0000644 0000000 0000000 00000027342 13313426772 014065 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-scope-All
Test description: Scope requesting all claims
Timestamp: 2018-06-23T11:24:42Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.083 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.085 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.085 phase <--<-- 2 --- Registration -->-->
0.085 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.085 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#lH0TEpE7xAEchDMw"
],
"response_types": [
"id_token token"
]
}
0.254 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.255 RegistrationResponse {
"client_id": "f6c6dad4-0468-444d-95c4-7c8feb88612c",
"client_secret": "NuXv1fE5MI.5",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "f6c6dad4-0468-444d-95c4-7c8feb88612c",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#lH0TEpE7xAEchDMw"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.255 phase <--<-- 3 --- AsyncAuthn -->-->
0.255 condition Check support: status=WARNING, message=No support for: scopes_supported=['profile', 'email', 'address', 'phone']
0.256 AuthorizationRequest {
"client_id": "f6c6dad4-0468-444d-95c4-7c8feb88612c",
"nonce": "Vs5tMk3WbQJo6EXT",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token token",
"scope": "openid profile email address phone",
"state": "XdCwtu899t4ecFTQ"
}
0.256 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+profile+email+address+phone&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=f6c6dad4-0468-444d-95c4-7c8feb88612c&state=XdCwtu899t4ecFTQ&response_type=id_token+token&nonce=Vs5tMk3WbQJo6EXT
0.256 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+profile+email+address+phone&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=f6c6dad4-0468-444d-95c4-7c8feb88612c&state=XdCwtu899t4ecFTQ&response_type=id_token+token&nonce=Vs5tMk3WbQJo6EXT
3.407 http args {}
3.576 response URL with fragment
3.576 response access_token=oyRBdMYzS8KRRytow671u4pkYNFAHhDueXH6h7FgEsw.esTW67QN5nGMSmq4ME04OZRz3ubRi30mA-8isOjEQ_4&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoieU8zUmdQa0ZYMmp1dThNcjByemxGQSIsImF1ZCI6WyJmNmM2ZGFkNC0wNDY4LTQ0NGQtOTVjNC03YzhmZWI4ODYxMmMiXSwiYXV0aF90aW1lIjoxNTI5NzUzMDA5LCJleHAiOjE1Mjk3NTY2ODIsImlhdCI6MTUyOTc1MzA4MiwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiMTRlMTM5YTctZjU1OS00MDc3LTg5ZjEtNjE2MGVkZGU5NWI4Iiwibm9uY2UiOiJWczV0TWszV2JRSm82RVhUIiwicmF0IjoxNTI5NzUzMDc5LCJzdWIiOiJmb29AYmFyLmNvbSJ9.UmAzwiVI8KhHTlNoUXx9oGtpJDRDDuPQHwU5PlpeDiHBHKlZ2-lwBamSEp2O7B1E19F1gExpZZzfOIm_1pohQhu4pEe8wvcQmXMicZ6U29cMX069DA_mM6lSp9J_ZwcgMAdhgiAYoysA_qZcR7skxK1DNoNdIcTj0zHofwISVmzE09cOjmMIqycgGJHTbrsTus9lrBrQNu387tbHVikP9mG2E6go1KenmxcqFVo-1g5tfpeY5rj_ZXdjrtk6geOCYjnDbaHDb4FOiSFpgHA3LNeXNH5P01giQWhhCocsUG5jYPFuZJ0kl4OtXqB9UHfE1-QUbsnay4oZgIKs_K_xVrvuFL6ndU0OJObCwSkHBTwCePUWq89-nSMH49YopJws7dtneeJy5mhjHqmmo7puxDLg5oxp5u9dZ1Z7t6DDX6pIEJC_Gj35LdeGCBMGNUiehPfONKemlQqU3kEeCnS-nWuO0vlbgVPyMXnNZRAlDsDPO7s6XAgTaVeKGl2OBP5akd2Q9dvu98F5UNRX45IKcrYWncnABXJa2V3Be7tH5BoDEU1cLGBRrbjUlPAazXV7kEtzaf5XGUM0d6btRRedVAxnBCDLOBZQE6oelHpe3Kj0k0_JdAEuQtiHeNV4ERVCOMHqpQt_FlcnorRclnxjxPsjVu_EyKBIuhr7abNCbsg&scope=openid%20profile%20email%20address%20phone&state=XdCwtu899t4ecFTQ&token_type=bearer
3.577 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoieU8zUmdQa0ZYMmp1dThNcjByemxGQSIsImF1ZCI6WyJmNmM2ZGFkNC0wNDY4LTQ0NGQtOTVjNC03YzhmZWI4ODYxMmMiXSwiYXV0aF90aW1lIjoxNTI5NzUzMDA5LCJleHAiOjE1Mjk3NTY2ODIsImlhdCI6MTUyOTc1MzA4MiwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiMTRlMTM5YTctZjU1OS00MDc3LTg5ZjEtNjE2MGVkZGU5NWI4Iiwibm9uY2UiOiJWczV0TWszV2JRSm82RVhUIiwicmF0IjoxNTI5NzUzMDc5LCJzdWIiOiJmb29AYmFyLmNvbSJ9.UmAzwiVI8KhHTlNoUXx9oGtpJDRDDuPQHwU5PlpeDiHBHKlZ2-lwBamSEp2O7B1E19F1gExpZZzfOIm_1pohQhu4pEe8wvcQmXMicZ6U29cMX069DA_mM6lSp9J_ZwcgMAdhgiAYoysA_qZcR7skxK1DNoNdIcTj0zHofwISVmzE09cOjmMIqycgGJHTbrsTus9lrBrQNu387tbHVikP9mG2E6go1KenmxcqFVo-1g5tfpeY5rj_ZXdjrtk6geOCYjnDbaHDb4FOiSFpgHA3LNeXNH5P01giQWhhCocsUG5jYPFuZJ0kl4OtXqB9UHfE1-QUbsnay4oZgIKs_K_xVrvuFL6ndU0OJObCwSkHBTwCePUWq89-nSMH49YopJws7dtneeJy5mhjHqmmo7puxDLg5oxp5u9dZ1Z7t6DDX6pIEJC_Gj35LdeGCBMGNUiehPfONKemlQqU3kEeCnS-nWuO0vlbgVPyMXnNZRAlDsDPO7s6XAgTaVeKGl2OBP5akd2Q9dvu98F5UNRX45IKcrYWncnABXJa2V3Be7tH5BoDEU1cLGBRrbjUlPAazXV7kEtzaf5XGUM0d6btRRedVAxnBCDLOBZQE6oelHpe3Kj0k0_JdAEuQtiHeNV4ERVCOMHqpQt_FlcnorRclnxjxPsjVu_EyKBIuhr7abNCbsg', 'scope': 'openid profile email address phone', 'access_token': 'oyRBdMYzS8KRRytow671u4pkYNFAHhDueXH6h7FgEsw.esTW67QN5nGMSmq4ME04OZRz3ubRi30mA-8isOjEQ_4', 'state': 'XdCwtu899t4ecFTQ', 'expires_in': 3599, 'token_type': 'bearer'}
3.658 AuthorizationResponse {
"access_token": "oyRBdMYzS8KRRytow671u4pkYNFAHhDueXH6h7FgEsw.esTW67QN5nGMSmq4ME04OZRz3ubRi30mA-8isOjEQ_4",
"expires_in": 3599,
"id_token": {
"at_hash": "yO3RgPkFX2juu8Mr0rzlFA",
"aud": [
"f6c6dad4-0468-444d-95c4-7c8feb88612c"
],
"auth_time": 1529753009,
"exp": 1529756682,
"iat": 1529753082,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "14e139a7-f559-4077-89f1-6160edde95b8",
"nonce": "Vs5tMk3WbQJo6EXT",
"rat": 1529753079,
"sub": "[email protected]"
},
"scope": "openid profile email address phone",
"state": "XdCwtu899t4ecFTQ",
"token_type": "bearer"
}
3.658 phase <--<-- 4 --- AccessToken -->-->
3.658 phase <--<-- 5 --- UserInfo -->-->
3.658 do_user_info_request kwargs:{'state': 'XdCwtu899t4ecFTQ', 'method': 'GET', 'authn_method': 'bearer_header'}
3.659 request {'body': None}
3.659 request_url https://oidc-certification.ory.sh:8443/userinfo
3.659 request_http_args {'headers': {'Authorization': 'Bearer oyRBdMYzS8KRRytow671u4pkYNFAHhDueXH6h7FgEsw.esTW67QN5nGMSmq4ME04OZRz3ubRi30mA-8isOjEQ_4'}}
3.73 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
3.731 OpenIDSchema {
"sub": "[email protected]"
}
3.731 OpenIDSchema {
"sub": "[email protected]"
}
3.731 phase <--<-- 6 --- Done -->-->
3.731 end
3.732 assertion CheckHTTPResponse
3.732 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
3.732 assertion VerifyResponse
3.732 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.733 assertion VerifyScopes
3.733 condition verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username', 'email', 'email_verified', 'address', 'phone_number', 'phone_number_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
3.733 condition Done: status=OK
============================================================
Conditions
Check support: status=WARNING, message=No support for: scopes_supported=['profile', 'email', 'address', 'phone']
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username', 'email', 'email_verified', 'address', 'phone_number', 'phone_number_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
No support for: scopes_supported=['profile', 'email', 'address', 'phone']
The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username', 'email', 'email_verified', 'address', 'phone_number', 'phone_number_verified']
./OP-IDToken-at_hash.txt 0000644 0000000 0000000 00000022224 13313426556 015142 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-IDToken-at_hash
Test description: ID Token has at_hash when ID Token and Access Token are returned from the Authorization Endpoint
Timestamp: 2018-06-23T11:22:22Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.118 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.12 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.12 phase <--<-- 2 --- Registration -->-->
0.12 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.121 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#VkNNKSOB1Apl81rj"
],
"response_types": [
"id_token token"
]
}
0.292 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.293 RegistrationResponse {
"client_id": "d0684ecc-6275-448d-a22b-b4dd50fa65d7",
"client_secret": "vBigtNw5FAmz",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "d0684ecc-6275-448d-a22b-b4dd50fa65d7",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#VkNNKSOB1Apl81rj"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.293 phase <--<-- 3 --- AsyncAuthn -->-->
0.294 AuthorizationRequest {
"client_id": "d0684ecc-6275-448d-a22b-b4dd50fa65d7",
"nonce": "BzJ9TAXwhaH2RjCZ",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token token",
"scope": "openid",
"state": "4hT6UDJGBfiMcOMh"
}
0.294 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=d0684ecc-6275-448d-a22b-b4dd50fa65d7&state=4hT6UDJGBfiMcOMh&response_type=id_token+token&nonce=BzJ9TAXwhaH2RjCZ
0.294 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=d0684ecc-6275-448d-a22b-b4dd50fa65d7&state=4hT6UDJGBfiMcOMh&response_type=id_token+token&nonce=BzJ9TAXwhaH2RjCZ
2.351 http args {}
2.529 response URL with fragment
2.53 response access_token=2d6mmKewKfUcpUf1eY4jeU8mINKUqhAVNd6oVkXnvXI.UEEdf9cL3JGzAIDeKGtsPBd4ol5LWaeTFHC5GggoInM&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoicHFqbVRGQ09jRmgwU2t5VXJMY0MzZyIsImF1ZCI6WyJkMDY4NGVjYy02Mjc1LTQ0OGQtYTIyYi1iNGRkNTBmYTY1ZDciXSwiYXV0aF90aW1lIjoxNTI5NzUyODIwLCJleHAiOjE1Mjk3NTY1NDIsImlhdCI6MTUyOTc1Mjk0MiwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiNDNhZmNkNzYtOWQyYy00MmE5LWFkNjEtYzhmMmQzMWE2YzdiIiwibm9uY2UiOiJCeko5VEFYd2hhSDJSakNaIiwicmF0IjoxNTI5NzUyOTQwLCJzdWIiOiJmb29AYmFyLmNvbSJ9.D9sD3f6I_5vNEaDvWTSpdQeaJfmXkfW2GplQ-XD71Wj1PZkIFew4gnWCdashCHi4-x8NpaPyRf_3r4GJ1Dbt8_bpeEU0ZnM24pg623maH-BXxw8wr_sJAx4g1GREaNOfC6lP3AEoGSyFdlFNcS1BAp5Zti_8pNjV23zn651TwfCq9fuujbvICqSzaNKMTik5Ab2cLxwlDrkv18JWFaeYbwYQHJvYpzTD2SwBN2qQJA6VqeeWzMLcxf0THwXCOSXZ6LLnV0wcfJxe3udtIlF1Ne1Pu4XHDQVoO4m5Uhz29T0at7Kr5fU_7BR9MZDIlJkZUuM986GhVqsJ2K2zQTyvfnruV24VGGD_NgnId4ZC849uLJnJe3k-qCEO1NGEUagqoaUU7AxosP_ofI-OMMMup2GtsDky6aff8tgziSHrQlajFxUMQCqG8g0T97rJjzQyoGy8Ix2h4_4L_Ao_CNbJmA9BbJBsI-nt2S5Vhyr57iw9DY021b5QQaTDSN8SxJQvUu24S51jJ6DhhZ5-s6YqarsWu4nw1LMX5x3UiN2n2lDc6Aeg37mtdO4DiN4iybbZ1I3SnlpniGZr-Dd9orx_WiA5KOwbOoooHkGrzNBEL0b-XQG8o3vhfw27W79aGuIglNb_MuGziN-AKnrr66Ixmsag95Bj-bTVgdUhun1rXek&scope=openid&state=4hT6UDJGBfiMcOMh&token_type=bearer
2.53 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoicHFqbVRGQ09jRmgwU2t5VXJMY0MzZyIsImF1ZCI6WyJkMDY4NGVjYy02Mjc1LTQ0OGQtYTIyYi1iNGRkNTBmYTY1ZDciXSwiYXV0aF90aW1lIjoxNTI5NzUyODIwLCJleHAiOjE1Mjk3NTY1NDIsImlhdCI6MTUyOTc1Mjk0MiwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiNDNhZmNkNzYtOWQyYy00MmE5LWFkNjEtYzhmMmQzMWE2YzdiIiwibm9uY2UiOiJCeko5VEFYd2hhSDJSakNaIiwicmF0IjoxNTI5NzUyOTQwLCJzdWIiOiJmb29AYmFyLmNvbSJ9.D9sD3f6I_5vNEaDvWTSpdQeaJfmXkfW2GplQ-XD71Wj1PZkIFew4gnWCdashCHi4-x8NpaPyRf_3r4GJ1Dbt8_bpeEU0ZnM24pg623maH-BXxw8wr_sJAx4g1GREaNOfC6lP3AEoGSyFdlFNcS1BAp5Zti_8pNjV23zn651TwfCq9fuujbvICqSzaNKMTik5Ab2cLxwlDrkv18JWFaeYbwYQHJvYpzTD2SwBN2qQJA6VqeeWzMLcxf0THwXCOSXZ6LLnV0wcfJxe3udtIlF1Ne1Pu4XHDQVoO4m5Uhz29T0at7Kr5fU_7BR9MZDIlJkZUuM986GhVqsJ2K2zQTyvfnruV24VGGD_NgnId4ZC849uLJnJe3k-qCEO1NGEUagqoaUU7AxosP_ofI-OMMMup2GtsDky6aff8tgziSHrQlajFxUMQCqG8g0T97rJjzQyoGy8Ix2h4_4L_Ao_CNbJmA9BbJBsI-nt2S5Vhyr57iw9DY021b5QQaTDSN8SxJQvUu24S51jJ6DhhZ5-s6YqarsWu4nw1LMX5x3UiN2n2lDc6Aeg37mtdO4DiN4iybbZ1I3SnlpniGZr-Dd9orx_WiA5KOwbOoooHkGrzNBEL0b-XQG8o3vhfw27W79aGuIglNb_MuGziN-AKnrr66Ixmsag95Bj-bTVgdUhun1rXek', 'scope': 'openid', 'access_token': '2d6mmKewKfUcpUf1eY4jeU8mINKUqhAVNd6oVkXnvXI.UEEdf9cL3JGzAIDeKGtsPBd4ol5LWaeTFHC5GggoInM', 'state': '4hT6UDJGBfiMcOMh', 'expires_in': 3599, 'token_type': 'bearer'}
2.632 AuthorizationResponse {
"access_token": "2d6mmKewKfUcpUf1eY4jeU8mINKUqhAVNd6oVkXnvXI.UEEdf9cL3JGzAIDeKGtsPBd4ol5LWaeTFHC5GggoInM",
"expires_in": 3599,
"id_token": {
"at_hash": "pqjmTFCOcFh0SkyUrLcC3g",
"aud": [
"d0684ecc-6275-448d-a22b-b4dd50fa65d7"
],
"auth_time": 1529752820,
"exp": 1529756542,
"iat": 1529752942,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "43afcd76-9d2c-42a9-ad61-c8f2d31a6c7b",
"nonce": "BzJ9TAXwhaH2RjCZ",
"rat": 1529752940,
"sub": "[email protected]"
},
"scope": "openid",
"state": "4hT6UDJGBfiMcOMh",
"token_type": "bearer"
}
2.632 phase <--<-- 4 --- Done -->-->
2.632 end
2.633 assertion VerifyAuthnResponse
2.633 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
2.633 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-redirect_uri-Query-Added.txt 0000644 0000000 0000000 00000011030 13313426733 017010 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-Query-Added
Test description: Request with redirect_uri with query component when registered redirect_uri has no query component
Timestamp: 2018-06-23T11:24:11Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.076 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.078 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.078 phase <--<-- 2 --- Registration -->-->
0.078 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.078 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#hFd5BPDSwXcf2wqo"
],
"response_types": [
"id_token token"
]
}
0.237 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.238 RegistrationResponse {
"client_id": "0cb53557-845d-457e-9c6f-eada3ef28f2d",
"client_secret": "1Km4M_DprwBZ",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "0cb53557-845d-457e-9c6f-eada3ef28f2d",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#hFd5BPDSwXcf2wqo"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.238 phase <--<-- 3 --- Note -->-->
============================================================
Conditions
============================================================
RESULT: PARTIAL RESULT
./OP-redirect_uri-Missing.txt 0000644 0000000 0000000 00000011216 13313426725 016324 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-Missing
Test description: Reject request without redirect_uri when multiple registered
Timestamp: 2018-06-23T11:24:05Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.102 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.104 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.104 phase <--<-- 2 --- Registration -->-->
0.104 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb', 'https://op.certification.openid.net:61353/cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.104 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb",
"https://op.certification.openid.net:61353/cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#B9cuiNZG8uvU7Sic"
],
"response_types": [
"id_token token"
]
}
0.261 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.262 RegistrationResponse {
"client_id": "857b82eb-80bf-41a7-ac1a-06e9d5953836",
"client_secret": "vZ~GwfObDFAI",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "857b82eb-80bf-41a7-ac1a-06e9d5953836",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb",
"https://op.certification.openid.net:61353/cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#B9cuiNZG8uvU7Sic"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.262 phase <--<-- 3 --- Note -->-->
============================================================
Conditions
============================================================
RESULT: PARTIAL RESULT
./OP-redirect_uri-NotReg.txt 0000644 0000000 0000000 00000010752 13313426730 016111 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-NotReg
Test description: Sent redirect_uri does not match a registered redirect_uri
Timestamp: 2018-06-23T11:24:08Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.11 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.111 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.111 phase <--<-- 2 --- Registration -->-->
0.111 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.112 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#RiNZYkPMTCmFN1mI"
],
"response_types": [
"id_token token"
]
}
0.266 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.267 RegistrationResponse {
"client_id": "26f683cb-c81e-4c13-a72b-d304dd233c73",
"client_secret": "lS61KNo_e5h4",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "26f683cb-c81e-4c13-a72b-d304dd233c73",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#RiNZYkPMTCmFN1mI"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.267 phase <--<-- 3 --- Note -->-->
============================================================
Conditions
============================================================
RESULT: PARTIAL RESULT
./OP-Req-ui_locales.txt 0000644 0000000 0000000 00000022247 13313427102 015075 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-ui_locales
Test description: Providing ui_locales
Timestamp: 2018-06-23T11:25:54Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.402 phase <--<-- 1 --- Webfinger -->-->
1.402 not expected to do WebFinger
1.402 phase <--<-- 2 --- Discovery -->-->
1.402 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.515 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.516 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.516 phase <--<-- 3 --- Registration -->-->
1.517 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.517 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#UIGACDirUKKKhzQs"
],
"response_types": [
"id_token token"
]
}
1.689 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.69 RegistrationResponse {
"client_id": "5f3c41f0-871c-4c39-81d1-292bf5fbd44b",
"client_secret": "B7HL8ZftKviq",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "5f3c41f0-871c-4c39-81d1-292bf5fbd44b",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#UIGACDirUKKKhzQs"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.69 phase <--<-- 4 --- AsyncAuthn -->-->
1.691 AuthorizationRequest {
"client_id": "5f3c41f0-871c-4c39-81d1-292bf5fbd44b",
"nonce": "Pmb65qSqOChiC4eH",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token token",
"scope": "openid",
"state": "1HETFDt3PnijvW4P",
"ui_locales": "se"
}
1.691 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?ui_locales=se&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=5f3c41f0-871c-4c39-81d1-292bf5fbd44b&state=1HETFDt3PnijvW4P&response_type=id_token+token&nonce=Pmb65qSqOChiC4eH
1.691 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?ui_locales=se&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=5f3c41f0-871c-4c39-81d1-292bf5fbd44b&state=1HETFDt3PnijvW4P&response_type=id_token+token&nonce=Pmb65qSqOChiC4eH
5.109 http args {}
5.29 response URL with fragment
5.29 response access_token=9ff5EIn7hW0JBmgNZbYpE5cFl_ud6aCDV2-6F9CukOc.Z99FTLqSmcA0XYMIVFvcvMZBoFF33xdGNaP3GPrFBRY&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiRThqbVg1WUJqWWNtN1NsN1NOOTNwUSIsImF1ZCI6WyI1ZjNjNDFmMC04NzFjLTRjMzktODFkMS0yOTJiZjVmYmQ0NGIiXSwiYXV0aF90aW1lIjoxNTI5NzUzMTM2LCJleHAiOjE1Mjk3NTY3NTMsImlhdCI6MTUyOTc1MzE1MywiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiY2RlYTViMmUtNmUyZC00ZjliLTljYTAtMTZlZDViNTU1Njg2Iiwibm9uY2UiOiJQbWI2NXFTcU9DaGlDNGVIIiwicmF0IjoxNTI5NzUzMTUwLCJzdWIiOiJmb29AYmFyLmNvbSJ9.Iakb9MMGVukKRfx6oEhqdZBokiSrPScD9rdkQGm2SsQbspwWh-7OI2T65e5q4Q9Xx4Rw3akDKCI6d_ZWDofjq7QCY4CnU69qJKIdWWF0qt8RTM1cN6ixu909w0w282Zfe3XysmcHqGZ_t9ctbKsShP9eQUnYX0d_NVPNkIQJXSWukFt0riWy0B14LuTVHCBWGWiacmUHm6LcUwNZav4s8f9rTKzYwSw0QSjy-n077Iw5ZVuh0fB9EsBSt3HMkjbMtotvnhFNFMNVPlOmDAOh5C1iBUJSWScI4C-4P_bFxbsjQ4gdlHfVAa_3PYf9BAJWMmILF1ydyljc0f8R5ywdrfHPQxmc_SwlE19TnYwGHX0PP6T8TIctSO8L4LnuyuzykWbORV7Sx5xjerZDbcqbGh3qe5irMeDTG41jvHJXOPDwABl4BCrwUaavU9dAriTwLYZ3Xfu9oDA1qtWZU3YoIsJy14wv4tHGAIivuk4cmGNNkRX4XgAEzQnaMe120mspcc4kSDcvZEFOoFSdPUoFD-8MnvIs5dP1dSqhVD7cvO1LdnftURtIANkscH2y7jmebi5-E6gO_nc01mj1ZrWaPAN50dVZfQL7m4jUOQhkI1OMvclMi-4S453bIQSWlIwW3E-jxu67J64bxerPe3sqdEuAfUMfKpI_u1iOnxJ9qwg&scope=openid&state=1HETFDt3PnijvW4P&token_type=bearer
5.291 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiRThqbVg1WUJqWWNtN1NsN1NOOTNwUSIsImF1ZCI6WyI1ZjNjNDFmMC04NzFjLTRjMzktODFkMS0yOTJiZjVmYmQ0NGIiXSwiYXV0aF90aW1lIjoxNTI5NzUzMTM2LCJleHAiOjE1Mjk3NTY3NTMsImlhdCI6MTUyOTc1MzE1MywiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiY2RlYTViMmUtNmUyZC00ZjliLTljYTAtMTZlZDViNTU1Njg2Iiwibm9uY2UiOiJQbWI2NXFTcU9DaGlDNGVIIiwicmF0IjoxNTI5NzUzMTUwLCJzdWIiOiJmb29AYmFyLmNvbSJ9.Iakb9MMGVukKRfx6oEhqdZBokiSrPScD9rdkQGm2SsQbspwWh-7OI2T65e5q4Q9Xx4Rw3akDKCI6d_ZWDofjq7QCY4CnU69qJKIdWWF0qt8RTM1cN6ixu909w0w282Zfe3XysmcHqGZ_t9ctbKsShP9eQUnYX0d_NVPNkIQJXSWukFt0riWy0B14LuTVHCBWGWiacmUHm6LcUwNZav4s8f9rTKzYwSw0QSjy-n077Iw5ZVuh0fB9EsBSt3HMkjbMtotvnhFNFMNVPlOmDAOh5C1iBUJSWScI4C-4P_bFxbsjQ4gdlHfVAa_3PYf9BAJWMmILF1ydyljc0f8R5ywdrfHPQxmc_SwlE19TnYwGHX0PP6T8TIctSO8L4LnuyuzykWbORV7Sx5xjerZDbcqbGh3qe5irMeDTG41jvHJXOPDwABl4BCrwUaavU9dAriTwLYZ3Xfu9oDA1qtWZU3YoIsJy14wv4tHGAIivuk4cmGNNkRX4XgAEzQnaMe120mspcc4kSDcvZEFOoFSdPUoFD-8MnvIs5dP1dSqhVD7cvO1LdnftURtIANkscH2y7jmebi5-E6gO_nc01mj1ZrWaPAN50dVZfQL7m4jUOQhkI1OMvclMi-4S453bIQSWlIwW3E-jxu67J64bxerPe3sqdEuAfUMfKpI_u1iOnxJ9qwg', 'scope': 'openid', 'access_token': '9ff5EIn7hW0JBmgNZbYpE5cFl_ud6aCDV2-6F9CukOc.Z99FTLqSmcA0XYMIVFvcvMZBoFF33xdGNaP3GPrFBRY', 'state': '1HETFDt3PnijvW4P', 'expires_in': 3599, 'token_type': 'bearer'}
5.373 AuthorizationResponse {
"access_token": "9ff5EIn7hW0JBmgNZbYpE5cFl_ud6aCDV2-6F9CukOc.Z99FTLqSmcA0XYMIVFvcvMZBoFF33xdGNaP3GPrFBRY",
"expires_in": 3599,
"id_token": {
"at_hash": "E8jmX5YBjYcm7Sl7SN93pQ",
"aud": [
"5f3c41f0-871c-4c39-81d1-292bf5fbd44b"
],
"auth_time": 1529753136,
"exp": 1529756753,
"iat": 1529753153,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "cdea5b2e-6e2d-4f9b-9ca0-16ed5b555686",
"nonce": "Pmb65qSqOChiC4eH",
"rat": 1529753150,
"sub": "[email protected]"
},
"scope": "openid",
"state": "1HETFDt3PnijvW4P",
"token_type": "bearer"
}
5.373 phase <--<-- 5 --- Done -->-->
5.373 end
5.373 assertion VerifyAuthnResponse
5.373 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
5.373 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-prompt-login.txt 0000644 0000000 0000000 00000033506 13313426664 014674 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-prompt-login
Test description: Request with prompt=login
Timestamp: 2018-06-23T11:23:32Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.079 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.081 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.081 phase <--<-- 2 --- Registration -->-->
0.081 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.081 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#3KQZudH1aWjNwuuj"
],
"response_types": [
"id_token token"
]
}
0.242 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.243 RegistrationResponse {
"client_id": "64fecf52-8f52-4f79-b59a-dd3d4018a0be",
"client_secret": "mj1X5W_DLTYR",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "64fecf52-8f52-4f79-b59a-dd3d4018a0be",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#3KQZudH1aWjNwuuj"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.243 phase <--<-- 3 --- AsyncAuthn -->-->
0.243 AuthorizationRequest {
"client_id": "64fecf52-8f52-4f79-b59a-dd3d4018a0be",
"nonce": "Dlnk8yZoFuGrnvq6",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token token",
"scope": "openid",
"state": "po5JiZTzaL5YvbS3"
}
0.243 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=64fecf52-8f52-4f79-b59a-dd3d4018a0be&state=po5JiZTzaL5YvbS3&response_type=id_token+token&nonce=Dlnk8yZoFuGrnvq6
0.243 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=64fecf52-8f52-4f79-b59a-dd3d4018a0be&state=po5JiZTzaL5YvbS3&response_type=id_token+token&nonce=Dlnk8yZoFuGrnvq6
2.966 http args {}
3.185 response URL with fragment
3.185 response access_token=lKIES5TX16DXugcVmk42tV-c6gLomMiqR1L6413BqLY.JiML6Pra5ENVc7PHWaVK3t4XEcIkeMhOqFJujvSEihU&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoieTM0dmFQQmYzSmRkV0Y5YU5CVExJdyIsImF1ZCI6WyI2NGZlY2Y1Mi04ZjUyLTRmNzktYjU5YS1kZDNkNDAxOGEwYmUiXSwiYXV0aF90aW1lIjoxNTI5NzUyODIwLCJleHAiOjE1Mjk3NTY2MDUsImlhdCI6MTUyOTc1MzAwNSwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiMzA2Yzc0NjYtZWEwMi00MzczLTgyOTAtZWNkMTkwNTI2NGExIiwibm9uY2UiOiJEbG5rOHlab0Z1R3JudnE2IiwicmF0IjoxNTI5NzUzMDAyLCJzdWIiOiJmb29AYmFyLmNvbSJ9.PvIIKSfNm2orH0UXM9vD7veWlbW1W54NIeWhfl4TKrOW4cg6aDjE0fCZw19BZtwFjVlsuk9ckvJVk3jumsq2KPS55S6_XfJNUjp5pe8RlHUP9vDaoovo9E9RQWHI_DEdBkIXhlaR_QWF8nA_r7WYkbSiaGyzR90-DK6aa6r0-cGXwPT1_4B0GdA-14abzspxjOVb6sCMr0Q4LbABxGy4nU2JfT5qCoD37qvkufObeL4bzmgx5LzM1Xs7h59h4XKgB324vH83kiYw90dzkNSTuSXAmy7SP_h0zj4RlBEPeO9Eo7Dx_xCox_GAj91xMV9pkjMPgzvNVGJkRecpcxa_4dypPFbC8_ajR4yYa_R70E7dLBbOjd1u4TB8TU7A_a0WPfRA04DxsUASr-brK5bDloretHRTIKCMnODo95u2DWUSilh4L9SzAbhOdzGe0SzIjcuY5DqvEo3uhiZz6tb0yEn8EcnfiwO7B37KeoMcheuTTPFC9zV0yLsqfqR8CHkUkUmeE_yTvUKIJ9cbmwquS0OlgBx594Wg6Ok964cjz9bkLBsqJXxWQfmR_rMltCm8m-JeijbaW9_DZVKo2woK3hRLpgt_haj1TZaEo3wyZw29xpPnaGKIg2rY9ukl4uZASlaZamT0Mp8E7oQsiMediB_kBSOApOJYj8OA6Dv1hAQ&scope=openid&state=po5JiZTzaL5YvbS3&token_type=bearer
3.186 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoieTM0dmFQQmYzSmRkV0Y5YU5CVExJdyIsImF1ZCI6WyI2NGZlY2Y1Mi04ZjUyLTRmNzktYjU5YS1kZDNkNDAxOGEwYmUiXSwiYXV0aF90aW1lIjoxNTI5NzUyODIwLCJleHAiOjE1Mjk3NTY2MDUsImlhdCI6MTUyOTc1MzAwNSwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiMzA2Yzc0NjYtZWEwMi00MzczLTgyOTAtZWNkMTkwNTI2NGExIiwibm9uY2UiOiJEbG5rOHlab0Z1R3JudnE2IiwicmF0IjoxNTI5NzUzMDAyLCJzdWIiOiJmb29AYmFyLmNvbSJ9.PvIIKSfNm2orH0UXM9vD7veWlbW1W54NIeWhfl4TKrOW4cg6aDjE0fCZw19BZtwFjVlsuk9ckvJVk3jumsq2KPS55S6_XfJNUjp5pe8RlHUP9vDaoovo9E9RQWHI_DEdBkIXhlaR_QWF8nA_r7WYkbSiaGyzR90-DK6aa6r0-cGXwPT1_4B0GdA-14abzspxjOVb6sCMr0Q4LbABxGy4nU2JfT5qCoD37qvkufObeL4bzmgx5LzM1Xs7h59h4XKgB324vH83kiYw90dzkNSTuSXAmy7SP_h0zj4RlBEPeO9Eo7Dx_xCox_GAj91xMV9pkjMPgzvNVGJkRecpcxa_4dypPFbC8_ajR4yYa_R70E7dLBbOjd1u4TB8TU7A_a0WPfRA04DxsUASr-brK5bDloretHRTIKCMnODo95u2DWUSilh4L9SzAbhOdzGe0SzIjcuY5DqvEo3uhiZz6tb0yEn8EcnfiwO7B37KeoMcheuTTPFC9zV0yLsqfqR8CHkUkUmeE_yTvUKIJ9cbmwquS0OlgBx594Wg6Ok964cjz9bkLBsqJXxWQfmR_rMltCm8m-JeijbaW9_DZVKo2woK3hRLpgt_haj1TZaEo3wyZw29xpPnaGKIg2rY9ukl4uZASlaZamT0Mp8E7oQsiMediB_kBSOApOJYj8OA6Dv1hAQ', 'scope': 'openid', 'access_token': 'lKIES5TX16DXugcVmk42tV-c6gLomMiqR1L6413BqLY.JiML6Pra5ENVc7PHWaVK3t4XEcIkeMhOqFJujvSEihU', 'state': 'po5JiZTzaL5YvbS3', 'expires_in': 3599, 'token_type': 'bearer'}
3.268 AuthorizationResponse {
"access_token": "lKIES5TX16DXugcVmk42tV-c6gLomMiqR1L6413BqLY.JiML6Pra5ENVc7PHWaVK3t4XEcIkeMhOqFJujvSEihU",
"expires_in": 3599,
"id_token": {
"at_hash": "y34vaPBf3JddWF9aNBTLIw",
"aud": [
"64fecf52-8f52-4f79-b59a-dd3d4018a0be"
],
"auth_time": 1529752820,
"exp": 1529756605,
"iat": 1529753005,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "306c7466-ea02-4373-8290-ecd1905264a1",
"nonce": "Dlnk8yZoFuGrnvq6",
"rat": 1529753002,
"sub": "[email protected]"
},
"scope": "openid",
"state": "po5JiZTzaL5YvbS3",
"token_type": "bearer"
}
3.268 phase <--<-- 4 --- AccessToken -->-->
3.268 phase <--<-- 5 --- Note -->-->
4.353 phase <--<-- 6 --- AsyncAuthn -->-->
4.353 AuthorizationRequest {
"client_id": "64fecf52-8f52-4f79-b59a-dd3d4018a0be",
"nonce": "9AhiOpFJfyUq6297",
"prompt": [
"login"
],
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token token",
"scope": "openid",
"state": "MvGT49DnfJvWTlEG"
}
4.354 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=login&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=64fecf52-8f52-4f79-b59a-dd3d4018a0be&state=MvGT49DnfJvWTlEG&response_type=id_token+token&nonce=9AhiOpFJfyUq6297
4.354 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=login&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=64fecf52-8f52-4f79-b59a-dd3d4018a0be&state=MvGT49DnfJvWTlEG&response_type=id_token+token&nonce=9AhiOpFJfyUq6297
9.346 http args {}
9.517 response URL with fragment
9.517 response access_token=lZW3luv5waxZ4sotamyFykQk1VAp4O04osPA6k8iN4s.jy2dLRVwkmUYCj4Zq9hutMbSdEZw_EADlL6Qg_FuUrI&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiMGVaR3RIUGJlLW5TMHp2b1YxNEtsUSIsImF1ZCI6WyI2NGZlY2Y1Mi04ZjUyLTRmNzktYjU5YS1kZDNkNDAxOGEwYmUiXSwiYXV0aF90aW1lIjoxNTI5NzUzMDA5LCJleHAiOjE1Mjk3NTY2MTEsImlhdCI6MTUyOTc1MzAxMSwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiYzY4YTdlYTQtNzBjNC00ZWNhLWI1MDYtODljMDY1ODdmODNiIiwibm9uY2UiOiI5QWhpT3BGSmZ5VXE2Mjk3IiwicmF0IjoxNTI5NzUzMDA3LCJzdWIiOiJmb29AYmFyLmNvbSJ9.edaTsehL07JELSyEhzD0MwQTwharLmkofZxGvzsBrHgvpkGk0op7EeWa7nGfzPcCvS_RfSoNUiyWWtzWZTGUXr-3CtfbV_KdWgVUmonIrgsLM9RUOJYtEytVR-eq835T1pzYKa2rr1YyiG2hTtt3TG9RemE3YHJ7J3MIwBepejo-Ux1OBZv4fQhTKNii1UhxFI3vsIfPn3YTdmwI15Pt7vmVtILtOHqu-l7i36UJEIvl2hqr7Hu1Iiol8L5E3iwOnouN3QDD-1mk3x7ZigwTcFAQsgWTbNoiCdENPrL8QQA5l-gUmioZTajSa6jeg-nNmahp38Qvv0fyqF9-7kR_0nu3yrfF60UFpWnWYBdNkG0QUXwuHJ3tMrpca-u_2ogpeQG99l3ohQIZi3w5AzocwoQDPwmtwuXGpFJRVjwRG1523VUjXCylMjFsU0n2elmB4fP_53GDvvXoutq2g6xB1FgIJk4apER3VrBrT13mZzUgQbpE3FawyOKnGPydyhYdQydC80zrLjhZ85SwPMt2yLnVGAElXTBAqxCdwo-YtIrNS3O4H_7ZDDEvjBBr-eT5ozLTzaxkSdaocA-UsuPVQ-aAcMqCnnKEdyGu5DnONO6FwJR5syj5HLYwiMxfRcrCMUKjCl0rV_sGdyNECnyPUuhCmhA7SRAoEEbp1mdCoMU&scope=openid&state=MvGT49DnfJvWTlEG&token_type=bearer
9.517 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiMGVaR3RIUGJlLW5TMHp2b1YxNEtsUSIsImF1ZCI6WyI2NGZlY2Y1Mi04ZjUyLTRmNzktYjU5YS1kZDNkNDAxOGEwYmUiXSwiYXV0aF90aW1lIjoxNTI5NzUzMDA5LCJleHAiOjE1Mjk3NTY2MTEsImlhdCI6MTUyOTc1MzAxMSwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiYzY4YTdlYTQtNzBjNC00ZWNhLWI1MDYtODljMDY1ODdmODNiIiwibm9uY2UiOiI5QWhpT3BGSmZ5VXE2Mjk3IiwicmF0IjoxNTI5NzUzMDA3LCJzdWIiOiJmb29AYmFyLmNvbSJ9.edaTsehL07JELSyEhzD0MwQTwharLmkofZxGvzsBrHgvpkGk0op7EeWa7nGfzPcCvS_RfSoNUiyWWtzWZTGUXr-3CtfbV_KdWgVUmonIrgsLM9RUOJYtEytVR-eq835T1pzYKa2rr1YyiG2hTtt3TG9RemE3YHJ7J3MIwBepejo-Ux1OBZv4fQhTKNii1UhxFI3vsIfPn3YTdmwI15Pt7vmVtILtOHqu-l7i36UJEIvl2hqr7Hu1Iiol8L5E3iwOnouN3QDD-1mk3x7ZigwTcFAQsgWTbNoiCdENPrL8QQA5l-gUmioZTajSa6jeg-nNmahp38Qvv0fyqF9-7kR_0nu3yrfF60UFpWnWYBdNkG0QUXwuHJ3tMrpca-u_2ogpeQG99l3ohQIZi3w5AzocwoQDPwmtwuXGpFJRVjwRG1523VUjXCylMjFsU0n2elmB4fP_53GDvvXoutq2g6xB1FgIJk4apER3VrBrT13mZzUgQbpE3FawyOKnGPydyhYdQydC80zrLjhZ85SwPMt2yLnVGAElXTBAqxCdwo-YtIrNS3O4H_7ZDDEvjBBr-eT5ozLTzaxkSdaocA-UsuPVQ-aAcMqCnnKEdyGu5DnONO6FwJR5syj5HLYwiMxfRcrCMUKjCl0rV_sGdyNECnyPUuhCmhA7SRAoEEbp1mdCoMU', 'scope': 'openid', 'access_token': 'lZW3luv5waxZ4sotamyFykQk1VAp4O04osPA6k8iN4s.jy2dLRVwkmUYCj4Zq9hutMbSdEZw_EADlL6Qg_FuUrI', 'state': 'MvGT49DnfJvWTlEG', 'expires_in': 3599, 'token_type': 'bearer'}
9.521 AuthorizationResponse {
"access_token": "lZW3luv5waxZ4sotamyFykQk1VAp4O04osPA6k8iN4s.jy2dLRVwkmUYCj4Zq9hutMbSdEZw_EADlL6Qg_FuUrI",
"expires_in": 3599,
"id_token": {
"at_hash": "0eZGtHPbe-nS0zvoV14KlQ",
"aud": [
"64fecf52-8f52-4f79-b59a-dd3d4018a0be"
],
"auth_time": 1529753009,
"exp": 1529756611,
"iat": 1529753011,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "c68a7ea4-70c4-4eca-b506-89c06587f83b",
"nonce": "9AhiOpFJfyUq6297",
"rat": 1529753007,
"sub": "[email protected]"
},
"scope": "openid",
"state": "MvGT49DnfJvWTlEG",
"token_type": "bearer"
}
9.521 phase <--<-- 7 --- AccessToken -->-->
9.521 phase <--<-- 8 --- Done -->-->
9.521 end
9.522 assertion VerifyResponse
9.522 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
9.522 assertion MultipleSignOn
9.522 condition multiple-sign-on: status=OK [Verifies that multiple authentications was used in the flow]
9.522 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
multiple-sign-on: status=OK [Verifies that multiple authentications was used in the flow]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Response-Missing.txt 0000644 0000000 0000000 00000015107 13313426477 015451 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Response-Missing
Test description: Authorization request missing the response_type parameter
Timestamp: 2018-06-23T11:21:35Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.111 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.113 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.113 phase <--<-- 2 --- Registration -->-->
0.113 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.113 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#9fwSrcwPUV1Cqaxd"
],
"response_types": [
"id_token token"
]
}
0.274 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.275 RegistrationResponse {
"client_id": "78acef58-7e9a-41f3-bb6d-b8730f30bb40",
"client_secret": "Oi0CH5aDd~fe",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "78acef58-7e9a-41f3-bb6d-b8730f30bb40",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#9fwSrcwPUV1Cqaxd"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.275 phase <--<-- 3 --- Note -->-->
1.57 phase <--<-- 4 --- AsyncAuthn -->-->
1.571 AuthorizationRequest {
"client_id": "78acef58-7e9a-41f3-bb6d-b8730f30bb40",
"nonce": "NKrMKk2QqwKVFpBo",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"scope": "openid",
"state": "DSLejwDl0yfRqzH1"
}
1.571 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?state=DSLejwDl0yfRqzH1&scope=openid&nonce=NKrMKk2QqwKVFpBo&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=78acef58-7e9a-41f3-bb6d-b8730f30bb40
1.571 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?state=DSLejwDl0yfRqzH1&scope=openid&nonce=NKrMKk2QqwKVFpBo&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=78acef58-7e9a-41f3-bb6d-b8730f30bb40
1.904 response Response URL with query part
1.904 response {'error_debug': 'The request is missing the response_type parameter', 'error_description': 'The authorization server does not support obtaining a token using this method', 'state': '', 'error': 'unsupported_response_type'}
1.904 response {'error_debug': 'The request is missing the response_type parameter', 'error_description': 'The authorization server does not support obtaining a token using this method', 'error': 'unsupported_response_type'}
1.904 AuthorizationErrorResponse {
"error": "unsupported_response_type",
"error_debug": "The request is missing the response_type parameter",
"error_description": "The authorization server does not support obtaining a token using this method"
}
1.904 AuthorizationErrorResponse {
"error": "unsupported_response_type",
"error_debug": "The request is missing the response_type parameter",
"error_description": "The authorization server does not support obtaining a token using this method"
}
1.905 phase <--<-- 5 --- Done -->-->
1.905 end
1.905 assertion VerifyErrorMessage
1.905 condition verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
1.905 condition Done: status=OK
============================================================
Conditions
verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-UserInfo-Endpoint.txt 0000644 0000000 0000000 00000023354 13313426572 015553 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-UserInfo-Endpoint
Test description: UserInfo Endpoint access with GET and bearer header
Timestamp: 2018-06-23T11:22:34Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Registration -->-->
0.075 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.075 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#ww6OI7HYGrUwz5Cq"
],
"response_types": [
"id_token token"
]
}
0.235 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.236 RegistrationResponse {
"client_id": "a63b6a24-571f-409a-8c93-fdabd42e83aa",
"client_secret": "2oWP0P8-852i",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "a63b6a24-571f-409a-8c93-fdabd42e83aa",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#ww6OI7HYGrUwz5Cq"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.236 phase <--<-- 3 --- AsyncAuthn -->-->
0.237 AuthorizationRequest {
"client_id": "a63b6a24-571f-409a-8c93-fdabd42e83aa",
"nonce": "gfsfxGzo2qio46jt",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token token",
"scope": "openid",
"state": "aQ4Wn5GtiEpmaoRm"
}
0.237 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=a63b6a24-571f-409a-8c93-fdabd42e83aa&state=aQ4Wn5GtiEpmaoRm&response_type=id_token+token&nonce=gfsfxGzo2qio46jt
0.237 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=a63b6a24-571f-409a-8c93-fdabd42e83aa&state=aQ4Wn5GtiEpmaoRm&response_type=id_token+token&nonce=gfsfxGzo2qio46jt
2.459 http args {}
2.675 response URL with fragment
2.676 response access_token=J5DBxkhxdol5GZpoWSqm2_UFwzvyx2OFzVHGdtAaQuY.qE_QWWZtzwP1WKJjBHF3zc_CJB0nGWGnpmhOGz9pJEg&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiOWdxa0pkcmJkU0EwZnIyVzFvT2FKUSIsImF1ZCI6WyJhNjNiNmEyNC01NzFmLTQwOWEtOGM5My1mZGFiZDQyZTgzYWEiXSwiYXV0aF90aW1lIjoxNTI5NzUyODIwLCJleHAiOjE1Mjk3NTY1NTQsImlhdCI6MTUyOTc1Mjk1NCwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiZmIyMjQwY2YtNzY5Yy00ODYyLTg0NjUtN2Y0MjBiMTRkMGZmIiwibm9uY2UiOiJnZnNmeEd6bzJxaW80Nmp0IiwicmF0IjoxNTI5NzUyOTUyLCJzdWIiOiJmb29AYmFyLmNvbSJ9.KBR98xFqCJgNvZqEjaaRpUNdEXz5hcJoMdWL20TXRPBttTODTyuElc_G7hMVy-2ywsUljmlUaqf21N16p3kjl1T2cSkko_CWKzN5uyqAbxVi4d0Bu2rwNPachq6ZPdMWNZBOlfjAU_xzbP_njvrTewIOpRtvcVLVpbtaF6JYDS0Uo-V0fv57uAqA2UeF4mSCcoRLOpbRZagBIzYrTz-XVF8ZgELi5CiRY7mcWFiA7isqmOuM6W1RyMx5I7eBSCCP6Mi_KH4dw9iC0qeRF6_Nzci-amJSr30TfuVqIdaSwCnorkNLdpYzSSMWlNN5Jrt6bwXSsolvq8g9kQLhVZpKAluqJd6Ih6fePyOma-U1KXCvXdAS6Gs-IOhQH3RHaTv0P3LCcJB1mHgfnrqsVNJElXxU4PIUbNDoD2JlbC-1J6pfzMUmr5A5459-Sn3ZTrdOxqNLDKmYiO01eeHCZ5-ImBMhixiEv7ffk7c3WmwjIVXvOuqO8d9tlb-io0htZ99QNQ-bF1MWUX47ldxnBkDPH8Gb2mPCd7pICSK59A_4IocEjFKODJM0-vQl_xkyWQ-Wu_fI8OtAdV4wkA3HPAmiOkrd2mbKMZxzZ_2l2_eGjYOn_K3AlTsPp-hOZDwfJqev_frbo7hgVqGxoKlgtaXQO8etE7Dse-jy5z8GrJJic_g&scope=openid&state=aQ4Wn5GtiEpmaoRm&token_type=bearer
2.676 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiOWdxa0pkcmJkU0EwZnIyVzFvT2FKUSIsImF1ZCI6WyJhNjNiNmEyNC01NzFmLTQwOWEtOGM5My1mZGFiZDQyZTgzYWEiXSwiYXV0aF90aW1lIjoxNTI5NzUyODIwLCJleHAiOjE1Mjk3NTY1NTQsImlhdCI6MTUyOTc1Mjk1NCwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiZmIyMjQwY2YtNzY5Yy00ODYyLTg0NjUtN2Y0MjBiMTRkMGZmIiwibm9uY2UiOiJnZnNmeEd6bzJxaW80Nmp0IiwicmF0IjoxNTI5NzUyOTUyLCJzdWIiOiJmb29AYmFyLmNvbSJ9.KBR98xFqCJgNvZqEjaaRpUNdEXz5hcJoMdWL20TXRPBttTODTyuElc_G7hMVy-2ywsUljmlUaqf21N16p3kjl1T2cSkko_CWKzN5uyqAbxVi4d0Bu2rwNPachq6ZPdMWNZBOlfjAU_xzbP_njvrTewIOpRtvcVLVpbtaF6JYDS0Uo-V0fv57uAqA2UeF4mSCcoRLOpbRZagBIzYrTz-XVF8ZgELi5CiRY7mcWFiA7isqmOuM6W1RyMx5I7eBSCCP6Mi_KH4dw9iC0qeRF6_Nzci-amJSr30TfuVqIdaSwCnorkNLdpYzSSMWlNN5Jrt6bwXSsolvq8g9kQLhVZpKAluqJd6Ih6fePyOma-U1KXCvXdAS6Gs-IOhQH3RHaTv0P3LCcJB1mHgfnrqsVNJElXxU4PIUbNDoD2JlbC-1J6pfzMUmr5A5459-Sn3ZTrdOxqNLDKmYiO01eeHCZ5-ImBMhixiEv7ffk7c3WmwjIVXvOuqO8d9tlb-io0htZ99QNQ-bF1MWUX47ldxnBkDPH8Gb2mPCd7pICSK59A_4IocEjFKODJM0-vQl_xkyWQ-Wu_fI8OtAdV4wkA3HPAmiOkrd2mbKMZxzZ_2l2_eGjYOn_K3AlTsPp-hOZDwfJqev_frbo7hgVqGxoKlgtaXQO8etE7Dse-jy5z8GrJJic_g', 'scope': 'openid', 'access_token': 'J5DBxkhxdol5GZpoWSqm2_UFwzvyx2OFzVHGdtAaQuY.qE_QWWZtzwP1WKJjBHF3zc_CJB0nGWGnpmhOGz9pJEg', 'state': 'aQ4Wn5GtiEpmaoRm', 'expires_in': 3599, 'token_type': 'bearer'}
2.754 AuthorizationResponse {
"access_token": "J5DBxkhxdol5GZpoWSqm2_UFwzvyx2OFzVHGdtAaQuY.qE_QWWZtzwP1WKJjBHF3zc_CJB0nGWGnpmhOGz9pJEg",
"expires_in": 3599,
"id_token": {
"at_hash": "9gqkJdrbdSA0fr2W1oOaJQ",
"aud": [
"a63b6a24-571f-409a-8c93-fdabd42e83aa"
],
"auth_time": 1529752820,
"exp": 1529756554,
"iat": 1529752954,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "fb2240cf-769c-4862-8465-7f420b14d0ff",
"nonce": "gfsfxGzo2qio46jt",
"rat": 1529752952,
"sub": "[email protected]"
},
"scope": "openid",
"state": "aQ4Wn5GtiEpmaoRm",
"token_type": "bearer"
}
2.754 phase <--<-- 4 --- AccessToken -->-->
2.754 phase <--<-- 5 --- UserInfo -->-->
2.755 do_user_info_request kwargs:{'state': 'aQ4Wn5GtiEpmaoRm', 'method': 'GET', 'authn_method': 'bearer_header'}
2.755 request {'body': None}
2.755 request_url https://oidc-certification.ory.sh:8443/userinfo
2.755 request_http_args {'headers': {'Authorization': 'Bearer J5DBxkhxdol5GZpoWSqm2_UFwzvyx2OFzVHGdtAaQuY.qE_QWWZtzwP1WKJjBHF3zc_CJB0nGWGnpmhOGz9pJEg'}}
2.827 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
2.828 OpenIDSchema {
"sub": "[email protected]"
}
2.828 OpenIDSchema {
"sub": "[email protected]"
}
2.828 phase <--<-- 6 --- Done -->-->
2.828 end
2.828 assertion VerifyResponse
2.828 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.828 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Req-id_token_hint.txt 0000644 0000000 0000000 00000042533 13313427040 015575 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-id_token_hint
Test description: Using prompt=none with user hint through id_token_hint
Timestamp: 2018-06-23T11:25:20Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Registration -->-->
0.075 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.075 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#RAk9cXvudX7XaGAn"
],
"response_types": [
"id_token token"
]
}
0.237 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.238 RegistrationResponse {
"client_id": "9110dee9-33e6-4c67-a213-b4b0016c69c9",
"client_secret": "2Bzr4~ljQgeZ",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "9110dee9-33e6-4c67-a213-b4b0016c69c9",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#RAk9cXvudX7XaGAn"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.238 phase <--<-- 3 --- AsyncAuthn -->-->
0.239 AuthorizationRequest {
"client_id": "9110dee9-33e6-4c67-a213-b4b0016c69c9",
"nonce": "QJhRN5pCn3ijlyM5",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token token",
"scope": "openid",
"state": "u3dCBZz2EQkncPGO"
}
0.239 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=9110dee9-33e6-4c67-a213-b4b0016c69c9&state=u3dCBZz2EQkncPGO&response_type=id_token+token&nonce=QJhRN5pCn3ijlyM5
0.239 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=9110dee9-33e6-4c67-a213-b4b0016c69c9&state=u3dCBZz2EQkncPGO&response_type=id_token+token&nonce=QJhRN5pCn3ijlyM5
2.658 http args {}
2.827 response URL with fragment
2.827 response access_token=2MQV_gmDVW80gKnERKqACFeSVDMv-M_V15KaGFOhtQU.hoO3v3s7S_kUsayGfu4GcjZ-NFw93BWv2opG8NVTcKU&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiMEtIcHR6U2tPcUJzTUtYcS14MTVldyIsImF1ZCI6WyI5MTEwZGVlOS0zM2U2LTRjNjctYTIxMy1iNGIwMDE2YzY5YzkiXSwiYXV0aF90aW1lIjoxNTI5NzUzMDA5LCJleHAiOjE1Mjk3NTY3MTksImlhdCI6MTUyOTc1MzExOSwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiZjRlMzliZWItOTM0YS00YjdhLWE4MGEtOGI5MTQ0ZTVkNmVmIiwibm9uY2UiOiJRSmhSTjVwQ24zaWpseU01IiwicmF0IjoxNTI5NzUzMTE2LCJzdWIiOiJmb29AYmFyLmNvbSJ9.H4o--urZYka_nrHgdEYzKTe4m-iwEjr01hsfwy1RgPan2NhD1YZX4jBpbgS4ZUGCB2s0_1ILcTlf3DQ-Va4GJwEZ4morkU4DOP8VI4JHxupRGdNrP8KUjq_BdQQ2Wlc3LVaWMrsCTrMcxvvmudaHvDml_h1AdiM5o2BmN1c0Khkp2FoYp9LNRQbpGviouaCbntIEPP04Oh3WEJriTvHXHxkgbtbAY10OroniJM74KAUiLj1UFlI8OcVwYBkR00T8aILQkwvFj1y2B6FSodPuE33lpahRShjZcj5c4D3UBnL8lS2-UYpRsy9AJem-dhi1OeB1NEEbc-byJjt3XMYCxln4asB57NbP1iwb0sFOrMUOhan1QB7TLdVSRncj9YkT294iD_v0-zXot2-6N9GWGgJKlMLukt45FKKhuq_NCuHGf56EYyoGH_lKHMDSBemYWDAWgntyf1KQH0C0fzRTAsHIfElyqY12dtoXVENwVP2zaRFCMGOKkzT4WF-R3SIMvJe1MwgtPStsvWDfC_iUmjuv0_BkGy8x6FES_xkFQ9ecnqcwK69IB9x4kLsdvhMkn_oLwCL1nWmLFxyCSSskbQDdVZ-jDuqkwH1_M_4eeZmCLiwgSivjD2AHwjOUW2ZiP_AztYb6AfdIBVHzxgfZ0hBnRV3VdFV7Z7HD-sE7a1U&scope=openid&state=u3dCBZz2EQkncPGO&token_type=bearer
2.828 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiMEtIcHR6U2tPcUJzTUtYcS14MTVldyIsImF1ZCI6WyI5MTEwZGVlOS0zM2U2LTRjNjctYTIxMy1iNGIwMDE2YzY5YzkiXSwiYXV0aF90aW1lIjoxNTI5NzUzMDA5LCJleHAiOjE1Mjk3NTY3MTksImlhdCI6MTUyOTc1MzExOSwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiZjRlMzliZWItOTM0YS00YjdhLWE4MGEtOGI5MTQ0ZTVkNmVmIiwibm9uY2UiOiJRSmhSTjVwQ24zaWpseU01IiwicmF0IjoxNTI5NzUzMTE2LCJzdWIiOiJmb29AYmFyLmNvbSJ9.H4o--urZYka_nrHgdEYzKTe4m-iwEjr01hsfwy1RgPan2NhD1YZX4jBpbgS4ZUGCB2s0_1ILcTlf3DQ-Va4GJwEZ4morkU4DOP8VI4JHxupRGdNrP8KUjq_BdQQ2Wlc3LVaWMrsCTrMcxvvmudaHvDml_h1AdiM5o2BmN1c0Khkp2FoYp9LNRQbpGviouaCbntIEPP04Oh3WEJriTvHXHxkgbtbAY10OroniJM74KAUiLj1UFlI8OcVwYBkR00T8aILQkwvFj1y2B6FSodPuE33lpahRShjZcj5c4D3UBnL8lS2-UYpRsy9AJem-dhi1OeB1NEEbc-byJjt3XMYCxln4asB57NbP1iwb0sFOrMUOhan1QB7TLdVSRncj9YkT294iD_v0-zXot2-6N9GWGgJKlMLukt45FKKhuq_NCuHGf56EYyoGH_lKHMDSBemYWDAWgntyf1KQH0C0fzRTAsHIfElyqY12dtoXVENwVP2zaRFCMGOKkzT4WF-R3SIMvJe1MwgtPStsvWDfC_iUmjuv0_BkGy8x6FES_xkFQ9ecnqcwK69IB9x4kLsdvhMkn_oLwCL1nWmLFxyCSSskbQDdVZ-jDuqkwH1_M_4eeZmCLiwgSivjD2AHwjOUW2ZiP_AztYb6AfdIBVHzxgfZ0hBnRV3VdFV7Z7HD-sE7a1U', 'scope': 'openid', 'access_token': '2MQV_gmDVW80gKnERKqACFeSVDMv-M_V15KaGFOhtQU.hoO3v3s7S_kUsayGfu4GcjZ-NFw93BWv2opG8NVTcKU', 'state': 'u3dCBZz2EQkncPGO', 'expires_in': 3599, 'token_type': 'bearer'}
2.914 AuthorizationResponse {
"access_token": "2MQV_gmDVW80gKnERKqACFeSVDMv-M_V15KaGFOhtQU.hoO3v3s7S_kUsayGfu4GcjZ-NFw93BWv2opG8NVTcKU",
"expires_in": 3599,
"id_token": {
"at_hash": "0KHptzSkOqBsMKXq-x15ew",
"aud": [
"9110dee9-33e6-4c67-a213-b4b0016c69c9"
],
"auth_time": 1529753009,
"exp": 1529756719,
"iat": 1529753119,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "f4e39beb-934a-4b7a-a80a-8b9144e5d6ef",
"nonce": "QJhRN5pCn3ijlyM5",
"rat": 1529753116,
"sub": "[email protected]"
},
"scope": "openid",
"state": "u3dCBZz2EQkncPGO",
"token_type": "bearer"
}
2.915 phase <--<-- 4 --- AccessToken -->-->
2.915 phase <--<-- 5 --- AsyncAuthn -->-->
2.915 AuthorizationRequest {
"client_id": "9110dee9-33e6-4c67-a213-b4b0016c69c9",
"id_token_hint": "eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiMEtIcHR6U2tPcUJzTUtYcS14MTVldyIsImF1ZCI6WyI5MTEwZGVlOS0zM2U2LTRjNjctYTIxMy1iNGIwMDE2YzY5YzkiXSwiYXV0aF90aW1lIjoxNTI5NzUzMDA5LCJleHAiOjE1Mjk3NTY3MTksImlhdCI6MTUyOTc1MzExOSwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiZjRlMzliZWItOTM0YS00YjdhLWE4MGEtOGI5MTQ0ZTVkNmVmIiwibm9uY2UiOiJRSmhSTjVwQ24zaWpseU01IiwicmF0IjoxNTI5NzUzMTE2LCJzdWIiOiJmb29AYmFyLmNvbSJ9.H4o--urZYka_nrHgdEYzKTe4m-iwEjr01hsfwy1RgPan2NhD1YZX4jBpbgS4ZUGCB2s0_1ILcTlf3DQ-Va4GJwEZ4morkU4DOP8VI4JHxupRGdNrP8KUjq_BdQQ2Wlc3LVaWMrsCTrMcxvvmudaHvDml_h1AdiM5o2BmN1c0Khkp2FoYp9LNRQbpGviouaCbntIEPP04Oh3WEJriTvHXHxkgbtbAY10OroniJM74KAUiLj1UFlI8OcVwYBkR00T8aILQkwvFj1y2B6FSodPuE33lpahRShjZcj5c4D3UBnL8lS2-UYpRsy9AJem-dhi1OeB1NEEbc-byJjt3XMYCxln4asB57NbP1iwb0sFOrMUOhan1QB7TLdVSRncj9YkT294iD_v0-zXot2-6N9GWGgJKlMLukt45FKKhuq_NCuHGf56EYyoGH_lKHMDSBemYWDAWgntyf1KQH0C0fzRTAsHIfElyqY12dtoXVENwVP2zaRFCMGOKkzT4WF-R3SIMvJe1MwgtPStsvWDfC_iUmjuv0_BkGy8x6FES_xkFQ9ecnqcwK69IB9x4kLsdvhMkn_oLwCL1nWmLFxyCSSskbQDdVZ-jDuqkwH1_M_4eeZmCLiwgSivjD2AHwjOUW2ZiP_AztYb6AfdIBVHzxgfZ0hBnRV3VdFV7Z7HD-sE7a1U",
"nonce": "rd7uVwh0dugZS6nR",
"prompt": [
"none"
],
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token token",
"scope": "openid",
"state": "WmFvyXOLqDMMyaI2"
}
2.916 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=9110dee9-33e6-4c67-a213-b4b0016c69c9&state=WmFvyXOLqDMMyaI2&id_token_hint=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiMEtIcHR6U2tPcUJzTUtYcS14MTVldyIsImF1ZCI6WyI5MTEwZGVlOS0zM2U2LTRjNjctYTIxMy1iNGIwMDE2YzY5YzkiXSwiYXV0aF90aW1lIjoxNTI5NzUzMDA5LCJleHAiOjE1Mjk3NTY3MTksImlhdCI6MTUyOTc1MzExOSwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiZjRlMzliZWItOTM0YS00YjdhLWE4MGEtOGI5MTQ0ZTVkNmVmIiwibm9uY2UiOiJRSmhSTjVwQ24zaWpseU01IiwicmF0IjoxNTI5NzUzMTE2LCJzdWIiOiJmb29AYmFyLmNvbSJ9.H4o--urZYka_nrHgdEYzKTe4m-iwEjr01hsfwy1RgPan2NhD1YZX4jBpbgS4ZUGCB2s0_1ILcTlf3DQ-Va4GJwEZ4morkU4DOP8VI4JHxupRGdNrP8KUjq_BdQQ2Wlc3LVaWMrsCTrMcxvvmudaHvDml_h1AdiM5o2BmN1c0Khkp2FoYp9LNRQbpGviouaCbntIEPP04Oh3WEJriTvHXHxkgbtbAY10OroniJM74KAUiLj1UFlI8OcVwYBkR00T8aILQkwvFj1y2B6FSodPuE33lpahRShjZcj5c4D3UBnL8lS2-UYpRsy9AJem-dhi1OeB1NEEbc-byJjt3XMYCxln4asB57NbP1iwb0sFOrMUOhan1QB7TLdVSRncj9YkT294iD_v0-zXot2-6N9GWGgJKlMLukt45FKKhuq_NCuHGf56EYyoGH_lKHMDSBemYWDAWgntyf1KQH0C0fzRTAsHIfElyqY12dtoXVENwVP2zaRFCMGOKkzT4WF-R3SIMvJe1MwgtPStsvWDfC_iUmjuv0_BkGy8x6FES_xkFQ9ecnqcwK69IB9x4kLsdvhMkn_oLwCL1nWmLFxyCSSskbQDdVZ-jDuqkwH1_M_4eeZmCLiwgSivjD2AHwjOUW2ZiP_AztYb6AfdIBVHzxgfZ0hBnRV3VdFV7Z7HD-sE7a1U&response_type=id_token+token&nonce=rd7uVwh0dugZS6nR
2.916 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=9110dee9-33e6-4c67-a213-b4b0016c69c9&state=WmFvyXOLqDMMyaI2&id_token_hint=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiMEtIcHR6U2tPcUJzTUtYcS14MTVldyIsImF1ZCI6WyI5MTEwZGVlOS0zM2U2LTRjNjctYTIxMy1iNGIwMDE2YzY5YzkiXSwiYXV0aF90aW1lIjoxNTI5NzUzMDA5LCJleHAiOjE1Mjk3NTY3MTksImlhdCI6MTUyOTc1MzExOSwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiZjRlMzliZWItOTM0YS00YjdhLWE4MGEtOGI5MTQ0ZTVkNmVmIiwibm9uY2UiOiJRSmhSTjVwQ24zaWpseU01IiwicmF0IjoxNTI5NzUzMTE2LCJzdWIiOiJmb29AYmFyLmNvbSJ9.H4o--urZYka_nrHgdEYzKTe4m-iwEjr01hsfwy1RgPan2NhD1YZX4jBpbgS4ZUGCB2s0_1ILcTlf3DQ-Va4GJwEZ4morkU4DOP8VI4JHxupRGdNrP8KUjq_BdQQ2Wlc3LVaWMrsCTrMcxvvmudaHvDml_h1AdiM5o2BmN1c0Khkp2FoYp9LNRQbpGviouaCbntIEPP04Oh3WEJriTvHXHxkgbtbAY10OroniJM74KAUiLj1UFlI8OcVwYBkR00T8aILQkwvFj1y2B6FSodPuE33lpahRShjZcj5c4D3UBnL8lS2-UYpRsy9AJem-dhi1OeB1NEEbc-byJjt3XMYCxln4asB57NbP1iwb0sFOrMUOhan1QB7TLdVSRncj9YkT294iD_v0-zXot2-6N9GWGgJKlMLukt45FKKhuq_NCuHGf56EYyoGH_lKHMDSBemYWDAWgntyf1KQH0C0fzRTAsHIfElyqY12dtoXVENwVP2zaRFCMGOKkzT4WF-R3SIMvJe1MwgtPStsvWDfC_iUmjuv0_BkGy8x6FES_xkFQ9ecnqcwK69IB9x4kLsdvhMkn_oLwCL1nWmLFxyCSSskbQDdVZ-jDuqkwH1_M_4eeZmCLiwgSivjD2AHwjOUW2ZiP_AztYb6AfdIBVHzxgfZ0hBnRV3VdFV7Z7HD-sE7a1U&response_type=id_token+token&nonce=rd7uVwh0dugZS6nR
4.243 http args {}
4.397 response URL with fragment
4.397 response access_token=o7iIveEhaCDYQIc-acA9XVqz_62jihi3y8KMStmcRog.LEUdKkNQC6Z5TwC-TdcWZb74XColJ4Cd0eoMi9QDPt0&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoidzlkT1N0UzQ4NXpHeVlDOGU5RzQxQSIsImF1ZCI6WyI5MTEwZGVlOS0zM2U2LTRjNjctYTIxMy1iNGIwMDE2YzY5YzkiXSwiYXV0aF90aW1lIjoxNTI5NzUzMDA5LCJleHAiOjE1Mjk3NTY3MjAsImlhdCI6MTUyOTc1MzEyMCwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiYTVjZmRiOTktMWM0ZS00OTc5LWE5OWYtYzY4OThkMzJjMjM3Iiwibm9uY2UiOiJyZDd1VndoMGR1Z1pTNm5SIiwicmF0IjoxNTI5NzUzMTE5LCJzdWIiOiJmb29AYmFyLmNvbSJ9.pfbQfRcH4h_XEHrDpadvMGe02sK4lKYVJHKO3fgL8kVmXq_Qbk7Ow_Ih0dWo-u4L_8TsWRs-XAfG-4w6dthDkAGyhPOi2uZTZ09dnPACkXoKqbM9bXJHaMm44evncOZNegLb3JVUjuIhn-X3Jdpj3LkHEd2E0B3P4VIU2EossMbugk1ZSohQ0eJNJ3jKt5R_dp4NdtcRwlpnuPLRLN7-xdz06WAZMnebAUl4irCZg52qR5z_106PIm8icaMI25zbJm18NNTkNp4HAKbyUtHeyBJdzfOsK6Z9EITEJ3ABLF3OOdablE6WK8SMU4sWGuUhd3k2QAFMUtzaBYmWvh7h7GIp1agch1RyY4wYPTyO9-ZUi6B1O52WwcI-egHmwnUE9GJbDFg-P0s1HTPukPejC0WvSN90tSAASVIiziU6Cmkcnfyh-x4aptYddH8rxCFulituyIZMpsTNSoGI-QiWGG_jegr7bjfgDCGGuFNqe4SfmU1GgA_ITZUf3SJB65w7nvAJLSLC8Ew7zrE1BM-w9E8Rsz2Op0vT5R9jEKkuN69jcpOHnSIJEYxcnH8w1qaYdQT-P1e9qiZ5lHj089XbMj2jEs7oQO4_sNPlf_FTdLZb0d84T28iF2lmV2_HG2jsjcJhJ2Cnn20G0olrzdzvObxjQI1eykEoMz3TEsEUd6U&scope=openid&state=WmFvyXOLqDMMyaI2&token_type=bearer
4.397 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoidzlkT1N0UzQ4NXpHeVlDOGU5RzQxQSIsImF1ZCI6WyI5MTEwZGVlOS0zM2U2LTRjNjctYTIxMy1iNGIwMDE2YzY5YzkiXSwiYXV0aF90aW1lIjoxNTI5NzUzMDA5LCJleHAiOjE1Mjk3NTY3MjAsImlhdCI6MTUyOTc1MzEyMCwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiYTVjZmRiOTktMWM0ZS00OTc5LWE5OWYtYzY4OThkMzJjMjM3Iiwibm9uY2UiOiJyZDd1VndoMGR1Z1pTNm5SIiwicmF0IjoxNTI5NzUzMTE5LCJzdWIiOiJmb29AYmFyLmNvbSJ9.pfbQfRcH4h_XEHrDpadvMGe02sK4lKYVJHKO3fgL8kVmXq_Qbk7Ow_Ih0dWo-u4L_8TsWRs-XAfG-4w6dthDkAGyhPOi2uZTZ09dnPACkXoKqbM9bXJHaMm44evncOZNegLb3JVUjuIhn-X3Jdpj3LkHEd2E0B3P4VIU2EossMbugk1ZSohQ0eJNJ3jKt5R_dp4NdtcRwlpnuPLRLN7-xdz06WAZMnebAUl4irCZg52qR5z_106PIm8icaMI25zbJm18NNTkNp4HAKbyUtHeyBJdzfOsK6Z9EITEJ3ABLF3OOdablE6WK8SMU4sWGuUhd3k2QAFMUtzaBYmWvh7h7GIp1agch1RyY4wYPTyO9-ZUi6B1O52WwcI-egHmwnUE9GJbDFg-P0s1HTPukPejC0WvSN90tSAASVIiziU6Cmkcnfyh-x4aptYddH8rxCFulituyIZMpsTNSoGI-QiWGG_jegr7bjfgDCGGuFNqe4SfmU1GgA_ITZUf3SJB65w7nvAJLSLC8Ew7zrE1BM-w9E8Rsz2Op0vT5R9jEKkuN69jcpOHnSIJEYxcnH8w1qaYdQT-P1e9qiZ5lHj089XbMj2jEs7oQO4_sNPlf_FTdLZb0d84T28iF2lmV2_HG2jsjcJhJ2Cnn20G0olrzdzvObxjQI1eykEoMz3TEsEUd6U', 'scope': 'openid', 'access_token': 'o7iIveEhaCDYQIc-acA9XVqz_62jihi3y8KMStmcRog.LEUdKkNQC6Z5TwC-TdcWZb74XColJ4Cd0eoMi9QDPt0', 'state': 'WmFvyXOLqDMMyaI2', 'expires_in': 3599, 'token_type': 'bearer'}
4.401 AuthorizationResponse {
"access_token": "o7iIveEhaCDYQIc-acA9XVqz_62jihi3y8KMStmcRog.LEUdKkNQC6Z5TwC-TdcWZb74XColJ4Cd0eoMi9QDPt0",
"expires_in": 3599,
"id_token": {
"at_hash": "w9dOStS485zGyYC8e9G41A",
"aud": [
"9110dee9-33e6-4c67-a213-b4b0016c69c9"
],
"auth_time": 1529753009,
"exp": 1529756720,
"iat": 1529753120,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "a5cfdb99-1c4e-4979-a99f-c6898d32c237",
"nonce": "rd7uVwh0dugZS6nR",
"rat": 1529753119,
"sub": "[email protected]"
},
"scope": "openid",
"state": "WmFvyXOLqDMMyaI2",
"token_type": "bearer"
}
4.401 phase <--<-- 6 --- AccessToken -->-->
4.401 phase <--<-- 7 --- Done -->-->
4.401 end
4.402 assertion VerifyResponse
4.402 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.402 assertion SameAuthn
4.402 condition same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
4.402 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Registration-tos_uri.txt 0000644 0000000 0000000 00000022541 13313426541 016370 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-tos_uri
Test description: Registration with tos_uri
Timestamp: 2018-06-23T11:22:09Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
0.919 phase <--<-- 1 --- Webfinger -->-->
0.919 not expected to do WebFinger
0.919 phase <--<-- 2 --- Discovery -->-->
0.92 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.006 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.008 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.008 phase <--<-- 3 --- Registration -->-->
1.008 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'tos_uri': 'https://op.certification.openid.net:61353/static/tos.html', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.008 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#oZZlG5YIt3SMX5JS"
],
"response_types": [
"id_token token"
],
"tos_uri": "https://op.certification.openid.net:61353/static/tos.html"
}
1.205 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.206 RegistrationResponse {
"client_id": "3c37b4ae-88bc-48b4-b6d3-cb953fbcaa32",
"client_secret": "x7pW9PRPOfyl",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "3c37b4ae-88bc-48b4-b6d3-cb953fbcaa32",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#oZZlG5YIt3SMX5JS"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"tos_uri": "https://op.certification.openid.net:61353/static/tos.html",
"userinfo_signed_response_alg": "none"
}
1.206 phase <--<-- 4 --- AsyncAuthn -->-->
1.207 AuthorizationRequest {
"client_id": "3c37b4ae-88bc-48b4-b6d3-cb953fbcaa32",
"nonce": "3d58ba2KngKqAaUi",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token token",
"scope": "openid",
"state": "Jo4ba8CkSA55KUxx"
}
1.207 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=3c37b4ae-88bc-48b4-b6d3-cb953fbcaa32&state=Jo4ba8CkSA55KUxx&response_type=id_token+token&nonce=3d58ba2KngKqAaUi
1.207 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=3c37b4ae-88bc-48b4-b6d3-cb953fbcaa32&state=Jo4ba8CkSA55KUxx&response_type=id_token+token&nonce=3d58ba2KngKqAaUi
4.762 http args {}
5.001 response URL with fragment
5.002 response access_token=C4YkfczIk38Rm7TuUSf_aTWvwcBy_S7ufpvc_WxNC2Q.F0i08hyYyJzCeaFuz-WHSlwB85EcVod0pZcCIpIwghA&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoidjRUYmttZXRkaWEySjBOQ3R5R0hoZyIsImF1ZCI6WyIzYzM3YjRhZS04OGJjLTQ4YjQtYjZkMy1jYjk1M2ZiY2FhMzIiXSwiYXV0aF90aW1lIjoxNTI5NzUyODIwLCJleHAiOjE1Mjk3NTY1MjgsImlhdCI6MTUyOTc1MjkyOCwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiMzY1ZDcwMTEtZWI0NC00YjY2LWJhNTEtMDlkOTRiMTljZGU0Iiwibm9uY2UiOiIzZDU4YmEyS25nS3FBYVVpIiwicmF0IjoxNTI5NzUyOTI1LCJzdWIiOiJmb29AYmFyLmNvbSJ9.V7nDr2zI-OpOUX2n53Z2XvxOv4FCoblMEn1BZ-eyOdSelDaVmqyP5GBpi6nOn-s7vxmNnLxIlLR9oDqYvB1mhH5b_SI5gS4QaefZyPwGLX1HhumIqm7vrQvNjac3CjBtVg9lFCbcuzB1ycpFvUSQEsMpic8jCe2KAruj8lnLcwUWuW0btR8z7tAaBzbJaUIkoiMbmj5jTPYB0t2NtUMhX6IhyRPDsQH-RrOsJBVFM9gfvsng9cRq28JDReCBL4cx58u4Ta066O3s2OQKVqFBHAiktnl02Xk05YD1CgwOGUF0OhyDOk6B64U1iPkf37NfX5_tyX407qgXlitBLScFZvKBYKwldIXCyIcgulgv9ZNRowETYt4O6fcGAcS1p6O9lxP8DaujwA3AwjK3fv7BMlMyZ5pDK6m7au8_Uf18wigp9WVKPtpwGQpRI260tAZMp7OHtz_-hdANNzW6UBeUen32oSLkJSJbOYJXUyKUY9b1tU-8P185MEpg_roua6MSQDEk2OJIFYKuRrxm5wVeHcPVFo7FJE75jQCc1Au2SrjPg83rF5J30T0Qd4owEHXDZ4d0Oy-aw0ewHlT_b87hPmjXyYgSD4zt6zVd8khwckfWbqRK9g7iaw_DOujDegDDjt3B-MwAyhR5TdQ9NAuNto78BDOOIgOq_aJLciTIrW4&scope=openid&state=Jo4ba8CkSA55KUxx&token_type=bearer
5.002 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoidjRUYmttZXRkaWEySjBOQ3R5R0hoZyIsImF1ZCI6WyIzYzM3YjRhZS04OGJjLTQ4YjQtYjZkMy1jYjk1M2ZiY2FhMzIiXSwiYXV0aF90aW1lIjoxNTI5NzUyODIwLCJleHAiOjE1Mjk3NTY1MjgsImlhdCI6MTUyOTc1MjkyOCwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiMzY1ZDcwMTEtZWI0NC00YjY2LWJhNTEtMDlkOTRiMTljZGU0Iiwibm9uY2UiOiIzZDU4YmEyS25nS3FBYVVpIiwicmF0IjoxNTI5NzUyOTI1LCJzdWIiOiJmb29AYmFyLmNvbSJ9.V7nDr2zI-OpOUX2n53Z2XvxOv4FCoblMEn1BZ-eyOdSelDaVmqyP5GBpi6nOn-s7vxmNnLxIlLR9oDqYvB1mhH5b_SI5gS4QaefZyPwGLX1HhumIqm7vrQvNjac3CjBtVg9lFCbcuzB1ycpFvUSQEsMpic8jCe2KAruj8lnLcwUWuW0btR8z7tAaBzbJaUIkoiMbmj5jTPYB0t2NtUMhX6IhyRPDsQH-RrOsJBVFM9gfvsng9cRq28JDReCBL4cx58u4Ta066O3s2OQKVqFBHAiktnl02Xk05YD1CgwOGUF0OhyDOk6B64U1iPkf37NfX5_tyX407qgXlitBLScFZvKBYKwldIXCyIcgulgv9ZNRowETYt4O6fcGAcS1p6O9lxP8DaujwA3AwjK3fv7BMlMyZ5pDK6m7au8_Uf18wigp9WVKPtpwGQpRI260tAZMp7OHtz_-hdANNzW6UBeUen32oSLkJSJbOYJXUyKUY9b1tU-8P185MEpg_roua6MSQDEk2OJIFYKuRrxm5wVeHcPVFo7FJE75jQCc1Au2SrjPg83rF5J30T0Qd4owEHXDZ4d0Oy-aw0ewHlT_b87hPmjXyYgSD4zt6zVd8khwckfWbqRK9g7iaw_DOujDegDDjt3B-MwAyhR5TdQ9NAuNto78BDOOIgOq_aJLciTIrW4', 'scope': 'openid', 'access_token': 'C4YkfczIk38Rm7TuUSf_aTWvwcBy_S7ufpvc_WxNC2Q.F0i08hyYyJzCeaFuz-WHSlwB85EcVod0pZcCIpIwghA', 'state': 'Jo4ba8CkSA55KUxx', 'expires_in': 3599, 'token_type': 'bearer'}
5.084 AuthorizationResponse {
"access_token": "C4YkfczIk38Rm7TuUSf_aTWvwcBy_S7ufpvc_WxNC2Q.F0i08hyYyJzCeaFuz-WHSlwB85EcVod0pZcCIpIwghA",
"expires_in": 3599,
"id_token": {
"at_hash": "v4Tbkmetdia2J0NCtyGHhg",
"aud": [
"3c37b4ae-88bc-48b4-b6d3-cb953fbcaa32"
],
"auth_time": 1529752820,
"exp": 1529756528,
"iat": 1529752928,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "365d7011-eb44-4b66-ba51-09d94b19cde4",
"nonce": "3d58ba2KngKqAaUi",
"rat": 1529752925,
"sub": "[email protected]"
},
"scope": "openid",
"state": "Jo4ba8CkSA55KUxx",
"token_type": "bearer"
}
5.084 phase <--<-- 5 --- Done -->-->
5.084 end
5.085 assertion VerifyAuthnResponse
5.085 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
5.085 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-prompt-none-NotLoggedIn.txt 0000644 0000000 0000000 00000015452 13313426700 016661 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-prompt-none-NotLoggedIn
Test description: Request with prompt=none when not logged in
Timestamp: 2018-06-23T11:23:44Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.797 phase <--<-- 1 --- Webfinger -->-->
1.797 not expected to do WebFinger
1.797 phase <--<-- 2 --- Discovery -->-->
1.797 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.875 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.876 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.876 phase <--<-- 3 --- Registration -->-->
1.876 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.876 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Gefr8bb1uG5MlAgw"
],
"response_types": [
"id_token token"
]
}
2.037 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
2.038 RegistrationResponse {
"client_id": "2426f26a-d3f7-47fc-a554-08e6c318ae0f",
"client_secret": "PXEAOFz-9-Ia",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "2426f26a-d3f7-47fc-a554-08e6c318ae0f",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Gefr8bb1uG5MlAgw"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
2.038 phase <--<-- 4 --- AsyncAuthn -->-->
2.038 AuthorizationRequest {
"client_id": "2426f26a-d3f7-47fc-a554-08e6c318ae0f",
"nonce": "SYfR3IPJwZsnVxdQ",
"prompt": [
"none"
],
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token token",
"scope": "openid",
"state": "Bydv2XaYoFssyp8M"
}
2.038 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=2426f26a-d3f7-47fc-a554-08e6c318ae0f&state=Bydv2XaYoFssyp8M&response_type=id_token+token&nonce=SYfR3IPJwZsnVxdQ
2.038 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=2426f26a-d3f7-47fc-a554-08e6c318ae0f&state=Bydv2XaYoFssyp8M&response_type=id_token+token&nonce=SYfR3IPJwZsnVxdQ
2.428 http args {}
2.619 response URL with fragment
2.62 response error=login_required&error_debug=Prompt+%2522none%2522+was+requested%252C+but+no+existing+login+session+was+found&error_description=The+Authorization+Server+requires+End-User+authentication&state=Bydv2XaYoFssyp8M
2.62 response {'error_debug': 'Prompt %22none%22 was requested%2C but no existing login session was found', 'error_description': 'The Authorization Server requires End-User authentication', 'state': 'Bydv2XaYoFssyp8M', 'error': 'login_required'}
2.62 AuthorizationErrorResponse {
"error": "login_required",
"error_debug": "Prompt %22none%22 was requested%2C but no existing login session was found",
"error_description": "The Authorization Server requires End-User authentication",
"state": "Bydv2XaYoFssyp8M"
}
2.62 AuthorizationErrorResponse {
"error": "login_required",
"error_debug": "Prompt %22none%22 was requested%2C but no existing login session was found",
"error_description": "The Authorization Server requires End-User authentication",
"state": "Bydv2XaYoFssyp8M"
}
2.621 phase <--<-- 5 --- Done -->-->
2.621 end
2.621 assertion VerifyErrorMessage
2.621 condition verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
2.621 condition Done: status=OK
============================================================
Conditions
verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-request_uri-Unsigned.txt 0000644 0000000 0000000 00000023312 13313426765 016362 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-request_uri-Unsigned
Test description: Support request_uri request parameter with unsigned request
Timestamp: 2018-06-23T11:24:37Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.079 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.08 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.08 phase <--<-- 2 --- Registration -->-->
0.08 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'request_object_signing_alg': 'none'}
0.08 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "none",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#06UB5In9QOZZRJGS"
],
"response_types": [
"id_token token"
]
}
0.24 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.241 RegistrationResponse {
"client_id": "8b7c0073-9609-449e-9aab-0475f9fa6ec9",
"client_secret": "AJRQcuaIkUbI",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "8b7c0073-9609-449e-9aab-0475f9fa6ec9",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "none",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#06UB5In9QOZZRJGS"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.241 phase <--<-- 3 --- AsyncAuthn -->-->
0.242 AuthorizationRequest {
"client_id": "8b7c0073-9609-449e-9aab-0475f9fa6ec9",
"nonce": "WVJBVouggIwqbGAn",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"request_uri": "https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#06UB5In9QOZZRJGS",
"response_type": "id_token token",
"scope": "openid",
"state": "JdcKjJE2ZHZITUki"
}
0.242 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?request_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Frequests%2Fe3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9%2306UB5In9QOZZRJGS&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=8b7c0073-9609-449e-9aab-0475f9fa6ec9&state=JdcKjJE2ZHZITUki&response_type=id_token+token&nonce=WVJBVouggIwqbGAn
0.242 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?request_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Frequests%2Fe3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9%2306UB5In9QOZZRJGS&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=8b7c0073-9609-449e-9aab-0475f9fa6ec9&state=JdcKjJE2ZHZITUki&response_type=id_token+token&nonce=WVJBVouggIwqbGAn
2.437 http args {}
2.609 response URL with fragment
2.609 response access_token=V5CuUWDoj5OSG0CeMsCxxtZM4LU9n-892aK2fAy1F6E.9ybarepqWyqHYMpP0I2m3r2pTHqAMrBhorT_qHjCL-Y&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiV1lMRFNyaWpvZjhCeG5lRnFaUFp5dyIsImF1ZCI6WyI4YjdjMDA3My05NjA5LTQ0OWUtOWFhYi0wNDc1ZjlmYTZlYzkiXSwiYXV0aF90aW1lIjoxNTI5NzUzMDA5LCJleHAiOjE1Mjk3NTY2NzYsImlhdCI6MTUyOTc1MzA3NiwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiYTZlNDc5YjYtMmQwNi00NDUzLWIzNGEtOWQ3Y2I2OTA3ZjRjIiwibm9uY2UiOiJXVkpCVm91Z2dJd3FiR0FuIiwicmF0IjoxNTI5NzUzMDc1LCJzdWIiOiJmb29AYmFyLmNvbSJ9.f-4atKcm9j-hhZQvqmMD1fs3s9lqMvM4WXVY4gvKLVyV0sROng10SYlMaP_a55AHR_ZQ7fqKvRWLxFJnZEtQDE9AaHphkBQ43zyuQftXSH7WWspW_blbDRmzvjw_3VCt4RFIXx37JpsREfK5pZfREYp682jMlq2XUxy8p9FjcKFa0j5ByYVrJBDszQwHSCNJvuGxLZK3ggEPiVfqoGYCzKtsHfcWaGmklPuYcQUeRvY9dVrmfHDsfoK6gzXaVzBIIBg5RMKwTJXfkuofXRuTctmG-nV6MYiX5cuGykfMJ4JmGFEZcWWR3p9TJTnxtjFfCVSmS4FdsWBfQozqoeBPBhd2qriedy1vC2jBGerAX8kJWbjnZME95lpyYVpDsSznKA6MoqnZkELdtmk3wLxUnbbnDlUgxJblBDyNSWRIbGw2ZaStWHAOrReaqIykZFiK8AGSy3zjTEd2IqZKR1ZiQcahs3_2rAmLB_2v0r2-FYx5vCjorl3BRCOiDx2fp3NRnkLdwPLyAlFzZTZLHJ-JjJ2fSDrOFD2DiBZqtABOaEbL3fjgFQBxatvIsT0oEya1qzBpY3wJbOhUnTGGqeR_hJtlQhwlI12Ah0M5iRVgGii-bMNBAAViEQJ_KGJaneK7dFb7PuxTQnybyP-UqyKu7duOQbB0jUmSDIHoJFDhFW4&scope=openid&state=JdcKjJE2ZHZITUki&token_type=bearer
2.61 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiV1lMRFNyaWpvZjhCeG5lRnFaUFp5dyIsImF1ZCI6WyI4YjdjMDA3My05NjA5LTQ0OWUtOWFhYi0wNDc1ZjlmYTZlYzkiXSwiYXV0aF90aW1lIjoxNTI5NzUzMDA5LCJleHAiOjE1Mjk3NTY2NzYsImlhdCI6MTUyOTc1MzA3NiwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiYTZlNDc5YjYtMmQwNi00NDUzLWIzNGEtOWQ3Y2I2OTA3ZjRjIiwibm9uY2UiOiJXVkpCVm91Z2dJd3FiR0FuIiwicmF0IjoxNTI5NzUzMDc1LCJzdWIiOiJmb29AYmFyLmNvbSJ9.f-4atKcm9j-hhZQvqmMD1fs3s9lqMvM4WXVY4gvKLVyV0sROng10SYlMaP_a55AHR_ZQ7fqKvRWLxFJnZEtQDE9AaHphkBQ43zyuQftXSH7WWspW_blbDRmzvjw_3VCt4RFIXx37JpsREfK5pZfREYp682jMlq2XUxy8p9FjcKFa0j5ByYVrJBDszQwHSCNJvuGxLZK3ggEPiVfqoGYCzKtsHfcWaGmklPuYcQUeRvY9dVrmfHDsfoK6gzXaVzBIIBg5RMKwTJXfkuofXRuTctmG-nV6MYiX5cuGykfMJ4JmGFEZcWWR3p9TJTnxtjFfCVSmS4FdsWBfQozqoeBPBhd2qriedy1vC2jBGerAX8kJWbjnZME95lpyYVpDsSznKA6MoqnZkELdtmk3wLxUnbbnDlUgxJblBDyNSWRIbGw2ZaStWHAOrReaqIykZFiK8AGSy3zjTEd2IqZKR1ZiQcahs3_2rAmLB_2v0r2-FYx5vCjorl3BRCOiDx2fp3NRnkLdwPLyAlFzZTZLHJ-JjJ2fSDrOFD2DiBZqtABOaEbL3fjgFQBxatvIsT0oEya1qzBpY3wJbOhUnTGGqeR_hJtlQhwlI12Ah0M5iRVgGii-bMNBAAViEQJ_KGJaneK7dFb7PuxTQnybyP-UqyKu7duOQbB0jUmSDIHoJFDhFW4', 'scope': 'openid', 'access_token': 'V5CuUWDoj5OSG0CeMsCxxtZM4LU9n-892aK2fAy1F6E.9ybarepqWyqHYMpP0I2m3r2pTHqAMrBhorT_qHjCL-Y', 'state': 'JdcKjJE2ZHZITUki', 'expires_in': 3599, 'token_type': 'bearer'}
2.729 AuthorizationResponse {
"access_token": "V5CuUWDoj5OSG0CeMsCxxtZM4LU9n-892aK2fAy1F6E.9ybarepqWyqHYMpP0I2m3r2pTHqAMrBhorT_qHjCL-Y",
"expires_in": 3599,
"id_token": {
"at_hash": "WYLDSrijof8BxneFqZPZyw",
"aud": [
"8b7c0073-9609-449e-9aab-0475f9fa6ec9"
],
"auth_time": 1529753009,
"exp": 1529756676,
"iat": 1529753076,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "a6e479b6-2d06-4453-b34a-9d7cb6907f4c",
"nonce": "WVJBVouggIwqbGAn",
"rat": 1529753075,
"sub": "[email protected]"
},
"scope": "openid",
"state": "JdcKjJE2ZHZITUki",
"token_type": "bearer"
}
2.729 phase <--<-- 4 --- Done -->-->
2.729 end
2.73 assertion VerifyResponse
2.73 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.73 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Req-acr_values.txt 0000644 0000000 0000000 00000023051 13313427025 015100 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-acr_values
Test description: Providing acr_values
Timestamp: 2018-06-23T11:25:09Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.075 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.077 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.077 phase <--<-- 2 --- Registration -->-->
0.077 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.077 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#h0rJ6zRdulxsefkQ"
],
"response_types": [
"id_token token"
]
}
0.267 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.268 RegistrationResponse {
"client_id": "4c7c7d93-a99f-4cac-9a7a-93042a7fb946",
"client_secret": "CQgnKFTW5-zU",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "4c7c7d93-a99f-4cac-9a7a-93042a7fb946",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#h0rJ6zRdulxsefkQ"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.268 phase <--<-- 3 --- AsyncAuthn -->-->
0.268 AuthorizationRequest {
"acr_values": "1 2",
"client_id": "4c7c7d93-a99f-4cac-9a7a-93042a7fb946",
"nonce": "cYH3qAlztl1lKU11",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token token",
"scope": "openid",
"state": "rfh8hNoBDv6dqv3y"
}
0.269 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=4c7c7d93-a99f-4cac-9a7a-93042a7fb946&state=rfh8hNoBDv6dqv3y&acr_values=1+2&response_type=id_token+token&nonce=cYH3qAlztl1lKU11
0.269 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=4c7c7d93-a99f-4cac-9a7a-93042a7fb946&state=rfh8hNoBDv6dqv3y&acr_values=1+2&response_type=id_token+token&nonce=cYH3qAlztl1lKU11
2.235 http args {}
2.405 response URL with fragment
2.405 response access_token=JKjxkpAfOXgKIWybsHsEMpQ0U1UJDxblSetV9l7N5es.8J5dT5zM9h5zZApQcV3hctGxwqbYPmVNTKNMH-Yirrs&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhY3IiOiIwIiwiYXRfaGFzaCI6Im9JTDZ5eVoyNVpBMG8xYWVYSElwMUEiLCJhdWQiOlsiNGM3YzdkOTMtYTk5Zi00Y2FjLTlhN2EtOTMwNDJhN2ZiOTQ2Il0sImF1dGhfdGltZSI6MTUyOTc1MzAwOSwiZXhwIjoxNTI5NzU2NzA5LCJpYXQiOjE1Mjk3NTMxMDksImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjhmZWE0MjI3LTYxODItNGExMC1iMTkyLTNjNDg4NzlmZDViOCIsIm5vbmNlIjoiY1lIM3FBbHp0bDFsS1UxMSIsInJhdCI6MTUyOTc1MzEwNywic3ViIjoiZm9vQGJhci5jb20ifQ.NiQU6F4y_LNGpBAOhJDRJHGjy-utaLbstD0JsafUMkL9mfQAImXE9PRnLJXPsevldOwdxWY4N9LpvTfX-Mv-Uu0Zb3XXVzUFxdqyue_57DgCM7lD11a0MT4ORT91DdIi2B6DYdkQViP2qV5OksCzHqKggkN9y3nGSDJkRupbXIfM6xLNjpN2hMJ0gL7070UbzlZMDC4dpsZJl2F0-AzUlfPEu4Jr8bSObDo2osCGKGYlzjuNDkkg9XHrRzhgRrh8GUz1QkQeZHfbW_rACTtKSYe4m5E5qsGrB1SVAZx2V7LImEGm6XD_Q8zfEyiT3SLrAVjCPPOWCTj3IMzRoOom15AqYwOpdGRh7gj2Fvk0wIzkRCuXZhp-Zc13RMuL9CBRz6MVsBML4hiI2jO-dXQ34uFmOeb6glI32mDvXysOWG_0IsCJ46qE9YpU1ZbrH5lAHbpYgCAbfp8vz-unij7neYJZryqa8YeCVC07kTxMuthvfH7UU3g59G3XoQcL9rAzeoYjmLo_s7UvdEvSpD_ZFJcDHPIvy-H5kPWe_abI5UEL9-Dtr8sBE3RlROlUiLbhTYKxgkIN-EBIfYLAvpLYUhu6jtr2J_RzXsv8MYv3UGQpVq8GRBUk0thzX1rt8AoybMgOuKVlkrJnYIFuVtwy2ZtO5IBV3gBSb6Cm_JSpTho&scope=openid&state=rfh8hNoBDv6dqv3y&token_type=bearer
2.405 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhY3IiOiIwIiwiYXRfaGFzaCI6Im9JTDZ5eVoyNVpBMG8xYWVYSElwMUEiLCJhdWQiOlsiNGM3YzdkOTMtYTk5Zi00Y2FjLTlhN2EtOTMwNDJhN2ZiOTQ2Il0sImF1dGhfdGltZSI6MTUyOTc1MzAwOSwiZXhwIjoxNTI5NzU2NzA5LCJpYXQiOjE1Mjk3NTMxMDksImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjhmZWE0MjI3LTYxODItNGExMC1iMTkyLTNjNDg4NzlmZDViOCIsIm5vbmNlIjoiY1lIM3FBbHp0bDFsS1UxMSIsInJhdCI6MTUyOTc1MzEwNywic3ViIjoiZm9vQGJhci5jb20ifQ.NiQU6F4y_LNGpBAOhJDRJHGjy-utaLbstD0JsafUMkL9mfQAImXE9PRnLJXPsevldOwdxWY4N9LpvTfX-Mv-Uu0Zb3XXVzUFxdqyue_57DgCM7lD11a0MT4ORT91DdIi2B6DYdkQViP2qV5OksCzHqKggkN9y3nGSDJkRupbXIfM6xLNjpN2hMJ0gL7070UbzlZMDC4dpsZJl2F0-AzUlfPEu4Jr8bSObDo2osCGKGYlzjuNDkkg9XHrRzhgRrh8GUz1QkQeZHfbW_rACTtKSYe4m5E5qsGrB1SVAZx2V7LImEGm6XD_Q8zfEyiT3SLrAVjCPPOWCTj3IMzRoOom15AqYwOpdGRh7gj2Fvk0wIzkRCuXZhp-Zc13RMuL9CBRz6MVsBML4hiI2jO-dXQ34uFmOeb6glI32mDvXysOWG_0IsCJ46qE9YpU1ZbrH5lAHbpYgCAbfp8vz-unij7neYJZryqa8YeCVC07kTxMuthvfH7UU3g59G3XoQcL9rAzeoYjmLo_s7UvdEvSpD_ZFJcDHPIvy-H5kPWe_abI5UEL9-Dtr8sBE3RlROlUiLbhTYKxgkIN-EBIfYLAvpLYUhu6jtr2J_RzXsv8MYv3UGQpVq8GRBUk0thzX1rt8AoybMgOuKVlkrJnYIFuVtwy2ZtO5IBV3gBSb6Cm_JSpTho', 'scope': 'openid', 'access_token': 'JKjxkpAfOXgKIWybsHsEMpQ0U1UJDxblSetV9l7N5es.8J5dT5zM9h5zZApQcV3hctGxwqbYPmVNTKNMH-Yirrs', 'state': 'rfh8hNoBDv6dqv3y', 'expires_in': 3599, 'token_type': 'bearer'}
2.485 AuthorizationResponse {
"access_token": "JKjxkpAfOXgKIWybsHsEMpQ0U1UJDxblSetV9l7N5es.8J5dT5zM9h5zZApQcV3hctGxwqbYPmVNTKNMH-Yirrs",
"expires_in": 3599,
"id_token": {
"acr": "0",
"at_hash": "oIL6yyZ25ZA0o1aeXHIp1A",
"aud": [
"4c7c7d93-a99f-4cac-9a7a-93042a7fb946"
],
"auth_time": 1529753009,
"exp": 1529756709,
"iat": 1529753109,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "8fea4227-6182-4a10-b192-3c48879fd5b8",
"nonce": "cYH3qAlztl1lKU11",
"rat": 1529753107,
"sub": "[email protected]"
},
"scope": "openid",
"state": "rfh8hNoBDv6dqv3y",
"token_type": "bearer"
}
2.485 phase <--<-- 4 --- AccessToken -->-->
2.485 phase <--<-- 5 --- Done -->-->
2.485 end
2.488 assertion VerifyResponse
2.488 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.489 assertion UsedAcrValue
2.489 condition used-acr-value: status=WARNING, message=Used acr value: 0, preferred: ['1', '2'] [The acr value in the ID Token]
2.489 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
used-acr-value: status=WARNING, message=Used acr value: 0, preferred: ['1', '2'] [The acr value in the ID Token]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
Used acr value: 0, preferred: ['1', '2']
./OP-scope-address.txt 0000644 0000000 0000000 00000025454 13313426776 015010 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-scope-address
Test description: Scope requesting address claims
Timestamp: 2018-06-23T11:24:46Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.077 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.078 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.079 phase <--<-- 2 --- Registration -->-->
0.079 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.079 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#51qE1v7YiDWHxyFN"
],
"response_types": [
"id_token token"
]
}
0.244 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.245 RegistrationResponse {
"client_id": "b5c4632c-3395-45f5-955a-ffa0fb78eef0",
"client_secret": "mUsReaa_C7Au",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "b5c4632c-3395-45f5-955a-ffa0fb78eef0",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#51qE1v7YiDWHxyFN"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.245 phase <--<-- 3 --- AsyncAuthn -->-->
0.245 condition Check support: status=WARNING, message=No support for: scopes_supported=['address']
0.245 AuthorizationRequest {
"client_id": "b5c4632c-3395-45f5-955a-ffa0fb78eef0",
"nonce": "ua4UlwbKhKB7VBoX",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token token",
"scope": "openid address",
"state": "uCrNJhMUG7n0DrmA"
}
0.246 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+address&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=b5c4632c-3395-45f5-955a-ffa0fb78eef0&state=uCrNJhMUG7n0DrmA&response_type=id_token+token&nonce=ua4UlwbKhKB7VBoX
0.246 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+address&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=b5c4632c-3395-45f5-955a-ffa0fb78eef0&state=uCrNJhMUG7n0DrmA&response_type=id_token+token&nonce=ua4UlwbKhKB7VBoX
2.387 http args {}
2.554 response URL with fragment
2.554 response access_token=HtNy2xVDiIhPTbUx23PoGKADqtoNhg0pPXWXuyOqYN4.tIJgSCTdc2FzidEIZBz7tbuiWPzigXZnsLtFBOQSpcc&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiOGRiV2hiaWdhQnZBMHpWZEF2ckVMQSIsImF1ZCI6WyJiNWM0NjMyYy0zMzk1LTQ1ZjUtOTU1YS1mZmEwZmI3OGVlZjAiXSwiYXV0aF90aW1lIjoxNTI5NzUzMDA5LCJleHAiOjE1Mjk3NTY2ODYsImlhdCI6MTUyOTc1MzA4NiwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiNWI2ODk5MjktZmE4YS00ODg3LWI3ODQtNTdjYTZhNDM0NjYzIiwibm9uY2UiOiJ1YTRVbHdiS2hLQjdWQm9YIiwicmF0IjoxNTI5NzUzMDg0LCJzdWIiOiJmb29AYmFyLmNvbSJ9.a5d_FqhpbIHjxcigVgg4pcCwtAodAo59EKoJJhFyq-R24BAmvQBbVCTqazagTADwBHlHtITGriC3r-feOrkZLvSm0G3hNGXEzxSZYvnbV9njzA894RVyeNsIKFcBpR6jLUCDCJE-gybtBSmgktn5w6_Sqk-OczeGyRy3dX2Pxy0iEcoZQUAd5c8GgffLJvyBtb0pmXgle2hRuG92aF6rE0aED7pQphVk_7DeP5mehEAdKTaXDh0RKG-4CTJ1ZN0v-tPQrUYn4ZHvwZTxH2EzmY5CSA6CPGQSmUfngPgee85-NIvNZMsE-ZqbzhVt7wGVtzujwWYgDcOv0yUgxPu4ufy8zI3g06FoM8ou8r0wV0PGPBAyYoX0qh3_PgbwT92QSNaGaRB3NjygLaPTH8aAIhiAMMW8uJ28zKAcoHPR8YDl9vgHefl-ErU4V2ay6SiXzk0B6HOQv-df3FNZ3QX3GqUyPRuc-QnM4QSMjp9WEuzBK7sAuOd5f0TX131QUzN6DfL80gD_SC_OZA0GalaiECvdjSvdy1lpbMs-WF-0AL7O03bsQbgGP5T9LBMHLTWhRmFpeQMjMrCwcRzBqPXTlXA7EuM0QHZfpFrrgPfMX145mWxFVoZnKeOe4J3pNS1OR7uI3d8GgfTo9LdpMKWdaQtK-rvRoOZPrc0WyI_xZl0&scope=openid%20address&state=uCrNJhMUG7n0DrmA&token_type=bearer
2.555 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiOGRiV2hiaWdhQnZBMHpWZEF2ckVMQSIsImF1ZCI6WyJiNWM0NjMyYy0zMzk1LTQ1ZjUtOTU1YS1mZmEwZmI3OGVlZjAiXSwiYXV0aF90aW1lIjoxNTI5NzUzMDA5LCJleHAiOjE1Mjk3NTY2ODYsImlhdCI6MTUyOTc1MzA4NiwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiNWI2ODk5MjktZmE4YS00ODg3LWI3ODQtNTdjYTZhNDM0NjYzIiwibm9uY2UiOiJ1YTRVbHdiS2hLQjdWQm9YIiwicmF0IjoxNTI5NzUzMDg0LCJzdWIiOiJmb29AYmFyLmNvbSJ9.a5d_FqhpbIHjxcigVgg4pcCwtAodAo59EKoJJhFyq-R24BAmvQBbVCTqazagTADwBHlHtITGriC3r-feOrkZLvSm0G3hNGXEzxSZYvnbV9njzA894RVyeNsIKFcBpR6jLUCDCJE-gybtBSmgktn5w6_Sqk-OczeGyRy3dX2Pxy0iEcoZQUAd5c8GgffLJvyBtb0pmXgle2hRuG92aF6rE0aED7pQphVk_7DeP5mehEAdKTaXDh0RKG-4CTJ1ZN0v-tPQrUYn4ZHvwZTxH2EzmY5CSA6CPGQSmUfngPgee85-NIvNZMsE-ZqbzhVt7wGVtzujwWYgDcOv0yUgxPu4ufy8zI3g06FoM8ou8r0wV0PGPBAyYoX0qh3_PgbwT92QSNaGaRB3NjygLaPTH8aAIhiAMMW8uJ28zKAcoHPR8YDl9vgHefl-ErU4V2ay6SiXzk0B6HOQv-df3FNZ3QX3GqUyPRuc-QnM4QSMjp9WEuzBK7sAuOd5f0TX131QUzN6DfL80gD_SC_OZA0GalaiECvdjSvdy1lpbMs-WF-0AL7O03bsQbgGP5T9LBMHLTWhRmFpeQMjMrCwcRzBqPXTlXA7EuM0QHZfpFrrgPfMX145mWxFVoZnKeOe4J3pNS1OR7uI3d8GgfTo9LdpMKWdaQtK-rvRoOZPrc0WyI_xZl0', 'scope': 'openid address', 'access_token': 'HtNy2xVDiIhPTbUx23PoGKADqtoNhg0pPXWXuyOqYN4.tIJgSCTdc2FzidEIZBz7tbuiWPzigXZnsLtFBOQSpcc', 'state': 'uCrNJhMUG7n0DrmA', 'expires_in': 3599, 'token_type': 'bearer'}
2.64 AuthorizationResponse {
"access_token": "HtNy2xVDiIhPTbUx23PoGKADqtoNhg0pPXWXuyOqYN4.tIJgSCTdc2FzidEIZBz7tbuiWPzigXZnsLtFBOQSpcc",
"expires_in": 3599,
"id_token": {
"at_hash": "8dbWhbigaBvA0zVdAvrELA",
"aud": [
"b5c4632c-3395-45f5-955a-ffa0fb78eef0"
],
"auth_time": 1529753009,
"exp": 1529756686,
"iat": 1529753086,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "5b689929-fa8a-4887-b784-57ca6a434663",
"nonce": "ua4UlwbKhKB7VBoX",
"rat": 1529753084,
"sub": "[email protected]"
},
"scope": "openid address",
"state": "uCrNJhMUG7n0DrmA",
"token_type": "bearer"
}
2.64 phase <--<-- 4 --- AccessToken -->-->
2.64 phase <--<-- 5 --- UserInfo -->-->
2.64 do_user_info_request kwargs:{'state': 'uCrNJhMUG7n0DrmA', 'method': 'GET', 'authn_method': 'bearer_header'}
2.64 request {'body': None}
2.64 request_url https://oidc-certification.ory.sh:8443/userinfo
2.64 request_http_args {'headers': {'Authorization': 'Bearer HtNy2xVDiIhPTbUx23PoGKADqtoNhg0pPXWXuyOqYN4.tIJgSCTdc2FzidEIZBz7tbuiWPzigXZnsLtFBOQSpcc'}}
2.71 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
2.711 OpenIDSchema {
"sub": "[email protected]"
}
2.711 OpenIDSchema {
"sub": "[email protected]"
}
2.711 phase <--<-- 6 --- Done -->-->
2.711 end
2.711 assertion CheckHTTPResponse
2.711 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
2.712 assertion VerifyResponse
2.712 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.712 assertion VerifyScopes
2.712 condition verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['address'] [Verifies that the claims corresponding to the requested scopes are returned]
2.712 condition Done: status=OK
============================================================
Conditions
Check support: status=WARNING, message=No support for: scopes_supported=['address']
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['address'] [Verifies that the claims corresponding to the requested scopes are returned]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
No support for: scopes_supported=['address']
The following claims were missing from the returned information: ['address']
./OP-Req-NotUnderstood.txt 0000644 0000000 0000000 00000022214 13313427022 015560 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-NotUnderstood
Test description: Request with extra query component
Timestamp: 2018-06-23T11:25:06Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Registration -->-->
0.075 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.075 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#BEogkRNYaXZN48Ly"
],
"response_types": [
"id_token token"
]
}
0.232 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.233 RegistrationResponse {
"client_id": "7a1e81ed-bee4-486b-a8a8-55c2f6735af8",
"client_secret": "OVxqqN1_7J1a",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "7a1e81ed-bee4-486b-a8a8-55c2f6735af8",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#BEogkRNYaXZN48Ly"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.233 phase <--<-- 3 --- AsyncAuthn -->-->
0.233 AuthorizationRequest {
"client_id": "7a1e81ed-bee4-486b-a8a8-55c2f6735af8",
"extra": "foobar",
"nonce": "1tvFiQRrN5WpG78f",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token token",
"scope": "openid",
"state": "6nLsa7lxm6CCi5Cb"
}
0.234 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?extra=foobar&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=7a1e81ed-bee4-486b-a8a8-55c2f6735af8&state=6nLsa7lxm6CCi5Cb&response_type=id_token+token&nonce=1tvFiQRrN5WpG78f
0.234 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?extra=foobar&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=7a1e81ed-bee4-486b-a8a8-55c2f6735af8&state=6nLsa7lxm6CCi5Cb&response_type=id_token+token&nonce=1tvFiQRrN5WpG78f
4.128 http args {}
4.3 response URL with fragment
4.301 response access_token=lrWACr2znVURENz6WadRWAhsTf6_lMftgteqTW59IFA.mFevD67G4pmiTXHnd4_xJWxGOIs-TrLa2h8PLv5VjBM&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiMzdyQXhIcllTV3NKZl9rVzhDVmEyZyIsImF1ZCI6WyI3YTFlODFlZC1iZWU0LTQ4NmItYThhOC01NWMyZjY3MzVhZjgiXSwiYXV0aF90aW1lIjoxNTI5NzUzMDA5LCJleHAiOjE1Mjk3NTY3MDUsImlhdCI6MTUyOTc1MzEwNSwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiZGE2ZjE3ODctY2JmNy00YTdmLWExMzQtYjUwMTE5OTU3ZDFlIiwibm9uY2UiOiIxdHZGaVFSck41V3BHNzhmIiwicmF0IjoxNTI5NzUzMTAyLCJzdWIiOiJmb29AYmFyLmNvbSJ9.JGd9NoRhQaHsF4ddJVwfxFoRhN2I9-OpMgQq_8duNYv7ZIJzz9RMZdEegemr5zcZahpnVKE_FiRbZILdwLtRvX5z2lor9VqKSLK967Uxx1D6uWVpEcAIWZEQwK5H416VsfwfZxJeLuWVYtUJmAdpfNJlZkdSQiwkmRHza9aC1w9Ggkxq3Oss-q8_VRIk3oj3XO4Nx5RYCK_XObvS9FkeJJwg16ygam32UmcWY_r84Ag6JaGFyHMnaNVmSlaOqdM4wuxYm6t-bUILfS7NoglL3ls3kcS-vZnznsYA1LqWFZT_TbMgRZHXR_bE0ZDQTQOanKiShu6J0bcBQXRNYhbdlj2mfrJnWlRvfe_IWPAQyED1uaYQYfshQ5X3c1D-thUbNI1xCgNI62j3TjznAXaxp0VbU7yWQ7UwsYs7qmLXrXoSNG_l_TFr5D3z3vKHkMQUjePqt1PnShdR2NgYySfKIclpshmVf-VABQVivpKtZuaOsxLUT2m0LlXexAuhuSW1t81vqPYkbmmB1OqEJnhLzWUbky4HBwBEiRYfY-FfELPKUj1vLg-D_Npzjvi4fhNvhKo6luvIhphR9XiNluAmDjOUssb-Z4_KJDJDaWSpNxFNFXcXHd0w3YfJsNYHxhUiuOMxriGWbn2vTrQsFwGMstGQxNwFZNIGjFhCuH3WKFY&scope=openid&state=6nLsa7lxm6CCi5Cb&token_type=bearer
4.301 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiMzdyQXhIcllTV3NKZl9rVzhDVmEyZyIsImF1ZCI6WyI3YTFlODFlZC1iZWU0LTQ4NmItYThhOC01NWMyZjY3MzVhZjgiXSwiYXV0aF90aW1lIjoxNTI5NzUzMDA5LCJleHAiOjE1Mjk3NTY3MDUsImlhdCI6MTUyOTc1MzEwNSwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiZGE2ZjE3ODctY2JmNy00YTdmLWExMzQtYjUwMTE5OTU3ZDFlIiwibm9uY2UiOiIxdHZGaVFSck41V3BHNzhmIiwicmF0IjoxNTI5NzUzMTAyLCJzdWIiOiJmb29AYmFyLmNvbSJ9.JGd9NoRhQaHsF4ddJVwfxFoRhN2I9-OpMgQq_8duNYv7ZIJzz9RMZdEegemr5zcZahpnVKE_FiRbZILdwLtRvX5z2lor9VqKSLK967Uxx1D6uWVpEcAIWZEQwK5H416VsfwfZxJeLuWVYtUJmAdpfNJlZkdSQiwkmRHza9aC1w9Ggkxq3Oss-q8_VRIk3oj3XO4Nx5RYCK_XObvS9FkeJJwg16ygam32UmcWY_r84Ag6JaGFyHMnaNVmSlaOqdM4wuxYm6t-bUILfS7NoglL3ls3kcS-vZnznsYA1LqWFZT_TbMgRZHXR_bE0ZDQTQOanKiShu6J0bcBQXRNYhbdlj2mfrJnWlRvfe_IWPAQyED1uaYQYfshQ5X3c1D-thUbNI1xCgNI62j3TjznAXaxp0VbU7yWQ7UwsYs7qmLXrXoSNG_l_TFr5D3z3vKHkMQUjePqt1PnShdR2NgYySfKIclpshmVf-VABQVivpKtZuaOsxLUT2m0LlXexAuhuSW1t81vqPYkbmmB1OqEJnhLzWUbky4HBwBEiRYfY-FfELPKUj1vLg-D_Npzjvi4fhNvhKo6luvIhphR9XiNluAmDjOUssb-Z4_KJDJDaWSpNxFNFXcXHd0w3YfJsNYHxhUiuOMxriGWbn2vTrQsFwGMstGQxNwFZNIGjFhCuH3WKFY', 'scope': 'openid', 'access_token': 'lrWACr2znVURENz6WadRWAhsTf6_lMftgteqTW59IFA.mFevD67G4pmiTXHnd4_xJWxGOIs-TrLa2h8PLv5VjBM', 'state': '6nLsa7lxm6CCi5Cb', 'expires_in': 3599, 'token_type': 'bearer'}
4.423 AuthorizationResponse {
"access_token": "lrWACr2znVURENz6WadRWAhsTf6_lMftgteqTW59IFA.mFevD67G4pmiTXHnd4_xJWxGOIs-TrLa2h8PLv5VjBM",
"expires_in": 3599,
"id_token": {
"at_hash": "37rAxHrYSWsJf_kW8CVa2g",
"aud": [
"7a1e81ed-bee4-486b-a8a8-55c2f6735af8"
],
"auth_time": 1529753009,
"exp": 1529756705,
"iat": 1529753105,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "da6f1787-cbf7-4a7f-a134-b50119957d1e",
"nonce": "1tvFiQRrN5WpG78f",
"rat": 1529753102,
"sub": "[email protected]"
},
"scope": "openid",
"state": "6nLsa7lxm6CCi5Cb",
"token_type": "bearer"
}
4.423 phase <--<-- 4 --- Done -->-->
4.423 end
4.423 assertion VerifyAuthnResponse
4.423 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
4.423 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-scope-email.txt 0000644 0000000 0000000 00000025515 13313427004 014431 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-scope-email
Test description: Scope requesting email claims
Timestamp: 2018-06-23T11:24:52Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.075 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.076 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.076 phase <--<-- 2 --- Registration -->-->
0.076 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.077 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#FTG0BCrkbr9LEY7M"
],
"response_types": [
"id_token token"
]
}
0.233 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.234 RegistrationResponse {
"client_id": "e61b2122-3e5e-4498-a4df-76f8b8b64ce9",
"client_secret": "9Qa29O0YLD4h",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "e61b2122-3e5e-4498-a4df-76f8b8b64ce9",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#FTG0BCrkbr9LEY7M"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.234 phase <--<-- 3 --- AsyncAuthn -->-->
0.235 condition Check support: status=WARNING, message=No support for: scopes_supported=['email']
0.235 AuthorizationRequest {
"client_id": "e61b2122-3e5e-4498-a4df-76f8b8b64ce9",
"nonce": "MM3cT5X4NqSHrlqa",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token token",
"scope": "openid email",
"state": "Hkw2BtJOjXgXYmIf"
}
0.235 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+email&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=e61b2122-3e5e-4498-a4df-76f8b8b64ce9&state=Hkw2BtJOjXgXYmIf&response_type=id_token+token&nonce=MM3cT5X4NqSHrlqa
0.235 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+email&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=e61b2122-3e5e-4498-a4df-76f8b8b64ce9&state=Hkw2BtJOjXgXYmIf&response_type=id_token+token&nonce=MM3cT5X4NqSHrlqa
4.04 http args {}
4.239 response URL with fragment
4.239 response access_token=pvFEQTbQXPmj093UotBKf9-xus13tVPOlwvgKTYUV2M.bfeyH2dodA5FOiyueqC4Ckn6kRo90eb5e2qx6JNjVYM&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiWi1RSDZuTkx0T0h4WkF2N1QyOWxmUSIsImF1ZCI6WyJlNjFiMjEyMi0zZTVlLTQ0OTgtYTRkZi03NmY4YjhiNjRjZTkiXSwiYXV0aF90aW1lIjoxNTI5NzUzMDA5LCJleHAiOjE1Mjk3NTY2OTEsImlhdCI6MTUyOTc1MzA5MSwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiN2VkODUwNGItMzdhZi00NjBkLTgxMTAtNDM4MTIwNzk0NzJjIiwibm9uY2UiOiJNTTNjVDVYNE5xU0hybHFhIiwicmF0IjoxNTI5NzUzMDg4LCJzdWIiOiJmb29AYmFyLmNvbSJ9.fPntVONhR_FTvgVnXRvL0qVLsalMyOrq8vHuo5wjU6Ls77JGybfD6KhfG7MAY-zdnboRGac_Jgmhmolum0enqw7BtnfJKbgvbZYifaG53yJ-07PvQEGRAIYMt7DgiV1Vq_YcO-NghoD0P2r7wqZy7g8X_AneJdqJGU4497PrgGXN6aTxpA6CNaAvD394Gywimk4EPzLGirbvOuDSly-IYbmh27PmIEfuKgE9k6RWbT2Eu6c2GAV7EkWTQqbVbbavPZo-4C8z6B4obLzXQPJoGzV4Qli08k1EiwIR2ODGZE6Fp66nOyI7SL_OoLoEn7V74ABK9ZCMiC7ZUfD_VqvlkQxt7W3nA8xwt8myztt_DLTdQrjmDmab1fh5qCu9SFzq336VWXFAxI_D9_8QL6uOt2oLmpujk-_Iiq7ZnEQoEZQfreQ6ZqqnEUHe8VLXqO_ajn6MfOSf_Suw6wrkCKQr1VlFLdcSG12P2Hr2--A-HBqUm57Dgd7gimBQ_FQeTlbrrarzYc837s0CZtsuYkfDghVr88byOr4nWxwjsvT0DfyU_Dq56iA2r5Fzi-Zq9xNa63NLca9sLD-cbAJntbBnioZouj8FcDz0SqHUXqGc6WJJQMgh5p7xcFRRoGQVzCuHn3rP0ShpwwvYrp9dgDd_HX1ovkk1ICB4dv5koiHeLh8&scope=openid%20email&state=Hkw2BtJOjXgXYmIf&token_type=bearer
4.239 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiWi1RSDZuTkx0T0h4WkF2N1QyOWxmUSIsImF1ZCI6WyJlNjFiMjEyMi0zZTVlLTQ0OTgtYTRkZi03NmY4YjhiNjRjZTkiXSwiYXV0aF90aW1lIjoxNTI5NzUzMDA5LCJleHAiOjE1Mjk3NTY2OTEsImlhdCI6MTUyOTc1MzA5MSwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiN2VkODUwNGItMzdhZi00NjBkLTgxMTAtNDM4MTIwNzk0NzJjIiwibm9uY2UiOiJNTTNjVDVYNE5xU0hybHFhIiwicmF0IjoxNTI5NzUzMDg4LCJzdWIiOiJmb29AYmFyLmNvbSJ9.fPntVONhR_FTvgVnXRvL0qVLsalMyOrq8vHuo5wjU6Ls77JGybfD6KhfG7MAY-zdnboRGac_Jgmhmolum0enqw7BtnfJKbgvbZYifaG53yJ-07PvQEGRAIYMt7DgiV1Vq_YcO-NghoD0P2r7wqZy7g8X_AneJdqJGU4497PrgGXN6aTxpA6CNaAvD394Gywimk4EPzLGirbvOuDSly-IYbmh27PmIEfuKgE9k6RWbT2Eu6c2GAV7EkWTQqbVbbavPZo-4C8z6B4obLzXQPJoGzV4Qli08k1EiwIR2ODGZE6Fp66nOyI7SL_OoLoEn7V74ABK9ZCMiC7ZUfD_VqvlkQxt7W3nA8xwt8myztt_DLTdQrjmDmab1fh5qCu9SFzq336VWXFAxI_D9_8QL6uOt2oLmpujk-_Iiq7ZnEQoEZQfreQ6ZqqnEUHe8VLXqO_ajn6MfOSf_Suw6wrkCKQr1VlFLdcSG12P2Hr2--A-HBqUm57Dgd7gimBQ_FQeTlbrrarzYc837s0CZtsuYkfDghVr88byOr4nWxwjsvT0DfyU_Dq56iA2r5Fzi-Zq9xNa63NLca9sLD-cbAJntbBnioZouj8FcDz0SqHUXqGc6WJJQMgh5p7xcFRRoGQVzCuHn3rP0ShpwwvYrp9dgDd_HX1ovkk1ICB4dv5koiHeLh8', 'scope': 'openid email', 'access_token': 'pvFEQTbQXPmj093UotBKf9-xus13tVPOlwvgKTYUV2M.bfeyH2dodA5FOiyueqC4Ckn6kRo90eb5e2qx6JNjVYM', 'state': 'Hkw2BtJOjXgXYmIf', 'expires_in': 3599, 'token_type': 'bearer'}
4.325 AuthorizationResponse {
"access_token": "pvFEQTbQXPmj093UotBKf9-xus13tVPOlwvgKTYUV2M.bfeyH2dodA5FOiyueqC4Ckn6kRo90eb5e2qx6JNjVYM",
"expires_in": 3599,
"id_token": {
"at_hash": "Z-QH6nNLtOHxZAv7T29lfQ",
"aud": [
"e61b2122-3e5e-4498-a4df-76f8b8b64ce9"
],
"auth_time": 1529753009,
"exp": 1529756691,
"iat": 1529753091,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "7ed8504b-37af-460d-8110-43812079472c",
"nonce": "MM3cT5X4NqSHrlqa",
"rat": 1529753088,
"sub": "[email protected]"
},
"scope": "openid email",
"state": "Hkw2BtJOjXgXYmIf",
"token_type": "bearer"
}
4.325 phase <--<-- 4 --- AccessToken -->-->
4.325 phase <--<-- 5 --- UserInfo -->-->
4.325 do_user_info_request kwargs:{'state': 'Hkw2BtJOjXgXYmIf', 'method': 'GET', 'authn_method': 'bearer_header'}
4.325 request {'body': None}
4.325 request_url https://oidc-certification.ory.sh:8443/userinfo
4.325 request_http_args {'headers': {'Authorization': 'Bearer pvFEQTbQXPmj093UotBKf9-xus13tVPOlwvgKTYUV2M.bfeyH2dodA5FOiyueqC4Ckn6kRo90eb5e2qx6JNjVYM'}}
4.405 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
4.406 OpenIDSchema {
"sub": "[email protected]"
}
4.406 OpenIDSchema {
"sub": "[email protected]"
}
4.406 phase <--<-- 6 --- Done -->-->
4.406 end
4.407 assertion CheckHTTPResponse
4.407 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
4.407 assertion VerifyResponse
4.407 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.407 assertion VerifyScopes
4.408 condition verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['email', 'email_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
4.408 condition Done: status=OK
============================================================
Conditions
Check support: status=WARNING, message=No support for: scopes_supported=['email']
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['email', 'email_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
No support for: scopes_supported=['email']
The following claims were missing from the returned information: ['email', 'email_verified']
./OP-scope-phone.txt 0000644 0000000 0000000 00000025567 13313427010 014457 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-scope-phone
Test description: Scope requesting phone claims
Timestamp: 2018-06-23T11:24:56Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.083 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.084 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.084 phase <--<-- 2 --- Registration -->-->
0.084 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.085 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#2UmCXr8cSNXfk747"
],
"response_types": [
"id_token token"
]
}
0.24 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.241 RegistrationResponse {
"client_id": "9f2ac16b-6696-486d-b55c-a06ce33685b9",
"client_secret": "BB-U9Jhi8LZZ",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "9f2ac16b-6696-486d-b55c-a06ce33685b9",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#2UmCXr8cSNXfk747"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.241 phase <--<-- 3 --- AsyncAuthn -->-->
0.242 condition Check support: status=WARNING, message=No support for: scopes_supported=['phone']
0.242 AuthorizationRequest {
"client_id": "9f2ac16b-6696-486d-b55c-a06ce33685b9",
"nonce": "51rbLebd9X2BWBiB",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token token",
"scope": "openid phone",
"state": "VrYEa2CzigjMudCQ"
}
0.242 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+phone&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=9f2ac16b-6696-486d-b55c-a06ce33685b9&state=VrYEa2CzigjMudCQ&response_type=id_token+token&nonce=51rbLebd9X2BWBiB
0.242 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+phone&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=9f2ac16b-6696-486d-b55c-a06ce33685b9&state=VrYEa2CzigjMudCQ&response_type=id_token+token&nonce=51rbLebd9X2BWBiB
2.447 http args {}
2.617 response URL with fragment
2.617 response access_token=OVJxaNSz6D3at_8vMIhZHR149RnqEu9T-e11CL4zzEU.4SZgahzYyu1eaVDwWt3eaBpK2OCgfa3mjFM38w1ttsA&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoicFdhUzBhV1NUT0QwaXJMa0tqbjlYZyIsImF1ZCI6WyI5ZjJhYzE2Yi02Njk2LTQ4NmQtYjU1Yy1hMDZjZTMzNjg1YjkiXSwiYXV0aF90aW1lIjoxNTI5NzUzMDA5LCJleHAiOjE1Mjk3NTY2OTUsImlhdCI6MTUyOTc1MzA5NSwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiMzI0ZTgwOWEtYWFlNS00Zjk3LWI2YmEtMzcwMTRlMzBkYjJhIiwibm9uY2UiOiI1MXJiTGViZDlYMkJXQmlCIiwicmF0IjoxNTI5NzUzMDkzLCJzdWIiOiJmb29AYmFyLmNvbSJ9.PrhwWuKVjb73GGZmq9xSGWpJ4lWaCDKPrHOQTO7TBr7iEK31_rLBo03md67HmPzFU0wk1RqjxupJDuI5zr2FSmPiQa65B7nxgga2u3ZnouqA55QxmwqtLuJQw5FRj7egi3v7N8wiO8B5fSyw0Nk6AW7MwZd2JhuyjY3AjQfKCDCZg7lENPQJACOaPJh3qUo5KHJrda2Ol5BdNmjJydnGm-U0mGFZeubqQfrfdhjpYj8H-NCzElaQFMl0aqcSFHGcN8tH6pN05U5YDdRpLeSjKa6mZFRJHaZGW0P--2sSuRf7e-1VwtUexJjKDqnCNFNoY6519zKCQZh_zdkEHTvWFS7N2febH0ZFOeEQKmnjWXymsYaAxCVP8U2TO3-mhyrlTmIJeAEJ2WS_Mpx6P3ggbtqidNWV7bpzS_idcT-7kIVm72GCvIl3lIeHLR_t-1NimqvFK08crgOillqQAuVERbL7-SFDD2PzOgUFIj_dEbvu-vECJn5toq3HZhiezZfz_DydzjhisVOdedOCOogsD1mE7ul-EO8VhMHTHarf_JLRly10YpO_EJUVRQtYymvHMTMrpNUE_2Uqve4EX6V30YOOXxpgeG87CvHQio2ZjYbQxyv1OnCikhMsfPPl1eun076ZPkTKZdWFaKMpAjYeEfzTjFj576qE_K44N2nJ_RY&scope=openid%20phone&state=VrYEa2CzigjMudCQ&token_type=bearer
2.618 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoicFdhUzBhV1NUT0QwaXJMa0tqbjlYZyIsImF1ZCI6WyI5ZjJhYzE2Yi02Njk2LTQ4NmQtYjU1Yy1hMDZjZTMzNjg1YjkiXSwiYXV0aF90aW1lIjoxNTI5NzUzMDA5LCJleHAiOjE1Mjk3NTY2OTUsImlhdCI6MTUyOTc1MzA5NSwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiMzI0ZTgwOWEtYWFlNS00Zjk3LWI2YmEtMzcwMTRlMzBkYjJhIiwibm9uY2UiOiI1MXJiTGViZDlYMkJXQmlCIiwicmF0IjoxNTI5NzUzMDkzLCJzdWIiOiJmb29AYmFyLmNvbSJ9.PrhwWuKVjb73GGZmq9xSGWpJ4lWaCDKPrHOQTO7TBr7iEK31_rLBo03md67HmPzFU0wk1RqjxupJDuI5zr2FSmPiQa65B7nxgga2u3ZnouqA55QxmwqtLuJQw5FRj7egi3v7N8wiO8B5fSyw0Nk6AW7MwZd2JhuyjY3AjQfKCDCZg7lENPQJACOaPJh3qUo5KHJrda2Ol5BdNmjJydnGm-U0mGFZeubqQfrfdhjpYj8H-NCzElaQFMl0aqcSFHGcN8tH6pN05U5YDdRpLeSjKa6mZFRJHaZGW0P--2sSuRf7e-1VwtUexJjKDqnCNFNoY6519zKCQZh_zdkEHTvWFS7N2febH0ZFOeEQKmnjWXymsYaAxCVP8U2TO3-mhyrlTmIJeAEJ2WS_Mpx6P3ggbtqidNWV7bpzS_idcT-7kIVm72GCvIl3lIeHLR_t-1NimqvFK08crgOillqQAuVERbL7-SFDD2PzOgUFIj_dEbvu-vECJn5toq3HZhiezZfz_DydzjhisVOdedOCOogsD1mE7ul-EO8VhMHTHarf_JLRly10YpO_EJUVRQtYymvHMTMrpNUE_2Uqve4EX6V30YOOXxpgeG87CvHQio2ZjYbQxyv1OnCikhMsfPPl1eun076ZPkTKZdWFaKMpAjYeEfzTjFj576qE_K44N2nJ_RY', 'scope': 'openid phone', 'access_token': 'OVJxaNSz6D3at_8vMIhZHR149RnqEu9T-e11CL4zzEU.4SZgahzYyu1eaVDwWt3eaBpK2OCgfa3mjFM38w1ttsA', 'state': 'VrYEa2CzigjMudCQ', 'expires_in': 3599, 'token_type': 'bearer'}
2.698 AuthorizationResponse {
"access_token": "OVJxaNSz6D3at_8vMIhZHR149RnqEu9T-e11CL4zzEU.4SZgahzYyu1eaVDwWt3eaBpK2OCgfa3mjFM38w1ttsA",
"expires_in": 3599,
"id_token": {
"at_hash": "pWaS0aWSTOD0irLkKjn9Xg",
"aud": [
"9f2ac16b-6696-486d-b55c-a06ce33685b9"
],
"auth_time": 1529753009,
"exp": 1529756695,
"iat": 1529753095,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "324e809a-aae5-4f97-b6ba-37014e30db2a",
"nonce": "51rbLebd9X2BWBiB",
"rat": 1529753093,
"sub": "[email protected]"
},
"scope": "openid phone",
"state": "VrYEa2CzigjMudCQ",
"token_type": "bearer"
}
2.698 phase <--<-- 4 --- AccessToken -->-->
2.698 phase <--<-- 5 --- UserInfo -->-->
2.698 do_user_info_request kwargs:{'state': 'VrYEa2CzigjMudCQ', 'method': 'GET', 'authn_method': 'bearer_header'}
2.699 request {'body': None}
2.699 request_url https://oidc-certification.ory.sh:8443/userinfo
2.699 request_http_args {'headers': {'Authorization': 'Bearer OVJxaNSz6D3at_8vMIhZHR149RnqEu9T-e11CL4zzEU.4SZgahzYyu1eaVDwWt3eaBpK2OCgfa3mjFM38w1ttsA'}}
2.771 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
2.771 OpenIDSchema {
"sub": "[email protected]"
}
2.771 OpenIDSchema {
"sub": "[email protected]"
}
2.771 phase <--<-- 6 --- Done -->-->
2.771 end
2.772 assertion CheckHTTPResponse
2.772 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
2.772 assertion VerifyResponse
2.772 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.773 assertion VerifyScopes
2.773 condition verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['phone_number', 'phone_number_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
2.773 condition Done: status=OK
============================================================
Conditions
Check support: status=WARNING, message=No support for: scopes_supported=['phone']
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['phone_number', 'phone_number_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
No support for: scopes_supported=['phone']
The following claims were missing from the returned information: ['phone_number', 'phone_number_verified']
./OP-Discovery-jwks_uri.txt 0000644 0000000 0000000 00000024536 13313426511 016041 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Discovery-jwks_uri
Test description: Verify that jwks_uri is published
Timestamp: 2018-06-23T11:21:45Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.113 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.114 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.114 phase <--<-- 2 --- Done -->-->
0.114 end
0.115 assertion CheckHTTPResponse
0.115 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.115 assertion BareKeys
0.183 http response url:https://oidc-certification.ory.sh:8443/.well-known/jwks.json status_code:200
0.184 jwks {'keys': [{'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': 'wFhdHCpPOd_H73YRTAyD8XHLxrYoaWlBWInPL-XkcIEOig3_9SzLzf8fL4Kv-tUFJwsUt9EmiKNLvRczFQddW5tgzW-ZLA4RaGQ1rBGDlmVbLBq9D7z_2UkTFrLiz1KY9YRrraNENtmS2DFmBbuQXIOBaX_n9mjgOK2GsLLSPrpm3IV3C_YWov1XibNpFuMIfEw0OhpvFMiQRkdkpf5bgFuEx7LK-rbALl_bul15TSltegQsjQyJkKwyJ4L_PaFSBz5Zltmpm6zD8VgcHhMFuLOKoA4mm2MSrfUE-p2UUM1xN9MTICKFcY3Sx6PW4k1Lb88wu8huJ4yytWNVIXSRsR4YPuuP4KvNY3xpBHfeHGdC9m9qSC1KKMUbrYl7xOexvxY8f1WqD4_B6MG5ihPdgP5rENKDF77pXHEGqdek5KEb_u0XlLmnYXK2fkyLQWP24_x7-hGjIgE4F_zox9onWi-ki3lUhBYbL8AZcbjq3o9CgQF2aACmgv6hPZ8ngbboU4ZLGnPte2qCW1S3ryx2tMweBTpDwAE_Jg3ZHlK7R-SoGspw0MNCuE7vHwnaHmDI8gKFqOEYCGG-tgYnniOkD2_KJ4ZBM20KKV2V66ANnwZERMn6exh_sbGjU6S3c8t-SI2MeQjOD1PyS4itl5Dxz60P9krYR6OeMoego0hOjys', 'alg': 'RS256', 'kid': 'public:4ae49bf4-9da0-4a82-bcce-893c3729f22a'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': 'wF5o__54njdCumCJeSzYxnE6GCJ9JZtYfsNKKeOcf1jPL_hFt1M5uf47WKs1YSWJJhibDWg31mkf18j77sO_KLXh3GBUAfl9O8VZtmm519TPBsSAridq-XiRqXXB_etvrTCeCgIJBupwZn7k9-_4HyZvrwn_l_ik16UY70nLkropxXwn4Jj7-tB_ZzzNMl4l5lSueMyw3VuAcpglwhiX4bPrJd3OMc9DefD42e8UworVqKeArt0SEwx33QP9XU43d83dUlv4Ha1LgsX96KWcan3qn7hxxP1oRhgcPxXqFeoN8sHohCPvLMSISdaqtdMkBdcaZI8aVPHx8J2JxN4aTF0l3cy-t7JB54z6f-3pHeE_bUnj4ghgqZLeU967sS0Y1R6NBRxMnqDb7qEO5_saA1zRfxKaDSbAaFVRhgjvknSoqBx5qyYCCRGnfX3Ax5leL-bvo_M4wszbBAvxoeGY-hwn_s_Nz705kDHIzJfem_XURbv2LjjvdjgUXtRqZJkeTzc9_pXcsoEZX9Xm1gLbAsI2geHQNLI_z1KzWcLsz1uitYEpfndBBYBS3DoFFqo-13qk9WaqBJX9vA7MiFBVPmpWSsNAmYT_-6YxvO9P_OVNDPyLSbOSl1PMbaSK5-sPXw5n7mtkw2rkgPoquEqrmhPQnTVrf876qh571YJgfFs', 'alg': 'RS256', 'kid': 'public:e87ff987-ee63-4f3e-8bf3-4099a6148f78'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': 'spxcDzycfjLukN1KJCopwI6s4bPjlQbA-fDA0qn4ntd-nCPieqq6KdXkpCtthr0jPhg6_NKHpL9CWTqJBCyaVvtgZbw1Q2saRXIyCxnYMlw8akMnYLtSsDVrJRmQMH5NTASnIbx0G_J6pZ6OvQ30c2q8xRkOOwgtGn6E85oNrdf_wbuklksIERzxsoZKpjamgxOKZsssz0x6v0mm0RFOTEPD20eOVUqRPhskBtY7W-swCavX5YVy7PYd14dJ7iiHNn4npe2XZLIwSC-zWts7z_N7RChaQYQCQk6e5q19G6DJMSYZOhsg98P8j4XpfD3m7uutGjSYURIVI2XYFv7EWTwGR_RD8QljM6f5s_JPy3A6_BE6zMgi95D6QB5NJUbQ615hBgYprf6lW-vTc6psER_4NjChA_F10eYFEkroDTO014qhGPm9xe--krH4vksfLwnv-_AsUJUg8nMiDmldrvMU4s8JMlEjTYy99zzhXgqQTRU_w_2C4-UKb0PZQi5IeKPqMygtGs7nqgN_rv1lpcWJ2YZ6VEFPnsSnHU7pMxBA04GeSAs6614FMATjWJW5o080_AFnggQRcHouSFTClvP5dUVC_OGJPFbRblHHPlJibXebdTJRX5jxB6o7KQjw7ua3dW3CfGoizS3iLJgQYENJLMDwUY1rjg37Kwm8JE0', 'alg': 'RS256', 'kid': 'public:5198db5b-878c-4635-a538-e627f98de93e'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': '1Kpv-wv6THhBggBy2793qierg_NDRod7pAT__caxzRd6OF9FmHgzklU2d03RqHris7y0freA7RGhmIZEAyPe-C4-O-hhjw3Afk3rp_UaG1wMbgVKStujOdrcobrO6_hLOoSY7lITA-BYqFl9R5DmBoCw9_C5DEsHYL82c_FD03qVBE2rB6rHLaE03j0coHbZn1yB-RzbQqABkafhxWIUADdQ_YqxE588UzjEDRyxm_QviKoUsfSjlu0R9OMwBeX3uHnUP8tkscmMVOctAktPqzxGlfzaorgvfVWDaSUzYvGHxUdkcloUwqrAeCW_MKRmUcUblYQV_xI7QGjXQK4scTWlt4bthHiZ5fYcWt2CFozBi9V9MjKdDejDuLDDPdGlgNLVAnbUp8OqB3w8eFUycni70qp5KrUa1ooG6Bzs4qxuAD7I7D-9NS9VVhRGDBynUtgUHlBWX908ndXNfrZGnfHUyiSyZGNwy2c6xXbH_F7N09Zu9jTDFQazj85B9fVVXZ-63kfCXeuRhRm5oqYoGCLSgs71f3qnqipu2zPukehGWRt3zqf8NWyNOJxnkwW_D9111MpcrRAyhn3cOzHML6rN4nTA-sdq-9bJNMaxr-WJtawuxQtwVMmQCRHOXuFxP0ZPSVjH0zq2Y3paujalyMGpDIJlvTcP4TT3pmnpJ80', 'alg': 'RS256', 'kid': 'public:e272a755-7ae2-490e-82f5-62e0678641b0'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': '16vFo3VXLypUERl1fqAWJEysIgKnJ15eEnc-5LOiFx7jK2L0zDKtj7q6ySr6rdwmgFjaV1vfG-VKmLHPMD_YuazQeb86blkDnUfNQvHfNID0g-U2G-xeLCqfdl54jzx5NAhMV6BVCUTOwsiUt3dgBaNWGJENo4gU0KGr0S2xEU38sJGUz3zROL6gOmUwqlSAk3YClnhyYYof0tj4j0dW7mXK7MaQ4CRAhq5rJq_VRrMCc4JiD7kAN104V5BmNU409uF4InE2Stugw8RSH4hXeBFp-dXtzQi6qmBLsnHd16_WEce76IxvthFnePqa3XMNg9G4-AJ36RVbH4IhMioQgvgHWGXR276pH1Vyga7V0dSakg8ohSD2vBD5OmlYquJ6krJ3uWUCez59YUeNEgOexn5XaBL0ZEnTQ-zNNHX39QZz9QaU2lftGhknRufg68bmshLWgXJexJS1ht1vFccFcmvpnYEnCTwKzo0kjlcY7IiBpWgJ1f4r1PTIKuh8CluNkitsbABcVx3-FOAhA4CMrQovAaNL_jfp6wKBA9Qy0W9LkESVsRQWFUSpQu_z4pJMOVfjbwJOsquxKwXphI2h1VczR-Hh8rTX7D2GL_4-GyG2nHfpF3jVq7raKnyGxJA8ZIK9kPh0JlQhR2FcBhFOWjvusFjoZ09Po6XtvWlP82E', 'alg': 'RS256', 'kid': 'public:0acf6c64-4d55-4888-abb9-b2a3f661ee7f'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': '0vvbIEitFVzY4o12elAZbZvpja5xTm5AOh9wi2UEiPEL6aKxAUn1ywpUaLyWKuEXdeuykHyybniLaThik7Gf-6xKk6S9IK9tjbbwfRqHVkn_Xkyul0ohFI3iTcjvFq5FPGr5vEhSB6eckdngUpzb-7S_Kt8yunkdhYTmkuAr2AXSbQcmCbOJXOsvkc5LOwpjmFIWrtBAHwILJ5cHjzIHtkK2QKMJRlknD8b4kmQ3x6vfxA7mtXREUXdQFn7ssnOVPzriPQp4kIi_TMczSmRLlX1PeeOeDGpTnYywQbsAfdBGZ20WdZlwP3lRUUJoKv1GpBU51GKm2xhHtyrzOkiRKE8pH_PD05gh1G9qXbFtBOoHMBWEaCxoxyJcW8_9iLXBPoC-Jhm47VO5T9hPlaISzDY6EUmgYktejS_mx_bR7emBcbtFUccYSVVqT3EZqAFuQlsPsvj8AT9NmEiVncB2Cy4z7ofLX_Wai_VFPCf7AEfmDZ8mzFZQfVGct74Q9KybwXm8YDq0TSszQGuqT0gtvU9In7CPSOytrVDbdk8Peyeg-Wn_ACMRh5T23wUbQ0jy0Wi9kBwIzN-dUpKu3uL6EZ3PmPSZItQHeAxpQbRZJ1vrrd2y-b6EGun3G9rlnOZ3L4_L4-NOKLt4VGPie7sphlND1pc4ZipaXBjZ9uC3bS8', 'alg': 'RS256', 'kid': 'public:490968e8-c6e5-441e-b42e-5053d6c67af2'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': '0WN9e_V2wEp33JZoN7zQ9J4E4Iz0l-dlx6GqIKdepcMjON3PKZHWFML1e0ZKAkuG2ZJRKoX1LaSNZT0NI9N6_wVAT9aNv53sHBJVC4Bww1zKHEvQseGwJbG0lZZHjDXaxCBPte9yQnquIRRp9Ab-uBeziRoaFQ02OV3LBMBSZ79AzFvZ4yTqpUS_xp-Ylfcmh5wXEppd6hoxs9h1tttPTPbnMLte3S_zxCZI4TQi8d1yBi39OvfZxtABQQbgqYPxiYehNdYbfmZ2CAmVlsTxByS3X-ANBe2nmLsOLgXTyVFZfvEZkzY7OgEwwq5zog5pScXJ-TGlj0guZd8nClHEV-GHvXonjb2hZB63dFEiUVMNh5cOblZX034GnlOkzYfAH8UZ_cvOqONHbvplzONuaYSSRMPRaZwj-0fpElhFNHwr1v1pqbE1i9XOxU_c-eSMr4XAm1VsWG3zJKymjoJmaDcW3AEawi3btL1N2tE3p27cHtcdFjcv5birnxMtPI9Vu806U0_WiGtH_kaWxz64Xk3A_yB-lIBQwXe61JME-K81wLLcHE9qoqpF5iUK4mDqMmI_DVIazUlVUzxY0-1iFkV790V95dBxeYFgXKX02g8NyxfnyzUDC12qUKKejJFbG5LPHaMUXWJIQ2ntwBX_XzeF4pGh0u0vYmfxAmfHWN0', 'alg': 'RS256', 'kid': 'public:a09f73cf-d685-4c5c-9312-60a13e57646f'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': 's_BEnyG0xHYDibtz9a4tE1IW8490BQ_z526Lg2d0PWRtHfcqKmPG0pd0DizPuLY2j1NAY4cCXLwNWMJ3Cp1TqddaMl08hElvNbilcTyQr96RQg9MnrWeR1EqpdXEzTjcx06DFDokvzs89YQVZTDzSh_-xY_m_0VkcFQ0RpDTBn1B0dkMh78dbTJVVSGXYSBgMpcKrGlrgDaPIRX7qp_SdvjNtkPStG_wCPkzd_IJAaTAHGrlyj27dyhOC6EqQjpZRhQvT-w7GalbObncCFox3hRiC8wbI9Toi5p7vEuJJ6yksaqtIwgbtPXXUChNTqwQgIc1RE8RVuhI8ExaT6FfStIVLq9Tow6Hd9mopdX_ydEHHbnbvSC0cCRPg8_G8zTk0ihFpiHE1yEDXBQSs6pZIQ8KZF2RG35j75Jh4ngsDyPbC7PmjE93SG25AkX0WZwoB3g8f6q2r4dZqNtemRX1lMDo0FUQyYcOU5mnOiW3E5oNs3g-VH5ISOiaSUSLX6AIxDfdk6Wj5t7FZUo4EcIwTnE3PI-0HxnLJaErwbYEX0hO1BuhfF7zYHxDjc085U7OyN0abZWbuVUMtIMRgq-4ASlM9fTECg3sMmOfTEJV9nrJZaSCxKvVWma9A01bvBPB6Qn92Gj1XNZ0E1RBLUp1V3iXLcS7MGJh7bAAk5kwKCM', 'alg': 'RS256', 'kid': 'public:8e8dab73-c9fe-42ef-9a7b-1e217abba9a9'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': '3cQ2ihjoElfFVnnkleo6ioUvZrkDfddEKOMCaemXP7umEhr8TC9_L3BKYbJqtE15jvkJiqT1vlHgTOKD5wWCFhFSmEa9PAWlt9Hw6BWddFEsiijR113yvj4eT0qfjseMYyiKst0kBxiTRmQdIzllY2Y2UU1IYIkaAP009nZSR7a5IrPYFydZ6SRARk9kZI90fmgRnzUuQKcv7C9HbkUqs7qiApfA17ACpnuKQP5p5lGL41t5ZnU1-5FvmmO6NnwtRZif34HL6WYuksi2RleLAKoHGh_l6P6ygP5v3ucHH0TmdLVBAHMmlLW4BKdVnWa2HEQCKIBiXJztu8EpYCVpZ_ThCaZLagcUM6VCD4nqvsXzQB7pnsBjq75tbo2jlqrGQJE9ekfGVyw7XDN45IkJFLgfVJ2anpyK4NeIAbkB7ZCYSXbR96_EC6h0uZSMHtPYVNIvbRCK6ysCdlDuDsWiQ01tP-lp90eWj1d7ZYlaYNws12OauBfgLyn0NZvjIz5EYXbOO_Hi0P5U6znS1Um-lU0nB1Gsj685Io-KLzN0shOqkfDP8Xcjfx_3EEg0aEPJWqCjiP9K6veNI896ZrIrH6Sd0V_o4TIzpSJimZlMZrTWS6dUm2j6q1WQOE2Z5JlDMC90yTGUC8MNt2AdMB0Z78Mf71rdSrpXpWLMh7rz_7k', 'alg': 'RS256', 'kid': 'public:6a09d4a3-a298-47bc-8bbd-50b64f653f2d'}]}
0.184 condition bare-keys: status=OK [Dynamic OPs MUST publish their public keys as bare JWK keys]
0.184 assertion CheckHasJwksURI
0.184 condition providerinfo-has-jwks_uri: status=OK [Check that the jwks_uri discovery metadata value is in the provider_info]
0.184 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
bare-keys: status=OK [Dynamic OPs MUST publish their public keys as bare JWK keys]
providerinfo-has-jwks_uri: status=OK [Check that the jwks_uri discovery metadata value is in the provider_info]
Done: status=OK
============================================================
RESULT: PASSED
./OP-request_uri-Sig.txt 0000644 0000000 0000000 00000023342 13313426761 015327 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-request_uri-Sig
Test description: Support request_uri request parameter with signed request
Timestamp: 2018-06-23T11:24:33Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.08 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.081 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.081 phase <--<-- 2 --- Registration -->-->
0.081 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'request_object_signing_alg': 'RS256'}
0.082 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "RS256",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#5VZgy1ok0KdyLupu"
],
"response_types": [
"id_token token"
]
}
0.279 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.28 RegistrationResponse {
"client_id": "3fd49a6e-f523-4652-8076-6aa0c8b7c165",
"client_secret": "T7IenAUGAkIX",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "3fd49a6e-f523-4652-8076-6aa0c8b7c165",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "RS256",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#5VZgy1ok0KdyLupu"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.28 phase <--<-- 3 --- AsyncAuthn -->-->
0.284 AuthorizationRequest {
"client_id": "3fd49a6e-f523-4652-8076-6aa0c8b7c165",
"nonce": "F4sN2D61VU80Llkj",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"request_uri": "https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#5VZgy1ok0KdyLupu",
"response_type": "id_token token",
"scope": "openid",
"state": "pnq5lTgJRdOGpShk"
}
0.284 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?request_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Frequests%2Fe3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9%235VZgy1ok0KdyLupu&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=3fd49a6e-f523-4652-8076-6aa0c8b7c165&state=pnq5lTgJRdOGpShk&response_type=id_token+token&nonce=F4sN2D61VU80Llkj
0.284 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?request_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Frequests%2Fe3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9%235VZgy1ok0KdyLupu&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=3fd49a6e-f523-4652-8076-6aa0c8b7c165&state=pnq5lTgJRdOGpShk&response_type=id_token+token&nonce=F4sN2D61VU80Llkj
3.081 http args {}
3.257 response URL with fragment
3.257 response access_token=qWRj0dG8dppxisKlFNdIyoUtgYcU70oaxXy0AHWvC9M.QNq04LO4sCjPcprcTiVl59Dfk8RO0OvLJErTUPwczY0&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoidm12bW16Q0ZWNENTank0Z0piVWpZdyIsImF1ZCI6WyIzZmQ0OWE2ZS1mNTIzLTQ2NTItODA3Ni02YWEwYzhiN2MxNjUiXSwiYXV0aF90aW1lIjoxNTI5NzUzMDA5LCJleHAiOjE1Mjk3NTY2NzMsImlhdCI6MTUyOTc1MzA3MywiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiNzZjMTNlZDctZDRlMS00MDMyLTkzYWUtYzUzZDNjZGQ2YmFkIiwibm9uY2UiOiJGNHNOMkQ2MVZVODBMbGtqIiwicmF0IjoxNTI5NzUzMDcxLCJzdWIiOiJmb29AYmFyLmNvbSJ9.E6NROexaRCl0Of2x8M9QW7MHra81WeDIOotmAE57Yia3NBZEnzQ_IQYbHdBd5MNVJpxNwMkaGwII3uXWmLNxQuJsJ3H-1SY3o82j0vPE74hAgtnNquElsXTu-OPxEQlpflBKhaXqa71VVO_Q3rJ-WquLw0M-dX0QpHbaf4mXJ2gF8o533popS1qX-ECiQMOv-25Lti6bCVWAIQiunR6lDsPmF4DQ4KYBUzMpWbn_8j0gRBjA9KXMtDqvg5JcCoVOT4ZTjzZCUddggR59jhZNCoO7hB9EOi64E6AazL_wR3AaTnnilWFVdWOwF89BIwlAIC3Y9MkxEVomd2GPapIkNN6nDiOdkKEiLuClypZcVqz3TrPL_cAxgJFnQvbyfkG1m7F-HSQ8isUqx-bdu5Eb-Jw1O9raUd3tm-743YdlZqG2KbtM3-UfcrCgMPqpvLriRSXVfn9y1EqeuKW-9RKO4sNNabskYG6qpX7fmNVDHxjcsMKsZMCOitjtW8OmN__rbY1zl-vVpTp00mulJBcrQHU5IpcAcNF4U6G3bTuMKa6Y6_m1xSfA-bkbyA_NfpklzUdVR7X_-Umynza7msQUbxqpQfexueVvEGxMylzaYQm1_XWAsiKnkY6DfF4XQscrMeFlmG_568mh_FzNF7enpCl9N82IZNRsSuQNhRiNpgI&scope=openid&state=pnq5lTgJRdOGpShk&token_type=bearer
3.258 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoidm12bW16Q0ZWNENTank0Z0piVWpZdyIsImF1ZCI6WyIzZmQ0OWE2ZS1mNTIzLTQ2NTItODA3Ni02YWEwYzhiN2MxNjUiXSwiYXV0aF90aW1lIjoxNTI5NzUzMDA5LCJleHAiOjE1Mjk3NTY2NzMsImlhdCI6MTUyOTc1MzA3MywiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiNzZjMTNlZDctZDRlMS00MDMyLTkzYWUtYzUzZDNjZGQ2YmFkIiwibm9uY2UiOiJGNHNOMkQ2MVZVODBMbGtqIiwicmF0IjoxNTI5NzUzMDcxLCJzdWIiOiJmb29AYmFyLmNvbSJ9.E6NROexaRCl0Of2x8M9QW7MHra81WeDIOotmAE57Yia3NBZEnzQ_IQYbHdBd5MNVJpxNwMkaGwII3uXWmLNxQuJsJ3H-1SY3o82j0vPE74hAgtnNquElsXTu-OPxEQlpflBKhaXqa71VVO_Q3rJ-WquLw0M-dX0QpHbaf4mXJ2gF8o533popS1qX-ECiQMOv-25Lti6bCVWAIQiunR6lDsPmF4DQ4KYBUzMpWbn_8j0gRBjA9KXMtDqvg5JcCoVOT4ZTjzZCUddggR59jhZNCoO7hB9EOi64E6AazL_wR3AaTnnilWFVdWOwF89BIwlAIC3Y9MkxEVomd2GPapIkNN6nDiOdkKEiLuClypZcVqz3TrPL_cAxgJFnQvbyfkG1m7F-HSQ8isUqx-bdu5Eb-Jw1O9raUd3tm-743YdlZqG2KbtM3-UfcrCgMPqpvLriRSXVfn9y1EqeuKW-9RKO4sNNabskYG6qpX7fmNVDHxjcsMKsZMCOitjtW8OmN__rbY1zl-vVpTp00mulJBcrQHU5IpcAcNF4U6G3bTuMKa6Y6_m1xSfA-bkbyA_NfpklzUdVR7X_-Umynza7msQUbxqpQfexueVvEGxMylzaYQm1_XWAsiKnkY6DfF4XQscrMeFlmG_568mh_FzNF7enpCl9N82IZNRsSuQNhRiNpgI', 'scope': 'openid', 'access_token': 'qWRj0dG8dppxisKlFNdIyoUtgYcU70oaxXy0AHWvC9M.QNq04LO4sCjPcprcTiVl59Dfk8RO0OvLJErTUPwczY0', 'state': 'pnq5lTgJRdOGpShk', 'expires_in': 3599, 'token_type': 'bearer'}
3.338 AuthorizationResponse {
"access_token": "qWRj0dG8dppxisKlFNdIyoUtgYcU70oaxXy0AHWvC9M.QNq04LO4sCjPcprcTiVl59Dfk8RO0OvLJErTUPwczY0",
"expires_in": 3599,
"id_token": {
"at_hash": "vmvmmzCFV4CSjy4gJbUjYw",
"aud": [
"3fd49a6e-f523-4652-8076-6aa0c8b7c165"
],
"auth_time": 1529753009,
"exp": 1529756673,
"iat": 1529753073,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "76c13ed7-d4e1-4032-93ae-c53d3cdd6bad",
"nonce": "F4sN2D61VU80Llkj",
"rat": 1529753071,
"sub": "[email protected]"
},
"scope": "openid",
"state": "pnq5lTgJRdOGpShk",
"token_type": "bearer"
}
3.338 phase <--<-- 4 --- Done -->-->
3.338 end
3.339 assertion VerifyAuthnOrErrorResponse
3.339 condition authn-response-or-error: status=OK [Checks that the last response was a JSON encoded authentication or error message]
3.339 condition Done: status=OK
============================================================
Conditions
authn-response-or-error: status=OK [Checks that the last response was a JSON encoded authentication or error message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Registration-policy_uri.txt 0000644 0000000 0000000 00000022565 13313426532 017070 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-policy_uri
Test description: Registration with policy_uri
Timestamp: 2018-06-23T11:22:02Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
0.968 phase <--<-- 1 --- Webfinger -->-->
0.968 not expected to do WebFinger
0.968 phase <--<-- 2 --- Discovery -->-->
0.968 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.118 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.12 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.12 phase <--<-- 3 --- Registration -->-->
1.12 register kwargs:{'application_name': 'OIC test tool', 'policy_uri': 'https://op.certification.openid.net:61353/static/policy.html', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.12 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"policy_uri": "https://op.certification.openid.net:61353/static/policy.html",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Oa9P1PsfLs5wkzKl"
],
"response_types": [
"id_token token"
]
}
1.28 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.281 RegistrationResponse {
"client_id": "93585e5b-babc-4dc5-842d-00bc86415f46",
"client_secret": ".-M9iJWpjZfL",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "93585e5b-babc-4dc5-842d-00bc86415f46",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"policy_uri": "https://op.certification.openid.net:61353/static/policy.html",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Oa9P1PsfLs5wkzKl"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.281 phase <--<-- 4 --- AsyncAuthn -->-->
1.281 AuthorizationRequest {
"client_id": "93585e5b-babc-4dc5-842d-00bc86415f46",
"nonce": "xVZr1WjlZOfIOusH",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token token",
"scope": "openid",
"state": "FyJ8rZBh62m4utrp"
}
1.282 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=93585e5b-babc-4dc5-842d-00bc86415f46&state=FyJ8rZBh62m4utrp&response_type=id_token+token&nonce=xVZr1WjlZOfIOusH
1.282 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=93585e5b-babc-4dc5-842d-00bc86415f46&state=FyJ8rZBh62m4utrp&response_type=id_token+token&nonce=xVZr1WjlZOfIOusH
3.658 http args {}
3.828 response URL with fragment
3.828 response access_token=-MOTaklBZAl3AmSL-H53gue3RZg69zcXGL_uZgPjvR4.lI5dPw_qDrv11g_7iErm78O06V-UAiiPM7Trg-MhZZw&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiQXZKMV8zY01PVzJsbUhnMUI4Wm5iUSIsImF1ZCI6WyI5MzU4NWU1Yi1iYWJjLTRkYzUtODQyZC0wMGJjODY0MTVmNDYiXSwiYXV0aF90aW1lIjoxNTI5NzUyODIwLCJleHAiOjE1Mjk3NTY1MjEsImlhdCI6MTUyOTc1MjkyMSwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiZjU4NDQ1YWEtMTAxYy00ZjFmLTk4YzUtYmQ2ODBlZDM3M2M5Iiwibm9uY2UiOiJ4VlpyMVdqbFpPZklPdXNIIiwicmF0IjoxNTI5NzUyOTE5LCJzdWIiOiJmb29AYmFyLmNvbSJ9.WzqlE0tlc1nKV0FoUQa2VH-tRSDi6EWoS3j9Bg2JxFw1Cb7g7Y_Or6fEuYODQb00HMriTf9MNkXf6Zw9uHyVMuylc4DqOQSiE1-nnQBM2CICHICNWb7iutZbnMFmZ5vjL2wAl65IZfWhCi2dnW-IcH2wCEeM0zl8HqZh8YkRtlDucMVf9gdFc704peGPmTaDmKys6J6SDlZeP4j4-AyIhuaiYILIj7CM-c5t7B3USzACBey18Ngz_NwLgpB09H5pLlH3J5R4q33CyqJ_Fmpdzum934nMlYKpsTDDa7mTR8yOKjkXdhm-WQR1IfQP4ZS0YV-dnHd_4orjGeDTyfm6x4Ru5WdCNjjw76TeDBH3186epwazhlpV4ugizMD9eQfzcSsznRHrdrq-jZ62uuZC0YmzMQg0LedE-hV5WyMlJVMwLVD_4Hkk4DEFF9DuvXj_GUFuh0LlwYHRxxW7SBXgefFUmhfPNrS26G8ktRhn8_Q-h8o7bzN1lW6mYjDWKOxmDtIWlDDy_dcPCYHHQKjUr3VPbeFA0oIJSkS11cNnRuuUPvEKJ8Wm7tQbO2icScPGOaAQuuax8RZL2OuxWO12QF61Ws7rB4nuG9JfbplNhpZLl8zL3xGNlQer6KgBFHBtDWG_PfEnZ_GDoWn-ADrz-l07R0Jagmy3ZbE6hdPl3Uk&scope=openid&state=FyJ8rZBh62m4utrp&token_type=bearer
3.829 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiQXZKMV8zY01PVzJsbUhnMUI4Wm5iUSIsImF1ZCI6WyI5MzU4NWU1Yi1iYWJjLTRkYzUtODQyZC0wMGJjODY0MTVmNDYiXSwiYXV0aF90aW1lIjoxNTI5NzUyODIwLCJleHAiOjE1Mjk3NTY1MjEsImlhdCI6MTUyOTc1MjkyMSwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiZjU4NDQ1YWEtMTAxYy00ZjFmLTk4YzUtYmQ2ODBlZDM3M2M5Iiwibm9uY2UiOiJ4VlpyMVdqbFpPZklPdXNIIiwicmF0IjoxNTI5NzUyOTE5LCJzdWIiOiJmb29AYmFyLmNvbSJ9.WzqlE0tlc1nKV0FoUQa2VH-tRSDi6EWoS3j9Bg2JxFw1Cb7g7Y_Or6fEuYODQb00HMriTf9MNkXf6Zw9uHyVMuylc4DqOQSiE1-nnQBM2CICHICNWb7iutZbnMFmZ5vjL2wAl65IZfWhCi2dnW-IcH2wCEeM0zl8HqZh8YkRtlDucMVf9gdFc704peGPmTaDmKys6J6SDlZeP4j4-AyIhuaiYILIj7CM-c5t7B3USzACBey18Ngz_NwLgpB09H5pLlH3J5R4q33CyqJ_Fmpdzum934nMlYKpsTDDa7mTR8yOKjkXdhm-WQR1IfQP4ZS0YV-dnHd_4orjGeDTyfm6x4Ru5WdCNjjw76TeDBH3186epwazhlpV4ugizMD9eQfzcSsznRHrdrq-jZ62uuZC0YmzMQg0LedE-hV5WyMlJVMwLVD_4Hkk4DEFF9DuvXj_GUFuh0LlwYHRxxW7SBXgefFUmhfPNrS26G8ktRhn8_Q-h8o7bzN1lW6mYjDWKOxmDtIWlDDy_dcPCYHHQKjUr3VPbeFA0oIJSkS11cNnRuuUPvEKJ8Wm7tQbO2icScPGOaAQuuax8RZL2OuxWO12QF61Ws7rB4nuG9JfbplNhpZLl8zL3xGNlQer6KgBFHBtDWG_PfEnZ_GDoWn-ADrz-l07R0Jagmy3ZbE6hdPl3Uk', 'scope': 'openid', 'access_token': '-MOTaklBZAl3AmSL-H53gue3RZg69zcXGL_uZgPjvR4.lI5dPw_qDrv11g_7iErm78O06V-UAiiPM7Trg-MhZZw', 'state': 'FyJ8rZBh62m4utrp', 'expires_in': 3599, 'token_type': 'bearer'}
3.945 AuthorizationResponse {
"access_token": "-MOTaklBZAl3AmSL-H53gue3RZg69zcXGL_uZgPjvR4.lI5dPw_qDrv11g_7iErm78O06V-UAiiPM7Trg-MhZZw",
"expires_in": 3599,
"id_token": {
"at_hash": "AvJ1_3cMOW2lmHg1B8ZnbQ",
"aud": [
"93585e5b-babc-4dc5-842d-00bc86415f46"
],
"auth_time": 1529752820,
"exp": 1529756521,
"iat": 1529752921,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "f58445aa-101c-4f1f-98c5-bd680ed373c9",
"nonce": "xVZr1WjlZOfIOusH",
"rat": 1529752919,
"sub": "[email protected]"
},
"scope": "openid",
"state": "FyJ8rZBh62m4utrp",
"token_type": "bearer"
}
3.945 phase <--<-- 5 --- Done -->-->
3.945 end
3.945 assertion VerifyAuthnResponse
3.945 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
3.945 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED
./OP-claims-essential.txt 0000644 0000000 0000000 00000024734 13313426621 015476 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-claims-essential
Test description: Claims request with essential name claim
Timestamp: 2018-06-23T11:22:57Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.074 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.076 phase <--<-- 2 --- Registration -->-->
0.076 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.076 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#vmg7TT7Xa6tDQmle"
],
"response_types": [
"id_token token"
]
}
0.235 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.236 RegistrationResponse {
"client_id": "00a62cc5-af72-4180-bd9f-c894c114725a",
"client_secret": "ZmrfD_GvyzYe",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "00a62cc5-af72-4180-bd9f-c894c114725a",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#vmg7TT7Xa6tDQmle"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.236 phase <--<-- 3 --- AsyncAuthn -->-->
0.237 AuthorizationRequest {
"claims": {
"userinfo": {
"name": {
"essential": true
}
}
},
"client_id": "00a62cc5-af72-4180-bd9f-c894c114725a",
"nonce": "MIfCkPLBDMfoCK1m",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token token",
"scope": "openid",
"state": "7NrFbnK9ryaXEa9W"
}
0.237 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=00a62cc5-af72-4180-bd9f-c894c114725a&claims=%7B%22userinfo%22%3A+%7B%22name%22%3A+%7B%22essential%22%3A+true%7D%7D%7D&state=7NrFbnK9ryaXEa9W&response_type=id_token+token&nonce=MIfCkPLBDMfoCK1m
0.237 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=00a62cc5-af72-4180-bd9f-c894c114725a&claims=%7B%22userinfo%22%3A+%7B%22name%22%3A+%7B%22essential%22%3A+true%7D%7D%7D&state=7NrFbnK9ryaXEa9W&response_type=id_token+token&nonce=MIfCkPLBDMfoCK1m
2.487 http args {}
2.697 response URL with fragment
2.698 response access_token=f06-zKU_8s01OR50Enf4Yx78STQUWfGkuoGDTmBtdz8.HGYPxd_UKY85EZsSpiGoL68zKoEfNbEEQRdVcIbE3S0&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiNVh5MGtRWEZrbV9wdWNNcEVmZHM5ZyIsImF1ZCI6WyIwMGE2MmNjNS1hZjcyLTQxODAtYmQ5Zi1jODk0YzExNDcyNWEiXSwiYXV0aF90aW1lIjoxNTI5NzUyODIwLCJleHAiOjE1Mjk3NTY1NzYsImlhdCI6MTUyOTc1Mjk3NiwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiMGY5NTI4NTctNzMzNS00ZDcxLTg1YWUtYjcyOTI1ZWE1ZGQ1Iiwibm9uY2UiOiJNSWZDa1BMQkRNZm9DSzFtIiwicmF0IjoxNTI5NzUyOTc0LCJzdWIiOiJmb29AYmFyLmNvbSJ9.MQ6dUXlbcuN7NIaqaxJcX5CuaFTsDWTBps4urSDnuXxnOOUVqt5jx0YWRwn6YRbnGelacfIdYRykwInQfVSaU0h7IJSLNkP8KVwp-xnRLk-G_o_Tigh6NNitxX9iRzFff6TuiZ6ctCIIxjq-zKKEIAkcnbxTTGQxL0a6kaTK8xzwBf2U7PrOAgmkObW0ySLOnp7OSG92edK7fqZOEbR3xMdEClGDQYUEmKXHmFfVwTdfCQ8v1dOoLPlu0jMIIRcVjooRYsgmGZA1Pt1dm0Zom1VnNVJCoSV8GTYhdRkjl-Q3jGblUQfsCXB2q5A_I0CJzZry9Bt00WKRPG-kWPHPCovg0Ck0WPOFl2p0_E1Uv3VBj9iX2ZxDAHVTI-7qBRt1XTtXjtH9PpcISOT8l9XtN9gNnZnrdr-FGkmb0PPDDuhvI6PiCiXDoyj3mTrV-XehrgCayPd5uA1p7AE2p-l6MqIzQOHudTptcJ_Aie67pyh2c9vGt3HY8iqQQ03qEQ1hQ5s-VUzCCZj0BiLNFieSIhbw0o8RSXBJhH9iTM_tFp98DDyzzf4ucNqp5Sqj_M_4z2NSMyyKKU9CjlD4jHGJyiDhVkLOM3RL41OMQ1054q4CSnT9DWgLjlU6CuY-2tmT6PanY7sWUs2D_x2b5O3Shg8MilnELaQDODgymCG45AA&scope=openid&state=7NrFbnK9ryaXEa9W&token_type=bearer
2.698 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiNVh5MGtRWEZrbV9wdWNNcEVmZHM5ZyIsImF1ZCI6WyIwMGE2MmNjNS1hZjcyLTQxODAtYmQ5Zi1jODk0YzExNDcyNWEiXSwiYXV0aF90aW1lIjoxNTI5NzUyODIwLCJleHAiOjE1Mjk3NTY1NzYsImlhdCI6MTUyOTc1Mjk3NiwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiMGY5NTI4NTctNzMzNS00ZDcxLTg1YWUtYjcyOTI1ZWE1ZGQ1Iiwibm9uY2UiOiJNSWZDa1BMQkRNZm9DSzFtIiwicmF0IjoxNTI5NzUyOTc0LCJzdWIiOiJmb29AYmFyLmNvbSJ9.MQ6dUXlbcuN7NIaqaxJcX5CuaFTsDWTBps4urSDnuXxnOOUVqt5jx0YWRwn6YRbnGelacfIdYRykwInQfVSaU0h7IJSLNkP8KVwp-xnRLk-G_o_Tigh6NNitxX9iRzFff6TuiZ6ctCIIxjq-zKKEIAkcnbxTTGQxL0a6kaTK8xzwBf2U7PrOAgmkObW0ySLOnp7OSG92edK7fqZOEbR3xMdEClGDQYUEmKXHmFfVwTdfCQ8v1dOoLPlu0jMIIRcVjooRYsgmGZA1Pt1dm0Zom1VnNVJCoSV8GTYhdRkjl-Q3jGblUQfsCXB2q5A_I0CJzZry9Bt00WKRPG-kWPHPCovg0Ck0WPOFl2p0_E1Uv3VBj9iX2ZxDAHVTI-7qBRt1XTtXjtH9PpcISOT8l9XtN9gNnZnrdr-FGkmb0PPDDuhvI6PiCiXDoyj3mTrV-XehrgCayPd5uA1p7AE2p-l6MqIzQOHudTptcJ_Aie67pyh2c9vGt3HY8iqQQ03qEQ1hQ5s-VUzCCZj0BiLNFieSIhbw0o8RSXBJhH9iTM_tFp98DDyzzf4ucNqp5Sqj_M_4z2NSMyyKKU9CjlD4jHGJyiDhVkLOM3RL41OMQ1054q4CSnT9DWgLjlU6CuY-2tmT6PanY7sWUs2D_x2b5O3Shg8MilnELaQDODgymCG45AA', 'scope': 'openid', 'access_token': 'f06-zKU_8s01OR50Enf4Yx78STQUWfGkuoGDTmBtdz8.HGYPxd_UKY85EZsSpiGoL68zKoEfNbEEQRdVcIbE3S0', 'state': '7NrFbnK9ryaXEa9W', 'expires_in': 3599, 'token_type': 'bearer'}
2.783 AuthorizationResponse {
"access_token": "f06-zKU_8s01OR50Enf4Yx78STQUWfGkuoGDTmBtdz8.HGYPxd_UKY85EZsSpiGoL68zKoEfNbEEQRdVcIbE3S0",
"expires_in": 3599,
"id_token": {
"at_hash": "5Xy0kQXFkm_pucMpEfds9g",
"aud": [
"00a62cc5-af72-4180-bd9f-c894c114725a"
],
"auth_time": 1529752820,
"exp": 1529756576,
"iat": 1529752976,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "0f952857-7335-4d71-85ae-b72925ea5dd5",
"nonce": "MIfCkPLBDMfoCK1m",
"rat": 1529752974,
"sub": "[email protected]"
},
"scope": "openid",
"state": "7NrFbnK9ryaXEa9W",
"token_type": "bearer"
}
2.783 phase <--<-- 4 --- AccessToken -->-->
2.783 phase <--<-- 5 --- UserInfo -->-->
2.783 do_user_info_request kwargs:{'state': '7NrFbnK9ryaXEa9W', 'method': 'GET', 'authn_method': 'bearer_header'}
2.783 request {'body': None}
2.783 request_url https://oidc-certification.ory.sh:8443/userinfo
2.783 request_http_args {'headers': {'Authorization': 'Bearer f06-zKU_8s01OR50Enf4Yx78STQUWfGkuoGDTmBtdz8.HGYPxd_UKY85EZsSpiGoL68zKoEfNbEEQRdVcIbE3S0'}}
2.86 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
2.861 OpenIDSchema {
"sub": "[email protected]"
}
2.861 OpenIDSchema {
"sub": "[email protected]"
}
2.861 phase <--<-- 6 --- Done -->-->
2.861 end
2.861 assertion VerifyClaims
2.862 condition verify-claims: status=WARNING, message=Missing required claim: name [Verifies that the claims returned as UserInfo or in the ID Token is consistent with what was asked for]
2.862 assertion CheckHTTPResponse
2.862 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
2.862 condition Done: status=OK
============================================================
Conditions
verify-claims: status=WARNING, message=Missing required claim: name [Verifies that the claims returned as UserInfo or in the ID Token is consistent with what was asked for]
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
Missing required claim: name
./OP-prompt-none-LoggedIn.txt 0000644 0000000 0000000 00000033506 13313426671 016207 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-prompt-none-LoggedIn
Test description: Request with prompt=none when logged in [Basic, Implicit, Hybrid]
Timestamp: 2018-06-23T11:23:37Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.078 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.079 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.079 phase <--<-- 2 --- Registration -->-->
0.079 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.08 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#w51YJEBQ1qFmEqMc"
],
"response_types": [
"id_token token"
]
}
0.272 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.273 RegistrationResponse {
"client_id": "839e0193-0cfd-4d37-b8be-50f10539f367",
"client_secret": "q75kLoiWwvP.",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "839e0193-0cfd-4d37-b8be-50f10539f367",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#w51YJEBQ1qFmEqMc"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.273 phase <--<-- 3 --- AsyncAuthn -->-->
0.273 AuthorizationRequest {
"client_id": "839e0193-0cfd-4d37-b8be-50f10539f367",
"nonce": "NaxFrUfW7he05V8Z",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token token",
"scope": "openid",
"state": "TAzNVyawOetf6H52"
}
0.274 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=839e0193-0cfd-4d37-b8be-50f10539f367&state=TAzNVyawOetf6H52&response_type=id_token+token&nonce=NaxFrUfW7he05V8Z
0.274 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=839e0193-0cfd-4d37-b8be-50f10539f367&state=TAzNVyawOetf6H52&response_type=id_token+token&nonce=NaxFrUfW7he05V8Z
2.59 http args {}
2.763 response URL with fragment
2.764 response access_token=mdQNdc8bD3ekyr-gWIiZvVuo1RmHgan0NlRL5ao0nYA.EnqISAXEbzvcanHnrMM6i8DxAt3oVgIdxig9ZTRfh3Y&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiLXpVbkMwTDFPWTlmT3hlR0JubE9oZyIsImF1ZCI6WyI4MzllMDE5My0wY2ZkLTRkMzctYjhiZS01MGYxMDUzOWYzNjciXSwiYXV0aF90aW1lIjoxNTI5NzUzMDA5LCJleHAiOjE1Mjk3NTY2MTYsImlhdCI6MTUyOTc1MzAxNiwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiNTcyOWZhMDgtNTE0My00OGQ2LThjZjItMTVjMWQyMjBiY2Q2Iiwibm9uY2UiOiJOYXhGclVmVzdoZTA1VjhaIiwicmF0IjoxNTI5NzUzMDE0LCJzdWIiOiJmb29AYmFyLmNvbSJ9.PQ6jwJgG-mF3o2_agr7v-gVJ7e_7ouAe6RBoFOpYkBW9ONHM1TdluArmuQAeEaewRVjMIAvv466mkWLSCs9Ij6nv9NbhyKuiFVGvr4iN2LrLvBMKE-eekeLmw87s1aBQaYCXl23gpRQwoTPOCHHUrFDc9C_7iOqo_Pk2CKPPB6ZBa9_jOsvk0D-cjuBrx1YQ_EiB3O606B8QzMYg-bfow7cBQS-84ZKBh7cyvsGVJBJq4zZIMJUaeJdCDiHkvyV8uA1WrqBb0_kLo5R-DdtwinauCp2IYyrk00MgKQMhTyI0ZB7r3rETK8c76M5VXfXkCfC3195XqneDs7EL-V33KQRkLCKlyrwk-8Te8bZjBlQWtQ5KfCSauFmvPwCT9a9zkBEI7xPMNj_f9Tj3SqbxbAA3-pN_zL73fKZdWEjM6sRJoCkmooY4t-k8dm9Ixf7iOYeHHXsupH592ujvA5099JPCHMd9h5xyO4e5m8a-O66UIRQBSf0WbjX_bE6YlpwvqKVMoD39e7Z8vf2ZNap5eA-sdzgMMlacP-vrajxzFZvH8eDR4_RuYbauiafLrYtY95Z92bx2AS6KVc92MZ0D3lJ79NT7VJgG_QypHH1Z551UwrvwBQajuqWCo5M6oPkRZBLl7YRCA2dizUEHd7pNOlRIel0yR8vXKVafsA3fe8A&scope=openid&state=TAzNVyawOetf6H52&token_type=bearer
2.764 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiLXpVbkMwTDFPWTlmT3hlR0JubE9oZyIsImF1ZCI6WyI4MzllMDE5My0wY2ZkLTRkMzctYjhiZS01MGYxMDUzOWYzNjciXSwiYXV0aF90aW1lIjoxNTI5NzUzMDA5LCJleHAiOjE1Mjk3NTY2MTYsImlhdCI6MTUyOTc1MzAxNiwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiNTcyOWZhMDgtNTE0My00OGQ2LThjZjItMTVjMWQyMjBiY2Q2Iiwibm9uY2UiOiJOYXhGclVmVzdoZTA1VjhaIiwicmF0IjoxNTI5NzUzMDE0LCJzdWIiOiJmb29AYmFyLmNvbSJ9.PQ6jwJgG-mF3o2_agr7v-gVJ7e_7ouAe6RBoFOpYkBW9ONHM1TdluArmuQAeEaewRVjMIAvv466mkWLSCs9Ij6nv9NbhyKuiFVGvr4iN2LrLvBMKE-eekeLmw87s1aBQaYCXl23gpRQwoTPOCHHUrFDc9C_7iOqo_Pk2CKPPB6ZBa9_jOsvk0D-cjuBrx1YQ_EiB3O606B8QzMYg-bfow7cBQS-84ZKBh7cyvsGVJBJq4zZIMJUaeJdCDiHkvyV8uA1WrqBb0_kLo5R-DdtwinauCp2IYyrk00MgKQMhTyI0ZB7r3rETK8c76M5VXfXkCfC3195XqneDs7EL-V33KQRkLCKlyrwk-8Te8bZjBlQWtQ5KfCSauFmvPwCT9a9zkBEI7xPMNj_f9Tj3SqbxbAA3-pN_zL73fKZdWEjM6sRJoCkmooY4t-k8dm9Ixf7iOYeHHXsupH592ujvA5099JPCHMd9h5xyO4e5m8a-O66UIRQBSf0WbjX_bE6YlpwvqKVMoD39e7Z8vf2ZNap5eA-sdzgMMlacP-vrajxzFZvH8eDR4_RuYbauiafLrYtY95Z92bx2AS6KVc92MZ0D3lJ79NT7VJgG_QypHH1Z551UwrvwBQajuqWCo5M6oPkRZBLl7YRCA2dizUEHd7pNOlRIel0yR8vXKVafsA3fe8A', 'scope': 'openid', 'access_token': 'mdQNdc8bD3ekyr-gWIiZvVuo1RmHgan0NlRL5ao0nYA.EnqISAXEbzvcanHnrMM6i8DxAt3oVgIdxig9ZTRfh3Y', 'state': 'TAzNVyawOetf6H52', 'expires_in': 3599, 'token_type': 'bearer'}
2.847 AuthorizationResponse {
"access_token": "mdQNdc8bD3ekyr-gWIiZvVuo1RmHgan0NlRL5ao0nYA.EnqISAXEbzvcanHnrMM6i8DxAt3oVgIdxig9ZTRfh3Y",
"expires_in": 3599,
"id_token": {
"at_hash": "-zUnC0L1OY9fOxeGBnlOhg",
"aud": [
"839e0193-0cfd-4d37-b8be-50f10539f367"
],
"auth_time": 1529753009,
"exp": 1529756616,
"iat": 1529753016,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "5729fa08-5143-48d6-8cf2-15c1d220bcd6",
"nonce": "NaxFrUfW7he05V8Z",
"rat": 1529753014,
"sub": "[email protected]"
},
"scope": "openid",
"state": "TAzNVyawOetf6H52",
"token_type": "bearer"
}
2.847 phase <--<-- 4 --- AccessToken -->-->
2.847 phase <--<-- 5 --- AsyncAuthn -->-->
2.848 AuthorizationRequest {
"client_id": "839e0193-0cfd-4d37-b8be-50f10539f367",
"nonce": "W2ikndBAYxCXP1eQ",
"prompt": [
"none"
],
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token token",
"scope": "openid",
"state": "ClBcMJmvF20k8zJC"
}
2.848 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=839e0193-0cfd-4d37-b8be-50f10539f367&state=ClBcMJmvF20k8zJC&response_type=id_token+token&nonce=W2ikndBAYxCXP1eQ
2.848 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=839e0193-0cfd-4d37-b8be-50f10539f367&state=ClBcMJmvF20k8zJC&response_type=id_token+token&nonce=W2ikndBAYxCXP1eQ
3.77 http args {}
3.928 response URL with fragment
3.928 response access_token=pX5RhrXzuS1OmYEUMZwYITHF2QvGJuHgj-bP1dWOu98.d9cNVHRofk2TDJPT2VTHzLQG0LyHVTUQv1rtSOq3Xk8&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoidi1KaENNV3JuZzhlc3BCd3B6dzZoQSIsImF1ZCI6WyI4MzllMDE5My0wY2ZkLTRkMzctYjhiZS01MGYxMDUzOWYzNjciXSwiYXV0aF90aW1lIjoxNTI5NzUzMDA5LCJleHAiOjE1Mjk3NTY2MTcsImlhdCI6MTUyOTc1MzAxNywiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiMjk0OWI3ZDYtYTc0Ni00MzRlLWIyNzYtMWQ1ZDI3YjdlZTUxIiwibm9uY2UiOiJXMmlrbmRCQVl4Q1hQMWVRIiwicmF0IjoxNTI5NzUzMDE2LCJzdWIiOiJmb29AYmFyLmNvbSJ9.iTULwXy66Fdbb60xUR6PytTnHX8CkFUVphv5pRhzDhVnYn0LY-dY76LxAYsxRI7fo4lxVEqKtpuvU30JXBRsgoeWYQYInAE_9Sw4EwTVUolmxDi3cR_JZJenN9Y2s9iTBh75pScTT1FNlkZBQIQ0JlvJEFAKefAYXTe3bef1gw8KCmtSgIGtzZpykEGF0STEo8iJhS6URFOe2-o8FuhTjRNdHpdvH1Bzz99nUKb_CdrncfYrqb8E-Wb0f7EjblMXK5hXoPQ5tDt9YzWD7YM_swOM47m2hIoc2REB1lvVd8ruglk5G9LJdZ9loDYO-wQRChNt0_ikUBbxv1fN9WwgrNfaSF9aiAaW6RvK3nyNcHtGZrXTu46mZPc7ZpuO4cZdFOx81JakQhvMTW53PiyNd6UHjFrtZxNKzEauvgaMwx8hlE-GiY5VBdKuxsd73SEZg2syZeOqWaAPxDWJr8uozcciTXah2Gs39e_oC9CoCZd6Ix8IH4PKdbP2QJWIqp86l3Pg2f-Z2R48Uc9kCWDsiuX-GnFoJQl8oFjLsq7oxPbJq8AshVM7E3sHoxFwjH1G1pmhafmv3QRyy9AKFdJ6Ws066DAxOfiAEoq4dztGEMRrNl5m1JB5EvddRJVha4QeDGR76kJlUTKPEQABEAzQjpcFWtU1e6t1dI4kAotscXo&scope=openid&state=ClBcMJmvF20k8zJC&token_type=bearer
3.929 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoidi1KaENNV3JuZzhlc3BCd3B6dzZoQSIsImF1ZCI6WyI4MzllMDE5My0wY2ZkLTRkMzctYjhiZS01MGYxMDUzOWYzNjciXSwiYXV0aF90aW1lIjoxNTI5NzUzMDA5LCJleHAiOjE1Mjk3NTY2MTcsImlhdCI6MTUyOTc1MzAxNywiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiMjk0OWI3ZDYtYTc0Ni00MzRlLWIyNzYtMWQ1ZDI3YjdlZTUxIiwibm9uY2UiOiJXMmlrbmRCQVl4Q1hQMWVRIiwicmF0IjoxNTI5NzUzMDE2LCJzdWIiOiJmb29AYmFyLmNvbSJ9.iTULwXy66Fdbb60xUR6PytTnHX8CkFUVphv5pRhzDhVnYn0LY-dY76LxAYsxRI7fo4lxVEqKtpuvU30JXBRsgoeWYQYInAE_9Sw4EwTVUolmxDi3cR_JZJenN9Y2s9iTBh75pScTT1FNlkZBQIQ0JlvJEFAKefAYXTe3bef1gw8KCmtSgIGtzZpykEGF0STEo8iJhS6URFOe2-o8FuhTjRNdHpdvH1Bzz99nUKb_CdrncfYrqb8E-Wb0f7EjblMXK5hXoPQ5tDt9YzWD7YM_swOM47m2hIoc2REB1lvVd8ruglk5G9LJdZ9loDYO-wQRChNt0_ikUBbxv1fN9WwgrNfaSF9aiAaW6RvK3nyNcHtGZrXTu46mZPc7ZpuO4cZdFOx81JakQhvMTW53PiyNd6UHjFrtZxNKzEauvgaMwx8hlE-GiY5VBdKuxsd73SEZg2syZeOqWaAPxDWJr8uozcciTXah2Gs39e_oC9CoCZd6Ix8IH4PKdbP2QJWIqp86l3Pg2f-Z2R48Uc9kCWDsiuX-GnFoJQl8oFjLsq7oxPbJq8AshVM7E3sHoxFwjH1G1pmhafmv3QRyy9AKFdJ6Ws066DAxOfiAEoq4dztGEMRrNl5m1JB5EvddRJVha4QeDGR76kJlUTKPEQABEAzQjpcFWtU1e6t1dI4kAotscXo', 'scope': 'openid', 'access_token': 'pX5RhrXzuS1OmYEUMZwYITHF2QvGJuHgj-bP1dWOu98.d9cNVHRofk2TDJPT2VTHzLQG0LyHVTUQv1rtSOq3Xk8', 'state': 'ClBcMJmvF20k8zJC', 'expires_in': 3599, 'token_type': 'bearer'}
3.932 AuthorizationResponse {
"access_token": "pX5RhrXzuS1OmYEUMZwYITHF2QvGJuHgj-bP1dWOu98.d9cNVHRofk2TDJPT2VTHzLQG0LyHVTUQv1rtSOq3Xk8",
"expires_in": 3599,
"id_token": {
"at_hash": "v-JhCMWrng8espBwpzw6hA",
"aud": [
"839e0193-0cfd-4d37-b8be-50f10539f367"
],
"auth_time": 1529753009,
"exp": 1529756617,
"iat": 1529753017,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "2949b7d6-a746-434e-b276-1d5d27b7ee51",
"nonce": "W2ikndBAYxCXP1eQ",
"rat": 1529753016,
"sub": "[email protected]"
},
"scope": "openid",
"state": "ClBcMJmvF20k8zJC",
"token_type": "bearer"
}
3.932 phase <--<-- 6 --- AccessToken -->-->
3.933 phase <--<-- 7 --- Done -->-->
3.933 end
3.933 assertion VerifyResponse
3.933 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.934 assertion SameAuthn
3.934 condition same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
3.934 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Req-max_age=1.txt 0000644 0000000 0000000 00000044411 13313427065 014542 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-max_age=1
Test description: Requesting ID Token with max_age=1 seconds restriction
Timestamp: 2018-06-23T11:25:41Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.074 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Registration -->-->
0.075 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.076 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#te5CMeTaDkbzmw0b"
],
"response_types": [
"id_token token"
]
}
0.235 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.236 RegistrationResponse {
"client_id": "1598a711-e2cb-4666-be72-482d8096aeea",
"client_secret": "WCtE7W2ykepy",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "1598a711-e2cb-4666-be72-482d8096aeea",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#te5CMeTaDkbzmw0b"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.236 phase <--<-- 3 --- AsyncAuthn -->-->
0.236 AuthorizationRequest {
"client_id": "1598a711-e2cb-4666-be72-482d8096aeea",
"nonce": "K6HfBtRSuEu4p8Ys",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token token",
"scope": "openid",
"state": "1pjPZHgnFlK1P1XN"
}
0.236 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=1598a711-e2cb-4666-be72-482d8096aeea&state=1pjPZHgnFlK1P1XN&response_type=id_token+token&nonce=K6HfBtRSuEu4p8Ys
0.236 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=1598a711-e2cb-4666-be72-482d8096aeea&state=1pjPZHgnFlK1P1XN&response_type=id_token+token&nonce=K6HfBtRSuEu4p8Ys
3.811 http args {}
3.984 response URL with fragment
3.984 response access_token=Fdz_yLT9Qz2idCuz1E7RQubGdgQcW8NMMtrcDyvKZTc.kFsH8GfulIs2Ouas96qiMcsDFLgMq4XX3YeBv2j1kPU&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoia05MV3JfdE44TTc2dWdRa1psckpadyIsImF1ZCI6WyIxNTk4YTcxMS1lMmNiLTQ2NjYtYmU3Mi00ODJkODA5NmFlZWEiXSwiYXV0aF90aW1lIjoxNTI5NzUzMDA5LCJleHAiOjE1Mjk3NTY3MzIsImlhdCI6MTUyOTc1MzEzMiwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiYjU2ODBlNGEtYTY1My00NjA1LWIwMWEtOGI1ZDQ4MDk2ODM0Iiwibm9uY2UiOiJLNkhmQnRSU3VFdTRwOFlzIiwicmF0IjoxNTI5NzUzMTI5LCJzdWIiOiJmb29AYmFyLmNvbSJ9.RD4RQdBcTUuQmC8-JBzVyL7hsqykgNpWhCj7hctLoXrsAqeBWtmPDE74gre7jWcmUENVB1X_Nqrd6T8hkJx_xwaZ54DA1eVnk_bprMPop7WlAjutL0VOo0DQvDvy-FR5liCTWlxDlLv2mBSoE6z8rt4mzsxI0qi1x_yuT7fwp4ysB1tZ-NN9UbhiH5bJR2byfxHUAJ6i7YxgVlS8JV8vhJDY8Vqz5mDdHi9KPc2jB0J_IA4bQiaeAl9MrW5-TBsWyJXkvz8T5U5Zi5W56IN2xiyAD_A2ZdYsnGibd_HGiKU7I9b4w74-EIGk-fYPE4SHkHleJ0_KDF18ktEzpCoBUvmZh7RIN_Y92PVbR9f-b2ju7nPhx_SU5qVLoKVd90g6veq6pt0lyV2E_0FVVM7LATkzo5xSnYd6G4bOs9Bn7sxNDClr6egc-eLYeIkoVcyp7tlF3d4QmmtuQ_3HceVt_WBB7HN9EiG__YlVQ5nNBnV6ZpKryHUX4Ig7-BBWX3F7FznSv1GLv5vKVVGJmW2ye3pQ4IH0s91WbrfC1bxGPjyxOK1Oj7LVq3_d9kv-UwXutqogCP24IYUYPl2aV-Mz5h-3Hq0o7kEtmuDhHlaAxDnJdVzzzUfKyV33pOWhEb02qsDjtrxrb7ahtJ-lXjs9TQX9X47BNj07nf8mLcuMolE&scope=openid&state=1pjPZHgnFlK1P1XN&token_type=bearer
3.984 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoia05MV3JfdE44TTc2dWdRa1psckpadyIsImF1ZCI6WyIxNTk4YTcxMS1lMmNiLTQ2NjYtYmU3Mi00ODJkODA5NmFlZWEiXSwiYXV0aF90aW1lIjoxNTI5NzUzMDA5LCJleHAiOjE1Mjk3NTY3MzIsImlhdCI6MTUyOTc1MzEzMiwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiYjU2ODBlNGEtYTY1My00NjA1LWIwMWEtOGI1ZDQ4MDk2ODM0Iiwibm9uY2UiOiJLNkhmQnRSU3VFdTRwOFlzIiwicmF0IjoxNTI5NzUzMTI5LCJzdWIiOiJmb29AYmFyLmNvbSJ9.RD4RQdBcTUuQmC8-JBzVyL7hsqykgNpWhCj7hctLoXrsAqeBWtmPDE74gre7jWcmUENVB1X_Nqrd6T8hkJx_xwaZ54DA1eVnk_bprMPop7WlAjutL0VOo0DQvDvy-FR5liCTWlxDlLv2mBSoE6z8rt4mzsxI0qi1x_yuT7fwp4ysB1tZ-NN9UbhiH5bJR2byfxHUAJ6i7YxgVlS8JV8vhJDY8Vqz5mDdHi9KPc2jB0J_IA4bQiaeAl9MrW5-TBsWyJXkvz8T5U5Zi5W56IN2xiyAD_A2ZdYsnGibd_HGiKU7I9b4w74-EIGk-fYPE4SHkHleJ0_KDF18ktEzpCoBUvmZh7RIN_Y92PVbR9f-b2ju7nPhx_SU5qVLoKVd90g6veq6pt0lyV2E_0FVVM7LATkzo5xSnYd6G4bOs9Bn7sxNDClr6egc-eLYeIkoVcyp7tlF3d4QmmtuQ_3HceVt_WBB7HN9EiG__YlVQ5nNBnV6ZpKryHUX4Ig7-BBWX3F7FznSv1GLv5vKVVGJmW2ye3pQ4IH0s91WbrfC1bxGPjyxOK1Oj7LVq3_d9kv-UwXutqogCP24IYUYPl2aV-Mz5h-3Hq0o7kEtmuDhHlaAxDnJdVzzzUfKyV33pOWhEb02qsDjtrxrb7ahtJ-lXjs9TQX9X47BNj07nf8mLcuMolE', 'scope': 'openid', 'access_token': 'Fdz_yLT9Qz2idCuz1E7RQubGdgQcW8NMMtrcDyvKZTc.kFsH8GfulIs2Ouas96qiMcsDFLgMq4XX3YeBv2j1kPU', 'state': '1pjPZHgnFlK1P1XN', 'expires_in': 3599, 'token_type': 'bearer'}
4.066 AuthorizationResponse {
"access_token": "Fdz_yLT9Qz2idCuz1E7RQubGdgQcW8NMMtrcDyvKZTc.kFsH8GfulIs2Ouas96qiMcsDFLgMq4XX3YeBv2j1kPU",
"expires_in": 3599,
"id_token": {
"at_hash": "kNLWr_tN8M76ugQkZlrJZw",
"aud": [
"1598a711-e2cb-4666-be72-482d8096aeea"
],
"auth_time": 1529753009,
"exp": 1529756732,
"iat": 1529753132,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "b5680e4a-a653-4605-b01a-8b5d48096834",
"nonce": "K6HfBtRSuEu4p8Ys",
"rat": 1529753129,
"sub": "[email protected]"
},
"scope": "openid",
"state": "1pjPZHgnFlK1P1XN",
"token_type": "bearer"
}
4.066 phase <--<-- 4 --- AccessToken -->-->
4.066 phase <--<-- 5 --- Note -->-->
5.237 phase <--<-- 6 --- Webfinger -->-->
5.238 not expected to do WebFinger
5.238 phase <--<-- 7 --- Discovery -->-->
5.238 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
5.312 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
5.313 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
5.313 phase <--<-- 8 --- Registration -->-->
5.314 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
5.314 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#dqJwGaR8JRmL5z5r"
],
"response_types": [
"id_token token"
]
}
5.491 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
5.492 RegistrationResponse {
"client_id": "11c6985e-f3bd-4472-a91c-6e7743f0f8e0",
"client_secret": "to3PrCgSIhyT",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "11c6985e-f3bd-4472-a91c-6e7743f0f8e0",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#dqJwGaR8JRmL5z5r"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
5.492 phase <--<-- 9 --- AsyncAuthn -->-->
5.493 AuthorizationRequest {
"client_id": "11c6985e-f3bd-4472-a91c-6e7743f0f8e0",
"max_age": 1,
"nonce": "y0HZmZGyIq6zK7y9",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token token",
"scope": "openid",
"state": "sX4ryu5ua0cCvhqo"
}
5.493 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?max_age=1&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=11c6985e-f3bd-4472-a91c-6e7743f0f8e0&state=sX4ryu5ua0cCvhqo&response_type=id_token+token&nonce=y0HZmZGyIq6zK7y9
5.493 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?max_age=1&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=11c6985e-f3bd-4472-a91c-6e7743f0f8e0&state=sX4ryu5ua0cCvhqo&response_type=id_token+token&nonce=y0HZmZGyIq6zK7y9
12.668 http args {}
12.844 response URL with fragment
12.844 response access_token=K4WFLziShcmmTmd3aTNmP_jbl2eoKRmwZNv6zhG0MvE.v_nVpIfjzS7sBifTu4mKRPKtY9Qg95cCvvK7gy7531g&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoidE9pZEhFNHVjdE5pR2doN1NxN3NDQSIsImF1ZCI6WyIxMWM2OTg1ZS1mM2JkLTQ0NzItYTkxYy02ZTc3NDNmMGY4ZTAiXSwiYXV0aF90aW1lIjoxNTI5NzUzMTM2LCJleHAiOjE1Mjk3NTY3NDEsImlhdCI6MTUyOTc1MzE0MSwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiM2RjMzk5MDYtNGVhYS00YmM4LThlNjQtZjAwZjkwODQxMTBlIiwibm9uY2UiOiJ5MEhabVpHeUlxNnpLN3k5IiwicmF0IjoxNTI5NzUzMTM0LCJzdWIiOiJmb29AYmFyLmNvbSJ9.ZlzgIT_dvmp0jFqK72KH8n7DpLHk9pZa6RNE_wqaw8Smrd7j5oo0YmqOyjAHIG5jwNBsYClrm-_jIYcjnKDD47Ue7YiDfPVAmeA0Z_V_xGL_UdmKtk8_qcfb5z7K7m0vi6zCvq-lq1miXdq8h_R5jIRllj1bUNdNBJbLmpP5t87NDnB92o_vrHx3u3B7a6TTugzgb1MrK7FJA504w5OeNUTYYO3p3sQGZ3HcmJQ2ZH4Zd9YQ91Jf3GhfQF7S5EqSEuNE8uVIV1_wahqp71xh_J_xiQCsQvF3zNZqwL2AkJes6l3VltQ3dhezDVRZM0Y1nKs_OisL92bZMF4q3POuJrt87L2CPgnq3H42eMgLmbJEWIFzNTBb8Y88N8uXZonzHjOCfNDzJo1QRq4rx2knnqiJM3wlly2lcii1YakuMU2WBdaTGIEM7pUf653VqGhB31tnT-Xg0lWJjwoywZzbiirAOmZkGftt2eqGb7sXELX8Po-muq1Row_J8It0iObNtTDjAAPNzmgFqnDwf0t88Dc2TSTSXpNOevef_sdfwy4SD7a3kSCI3BmapOp_EE7lKtxIxka0Nn0x0cfVc7qlK6u_mOnv7j0zadDQftMCS7Un1cVfa20mXLfeoG307VgVj8PWCaJKynl4PQ8aGQP8_3ruDW-c_zRIJC-uM1U-Bd0&scope=openid&state=sX4ryu5ua0cCvhqo&token_type=bearer
12.845 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoidE9pZEhFNHVjdE5pR2doN1NxN3NDQSIsImF1ZCI6WyIxMWM2OTg1ZS1mM2JkLTQ0NzItYTkxYy02ZTc3NDNmMGY4ZTAiXSwiYXV0aF90aW1lIjoxNTI5NzUzMTM2LCJleHAiOjE1Mjk3NTY3NDEsImlhdCI6MTUyOTc1MzE0MSwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiM2RjMzk5MDYtNGVhYS00YmM4LThlNjQtZjAwZjkwODQxMTBlIiwibm9uY2UiOiJ5MEhabVpHeUlxNnpLN3k5IiwicmF0IjoxNTI5NzUzMTM0LCJzdWIiOiJmb29AYmFyLmNvbSJ9.ZlzgIT_dvmp0jFqK72KH8n7DpLHk9pZa6RNE_wqaw8Smrd7j5oo0YmqOyjAHIG5jwNBsYClrm-_jIYcjnKDD47Ue7YiDfPVAmeA0Z_V_xGL_UdmKtk8_qcfb5z7K7m0vi6zCvq-lq1miXdq8h_R5jIRllj1bUNdNBJbLmpP5t87NDnB92o_vrHx3u3B7a6TTugzgb1MrK7FJA504w5OeNUTYYO3p3sQGZ3HcmJQ2ZH4Zd9YQ91Jf3GhfQF7S5EqSEuNE8uVIV1_wahqp71xh_J_xiQCsQvF3zNZqwL2AkJes6l3VltQ3dhezDVRZM0Y1nKs_OisL92bZMF4q3POuJrt87L2CPgnq3H42eMgLmbJEWIFzNTBb8Y88N8uXZonzHjOCfNDzJo1QRq4rx2knnqiJM3wlly2lcii1YakuMU2WBdaTGIEM7pUf653VqGhB31tnT-Xg0lWJjwoywZzbiirAOmZkGftt2eqGb7sXELX8Po-muq1Row_J8It0iObNtTDjAAPNzmgFqnDwf0t88Dc2TSTSXpNOevef_sdfwy4SD7a3kSCI3BmapOp_EE7lKtxIxka0Nn0x0cfVc7qlK6u_mOnv7j0zadDQftMCS7Un1cVfa20mXLfeoG307VgVj8PWCaJKynl4PQ8aGQP8_3ruDW-c_zRIJC-uM1U-Bd0', 'scope': 'openid', 'access_token': 'K4WFLziShcmmTmd3aTNmP_jbl2eoKRmwZNv6zhG0MvE.v_nVpIfjzS7sBifTu4mKRPKtY9Qg95cCvvK7gy7531g', 'state': 'sX4ryu5ua0cCvhqo', 'expires_in': 3599, 'token_type': 'bearer'}
12.848 AuthorizationResponse {
"access_token": "K4WFLziShcmmTmd3aTNmP_jbl2eoKRmwZNv6zhG0MvE.v_nVpIfjzS7sBifTu4mKRPKtY9Qg95cCvvK7gy7531g",
"expires_in": 3599,
"id_token": {
"at_hash": "tOidHE4uctNiGgh7Sq7sCA",
"aud": [
"11c6985e-f3bd-4472-a91c-6e7743f0f8e0"
],
"auth_time": 1529753136,
"exp": 1529756741,
"iat": 1529753141,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "3dc39906-4eaa-4bc8-8e64-f00f9084110e",
"nonce": "y0HZmZGyIq6zK7y9",
"rat": 1529753134,
"sub": "[email protected]"
},
"scope": "openid",
"state": "sX4ryu5ua0cCvhqo",
"token_type": "bearer"
}
12.848 phase <--<-- 10 --- AccessToken -->-->
12.848 phase <--<-- 11 --- Done -->-->
12.849 end
12.849 assertion AuthTimeCheck
12.849 condition auth_time-check: status=OK [Check that the auth_time returned in the ID Token is in the expected range.]
12.849 assertion VerifyResponse
12.849 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
12.85 assertion ClaimsCheck
12.85 condition claims-check: status=OK [Checks if specific claims is present or not]
12.85 assertion MultipleSignOn
12.85 condition multiple-sign-on: status=OK [Verifies that multiple authentications was used in the flow]
12.85 condition Done: status=OK
============================================================
Conditions
auth_time-check: status=OK [Check that the auth_time returned in the ID Token is in the expected range.]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
claims-check: status=OK [Checks if specific claims is present or not]
multiple-sign-on: status=OK [Verifies that multiple authentications was used in the flow]
Done: status=OK
============================================================
RESULT: PASSED
./OP-UserInfo-Header.txt 0000644 0000000 0000000 00000023445 13313426610 015155 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-UserInfo-Header
Test description: UserInfo Endpoint access with POST and bearer header
Timestamp: 2018-06-23T11:22:48Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.095 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.096 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.096 phase <--<-- 2 --- Registration -->-->
0.096 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.096 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#ZMA0pUN9JBE4PB4O"
],
"response_types": [
"id_token token"
]
}
0.254 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.255 RegistrationResponse {
"client_id": "7b0f2b25-a121-4dd0-8e74-49c28941eed3",
"client_secret": "n-dTsBNJGjON",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "7b0f2b25-a121-4dd0-8e74-49c28941eed3",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#ZMA0pUN9JBE4PB4O"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.255 phase <--<-- 3 --- AsyncAuthn -->-->
0.256 AuthorizationRequest {
"client_id": "7b0f2b25-a121-4dd0-8e74-49c28941eed3",
"nonce": "YnrdAkBDD5ZsOrBT",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token token",
"scope": "openid",
"state": "HZ2nFRiIILFCSBbe"
}
0.256 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=7b0f2b25-a121-4dd0-8e74-49c28941eed3&state=HZ2nFRiIILFCSBbe&response_type=id_token+token&nonce=YnrdAkBDD5ZsOrBT
0.256 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=7b0f2b25-a121-4dd0-8e74-49c28941eed3&state=HZ2nFRiIILFCSBbe&response_type=id_token+token&nonce=YnrdAkBDD5ZsOrBT
3.68 http args {}
3.858 response URL with fragment
3.858 response access_token=QU4oZbXn2MSm43nBkhy_0kwvYYpapWdErE1BPV66OPg.l6EhOEEZaI6EOVKaXUqxTB6RV1h5cQfckOcoAcw4-Nc&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiNnRaQUUzTXRJUlNjU0lrVTZjYV9BZyIsImF1ZCI6WyI3YjBmMmIyNS1hMTIxLTRkZDAtOGU3NC00OWMyODk0MWVlZDMiXSwiYXV0aF90aW1lIjoxNTI5NzUyODIwLCJleHAiOjE1Mjk3NTY1NjcsImlhdCI6MTUyOTc1Mjk2NywiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiNmRmZTA1MjEtNzY2Ni00ZWNiLWFkYTctMjU0ZjUxMWY3NmY0Iiwibm9uY2UiOiJZbnJkQWtCREQ1WnNPckJUIiwicmF0IjoxNTI5NzUyOTY0LCJzdWIiOiJmb29AYmFyLmNvbSJ9.JUrjYCu1qUMNKfajLg5hjxMI5h7ylMpqloZ7ng33AlMg_a3UgvEmktLIuB6aNoLlaTssIiQRLgRDXE30vVIFzablw7K4bzaOYz3J5768QYoXC2yffvwRAj43t1APG2Pg26J8ifXm4NOLLMqDzx1mUmi8jdAV6D51zhpyJSo0tf_gFPm9BaDh8zr0oxnz5WHJ0vmSeLGxIqSGYE1PXEECfeKbeEssxVowHzdllKULhu65zNQKQEbc8O00QL0MtEkjb0hEkToYpfFSazjThZhjrAIaRbRMFL275JmwiAeFD_u4MP2kvAxGfjtni8FnRrpF-02O3nWKFHzpGn571-Ir9Qj8a9qTBCpupsAiHWF9K_ZXljVE3tSliyETqYKIUv4Z2dGwkGqcdRC_x1_iUl7tAwh8hUkMBpcUGxCaQyRQFh0VFPGEVYmgUHAuyC6Db_NlItWfssK16AIWsqjUkXAH4Vp37loIgag09T4162An6iy2HBF5U7LyuhwC5AmXCAm_O2yLjPUZHRIjRHXMUjplbcQIRdQtlKuY5sz8-JjFFmR5yco_u-JLRgKGKuzxvtG0LVorWqSPrK-nJhQMgNL_wH18qUjxbkhuh42x74r1t8Gyt8zC9bv3Vkqub0gGTaNHEAHaJsO4Q-8xUO4egDI4bxYH3lJ3CgrOsltyOuYheJY&scope=openid&state=HZ2nFRiIILFCSBbe&token_type=bearer
3.858 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiNnRaQUUzTXRJUlNjU0lrVTZjYV9BZyIsImF1ZCI6WyI3YjBmMmIyNS1hMTIxLTRkZDAtOGU3NC00OWMyODk0MWVlZDMiXSwiYXV0aF90aW1lIjoxNTI5NzUyODIwLCJleHAiOjE1Mjk3NTY1NjcsImlhdCI6MTUyOTc1Mjk2NywiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiNmRmZTA1MjEtNzY2Ni00ZWNiLWFkYTctMjU0ZjUxMWY3NmY0Iiwibm9uY2UiOiJZbnJkQWtCREQ1WnNPckJUIiwicmF0IjoxNTI5NzUyOTY0LCJzdWIiOiJmb29AYmFyLmNvbSJ9.JUrjYCu1qUMNKfajLg5hjxMI5h7ylMpqloZ7ng33AlMg_a3UgvEmktLIuB6aNoLlaTssIiQRLgRDXE30vVIFzablw7K4bzaOYz3J5768QYoXC2yffvwRAj43t1APG2Pg26J8ifXm4NOLLMqDzx1mUmi8jdAV6D51zhpyJSo0tf_gFPm9BaDh8zr0oxnz5WHJ0vmSeLGxIqSGYE1PXEECfeKbeEssxVowHzdllKULhu65zNQKQEbc8O00QL0MtEkjb0hEkToYpfFSazjThZhjrAIaRbRMFL275JmwiAeFD_u4MP2kvAxGfjtni8FnRrpF-02O3nWKFHzpGn571-Ir9Qj8a9qTBCpupsAiHWF9K_ZXljVE3tSliyETqYKIUv4Z2dGwkGqcdRC_x1_iUl7tAwh8hUkMBpcUGxCaQyRQFh0VFPGEVYmgUHAuyC6Db_NlItWfssK16AIWsqjUkXAH4Vp37loIgag09T4162An6iy2HBF5U7LyuhwC5AmXCAm_O2yLjPUZHRIjRHXMUjplbcQIRdQtlKuY5sz8-JjFFmR5yco_u-JLRgKGKuzxvtG0LVorWqSPrK-nJhQMgNL_wH18qUjxbkhuh42x74r1t8Gyt8zC9bv3Vkqub0gGTaNHEAHaJsO4Q-8xUO4egDI4bxYH3lJ3CgrOsltyOuYheJY', 'scope': 'openid', 'access_token': 'QU4oZbXn2MSm43nBkhy_0kwvYYpapWdErE1BPV66OPg.l6EhOEEZaI6EOVKaXUqxTB6RV1h5cQfckOcoAcw4-Nc', 'state': 'HZ2nFRiIILFCSBbe', 'expires_in': 3599, 'token_type': 'bearer'}
3.952 AuthorizationResponse {
"access_token": "QU4oZbXn2MSm43nBkhy_0kwvYYpapWdErE1BPV66OPg.l6EhOEEZaI6EOVKaXUqxTB6RV1h5cQfckOcoAcw4-Nc",
"expires_in": 3599,
"id_token": {
"at_hash": "6tZAE3MtIRScSIkU6ca_Ag",
"aud": [
"7b0f2b25-a121-4dd0-8e74-49c28941eed3"
],
"auth_time": 1529752820,
"exp": 1529756567,
"iat": 1529752967,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "6dfe0521-7666-4ecb-ada7-254f511f76f4",
"nonce": "YnrdAkBDD5ZsOrBT",
"rat": 1529752964,
"sub": "[email protected]"
},
"scope": "openid",
"state": "HZ2nFRiIILFCSBbe",
"token_type": "bearer"
}
3.952 phase <--<-- 4 --- AccessToken -->-->
3.952 phase <--<-- 5 --- UserInfo -->-->
3.952 do_user_info_request kwargs:{'state': 'HZ2nFRiIILFCSBbe', 'method': 'POST', 'behavior': 'use_authorization_header'}
3.953 request {'body': ''}
3.953 request_url https://oidc-certification.ory.sh:8443/userinfo
3.953 request_http_args {'headers': {'Authorization': 'Bearer QU4oZbXn2MSm43nBkhy_0kwvYYpapWdErE1BPV66OPg.l6EhOEEZaI6EOVKaXUqxTB6RV1h5cQfckOcoAcw4-Nc', 'Content-Type': 'application/x-www-form-urlencoded'}}
4.028 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
4.029 OpenIDSchema {
"sub": "[email protected]"
}
4.029 OpenIDSchema {
"sub": "[email protected]"
}
4.029 phase <--<-- 6 --- Done -->-->
4.029 end
4.029 assertion VerifyResponse
4.029 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.029 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Registration-Dynamic.txt 0000644 0000000 0000000 00000011470 13313426512 016265 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-Dynamic
Test description: Client registration request
Timestamp: 2018-06-23T11:21:46Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.098 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.1 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.1 phase <--<-- 2 --- Registration -->-->
0.1 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.1 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#ifrjMbo0PO8IVSdR"
],
"response_types": [
"id_token token"
]
}
0.255 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.256 RegistrationResponse {
"client_id": "4876b503-7c52-4454-8325-12751437f6b8",
"client_secret": "31MQn6gz9oPy",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "4876b503-7c52-4454-8325-12751437f6b8",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#ifrjMbo0PO8IVSdR"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.256 phase <--<-- 3 --- Done -->-->
0.256 end
0.256 assertion CheckHTTPResponse
0.256 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.256 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
Done: status=OK
============================================================
RESULT: PASSED
./OP-display-page.txt 0000644 0000000 0000000 00000022261 13313426631 014612 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-display-page
Test description: Request with display=page
Timestamp: 2018-06-23T11:23:05Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.166 phase <--<-- 1 --- Webfinger -->-->
1.166 not expected to do WebFinger
1.166 phase <--<-- 2 --- Discovery -->-->
1.166 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.243 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.244 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.244 phase <--<-- 3 --- Registration -->-->
1.244 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.244 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#kl6gaETOo77BtSK9"
],
"response_types": [
"id_token token"
]
}
1.403 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.404 RegistrationResponse {
"client_id": "140773ac-b48d-4dab-a3de-7cc5a3e00885",
"client_secret": ".PbKh2pMAsO1",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "140773ac-b48d-4dab-a3de-7cc5a3e00885",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#kl6gaETOo77BtSK9"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.404 phase <--<-- 4 --- AsyncAuthn -->-->
1.404 AuthorizationRequest {
"client_id": "140773ac-b48d-4dab-a3de-7cc5a3e00885",
"display": "page",
"nonce": "ls9D9PMcXn3m4lfW",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token token",
"scope": "openid",
"state": "wjs7H85CjrtmtZ7j"
}
1.405 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=140773ac-b48d-4dab-a3de-7cc5a3e00885&state=wjs7H85CjrtmtZ7j&response_type=id_token+token&nonce=ls9D9PMcXn3m4lfW&display=page
1.405 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=140773ac-b48d-4dab-a3de-7cc5a3e00885&state=wjs7H85CjrtmtZ7j&response_type=id_token+token&nonce=ls9D9PMcXn3m4lfW&display=page
4.34 http args {}
4.512 response URL with fragment
4.512 response access_token=1CXGZhxKrfQS53TkvLnmkrJ3pEiikY3raNj-KVrieFc.CVettkxSJxeZcL2051RpwLiUkCicK3WIh3KCA48Vd2k&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoieW5yU2ozZjVCQW1DSUs5NlVoOUY4USIsImF1ZCI6WyIxNDA3NzNhYy1iNDhkLTRkYWItYTNkZS03Y2M1YTNlMDA4ODUiXSwiYXV0aF90aW1lIjoxNTI5NzUyODIwLCJleHAiOjE1Mjk3NTY1ODUsImlhdCI6MTUyOTc1Mjk4NSwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiOGE5OTBiNTEtN2ZmNC00MjM1LWE1MzQtNTZmZWI3ZjU0YWNhIiwibm9uY2UiOiJsczlEOVBNY1huM200bGZXIiwicmF0IjoxNTI5NzUyOTgyLCJzdWIiOiJmb29AYmFyLmNvbSJ9.gzzyWgJvohN2NkPQjxI7-g2fWjylItu4oLBQDTlKyV54lDIr6UGgu8XMXNhhxQEriV2TWgtNlLs8sKRNfaMTNe_RKIj83npmmej7EmlsI9x1WZwG9XeY1e8DtL1_pUDvuDNvMe-mXEOFtYlPBZ7LthBSjtjwEacNSNwh5buobpXBhMBmg1JKx3-9iXDquIkgnDRcEPIs2c-OV3IQVy0aSAcIQoQ583giVi1fx7CS5OmGf01-VjqhnTTmdLBXMON_75SzA3__AB9kf0EBOLhWPkRn--1kt5fnAPZ2Oz_JDMTGfl2jae9mfxECzPBCutEKofCoP0qbzBYhPgdLh3GGy90cDxD8ibcL4jw-IzKbMuiROR8be1Q_OwFsawJ5LjmVnRwUY6fBGSfEwFxtmrR90Nfx44aX67oOEmDEuQ_efRYFgO9lKN-FN6X6KcYUu6h7o9uvJhPsq_GEYFCAoLBqnUldd4CDMbGxUb7la2b_fJZ4nQ53tc3gWwA2h1grfAi-huV1NC7uRN6SLfSKbJn-ZgBFCd8RXmahq623yBqk2iq6uB9YzdRCD9_GJ37PwaHsLhooA-Altr41_xPZY0SwsBeFmv9crlWm_hFr6wdcCHwyl8TkqM-eHpD2bj841lZNTyr5a7XjQyIMk_iW04WOcmdwbY9ip8YK3Hkr0wcKIT0&scope=openid&state=wjs7H85CjrtmtZ7j&token_type=bearer
4.512 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoieW5yU2ozZjVCQW1DSUs5NlVoOUY4USIsImF1ZCI6WyIxNDA3NzNhYy1iNDhkLTRkYWItYTNkZS03Y2M1YTNlMDA4ODUiXSwiYXV0aF90aW1lIjoxNTI5NzUyODIwLCJleHAiOjE1Mjk3NTY1ODUsImlhdCI6MTUyOTc1Mjk4NSwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiOGE5OTBiNTEtN2ZmNC00MjM1LWE1MzQtNTZmZWI3ZjU0YWNhIiwibm9uY2UiOiJsczlEOVBNY1huM200bGZXIiwicmF0IjoxNTI5NzUyOTgyLCJzdWIiOiJmb29AYmFyLmNvbSJ9.gzzyWgJvohN2NkPQjxI7-g2fWjylItu4oLBQDTlKyV54lDIr6UGgu8XMXNhhxQEriV2TWgtNlLs8sKRNfaMTNe_RKIj83npmmej7EmlsI9x1WZwG9XeY1e8DtL1_pUDvuDNvMe-mXEOFtYlPBZ7LthBSjtjwEacNSNwh5buobpXBhMBmg1JKx3-9iXDquIkgnDRcEPIs2c-OV3IQVy0aSAcIQoQ583giVi1fx7CS5OmGf01-VjqhnTTmdLBXMON_75SzA3__AB9kf0EBOLhWPkRn--1kt5fnAPZ2Oz_JDMTGfl2jae9mfxECzPBCutEKofCoP0qbzBYhPgdLh3GGy90cDxD8ibcL4jw-IzKbMuiROR8be1Q_OwFsawJ5LjmVnRwUY6fBGSfEwFxtmrR90Nfx44aX67oOEmDEuQ_efRYFgO9lKN-FN6X6KcYUu6h7o9uvJhPsq_GEYFCAoLBqnUldd4CDMbGxUb7la2b_fJZ4nQ53tc3gWwA2h1grfAi-huV1NC7uRN6SLfSKbJn-ZgBFCd8RXmahq623yBqk2iq6uB9YzdRCD9_GJ37PwaHsLhooA-Altr41_xPZY0SwsBeFmv9crlWm_hFr6wdcCHwyl8TkqM-eHpD2bj841lZNTyr5a7XjQyIMk_iW04WOcmdwbY9ip8YK3Hkr0wcKIT0', 'scope': 'openid', 'access_token': '1CXGZhxKrfQS53TkvLnmkrJ3pEiikY3raNj-KVrieFc.CVettkxSJxeZcL2051RpwLiUkCicK3WIh3KCA48Vd2k', 'state': 'wjs7H85CjrtmtZ7j', 'expires_in': 3599, 'token_type': 'bearer'}
4.601 AuthorizationResponse {
"access_token": "1CXGZhxKrfQS53TkvLnmkrJ3pEiikY3raNj-KVrieFc.CVettkxSJxeZcL2051RpwLiUkCicK3WIh3KCA48Vd2k",
"expires_in": 3599,
"id_token": {
"at_hash": "ynrSj3f5BAmCIK96Uh9F8Q",
"aud": [
"140773ac-b48d-4dab-a3de-7cc5a3e00885"
],
"auth_time": 1529752820,
"exp": 1529756585,
"iat": 1529752985,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "8a990b51-7ff4-4235-a534-56feb7f54aca",
"nonce": "ls9D9PMcXn3m4lfW",
"rat": 1529752982,
"sub": "[email protected]"
},
"scope": "openid",
"state": "wjs7H85CjrtmtZ7j",
"token_type": "bearer"
}
4.602 phase <--<-- 5 --- Done -->-->
4.602 end
4.602 assertion VerifyResponse
4.602 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.602 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED
./OP-Registration-Endpoint.txt 0000644 0000000 0000000 00000005207 13313426513 016463 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-Endpoint
Test description: Verify that registration_endpoint is published
Timestamp: 2018-06-23T11:21:47Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.077 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.078 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.078 phase <--<-- 2 --- Done -->-->
0.078 end
0.079 assertion VerifyOPHasRegistrationEndpoint
0.079 condition verify-op-has-registration-endpoint: status=OK [Verify that the OP has a registration endpoint]
0.079 condition Done: status=OK
============================================================
Conditions
verify-op-has-registration-endpoint: status=OK [Verify that the OP has a registration endpoint]
Done: status=OK
============================================================
RESULT: PASSED
./OP-IDToken-C-Signature.txt 0000644 0000000 0000000 00000022504 13313426546 015654 0 ustar root root 0000000 0000000 Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-IDToken-C-Signature
Test description: Does the OP sign the ID Token and with what
Timestamp: 2018-06-23T11:22:14Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Registration -->-->
0.074 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.075 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Yq6cKEmYDArNLZ6A"
],
"response_types": [
"id_token token"
]
}
0.229 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.23 RegistrationResponse {
"client_id": "77aa2531-2ba7-4e5b-be59-f32ca24963e7",
"client_secret": "BYeWZwY-SUxP",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "77aa2531-2ba7-4e5b-be59-f32ca24963e7",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Yq6cKEmYDArNLZ6A"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.23 phase <--<-- 3 --- AsyncAuthn -->-->
0.23 AuthorizationRequest {
"client_id": "77aa2531-2ba7-4e5b-be59-f32ca24963e7",
"nonce": "ftHcZU0REpaAnJiw",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token token",
"scope": "openid",
"state": "2vGwmwCrOFjokzSw"
}
0.231 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=77aa2531-2ba7-4e5b-be59-f32ca24963e7&state=2vGwmwCrOFjokzSw&response_type=id_token+token&nonce=ftHcZU0REpaAnJiw
0.231 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=77aa2531-2ba7-4e5b-be59-f32ca24963e7&state=2vGwmwCrOFjokzSw&response_type=id_token+token&nonce=ftHcZU0REpaAnJiw
2.543 http args {}
2.748 response URL with fragment
2.748 response access_token=yR9TLRjxU5yWGhDVZkPn-DG_VyhMufXpv-b21SOkcqo.wo7rJiKTvnQMQic-oQlrwUCgmApk8aSxmJKHAWldRBg&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiZFJpLWJySzdiV0ZwWGZBNDRwZUV0ZyIsImF1ZCI6WyI3N2FhMjUzMS0yYmE3LTRlNWItYmU1OS1mMzJjYTI0OTYzZTciXSwiYXV0aF90aW1lIjoxNTI5NzUyODIwLCJleHAiOjE1Mjk3NTY1MzQsImlhdCI6MTUyOTc1MjkzNCwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiNTc3NDJhZDgtOWU2NC00Y2UzLWJlYzktN2Q3NmVhZWU1MjkyIiwibm9uY2UiOiJmdEhjWlUwUkVwYUFuSml3IiwicmF0IjoxNTI5NzUyOTMyLCJzdWIiOiJmb29AYmFyLmNvbSJ9.PPt8TPQmLnTpHekuCOd9eF80iVj4dhlJWwsx02xtfkEUSf7bdtamsPiBuqOfbFUBcYRGVYtAtI12virfXtcYYCwTaMR64i9n4vmA4r8zrc-XkS4om7F3K7iLKOpFQdPQxYJ5GVItnT-x90pCGy1oMKnWjM2NCNUqINdFHYhgdaDnbxtRdYmWNKHAjcH0rmQG-G-PZiHx294ucQjf2qe82QeZhjmee-IcuU7QXnlzolhjttB8PaB8DelqZ9xDnHB-dakjtV-CCeyhAzfLTWhHrZE-hI0eSTORznFRn9wmchqHbbCNvZtXBu0xuby0JPoy_9yehX-ZgXDUlzIJ3qB18k9s-G-b9luXeUCVvXslqvDUGnyEZnyxqYiYxAlDUbqu7nVV8LPjjrBAP1DeRDwu0pMTnJqFnPfpZbOU4jW140mCyEplimwz5UTknXcCZZj1i3exeKdFZtPwsk5Q24Po9DVnw7N2VizJ3mCbAiKCSChbzy4s5i_daHQ0d5WoJFl-J7BhGCd2I77exkf_dcrTx_pXgmFcB5yIDL8Ah8tmdbyGMy_o2ACRHStY3ToKMgKLDPP71zUQHrgNTGbtcfJn3H5hgiDa0n2mkPSD9UErzvCMG1OgDN8FKA71tNlX3FoPJ1i5A1WrseSiMfvNVAw41DpUjTxX2KTuG5ZinbOMfQs&scope=openid&state=2vGwmwCrOFjokzSw&token_type=bearer
2.749 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiZFJpLWJySzdiV0ZwWGZBNDRwZUV0ZyIsImF1ZCI6WyI3N2FhMjUzMS0yYmE3LTRlNWItYmU1OS1mMzJjYTI0OTYzZTciXSwiYXV0aF90aW1lIjoxNTI5NzUyODIwLCJleHAiOjE1Mjk3NTY1MzQsImlhdCI6MTUyOTc1MjkzNCwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiNTc3NDJhZDgtOWU2NC00Y2UzLWJlYzktN2Q3NmVhZWU1MjkyIiwibm9uY2UiOiJmdEhjWlUwUkVwYUFuSml3IiwicmF0IjoxNTI5NzUyOTMyLCJzdWIiOiJmb29AYmFyLmNvbSJ9.PPt8TPQmLnTpHekuCOd9eF80iVj4dhlJWwsx02xtfkEUSf7bdtamsPiBuqOfbFUBcYRGVYtAtI12virfXtcYYCwTaMR64i9n4vmA4r8zrc-XkS4om7F3K7iLKOpFQdPQxYJ5GVItnT-x90pCGy1oMKnWjM2NCNUqINdFHYhgdaDnbxtRdYmWNKHAjcH0rmQG-G-PZiHx294ucQjf2qe82QeZhjmee-IcuU7QXnlzolhjttB8PaB8DelqZ9xDnHB-dakjtV-CCeyhAzfLTWhHrZE-hI0eSTORznFRn9wmchqHbbCNvZtXBu0xuby0JPoy_9yehX-ZgXDUlzIJ3qB18k9s-G-b9luXeUCVvXslqvDUGnyEZnyxqYiYxAlDUbqu7nVV8LPjjrBAP1DeRDwu0pMTnJqFnPfpZbOU4jW140mCyEplimwz5UTknXcCZZj1i3exeKdFZtPwsk5Q24Po9DVnw7N2VizJ3mCbAiKCSChbzy4s5i_daHQ0d5WoJFl-J7BhGCd2I77exkf_dcrTx_pXgmFcB5yIDL8Ah8tmdbyGMy_o2ACRHStY3ToKMgKLDPP71zUQHrgNTGbtcfJn3H5hgiDa0n2mkPSD9UErzvCMG1OgDN8FKA71tNlX3FoPJ1i5A1WrseSiMfvNVAw41DpUjTxX2KTuG5ZinbOMfQs', 'scope': 'openid', 'access_token': 'yR9TLRjxU5yWGhDVZkPn-DG_VyhMufXpv-b21SOkcqo.wo7rJiKTvnQMQic-oQlrwUCgmApk8aSxmJKHAWldRBg', 'state': '2vGwmwCrOFjokzSw', 'expires_in': 3599, 'token_type': 'bearer'}
2.83 AuthorizationResponse {
"access_token": "yR9TLRjxU5yWGhDVZkPn-DG_VyhMufXpv-b21SOkcqo.wo7rJiKTvnQMQic-oQlrwUCgmApk8aSxmJKHAWldRBg",
"expires_in": 3599,
"id_token": {
"at_hash": "dRi-brK7bWFpXfA44peEtg",
"aud": [
"77aa2531-2ba7-4e5b-be59-f32ca24963e7"
],
"auth_time": 1529752820,
"exp": 1529756534,
"iat": 1529752934,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "57742ad8-9e64-4ce3-bec9-7d76eaee5292",
"nonce": "ftHcZU0REpaAnJiw",
"rat": 1529752932,
"sub": "[email protected]"
},
"scope": "openid",
"state": "2vGwmwCrOFjokzSw",
"token_type": "bearer"
}
2.83 phase <--<-- 4 --- AccessToken -->-->
2.83 phase <--<-- 5 --- Done -->-->
2.83 end
2.831 assertion VerifyResponse
2.831 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.831 assertion IsIDTokenSigned
2.831 condition is-idtoken-signed: status=OK [Checks if the id_token is signed]
2.831 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
is-idtoken-signed: status=OK [Checks if the id_token is signed]
Done: status=OK
============================================================
RESULT: PASSED
|
|
Text | hydra/internal/certification/C.F.T.T.s/OP-claims-essential.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-claims-essential
Test description: Claims request with essential name claim
Timestamp: 2018-06-23T10:45:15Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.084 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.086 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.086 phase <--<-- 2 --- Registration -->-->
0.086 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.086 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#K2Y2RF6vhgRwjUL4"
],
"response_types": [
"code"
]
}
0.243 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.244 RegistrationResponse {
"client_id": "17be20bc-63a8-49d4-b6fd-69e2862a9e1d",
"client_secret": "YKu0gfhSPcwx",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "17be20bc-63a8-49d4-b6fd-69e2862a9e1d",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#K2Y2RF6vhgRwjUL4"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.244 phase <--<-- 3 --- AsyncAuthn -->-->
0.244 AuthorizationRequest {
"claims": {
"userinfo": {
"name": {
"essential": true
}
}
},
"client_id": "17be20bc-63a8-49d4-b6fd-69e2862a9e1d",
"nonce": "C84S0pdAWVTHCUgu",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "rNNO0wwmUg1UTDvi"
}
0.245 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=17be20bc-63a8-49d4-b6fd-69e2862a9e1d&claims=%7B%22userinfo%22%3A+%7B%22name%22%3A+%7B%22essential%22%3A+true%7D%7D%7D&state=rNNO0wwmUg1UTDvi&response_type=code&nonce=C84S0pdAWVTHCUgu
0.245 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=17be20bc-63a8-49d4-b6fd-69e2862a9e1d&claims=%7B%22userinfo%22%3A+%7B%22name%22%3A+%7B%22essential%22%3A+true%7D%7D%7D&state=rNNO0wwmUg1UTDvi&response_type=code&nonce=C84S0pdAWVTHCUgu
2.782 response Response URL with query part
2.782 response {'state': 'rNNO0wwmUg1UTDvi', 'scope': 'openid', 'code': 'Dkpqw55dihI2n2QeOSi_0oRrZvvhrSA-Emx8UV8u6iI.9NkC-cwAPvujPJloUTUS_sOsaLNhYzbCnj2BlJVYUpQ'}
2.782 response {'state': 'rNNO0wwmUg1UTDvi', 'scope': 'openid', 'code': 'Dkpqw55dihI2n2QeOSi_0oRrZvvhrSA-Emx8UV8u6iI.9NkC-cwAPvujPJloUTUS_sOsaLNhYzbCnj2BlJVYUpQ'}
2.783 AuthorizationResponse {
"code": "Dkpqw55dihI2n2QeOSi_0oRrZvvhrSA-Emx8UV8u6iI.9NkC-cwAPvujPJloUTUS_sOsaLNhYzbCnj2BlJVYUpQ",
"scope": "openid",
"state": "rNNO0wwmUg1UTDvi"
}
2.783 phase <--<-- 4 --- AccessToken -->-->
2.783 --> request op_args: {'state': 'rNNO0wwmUg1UTDvi'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.783 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'rNNO0wwmUg1UTDvi', 'code': 'Dkpqw55dihI2n2QeOSi_0oRrZvvhrSA-Emx8UV8u6iI.9NkC-cwAPvujPJloUTUS_sOsaLNhYzbCnj2BlJVYUpQ', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '17be20bc-63a8-49d4-b6fd-69e2862a9e1d'}, 'state': 'rNNO0wwmUg1UTDvi'}
2.783 AccessTokenRequest {
"code": "Dkpqw55dihI2n2QeOSi_0oRrZvvhrSA-Emx8UV8u6iI.9NkC-cwAPvujPJloUTUS_sOsaLNhYzbCnj2BlJVYUpQ",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "rNNO0wwmUg1UTDvi"
}
2.786 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.786 request_http_args {'headers': {'Authorization': 'Basic MTdiZTIwYmMtNjNhOC00OWQ0LWI2ZmQtNjllMjg2MmE5ZTFkOllLdTBnZmhTUGN3eA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.786 request code=Dkpqw55dihI2n2QeOSi_0oRrZvvhrSA-Emx8UV8u6iI.9NkC-cwAPvujPJloUTUS_sOsaLNhYzbCnj2BlJVYUpQ&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=rNNO0wwmUg1UTDvi
3.0 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.001 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMTdiZTIwYmMtNjNhOC00OWQ0LWI2ZmQtNjllMjg2MmE5ZTFkIl0sImF1dGhfdGltZSI6MTUyOTc1MDU5MiwiZXhwIjoxNTI5NzU0MzE0LCJpYXQiOjE1Mjk3NTA3MTUsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjJkOGY1MzhmLWY4ZDctNDgyNC05NWFkLTI3Nzg2YjNhYjJmOCIsIm5vbmNlIjoiQzg0UzBwZEFXVlRIQ1VndSIsInJhdCI6MTUyOTc1MDcxMiwic3ViIjoiZm9vQGJhci5jb20ifQ.IebCwNPxC2AstcPyn2StHv5t-BOzIp0FzSgH9rW3MOHhJ9kX4o-SgdQPvnKBXfqbmo_H0ATq8bTLRmpUrzVzSHiHLxFD7yappkyRcUU5iY5mzY_ILAyKtYA7gXDS95WLrzX4rzLqnPhEqwK1f9I-ngAGxGHSYtiUd5oYJ2kgbVr56YCzRRdnJW6EYNb7SnEkhQZbDr2rFW3Ezkwg4kATL0d-6fp73USi_SHJtoyYoJ9V4U9PymJPVnuJXKgqYZBZRn_TQNbeRiXDEvpOs6-FafHZZQtpm0Qbw07akYssWUS-4QoM6HGPR4slGcIkr8rRIgBydvU0Qm2OqN1rwvzINXYAcPAvw7R6mafg4INjpOu146r0Ctk8dWl7rdVffn7uOpEm6FJ89gv1-kW66RpY7clKVVPbANNFBfil8xdG2H3S0j0-QL472-9oSsTkb6xgPefIEs3-dEBqsuZWqHW5NRriWz_8jEckLt_0c7M5a29UM0V9tFOfBLr_56cLpmkEz4j9ceJz7EeSFxTwqo6PUrYdV_zGJqyhGpLdx9u_iRNsighJajaOtGWt0keJpgnhOhnjfg9_3LcqLZcyN4IdkgtUM6ivFYJpKy4Y7pcWiNTK0Se8-uc9-unECVLlf-UXBnI8K4hmaFelbys_NgcirABn-sKm2uG1sh73qET_nHg', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'MAmqFWhZ7PEAUpep-jfPyEvASmx8w6ARpWc2nAcNeZQ.JzvgeZe3KrzNGbBbwyQoTmbPJIseCbkQUMhDNDBiY4Y', 'scope': 'openid'}
3.081 AccessTokenResponse {
"access_token": "MAmqFWhZ7PEAUpep-jfPyEvASmx8w6ARpWc2nAcNeZQ.JzvgeZe3KrzNGbBbwyQoTmbPJIseCbkQUMhDNDBiY4Y",
"expires_in": 3599,
"id_token": {
"aud": [
"17be20bc-63a8-49d4-b6fd-69e2862a9e1d"
],
"auth_time": 1529750592,
"exp": 1529754314,
"iat": 1529750715,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "2d8f538f-f8d7-4824-95ad-27786b3ab2f8",
"nonce": "C84S0pdAWVTHCUgu",
"rat": 1529750712,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.081 phase <--<-- 5 --- UserInfo -->-->
3.081 do_user_info_request kwargs:{'state': 'rNNO0wwmUg1UTDvi', 'method': 'GET', 'authn_method': 'bearer_header'}
3.081 request {'body': None}
3.081 request_url https://oidc-certification.ory.sh:8443/userinfo
3.081 request_http_args {'headers': {'Authorization': 'Bearer MAmqFWhZ7PEAUpep-jfPyEvASmx8w6ARpWc2nAcNeZQ.JzvgeZe3KrzNGbBbwyQoTmbPJIseCbkQUMhDNDBiY4Y'}}
3.152 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
3.153 OpenIDSchema {
"sub": "[email protected]"
}
3.153 OpenIDSchema {
"sub": "[email protected]"
}
3.153 phase <--<-- 6 --- Done -->-->
3.153 end
3.153 assertion VerifyClaims
3.154 condition verify-claims: status=WARNING, message=Missing required claim: name [Verifies that the claims returned as UserInfo or in the ID Token is consistent with what was asked for]
3.154 assertion CheckHTTPResponse
3.154 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
3.154 condition Done: status=OK
============================================================
Conditions
verify-claims: status=WARNING, message=Missing required claim: name [Verifies that the claims returned as UserInfo or in the ID Token is consistent with what was asked for]
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
Missing required claim: name |
Text | hydra/internal/certification/C.F.T.T.s/OP-ClientAuth-Basic-Dynamic.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-ClientAuth-Basic-Dynamic
Test description: Access token request with client_secret_basic authentication
Timestamp: 2018-06-23T10:44:36Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.081 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.082 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.082 phase <--<-- 2 --- Registration -->-->
0.082 register kwargs:{'application_name': 'OIC test tool', 'token_endpoint_auth_method': 'client_secret_basic', 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'response_types': ['code'], 'url': 'https://oidc-certification.ory.sh:8443/clients', 'application_type': 'web'}
0.083 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Uk7Qb5p2QPgnoUJs"
],
"response_types": [
"code"
],
"token_endpoint_auth_method": "client_secret_basic"
}
0.24 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.241 RegistrationResponse {
"client_id": "f0852d80-b05c-4f0b-8ebb-2fc758dfc979",
"client_secret": "jUVlAj7TntjH",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "f0852d80-b05c-4f0b-8ebb-2fc758dfc979",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Uk7Qb5p2QPgnoUJs"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.241 phase <--<-- 3 --- AsyncAuthn -->-->
0.242 AuthorizationRequest {
"client_id": "f0852d80-b05c-4f0b-8ebb-2fc758dfc979",
"nonce": "fn5gv4fWICWN5kEK",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "xiFdT0JBP8plW93q"
}
0.242 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=f0852d80-b05c-4f0b-8ebb-2fc758dfc979&state=xiFdT0JBP8plW93q&response_type=code&nonce=fn5gv4fWICWN5kEK
0.242 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=f0852d80-b05c-4f0b-8ebb-2fc758dfc979&state=xiFdT0JBP8plW93q&response_type=code&nonce=fn5gv4fWICWN5kEK
2.139 response Response URL with query part
2.14 response {'state': 'xiFdT0JBP8plW93q', 'scope': 'openid', 'code': 'V0A0eFhM93IYa7WEhh31E2aqNI_FY_RaFFxF50a-nGQ.gnKBFCsJXBOY12bslUEEQmNxfbYVvqb6Gy3W303XPqA'}
2.14 response {'state': 'xiFdT0JBP8plW93q', 'scope': 'openid', 'code': 'V0A0eFhM93IYa7WEhh31E2aqNI_FY_RaFFxF50a-nGQ.gnKBFCsJXBOY12bslUEEQmNxfbYVvqb6Gy3W303XPqA'}
2.14 AuthorizationResponse {
"code": "V0A0eFhM93IYa7WEhh31E2aqNI_FY_RaFFxF50a-nGQ.gnKBFCsJXBOY12bslUEEQmNxfbYVvqb6Gy3W303XPqA",
"scope": "openid",
"state": "xiFdT0JBP8plW93q"
}
2.14 phase <--<-- 4 --- AccessToken -->-->
2.141 --> request op_args: {'state': 'xiFdT0JBP8plW93q', 'authn_method': 'client_secret_basic'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.141 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'xiFdT0JBP8plW93q', 'code': 'V0A0eFhM93IYa7WEhh31E2aqNI_FY_RaFFxF50a-nGQ.gnKBFCsJXBOY12bslUEEQmNxfbYVvqb6Gy3W303XPqA', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'f0852d80-b05c-4f0b-8ebb-2fc758dfc979'}, 'state': 'xiFdT0JBP8plW93q', 'authn_method': 'client_secret_basic'}
2.141 AccessTokenRequest {
"code": "V0A0eFhM93IYa7WEhh31E2aqNI_FY_RaFFxF50a-nGQ.gnKBFCsJXBOY12bslUEEQmNxfbYVvqb6Gy3W303XPqA",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "xiFdT0JBP8plW93q"
}
2.141 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.141 request_http_args {'headers': {'Authorization': 'Basic ZjA4NTJkODAtYjA1Yy00ZjBiLThlYmItMmZjNzU4ZGZjOTc5OmpVVmxBajdUbnRqSA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.141 request code=V0A0eFhM93IYa7WEhh31E2aqNI_FY_RaFFxF50a-nGQ.gnKBFCsJXBOY12bslUEEQmNxfbYVvqb6Gy3W303XPqA&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=xiFdT0JBP8plW93q
2.356 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.357 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZjA4NTJkODAtYjA1Yy00ZjBiLThlYmItMmZjNzU4ZGZjOTc5Il0sImF1dGhfdGltZSI6MTUyOTc1MDU5MiwiZXhwIjoxNTI5NzU0Mjc2LCJpYXQiOjE1Mjk3NTA2NzYsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjUzZTQxODU5LWFlOGMtNGY3Ni04YzgwLTljMGVkYmZiZTIzYyIsIm5vbmNlIjoiZm41Z3Y0ZldJQ1dONWtFSyIsInJhdCI6MTUyOTc1MDY3NCwic3ViIjoiZm9vQGJhci5jb20ifQ.cmg2s22ZDs_e8Pdu_LVMDmN10eobgTtExq56Zqx_obYAJ4KvjF6JEAFbgZy-4xQuB4wajt3AQ7y34HEqa_ShqRnssO7ENLhSLOTwUeyJsQIS2bziWHlANxNBjg4uWmMPBowQl1hJ1ZyQWu6XGHaQs4qhKGtD32wZDentaH5EugE45t1dEwx8wkjzUA9dpP511o9dtvnFmiGw4vb_qnjPi5oqmaFVUtefHqfrPmnlFgKTH65BXN6TC3cPHzl7DfytrLqxNm2otaw3w2IkHlpzjufJ95B8UWa6ZcLgZt5_edP-994SoKYFHm5yML0E3Zia2tA-wCbwFwLEd_SyoklXc_ljFKjBp_RXKTyM0SN5SdbAfoJkxRvEmrgnkat-yFY51KR-1Ih8n0cD7zbyHfElDP6zx9zRTyBBp2u2atJvH3bnwi6DgZvqI_DfIER0ET8JciDYOsA_7Uwul-R2JPiyUkp4txERA6FiX0C0IxkTgU9vUFygoIs6FSP-wqEzjIM1jD5KBRf_hS7Bp4YuMiHQBpKnpOCewGcr94QwSj4b5mbQpwbhrOW4WeTdLn_bpFk1OcNuusy7pAYFS46E2CmSBtwwALTyixgpFFn55XZ5mCgDtiQHziuAfijDjVogovgWZiN3kACTE1T8Ytk8eKSiCM6hAtky20JNIU-s3UdhvOA', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': '7fmF8tKzJ_-loZhTKANHUwK-IU9M0DQdabnlcCnyBnQ.752n8w_2cHkPaJ7JKNZeaP0moSMj-06avj8CwbNkm-E', 'scope': 'openid'}
2.441 AccessTokenResponse {
"access_token": "7fmF8tKzJ_-loZhTKANHUwK-IU9M0DQdabnlcCnyBnQ.752n8w_2cHkPaJ7JKNZeaP0moSMj-06avj8CwbNkm-E",
"expires_in": 3599,
"id_token": {
"aud": [
"f0852d80-b05c-4f0b-8ebb-2fc758dfc979"
],
"auth_time": 1529750592,
"exp": 1529754276,
"iat": 1529750676,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "53e41859-ae8c-4f76-8c80-9c0edbfbe23c",
"nonce": "fn5gv4fWICWN5kEK",
"rat": 1529750674,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
2.441 phase <--<-- 5 --- Done -->-->
2.441 end
2.441 assertion VerifyResponse
2.441 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.441 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-ClientAuth-SecretPost-Dynamic.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-ClientAuth-SecretPost-Dynamic
Test description: Access token request with client_secret_post authentication
Timestamp: 2018-06-23T10:44:47Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.109 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.11 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.11 phase <--<-- 2 --- Registration -->-->
0.11 register kwargs:{'application_name': 'OIC test tool', 'token_endpoint_auth_method': 'client_secret_post', 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'response_types': ['code'], 'url': 'https://oidc-certification.ory.sh:8443/clients', 'application_type': 'web'}
0.111 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#poWXZDCsCiLPxp5X"
],
"response_types": [
"code"
],
"token_endpoint_auth_method": "client_secret_post"
}
0.265 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.266 RegistrationResponse {
"client_id": "fa7e3e69-4c47-4bd6-a85e-e631eb5f370e",
"client_secret": "XJHCjQFO4huZ",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "fa7e3e69-4c47-4bd6-a85e-e631eb5f370e",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#poWXZDCsCiLPxp5X"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_post",
"userinfo_signed_response_alg": "none"
}
0.266 phase <--<-- 3 --- AsyncAuthn -->-->
0.267 AuthorizationRequest {
"client_id": "fa7e3e69-4c47-4bd6-a85e-e631eb5f370e",
"nonce": "IEifmKIFyjEpAt2h",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "iQgoWHDARhVIYd3N"
}
0.267 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=fa7e3e69-4c47-4bd6-a85e-e631eb5f370e&state=iQgoWHDARhVIYd3N&response_type=code&nonce=IEifmKIFyjEpAt2h
0.267 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=fa7e3e69-4c47-4bd6-a85e-e631eb5f370e&state=iQgoWHDARhVIYd3N&response_type=code&nonce=IEifmKIFyjEpAt2h
3.303 response Response URL with query part
3.303 response {'state': 'iQgoWHDARhVIYd3N', 'scope': 'openid', 'code': 'aarGe7yRXxpiaMYLFg15pSt1pC5nyb9PcQ_bhzTdBjo.lhA4be3O4jDEPpIi0ZzSm6mWbQuyW2iFL5L-ib1sBkE'}
3.304 response {'state': 'iQgoWHDARhVIYd3N', 'scope': 'openid', 'code': 'aarGe7yRXxpiaMYLFg15pSt1pC5nyb9PcQ_bhzTdBjo.lhA4be3O4jDEPpIi0ZzSm6mWbQuyW2iFL5L-ib1sBkE'}
3.304 AuthorizationResponse {
"code": "aarGe7yRXxpiaMYLFg15pSt1pC5nyb9PcQ_bhzTdBjo.lhA4be3O4jDEPpIi0ZzSm6mWbQuyW2iFL5L-ib1sBkE",
"scope": "openid",
"state": "iQgoWHDARhVIYd3N"
}
3.304 phase <--<-- 4 --- AccessToken -->-->
3.304 --> request op_args: {'state': 'iQgoWHDARhVIYd3N', 'authn_method': 'client_secret_post'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.304 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'iQgoWHDARhVIYd3N', 'code': 'aarGe7yRXxpiaMYLFg15pSt1pC5nyb9PcQ_bhzTdBjo.lhA4be3O4jDEPpIi0ZzSm6mWbQuyW2iFL5L-ib1sBkE', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'fa7e3e69-4c47-4bd6-a85e-e631eb5f370e'}, 'state': 'iQgoWHDARhVIYd3N', 'authn_method': 'client_secret_post'}
3.305 AccessTokenRequest {
"client_id": "fa7e3e69-4c47-4bd6-a85e-e631eb5f370e",
"client_secret": "XJHCjQFO4huZ",
"code": "aarGe7yRXxpiaMYLFg15pSt1pC5nyb9PcQ_bhzTdBjo.lhA4be3O4jDEPpIi0ZzSm6mWbQuyW2iFL5L-ib1sBkE",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "iQgoWHDARhVIYd3N"
}
3.305 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.305 request_http_args {'headers': {'Content-Type': 'application/x-www-form-urlencoded'}}
3.305 request code=aarGe7yRXxpiaMYLFg15pSt1pC5nyb9PcQ_bhzTdBjo.lhA4be3O4jDEPpIi0ZzSm6mWbQuyW2iFL5L-ib1sBkE&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=fa7e3e69-4c47-4bd6-a85e-e631eb5f370e&grant_type=authorization_code&state=iQgoWHDARhVIYd3N&client_secret=XJHCjQFO4huZ
3.516 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.517 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZmE3ZTNlNjktNGM0Ny00YmQ2LWE4NWUtZTYzMWViNWYzNzBlIl0sImF1dGhfdGltZSI6MTUyOTc1MDU5MiwiZXhwIjoxNTI5NzU0Mjg2LCJpYXQiOjE1Mjk3NTA2ODcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImIyM2E2YTNkLWNlZWItNDhlOS1hZTQ5LWI1OTkyMjc4MDJiMiIsIm5vbmNlIjoiSUVpZm1LSUZ5akVwQXQyaCIsInJhdCI6MTUyOTc1MDY4NCwic3ViIjoiZm9vQGJhci5jb20ifQ.kjOYWeGnPnvxLIY9-9C5zz6efn7eojl0FSfXF7lNVN4cmnC1fxd48bFmLSnQcpPVm0W-YVc7tBv2K3_mUn1zU-yhzpwgSgMAIjPZPdt8YN2bq6IeRclN0sowEJg4jycxpJoph-dlgfc8CwoRbpnKxJ7uwFySg6BidVtrsPpV-MiH9nzvq4jA5K-kAAnWXPQzvIkQsihHKphXuZnLMZ5bWyQUZEVgY1YrFoUYFxD0-3Hr-dx6-Zc0QsTiWPLXknqkJoS9Jxj7SmamMUydC89VRKM4V2_R8ggy1P70IxrrVIIBR64uis0Tw-tcwQxvSHLxE9fkix4wiV5ZR2JAbsLYnI3GcQ5a4dhutfeG_Bh_gZGU57oevpK-UJ6EjeznoKYd22NDA4uuG6DZ4kmIlhMuVyYLP6398uSJ9Yr0hSucL990CVQVuROQIC6rexonpVjCIRjghLoAN_t9VMD1Xolhj9DC9Fg_qw1C70Mt3dzQdpdHHzFbQOON1EQWzY9E1MEjXaHBrwNhPXvSqxvprbU-3ffzbFwR-xYh8zH7GmtjiAC45SQBszfjD2aiSuEm65JYHLuJ1vH21q9MFvq3VAEVZoapmE0wRykpifi29ycdhltnSxZodtLxN4K19pQh6YKa9jsAizaz_4gMnH17MQHrw1aPXuyNU4dUyTINXeOiHXs', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'RR093LmuXffnh3U_kyzJ7VH8bsLqsMPTzUENPj6fJ1A.GARSHaWDXwLTzlWsqJsgezglRIKJz0LSl9nL8LXYiH0', 'scope': 'openid'}
3.63 AccessTokenResponse {
"access_token": "RR093LmuXffnh3U_kyzJ7VH8bsLqsMPTzUENPj6fJ1A.GARSHaWDXwLTzlWsqJsgezglRIKJz0LSl9nL8LXYiH0",
"expires_in": 3599,
"id_token": {
"aud": [
"fa7e3e69-4c47-4bd6-a85e-e631eb5f370e"
],
"auth_time": 1529750592,
"exp": 1529754286,
"iat": 1529750687,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "b23a6a3d-ceeb-48e9-ae49-b599227802b2",
"nonce": "IEifmKIFyjEpAt2h",
"rat": 1529750684,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.63 phase <--<-- 5 --- Done -->-->
3.63 end
3.631 assertion VerifyResponse
3.631 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.631 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-Discovery-claims_supported.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Discovery-claims_supported
Test description: Verify that claims_supported is published
Timestamp: 2018-06-23T10:43:24Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.116 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.117 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.118 phase <--<-- 2 --- Done -->-->
0.118 end
0.118 assertion CheckHTTPResponse
0.118 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.118 assertion CheckHasClaimsSupported
0.118 condition providerinfo-has-claims_supported: status=OK [Check that the claims_supported discovery metadata value is in the provider_info]
0.118 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
providerinfo-has-claims_supported: status=OK [Check that the claims_supported discovery metadata value is in the provider_info]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-Discovery-Config.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Discovery-Config
Test description: Publishes openid-configuration discovery information
Timestamp: 2018-06-23T10:43:21Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.106 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.107 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.107 phase <--<-- 2 --- Done -->-->
0.107 end
0.108 assertion CheckHTTPResponse
0.108 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.108 assertion VerifyIdTokenSigningAlgorithmIsSupported
0.108 condition verify-id_token_signing-algorithm-is-supported: status=OK [Verify that required algorithms in id_token_signing_alg_values_supported]
0.108 assertion VerifyHTTPSUsage
0.108 condition verify-https-usage: status=OK [Verify that specific endpoints uses https]
0.109 assertion VerifyOPEndpointsUseHTTPS
0.109 condition verify-op-endpoints-use-https: status=OK [Verify that all OP endpoints uses https]
0.109 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-id_token_signing-algorithm-is-supported: status=OK [Verify that required algorithms in id_token_signing_alg_values_supported]
verify-https-usage: status=OK [Verify that specific endpoints uses https]
verify-op-endpoints-use-https: status=OK [Verify that all OP endpoints uses https]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-Discovery-JWKs.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Discovery-JWKs
Test description: Keys in OP JWKs well formed
Timestamp: 2018-06-23T10:43:23Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.108 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.11 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.11 phase <--<-- 2 --- Done -->-->
0.11 end
0.11 assertion CheckHTTPResponse
0.11 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.111 assertion VerifyBase64URL
0.212 http response url:https://oidc-certification.ory.sh:8443/.well-known/jwks.json status_code:200
0.213 condition verify-base64url: status=OK [Verifies that the base64 encoded parts of a JWK is in fact base64url encoded and not just base64 encoded]
0.213 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-base64url: status=OK [Verifies that the base64 encoded parts of a JWK is in fact base64url encoded and not just base64 encoded]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-Discovery-jwks_uri.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Discovery-jwks_uri
Test description: Verify that jwks_uri is published
Timestamp: 2018-06-23T10:43:25Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.105 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.107 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.107 phase <--<-- 2 --- Done -->-->
0.107 end
0.107 assertion CheckHTTPResponse
0.108 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.108 assertion BareKeys
0.173 http response url:https://oidc-certification.ory.sh:8443/.well-known/jwks.json status_code:200
0.174 jwks {'keys': [{'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': '0vvbIEitFVzY4o12elAZbZvpja5xTm5AOh9wi2UEiPEL6aKxAUn1ywpUaLyWKuEXdeuykHyybniLaThik7Gf-6xKk6S9IK9tjbbwfRqHVkn_Xkyul0ohFI3iTcjvFq5FPGr5vEhSB6eckdngUpzb-7S_Kt8yunkdhYTmkuAr2AXSbQcmCbOJXOsvkc5LOwpjmFIWrtBAHwILJ5cHjzIHtkK2QKMJRlknD8b4kmQ3x6vfxA7mtXREUXdQFn7ssnOVPzriPQp4kIi_TMczSmRLlX1PeeOeDGpTnYywQbsAfdBGZ20WdZlwP3lRUUJoKv1GpBU51GKm2xhHtyrzOkiRKE8pH_PD05gh1G9qXbFtBOoHMBWEaCxoxyJcW8_9iLXBPoC-Jhm47VO5T9hPlaISzDY6EUmgYktejS_mx_bR7emBcbtFUccYSVVqT3EZqAFuQlsPsvj8AT9NmEiVncB2Cy4z7ofLX_Wai_VFPCf7AEfmDZ8mzFZQfVGct74Q9KybwXm8YDq0TSszQGuqT0gtvU9In7CPSOytrVDbdk8Peyeg-Wn_ACMRh5T23wUbQ0jy0Wi9kBwIzN-dUpKu3uL6EZ3PmPSZItQHeAxpQbRZJ1vrrd2y-b6EGun3G9rlnOZ3L4_L4-NOKLt4VGPie7sphlND1pc4ZipaXBjZ9uC3bS8', 'alg': 'RS256', 'kid': 'public:490968e8-c6e5-441e-b42e-5053d6c67af2'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': '0WN9e_V2wEp33JZoN7zQ9J4E4Iz0l-dlx6GqIKdepcMjON3PKZHWFML1e0ZKAkuG2ZJRKoX1LaSNZT0NI9N6_wVAT9aNv53sHBJVC4Bww1zKHEvQseGwJbG0lZZHjDXaxCBPte9yQnquIRRp9Ab-uBeziRoaFQ02OV3LBMBSZ79AzFvZ4yTqpUS_xp-Ylfcmh5wXEppd6hoxs9h1tttPTPbnMLte3S_zxCZI4TQi8d1yBi39OvfZxtABQQbgqYPxiYehNdYbfmZ2CAmVlsTxByS3X-ANBe2nmLsOLgXTyVFZfvEZkzY7OgEwwq5zog5pScXJ-TGlj0guZd8nClHEV-GHvXonjb2hZB63dFEiUVMNh5cOblZX034GnlOkzYfAH8UZ_cvOqONHbvplzONuaYSSRMPRaZwj-0fpElhFNHwr1v1pqbE1i9XOxU_c-eSMr4XAm1VsWG3zJKymjoJmaDcW3AEawi3btL1N2tE3p27cHtcdFjcv5birnxMtPI9Vu806U0_WiGtH_kaWxz64Xk3A_yB-lIBQwXe61JME-K81wLLcHE9qoqpF5iUK4mDqMmI_DVIazUlVUzxY0-1iFkV790V95dBxeYFgXKX02g8NyxfnyzUDC12qUKKejJFbG5LPHaMUXWJIQ2ntwBX_XzeF4pGh0u0vYmfxAmfHWN0', 'alg': 'RS256', 'kid': 'public:a09f73cf-d685-4c5c-9312-60a13e57646f'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': 's_BEnyG0xHYDibtz9a4tE1IW8490BQ_z526Lg2d0PWRtHfcqKmPG0pd0DizPuLY2j1NAY4cCXLwNWMJ3Cp1TqddaMl08hElvNbilcTyQr96RQg9MnrWeR1EqpdXEzTjcx06DFDokvzs89YQVZTDzSh_-xY_m_0VkcFQ0RpDTBn1B0dkMh78dbTJVVSGXYSBgMpcKrGlrgDaPIRX7qp_SdvjNtkPStG_wCPkzd_IJAaTAHGrlyj27dyhOC6EqQjpZRhQvT-w7GalbObncCFox3hRiC8wbI9Toi5p7vEuJJ6yksaqtIwgbtPXXUChNTqwQgIc1RE8RVuhI8ExaT6FfStIVLq9Tow6Hd9mopdX_ydEHHbnbvSC0cCRPg8_G8zTk0ihFpiHE1yEDXBQSs6pZIQ8KZF2RG35j75Jh4ngsDyPbC7PmjE93SG25AkX0WZwoB3g8f6q2r4dZqNtemRX1lMDo0FUQyYcOU5mnOiW3E5oNs3g-VH5ISOiaSUSLX6AIxDfdk6Wj5t7FZUo4EcIwTnE3PI-0HxnLJaErwbYEX0hO1BuhfF7zYHxDjc085U7OyN0abZWbuVUMtIMRgq-4ASlM9fTECg3sMmOfTEJV9nrJZaSCxKvVWma9A01bvBPB6Qn92Gj1XNZ0E1RBLUp1V3iXLcS7MGJh7bAAk5kwKCM', 'alg': 'RS256', 'kid': 'public:8e8dab73-c9fe-42ef-9a7b-1e217abba9a9'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': '3cQ2ihjoElfFVnnkleo6ioUvZrkDfddEKOMCaemXP7umEhr8TC9_L3BKYbJqtE15jvkJiqT1vlHgTOKD5wWCFhFSmEa9PAWlt9Hw6BWddFEsiijR113yvj4eT0qfjseMYyiKst0kBxiTRmQdIzllY2Y2UU1IYIkaAP009nZSR7a5IrPYFydZ6SRARk9kZI90fmgRnzUuQKcv7C9HbkUqs7qiApfA17ACpnuKQP5p5lGL41t5ZnU1-5FvmmO6NnwtRZif34HL6WYuksi2RleLAKoHGh_l6P6ygP5v3ucHH0TmdLVBAHMmlLW4BKdVnWa2HEQCKIBiXJztu8EpYCVpZ_ThCaZLagcUM6VCD4nqvsXzQB7pnsBjq75tbo2jlqrGQJE9ekfGVyw7XDN45IkJFLgfVJ2anpyK4NeIAbkB7ZCYSXbR96_EC6h0uZSMHtPYVNIvbRCK6ysCdlDuDsWiQ01tP-lp90eWj1d7ZYlaYNws12OauBfgLyn0NZvjIz5EYXbOO_Hi0P5U6znS1Um-lU0nB1Gsj685Io-KLzN0shOqkfDP8Xcjfx_3EEg0aEPJWqCjiP9K6veNI896ZrIrH6Sd0V_o4TIzpSJimZlMZrTWS6dUm2j6q1WQOE2Z5JlDMC90yTGUC8MNt2AdMB0Z78Mf71rdSrpXpWLMh7rz_7k', 'alg': 'RS256', 'kid': 'public:6a09d4a3-a298-47bc-8bbd-50b64f653f2d'}]}
0.174 condition bare-keys: status=OK [Dynamic OPs MUST publish their public keys as bare JWK keys]
0.174 assertion CheckHasJwksURI
0.174 condition providerinfo-has-jwks_uri: status=OK [Check that the jwks_uri discovery metadata value is in the provider_info]
0.174 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
bare-keys: status=OK [Dynamic OPs MUST publish their public keys as bare JWK keys]
providerinfo-has-jwks_uri: status=OK [Check that the jwks_uri discovery metadata value is in the provider_info]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-display-page.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-display-page
Test description: Request with display=page
Timestamp: 2018-06-23T10:45:20Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.456 phase <--<-- 1 --- Webfinger -->-->
1.457 not expected to do WebFinger
1.457 phase <--<-- 2 --- Discovery -->-->
1.457 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.528 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.529 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.529 phase <--<-- 3 --- Registration -->-->
1.529 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.53 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#NhW5pddP0Mh7rE7e"
],
"response_types": [
"code"
]
}
1.686 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.687 RegistrationResponse {
"client_id": "040fd742-7fa2-427e-ab4a-6a8e3f980798",
"client_secret": "03igEnNuvrH0",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "040fd742-7fa2-427e-ab4a-6a8e3f980798",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#NhW5pddP0Mh7rE7e"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.687 phase <--<-- 4 --- AsyncAuthn -->-->
1.688 AuthorizationRequest {
"client_id": "040fd742-7fa2-427e-ab4a-6a8e3f980798",
"display": "page",
"nonce": "MgBPdF8IkUj0nXT7",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "upGoYKEtjGzwXaoO"
}
1.688 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=040fd742-7fa2-427e-ab4a-6a8e3f980798&state=upGoYKEtjGzwXaoO&response_type=code&nonce=MgBPdF8IkUj0nXT7&display=page
1.688 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=040fd742-7fa2-427e-ab4a-6a8e3f980798&state=upGoYKEtjGzwXaoO&response_type=code&nonce=MgBPdF8IkUj0nXT7&display=page
4.337 response Response URL with query part
4.338 response {'state': 'upGoYKEtjGzwXaoO', 'scope': 'openid', 'code': 'Tlu_o4Xu-inZWVNF4LUDx__ijfxcEYpkj0MfKiQ0orE.hmFF7awAJvJieYsCApfB9NBn3kGIIKFJ81v9LLF-skg'}
4.339 response {'state': 'upGoYKEtjGzwXaoO', 'scope': 'openid', 'code': 'Tlu_o4Xu-inZWVNF4LUDx__ijfxcEYpkj0MfKiQ0orE.hmFF7awAJvJieYsCApfB9NBn3kGIIKFJ81v9LLF-skg'}
4.339 AuthorizationResponse {
"code": "Tlu_o4Xu-inZWVNF4LUDx__ijfxcEYpkj0MfKiQ0orE.hmFF7awAJvJieYsCApfB9NBn3kGIIKFJ81v9LLF-skg",
"scope": "openid",
"state": "upGoYKEtjGzwXaoO"
}
4.339 phase <--<-- 5 --- Done -->-->
4.339 end
4.34 assertion VerifyResponse
4.34 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.34 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-display-popup.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-display-popup
Test description: Request with display=popup
Timestamp: 2018-06-23T10:45:26Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.129 phase <--<-- 1 --- Webfinger -->-->
1.129 not expected to do WebFinger
1.13 phase <--<-- 2 --- Discovery -->-->
1.13 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.204 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.205 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.205 phase <--<-- 3 --- Registration -->-->
1.206 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.206 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#sFV83q2g4CcNZYgN"
],
"response_types": [
"code"
]
}
1.366 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.367 RegistrationResponse {
"client_id": "fdcfa78e-4dc5-43bf-9646-63083604c42a",
"client_secret": "qiF3s_DWSIcy",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "fdcfa78e-4dc5-43bf-9646-63083604c42a",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#sFV83q2g4CcNZYgN"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.367 phase <--<-- 4 --- AsyncAuthn -->-->
1.368 AuthorizationRequest {
"client_id": "fdcfa78e-4dc5-43bf-9646-63083604c42a",
"display": "popup",
"nonce": "Zh3sLaPYEccBfrmF",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "zoP7AW4A6y52PKyr"
}
1.368 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=fdcfa78e-4dc5-43bf-9646-63083604c42a&state=zoP7AW4A6y52PKyr&response_type=code&nonce=Zh3sLaPYEccBfrmF&display=popup
1.368 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=fdcfa78e-4dc5-43bf-9646-63083604c42a&state=zoP7AW4A6y52PKyr&response_type=code&nonce=Zh3sLaPYEccBfrmF&display=popup
3.83 response Response URL with query part
3.831 response {'state': 'zoP7AW4A6y52PKyr', 'scope': 'openid', 'code': '6EDv7AOo28h3V5KicwJekf0YWZdGFFJjdmeZ1AA2E2A.aogVGCd522_sIjW2ZZbxX6ViZsF6iU5ntEEzvm-t-Co'}
3.831 response {'state': 'zoP7AW4A6y52PKyr', 'scope': 'openid', 'code': '6EDv7AOo28h3V5KicwJekf0YWZdGFFJjdmeZ1AA2E2A.aogVGCd522_sIjW2ZZbxX6ViZsF6iU5ntEEzvm-t-Co'}
3.831 AuthorizationResponse {
"code": "6EDv7AOo28h3V5KicwJekf0YWZdGFFJjdmeZ1AA2E2A.aogVGCd522_sIjW2ZZbxX6ViZsF6iU5ntEEzvm-t-Co",
"scope": "openid",
"state": "zoP7AW4A6y52PKyr"
}
3.831 phase <--<-- 5 --- Done -->-->
3.831 end
3.832 assertion VerifyResponse
3.832 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.832 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-IDToken-C-Signature.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-IDToken-C-Signature
Test description: Does the OP sign the ID Token and with what
Timestamp: 2018-06-23T10:44:19Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.091 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.093 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.093 phase <--<-- 2 --- Registration -->-->
0.093 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.093 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#yRexVseJ5WpRjoBI"
],
"response_types": [
"code"
]
}
0.292 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.292 RegistrationResponse {
"client_id": "6f1490e4-ed74-431c-b0a0-c5d4908c41b8",
"client_secret": "E_EZ9WeOhjsd",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "6f1490e4-ed74-431c-b0a0-c5d4908c41b8",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#yRexVseJ5WpRjoBI"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.293 phase <--<-- 3 --- AsyncAuthn -->-->
0.293 AuthorizationRequest {
"client_id": "6f1490e4-ed74-431c-b0a0-c5d4908c41b8",
"nonce": "WJevRTBFfLpx3kyn",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "DStKMWdQshxkfiQD"
}
0.293 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=6f1490e4-ed74-431c-b0a0-c5d4908c41b8&state=DStKMWdQshxkfiQD&response_type=code&nonce=WJevRTBFfLpx3kyn
0.293 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=6f1490e4-ed74-431c-b0a0-c5d4908c41b8&state=DStKMWdQshxkfiQD&response_type=code&nonce=WJevRTBFfLpx3kyn
2.979 response Response URL with query part
2.979 response {'state': 'DStKMWdQshxkfiQD', 'scope': 'openid', 'code': 'EHhv1enltKedw2R49Sw91bYFOAwpzkzxFF2NKVTpt0k.acsXVo87D0pcqC_6QOvy9ZhCp6e9KNFAVG43RnvaD68'}
2.98 response {'state': 'DStKMWdQshxkfiQD', 'scope': 'openid', 'code': 'EHhv1enltKedw2R49Sw91bYFOAwpzkzxFF2NKVTpt0k.acsXVo87D0pcqC_6QOvy9ZhCp6e9KNFAVG43RnvaD68'}
2.98 AuthorizationResponse {
"code": "EHhv1enltKedw2R49Sw91bYFOAwpzkzxFF2NKVTpt0k.acsXVo87D0pcqC_6QOvy9ZhCp6e9KNFAVG43RnvaD68",
"scope": "openid",
"state": "DStKMWdQshxkfiQD"
}
2.98 phase <--<-- 4 --- AccessToken -->-->
2.98 --> request op_args: {'state': 'DStKMWdQshxkfiQD'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.98 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'DStKMWdQshxkfiQD', 'code': 'EHhv1enltKedw2R49Sw91bYFOAwpzkzxFF2NKVTpt0k.acsXVo87D0pcqC_6QOvy9ZhCp6e9KNFAVG43RnvaD68', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '6f1490e4-ed74-431c-b0a0-c5d4908c41b8'}, 'state': 'DStKMWdQshxkfiQD'}
2.98 AccessTokenRequest {
"code": "EHhv1enltKedw2R49Sw91bYFOAwpzkzxFF2NKVTpt0k.acsXVo87D0pcqC_6QOvy9ZhCp6e9KNFAVG43RnvaD68",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "DStKMWdQshxkfiQD"
}
2.981 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.981 request_http_args {'headers': {'Authorization': 'Basic NmYxNDkwZTQtZWQ3NC00MzFjLWIwYTAtYzVkNDkwOGM0MWI4OkVfRVo5V2VPaGpzZA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.981 request code=EHhv1enltKedw2R49Sw91bYFOAwpzkzxFF2NKVTpt0k.acsXVo87D0pcqC_6QOvy9ZhCp6e9KNFAVG43RnvaD68&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=DStKMWdQshxkfiQD
3.196 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.197 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNmYxNDkwZTQtZWQ3NC00MzFjLWIwYTAtYzVkNDkwOGM0MWI4Il0sImF1dGhfdGltZSI6MTUyOTc1MDU5MiwiZXhwIjoxNTI5NzU0MjU5LCJpYXQiOjE1Mjk3NTA2NTksImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjE1ZTY2Y2U4LWYyYzMtNDUzYy1iY2Y3LTg0Yzg3YTVmNDIxZiIsIm5vbmNlIjoiV0pldlJUQkZmTHB4M2t5biIsInJhdCI6MTUyOTc1MDY1Niwic3ViIjoiZm9vQGJhci5jb20ifQ.wDvxxgpwQUqDFR3CBXJ5IdcW5PMoTjMlT0FjSsgschKN3zCuqmIur4qomJBU7U5NmYrR29tS8g8TxU9WJQpH2OvqKwe1WZaELuFJeSUarwsM9oGdRHt0eY81eRuobESKD2eIByXFqC4mqSD3la6_bUyKBt6HK0gXM1NwDIaVelqHC3I6wS0Z_oVgDhcsevwM4y5m1bdxfsChYfP5lpjWJVbx13ReAuvJKcnnuWc9Jf5gl4aPYXxXGsMsafoEPnI20FmdZreH3OEIyiqiiWjh4TAVTVSKLnLmQYzNeOP1V3iz84-miTPkd4IyrEYkkdE_P-J_uEKhc-ny7VKyJUXOA_UyD2qwgAwIYPQsam-TVzuwrjXITE6zr3-g7fuz7Z10QJHnzpC0-t-Qzo4wotqcKRS4MiOShjvNET1dTXptw4aIiPWYdQyI6XGVM5wb2BDHBnDNSQnIWrQxO4kwMYa6LCrNRRwjfHmlw4072og9yR2vvMRgKd66-kxqXfakefIExyCg5anFo8nS4MaSFGbEEorfs6GBs2lC0D5Oj7PZsX7sspVsoFgRGLkqWx30CJy_dwlAleOMCmrC4jHyt-5Mj06PP3twZhJ6MNf9twJbF8gmWiG-itBw-4DQ2hKosV3zxA0ePGrc8W_ASKfzIrOj_ZRgBnK7TDoCf1MnuvcMWmM', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'mmzhHCal4LULBZbMeac1DUQfKfk7cfrq2c5OE7yT6Ns.Bcx1S4VqOnR4HLMld-9pqPOpcjVU6TyL2RzddWvlUlY', 'scope': 'openid'}
3.273 AccessTokenResponse {
"access_token": "mmzhHCal4LULBZbMeac1DUQfKfk7cfrq2c5OE7yT6Ns.Bcx1S4VqOnR4HLMld-9pqPOpcjVU6TyL2RzddWvlUlY",
"expires_in": 3599,
"id_token": {
"aud": [
"6f1490e4-ed74-431c-b0a0-c5d4908c41b8"
],
"auth_time": 1529750592,
"exp": 1529754259,
"iat": 1529750659,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "15e66ce8-f2c3-453c-bcf7-84c87a5f421f",
"nonce": "WJevRTBFfLpx3kyn",
"rat": 1529750656,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.273 phase <--<-- 5 --- Done -->-->
3.273 end
3.274 assertion VerifyResponse
3.274 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.274 assertion IsIDTokenSigned
3.274 condition is-idtoken-signed: status=OK [Checks if the id_token is signed]
3.274 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
is-idtoken-signed: status=OK [Checks if the id_token is signed]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-IDToken-kid.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-IDToken-kid
Test description: IDToken has kid [Basic, Implicit, Hybrid]
Timestamp: 2018-06-23T10:44:33Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.079 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.08 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.081 phase <--<-- 2 --- Registration -->-->
0.081 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.081 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#7rutQ0b4oNUGNckW"
],
"response_types": [
"code"
]
}
0.248 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.249 RegistrationResponse {
"client_id": "eceec431-1a95-44af-ab84-602c71ff3239",
"client_secret": "~~wLy6mN1M_A",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "eceec431-1a95-44af-ab84-602c71ff3239",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#7rutQ0b4oNUGNckW"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.249 phase <--<-- 3 --- AsyncAuthn -->-->
0.249 AuthorizationRequest {
"client_id": "eceec431-1a95-44af-ab84-602c71ff3239",
"nonce": "jB7FX3wlH6Ju2TV0",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "RTqYTScT57zw7o67"
}
0.249 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=eceec431-1a95-44af-ab84-602c71ff3239&state=RTqYTScT57zw7o67&response_type=code&nonce=jB7FX3wlH6Ju2TV0
0.249 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=eceec431-1a95-44af-ab84-602c71ff3239&state=RTqYTScT57zw7o67&response_type=code&nonce=jB7FX3wlH6Ju2TV0
2.417 response Response URL with query part
2.418 response {'state': 'RTqYTScT57zw7o67', 'scope': 'openid', 'code': 'fsU6T8oJheLs6MYZc5_ZgPIbWxBz71ItggXEliSMQSo.-twObSgCWxbYzoCg4CpLh0oJQWn4umOWUv6_ZDUyCUw'}
2.418 response {'state': 'RTqYTScT57zw7o67', 'scope': 'openid', 'code': 'fsU6T8oJheLs6MYZc5_ZgPIbWxBz71ItggXEliSMQSo.-twObSgCWxbYzoCg4CpLh0oJQWn4umOWUv6_ZDUyCUw'}
2.419 AuthorizationResponse {
"code": "fsU6T8oJheLs6MYZc5_ZgPIbWxBz71ItggXEliSMQSo.-twObSgCWxbYzoCg4CpLh0oJQWn4umOWUv6_ZDUyCUw",
"scope": "openid",
"state": "RTqYTScT57zw7o67"
}
2.419 phase <--<-- 4 --- AccessToken -->-->
2.419 --> request op_args: {'state': 'RTqYTScT57zw7o67'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.419 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'RTqYTScT57zw7o67', 'code': 'fsU6T8oJheLs6MYZc5_ZgPIbWxBz71ItggXEliSMQSo.-twObSgCWxbYzoCg4CpLh0oJQWn4umOWUv6_ZDUyCUw', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'eceec431-1a95-44af-ab84-602c71ff3239'}, 'state': 'RTqYTScT57zw7o67'}
2.419 AccessTokenRequest {
"code": "fsU6T8oJheLs6MYZc5_ZgPIbWxBz71ItggXEliSMQSo.-twObSgCWxbYzoCg4CpLh0oJQWn4umOWUv6_ZDUyCUw",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "RTqYTScT57zw7o67"
}
2.419 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.419 request_http_args {'headers': {'Authorization': 'Basic ZWNlZWM0MzEtMWE5NS00NGFmLWFiODQtNjAyYzcxZmYzMjM5OiU3RSU3RXdMeTZtTjFNX0E=', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.419 request code=fsU6T8oJheLs6MYZc5_ZgPIbWxBz71ItggXEliSMQSo.-twObSgCWxbYzoCg4CpLh0oJQWn4umOWUv6_ZDUyCUw&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=RTqYTScT57zw7o67
2.63 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.632 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZWNlZWM0MzEtMWE5NS00NGFmLWFiODQtNjAyYzcxZmYzMjM5Il0sImF1dGhfdGltZSI6MTUyOTc1MDU5MiwiZXhwIjoxNTI5NzU0MjcyLCJpYXQiOjE1Mjk3NTA2NzIsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImQyYjYzOWU2LTJjNDctNDJkNC04YTg1LTFjZjY2ZGRjOTM0MiIsIm5vbmNlIjoiakI3Rlgzd2xINkp1MlRWMCIsInJhdCI6MTUyOTc1MDY3MCwic3ViIjoiZm9vQGJhci5jb20ifQ.b_UJ5cuRy199i0hfyV9upPWX5T0hDqfSt1C02-M6cMAemOuco3750vYrVJkjIPWqoPDR4FE0GkHJCTthauRXaHt7KL0E9xhEvWo1lAZ6-bytI5DB5WkoPHidPmGgbWBn8vT39punFrRodMp2iou-6LEIonvVMUkCVTcGY9ifo_M1-EszakxLyYMcoF4Bkhz7PkLEsPmSw1mf3fhbNxYvXh3XpH9RMHbM3lsgJUiV2mX7pFszqgNNOY9hXvNDGTKuqqUQyPdwN0PSe9vyl8fiNfkiIwpR-ZW5qmozr1jiGAsgj3N5gf10XZDxLU7KthTXKKYHIJ6RBrx-XCbCr8EVNQfUnTc_uYyBy1nP8HycXEENkuJpwxn4wwPka2hvIbJDYoGmzdNi57MJ7OkfvYagO01gZgsxNsaACDOXVNsFmKTZzoT4Eb6oT7vZu26_85q5cILsh_SvZhPOEqt-fqWJ1x_8i0NOteBKbHG4GIGvJHBrXn5miAa_IRc9397o1_15ovqLdYCwza8sl0k61z_mgVrL1H-y8x5B2JKpeETjvmWdBIYvbGB6OOh1Gx2DZM7Tz4T3FC5Fu4GOuJrt1L_7gT_W1X4WvVXbYex51vGrhepAew-quKdUSA06DwPKzx_Z0rx-iq-_AxmaYx4fHnlVcnmZigJidzuflNlSQYY-Ui0', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'S_MwiGHdaqk7DVgRdqaE35haMvgex1h-35z1bvLXwqQ.zKY1x1PvDDS2GSZF7oao1Uv1Qe8_7CDFTni4IsmCRQw', 'scope': 'openid'}
2.714 AccessTokenResponse {
"access_token": "S_MwiGHdaqk7DVgRdqaE35haMvgex1h-35z1bvLXwqQ.zKY1x1PvDDS2GSZF7oao1Uv1Qe8_7CDFTni4IsmCRQw",
"expires_in": 3599,
"id_token": {
"aud": [
"eceec431-1a95-44af-ab84-602c71ff3239"
],
"auth_time": 1529750592,
"exp": 1529754272,
"iat": 1529750672,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "d2b639e6-2c47-42d4-8a85-1cf66ddc9342",
"nonce": "jB7FX3wlH6Ju2TV0",
"rat": 1529750670,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
2.714 phase <--<-- 5 --- Done -->-->
2.714 end
2.714 assertion VerifySignedIdTokenHasKID
2.714 condition verify-signed-idtoken-has-kid: status=OK [Verifies that the header of a signed IDToken includes a kid claim.]
2.715 assertion VerifyResponse
2.715 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.715 condition Done: status=OK
============================================================
Conditions
verify-signed-idtoken-has-kid: status=OK [Verifies that the header of a signed IDToken includes a kid claim.]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-IDToken-RS256.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-IDToken-RS256
Test description: Asymmetric ID Token signature with RS256
Timestamp: 2018-06-23T10:44:28Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.085 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.087 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.087 phase <--<-- 2 --- Registration -->-->
0.087 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'id_token_signed_response_alg': 'RS256', 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.087 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id_token_signed_response_alg": "RS256",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#4k6amLHIs3k6Ra09"
],
"response_types": [
"code"
]
}
0.242 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.243 RegistrationResponse {
"client_id": "d5949b53-660c-4eeb-a850-068c67a74469",
"client_secret": "bLCYOZl72BiD",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "d5949b53-660c-4eeb-a850-068c67a74469",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#4k6amLHIs3k6Ra09"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.243 phase <--<-- 3 --- AsyncAuthn -->-->
0.244 AuthorizationRequest {
"client_id": "d5949b53-660c-4eeb-a850-068c67a74469",
"nonce": "x4dnXvoHgbsiYnpc",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "FU3IeNJ6iGAFQ9Ec"
}
0.244 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=d5949b53-660c-4eeb-a850-068c67a74469&state=FU3IeNJ6iGAFQ9Ec&response_type=code&nonce=x4dnXvoHgbsiYnpc
0.244 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=d5949b53-660c-4eeb-a850-068c67a74469&state=FU3IeNJ6iGAFQ9Ec&response_type=code&nonce=x4dnXvoHgbsiYnpc
2.244 response Response URL with query part
2.245 response {'state': 'FU3IeNJ6iGAFQ9Ec', 'scope': 'openid', 'code': 'a7BAb3PECCndJJrWeGYVo3dw2z7VfYlmmDEy92jLMds.m2i2WLBlaK11-YcnlTmqcAhNRg22emGLEZ4k84tdXK8'}
2.245 response {'state': 'FU3IeNJ6iGAFQ9Ec', 'scope': 'openid', 'code': 'a7BAb3PECCndJJrWeGYVo3dw2z7VfYlmmDEy92jLMds.m2i2WLBlaK11-YcnlTmqcAhNRg22emGLEZ4k84tdXK8'}
2.245 AuthorizationResponse {
"code": "a7BAb3PECCndJJrWeGYVo3dw2z7VfYlmmDEy92jLMds.m2i2WLBlaK11-YcnlTmqcAhNRg22emGLEZ4k84tdXK8",
"scope": "openid",
"state": "FU3IeNJ6iGAFQ9Ec"
}
2.245 phase <--<-- 4 --- AccessToken -->-->
2.245 --> request op_args: {'state': 'FU3IeNJ6iGAFQ9Ec'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.245 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'FU3IeNJ6iGAFQ9Ec', 'code': 'a7BAb3PECCndJJrWeGYVo3dw2z7VfYlmmDEy92jLMds.m2i2WLBlaK11-YcnlTmqcAhNRg22emGLEZ4k84tdXK8', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'd5949b53-660c-4eeb-a850-068c67a74469'}, 'state': 'FU3IeNJ6iGAFQ9Ec'}
2.246 AccessTokenRequest {
"code": "a7BAb3PECCndJJrWeGYVo3dw2z7VfYlmmDEy92jLMds.m2i2WLBlaK11-YcnlTmqcAhNRg22emGLEZ4k84tdXK8",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "FU3IeNJ6iGAFQ9Ec"
}
2.246 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.246 request_http_args {'headers': {'Authorization': 'Basic ZDU5NDliNTMtNjYwYy00ZWViLWE4NTAtMDY4YzY3YTc0NDY5OmJMQ1lPWmw3MkJpRA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.246 request code=a7BAb3PECCndJJrWeGYVo3dw2z7VfYlmmDEy92jLMds.m2i2WLBlaK11-YcnlTmqcAhNRg22emGLEZ4k84tdXK8&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=FU3IeNJ6iGAFQ9Ec
2.459 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.46 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZDU5NDliNTMtNjYwYy00ZWViLWE4NTAtMDY4YzY3YTc0NDY5Il0sImF1dGhfdGltZSI6MTUyOTc1MDU5MiwiZXhwIjoxNTI5NzU0MjY4LCJpYXQiOjE1Mjk3NTA2NjgsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjJjNzc2MWFjLTU5ZjYtNGE3ZS04Yjk2LWU2ZDZjNjU0ZTIyNiIsIm5vbmNlIjoieDRkblh2b0hnYnNpWW5wYyIsInJhdCI6MTUyOTc1MDY2Niwic3ViIjoiZm9vQGJhci5jb20ifQ.qgz3Bqg1uLvpeBdAr7Yk9wVBtOnQmQVvLQU5jgFavYqL9BPbPN-ALzM6P-1rEWTV8vSES8-Q3Ax2XwRD9F43tNGlZL5n0UApUiRbKDalVlQNoOfzW5c3WZL-Iv3yKmnSPKSqJbucBznSfbQ6ewDTxmOIFhO3hM5DTyyH1Mxu2ETdAEK92xTI6YXrYlHLVhw0eq1wdhsb-VH8yH8te4MPKMuXdIe5bxZn5fZfmY1xCKyyOBXNT8VfDTHCAC8BrFCfsGKhf6FsblqCb1BZtpfKpS1qITgNBGS7FtpfBhc0HoC2UcAvlGSVFsOohrXCag4KUYQrtJrNaDK32uVMlrFetJJ7Ap3saIH8vsHi4P1pFGdel6VBMsvgWopWvnwFGjNlg7kJzh3i8vWo-VG9_4d1-0aVrwmQCQzKbVU3j8UA7ydeSnYePTz2EalALlpR5XGRxC1g9RHiePN5BmRi6I7L1JBslYPhuBIn1zbE9vIfLO8gCcBSSnCY4-nsJId3WwL8QJwcXp57ib0bE7lvGg4xrGemfKiR-xZzUXnEG9yNP4sJ-FlVwz0cHudDBVy8JcOsnf6s10-235penDzUEdX7c65XGz3G6XpCkyxWJaeZlJdy9ciKq1x7UavfvS1BnoHNsiY4d38awE6FlFhip0EE-MGNpfR7-1KesVfijsKWarc', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': '2OyFz89sXpFPwHlBlHcJVMALxh7-HrJCSj2Kqy5DTB4.HdnQTD7UrhmjfFDXegNb7sI2raK0DfGWSRzReAqWnXM', 'scope': 'openid'}
2.544 AccessTokenResponse {
"access_token": "2OyFz89sXpFPwHlBlHcJVMALxh7-HrJCSj2Kqy5DTB4.HdnQTD7UrhmjfFDXegNb7sI2raK0DfGWSRzReAqWnXM",
"expires_in": 3599,
"id_token": {
"aud": [
"d5949b53-660c-4eeb-a850-068c67a74469"
],
"auth_time": 1529750592,
"exp": 1529754268,
"iat": 1529750668,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "2c7761ac-59f6-4a7e-8b96-e6d6c654e226",
"nonce": "x4dnXvoHgbsiYnpc",
"rat": 1529750666,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
2.545 phase <--<-- 5 --- Done -->-->
2.545 end
2.545 assertion VerifyResponse
2.545 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.545 assertion VerifySignedIdToken
2.545 condition verify-idtoken-is-signed: status=OK [Verifies that an ID Token is signed]
2.546 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-idtoken-is-signed: status=OK [Verifies that an ID Token is signed]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-nonce-code.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-nonce-code
Test description: ID Token has nonce when requested for code flow
Timestamp: 2018-06-23T10:45:34Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.094 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.096 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.096 phase <--<-- 2 --- Registration -->-->
0.096 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.096 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#IJ9QgjAlHuEm72cL"
],
"response_types": [
"code"
]
}
0.267 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.268 RegistrationResponse {
"client_id": "0b4c1ae2-a82c-47eb-acf4-afc93ef92df5",
"client_secret": "2ju7LCfhOshL",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "0b4c1ae2-a82c-47eb-acf4-afc93ef92df5",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#IJ9QgjAlHuEm72cL"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.268 phase <--<-- 3 --- AsyncAuthn -->-->
0.269 AuthorizationRequest {
"client_id": "0b4c1ae2-a82c-47eb-acf4-afc93ef92df5",
"nonce": "godmorgon",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "lsd30TvVdAewHHQe"
}
0.269 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=0b4c1ae2-a82c-47eb-acf4-afc93ef92df5&state=lsd30TvVdAewHHQe&response_type=code&nonce=godmorgon
0.269 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=0b4c1ae2-a82c-47eb-acf4-afc93ef92df5&state=lsd30TvVdAewHHQe&response_type=code&nonce=godmorgon
2.331 response Response URL with query part
2.332 response {'state': 'lsd30TvVdAewHHQe', 'scope': 'openid', 'code': 'jran3uGUhC_W3e3X4KnvgxyTbuOo11M5M3-zbFT3y90.2oWqL8iax2O8IwQJ9aRPcL8Wp1gRV4dt8CZAquG-r_E'}
2.332 response {'state': 'lsd30TvVdAewHHQe', 'scope': 'openid', 'code': 'jran3uGUhC_W3e3X4KnvgxyTbuOo11M5M3-zbFT3y90.2oWqL8iax2O8IwQJ9aRPcL8Wp1gRV4dt8CZAquG-r_E'}
2.332 AuthorizationResponse {
"code": "jran3uGUhC_W3e3X4KnvgxyTbuOo11M5M3-zbFT3y90.2oWqL8iax2O8IwQJ9aRPcL8Wp1gRV4dt8CZAquG-r_E",
"scope": "openid",
"state": "lsd30TvVdAewHHQe"
}
2.332 phase <--<-- 4 --- AccessToken -->-->
2.333 --> request op_args: {'state': 'lsd30TvVdAewHHQe'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.333 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'lsd30TvVdAewHHQe', 'code': 'jran3uGUhC_W3e3X4KnvgxyTbuOo11M5M3-zbFT3y90.2oWqL8iax2O8IwQJ9aRPcL8Wp1gRV4dt8CZAquG-r_E', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '0b4c1ae2-a82c-47eb-acf4-afc93ef92df5'}, 'state': 'lsd30TvVdAewHHQe'}
2.333 AccessTokenRequest {
"code": "jran3uGUhC_W3e3X4KnvgxyTbuOo11M5M3-zbFT3y90.2oWqL8iax2O8IwQJ9aRPcL8Wp1gRV4dt8CZAquG-r_E",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "lsd30TvVdAewHHQe"
}
2.333 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.333 request_http_args {'headers': {'Authorization': 'Basic MGI0YzFhZTItYTgyYy00N2ViLWFjZjQtYWZjOTNlZjkyZGY1OjJqdTdMQ2ZoT3NoTA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.333 request code=jran3uGUhC_W3e3X4KnvgxyTbuOo11M5M3-zbFT3y90.2oWqL8iax2O8IwQJ9aRPcL8Wp1gRV4dt8CZAquG-r_E&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=lsd30TvVdAewHHQe
2.548 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.549 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMGI0YzFhZTItYTgyYy00N2ViLWFjZjQtYWZjOTNlZjkyZGY1Il0sImF1dGhfdGltZSI6MTUyOTc1MDU5MiwiZXhwIjoxNTI5NzU0MzM0LCJpYXQiOjE1Mjk3NTA3MzQsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjJhNTBmMWJhLWQwZTgtNDdkNS1hNzEyLWZjY2E0ODllZThmNCIsIm5vbmNlIjoiZ29kbW9yZ29uIiwicmF0IjoxNTI5NzUwNzMyLCJzdWIiOiJmb29AYmFyLmNvbSJ9.VodgNSYDvojKEuxELokWE81dHyQO72hOx1gZTHi2fNWEkundzAnRV8t123uecnfr7JrDsbl68_sOOVsEt43kuh_QHjlljUn_14NHtNcKPhMh3cHgZp0Pw_rkwIYo4R80vwKCSQEqoJqZMXysDMjKrrsbfkRQnieX96anZJ4dUx8OydnkuDxHY60H9QzK6geJqfQgEtEp5nCmpNaUWdXzsEc2rxv7rCA8T_5ArfORZoIj0B3652BWlmtscpl3vlA8tRcGHLIVxmo3ZPqvcoTrqEnMHupch_hhvGqH57Yn6alDMgzgAoemANVY2N_-T934E_nDyXh1o-Y64DxYK_yA4DWDJY_uPYPOJgqsAAnjZa9ySD6MGOMGUmfv_PYdVgcprtxYyeuFXMI9HpRfTSnWTTv6BcMlDjt4meXt-0tEez5ztYiPzsMuzFaDkoktUDPOC8YmFwp_cRgzkH1WkWdknp6ENJci3PuTKysoQ6LoqxN9cFibGAylvGIYGn_Oh2EfnnzXbgJe57FnCQhYmlE3_rlJLwxnC1bqdxswHZqiqAjViXYcLGsJOKoFE2C7MRIfgtEjPg5PVZS7iv_k9OmsgMmd5FSsB_Y0JafDBQ0qKRfitEYE8GdpvEGkBu-2y44Q7ObmUEIDy_UypvVdFDskS2Ncp_GIEpPb3Pm9zYcb3-E', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'Wz0J5Wf7vL8jPp2DyfFFdNvOYyaH-c7M2DEA7BdgB0g.nzMNBbh_zdFLlJtnTF2qxO9m58LN2xCASyZAE20ZsOk', 'scope': 'openid'}
2.626 AccessTokenResponse {
"access_token": "Wz0J5Wf7vL8jPp2DyfFFdNvOYyaH-c7M2DEA7BdgB0g.nzMNBbh_zdFLlJtnTF2qxO9m58LN2xCASyZAE20ZsOk",
"expires_in": 3599,
"id_token": {
"aud": [
"0b4c1ae2-a82c-47eb-acf4-afc93ef92df5"
],
"auth_time": 1529750592,
"exp": 1529754334,
"iat": 1529750734,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "2a50f1ba-d0e8-47d5-a712-fcca489ee8f4",
"nonce": "godmorgon",
"rat": 1529750732,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
2.626 phase <--<-- 5 --- Done -->-->
2.626 end
2.627 assertion VerifyResponse
2.627 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.627 assertion VerifyNonce
2.627 condition verify-nonce: status=OK [Verifies that the nonce received in the IDToken is the same as was given in the Authorization Request]
2.627 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-nonce: status=OK [Verifies that the nonce received in the IDToken is the same as was given in the Authorization Request]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-nonce-NoReq-code.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-nonce-NoReq-code
Test description: Login no nonce, code flow [Basic]
Timestamp: 2018-06-23T10:45:30Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.088 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.089 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.09 phase <--<-- 2 --- Registration -->-->
0.09 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.09 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#u7laEba6aRPu3CO3"
],
"response_types": [
"code"
]
}
0.244 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.245 RegistrationResponse {
"client_id": "eb73d30c-23c0-4438-b38a-3d43aea4fa70",
"client_secret": "GG8q4Nc6i2bv",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "eb73d30c-23c0-4438-b38a-3d43aea4fa70",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#u7laEba6aRPu3CO3"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.245 phase <--<-- 3 --- AsyncAuthn -->-->
0.245 AuthorizationRequest {
"client_id": "eb73d30c-23c0-4438-b38a-3d43aea4fa70",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "3bJSWLUyoOqqIo3I"
}
0.246 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?state=3bJSWLUyoOqqIo3I&scope=openid&response_type=code&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=eb73d30c-23c0-4438-b38a-3d43aea4fa70
0.246 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?state=3bJSWLUyoOqqIo3I&scope=openid&response_type=code&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=eb73d30c-23c0-4438-b38a-3d43aea4fa70
2.421 response Response URL with query part
2.421 response {'state': '3bJSWLUyoOqqIo3I', 'scope': 'openid', 'code': 'kYKzpZfqgngmmLJoGSOiAh3KQ3lQ4queP480yoTgjkE.3Rve3DXCqo7FJ5df78k-hqNSGisBq59xcVajvel1kew'}
2.422 response {'state': '3bJSWLUyoOqqIo3I', 'scope': 'openid', 'code': 'kYKzpZfqgngmmLJoGSOiAh3KQ3lQ4queP480yoTgjkE.3Rve3DXCqo7FJ5df78k-hqNSGisBq59xcVajvel1kew'}
2.422 AuthorizationResponse {
"code": "kYKzpZfqgngmmLJoGSOiAh3KQ3lQ4queP480yoTgjkE.3Rve3DXCqo7FJ5df78k-hqNSGisBq59xcVajvel1kew",
"scope": "openid",
"state": "3bJSWLUyoOqqIo3I"
}
2.422 phase <--<-- 4 --- Done -->-->
2.422 end
2.423 assertion VerifyResponse
2.423 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.423 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-OAuth-2nd-30s.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-OAuth-2nd-30s
Test description: Trying to use authorization code twice with 30 seconds in between uses must result in an error
Timestamp: 2018-06-23T10:50:33Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.19 phase <--<-- 1 --- Webfinger -->-->
1.19 not expected to do WebFinger
1.19 phase <--<-- 2 --- Discovery -->-->
1.19 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.268 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.27 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.27 phase <--<-- 3 --- Registration -->-->
1.27 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.27 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#AD1unRAWJ9cGq4xD"
],
"response_types": [
"code"
]
}
1.421 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.422 RegistrationResponse {
"client_id": "d5eaf406-5e53-4d49-b6ce-468562086167",
"client_secret": "FcmxTs-Z1NFA",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "d5eaf406-5e53-4d49-b6ce-468562086167",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#AD1unRAWJ9cGq4xD"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.422 phase <--<-- 4 --- AsyncAuthn -->-->
1.423 AuthorizationRequest {
"client_id": "d5eaf406-5e53-4d49-b6ce-468562086167",
"nonce": "LAsOKR5TeGHbO7vv",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "1VX5yS0jZvPegC1I"
}
1.423 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=d5eaf406-5e53-4d49-b6ce-468562086167&state=1VX5yS0jZvPegC1I&response_type=code&nonce=LAsOKR5TeGHbO7vv
1.423 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=d5eaf406-5e53-4d49-b6ce-468562086167&state=1VX5yS0jZvPegC1I&response_type=code&nonce=LAsOKR5TeGHbO7vv
4.081 response Response URL with query part
4.082 response {'state': '1VX5yS0jZvPegC1I', 'scope': 'openid', 'code': 'Us1_zRX6pJeUZ34dsaXbnOI2lkybw_ygyVcY1-wXeNk._pUEhdkfAmmmgCqdjM_gMpmXEWVxDJhl8c075Dp_5eY'}
4.082 response {'state': '1VX5yS0jZvPegC1I', 'scope': 'openid', 'code': 'Us1_zRX6pJeUZ34dsaXbnOI2lkybw_ygyVcY1-wXeNk._pUEhdkfAmmmgCqdjM_gMpmXEWVxDJhl8c075Dp_5eY'}
4.082 AuthorizationResponse {
"code": "Us1_zRX6pJeUZ34dsaXbnOI2lkybw_ygyVcY1-wXeNk._pUEhdkfAmmmgCqdjM_gMpmXEWVxDJhl8c075Dp_5eY",
"scope": "openid",
"state": "1VX5yS0jZvPegC1I"
}
4.082 phase <--<-- 5 --- AccessToken -->-->
4.082 --> request op_args: {'state': '1VX5yS0jZvPegC1I'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
4.082 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': '1VX5yS0jZvPegC1I', 'code': 'Us1_zRX6pJeUZ34dsaXbnOI2lkybw_ygyVcY1-wXeNk._pUEhdkfAmmmgCqdjM_gMpmXEWVxDJhl8c075Dp_5eY', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'd5eaf406-5e53-4d49-b6ce-468562086167'}, 'state': '1VX5yS0jZvPegC1I'}
4.083 AccessTokenRequest {
"code": "Us1_zRX6pJeUZ34dsaXbnOI2lkybw_ygyVcY1-wXeNk._pUEhdkfAmmmgCqdjM_gMpmXEWVxDJhl8c075Dp_5eY",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "1VX5yS0jZvPegC1I"
}
4.083 request_url https://oidc-certification.ory.sh:8443/oauth2/token
4.083 request_http_args {'headers': {'Authorization': 'Basic ZDVlYWY0MDYtNWU1My00ZDQ5LWI2Y2UtNDY4NTYyMDg2MTY3OkZjbXhUcy1aMU5GQQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
4.083 request code=Us1_zRX6pJeUZ34dsaXbnOI2lkybw_ygyVcY1-wXeNk._pUEhdkfAmmmgCqdjM_gMpmXEWVxDJhl8c075Dp_5eY&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=1VX5yS0jZvPegC1I
4.305 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
4.306 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZDVlYWY0MDYtNWU1My00ZDQ5LWI2Y2UtNDY4NTYyMDg2MTY3Il0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiZXhwIjoxNTI5NzU0NjAyLCJpYXQiOjE1Mjk3NTEwMDMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6Ijk4YjE3ZGI0LWMzNTQtNGI1ZC1hNjA3LTBlNWE5M2EwMGQ1NSIsIm5vbmNlIjoiTEFzT0tSNVRlR0hiTzd2diIsInJhdCI6MTUyOTc1MTAwMCwic3ViIjoiZm9vQGJhci5jb20ifQ.DFB9uh6WHBpTS8egu2jY3P08VUxiJclmt9UYxJDrIwpqdet5dXdBhgOTzAXEb7dCltiaL11Ld5DhloZrAZA9KYrRgbbqubTJtCVxWl4OmsougleTdiF2lpuAISO4qPb2BP4bo_-4nKx70u5T_QIUKszPxPjRQNaKtWzD1F7PwmHVaQm82_WguZBm8bOY7AEqvyeVsv3g_yaOQ9iKw8soiAzzSA9kXK4en7hPQ4Kv58IuHgCPmrVk90W4nRIM80v8KjSs9IOp_bWnn-t01XCRoOEUqGfJloU8xiYETycZoOyPdaApIB5MFtB9LWJo9jo1mc_NMG3GuoceBMpmErodk6EVUgfV4rginU_hkTnRUzW_nHIUoHiiSH6SRrVvWLpiqq91sTKec5x3fApSg6LHfGqrnSGm_9ctp6ZjlOzhrSkE6AdD2dfTtQAe8IDF40zZgmRdo4epf5NMttYjbSlKIP9LkCWb-wN_mw_5V74B2wGneEo446Oo1xzPW0qClNUd1ySg7bmpsAD8eVEzzSLT6DkUK8CNewjNbIO0CIhwe3acvsumDsg96KTzsghaKM6x91BNoFG0NAt00KS_hfK_tP_Qz-swan3w3LJNS1Yl4Olsd7Vj9ge3nFDE7QFHAKYzQjcboLzJrHykNNW7zyHTe8mVywME9um7mnmnmZ6MrF0', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'TnwfeNNRZwM__UZhjILaV1mHXmEz4wtUINuOIQfZsMs.CGF1XpdUkLPKUUsTvsjM22Ye1FkNlKSFEuaM-a2hagg', 'scope': 'openid'}
4.386 AccessTokenResponse {
"access_token": "TnwfeNNRZwM__UZhjILaV1mHXmEz4wtUINuOIQfZsMs.CGF1XpdUkLPKUUsTvsjM22Ye1FkNlKSFEuaM-a2hagg",
"expires_in": 3599,
"id_token": {
"aud": [
"d5eaf406-5e53-4d49-b6ce-468562086167"
],
"auth_time": 1529750975,
"exp": 1529754602,
"iat": 1529751003,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "98b17db4-c354-4b5d-a607-0e5a93a00d55",
"nonce": "LAsOKR5TeGHbO7vv",
"rat": 1529751000,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
4.386 phase <--<-- 6 --- TimeDelay -->-->
34.414 phase <--<-- 7 --- AccessToken -->-->
34.414 --> request op_args: {'state': '1VX5yS0jZvPegC1I'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
34.414 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': '1VX5yS0jZvPegC1I', 'code': 'Us1_zRX6pJeUZ34dsaXbnOI2lkybw_ygyVcY1-wXeNk._pUEhdkfAmmmgCqdjM_gMpmXEWVxDJhl8c075Dp_5eY', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'd5eaf406-5e53-4d49-b6ce-468562086167'}, 'state': '1VX5yS0jZvPegC1I'}
34.414 AccessTokenRequest {
"code": "Us1_zRX6pJeUZ34dsaXbnOI2lkybw_ygyVcY1-wXeNk._pUEhdkfAmmmgCqdjM_gMpmXEWVxDJhl8c075Dp_5eY",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "1VX5yS0jZvPegC1I"
}
34.414 request_url https://oidc-certification.ory.sh:8443/oauth2/token
34.414 request_http_args {'headers': {'Authorization': 'Basic ZDVlYWY0MDYtNWU1My00ZDQ5LWI2Y2UtNDY4NTYyMDg2MTY3OkZjbXhUcy1aMU5GQQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
34.414 request code=Us1_zRX6pJeUZ34dsaXbnOI2lkybw_ygyVcY1-wXeNk._pUEhdkfAmmmgCqdjM_gMpmXEWVxDJhl8c075Dp_5eY&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=1VX5yS0jZvPegC1I
34.717 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:400 message:{"error":"invalid_grant","error_description":"The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client","status_code":400,"error_debug":"The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found."}
34.718 response {'error_debug': 'The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found.', 'error_description': 'The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client', 'error': 'invalid_grant', 'status_code': 400}
34.718 event Got expected error
34.718 TokenErrorResponse {
"error": "invalid_grant",
"error_debug": "The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found.",
"error_description": "The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client",
"status_code": 400
}
34.719 phase <--<-- 8 --- Done -->-->
34.719 end
34.719 assertion VerifyResponse
34.719 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
34.719 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-OAuth-2nd-Revokes.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-OAuth-2nd-Revokes
Test description: Trying to use authorization code twice should result in revoking previously issued access tokens
Timestamp: 2018-06-23T10:50:43Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.076 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.077 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.077 phase <--<-- 2 --- Registration -->-->
0.078 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.078 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#XBw87oVdSVU8JxPO"
],
"response_types": [
"code"
]
}
0.242 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.243 RegistrationResponse {
"client_id": "ce8e94bb-b051-4d75-91cb-8f8f99bddb18",
"client_secret": "DdcrL1_M5qmy",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "ce8e94bb-b051-4d75-91cb-8f8f99bddb18",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#XBw87oVdSVU8JxPO"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.243 phase <--<-- 3 --- Note -->-->
1.568 phase <--<-- 4 --- AsyncAuthn -->-->
1.569 AuthorizationRequest {
"client_id": "ce8e94bb-b051-4d75-91cb-8f8f99bddb18",
"nonce": "dqgkYo3H5I69iFX2",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "vo0F5zs0z6N5iLSf"
}
1.569 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=ce8e94bb-b051-4d75-91cb-8f8f99bddb18&state=vo0F5zs0z6N5iLSf&response_type=code&nonce=dqgkYo3H5I69iFX2
1.569 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=ce8e94bb-b051-4d75-91cb-8f8f99bddb18&state=vo0F5zs0z6N5iLSf&response_type=code&nonce=dqgkYo3H5I69iFX2
5.951 response Response URL with query part
5.951 response {'state': 'vo0F5zs0z6N5iLSf', 'scope': 'openid', 'code': 'SOfv2rr_HYydZ5epx3H-S2sUb2cDbL-U3AwOML96bO8.fY-Nw_9SU-VefjGtGzaBxYPqnuWez5BkZJ3Y8xH0XX8'}
5.951 response {'state': 'vo0F5zs0z6N5iLSf', 'scope': 'openid', 'code': 'SOfv2rr_HYydZ5epx3H-S2sUb2cDbL-U3AwOML96bO8.fY-Nw_9SU-VefjGtGzaBxYPqnuWez5BkZJ3Y8xH0XX8'}
5.952 AuthorizationResponse {
"code": "SOfv2rr_HYydZ5epx3H-S2sUb2cDbL-U3AwOML96bO8.fY-Nw_9SU-VefjGtGzaBxYPqnuWez5BkZJ3Y8xH0XX8",
"scope": "openid",
"state": "vo0F5zs0z6N5iLSf"
}
5.952 phase <--<-- 5 --- AccessToken -->-->
5.952 --> request op_args: {'state': 'vo0F5zs0z6N5iLSf'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
5.952 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'vo0F5zs0z6N5iLSf', 'code': 'SOfv2rr_HYydZ5epx3H-S2sUb2cDbL-U3AwOML96bO8.fY-Nw_9SU-VefjGtGzaBxYPqnuWez5BkZJ3Y8xH0XX8', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'ce8e94bb-b051-4d75-91cb-8f8f99bddb18'}, 'state': 'vo0F5zs0z6N5iLSf'}
5.952 AccessTokenRequest {
"code": "SOfv2rr_HYydZ5epx3H-S2sUb2cDbL-U3AwOML96bO8.fY-Nw_9SU-VefjGtGzaBxYPqnuWez5BkZJ3Y8xH0XX8",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "vo0F5zs0z6N5iLSf"
}
5.952 request_url https://oidc-certification.ory.sh:8443/oauth2/token
5.952 request_http_args {'headers': {'Authorization': 'Basic Y2U4ZTk0YmItYjA1MS00ZDc1LTkxY2ItOGY4Zjk5YmRkYjE4OkRkY3JMMV9NNXFteQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
5.952 request code=SOfv2rr_HYydZ5epx3H-S2sUb2cDbL-U3AwOML96bO8.fY-Nw_9SU-VefjGtGzaBxYPqnuWez5BkZJ3Y8xH0XX8&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=vo0F5zs0z6N5iLSf
6.232 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
6.233 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiY2U4ZTk0YmItYjA1MS00ZDc1LTkxY2ItOGY4Zjk5YmRkYjE4Il0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiZXhwIjoxNTI5NzU0NjQyLCJpYXQiOjE1Mjk3NTEwNDMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImZmOGIxYmM4LTk3MDItNDBjZS1iZjQxLTZjMTc3MzgzN2E3ZCIsIm5vbmNlIjoiZHFna1lvM0g1STY5aUZYMiIsInJhdCI6MTUyOTc1MTAzOCwic3ViIjoiZm9vQGJhci5jb20ifQ.bJG06MkuiZQS_XjpyWJP_U8gHU0rHzKscC6dM3UaBtoO7nPchcCa05VAMQRyetTn7VU98lEOT0UXo5rDyxQmVWFpy_4vL-hwdaReVHAiTv0YmsJIP4L0WFE4BhW5q_6YnPWJRX3zls7h6dbCvjxho-oRa5-d1fUM55JqsXn66JE14p7jdY2BmUXEr1ribfMc4HYcHtMYkCV9IHw89nHUneq4nq-IdQyciQVbodkIxGQ5s6jj2YO0udJhgZfwT3yix45YA1YRFmjRGfvpfAD2Pkgvu08mD1NkddVJLphkGejGnpr_hIKvyAHPq2FAjjICLplV5mIjzqi47jsaZxSUNOb5wtnJh50I3sqlkBVY1uHBgVTcbkX0Ss2JLeJsbLpUxV3j5k_SRb2-J5i1iWz8V74A6e8aMEJWc7ewM_nQjzzpRmXFl1sR_GKuGboUXGzJugkzRg6o2K_YfQGG-k7LD108U4WyVA4vTl7-IfxknUL9iOwOoF9S__bigypffx80gtf_PpqHtS6BHKangw7ZFgC3JB-ykhgZ3eVr0zHg_hk-E-LBPw_YlLwSEFquP9GgiM3UFwc53U28j394VgydOmce5dvxJoAego19T7uUtXTcrqGp_oFDAGqfDhfyhREK7fMJ5uiprpFLlSFDyAE5NeAdUw-8ST1XnPdpofJCQj0', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'L6jTyeUSvhHNK1xLNf3BNrdQ9ksIj3aKAu4yOhuN8A0.URku-iZj4qSi7X5SpIBeOpF1_ejXxm2OmGeJg82E4d0', 'scope': 'openid'}
6.349 AccessTokenResponse {
"access_token": "L6jTyeUSvhHNK1xLNf3BNrdQ9ksIj3aKAu4yOhuN8A0.URku-iZj4qSi7X5SpIBeOpF1_ejXxm2OmGeJg82E4d0",
"expires_in": 3599,
"id_token": {
"aud": [
"ce8e94bb-b051-4d75-91cb-8f8f99bddb18"
],
"auth_time": 1529750975,
"exp": 1529754642,
"iat": 1529751043,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "ff8b1bc8-9702-40ce-bf41-6c1773837a7d",
"nonce": "dqgkYo3H5I69iFX2",
"rat": 1529751038,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
6.35 phase <--<-- 6 --- AccessToken -->-->
6.35 --> request op_args: {'state': 'vo0F5zs0z6N5iLSf'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
6.35 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'vo0F5zs0z6N5iLSf', 'code': 'SOfv2rr_HYydZ5epx3H-S2sUb2cDbL-U3AwOML96bO8.fY-Nw_9SU-VefjGtGzaBxYPqnuWez5BkZJ3Y8xH0XX8', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'ce8e94bb-b051-4d75-91cb-8f8f99bddb18'}, 'state': 'vo0F5zs0z6N5iLSf'}
6.35 AccessTokenRequest {
"code": "SOfv2rr_HYydZ5epx3H-S2sUb2cDbL-U3AwOML96bO8.fY-Nw_9SU-VefjGtGzaBxYPqnuWez5BkZJ3Y8xH0XX8",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "vo0F5zs0z6N5iLSf"
}
6.35 request_url https://oidc-certification.ory.sh:8443/oauth2/token
6.35 request_http_args {'headers': {'Authorization': 'Basic Y2U4ZTk0YmItYjA1MS00ZDc1LTkxY2ItOGY4Zjk5YmRkYjE4OkRkY3JMMV9NNXFteQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
6.35 request code=SOfv2rr_HYydZ5epx3H-S2sUb2cDbL-U3AwOML96bO8.fY-Nw_9SU-VefjGtGzaBxYPqnuWez5BkZJ3Y8xH0XX8&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=vo0F5zs0z6N5iLSf
6.513 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:400 message:{"error":"invalid_grant","error_description":"The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client","status_code":400,"error_debug":"The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found."}
6.513 response {'error_debug': 'The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found.', 'error_description': 'The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client', 'error': 'invalid_grant', 'status_code': 400}
6.513 event Got expected error
6.513 TokenErrorResponse {
"error": "invalid_grant",
"error_debug": "The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found.",
"error_description": "The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client",
"status_code": 400
}
6.514 phase <--<-- 7 --- UserInfo -->-->
6.514 do_user_info_request kwargs:{'state': 'vo0F5zs0z6N5iLSf', 'method': 'GET', 'authn_method': 'bearer_header'}
6.514 request {'body': None}
6.514 request_url https://oidc-certification.ory.sh:8443/userinfo
6.514 request_http_args {'headers': {'Authorization': 'Bearer L6jTyeUSvhHNK1xLNf3BNrdQ9ksIj3aKAu4yOhuN8A0.URku-iZj4qSi7X5SpIBeOpF1_ejXxm2OmGeJg82E4d0'}}
6.622 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:401 message:{"error":"request_unauthorized","error_description":"The request could not be authorized","error_hint":"Check that you provided valid credentials in the right format.","status_code":401,"error_debug":"A validator returned an error"}
6.623 event Expected error not received: got request_unauthorized
6.623 ErrorResponse {
"error": "request_unauthorized",
"error_debug": "A validator returned an error",
"error_description": "The request could not be authorized",
"error_hint": "Check that you provided valid credentials in the right format.",
"status_code": 401
}
6.623 ErrorResponse {
"error": "request_unauthorized",
"error_debug": "A validator returned an error",
"error_description": "The request could not be authorized",
"error_hint": "Check that you provided valid credentials in the right format.",
"status_code": 401
}
6.623 phase <--<-- 8 --- Done -->-->
6.623 end
6.624 assertion VerifyResponse
6.624 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
6.624 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-OAuth-2nd.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-OAuth-2nd
Test description: Trying to use authorization code twice should result in an error
Timestamp: 2018-06-23T10:49:57Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.083 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.085 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.085 phase <--<-- 2 --- Registration -->-->
0.085 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.085 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#FL581Lz6aG6iwVOy"
],
"response_types": [
"code"
]
}
0.242 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.243 RegistrationResponse {
"client_id": "d082c01c-91c4-49df-aa46-33b71608ad1e",
"client_secret": "Ra1Zab_HDS8j",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "d082c01c-91c4-49df-aa46-33b71608ad1e",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#FL581Lz6aG6iwVOy"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.243 phase <--<-- 3 --- Note -->-->
1.421 phase <--<-- 4 --- AsyncAuthn -->-->
1.421 AuthorizationRequest {
"client_id": "d082c01c-91c4-49df-aa46-33b71608ad1e",
"nonce": "yEeKuZL8WoGk8s9H",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "fUctXcDznly6yE0o"
}
1.421 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=d082c01c-91c4-49df-aa46-33b71608ad1e&state=fUctXcDznly6yE0o&response_type=code&nonce=yEeKuZL8WoGk8s9H
1.421 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=d082c01c-91c4-49df-aa46-33b71608ad1e&state=fUctXcDznly6yE0o&response_type=code&nonce=yEeKuZL8WoGk8s9H
4.004 response Response URL with query part
4.005 response {'state': 'fUctXcDznly6yE0o', 'scope': 'openid', 'code': 'oen54vVB1bj-8vrWP3SR1k1hYRrWOr02M-3OtG4b6LQ.quyUhmTNeYRXtwZTLuTG8eZr3saYIjbKVM0HhCKH3f8'}
4.005 response {'state': 'fUctXcDznly6yE0o', 'scope': 'openid', 'code': 'oen54vVB1bj-8vrWP3SR1k1hYRrWOr02M-3OtG4b6LQ.quyUhmTNeYRXtwZTLuTG8eZr3saYIjbKVM0HhCKH3f8'}
4.005 AuthorizationResponse {
"code": "oen54vVB1bj-8vrWP3SR1k1hYRrWOr02M-3OtG4b6LQ.quyUhmTNeYRXtwZTLuTG8eZr3saYIjbKVM0HhCKH3f8",
"scope": "openid",
"state": "fUctXcDznly6yE0o"
}
4.005 phase <--<-- 5 --- AccessToken -->-->
4.006 --> request op_args: {'state': 'fUctXcDznly6yE0o'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
4.006 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'fUctXcDznly6yE0o', 'code': 'oen54vVB1bj-8vrWP3SR1k1hYRrWOr02M-3OtG4b6LQ.quyUhmTNeYRXtwZTLuTG8eZr3saYIjbKVM0HhCKH3f8', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'd082c01c-91c4-49df-aa46-33b71608ad1e'}, 'state': 'fUctXcDznly6yE0o'}
4.006 AccessTokenRequest {
"code": "oen54vVB1bj-8vrWP3SR1k1hYRrWOr02M-3OtG4b6LQ.quyUhmTNeYRXtwZTLuTG8eZr3saYIjbKVM0HhCKH3f8",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "fUctXcDznly6yE0o"
}
4.006 request_url https://oidc-certification.ory.sh:8443/oauth2/token
4.006 request_http_args {'headers': {'Authorization': 'Basic ZDA4MmMwMWMtOTFjNC00OWRmLWFhNDYtMzNiNzE2MDhhZDFlOlJhMVphYl9IRFM4ag==', 'Content-Type': 'application/x-www-form-urlencoded'}}
4.006 request code=oen54vVB1bj-8vrWP3SR1k1hYRrWOr02M-3OtG4b6LQ.quyUhmTNeYRXtwZTLuTG8eZr3saYIjbKVM0HhCKH3f8&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=fUctXcDznly6yE0o
4.217 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
4.218 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZDA4MmMwMWMtOTFjNC00OWRmLWFhNDYtMzNiNzE2MDhhZDFlIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiZXhwIjoxNTI5NzU0NTk2LCJpYXQiOjE1Mjk3NTA5OTcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjIyNTkxNDMyLThhZjQtNGQzMy05ZTc3LTA0ZTg5ZjIxZjg3OSIsIm5vbmNlIjoieUVlS3VaTDhXb0drOHM5SCIsInJhdCI6MTUyOTc1MDk5NCwic3ViIjoiZm9vQGJhci5jb20ifQ.zYM76KEEBI9ExJlVNFalJrXgliJ0JIhNSJhHENueOFx4sT4jL2xnKrUGh5XyMeDZLM9QdkSgLpg3KyzcB7UsNigw5A_76E80rHDSJLmE80nJJ96_ljLm0Jgf0Wh8uJusdBDQDipTEKAlO_Yq7Zi3IlPY6tZ2bJwM4L5HYZV7aEjTOnJgoXeUqxSmj4JKLkdpQb-n1TvHH3lj-epCLwlEwRjzvTo5o-Tnsr9_RYr2RCVjplRtFKCs2VTPY5yOsY4KdEn5r_N_aPpJQuTtShOjkNFXovxbQIq-hB3VtEWFA5kJ-Q0_SeF--uA_pLr4KmikbfNQwp_TE1_6ultiPZLiLAOOxvRQobM2Bybfkb2Uk7cQKPVfn6669BJJSLXhxP7KZfhD578TU2e0uZdxrMhwgStP1FvwWR63McFNxWFn1cKsRUplV6N8qZmGGiFtwTZUNmRsS04oSQxGSjbAXbg-Tcs5aBfBcgemBf5OjjP4tf9PKRRwwz5tLIkUuXUHENGfRskczsBF2UEGkI6J4-imHNu3KEyU83FarDidHQpom929bfq6vptrrvrulaR9zRkpzOsaZIWIlOU-p1Z3SYT7ZpDgHqIeVkrLwsoairipKHfXxLQkflVlK2OTUT3hyqmujm6QHkkbCAeenV5YSwtAcIVtRxoaxAVVn-IuwwKx0QY', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'jKnTPzMdvcxFXMJNUr2lsP_bAOO0F3RRIftv-RZetK8.JINGTI8dGGa1s2uAvA_a1rZxUXZmZYJJbvvqh6iFSIc', 'scope': 'openid'}
4.306 AccessTokenResponse {
"access_token": "jKnTPzMdvcxFXMJNUr2lsP_bAOO0F3RRIftv-RZetK8.JINGTI8dGGa1s2uAvA_a1rZxUXZmZYJJbvvqh6iFSIc",
"expires_in": 3599,
"id_token": {
"aud": [
"d082c01c-91c4-49df-aa46-33b71608ad1e"
],
"auth_time": 1529750975,
"exp": 1529754596,
"iat": 1529750997,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "22591432-8af4-4d33-9e77-04e89f21f879",
"nonce": "yEeKuZL8WoGk8s9H",
"rat": 1529750994,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
4.306 phase <--<-- 6 --- AccessToken -->-->
4.306 --> request op_args: {'state': 'fUctXcDznly6yE0o'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
4.306 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'fUctXcDznly6yE0o', 'code': 'oen54vVB1bj-8vrWP3SR1k1hYRrWOr02M-3OtG4b6LQ.quyUhmTNeYRXtwZTLuTG8eZr3saYIjbKVM0HhCKH3f8', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'd082c01c-91c4-49df-aa46-33b71608ad1e'}, 'state': 'fUctXcDznly6yE0o'}
4.307 AccessTokenRequest {
"code": "oen54vVB1bj-8vrWP3SR1k1hYRrWOr02M-3OtG4b6LQ.quyUhmTNeYRXtwZTLuTG8eZr3saYIjbKVM0HhCKH3f8",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "fUctXcDznly6yE0o"
}
4.307 request_url https://oidc-certification.ory.sh:8443/oauth2/token
4.307 request_http_args {'headers': {'Authorization': 'Basic ZDA4MmMwMWMtOTFjNC00OWRmLWFhNDYtMzNiNzE2MDhhZDFlOlJhMVphYl9IRFM4ag==', 'Content-Type': 'application/x-www-form-urlencoded'}}
4.307 request code=oen54vVB1bj-8vrWP3SR1k1hYRrWOr02M-3OtG4b6LQ.quyUhmTNeYRXtwZTLuTG8eZr3saYIjbKVM0HhCKH3f8&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=fUctXcDznly6yE0o
4.467 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:400 message:{"error":"invalid_grant","error_description":"The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client","status_code":400,"error_debug":"The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found."}
4.467 response {'error_debug': 'The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found.', 'error_description': 'The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client', 'error': 'invalid_grant', 'status_code': 400}
4.467 event Got expected error
4.468 TokenErrorResponse {
"error": "invalid_grant",
"error_debug": "The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found.",
"error_description": "The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client",
"status_code": 400
}
4.468 phase <--<-- 7 --- Done -->-->
4.468 end
4.468 assertion VerifyResponse
4.468 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.468 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-prompt-login.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-prompt-login
Test description: Request with prompt=login
Timestamp: 2018-06-23T10:45:45Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Registration -->-->
0.075 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.076 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#hXWMLsxMEZ7z6KnS"
],
"response_types": [
"code"
]
}
0.244 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.245 RegistrationResponse {
"client_id": "e6e5d6ab-950a-4534-801e-e12781fb9516",
"client_secret": "a-IJPhIH5ClD",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "e6e5d6ab-950a-4534-801e-e12781fb9516",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#hXWMLsxMEZ7z6KnS"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.245 phase <--<-- 3 --- AsyncAuthn -->-->
0.245 AuthorizationRequest {
"client_id": "e6e5d6ab-950a-4534-801e-e12781fb9516",
"nonce": "ghtrPbyPuirnuLbo",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "bYXnjDF4uAczmtnQ"
}
0.246 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=e6e5d6ab-950a-4534-801e-e12781fb9516&state=bYXnjDF4uAczmtnQ&response_type=code&nonce=ghtrPbyPuirnuLbo
0.246 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=e6e5d6ab-950a-4534-801e-e12781fb9516&state=bYXnjDF4uAczmtnQ&response_type=code&nonce=ghtrPbyPuirnuLbo
2.91 response Response URL with query part
2.91 response {'state': 'bYXnjDF4uAczmtnQ', 'scope': 'openid', 'code': 'q8ylankd9P7W1MyAI5s41uXmidsODni7nWkmYStOZgQ.bmtXi4y15cNeY8CkLdIYs76hQ32JTE3V4xC9alWvpEg'}
2.91 response {'state': 'bYXnjDF4uAczmtnQ', 'scope': 'openid', 'code': 'q8ylankd9P7W1MyAI5s41uXmidsODni7nWkmYStOZgQ.bmtXi4y15cNeY8CkLdIYs76hQ32JTE3V4xC9alWvpEg'}
2.911 AuthorizationResponse {
"code": "q8ylankd9P7W1MyAI5s41uXmidsODni7nWkmYStOZgQ.bmtXi4y15cNeY8CkLdIYs76hQ32JTE3V4xC9alWvpEg",
"scope": "openid",
"state": "bYXnjDF4uAczmtnQ"
}
2.911 phase <--<-- 4 --- AccessToken -->-->
2.911 --> request op_args: {'state': 'bYXnjDF4uAczmtnQ'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.911 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'bYXnjDF4uAczmtnQ', 'code': 'q8ylankd9P7W1MyAI5s41uXmidsODni7nWkmYStOZgQ.bmtXi4y15cNeY8CkLdIYs76hQ32JTE3V4xC9alWvpEg', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'e6e5d6ab-950a-4534-801e-e12781fb9516'}, 'state': 'bYXnjDF4uAczmtnQ'}
2.911 AccessTokenRequest {
"code": "q8ylankd9P7W1MyAI5s41uXmidsODni7nWkmYStOZgQ.bmtXi4y15cNeY8CkLdIYs76hQ32JTE3V4xC9alWvpEg",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "bYXnjDF4uAczmtnQ"
}
2.912 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.912 request_http_args {'headers': {'Authorization': 'Basic ZTZlNWQ2YWItOTUwYS00NTM0LTgwMWUtZTEyNzgxZmI5NTE2OmEtSUpQaElINUNsRA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.912 request code=q8ylankd9P7W1MyAI5s41uXmidsODni7nWkmYStOZgQ.bmtXi4y15cNeY8CkLdIYs76hQ32JTE3V4xC9alWvpEg&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=bYXnjDF4uAczmtnQ
3.126 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.127 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZTZlNWQ2YWItOTUwYS00NTM0LTgwMWUtZTEyNzgxZmI5NTE2Il0sImF1dGhfdGltZSI6MTUyOTc1MDU5MiwiZXhwIjoxNTI5NzU0MzQwLCJpYXQiOjE1Mjk3NTA3NDAsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImFhYmZhZTA1LWQzN2UtNDM0Ni05ODRhLTAwNGU1YWVlNDExMCIsIm5vbmNlIjoiZ2h0clBieVB1aXJudUxibyIsInJhdCI6MTUyOTc1MDczNywic3ViIjoiZm9vQGJhci5jb20ifQ.b3LDZ0CizWz1lIoJ1Wt6nGQGsImQCGHjj0XpeeBJPY5JYHQwOoH_Ifc8bHPzMHmc7KhZ9sdln5OHHfgXpCThmqTLUb1kdakJ2AFJeV7iu5hbBbJ8eX_1OmIBZGWe5UoxK0sQBAbxXxMecXtVQuVumHxJFjh22pXHpxSQwY6BDkvhxrFc_dz0rUlSr4SGeStZqp_97rAY1PFYvrZfdAD2uncDrk8ps7zw_Ew3jcRn3t077iut_PTu5sAK3u_FHJIpHqmjFJ0fNo2ix5ona4D8xppz5OwgvMO5U30zzHszFsxhlkZZw1xyZDngbdJLmPAkGSPYWdx9b6CKWLz2Fvjy2XvoGZtlMnxhWMAzoQ60eok78XdmsdQ_P8xWjL9OOlMyUzciqrWN4PWkxH94Qkn-JEu6rL0v8C2hyCuzvx_Ej0qz3vvUBCScQulTHcbd2oyWM9HMeC3yXUSGLSw3Ov6xGeuR4Vf_FNpepE-yq0ImxGqYFZK1fB5JJ83OVk9fVKlHgnvuaZwNLxXXjIo4H1soKpKgBAuTsr7vinmI8BDuOxCYjHke-RalnApSmytvSF7_d4yWxHzGbpMKplm5UOuyiYzaeFE07stIG0TK9LyOyPopl7ABYRzsgVIlqa9-i_znjHmkj82OqMes4xwVKqWa1q5sSOSW89eTGYVcQAy9ql0', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'uIjyvWq2Qco8ALae-1XmNw2tX0eA_ie6K3TvBM-7B2g.IslXBdiw-P2LUodKwxAveu4gskoq4-1PqBJxLHWgPB0', 'scope': 'openid'}
3.204 AccessTokenResponse {
"access_token": "uIjyvWq2Qco8ALae-1XmNw2tX0eA_ie6K3TvBM-7B2g.IslXBdiw-P2LUodKwxAveu4gskoq4-1PqBJxLHWgPB0",
"expires_in": 3599,
"id_token": {
"aud": [
"e6e5d6ab-950a-4534-801e-e12781fb9516"
],
"auth_time": 1529750592,
"exp": 1529754340,
"iat": 1529750740,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "aabfae05-d37e-4346-984a-004e5aee4110",
"nonce": "ghtrPbyPuirnuLbo",
"rat": 1529750737,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.204 phase <--<-- 5 --- Note -->-->
4.551 phase <--<-- 6 --- AsyncAuthn -->-->
4.551 AuthorizationRequest {
"client_id": "e6e5d6ab-950a-4534-801e-e12781fb9516",
"nonce": "WLnmIFq8SN7COL2r",
"prompt": [
"login"
],
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "qRoPEHDE9rwcYJA2"
}
4.551 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=login&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=e6e5d6ab-950a-4534-801e-e12781fb9516&state=qRoPEHDE9rwcYJA2&response_type=code&nonce=WLnmIFq8SN7COL2r
4.551 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=login&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=e6e5d6ab-950a-4534-801e-e12781fb9516&state=qRoPEHDE9rwcYJA2&response_type=code&nonce=WLnmIFq8SN7COL2r
7.782 response Response URL with query part
7.782 response {'state': 'qRoPEHDE9rwcYJA2', 'scope': 'openid', 'code': 'U7xfLQrCoHL6vtnH8BqOJ57aJkT8IDK8WvoETbhNdp8.FajaFGq-Q6z0tddojqtBrqVs5rDDXkDrTPjw5NodwLM'}
7.782 response {'state': 'qRoPEHDE9rwcYJA2', 'scope': 'openid', 'code': 'U7xfLQrCoHL6vtnH8BqOJ57aJkT8IDK8WvoETbhNdp8.FajaFGq-Q6z0tddojqtBrqVs5rDDXkDrTPjw5NodwLM'}
7.783 AuthorizationResponse {
"code": "U7xfLQrCoHL6vtnH8BqOJ57aJkT8IDK8WvoETbhNdp8.FajaFGq-Q6z0tddojqtBrqVs5rDDXkDrTPjw5NodwLM",
"scope": "openid",
"state": "qRoPEHDE9rwcYJA2"
}
7.783 phase <--<-- 7 --- AccessToken -->-->
7.783 --> request op_args: {'state': 'qRoPEHDE9rwcYJA2'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
7.783 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'qRoPEHDE9rwcYJA2', 'code': 'U7xfLQrCoHL6vtnH8BqOJ57aJkT8IDK8WvoETbhNdp8.FajaFGq-Q6z0tddojqtBrqVs5rDDXkDrTPjw5NodwLM', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'e6e5d6ab-950a-4534-801e-e12781fb9516'}, 'state': 'qRoPEHDE9rwcYJA2'}
7.783 AccessTokenRequest {
"code": "U7xfLQrCoHL6vtnH8BqOJ57aJkT8IDK8WvoETbhNdp8.FajaFGq-Q6z0tddojqtBrqVs5rDDXkDrTPjw5NodwLM",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "qRoPEHDE9rwcYJA2"
}
7.783 request_url https://oidc-certification.ory.sh:8443/oauth2/token
7.783 request_http_args {'headers': {'Authorization': 'Basic ZTZlNWQ2YWItOTUwYS00NTM0LTgwMWUtZTEyNzgxZmI5NTE2OmEtSUpQaElINUNsRA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
7.783 request code=U7xfLQrCoHL6vtnH8BqOJ57aJkT8IDK8WvoETbhNdp8.FajaFGq-Q6z0tddojqtBrqVs5rDDXkDrTPjw5NodwLM&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=qRoPEHDE9rwcYJA2
8.001 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
8.002 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZTZlNWQ2YWItOTUwYS00NTM0LTgwMWUtZTEyNzgxZmI5NTE2Il0sImF1dGhfdGltZSI6MTUyOTc1MDc0NCwiZXhwIjoxNTI5NzU0MzQ1LCJpYXQiOjE1Mjk3NTA3NDUsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImNiZWNhZTAxLTM3ZGItNGQ3OS04MzgzLTA0N2YyY2E2Nzg1MiIsIm5vbmNlIjoiV0xubUlGcThTTjdDT0wyciIsInJhdCI6MTUyOTc1MDc0Miwic3ViIjoiZm9vQGJhci5jb20ifQ.grgWZcVRDvOP2QH-IeBfbFLpLm3-zzNzfb_41pItj40SV8N3V4oV1gl3XURvM4czzzv5wt_8T6ADbD3oBm9lGTFqP3Jt4SvsGzKHrH0O-goNhEhw9kLcY9QIBfJzMdiuZRa6FcDFvTO5Q0dbqsQmTJzWkpNw7d0p5aH45uoIFyzJA-OmmYrjcne1NJrArGUg0J4ikX6UJzsZtaIbc_DcwnSBVv3Rt71bu68aDjlXCvKLE5hBvd0tZMyAzbWucPG2Iy40OtJEx6Xs0VlXg0yUSueaJuNOu8xfWRMUulqRhXpBUdFDOEYw0GTbpwO1HHTNlZDvVXBF6eian75W0B8gFtqv2yQT3eE61Re3DQEWCxs9y8yxwKTkBbcfERAVPJVRZ2oYwtCAGZ8S5tgLh8pqgqy0ms5D0ohMB5RFqKmwQSsXG2qaIy3G6Vq89PRmJZCe63-KYRDuLzvMpXLfcXIJlr___jNz9FgoRk56cCjQe3-dQoKXGq0IyI-hXvDomCXHGsDhNDsTSxYZHbypL8QRB7-NGTuGBeGx2sWn0daFc4pB7UkTS43U3XqiB_RIo2vJGOzoaYErDkK5MunMkaZMqB8rE8-69WCsgMkDaaNw4eTFpRIkNpJGClHVkuYjcfViAj0t8OhzkgrZB8aIX4jtW-uZwpxKynr08yhmAjtQwEw', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'P1tmPbeHlZ9ZlyMWZJrEjpjBW5hKnaczymehndmdy1s.oWSsWwagQ3imZmwaeYO5Knq0jp5aF6KlqRmGVpIU5Ew', 'scope': 'openid'}
8.006 AccessTokenResponse {
"access_token": "P1tmPbeHlZ9ZlyMWZJrEjpjBW5hKnaczymehndmdy1s.oWSsWwagQ3imZmwaeYO5Knq0jp5aF6KlqRmGVpIU5Ew",
"expires_in": 3599,
"id_token": {
"aud": [
"e6e5d6ab-950a-4534-801e-e12781fb9516"
],
"auth_time": 1529750744,
"exp": 1529754345,
"iat": 1529750745,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "cbecae01-37db-4d79-8383-047f2ca67852",
"nonce": "WLnmIFq8SN7COL2r",
"rat": 1529750742,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
8.006 phase <--<-- 8 --- Done -->-->
8.006 end
8.006 assertion VerifyResponse
8.006 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
8.007 assertion MultipleSignOn
8.007 condition multiple-sign-on: status=OK [Verifies that multiple authentications was used in the flow]
8.007 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
multiple-sign-on: status=OK [Verifies that multiple authentications was used in the flow]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-prompt-none-LoggedIn.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-prompt-none-LoggedIn
Test description: Request with prompt=none when logged in [Basic, Implicit, Hybrid]
Timestamp: 2018-06-23T10:45:54Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Registration -->-->
0.075 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.075 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#xl418IYHQ78NbkLH"
],
"response_types": [
"code"
]
}
0.242 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.243 RegistrationResponse {
"client_id": "06890cdd-4797-4c39-8b2f-a610890eed9a",
"client_secret": "yV4jXIT~KmTD",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "06890cdd-4797-4c39-8b2f-a610890eed9a",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#xl418IYHQ78NbkLH"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.243 phase <--<-- 3 --- AsyncAuthn -->-->
0.243 AuthorizationRequest {
"client_id": "06890cdd-4797-4c39-8b2f-a610890eed9a",
"nonce": "MFK7My6oTJYJPkWs",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "KlDUXbORnMBL0nSc"
}
0.243 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=06890cdd-4797-4c39-8b2f-a610890eed9a&state=KlDUXbORnMBL0nSc&response_type=code&nonce=MFK7My6oTJYJPkWs
0.243 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=06890cdd-4797-4c39-8b2f-a610890eed9a&state=KlDUXbORnMBL0nSc&response_type=code&nonce=MFK7My6oTJYJPkWs
5.286 response Response URL with query part
5.286 response {'state': 'KlDUXbORnMBL0nSc', 'scope': 'openid', 'code': 'BwbvzCKf1ioyYXdMyWwmivXOlpPD1QPjpjlxLvMJjNg.Bm9_LGXmfadHJc9zAoTk4sVfnzHLEbegz-N9VIb6ZiM'}
5.287 response {'state': 'KlDUXbORnMBL0nSc', 'scope': 'openid', 'code': 'BwbvzCKf1ioyYXdMyWwmivXOlpPD1QPjpjlxLvMJjNg.Bm9_LGXmfadHJc9zAoTk4sVfnzHLEbegz-N9VIb6ZiM'}
5.287 AuthorizationResponse {
"code": "BwbvzCKf1ioyYXdMyWwmivXOlpPD1QPjpjlxLvMJjNg.Bm9_LGXmfadHJc9zAoTk4sVfnzHLEbegz-N9VIb6ZiM",
"scope": "openid",
"state": "KlDUXbORnMBL0nSc"
}
5.287 phase <--<-- 4 --- AccessToken -->-->
5.287 --> request op_args: {'state': 'KlDUXbORnMBL0nSc'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
5.287 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'KlDUXbORnMBL0nSc', 'code': 'BwbvzCKf1ioyYXdMyWwmivXOlpPD1QPjpjlxLvMJjNg.Bm9_LGXmfadHJc9zAoTk4sVfnzHLEbegz-N9VIb6ZiM', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '06890cdd-4797-4c39-8b2f-a610890eed9a'}, 'state': 'KlDUXbORnMBL0nSc'}
5.287 AccessTokenRequest {
"code": "BwbvzCKf1ioyYXdMyWwmivXOlpPD1QPjpjlxLvMJjNg.Bm9_LGXmfadHJc9zAoTk4sVfnzHLEbegz-N9VIb6ZiM",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "KlDUXbORnMBL0nSc"
}
5.288 request_url https://oidc-certification.ory.sh:8443/oauth2/token
5.288 request_http_args {'headers': {'Authorization': 'Basic MDY4OTBjZGQtNDc5Ny00YzM5LThiMmYtYTYxMDg5MGVlZDlhOnlWNGpYSVQlN0VLbVRE', 'Content-Type': 'application/x-www-form-urlencoded'}}
5.288 request code=BwbvzCKf1ioyYXdMyWwmivXOlpPD1QPjpjlxLvMJjNg.Bm9_LGXmfadHJc9zAoTk4sVfnzHLEbegz-N9VIb6ZiM&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=KlDUXbORnMBL0nSc
5.512 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
5.513 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMDY4OTBjZGQtNDc5Ny00YzM5LThiMmYtYTYxMDg5MGVlZDlhIl0sImF1dGhfdGltZSI6MTUyOTc1MDc0OSwiZXhwIjoxNTI5NzU0MzUyLCJpYXQiOjE1Mjk3NTA3NTIsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjUxNzdmZGEyLWYzODctNDhmZS1iZDVmLWQzNjg1YWJlY2FiZCIsIm5vbmNlIjoiTUZLN015Nm9USllKUGtXcyIsInJhdCI6MTUyOTc1MDc0Nywic3ViIjoiZm9vQGJhci5jb20ifQ.Im4_j_iaFL-HB9bSsI-VyxCryqC2gzWvimQynRU175xtAaxldzXnQJKNmsHth-3DSWj6W8lagfiA_1CgWERkU8RNlb9R0hi8yPtySnQUFtIrhJ1kjBMjglEKmY3rW9qvtdrjiZrX6HfZ1GiYTCnflACtZQXdExmAAyCx-AY8i-pH3nvv1qkDFDWRzlKoUrGsZJTq1gvMX1OgEZckz6lPaLhZW5LoaqNWyp3hlFizkDd7p13AEUNol8nzz7EugSp-1jTpO_sZ34nghtjqWUn4UXy81QrwqvN4YE_iE44gTajsB5I3-iPG9NPpB4Frdqm1NjCwF_gdLqhConVC6q41zxkRrd2OvlCakBzJe4uzIUeR8VbAExq9NfE_ssUX5XRGAhVNGab7WGaIOkHny2Gg_IROC_9xnPlCxQUYpK_Wb8QA4KQVrKRyeBkv2kTNQjcE1qGW-hpzwEJzFYsF05Rq9JsJeVyslkjk8rqj3vAKtjkDHaqYNDl7UAnk0BZmfvW-pVi7QNlu7IlowlXHmRNdDmwsuHCeVLaVXwZVdHRq-QcAKqN3TnElx7akTYFDbuGLM47CtNK9XUnEKk3puBTzPjh1Kx0ILsP6EK_NQJZqeJDHWWkvOj097oy1y9D3IEVFjI71xcz2KdckwnVTTVMuUZ3QytjPTtQug_dvKLeJygQ', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'mNcoso5YeldEVWuK9rb4Pdo6q4tvMamXQWds9d9gORw.dzdbHb0mfThlvTqX_CU29F_Fss5LlMbh5Ys-x2kFDLI', 'scope': 'openid'}
5.591 AccessTokenResponse {
"access_token": "mNcoso5YeldEVWuK9rb4Pdo6q4tvMamXQWds9d9gORw.dzdbHb0mfThlvTqX_CU29F_Fss5LlMbh5Ys-x2kFDLI",
"expires_in": 3599,
"id_token": {
"aud": [
"06890cdd-4797-4c39-8b2f-a610890eed9a"
],
"auth_time": 1529750749,
"exp": 1529754352,
"iat": 1529750752,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "5177fda2-f387-48fe-bd5f-d3685abecabd",
"nonce": "MFK7My6oTJYJPkWs",
"rat": 1529750747,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
5.591 phase <--<-- 5 --- AsyncAuthn -->-->
5.591 AuthorizationRequest {
"client_id": "06890cdd-4797-4c39-8b2f-a610890eed9a",
"nonce": "eZRl5hV8YYan8AfR",
"prompt": [
"none"
],
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "e556UQeaBcQnykv8"
}
5.592 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=06890cdd-4797-4c39-8b2f-a610890eed9a&state=e556UQeaBcQnykv8&response_type=code&nonce=eZRl5hV8YYan8AfR
5.592 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=06890cdd-4797-4c39-8b2f-a610890eed9a&state=e556UQeaBcQnykv8&response_type=code&nonce=eZRl5hV8YYan8AfR
6.629 response Response URL with query part
6.629 response {'state': 'e556UQeaBcQnykv8', 'scope': 'openid', 'code': 'JxOxykzbTxO19kytfuBz_KN4LeLuBrzkJ8mwn4a3DL4.L67fMYxGlVT1Yaghted0hlE4ghihRo9VP9i1oORv0vI'}
6.63 response {'state': 'e556UQeaBcQnykv8', 'scope': 'openid', 'code': 'JxOxykzbTxO19kytfuBz_KN4LeLuBrzkJ8mwn4a3DL4.L67fMYxGlVT1Yaghted0hlE4ghihRo9VP9i1oORv0vI'}
6.63 AuthorizationResponse {
"code": "JxOxykzbTxO19kytfuBz_KN4LeLuBrzkJ8mwn4a3DL4.L67fMYxGlVT1Yaghted0hlE4ghihRo9VP9i1oORv0vI",
"scope": "openid",
"state": "e556UQeaBcQnykv8"
}
6.63 phase <--<-- 6 --- AccessToken -->-->
6.63 --> request op_args: {'state': 'e556UQeaBcQnykv8'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
6.63 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'e556UQeaBcQnykv8', 'code': 'JxOxykzbTxO19kytfuBz_KN4LeLuBrzkJ8mwn4a3DL4.L67fMYxGlVT1Yaghted0hlE4ghihRo9VP9i1oORv0vI', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '06890cdd-4797-4c39-8b2f-a610890eed9a'}, 'state': 'e556UQeaBcQnykv8'}
6.63 AccessTokenRequest {
"code": "JxOxykzbTxO19kytfuBz_KN4LeLuBrzkJ8mwn4a3DL4.L67fMYxGlVT1Yaghted0hlE4ghihRo9VP9i1oORv0vI",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "e556UQeaBcQnykv8"
}
6.63 request_url https://oidc-certification.ory.sh:8443/oauth2/token
6.63 request_http_args {'headers': {'Authorization': 'Basic MDY4OTBjZGQtNDc5Ny00YzM5LThiMmYtYTYxMDg5MGVlZDlhOnlWNGpYSVQlN0VLbVRE', 'Content-Type': 'application/x-www-form-urlencoded'}}
6.63 request code=JxOxykzbTxO19kytfuBz_KN4LeLuBrzkJ8mwn4a3DL4.L67fMYxGlVT1Yaghted0hlE4ghihRo9VP9i1oORv0vI&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=e556UQeaBcQnykv8
6.844 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
6.845 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMDY4OTBjZGQtNDc5Ny00YzM5LThiMmYtYTYxMDg5MGVlZDlhIl0sImF1dGhfdGltZSI6MTUyOTc1MDc0OSwiZXhwIjoxNTI5NzU0MzUzLCJpYXQiOjE1Mjk3NTA3NTMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImE2ZjAwZTlkLWM3ZWUtNDY5Zi05YTNlLTc0NWU4Y2UyZjkxNSIsIm5vbmNlIjoiZVpSbDVoVjhZWWFuOEFmUiIsInJhdCI6MTUyOTc1MDc1Miwic3ViIjoiZm9vQGJhci5jb20ifQ.hwSEEoGieIR79YNbHIHR2fiHcpTyxfg9EmuM-iJMLc2O0WkEqoIEM76E4LC6CzqrQjMNZOk-4n_9wNFg-XmgoXAH6N-hWjHzjLv2rVNjShkoxCeOy_HLP8udTFSq2rMYNTI0DWBj_SWinNZ4QStupq2VRaD2hhOJ7aUNEjMervUFhLOndVBgDTzBzoWd_Sx8Y2LkeTV2vh2gNTKeORt4qxhYh2lL_DNxxRoQADiy2MVcpanfJEuqgB0EHOkrYEdPR48ItDbkw0QpRbJU5THX07oHPt-9B6wRpwVDsIDGtlS8JIvsLNvu5wrpA54ewzObo622PTJD4yZUkWJL40lSecj5NN1JveGr55lVR3PS9GQaTZuDTw6OxkdIrygiqf7Audt5CLU_15Qxh97lTgC0eSQvkmYqKfj8Akd_rZaRoVFPup422zD1Emfk5vFs_yXADhXLtQ8E5zDFCMdx1jDStqayl8mM6pZIAGCYqauxhBXLP_pYKr72ryrs1DAFH3bg9yBI3pLzk-PYnGbipimr5YX69wFcDrznRIoYqlOdTCd25a9D7-Q7ErKDPOXa6PxGsqK04Z9ciHuqrUamJTo6otPqm8_NRlUJWLw8Ws42pui7SLISRlcvIUeyLBj0yyuuCJMlBk_Z_SIkqKhcUBnyipeifIEVC4p8B2TBGut6VNc', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'TB3cb7VQoRvyH5bdV5YUVahW0RmdaNYm-CIcodJjcMc.iw2nAwaXi-maWK53F2-CtZlD_AvNrDPOQ6GHfwuW_BU', 'scope': 'openid'}
6.849 AccessTokenResponse {
"access_token": "TB3cb7VQoRvyH5bdV5YUVahW0RmdaNYm-CIcodJjcMc.iw2nAwaXi-maWK53F2-CtZlD_AvNrDPOQ6GHfwuW_BU",
"expires_in": 3599,
"id_token": {
"aud": [
"06890cdd-4797-4c39-8b2f-a610890eed9a"
],
"auth_time": 1529750749,
"exp": 1529754353,
"iat": 1529750753,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "a6f00e9d-c7ee-469f-9a3e-745e8ce2f915",
"nonce": "eZRl5hV8YYan8AfR",
"rat": 1529750752,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
6.849 phase <--<-- 7 --- Done -->-->
6.849 end
6.849 assertion VerifyResponse
6.849 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
6.85 assertion SameAuthn
6.85 condition same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
6.85 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-prompt-none-NotLoggedIn.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-prompt-none-NotLoggedIn
Test description: Request with prompt=none when not logged in
Timestamp: 2018-06-23T10:46:04Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
2.55 phase <--<-- 1 --- Webfinger -->-->
2.55 not expected to do WebFinger
2.55 phase <--<-- 2 --- Discovery -->-->
2.55 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
2.624 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
2.625 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
2.625 phase <--<-- 3 --- Registration -->-->
2.625 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
2.626 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#n0iVlSqvBXqBieXQ"
],
"response_types": [
"code"
]
}
2.785 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
2.786 RegistrationResponse {
"client_id": "68557ec6-8e9f-4ff1-b50c-6d95713e5977",
"client_secret": "SxP6GFsvbnIk",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "68557ec6-8e9f-4ff1-b50c-6d95713e5977",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#n0iVlSqvBXqBieXQ"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
2.786 phase <--<-- 4 --- AsyncAuthn -->-->
2.787 AuthorizationRequest {
"client_id": "68557ec6-8e9f-4ff1-b50c-6d95713e5977",
"nonce": "i3OljxAGcNCbqIiA",
"prompt": [
"none"
],
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "q1An4wJ1Y5ITWTL4"
}
2.787 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=68557ec6-8e9f-4ff1-b50c-6d95713e5977&state=q1An4wJ1Y5ITWTL4&response_type=code&nonce=i3OljxAGcNCbqIiA
2.787 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=68557ec6-8e9f-4ff1-b50c-6d95713e5977&state=q1An4wJ1Y5ITWTL4&response_type=code&nonce=i3OljxAGcNCbqIiA
3.226 response Response URL with query part
3.226 response {'error_debug': 'Prompt "none" was requested, but no existing login session was found', 'error_description': 'The Authorization Server requires End-User authentication', 'state': 'q1An4wJ1Y5ITWTL4', 'error': 'login_required'}
3.227 response {'error_debug': 'Prompt "none" was requested, but no existing login session was found', 'error_description': 'The Authorization Server requires End-User authentication', 'state': 'q1An4wJ1Y5ITWTL4', 'error': 'login_required'}
3.227 AuthorizationErrorResponse {
"error": "login_required",
"error_debug": "Prompt \"none\" was requested, but no existing login session was found",
"error_description": "The Authorization Server requires End-User authentication",
"state": "q1An4wJ1Y5ITWTL4"
}
3.227 AuthorizationErrorResponse {
"error": "login_required",
"error_debug": "Prompt \"none\" was requested, but no existing login session was found",
"error_description": "The Authorization Server requires End-User authentication",
"state": "q1An4wJ1Y5ITWTL4"
}
3.227 phase <--<-- 5 --- Done -->-->
3.227 end
3.228 assertion VerifyErrorMessage
3.228 condition verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
3.228 condition Done: status=OK
============================================================
Conditions
verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-redirect_uri-Missing.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-Missing
Test description: Reject request without redirect_uri when multiple registered
Timestamp: 2018-06-23T10:46:17Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.079 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.08 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.08 phase <--<-- 2 --- Registration -->-->
0.08 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb', 'https://op.certification.openid.net:61353/cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.08 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb",
"https://op.certification.openid.net:61353/cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#pUFK3PHKWFcdh5dO"
],
"response_types": [
"code"
]
}
0.277 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.277 RegistrationResponse {
"client_id": "1244821b-a593-4921-875c-30f57414b5d5",
"client_secret": "oi0Cwy.0Hctg",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "1244821b-a593-4921-875c-30f57414b5d5",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb",
"https://op.certification.openid.net:61353/cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#pUFK3PHKWFcdh5dO"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.278 phase <--<-- 3 --- Note -->-->
============================================================
Conditions
============================================================
RESULT: PARTIAL RESULT |
Text | hydra/internal/certification/C.F.T.T.s/OP-redirect_uri-NotReg.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-NotReg
Test description: Sent redirect_uri does not match a registered redirect_uri
Timestamp: 2018-06-23T10:46:41Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Registration -->-->
0.075 register kwargs:{'application_name': 'OIC test tool', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'redirect_uri': ['https://op.certification.openid.net:61353/authz_cb?foo=bar']}
0.075 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#LtySycnhFcGnHiXR"
],
"response_types": [
"code"
]
}
0.236 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.237 RegistrationResponse {
"client_id": "ecb012c6-512d-4236-b362-a17e856e054f",
"client_secret": "xjeZZSzBwdMu",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "ecb012c6-512d-4236-b362-a17e856e054f",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#LtySycnhFcGnHiXR"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.237 phase <--<-- 3 --- Note -->-->
15.249 phase <--<-- 4 --- AsyncAuthn -->-->
15.249 AuthorizationRequest {
"client_id": "ecb012c6-512d-4236-b362-a17e856e054f",
"nonce": "BOoxee6CpKSapklm",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb?bar=foo",
"response_type": "code",
"scope": "openid",
"state": "llkFogf4uGclH9hQ"
}
15.25 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb%3Fbar%3Dfoo&client_id=ecb012c6-512d-4236-b362-a17e856e054f&state=llkFogf4uGclH9hQ&response_type=code&nonce=BOoxee6CpKSapklm
15.25 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb%3Fbar%3Dfoo&client_id=ecb012c6-512d-4236-b362-a17e856e054f&state=llkFogf4uGclH9hQ&response_type=code&nonce=BOoxee6CpKSapklm
============================================================
Conditions
============================================================
RESULT: PARTIAL RESULT |
Text | hydra/internal/certification/C.F.T.T.s/OP-redirect_uri-Query-Added.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-Query-Added
Test description: Request with redirect_uri with query component when registered redirect_uri has no query component
Timestamp: 2018-06-23T10:46:44Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Registration -->-->
0.075 register kwargs:{'application_name': 'OIC test tool', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'redirect_uri': ['https://op.certification.openid.net:61353/authz_cb?foo=bar']}
0.075 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#LtySycnhFcGnHiXR"
],
"response_types": [
"code"
]
}
0.236 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.237 RegistrationResponse {
"client_id": "ecb012c6-512d-4236-b362-a17e856e054f",
"client_secret": "xjeZZSzBwdMu",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "ecb012c6-512d-4236-b362-a17e856e054f",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#LtySycnhFcGnHiXR"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.237 phase <--<-- 3 --- Note -->-->
15.249 phase <--<-- 4 --- AsyncAuthn -->-->
15.249 AuthorizationRequest {
"client_id": "ecb012c6-512d-4236-b362-a17e856e054f",
"nonce": "BOoxee6CpKSapklm",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb?bar=foo",
"response_type": "code",
"scope": "openid",
"state": "llkFogf4uGclH9hQ"
}
15.25 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb%3Fbar%3Dfoo&client_id=ecb012c6-512d-4236-b362-a17e856e054f&state=llkFogf4uGclH9hQ&response_type=code&nonce=BOoxee6CpKSapklm
15.25 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb%3Fbar%3Dfoo&client_id=ecb012c6-512d-4236-b362-a17e856e054f&state=llkFogf4uGclH9hQ&response_type=code&nonce=BOoxee6CpKSapklm
16.2 phase <--<-- 4 --- AsyncAuthn -->-->
16.201 AuthorizationRequest {
"client_id": "ecb012c6-512d-4236-b362-a17e856e054f",
"nonce": "APR9OMfToXZqwWYp",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb?bar=foo",
"response_type": "code",
"scope": "openid",
"state": "qf39DpT37XADhfJF"
}
16.201 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb%3Fbar%3Dfoo&client_id=ecb012c6-512d-4236-b362-a17e856e054f&state=qf39DpT37XADhfJF&response_type=code&nonce=APR9OMfToXZqwWYp
16.201 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb%3Fbar%3Dfoo&client_id=ecb012c6-512d-4236-b362-a17e856e054f&state=qf39DpT37XADhfJF&response_type=code&nonce=APR9OMfToXZqwWYp
17.286 phase <--<-- 4 --- AsyncAuthn -->-->
17.287 AuthorizationRequest {
"client_id": "ecb012c6-512d-4236-b362-a17e856e054f",
"nonce": "nB4DhCj8O8crsBh3",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb?bar=foo",
"response_type": "code",
"scope": "openid",
"state": "6UwXfce74GGdK9TQ"
}
17.287 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb%3Fbar%3Dfoo&client_id=ecb012c6-512d-4236-b362-a17e856e054f&state=6UwXfce74GGdK9TQ&response_type=code&nonce=nB4DhCj8O8crsBh3
17.287 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb%3Fbar%3Dfoo&client_id=ecb012c6-512d-4236-b362-a17e856e054f&state=6UwXfce74GGdK9TQ&response_type=code&nonce=nB4DhCj8O8crsBh3
============================================================
Conditions
============================================================
RESULT: PARTIAL RESULT |
Text | hydra/internal/certification/C.F.T.T.s/OP-redirect_uri-Query-Mismatch.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-Query-Mismatch
Test description: Rejects redirect_uri when query parameter does not match what is registed
Timestamp: 2018-06-23T10:46:41Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Registration -->-->
0.075 register kwargs:{'application_name': 'OIC test tool', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'redirect_uri': ['https://op.certification.openid.net:61353/authz_cb?foo=bar']}
0.075 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#LtySycnhFcGnHiXR"
],
"response_types": [
"code"
]
}
0.236 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.237 RegistrationResponse {
"client_id": "ecb012c6-512d-4236-b362-a17e856e054f",
"client_secret": "xjeZZSzBwdMu",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "ecb012c6-512d-4236-b362-a17e856e054f",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#LtySycnhFcGnHiXR"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.237 phase <--<-- 3 --- Note -->-->
============================================================
Conditions
============================================================
RESULT: PARTIAL RESULT |
Text | hydra/internal/certification/C.F.T.T.s/OP-redirect_uri-Query-OK.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-Query-OK
Test description: Request with a redirect_uri with a query component when a redirect_uri with the same query component is registered
Timestamp: 2018-06-23T10:46:52Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.079 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.08 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.08 phase <--<-- 2 --- Registration -->-->
0.08 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb?foo=bar'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.08 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb?foo=bar"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#74G38lF4NGcBjIWN"
],
"response_types": [
"code"
]
}
0.27 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.271 RegistrationResponse {
"client_id": "7d1128b3-4954-4ba1-828f-19865971c75f",
"client_secret": "JON-4DslGitJ",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "7d1128b3-4954-4ba1-828f-19865971c75f",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb?foo=bar"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#74G38lF4NGcBjIWN"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.271 phase <--<-- 3 --- AsyncAuthn -->-->
0.272 AuthorizationRequest {
"client_id": "7d1128b3-4954-4ba1-828f-19865971c75f",
"nonce": "Z0fIcSjs3zD1cAW1",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb?foo=bar",
"response_type": "code",
"scope": "openid",
"state": "5NSRt1eD5V8rHyLi"
}
0.272 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb%3Ffoo%3Dbar&client_id=7d1128b3-4954-4ba1-828f-19865971c75f&state=5NSRt1eD5V8rHyLi&response_type=code&nonce=Z0fIcSjs3zD1cAW1
0.272 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb%3Ffoo%3Dbar&client_id=7d1128b3-4954-4ba1-828f-19865971c75f&state=5NSRt1eD5V8rHyLi&response_type=code&nonce=Z0fIcSjs3zD1cAW1
3.934 response Response URL with query part
3.935 response {'state': '5NSRt1eD5V8rHyLi', 'scope': 'openid', 'code': 'wdY6RkkVbzOn4pg2g4YMDBkxNtkyughZK0m_hn3w4ls.slFPZhEBARhYaNynmc_C7ZVHlVx11NoK4vGLDHsH6Sk', 'foo': 'bar'}
3.936 response {'state': '5NSRt1eD5V8rHyLi', 'scope': 'openid', 'code': 'wdY6RkkVbzOn4pg2g4YMDBkxNtkyughZK0m_hn3w4ls.slFPZhEBARhYaNynmc_C7ZVHlVx11NoK4vGLDHsH6Sk', 'foo': 'bar'}
3.936 AuthorizationResponse {
"code": "wdY6RkkVbzOn4pg2g4YMDBkxNtkyughZK0m_hn3w4ls.slFPZhEBARhYaNynmc_C7ZVHlVx11NoK4vGLDHsH6Sk",
"foo": "bar",
"scope": "openid",
"state": "5NSRt1eD5V8rHyLi"
}
3.936 phase <--<-- 4 --- Done -->-->
3.936 end
3.937 assertion VerifyResponse
3.937 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.937 assertion CheckQueryPart
3.937 condition check-query-part: status=OK [Check that a query part send in the Authorization Request is returned in the Authorization response.]
3.937 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
check-query-part: status=OK [Check that a query part send in the Authorization Request is returned in the Authorization response.]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-redirect_uri-RegFrag.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-RegFrag
Test description: Reject registration where a redirect_uri has a fragment
Timestamp: 2018-06-23T10:46:54Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.072 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Registration -->-->
0.074 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb#foobar'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.074 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb#foobar"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#dzxLL2yTZHS9OrlH"
],
"response_types": [
"code"
]
}
0.179 http response url:https://oidc-certification.ory.sh:8443/clients status_code:400 message:{"error":"invalid_request","error_description":"The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed","error_hint":"Redirect URIs must not contain fragments (#)","status_code":400}
0.18 ErrorResponse {
"error": "invalid_request",
"error_description": "The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed",
"error_hint": "Redirect URIs must not contain fragments (#)",
"status_code": 400
}
0.18 exception RegistrationError:{'error_description': 'The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed', 'status_code': 400, 'error': 'invalid_request', 'error_hint': 'Redirect URIs must not contain fragments (#)'}
0.18 event got expected exception RegistrationError
0.18 phase <--<-- 3 --- Done -->-->
0.18 end
0.181 assertion VerifyErrorMessage
0.181 condition verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
0.181 condition Done: status=OK
============================================================
Conditions
verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-Registration-Dynamic.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-Dynamic
Test description: Client registration request
Timestamp: 2018-06-23T10:43:26Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.11 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.111 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.112 phase <--<-- 2 --- Registration -->-->
0.112 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.112 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#wG5lPNdDnhbb3lBI"
],
"response_types": [
"code"
]
}
0.3 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.301 RegistrationResponse {
"client_id": "c52050fc-b532-4d95-b334-83bb56094891",
"client_secret": "Tb1prwm3dErm",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "c52050fc-b532-4d95-b334-83bb56094891",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#wG5lPNdDnhbb3lBI"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.301 phase <--<-- 3 --- Done -->-->
0.301 end
0.302 assertion CheckHTTPResponse
0.302 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.302 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-Registration-Endpoint.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-Endpoint
Test description: Verify that registration_endpoint is published
Timestamp: 2018-06-23T10:43:28Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.109 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.11 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.11 phase <--<-- 2 --- Done -->-->
0.11 end
0.111 assertion VerifyOPHasRegistrationEndpoint
0.111 condition verify-op-has-registration-endpoint: status=OK [Verify that the OP has a registration endpoint]
0.111 condition Done: status=OK
============================================================
Conditions
verify-op-has-registration-endpoint: status=OK [Verify that the OP has a registration endpoint]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-Registration-jwks.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-jwks
Test description: Uses keys registered with jwks value
Timestamp: 2018-06-23T10:43:33Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.092 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.093 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.093 phase <--<-- 2 --- Registration -->-->
0.094 register kwargs:{'application_name': 'OIC test tool', 'jwks': {'keys': [{'use': 'enc', 'kty': 'RSA', 'n': 'pKXuY5tuT9ibmEcq4B6VRx3MafdSsajrOndAk5FjJFedlA6qSpdqDUr9wWUkNeO8h_efdLfg43CHXk3mH6Fp1t2gbHzBQ4-SzT3_X5tsdG2PPqvngem7f5NHO6Kefhq11Zk5q4-FyTL9FUQQW6ZANbrU7GifSAs82Ck20ciIvFdv7cPCphk_THMVv14aW5w0eKEXumgx4Bc7HrQFXQUHSze3dVAKg8hKHDIQOGUU0fkolEFmOC4Gb-G57RpBJryZxXqgdUdEG66xl1f37tqpYgaLViFDWDiI8S7BMVHEbGHN4-f_MD9f6gMduaxrL6a6SfyIW1So2VqtvlAyanesTw', 'e': 'AQAB', 'kid': 'gtH4v3Yr2QqLreBSz0ByQQ8vkf8eFo1KIit3s-3Bbww'}, {'use': 'sig', 'kty': 'RSA', 'n': '1Z8lhYNb0tHZsVrzIQs-JetNCLIBWeOHXblcirxQgFLt6z4Rr-9vxPbEsrmRmZbPuuoL8nGehqOK11LAgqa1QfCR4TKxr2srlbTv4A4Gyf-suhO_KKt0JWv2q9olREZcoIE4FCwK0vuWTqD5q4qL_uqt_kHltzhdkJ4LySdCRCbxG1kcEcXoPNIhZERttqbZTIQviJxJ2HqC7CbwocmZMnbMAzP52bVX86vLxosmI-pqkG1RG8jMTZMhvc2GmYe6CfleW7bRxS0078sWDM_iACSQVOqLk5rcW_C-a61EYzNNN7BMw-VxFSDtoGgNgb6XGM6FTf9fkdJjIRL2VZAt0Q', 'e': 'AQAB', 'kid': 'wt25OgyR_nzG3OoQ7daa2rL6-gMnFdfRzBjhUVPu8RQ'}, {'x': 'aruz0ufjUGuEQwg2Q3ewyy5DnEIWWmIEO5stN8MfUTA', 'use': 'sig', 'kty': 'EC', 'y': 'dZnZMUOQAvzOD6q1f11PEho4-aX7nWdmive8zdxUbrA', 'crv': 'P-256', 'kid': 'AZXCzT401BtqezIxAdHOEez1ApQUu3O5hjcfRFKxXtQ'}, {'x': 'AeI9gyN_hcFae8vO2HgaH7Fh-MVX1YXJdWg-T16g1kM', 'use': 'enc', 'kty': 'EC', 'y': '5ASt8rCvPWTKMAh6wvR8_-OEbl_9TTkkgAd7LXW8H48', 'crv': 'P-256', 'kid': 'CrXNdVSdrZ-lOToSPso6OlcZnP-Et4U9CzOIZOZPvLw'}]}, 'token_endpoint_auth_method': 'private_key_jwt', 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'grant_types': ['authorization_code'], 'response_types': ['code'], 'url': 'https://oidc-certification.ory.sh:8443/clients', 'application_type': 'web'}
0.094 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks": {
"keys": [
{
"e": "AQAB",
"kid": "gtH4v3Yr2QqLreBSz0ByQQ8vkf8eFo1KIit3s-3Bbww",
"kty": "RSA",
"n": "pKXuY5tuT9ibmEcq4B6VRx3MafdSsajrOndAk5FjJFedlA6qSpdqDUr9wWUkNeO8h_efdLfg43CHXk3mH6Fp1t2gbHzBQ4-SzT3_X5tsdG2PPqvngem7f5NHO6Kefhq11Zk5q4-FyTL9FUQQW6ZANbrU7GifSAs82Ck20ciIvFdv7cPCphk_THMVv14aW5w0eKEXumgx4Bc7HrQFXQUHSze3dVAKg8hKHDIQOGUU0fkolEFmOC4Gb-G57RpBJryZxXqgdUdEG66xl1f37tqpYgaLViFDWDiI8S7BMVHEbGHN4-f_MD9f6gMduaxrL6a6SfyIW1So2VqtvlAyanesTw",
"use": "enc"
},
{
"e": "AQAB",
"kid": "wt25OgyR_nzG3OoQ7daa2rL6-gMnFdfRzBjhUVPu8RQ",
"kty": "RSA",
"n": "1Z8lhYNb0tHZsVrzIQs-JetNCLIBWeOHXblcirxQgFLt6z4Rr-9vxPbEsrmRmZbPuuoL8nGehqOK11LAgqa1QfCR4TKxr2srlbTv4A4Gyf-suhO_KKt0JWv2q9olREZcoIE4FCwK0vuWTqD5q4qL_uqt_kHltzhdkJ4LySdCRCbxG1kcEcXoPNIhZERttqbZTIQviJxJ2HqC7CbwocmZMnbMAzP52bVX86vLxosmI-pqkG1RG8jMTZMhvc2GmYe6CfleW7bRxS0078sWDM_iACSQVOqLk5rcW_C-a61EYzNNN7BMw-VxFSDtoGgNgb6XGM6FTf9fkdJjIRL2VZAt0Q",
"use": "sig"
},
{
"crv": "P-256",
"kid": "AZXCzT401BtqezIxAdHOEez1ApQUu3O5hjcfRFKxXtQ",
"kty": "EC",
"use": "sig",
"x": "aruz0ufjUGuEQwg2Q3ewyy5DnEIWWmIEO5stN8MfUTA",
"y": "dZnZMUOQAvzOD6q1f11PEho4-aX7nWdmive8zdxUbrA"
},
{
"crv": "P-256",
"kid": "CrXNdVSdrZ-lOToSPso6OlcZnP-Et4U9CzOIZOZPvLw",
"kty": "EC",
"use": "enc",
"x": "AeI9gyN_hcFae8vO2HgaH7Fh-MVX1YXJdWg-T16g1kM",
"y": "5ASt8rCvPWTKMAh6wvR8_-OEbl_9TTkkgAd7LXW8H48"
}
]
},
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#hJz8quGQztGsPTS8"
],
"response_types": [
"code"
],
"token_endpoint_auth_method": "private_key_jwt"
}
0.282 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.283 RegistrationResponse {
"client_id": "1cf701c5-bb2e-4d69-adad-23cde091db7b",
"client_secret": "Fp9mcCQWBlQp",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "1cf701c5-bb2e-4d69-adad-23cde091db7b",
"jwks": {
"keys": [
{
"e": "AQAB",
"kid": "gtH4v3Yr2QqLreBSz0ByQQ8vkf8eFo1KIit3s-3Bbww",
"kty": "RSA",
"n": "pKXuY5tuT9ibmEcq4B6VRx3MafdSsajrOndAk5FjJFedlA6qSpdqDUr9wWUkNeO8h_efdLfg43CHXk3mH6Fp1t2gbHzBQ4-SzT3_X5tsdG2PPqvngem7f5NHO6Kefhq11Zk5q4-FyTL9FUQQW6ZANbrU7GifSAs82Ck20ciIvFdv7cPCphk_THMVv14aW5w0eKEXumgx4Bc7HrQFXQUHSze3dVAKg8hKHDIQOGUU0fkolEFmOC4Gb-G57RpBJryZxXqgdUdEG66xl1f37tqpYgaLViFDWDiI8S7BMVHEbGHN4-f_MD9f6gMduaxrL6a6SfyIW1So2VqtvlAyanesTw",
"use": "enc"
},
{
"e": "AQAB",
"kid": "wt25OgyR_nzG3OoQ7daa2rL6-gMnFdfRzBjhUVPu8RQ",
"kty": "RSA",
"n": "1Z8lhYNb0tHZsVrzIQs-JetNCLIBWeOHXblcirxQgFLt6z4Rr-9vxPbEsrmRmZbPuuoL8nGehqOK11LAgqa1QfCR4TKxr2srlbTv4A4Gyf-suhO_KKt0JWv2q9olREZcoIE4FCwK0vuWTqD5q4qL_uqt_kHltzhdkJ4LySdCRCbxG1kcEcXoPNIhZERttqbZTIQviJxJ2HqC7CbwocmZMnbMAzP52bVX86vLxosmI-pqkG1RG8jMTZMhvc2GmYe6CfleW7bRxS0078sWDM_iACSQVOqLk5rcW_C-a61EYzNNN7BMw-VxFSDtoGgNgb6XGM6FTf9fkdJjIRL2VZAt0Q",
"use": "sig"
},
{
"crv": "P-256",
"kid": "AZXCzT401BtqezIxAdHOEez1ApQUu3O5hjcfRFKxXtQ",
"kty": "EC",
"use": "sig",
"x": "aruz0ufjUGuEQwg2Q3ewyy5DnEIWWmIEO5stN8MfUTA",
"y": "dZnZMUOQAvzOD6q1f11PEho4-aX7nWdmive8zdxUbrA"
},
{
"crv": "P-256",
"kid": "CrXNdVSdrZ-lOToSPso6OlcZnP-Et4U9CzOIZOZPvLw",
"kty": "EC",
"use": "enc",
"x": "AeI9gyN_hcFae8vO2HgaH7Fh-MVX1YXJdWg-T16g1kM",
"y": "5ASt8rCvPWTKMAh6wvR8_-OEbl_9TTkkgAd7LXW8H48"
}
]
},
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#hJz8quGQztGsPTS8"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "private_key_jwt",
"userinfo_signed_response_alg": "none"
}
0.283 phase <--<-- 3 --- AsyncAuthn -->-->
0.284 AuthorizationRequest {
"client_id": "1cf701c5-bb2e-4d69-adad-23cde091db7b",
"nonce": "6VGUlP2kd4aEPc5j",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "pi2vuIJpsTHD6JyL"
}
0.284 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=1cf701c5-bb2e-4d69-adad-23cde091db7b&state=pi2vuIJpsTHD6JyL&response_type=code&nonce=6VGUlP2kd4aEPc5j
0.284 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=1cf701c5-bb2e-4d69-adad-23cde091db7b&state=pi2vuIJpsTHD6JyL&response_type=code&nonce=6VGUlP2kd4aEPc5j
2.81 response Response URL with query part
2.81 response {'state': 'pi2vuIJpsTHD6JyL', 'scope': 'openid', 'code': 'tw9Ris3XV0JCPHlRK7ug2TGj4uJo8LXqgEzmCVEJzAI.o_QkF_2i10ONH3LPve8RadpDrzsr71tqcsz9chcNZ5g'}
2.81 response {'state': 'pi2vuIJpsTHD6JyL', 'scope': 'openid', 'code': 'tw9Ris3XV0JCPHlRK7ug2TGj4uJo8LXqgEzmCVEJzAI.o_QkF_2i10ONH3LPve8RadpDrzsr71tqcsz9chcNZ5g'}
2.811 AuthorizationResponse {
"code": "tw9Ris3XV0JCPHlRK7ug2TGj4uJo8LXqgEzmCVEJzAI.o_QkF_2i10ONH3LPve8RadpDrzsr71tqcsz9chcNZ5g",
"scope": "openid",
"state": "pi2vuIJpsTHD6JyL"
}
2.811 phase <--<-- 4 --- AccessToken -->-->
2.811 --> request op_args: {'state': 'pi2vuIJpsTHD6JyL', 'authn_method': 'private_key_jwt'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.811 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'pi2vuIJpsTHD6JyL', 'code': 'tw9Ris3XV0JCPHlRK7ug2TGj4uJo8LXqgEzmCVEJzAI.o_QkF_2i10ONH3LPve8RadpDrzsr71tqcsz9chcNZ5g', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '1cf701c5-bb2e-4d69-adad-23cde091db7b'}, 'state': 'pi2vuIJpsTHD6JyL', 'authn_method': 'private_key_jwt'}
2.811 AccessTokenRequest {
"client_assertion": "eyJhbGciOiJSUzI1NiIsImtpZCI6Ind0MjVPZ3lSX256RzNPb1E3ZGFhMnJMNi1nTW5GZGZSekJqaFVWUHU4UlEifQ.eyJpc3MiOiAiMWNmNzAxYzUtYmIyZS00ZDY5LWFkYWQtMjNjZGUwOTFkYjdiIiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiMWNmNzAxYzUtYmIyZS00ZDY5LWFkYWQtMjNjZGUwOTFkYjdiIiwgImlhdCI6IDE1Mjk3NTA2MTIsICJqdGkiOiAiZjhleElKek1GVTVYRkpMNFg3cVNOdjVSR3VaUGZYNTMiLCAiZXhwIjogMTUyOTc1MTIxMn0.c6JaBlLtyZLYG_c060vcz-q3nLmfZZ0V_rkydl1flR-V8IyuqNHw0b-rYXr82gqfJom7_rc0lRWuPD5cc58NUgrRZY9gELOHX6tqWJG4WtrL8Fmf_MJu3DWNG4Rr140Dv4unLOp8U1aYCutrwaD6zvXQtskgWC-qHIEul17C-u9DyewosQWKJI1vDWPqjK_G7iGHvOVIt2_VGlCLhZgLq_sQvkGIvIwLz7v_vBxIs11JKJbauGRKxsN4CO4JYr5oPNjWktD0IPLq7pF7gKU0Z5j0W7k9nw-c4FCgdv6Ct-2pZyKs0KfLjaB-8HDz6doAhd1EINspf_RiXnfq4My0dg",
"client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer",
"code": "tw9Ris3XV0JCPHlRK7ug2TGj4uJo8LXqgEzmCVEJzAI.o_QkF_2i10ONH3LPve8RadpDrzsr71tqcsz9chcNZ5g",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "pi2vuIJpsTHD6JyL"
}
2.817 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.817 request_http_args {'headers': {'Content-Type': 'application/x-www-form-urlencoded'}}
2.817 request code=tw9Ris3XV0JCPHlRK7ug2TGj4uJo8LXqgEzmCVEJzAI.o_QkF_2i10ONH3LPve8RadpDrzsr71tqcsz9chcNZ5g&client_assertion_type=urn%3Aietf%3Aparams%3Aoauth%3Aclient-assertion-type%3Ajwt-bearer&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=pi2vuIJpsTHD6JyL&client_assertion=eyJhbGciOiJSUzI1NiIsImtpZCI6Ind0MjVPZ3lSX256RzNPb1E3ZGFhMnJMNi1nTW5GZGZSekJqaFVWUHU4UlEifQ.eyJpc3MiOiAiMWNmNzAxYzUtYmIyZS00ZDY5LWFkYWQtMjNjZGUwOTFkYjdiIiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiMWNmNzAxYzUtYmIyZS00ZDY5LWFkYWQtMjNjZGUwOTFkYjdiIiwgImlhdCI6IDE1Mjk3NTA2MTIsICJqdGkiOiAiZjhleElKek1GVTVYRkpMNFg3cVNOdjVSR3VaUGZYNTMiLCAiZXhwIjogMTUyOTc1MTIxMn0.c6JaBlLtyZLYG_c060vcz-q3nLmfZZ0V_rkydl1flR-V8IyuqNHw0b-rYXr82gqfJom7_rc0lRWuPD5cc58NUgrRZY9gELOHX6tqWJG4WtrL8Fmf_MJu3DWNG4Rr140Dv4unLOp8U1aYCutrwaD6zvXQtskgWC-qHIEul17C-u9DyewosQWKJI1vDWPqjK_G7iGHvOVIt2_VGlCLhZgLq_sQvkGIvIwLz7v_vBxIs11JKJbauGRKxsN4CO4JYr5oPNjWktD0IPLq7pF7gKU0Z5j0W7k9nw-c4FCgdv6Ct-2pZyKs0KfLjaB-8HDz6doAhd1EINspf_RiXnfq4My0dg
2.983 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.984 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMWNmNzAxYzUtYmIyZS00ZDY5LWFkYWQtMjNjZGUwOTFkYjdiIl0sImF1dGhfdGltZSI6MTUyOTc1MDU5MiwiZXhwIjoxNTI5NzU0MjEyLCJpYXQiOjE1Mjk3NTA2MTIsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImQ4ZjliMGJlLTJkZjUtNDA1NS1hNzE3LWQ0MTljOWY3MWNlOCIsIm5vbmNlIjoiNlZHVWxQMmtkNGFFUGM1aiIsInJhdCI6MTUyOTc1MDYxMCwic3ViIjoiZm9vQGJhci5jb20ifQ.BUjDkue8e5KWI9ke_A3L3RBqCEhDxzNocRBYYXP-r4ekdfbnh5CDVFZNXfgZ1fRkjvDoMTKgp5oGdnBKmzCB_Jw0nFSSX3U2rxKk9VBOkbkSWsUdYLmUtpxop2ramiquUUucFX3y9DmmJR0l5SDVYqvVI2JpVnmqIWAAJJKJnQR2rsR7qd6EAmEBF6crdbSaenLyMp0m_5B0zQ58d_-N164-8FEHG9GKcjDqav3xgw7mJi47JpWcykdlg9ux8DEADTenovv0jC0PPrDYo5i8MnsSPpnvHFU1ZeYH-K0pIJZHPHN861jwMqcvHnK-xQ-z64c9LdNpw8LMOBqEwhO6rKskwVvz0xSNlnYBu3FuNYmNaEZmOwjPZKbSXFovtqNyjdHBocVz8B7W-LfgcF6DflyBhOaGvuQye3KsNmi4dNPy0o06cFdLtnnZhaYQ4yiovcMLvKJvNI3btdDVJROQWdPmkbzqUoX1K6gIvajgY4KkvLUn_PcqFTCJwKj3OZB2AlGPDsK_rvdoCs3F-Csy98Aft4NtFkFV9fV-SgJawdjR9hjCVfkZlqfJJ8p_hG8GnSXMAdCAbf01dO2NzcgDAWeyC2AqgK_IU6nP4CRA-gdGZVBYJH8AY_XXxqBgtCFtTOM0l6hGrQ_9OjUvv3-Fz2ahTw8oroOBtKSbhV8xTLU', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'zzLwtd-HSt0GQh-4I5F17cyQjW96SalXqrKaIMvMeLk.K2wL8vzSg9ZYvghK0Cr38ftWnnYvPMs7p6oxv-MTQyk', 'scope': 'openid'}
3.066 AccessTokenResponse {
"access_token": "zzLwtd-HSt0GQh-4I5F17cyQjW96SalXqrKaIMvMeLk.K2wL8vzSg9ZYvghK0Cr38ftWnnYvPMs7p6oxv-MTQyk",
"expires_in": 3599,
"id_token": {
"aud": [
"1cf701c5-bb2e-4d69-adad-23cde091db7b"
],
"auth_time": 1529750592,
"exp": 1529754212,
"iat": 1529750612,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "d8f9b0be-2df5-4055-a717-d419c9f71ce8",
"nonce": "6VGUlP2kd4aEPc5j",
"rat": 1529750610,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.066 phase <--<-- 5 --- Done -->-->
3.066 end
3.067 assertion VerifyResponse
3.067 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.067 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-Registration-jwks_uri.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-jwks_uri
Test description: Uses keys registered with jwks_uri value
Timestamp: 2018-06-23T10:43:44Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.08 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.082 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.082 phase <--<-- 2 --- Registration -->-->
0.082 register kwargs:{'application_name': 'OIC test tool', 'token_endpoint_auth_method': 'private_key_jwt', 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'response_types': ['code'], 'url': 'https://oidc-certification.ory.sh:8443/clients', 'application_type': 'web'}
0.082 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#DJag6msYGkIEs0Gl"
],
"response_types": [
"code"
],
"token_endpoint_auth_method": "private_key_jwt"
}
0.24 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.241 RegistrationResponse {
"client_id": "bbdb0da4-0ef4-4e52-a7e1-7886d8a75941",
"client_secret": "4f~A_g2.OD7p",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "bbdb0da4-0ef4-4e52-a7e1-7886d8a75941",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#DJag6msYGkIEs0Gl"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "private_key_jwt",
"userinfo_signed_response_alg": "none"
}
0.241 phase <--<-- 3 --- AsyncAuthn -->-->
0.242 AuthorizationRequest {
"client_id": "bbdb0da4-0ef4-4e52-a7e1-7886d8a75941",
"nonce": "AjVnT1wp1y1um8fG",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "qv6n7TUvrXnULueo"
}
0.242 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=bbdb0da4-0ef4-4e52-a7e1-7886d8a75941&state=qv6n7TUvrXnULueo&response_type=code&nonce=AjVnT1wp1y1um8fG
0.242 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=bbdb0da4-0ef4-4e52-a7e1-7886d8a75941&state=qv6n7TUvrXnULueo&response_type=code&nonce=AjVnT1wp1y1um8fG
2.764 response Response URL with query part
2.764 response {'state': 'qv6n7TUvrXnULueo', 'scope': 'openid', 'code': '9lilQ3nKKmBECZFkZPKhHdLUNzi1eNzUi1iMSmTDTg0.RjmLsqscpzS5_BiZREu2o2TAxGTlq9_dTJehbcxbh8E'}
2.764 response {'state': 'qv6n7TUvrXnULueo', 'scope': 'openid', 'code': '9lilQ3nKKmBECZFkZPKhHdLUNzi1eNzUi1iMSmTDTg0.RjmLsqscpzS5_BiZREu2o2TAxGTlq9_dTJehbcxbh8E'}
2.765 AuthorizationResponse {
"code": "9lilQ3nKKmBECZFkZPKhHdLUNzi1eNzUi1iMSmTDTg0.RjmLsqscpzS5_BiZREu2o2TAxGTlq9_dTJehbcxbh8E",
"scope": "openid",
"state": "qv6n7TUvrXnULueo"
}
2.765 phase <--<-- 4 --- AccessToken -->-->
2.765 --> request op_args: {'state': 'qv6n7TUvrXnULueo', 'authn_method': 'private_key_jwt'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.765 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'qv6n7TUvrXnULueo', 'code': '9lilQ3nKKmBECZFkZPKhHdLUNzi1eNzUi1iMSmTDTg0.RjmLsqscpzS5_BiZREu2o2TAxGTlq9_dTJehbcxbh8E', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'bbdb0da4-0ef4-4e52-a7e1-7886d8a75941'}, 'state': 'qv6n7TUvrXnULueo', 'authn_method': 'private_key_jwt'}
2.765 AccessTokenRequest {
"client_assertion": "eyJhbGciOiJSUzI1NiIsImtpZCI6Ind0MjVPZ3lSX256RzNPb1E3ZGFhMnJMNi1nTW5GZGZSekJqaFVWUHU4UlEifQ.eyJpc3MiOiAiYmJkYjBkYTQtMGVmNC00ZTUyLWE3ZTEtNzg4NmQ4YTc1OTQxIiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiYmJkYjBkYTQtMGVmNC00ZTUyLWE3ZTEtNzg4NmQ4YTc1OTQxIiwgImlhdCI6IDE1Mjk3NTA2MjQsICJqdGkiOiAib0ZYMEhWbVF5aW9RT0RuNzB2bTQyZXVkWENMNFZOQ2IiLCAiZXhwIjogMTUyOTc1MTIyNH0.NWkYR-d33B-sHimw-IX4DcFccjp1eDuHaS9q-U1IVLEiZPvrPCUdngAcfL9Am04_LgqeM7ShuW63a3LQppS7m3Fq-zTtKz0qscdgGVuCX4Rs2EUP3KSEKpslSIDnaaOXFs5JamfP70f64HIhVGd-Ep_8O3-mIQH7WgjHaDlcmAgy75WXj0uLaGlc52V2NZjIYp5JFmcqJrD0wJCWQ6ZaIKaEedG9YVSLmYhNjar8w0fsCeN_sOgNUj0WV7ruOMHJXMh6qWZQdquY6suPINYuR30pien3DdXqAXuzheppqp779kJPauScigxfkY22VaQxfJ9FE3BKG4QGI2DzbB4s4A",
"client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer",
"code": "9lilQ3nKKmBECZFkZPKhHdLUNzi1eNzUi1iMSmTDTg0.RjmLsqscpzS5_BiZREu2o2TAxGTlq9_dTJehbcxbh8E",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "qv6n7TUvrXnULueo"
}
2.769 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.769 request_http_args {'headers': {'Content-Type': 'application/x-www-form-urlencoded'}}
2.769 request code=9lilQ3nKKmBECZFkZPKhHdLUNzi1eNzUi1iMSmTDTg0.RjmLsqscpzS5_BiZREu2o2TAxGTlq9_dTJehbcxbh8E&client_assertion_type=urn%3Aietf%3Aparams%3Aoauth%3Aclient-assertion-type%3Ajwt-bearer&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=qv6n7TUvrXnULueo&client_assertion=eyJhbGciOiJSUzI1NiIsImtpZCI6Ind0MjVPZ3lSX256RzNPb1E3ZGFhMnJMNi1nTW5GZGZSekJqaFVWUHU4UlEifQ.eyJpc3MiOiAiYmJkYjBkYTQtMGVmNC00ZTUyLWE3ZTEtNzg4NmQ4YTc1OTQxIiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiYmJkYjBkYTQtMGVmNC00ZTUyLWE3ZTEtNzg4NmQ4YTc1OTQxIiwgImlhdCI6IDE1Mjk3NTA2MjQsICJqdGkiOiAib0ZYMEhWbVF5aW9RT0RuNzB2bTQyZXVkWENMNFZOQ2IiLCAiZXhwIjogMTUyOTc1MTIyNH0.NWkYR-d33B-sHimw-IX4DcFccjp1eDuHaS9q-U1IVLEiZPvrPCUdngAcfL9Am04_LgqeM7ShuW63a3LQppS7m3Fq-zTtKz0qscdgGVuCX4Rs2EUP3KSEKpslSIDnaaOXFs5JamfP70f64HIhVGd-Ep_8O3-mIQH7WgjHaDlcmAgy75WXj0uLaGlc52V2NZjIYp5JFmcqJrD0wJCWQ6ZaIKaEedG9YVSLmYhNjar8w0fsCeN_sOgNUj0WV7ruOMHJXMh6qWZQdquY6suPINYuR30pien3DdXqAXuzheppqp779kJPauScigxfkY22VaQxfJ9FE3BKG4QGI2DzbB4s4A
2.93 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.932 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYmJkYjBkYTQtMGVmNC00ZTUyLWE3ZTEtNzg4NmQ4YTc1OTQxIl0sImF1dGhfdGltZSI6MTUyOTc1MDU5MiwiZXhwIjoxNTI5NzU0MjI0LCJpYXQiOjE1Mjk3NTA2MjQsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImI4MzU3MGFmLWE5ZjQtNGM4MS1hMTU5LWM5OTBjZDljNWRjYSIsIm5vbmNlIjoiQWpWblQxd3AxeTF1bThmRyIsInJhdCI6MTUyOTc1MDYyMiwic3ViIjoiZm9vQGJhci5jb20ifQ.CzjfghDP-AIkmdS5CN3rkMJ6NyMe8yWl_rFQaz3vUmmCdtSvc-lsdXun4eL6sqZB85N1nATR0ucmuoR-UpPhWQTRJ7rztVNt3tQ9a40AnHZS7IemFevEnqzE72ync7fnH_Wrx8XIgTtOHxRHZnUlzO9ip3fcjHCk5yuOILFdVhEaa7J0qC6mzaYX8_Rq8Cmo8p29tTcrEnBN-Wbhxw8W6hYtAMl-5z5KkyFBAcazWsTiV_55GcDpUWHbB7QJOU6nieTjl6MYDhlspQOUQA63Syp2PYUEv81iKRJefH9LPWx8UxL-ScTKZS3vV190WmzPUL8-FHkx9Co6lyCHC4HGWC8sau1vWlsoitg4VPvTB0Jq8eanj22zy5hs9VtNse34pPaLIhsFP4D5AliHGgYC0LuXZ2aVreR6iOl-N-onq_YacLUyx2Fzaig3lcD_w0Pgbh1C_xkZGuv-eGQcAAl2Yk5FVE9dWF09autP-8Iky5TZ3MgBj6uHbXvot5tW1oS5F8xuGmxiaRYAksDeH-tM-b2ejnQ6HN2A7iiq6sdj7OcRN8_de6uuMb23Y9APbqA9hyPBs9qM4NZHrK92IE3_YsZrg3FkK_2Utr7Ebw-4GA3_xeYdt8_dZuTRKJQUjld8XXNy8XKCbVa9IIAqFCIJG923IIfbZ0dq1oi5bZP64FA', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': '-X01qotFl-SU05bQEWsWZDhW7Vom0envPM5CUmf06mE.Y62sII-yPfwCeInPgLGPu4avFXmyJP2HFK079ZC5uFw', 'scope': 'openid'}
3.015 AccessTokenResponse {
"access_token": "-X01qotFl-SU05bQEWsWZDhW7Vom0envPM5CUmf06mE.Y62sII-yPfwCeInPgLGPu4avFXmyJP2HFK079ZC5uFw",
"expires_in": 3599,
"id_token": {
"aud": [
"bbdb0da4-0ef4-4e52-a7e1-7886d8a75941"
],
"auth_time": 1529750592,
"exp": 1529754224,
"iat": 1529750624,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "b83570af-a9f4-4c81-a159-c990cd9c5dca",
"nonce": "AjVnT1wp1y1um8fG",
"rat": 1529750622,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.015 phase <--<-- 5 --- Done -->-->
3.015 end
3.016 assertion VerifyResponse
3.016 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.016 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-Registration-logo_uri.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-logo_uri
Test description: Registration with logo_uri
Timestamp: 2018-06-23T10:44:10Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.082 phase <--<-- 1 --- Webfinger -->-->
1.082 not expected to do WebFinger
1.082 phase <--<-- 2 --- Discovery -->-->
1.082 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.18 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.181 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.182 phase <--<-- 3 --- Registration -->-->
1.182 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'logo_uri': 'https://op.certification.openid.net:61353/static/logo.png'}
1.182 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"logo_uri": "https://op.certification.openid.net:61353/static/logo.png",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#3J63oL6NYS9csBrt"
],
"response_types": [
"code"
]
}
1.343 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.344 RegistrationResponse {
"client_id": "87135160-a662-4fb3-b2ab-f5025517c1a1",
"client_secret": "iflKX8b.ioLO",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "87135160-a662-4fb3-b2ab-f5025517c1a1",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"logo_uri": "https://op.certification.openid.net:61353/static/logo.png",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#3J63oL6NYS9csBrt"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.344 phase <--<-- 4 --- AsyncAuthn -->-->
1.345 AuthorizationRequest {
"client_id": "87135160-a662-4fb3-b2ab-f5025517c1a1",
"nonce": "uxjLGBv3XKggTGwl",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "AfCsHJqVmUwtTqSe"
}
1.345 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=87135160-a662-4fb3-b2ab-f5025517c1a1&state=AfCsHJqVmUwtTqSe&response_type=code&nonce=uxjLGBv3XKggTGwl
1.345 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=87135160-a662-4fb3-b2ab-f5025517c1a1&state=AfCsHJqVmUwtTqSe&response_type=code&nonce=uxjLGBv3XKggTGwl
3.106 response Response URL with query part
3.106 response {'state': 'AfCsHJqVmUwtTqSe', 'scope': '', 'code': 'yVG-Y5soqHrmFH3y-MLa_hnSQXVb5eWfIEyFhMcI1fc.PvP_zMJHlL-JpSnL7yKs4_rkHcbK2h54fmjRh2mHBj0'}
3.107 response {'state': 'AfCsHJqVmUwtTqSe', 'code': 'yVG-Y5soqHrmFH3y-MLa_hnSQXVb5eWfIEyFhMcI1fc.PvP_zMJHlL-JpSnL7yKs4_rkHcbK2h54fmjRh2mHBj0'}
3.107 AuthorizationResponse {
"code": "yVG-Y5soqHrmFH3y-MLa_hnSQXVb5eWfIEyFhMcI1fc.PvP_zMJHlL-JpSnL7yKs4_rkHcbK2h54fmjRh2mHBj0",
"state": "AfCsHJqVmUwtTqSe"
}
3.107 phase <--<-- 5 --- Done -->-->
3.107 end
3.108 assertion VerifyAuthnResponse
3.108 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
3.108 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-Registration-policy_uri.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-policy_uri
Test description: Registration with policy_uri
Timestamp: 2018-06-23T10:44:14Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.045 phase <--<-- 1 --- Webfinger -->-->
1.045 not expected to do WebFinger
1.045 phase <--<-- 2 --- Discovery -->-->
1.045 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.126 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.127 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.128 phase <--<-- 3 --- Registration -->-->
1.128 register kwargs:{'application_name': 'OIC test tool', 'policy_uri': 'https://op.certification.openid.net:61353/static/policy.html', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.128 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"policy_uri": "https://op.certification.openid.net:61353/static/policy.html",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#xVh8daa99dmlh3cG"
],
"response_types": [
"code"
]
}
1.287 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.287 RegistrationResponse {
"client_id": "bfd04899-4a3e-4904-ad5c-02a8d24e1245",
"client_secret": "VXXN-IucrFts",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "bfd04899-4a3e-4904-ad5c-02a8d24e1245",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"policy_uri": "https://op.certification.openid.net:61353/static/policy.html",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#xVh8daa99dmlh3cG"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.288 phase <--<-- 4 --- AsyncAuthn -->-->
1.288 AuthorizationRequest {
"client_id": "bfd04899-4a3e-4904-ad5c-02a8d24e1245",
"nonce": "5IIeW3of3OLrs5Xm",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "rMIVdEIadjLsSz6G"
}
1.288 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=bfd04899-4a3e-4904-ad5c-02a8d24e1245&state=rMIVdEIadjLsSz6G&response_type=code&nonce=5IIeW3of3OLrs5Xm
1.288 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=bfd04899-4a3e-4904-ad5c-02a8d24e1245&state=rMIVdEIadjLsSz6G&response_type=code&nonce=5IIeW3of3OLrs5Xm
3.172 response Response URL with query part
3.172 response {'state': 'rMIVdEIadjLsSz6G', 'scope': 'openid', 'code': 'ogKm-YFIGresiJFFJp6nR7wLAJTbHd32L2sPlVflEbI.0i1eVEzn055VTDj1iVarMEbvMadpOxafHt-1i_in59s'}
3.173 response {'state': 'rMIVdEIadjLsSz6G', 'scope': 'openid', 'code': 'ogKm-YFIGresiJFFJp6nR7wLAJTbHd32L2sPlVflEbI.0i1eVEzn055VTDj1iVarMEbvMadpOxafHt-1i_in59s'}
3.173 AuthorizationResponse {
"code": "ogKm-YFIGresiJFFJp6nR7wLAJTbHd32L2sPlVflEbI.0i1eVEzn055VTDj1iVarMEbvMadpOxafHt-1i_in59s",
"scope": "openid",
"state": "rMIVdEIadjLsSz6G"
}
3.173 phase <--<-- 5 --- Done -->-->
3.173 end
3.174 assertion VerifyAuthnResponse
3.174 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
3.174 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-Registration-Sector-Bad.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-Sector-Bad
Test description: Incorrect registration of sector_identifier_uri
Timestamp: 2018-06-23T10:43:29Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Registration -->-->
0.075 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'sector_identifier_uri': 'https://op.certification.openid.net:61353/export/siu.json', 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.075 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#pgLJVctDVerylLpy"
],
"response_types": [
"code"
],
"sector_identifier_uri": "https://op.certification.openid.net:61353/export/siu.json"
}
0.306 http response url:https://oidc-certification.ory.sh:8443/clients status_code:400 message:{"error":"invalid_request","error_description":"The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed","error_hint":"Make sure that the various parameters are correct, be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.","status_code":400,"error_debug":"Redirect URL \"https://op.certification.openid.net:61353/authz_cb\" does not match values from sector_identifier_uri."}
0.307 ErrorResponse {
"error": "invalid_request",
"error_debug": "Redirect URL \"https://op.certification.openid.net:61353/authz_cb\" does not match values from sector_identifier_uri.",
"error_description": "The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed",
"error_hint": "Make sure that the various parameters are correct, be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.",
"status_code": 400
}
0.307 exception RegistrationError:{'error_debug': 'Redirect URL "https://op.certification.openid.net:61353/authz_cb" does not match values from sector_identifier_uri.', 'error_description': 'The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed', 'status_code': 400, 'error': 'invalid_request', 'error_hint': 'Make sure that the various parameters are correct, be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.'}
0.307 event got expected exception RegistrationError
0.307 phase <--<-- 3 --- Done -->-->
0.307 end
0.307 condition Done: status=OK
============================================================
Conditions
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-Registration-tos_uri.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-tos_uri
Test description: Registration with tos_uri
Timestamp: 2018-06-23T10:44:04Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.09 phase <--<-- 1 --- Webfinger -->-->
1.09 not expected to do WebFinger
1.09 phase <--<-- 2 --- Discovery -->-->
1.09 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.172 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.174 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.174 phase <--<-- 3 --- Registration -->-->
1.174 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'tos_uri': 'https://op.certification.openid.net:61353/static/tos.html', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.174 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#7LsDldjXGsu24rqB"
],
"response_types": [
"code"
],
"tos_uri": "https://op.certification.openid.net:61353/static/tos.html"
}
1.329 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.33 RegistrationResponse {
"client_id": "b9f3defb-96fb-4f5f-a4c1-3da0c0b8245f",
"client_secret": "sEJ_Jj149xEj",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "b9f3defb-96fb-4f5f-a4c1-3da0c0b8245f",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#7LsDldjXGsu24rqB"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"tos_uri": "https://op.certification.openid.net:61353/static/tos.html",
"userinfo_signed_response_alg": "none"
}
1.33 phase <--<-- 4 --- AsyncAuthn -->-->
1.331 AuthorizationRequest {
"client_id": "b9f3defb-96fb-4f5f-a4c1-3da0c0b8245f",
"nonce": "sBCJg0CTIeMKEYCo",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "xBj0nldKDfD34aq7"
}
1.331 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=b9f3defb-96fb-4f5f-a4c1-3da0c0b8245f&state=xBj0nldKDfD34aq7&response_type=code&nonce=sBCJg0CTIeMKEYCo
1.331 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=b9f3defb-96fb-4f5f-a4c1-3da0c0b8245f&state=xBj0nldKDfD34aq7&response_type=code&nonce=sBCJg0CTIeMKEYCo
4.773 response Response URL with query part
4.773 response {'state': 'xBj0nldKDfD34aq7', 'scope': 'openid', 'code': 'CnJRaupaStC3ecxsVUrIX_gO4MWYo6ap4sZsIFAPxU4.oXBBjtX8OlXI7KrLbona60PxiazGJYSQvhNeLKlS-rs'}
4.774 response {'state': 'xBj0nldKDfD34aq7', 'scope': 'openid', 'code': 'CnJRaupaStC3ecxsVUrIX_gO4MWYo6ap4sZsIFAPxU4.oXBBjtX8OlXI7KrLbona60PxiazGJYSQvhNeLKlS-rs'}
4.774 AuthorizationResponse {
"code": "CnJRaupaStC3ecxsVUrIX_gO4MWYo6ap4sZsIFAPxU4.oXBBjtX8OlXI7KrLbona60PxiazGJYSQvhNeLKlS-rs",
"scope": "openid",
"state": "xBj0nldKDfD34aq7"
}
4.774 phase <--<-- 5 --- Done -->-->
4.774 end
4.775 assertion VerifyAuthnResponse
4.775 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
4.775 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-Req-acr_values.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-acr_values
Test description: Providing acr_values
Timestamp: 2018-06-23T10:47:54Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.072 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Registration -->-->
0.074 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.074 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#5ofEKGPE4swDCLVE"
],
"response_types": [
"code"
]
}
0.235 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.236 RegistrationResponse {
"client_id": "45fcfb4e-4c2d-4da4-95f7-e6b24f5a96d1",
"client_secret": "8JdoRG7cbXg9",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "45fcfb4e-4c2d-4da4-95f7-e6b24f5a96d1",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#5ofEKGPE4swDCLVE"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.236 phase <--<-- 3 --- AsyncAuthn -->-->
0.237 AuthorizationRequest {
"acr_values": "1 2",
"client_id": "45fcfb4e-4c2d-4da4-95f7-e6b24f5a96d1",
"nonce": "eU8NNDTqE5vMy3JB",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "nbwase0KVlKytapU"
}
0.237 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=45fcfb4e-4c2d-4da4-95f7-e6b24f5a96d1&state=nbwase0KVlKytapU&acr_values=1+2&response_type=code&nonce=eU8NNDTqE5vMy3JB
0.237 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=45fcfb4e-4c2d-4da4-95f7-e6b24f5a96d1&state=nbwase0KVlKytapU&acr_values=1+2&response_type=code&nonce=eU8NNDTqE5vMy3JB
2.425 response Response URL with query part
2.425 response {'state': 'nbwase0KVlKytapU', 'scope': 'openid', 'code': '4EAM2YmrQcMgZdhPslm3OwP8yBCvC3gX24FKqbiDGxw.wfU4oM_1PpAlM-cxYCUSjL-N9MPFqYN3pFMMYp4q7Dw'}
2.426 response {'state': 'nbwase0KVlKytapU', 'scope': 'openid', 'code': '4EAM2YmrQcMgZdhPslm3OwP8yBCvC3gX24FKqbiDGxw.wfU4oM_1PpAlM-cxYCUSjL-N9MPFqYN3pFMMYp4q7Dw'}
2.426 AuthorizationResponse {
"code": "4EAM2YmrQcMgZdhPslm3OwP8yBCvC3gX24FKqbiDGxw.wfU4oM_1PpAlM-cxYCUSjL-N9MPFqYN3pFMMYp4q7Dw",
"scope": "openid",
"state": "nbwase0KVlKytapU"
}
2.426 phase <--<-- 4 --- AccessToken -->-->
2.426 --> request op_args: {'state': 'nbwase0KVlKytapU'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.426 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'nbwase0KVlKytapU', 'code': '4EAM2YmrQcMgZdhPslm3OwP8yBCvC3gX24FKqbiDGxw.wfU4oM_1PpAlM-cxYCUSjL-N9MPFqYN3pFMMYp4q7Dw', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '45fcfb4e-4c2d-4da4-95f7-e6b24f5a96d1'}, 'state': 'nbwase0KVlKytapU'}
2.426 AccessTokenRequest {
"code": "4EAM2YmrQcMgZdhPslm3OwP8yBCvC3gX24FKqbiDGxw.wfU4oM_1PpAlM-cxYCUSjL-N9MPFqYN3pFMMYp4q7Dw",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "nbwase0KVlKytapU"
}
2.426 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.426 request_http_args {'headers': {'Authorization': 'Basic NDVmY2ZiNGUtNGMyZC00ZGE0LTk1ZjctZTZiMjRmNWE5NmQxOjhKZG9SRzdjYlhnOQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.426 request code=4EAM2YmrQcMgZdhPslm3OwP8yBCvC3gX24FKqbiDGxw.wfU4oM_1PpAlM-cxYCUSjL-N9MPFqYN3pFMMYp4q7Dw&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=nbwase0KVlKytapU
2.64 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.641 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhY3IiOiIwIiwiYXVkIjpbIjQ1ZmNmYjRlLTRjMmQtNGRhNC05NWY3LWU2YjI0ZjVhOTZkMSJdLCJhdXRoX3RpbWUiOjE1Mjk3NTA3NDksImV4cCI6MTUyOTc1NDQ3MywiaWF0IjoxNTI5NzUwODczLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJlNGRhNmIwMi05OTRlLTRhNWQtYjMzNy0wYzE5NTI1YTg4NTEiLCJub25jZSI6ImVVOE5ORFRxRTV2TXkzSkIiLCJyYXQiOjE1Mjk3NTA4NzEsInN1YiI6ImZvb0BiYXIuY29tIn0.c2_g5zxoyoWGUv-bQIPhrFGLGQPzEVNHcAzFc7jbTe61hCDWVc44rlm50s8Nq0oCMjLLBRO_OJsoQsC9esXrdY8deNn8tJ0gjpszgf8a17K7g5VhXenRFqTWD0fVIPL8GodWtiBhfSZJSYgrbKt9d_pjntg6oY1Eak9sHQemD4nKF1IZpMOpsWalO-SC0mUhoVcSNpGUtZ-FCkBkRRXUfUCo7fq83Anmr0IMrCzz6abkVJZk_yOpEq7GE8JesnaQeHT28O3l8LEYOJrzoDZmYuue3nXzesyGNd5D_qrK3MECzvLEMcVQOtJA2dzhjiBy3l61sD_vBbE-s40i7wfTixee_hS8N8I6iF2bZpmXO_fySuCHOvheKtIQ6E8fn6RZ0y_J4XitA1QY_yd5hlGeF5HxBx1X0oGAlFqCK2ur6IJ-fABx4NDvokuPEM2R0RS_YY1xbUYzDQoa2Y99CAREeOhppSCXw7m0sRxgMvHvo5iEEHgX4PZFCj72wFXyLQxoJISiabzWRWCiEo_VigK9TsLo45afZMEhOUfshHkO20HQyrBIi6B5LV2KwbEJeBdBYCFdBYUd2-vpi9lU-Mqt9KX3p0D7Gp6-varcIqHH4brXmB7NfySen_okkQZO0LxyRLXY8mKJT5-yIuda1LJ4BvIXUucob1lTulZgtLEEUro', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'DuS8ueyN2zvYCaP1SCamSzNPUkCiNlH4Z8yNsxUCMPQ.wQDN-_MniAoevr1J9-yavV9WY5lEyXxqPBAsRwScHus', 'scope': 'openid'}
2.72 AccessTokenResponse {
"access_token": "DuS8ueyN2zvYCaP1SCamSzNPUkCiNlH4Z8yNsxUCMPQ.wQDN-_MniAoevr1J9-yavV9WY5lEyXxqPBAsRwScHus",
"expires_in": 3599,
"id_token": {
"acr": "0",
"aud": [
"45fcfb4e-4c2d-4da4-95f7-e6b24f5a96d1"
],
"auth_time": 1529750749,
"exp": 1529754473,
"iat": 1529750873,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "e4da6b02-994e-4a5d-b337-0c19525a8851",
"nonce": "eU8NNDTqE5vMy3JB",
"rat": 1529750871,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
2.72 phase <--<-- 5 --- Done -->-->
2.72 end
2.72 assertion VerifyResponse
2.72 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.721 assertion UsedAcrValue
2.721 condition used-acr-value: status=WARNING, message=Used acr value: 0, preferred: ['1', '2'] [The acr value in the ID Token]
2.721 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
used-acr-value: status=WARNING, message=Used acr value: 0, preferred: ['1', '2'] [The acr value in the ID Token]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
Used acr value: 0, preferred: ['1', '2'] |
Text | hydra/internal/certification/C.F.T.T.s/OP-Req-claims_locales.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-claims_locales
Test description: Providing claims_locales
Timestamp: 2018-06-23T10:48:51Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
2.992 phase <--<-- 1 --- Webfinger -->-->
2.992 not expected to do WebFinger
2.992 phase <--<-- 2 --- Discovery -->-->
2.992 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
3.077 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
3.079 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
3.079 phase <--<-- 3 --- Registration -->-->
3.079 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
3.079 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#dqKFhoFEBSQe8hpu"
],
"response_types": [
"code"
]
}
3.268 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
3.269 RegistrationResponse {
"client_id": "eb9588cc-88e5-4207-9241-7df27bdbbcd9",
"client_secret": "Rlp16I6tzwgt",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "eb9588cc-88e5-4207-9241-7df27bdbbcd9",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#dqKFhoFEBSQe8hpu"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
3.269 phase <--<-- 4 --- AsyncAuthn -->-->
3.27 AuthorizationRequest {
"claims_locales": "se",
"client_id": "eb9588cc-88e5-4207-9241-7df27bdbbcd9",
"nonce": "VmzEXEut5GvFGWFR",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "kcQ8nNRmAMUzvLWw"
}
3.27 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=eb9588cc-88e5-4207-9241-7df27bdbbcd9&state=kcQ8nNRmAMUzvLWw&response_type=code&nonce=VmzEXEut5GvFGWFR&claims_locales=se
3.27 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=eb9588cc-88e5-4207-9241-7df27bdbbcd9&state=kcQ8nNRmAMUzvLWw&response_type=code&nonce=VmzEXEut5GvFGWFR&claims_locales=se
6.571 response Response URL with query part
6.572 response {'state': 'kcQ8nNRmAMUzvLWw', 'scope': 'openid', 'code': 'Tq7nqV5Aoj3vp3oLXiXLMJLOwQoWgz9nC8DkP4UHOCk.HUzY9a92LFqD4frV4bxnxFjuQPc0_Lsk6ZODlG6AS5s'}
6.572 response {'state': 'kcQ8nNRmAMUzvLWw', 'scope': 'openid', 'code': 'Tq7nqV5Aoj3vp3oLXiXLMJLOwQoWgz9nC8DkP4UHOCk.HUzY9a92LFqD4frV4bxnxFjuQPc0_Lsk6ZODlG6AS5s'}
6.572 AuthorizationResponse {
"code": "Tq7nqV5Aoj3vp3oLXiXLMJLOwQoWgz9nC8DkP4UHOCk.HUzY9a92LFqD4frV4bxnxFjuQPc0_Lsk6ZODlG6AS5s",
"scope": "openid",
"state": "kcQ8nNRmAMUzvLWw"
}
6.572 phase <--<-- 5 --- AccessToken -->-->
6.573 --> request op_args: {'state': 'kcQ8nNRmAMUzvLWw'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
6.573 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'kcQ8nNRmAMUzvLWw', 'code': 'Tq7nqV5Aoj3vp3oLXiXLMJLOwQoWgz9nC8DkP4UHOCk.HUzY9a92LFqD4frV4bxnxFjuQPc0_Lsk6ZODlG6AS5s', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'eb9588cc-88e5-4207-9241-7df27bdbbcd9'}, 'state': 'kcQ8nNRmAMUzvLWw'}
6.573 AccessTokenRequest {
"code": "Tq7nqV5Aoj3vp3oLXiXLMJLOwQoWgz9nC8DkP4UHOCk.HUzY9a92LFqD4frV4bxnxFjuQPc0_Lsk6ZODlG6AS5s",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "kcQ8nNRmAMUzvLWw"
}
6.573 request_url https://oidc-certification.ory.sh:8443/oauth2/token
6.573 request_http_args {'headers': {'Authorization': 'Basic ZWI5NTg4Y2MtODhlNS00MjA3LTkyNDEtN2RmMjdiZGJiY2Q5OlJscDE2STZ0endndA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
6.573 request code=Tq7nqV5Aoj3vp3oLXiXLMJLOwQoWgz9nC8DkP4UHOCk.HUzY9a92LFqD4frV4bxnxFjuQPc0_Lsk6ZODlG6AS5s&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=kcQ8nNRmAMUzvLWw
6.789 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
6.79 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZWI5NTg4Y2MtODhlNS00MjA3LTkyNDEtN2RmMjdiZGJiY2Q5Il0sImF1dGhfdGltZSI6MTUyOTc1MDc0OSwiZXhwIjoxNTI5NzU0NTMxLCJpYXQiOjE1Mjk3NTA5MzEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjUxZjliMWMxLWZlOGItNGE1OC1hMzViLTQ3ODg4MmFhNDE5YiIsIm5vbmNlIjoiVm16RVhFdXQ1R3ZGR1dGUiIsInJhdCI6MTUyOTc1MDkyOCwic3ViIjoiZm9vQGJhci5jb20ifQ.BBK8rBwBiQIpF2GgNNJWME4D3jCVIZr1ooXI6QTJhNXH2W7PZixS3ljKU_16a-fom1vqZkW4DNtNj5JG9qczLznva8dS9AGNaUuP13v7i1LIoVQS7OFR6SQ5meFIZzshDaumacQTpNOBEZ15cMFb_Rd2GlEQNcsug6Tqdd2TrNlFaTIW-GpJgPvAmfPFv0T-dy4Y69z8FRz5gULp9qU2U6mwKuZAsjWLCcLDZ2-1Il9pN7g8Y7dgGO4V0u7jeiYCyw8EB6Fb8oK0OOU8PO2YoglbNsbI4C8sUcB1tbrcLx9CwpglyxdzWTnWOD1iHH2Azb5Jj84zloIAlsZWctGSy_gOu0XpRjFki9z3uDS9JgJmJmSDoAKFFUQZvHyOngiiYVlTpJVV8_7DOZzJvtIRHiLgX0mGfqKRXA4saVY1eSbD02BNoaM2kvev4iyoirnahMfVQW1pK-7Sf5U1Jz0Wk-cb9ridv-XODZzXk3llI9cKcGOOL3thSVdQrm3ZOUixuwXD_CI8xrQUFhXJVWBEfq0NzTRMihm1gqpwsgDE6PfRnRReuOtBMw8cvMlDbnHaCFcMvdJ3SyUqSOFcQ0Wr4AyyrK_JlYTbCYUBhAkATcnpp3bfoVI_iWnAprIu6j6hsgB5lWAVZHGxVx4o7VB4dGD5gdibvEE-gx1gSINmOdI', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'rbH3lY0AT2P2aqRSf7ve4Vx54Y7uGOGcu_HlKQ123iM.-ljPYmb1xENPMT9LT-1kXz6oQ4h0XLJ5h893a6GBtdQ', 'scope': 'openid'}
7.116 AccessTokenResponse {
"access_token": "rbH3lY0AT2P2aqRSf7ve4Vx54Y7uGOGcu_HlKQ123iM.-ljPYmb1xENPMT9LT-1kXz6oQ4h0XLJ5h893a6GBtdQ",
"expires_in": 3599,
"id_token": {
"aud": [
"eb9588cc-88e5-4207-9241-7df27bdbbcd9"
],
"auth_time": 1529750749,
"exp": 1529754531,
"iat": 1529750931,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "51f9b1c1-fe8b-4a58-a35b-478882aa419b",
"nonce": "VmzEXEut5GvFGWFR",
"rat": 1529750928,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
7.116 phase <--<-- 6 --- UserInfo -->-->
7.116 do_user_info_request kwargs:{'state': 'kcQ8nNRmAMUzvLWw', 'method': 'GET', 'authn_method': 'bearer_header'}
7.117 request {'body': None}
7.117 request_url https://oidc-certification.ory.sh:8443/userinfo
7.117 request_http_args {'headers': {'Authorization': 'Bearer rbH3lY0AT2P2aqRSf7ve4Vx54Y7uGOGcu_HlKQ123iM.-ljPYmb1xENPMT9LT-1kXz6oQ4h0XLJ5h893a6GBtdQ'}}
7.19 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
7.191 OpenIDSchema {
"sub": "[email protected]"
}
7.191 OpenIDSchema {
"sub": "[email protected]"
}
7.191 phase <--<-- 7 --- DisplayUserInfo -->-->
7.191 phase <--<-- 8 --- Done -->-->
7.191 end
7.192 assertion CheckHTTPResponse
7.192 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
7.192 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-Req-id_token_hint.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-id_token_hint
Test description: Using prompt=none with user hint through id_token_hint
Timestamp: 2018-06-23T10:49:15Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.117 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.118 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.118 phase <--<-- 2 --- Registration -->-->
0.118 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.119 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#1WWcE2792QFTeUxF"
],
"response_types": [
"code"
]
}
0.319 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.32 RegistrationResponse {
"client_id": "ff067afc-f729-4ebd-a3c1-52378407deaf",
"client_secret": "pK96NV.d8Re-",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "ff067afc-f729-4ebd-a3c1-52378407deaf",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#1WWcE2792QFTeUxF"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.32 phase <--<-- 3 --- AsyncAuthn -->-->
0.321 AuthorizationRequest {
"client_id": "ff067afc-f729-4ebd-a3c1-52378407deaf",
"nonce": "DCfHCfeJMtDXjewS",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "IvQFjZusTqYXb9X3"
}
0.321 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=ff067afc-f729-4ebd-a3c1-52378407deaf&state=IvQFjZusTqYXb9X3&response_type=code&nonce=DCfHCfeJMtDXjewS
0.321 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=ff067afc-f729-4ebd-a3c1-52378407deaf&state=IvQFjZusTqYXb9X3&response_type=code&nonce=DCfHCfeJMtDXjewS
2.678 response Response URL with query part
2.678 response {'state': 'IvQFjZusTqYXb9X3', 'scope': 'openid', 'code': '3_fwm3bVHIFDqKU5RV_CCtMIlKV1ZMl3hIdAPiMfNBg.LWxWRQfU-HzTSLs8V6voZSDeVLDH25Bzip1-a1zA-AI'}
2.678 response {'state': 'IvQFjZusTqYXb9X3', 'scope': 'openid', 'code': '3_fwm3bVHIFDqKU5RV_CCtMIlKV1ZMl3hIdAPiMfNBg.LWxWRQfU-HzTSLs8V6voZSDeVLDH25Bzip1-a1zA-AI'}
2.679 AuthorizationResponse {
"code": "3_fwm3bVHIFDqKU5RV_CCtMIlKV1ZMl3hIdAPiMfNBg.LWxWRQfU-HzTSLs8V6voZSDeVLDH25Bzip1-a1zA-AI",
"scope": "openid",
"state": "IvQFjZusTqYXb9X3"
}
2.679 phase <--<-- 4 --- AccessToken -->-->
2.679 --> request op_args: {'state': 'IvQFjZusTqYXb9X3'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.679 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'IvQFjZusTqYXb9X3', 'code': '3_fwm3bVHIFDqKU5RV_CCtMIlKV1ZMl3hIdAPiMfNBg.LWxWRQfU-HzTSLs8V6voZSDeVLDH25Bzip1-a1zA-AI', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'ff067afc-f729-4ebd-a3c1-52378407deaf'}, 'state': 'IvQFjZusTqYXb9X3'}
2.679 AccessTokenRequest {
"code": "3_fwm3bVHIFDqKU5RV_CCtMIlKV1ZMl3hIdAPiMfNBg.LWxWRQfU-HzTSLs8V6voZSDeVLDH25Bzip1-a1zA-AI",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "IvQFjZusTqYXb9X3"
}
2.679 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.679 request_http_args {'headers': {'Authorization': 'Basic ZmYwNjdhZmMtZjcyOS00ZWJkLWEzYzEtNTIzNzg0MDdkZWFmOnBLOTZOVi5kOFJlLQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.679 request code=3_fwm3bVHIFDqKU5RV_CCtMIlKV1ZMl3hIdAPiMfNBg.LWxWRQfU-HzTSLs8V6voZSDeVLDH25Bzip1-a1zA-AI&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=IvQFjZusTqYXb9X3
2.937 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.939 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZmYwNjdhZmMtZjcyOS00ZWJkLWEzYzEtNTIzNzg0MDdkZWFmIl0sImF1dGhfdGltZSI6MTUyOTc1MDc0OSwiZXhwIjoxNTI5NzU0NTQ3LCJpYXQiOjE1Mjk3NTA5NDcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImM0ODQ3ZDlkLWUxM2MtNDNlNC1hMTMyLTA2N2RkNDNjNzE3NiIsIm5vbmNlIjoiRENmSENmZUpNdERYamV3UyIsInJhdCI6MTUyOTc1MDk0NSwic3ViIjoiZm9vQGJhci5jb20ifQ.kgcqm3iUGExUECXjrJ9gnJgHbkh69Z0WlDpcjEvicz8RVvYv_04t6DQQPt8L0goot4rQYzNNsL3znktu0yOaSGJ4e8nOdpOFIlB8J9kU9vtZ8xjD2Gt8Rt1eYpIvT619wXSGLbM4Fy3X_XunS8hdMtT_tJhb8nhCOj19JgMOp-_ejaFcHNr3jnvnUsPf0h6Boe6tqsCFEruyamrvkFe0bGzriaylRlhANQcOAgHHUz_ViHRGlJrnRPX3MEZjJQljXirqPKDaG1upJb_-nPxaasc8bYYsVqv-tvPAlRJsLRLcbpsvyyJCEVm8-Wbf28XCJO9jnBAMWAZqO-hYZRTB62tPTTsStlwPkwoAbo_WZRht8SBEJxB4S3zpjrIpQUWsG4kRp6gHg6tVvbPYhAxSq3AiXabUq8tP_17wSO4dJg3EgydtgpbGp50aG38G8_T3R53mbJCINSn95g5cYpghgtb2-y6WQrvsY__oMwxqtMRosIjHU-UFwya4avj_ihh-Ftt1gYuDp6tyN26y6N6DCx1KjXnip3k7VkTs33yRBeCWhjthDfKlY_ahJKgu3OqwW87oyjXFqeLVJ9TmFXzxOEyfFEOH3wV00NyDgopE5QJ1Ei7qtiNBp9ezhv7h1iLEyl2xmlh8eWstRSBxX1NYPVSSOJSfM_2wTQelPO_uvL8', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'rLck6Jqpm8s4VhgnKrx_dukjW6fBsGKfepHibcqBQ7I.Cp_7kFeSwan6NYAetD-jEZuBtac8b2SZrADp_k6Zitg', 'scope': 'openid'}
3.02 AccessTokenResponse {
"access_token": "rLck6Jqpm8s4VhgnKrx_dukjW6fBsGKfepHibcqBQ7I.Cp_7kFeSwan6NYAetD-jEZuBtac8b2SZrADp_k6Zitg",
"expires_in": 3599,
"id_token": {
"aud": [
"ff067afc-f729-4ebd-a3c1-52378407deaf"
],
"auth_time": 1529750749,
"exp": 1529754547,
"iat": 1529750947,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "c4847d9d-e13c-43e4-a132-067dd43c7176",
"nonce": "DCfHCfeJMtDXjewS",
"rat": 1529750945,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.02 phase <--<-- 5 --- AsyncAuthn -->-->
3.021 AuthorizationRequest {
"client_id": "ff067afc-f729-4ebd-a3c1-52378407deaf",
"id_token_hint": "eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZmYwNjdhZmMtZjcyOS00ZWJkLWEzYzEtNTIzNzg0MDdkZWFmIl0sImF1dGhfdGltZSI6MTUyOTc1MDc0OSwiZXhwIjoxNTI5NzU0NTQ3LCJpYXQiOjE1Mjk3NTA5NDcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImM0ODQ3ZDlkLWUxM2MtNDNlNC1hMTMyLTA2N2RkNDNjNzE3NiIsIm5vbmNlIjoiRENmSENmZUpNdERYamV3UyIsInJhdCI6MTUyOTc1MDk0NSwic3ViIjoiZm9vQGJhci5jb20ifQ.kgcqm3iUGExUECXjrJ9gnJgHbkh69Z0WlDpcjEvicz8RVvYv_04t6DQQPt8L0goot4rQYzNNsL3znktu0yOaSGJ4e8nOdpOFIlB8J9kU9vtZ8xjD2Gt8Rt1eYpIvT619wXSGLbM4Fy3X_XunS8hdMtT_tJhb8nhCOj19JgMOp-_ejaFcHNr3jnvnUsPf0h6Boe6tqsCFEruyamrvkFe0bGzriaylRlhANQcOAgHHUz_ViHRGlJrnRPX3MEZjJQljXirqPKDaG1upJb_-nPxaasc8bYYsVqv-tvPAlRJsLRLcbpsvyyJCEVm8-Wbf28XCJO9jnBAMWAZqO-hYZRTB62tPTTsStlwPkwoAbo_WZRht8SBEJxB4S3zpjrIpQUWsG4kRp6gHg6tVvbPYhAxSq3AiXabUq8tP_17wSO4dJg3EgydtgpbGp50aG38G8_T3R53mbJCINSn95g5cYpghgtb2-y6WQrvsY__oMwxqtMRosIjHU-UFwya4avj_ihh-Ftt1gYuDp6tyN26y6N6DCx1KjXnip3k7VkTs33yRBeCWhjthDfKlY_ahJKgu3OqwW87oyjXFqeLVJ9TmFXzxOEyfFEOH3wV00NyDgopE5QJ1Ei7qtiNBp9ezhv7h1iLEyl2xmlh8eWstRSBxX1NYPVSSOJSfM_2wTQelPO_uvL8",
"nonce": "wTR3Yfgt9n5uojPq",
"prompt": [
"none"
],
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "FmSlcEa8rY6NQEHn"
}
3.021 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=ff067afc-f729-4ebd-a3c1-52378407deaf&state=FmSlcEa8rY6NQEHn&id_token_hint=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZmYwNjdhZmMtZjcyOS00ZWJkLWEzYzEtNTIzNzg0MDdkZWFmIl0sImF1dGhfdGltZSI6MTUyOTc1MDc0OSwiZXhwIjoxNTI5NzU0NTQ3LCJpYXQiOjE1Mjk3NTA5NDcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImM0ODQ3ZDlkLWUxM2MtNDNlNC1hMTMyLTA2N2RkNDNjNzE3NiIsIm5vbmNlIjoiRENmSENmZUpNdERYamV3UyIsInJhdCI6MTUyOTc1MDk0NSwic3ViIjoiZm9vQGJhci5jb20ifQ.kgcqm3iUGExUECXjrJ9gnJgHbkh69Z0WlDpcjEvicz8RVvYv_04t6DQQPt8L0goot4rQYzNNsL3znktu0yOaSGJ4e8nOdpOFIlB8J9kU9vtZ8xjD2Gt8Rt1eYpIvT619wXSGLbM4Fy3X_XunS8hdMtT_tJhb8nhCOj19JgMOp-_ejaFcHNr3jnvnUsPf0h6Boe6tqsCFEruyamrvkFe0bGzriaylRlhANQcOAgHHUz_ViHRGlJrnRPX3MEZjJQljXirqPKDaG1upJb_-nPxaasc8bYYsVqv-tvPAlRJsLRLcbpsvyyJCEVm8-Wbf28XCJO9jnBAMWAZqO-hYZRTB62tPTTsStlwPkwoAbo_WZRht8SBEJxB4S3zpjrIpQUWsG4kRp6gHg6tVvbPYhAxSq3AiXabUq8tP_17wSO4dJg3EgydtgpbGp50aG38G8_T3R53mbJCINSn95g5cYpghgtb2-y6WQrvsY__oMwxqtMRosIjHU-UFwya4avj_ihh-Ftt1gYuDp6tyN26y6N6DCx1KjXnip3k7VkTs33yRBeCWhjthDfKlY_ahJKgu3OqwW87oyjXFqeLVJ9TmFXzxOEyfFEOH3wV00NyDgopE5QJ1Ei7qtiNBp9ezhv7h1iLEyl2xmlh8eWstRSBxX1NYPVSSOJSfM_2wTQelPO_uvL8&response_type=code&nonce=wTR3Yfgt9n5uojPq
3.021 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=ff067afc-f729-4ebd-a3c1-52378407deaf&state=FmSlcEa8rY6NQEHn&id_token_hint=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZmYwNjdhZmMtZjcyOS00ZWJkLWEzYzEtNTIzNzg0MDdkZWFmIl0sImF1dGhfdGltZSI6MTUyOTc1MDc0OSwiZXhwIjoxNTI5NzU0NTQ3LCJpYXQiOjE1Mjk3NTA5NDcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImM0ODQ3ZDlkLWUxM2MtNDNlNC1hMTMyLTA2N2RkNDNjNzE3NiIsIm5vbmNlIjoiRENmSENmZUpNdERYamV3UyIsInJhdCI6MTUyOTc1MDk0NSwic3ViIjoiZm9vQGJhci5jb20ifQ.kgcqm3iUGExUECXjrJ9gnJgHbkh69Z0WlDpcjEvicz8RVvYv_04t6DQQPt8L0goot4rQYzNNsL3znktu0yOaSGJ4e8nOdpOFIlB8J9kU9vtZ8xjD2Gt8Rt1eYpIvT619wXSGLbM4Fy3X_XunS8hdMtT_tJhb8nhCOj19JgMOp-_ejaFcHNr3jnvnUsPf0h6Boe6tqsCFEruyamrvkFe0bGzriaylRlhANQcOAgHHUz_ViHRGlJrnRPX3MEZjJQljXirqPKDaG1upJb_-nPxaasc8bYYsVqv-tvPAlRJsLRLcbpsvyyJCEVm8-Wbf28XCJO9jnBAMWAZqO-hYZRTB62tPTTsStlwPkwoAbo_WZRht8SBEJxB4S3zpjrIpQUWsG4kRp6gHg6tVvbPYhAxSq3AiXabUq8tP_17wSO4dJg3EgydtgpbGp50aG38G8_T3R53mbJCINSn95g5cYpghgtb2-y6WQrvsY__oMwxqtMRosIjHU-UFwya4avj_ihh-Ftt1gYuDp6tyN26y6N6DCx1KjXnip3k7VkTs33yRBeCWhjthDfKlY_ahJKgu3OqwW87oyjXFqeLVJ9TmFXzxOEyfFEOH3wV00NyDgopE5QJ1Ei7qtiNBp9ezhv7h1iLEyl2xmlh8eWstRSBxX1NYPVSSOJSfM_2wTQelPO_uvL8&response_type=code&nonce=wTR3Yfgt9n5uojPq
10.565 response Response URL with query part
10.565 response {'state': 'FmSlcEa8rY6NQEHn', 'scope': 'openid', 'code': 'lw8ZcvVYO7oxVR_dYuvk36uoLA-NTTImmKvTldXWWjQ.EIwo2mjKW3pnrs8PX2W8ewtUn64RyKkc_6Ahm_QVbrs'}
10.565 response {'state': 'FmSlcEa8rY6NQEHn', 'scope': 'openid', 'code': 'lw8ZcvVYO7oxVR_dYuvk36uoLA-NTTImmKvTldXWWjQ.EIwo2mjKW3pnrs8PX2W8ewtUn64RyKkc_6Ahm_QVbrs'}
10.566 AuthorizationResponse {
"code": "lw8ZcvVYO7oxVR_dYuvk36uoLA-NTTImmKvTldXWWjQ.EIwo2mjKW3pnrs8PX2W8ewtUn64RyKkc_6Ahm_QVbrs",
"scope": "openid",
"state": "FmSlcEa8rY6NQEHn"
}
10.566 phase <--<-- 6 --- AccessToken -->-->
10.566 --> request op_args: {'state': 'FmSlcEa8rY6NQEHn'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
10.566 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'FmSlcEa8rY6NQEHn', 'code': 'lw8ZcvVYO7oxVR_dYuvk36uoLA-NTTImmKvTldXWWjQ.EIwo2mjKW3pnrs8PX2W8ewtUn64RyKkc_6Ahm_QVbrs', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'ff067afc-f729-4ebd-a3c1-52378407deaf'}, 'state': 'FmSlcEa8rY6NQEHn'}
10.566 AccessTokenRequest {
"code": "lw8ZcvVYO7oxVR_dYuvk36uoLA-NTTImmKvTldXWWjQ.EIwo2mjKW3pnrs8PX2W8ewtUn64RyKkc_6Ahm_QVbrs",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "FmSlcEa8rY6NQEHn"
}
10.566 request_url https://oidc-certification.ory.sh:8443/oauth2/token
10.566 request_http_args {'headers': {'Authorization': 'Basic ZmYwNjdhZmMtZjcyOS00ZWJkLWEzYzEtNTIzNzg0MDdkZWFmOnBLOTZOVi5kOFJlLQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
10.566 request code=lw8ZcvVYO7oxVR_dYuvk36uoLA-NTTImmKvTldXWWjQ.EIwo2mjKW3pnrs8PX2W8ewtUn64RyKkc_6Ahm_QVbrs&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=FmSlcEa8rY6NQEHn
10.796 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
10.797 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZmYwNjdhZmMtZjcyOS00ZWJkLWEzYzEtNTIzNzg0MDdkZWFmIl0sImF1dGhfdGltZSI6MTUyOTc1MDc0OSwiZXhwIjoxNTI5NzU0NTU1LCJpYXQiOjE1Mjk3NTA5NTUsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImQzNDYxNDI4LWU2ZjgtNGU3Ny1hYTMyLThkNDAwNjg4ZmUzMiIsIm5vbmNlIjoid1RSM1lmZ3Q5bjV1b2pQcSIsInJhdCI6MTUyOTc1MDk0OCwic3ViIjoiZm9vQGJhci5jb20ifQ.Zh1KpuHVpRg90sXaPbs7dzvSHkgBKYtMTBLJMzh1C0adyTEyZsmCt-OwI1xojHhHu8qMXqLej8PqdcclGsAGlOs-abllxrRQQuqD_a-ohzq3J9qKelJLjo7fApjtRHSoQwB8WCyKJ8eIudAxjvQg1CyQekpfzl9RudPp-0bhfnV_VPZP_Ez_nK-VcFqHsBnkhdeJ-ZtmBqW4qZGoZX3JdB9-DB8bkw6wQSmJ1dd4dHzxgZZU5v-p3GLYh1_nZc45CVfulmYIv3Di5gUkmrp3zoPzosfjSM--MKbaL4GT73tqGCGTJD5PM-kRdHZ8T066-LGcWlu5KBxLTTvDDMMJlXlYvG04m4bzc4Oy3qAnXMIXoFilOKOOuQZpyuZW0DGzagSXlMnx5JKvmlpay_dTfFKknoLDcy_rT6Tutb7usUpa8MsW3dgHMXjCroH6Me3rqM4Q9VyBnRReYq0vGKo2Ad_pr2DvBS9UtpcIkTOAT4rjZVh1qRCf0doSqxaJLJAkjcGFrih0-q_0YxRX8GIgPJN8XoAcyFuk7oxxXQztbgLBmBK5KXYPIAHZXIplKimteLQmQoyjama0fdyVqqC9pLaEhvp1HrmTdJMV_M5e7XI9jV1nzURl6kIGN5wmGGfxpXoYjPkXr-kZKAooN8YZ4RNX4oEVhDiDDBhJPQ8-afo', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'oOzUA99d7m5oDwL3Z-ZohMfRCVxzrbumQ7JV5qEjh6I.wQ4KIyfovk4GD-QG8gjfVISPmGtymYqKW_Z4IDK9aTE', 'scope': 'openid'}
10.801 AccessTokenResponse {
"access_token": "oOzUA99d7m5oDwL3Z-ZohMfRCVxzrbumQ7JV5qEjh6I.wQ4KIyfovk4GD-QG8gjfVISPmGtymYqKW_Z4IDK9aTE",
"expires_in": 3599,
"id_token": {
"aud": [
"ff067afc-f729-4ebd-a3c1-52378407deaf"
],
"auth_time": 1529750749,
"exp": 1529754555,
"iat": 1529750955,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "d3461428-e6f8-4e77-aa32-8d400688fe32",
"nonce": "wTR3Yfgt9n5uojPq",
"rat": 1529750948,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
10.801 phase <--<-- 7 --- Done -->-->
10.801 end
10.801 assertion VerifyResponse
10.801 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
10.802 assertion SameAuthn
10.802 condition same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
10.802 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-Req-login_hint.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-login_hint
Test description: Providing login_hint
Timestamp: 2018-06-23T10:49:23Z
============================================================
Trace output
0.0 phase <--<-- 0 --- VerifyConfiguration -->-->
0.0 phase <--<-- 1 --- Note -->-->
1.343 phase <--<-- 2 --- Webfinger -->-->
1.343 not expected to do WebFinger
1.343 phase <--<-- 3 --- Discovery -->-->
1.343 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.425 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.427 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.427 phase <--<-- 4 --- Registration -->-->
1.427 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.427 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#xKydLDc8jeSHuwnb"
],
"response_types": [
"code"
]
}
1.62 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.621 RegistrationResponse {
"client_id": "e26c0a67-8f52-4ce7-a07c-9eac7d27ce20",
"client_secret": "-Bpt7NDuIHs3",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "e26c0a67-8f52-4ce7-a07c-9eac7d27ce20",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#xKydLDc8jeSHuwnb"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.621 phase <--<-- 5 --- AsyncAuthn -->-->
1.621 AuthorizationRequest {
"client_id": "e26c0a67-8f52-4ce7-a07c-9eac7d27ce20",
"login_hint": "[email protected]",
"nonce": "rviIHKFwvI5A9nUc",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "2o88jse9euiKGexb"
}
1.621 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=e26c0a67-8f52-4ce7-a07c-9eac7d27ce20&state=2o88jse9euiKGexb&response_type=code&nonce=rviIHKFwvI5A9nUc&login_hint=foo%40bar.com
1.622 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=e26c0a67-8f52-4ce7-a07c-9eac7d27ce20&state=2o88jse9euiKGexb&response_type=code&nonce=rviIHKFwvI5A9nUc&login_hint=foo%40bar.com
5.51 response Response URL with query part
5.51 response {'state': '2o88jse9euiKGexb', 'scope': 'openid', 'code': '-5syrbZX5UKD0Sa4YDoWb4aTzw0K40aNMV5mCL65-E0.4q3iNhJpRRp9JZueXI6vzNZ71F1UUbcFkFp_XM9j76Q'}
5.51 response {'state': '2o88jse9euiKGexb', 'scope': 'openid', 'code': '-5syrbZX5UKD0Sa4YDoWb4aTzw0K40aNMV5mCL65-E0.4q3iNhJpRRp9JZueXI6vzNZ71F1UUbcFkFp_XM9j76Q'}
5.511 AuthorizationResponse {
"code": "-5syrbZX5UKD0Sa4YDoWb4aTzw0K40aNMV5mCL65-E0.4q3iNhJpRRp9JZueXI6vzNZ71F1UUbcFkFp_XM9j76Q",
"scope": "openid",
"state": "2o88jse9euiKGexb"
}
5.511 phase <--<-- 6 --- Done -->-->
5.511 end
5.511 assertion VerifyAuthnResponse
5.511 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
5.511 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-Req-max_age=1.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-max_age=1
Test description: Requesting ID Token with max_age=1 seconds restriction
Timestamp: 2018-06-23T10:49:38Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.074 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Registration -->-->
0.076 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.076 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#5p0CJ2XQgHjSje1d"
],
"response_types": [
"code"
]
}
0.271 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.272 RegistrationResponse {
"client_id": "a942a48d-32e0-47a3-8894-e6c985d8fe06",
"client_secret": "frX3DqqBfdu2",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "a942a48d-32e0-47a3-8894-e6c985d8fe06",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#5p0CJ2XQgHjSje1d"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.272 phase <--<-- 3 --- AsyncAuthn -->-->
0.273 AuthorizationRequest {
"client_id": "a942a48d-32e0-47a3-8894-e6c985d8fe06",
"nonce": "e5FGaAkgppTjT3F5",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "12ub9oMq3s0bvvRk"
}
0.273 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=a942a48d-32e0-47a3-8894-e6c985d8fe06&state=12ub9oMq3s0bvvRk&response_type=code&nonce=e5FGaAkgppTjT3F5
0.273 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=a942a48d-32e0-47a3-8894-e6c985d8fe06&state=12ub9oMq3s0bvvRk&response_type=code&nonce=e5FGaAkgppTjT3F5
4.564 response Response URL with query part
4.565 response {'state': '12ub9oMq3s0bvvRk', 'scope': 'openid', 'code': 'jXWgT00mZ3E3EpzWOywxD4IxCFu4HRvNQSC3IpJAaLM.L1Nc0O6UNu-olrzB9IP5Aehqia4PBC6ogTFxt6W-85g'}
4.565 response {'state': '12ub9oMq3s0bvvRk', 'scope': 'openid', 'code': 'jXWgT00mZ3E3EpzWOywxD4IxCFu4HRvNQSC3IpJAaLM.L1Nc0O6UNu-olrzB9IP5Aehqia4PBC6ogTFxt6W-85g'}
4.565 AuthorizationResponse {
"code": "jXWgT00mZ3E3EpzWOywxD4IxCFu4HRvNQSC3IpJAaLM.L1Nc0O6UNu-olrzB9IP5Aehqia4PBC6ogTFxt6W-85g",
"scope": "openid",
"state": "12ub9oMq3s0bvvRk"
}
4.566 phase <--<-- 4 --- AccessToken -->-->
4.566 --> request op_args: {'state': '12ub9oMq3s0bvvRk'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
4.566 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': '12ub9oMq3s0bvvRk', 'code': 'jXWgT00mZ3E3EpzWOywxD4IxCFu4HRvNQSC3IpJAaLM.L1Nc0O6UNu-olrzB9IP5Aehqia4PBC6ogTFxt6W-85g', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'a942a48d-32e0-47a3-8894-e6c985d8fe06'}, 'state': '12ub9oMq3s0bvvRk'}
4.566 AccessTokenRequest {
"code": "jXWgT00mZ3E3EpzWOywxD4IxCFu4HRvNQSC3IpJAaLM.L1Nc0O6UNu-olrzB9IP5Aehqia4PBC6ogTFxt6W-85g",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "12ub9oMq3s0bvvRk"
}
4.566 request_url https://oidc-certification.ory.sh:8443/oauth2/token
4.566 request_http_args {'headers': {'Authorization': 'Basic YTk0MmE0OGQtMzJlMC00N2EzLTg4OTQtZTZjOTg1ZDhmZTA2OmZyWDNEcXFCZmR1Mg==', 'Content-Type': 'application/x-www-form-urlencoded'}}
4.566 request code=jXWgT00mZ3E3EpzWOywxD4IxCFu4HRvNQSC3IpJAaLM.L1Nc0O6UNu-olrzB9IP5Aehqia4PBC6ogTFxt6W-85g&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=12ub9oMq3s0bvvRk
4.78 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
4.781 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYTk0MmE0OGQtMzJlMC00N2EzLTg4OTQtZTZjOTg1ZDhmZTA2Il0sImF1dGhfdGltZSI6MTUyOTc1MDc0OSwiZXhwIjoxNTI5NzU0NTcwLCJpYXQiOjE1Mjk3NTA5NzAsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImQ3ZGM1ZTc2LThjNjMtNGNlMS05ZGQxLTUxZDNlZjBkNzg4NiIsIm5vbmNlIjoiZTVGR2FBa2dwcFRqVDNGNSIsInJhdCI6MTUyOTc1MDk2Niwic3ViIjoiZm9vQGJhci5jb20ifQ.hKV80K9doYK7tTefsUOkJP6f7gg99XV4jMrI_8h3YFxPz2nEFFBR-xNQlWS-pvHnoBsd3KUu5iW41oTh51uk3rK50TDNhST-A2TfBxiRS6zwVc9C0khw7Ven2thUsCTOg3uY9tB7L2WgfMx48aLc9eiSworfQapzclEKMgP0LbRilh2QepHl3ot5DvbxekVK0Wr01nrWs7f9s2w5LxPqxZmM-ZEYge0ZtFE0BKuJw0rCfgV2IbJ511cZ5vNVXVn1cwnUuqve-8PvzoW3qk1hdWkyDbfUdiyykZTUfx1-oJ2gFYFwXrF4lx2KGzEA74FvXLAny3HAtfJP870IGpgtxKBvLFjO0oWLEn2vGHXQznwQ_4zxb1WcAIvSsvzIpETRuEuOSVRQd3TRwTEtaS9Pss475rovVjT4OV0VeueaVttGJ-DNmGp7njD3mercaXmscZe4dQKMEYh0v-ZYOSuZ6SBDYgxqB-5e0pBeXCbgYAUitp4PwasoSHnGxAlvlnp-vg780bXKFzLpgr2AZkPIUh5hiWUtaTIvxXtbvJK9dm27euX8YHWHUS10FFRVOtrnEk66bjBbd4YfYODLLO0bju7_2MF32AJLiIVWOj6r7mb76Cn4jVxntDnS9tLwF_cwKzK_a1lSemPRCl_oXFX1OCaH64VD3-gGHTWafjdN1II', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'eIsiutoh_Sceq_OKu80E-Uw82v_vHSEuxvQv70tyI2g.l41YozrJdQfmyjdgr8aOEJQhidrHxXIQZvbJTiKEnz8', 'scope': 'openid'}
4.897 AccessTokenResponse {
"access_token": "eIsiutoh_Sceq_OKu80E-Uw82v_vHSEuxvQv70tyI2g.l41YozrJdQfmyjdgr8aOEJQhidrHxXIQZvbJTiKEnz8",
"expires_in": 3599,
"id_token": {
"aud": [
"a942a48d-32e0-47a3-8894-e6c985d8fe06"
],
"auth_time": 1529750749,
"exp": 1529754570,
"iat": 1529750970,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "d7dc5e76-8c63-4ce1-9dd1-51d3ef0d7886",
"nonce": "e5FGaAkgppTjT3F5",
"rat": 1529750966,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
4.897 phase <--<-- 5 --- Note -->-->
6.952 phase <--<-- 6 --- Webfinger -->-->
6.952 not expected to do WebFinger
6.952 phase <--<-- 7 --- Discovery -->-->
6.952 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
7.04 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
7.041 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
7.041 phase <--<-- 8 --- Registration -->-->
7.041 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
7.042 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#R6uysB49cR0gilVk"
],
"response_types": [
"code"
]
}
7.2 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
7.201 RegistrationResponse {
"client_id": "5e6298c0-5621-4d0e-bcbb-4ec21b2ba554",
"client_secret": "hWW-Grw39Qwe",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "5e6298c0-5621-4d0e-bcbb-4ec21b2ba554",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#R6uysB49cR0gilVk"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
7.201 phase <--<-- 9 --- AsyncAuthn -->-->
7.202 AuthorizationRequest {
"client_id": "5e6298c0-5621-4d0e-bcbb-4ec21b2ba554",
"max_age": 1,
"nonce": "Ld7AQn5QDAHvconQ",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "Qho0A3keI70Da9QM"
}
7.202 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?max_age=1&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=5e6298c0-5621-4d0e-bcbb-4ec21b2ba554&state=Qho0A3keI70Da9QM&response_type=code&nonce=Ld7AQn5QDAHvconQ
7.202 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?max_age=1&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=5e6298c0-5621-4d0e-bcbb-4ec21b2ba554&state=Qho0A3keI70Da9QM&response_type=code&nonce=Ld7AQn5QDAHvconQ
12.034 response Response URL with query part
12.035 response {'state': 'Qho0A3keI70Da9QM', 'scope': 'openid', 'code': 'Wgq7bfvH9KKez90eGhC2a4ruwq4WaWX0CAvGUgiJMIU.QeZU8jDQRKw530vQY8LQJV_2QDJxD7IQreHqBFsmo5g'}
12.036 response {'state': 'Qho0A3keI70Da9QM', 'scope': 'openid', 'code': 'Wgq7bfvH9KKez90eGhC2a4ruwq4WaWX0CAvGUgiJMIU.QeZU8jDQRKw530vQY8LQJV_2QDJxD7IQreHqBFsmo5g'}
12.036 AuthorizationResponse {
"code": "Wgq7bfvH9KKez90eGhC2a4ruwq4WaWX0CAvGUgiJMIU.QeZU8jDQRKw530vQY8LQJV_2QDJxD7IQreHqBFsmo5g",
"scope": "openid",
"state": "Qho0A3keI70Da9QM"
}
12.036 phase <--<-- 10 --- AccessToken -->-->
12.036 --> request op_args: {'state': 'Qho0A3keI70Da9QM'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
12.036 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'Qho0A3keI70Da9QM', 'code': 'Wgq7bfvH9KKez90eGhC2a4ruwq4WaWX0CAvGUgiJMIU.QeZU8jDQRKw530vQY8LQJV_2QDJxD7IQreHqBFsmo5g', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '5e6298c0-5621-4d0e-bcbb-4ec21b2ba554'}, 'state': 'Qho0A3keI70Da9QM'}
12.036 AccessTokenRequest {
"code": "Wgq7bfvH9KKez90eGhC2a4ruwq4WaWX0CAvGUgiJMIU.QeZU8jDQRKw530vQY8LQJV_2QDJxD7IQreHqBFsmo5g",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "Qho0A3keI70Da9QM"
}
12.036 request_url https://oidc-certification.ory.sh:8443/oauth2/token
12.036 request_http_args {'headers': {'Authorization': 'Basic NWU2Mjk4YzAtNTYyMS00ZDBlLWJjYmItNGVjMjFiMmJhNTU0OmhXVy1HcnczOVF3ZQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
12.036 request code=Wgq7bfvH9KKez90eGhC2a4ruwq4WaWX0CAvGUgiJMIU.QeZU8jDQRKw530vQY8LQJV_2QDJxD7IQreHqBFsmo5g&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=Qho0A3keI70Da9QM
12.247 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
12.248 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNWU2Mjk4YzAtNTYyMS00ZDBlLWJjYmItNGVjMjFiMmJhNTU0Il0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiZXhwIjoxNTI5NzU0NTc3LCJpYXQiOjE1Mjk3NTA5NzcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjM2NmIwYmNhLWU2ZDgtNGM5ZS04MjVlLTNiMWI5M2ZkMzcwNiIsIm5vbmNlIjoiTGQ3QVFuNVFEQUh2Y29uUSIsInJhdCI6MTUyOTc1MDk3Mywic3ViIjoiZm9vQGJhci5jb20ifQ.cBJzzWyO7BJRalw2Ibu1okWzxH3sIYaQ22CKjb500HFggIJLcRWyscIkPerV8ZMGCimD0vY1ul6hT5OEaSTejN3ZRLOewP8MwRvBw36fGh6JujP_tn6yW3EKGdt1X1JHGlLBsuvpHlzyVMA5AcCRIZb2t8dYGtu0wpAdP1VfLsac_omeEKUntlK47vi_KLLMwgjfP4S1U94kugm7J7cs7RYmUOECEYNc7irOGDLLqv5GMWKu2aHuqOLcuIAQeJ1Aukdx__8343caUvuhzOMv9jN4QIBkzdYgU6dZJ4Y4Ii3r7H6ZIwaqFkHhYrnwj3dLTslna4P2m6B0urUs0UUekZe6UHKVyszdBhV2AAmRL40SFOQ4KFOmbx4cATXA8SN8FFTU_Wr-w6MgoKWgCqVDUrPexEVJYTtWyT9r1HsgeiyBzlUm201XX3FVwYzg_4D-mZkRD0ZCOYMZTajYz4mYm0e8QYPTj3Ka824zR62XeN9zBO2FyJIRihSptxLPLd0Qr-__gULP_mXNCXL5g3WLcyrG1jVY3dRvWbNqUc4Pd-D8pQrrMbbXmNzSbP7TKHeq6MI1AaXQ5AWcnhKKNq0BRckoCYc4YVffqo9G9zRPcpIHcycUSr0oUy5_MP6uNLg6IIZlzWdtVJ8gyn1k0RO4cntFcp0FLGOQRqLHOHDchF8', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': '3RaT6JkREXBXGu7ksZPmH5iKngTggPPObWOib7OCs1I.44E8ZS_kXK43CB3ptK6j80VA75maDGW_5ifmBBrlvE0', 'scope': 'openid'}
12.252 AccessTokenResponse {
"access_token": "3RaT6JkREXBXGu7ksZPmH5iKngTggPPObWOib7OCs1I.44E8ZS_kXK43CB3ptK6j80VA75maDGW_5ifmBBrlvE0",
"expires_in": 3599,
"id_token": {
"aud": [
"5e6298c0-5621-4d0e-bcbb-4ec21b2ba554"
],
"auth_time": 1529750975,
"exp": 1529754577,
"iat": 1529750977,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "366b0bca-e6d8-4c9e-825e-3b1b93fd3706",
"nonce": "Ld7AQn5QDAHvconQ",
"rat": 1529750973,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
12.252 phase <--<-- 11 --- Done -->-->
12.252 end
12.252 assertion AuthTimeCheck
12.252 condition auth_time-check: status=OK [Check that the auth_time returned in the ID Token is in the expected range.]
12.253 assertion VerifyResponse
12.253 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
12.253 assertion ClaimsCheck
12.253 condition claims-check: status=OK [Checks if specific claims is present or not]
12.254 assertion MultipleSignOn
12.254 condition multiple-sign-on: status=OK [Verifies that multiple authentications was used in the flow]
12.254 condition Done: status=OK
============================================================
Conditions
auth_time-check: status=OK [Check that the auth_time returned in the ID Token is in the expected range.]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
claims-check: status=OK [Checks if specific claims is present or not]
multiple-sign-on: status=OK [Verifies that multiple authentications was used in the flow]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-Req-max_age=10000.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-max_age=10000
Test description: Requesting ID Token with max_age=10000 seconds restriction
Timestamp: 2018-06-23T10:49:44Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.075 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.076 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.076 phase <--<-- 2 --- Registration -->-->
0.076 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.077 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#DXuQUZ3bXuPFPvU4"
],
"response_types": [
"code"
]
}
0.232 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.233 RegistrationResponse {
"client_id": "70cccb54-e0f4-4299-a099-f2975a3fcf5b",
"client_secret": "zFXlj9CwVdS-",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "70cccb54-e0f4-4299-a099-f2975a3fcf5b",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#DXuQUZ3bXuPFPvU4"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.233 phase <--<-- 3 --- AsyncAuthn -->-->
0.234 AuthorizationRequest {
"client_id": "70cccb54-e0f4-4299-a099-f2975a3fcf5b",
"nonce": "DV8BFYgpi39cIokJ",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "j1NsamVKz6wIzlW9"
}
0.234 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=70cccb54-e0f4-4299-a099-f2975a3fcf5b&state=j1NsamVKz6wIzlW9&response_type=code&nonce=DV8BFYgpi39cIokJ
0.234 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=70cccb54-e0f4-4299-a099-f2975a3fcf5b&state=j1NsamVKz6wIzlW9&response_type=code&nonce=DV8BFYgpi39cIokJ
2.96 response Response URL with query part
2.96 response {'state': 'j1NsamVKz6wIzlW9', 'scope': 'openid', 'code': 'l4166QgxrsPnK3EbJGb9youJsnHbIeqY2LQvM6HXkfw.Rr9fgSuxDf0jCMikWr9lIEC4xF12AyDI_k1QzsHg9Tc'}
2.96 response {'state': 'j1NsamVKz6wIzlW9', 'scope': 'openid', 'code': 'l4166QgxrsPnK3EbJGb9youJsnHbIeqY2LQvM6HXkfw.Rr9fgSuxDf0jCMikWr9lIEC4xF12AyDI_k1QzsHg9Tc'}
2.961 AuthorizationResponse {
"code": "l4166QgxrsPnK3EbJGb9youJsnHbIeqY2LQvM6HXkfw.Rr9fgSuxDf0jCMikWr9lIEC4xF12AyDI_k1QzsHg9Tc",
"scope": "openid",
"state": "j1NsamVKz6wIzlW9"
}
2.961 phase <--<-- 4 --- AccessToken -->-->
2.961 --> request op_args: {'state': 'j1NsamVKz6wIzlW9'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.961 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'j1NsamVKz6wIzlW9', 'code': 'l4166QgxrsPnK3EbJGb9youJsnHbIeqY2LQvM6HXkfw.Rr9fgSuxDf0jCMikWr9lIEC4xF12AyDI_k1QzsHg9Tc', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '70cccb54-e0f4-4299-a099-f2975a3fcf5b'}, 'state': 'j1NsamVKz6wIzlW9'}
2.961 AccessTokenRequest {
"code": "l4166QgxrsPnK3EbJGb9youJsnHbIeqY2LQvM6HXkfw.Rr9fgSuxDf0jCMikWr9lIEC4xF12AyDI_k1QzsHg9Tc",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "j1NsamVKz6wIzlW9"
}
2.961 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.961 request_http_args {'headers': {'Authorization': 'Basic NzBjY2NiNTQtZTBmNC00Mjk5LWEwOTktZjI5NzVhM2ZjZjViOnpGWGxqOUN3VmRTLQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.961 request code=l4166QgxrsPnK3EbJGb9youJsnHbIeqY2LQvM6HXkfw.Rr9fgSuxDf0jCMikWr9lIEC4xF12AyDI_k1QzsHg9Tc&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=j1NsamVKz6wIzlW9
3.22 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.221 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNzBjY2NiNTQtZTBmNC00Mjk5LWEwOTktZjI5NzVhM2ZjZjViIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiZXhwIjoxNTI5NzU0NTgyLCJpYXQiOjE1Mjk3NTA5ODIsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImI4MTkxZjEyLWZmMzktNDhhOC1hNjg5LTI0MDgyMmM4ZjJhNSIsIm5vbmNlIjoiRFY4QkZZZ3BpMzljSW9rSiIsInJhdCI6MTUyOTc1MDk3OSwic3ViIjoiZm9vQGJhci5jb20ifQ.bBpHTeHACkHQZBhs2Q9J5x0TfOmSpH3rOlm3BxclV8F12b_6gBVfiPC6vcH4JQwTyS1Ouo4lCfcdIyxnuUjF7n0N6gvuZdbjUfoXbVZ2SGu7_PwZChFRWC_ErNaiDSP9ZRdvElD3yL72pgQSLopT1RiLbgCIyJTsqES6YsYs3nmwz3vDwoD0Ru0WRAOa_NiMBrmLP9ekQw9b0wHs6OlYcJ03UzVarfTp9EEmdAgkNhSfbvb2NmuxtpaF8xDOEg5iAZhRBfHKwckKtBkO4Jf8XiNfImqWh06UgSu916JzRfGxRbSvpHOeXYcW4BLyYv__v4CbcpT_nB6xe9LT7WCbshJ4FPN05ORjK9IX2MD0cgb_OXFZV_UMnMcM1A9YZLRsVHjliZyw30mXFjDhMxdPmB9JZywnSsqW5okGcoAyQGQFitn38qh1IIkDl7AnAe0mhUDI7S8hGo3efpfZfR6sQi6NZWPXUZm5TfVsRKpBUfIDD76KIxKXW2Yaqyw96AsJK2CJFB_Ao9K7Nay2fEWYc2PautExwQBaDn2uVqJlOeV38kMOPesA2qELQaCN3ou4fTnJIuej79xTFbrx-POQiDlXQpvfJuAkMBVPpbENqHwLVOpaJlNKpGpTuYDtanRp8mCJyMBKuA7C2BjQ8neKB4R3RiVIA289ofvbI0zdKmw', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'Qts-uQQqOOTjwpkwJGOVDRWn5wsysUSlj_urWCkv2gc.JsG9HriNfIzYmPOYC3ycJZH5bwFV9FHTBn2lbr993Ks', 'scope': 'openid'}
3.299 AccessTokenResponse {
"access_token": "Qts-uQQqOOTjwpkwJGOVDRWn5wsysUSlj_urWCkv2gc.JsG9HriNfIzYmPOYC3ycJZH5bwFV9FHTBn2lbr993Ks",
"expires_in": 3599,
"id_token": {
"aud": [
"70cccb54-e0f4-4299-a099-f2975a3fcf5b"
],
"auth_time": 1529750975,
"exp": 1529754582,
"iat": 1529750982,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "b8191f12-ff39-48a8-a689-240822c8f2a5",
"nonce": "DV8BFYgpi39cIokJ",
"rat": 1529750979,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.299 phase <--<-- 5 --- AsyncAuthn -->-->
3.3 AuthorizationRequest {
"client_id": "70cccb54-e0f4-4299-a099-f2975a3fcf5b",
"max_age": 10000,
"nonce": "pCda3IRJ4cGzulp0",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "JAX1SGm3GQFzTDpk"
}
3.3 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?max_age=10000&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=70cccb54-e0f4-4299-a099-f2975a3fcf5b&state=JAX1SGm3GQFzTDpk&response_type=code&nonce=pCda3IRJ4cGzulp0
3.3 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?max_age=10000&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=70cccb54-e0f4-4299-a099-f2975a3fcf5b&state=JAX1SGm3GQFzTDpk&response_type=code&nonce=pCda3IRJ4cGzulp0
4.977 response Response URL with query part
4.977 response {'state': 'JAX1SGm3GQFzTDpk', 'scope': 'openid', 'code': 'W_5QuSN7YDwP3j7FJKptV26vGdhNOrIXrHD-XaEhWPE.mLt8BexOYI2kZjI7cd-a9AbsDs4MDSq7IirB1vPRXAk'}
4.977 response {'state': 'JAX1SGm3GQFzTDpk', 'scope': 'openid', 'code': 'W_5QuSN7YDwP3j7FJKptV26vGdhNOrIXrHD-XaEhWPE.mLt8BexOYI2kZjI7cd-a9AbsDs4MDSq7IirB1vPRXAk'}
4.978 AuthorizationResponse {
"code": "W_5QuSN7YDwP3j7FJKptV26vGdhNOrIXrHD-XaEhWPE.mLt8BexOYI2kZjI7cd-a9AbsDs4MDSq7IirB1vPRXAk",
"scope": "openid",
"state": "JAX1SGm3GQFzTDpk"
}
4.978 phase <--<-- 6 --- AccessToken -->-->
4.978 --> request op_args: {'state': 'JAX1SGm3GQFzTDpk'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
4.978 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'JAX1SGm3GQFzTDpk', 'code': 'W_5QuSN7YDwP3j7FJKptV26vGdhNOrIXrHD-XaEhWPE.mLt8BexOYI2kZjI7cd-a9AbsDs4MDSq7IirB1vPRXAk', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '70cccb54-e0f4-4299-a099-f2975a3fcf5b'}, 'state': 'JAX1SGm3GQFzTDpk'}
4.978 AccessTokenRequest {
"code": "W_5QuSN7YDwP3j7FJKptV26vGdhNOrIXrHD-XaEhWPE.mLt8BexOYI2kZjI7cd-a9AbsDs4MDSq7IirB1vPRXAk",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "JAX1SGm3GQFzTDpk"
}
4.978 request_url https://oidc-certification.ory.sh:8443/oauth2/token
4.978 request_http_args {'headers': {'Authorization': 'Basic NzBjY2NiNTQtZTBmNC00Mjk5LWEwOTktZjI5NzVhM2ZjZjViOnpGWGxqOUN3VmRTLQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
4.978 request code=W_5QuSN7YDwP3j7FJKptV26vGdhNOrIXrHD-XaEhWPE.mLt8BexOYI2kZjI7cd-a9AbsDs4MDSq7IirB1vPRXAk&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=JAX1SGm3GQFzTDpk
5.232 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
5.233 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNzBjY2NiNTQtZTBmNC00Mjk5LWEwOTktZjI5NzVhM2ZjZjViIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiZXhwIjoxNTI5NzU0NTg0LCJpYXQiOjE1Mjk3NTA5ODQsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjhlM2FhYjI1LTZkMDAtNDllNi05ZTViLTcxMWM3YTgxNTJiNyIsIm5vbmNlIjoicENkYTNJUko0Y0d6dWxwMCIsInJhdCI6MTUyOTc1MDk4Miwic3ViIjoiZm9vQGJhci5jb20ifQ.UnElRkqLWq6vMpPE57S6St_QWy33pCNniyySzDNPbUQtocnputlFAeFot72E6xiUy9SB9TgJR0ty_HJ_TV0cZoPFgWxICeYtgumoziLhvWHbQn5b3eMEiqVOkDcroo7Q3xfs0Uny144cfTHXI2dGmP4lBiU1xDudGxC37lOcyQJ9-nVUwTiCa-nnj5WhYyrlGfhb_qlfIzaEqBKKzSiTkyHgZG08anVqyCiboRymhjtzqQbb6mjePQBJhQ3Ienm-XIaIB8dZk1AS7HoHBZfLtmF5_4c3bNCL3wefgw3pVnV9vFCGyX7iLq3DDTRuPmo1fMh1k0GA4RT1tG7zG4EG8jfbvtc0lGuaBT1wcPWEBzgUy2i3uG4CnWuYS7E3iZQgTkcbZBfshduH5htkMIhK2eADiAT5abCv1XhILMWOst1yi5jQytyvZHkS5_F4lJ9AcxttUBv_nM0wGl8cvteAi3l9TV2MshDfn6Og6n0TRUUtz5EK1A_FBZjHBFjMTged31WYMXOwnr0KGE-3rZo1OuGBrvxF-7PGCksBM814hzlok5zpOJatqDuSUz-3IzPw9gp1ewLdPc-ofLDfs_d7Mc1Kv-9NI_PKbEhkjcQFvqGucssBQ5s97KV8mAMUs-6fxtBygF4Wso4pOQeDx9y5oBLPUzbUwtooChvbJDNbHVQ', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'DJLtc3HNFiIJ80TT8bi2Ib3pfsSkzfhpH9U5wtVHyVA.5LA7HqMvRFyUO0iHk-AZVU7IzgqPk5QDXJThnfdJ3uo', 'scope': 'openid'}
5.237 AccessTokenResponse {
"access_token": "DJLtc3HNFiIJ80TT8bi2Ib3pfsSkzfhpH9U5wtVHyVA.5LA7HqMvRFyUO0iHk-AZVU7IzgqPk5QDXJThnfdJ3uo",
"expires_in": 3599,
"id_token": {
"aud": [
"70cccb54-e0f4-4299-a099-f2975a3fcf5b"
],
"auth_time": 1529750975,
"exp": 1529754584,
"iat": 1529750984,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "8e3aab25-6d00-49e6-9e5b-711c7a8152b7",
"nonce": "pCda3IRJ4cGzulp0",
"rat": 1529750982,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
5.237 phase <--<-- 7 --- Done -->-->
5.237 end
5.237 assertion AuthTimeCheck
5.238 condition auth_time-check: status=OK [Check that the auth_time returned in the ID Token is in the expected range.]
5.238 assertion VerifyResponse
5.238 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
5.238 assertion SameAuthn
5.238 condition same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
5.239 assertion ClaimsCheck
5.239 condition claims-check: status=OK [Checks if specific claims is present or not]
5.239 condition Done: status=OK
============================================================
Conditions
auth_time-check: status=OK [Check that the auth_time returned in the ID Token is in the expected range.]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
claims-check: status=OK [Checks if specific claims is present or not]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-Req-NotUnderstood.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-NotUnderstood
Test description: Request with extra query component
Timestamp: 2018-06-23T10:47:50Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.079 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.081 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.081 phase <--<-- 2 --- Registration -->-->
0.081 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.081 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#rgycwmXRYanMXQEV"
],
"response_types": [
"code"
]
}
0.239 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.24 RegistrationResponse {
"client_id": "6abf2b84-3a08-482a-b56c-502d5a034123",
"client_secret": "aqC3ZxjtrQsK",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "6abf2b84-3a08-482a-b56c-502d5a034123",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#rgycwmXRYanMXQEV"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.24 phase <--<-- 3 --- AsyncAuthn -->-->
0.24 AuthorizationRequest {
"client_id": "6abf2b84-3a08-482a-b56c-502d5a034123",
"extra": "foobar",
"nonce": "73aJQL913hIWRYHa",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "3Cj6EOpWacd6emyu"
}
0.24 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?extra=foobar&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=6abf2b84-3a08-482a-b56c-502d5a034123&state=3Cj6EOpWacd6emyu&response_type=code&nonce=73aJQL913hIWRYHa
0.24 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?extra=foobar&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=6abf2b84-3a08-482a-b56c-502d5a034123&state=3Cj6EOpWacd6emyu&response_type=code&nonce=73aJQL913hIWRYHa
2.808 response Response URL with query part
2.808 response {'state': '3Cj6EOpWacd6emyu', 'scope': 'openid', 'code': '3U0lyrGU5OUHC2hYPVk1Wbk70FGHMbZy2UTjOJXSvgw.DVyQ3TRCXgTqHd2sDJnCRmi8sBYP-l3lsS6BlzLwyIU'}
2.808 response {'state': '3Cj6EOpWacd6emyu', 'scope': 'openid', 'code': '3U0lyrGU5OUHC2hYPVk1Wbk70FGHMbZy2UTjOJXSvgw.DVyQ3TRCXgTqHd2sDJnCRmi8sBYP-l3lsS6BlzLwyIU'}
2.809 AuthorizationResponse {
"code": "3U0lyrGU5OUHC2hYPVk1Wbk70FGHMbZy2UTjOJXSvgw.DVyQ3TRCXgTqHd2sDJnCRmi8sBYP-l3lsS6BlzLwyIU",
"scope": "openid",
"state": "3Cj6EOpWacd6emyu"
}
2.809 phase <--<-- 4 --- Done -->-->
2.809 end
2.809 assertion VerifyAuthnResponse
2.809 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
2.809 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-Req-ui_locales.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-ui_locales
Test description: Providing ui_locales
Timestamp: 2018-06-23T10:49:51Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.153 phase <--<-- 1 --- Webfinger -->-->
1.153 not expected to do WebFinger
1.153 phase <--<-- 2 --- Discovery -->-->
1.153 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.26 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.261 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.262 phase <--<-- 3 --- Registration -->-->
1.262 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.262 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#TDE4KqFk8ntzOfJI"
],
"response_types": [
"code"
]
}
1.42 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.421 RegistrationResponse {
"client_id": "75bab0be-6a42-46e3-a89b-3fad9678c640",
"client_secret": "dlQGv--UZQ-I",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "75bab0be-6a42-46e3-a89b-3fad9678c640",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#TDE4KqFk8ntzOfJI"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.421 phase <--<-- 4 --- AsyncAuthn -->-->
1.422 AuthorizationRequest {
"client_id": "75bab0be-6a42-46e3-a89b-3fad9678c640",
"nonce": "U9weuTEXF2LiK4LZ",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "PU1OyxDSKAY1JwMb",
"ui_locales": "se"
}
1.422 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?ui_locales=se&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=75bab0be-6a42-46e3-a89b-3fad9678c640&state=PU1OyxDSKAY1JwMb&response_type=code&nonce=U9weuTEXF2LiK4LZ
1.422 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?ui_locales=se&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=75bab0be-6a42-46e3-a89b-3fad9678c640&state=PU1OyxDSKAY1JwMb&response_type=code&nonce=U9weuTEXF2LiK4LZ
4.385 response Response URL with query part
4.386 response {'state': 'PU1OyxDSKAY1JwMb', 'scope': 'openid', 'code': 'Mx7TA1Lf5cwf42AVv3xvku_lJeozK5s0lJasPmI2AbU.rqo4xZdN31BEtL9gOnufcAjD8XizSnbTSTGdaQIxAdg'}
4.386 response {'state': 'PU1OyxDSKAY1JwMb', 'scope': 'openid', 'code': 'Mx7TA1Lf5cwf42AVv3xvku_lJeozK5s0lJasPmI2AbU.rqo4xZdN31BEtL9gOnufcAjD8XizSnbTSTGdaQIxAdg'}
4.386 AuthorizationResponse {
"code": "Mx7TA1Lf5cwf42AVv3xvku_lJeozK5s0lJasPmI2AbU.rqo4xZdN31BEtL9gOnufcAjD8XizSnbTSTGdaQIxAdg",
"scope": "openid",
"state": "PU1OyxDSKAY1JwMb"
}
4.387 phase <--<-- 5 --- Done -->-->
4.387 end
4.387 assertion VerifyAuthnResponse
4.387 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
4.387 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-request-Unsigned.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-request-Unsigned
Test description: Support request request parameter with unsigned request
Timestamp: 2018-06-23T10:46:59Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.143 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.144 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.144 phase <--<-- 2 --- Registration -->-->
0.144 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'request_object_signing_alg': 'none'}
0.145 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "none",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#jfQdJ2iwLxaUTAt9"
],
"response_types": [
"code"
]
}
0.303 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.304 RegistrationResponse {
"client_id": "1b567dbb-9164-428a-9340-340ab8c7d341",
"client_secret": "hEibpZ6INKO0",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "1b567dbb-9164-428a-9340-340ab8c7d341",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "none",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#jfQdJ2iwLxaUTAt9"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.304 phase <--<-- 3 --- AsyncAuthn -->-->
0.305 AuthorizationRequest {
"client_id": "1b567dbb-9164-428a-9340-340ab8c7d341",
"nonce": "L72FDNOM5JEgt209",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"request": "eyJhbGciOiJub25lIn0.eyJzY29wZSI6ICJvcGVuaWQiLCAicmVkaXJlY3RfdXJpIjogImh0dHBzOi8vb3AuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0OjYxMzUzL2F1dGh6X2NiIiwgImNsaWVudF9pZCI6ICIxYjU2N2RiYi05MTY0LTQyOGEtOTM0MC0zNDBhYjhjN2QzNDEiLCAic3RhdGUiOiAiMVRyNnFkYWNhU1p4ZE83RiIsICJyZXNwb25zZV90eXBlIjogImNvZGUiLCAibm9uY2UiOiAiTDcyRkROT001SkVndDIwOSJ9.",
"response_type": "code",
"scope": "openid",
"state": "1Tr6qdacaSZxdO7F"
}
0.305 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=1b567dbb-9164-428a-9340-340ab8c7d341&response_type=code&state=1Tr6qdacaSZxdO7F&request=eyJhbGciOiJub25lIn0.eyJzY29wZSI6ICJvcGVuaWQiLCAicmVkaXJlY3RfdXJpIjogImh0dHBzOi8vb3AuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0OjYxMzUzL2F1dGh6X2NiIiwgImNsaWVudF9pZCI6ICIxYjU2N2RiYi05MTY0LTQyOGEtOTM0MC0zNDBhYjhjN2QzNDEiLCAic3RhdGUiOiAiMVRyNnFkYWNhU1p4ZE83RiIsICJyZXNwb25zZV90eXBlIjogImNvZGUiLCAibm9uY2UiOiAiTDcyRkROT001SkVndDIwOSJ9.&nonce=L72FDNOM5JEgt209
0.305 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=1b567dbb-9164-428a-9340-340ab8c7d341&response_type=code&state=1Tr6qdacaSZxdO7F&request=eyJhbGciOiJub25lIn0.eyJzY29wZSI6ICJvcGVuaWQiLCAicmVkaXJlY3RfdXJpIjogImh0dHBzOi8vb3AuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0OjYxMzUzL2F1dGh6X2NiIiwgImNsaWVudF9pZCI6ICIxYjU2N2RiYi05MTY0LTQyOGEtOTM0MC0zNDBhYjhjN2QzNDEiLCAic3RhdGUiOiAiMVRyNnFkYWNhU1p4ZE83RiIsICJyZXNwb25zZV90eXBlIjogImNvZGUiLCAibm9uY2UiOiAiTDcyRkROT001SkVndDIwOSJ9.&nonce=L72FDNOM5JEgt209
3.163 response Response URL with query part
3.164 response {'state': '1Tr6qdacaSZxdO7F', 'scope': 'openid', 'code': '_QWM6y9PX-kHdJdDy7Xq_A8rJQkGA1BPCUd5_8BwF4s.Hm0Z9AW4fjZbQ8F9fnoU27dQtQVdYX6DlR0-XZz8Hpc'}
3.164 response {'state': '1Tr6qdacaSZxdO7F', 'scope': 'openid', 'code': '_QWM6y9PX-kHdJdDy7Xq_A8rJQkGA1BPCUd5_8BwF4s.Hm0Z9AW4fjZbQ8F9fnoU27dQtQVdYX6DlR0-XZz8Hpc'}
3.164 AuthorizationResponse {
"code": "_QWM6y9PX-kHdJdDy7Xq_A8rJQkGA1BPCUd5_8BwF4s.Hm0Z9AW4fjZbQ8F9fnoU27dQtQVdYX6DlR0-XZz8Hpc",
"scope": "openid",
"state": "1Tr6qdacaSZxdO7F"
}
3.165 phase <--<-- 4 --- Done -->-->
3.165 end
3.165 assertion VerifyAuthnOrErrorResponse
3.165 condition authn-response-or-error: status=OK [Checks that the last response was a JSON encoded authentication or error message]
3.165 condition Done: status=OK
============================================================
Conditions
authn-response-or-error: status=OK [Checks that the last response was a JSON encoded authentication or error message]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-request_uri-Sig.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-request_uri-Sig
Test description: Support request_uri request parameter with signed request
Timestamp: 2018-06-23T10:47:04Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.124 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.125 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.125 phase <--<-- 2 --- Registration -->-->
0.125 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'request_object_signing_alg': 'RS256'}
0.126 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "RS256",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#P4zH7hvdIA0S4K0E"
],
"response_types": [
"code"
]
}
0.325 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.326 RegistrationResponse {
"client_id": "309fa3c3-b28d-44b1-96fc-b6804ff9459d",
"client_secret": "4AEImvMBBEy8",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "309fa3c3-b28d-44b1-96fc-b6804ff9459d",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "RS256",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#P4zH7hvdIA0S4K0E"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.326 phase <--<-- 3 --- AsyncAuthn -->-->
0.33 AuthorizationRequest {
"client_id": "309fa3c3-b28d-44b1-96fc-b6804ff9459d",
"nonce": "mzAWCEBxR6Xk9XVc",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"request_uri": "https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#P4zH7hvdIA0S4K0E",
"response_type": "code",
"scope": "openid",
"state": "nQuuCm7XNeDEtfEj"
}
0.33 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?request_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Frequests%2Fe3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9%23P4zH7hvdIA0S4K0E&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=309fa3c3-b28d-44b1-96fc-b6804ff9459d&state=nQuuCm7XNeDEtfEj&response_type=code&nonce=mzAWCEBxR6Xk9XVc
0.33 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?request_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Frequests%2Fe3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9%23P4zH7hvdIA0S4K0E&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=309fa3c3-b28d-44b1-96fc-b6804ff9459d&state=nQuuCm7XNeDEtfEj&response_type=code&nonce=mzAWCEBxR6Xk9XVc
3.147 response Response URL with query part
3.147 response {'state': 'nQuuCm7XNeDEtfEj', 'scope': 'openid', 'code': 'TRBnO70zpOMrHwMMWgjLnJ0nl6eSjRXOpti0Tvlj2vs.6DXPm1IrsnYOp05XFrbt4ZAypymw6pQwGxEWQo1ShSQ'}
3.148 response {'state': 'nQuuCm7XNeDEtfEj', 'scope': 'openid', 'code': 'TRBnO70zpOMrHwMMWgjLnJ0nl6eSjRXOpti0Tvlj2vs.6DXPm1IrsnYOp05XFrbt4ZAypymw6pQwGxEWQo1ShSQ'}
3.148 AuthorizationResponse {
"code": "TRBnO70zpOMrHwMMWgjLnJ0nl6eSjRXOpti0Tvlj2vs.6DXPm1IrsnYOp05XFrbt4ZAypymw6pQwGxEWQo1ShSQ",
"scope": "openid",
"state": "nQuuCm7XNeDEtfEj"
}
3.148 phase <--<-- 4 --- Done -->-->
3.148 end
3.149 assertion VerifyAuthnOrErrorResponse
3.149 condition authn-response-or-error: status=OK [Checks that the last response was a JSON encoded authentication or error message]
3.149 condition Done: status=OK
============================================================
Conditions
authn-response-or-error: status=OK [Checks that the last response was a JSON encoded authentication or error message]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-request_uri-Unsigned.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-request_uri-Unsigned
Test description: Support request_uri request parameter with unsigned request
Timestamp: 2018-06-23T10:47:09Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.108 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.109 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.109 phase <--<-- 2 --- Registration -->-->
0.109 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'request_object_signing_alg': 'none'}
0.11 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "none",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#y3yJCj9aUwijFwLb"
],
"response_types": [
"code"
]
}
0.266 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.267 RegistrationResponse {
"client_id": "7e003ff3-922d-46c7-9aed-14229d2dcd77",
"client_secret": "uDrA6HdvFjX_",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "7e003ff3-922d-46c7-9aed-14229d2dcd77",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "none",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#y3yJCj9aUwijFwLb"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.267 phase <--<-- 3 --- AsyncAuthn -->-->
0.269 AuthorizationRequest {
"client_id": "7e003ff3-922d-46c7-9aed-14229d2dcd77",
"nonce": "J399ANqxm0zU5D12",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"request_uri": "https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#y3yJCj9aUwijFwLb",
"response_type": "code",
"scope": "openid",
"state": "4mLRZhS3TmIfT4PC"
}
0.269 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?request_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Frequests%2Fe3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9%23y3yJCj9aUwijFwLb&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=7e003ff3-922d-46c7-9aed-14229d2dcd77&state=4mLRZhS3TmIfT4PC&response_type=code&nonce=J399ANqxm0zU5D12
0.269 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?request_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Frequests%2Fe3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9%23y3yJCj9aUwijFwLb&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=7e003ff3-922d-46c7-9aed-14229d2dcd77&state=4mLRZhS3TmIfT4PC&response_type=code&nonce=J399ANqxm0zU5D12
4.007 response Response URL with query part
4.007 response {'state': '4mLRZhS3TmIfT4PC', 'scope': 'openid', 'code': 'RC9sPmg6uGLiz7AOGzyMJlz3WRO3TnuDp4ukq6SLn9w.z1UQnAQdHLjEGtAcoTKzJKMuh3OupD8C6-XyXQf0AZw'}
4.008 response {'state': '4mLRZhS3TmIfT4PC', 'scope': 'openid', 'code': 'RC9sPmg6uGLiz7AOGzyMJlz3WRO3TnuDp4ukq6SLn9w.z1UQnAQdHLjEGtAcoTKzJKMuh3OupD8C6-XyXQf0AZw'}
4.008 AuthorizationResponse {
"code": "RC9sPmg6uGLiz7AOGzyMJlz3WRO3TnuDp4ukq6SLn9w.z1UQnAQdHLjEGtAcoTKzJKMuh3OupD8C6-XyXQf0AZw",
"scope": "openid",
"state": "4mLRZhS3TmIfT4PC"
}
4.008 phase <--<-- 4 --- Done -->-->
4.008 end
4.009 assertion VerifyResponse
4.009 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.009 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-Response-code.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Response-code
Test description: Request with response_type=code
Timestamp: 2018-06-23T10:43:16Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.106 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.107 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.107 phase <--<-- 2 --- Registration -->-->
0.107 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.107 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#93s4J36rqeQJiHsM"
],
"response_types": [
"code"
]
}
0.298 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.299 RegistrationResponse {
"client_id": "7aaec6a8-b0a8-438f-af5f-6f2fe5d378dc",
"client_secret": "O1AMWod5wybF",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "7aaec6a8-b0a8-438f-af5f-6f2fe5d378dc",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#93s4J36rqeQJiHsM"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.299 phase <--<-- 3 --- AsyncAuthn -->-->
0.299 AuthorizationRequest {
"client_id": "7aaec6a8-b0a8-438f-af5f-6f2fe5d378dc",
"nonce": "SRMa3MgSMgr6Bjm6",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "fE1XuV4S8dvmxiPT"
}
0.3 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=7aaec6a8-b0a8-438f-af5f-6f2fe5d378dc&state=fE1XuV4S8dvmxiPT&response_type=code&nonce=SRMa3MgSMgr6Bjm6
0.3 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=7aaec6a8-b0a8-438f-af5f-6f2fe5d378dc&state=fE1XuV4S8dvmxiPT&response_type=code&nonce=SRMa3MgSMgr6Bjm6
7.414 response Response URL with query part
7.415 response {'state': 'fE1XuV4S8dvmxiPT', 'scope': 'openid', 'code': 'QdzPnGJ2hEUhGi_Xc2swEZz9BOV1okGsf_03oI6DDmw.YH0sAo_sBk69q7O6Nljqg25K8MHtRyBn64qkqIdJtxA'}
7.415 response {'state': 'fE1XuV4S8dvmxiPT', 'scope': 'openid', 'code': 'QdzPnGJ2hEUhGi_Xc2swEZz9BOV1okGsf_03oI6DDmw.YH0sAo_sBk69q7O6Nljqg25K8MHtRyBn64qkqIdJtxA'}
7.415 AuthorizationResponse {
"code": "QdzPnGJ2hEUhGi_Xc2swEZz9BOV1okGsf_03oI6DDmw.YH0sAo_sBk69q7O6Nljqg25K8MHtRyBn64qkqIdJtxA",
"scope": "openid",
"state": "fE1XuV4S8dvmxiPT"
}
7.415 phase <--<-- 4 --- Done -->-->
7.415 end
7.416 assertion VerifyAuthnResponse
7.416 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
7.416 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-Response-Missing.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Response-Missing
Test description: Authorization request missing the response_type parameter
Timestamp: 2018-06-23T10:43:08Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.141 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.153 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.154 phase <--<-- 2 --- Registration -->-->
0.154 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.154 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Si4UYQrtfWIg8h1Y"
],
"response_types": [
"code"
]
}
0.353 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.354 RegistrationResponse {
"client_id": "65f52f63-0ce2-4f34-8b28-7a655854acdb",
"client_secret": "L701-PZArCjQ",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "65f52f63-0ce2-4f34-8b28-7a655854acdb",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Si4UYQrtfWIg8h1Y"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.355 phase <--<-- 3 --- Note -->-->
1.651 phase <--<-- 4 --- AsyncAuthn -->-->
1.652 AuthorizationRequest {
"client_id": "65f52f63-0ce2-4f34-8b28-7a655854acdb",
"nonce": "7nQtj2WpXvPDKOLZ",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"scope": "openid",
"state": "QP5hDgKl8HxTW7F6"
}
1.652 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?state=QP5hDgKl8HxTW7F6&scope=openid&nonce=7nQtj2WpXvPDKOLZ&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=65f52f63-0ce2-4f34-8b28-7a655854acdb
1.652 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?state=QP5hDgKl8HxTW7F6&scope=openid&nonce=7nQtj2WpXvPDKOLZ&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=65f52f63-0ce2-4f34-8b28-7a655854acdb
2.368 response Response URL with query part
2.368 response {'error_debug': 'The request is missing the response_type parameter', 'error_description': 'The authorization server does not support obtaining a token using this method', 'state': '', 'error': 'unsupported_response_type'}
2.369 response {'error_debug': 'The request is missing the response_type parameter', 'error_description': 'The authorization server does not support obtaining a token using this method', 'error': 'unsupported_response_type'}
2.369 AuthorizationErrorResponse {
"error": "unsupported_response_type",
"error_debug": "The request is missing the response_type parameter",
"error_description": "The authorization server does not support obtaining a token using this method"
}
2.369 AuthorizationErrorResponse {
"error": "unsupported_response_type",
"error_debug": "The request is missing the response_type parameter",
"error_description": "The authorization server does not support obtaining a token using this method"
}
2.369 phase <--<-- 5 --- Done -->-->
2.369 end
2.37 assertion VerifyErrorMessage
2.37 condition verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
2.37 condition Done: status=OK
============================================================
Conditions
verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-Rotation-OP-Sig.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Rotation-OP-Sig
Test description: Can rotate OP signing keys
Timestamp: 2018-06-23T10:51:00Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.072 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- FetchKeys -->-->
0.147 phase <--<-- 3 --- Note -->-->
8.548 phase <--<-- 4 --- Webfinger -->-->
8.548 not expected to do WebFinger
8.548 phase <--<-- 5 --- Discovery -->-->
8.548 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
8.626 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
8.627 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
8.627 phase <--<-- 6 --- FetchKeys -->-->
8.737 phase <--<-- 7 --- Done -->-->
8.737 end
8.738 assertion CheckHTTPResponse
8.738 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
8.738 assertion NewSigningKeys
8.738 condition new-signing-keys: status=OK [Verifies that two set of signing keys are not the same]
8.738 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
new-signing-keys: status=OK [Verifies that two set of signing keys are not the same]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-Rotation-RP-Sig.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Rotation-RP-Sig
Test description: Request access token, change RSA signing key and request another access token
Timestamp: 2018-06-23T10:51:06Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.113 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.115 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.115 phase <--<-- 2 --- Registration -->-->
0.115 register kwargs:{'application_name': 'OIC test tool', 'token_endpoint_auth_method': 'private_key_jwt', 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'refresh_token'], 'response_types': ['code'], 'url': 'https://oidc-certification.ory.sh:8443/clients', 'application_type': 'web'}
0.115 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"refresh_token"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#9oVL9l6dfiAKN4Rx"
],
"response_types": [
"code"
],
"token_endpoint_auth_method": "private_key_jwt"
}
0.278 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.279 RegistrationResponse {
"client_id": "94defbce-9d19-444e-82ff-063166893d73",
"client_secret": "ypMiMiH9eHu~",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"refresh_token"
],
"id": "94defbce-9d19-444e-82ff-063166893d73",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#9oVL9l6dfiAKN4Rx"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "private_key_jwt",
"userinfo_signed_response_alg": "none"
}
0.28 phase <--<-- 3 --- AsyncAuthn -->-->
0.28 AuthorizationRequest {
"client_id": "94defbce-9d19-444e-82ff-063166893d73",
"nonce": "78KLPiZTCvbRLGSv",
"prompt": [
"consent"
],
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid offline_access",
"state": "ZPnami488m175HIA"
}
0.28 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=consent&scope=openid+offline_access&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=94defbce-9d19-444e-82ff-063166893d73&state=ZPnami488m175HIA&response_type=code&nonce=78KLPiZTCvbRLGSv
0.28 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=consent&scope=openid+offline_access&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=94defbce-9d19-444e-82ff-063166893d73&state=ZPnami488m175HIA&response_type=code&nonce=78KLPiZTCvbRLGSv
3.569 response Response URL with query part
3.57 response {'state': 'ZPnami488m175HIA', 'scope': 'openid offline_access', 'code': '_ox-YKllX_eyuQg8FDthnD7bynxyCCBvBbLwAfXo29k.IqqWILdWNOxqdYJYCuzF_q28R29wBxdJA-7QFzOQp44'}
3.57 response {'state': 'ZPnami488m175HIA', 'scope': 'openid offline_access', 'code': '_ox-YKllX_eyuQg8FDthnD7bynxyCCBvBbLwAfXo29k.IqqWILdWNOxqdYJYCuzF_q28R29wBxdJA-7QFzOQp44'}
3.57 AuthorizationResponse {
"code": "_ox-YKllX_eyuQg8FDthnD7bynxyCCBvBbLwAfXo29k.IqqWILdWNOxqdYJYCuzF_q28R29wBxdJA-7QFzOQp44",
"scope": "openid offline_access",
"state": "ZPnami488m175HIA"
}
3.57 phase <--<-- 4 --- AccessToken -->-->
3.57 --> request op_args: {'state': 'ZPnami488m175HIA', 'authn_method': 'private_key_jwt'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.571 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'ZPnami488m175HIA', 'code': '_ox-YKllX_eyuQg8FDthnD7bynxyCCBvBbLwAfXo29k.IqqWILdWNOxqdYJYCuzF_q28R29wBxdJA-7QFzOQp44', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '94defbce-9d19-444e-82ff-063166893d73'}, 'state': 'ZPnami488m175HIA', 'authn_method': 'private_key_jwt'}
3.571 AccessTokenRequest {
"client_assertion": "eyJhbGciOiJSUzI1NiIsImtpZCI6Ind0MjVPZ3lSX256RzNPb1E3ZGFhMnJMNi1nTW5GZGZSekJqaFVWUHU4UlEifQ.eyJpc3MiOiAiOTRkZWZiY2UtOWQxOS00NDRlLTgyZmYtMDYzMTY2ODkzZDczIiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiOTRkZWZiY2UtOWQxOS00NDRlLTgyZmYtMDYzMTY2ODkzZDczIiwgImlhdCI6IDE1Mjk3NTEwNjUsICJqdGkiOiAiYWtVSXVmbHJWd3dFVVlJTEkzcnpSeER6b0R2R1FhRVMiLCAiZXhwIjogMTUyOTc1MTY2NX0.gNaR_ICpkvhYIUkYH7nvdJ5G7YprXlipQcrfsQuzSfKyPHiIJDDkWbtwQnOmMjoaAvIZnejD3rAeHR8JXZbyO64gc31hH-8ISrTlUDCnsj-au6y9UEsW-262wPrOneFUMSArq0-toqYEBGQP7-6ze_gBCO0O6Ds-2p4sodTxllpoAaiP2CFMpmO6n8y4RNYhfd07tl9ccbjN4MtQLz2d2538ryJ8VClJq1h4ymn4j3Oxr2fyDvjZFm0voSe7VhnV5_51JkXtlGrO--qCKun0aS_szGHQBBuhsHFN1b4pyDqGhF9BddtW6hX4pXNN3OOr6uL7_YqkRNZau7DgAztFvg",
"client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer",
"code": "_ox-YKllX_eyuQg8FDthnD7bynxyCCBvBbLwAfXo29k.IqqWILdWNOxqdYJYCuzF_q28R29wBxdJA-7QFzOQp44",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "ZPnami488m175HIA"
}
3.574 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.574 request_http_args {'headers': {'Content-Type': 'application/x-www-form-urlencoded'}}
3.574 request code=_ox-YKllX_eyuQg8FDthnD7bynxyCCBvBbLwAfXo29k.IqqWILdWNOxqdYJYCuzF_q28R29wBxdJA-7QFzOQp44&client_assertion_type=urn%3Aietf%3Aparams%3Aoauth%3Aclient-assertion-type%3Ajwt-bearer&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=ZPnami488m175HIA&client_assertion=eyJhbGciOiJSUzI1NiIsImtpZCI6Ind0MjVPZ3lSX256RzNPb1E3ZGFhMnJMNi1nTW5GZGZSekJqaFVWUHU4UlEifQ.eyJpc3MiOiAiOTRkZWZiY2UtOWQxOS00NDRlLTgyZmYtMDYzMTY2ODkzZDczIiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiOTRkZWZiY2UtOWQxOS00NDRlLTgyZmYtMDYzMTY2ODkzZDczIiwgImlhdCI6IDE1Mjk3NTEwNjUsICJqdGkiOiAiYWtVSXVmbHJWd3dFVVlJTEkzcnpSeER6b0R2R1FhRVMiLCAiZXhwIjogMTUyOTc1MTY2NX0.gNaR_ICpkvhYIUkYH7nvdJ5G7YprXlipQcrfsQuzSfKyPHiIJDDkWbtwQnOmMjoaAvIZnejD3rAeHR8JXZbyO64gc31hH-8ISrTlUDCnsj-au6y9UEsW-262wPrOneFUMSArq0-toqYEBGQP7-6ze_gBCO0O6Ds-2p4sodTxllpoAaiP2CFMpmO6n8y4RNYhfd07tl9ccbjN4MtQLz2d2538ryJ8VClJq1h4ymn4j3Oxr2fyDvjZFm0voSe7VhnV5_51JkXtlGrO--qCKun0aS_szGHQBBuhsHFN1b4pyDqGhF9BddtW6hX4pXNN3OOr6uL7_YqkRNZau7DgAztFvg
3.702 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.703 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiOTRkZWZiY2UtOWQxOS00NDRlLTgyZmYtMDYzMTY2ODkzZDczIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiZXhwIjoxNTI5NzU0NjY1LCJpYXQiOjE1Mjk3NTEwNjUsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjNhZDFhNzJiLWFjNzEtNDA5OS04MGFjLWE5NmFmYzg5NDA0OSIsIm5vbmNlIjoiNzhLTFBpWlRDdmJSTEdTdiIsInJhdCI6MTUyOTc1MTA2Miwic3ViIjoiZm9vQGJhci5jb20ifQ.iAwTmRufOWvHsc8VFBM9ztznJJjbXryE4wKpkyzpqwnaJ2kIcsFzxzIhwKjHrj5smva66Uyp2doIP6kNEku5qmcN1hTaE-XyrEkwCzrTKqG6CZJq9IRMV6CxcXCeeN6huMN3iJUXwNmqcFejEKgfT3d6nZXzzWuhKNxvuJ7OHY0ArXdCowhQahSDYBG0FKNfaokhkEP27mbzb6p0FR16EWWE7iuEp7hF9G3f-VlLSfzhGYpeY9hqYrQsS27Xq2r3vEqPEOX_5HZiMUAdVRPyC4AgTiN59w3rQ0_IhWp0zWSFCMGS-T6sjquVNm908Xrkopk726i7ZGvC38SAPRx8paerlZgrqzGd2mJmoz0VNsyO6nIXb0JX0EgchAMFFFVXyDCLmGZ7tlSAMpouJoh2r-3C5Rf0zE971lcrm6TKm2hB3n4asAOPMvfiuETLgwonZL8xV4U00wQaIUUHv7wgGwV_5I-3AUBwKyrB2kYzz4mpVAX_XyIsFRMqZ-YFFW3REYfJVBxU5MTfG7s7M0Pg5sNModiot4hUPgskiHqISEwBNJuutlIGrO5ghB37_-kKc1Jp8eVE0pGKq9kiPkL-4l792hp1-5_0WHO5ozZnku_wigH5pl5V88rHlnPSU2i5XiQtPW1CqnD_hnC-3g8_4z4kGfjivhfaopuhZfJiPg8', 'scope': 'openid offline_access', 'access_token': 'IeVz0vz8NQdA327xdFMGBgW_mrQiVy_eY06rxAoRAeM.k5C1n5drAdms2RRmvb3AitKTRdrtCHcvhevwcMLzfCQ', 'refresh_token': 'hoIr1vEHsEnXJpaDSXnv2Ll3LExhQ_In1q7ktnGRMfs.4_7o2b9QNBMFCC4-jsNdiuGdSbYmxUSP0_uW3_OTbzQ', 'token_type': 'bearer', 'expires_in': 3599}
3.783 AccessTokenResponse {
"access_token": "IeVz0vz8NQdA327xdFMGBgW_mrQiVy_eY06rxAoRAeM.k5C1n5drAdms2RRmvb3AitKTRdrtCHcvhevwcMLzfCQ",
"expires_in": 3599,
"id_token": {
"aud": [
"94defbce-9d19-444e-82ff-063166893d73"
],
"auth_time": 1529750975,
"exp": 1529754665,
"iat": 1529751065,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "3ad1a72b-ac71-4099-80ac-a96afc894049",
"nonce": "78KLPiZTCvbRLGSv",
"rat": 1529751062,
"sub": "[email protected]"
},
"refresh_token": "hoIr1vEHsEnXJpaDSXnv2Ll3LExhQ_In1q7ktnGRMfs.4_7o2b9QNBMFCC4-jsNdiuGdSbYmxUSP0_uW3_OTbzQ",
"scope": "openid offline_access",
"token_type": "bearer"
}
3.783 phase <--<-- 5 --- RotateSigKeys -->-->
3.829 phase <--<-- 6 --- RefreshAccessToken -->-->
3.833 RefreshAccessTokenRequest {
"client_assertion": "eyJhbGciOiJSUzI1NiIsImtpZCI6IkJlYTFmMHRNOWFhRmpkTU5YSmk4RXJhbDhFR0dWdjducF9NVjdUdlJ0UFEifQ.eyJpc3MiOiAiOTRkZWZiY2UtOWQxOS00NDRlLTgyZmYtMDYzMTY2ODkzZDczIiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiOTRkZWZiY2UtOWQxOS00NDRlLTgyZmYtMDYzMTY2ODkzZDczIiwgImlhdCI6IDE1Mjk3NTEwNjUsICJqdGkiOiAiZjBJOFhEWGc1bXZHWnZUdnRmcFgzWjIxSkpFeXZXeTMiLCAiZXhwIjogMTUyOTc1MTY2NX0.JJtCb3fnOy4Y3NBrO8QkebS0VvoRrgcyQnCK3GXyNhQJw-u7K0b9Mu6E-ubhqBWkClSdlEN7bM5QbqRkpHIHSoXJnb7RhlF8ZBMYSmYVG8cl72LyEVHLeuprD5OvyBCvwvIpQcUHHiPyzPekOB9nsHhEmN69939vMfsW3SoM4SFpeyZQTTPaW3pmepzpIgwExVnajFEGfxbQ-KJxCEYbmgDFGVvcU7Lu37kugrIH52KfRr7FaGGJs0T-lzDrpNPVUmsJ15rdAqnUrZSpNQY1LMAkTV5pQmNlYDTn4KfRfUHphdd5HRsbVA6RQXsVY6YqOVSi2nxLKAGbwby8IR86Ig",
"client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer",
"grant_type": "refresh_token",
"refresh_token": "hoIr1vEHsEnXJpaDSXnv2Ll3LExhQ_In1q7ktnGRMfs.4_7o2b9QNBMFCC4-jsNdiuGdSbYmxUSP0_uW3_OTbzQ",
"scope": "openid offline_access"
}
3.837 request {'client_assertion': 'eyJhbGciOiJSUzI1NiIsImtpZCI6IkJlYTFmMHRNOWFhRmpkTU5YSmk4RXJhbDhFR0dWdjducF9NVjdUdlJ0UFEifQ.eyJpc3MiOiAiOTRkZWZiY2UtOWQxOS00NDRlLTgyZmYtMDYzMTY2ODkzZDczIiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiOTRkZWZiY2UtOWQxOS00NDRlLTgyZmYtMDYzMTY2ODkzZDczIiwgImlhdCI6IDE1Mjk3NTEwNjUsICJqdGkiOiAiZjBJOFhEWGc1bXZHWnZUdnRmcFgzWjIxSkpFeXZXeTMiLCAiZXhwIjogMTUyOTc1MTY2NX0.JJtCb3fnOy4Y3NBrO8QkebS0VvoRrgcyQnCK3GXyNhQJw-u7K0b9Mu6E-ubhqBWkClSdlEN7bM5QbqRkpHIHSoXJnb7RhlF8ZBMYSmYVG8cl72LyEVHLeuprD5OvyBCvwvIpQcUHHiPyzPekOB9nsHhEmN69939vMfsW3SoM4SFpeyZQTTPaW3pmepzpIgwExVnajFEGfxbQ-KJxCEYbmgDFGVvcU7Lu37kugrIH52KfRr7FaGGJs0T-lzDrpNPVUmsJ15rdAqnUrZSpNQY1LMAkTV5pQmNlYDTn4KfRfUHphdd5HRsbVA6RQXsVY6YqOVSi2nxLKAGbwby8IR86Ig', 'scope': 'openid offline_access', 'grant_type': 'refresh_token', 'client_assertion_type': 'urn:ietf:params:oauth:client-assertion-type:jwt-bearer', 'refresh_token': 'hoIr1vEHsEnXJpaDSXnv2Ll3LExhQ_In1q7ktnGRMfs.4_7o2b9QNBMFCC4-jsNdiuGdSbYmxUSP0_uW3_OTbzQ'}
3.966 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.966 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.966 handle_response kwargs:{'r': <Response [200]>, 'csi': <oic.oic.message.RefreshAccessTokenRequest object at 0x7f2440115eb8>}
3.967 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiOTRkZWZiY2UtOWQxOS00NDRlLTgyZmYtMDYzMTY2ODkzZDczIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiZXhwIjoxNTI5NzU0NjY1LCJpYXQiOjE1Mjk3NTEwNjUsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImY4YzgwNDAwLTE5YzgtNDM2NS05MjM0LWRkNGE0NDFkYWY1MyIsIm5vbmNlIjoiIiwicmF0IjoxNTI5NzUxMDYyLCJzdWIiOiJmb29AYmFyLmNvbSJ9.Yn3F778rHoILy6xyoA88frqDu_wTTy5zBW-bJ8vDKliiV7RgnrjWSlGYufxgvs59etatv2_sd8qX--hLv0lWgGXVfIZKbD8rVrRFFeo0Y-9xgRK6j_OcpWhp9vaHnOuuvE2us_-hk8qvvKGAR4OAyDybaQcelldb6vmvmOG6AIlQJ3SEt1AETg063K-yEPE-WP7y849E329IOiUxIyvggsjNU5nIVe26I2R-fQ6BYLzqL2QKzotQK_Bht_kXdV2Z8Nf2Zqcnfk6wNmy4ihV0YKjOXZTs0MzR4KBghlWueE0C2nr6ww-uofE7hJJWzebJUHCuK0lxOxIAyBnP4iAvI2vZah5avOuUSywpPQy1-cDinTIG7DXG8BobaHaauOfPhLd0XzGQoUilGe1X8Y6e2UE83sBaDfJV6ayr8kcYZ7nlDTB0alyMjzI8wRhK7CbFnfHwbiPTUJB6VuIsp4IDGvnEWQoEr3nuP5fP48th4taIrSvyuiMt4irkq9xtPfDJQFaxE5oykOQbkYWv4zQbM18k5msAHEVDEzi-kSdQzQYVSVr_mJlGFBobxnWdtRBH81BMaAapYWA-7gdGmHchf8qXr-OQ_XGz3yTstdEtQYKvIIMPhpddQiH_QC0q3Uu_vmBD2WKepVh-z-uCBE9Nj0V1fbYpkBjuNY8Tx02Nxmo', 'scope': 'openid offline_access', 'access_token': '2gCjRUPGKTRXQPWlUUHG3GQWHR9iTwZMNQdqWtdbgQw.UlR0HCq0qY_gdRlwhwr85jiKbR3eAGQD6Aq1_mef-Z0', 'refresh_token': 'Ruk0UHb-qp4MCkl8Jvyexg_JqxrpfP5wzkKKcFedXHI.j--8O2dT8AOu2W9kiN2Pwpz3dkfVZrmbZ1Reee4tw9Q', 'token_type': 'bearer', 'expires_in': 3599}
3.97 jws header {'typ': 'JWT', 'alg': 'RS256', 'kid': 'public:0acf6c64-4d55-4888-abb9-b2a3f661ee7f'}
3.97 AccessTokenResponse {
"access_token": "2gCjRUPGKTRXQPWlUUHG3GQWHR9iTwZMNQdqWtdbgQw.UlR0HCq0qY_gdRlwhwr85jiKbR3eAGQD6Aq1_mef-Z0",
"expires_in": 3599,
"id_token": {
"aud": [
"94defbce-9d19-444e-82ff-063166893d73"
],
"auth_time": 1529750975,
"exp": 1529754665,
"iat": 1529751065,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "f8c80400-19c8-4365-9234-dd4a441daf53",
"rat": 1529751062,
"sub": "[email protected]"
},
"refresh_token": "Ruk0UHb-qp4MCkl8Jvyexg_JqxrpfP5wzkKKcFedXHI.j--8O2dT8AOu2W9kiN2Pwpz3dkfVZrmbZ1Reee4tw9Q",
"scope": "openid offline_access",
"token_type": "bearer"
}
3.97 phase <--<-- 7 --- Done -->-->
3.97 end
3.971 assertion CheckHTTPResponse
3.971 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
3.971 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-scope-address.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-scope-address
Test description: Scope requesting address claims
Timestamp: 2018-06-23T10:47:20Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.545 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.546 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.547 phase <--<-- 2 --- Registration -->-->
0.547 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.547 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#WKsM4xjlUcIg9WDq"
],
"response_types": [
"code"
]
}
0.713 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.714 RegistrationResponse {
"client_id": "a5e1c85e-0347-4ca0-a459-5ad6355ae4e4",
"client_secret": "pf84VVUUcxVF",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "a5e1c85e-0347-4ca0-a459-5ad6355ae4e4",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#WKsM4xjlUcIg9WDq"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.714 phase <--<-- 3 --- AsyncAuthn -->-->
0.715 condition Check support: status=WARNING, message=No support for: scopes_supported=['address']
0.715 AuthorizationRequest {
"client_id": "a5e1c85e-0347-4ca0-a459-5ad6355ae4e4",
"nonce": "1UY1L6Ve7Nab89lx",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid address",
"state": "rz8Zr1KZkZGGEBx3"
}
0.715 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+address&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=a5e1c85e-0347-4ca0-a459-5ad6355ae4e4&state=rz8Zr1KZkZGGEBx3&response_type=code&nonce=1UY1L6Ve7Nab89lx
0.715 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+address&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=a5e1c85e-0347-4ca0-a459-5ad6355ae4e4&state=rz8Zr1KZkZGGEBx3&response_type=code&nonce=1UY1L6Ve7Nab89lx
2.792 response Response URL with query part
2.792 response {'state': 'rz8Zr1KZkZGGEBx3', 'scope': 'openid address', 'code': 'Ij3tPFq6yFy4E-8c_W1hnaCaaYo6JfbIakUBejy8hnA.BhoMQ5IAA4M04KB-2Gp1y4Mi2geoA_qPdJ-ehwQAN18'}
2.793 response {'state': 'rz8Zr1KZkZGGEBx3', 'scope': 'openid address', 'code': 'Ij3tPFq6yFy4E-8c_W1hnaCaaYo6JfbIakUBejy8hnA.BhoMQ5IAA4M04KB-2Gp1y4Mi2geoA_qPdJ-ehwQAN18'}
2.793 AuthorizationResponse {
"code": "Ij3tPFq6yFy4E-8c_W1hnaCaaYo6JfbIakUBejy8hnA.BhoMQ5IAA4M04KB-2Gp1y4Mi2geoA_qPdJ-ehwQAN18",
"scope": "openid address",
"state": "rz8Zr1KZkZGGEBx3"
}
2.793 phase <--<-- 4 --- AccessToken -->-->
2.793 --> request op_args: {'state': 'rz8Zr1KZkZGGEBx3'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.793 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'rz8Zr1KZkZGGEBx3', 'code': 'Ij3tPFq6yFy4E-8c_W1hnaCaaYo6JfbIakUBejy8hnA.BhoMQ5IAA4M04KB-2Gp1y4Mi2geoA_qPdJ-ehwQAN18', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'a5e1c85e-0347-4ca0-a459-5ad6355ae4e4'}, 'state': 'rz8Zr1KZkZGGEBx3'}
2.793 AccessTokenRequest {
"code": "Ij3tPFq6yFy4E-8c_W1hnaCaaYo6JfbIakUBejy8hnA.BhoMQ5IAA4M04KB-2Gp1y4Mi2geoA_qPdJ-ehwQAN18",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "rz8Zr1KZkZGGEBx3"
}
2.794 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.794 request_http_args {'headers': {'Authorization': 'Basic YTVlMWM4NWUtMDM0Ny00Y2EwLWE0NTktNWFkNjM1NWFlNGU0OnBmODRWVlVVY3hWRg==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.794 request code=Ij3tPFq6yFy4E-8c_W1hnaCaaYo6JfbIakUBejy8hnA.BhoMQ5IAA4M04KB-2Gp1y4Mi2geoA_qPdJ-ehwQAN18&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=rz8Zr1KZkZGGEBx3
3.003 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.004 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYTVlMWM4NWUtMDM0Ny00Y2EwLWE0NTktNWFkNjM1NWFlNGU0Il0sImF1dGhfdGltZSI6MTUyOTc1MDc0OSwiZXhwIjoxNTI5NzU0NDQwLCJpYXQiOjE1Mjk3NTA4NDAsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjU0MmNjYTgyLTE0NDItNDRlMi05ZDYzLTgwZWE3YWJhZjBlYSIsIm5vbmNlIjoiMVVZMUw2VmU3TmFiODlseCIsInJhdCI6MTUyOTc1MDgzOCwic3ViIjoiZm9vQGJhci5jb20ifQ.yuvvCsBU9OvCXSin-IInSgRXtrr1-WFCcgnC0p5y4zUZbF0QEHOpDpGnaHijtQlqKKG1MIAufU1rwwTi8RfrlECOJWDQveKEYMraUOVzVPS15H3S0AbC-zu_AF-Dp98vroSVrXCr2Uli35LL1pSCxMy7V3sDEUKlGRAw321My9sq5GvRGO62Hc_zSg4ZhMx0Z6MgthAwPnKM4n9ccN2Iu7yH7jQpJHvDz6oIGaZbUCw5Xk-XXrbVIt27uOrAjf5LS8U4g8fLGEPRPndMQ5IsURpTlInbaVZ3RXoBiBES6m9IJv_7lA2g-eL8NwSlkUooTWMr1FDFgY4S4V85BXQxgPDFblEvnJktY8Hx5v8sCklh4PSrSwPpFYQkrF_RVOWdcOWV9DyLkzeNl3nVqePaqww41FE0JbdoCPB_QfzNv6cyQ78vDbWBtkfTruXw5YIpKnFRiJt0QmAtJ6FDUIjzeenlLPzs1a4GX8vlSw7S6O2DhgJ8CaTOB-8n0Swu66z3nOTr1CKr9CKHGm-ohMftxxovCWudcTW2fwMulpSHMCRuWSHRICuBYWHqBiCdgzpa-IQogWPPcTDKShMmCAlB6cmgtE78DblUD-CGCfUQsYuuqX5knjg5c2bzreWLdOwYkOjQrwJnHrUGFX3R3NBcA2M2eHSgDwYVXzrzRvzhBbM', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'GqtG0m_X_K14O2N-Xp1yAhtNK-XnTQtWow5bKhM8Gnc.6zIuS-868pPOKIwOcBsom7iquex3Vev3sCG0mQv0EWw', 'scope': 'openid address'}
3.118 AccessTokenResponse {
"access_token": "GqtG0m_X_K14O2N-Xp1yAhtNK-XnTQtWow5bKhM8Gnc.6zIuS-868pPOKIwOcBsom7iquex3Vev3sCG0mQv0EWw",
"expires_in": 3599,
"id_token": {
"aud": [
"a5e1c85e-0347-4ca0-a459-5ad6355ae4e4"
],
"auth_time": 1529750749,
"exp": 1529754440,
"iat": 1529750840,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "542cca82-1442-44e2-9d63-80ea7abaf0ea",
"nonce": "1UY1L6Ve7Nab89lx",
"rat": 1529750838,
"sub": "[email protected]"
},
"scope": "openid address",
"token_type": "bearer"
}
3.118 phase <--<-- 5 --- UserInfo -->-->
3.118 do_user_info_request kwargs:{'state': 'rz8Zr1KZkZGGEBx3', 'method': 'GET', 'authn_method': 'bearer_header'}
3.118 request {'body': None}
3.118 request_url https://oidc-certification.ory.sh:8443/userinfo
3.118 request_http_args {'headers': {'Authorization': 'Bearer GqtG0m_X_K14O2N-Xp1yAhtNK-XnTQtWow5bKhM8Gnc.6zIuS-868pPOKIwOcBsom7iquex3Vev3sCG0mQv0EWw'}}
3.19 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
3.19 OpenIDSchema {
"sub": "[email protected]"
}
3.19 OpenIDSchema {
"sub": "[email protected]"
}
3.19 phase <--<-- 6 --- Done -->-->
3.19 end
3.191 assertion CheckHTTPResponse
3.191 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
3.191 assertion VerifyResponse
3.192 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.192 assertion VerifyScopes
3.192 condition verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['address'] [Verifies that the claims corresponding to the requested scopes are returned]
3.192 condition Done: status=OK
============================================================
Conditions
Check support: status=WARNING, message=No support for: scopes_supported=['address']
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['address'] [Verifies that the claims corresponding to the requested scopes are returned]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
No support for: scopes_supported=['address']
The following claims were missing from the returned information: ['address'] |
Text | hydra/internal/certification/C.F.T.T.s/OP-scope-All.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-scope-All
Test description: Scope requesting all claims
Timestamp: 2018-06-23T10:47:15Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.101 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.102 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.102 phase <--<-- 2 --- Registration -->-->
0.102 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.103 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#afOCONhA3tHSUiZg"
],
"response_types": [
"code"
]
}
0.261 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.262 RegistrationResponse {
"client_id": "5ffbb9c1-0c63-4074-9491-28f0e0fc277c",
"client_secret": "UF_gwCY8VDz6",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "5ffbb9c1-0c63-4074-9491-28f0e0fc277c",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#afOCONhA3tHSUiZg"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.262 phase <--<-- 3 --- AsyncAuthn -->-->
0.262 condition Check support: status=WARNING, message=No support for: scopes_supported=['profile', 'email', 'address', 'phone']
0.262 AuthorizationRequest {
"client_id": "5ffbb9c1-0c63-4074-9491-28f0e0fc277c",
"nonce": "1yrzOHQx6krgPSXA",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid profile email address phone",
"state": "xuXhK2ICXRbT6sfG"
}
0.263 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+profile+email+address+phone&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=5ffbb9c1-0c63-4074-9491-28f0e0fc277c&state=xuXhK2ICXRbT6sfG&response_type=code&nonce=1yrzOHQx6krgPSXA
0.263 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+profile+email+address+phone&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=5ffbb9c1-0c63-4074-9491-28f0e0fc277c&state=xuXhK2ICXRbT6sfG&response_type=code&nonce=1yrzOHQx6krgPSXA
4.3 response Response URL with query part
4.301 response {'state': 'xuXhK2ICXRbT6sfG', 'scope': 'openid profile email address phone', 'code': 'WZA8FZ037sbc_g7mUW-VKuj4tgkhdWk75z2JRY2ZHkw.kZ76IRcCgFSCex4roQ3IZ_Dd6GqJ5epOnYIieb_xY-I'}
4.301 response {'state': 'xuXhK2ICXRbT6sfG', 'scope': 'openid profile email address phone', 'code': 'WZA8FZ037sbc_g7mUW-VKuj4tgkhdWk75z2JRY2ZHkw.kZ76IRcCgFSCex4roQ3IZ_Dd6GqJ5epOnYIieb_xY-I'}
4.301 AuthorizationResponse {
"code": "WZA8FZ037sbc_g7mUW-VKuj4tgkhdWk75z2JRY2ZHkw.kZ76IRcCgFSCex4roQ3IZ_Dd6GqJ5epOnYIieb_xY-I",
"scope": "openid profile email address phone",
"state": "xuXhK2ICXRbT6sfG"
}
4.301 phase <--<-- 4 --- AccessToken -->-->
4.301 --> request op_args: {'state': 'xuXhK2ICXRbT6sfG'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
4.301 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'xuXhK2ICXRbT6sfG', 'code': 'WZA8FZ037sbc_g7mUW-VKuj4tgkhdWk75z2JRY2ZHkw.kZ76IRcCgFSCex4roQ3IZ_Dd6GqJ5epOnYIieb_xY-I', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '5ffbb9c1-0c63-4074-9491-28f0e0fc277c'}, 'state': 'xuXhK2ICXRbT6sfG'}
4.302 AccessTokenRequest {
"code": "WZA8FZ037sbc_g7mUW-VKuj4tgkhdWk75z2JRY2ZHkw.kZ76IRcCgFSCex4roQ3IZ_Dd6GqJ5epOnYIieb_xY-I",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "xuXhK2ICXRbT6sfG"
}
4.302 request_url https://oidc-certification.ory.sh:8443/oauth2/token
4.302 request_http_args {'headers': {'Authorization': 'Basic NWZmYmI5YzEtMGM2My00MDc0LTk0OTEtMjhmMGUwZmMyNzdjOlVGX2d3Q1k4VkR6Ng==', 'Content-Type': 'application/x-www-form-urlencoded'}}
4.302 request code=WZA8FZ037sbc_g7mUW-VKuj4tgkhdWk75z2JRY2ZHkw.kZ76IRcCgFSCex4roQ3IZ_Dd6GqJ5epOnYIieb_xY-I&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=xuXhK2ICXRbT6sfG
4.517 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
4.518 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNWZmYmI5YzEtMGM2My00MDc0LTk0OTEtMjhmMGUwZmMyNzdjIl0sImF1dGhfdGltZSI6MTUyOTc1MDc0OSwiZXhwIjoxNTI5NzU0NDM1LCJpYXQiOjE1Mjk3NTA4MzUsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjdiZWI1YWQwLTFkOWQtNGU4OS1iZmU4LWNkMDRhMTkxZmE1ZCIsIm5vbmNlIjoiMXlyek9IUXg2a3JnUFNYQSIsInJhdCI6MTUyOTc1MDgzMSwic3ViIjoiZm9vQGJhci5jb20ifQ.VBZognv-Jiul9LshSodEeX0fXvnL_B54t-LNfBWXN-7d7TB5hgjsZmPGbvaSSbx0qdnnE3aaTk6eArzBG2cd-Ih3MGc2NeAGvWqFmFD-TF3ASBLy4Er-1HSrxvYGhSe_M4uhNDsYwx2ULxZokOuDlniYFQym9mTzLy9MfvtIxWZHnchtTT2SulR1I1JseiGV_ry-1-d41dKa7CZG2Hy01LALTpU3M1v2L7ZDAzFgQDKi8YGGPlbXL1Chh_rzmNaSjhWKHRq3EZ6nWb3P1FeswjqEslf_XEJYGtKtM502i9s4K0_LbBkhq0CQwtejd4wdhG3hgDAbtX68AobdRg6HsLspHThM71G8un5l281ZiipAUNpkE9eJwdnPkHRNWd30PurypTl3hKbfB5ULBg2Vle1UEaq6WCykmvrKqVnO88YtnCjEjZowMUTDOXLzReRUzjkWtJ-qy9UcbVC53yV8_LqjEeiKXiU_FcTrzj0CEOk1x1b3UYHp2uA_qe2lWee9VigRmKl2r49SebnKQpyQMVrLXZb2J6fIhzx4OE-9LN3Qj8Gt8E5UlwpIdUQcTLd9bCJuCyiQr-JJqJxhwrB5qF5NidNiIBUbmb5VHwZ7j8IbOIhNg_Fcxp2sQOrtgW1Yx6i42Ezyyr2FIDG1qPBgpNbbpIhjwO-OHnhyMlSL4AU', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': '_FiJ3LpkzW0ydTMcrRrFqQURyOPeseUkLcG40A8MDnE.7iMcWKgftVNmNLHTFolNxhMB_WhXEA4wxzy0NXAbhFo', 'scope': 'openid profile email address phone'}
4.604 AccessTokenResponse {
"access_token": "_FiJ3LpkzW0ydTMcrRrFqQURyOPeseUkLcG40A8MDnE.7iMcWKgftVNmNLHTFolNxhMB_WhXEA4wxzy0NXAbhFo",
"expires_in": 3599,
"id_token": {
"aud": [
"5ffbb9c1-0c63-4074-9491-28f0e0fc277c"
],
"auth_time": 1529750749,
"exp": 1529754435,
"iat": 1529750835,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "7beb5ad0-1d9d-4e89-bfe8-cd04a191fa5d",
"nonce": "1yrzOHQx6krgPSXA",
"rat": 1529750831,
"sub": "[email protected]"
},
"scope": "openid profile email address phone",
"token_type": "bearer"
}
4.604 phase <--<-- 5 --- UserInfo -->-->
4.604 do_user_info_request kwargs:{'state': 'xuXhK2ICXRbT6sfG', 'method': 'GET', 'authn_method': 'bearer_header'}
4.605 request {'body': None}
4.605 request_url https://oidc-certification.ory.sh:8443/userinfo
4.605 request_http_args {'headers': {'Authorization': 'Bearer _FiJ3LpkzW0ydTMcrRrFqQURyOPeseUkLcG40A8MDnE.7iMcWKgftVNmNLHTFolNxhMB_WhXEA4wxzy0NXAbhFo'}}
4.698 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
4.699 OpenIDSchema {
"sub": "[email protected]"
}
4.699 OpenIDSchema {
"sub": "[email protected]"
}
4.699 phase <--<-- 6 --- Done -->-->
4.699 end
4.7 assertion CheckHTTPResponse
4.7 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
4.7 assertion VerifyResponse
4.7 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.701 assertion VerifyScopes
4.701 condition verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username', 'email', 'email_verified', 'address', 'phone_number', 'phone_number_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
4.701 condition Done: status=OK
============================================================
Conditions
Check support: status=WARNING, message=No support for: scopes_supported=['profile', 'email', 'address', 'phone']
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username', 'email', 'email_verified', 'address', 'phone_number', 'phone_number_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
No support for: scopes_supported=['profile', 'email', 'address', 'phone']
The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username', 'email', 'email_verified', 'address', 'phone_number', 'phone_number_verified'] |
Text | hydra/internal/certification/C.F.T.T.s/OP-scope-email.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-scope-email
Test description: Scope requesting email claims
Timestamp: 2018-06-23T10:47:25Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.143 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.145 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.145 phase <--<-- 2 --- Registration -->-->
0.145 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.145 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Es1oZIZdTq4xDU37"
],
"response_types": [
"code"
]
}
0.304 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.305 RegistrationResponse {
"client_id": "98d9428f-90d1-4f51-9416-cf90350de5cf",
"client_secret": "dXUURXiqSHe9",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "98d9428f-90d1-4f51-9416-cf90350de5cf",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Es1oZIZdTq4xDU37"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.305 phase <--<-- 3 --- AsyncAuthn -->-->
0.305 condition Check support: status=WARNING, message=No support for: scopes_supported=['email']
0.305 AuthorizationRequest {
"client_id": "98d9428f-90d1-4f51-9416-cf90350de5cf",
"nonce": "B4Vw5MT8LfIePRLm",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid email",
"state": "PDfu4AACDB7uCRJ9"
}
0.305 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+email&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=98d9428f-90d1-4f51-9416-cf90350de5cf&state=PDfu4AACDB7uCRJ9&response_type=code&nonce=B4Vw5MT8LfIePRLm
0.305 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+email&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=98d9428f-90d1-4f51-9416-cf90350de5cf&state=PDfu4AACDB7uCRJ9&response_type=code&nonce=B4Vw5MT8LfIePRLm
2.819 response Response URL with query part
2.82 response {'state': 'PDfu4AACDB7uCRJ9', 'scope': 'openid email', 'code': 'LkbzMOZfkDtJox_WMOUD8ZCvTuxMOKTE_vXDajBt8Iw.eh31vU7si87W3ktCSauU-z13AcMurOWCID83Zr1TsIk'}
2.82 response {'state': 'PDfu4AACDB7uCRJ9', 'scope': 'openid email', 'code': 'LkbzMOZfkDtJox_WMOUD8ZCvTuxMOKTE_vXDajBt8Iw.eh31vU7si87W3ktCSauU-z13AcMurOWCID83Zr1TsIk'}
2.82 AuthorizationResponse {
"code": "LkbzMOZfkDtJox_WMOUD8ZCvTuxMOKTE_vXDajBt8Iw.eh31vU7si87W3ktCSauU-z13AcMurOWCID83Zr1TsIk",
"scope": "openid email",
"state": "PDfu4AACDB7uCRJ9"
}
2.821 phase <--<-- 4 --- AccessToken -->-->
2.821 --> request op_args: {'state': 'PDfu4AACDB7uCRJ9'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.821 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'PDfu4AACDB7uCRJ9', 'code': 'LkbzMOZfkDtJox_WMOUD8ZCvTuxMOKTE_vXDajBt8Iw.eh31vU7si87W3ktCSauU-z13AcMurOWCID83Zr1TsIk', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '98d9428f-90d1-4f51-9416-cf90350de5cf'}, 'state': 'PDfu4AACDB7uCRJ9'}
2.821 AccessTokenRequest {
"code": "LkbzMOZfkDtJox_WMOUD8ZCvTuxMOKTE_vXDajBt8Iw.eh31vU7si87W3ktCSauU-z13AcMurOWCID83Zr1TsIk",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "PDfu4AACDB7uCRJ9"
}
2.821 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.821 request_http_args {'headers': {'Authorization': 'Basic OThkOTQyOGYtOTBkMS00ZjUxLTk0MTYtY2Y5MDM1MGRlNWNmOmRYVVVSWGlxU0hlOQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.821 request code=LkbzMOZfkDtJox_WMOUD8ZCvTuxMOKTE_vXDajBt8Iw.eh31vU7si87W3ktCSauU-z13AcMurOWCID83Zr1TsIk&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=PDfu4AACDB7uCRJ9
3.07 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.071 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiOThkOTQyOGYtOTBkMS00ZjUxLTk0MTYtY2Y5MDM1MGRlNWNmIl0sImF1dGhfdGltZSI6MTUyOTc1MDc0OSwiZXhwIjoxNTI5NzU0NDQ0LCJpYXQiOjE1Mjk3NTA4NDQsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjA4Yjg1MDVlLWQ5YTAtNGYzOS05ZTNhLWVlZjQzMGU2MDhmYiIsIm5vbmNlIjoiQjRWdzVNVDhMZkllUFJMbSIsInJhdCI6MTUyOTc1MDg0Miwic3ViIjoiZm9vQGJhci5jb20ifQ.MnIBJWQ-wRnXoxROKFoyycY7qvaX6quGlPj0nW2nKUkYmRrEYtQUuX2A_OXxKb_ULdjdvov3r0hoj99eYxra7qvJRWGt8g9KMcUR7QPeCYWrWvMxVWf1ul1qARuo3_FqyqfhOKP1fC8gOLENEpDcuoVRt-TcUbDAVK0Cr1hAs7w8U5lvyk-bCwKABkcfGK2aIKiZGQxW7mtDK721PjhZfFGWd-BAqwc9sR5T8CUhg7tF0f5XAO5r0TMzr67N8SUaBR9wTNtYuHMvxJry2AKAhm721VsaZ0HKZ3bN1WaVZrZEW1clwcDJws4Y56gnBvbEb-OvjtC88F02uwgzwnhnCl5XahwXRkAfcx5sHtd9LJbwBzsgbWxU4QJvUKkxchL635r8l7PqKauiGO-MV3luKXvnAXS7l832I5ESRopgI9Uk6gfJEtRXVOs-rSVQ1lMXDxI3WRfvqd4iDp-gp0IYbfAFGj4tAGcoyYW9QpgBHMx1TKX3c0_jFfYQokJUcdPZV9zMQH0xHo2JPo0X9rn7AwaVUhTstFPBVKsuXDj9RqwkUKwK96m5m70WlXmPlafpuP3p8LuYff08lQGXtqBtN522QYLqLZBns06NOHApKPNGMgilR9-tOcYMEZduAG-FdTaV1usXc2nefgLHhaDtyARAGLQk8qeE91WCDMkXy2Q', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'UZcuuRYNbW5N1LyyryJE_noqKNW_uQpSvKHtyKi7YGY.5M9z39nlFo0SP862TLJuyFSJz0gtmcjkIqImBe6nkCk', 'scope': 'openid email'}
3.149 AccessTokenResponse {
"access_token": "UZcuuRYNbW5N1LyyryJE_noqKNW_uQpSvKHtyKi7YGY.5M9z39nlFo0SP862TLJuyFSJz0gtmcjkIqImBe6nkCk",
"expires_in": 3599,
"id_token": {
"aud": [
"98d9428f-90d1-4f51-9416-cf90350de5cf"
],
"auth_time": 1529750749,
"exp": 1529754444,
"iat": 1529750844,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "08b8505e-d9a0-4f39-9e3a-eef430e608fb",
"nonce": "B4Vw5MT8LfIePRLm",
"rat": 1529750842,
"sub": "[email protected]"
},
"scope": "openid email",
"token_type": "bearer"
}
3.149 phase <--<-- 5 --- UserInfo -->-->
3.149 do_user_info_request kwargs:{'state': 'PDfu4AACDB7uCRJ9', 'method': 'GET', 'authn_method': 'bearer_header'}
3.15 request {'body': None}
3.15 request_url https://oidc-certification.ory.sh:8443/userinfo
3.15 request_http_args {'headers': {'Authorization': 'Bearer UZcuuRYNbW5N1LyyryJE_noqKNW_uQpSvKHtyKi7YGY.5M9z39nlFo0SP862TLJuyFSJz0gtmcjkIqImBe6nkCk'}}
3.228 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
3.229 OpenIDSchema {
"sub": "[email protected]"
}
3.229 OpenIDSchema {
"sub": "[email protected]"
}
3.229 phase <--<-- 6 --- Done -->-->
3.229 end
3.23 assertion CheckHTTPResponse
3.23 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
3.23 assertion VerifyResponse
3.23 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.23 assertion VerifyScopes
3.231 condition verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['email', 'email_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
3.231 condition Done: status=OK
============================================================
Conditions
Check support: status=WARNING, message=No support for: scopes_supported=['email']
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['email', 'email_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
No support for: scopes_supported=['email']
The following claims were missing from the returned information: ['email', 'email_verified'] |
Text | hydra/internal/certification/C.F.T.T.s/OP-scope-phone.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-scope-phone
Test description: Scope requesting phone claims
Timestamp: 2018-06-23T10:47:28Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.074 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.076 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.076 phase <--<-- 2 --- Registration -->-->
0.076 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.076 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#EvRrkiKr0Rp2pyYz"
],
"response_types": [
"code"
]
}
0.231 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.232 RegistrationResponse {
"client_id": "5b5d3c35-af23-4a89-b141-457329dd3aac",
"client_secret": "55Zi~q7f8hGI",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "5b5d3c35-af23-4a89-b141-457329dd3aac",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#EvRrkiKr0Rp2pyYz"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.232 phase <--<-- 3 --- AsyncAuthn -->-->
0.233 condition Check support: status=WARNING, message=No support for: scopes_supported=['phone']
0.233 AuthorizationRequest {
"client_id": "5b5d3c35-af23-4a89-b141-457329dd3aac",
"nonce": "E2Ecg2HCQVBSeF19",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid phone",
"state": "oAU3PBlY9oLIkhDh"
}
0.233 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+phone&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=5b5d3c35-af23-4a89-b141-457329dd3aac&state=oAU3PBlY9oLIkhDh&response_type=code&nonce=E2Ecg2HCQVBSeF19
0.233 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+phone&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=5b5d3c35-af23-4a89-b141-457329dd3aac&state=oAU3PBlY9oLIkhDh&response_type=code&nonce=E2Ecg2HCQVBSeF19
2.209 response Response URL with query part
2.209 response {'state': 'oAU3PBlY9oLIkhDh', 'scope': 'openid phone', 'code': '1gPJ1YECwWpLZsn-GG-ZVuiiDiF65Ln73x1tMeUJKi8.d5svJQ1OwSNwugRNr8pdvsx4ERwjnE07asbTx9fpYOs'}
2.21 response {'state': 'oAU3PBlY9oLIkhDh', 'scope': 'openid phone', 'code': '1gPJ1YECwWpLZsn-GG-ZVuiiDiF65Ln73x1tMeUJKi8.d5svJQ1OwSNwugRNr8pdvsx4ERwjnE07asbTx9fpYOs'}
2.21 AuthorizationResponse {
"code": "1gPJ1YECwWpLZsn-GG-ZVuiiDiF65Ln73x1tMeUJKi8.d5svJQ1OwSNwugRNr8pdvsx4ERwjnE07asbTx9fpYOs",
"scope": "openid phone",
"state": "oAU3PBlY9oLIkhDh"
}
2.21 phase <--<-- 4 --- AccessToken -->-->
2.21 --> request op_args: {'state': 'oAU3PBlY9oLIkhDh'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.21 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'oAU3PBlY9oLIkhDh', 'code': '1gPJ1YECwWpLZsn-GG-ZVuiiDiF65Ln73x1tMeUJKi8.d5svJQ1OwSNwugRNr8pdvsx4ERwjnE07asbTx9fpYOs', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '5b5d3c35-af23-4a89-b141-457329dd3aac'}, 'state': 'oAU3PBlY9oLIkhDh'}
2.21 AccessTokenRequest {
"code": "1gPJ1YECwWpLZsn-GG-ZVuiiDiF65Ln73x1tMeUJKi8.d5svJQ1OwSNwugRNr8pdvsx4ERwjnE07asbTx9fpYOs",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "oAU3PBlY9oLIkhDh"
}
2.21 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.21 request_http_args {'headers': {'Authorization': 'Basic NWI1ZDNjMzUtYWYyMy00YTg5LWIxNDEtNDU3MzI5ZGQzYWFjOjU1WmklN0VxN2Y4aEdJ', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.21 request code=1gPJ1YECwWpLZsn-GG-ZVuiiDiF65Ln73x1tMeUJKi8.d5svJQ1OwSNwugRNr8pdvsx4ERwjnE07asbTx9fpYOs&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=oAU3PBlY9oLIkhDh
2.47 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.472 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNWI1ZDNjMzUtYWYyMy00YTg5LWIxNDEtNDU3MzI5ZGQzYWFjIl0sImF1dGhfdGltZSI6MTUyOTc1MDc0OSwiZXhwIjoxNTI5NzU0NDQ4LCJpYXQiOjE1Mjk3NTA4NDgsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjNmYTIzNWU2LTMwN2UtNDUwMi04ZDMxLWUzODFkZGY1OTZlYyIsIm5vbmNlIjoiRTJFY2cySENRVkJTZUYxOSIsInJhdCI6MTUyOTc1MDg0Niwic3ViIjoiZm9vQGJhci5jb20ifQ.jPZivxl27OgpOvC2fhAI3u-UVt9i4ErPP3hVZl1OckYNGi1CrSz4b34CjDS00RAvEj7BGNivbGn22D4L6oTfNmTjZiUGzDouQ-FbVWBJOcke4RltRV9Upl2ej-pVhluiLFrMTSyl8jyY3xJ_imD_w4eHNBR0RStLlLQ-vUfmQrc0GfJ7PCMfmYwix4_khQoXKJ8K3_ehvxCUt6gBw1pJ0mXpz5Gm5qo1VKyJhlunIWCDN_ls4ThzK8aLdaTA-09jz0c7GKHiTydzTr8gWVuqFt5n7tKY5JgB1hbdlN_z4uy7fSHdtXoMi5e93j1J_dMXuR_8Cv4F1p6mRQUbV1Xl7Yt-afauEir3pWrSm97kqFD5sYMvLKIku0pLkruy86AkqvvYRk16QwPZC_JhhBC__936HZfJJ-7QnsLI2IEk3TvyBRzhmJg9nos9x4deGv0wKi77wVwscYlcvpjNh9Nm55qZFNS25H5vVZMloHsAzizdIn3951fnPtAUhAAFI75ncfUgfCuQusnvKQF35LvNeDxyZKsczCNWnWoY979NcBTZzIpxtWgNtFDilZdhusxCi1noi0jqshhE-7kcKFJS6BEPuTYjKVuBZ70z-3H48JRq_In98rPE6bdFefzFE5Bs2QGKwyWq1cU2cRC0y0Lyz7c7PvghO1vJmOLF8vQhX2M', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'EdSgmItX8P1_5B1_15o-ugHdf4epjRykpsXXkUfvzyQ.GywTVnvUOlZzct6cWJOrIWpJbiLQ4Rb_TsnntA3OFBk', 'scope': 'openid phone'}
2.555 AccessTokenResponse {
"access_token": "EdSgmItX8P1_5B1_15o-ugHdf4epjRykpsXXkUfvzyQ.GywTVnvUOlZzct6cWJOrIWpJbiLQ4Rb_TsnntA3OFBk",
"expires_in": 3599,
"id_token": {
"aud": [
"5b5d3c35-af23-4a89-b141-457329dd3aac"
],
"auth_time": 1529750749,
"exp": 1529754448,
"iat": 1529750848,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "3fa235e6-307e-4502-8d31-e381ddf596ec",
"nonce": "E2Ecg2HCQVBSeF19",
"rat": 1529750846,
"sub": "[email protected]"
},
"scope": "openid phone",
"token_type": "bearer"
}
2.555 phase <--<-- 5 --- UserInfo -->-->
2.555 do_user_info_request kwargs:{'state': 'oAU3PBlY9oLIkhDh', 'method': 'GET', 'authn_method': 'bearer_header'}
2.555 request {'body': None}
2.555 request_url https://oidc-certification.ory.sh:8443/userinfo
2.555 request_http_args {'headers': {'Authorization': 'Bearer EdSgmItX8P1_5B1_15o-ugHdf4epjRykpsXXkUfvzyQ.GywTVnvUOlZzct6cWJOrIWpJbiLQ4Rb_TsnntA3OFBk'}}
2.625 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
2.626 OpenIDSchema {
"sub": "[email protected]"
}
2.626 OpenIDSchema {
"sub": "[email protected]"
}
2.626 phase <--<-- 6 --- Done -->-->
2.626 end
2.627 assertion CheckHTTPResponse
2.627 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
2.627 assertion VerifyResponse
2.627 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.628 assertion VerifyScopes
2.628 condition verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['phone_number', 'phone_number_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
2.628 condition Done: status=OK
============================================================
Conditions
Check support: status=WARNING, message=No support for: scopes_supported=['phone']
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['phone_number', 'phone_number_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
No support for: scopes_supported=['phone']
The following claims were missing from the returned information: ['phone_number', 'phone_number_verified'] |
Text | hydra/internal/certification/C.F.T.T.s/OP-scope-profile.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-scope-profile
Test description: Scope requesting profile claims
Timestamp: 2018-06-23T10:47:33Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.076 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.078 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.078 phase <--<-- 2 --- Registration -->-->
0.078 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.078 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#tcc6BgTp9FrxyYqN"
],
"response_types": [
"code"
]
}
0.236 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.237 RegistrationResponse {
"client_id": "ee74b2f5-49e7-40f7-b353-b0b8dfbcd3fa",
"client_secret": "Ihw.pkGKulT.",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "ee74b2f5-49e7-40f7-b353-b0b8dfbcd3fa",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#tcc6BgTp9FrxyYqN"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.237 phase <--<-- 3 --- AsyncAuthn -->-->
0.238 condition Check support: status=WARNING, message=No support for: scopes_supported=['profile']
0.238 AuthorizationRequest {
"client_id": "ee74b2f5-49e7-40f7-b353-b0b8dfbcd3fa",
"nonce": "eQScCTUwFg4AGv11",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid profile",
"state": "5v4IYw9xlYe4H7FL"
}
0.238 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+profile&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=ee74b2f5-49e7-40f7-b353-b0b8dfbcd3fa&state=5v4IYw9xlYe4H7FL&response_type=code&nonce=eQScCTUwFg4AGv11
0.238 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+profile&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=ee74b2f5-49e7-40f7-b353-b0b8dfbcd3fa&state=5v4IYw9xlYe4H7FL&response_type=code&nonce=eQScCTUwFg4AGv11
2.233 response Response URL with query part
2.233 response {'state': '5v4IYw9xlYe4H7FL', 'scope': 'openid profile', 'code': 'KuUP72LVCo0fW4dXLrrpTmjV8VlI2MYcTvp6GaK61Rg.bDxB6ts5XofLOxbcm6OGLzELNAQD80tqDO8goNkUbW0'}
2.234 response {'state': '5v4IYw9xlYe4H7FL', 'scope': 'openid profile', 'code': 'KuUP72LVCo0fW4dXLrrpTmjV8VlI2MYcTvp6GaK61Rg.bDxB6ts5XofLOxbcm6OGLzELNAQD80tqDO8goNkUbW0'}
2.234 AuthorizationResponse {
"code": "KuUP72LVCo0fW4dXLrrpTmjV8VlI2MYcTvp6GaK61Rg.bDxB6ts5XofLOxbcm6OGLzELNAQD80tqDO8goNkUbW0",
"scope": "openid profile",
"state": "5v4IYw9xlYe4H7FL"
}
2.234 phase <--<-- 4 --- AccessToken -->-->
2.234 --> request op_args: {'state': '5v4IYw9xlYe4H7FL'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.234 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': '5v4IYw9xlYe4H7FL', 'code': 'KuUP72LVCo0fW4dXLrrpTmjV8VlI2MYcTvp6GaK61Rg.bDxB6ts5XofLOxbcm6OGLzELNAQD80tqDO8goNkUbW0', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'ee74b2f5-49e7-40f7-b353-b0b8dfbcd3fa'}, 'state': '5v4IYw9xlYe4H7FL'}
2.234 AccessTokenRequest {
"code": "KuUP72LVCo0fW4dXLrrpTmjV8VlI2MYcTvp6GaK61Rg.bDxB6ts5XofLOxbcm6OGLzELNAQD80tqDO8goNkUbW0",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "5v4IYw9xlYe4H7FL"
}
2.234 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.234 request_http_args {'headers': {'Authorization': 'Basic ZWU3NGIyZjUtNDllNy00MGY3LWIzNTMtYjBiOGRmYmNkM2ZhOklody5wa0dLdWxULg==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.234 request code=KuUP72LVCo0fW4dXLrrpTmjV8VlI2MYcTvp6GaK61Rg.bDxB6ts5XofLOxbcm6OGLzELNAQD80tqDO8goNkUbW0&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=5v4IYw9xlYe4H7FL
2.449 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.45 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZWU3NGIyZjUtNDllNy00MGY3LWIzNTMtYjBiOGRmYmNkM2ZhIl0sImF1dGhfdGltZSI6MTUyOTc1MDc0OSwiZXhwIjoxNTI5NzU0NDUyLCJpYXQiOjE1Mjk3NTA4NTIsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImU1ZDYwOWYwLTE4MmYtNDk3OC1hZGE1LTc5NjA1NDQ4Zjk2NCIsIm5vbmNlIjoiZVFTY0NUVXdGZzRBR3YxMSIsInJhdCI6MTUyOTc1MDg1MCwic3ViIjoiZm9vQGJhci5jb20ifQ.YhKWpW6tAgcWx1QJgP_bHIC66Mw1wwQLF1U6ERdveq9x1gn25mMoRnQqUZU5tWrQq2wubiwTf4ap_hJ1myhK_R19MW1hUl2lM_fhuJ6_2hS3ArlLtoFPKg4lpRFDf-La0aukCw2Su-HYeN8ON8j6bdyg2wlyfUVAHzkKD9StHxGqG27F59dtxv15TfftTYAkyMHS0qUwTafu6Lamq4D-16iqAhHcUeWxo7hOGGD4z6-PKoKgQg96MejkMl8WlhJ4qw6-uqwgk1QcYKlxzngyfxq2SelEJqytxIElO8-oVP0pAipvhuZdtH_1fTarhs_TJiWP1kll_YtAS2dzZoh1clwzZjDwB4LyX61weE_zlfnuZwFx7_OQ2mCQLGnQon3NLpjSjJu1CUyALggFGYdvAQ4rN6zqduIZt1cw5shtDNA0ylwC6pnRlwvM74wNsGcuIFH_5Q8gFjtBC5chAo-shh8pxEiF0j7xV-fi-q7CMFSZWRAr3iWnnzNuq-PavWjm7fI-OYcMdoFSIp_CJtRbsv9ZW3vmZl0y0D4PBJO0CuMDadmy1odLneQ44QVxZh_WymKa4iC2Wj56-TS1fSspLQKOKdtjyFTyWm4bzVYZL9jPL8wJQP2Y0Y4gQ-xaD_zDOrOPD9lQRTOZ0-lOCf5Yki9awh6m9bdWn7JaM0EYTK8', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'zxfTfPSKKF0SgpFF_nWHy4lErzRNNC9YAk_CC9oGk_M.o_e5AIPL-_RU8b2JeOF1iAR8DdCKuqapabwNVP2J6Y4', 'scope': 'openid profile'}
2.533 AccessTokenResponse {
"access_token": "zxfTfPSKKF0SgpFF_nWHy4lErzRNNC9YAk_CC9oGk_M.o_e5AIPL-_RU8b2JeOF1iAR8DdCKuqapabwNVP2J6Y4",
"expires_in": 3599,
"id_token": {
"aud": [
"ee74b2f5-49e7-40f7-b353-b0b8dfbcd3fa"
],
"auth_time": 1529750749,
"exp": 1529754452,
"iat": 1529750852,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "e5d609f0-182f-4978-ada5-79605448f964",
"nonce": "eQScCTUwFg4AGv11",
"rat": 1529750850,
"sub": "[email protected]"
},
"scope": "openid profile",
"token_type": "bearer"
}
2.533 phase <--<-- 5 --- UserInfo -->-->
2.533 do_user_info_request kwargs:{'state': '5v4IYw9xlYe4H7FL', 'method': 'GET', 'authn_method': 'bearer_header'}
2.533 request {'body': None}
2.533 request_url https://oidc-certification.ory.sh:8443/userinfo
2.533 request_http_args {'headers': {'Authorization': 'Bearer zxfTfPSKKF0SgpFF_nWHy4lErzRNNC9YAk_CC9oGk_M.o_e5AIPL-_RU8b2JeOF1iAR8DdCKuqapabwNVP2J6Y4'}}
2.606 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
2.607 OpenIDSchema {
"sub": "[email protected]"
}
2.607 OpenIDSchema {
"sub": "[email protected]"
}
2.607 phase <--<-- 6 --- Done -->-->
2.607 end
2.607 assertion CheckHTTPResponse
2.607 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
2.608 assertion VerifyResponse
2.608 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.608 assertion VerifyScopes
2.608 condition verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username'] [Verifies that the claims corresponding to the requested scopes are returned]
2.608 condition Done: status=OK
============================================================
Conditions
Check support: status=WARNING, message=No support for: scopes_supported=['profile']
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username'] [Verifies that the claims corresponding to the requested scopes are returned]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
No support for: scopes_supported=['profile']
The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username'] |
Text | hydra/internal/certification/C.F.T.T.s/OP-UserInfo-Body.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-UserInfo-Body
Test description: UserInfo Endpoint access with POST and bearer body
Timestamp: 2018-06-23T10:44:54Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.075 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.076 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.076 phase <--<-- 2 --- Registration -->-->
0.076 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.077 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#CN4s4BIc0vrzjlqu"
],
"response_types": [
"code"
]
}
0.269 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.27 RegistrationResponse {
"client_id": "23fe7a9e-36ec-48be-8eb4-69769144093e",
"client_secret": "qTPBRtqBGWQj",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "23fe7a9e-36ec-48be-8eb4-69769144093e",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#CN4s4BIc0vrzjlqu"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.27 phase <--<-- 3 --- AsyncAuthn -->-->
0.271 AuthorizationRequest {
"client_id": "23fe7a9e-36ec-48be-8eb4-69769144093e",
"nonce": "8JSArgkq5bDA8TYy",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "55wA3cTDwiw71zfG"
}
0.271 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=23fe7a9e-36ec-48be-8eb4-69769144093e&state=55wA3cTDwiw71zfG&response_type=code&nonce=8JSArgkq5bDA8TYy
0.271 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=23fe7a9e-36ec-48be-8eb4-69769144093e&state=55wA3cTDwiw71zfG&response_type=code&nonce=8JSArgkq5bDA8TYy
3.044 response Response URL with query part
3.044 response {'state': '55wA3cTDwiw71zfG', 'scope': 'openid', 'code': 'YlXoApyliGDYrTYk3-xRug2cQtLYjmk8NWlZMwn1SdE.qRH358g22a2csGVt-wk6UhrhBd3u2GNMloOF6bH93vs'}
3.044 response {'state': '55wA3cTDwiw71zfG', 'scope': 'openid', 'code': 'YlXoApyliGDYrTYk3-xRug2cQtLYjmk8NWlZMwn1SdE.qRH358g22a2csGVt-wk6UhrhBd3u2GNMloOF6bH93vs'}
3.045 AuthorizationResponse {
"code": "YlXoApyliGDYrTYk3-xRug2cQtLYjmk8NWlZMwn1SdE.qRH358g22a2csGVt-wk6UhrhBd3u2GNMloOF6bH93vs",
"scope": "openid",
"state": "55wA3cTDwiw71zfG"
}
3.045 phase <--<-- 4 --- AccessToken -->-->
3.045 --> request op_args: {'state': '55wA3cTDwiw71zfG'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.045 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': '55wA3cTDwiw71zfG', 'code': 'YlXoApyliGDYrTYk3-xRug2cQtLYjmk8NWlZMwn1SdE.qRH358g22a2csGVt-wk6UhrhBd3u2GNMloOF6bH93vs', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '23fe7a9e-36ec-48be-8eb4-69769144093e'}, 'state': '55wA3cTDwiw71zfG'}
3.045 AccessTokenRequest {
"code": "YlXoApyliGDYrTYk3-xRug2cQtLYjmk8NWlZMwn1SdE.qRH358g22a2csGVt-wk6UhrhBd3u2GNMloOF6bH93vs",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "55wA3cTDwiw71zfG"
}
3.045 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.045 request_http_args {'headers': {'Authorization': 'Basic MjNmZTdhOWUtMzZlYy00OGJlLThlYjQtNjk3NjkxNDQwOTNlOnFUUEJSdHFCR1dRag==', 'Content-Type': 'application/x-www-form-urlencoded'}}
3.045 request code=YlXoApyliGDYrTYk3-xRug2cQtLYjmk8NWlZMwn1SdE.qRH358g22a2csGVt-wk6UhrhBd3u2GNMloOF6bH93vs&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=55wA3cTDwiw71zfG
3.275 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.276 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMjNmZTdhOWUtMzZlYy00OGJlLThlYjQtNjk3NjkxNDQwOTNlIl0sImF1dGhfdGltZSI6MTUyOTc1MDU5MiwiZXhwIjoxNTI5NzU0MjkzLCJpYXQiOjE1Mjk3NTA2OTMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImExNGYwYmVjLTY5N2YtNGUwMC05NzJhLTQ3YTM0M2ExYmFlYyIsIm5vbmNlIjoiOEpTQXJna3E1YkRBOFRZeSIsInJhdCI6MTUyOTc1MDY5MSwic3ViIjoiZm9vQGJhci5jb20ifQ.OGONV5FRSqkX1mbRXpPELAkhViP4jSZkchX5EpdH7MNqt6LS6UTVKKMjOWl3CZ2gxO0vA6oY8FlpuBvsCvzVEZUgx8u25Mpse7ivWKZJqN8nPCFMWQCvDPdPWFCGlsv2DbsuN2HXjpnb_1pCcUkBAw41ff6FCGnfhywZVEeDLJBZui54vo8BDmmI0u9RACg1AYOYLPA5ZknHjp8yAAoXioLxy9_UFf4rMtMiMMowuImU1fK-YB_s-ibN5pliBxbnCi5HyGQYIxYDXNd2r2mgzTOYki7g6etf3fbimeUs6VVAbLDKxFvoOCdS_FdVNpnqyE2GD4YXn3pmi4Usa66xotaHuBqBV2K_lAvq3G7weoE9PsGFcI2oZIkiOFuLFGi7TMOYRVLc44iWltM_xyEHhNIcZhWzvHbwGLX2MXmmTm2RCHy6pON7pPO_CzkcgCDBZ7CaeF9gMYOeeeK7enZLRVNPX8dWndWwQ03mU7-ZKpR5aKneG--wch2XCW4NsD_VgjJfKN4t15C-qL1O-HE3kals76i8LqiuhB07p52Fnkmxljn7sVepOuepZ3hnNfhGPAudmqp_ic-ENWT2nrZTxsQz9xiwfAonPOFxCrOUHKUxWLQznNcxVjausWVtCCyZBMG2I324BLY2FI_o16G2vcfnJL2QPFZ_uGHTw6yYT6E', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'J26bERU5tBLxOLxoMlN3rry8S7q_eR8PHTGMRxD1Ovg.PgWCiK8aHQh2B22Gk2jCBOTHM64oI5RwoUOT6HBJyn8', 'scope': 'openid'}
3.358 AccessTokenResponse {
"access_token": "J26bERU5tBLxOLxoMlN3rry8S7q_eR8PHTGMRxD1Ovg.PgWCiK8aHQh2B22Gk2jCBOTHM64oI5RwoUOT6HBJyn8",
"expires_in": 3599,
"id_token": {
"aud": [
"23fe7a9e-36ec-48be-8eb4-69769144093e"
],
"auth_time": 1529750592,
"exp": 1529754293,
"iat": 1529750693,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "a14f0bec-697f-4e00-972a-47a343a1baec",
"nonce": "8JSArgkq5bDA8TYy",
"rat": 1529750691,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.359 phase <--<-- 5 --- UserInfo -->-->
3.359 do_user_info_request kwargs:{'state': '55wA3cTDwiw71zfG', 'method': 'POST', 'authn_method': 'token_in_message_body'}
3.359 request {'body': 'access_token=J26bERU5tBLxOLxoMlN3rry8S7q_eR8PHTGMRxD1Ovg.PgWCiK8aHQh2B22Gk2jCBOTHM64oI5RwoUOT6HBJyn8'}
3.359 request_url https://oidc-certification.ory.sh:8443/userinfo
3.359 request_http_args {'headers': {'Content-Type': 'application/x-www-form-urlencoded'}}
3.439 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
3.439 OpenIDSchema {
"sub": "[email protected]"
}
3.439 OpenIDSchema {
"sub": "[email protected]"
}
3.439 phase <--<-- 6 --- Done -->-->
3.44 end
3.44 assertion VerifyResponse
3.44 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.44 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-UserInfo-Endpoint.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-UserInfo-Endpoint
Test description: UserInfo Endpoint access with GET and bearer header
Timestamp: 2018-06-23T10:45:03Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.074 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.076 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.076 phase <--<-- 2 --- Registration -->-->
0.076 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.076 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#dS4H9oQi7M3amgkM"
],
"response_types": [
"code"
]
}
0.236 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.237 RegistrationResponse {
"client_id": "26991bdc-d9de-4007-9348-c302b9572d19",
"client_secret": "OLC_FYl5_x6k",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "26991bdc-d9de-4007-9348-c302b9572d19",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#dS4H9oQi7M3amgkM"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.237 phase <--<-- 3 --- AsyncAuthn -->-->
0.237 AuthorizationRequest {
"client_id": "26991bdc-d9de-4007-9348-c302b9572d19",
"nonce": "JgZv8B58VKjNmj6P",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "7GWJAnloMV7r7NLC"
}
0.238 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=26991bdc-d9de-4007-9348-c302b9572d19&state=7GWJAnloMV7r7NLC&response_type=code&nonce=JgZv8B58VKjNmj6P
0.238 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=26991bdc-d9de-4007-9348-c302b9572d19&state=7GWJAnloMV7r7NLC&response_type=code&nonce=JgZv8B58VKjNmj6P
1.922 response Response URL with query part
1.923 response {'state': '7GWJAnloMV7r7NLC', 'scope': 'openid', 'code': 'u3sg2MxtP-MIaMcDqUoq4OwJT1-9giC0QVAlRVQEj88.XzDWQudzDssVnvmHBWFoMpN1IqZ-fHsI3rxa2umv7PA'}
1.923 response {'state': '7GWJAnloMV7r7NLC', 'scope': 'openid', 'code': 'u3sg2MxtP-MIaMcDqUoq4OwJT1-9giC0QVAlRVQEj88.XzDWQudzDssVnvmHBWFoMpN1IqZ-fHsI3rxa2umv7PA'}
1.923 AuthorizationResponse {
"code": "u3sg2MxtP-MIaMcDqUoq4OwJT1-9giC0QVAlRVQEj88.XzDWQudzDssVnvmHBWFoMpN1IqZ-fHsI3rxa2umv7PA",
"scope": "openid",
"state": "7GWJAnloMV7r7NLC"
}
1.923 phase <--<-- 4 --- AccessToken -->-->
1.923 --> request op_args: {'state': '7GWJAnloMV7r7NLC'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
1.923 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': '7GWJAnloMV7r7NLC', 'code': 'u3sg2MxtP-MIaMcDqUoq4OwJT1-9giC0QVAlRVQEj88.XzDWQudzDssVnvmHBWFoMpN1IqZ-fHsI3rxa2umv7PA', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '26991bdc-d9de-4007-9348-c302b9572d19'}, 'state': '7GWJAnloMV7r7NLC'}
1.924 AccessTokenRequest {
"code": "u3sg2MxtP-MIaMcDqUoq4OwJT1-9giC0QVAlRVQEj88.XzDWQudzDssVnvmHBWFoMpN1IqZ-fHsI3rxa2umv7PA",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "7GWJAnloMV7r7NLC"
}
1.924 request_url https://oidc-certification.ory.sh:8443/oauth2/token
1.924 request_http_args {'headers': {'Authorization': 'Basic MjY5OTFiZGMtZDlkZS00MDA3LTkzNDgtYzMwMmI5NTcyZDE5Ok9MQ19GWWw1X3g2aw==', 'Content-Type': 'application/x-www-form-urlencoded'}}
1.924 request code=u3sg2MxtP-MIaMcDqUoq4OwJT1-9giC0QVAlRVQEj88.XzDWQudzDssVnvmHBWFoMpN1IqZ-fHsI3rxa2umv7PA&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=7GWJAnloMV7r7NLC
2.169 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.17 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMjY5OTFiZGMtZDlkZS00MDA3LTkzNDgtYzMwMmI5NTcyZDE5Il0sImF1dGhfdGltZSI6MTUyOTc1MDU5MiwiZXhwIjoxNTI5NzU0MzAyLCJpYXQiOjE1Mjk3NTA3MDIsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6Ijc2NDA1YjkwLTc4NjQtNGQ1Yy04MTFhLTNiMDhhNTJiNzcxMiIsIm5vbmNlIjoiSmdadjhCNThWS2pObWo2UCIsInJhdCI6MTUyOTc1MDcwMSwic3ViIjoiZm9vQGJhci5jb20ifQ.YTYm69ZMPcU9epaeVXZ9QPVZsgtz_Wk0rvC0qIdOZQBlZEdixvQVXr9qd_2_7N37fA3N6-3k5qpaPnnElKVsM3_EtGvnslPAGIT3V7fysVT6CtT1WqOGbet5wgZjKT5txNXhRkbclndVGXGHP_JWQ4rl9GqZOPH00bEiBhHGp7uWDwQW3EF0XR1PE1HG3LG-wMhspBHfAGhG86rfkD39wI-ay8F4YByMW9IPEk_htjUe2DqvFGDl2z9RzFFHJiWObUpi5zcOanJPnngx8LRi2T8GZl49FdRzPIx2Yf7EGeDm5VEfUsjr6tArv3A0LdjyP31OQHw3Gx3D6S_7hk-b3sNeNUO0QjASIJ-Vr64yxK2zfYmy084GUsrJmYwQ_NKova1-CqBcHTeGBMlYxXuvXnyYSCye5pY9MMT71XBZbbd_RI7hY8losFhBNIQfdatEkfG_nCyl3OujV3_ZQCDRogSsbjkS-EtasHNhcvTAoWyJJohnpvB8Y1R8i0hOEpbw3o0Bfs2EQD1OqV1ouhz1mHoI8ii5AEbAj6uK7aLdA82YlfBBB2ltkKbsvqaOYdrnIEY86oCosxPB6ZABOE4D0BMH5kCTIAmzdml__Q4S8omblushaahN6N6nuielnJaoyP-aPG4cvu2xRExqQ0ihudh1ty3yN7-tLcCM8pBCR-E', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'o544Fmn8gB1tahnB3pzNzhnBnIB21AS3lVH8N79llik.1WpXmdMxQEDG3-BMy-la_b5ptkey7Fvxh5oSpFtr8CU', 'scope': 'openid'}
2.252 AccessTokenResponse {
"access_token": "o544Fmn8gB1tahnB3pzNzhnBnIB21AS3lVH8N79llik.1WpXmdMxQEDG3-BMy-la_b5ptkey7Fvxh5oSpFtr8CU",
"expires_in": 3599,
"id_token": {
"aud": [
"26991bdc-d9de-4007-9348-c302b9572d19"
],
"auth_time": 1529750592,
"exp": 1529754302,
"iat": 1529750702,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "76405b90-7864-4d5c-811a-3b08a52b7712",
"nonce": "JgZv8B58VKjNmj6P",
"rat": 1529750701,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
2.253 phase <--<-- 5 --- UserInfo -->-->
2.253 do_user_info_request kwargs:{'state': '7GWJAnloMV7r7NLC', 'method': 'GET', 'authn_method': 'bearer_header'}
2.253 request {'body': None}
2.253 request_url https://oidc-certification.ory.sh:8443/userinfo
2.253 request_http_args {'headers': {'Authorization': 'Bearer o544Fmn8gB1tahnB3pzNzhnBnIB21AS3lVH8N79llik.1WpXmdMxQEDG3-BMy-la_b5ptkey7Fvxh5oSpFtr8CU'}}
2.331 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
2.332 OpenIDSchema {
"sub": "[email protected]"
}
2.332 OpenIDSchema {
"sub": "[email protected]"
}
2.332 phase <--<-- 6 --- Done -->-->
2.332 end
2.332 assertion VerifyResponse
2.332 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.332 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-UserInfo-Header.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-UserInfo-Header
Test description: UserInfo Endpoint access with POST and bearer header
Timestamp: 2018-06-23T10:45:06Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.074 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.076 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.076 phase <--<-- 2 --- Registration -->-->
0.076 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.076 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#FsZG8yaaKFEkQRyv"
],
"response_types": [
"code"
]
}
0.23 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.231 RegistrationResponse {
"client_id": "19524c99-63a9-4332-9635-e3b12a4bfebd",
"client_secret": "cEd5J.bIugIQ",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "19524c99-63a9-4332-9635-e3b12a4bfebd",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#FsZG8yaaKFEkQRyv"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.231 phase <--<-- 3 --- AsyncAuthn -->-->
0.232 AuthorizationRequest {
"client_id": "19524c99-63a9-4332-9635-e3b12a4bfebd",
"nonce": "3GSZWZW6lCoJ0r9M",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "iq5OQv3hTLHWY3Lp"
}
0.232 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=19524c99-63a9-4332-9635-e3b12a4bfebd&state=iq5OQv3hTLHWY3Lp&response_type=code&nonce=3GSZWZW6lCoJ0r9M
0.232 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=19524c99-63a9-4332-9635-e3b12a4bfebd&state=iq5OQv3hTLHWY3Lp&response_type=code&nonce=3GSZWZW6lCoJ0r9M
2.446 response Response URL with query part
2.446 response {'state': 'iq5OQv3hTLHWY3Lp', 'scope': 'openid', 'code': 'fZ1s3s9nV7SQtoiWcit46-3IXrP4B9m4drva5NEZvZA.VEAQygqS8n0amJODgmml8Uwrq83tI7CRxt_EIrqZBdg'}
2.447 response {'state': 'iq5OQv3hTLHWY3Lp', 'scope': 'openid', 'code': 'fZ1s3s9nV7SQtoiWcit46-3IXrP4B9m4drva5NEZvZA.VEAQygqS8n0amJODgmml8Uwrq83tI7CRxt_EIrqZBdg'}
2.447 AuthorizationResponse {
"code": "fZ1s3s9nV7SQtoiWcit46-3IXrP4B9m4drva5NEZvZA.VEAQygqS8n0amJODgmml8Uwrq83tI7CRxt_EIrqZBdg",
"scope": "openid",
"state": "iq5OQv3hTLHWY3Lp"
}
2.447 phase <--<-- 4 --- AccessToken -->-->
2.447 --> request op_args: {'state': 'iq5OQv3hTLHWY3Lp'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.447 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'iq5OQv3hTLHWY3Lp', 'code': 'fZ1s3s9nV7SQtoiWcit46-3IXrP4B9m4drva5NEZvZA.VEAQygqS8n0amJODgmml8Uwrq83tI7CRxt_EIrqZBdg', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '19524c99-63a9-4332-9635-e3b12a4bfebd'}, 'state': 'iq5OQv3hTLHWY3Lp'}
2.447 AccessTokenRequest {
"code": "fZ1s3s9nV7SQtoiWcit46-3IXrP4B9m4drva5NEZvZA.VEAQygqS8n0amJODgmml8Uwrq83tI7CRxt_EIrqZBdg",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "iq5OQv3hTLHWY3Lp"
}
2.447 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.447 request_http_args {'headers': {'Authorization': 'Basic MTk1MjRjOTktNjNhOS00MzMyLTk2MzUtZTNiMTJhNGJmZWJkOmNFZDVKLmJJdWdJUQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.447 request code=fZ1s3s9nV7SQtoiWcit46-3IXrP4B9m4drva5NEZvZA.VEAQygqS8n0amJODgmml8Uwrq83tI7CRxt_EIrqZBdg&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=iq5OQv3hTLHWY3Lp
2.66 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.661 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMTk1MjRjOTktNjNhOS00MzMyLTk2MzUtZTNiMTJhNGJmZWJkIl0sImF1dGhfdGltZSI6MTUyOTc1MDU5MiwiZXhwIjoxNTI5NzU0MzA2LCJpYXQiOjE1Mjk3NTA3MDYsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImEwZGNkNmViLTU5ZmMtNDY0Zi1iZTc5LWVlYzM4YzFhZDI1YiIsIm5vbmNlIjoiM0dTWldaVzZsQ29KMHI5TSIsInJhdCI6MTUyOTc1MDcwNCwic3ViIjoiZm9vQGJhci5jb20ifQ.uDl6VRD5NaE7tJDvfvVcgeruKzGsXZXg6k_SzING_2vpFnCTaETzeA1XgsrP9LsMGLhscJFxj9w5SEm8QVMf1jxFyV7zL-p-UbBdoL7fIc0bZDYBcxu1tk2mg_hgedkKEArSXjL4hwYmhh6E8OzwA2hcg-adi7DevHtMo0xPdUNbh7algn1InBN5facazm05hSNuuGqJdypubelT6UBlTBfiuijbgjn-xt94S8pV3ZvQzfv0plEYvfzoqXLkDPgDM_In4I911asVxvrm1KivTYSElt-fOLEclIWIvf1PxuLrH-44UOfScspkWVOrEXuBf18cW7StjI2EO41QVz5Uq7QJ0j5souoHm45E5fxvAXvfjDYX2ILZ3Oyot-IjBDEQbFC9ZaRkDT5ZLZnkSAZ1-BAhSjvg8QicmcRO10NU99dorD2sX8G5YsU6QMe7SvBxGFQHzkRU2Tt0MVaHdw5CpOMgstAGVMHe1rgsC_m6MrHgl3UTc7DeH2Q51AT5qkPOlKWMUeX4K9xTguzSbhZlSqcyJ3bcA1T_No9n9goH4L-YCtcuBIfOyRWu4er8wExGTSaRWD82BpPihE4Hl4rZqEx5rqmRciyKiX-U-VYv08PIsaSHZruU6Tg0ASyDCE6joTlCFTVN07J_pPB4kWOoKlhpcg9Ileedivth0KDBy-U', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'lEAvI-LvpReCmRzQaelaDNrblmhspAFOciiFR-TsYBc.pVztzjiS37hGLBibb1fZch47UIX70zc9Gcupys6RMCE', 'scope': 'openid'}
2.739 AccessTokenResponse {
"access_token": "lEAvI-LvpReCmRzQaelaDNrblmhspAFOciiFR-TsYBc.pVztzjiS37hGLBibb1fZch47UIX70zc9Gcupys6RMCE",
"expires_in": 3599,
"id_token": {
"aud": [
"19524c99-63a9-4332-9635-e3b12a4bfebd"
],
"auth_time": 1529750592,
"exp": 1529754306,
"iat": 1529750706,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "a0dcd6eb-59fc-464f-be79-eec38c1ad25b",
"nonce": "3GSZWZW6lCoJ0r9M",
"rat": 1529750704,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
2.739 phase <--<-- 5 --- UserInfo -->-->
2.739 do_user_info_request kwargs:{'state': 'iq5OQv3hTLHWY3Lp', 'method': 'POST', 'behavior': 'use_authorization_header'}
2.74 request {'body': ''}
2.74 request_url https://oidc-certification.ory.sh:8443/userinfo
2.74 request_http_args {'headers': {'Authorization': 'Bearer lEAvI-LvpReCmRzQaelaDNrblmhspAFOciiFR-TsYBc.pVztzjiS37hGLBibb1fZch47UIX70zc9Gcupys6RMCE', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.812 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
2.813 OpenIDSchema {
"sub": "[email protected]"
}
2.813 OpenIDSchema {
"sub": "[email protected]"
}
2.813 phase <--<-- 6 --- Done -->-->
2.813 end
2.813 assertion VerifyResponse
2.813 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.813 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/C.F.T.T.s/OP-UserInfo-RS256.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-UserInfo-RS256
Test description: RP registers userinfo_signed_response_alg to signal that it wants signed UserInfo returned
Timestamp: 2018-06-23T10:45:10Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.092 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.093 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.093 phase <--<-- 2 --- Registration -->-->
0.094 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'userinfo_signed_response_alg': 'RS256'}
0.094 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Ztc7biwTsjlG3fdD"
],
"response_types": [
"code"
],
"userinfo_signed_response_alg": "RS256"
}
0.249 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.25 RegistrationResponse {
"client_id": "da4bd40a-7787-4977-a0c4-fe4a83c590e3",
"client_secret": "wvuX4KT9oOBp",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code"
],
"id": "da4bd40a-7787-4977-a0c4-fe4a83c590e3",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Ztc7biwTsjlG3fdD"
],
"response_types": [
"code"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "RS256"
}
0.25 phase <--<-- 3 --- AsyncAuthn -->-->
0.251 AuthorizationRequest {
"client_id": "da4bd40a-7787-4977-a0c4-fe4a83c590e3",
"nonce": "NCy0gQtufCd5PQsv",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "2MJFLy7CHGvobA3G"
}
0.251 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=da4bd40a-7787-4977-a0c4-fe4a83c590e3&state=2MJFLy7CHGvobA3G&response_type=code&nonce=NCy0gQtufCd5PQsv
0.251 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=da4bd40a-7787-4977-a0c4-fe4a83c590e3&state=2MJFLy7CHGvobA3G&response_type=code&nonce=NCy0gQtufCd5PQsv
2.225 response Response URL with query part
2.225 response {'state': '2MJFLy7CHGvobA3G', 'scope': 'openid', 'code': 'xOw-vY3U5TfJXnVh9yN7wvB3x5EoRcx-9kFayPoIjjE.5IDHzDod24rCpK3mgVTGiPTpYrMuLPDk1owLCXRDtmc'}
2.226 response {'state': '2MJFLy7CHGvobA3G', 'scope': 'openid', 'code': 'xOw-vY3U5TfJXnVh9yN7wvB3x5EoRcx-9kFayPoIjjE.5IDHzDod24rCpK3mgVTGiPTpYrMuLPDk1owLCXRDtmc'}
2.226 AuthorizationResponse {
"code": "xOw-vY3U5TfJXnVh9yN7wvB3x5EoRcx-9kFayPoIjjE.5IDHzDod24rCpK3mgVTGiPTpYrMuLPDk1owLCXRDtmc",
"scope": "openid",
"state": "2MJFLy7CHGvobA3G"
}
2.226 phase <--<-- 4 --- AccessToken -->-->
2.226 --> request op_args: {'state': '2MJFLy7CHGvobA3G'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.226 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': '2MJFLy7CHGvobA3G', 'code': 'xOw-vY3U5TfJXnVh9yN7wvB3x5EoRcx-9kFayPoIjjE.5IDHzDod24rCpK3mgVTGiPTpYrMuLPDk1owLCXRDtmc', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'da4bd40a-7787-4977-a0c4-fe4a83c590e3'}, 'state': '2MJFLy7CHGvobA3G'}
2.226 AccessTokenRequest {
"code": "xOw-vY3U5TfJXnVh9yN7wvB3x5EoRcx-9kFayPoIjjE.5IDHzDod24rCpK3mgVTGiPTpYrMuLPDk1owLCXRDtmc",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "2MJFLy7CHGvobA3G"
}
2.226 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.226 request_http_args {'headers': {'Authorization': 'Basic ZGE0YmQ0MGEtNzc4Ny00OTc3LWEwYzQtZmU0YTgzYzU5MGUzOnd2dVg0S1Q5b09CcA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.226 request code=xOw-vY3U5TfJXnVh9yN7wvB3x5EoRcx-9kFayPoIjjE.5IDHzDod24rCpK3mgVTGiPTpYrMuLPDk1owLCXRDtmc&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=2MJFLy7CHGvobA3G
2.451 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.452 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0OTA5NjhlOC1jNmU1LTQ0MWUtYjQyZS01MDUzZDZjNjdhZjIiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZGE0YmQ0MGEtNzc4Ny00OTc3LWEwYzQtZmU0YTgzYzU5MGUzIl0sImF1dGhfdGltZSI6MTUyOTc1MDU5MiwiZXhwIjoxNTI5NzU0MzEwLCJpYXQiOjE1Mjk3NTA3MTAsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjMyZWYwNWY1LWM0ZjMtNDIxMi1iMmE5LTExNTExNDY5ODA1MyIsIm5vbmNlIjoiTkN5MGdRdHVmQ2Q1UFFzdiIsInJhdCI6MTUyOTc1MDcwOCwic3ViIjoiZm9vQGJhci5jb20ifQ.t7-Bopt6G9ai7hh5jErVJd9PA3z23u2ZAcudonXC3iKlQq3uiVYHNjrq_ntbv8IOZP9CTuNC_mGDpdbs8O5qW16k0Aj3wirLCda_mh2uaHSZAg3cGCZcdJddrnpaSJDBuf6YJByJQN52iJ05YZKfN4CgZzOKmiKQd9QiUq9eJJlJwH-yqxdWKEJnbbgEgA0UvH5yD35AR0w_swbQedFGWn-V1Qj1-E5U3CqFuON7fa5qw3qWC03Pi5cE99xnbrj39HVzbc9icBtHv4OiAQ60arhM4NoL_0gV6V8NoD_FANdV68u5B9iiz0A5W53AIK3RG1nbgZWMPqBbwsJt2BrEkvEmPthLt9aRrZlQal6xvojGnHWpYaSWWcX2UtIkpocAFaa-8fImqvoUU3uOOxSnicLVM-8hLlt1LLAF3s-vZXSEOt3SqSuDAurPi60D3d18lO0SDd30kmbvuz9NYVI3voE4ba2YHcipuPlKzIN-yIiCWTODlt6KXcFMxCQWNILoTC137KgXoCYyxiqUZv3vd7QWiFD6mJc5tDLfGe6CUyjkYi_IlmmEkRn2e4fR8yT_7kOObNMT_UeodC-3IRdNcjnRA58GgYB_XrQReQhkCBfOOzniCIIdBy4k-rFy43oooRyWBfpi6qXCvwjDbDnmrKAGfcrz7y3zoYPssCwBAlU', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': '49imjZ6rmSX5edbq0ufODE_P6lmvSy168GTdhYwWynU.Hz4S_JToZtIMrZI-kaMunN30jN9VjyvmfPKIo8atT7E', 'scope': 'openid'}
2.539 AccessTokenResponse {
"access_token": "49imjZ6rmSX5edbq0ufODE_P6lmvSy168GTdhYwWynU.Hz4S_JToZtIMrZI-kaMunN30jN9VjyvmfPKIo8atT7E",
"expires_in": 3599,
"id_token": {
"aud": [
"da4bd40a-7787-4977-a0c4-fe4a83c590e3"
],
"auth_time": 1529750592,
"exp": 1529754310,
"iat": 1529750710,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "32ef05f5-c4f3-4212-b2a9-115114698053",
"nonce": "NCy0gQtufCd5PQsv",
"rat": 1529750708,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
2.539 phase <--<-- 5 --- UserInfo -->-->
2.539 do_user_info_request kwargs:{'state': '2MJFLy7CHGvobA3G', 'method': 'GET', 'authn_method': 'bearer_header', 'ctype': 'jwt'}
2.539 request {'body': None}
2.539 request_url https://oidc-certification.ory.sh:8443/userinfo
2.539 request_http_args {'headers': {'Authorization': 'Bearer 49imjZ6rmSX5edbq0ufODE_P6lmvSy168GTdhYwWynU.Hz4S_JToZtIMrZI-kaMunN30jN9VjyvmfPKIo8atT7E'}}
2.67 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
2.674 OpenIDSchema {
"aud": [
"da4bd40a-7787-4977-a0c4-fe4a83c590e3"
],
"iss": "https://oidc-certification.ory.sh:8443/",
"sub": "[email protected]"
}
2.674 OpenIDSchema {
"aud": [
"da4bd40a-7787-4977-a0c4-fe4a83c590e3"
],
"iss": "https://oidc-certification.ory.sh:8443/",
"sub": "[email protected]"
}
2.674 phase <--<-- 6 --- Done -->-->
2.674 end
2.675 assertion VerifyResponse
2.675 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.675 assertion CheckAsymSignedUserInfo
2.675 condition asym-signed-userinfo: status=OK [Verifies that the UserInfo was signed with a RSA key]
2.675 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
asym-signed-userinfo: status=OK [Verifies that the UserInfo was signed with a RSA key]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CI.F.T.T.s/OP-claims-essential.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-claims-essential
Test description: Claims request with essential name claim
Timestamp: 2018-06-23T10:53:03Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.071 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.073 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.073 phase <--<-- 2 --- Registration -->-->
0.073 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.073 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#p1FlzphpgFkJTQ9L"
],
"response_types": [
"code id_token"
]
}
0.234 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.235 RegistrationResponse {
"client_id": "6b484614-5af7-49c6-ae42-a76478fbb424",
"client_secret": "rtu0jUVDvre~",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "6b484614-5af7-49c6-ae42-a76478fbb424",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#p1FlzphpgFkJTQ9L"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.235 phase <--<-- 3 --- AsyncAuthn -->-->
0.235 AuthorizationRequest {
"claims": {
"userinfo": {
"name": {
"essential": true
}
}
},
"client_id": "6b484614-5af7-49c6-ae42-a76478fbb424",
"nonce": "hGQrxOFXkpRg5qBW",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "aSft07CSxD12s7FU"
}
0.236 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=6b484614-5af7-49c6-ae42-a76478fbb424&claims=%7B%22userinfo%22%3A+%7B%22name%22%3A+%7B%22essential%22%3A+true%7D%7D%7D&state=aSft07CSxD12s7FU&response_type=code+id_token&nonce=hGQrxOFXkpRg5qBW
0.236 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=6b484614-5af7-49c6-ae42-a76478fbb424&claims=%7B%22userinfo%22%3A+%7B%22name%22%3A+%7B%22essential%22%3A+true%7D%7D%7D&state=aSft07CSxD12s7FU&response_type=code+id_token&nonce=hGQrxOFXkpRg5qBW
2.849 http args {}
3.054 response URL with fragment
3.054 response code=AeenAWqYKEvY7aoVbji4SZub_GBBiYQmZaNHkD0f93M.VBUUXzdY2ZY9IcivvERFcZHG-rGjJHEc4rzreg94h3Y&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNmI0ODQ2MTQtNWFmNy00OWM2LWFlNDItYTc2NDc4ZmJiNDI0Il0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiMXVhV3RUcWNiUnVOTlVlaWVyUjdrUSIsImV4cCI6MTUyOTc1NDc4MiwiaWF0IjoxNTI5NzUxMTgyLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJhOWNlOTNkMi1mZWNhLTQxYjQtOTVlMS1jN2Q4ODkyZjk0YjQiLCJub25jZSI6ImhHUXJ4T0ZYa3BSZzVxQlciLCJyYXQiOjE1Mjk3NTExODAsInN1YiI6ImZvb0BiYXIuY29tIn0.Jm8LXjo7CWFylxo-Os7yKMThZuNPRpV0NEmDfk5bXuq3O7LFEEZgtoIPgprp0SlCynyqEMBXi1oNW5FhGcdBIaacpFGIMp7oEv8uXSA_yxMHZirBt4w8F534AddRYhxtHtDd-84V5jYnp03X5RMVOEJlieHTajLaJwBHCFOs1uRwifEnAxTMxSvmHQ8OOPApaWlAq4dh1RYk3j7zcU1UbR9rjmRik1I3trcjhYGRqTifvCeabbsOivmBHi8ZRYqFaPyKC0wt0Vljg-DBLwbya_4RQdQtvCimJzNCPSN7hxZe5g1F4FkmKKgw1baM4hcfPkElA-zWvfEM7ZY7R59TH4rDB-jXv5F9FB54v-_pTt86Szo6FdOpkqoaD6iJjYyD1tgIquMVT2r9sqv6ZvfSGxAf2AYvmBKATzShwcVXS_d1tsfDPzOPhZyWFJjqYM0864Q4zEw6CJPP8g-5-xXZNjzg2urCgcb6K230le8-LHRPENL_w0RQvBqodJ2IPhdpJkVTa6EVyY0EHuTnzxWdiJjyyVAbwcmUDLjvhBfGRUyMAKoBbx_5nO2NTwqVAeWknjrCKDy6rE2MGI-4zr42a9Iprd2UXrnd6rycoRymevkI5VbkLx_jXwKml6-cDcKWV3u1yFakdyKj18me3WCkuVXIuJWTQRJLhqfLZb1b_kg&state=aSft07CSxD12s7FU
3.054 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNmI0ODQ2MTQtNWFmNy00OWM2LWFlNDItYTc2NDc4ZmJiNDI0Il0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiMXVhV3RUcWNiUnVOTlVlaWVyUjdrUSIsImV4cCI6MTUyOTc1NDc4MiwiaWF0IjoxNTI5NzUxMTgyLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJhOWNlOTNkMi1mZWNhLTQxYjQtOTVlMS1jN2Q4ODkyZjk0YjQiLCJub25jZSI6ImhHUXJ4T0ZYa3BSZzVxQlciLCJyYXQiOjE1Mjk3NTExODAsInN1YiI6ImZvb0BiYXIuY29tIn0.Jm8LXjo7CWFylxo-Os7yKMThZuNPRpV0NEmDfk5bXuq3O7LFEEZgtoIPgprp0SlCynyqEMBXi1oNW5FhGcdBIaacpFGIMp7oEv8uXSA_yxMHZirBt4w8F534AddRYhxtHtDd-84V5jYnp03X5RMVOEJlieHTajLaJwBHCFOs1uRwifEnAxTMxSvmHQ8OOPApaWlAq4dh1RYk3j7zcU1UbR9rjmRik1I3trcjhYGRqTifvCeabbsOivmBHi8ZRYqFaPyKC0wt0Vljg-DBLwbya_4RQdQtvCimJzNCPSN7hxZe5g1F4FkmKKgw1baM4hcfPkElA-zWvfEM7ZY7R59TH4rDB-jXv5F9FB54v-_pTt86Szo6FdOpkqoaD6iJjYyD1tgIquMVT2r9sqv6ZvfSGxAf2AYvmBKATzShwcVXS_d1tsfDPzOPhZyWFJjqYM0864Q4zEw6CJPP8g-5-xXZNjzg2urCgcb6K230le8-LHRPENL_w0RQvBqodJ2IPhdpJkVTa6EVyY0EHuTnzxWdiJjyyVAbwcmUDLjvhBfGRUyMAKoBbx_5nO2NTwqVAeWknjrCKDy6rE2MGI-4zr42a9Iprd2UXrnd6rycoRymevkI5VbkLx_jXwKml6-cDcKWV3u1yFakdyKj18me3WCkuVXIuJWTQRJLhqfLZb1b_kg', 'state': 'aSft07CSxD12s7FU', 'code': 'AeenAWqYKEvY7aoVbji4SZub_GBBiYQmZaNHkD0f93M.VBUUXzdY2ZY9IcivvERFcZHG-rGjJHEc4rzreg94h3Y'}
3.148 AuthorizationResponse {
"code": "AeenAWqYKEvY7aoVbji4SZub_GBBiYQmZaNHkD0f93M.VBUUXzdY2ZY9IcivvERFcZHG-rGjJHEc4rzreg94h3Y",
"id_token": {
"aud": [
"6b484614-5af7-49c6-ae42-a76478fbb424"
],
"auth_time": 1529750975,
"c_hash": "1uaWtTqcbRuNNUeierR7kQ",
"exp": 1529754782,
"iat": 1529751182,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "a9ce93d2-feca-41b4-95e1-c7d8892f94b4",
"nonce": "hGQrxOFXkpRg5qBW",
"rat": 1529751180,
"sub": "[email protected]"
},
"state": "aSft07CSxD12s7FU"
}
3.148 phase <--<-- 4 --- AccessToken -->-->
3.148 --> request op_args: {'state': 'aSft07CSxD12s7FU'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.148 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'aSft07CSxD12s7FU', 'code': 'AeenAWqYKEvY7aoVbji4SZub_GBBiYQmZaNHkD0f93M.VBUUXzdY2ZY9IcivvERFcZHG-rGjJHEc4rzreg94h3Y', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '6b484614-5af7-49c6-ae42-a76478fbb424'}, 'state': 'aSft07CSxD12s7FU'}
3.148 AccessTokenRequest {
"code": "AeenAWqYKEvY7aoVbji4SZub_GBBiYQmZaNHkD0f93M.VBUUXzdY2ZY9IcivvERFcZHG-rGjJHEc4rzreg94h3Y",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "aSft07CSxD12s7FU"
}
3.149 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.149 request_http_args {'headers': {'Authorization': 'Basic NmI0ODQ2MTQtNWFmNy00OWM2LWFlNDItYTc2NDc4ZmJiNDI0OnJ0dTBqVVZEdnJlJTdF', 'Content-Type': 'application/x-www-form-urlencoded'}}
3.149 request code=AeenAWqYKEvY7aoVbji4SZub_GBBiYQmZaNHkD0f93M.VBUUXzdY2ZY9IcivvERFcZHG-rGjJHEc4rzreg94h3Y&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=aSft07CSxD12s7FU
3.362 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.363 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNmI0ODQ2MTQtNWFmNy00OWM2LWFlNDItYTc2NDc4ZmJiNDI0Il0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiMXVhV3RUcWNiUnVOTlVlaWVyUjdrUSIsImV4cCI6MTUyOTc1NDc4MiwiaWF0IjoxNTI5NzUxMTgzLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJkOGM5MWRhNS0xOWE2LTRiOWUtYTk5Zi04NDgwMWJjNWM1MTAiLCJub25jZSI6ImhHUXJ4T0ZYa3BSZzVxQlciLCJyYXQiOjE1Mjk3NTExODAsInN1YiI6ImZvb0BiYXIuY29tIn0.PiPf7iaNPDC14NqsrfzGLjuZAe9c2AQ4oPCcVqjeBGOoGxvmLwi-YnkfRJJjaTzWCivm6NymNZq7gP7br2i-ID0Cgn0Ox-tcZ6HX_De438Easw-TU1HZOnkxLVb6nWYwkBTGrrPxcO7YzxJAQ5p0xkAI48q329WOleKxjK6d63euvmjB4M8pimCZgT-EseyYQOFzqu4lAn7_pwf7qKoHFa1_98b1n5g2Snn295w9gwgEJksFzmCVRYtR18d7MtEO8YnGPZANUTLD6jVyGCWrIMkm7gAC9WRJCa-Jb8MxQeoGXaJuskv0i6iBkEW0pdKowF5uPvUJBk0cVoCi3NcHOUYjBLuYqp0eO9wy8RUpEeB-eUsrvIjBVDgsYwNmQiJ4IC24T5kiJCEh74Sl_qlWJdkIjm-LbRrL_AmQp4Ftr85NoJIiidZ56XwoPer_Pa6s3w7sfcG6tZJ0NZxoYsuUSGIJo7reVYWCb9D8cJ6HxVe9djc7vPUjYFYfQRl1Z3LFKHQJYv05sR9dLDvdfroOEwCGywScwLneQZlmGedY7iiQzloZSvhwGx3n15gsGOO1giSmpuzt2CcF1a6aV6dR1Ww-IsIhNfrQUiF-QluwV4Lh-T5gZqZ2GF-HhPOTJrD74Fs2-UG90ehtKIaTIQQDDRUAmAqo26-83ucq9G-DwwQ', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'AG9sIqwGoZjt7hjPO_mDZwG7UNbwFlg35okGl9KOd_c.YVmddbnx1l8m8SE0gpFEGAT0e87CEieQpyvYWYZbUhk', 'scope': 'openid'}
3.366 AccessTokenResponse {
"access_token": "AG9sIqwGoZjt7hjPO_mDZwG7UNbwFlg35okGl9KOd_c.YVmddbnx1l8m8SE0gpFEGAT0e87CEieQpyvYWYZbUhk",
"expires_in": 3599,
"id_token": {
"aud": [
"6b484614-5af7-49c6-ae42-a76478fbb424"
],
"auth_time": 1529750975,
"c_hash": "1uaWtTqcbRuNNUeierR7kQ",
"exp": 1529754782,
"iat": 1529751183,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "d8c91da5-19a6-4b9e-a99f-84801bc5c510",
"nonce": "hGQrxOFXkpRg5qBW",
"rat": 1529751180,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.366 phase <--<-- 5 --- UserInfo -->-->
3.366 do_user_info_request kwargs:{'state': 'aSft07CSxD12s7FU', 'method': 'GET', 'authn_method': 'bearer_header'}
3.366 request {'body': None}
3.366 request_url https://oidc-certification.ory.sh:8443/userinfo
3.367 request_http_args {'headers': {'Authorization': 'Bearer AG9sIqwGoZjt7hjPO_mDZwG7UNbwFlg35okGl9KOd_c.YVmddbnx1l8m8SE0gpFEGAT0e87CEieQpyvYWYZbUhk'}}
3.44 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
3.441 OpenIDSchema {
"sub": "[email protected]"
}
3.441 OpenIDSchema {
"sub": "[email protected]"
}
3.441 phase <--<-- 6 --- Done -->-->
3.441 end
3.442 assertion VerifyClaims
3.442 condition verify-claims: status=WARNING, message=Missing required claim: name [Verifies that the claims returned as UserInfo or in the ID Token is consistent with what was asked for]
3.442 assertion CheckHTTPResponse
3.442 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
3.442 condition Done: status=OK
============================================================
Conditions
verify-claims: status=WARNING, message=Missing required claim: name [Verifies that the claims returned as UserInfo or in the ID Token is consistent with what was asked for]
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
Missing required claim: name |
Text | hydra/internal/certification/CI.F.T.T.s/OP-ClientAuth-Basic-Dynamic.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-ClientAuth-Basic-Dynamic
Test description: Access token request with client_secret_basic authentication
Timestamp: 2018-06-23T10:52:36Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.075 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.077 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.077 phase <--<-- 2 --- Registration -->-->
0.077 register kwargs:{'application_name': 'OIC test tool', 'token_endpoint_auth_method': 'client_secret_basic', 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'response_types': ['code id_token'], 'url': 'https://oidc-certification.ory.sh:8443/clients', 'application_type': 'web'}
0.077 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#OiyJvR4yVkJM3nRf"
],
"response_types": [
"code id_token"
],
"token_endpoint_auth_method": "client_secret_basic"
}
0.237 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.238 RegistrationResponse {
"client_id": "d5eab431-2dfb-473d-8522-bf10654623b8",
"client_secret": "N_9W~UVpRECK",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "d5eab431-2dfb-473d-8522-bf10654623b8",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#OiyJvR4yVkJM3nRf"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.238 phase <--<-- 3 --- AsyncAuthn -->-->
0.239 AuthorizationRequest {
"client_id": "d5eab431-2dfb-473d-8522-bf10654623b8",
"nonce": "4rnKjtb151JJSYV4",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "xKfCNycWHarQegeT"
}
0.239 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=d5eab431-2dfb-473d-8522-bf10654623b8&state=xKfCNycWHarQegeT&response_type=code+id_token&nonce=4rnKjtb151JJSYV4
0.239 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=d5eab431-2dfb-473d-8522-bf10654623b8&state=xKfCNycWHarQegeT&response_type=code+id_token&nonce=4rnKjtb151JJSYV4
2.239 http args {}
2.411 response URL with fragment
2.411 response code=xN5s-M4iSkj2iZm04r6RtS0zoQSCNRn5zMGw5uHJn_E.AoEIUUSbnRtDi0EeZ6WeDzNz-MwsSKd9gnghdIBdVIY&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZDVlYWI0MzEtMmRmYi00NzNkLTg1MjItYmYxMDY1NDYyM2I4Il0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiT2FPRWtNZ3BmZDgxN2U5VVB4NGdFUSIsImV4cCI6MTUyOTc1NDc1NSwiaWF0IjoxNTI5NzUxMTU1LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI0Y2YzNzMxYy1lODQ5LTQyZTktOTFmNS0yMjU5NTgyZDA1OGEiLCJub25jZSI6IjRybktqdGIxNTFKSlNZVjQiLCJyYXQiOjE1Mjk3NTExNTQsInN1YiI6ImZvb0BiYXIuY29tIn0.o7PywR9XjTGrWslVA7XOaIf5cqQ-kVs7XktIi_vLl0Gr1wWzVsAQozf4wEvxdZHLIjRLyi7VRcMZZoGLPbycXgHw2bmjsnUc4-gEuwwzMYZtkRSdJdCrv_HeAr4Y4jiczXvVqNvVfxne4_FQGUrQjfq0Lcou0vQx5tXclFL6zK6ehR9mGOWit9QamvLEVDnMRmhUkgegLdMTXvZ5RcH0XmXcW--3rXfXbSoOBWIEVSsrpNBLzKc1gw9TtGdmzT4o8cPMxZZsfPrkT3NT9HU1k5wbHA3wW7J-xHOy529MaNOcaZUt4iwBe2J09TFTreqASiLGqqIfKbkl2R_guyFrdSXdWSm62Sdb2gYSk0iyx1iETJK7sG7jldxG09iLzyXOZSvnDsZxlpMrTZgLF9I_rDwy3Hcecugk1H-7NjlhleI8DxcNlmkKr03s0-R96NiCJ2qczzlv8wpTBzcu-gmJXybE5zF6tjwCfxgcNcUxqvgtRUgJ6cYgkjXD7s7upDVd8izxL-QyNb22rNH9H1SPQa8rCGRuNBlbHkSWveXjDmCXPwagT3BbCp3Q6Y1QopKeSYpD0yIqvUi8jeZS0A8L32An3gNl5fLXhWm0-x3ivlhF8OI-_vaC9gMFd6UM2Emo8FxGHqtafxEq9DzY7UUMl_WSruQzDLzy4eq88BEkOqo&state=xKfCNycWHarQegeT
2.412 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZDVlYWI0MzEtMmRmYi00NzNkLTg1MjItYmYxMDY1NDYyM2I4Il0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiT2FPRWtNZ3BmZDgxN2U5VVB4NGdFUSIsImV4cCI6MTUyOTc1NDc1NSwiaWF0IjoxNTI5NzUxMTU1LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI0Y2YzNzMxYy1lODQ5LTQyZTktOTFmNS0yMjU5NTgyZDA1OGEiLCJub25jZSI6IjRybktqdGIxNTFKSlNZVjQiLCJyYXQiOjE1Mjk3NTExNTQsInN1YiI6ImZvb0BiYXIuY29tIn0.o7PywR9XjTGrWslVA7XOaIf5cqQ-kVs7XktIi_vLl0Gr1wWzVsAQozf4wEvxdZHLIjRLyi7VRcMZZoGLPbycXgHw2bmjsnUc4-gEuwwzMYZtkRSdJdCrv_HeAr4Y4jiczXvVqNvVfxne4_FQGUrQjfq0Lcou0vQx5tXclFL6zK6ehR9mGOWit9QamvLEVDnMRmhUkgegLdMTXvZ5RcH0XmXcW--3rXfXbSoOBWIEVSsrpNBLzKc1gw9TtGdmzT4o8cPMxZZsfPrkT3NT9HU1k5wbHA3wW7J-xHOy529MaNOcaZUt4iwBe2J09TFTreqASiLGqqIfKbkl2R_guyFrdSXdWSm62Sdb2gYSk0iyx1iETJK7sG7jldxG09iLzyXOZSvnDsZxlpMrTZgLF9I_rDwy3Hcecugk1H-7NjlhleI8DxcNlmkKr03s0-R96NiCJ2qczzlv8wpTBzcu-gmJXybE5zF6tjwCfxgcNcUxqvgtRUgJ6cYgkjXD7s7upDVd8izxL-QyNb22rNH9H1SPQa8rCGRuNBlbHkSWveXjDmCXPwagT3BbCp3Q6Y1QopKeSYpD0yIqvUi8jeZS0A8L32An3gNl5fLXhWm0-x3ivlhF8OI-_vaC9gMFd6UM2Emo8FxGHqtafxEq9DzY7UUMl_WSruQzDLzy4eq88BEkOqo', 'state': 'xKfCNycWHarQegeT', 'code': 'xN5s-M4iSkj2iZm04r6RtS0zoQSCNRn5zMGw5uHJn_E.AoEIUUSbnRtDi0EeZ6WeDzNz-MwsSKd9gnghdIBdVIY'}
2.515 AuthorizationResponse {
"code": "xN5s-M4iSkj2iZm04r6RtS0zoQSCNRn5zMGw5uHJn_E.AoEIUUSbnRtDi0EeZ6WeDzNz-MwsSKd9gnghdIBdVIY",
"id_token": {
"aud": [
"d5eab431-2dfb-473d-8522-bf10654623b8"
],
"auth_time": 1529750975,
"c_hash": "OaOEkMgpfd817e9UPx4gEQ",
"exp": 1529754755,
"iat": 1529751155,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "4cf3731c-e849-42e9-91f5-2259582d058a",
"nonce": "4rnKjtb151JJSYV4",
"rat": 1529751154,
"sub": "[email protected]"
},
"state": "xKfCNycWHarQegeT"
}
2.515 phase <--<-- 4 --- AccessToken -->-->
2.515 --> request op_args: {'state': 'xKfCNycWHarQegeT', 'authn_method': 'client_secret_basic'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.515 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'xKfCNycWHarQegeT', 'code': 'xN5s-M4iSkj2iZm04r6RtS0zoQSCNRn5zMGw5uHJn_E.AoEIUUSbnRtDi0EeZ6WeDzNz-MwsSKd9gnghdIBdVIY', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'd5eab431-2dfb-473d-8522-bf10654623b8'}, 'state': 'xKfCNycWHarQegeT', 'authn_method': 'client_secret_basic'}
2.515 AccessTokenRequest {
"code": "xN5s-M4iSkj2iZm04r6RtS0zoQSCNRn5zMGw5uHJn_E.AoEIUUSbnRtDi0EeZ6WeDzNz-MwsSKd9gnghdIBdVIY",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "xKfCNycWHarQegeT"
}
2.515 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.515 request_http_args {'headers': {'Authorization': 'Basic ZDVlYWI0MzEtMmRmYi00NzNkLTg1MjItYmYxMDY1NDYyM2I4Ok5fOVclN0VVVnBSRUNL', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.515 request code=xN5s-M4iSkj2iZm04r6RtS0zoQSCNRn5zMGw5uHJn_E.AoEIUUSbnRtDi0EeZ6WeDzNz-MwsSKd9gnghdIBdVIY&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=xKfCNycWHarQegeT
2.733 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.734 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZDVlYWI0MzEtMmRmYi00NzNkLTg1MjItYmYxMDY1NDYyM2I4Il0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiT2FPRWtNZ3BmZDgxN2U5VVB4NGdFUSIsImV4cCI6MTUyOTc1NDc1NSwiaWF0IjoxNTI5NzUxMTU2LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI3OWRjMDk3Yy1lNzI0LTQ4YzMtOGU2OC02ZDU2YjY4NzhmMTkiLCJub25jZSI6IjRybktqdGIxNTFKSlNZVjQiLCJyYXQiOjE1Mjk3NTExNTQsInN1YiI6ImZvb0BiYXIuY29tIn0.WJjnUU6FKNqu15gIpDIdbNEBPghVJSB0hW--eMNullHHQVbpePLV2QQsk0d9t5vVym_VV1uZRL4RN1Ul4h_6Nd_HF-Fvae2zStucdv1dEBamzdmvgE3dsk7AcvULUMn57IndYMdq_vQ8IRmuIMUiCs8Hs7Q2CRHGZCKy5MvAjTtKIvbMSLpBADWOPPG2Y2PK1saC7zYefodnmcpotrKQQZynFZ1RCEfLk19RCfk-VkoqO3Q0HYIbo3kRg8RkN2ctPHigEMfMHffpNXq1awBSp90bUd3AC3lMRWB7ql4joAQY38w2LMX8GNzd_ykKpS3d-Y1GLT3GG5xaIiGEu6prDNf7zTUo-hg5ce3XJo9Qu-KeNB15thfXOKRsOvMMWeqsFFjTkZNyAqw_i-m5d7ZbepuDN_XiICVwv6K-E59rLF14TCwbBB9K5DlCpVlwxCBIoltzZcDpFTrceWaxhPmYwZ1-Gw6iSuLKM1drjAYDpeICw8483Iqc5W40UyykE0RFU3XPc33GJhHR7muOwj-wRItQddzEEnHBUhVO58QXClD6qTCWMoSmpB_dHDjgxDzCLmHtJhRKoh-JUcikF-L2XAeYDRjhZDp7qnCW7ov-keLmdle9ziAuvriPEl10S8S8BWXSt_WHUCg04FDZaaiElpWkXyv91V6zw3EyB018OaE', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'kjPClPaAO--qoAXOCH4RGJyoS0HNnghUhy2RCsuDl0Y.C2UvOofD2SUQY5oSFYw2KXATo-qovAiinrjcwwhBgZ8', 'scope': 'openid'}
2.738 AccessTokenResponse {
"access_token": "kjPClPaAO--qoAXOCH4RGJyoS0HNnghUhy2RCsuDl0Y.C2UvOofD2SUQY5oSFYw2KXATo-qovAiinrjcwwhBgZ8",
"expires_in": 3599,
"id_token": {
"aud": [
"d5eab431-2dfb-473d-8522-bf10654623b8"
],
"auth_time": 1529750975,
"c_hash": "OaOEkMgpfd817e9UPx4gEQ",
"exp": 1529754755,
"iat": 1529751156,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "79dc097c-e724-48c3-8e68-6d56b6878f19",
"nonce": "4rnKjtb151JJSYV4",
"rat": 1529751154,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
2.738 phase <--<-- 5 --- Done -->-->
2.738 end
2.738 assertion VerifyResponse
2.738 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.738 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CI.F.T.T.s/OP-ClientAuth-SecretPost-Dynamic.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-ClientAuth-SecretPost-Dynamic
Test description: Access token request with client_secret_post authentication
Timestamp: 2018-06-23T10:52:40Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.074 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.076 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.076 phase <--<-- 2 --- Registration -->-->
0.076 register kwargs:{'application_name': 'OIC test tool', 'token_endpoint_auth_method': 'client_secret_post', 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'response_types': ['code id_token'], 'url': 'https://oidc-certification.ory.sh:8443/clients', 'application_type': 'web'}
0.076 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#WLZrs5ZB0BWRMPro"
],
"response_types": [
"code id_token"
],
"token_endpoint_auth_method": "client_secret_post"
}
0.237 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.237 RegistrationResponse {
"client_id": "ffa257cc-7836-4f05-9d44-bb5540e3761a",
"client_secret": "5XyfzEIlj9R3",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "ffa257cc-7836-4f05-9d44-bb5540e3761a",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#WLZrs5ZB0BWRMPro"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_post",
"userinfo_signed_response_alg": "none"
}
0.238 phase <--<-- 3 --- AsyncAuthn -->-->
0.238 AuthorizationRequest {
"client_id": "ffa257cc-7836-4f05-9d44-bb5540e3761a",
"nonce": "TgbKjihOnmvcocC5",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "fVfcyMeK1JbGCdp3"
}
0.238 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=ffa257cc-7836-4f05-9d44-bb5540e3761a&state=fVfcyMeK1JbGCdp3&response_type=code+id_token&nonce=TgbKjihOnmvcocC5
0.238 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=ffa257cc-7836-4f05-9d44-bb5540e3761a&state=fVfcyMeK1JbGCdp3&response_type=code+id_token&nonce=TgbKjihOnmvcocC5
2.357 http args {}
2.527 response URL with fragment
2.528 response code=Uv1WRHKOToE2zPWigvY6QouliyvPSsGLSgezrhK3QmA.Cn5IctMDd6zsDp3bOdAgrT2CKuIZ8Z4U5T6RGeZpcRE&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZmZhMjU3Y2MtNzgzNi00ZjA1LTlkNDQtYmI1NTQwZTM3NjFhIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiTmU3X1JxOVV2ZWRjMFJLUkVPcW83dyIsImV4cCI6MTUyOTc1NDc1OSwiaWF0IjoxNTI5NzUxMTU5LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJiY2QwNDNhNy1lMWY2LTQ3MjAtODFhMC03MTRmM2U1YTkwYzAiLCJub25jZSI6IlRnYktqaWhPbm12Y29jQzUiLCJyYXQiOjE1Mjk3NTExNTgsInN1YiI6ImZvb0BiYXIuY29tIn0.I2U6khGR1IegBEFtlA-TYYTrQmkB_IIb7iYIkJ5HFR-PAyk0h8ZtR1aaA7a166VsFyRzjtnkI0FZp4wrPCuqh0AxohAKBU3CMGJmKIpQqNVixqG2_PkK8mdKSSdte7Xf0GApBBGIdPr0oIPxKYT9pdoEOgJbKbqPygoqjPwCChaSz88tvu-diLC9BVMn81oG_J3YTytcHkkHqe4T_Rj-EF_1OqDf3SXYngJ2zgKLeSc6Bh1GQlLZrshbLXW_RfR9930fpkJ9JK3bbxUfBUSTfNB70zskQe52A988sKkQzptjpPIm1AXZpcnbgIzbQHeDhSRnGHbnjxq4eLIeO3EdMupBsI5DkrRktOHiAOgHhdGUxEwnWfEa0FLImofBGR-KLr9eIKxL-_JVXfOM-MIi1vXaBGFrcA07nm92MvTvnoFzB5JRKiwGzlNAdytvp0t-rXZyfTJZGGnA8WGNhUVHyqvTuk-9TW_S6yhUli3hQCGHR2RbT1g-DRB2KFtXj5UGN8EVnQSQEmiX4hcD8bK3t175gUpHL4nSV6l9vs3266FrV56ImcmzEdkRHCIsMjLygQT_uthqm9xD3nVsoWXkIiEXVwjCIT9scXNGQhuEdBDtHz-sBvmLXQ8tu4GLpubWNHujRifxypCWDCwU2XN5Rpb5Mn6V84hrlZhsTaGbBvw&state=fVfcyMeK1JbGCdp3
2.528 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZmZhMjU3Y2MtNzgzNi00ZjA1LTlkNDQtYmI1NTQwZTM3NjFhIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiTmU3X1JxOVV2ZWRjMFJLUkVPcW83dyIsImV4cCI6MTUyOTc1NDc1OSwiaWF0IjoxNTI5NzUxMTU5LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJiY2QwNDNhNy1lMWY2LTQ3MjAtODFhMC03MTRmM2U1YTkwYzAiLCJub25jZSI6IlRnYktqaWhPbm12Y29jQzUiLCJyYXQiOjE1Mjk3NTExNTgsInN1YiI6ImZvb0BiYXIuY29tIn0.I2U6khGR1IegBEFtlA-TYYTrQmkB_IIb7iYIkJ5HFR-PAyk0h8ZtR1aaA7a166VsFyRzjtnkI0FZp4wrPCuqh0AxohAKBU3CMGJmKIpQqNVixqG2_PkK8mdKSSdte7Xf0GApBBGIdPr0oIPxKYT9pdoEOgJbKbqPygoqjPwCChaSz88tvu-diLC9BVMn81oG_J3YTytcHkkHqe4T_Rj-EF_1OqDf3SXYngJ2zgKLeSc6Bh1GQlLZrshbLXW_RfR9930fpkJ9JK3bbxUfBUSTfNB70zskQe52A988sKkQzptjpPIm1AXZpcnbgIzbQHeDhSRnGHbnjxq4eLIeO3EdMupBsI5DkrRktOHiAOgHhdGUxEwnWfEa0FLImofBGR-KLr9eIKxL-_JVXfOM-MIi1vXaBGFrcA07nm92MvTvnoFzB5JRKiwGzlNAdytvp0t-rXZyfTJZGGnA8WGNhUVHyqvTuk-9TW_S6yhUli3hQCGHR2RbT1g-DRB2KFtXj5UGN8EVnQSQEmiX4hcD8bK3t175gUpHL4nSV6l9vs3266FrV56ImcmzEdkRHCIsMjLygQT_uthqm9xD3nVsoWXkIiEXVwjCIT9scXNGQhuEdBDtHz-sBvmLXQ8tu4GLpubWNHujRifxypCWDCwU2XN5Rpb5Mn6V84hrlZhsTaGbBvw', 'state': 'fVfcyMeK1JbGCdp3', 'code': 'Uv1WRHKOToE2zPWigvY6QouliyvPSsGLSgezrhK3QmA.Cn5IctMDd6zsDp3bOdAgrT2CKuIZ8Z4U5T6RGeZpcRE'}
2.615 AuthorizationResponse {
"code": "Uv1WRHKOToE2zPWigvY6QouliyvPSsGLSgezrhK3QmA.Cn5IctMDd6zsDp3bOdAgrT2CKuIZ8Z4U5T6RGeZpcRE",
"id_token": {
"aud": [
"ffa257cc-7836-4f05-9d44-bb5540e3761a"
],
"auth_time": 1529750975,
"c_hash": "Ne7_Rq9Uvedc0RKREOqo7w",
"exp": 1529754759,
"iat": 1529751159,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "bcd043a7-e1f6-4720-81a0-714f3e5a90c0",
"nonce": "TgbKjihOnmvcocC5",
"rat": 1529751158,
"sub": "[email protected]"
},
"state": "fVfcyMeK1JbGCdp3"
}
2.615 phase <--<-- 4 --- AccessToken -->-->
2.615 --> request op_args: {'state': 'fVfcyMeK1JbGCdp3', 'authn_method': 'client_secret_post'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.615 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'fVfcyMeK1JbGCdp3', 'code': 'Uv1WRHKOToE2zPWigvY6QouliyvPSsGLSgezrhK3QmA.Cn5IctMDd6zsDp3bOdAgrT2CKuIZ8Z4U5T6RGeZpcRE', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'ffa257cc-7836-4f05-9d44-bb5540e3761a'}, 'state': 'fVfcyMeK1JbGCdp3', 'authn_method': 'client_secret_post'}
2.615 AccessTokenRequest {
"client_id": "ffa257cc-7836-4f05-9d44-bb5540e3761a",
"client_secret": "5XyfzEIlj9R3",
"code": "Uv1WRHKOToE2zPWigvY6QouliyvPSsGLSgezrhK3QmA.Cn5IctMDd6zsDp3bOdAgrT2CKuIZ8Z4U5T6RGeZpcRE",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "fVfcyMeK1JbGCdp3"
}
2.615 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.615 request_http_args {'headers': {'Content-Type': 'application/x-www-form-urlencoded'}}
2.615 request code=Uv1WRHKOToE2zPWigvY6QouliyvPSsGLSgezrhK3QmA.Cn5IctMDd6zsDp3bOdAgrT2CKuIZ8Z4U5T6RGeZpcRE&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=ffa257cc-7836-4f05-9d44-bb5540e3761a&grant_type=authorization_code&state=fVfcyMeK1JbGCdp3&client_secret=5XyfzEIlj9R3
2.831 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.832 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZmZhMjU3Y2MtNzgzNi00ZjA1LTlkNDQtYmI1NTQwZTM3NjFhIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiTmU3X1JxOVV2ZWRjMFJLUkVPcW83dyIsImV4cCI6MTUyOTc1NDc1OSwiaWF0IjoxNTI5NzUxMTYwLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJiODE4MzA1NS04YTU5LTRlNDUtOGU0Yy0xMjc5NTc1NDFhNGEiLCJub25jZSI6IlRnYktqaWhPbm12Y29jQzUiLCJyYXQiOjE1Mjk3NTExNTgsInN1YiI6ImZvb0BiYXIuY29tIn0.hBwP7XYgqDu7zn_QF-TbfAbuZ0gauwyj4p5vImEr_25IUSyGo3dEJsFSkhV2tyzLlaeCQBb5S689MM3VWAUXphKG4Ni_pTJ-Ykknkw2x7XSJS9BZ5RNgM3cfXkjerhVAFms7BHzg4vJPPAdnCucRqhTzDaX0-yFkJDpQyK0iU-2ODe1Z0gl9vOrrk6I70dXcYwBCdo2fhLmB5B-_PrCl-qlMuMwxXiKFSNYberN4b1hUg3zIjYepsqpS9uRvBdCiB1qg4l3Ud-CxxybGYLNiYQa2ha6Pk285wDmqEC9Bwtw4mJdU8HgAnpZdMR9q2B1mlNXPJQDWdbNVvw9R9knYh0QxKkrWwposqcv2WiVS_NCGAw4FStXsx0dYEtkVb2Zc8SbsLuWNOasgCe1dbMc_RyiHNUcVBLYtpyeKu-lAZ-iBydjiSyTXMXOikp54FCR3c-sc4DPB4ok8Tz8yOdT4c4KNvC-Uf7l2auIMseyLXQmxYu_FmXXM_Ts8dqSAJPWpjS-vgj6i6Iw1cHhbugbtgNkhSaIKsEc_XF99xi6eBCACGCrF3N7me2ssc8xG-rPgP4CUNJFwbX4Ohfv_Hp0CWSz6joqqHZv10amfY-VxWyq82d6UvFfUBKKoWRyRqq1GbgP7tnUH0SbtlRZdJz0HAKuMGdrG1n13VrpQ8QKM6F4', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'ncAMt5VsqxULb_vO5fIu1vYKPwT8NC2_1gkxHIDXz74.HX2Rs6YvzDa6Kcy_FsoTxyylhWCB9-7JC6elFHBz2Tw', 'scope': 'openid'}
2.835 AccessTokenResponse {
"access_token": "ncAMt5VsqxULb_vO5fIu1vYKPwT8NC2_1gkxHIDXz74.HX2Rs6YvzDa6Kcy_FsoTxyylhWCB9-7JC6elFHBz2Tw",
"expires_in": 3599,
"id_token": {
"aud": [
"ffa257cc-7836-4f05-9d44-bb5540e3761a"
],
"auth_time": 1529750975,
"c_hash": "Ne7_Rq9Uvedc0RKREOqo7w",
"exp": 1529754759,
"iat": 1529751160,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "b8183055-8a59-4e45-8e4c-127957541a4a",
"nonce": "TgbKjihOnmvcocC5",
"rat": 1529751158,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
2.835 phase <--<-- 5 --- Done -->-->
2.835 end
2.836 assertion VerifyResponse
2.836 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.836 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CI.F.T.T.s/OP-Discovery-claims_supported.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Discovery-claims_supported
Test description: Verify that claims_supported is published
Timestamp: 2018-06-23T10:51:45Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.078 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.079 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.079 phase <--<-- 2 --- Done -->-->
0.079 end
0.08 assertion CheckHTTPResponse
0.08 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.08 assertion CheckHasClaimsSupported
0.08 condition providerinfo-has-claims_supported: status=OK [Check that the claims_supported discovery metadata value is in the provider_info]
0.08 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
providerinfo-has-claims_supported: status=OK [Check that the claims_supported discovery metadata value is in the provider_info]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CI.F.T.T.s/OP-Discovery-Config.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Discovery-Config
Test description: Publishes openid-configuration discovery information
Timestamp: 2018-06-23T10:51:42Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.075 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.077 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.077 phase <--<-- 2 --- Done -->-->
0.077 end
0.077 assertion CheckHTTPResponse
0.077 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.078 assertion VerifyIdTokenSigningAlgorithmIsSupported
0.078 condition verify-id_token_signing-algorithm-is-supported: status=OK [Verify that required algorithms in id_token_signing_alg_values_supported]
0.078 assertion VerifyHTTPSUsage
0.078 condition verify-https-usage: status=OK [Verify that specific endpoints uses https]
0.078 assertion VerifyOPEndpointsUseHTTPS
0.078 condition verify-op-endpoints-use-https: status=OK [Verify that all OP endpoints uses https]
0.078 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-id_token_signing-algorithm-is-supported: status=OK [Verify that required algorithms in id_token_signing_alg_values_supported]
verify-https-usage: status=OK [Verify that specific endpoints uses https]
verify-op-endpoints-use-https: status=OK [Verify that all OP endpoints uses https]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CI.F.T.T.s/OP-Discovery-JWKs.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Discovery-JWKs
Test description: Keys in OP JWKs well formed
Timestamp: 2018-06-23T10:51:44Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.072 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.073 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.073 phase <--<-- 2 --- Done -->-->
0.074 end
0.074 assertion CheckHTTPResponse
0.074 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.074 assertion VerifyBase64URL
0.136 http response url:https://oidc-certification.ory.sh:8443/.well-known/jwks.json status_code:200
0.137 condition verify-base64url: status=OK [Verifies that the base64 encoded parts of a JWK is in fact base64url encoded and not just base64 encoded]
0.137 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-base64url: status=OK [Verifies that the base64 encoded parts of a JWK is in fact base64url encoded and not just base64 encoded]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CI.F.T.T.s/OP-Discovery-jwks_uri.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Discovery-jwks_uri
Test description: Verify that jwks_uri is published
Timestamp: 2018-06-23T10:51:45Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Done -->-->
0.075 end
0.075 assertion CheckHTTPResponse
0.075 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.076 assertion BareKeys
0.145 http response url:https://oidc-certification.ory.sh:8443/.well-known/jwks.json status_code:200
0.145 jwks {'keys': [{'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': '16vFo3VXLypUERl1fqAWJEysIgKnJ15eEnc-5LOiFx7jK2L0zDKtj7q6ySr6rdwmgFjaV1vfG-VKmLHPMD_YuazQeb86blkDnUfNQvHfNID0g-U2G-xeLCqfdl54jzx5NAhMV6BVCUTOwsiUt3dgBaNWGJENo4gU0KGr0S2xEU38sJGUz3zROL6gOmUwqlSAk3YClnhyYYof0tj4j0dW7mXK7MaQ4CRAhq5rJq_VRrMCc4JiD7kAN104V5BmNU409uF4InE2Stugw8RSH4hXeBFp-dXtzQi6qmBLsnHd16_WEce76IxvthFnePqa3XMNg9G4-AJ36RVbH4IhMioQgvgHWGXR276pH1Vyga7V0dSakg8ohSD2vBD5OmlYquJ6krJ3uWUCez59YUeNEgOexn5XaBL0ZEnTQ-zNNHX39QZz9QaU2lftGhknRufg68bmshLWgXJexJS1ht1vFccFcmvpnYEnCTwKzo0kjlcY7IiBpWgJ1f4r1PTIKuh8CluNkitsbABcVx3-FOAhA4CMrQovAaNL_jfp6wKBA9Qy0W9LkESVsRQWFUSpQu_z4pJMOVfjbwJOsquxKwXphI2h1VczR-Hh8rTX7D2GL_4-GyG2nHfpF3jVq7raKnyGxJA8ZIK9kPh0JlQhR2FcBhFOWjvusFjoZ09Po6XtvWlP82E', 'alg': 'RS256', 'kid': 'public:0acf6c64-4d55-4888-abb9-b2a3f661ee7f'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': '0vvbIEitFVzY4o12elAZbZvpja5xTm5AOh9wi2UEiPEL6aKxAUn1ywpUaLyWKuEXdeuykHyybniLaThik7Gf-6xKk6S9IK9tjbbwfRqHVkn_Xkyul0ohFI3iTcjvFq5FPGr5vEhSB6eckdngUpzb-7S_Kt8yunkdhYTmkuAr2AXSbQcmCbOJXOsvkc5LOwpjmFIWrtBAHwILJ5cHjzIHtkK2QKMJRlknD8b4kmQ3x6vfxA7mtXREUXdQFn7ssnOVPzriPQp4kIi_TMczSmRLlX1PeeOeDGpTnYywQbsAfdBGZ20WdZlwP3lRUUJoKv1GpBU51GKm2xhHtyrzOkiRKE8pH_PD05gh1G9qXbFtBOoHMBWEaCxoxyJcW8_9iLXBPoC-Jhm47VO5T9hPlaISzDY6EUmgYktejS_mx_bR7emBcbtFUccYSVVqT3EZqAFuQlsPsvj8AT9NmEiVncB2Cy4z7ofLX_Wai_VFPCf7AEfmDZ8mzFZQfVGct74Q9KybwXm8YDq0TSszQGuqT0gtvU9In7CPSOytrVDbdk8Peyeg-Wn_ACMRh5T23wUbQ0jy0Wi9kBwIzN-dUpKu3uL6EZ3PmPSZItQHeAxpQbRZJ1vrrd2y-b6EGun3G9rlnOZ3L4_L4-NOKLt4VGPie7sphlND1pc4ZipaXBjZ9uC3bS8', 'alg': 'RS256', 'kid': 'public:490968e8-c6e5-441e-b42e-5053d6c67af2'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': '0WN9e_V2wEp33JZoN7zQ9J4E4Iz0l-dlx6GqIKdepcMjON3PKZHWFML1e0ZKAkuG2ZJRKoX1LaSNZT0NI9N6_wVAT9aNv53sHBJVC4Bww1zKHEvQseGwJbG0lZZHjDXaxCBPte9yQnquIRRp9Ab-uBeziRoaFQ02OV3LBMBSZ79AzFvZ4yTqpUS_xp-Ylfcmh5wXEppd6hoxs9h1tttPTPbnMLte3S_zxCZI4TQi8d1yBi39OvfZxtABQQbgqYPxiYehNdYbfmZ2CAmVlsTxByS3X-ANBe2nmLsOLgXTyVFZfvEZkzY7OgEwwq5zog5pScXJ-TGlj0guZd8nClHEV-GHvXonjb2hZB63dFEiUVMNh5cOblZX034GnlOkzYfAH8UZ_cvOqONHbvplzONuaYSSRMPRaZwj-0fpElhFNHwr1v1pqbE1i9XOxU_c-eSMr4XAm1VsWG3zJKymjoJmaDcW3AEawi3btL1N2tE3p27cHtcdFjcv5birnxMtPI9Vu806U0_WiGtH_kaWxz64Xk3A_yB-lIBQwXe61JME-K81wLLcHE9qoqpF5iUK4mDqMmI_DVIazUlVUzxY0-1iFkV790V95dBxeYFgXKX02g8NyxfnyzUDC12qUKKejJFbG5LPHaMUXWJIQ2ntwBX_XzeF4pGh0u0vYmfxAmfHWN0', 'alg': 'RS256', 'kid': 'public:a09f73cf-d685-4c5c-9312-60a13e57646f'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': 's_BEnyG0xHYDibtz9a4tE1IW8490BQ_z526Lg2d0PWRtHfcqKmPG0pd0DizPuLY2j1NAY4cCXLwNWMJ3Cp1TqddaMl08hElvNbilcTyQr96RQg9MnrWeR1EqpdXEzTjcx06DFDokvzs89YQVZTDzSh_-xY_m_0VkcFQ0RpDTBn1B0dkMh78dbTJVVSGXYSBgMpcKrGlrgDaPIRX7qp_SdvjNtkPStG_wCPkzd_IJAaTAHGrlyj27dyhOC6EqQjpZRhQvT-w7GalbObncCFox3hRiC8wbI9Toi5p7vEuJJ6yksaqtIwgbtPXXUChNTqwQgIc1RE8RVuhI8ExaT6FfStIVLq9Tow6Hd9mopdX_ydEHHbnbvSC0cCRPg8_G8zTk0ihFpiHE1yEDXBQSs6pZIQ8KZF2RG35j75Jh4ngsDyPbC7PmjE93SG25AkX0WZwoB3g8f6q2r4dZqNtemRX1lMDo0FUQyYcOU5mnOiW3E5oNs3g-VH5ISOiaSUSLX6AIxDfdk6Wj5t7FZUo4EcIwTnE3PI-0HxnLJaErwbYEX0hO1BuhfF7zYHxDjc085U7OyN0abZWbuVUMtIMRgq-4ASlM9fTECg3sMmOfTEJV9nrJZaSCxKvVWma9A01bvBPB6Qn92Gj1XNZ0E1RBLUp1V3iXLcS7MGJh7bAAk5kwKCM', 'alg': 'RS256', 'kid': 'public:8e8dab73-c9fe-42ef-9a7b-1e217abba9a9'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': '3cQ2ihjoElfFVnnkleo6ioUvZrkDfddEKOMCaemXP7umEhr8TC9_L3BKYbJqtE15jvkJiqT1vlHgTOKD5wWCFhFSmEa9PAWlt9Hw6BWddFEsiijR113yvj4eT0qfjseMYyiKst0kBxiTRmQdIzllY2Y2UU1IYIkaAP009nZSR7a5IrPYFydZ6SRARk9kZI90fmgRnzUuQKcv7C9HbkUqs7qiApfA17ACpnuKQP5p5lGL41t5ZnU1-5FvmmO6NnwtRZif34HL6WYuksi2RleLAKoHGh_l6P6ygP5v3ucHH0TmdLVBAHMmlLW4BKdVnWa2HEQCKIBiXJztu8EpYCVpZ_ThCaZLagcUM6VCD4nqvsXzQB7pnsBjq75tbo2jlqrGQJE9ekfGVyw7XDN45IkJFLgfVJ2anpyK4NeIAbkB7ZCYSXbR96_EC6h0uZSMHtPYVNIvbRCK6ysCdlDuDsWiQ01tP-lp90eWj1d7ZYlaYNws12OauBfgLyn0NZvjIz5EYXbOO_Hi0P5U6znS1Um-lU0nB1Gsj685Io-KLzN0shOqkfDP8Xcjfx_3EEg0aEPJWqCjiP9K6veNI896ZrIrH6Sd0V_o4TIzpSJimZlMZrTWS6dUm2j6q1WQOE2Z5JlDMC90yTGUC8MNt2AdMB0Z78Mf71rdSrpXpWLMh7rz_7k', 'alg': 'RS256', 'kid': 'public:6a09d4a3-a298-47bc-8bbd-50b64f653f2d'}]}
0.145 condition bare-keys: status=OK [Dynamic OPs MUST publish their public keys as bare JWK keys]
0.145 assertion CheckHasJwksURI
0.146 condition providerinfo-has-jwks_uri: status=OK [Check that the jwks_uri discovery metadata value is in the provider_info]
0.146 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
bare-keys: status=OK [Dynamic OPs MUST publish their public keys as bare JWK keys]
providerinfo-has-jwks_uri: status=OK [Check that the jwks_uri discovery metadata value is in the provider_info]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CI.F.T.T.s/OP-display-page.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-display-page
Test description: Request with display=page
Timestamp: 2018-06-23T10:53:16Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
7.39 phase <--<-- 1 --- Webfinger -->-->
7.391 not expected to do WebFinger
7.391 phase <--<-- 2 --- Discovery -->-->
7.391 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
7.476 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
7.477 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
7.477 phase <--<-- 3 --- Registration -->-->
7.477 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
7.478 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#ekUoir3BzIdrIhA2"
],
"response_types": [
"code id_token"
]
}
7.643 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
7.644 RegistrationResponse {
"client_id": "3e7bb4cb-2870-460e-8aec-16ce918b242d",
"client_secret": "B0~lL4eV.UXQ",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "3e7bb4cb-2870-460e-8aec-16ce918b242d",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#ekUoir3BzIdrIhA2"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
7.644 phase <--<-- 4 --- AsyncAuthn -->-->
7.645 AuthorizationRequest {
"client_id": "3e7bb4cb-2870-460e-8aec-16ce918b242d",
"display": "page",
"nonce": "bmimf5CAulOnXaTI",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "0TeRiQinuw3aYQH0"
}
7.645 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=3e7bb4cb-2870-460e-8aec-16ce918b242d&state=0TeRiQinuw3aYQH0&response_type=code+id_token&nonce=bmimf5CAulOnXaTI&display=page
7.645 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=3e7bb4cb-2870-460e-8aec-16ce918b242d&state=0TeRiQinuw3aYQH0&response_type=code+id_token&nonce=bmimf5CAulOnXaTI&display=page
10.504 http args {}
10.671 response URL with fragment
10.672 response code=2F3v2l_UCmkXeyioyqeRujdKsNz0KgcY61wPU3VPrVM.UuLTifXNuqkWwdDWKC4jybXILE2enCaNKj8Wd1YniMs&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiM2U3YmI0Y2ItMjg3MC00NjBlLThhZWMtMTZjZTkxOGIyNDJkIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiTEVyekdVWmNkWE5jT0VkU0tMRDNwZyIsImV4cCI6MTUyOTc1NDc5NiwiaWF0IjoxNTI5NzUxMTk2LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJkZGIyNjYwYy03OTE3LTRjMzktOWM2Zi1jNzRkNTEwOWRjMTYiLCJub25jZSI6ImJtaW1mNUNBdWxPblhhVEkiLCJyYXQiOjE1Mjk3NTExOTMsInN1YiI6ImZvb0BiYXIuY29tIn0.dNYUeCaD5hEaMyw3tJus49KCjmrB1SI-G7SpC24RNaBSi2OnmHGKQxb0LJOJ3eIHpR3MXAOXr-ClRM9oFURBGq2F7VSJQlmSU3XnTt25-KUKFcUo0jLZwMo-tbxS954LQyeVCez6xH9HRW3nfQ_ZCs6UP0s1EJ6lPv04_fJ5dT1PQmEK6hrEmjDHZjXdqUH_IiVxWoJAYC3yAe6K5aTxKdQwfSZZhZel029t-bDHv3FzzsKKrxjU9p8TfcXrLsT_tsnXrkPuaaomR-UcFP3fMpykpv8tMNV1osCXBQ-uHVIKO_kApL5R5_jTaKu_sWLksLzJxOgs3gbzMjpEImIBvrZ_RopSmTcwzMwiNY_S7Nwo-7bHeQmsFh_W16aEWnJPgnx_Re05UjGbz-dm1W3jQAqZXSWtPgPeXISzAQ3pv19TGHPhv-XUeKk3j9brm3XCLP5kDP6Q8N7BbjNNuJHfVC6fReD9HAG4uW_1XvIcaFD5CZ99EyTaEsp3Z8qeHNDAUG6ORFmKYPMDIuvhLTB-uE-PbC1RsF9ZQqww_mGhkHjqySA3D3jH0YD043P8LR4RExZjKLyYsXILENqiIpJTSPUe3ZNsBuSQKNmkiCLhckGN4LTAfaNyDt-ogTeMOaWh-JSPuKER2uI59BxWkiA0ExaM4IPX_LFkSNCafjT7nYo&state=0TeRiQinuw3aYQH0
10.672 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiM2U3YmI0Y2ItMjg3MC00NjBlLThhZWMtMTZjZTkxOGIyNDJkIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiTEVyekdVWmNkWE5jT0VkU0tMRDNwZyIsImV4cCI6MTUyOTc1NDc5NiwiaWF0IjoxNTI5NzUxMTk2LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJkZGIyNjYwYy03OTE3LTRjMzktOWM2Zi1jNzRkNTEwOWRjMTYiLCJub25jZSI6ImJtaW1mNUNBdWxPblhhVEkiLCJyYXQiOjE1Mjk3NTExOTMsInN1YiI6ImZvb0BiYXIuY29tIn0.dNYUeCaD5hEaMyw3tJus49KCjmrB1SI-G7SpC24RNaBSi2OnmHGKQxb0LJOJ3eIHpR3MXAOXr-ClRM9oFURBGq2F7VSJQlmSU3XnTt25-KUKFcUo0jLZwMo-tbxS954LQyeVCez6xH9HRW3nfQ_ZCs6UP0s1EJ6lPv04_fJ5dT1PQmEK6hrEmjDHZjXdqUH_IiVxWoJAYC3yAe6K5aTxKdQwfSZZhZel029t-bDHv3FzzsKKrxjU9p8TfcXrLsT_tsnXrkPuaaomR-UcFP3fMpykpv8tMNV1osCXBQ-uHVIKO_kApL5R5_jTaKu_sWLksLzJxOgs3gbzMjpEImIBvrZ_RopSmTcwzMwiNY_S7Nwo-7bHeQmsFh_W16aEWnJPgnx_Re05UjGbz-dm1W3jQAqZXSWtPgPeXISzAQ3pv19TGHPhv-XUeKk3j9brm3XCLP5kDP6Q8N7BbjNNuJHfVC6fReD9HAG4uW_1XvIcaFD5CZ99EyTaEsp3Z8qeHNDAUG6ORFmKYPMDIuvhLTB-uE-PbC1RsF9ZQqww_mGhkHjqySA3D3jH0YD043P8LR4RExZjKLyYsXILENqiIpJTSPUe3ZNsBuSQKNmkiCLhckGN4LTAfaNyDt-ogTeMOaWh-JSPuKER2uI59BxWkiA0ExaM4IPX_LFkSNCafjT7nYo', 'state': '0TeRiQinuw3aYQH0', 'code': '2F3v2l_UCmkXeyioyqeRujdKsNz0KgcY61wPU3VPrVM.UuLTifXNuqkWwdDWKC4jybXILE2enCaNKj8Wd1YniMs'}
10.753 AuthorizationResponse {
"code": "2F3v2l_UCmkXeyioyqeRujdKsNz0KgcY61wPU3VPrVM.UuLTifXNuqkWwdDWKC4jybXILE2enCaNKj8Wd1YniMs",
"id_token": {
"aud": [
"3e7bb4cb-2870-460e-8aec-16ce918b242d"
],
"auth_time": 1529750975,
"c_hash": "LErzGUZcdXNcOEdSKLD3pg",
"exp": 1529754796,
"iat": 1529751196,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "ddb2660c-7917-4c39-9c6f-c74d5109dc16",
"nonce": "bmimf5CAulOnXaTI",
"rat": 1529751193,
"sub": "[email protected]"
},
"state": "0TeRiQinuw3aYQH0"
}
10.753 phase <--<-- 5 --- Done -->-->
10.753 end
10.753 assertion VerifyResponse
10.753 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
10.753 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CI.F.T.T.s/OP-display-popup.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-display-popup
Test description: Request with display=popup
Timestamp: 2018-06-23T10:53:25Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.123 phase <--<-- 1 --- Webfinger -->-->
1.123 not expected to do WebFinger
1.123 phase <--<-- 2 --- Discovery -->-->
1.123 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.198 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.199 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.199 phase <--<-- 3 --- Registration -->-->
1.199 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.2 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#oaXE4k1EDRFOSyId"
],
"response_types": [
"code id_token"
]
}
1.355 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.355 RegistrationResponse {
"client_id": "b6aec107-eff3-4f85-b6aa-96bde2f2723f",
"client_secret": "wJG6dYdG3922",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "b6aec107-eff3-4f85-b6aa-96bde2f2723f",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#oaXE4k1EDRFOSyId"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.356 phase <--<-- 4 --- AsyncAuthn -->-->
1.356 AuthorizationRequest {
"client_id": "b6aec107-eff3-4f85-b6aa-96bde2f2723f",
"display": "popup",
"nonce": "95hhIooRCcoC8eqR",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "ihNQyX2Q1XF04W3l"
}
1.356 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=b6aec107-eff3-4f85-b6aa-96bde2f2723f&state=ihNQyX2Q1XF04W3l&response_type=code+id_token&nonce=95hhIooRCcoC8eqR&display=popup
1.356 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=b6aec107-eff3-4f85-b6aa-96bde2f2723f&state=ihNQyX2Q1XF04W3l&response_type=code+id_token&nonce=95hhIooRCcoC8eqR&display=popup
4.041 http args {}
4.217 response URL with fragment
4.217 response code=DTXODptyXEJ5MjJpn0bq1MEtSBArr4f-bF4-uGU3_fE.ja7hkPgmu3NM2DDt3RfFJc9qWASRh9d2mHnSWaKzRj0&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYjZhZWMxMDctZWZmMy00Zjg1LWI2YWEtOTZiZGUyZjI3MjNmIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoidU51Yms1eFEyMVRDZFNrRXFnQmV6QSIsImV4cCI6MTUyOTc1NDgwNCwiaWF0IjoxNTI5NzUxMjA0LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJiYjllMjkxYy1hMjk3LTQ2MGYtYjk5ZS1jZjI0YWM1ZTQxZTEiLCJub25jZSI6Ijk1aGhJb29SQ2NvQzhlcVIiLCJyYXQiOjE1Mjk3NTEyMDIsInN1YiI6ImZvb0BiYXIuY29tIn0.E4qszyZfX8fyn-FQ322LyHtZihXyLnQkUeddIvRz6yN_u202pbeFO2rqLFMSy5Buybiauhs2MmbYyhqTEAdfdd7bfUBH09oVQXyhnkbuAeanxSw4_KPJhy0VZceKRmvSfAKn2FcVhmmEnpx392m-O4Lbj8iyY5utTbcBMyHfhbUv1M5sL14IFBsbctVUL_8L853o8QsEK_d-ooCxyBxneo_6yL4DQ6D3kuT0gOEdisJBpOKgdZ3GHVEFTQzJLHBaic3SzcL8RSPEcYCvphJjw1RxJ_anyTjYkDtYmq73dMD8D4uNDLQHK3b6DkvfXvBbYL-XE4G4QK-HkawEDsrezD2XKASg5YHX-gK7EZ4DAzalYIx7zbjSZqLjbChoNE8V4SZHwGV0jO4SgHH-7Y9nu96j5wZuj4nBH3FFlFWdQngaAzkElHKYPdEN1hI3jXsXRZSu7FWp8I4weW3s29hzsmCl9nGuiIqst0h-G3y1jRdFh9mx6rQd9kpLHWmHrAHm9U6bQeymgFwKt9ioGPvTlGx6BxMuYyDJ-wj-jhKr10179M87XC_mUBC7bmHQLf7JKLpFIWsipWSMBypwyVNibbKA6Ox64Nd36zHvWHZe97Tgns5qNaGDwzCDMC6dKJWCerCMLaU-XrxrrbOhrn5G0g_PNUBmBVuiulj0YTGW8sM&state=ihNQyX2Q1XF04W3l
4.217 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYjZhZWMxMDctZWZmMy00Zjg1LWI2YWEtOTZiZGUyZjI3MjNmIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoidU51Yms1eFEyMVRDZFNrRXFnQmV6QSIsImV4cCI6MTUyOTc1NDgwNCwiaWF0IjoxNTI5NzUxMjA0LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJiYjllMjkxYy1hMjk3LTQ2MGYtYjk5ZS1jZjI0YWM1ZTQxZTEiLCJub25jZSI6Ijk1aGhJb29SQ2NvQzhlcVIiLCJyYXQiOjE1Mjk3NTEyMDIsInN1YiI6ImZvb0BiYXIuY29tIn0.E4qszyZfX8fyn-FQ322LyHtZihXyLnQkUeddIvRz6yN_u202pbeFO2rqLFMSy5Buybiauhs2MmbYyhqTEAdfdd7bfUBH09oVQXyhnkbuAeanxSw4_KPJhy0VZceKRmvSfAKn2FcVhmmEnpx392m-O4Lbj8iyY5utTbcBMyHfhbUv1M5sL14IFBsbctVUL_8L853o8QsEK_d-ooCxyBxneo_6yL4DQ6D3kuT0gOEdisJBpOKgdZ3GHVEFTQzJLHBaic3SzcL8RSPEcYCvphJjw1RxJ_anyTjYkDtYmq73dMD8D4uNDLQHK3b6DkvfXvBbYL-XE4G4QK-HkawEDsrezD2XKASg5YHX-gK7EZ4DAzalYIx7zbjSZqLjbChoNE8V4SZHwGV0jO4SgHH-7Y9nu96j5wZuj4nBH3FFlFWdQngaAzkElHKYPdEN1hI3jXsXRZSu7FWp8I4weW3s29hzsmCl9nGuiIqst0h-G3y1jRdFh9mx6rQd9kpLHWmHrAHm9U6bQeymgFwKt9ioGPvTlGx6BxMuYyDJ-wj-jhKr10179M87XC_mUBC7bmHQLf7JKLpFIWsipWSMBypwyVNibbKA6Ox64Nd36zHvWHZe97Tgns5qNaGDwzCDMC6dKJWCerCMLaU-XrxrrbOhrn5G0g_PNUBmBVuiulj0YTGW8sM', 'state': 'ihNQyX2Q1XF04W3l', 'code': 'DTXODptyXEJ5MjJpn0bq1MEtSBArr4f-bF4-uGU3_fE.ja7hkPgmu3NM2DDt3RfFJc9qWASRh9d2mHnSWaKzRj0'}
4.293 AuthorizationResponse {
"code": "DTXODptyXEJ5MjJpn0bq1MEtSBArr4f-bF4-uGU3_fE.ja7hkPgmu3NM2DDt3RfFJc9qWASRh9d2mHnSWaKzRj0",
"id_token": {
"aud": [
"b6aec107-eff3-4f85-b6aa-96bde2f2723f"
],
"auth_time": 1529750975,
"c_hash": "uNubk5xQ21TCdSkEqgBezA",
"exp": 1529754804,
"iat": 1529751204,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "bb9e291c-a297-460f-b99e-cf24ac5e41e1",
"nonce": "95hhIooRCcoC8eqR",
"rat": 1529751202,
"sub": "[email protected]"
},
"state": "ihNQyX2Q1XF04W3l"
}
4.293 phase <--<-- 5 --- Done -->-->
4.293 end
4.294 assertion VerifyResponse
4.294 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.294 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CI.F.T.T.s/OP-IDToken-C-Signature.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-IDToken-C-Signature
Test description: Does the OP sign the ID Token and with what
Timestamp: 2018-06-23T10:52:20Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Registration -->-->
0.074 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.074 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#XiIminCBzanmSSIl"
],
"response_types": [
"code id_token"
]
}
0.233 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.234 RegistrationResponse {
"client_id": "00068b75-61fb-4b08-9c0e-72bb0f2ddf12",
"client_secret": "e33_WHog_Ikl",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "00068b75-61fb-4b08-9c0e-72bb0f2ddf12",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#XiIminCBzanmSSIl"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.234 phase <--<-- 3 --- AsyncAuthn -->-->
0.234 AuthorizationRequest {
"client_id": "00068b75-61fb-4b08-9c0e-72bb0f2ddf12",
"nonce": "HSzVU44xLhqXeUa4",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "A6WIQrkFEoCM1izG"
}
0.234 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=00068b75-61fb-4b08-9c0e-72bb0f2ddf12&state=A6WIQrkFEoCM1izG&response_type=code+id_token&nonce=HSzVU44xLhqXeUa4
0.234 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=00068b75-61fb-4b08-9c0e-72bb0f2ddf12&state=A6WIQrkFEoCM1izG&response_type=code+id_token&nonce=HSzVU44xLhqXeUa4
2.61 http args {}
2.784 response URL with fragment
2.784 response code=9sLzymMA-2Vk7HBo9Esgo6cqVgEm9JZEGaNtcmJU-h8.AgNR2qzmob1bhvmIM3ikVYzylGmejSTRvoqiCtMgGtg&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMDAwNjhiNzUtNjFmYi00YjA4LTljMGUtNzJiYjBmMmRkZjEyIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiRnR2MWViVDN0cE81cUVDeFo2eTdZdyIsImV4cCI6MTUyOTc1NDczOSwiaWF0IjoxNTI5NzUxMTM5LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiIzYzBmMzYyMS1iZGE2LTRmM2YtOGEyMS1iNmRkMDc2OTg3YjYiLCJub25jZSI6IkhTelZVNDR4TGhxWGVVYTQiLCJyYXQiOjE1Mjk3NTExMzcsInN1YiI6ImZvb0BiYXIuY29tIn0.whGFRnijiE_HrMMOwLaFqITjJM62R1RnW0OMohWI5GXqKdPAjVkxJerxcgKpWgnNgRz7s5Fe2LV6o9BL6bTZoiHWaS5fYCXS6RSFGmDBlFcjNiu9V0Fnwrx0NLn2Bib45tGM1aE22t8bnDjDDdPlKZkFwQzB8VD9ydA5S_OtQNrb0doeEup-58KNVSF1N_CjjZhc6ccnFY22etVReRvOe7y5Ocbq_JM_0Xyp072VU8PtkF2NaxOpzp4cE7sjXpwMmsAm-cJJ8uVOZ1l-PqWyLIYNMALvrvvKcpHT21gYt4N9toSji4E2zW6SNJvEv9qYfLqLwlCICWCspDzyZKTuzh-uHjC9QXKmHyxZznjXxSZrj-jUmpOMlj7-l8Bye2wABbFoMl1Fr2EVBvN8kwRW_lKZIMskSmfoQF9EQYg8IIfkQUNsmrddgfQuN9IERT3vS8vi_CgM28Rm156mpSQOgGoH7x6xOon_0EBn1g-LvhsI1HPtsFsq5zs-C2wlswageO7B1OwglvRMyS07MShGzzGMd2e5gucTk--s8WSDzXBclGctbQkEDCFoyz9FvzrUWKJsEizL4Pno75CSfW4T2XoDUAfQu-evJFTkzA5sAKhAA_fgO0daWbisMCD3rv-JlsrSG4zs41QVd3QyJ2gBDKt91LD2SzK6rhsXyaRTpKQ&state=A6WIQrkFEoCM1izG
2.784 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMDAwNjhiNzUtNjFmYi00YjA4LTljMGUtNzJiYjBmMmRkZjEyIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiRnR2MWViVDN0cE81cUVDeFo2eTdZdyIsImV4cCI6MTUyOTc1NDczOSwiaWF0IjoxNTI5NzUxMTM5LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiIzYzBmMzYyMS1iZGE2LTRmM2YtOGEyMS1iNmRkMDc2OTg3YjYiLCJub25jZSI6IkhTelZVNDR4TGhxWGVVYTQiLCJyYXQiOjE1Mjk3NTExMzcsInN1YiI6ImZvb0BiYXIuY29tIn0.whGFRnijiE_HrMMOwLaFqITjJM62R1RnW0OMohWI5GXqKdPAjVkxJerxcgKpWgnNgRz7s5Fe2LV6o9BL6bTZoiHWaS5fYCXS6RSFGmDBlFcjNiu9V0Fnwrx0NLn2Bib45tGM1aE22t8bnDjDDdPlKZkFwQzB8VD9ydA5S_OtQNrb0doeEup-58KNVSF1N_CjjZhc6ccnFY22etVReRvOe7y5Ocbq_JM_0Xyp072VU8PtkF2NaxOpzp4cE7sjXpwMmsAm-cJJ8uVOZ1l-PqWyLIYNMALvrvvKcpHT21gYt4N9toSji4E2zW6SNJvEv9qYfLqLwlCICWCspDzyZKTuzh-uHjC9QXKmHyxZznjXxSZrj-jUmpOMlj7-l8Bye2wABbFoMl1Fr2EVBvN8kwRW_lKZIMskSmfoQF9EQYg8IIfkQUNsmrddgfQuN9IERT3vS8vi_CgM28Rm156mpSQOgGoH7x6xOon_0EBn1g-LvhsI1HPtsFsq5zs-C2wlswageO7B1OwglvRMyS07MShGzzGMd2e5gucTk--s8WSDzXBclGctbQkEDCFoyz9FvzrUWKJsEizL4Pno75CSfW4T2XoDUAfQu-evJFTkzA5sAKhAA_fgO0daWbisMCD3rv-JlsrSG4zs41QVd3QyJ2gBDKt91LD2SzK6rhsXyaRTpKQ', 'state': 'A6WIQrkFEoCM1izG', 'code': '9sLzymMA-2Vk7HBo9Esgo6cqVgEm9JZEGaNtcmJU-h8.AgNR2qzmob1bhvmIM3ikVYzylGmejSTRvoqiCtMgGtg'}
2.866 AuthorizationResponse {
"code": "9sLzymMA-2Vk7HBo9Esgo6cqVgEm9JZEGaNtcmJU-h8.AgNR2qzmob1bhvmIM3ikVYzylGmejSTRvoqiCtMgGtg",
"id_token": {
"aud": [
"00068b75-61fb-4b08-9c0e-72bb0f2ddf12"
],
"auth_time": 1529750975,
"c_hash": "Ftv1ebT3tpO5qECxZ6y7Yw",
"exp": 1529754739,
"iat": 1529751139,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "3c0f3621-bda6-4f3f-8a21-b6dd076987b6",
"nonce": "HSzVU44xLhqXeUa4",
"rat": 1529751137,
"sub": "[email protected]"
},
"state": "A6WIQrkFEoCM1izG"
}
2.866 phase <--<-- 4 --- AccessToken -->-->
2.866 --> request op_args: {'state': 'A6WIQrkFEoCM1izG'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.866 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'A6WIQrkFEoCM1izG', 'code': '9sLzymMA-2Vk7HBo9Esgo6cqVgEm9JZEGaNtcmJU-h8.AgNR2qzmob1bhvmIM3ikVYzylGmejSTRvoqiCtMgGtg', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '00068b75-61fb-4b08-9c0e-72bb0f2ddf12'}, 'state': 'A6WIQrkFEoCM1izG'}
2.866 AccessTokenRequest {
"code": "9sLzymMA-2Vk7HBo9Esgo6cqVgEm9JZEGaNtcmJU-h8.AgNR2qzmob1bhvmIM3ikVYzylGmejSTRvoqiCtMgGtg",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "A6WIQrkFEoCM1izG"
}
2.866 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.866 request_http_args {'headers': {'Authorization': 'Basic MDAwNjhiNzUtNjFmYi00YjA4LTljMGUtNzJiYjBmMmRkZjEyOmUzM19XSG9nX0lrbA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.866 request code=9sLzymMA-2Vk7HBo9Esgo6cqVgEm9JZEGaNtcmJU-h8.AgNR2qzmob1bhvmIM3ikVYzylGmejSTRvoqiCtMgGtg&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=A6WIQrkFEoCM1izG
3.083 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.084 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMDAwNjhiNzUtNjFmYi00YjA4LTljMGUtNzJiYjBmMmRkZjEyIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiRnR2MWViVDN0cE81cUVDeFo2eTdZdyIsImV4cCI6MTUyOTc1NDczOSwiaWF0IjoxNTI5NzUxMTQwLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiIyOGUxNTM1Yy0xNWZkLTRkY2ItOWNiZS1mZWNhMzY2MTQ4MTciLCJub25jZSI6IkhTelZVNDR4TGhxWGVVYTQiLCJyYXQiOjE1Mjk3NTExMzcsInN1YiI6ImZvb0BiYXIuY29tIn0.YPgxbrGkXPTSogMnwqbK9s-4qs8KwgWCYX73iYEaBX2JcOEw689ZW6FrJKjsgEdpDg0clwuZMK-AE5-hvJnCbx9ZjCIH49JejsktMj2HUvKZTmqHGdfCxvjqrkx-LoaA6psimq7Avuf4HJI4OZNGWHYhPEfYvEg6rgeU4DiottqcTLvk9KoJe5saVl37gSSgQvsc-XNTnkKJ7xHvh2SFBDKZewLVs-mMNqirDE2c_ThC6h2w540iOCjdtFM_FyDxrpRcYz8NAY2VkH37HtNYZkmx2lSg9xU_Bk9I3_wB4FqHMFvrVX4kYqqojNjEkhPomuMXrGpFfGogsXhp3SEBKUO0FC37M1UCzi2yScMnnRIfm9ZZ2SWGuhrLFe5C7OB_dTTy5LVLjT_q4My5U-jj_Tm-5PPJA_P8nem_lc8DYBKicbtsaj8h8731FTnvR-rdZaCBlVflnXDqOqqjDKhRXxAJ1KJE2VDW-o5soVeNWGAi-L-DxNXJbirflw8ZYETXZq8ncjiAvbwx_8sBHDLGewc30IHQ5Y17cvhuYN5ALiBK3ABcCgr2S6qy9DrZuhv9H8kSmmnA3bqTjQ2z5oaKZp6GYHh52j2PXCXAfmDiDbvsKhkv0SzZi9WJ0m4vS4wmPBE1IbgiKL_zRLMy8yPY1GJ_V_q9iPfdj22y3l_Rzys', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'YzhhK2sEDyRCVI8B2x09IwsXPHz31rYFjH5kBRBMheI.JuYFEQDsObSnBximByVdrTnvRUaJ-q_r-FFKA5tJYj0', 'scope': 'openid'}
3.087 AccessTokenResponse {
"access_token": "YzhhK2sEDyRCVI8B2x09IwsXPHz31rYFjH5kBRBMheI.JuYFEQDsObSnBximByVdrTnvRUaJ-q_r-FFKA5tJYj0",
"expires_in": 3599,
"id_token": {
"aud": [
"00068b75-61fb-4b08-9c0e-72bb0f2ddf12"
],
"auth_time": 1529750975,
"c_hash": "Ftv1ebT3tpO5qECxZ6y7Yw",
"exp": 1529754739,
"iat": 1529751140,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "28e1535c-15fd-4dcb-9cbe-feca36614817",
"nonce": "HSzVU44xLhqXeUa4",
"rat": 1529751137,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.088 phase <--<-- 5 --- Done -->-->
3.088 end
3.088 assertion VerifyResponse
3.088 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.089 assertion IsIDTokenSigned
3.089 condition is-idtoken-signed: status=OK [Checks if the id_token is signed]
3.089 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
is-idtoken-signed: status=OK [Checks if the id_token is signed]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CI.F.T.T.s/OP-IDToken-c_hash.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-IDToken-c_hash
Test description: ID Token has c_hash when ID Token and Authorization Code returned from Authorization Endpoint [Hybrid]
Timestamp: 2018-06-23T10:52:28Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.113 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.115 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.115 phase <--<-- 2 --- Registration -->-->
0.115 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.115 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#XOiFCmvEwUIU2s6A"
],
"response_types": [
"code id_token"
]
}
0.275 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.276 RegistrationResponse {
"client_id": "f60072bd-f323-4fcc-9eb4-f9bcee97a63f",
"client_secret": "rAj8oS8kkthI",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "f60072bd-f323-4fcc-9eb4-f9bcee97a63f",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#XOiFCmvEwUIU2s6A"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.276 phase <--<-- 3 --- AsyncAuthn -->-->
0.276 AuthorizationRequest {
"client_id": "f60072bd-f323-4fcc-9eb4-f9bcee97a63f",
"nonce": "6ItYBO4OpWPpMFI7",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "trmWXSn7ja9zN449"
}
0.277 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=f60072bd-f323-4fcc-9eb4-f9bcee97a63f&state=trmWXSn7ja9zN449&response_type=code+id_token&nonce=6ItYBO4OpWPpMFI7
0.277 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=f60072bd-f323-4fcc-9eb4-f9bcee97a63f&state=trmWXSn7ja9zN449&response_type=code+id_token&nonce=6ItYBO4OpWPpMFI7
3.036 http args {}
3.243 response URL with fragment
3.243 response code=2E9v9MxJOdXprH69OC274RfzoZSHexc4ic3JZzsskzY.WcRBwU1oMrGbgsIVYlOfIBRfEhkSPJwVQ7gOBUF1rN0&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZjYwMDcyYmQtZjMyMy00ZmNjLTllYjQtZjliY2VlOTdhNjNmIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiM2lhdzBYNTJHZ0tJMzhfYzVxS1RVZyIsImV4cCI6MTUyOTc1NDc0OCwiaWF0IjoxNTI5NzUxMTQ4LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiIwYTE4ODMxMi02YzhlLTQ0YWYtOGUwMy03OThiYTI0ZGM0MTMiLCJub25jZSI6IjZJdFlCTzRPcFdQcE1GSTciLCJyYXQiOjE1Mjk3NTExNDUsInN1YiI6ImZvb0BiYXIuY29tIn0.DbsiMHcgLhN6tou6-vA5G58YdGHMcTaTuVSjG96NlYg0zfuO2mnw1TTEhKoAfMaljAc6AOxcVtwL2YNNFuJQRJ-DkaDs8Tu6OhvN_4OppJbmlFcAiHMXPPy7FtG2xs40ocS3zLoFbGE5kW1LeyUF38UFp04mWvqRshJFo3u17cdNAcWDINcVgIxjzKOtQjpL53uYW_Eoxi_0I8ERXdamL9dFXvOrQy5dbQ20heJImYQeKJeIeLMduLSPAcmVS6N90V4PmCAtJYOXg_Mvr36YBTfKuaIKuZens1MCAWjId5AYEkzGOdf6xvAaSZJAge-Q4uzG7cCNTRvFfomvZKhFTgFJKd76u_xlw-GCe__QT4t_ir11-mYWX2Vi1df_Onl9YigIhZPSuz9T_TN7V7PWjQApJUt0oJrkNY63tKk-9dUgkE07twz3qXfd0qIV7D5z79HNIL_5FKWz2zChXrLLLPPwX3EaHyGdmzMYzLl5Gcv5msvVeWWpZNHNlRU18Y2iaV6OWfRKr_OFrpxFLEVrzxSagh-TpZYg-OgXipidmGFf-bCTzxesbF5BTTrgakDd8FeV8cNLzz3wsepXfmbxa7Zlsu5PlKhshCwfxLmKIIXXdU9hxnvnSCqHzaeVaEGnK_QD4FVcZIMAKOon841p9En1KsSbZ5iEp6Eu0a2PfaE&state=trmWXSn7ja9zN449
3.243 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZjYwMDcyYmQtZjMyMy00ZmNjLTllYjQtZjliY2VlOTdhNjNmIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiM2lhdzBYNTJHZ0tJMzhfYzVxS1RVZyIsImV4cCI6MTUyOTc1NDc0OCwiaWF0IjoxNTI5NzUxMTQ4LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiIwYTE4ODMxMi02YzhlLTQ0YWYtOGUwMy03OThiYTI0ZGM0MTMiLCJub25jZSI6IjZJdFlCTzRPcFdQcE1GSTciLCJyYXQiOjE1Mjk3NTExNDUsInN1YiI6ImZvb0BiYXIuY29tIn0.DbsiMHcgLhN6tou6-vA5G58YdGHMcTaTuVSjG96NlYg0zfuO2mnw1TTEhKoAfMaljAc6AOxcVtwL2YNNFuJQRJ-DkaDs8Tu6OhvN_4OppJbmlFcAiHMXPPy7FtG2xs40ocS3zLoFbGE5kW1LeyUF38UFp04mWvqRshJFo3u17cdNAcWDINcVgIxjzKOtQjpL53uYW_Eoxi_0I8ERXdamL9dFXvOrQy5dbQ20heJImYQeKJeIeLMduLSPAcmVS6N90V4PmCAtJYOXg_Mvr36YBTfKuaIKuZens1MCAWjId5AYEkzGOdf6xvAaSZJAge-Q4uzG7cCNTRvFfomvZKhFTgFJKd76u_xlw-GCe__QT4t_ir11-mYWX2Vi1df_Onl9YigIhZPSuz9T_TN7V7PWjQApJUt0oJrkNY63tKk-9dUgkE07twz3qXfd0qIV7D5z79HNIL_5FKWz2zChXrLLLPPwX3EaHyGdmzMYzLl5Gcv5msvVeWWpZNHNlRU18Y2iaV6OWfRKr_OFrpxFLEVrzxSagh-TpZYg-OgXipidmGFf-bCTzxesbF5BTTrgakDd8FeV8cNLzz3wsepXfmbxa7Zlsu5PlKhshCwfxLmKIIXXdU9hxnvnSCqHzaeVaEGnK_QD4FVcZIMAKOon841p9En1KsSbZ5iEp6Eu0a2PfaE', 'state': 'trmWXSn7ja9zN449', 'code': '2E9v9MxJOdXprH69OC274RfzoZSHexc4ic3JZzsskzY.WcRBwU1oMrGbgsIVYlOfIBRfEhkSPJwVQ7gOBUF1rN0'}
3.322 AuthorizationResponse {
"code": "2E9v9MxJOdXprH69OC274RfzoZSHexc4ic3JZzsskzY.WcRBwU1oMrGbgsIVYlOfIBRfEhkSPJwVQ7gOBUF1rN0",
"id_token": {
"aud": [
"f60072bd-f323-4fcc-9eb4-f9bcee97a63f"
],
"auth_time": 1529750975,
"c_hash": "3iaw0X52GgKI38_c5qKTUg",
"exp": 1529754748,
"iat": 1529751148,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "0a188312-6c8e-44af-8e03-798ba24dc413",
"nonce": "6ItYBO4OpWPpMFI7",
"rat": 1529751145,
"sub": "[email protected]"
},
"state": "trmWXSn7ja9zN449"
}
3.322 phase <--<-- 4 --- Done -->-->
3.322 end
3.323 assertion VerifyAuthnResponse
3.323 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
3.323 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CI.F.T.T.s/OP-IDToken-kid.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-IDToken-kid
Test description: IDToken has kid [Basic, Implicit, Hybrid]
Timestamp: 2018-06-23T10:52:32Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.077 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.079 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.079 phase <--<-- 2 --- Registration -->-->
0.079 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.079 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#hwB23OFBIUT8n3Dx"
],
"response_types": [
"code id_token"
]
}
0.237 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.238 RegistrationResponse {
"client_id": "7d8e41f1-bb90-4c62-8d1c-ba2ef0fb97bc",
"client_secret": "qnaNIVuERuWW",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "7d8e41f1-bb90-4c62-8d1c-ba2ef0fb97bc",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#hwB23OFBIUT8n3Dx"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.238 phase <--<-- 3 --- AsyncAuthn -->-->
0.239 AuthorizationRequest {
"client_id": "7d8e41f1-bb90-4c62-8d1c-ba2ef0fb97bc",
"nonce": "UkvdiHPptM7fQIL0",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "xjK7jKSFSquPZHuQ"
}
0.239 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=7d8e41f1-bb90-4c62-8d1c-ba2ef0fb97bc&state=xjK7jKSFSquPZHuQ&response_type=code+id_token&nonce=UkvdiHPptM7fQIL0
0.239 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=7d8e41f1-bb90-4c62-8d1c-ba2ef0fb97bc&state=xjK7jKSFSquPZHuQ&response_type=code+id_token&nonce=UkvdiHPptM7fQIL0
2.325 http args {}
2.495 response URL with fragment
2.495 response code=v00EpU4rX4fMeTRiYTwd7vUCtNKEhPZ1ilY5ZSroRi4.EXbTpR8l6sZczidVUIkuoW1DORIbqtk7G4rpVbWAOa0&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiN2Q4ZTQxZjEtYmI5MC00YzYyLThkMWMtYmEyZWYwZmI5N2JjIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiSjh3RGR1MWpRbUwtTndaS0JqWjY4QSIsImV4cCI6MTUyOTc1NDc1MSwiaWF0IjoxNTI5NzUxMTUxLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI1Y2Q5YmU5YS04NGU0LTRkNzUtOGJlMC1mNDQ5MzU3ZjFkMGIiLCJub25jZSI6IlVrdmRpSFBwdE03ZlFJTDAiLCJyYXQiOjE1Mjk3NTExNTAsInN1YiI6ImZvb0BiYXIuY29tIn0.UWwkE4jqYovuY-Uuqj5yZ2qk5F3lDz4G4TmjoX3XSPYXnH5u5cRQR0VJP7DtlEe9wOeV06c7a2FGL8gqad9J_FjYxUXpvh97xU7pFgRZUg4DcJpleAU92WAcda3zokwhwgf8Bew_93HM03zxv_qINeJdpQWTrGtLuVNdy3PuaA6uwM_OUQ7SRKoumtjvfQpfT74ZbE-wwsJrj0UBlO8KC684l0pQY0q2OSXWuD4K80ZdCZ2GBlRuGvyOLHwTOuQm9eCDJMpt3yfewsUlL80f5PG_1u2KDRHt8OUh8wqF9cD9nySnzvumZ7c_KEfMRCbMXphrbK4OgZivXe_iUGVZCd0lobr4UEIT0ydTwX4s-D8_yWKSgxIcDGRZ7fEjdkSWtST6phsc61bQJizpp-Wxomk8AsUIoaoc36lchfJvzTc3g43xGmhepwCbsMQLzOpPOdhNkNKdTKk5ElV2qI-ispyoWKpB_6xPujKMWJ8lOZwwhcDaxSzVsCaak6NKzD4kJeWfJPyrGoy8CZZqLYg1Ydk7zgyYKiB0xgeiwbeu1FsfDwX_idfN0CbKKO27hv57vK6jmWQkn8OXfSqPn_oNX12e1yAvIsLtEpd4Xo05BkAucdsw2LNd4OeIUtLZ3Ie0os7ZjfRXTpR5d8IttxF5wUUxEdXB9gkEw4IZmMHfQps&state=xjK7jKSFSquPZHuQ
2.496 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiN2Q4ZTQxZjEtYmI5MC00YzYyLThkMWMtYmEyZWYwZmI5N2JjIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiSjh3RGR1MWpRbUwtTndaS0JqWjY4QSIsImV4cCI6MTUyOTc1NDc1MSwiaWF0IjoxNTI5NzUxMTUxLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI1Y2Q5YmU5YS04NGU0LTRkNzUtOGJlMC1mNDQ5MzU3ZjFkMGIiLCJub25jZSI6IlVrdmRpSFBwdE03ZlFJTDAiLCJyYXQiOjE1Mjk3NTExNTAsInN1YiI6ImZvb0BiYXIuY29tIn0.UWwkE4jqYovuY-Uuqj5yZ2qk5F3lDz4G4TmjoX3XSPYXnH5u5cRQR0VJP7DtlEe9wOeV06c7a2FGL8gqad9J_FjYxUXpvh97xU7pFgRZUg4DcJpleAU92WAcda3zokwhwgf8Bew_93HM03zxv_qINeJdpQWTrGtLuVNdy3PuaA6uwM_OUQ7SRKoumtjvfQpfT74ZbE-wwsJrj0UBlO8KC684l0pQY0q2OSXWuD4K80ZdCZ2GBlRuGvyOLHwTOuQm9eCDJMpt3yfewsUlL80f5PG_1u2KDRHt8OUh8wqF9cD9nySnzvumZ7c_KEfMRCbMXphrbK4OgZivXe_iUGVZCd0lobr4UEIT0ydTwX4s-D8_yWKSgxIcDGRZ7fEjdkSWtST6phsc61bQJizpp-Wxomk8AsUIoaoc36lchfJvzTc3g43xGmhepwCbsMQLzOpPOdhNkNKdTKk5ElV2qI-ispyoWKpB_6xPujKMWJ8lOZwwhcDaxSzVsCaak6NKzD4kJeWfJPyrGoy8CZZqLYg1Ydk7zgyYKiB0xgeiwbeu1FsfDwX_idfN0CbKKO27hv57vK6jmWQkn8OXfSqPn_oNX12e1yAvIsLtEpd4Xo05BkAucdsw2LNd4OeIUtLZ3Ie0os7ZjfRXTpR5d8IttxF5wUUxEdXB9gkEw4IZmMHfQps', 'state': 'xjK7jKSFSquPZHuQ', 'code': 'v00EpU4rX4fMeTRiYTwd7vUCtNKEhPZ1ilY5ZSroRi4.EXbTpR8l6sZczidVUIkuoW1DORIbqtk7G4rpVbWAOa0'}
2.575 AuthorizationResponse {
"code": "v00EpU4rX4fMeTRiYTwd7vUCtNKEhPZ1ilY5ZSroRi4.EXbTpR8l6sZczidVUIkuoW1DORIbqtk7G4rpVbWAOa0",
"id_token": {
"aud": [
"7d8e41f1-bb90-4c62-8d1c-ba2ef0fb97bc"
],
"auth_time": 1529750975,
"c_hash": "J8wDdu1jQmL-NwZKBjZ68A",
"exp": 1529754751,
"iat": 1529751151,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "5cd9be9a-84e4-4d75-8be0-f449357f1d0b",
"nonce": "UkvdiHPptM7fQIL0",
"rat": 1529751150,
"sub": "[email protected]"
},
"state": "xjK7jKSFSquPZHuQ"
}
2.575 phase <--<-- 4 --- AccessToken -->-->
2.575 --> request op_args: {'state': 'xjK7jKSFSquPZHuQ'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.575 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'xjK7jKSFSquPZHuQ', 'code': 'v00EpU4rX4fMeTRiYTwd7vUCtNKEhPZ1ilY5ZSroRi4.EXbTpR8l6sZczidVUIkuoW1DORIbqtk7G4rpVbWAOa0', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '7d8e41f1-bb90-4c62-8d1c-ba2ef0fb97bc'}, 'state': 'xjK7jKSFSquPZHuQ'}
2.575 AccessTokenRequest {
"code": "v00EpU4rX4fMeTRiYTwd7vUCtNKEhPZ1ilY5ZSroRi4.EXbTpR8l6sZczidVUIkuoW1DORIbqtk7G4rpVbWAOa0",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "xjK7jKSFSquPZHuQ"
}
2.575 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.575 request_http_args {'headers': {'Authorization': 'Basic N2Q4ZTQxZjEtYmI5MC00YzYyLThkMWMtYmEyZWYwZmI5N2JjOnFuYU5JVnVFUnVXVw==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.575 request code=v00EpU4rX4fMeTRiYTwd7vUCtNKEhPZ1ilY5ZSroRi4.EXbTpR8l6sZczidVUIkuoW1DORIbqtk7G4rpVbWAOa0&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=xjK7jKSFSquPZHuQ
2.79 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.791 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiN2Q4ZTQxZjEtYmI5MC00YzYyLThkMWMtYmEyZWYwZmI5N2JjIl0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiSjh3RGR1MWpRbUwtTndaS0JqWjY4QSIsImV4cCI6MTUyOTc1NDc1MSwiaWF0IjoxNTI5NzUxMTUyLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJjYzliNjAyMS05OTdjLTQ4NDItYmNlMi0yZTFmMjM3MWJjMzQiLCJub25jZSI6IlVrdmRpSFBwdE03ZlFJTDAiLCJyYXQiOjE1Mjk3NTExNTAsInN1YiI6ImZvb0BiYXIuY29tIn0.wg2a8jGDiyL1IucKT0KMK74hAJCEoY-lrizgey-5eql5-Lo1r2Dw9HuBbjBzOrGWkadCCFc7tzM60zKk2WIDTkaghcIqL7ZVsxBs9ASErqUlVHxh1IGXQw_NRm7lVuRJgfK1qURle_HD-yt57E7N3kyCMHpIovcHj5wNQbwBUfb-hg86ymz5VvHgeFs0F61PjYalEy1TpTff3OGeOvKKfpQxYIn_0n8-oqouRqcWV56U9BSVOuAxha5_85ktNFMhmhb4OfIwcyfA5BY88XNn1CQYeSBCC_sx5vT7ERF7cPPi7IHufccOPeOc3p37w7HlAo2Gb7_T9Xb05E8M__Q4P_50sENJkhdCsX9vwqJbwByExD7IpEqsz3cXcHy5DC1P6q025akELnB2_M0MDZN1IcCKA-zZbIKMG79kAevCtVxDpGH07_zts1dNlmcYSZ1SEDDDCLgImpobIaXw48jrlvdHK_k_AFme5W_pXjJfkSEc58-lS_BxKmzrMFFzrY8NXMbepizWyL3I8Wb33wp6xwOVtosFKq3sIUjz9LKMW4mW5qwI9ZMMP7iTeJzYcECGP9mV8I2Wc7mHHM7TevzCnmvH9kW4M7DcYq5WcwylvmfnfGI2fui2EQ1WR0OlNZCUwh95fndfS5nuik6ET2UsGBckIFaWFYXWDcUijmg0_Cs', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'R_qGhLUnDUo52fohC5Du1R0GqxhXH8j9u2OFFpRU3OQ.MCk90rUxisSOWEh5ryZj8KwqDQmyxsH4DPaByxUelgk', 'scope': 'openid'}
2.794 AccessTokenResponse {
"access_token": "R_qGhLUnDUo52fohC5Du1R0GqxhXH8j9u2OFFpRU3OQ.MCk90rUxisSOWEh5ryZj8KwqDQmyxsH4DPaByxUelgk",
"expires_in": 3599,
"id_token": {
"aud": [
"7d8e41f1-bb90-4c62-8d1c-ba2ef0fb97bc"
],
"auth_time": 1529750975,
"c_hash": "J8wDdu1jQmL-NwZKBjZ68A",
"exp": 1529754751,
"iat": 1529751152,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "cc9b6021-997c-4842-bce2-2e1f2371bc34",
"nonce": "UkvdiHPptM7fQIL0",
"rat": 1529751150,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
2.794 phase <--<-- 5 --- Done -->-->
2.794 end
2.795 assertion VerifySignedIdTokenHasKID
2.795 condition verify-signed-idtoken-has-kid: status=OK [Verifies that the header of a signed IDToken includes a kid claim.]
2.795 assertion VerifyResponse
2.795 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.795 condition Done: status=OK
============================================================
Conditions
verify-signed-idtoken-has-kid: status=OK [Verifies that the header of a signed IDToken includes a kid claim.]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CI.F.T.T.s/OP-IDToken-RS256.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-IDToken-RS256
Test description: Asymmetric ID Token signature with RS256
Timestamp: 2018-06-23T10:52:24Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Registration -->-->
0.074 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'id_token_signed_response_alg': 'RS256', 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.075 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id_token_signed_response_alg": "RS256",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#aUGzJ8XAkg0cV0qq"
],
"response_types": [
"code id_token"
]
}
0.232 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.233 RegistrationResponse {
"client_id": "abf7e8d0-332d-487c-a86f-5f4c8913e654",
"client_secret": "vxASIVLDIxXE",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "abf7e8d0-332d-487c-a86f-5f4c8913e654",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#aUGzJ8XAkg0cV0qq"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.233 phase <--<-- 3 --- AsyncAuthn -->-->
0.233 AuthorizationRequest {
"client_id": "abf7e8d0-332d-487c-a86f-5f4c8913e654",
"nonce": "ZXeRY7TYN2wYVBRB",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "dypl4hbc7xI1UKcg"
}
0.234 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=abf7e8d0-332d-487c-a86f-5f4c8913e654&state=dypl4hbc7xI1UKcg&response_type=code+id_token&nonce=ZXeRY7TYN2wYVBRB
0.234 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=abf7e8d0-332d-487c-a86f-5f4c8913e654&state=dypl4hbc7xI1UKcg&response_type=code+id_token&nonce=ZXeRY7TYN2wYVBRB
2.308 http args {}
2.521 response URL with fragment
2.522 response code=flrvnBo3Fa67vHmcNHbXnHAODrRhovCdRWklwAkcixk.8ki218hFxdV0Qu6SCSX2E03chkfmFEy-n1loCsSL0bo&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYWJmN2U4ZDAtMzMyZC00ODdjLWE4NmYtNWY0Yzg5MTNlNjU0Il0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoicWJwclUwQWpzOHZfbWJ0cllrRDJ1USIsImV4cCI6MTUyOTc1NDc0MywiaWF0IjoxNTI5NzUxMTQzLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiIwZWE5NDRhYy05NmFlLTQwYmEtODhiZC0zZWEwMjdiODBmZjEiLCJub25jZSI6IlpYZVJZN1RZTjJ3WVZCUkIiLCJyYXQiOjE1Mjk3NTExNDEsInN1YiI6ImZvb0BiYXIuY29tIn0.XnUFZFlZ2Ur5nCRHNIffNTR1VSzU_qZuQ1wS6YFtExew4ar813HMypm78NbRS4FZx73jvOsBgLSwh7VjxJ42pik2Ew-JCB20hA-tORJNh7SpLzX5t3Pmre9Xr85hAbZ0KfeoRhipBJB0S8EHjmD-stX-XsC6-WesAi2E9ymGwJ9GY0SpN2pS3-Agy78wyoZeh9kLAw3XDHdudLWBgDCGAWu-DaOyeHJP4gEKEL0KzZmCR4S8jW9hKTRgUXQpD5aph4YbUHfN8IJjjvVUkhey41avyf_T1tO5L7PByykKVNK6zRB1k_bhwpZqeGDpJInDo1lftm6v0JD-al6MLhTCFe81kGqJOu7DLl0CBxpTwktQmJmkmDTkQrU9DkbiVpR5mrGS246939t_A4inw0ZvdG-3JPulkGPdK_FFkTygt1LNBwNGhWD_naeMf10nBK7rE1sVc1URBQbghXVnSNZ_a3mu_xgaNli7HpO67elxQL7d4dmapyTSs2uQ22TgtvsYVL9D7mP-8OgSJn98hX1nvmi9901sm8oMIZIm8hRyXdI3u7PWtKY2gzMh2MYzxfQTAy_sgdGd20pD1VkbRI58XRqcgQjqSAIKyjnr-Fvy47DE1eA0hqlCGev0vVqG7sjHLe1Yfhir3CfBRZzxFRJRHopIIQOImqZ5qfVEfFOnxaw&state=dypl4hbc7xI1UKcg
2.522 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYWJmN2U4ZDAtMzMyZC00ODdjLWE4NmYtNWY0Yzg5MTNlNjU0Il0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoicWJwclUwQWpzOHZfbWJ0cllrRDJ1USIsImV4cCI6MTUyOTc1NDc0MywiaWF0IjoxNTI5NzUxMTQzLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiIwZWE5NDRhYy05NmFlLTQwYmEtODhiZC0zZWEwMjdiODBmZjEiLCJub25jZSI6IlpYZVJZN1RZTjJ3WVZCUkIiLCJyYXQiOjE1Mjk3NTExNDEsInN1YiI6ImZvb0BiYXIuY29tIn0.XnUFZFlZ2Ur5nCRHNIffNTR1VSzU_qZuQ1wS6YFtExew4ar813HMypm78NbRS4FZx73jvOsBgLSwh7VjxJ42pik2Ew-JCB20hA-tORJNh7SpLzX5t3Pmre9Xr85hAbZ0KfeoRhipBJB0S8EHjmD-stX-XsC6-WesAi2E9ymGwJ9GY0SpN2pS3-Agy78wyoZeh9kLAw3XDHdudLWBgDCGAWu-DaOyeHJP4gEKEL0KzZmCR4S8jW9hKTRgUXQpD5aph4YbUHfN8IJjjvVUkhey41avyf_T1tO5L7PByykKVNK6zRB1k_bhwpZqeGDpJInDo1lftm6v0JD-al6MLhTCFe81kGqJOu7DLl0CBxpTwktQmJmkmDTkQrU9DkbiVpR5mrGS246939t_A4inw0ZvdG-3JPulkGPdK_FFkTygt1LNBwNGhWD_naeMf10nBK7rE1sVc1URBQbghXVnSNZ_a3mu_xgaNli7HpO67elxQL7d4dmapyTSs2uQ22TgtvsYVL9D7mP-8OgSJn98hX1nvmi9901sm8oMIZIm8hRyXdI3u7PWtKY2gzMh2MYzxfQTAy_sgdGd20pD1VkbRI58XRqcgQjqSAIKyjnr-Fvy47DE1eA0hqlCGev0vVqG7sjHLe1Yfhir3CfBRZzxFRJRHopIIQOImqZ5qfVEfFOnxaw', 'state': 'dypl4hbc7xI1UKcg', 'code': 'flrvnBo3Fa67vHmcNHbXnHAODrRhovCdRWklwAkcixk.8ki218hFxdV0Qu6SCSX2E03chkfmFEy-n1loCsSL0bo'}
2.608 AuthorizationResponse {
"code": "flrvnBo3Fa67vHmcNHbXnHAODrRhovCdRWklwAkcixk.8ki218hFxdV0Qu6SCSX2E03chkfmFEy-n1loCsSL0bo",
"id_token": {
"aud": [
"abf7e8d0-332d-487c-a86f-5f4c8913e654"
],
"auth_time": 1529750975,
"c_hash": "qbprU0Ajs8v_mbtrYkD2uQ",
"exp": 1529754743,
"iat": 1529751143,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "0ea944ac-96ae-40ba-88bd-3ea027b80ff1",
"nonce": "ZXeRY7TYN2wYVBRB",
"rat": 1529751141,
"sub": "[email protected]"
},
"state": "dypl4hbc7xI1UKcg"
}
2.608 phase <--<-- 4 --- AccessToken -->-->
2.609 --> request op_args: {'state': 'dypl4hbc7xI1UKcg'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.609 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'dypl4hbc7xI1UKcg', 'code': 'flrvnBo3Fa67vHmcNHbXnHAODrRhovCdRWklwAkcixk.8ki218hFxdV0Qu6SCSX2E03chkfmFEy-n1loCsSL0bo', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'abf7e8d0-332d-487c-a86f-5f4c8913e654'}, 'state': 'dypl4hbc7xI1UKcg'}
2.609 AccessTokenRequest {
"code": "flrvnBo3Fa67vHmcNHbXnHAODrRhovCdRWklwAkcixk.8ki218hFxdV0Qu6SCSX2E03chkfmFEy-n1loCsSL0bo",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "dypl4hbc7xI1UKcg"
}
2.609 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.609 request_http_args {'headers': {'Authorization': 'Basic YWJmN2U4ZDAtMzMyZC00ODdjLWE4NmYtNWY0Yzg5MTNlNjU0OnZ4QVNJVkxESXhYRQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.609 request code=flrvnBo3Fa67vHmcNHbXnHAODrRhovCdRWklwAkcixk.8ki218hFxdV0Qu6SCSX2E03chkfmFEy-n1loCsSL0bo&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=dypl4hbc7xI1UKcg
2.856 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.857 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYWJmN2U4ZDAtMzMyZC00ODdjLWE4NmYtNWY0Yzg5MTNlNjU0Il0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoicWJwclUwQWpzOHZfbWJ0cllrRDJ1USIsImV4cCI6MTUyOTc1NDc0MywiaWF0IjoxNTI5NzUxMTQ0LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiIzYzc4NjUzMS0zYWY1LTQyZGMtOTcwNC1lZmRlOTFmMjM4NWYiLCJub25jZSI6IlpYZVJZN1RZTjJ3WVZCUkIiLCJyYXQiOjE1Mjk3NTExNDEsInN1YiI6ImZvb0BiYXIuY29tIn0.wBczhN6EaqNGKayHeJq6TNQLSeh9-ujI1PqKjXJFz9wo6_9f2ww60rTQZZgiPAq0yDBbDZwz--pk_msmf3MK-754tlN9wyHsHZ-FD3apmmUWf659AiDP4pv5WBkoTZvBX8PAmPt0tF4sbXlR5MaqRWy_IjG-SMp5EHBcfWoyqJrmWZ_3lU5qgOI0hDtDRuhi-x-c_00sgfWLflP_GerEexHEGZF3L7LoQhr_prdiLl8yXG-1AIJ4_vTIP7XU2QS6uNWkJq_mq7AhLgXZCsxq2WSp-WsQf1Qp5_id_kR-UCAnc6Lxkzyi_MH-_5OM8FYGGjoG08XN93YXhBZYPBci2iA0cFkUfJtIzFfimAnNWHVUML3IXrOUyVxJbfcgHEDSXpT_i8aPP5-cZoITuk-NnFrCAPE12staBNw26WBEp1BWjLayDjLy8odfD42a0lbBs-6O_vUh1jlBDfG38yFmXL7FAKCxk-m12KrnaK7hV7Mjeai4bCICNGzwlf65ixFNhBUuV9HlzVxKOwVBUHsKyHIjMw9cAFJjNYMK0h3QXIybpuLCzr-hzpkxPUyxS38J6yHTmmT1HgQ-KGjswRDHK-BenbuA2Pymh0bvetpU4Z4G6aZ5rINhTN4SE1qNbyqxYa0CfJbbV5tV9KOYsk9lTajBPInEyM0s6Qqzw9_11BQ', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': '9GFcVR6kyPO_j2gUs0z3DIxILhxWN1ckHtQIbkVEglc.2RjSDDM0XPWeYQLW1wBnpLy-K1sbUPPNWMBaQhpKhBc', 'scope': 'openid'}
2.861 AccessTokenResponse {
"access_token": "9GFcVR6kyPO_j2gUs0z3DIxILhxWN1ckHtQIbkVEglc.2RjSDDM0XPWeYQLW1wBnpLy-K1sbUPPNWMBaQhpKhBc",
"expires_in": 3599,
"id_token": {
"aud": [
"abf7e8d0-332d-487c-a86f-5f4c8913e654"
],
"auth_time": 1529750975,
"c_hash": "qbprU0Ajs8v_mbtrYkD2uQ",
"exp": 1529754743,
"iat": 1529751144,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "3c786531-3af5-42dc-9704-efde91f2385f",
"nonce": "ZXeRY7TYN2wYVBRB",
"rat": 1529751141,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
2.861 phase <--<-- 5 --- Done -->-->
2.861 end
2.861 assertion VerifyResponse
2.862 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.862 assertion VerifySignedIdToken
2.862 condition verify-idtoken-is-signed: status=OK [Verifies that an ID Token is signed]
2.862 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-idtoken-is-signed: status=OK [Verifies that an ID Token is signed]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CI.F.T.T.s/OP-nonce-noncode.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-nonce-noncode
Test description: Request with nonce, verifies it was returned in ID Token [Implicit, Hybrid]
Timestamp: 2018-06-23T10:53:35Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.083 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.085 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.085 phase <--<-- 2 --- Registration -->-->
0.085 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.085 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#vzPzLHB6z9sH2t9P"
],
"response_types": [
"code id_token"
]
}
0.284 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.285 RegistrationResponse {
"client_id": "5c4259c1-4c26-4419-888d-b5d77faa9366",
"client_secret": "cBBvKtL9yA7D",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "5c4259c1-4c26-4419-888d-b5d77faa9366",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#vzPzLHB6z9sH2t9P"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.285 phase <--<-- 3 --- AsyncAuthn -->-->
0.285 AuthorizationRequest {
"client_id": "5c4259c1-4c26-4419-888d-b5d77faa9366",
"nonce": "DmrkBKhNbhmv1Wip",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "xoCIUh5vSWiABf3m"
}
0.285 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=5c4259c1-4c26-4419-888d-b5d77faa9366&state=xoCIUh5vSWiABf3m&response_type=code+id_token&nonce=DmrkBKhNbhmv1Wip
0.285 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=5c4259c1-4c26-4419-888d-b5d77faa9366&state=xoCIUh5vSWiABf3m&response_type=code+id_token&nonce=DmrkBKhNbhmv1Wip
2.536 http args {}
2.706 response URL with fragment
2.707 response code=JiFti5AYMRG6l5Sx5J6qmKbyKK57F3w94n_eut4qZHM.MmOqyknmcw-lmZxZ_AIuZRRc3TxPOSvEKpxTNz956-g&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNWM0MjU5YzEtNGMyNi00NDE5LTg4OGQtYjVkNzdmYWE5MzY2Il0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiajJUOGtaSFdMNkpjSWhIN1BRUThpZyIsImV4cCI6MTUyOTc1NDgxNSwiaWF0IjoxNTI5NzUxMjE1LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI4Yjg3ZjE3Zi01OWNlLTQ2MTctOWJkNC1lNTYwYTVlYWYwOGMiLCJub25jZSI6IkRtcmtCS2hOYmhtdjFXaXAiLCJyYXQiOjE1Mjk3NTEyMTMsInN1YiI6ImZvb0BiYXIuY29tIn0.Qh1XXmuykLpQ-1QOd7VPpegg_zFaNI1EZAUPgx_wJ36b-FgiOuaBvc0NtslHmb6rXA-b7mXESQuKB9o3Ic7-2ruE6y1WOxue-8NpuLrJBPBF9o0UsVZyit_3J0VTNPJBy_WSIQHXo119zhKqJBRBa8IrLkpQk6b7LnV9OnIkVBAHGyekltWBZ8cDH0cPqNsPjzwAi_Ct-GmQvl4eACnLVftM6mdWvxnTfr7jEv1SmpDO37c5SHRUCVfgr9hoO77GEj4aIgQASxZm7wJpG_yWN5XrGpJPHaxfe3KBjYTmuEMGkPKIjXPCbBePRw3jcnLOtM6EfohEnBnzDsF1PLiffppru4WaDpyfOrbIRpAOi6U58lI8J_oPWqGcbkakGTnh5sRiDwCvJIMWZ-1RXjVjQIVVCpBdjPQV115FSigbsiHbvowYbsvxdXWXpy5z_KN0ziZtSx67QiQcB3H88QArw92Hga2pC4pk_6x2ICC6RKgL-gQxqN2ieqzhjufE26DFuJyjUVwRFtbhq2o8XhPjofjXn0E0_7-mSHcySjMhQOFm122SVJ2F0VaaXzwc-Vpa-LmRSHHSAYdD-ns9aksB5RZnJWf_queO5HNw40f5VIHpC5yCHvtFZn7YkzM43qbH8L7cDwmrNC72GMbyYfgMCa3sGrkU7QFhGMdQZoznVe0&state=xoCIUh5vSWiABf3m
2.707 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNWM0MjU5YzEtNGMyNi00NDE5LTg4OGQtYjVkNzdmYWE5MzY2Il0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiajJUOGtaSFdMNkpjSWhIN1BRUThpZyIsImV4cCI6MTUyOTc1NDgxNSwiaWF0IjoxNTI5NzUxMjE1LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI4Yjg3ZjE3Zi01OWNlLTQ2MTctOWJkNC1lNTYwYTVlYWYwOGMiLCJub25jZSI6IkRtcmtCS2hOYmhtdjFXaXAiLCJyYXQiOjE1Mjk3NTEyMTMsInN1YiI6ImZvb0BiYXIuY29tIn0.Qh1XXmuykLpQ-1QOd7VPpegg_zFaNI1EZAUPgx_wJ36b-FgiOuaBvc0NtslHmb6rXA-b7mXESQuKB9o3Ic7-2ruE6y1WOxue-8NpuLrJBPBF9o0UsVZyit_3J0VTNPJBy_WSIQHXo119zhKqJBRBa8IrLkpQk6b7LnV9OnIkVBAHGyekltWBZ8cDH0cPqNsPjzwAi_Ct-GmQvl4eACnLVftM6mdWvxnTfr7jEv1SmpDO37c5SHRUCVfgr9hoO77GEj4aIgQASxZm7wJpG_yWN5XrGpJPHaxfe3KBjYTmuEMGkPKIjXPCbBePRw3jcnLOtM6EfohEnBnzDsF1PLiffppru4WaDpyfOrbIRpAOi6U58lI8J_oPWqGcbkakGTnh5sRiDwCvJIMWZ-1RXjVjQIVVCpBdjPQV115FSigbsiHbvowYbsvxdXWXpy5z_KN0ziZtSx67QiQcB3H88QArw92Hga2pC4pk_6x2ICC6RKgL-gQxqN2ieqzhjufE26DFuJyjUVwRFtbhq2o8XhPjofjXn0E0_7-mSHcySjMhQOFm122SVJ2F0VaaXzwc-Vpa-LmRSHHSAYdD-ns9aksB5RZnJWf_queO5HNw40f5VIHpC5yCHvtFZn7YkzM43qbH8L7cDwmrNC72GMbyYfgMCa3sGrkU7QFhGMdQZoznVe0', 'state': 'xoCIUh5vSWiABf3m', 'code': 'JiFti5AYMRG6l5Sx5J6qmKbyKK57F3w94n_eut4qZHM.MmOqyknmcw-lmZxZ_AIuZRRc3TxPOSvEKpxTNz956-g'}
2.791 AuthorizationResponse {
"code": "JiFti5AYMRG6l5Sx5J6qmKbyKK57F3w94n_eut4qZHM.MmOqyknmcw-lmZxZ_AIuZRRc3TxPOSvEKpxTNz956-g",
"id_token": {
"aud": [
"5c4259c1-4c26-4419-888d-b5d77faa9366"
],
"auth_time": 1529750975,
"c_hash": "j2T8kZHWL6JcIhH7PQQ8ig",
"exp": 1529754815,
"iat": 1529751215,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "8b87f17f-59ce-4617-9bd4-e560a5eaf08c",
"nonce": "DmrkBKhNbhmv1Wip",
"rat": 1529751213,
"sub": "[email protected]"
},
"state": "xoCIUh5vSWiABf3m"
}
2.792 phase <--<-- 4 --- AccessToken -->-->
2.792 --> request op_args: {'state': 'xoCIUh5vSWiABf3m'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.792 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'xoCIUh5vSWiABf3m', 'code': 'JiFti5AYMRG6l5Sx5J6qmKbyKK57F3w94n_eut4qZHM.MmOqyknmcw-lmZxZ_AIuZRRc3TxPOSvEKpxTNz956-g', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '5c4259c1-4c26-4419-888d-b5d77faa9366'}, 'state': 'xoCIUh5vSWiABf3m'}
2.792 AccessTokenRequest {
"code": "JiFti5AYMRG6l5Sx5J6qmKbyKK57F3w94n_eut4qZHM.MmOqyknmcw-lmZxZ_AIuZRRc3TxPOSvEKpxTNz956-g",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "xoCIUh5vSWiABf3m"
}
2.792 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.792 request_http_args {'headers': {'Authorization': 'Basic NWM0MjU5YzEtNGMyNi00NDE5LTg4OGQtYjVkNzdmYWE5MzY2OmNCQnZLdEw5eUE3RA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.792 request code=JiFti5AYMRG6l5Sx5J6qmKbyKK57F3w94n_eut4qZHM.MmOqyknmcw-lmZxZ_AIuZRRc3TxPOSvEKpxTNz956-g&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=xoCIUh5vSWiABf3m
3.004 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.005 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNWM0MjU5YzEtNGMyNi00NDE5LTg4OGQtYjVkNzdmYWE5MzY2Il0sImF1dGhfdGltZSI6MTUyOTc1MDk3NSwiY19oYXNoIjoiajJUOGtaSFdMNkpjSWhIN1BRUThpZyIsImV4cCI6MTUyOTc1NDgxNSwiaWF0IjoxNTI5NzUxMjE1LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiIzMTVmMmI2MS02ZTQ1LTQ2YTUtOWZiNi00ZTM0MWUyNDI0MzIiLCJub25jZSI6IkRtcmtCS2hOYmhtdjFXaXAiLCJyYXQiOjE1Mjk3NTEyMTMsInN1YiI6ImZvb0BiYXIuY29tIn0.VYbF3VoPLAmco6q7X8a6_ooX9Xelf5PPks_Q11THHhpCxxyIxman5xJep28Ld72YL1060r-jIm55g_jOiFNXW3l7E2ZHL2H5sLK8LCHOajWY2vpNZitFDfGosfuUN-wV37pEATlvT4XA56nmHq-6nXFI2ml7dBsCPcL7RO7sBeU8pTsxRCh8ELgYE6osCA0qFeSF2PQqAehips3tQl5ne8pDA9Gu3I97_ZGLNoN2coI3GIHOqnULNKlNHzL76lOSGlCDtkdIh77cfL9CkJALUSiyOoxKg0-vfQeWn9dZTW_xYRRAQBAErvybGzArJam7L-qiozec2MSwkOf2sFVtkyd5PBcR9q-8YeHvyAooySmtX726hzWGqQ-4JpEc4bAbCTKwVGvA32TbBQGdSsp2l-CagpV43-_fLCvH3LOma27b_5P_SOxOoLKzkkWkXF1k2KT9qIsM4o4GI4OHPQ6HoghITxFD4pel-Aw6aFlyiC-a_9VGlLgJj4oAgn2wiSm5XAJT_rGmyZqz8m3o1WuNlrlYGwbSllmFVRlWIz2Fq8bmIxX5bHQA9vtOS3nSU33P3zUoxqKFSR4EyLm1xfWySAbouacwAXQ282L-YxQpN5hkONL4zPen9Qd_MZKWm8qldPdSCdXYQBZ8WeU5OmjRBXexBts9VHWKbnqLkkbtKqc', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'Op17Wlqgi8U-SmNzHr_8DBuTdk6poKacKhU1aRX3ix8.zSi_kqAQZvNQxfxF4UzDLcfHw6pBwC6UVHex6cUc83E', 'scope': 'openid'}
3.008 AccessTokenResponse {
"access_token": "Op17Wlqgi8U-SmNzHr_8DBuTdk6poKacKhU1aRX3ix8.zSi_kqAQZvNQxfxF4UzDLcfHw6pBwC6UVHex6cUc83E",
"expires_in": 3599,
"id_token": {
"aud": [
"5c4259c1-4c26-4419-888d-b5d77faa9366"
],
"auth_time": 1529750975,
"c_hash": "j2T8kZHWL6JcIhH7PQQ8ig",
"exp": 1529754815,
"iat": 1529751215,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "315f2b61-6e45-46a5-9fb6-4e341e242432",
"nonce": "DmrkBKhNbhmv1Wip",
"rat": 1529751213,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.008 phase <--<-- 5 --- Done -->-->
3.008 end
3.009 assertion VerifyResponse
3.009 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.009 assertion CheckIdTokenNonce
3.009 condition check-idtoken-nonce: status=OK [Verify that the nonce in the IDToken is the same that's included in the Authorization Request.]
3.009 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
check-idtoken-nonce: status=OK [Verify that the nonce in the IDToken is the same that's included in the Authorization Request.]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CI.F.T.T.s/OP-nonce-NoReq-noncode.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-nonce-NoReq-noncode
Test description: Reject requests without nonce unless using the code flow
Timestamp: 2018-06-23T10:53:31Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.071 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.073 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.073 phase <--<-- 2 --- Note -->-->
1.198 phase <--<-- 3 --- Registration -->-->
1.198 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.199 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#a2ZSDM0zWQmk9hTt"
],
"response_types": [
"code id_token"
]
}
1.353 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.354 RegistrationResponse {
"client_id": "55ee9a6a-bdf5-464e-95dc-9bac3eb6a086",
"client_secret": "IxS6PXf2eaiH",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "55ee9a6a-bdf5-464e-95dc-9bac3eb6a086",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#a2ZSDM0zWQmk9hTt"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.355 phase <--<-- 4 --- AsyncAuthn -->-->
1.355 AuthorizationRequest {
"client_id": "55ee9a6a-bdf5-464e-95dc-9bac3eb6a086",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "7bxuILmubEg6GlzQ"
}
1.355 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?state=7bxuILmubEg6GlzQ&scope=openid&response_type=code+id_token&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=55ee9a6a-bdf5-464e-95dc-9bac3eb6a086
1.355 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?state=7bxuILmubEg6GlzQ&scope=openid&response_type=code+id_token&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=55ee9a6a-bdf5-464e-95dc-9bac3eb6a086
3.751 http args {}
3.918 response URL with fragment
3.919 response error=invalid_request&error_debug=Parameter+nonce+must+be+set+when+using+the+hybrid+flow&error_description=The+request+is+missing+a+required+parameter%252C+includes+an+invalid+parameter+value%252C+includes+a+parameter+more+than+once%252C+or+is+otherwise+malformed&error_hint=Make+sure+that+the+various+parameters+are+correct%252C+be+aware+of+case+sensitivity+and+trim+your+parameters.+Make+sure+that+the+client+you+are+using+has+exactly+whitelisted+the+redirect_uri+you+specified.&state=7bxuILmubEg6GlzQ
3.919 response {'error_debug': 'Parameter nonce must be set when using the hybrid flow', 'error_description': 'The request is missing a required parameter%2C includes an invalid parameter value%2C includes a parameter more than once%2C or is otherwise malformed', 'state': '7bxuILmubEg6GlzQ', 'error': 'invalid_request', 'error_hint': 'Make sure that the various parameters are correct%2C be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.'}
3.919 AuthorizationErrorResponse {
"error": "invalid_request",
"error_debug": "Parameter nonce must be set when using the hybrid flow",
"error_description": "The request is missing a required parameter%2C includes an invalid parameter value%2C includes a parameter more than once%2C or is otherwise malformed",
"error_hint": "Make sure that the various parameters are correct%2C be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.",
"state": "7bxuILmubEg6GlzQ"
}
3.919 AuthorizationErrorResponse {
"error": "invalid_request",
"error_debug": "Parameter nonce must be set when using the hybrid flow",
"error_description": "The request is missing a required parameter%2C includes an invalid parameter value%2C includes a parameter more than once%2C or is otherwise malformed",
"error_hint": "Make sure that the various parameters are correct%2C be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.",
"state": "7bxuILmubEg6GlzQ"
}
3.919 phase <--<-- 5 --- Done -->-->
3.919 end
3.92 assertion VerifyResponse
3.92 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.92 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CI.F.T.T.s/OP-OAuth-2nd-30s.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-OAuth-2nd-30s
Test description: Trying to use authorization code twice with 30 seconds in between uses must result in an error
Timestamp: 2018-06-23T10:58:01Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.612 phase <--<-- 1 --- Webfinger -->-->
1.612 not expected to do WebFinger
1.612 phase <--<-- 2 --- Discovery -->-->
1.612 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.686 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.687 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.687 phase <--<-- 3 --- Registration -->-->
1.687 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.688 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#WiniNJcSizOs2U5E"
],
"response_types": [
"code id_token"
]
}
1.842 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.843 RegistrationResponse {
"client_id": "adf05591-2b56-4a8a-8976-3fc1be0ecb21",
"client_secret": "CLE.9RwqRr_c",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "adf05591-2b56-4a8a-8976-3fc1be0ecb21",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#WiniNJcSizOs2U5E"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.843 phase <--<-- 4 --- AsyncAuthn -->-->
1.844 AuthorizationRequest {
"client_id": "adf05591-2b56-4a8a-8976-3fc1be0ecb21",
"nonce": "sy1RktaY5R0gMiI0",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "jPDgZXb8TbQXiSq2"
}
1.844 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=adf05591-2b56-4a8a-8976-3fc1be0ecb21&state=jPDgZXb8TbQXiSq2&response_type=code+id_token&nonce=sy1RktaY5R0gMiI0
1.844 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=adf05591-2b56-4a8a-8976-3fc1be0ecb21&state=jPDgZXb8TbQXiSq2&response_type=code+id_token&nonce=sy1RktaY5R0gMiI0
5.114 http args {}
5.281 response URL with fragment
5.282 response code=w03NmGVbjm0FjgcfJm4187EME21tpTSMMIC2OOZW_Pk.-i1OlNCMgHs5joAJxnjiln8CdnBg42ZljPag0hboEQs&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYWRmMDU1OTEtMmI1Ni00YThhLTg5NzYtM2ZjMWJlMGVjYjIxIl0sImF1dGhfdGltZSI6MTUyOTc1MTQwOSwiY19oYXNoIjoiQWN0Q2E3Ui15SGNXTFA3TXI4bUtmQSIsImV4cCI6MTUyOTc1NTA1MCwiaWF0IjoxNTI5NzUxNDUwLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiIzYzAzNWVmMi04MmFjLTQ5N2EtYWE5NS0xZWY0NjVlMDU2MTciLCJub25jZSI6InN5MVJrdGFZNVIwZ01pSTAiLCJyYXQiOjE1Mjk3NTE0NDcsInN1YiI6ImZvb0BiYXIuY29tIn0.FHiQFXkWDyGLQWpkHbUitSYQVFikvyxA6YgHC7s6P-Wapn58IjuiCgeP1u4M4-it3u5ax6j0__w0UTEB_TeOmn2UUREPP0n-bVtr4RyoOmFoAlYxIbloFXvFaSoAJ_bJzLFTDfTcwP4ap2Ovwe5Py-Xp-QZLz3dR1PZyD77lXZXU1i46JB36simthctlNhrUmGLUeQOl3fbtDPFLhS1Y6tKSquhkxCJ4lqRgDQTHWQMBrFrFoJ01k6j2sBWMhYHI5A7OOsXe8HEftCxJtq5RqCXAl85GdUkRsEDhFax7o79taepnWbtjqNw3pAv92VFHsH8NfgnakgZz71dwCD2S_F9fSekzi4ska5Qp8EbCQMU69zDpi3kGLygekyGORSRm5i5huLw3IttVBz2aJT87Lj-uhHHxRtY8xXBDXzClv9Ee3Jv57LT11QnazZG19BUj2z-AetvdfFbc_shzkk_diJZnNFDWbYTmXapwd4t1WF-dXRb-5vFarFPclKweRBDEMvMuWn0K0IK5yMSUjBEsJBzTTGPWQyccddF9HqZoCqpa8_tZhjniCEq_cCHAc_5jmKR44-xhOiMZUoajGGfmZj1LXvbV0kKzFPR5SdvAsxOiYQPu044t6WBItE0eFS6PSwOU64fJuxhX6Ujd6nmO2Ur9Doq_ITR1mcNRzfEe_9E&state=jPDgZXb8TbQXiSq2
5.282 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYWRmMDU1OTEtMmI1Ni00YThhLTg5NzYtM2ZjMWJlMGVjYjIxIl0sImF1dGhfdGltZSI6MTUyOTc1MTQwOSwiY19oYXNoIjoiQWN0Q2E3Ui15SGNXTFA3TXI4bUtmQSIsImV4cCI6MTUyOTc1NTA1MCwiaWF0IjoxNTI5NzUxNDUwLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiIzYzAzNWVmMi04MmFjLTQ5N2EtYWE5NS0xZWY0NjVlMDU2MTciLCJub25jZSI6InN5MVJrdGFZNVIwZ01pSTAiLCJyYXQiOjE1Mjk3NTE0NDcsInN1YiI6ImZvb0BiYXIuY29tIn0.FHiQFXkWDyGLQWpkHbUitSYQVFikvyxA6YgHC7s6P-Wapn58IjuiCgeP1u4M4-it3u5ax6j0__w0UTEB_TeOmn2UUREPP0n-bVtr4RyoOmFoAlYxIbloFXvFaSoAJ_bJzLFTDfTcwP4ap2Ovwe5Py-Xp-QZLz3dR1PZyD77lXZXU1i46JB36simthctlNhrUmGLUeQOl3fbtDPFLhS1Y6tKSquhkxCJ4lqRgDQTHWQMBrFrFoJ01k6j2sBWMhYHI5A7OOsXe8HEftCxJtq5RqCXAl85GdUkRsEDhFax7o79taepnWbtjqNw3pAv92VFHsH8NfgnakgZz71dwCD2S_F9fSekzi4ska5Qp8EbCQMU69zDpi3kGLygekyGORSRm5i5huLw3IttVBz2aJT87Lj-uhHHxRtY8xXBDXzClv9Ee3Jv57LT11QnazZG19BUj2z-AetvdfFbc_shzkk_diJZnNFDWbYTmXapwd4t1WF-dXRb-5vFarFPclKweRBDEMvMuWn0K0IK5yMSUjBEsJBzTTGPWQyccddF9HqZoCqpa8_tZhjniCEq_cCHAc_5jmKR44-xhOiMZUoajGGfmZj1LXvbV0kKzFPR5SdvAsxOiYQPu044t6WBItE0eFS6PSwOU64fJuxhX6Ujd6nmO2Ur9Doq_ITR1mcNRzfEe_9E', 'state': 'jPDgZXb8TbQXiSq2', 'code': 'w03NmGVbjm0FjgcfJm4187EME21tpTSMMIC2OOZW_Pk.-i1OlNCMgHs5joAJxnjiln8CdnBg42ZljPag0hboEQs'}
5.407 AuthorizationResponse {
"code": "w03NmGVbjm0FjgcfJm4187EME21tpTSMMIC2OOZW_Pk.-i1OlNCMgHs5joAJxnjiln8CdnBg42ZljPag0hboEQs",
"id_token": {
"aud": [
"adf05591-2b56-4a8a-8976-3fc1be0ecb21"
],
"auth_time": 1529751409,
"c_hash": "ActCa7R-yHcWLP7Mr8mKfA",
"exp": 1529755050,
"iat": 1529751450,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "3c035ef2-82ac-497a-aa95-1ef465e05617",
"nonce": "sy1RktaY5R0gMiI0",
"rat": 1529751447,
"sub": "[email protected]"
},
"state": "jPDgZXb8TbQXiSq2"
}
5.408 phase <--<-- 5 --- AccessToken -->-->
5.408 --> request op_args: {'state': 'jPDgZXb8TbQXiSq2'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
5.408 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'jPDgZXb8TbQXiSq2', 'code': 'w03NmGVbjm0FjgcfJm4187EME21tpTSMMIC2OOZW_Pk.-i1OlNCMgHs5joAJxnjiln8CdnBg42ZljPag0hboEQs', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'adf05591-2b56-4a8a-8976-3fc1be0ecb21'}, 'state': 'jPDgZXb8TbQXiSq2'}
5.408 AccessTokenRequest {
"code": "w03NmGVbjm0FjgcfJm4187EME21tpTSMMIC2OOZW_Pk.-i1OlNCMgHs5joAJxnjiln8CdnBg42ZljPag0hboEQs",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "jPDgZXb8TbQXiSq2"
}
5.408 request_url https://oidc-certification.ory.sh:8443/oauth2/token
5.408 request_http_args {'headers': {'Authorization': 'Basic YWRmMDU1OTEtMmI1Ni00YThhLTg5NzYtM2ZjMWJlMGVjYjIxOkNMRS45UndxUnJfYw==', 'Content-Type': 'application/x-www-form-urlencoded'}}
5.408 request code=w03NmGVbjm0FjgcfJm4187EME21tpTSMMIC2OOZW_Pk.-i1OlNCMgHs5joAJxnjiln8CdnBg42ZljPag0hboEQs&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=jPDgZXb8TbQXiSq2
5.627 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
5.628 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYWRmMDU1OTEtMmI1Ni00YThhLTg5NzYtM2ZjMWJlMGVjYjIxIl0sImF1dGhfdGltZSI6MTUyOTc1MTQwOSwiY19oYXNoIjoiQWN0Q2E3Ui15SGNXTFA3TXI4bUtmQSIsImV4cCI6MTUyOTc1NTA1MCwiaWF0IjoxNTI5NzUxNDUxLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiI3YzAxMjQ5Zi1iZDU3LTQ4NGEtOTQ5My1mYzgxZWJlZGNiYTYiLCJub25jZSI6InN5MVJrdGFZNVIwZ01pSTAiLCJyYXQiOjE1Mjk3NTE0NDcsInN1YiI6ImZvb0BiYXIuY29tIn0.kFLyzPL6WtWU_APV8Soqt-kmuAK7_aeBfYIA_vtcrtK3HBayYX1aRSgR--rqHaXxBWWgyIXzBp8iz7bhUC3Uqen3yYKk5UKCiH4xNmnI5Y-SmxEwWDEbaMm4yT1K67T-WFagHPw9lQib9YWzOtzy2w2GZKVXqmLbNWN4Udpo_Lsk2rgn9ZqFvNJDL9XplKD2-tVZKRNU7YawTWEDs5vCH51tC2BEiP79msapuD0-SgmTsSzLF1uMHgaT0Afi2vG7ANFhBlwWFSDMT8DsC-tJk1k6M0d_QOLT5O3BKGsHuDuJcWb7DmgDNihLBsJv2MsyyP6QUVEH_hreyrinGrIwA1BLImFK4uULzsuqhHN3I39yi5huYjIbjaxwqi4uzwlz7RVt0o2L9V1UjGNLBIudS82mu7HPRBbxU0E5yvQ0ir0ForlYYr7XOphqzaqTo9zDEkdH-80qRYWoJtGzacRXvGEw1kwSk5XZPlC36UK_UHhjw5YW8PjglQtRZU7jawsdjX0C9WhzEHdW0A9zFlQXPl9kPiN5BDd7d0mquTElvjdhlkOqYCRUZBR_5m5kcBswxDKOUDOhvwbWS9XS3lc9ivU3SRRKiW3ursGlmsDTHFGwTSGfGDT-pMlhLmT0MwJaj8dfdPD7iDCJiwNlS3GzY25EOdTburwv2VffROs-71Y', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': '6ktl-BPY_8OEA_Wt3weiczgOEzQaXWVsJfN8V8pBLbg.rXw1l6WXJvoZyUmcSSpAnEL5xkmrOLg72_DZb7GJzw0', 'scope': 'openid'}
5.631 AccessTokenResponse {
"access_token": "6ktl-BPY_8OEA_Wt3weiczgOEzQaXWVsJfN8V8pBLbg.rXw1l6WXJvoZyUmcSSpAnEL5xkmrOLg72_DZb7GJzw0",
"expires_in": 3599,
"id_token": {
"aud": [
"adf05591-2b56-4a8a-8976-3fc1be0ecb21"
],
"auth_time": 1529751409,
"c_hash": "ActCa7R-yHcWLP7Mr8mKfA",
"exp": 1529755050,
"iat": 1529751451,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "7c01249f-bd57-484a-9493-fc81ebedcba6",
"nonce": "sy1RktaY5R0gMiI0",
"rat": 1529751447,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
5.631 phase <--<-- 6 --- TimeDelay -->-->
35.632 phase <--<-- 7 --- AccessToken -->-->
35.632 --> request op_args: {'state': 'jPDgZXb8TbQXiSq2'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
35.632 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'jPDgZXb8TbQXiSq2', 'code': 'w03NmGVbjm0FjgcfJm4187EME21tpTSMMIC2OOZW_Pk.-i1OlNCMgHs5joAJxnjiln8CdnBg42ZljPag0hboEQs', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'adf05591-2b56-4a8a-8976-3fc1be0ecb21'}, 'state': 'jPDgZXb8TbQXiSq2'}
35.632 AccessTokenRequest {
"code": "w03NmGVbjm0FjgcfJm4187EME21tpTSMMIC2OOZW_Pk.-i1OlNCMgHs5joAJxnjiln8CdnBg42ZljPag0hboEQs",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "jPDgZXb8TbQXiSq2"
}
35.632 request_url https://oidc-certification.ory.sh:8443/oauth2/token
35.632 request_http_args {'headers': {'Authorization': 'Basic YWRmMDU1OTEtMmI1Ni00YThhLTg5NzYtM2ZjMWJlMGVjYjIxOkNMRS45UndxUnJfYw==', 'Content-Type': 'application/x-www-form-urlencoded'}}
35.632 request code=w03NmGVbjm0FjgcfJm4187EME21tpTSMMIC2OOZW_Pk.-i1OlNCMgHs5joAJxnjiln8CdnBg42ZljPag0hboEQs&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=jPDgZXb8TbQXiSq2
35.826 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:400 message:{"error":"invalid_grant","error_description":"The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client","status_code":400,"error_debug":"The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found."}
35.827 response {'error_debug': 'The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found.', 'error_description': 'The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client', 'error': 'invalid_grant', 'status_code': 400}
35.827 event Got expected error
35.827 TokenErrorResponse {
"error": "invalid_grant",
"error_debug": "The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found.",
"error_description": "The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client",
"status_code": 400
}
35.827 phase <--<-- 8 --- Done -->-->
35.827 end
35.828 assertion VerifyResponse
35.828 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
35.828 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CI.F.T.T.s/OP-OAuth-2nd-Revokes.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-OAuth-2nd-Revokes
Test description: Trying to use authorization code twice should result in revoking previously issued access tokens
Timestamp: 2018-06-23T10:58:11Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.089 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.09 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.09 phase <--<-- 2 --- Registration -->-->
0.09 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.091 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#ci3IHpMdg9juPHoI"
],
"response_types": [
"code id_token"
]
}
0.251 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.252 RegistrationResponse {
"client_id": "401bb090-83e6-4049-b716-d9d346990e0a",
"client_secret": "ioLyDpU~kxu-",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "401bb090-83e6-4049-b716-d9d346990e0a",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#ci3IHpMdg9juPHoI"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.252 phase <--<-- 3 --- Note -->-->
2.274 phase <--<-- 4 --- AsyncAuthn -->-->
2.274 AuthorizationRequest {
"client_id": "401bb090-83e6-4049-b716-d9d346990e0a",
"nonce": "dT4epzvgloJmT2ai",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "hItVD6KV0VRWqeqd"
}
2.275 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=401bb090-83e6-4049-b716-d9d346990e0a&state=hItVD6KV0VRWqeqd&response_type=code+id_token&nonce=dT4epzvgloJmT2ai
2.275 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=401bb090-83e6-4049-b716-d9d346990e0a&state=hItVD6KV0VRWqeqd&response_type=code+id_token&nonce=dT4epzvgloJmT2ai
5.893 http args {}
6.067 response URL with fragment
6.068 response code=UUxBST5rFc5wge9VU1TfXE2X5EOAOhxBsbkP-i_UQkM.XtczFf68fL6gj68YslHcXEs_tJMtNb-HsbCFpODACJQ&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNDAxYmIwOTAtODNlNi00MDQ5LWI3MTYtZDlkMzQ2OTkwZTBhIl0sImF1dGhfdGltZSI6MTUyOTc1MTQwOSwiY19oYXNoIjoiRTJDMmE2a21oanM5WjB5aFQ3SVZadyIsImV4cCI6MTUyOTc1NTA5MCwiaWF0IjoxNTI5NzUxNDkwLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJhY2E3NzNkNi1iMGM3LTQ4ZGMtYTYwYy1lMTU0OTVhODBiODAiLCJub25jZSI6ImRUNGVwenZnbG9KbVQyYWkiLCJyYXQiOjE1Mjk3NTE0ODcsInN1YiI6ImZvb0BiYXIuY29tIn0.H67QuRm3vjhZ95uaGcacCFb09lov4mawS6Z0jKCMb-S1i9Vq2nXWXpWDVFPMJpk2B1X1UcUHvJTHVUSGDqaVT3wYPhOY4PhXrGj74v4eJwLyWGeG2XAvCcEx0FKTJYBJiB1Opv9ys-jvf7yMA0tURRxN4pXzx-Is6H30eltKujTiamaW0FWKeMjp_yBV7DErfYtKMIuyNC62aQ1uvtcLON182YnGZfucXQlFMbscQ6ZJH0dOh7xz5DJEJ05HN-1LCpYuzKBIFZlFm5zTqeJgsplHlQfgGp7UuoHet81HT_f_C41itvITiyGkns9qIansUr2y_pdBYMbFIFFY0S_ZP4zkb2C3_pMwEM2rGRk6s_Z0lZpJE-P2d4ZTTYfv-DsxTJNI9aRhY2-BXliFu-jsHW5evXsmcC4x13NqdZPZFHpMhoPWTf92l0uMO2muaPljwPAOtpYmqsejSSquiYoZ267IVSTv2mtkJQsF1nI3bCRac7R6RwC3JeP53NRRPm1Ive6QqzUjUMzD-8SWMVDe--TJxqXWHlZVGX2NTD8naXRtD_MfuRU9uOIjwBELMX9d8y62KALUnBjixbSfpyoVFWPiylq95Y1MZzG6KTMC4H9uayKjzoItFNfGBOZ9o7rKniLs0tiwaiqnlKmBZTa_00q2uRKYeH7foTJ8khqBAB8&state=hItVD6KV0VRWqeqd
6.068 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNDAxYmIwOTAtODNlNi00MDQ5LWI3MTYtZDlkMzQ2OTkwZTBhIl0sImF1dGhfdGltZSI6MTUyOTc1MTQwOSwiY19oYXNoIjoiRTJDMmE2a21oanM5WjB5aFQ3SVZadyIsImV4cCI6MTUyOTc1NTA5MCwiaWF0IjoxNTI5NzUxNDkwLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJhY2E3NzNkNi1iMGM3LTQ4ZGMtYTYwYy1lMTU0OTVhODBiODAiLCJub25jZSI6ImRUNGVwenZnbG9KbVQyYWkiLCJyYXQiOjE1Mjk3NTE0ODcsInN1YiI6ImZvb0BiYXIuY29tIn0.H67QuRm3vjhZ95uaGcacCFb09lov4mawS6Z0jKCMb-S1i9Vq2nXWXpWDVFPMJpk2B1X1UcUHvJTHVUSGDqaVT3wYPhOY4PhXrGj74v4eJwLyWGeG2XAvCcEx0FKTJYBJiB1Opv9ys-jvf7yMA0tURRxN4pXzx-Is6H30eltKujTiamaW0FWKeMjp_yBV7DErfYtKMIuyNC62aQ1uvtcLON182YnGZfucXQlFMbscQ6ZJH0dOh7xz5DJEJ05HN-1LCpYuzKBIFZlFm5zTqeJgsplHlQfgGp7UuoHet81HT_f_C41itvITiyGkns9qIansUr2y_pdBYMbFIFFY0S_ZP4zkb2C3_pMwEM2rGRk6s_Z0lZpJE-P2d4ZTTYfv-DsxTJNI9aRhY2-BXliFu-jsHW5evXsmcC4x13NqdZPZFHpMhoPWTf92l0uMO2muaPljwPAOtpYmqsejSSquiYoZ267IVSTv2mtkJQsF1nI3bCRac7R6RwC3JeP53NRRPm1Ive6QqzUjUMzD-8SWMVDe--TJxqXWHlZVGX2NTD8naXRtD_MfuRU9uOIjwBELMX9d8y62KALUnBjixbSfpyoVFWPiylq95Y1MZzG6KTMC4H9uayKjzoItFNfGBOZ9o7rKniLs0tiwaiqnlKmBZTa_00q2uRKYeH7foTJ8khqBAB8', 'state': 'hItVD6KV0VRWqeqd', 'code': 'UUxBST5rFc5wge9VU1TfXE2X5EOAOhxBsbkP-i_UQkM.XtczFf68fL6gj68YslHcXEs_tJMtNb-HsbCFpODACJQ'}
6.192 AuthorizationResponse {
"code": "UUxBST5rFc5wge9VU1TfXE2X5EOAOhxBsbkP-i_UQkM.XtczFf68fL6gj68YslHcXEs_tJMtNb-HsbCFpODACJQ",
"id_token": {
"aud": [
"401bb090-83e6-4049-b716-d9d346990e0a"
],
"auth_time": 1529751409,
"c_hash": "E2C2a6kmhjs9Z0yhT7IVZw",
"exp": 1529755090,
"iat": 1529751490,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "aca773d6-b0c7-48dc-a60c-e15495a80b80",
"nonce": "dT4epzvgloJmT2ai",
"rat": 1529751487,
"sub": "[email protected]"
},
"state": "hItVD6KV0VRWqeqd"
}
6.192 phase <--<-- 5 --- AccessToken -->-->
6.192 --> request op_args: {'state': 'hItVD6KV0VRWqeqd'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
6.192 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'hItVD6KV0VRWqeqd', 'code': 'UUxBST5rFc5wge9VU1TfXE2X5EOAOhxBsbkP-i_UQkM.XtczFf68fL6gj68YslHcXEs_tJMtNb-HsbCFpODACJQ', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '401bb090-83e6-4049-b716-d9d346990e0a'}, 'state': 'hItVD6KV0VRWqeqd'}
6.192 AccessTokenRequest {
"code": "UUxBST5rFc5wge9VU1TfXE2X5EOAOhxBsbkP-i_UQkM.XtczFf68fL6gj68YslHcXEs_tJMtNb-HsbCFpODACJQ",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "hItVD6KV0VRWqeqd"
}
6.193 request_url https://oidc-certification.ory.sh:8443/oauth2/token
6.193 request_http_args {'headers': {'Authorization': 'Basic NDAxYmIwOTAtODNlNi00MDQ5LWI3MTYtZDlkMzQ2OTkwZTBhOmlvTHlEcFUlN0VreHUt', 'Content-Type': 'application/x-www-form-urlencoded'}}
6.193 request code=UUxBST5rFc5wge9VU1TfXE2X5EOAOhxBsbkP-i_UQkM.XtczFf68fL6gj68YslHcXEs_tJMtNb-HsbCFpODACJQ&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=hItVD6KV0VRWqeqd
6.411 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
6.412 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNDAxYmIwOTAtODNlNi00MDQ5LWI3MTYtZDlkMzQ2OTkwZTBhIl0sImF1dGhfdGltZSI6MTUyOTc1MTQwOSwiY19oYXNoIjoiRTJDMmE2a21oanM5WjB5aFQ3SVZadyIsImV4cCI6MTUyOTc1NTA5MCwiaWF0IjoxNTI5NzUxNDkxLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiIwNmQ4Y2JjOC02NmZiLTQyNzEtODg1OC1mOWNlN2RmNjQ3NGIiLCJub25jZSI6ImRUNGVwenZnbG9KbVQyYWkiLCJyYXQiOjE1Mjk3NTE0ODcsInN1YiI6ImZvb0BiYXIuY29tIn0.s7okpoq0W2xRFWvXO70xq4bmSSnFOmkKidud6kWbvNS3K7fOlm1J2O7v5m8o4cSL5fjUtonMggUDz3edFPVf4-d7Y2SK2w1auEgigT6as3pDjR7VJ5XHlGmiEBNZibaJ2ycCFeSGcMPBhEo01cSYHR6AW9yiGsISYCbdYm1rmpcuKSO1aEMyTWKR9LClRDveAJGtVhhqBBQjx1gCQimQGoDw_DkEHHUI9kIHzLnGxkP7ikUh3ZbfwunmvzfJ6fZHXzHRhssuQVrGfiExlYqqmlCX3s844bKut93PTf8DadtpEA_OSzeLWpC-XPsYJIJQma-_it0n8bZUnzyRNyrB3uiOqtya-IpaoCLjpuvOPL7ZtUIrkQd1lTcXwyG_iVjOLeCHhPq2axZCNXk6IgVXqdp96rNtUCOo2BqvLdXbBdVOgzIOy7t5ioCj_-fcEFSL0G7CUOFiE5IgdjvJAO56aKZeMA3D3cYmk29Qb5O6iUduxJ1A6V-1UfsbuFTj20dWNUfYom2xqAb5cUgI7tsN1msWjUkHJV2581XxbmKFlLVFqe6JH_3hKpcY-DZqw2FZ23W8q7blUbfRrDuCdXowFpTMCnm5ACEtiSEg5t-XBaqtbYXDAEPAtd7Fd5vQyccTTjAFD_0B8Bxng9Q5Q5L707tTEdO7NNSwFsuyH6bDZrY', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'Y4TqIkozORs17kxBNpZBDnBmy1u_q9rxmi1PAbn1F1k.FhgSAI7I0QQQN9FwRe76ppwqRLszBitxxwyB7YBIFv0', 'scope': 'openid'}
6.415 AccessTokenResponse {
"access_token": "Y4TqIkozORs17kxBNpZBDnBmy1u_q9rxmi1PAbn1F1k.FhgSAI7I0QQQN9FwRe76ppwqRLszBitxxwyB7YBIFv0",
"expires_in": 3599,
"id_token": {
"aud": [
"401bb090-83e6-4049-b716-d9d346990e0a"
],
"auth_time": 1529751409,
"c_hash": "E2C2a6kmhjs9Z0yhT7IVZw",
"exp": 1529755090,
"iat": 1529751491,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "06d8cbc8-66fb-4271-8858-f9ce7df6474b",
"nonce": "dT4epzvgloJmT2ai",
"rat": 1529751487,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
6.415 phase <--<-- 6 --- AccessToken -->-->
6.415 --> request op_args: {'state': 'hItVD6KV0VRWqeqd'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
6.415 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'hItVD6KV0VRWqeqd', 'code': 'UUxBST5rFc5wge9VU1TfXE2X5EOAOhxBsbkP-i_UQkM.XtczFf68fL6gj68YslHcXEs_tJMtNb-HsbCFpODACJQ', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '401bb090-83e6-4049-b716-d9d346990e0a'}, 'state': 'hItVD6KV0VRWqeqd'}
6.415 AccessTokenRequest {
"code": "UUxBST5rFc5wge9VU1TfXE2X5EOAOhxBsbkP-i_UQkM.XtczFf68fL6gj68YslHcXEs_tJMtNb-HsbCFpODACJQ",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "hItVD6KV0VRWqeqd"
}
6.415 request_url https://oidc-certification.ory.sh:8443/oauth2/token
6.415 request_http_args {'headers': {'Authorization': 'Basic NDAxYmIwOTAtODNlNi00MDQ5LWI3MTYtZDlkMzQ2OTkwZTBhOmlvTHlEcFUlN0VreHUt', 'Content-Type': 'application/x-www-form-urlencoded'}}
6.415 request code=UUxBST5rFc5wge9VU1TfXE2X5EOAOhxBsbkP-i_UQkM.XtczFf68fL6gj68YslHcXEs_tJMtNb-HsbCFpODACJQ&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=hItVD6KV0VRWqeqd
6.61 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:400 message:{"error":"invalid_grant","error_description":"The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client","status_code":400,"error_debug":"The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found."}
6.61 response {'error_debug': 'The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found.', 'error_description': 'The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client', 'error': 'invalid_grant', 'status_code': 400}
6.61 event Got expected error
6.611 TokenErrorResponse {
"error": "invalid_grant",
"error_debug": "The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found.",
"error_description": "The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client",
"status_code": 400
}
6.611 phase <--<-- 7 --- UserInfo -->-->
6.611 do_user_info_request kwargs:{'state': 'hItVD6KV0VRWqeqd', 'method': 'GET', 'authn_method': 'bearer_header'}
6.611 request {'body': None}
6.611 request_url https://oidc-certification.ory.sh:8443/userinfo
6.611 request_http_args {'headers': {'Authorization': 'Bearer Y4TqIkozORs17kxBNpZBDnBmy1u_q9rxmi1PAbn1F1k.FhgSAI7I0QQQN9FwRe76ppwqRLszBitxxwyB7YBIFv0'}}
6.726 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:401 message:{"error":"request_unauthorized","error_description":"The request could not be authorized","error_hint":"Check that you provided valid credentials in the right format.","status_code":401,"error_debug":"A validator returned an error"}
6.726 event Expected error not received: got request_unauthorized
6.727 ErrorResponse {
"error": "request_unauthorized",
"error_debug": "A validator returned an error",
"error_description": "The request could not be authorized",
"error_hint": "Check that you provided valid credentials in the right format.",
"status_code": 401
}
6.727 ErrorResponse {
"error": "request_unauthorized",
"error_debug": "A validator returned an error",
"error_description": "The request could not be authorized",
"error_hint": "Check that you provided valid credentials in the right format.",
"status_code": 401
}
6.727 phase <--<-- 8 --- Done -->-->
6.727 end
6.727 assertion VerifyResponse
6.727 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
6.727 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CI.F.T.T.s/OP-OAuth-2nd.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-OAuth-2nd
Test description: Trying to use authorization code twice should result in an error
Timestamp: 2018-06-23T10:57:23Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Registration -->-->
0.074 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.075 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#eYjqrW47xyOMOfSk"
],
"response_types": [
"code id_token"
]
}
0.231 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.232 RegistrationResponse {
"client_id": "56d5a7ed-90b1-4c66-9436-4d77fbbb650a",
"client_secret": "C7isK6zN8X7Y",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "56d5a7ed-90b1-4c66-9436-4d77fbbb650a",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#eYjqrW47xyOMOfSk"
],
"response_types": [
"code id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.232 phase <--<-- 3 --- Note -->-->
2.737 phase <--<-- 4 --- AsyncAuthn -->-->
2.738 AuthorizationRequest {
"client_id": "56d5a7ed-90b1-4c66-9436-4d77fbbb650a",
"nonce": "W52p79cU7QV79PhK",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token",
"scope": "openid",
"state": "XWmOmGw9T6nhwzkh"
}
2.738 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=56d5a7ed-90b1-4c66-9436-4d77fbbb650a&state=XWmOmGw9T6nhwzkh&response_type=code+id_token&nonce=W52p79cU7QV79PhK
2.738 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=56d5a7ed-90b1-4c66-9436-4d77fbbb650a&state=XWmOmGw9T6nhwzkh&response_type=code+id_token&nonce=W52p79cU7QV79PhK
6.398 http args {}
6.575 response URL with fragment
6.575 response code=9Yv2EYOElE3gAwNGdzzA8_OgP6JCYYWUXfyP0BinRL8.YN2Eg0vFfLCKd_Hy1eDl542JWrsAPhGei5RmzrR_H0o&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNTZkNWE3ZWQtOTBiMS00YzY2LTk0MzYtNGQ3N2ZiYmI2NTBhIl0sImF1dGhfdGltZSI6MTUyOTc1MTQwOSwiY19oYXNoIjoiOFNyVTRjZURvTHFSTVhkU1lpbHJaUSIsImV4cCI6MTUyOTc1NTA0MiwiaWF0IjoxNTI5NzUxNDQyLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJjNDYwOTJhNi04OGQzLTRmYjktOGI0My0yYjU2ZTE3NTcwOGUiLCJub25jZSI6Ilc1MnA3OWNVN1FWNzlQaEsiLCJyYXQiOjE1Mjk3NTE0MzksInN1YiI6ImZvb0BiYXIuY29tIn0.Y7VBgmfpKtUZ5kmVbaOcKz5hSWMzinEo8Bnmb_XLPneTyXE1vslcauGHZ0ti-BMXHutVHke0Qah-slzxmvRrSvpZwlf_hyXFUYKH4-hmEw0QYGeGE_JY-3-7WeyRj0fCfpLCIaRchEWs8HZjRFXd8wfy0YD-utIu-InZZFJbArhfH0lFK61LYCpuDZfH5Ud_n4Ts-JynQ1Y8pmLYQL352rjnXJzyfRx9AkK4MKED3mfq4Va-ViGjG1NI9kVnlN0_mlgBN2UfyfJna0cMQxTdA7m8aPmaljSgIZFYwitLO9r7ismkyNZ17OxOkbJH1-AZQj5h_IL04AclBl6nUxPSULEPRQI1KB0Yq_NZm9eKT5uM6oxQ1ZFrzi0VzzFKta0RUsn1Kyur69t2AppO8rayzCUGiQsd4ii4Hukza22ozuswi440-l0-xMonob5xo7xeOY2ksKpA0p_IJxdI2scHPWCzQIc5cHM0nHkEcUbrY0m6uMx8zAg4uKh7TjrVZmUTi3ktW5HZhFOSlzkVcoRgQYKIYOWZARBOZt40UAANHq8HEMgIo5k_2kr7EoQK198vSbIaQny47kNjrBud8qmtA0wOI6pvBUCdLTWgZJBcg1LIwvlcFOOQf7Hcxkv3qn0Jv-FzbTVb22h1AclhFnG4TeCAswdOa5j-HUzt0KInrPE&state=XWmOmGw9T6nhwzkh
6.575 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNTZkNWE3ZWQtOTBiMS00YzY2LTk0MzYtNGQ3N2ZiYmI2NTBhIl0sImF1dGhfdGltZSI6MTUyOTc1MTQwOSwiY19oYXNoIjoiOFNyVTRjZURvTHFSTVhkU1lpbHJaUSIsImV4cCI6MTUyOTc1NTA0MiwiaWF0IjoxNTI5NzUxNDQyLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJjNDYwOTJhNi04OGQzLTRmYjktOGI0My0yYjU2ZTE3NTcwOGUiLCJub25jZSI6Ilc1MnA3OWNVN1FWNzlQaEsiLCJyYXQiOjE1Mjk3NTE0MzksInN1YiI6ImZvb0BiYXIuY29tIn0.Y7VBgmfpKtUZ5kmVbaOcKz5hSWMzinEo8Bnmb_XLPneTyXE1vslcauGHZ0ti-BMXHutVHke0Qah-slzxmvRrSvpZwlf_hyXFUYKH4-hmEw0QYGeGE_JY-3-7WeyRj0fCfpLCIaRchEWs8HZjRFXd8wfy0YD-utIu-InZZFJbArhfH0lFK61LYCpuDZfH5Ud_n4Ts-JynQ1Y8pmLYQL352rjnXJzyfRx9AkK4MKED3mfq4Va-ViGjG1NI9kVnlN0_mlgBN2UfyfJna0cMQxTdA7m8aPmaljSgIZFYwitLO9r7ismkyNZ17OxOkbJH1-AZQj5h_IL04AclBl6nUxPSULEPRQI1KB0Yq_NZm9eKT5uM6oxQ1ZFrzi0VzzFKta0RUsn1Kyur69t2AppO8rayzCUGiQsd4ii4Hukza22ozuswi440-l0-xMonob5xo7xeOY2ksKpA0p_IJxdI2scHPWCzQIc5cHM0nHkEcUbrY0m6uMx8zAg4uKh7TjrVZmUTi3ktW5HZhFOSlzkVcoRgQYKIYOWZARBOZt40UAANHq8HEMgIo5k_2kr7EoQK198vSbIaQny47kNjrBud8qmtA0wOI6pvBUCdLTWgZJBcg1LIwvlcFOOQf7Hcxkv3qn0Jv-FzbTVb22h1AclhFnG4TeCAswdOa5j-HUzt0KInrPE', 'state': 'XWmOmGw9T6nhwzkh', 'code': '9Yv2EYOElE3gAwNGdzzA8_OgP6JCYYWUXfyP0BinRL8.YN2Eg0vFfLCKd_Hy1eDl542JWrsAPhGei5RmzrR_H0o'}
6.654 AuthorizationResponse {
"code": "9Yv2EYOElE3gAwNGdzzA8_OgP6JCYYWUXfyP0BinRL8.YN2Eg0vFfLCKd_Hy1eDl542JWrsAPhGei5RmzrR_H0o",
"id_token": {
"aud": [
"56d5a7ed-90b1-4c66-9436-4d77fbbb650a"
],
"auth_time": 1529751409,
"c_hash": "8SrU4ceDoLqRMXdSYilrZQ",
"exp": 1529755042,
"iat": 1529751442,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "c46092a6-88d3-4fb9-8b43-2b56e175708e",
"nonce": "W52p79cU7QV79PhK",
"rat": 1529751439,
"sub": "[email protected]"
},
"state": "XWmOmGw9T6nhwzkh"
}
6.655 phase <--<-- 5 --- AccessToken -->-->
6.655 --> request op_args: {'state': 'XWmOmGw9T6nhwzkh'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
6.655 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'XWmOmGw9T6nhwzkh', 'code': '9Yv2EYOElE3gAwNGdzzA8_OgP6JCYYWUXfyP0BinRL8.YN2Eg0vFfLCKd_Hy1eDl542JWrsAPhGei5RmzrR_H0o', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '56d5a7ed-90b1-4c66-9436-4d77fbbb650a'}, 'state': 'XWmOmGw9T6nhwzkh'}
6.655 AccessTokenRequest {
"code": "9Yv2EYOElE3gAwNGdzzA8_OgP6JCYYWUXfyP0BinRL8.YN2Eg0vFfLCKd_Hy1eDl542JWrsAPhGei5RmzrR_H0o",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "XWmOmGw9T6nhwzkh"
}
6.655 request_url https://oidc-certification.ory.sh:8443/oauth2/token
6.655 request_http_args {'headers': {'Authorization': 'Basic NTZkNWE3ZWQtOTBiMS00YzY2LTk0MzYtNGQ3N2ZiYmI2NTBhOkM3aXNLNnpOOFg3WQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
6.655 request code=9Yv2EYOElE3gAwNGdzzA8_OgP6JCYYWUXfyP0BinRL8.YN2Eg0vFfLCKd_Hy1eDl542JWrsAPhGei5RmzrR_H0o&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=XWmOmGw9T6nhwzkh
6.864 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
6.865 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowYWNmNmM2NC00ZDU1LTQ4ODgtYWJiOS1iMmEzZjY2MWVlN2YiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNTZkNWE3ZWQtOTBiMS00YzY2LTk0MzYtNGQ3N2ZiYmI2NTBhIl0sImF1dGhfdGltZSI6MTUyOTc1MTQwOSwiY19oYXNoIjoiOFNyVTRjZURvTHFSTVhkU1lpbHJaUSIsImV4cCI6MTUyOTc1NTA0MiwiaWF0IjoxNTI5NzUxNDQzLCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJlY2RkZjBjZS05ODNlLTQyZTUtOGIzMS01MzJiMmMyMWQ4NWMiLCJub25jZSI6Ilc1MnA3OWNVN1FWNzlQaEsiLCJyYXQiOjE1Mjk3NTE0MzksInN1YiI6ImZvb0BiYXIuY29tIn0.DppI2FmrJ5gjI-alBAIcmHj_Gx9sDmB-QdzdSGPMr_cDxvSfPEeW1v-tDFQLgR4kHANemy84INZJbIWa5GSQdyFtlUizMw_vS-fErvocQX9y13Lbt2-bc-1Ezzvb9IcwaE0OrFbMe5jaeDPaqI_ucu6eSmQLS32r9zaUou6yEp_C6ftSAws-K97Nt-KhYUR8ReAwGHE5USe7G24oHxju8zPhIs_kcEDmOE5dgSGc4S4MX2WZcDZhUQyc32k9Vyr-E0zZHtljk9dJUwM0Ua4tj7aw1Mlm3LHnCTqoUugFkTqET4DRzNGQpdDbzrLaEkJZ4ve7PILfHED13jW_OpUgn1qcpEChUlkPQzCBQgXljfQNXvwxi_fyx0vAJtFNkezdy6TUzob5cV6BiGIZK_1bRmw0LlWzpbIvRDX_8KymUbzElZzHJlJ5DlT8UxyPw9XiTi7YSOGJGoGr5iYPfCKR0YJOU4E7sDwR0oG86KC4pcrJReV1eedXSKbE8pN9-BON6nuCyzlSWFjZMHORubpHRhXwFVSfpe9Lvxf6u7-4eiPZe35GzKY8pn8Pxs6qB5X8-ZIHfq1SHnKcNOn0_VXbHGfuZ4isdCbgtZMVUXysbxxnTI3vvp0hIzDEsKK9LShBmpGN2EXk70hmmlgWcc3ZFYABoz7QV6IYKckSyfftlfM', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'sQ0WB52e1yomAf1xx7WddYIzEz51xwrCd9OW9HcR3do.Jq-97mvh0Ol9-bhGAflozH5cBDLb6gIyfHGmMJxT3I8', 'scope': 'openid'}
6.869 AccessTokenResponse {
"access_token": "sQ0WB52e1yomAf1xx7WddYIzEz51xwrCd9OW9HcR3do.Jq-97mvh0Ol9-bhGAflozH5cBDLb6gIyfHGmMJxT3I8",
"expires_in": 3599,
"id_token": {
"aud": [
"56d5a7ed-90b1-4c66-9436-4d77fbbb650a"
],
"auth_time": 1529751409,
"c_hash": "8SrU4ceDoLqRMXdSYilrZQ",
"exp": 1529755042,
"iat": 1529751443,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "ecddf0ce-983e-42e5-8b31-532b2c21d85c",
"nonce": "W52p79cU7QV79PhK",
"rat": 1529751439,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
6.869 phase <--<-- 6 --- AccessToken -->-->
6.869 --> request op_args: {'state': 'XWmOmGw9T6nhwzkh'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
6.869 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'XWmOmGw9T6nhwzkh', 'code': '9Yv2EYOElE3gAwNGdzzA8_OgP6JCYYWUXfyP0BinRL8.YN2Eg0vFfLCKd_Hy1eDl542JWrsAPhGei5RmzrR_H0o', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '56d5a7ed-90b1-4c66-9436-4d77fbbb650a'}, 'state': 'XWmOmGw9T6nhwzkh'}
6.869 AccessTokenRequest {
"code": "9Yv2EYOElE3gAwNGdzzA8_OgP6JCYYWUXfyP0BinRL8.YN2Eg0vFfLCKd_Hy1eDl542JWrsAPhGei5RmzrR_H0o",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "XWmOmGw9T6nhwzkh"
}
6.869 request_url https://oidc-certification.ory.sh:8443/oauth2/token
6.869 request_http_args {'headers': {'Authorization': 'Basic NTZkNWE3ZWQtOTBiMS00YzY2LTk0MzYtNGQ3N2ZiYmI2NTBhOkM3aXNLNnpOOFg3WQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
6.869 request code=9Yv2EYOElE3gAwNGdzzA8_OgP6JCYYWUXfyP0BinRL8.YN2Eg0vFfLCKd_Hy1eDl542JWrsAPhGei5RmzrR_H0o&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=XWmOmGw9T6nhwzkh
7.059 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:400 message:{"error":"invalid_grant","error_description":"The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client","status_code":400,"error_debug":"The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found."}
7.06 response {'error_debug': 'The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found.', 'error_description': 'The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client', 'error': 'invalid_grant', 'status_code': 400}
7.06 event Got expected error
7.06 TokenErrorResponse {
"error": "invalid_grant",
"error_debug": "The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found.",
"error_description": "The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client",
"status_code": 400
}
7.061 phase <--<-- 7 --- Done -->-->
7.061 end
7.061 assertion VerifyResponse
7.061 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
7.061 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.