language
stringlengths 0
24
| filename
stringlengths 9
214
| code
stringlengths 99
9.93M
|
---|---|---|
Text | hydra/internal/certification/CIT.F.T.T.s/OP-UserInfo-RS256.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-UserInfo-RS256
Test description: RP registers userinfo_signed_response_alg to signal that it wants signed UserInfo returned
Timestamp: 2018-06-23T11:00:59Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.076 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.077 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.077 phase <--<-- 2 --- Registration -->-->
0.077 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'userinfo_signed_response_alg': 'RS256'}
0.078 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#RowOB4UjqZB5KSwo"
],
"response_types": [
"code id_token token"
],
"userinfo_signed_response_alg": "RS256"
}
0.232 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.233 RegistrationResponse {
"client_id": "6b898607-9bf4-46b5-9fd1-b0c84bb4f933",
"client_secret": "RG35fJVy~xBP",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "6b898607-9bf4-46b5-9fd1-b0c84bb4f933",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#RowOB4UjqZB5KSwo"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "RS256"
}
0.233 phase <--<-- 3 --- AsyncAuthn -->-->
0.233 AuthorizationRequest {
"client_id": "6b898607-9bf4-46b5-9fd1-b0c84bb4f933",
"nonce": "RuKLv3xs7UyQPEl7",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid",
"state": "hdG2zzMmcbcj6ZlV"
}
0.234 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=6b898607-9bf4-46b5-9fd1-b0c84bb4f933&state=hdG2zzMmcbcj6ZlV&response_type=code+id_token+token&nonce=RuKLv3xs7UyQPEl7
0.234 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=6b898607-9bf4-46b5-9fd1-b0c84bb4f933&state=hdG2zzMmcbcj6ZlV&response_type=code+id_token+token&nonce=RuKLv3xs7UyQPEl7
6.252 http args {}
6.423 response URL with fragment
6.423 response access_token=d0y-92VuuGQRKwFDoHti5RMuecfEEHlsLueRo7WN2j4.5ofO7ft9ukhMQp0Aoscm407UECCTeGvW5vCDiUuDjQ0&code=lHsaSLpXS0z4kqdP96ny1oGsHsxuPWV-WtwBKEcbPPY.yuB530KzaThucVP5CJiBnWiyLCUb_Jv5erxAyw8AO3M&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiNUdleE1ILUhYSUl6TDBNcnZBb2NMdyIsImF1ZCI6WyI2Yjg5ODYwNy05YmY0LTQ2YjUtOWZkMS1iMGM4NGJiNGY5MzMiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJDLXRraVphaERHU2FQLWhGQk9QWkh3IiwiZXhwIjoxNTI5NzU1MjU5LCJpYXQiOjE1Mjk3NTE2NTksImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjlhZjljOTM3LTk1MzEtNDZlMS04OTg1LTNlNGUxOThmOWM1MSIsIm5vbmNlIjoiUnVLTHYzeHM3VXlRUEVsNyIsInJhdCI6MTUyOTc1MTY1Mywic3ViIjoiZm9vQGJhci5jb20ifQ.IxYGCcN6cSsaM6ov2LMRsWCCV6NcROkv5E3CAph3sxf9OQcIanMV5McrVOFIiIAX3woZFnKiwpwtJg786bNbHd5HbAMIVpYzYXvxZcd903XMmfAAgocBw7su-g-n73k2kGsRlifnuR9W2RjUQoeiYqwRlOiAl2NIHuAGmbzWo8G8GJxQM38qcqRyCYDZ2-5wr88uFkvKZtn9vq_fF9att4YtO-e3SRiXCGqwBc5j2vSNU9icZMnQCBciX4Jn6lP5AR1vEVN76tfNUGJohGhDbsSmDALFqloEcRXMwbrvo8DE8xjij0locXnS5Os8mGJjceHe-9CbiwgMJtQZFTbg9dEalpNBrBBv64o_IneYI3nky5n5KJA9DAzjneGpj6GOXkaX7qRXulZHZP7rPaUu8QEHiFZ7T7CE03mTA1u07FpBj5CidXnvZdkTGfpSUgjRxvUt8UR1AjWrsa_5YCPDUfNWfy-lTr3QMDfvkskXd2KiFFtlM1pL-SfOgg00qOc7Cav-5NEH4t8JqtmUqHJFMaBiRNe-cbgVXYRCbbN0EIbhSx-itqh7oexwKbTRYuSRZ-6KJWfvxdLwm8AOqZRUall2fVAC4Y9sL22607tYzE4t0aJgDlHIP781WHCJdk5cSXi_je0ordnKFjIrgOPK70gTCaN8-j-KdJZZytj7Kxc&scope=openid&state=hdG2zzMmcbcj6ZlV&token_type=bearer
6.424 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiNUdleE1ILUhYSUl6TDBNcnZBb2NMdyIsImF1ZCI6WyI2Yjg5ODYwNy05YmY0LTQ2YjUtOWZkMS1iMGM4NGJiNGY5MzMiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJDLXRraVphaERHU2FQLWhGQk9QWkh3IiwiZXhwIjoxNTI5NzU1MjU5LCJpYXQiOjE1Mjk3NTE2NTksImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjlhZjljOTM3LTk1MzEtNDZlMS04OTg1LTNlNGUxOThmOWM1MSIsIm5vbmNlIjoiUnVLTHYzeHM3VXlRUEVsNyIsInJhdCI6MTUyOTc1MTY1Mywic3ViIjoiZm9vQGJhci5jb20ifQ.IxYGCcN6cSsaM6ov2LMRsWCCV6NcROkv5E3CAph3sxf9OQcIanMV5McrVOFIiIAX3woZFnKiwpwtJg786bNbHd5HbAMIVpYzYXvxZcd903XMmfAAgocBw7su-g-n73k2kGsRlifnuR9W2RjUQoeiYqwRlOiAl2NIHuAGmbzWo8G8GJxQM38qcqRyCYDZ2-5wr88uFkvKZtn9vq_fF9att4YtO-e3SRiXCGqwBc5j2vSNU9icZMnQCBciX4Jn6lP5AR1vEVN76tfNUGJohGhDbsSmDALFqloEcRXMwbrvo8DE8xjij0locXnS5Os8mGJjceHe-9CbiwgMJtQZFTbg9dEalpNBrBBv64o_IneYI3nky5n5KJA9DAzjneGpj6GOXkaX7qRXulZHZP7rPaUu8QEHiFZ7T7CE03mTA1u07FpBj5CidXnvZdkTGfpSUgjRxvUt8UR1AjWrsa_5YCPDUfNWfy-lTr3QMDfvkskXd2KiFFtlM1pL-SfOgg00qOc7Cav-5NEH4t8JqtmUqHJFMaBiRNe-cbgVXYRCbbN0EIbhSx-itqh7oexwKbTRYuSRZ-6KJWfvxdLwm8AOqZRUall2fVAC4Y9sL22607tYzE4t0aJgDlHIP781WHCJdk5cSXi_je0ordnKFjIrgOPK70gTCaN8-j-KdJZZytj7Kxc', 'scope': 'openid', 'code': 'lHsaSLpXS0z4kqdP96ny1oGsHsxuPWV-WtwBKEcbPPY.yuB530KzaThucVP5CJiBnWiyLCUb_Jv5erxAyw8AO3M', 'access_token': 'd0y-92VuuGQRKwFDoHti5RMuecfEEHlsLueRo7WN2j4.5ofO7ft9ukhMQp0Aoscm407UECCTeGvW5vCDiUuDjQ0', 'state': 'hdG2zzMmcbcj6ZlV', 'expires_in': 3599, 'token_type': 'bearer'}
6.51 AuthorizationResponse {
"access_token": "d0y-92VuuGQRKwFDoHti5RMuecfEEHlsLueRo7WN2j4.5ofO7ft9ukhMQp0Aoscm407UECCTeGvW5vCDiUuDjQ0",
"code": "lHsaSLpXS0z4kqdP96ny1oGsHsxuPWV-WtwBKEcbPPY.yuB530KzaThucVP5CJiBnWiyLCUb_Jv5erxAyw8AO3M",
"expires_in": 3599,
"id_token": {
"at_hash": "5GexMH-HXIIzL0MrvAocLw",
"aud": [
"6b898607-9bf4-46b5-9fd1-b0c84bb4f933"
],
"auth_time": 1529751409,
"c_hash": "C-tkiZahDGSaP-hFBOPZHw",
"exp": 1529755259,
"iat": 1529751659,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "9af9c937-9531-46e1-8985-3e4e198f9c51",
"nonce": "RuKLv3xs7UyQPEl7",
"rat": 1529751653,
"sub": "[email protected]"
},
"scope": "openid",
"state": "hdG2zzMmcbcj6ZlV",
"token_type": "bearer"
}
6.51 phase <--<-- 4 --- AccessToken -->-->
6.51 --> request op_args: {'state': 'hdG2zzMmcbcj6ZlV'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
6.51 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'hdG2zzMmcbcj6ZlV', 'code': 'lHsaSLpXS0z4kqdP96ny1oGsHsxuPWV-WtwBKEcbPPY.yuB530KzaThucVP5CJiBnWiyLCUb_Jv5erxAyw8AO3M', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '6b898607-9bf4-46b5-9fd1-b0c84bb4f933'}, 'state': 'hdG2zzMmcbcj6ZlV'}
6.51 AccessTokenRequest {
"code": "lHsaSLpXS0z4kqdP96ny1oGsHsxuPWV-WtwBKEcbPPY.yuB530KzaThucVP5CJiBnWiyLCUb_Jv5erxAyw8AO3M",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "hdG2zzMmcbcj6ZlV"
}
6.51 request_url https://oidc-certification.ory.sh:8443/oauth2/token
6.51 request_http_args {'headers': {'Authorization': 'Basic NmI4OTg2MDctOWJmNC00NmI1LTlmZDEtYjBjODRiYjRmOTMzOlJHMzVmSlZ5JTdFeEJQ', 'Content-Type': 'application/x-www-form-urlencoded'}}
6.51 request code=lHsaSLpXS0z4kqdP96ny1oGsHsxuPWV-WtwBKEcbPPY.yuB530KzaThucVP5CJiBnWiyLCUb_Jv5erxAyw8AO3M&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=hdG2zzMmcbcj6ZlV
6.731 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
6.732 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiNUdleE1ILUhYSUl6TDBNcnZBb2NMdyIsImF1ZCI6WyI2Yjg5ODYwNy05YmY0LTQ2YjUtOWZkMS1iMGM4NGJiNGY5MzMiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJDLXRraVphaERHU2FQLWhGQk9QWkh3IiwiZXhwIjoxNTI5NzU1MjU5LCJpYXQiOjE1Mjk3NTE2NTksImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjJiZDJjYzJkLTJjNzUtNDNmNy1hYjRkLWZjYWZkZTVjODc1NSIsIm5vbmNlIjoiUnVLTHYzeHM3VXlRUEVsNyIsInJhdCI6MTUyOTc1MTY1Mywic3ViIjoiZm9vQGJhci5jb20ifQ.N7WydMmIeGZ5ARVy-90FLx-Wrzjl0KRGf53gPc9KaaqWQSKDubh2sw-xSH03cYLfgFuf4DrIZZiqGBpWq1iMhPtjNavKiT53icyUHM6YqSsAYVKLkTg0POhxq0-SkVHUp58eZ0ktS6G83KytOC8bFPIMeMaSJxjJwLJL_lZ8mdH4TtKx5qsQKsyqaks4YmsgnZS4DAQoomz63apEo13WzyzQ3Y_8KmyiV6Tu95YLRD2XRmP5XpYoYs9B5EzyW9VbBUHTPceWLNw3c2mFB2YgBCn9g2n92amgu39GK6r4CyELd2dQ4rVPX_E1DHatBQeZNRKv6ZkwbjbLRTgl5W936H3hDLuVGN9Ssu0pAORNZI6QZoSzcLypKbq8skdfHdP1S8_r_Dc1gdqQVnbFthwriqR4fIjk2xIR1LbGs9mXCavGc7VaeQAkDJiPT9_oNJsvNuwuRthXW0leAL5ia5VA2YAStUlsWCZCdtRjQZrnAxdCe4P8urf-ze6bZoKISLlOlAUvrtCRlDkJ3zxNMG5cFTar70fM3fbLPnND4szgQ24s6Rrsg-N01etOCdNp2bi22KaI6kQFmz4xM1PWiyXpk2nN5MXCwQXTYII2PB8nPYyR0cHdouvXP6Q36HCQ0fc8J6Cz7-ERiuSZOWyMxW1yA8fkBeL30iJrzct6qnAAuvw', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'HN3D8Jm3yYrt_XwM8U8dEpIcwvdAFE-HXwpz36gBIp4.xKFaRlcXDKh5qKwck9vMxU39PyH4_5-tybpWUDq7wPs', 'scope': 'openid'}
6.735 AccessTokenResponse {
"access_token": "HN3D8Jm3yYrt_XwM8U8dEpIcwvdAFE-HXwpz36gBIp4.xKFaRlcXDKh5qKwck9vMxU39PyH4_5-tybpWUDq7wPs",
"expires_in": 3599,
"id_token": {
"at_hash": "5GexMH-HXIIzL0MrvAocLw",
"aud": [
"6b898607-9bf4-46b5-9fd1-b0c84bb4f933"
],
"auth_time": 1529751409,
"c_hash": "C-tkiZahDGSaP-hFBOPZHw",
"exp": 1529755259,
"iat": 1529751659,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "2bd2cc2d-2c75-43f7-ab4d-fcafde5c8755",
"nonce": "RuKLv3xs7UyQPEl7",
"rat": 1529751653,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
6.735 phase <--<-- 5 --- UserInfo -->-->
6.735 do_user_info_request kwargs:{'state': 'hdG2zzMmcbcj6ZlV', 'method': 'GET', 'authn_method': 'bearer_header', 'ctype': 'jwt'}
6.736 request {'body': None}
6.736 request_url https://oidc-certification.ory.sh:8443/userinfo
6.736 request_http_args {'headers': {'Authorization': 'Bearer HN3D8Jm3yYrt_XwM8U8dEpIcwvdAFE-HXwpz36gBIp4.xKFaRlcXDKh5qKwck9vMxU39PyH4_5-tybpWUDq7wPs'}}
6.869 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
6.873 OpenIDSchema {
"aud": [
"6b898607-9bf4-46b5-9fd1-b0c84bb4f933"
],
"iss": "https://oidc-certification.ory.sh:8443/",
"sub": "[email protected]"
}
6.873 OpenIDSchema {
"aud": [
"6b898607-9bf4-46b5-9fd1-b0c84bb4f933"
],
"iss": "https://oidc-certification.ory.sh:8443/",
"sub": "[email protected]"
}
6.873 phase <--<-- 6 --- Done -->-->
6.873 end
6.873 assertion VerifyResponse
6.873 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
6.874 assertion CheckAsymSignedUserInfo
6.874 condition asym-signed-userinfo: status=OK [Verifies that the UserInfo was signed with a RSA key]
6.874 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
asym-signed-userinfo: status=OK [Verifies that the UserInfo was signed with a RSA key]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-claims-essential.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-claims-essential
Test description: Claims request with essential name claim
Timestamp: 2018-06-23T11:08:37Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.082 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.083 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.083 phase <--<-- 2 --- Registration -->-->
0.083 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.084 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#3vvDQrQPZC4vUhJg"
],
"response_types": [
"code token"
]
}
0.242 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.242 RegistrationResponse {
"client_id": "8724edc2-dcf3-43ac-a609-9dbfaaaf3d70",
"client_secret": "KQDALCc9FRUt",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "8724edc2-dcf3-43ac-a609-9dbfaaaf3d70",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#3vvDQrQPZC4vUhJg"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.243 phase <--<-- 3 --- AsyncAuthn -->-->
0.243 AuthorizationRequest {
"claims": {
"userinfo": {
"name": {
"essential": true
}
}
},
"client_id": "8724edc2-dcf3-43ac-a609-9dbfaaaf3d70",
"nonce": "kf8emIvj9SmNuvxB",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "0Yuh6P7OEuKaDMz2"
}
0.244 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=8724edc2-dcf3-43ac-a609-9dbfaaaf3d70&claims=%7B%22userinfo%22%3A+%7B%22name%22%3A+%7B%22essential%22%3A+true%7D%7D%7D&state=0Yuh6P7OEuKaDMz2&response_type=code+token&nonce=kf8emIvj9SmNuvxB
0.244 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=8724edc2-dcf3-43ac-a609-9dbfaaaf3d70&claims=%7B%22userinfo%22%3A+%7B%22name%22%3A+%7B%22essential%22%3A+true%7D%7D%7D&state=0Yuh6P7OEuKaDMz2&response_type=code+token&nonce=kf8emIvj9SmNuvxB
2.897 http args {}
3.098 response URL with fragment
3.098 response access_token=rNwpzhgSt9pYR8dI3zpDKTKsS0crXrCaIJthGBddnPg.XxE4awsYB-w69P8hWnucB1sxUvKbIniRRM4npfPgy3Y&code=wbGYimmVmQnZ9DC6m4_OjZRAnNpVuy8TSuniEvkYeC8.PYSsmkXdn0yealyj6pFvBcQFiw79besufo5oolzbHys&expires_in=3599&scope=openid&state=0Yuh6P7OEuKaDMz2&token_type=bearer
3.099 response {'scope': 'openid', 'code': 'wbGYimmVmQnZ9DC6m4_OjZRAnNpVuy8TSuniEvkYeC8.PYSsmkXdn0yealyj6pFvBcQFiw79besufo5oolzbHys', 'access_token': 'rNwpzhgSt9pYR8dI3zpDKTKsS0crXrCaIJthGBddnPg.XxE4awsYB-w69P8hWnucB1sxUvKbIniRRM4npfPgy3Y', 'state': '0Yuh6P7OEuKaDMz2', 'expires_in': 3599, 'token_type': 'bearer'}
3.099 AuthorizationResponse {
"access_token": "rNwpzhgSt9pYR8dI3zpDKTKsS0crXrCaIJthGBddnPg.XxE4awsYB-w69P8hWnucB1sxUvKbIniRRM4npfPgy3Y",
"code": "wbGYimmVmQnZ9DC6m4_OjZRAnNpVuy8TSuniEvkYeC8.PYSsmkXdn0yealyj6pFvBcQFiw79besufo5oolzbHys",
"expires_in": 3599,
"scope": "openid",
"state": "0Yuh6P7OEuKaDMz2",
"token_type": "bearer"
}
3.099 phase <--<-- 4 --- AccessToken -->-->
3.099 --> request op_args: {'state': '0Yuh6P7OEuKaDMz2'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.099 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': '0Yuh6P7OEuKaDMz2', 'code': 'wbGYimmVmQnZ9DC6m4_OjZRAnNpVuy8TSuniEvkYeC8.PYSsmkXdn0yealyj6pFvBcQFiw79besufo5oolzbHys', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '8724edc2-dcf3-43ac-a609-9dbfaaaf3d70'}, 'state': '0Yuh6P7OEuKaDMz2'}
3.099 AccessTokenRequest {
"code": "wbGYimmVmQnZ9DC6m4_OjZRAnNpVuy8TSuniEvkYeC8.PYSsmkXdn0yealyj6pFvBcQFiw79besufo5oolzbHys",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "0Yuh6P7OEuKaDMz2"
}
3.099 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.099 request_http_args {'headers': {'Authorization': 'Basic ODcyNGVkYzItZGNmMy00M2FjLWE2MDktOWRiZmFhYWYzZDcwOktRREFMQ2M5RlJVdA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
3.099 request code=wbGYimmVmQnZ9DC6m4_OjZRAnNpVuy8TSuniEvkYeC8.PYSsmkXdn0yealyj6pFvBcQFiw79besufo5oolzbHys&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=0Yuh6P7OEuKaDMz2
3.313 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.314 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiWHpvdTVOSDZTN0o4R2UwR1RrVWZ0ZyIsImF1ZCI6WyI4NzI0ZWRjMi1kY2YzLTQzYWMtYTYwOS05ZGJmYWFhZjNkNzAiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiJnejZ2a1pqVzhTNDJBTWJkOV80ZmV3IiwiZXhwIjoxNTI5NzU1NzE2LCJpYXQiOjE1Mjk3NTIxMTYsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImY3ZTg0ZDZjLWM2OTItNGRlMi1hYWE0LTU3N2Y5YmQ2OTIyMyIsIm5vbmNlIjoia2Y4ZW1Jdmo5U21OdXZ4QiIsInJhdCI6MTUyOTc1MjExMywic3ViIjoiZm9vQGJhci5jb20ifQ.Chi0UqhtiUq--SZ-5UJJDJ4IJqEbBUHa6JNmd7L73hM_FOTE_fIbIiCRaAI29fvrJrJYsfds3SNodeS2-4800n5nekUKSh1oFyMSIVrvRV7lTx46G55MdlqzP1hlFyvsBAJuTI2lKzxoU6BntgWl-SFVDnVFvQq4ptgac70LIlOGeXCvKmfxPPQLwqt3ExclU5MbZDjoz5g8aCqnmDsc7IYOaOY30vs5SY9_NgE3OQVa99E95BV64G9m-9_c2KMQVQPMiaT2c-vcRrr9ekQ7IJ6-fOF8O7T0vJy25WrAgOD7lhMJCFZTUPbmkF1mzlcVDDz_lOxey-wQkLwwDJYBJtWCoV5tWhISneoF7KsZsS4ipETWz6n5LUbJarafMuBhrCB79V-ZO9wp5R9Y0NLNRzucrxREwLIoHm7GdZxAHaG-Sk5aZeMd80cjCIRvgrI21N6RcIlY9NPk5DdZJMGU17nZQ6elIcXEpmPkB6UTBZxVHkjFOXpmRgNgjPNcdxdIBiJWAX3WV2uMuANAg4Tm9aYM75EzM1G6tL9mZymix7Fdu5jfopUtUFu8ei1GLlIBvc5A7J_njhyKEaD2TOXkZ1H2_PYHKDL57AoA8dcHJ0pOR-Iy9TvAhTJh9IAEREbhaKPtLhdLKWRnUuoti43p3fJ-UbtjW88-ARhvLFsOG7o', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'M4BnNXufeL-ZmOPLWQLzgRuoIh3aZWBBybGcgN13fzs.kQ2CIT7Wd5rSXjWdlr_tVG-qjRctT9gFZL4QoCdLJRk', 'scope': 'openid'}
3.396 AccessTokenResponse {
"access_token": "M4BnNXufeL-ZmOPLWQLzgRuoIh3aZWBBybGcgN13fzs.kQ2CIT7Wd5rSXjWdlr_tVG-qjRctT9gFZL4QoCdLJRk",
"expires_in": 3599,
"id_token": {
"at_hash": "Xzou5NH6S7J8Ge0GTkUftg",
"aud": [
"8724edc2-dcf3-43ac-a609-9dbfaaaf3d70"
],
"auth_time": 1529751824,
"c_hash": "gz6vkZjW8S42AMbd9_4few",
"exp": 1529755716,
"iat": 1529752116,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "f7e84d6c-c692-4de2-aaa4-577f9bd69223",
"nonce": "kf8emIvj9SmNuvxB",
"rat": 1529752113,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.396 phase <--<-- 5 --- UserInfo -->-->
3.396 do_user_info_request kwargs:{'state': '0Yuh6P7OEuKaDMz2', 'method': 'GET', 'authn_method': 'bearer_header'}
3.396 request {'body': None}
3.396 request_url https://oidc-certification.ory.sh:8443/userinfo
3.396 request_http_args {'headers': {'Authorization': 'Bearer M4BnNXufeL-ZmOPLWQLzgRuoIh3aZWBBybGcgN13fzs.kQ2CIT7Wd5rSXjWdlr_tVG-qjRctT9gFZL4QoCdLJRk'}}
3.469 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
3.47 OpenIDSchema {
"sub": "[email protected]"
}
3.47 OpenIDSchema {
"sub": "[email protected]"
}
3.47 phase <--<-- 6 --- Done -->-->
3.47 end
3.471 assertion VerifyClaims
3.471 condition verify-claims: status=WARNING, message=Missing required claim: name [Verifies that the claims returned as UserInfo or in the ID Token is consistent with what was asked for]
3.471 assertion CheckHTTPResponse
3.471 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
3.471 condition Done: status=OK
============================================================
Conditions
verify-claims: status=WARNING, message=Missing required claim: name [Verifies that the claims returned as UserInfo or in the ID Token is consistent with what was asked for]
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
Missing required claim: name |
Text | hydra/internal/certification/CT.F.T.T.s/OP-ClientAuth-Basic-Dynamic.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-ClientAuth-Basic-Dynamic
Test description: Access token request with client_secret_basic authentication
Timestamp: 2018-06-23T11:07:18Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.165 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.167 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.167 phase <--<-- 2 --- Registration -->-->
0.167 register kwargs:{'application_name': 'OIC test tool', 'token_endpoint_auth_method': 'client_secret_basic', 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'response_types': ['code token'], 'url': 'https://oidc-certification.ory.sh:8443/clients', 'application_type': 'web'}
0.167 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#nQgEIISvVJP7bKjU"
],
"response_types": [
"code token"
],
"token_endpoint_auth_method": "client_secret_basic"
}
0.326 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.327 RegistrationResponse {
"client_id": "e5df08d9-323b-4692-89da-04145b4e188a",
"client_secret": "IT4bX0fz4Lmr",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "e5df08d9-323b-4692-89da-04145b4e188a",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#nQgEIISvVJP7bKjU"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.327 phase <--<-- 3 --- AsyncAuthn -->-->
0.327 AuthorizationRequest {
"client_id": "e5df08d9-323b-4692-89da-04145b4e188a",
"nonce": "vakVAQdCIYQ51KVp",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "M9zLvwMo9CelSRPg"
}
0.328 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=e5df08d9-323b-4692-89da-04145b4e188a&state=M9zLvwMo9CelSRPg&response_type=code+token&nonce=vakVAQdCIYQ51KVp
0.328 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=e5df08d9-323b-4692-89da-04145b4e188a&state=M9zLvwMo9CelSRPg&response_type=code+token&nonce=vakVAQdCIYQ51KVp
3.999 http args {}
4.166 response URL with fragment
4.167 response access_token=s762vKbzAri0CX3YFmgFMP2n-TxXQUGP7vu_0_WO4-s._S9Oqm2cYyfLuSX76stJHEnuJw463-YmVsZvsF_9kiA&code=n-zYm3hQ7no4lQiPOftA280en6Vjf-RAg7Mgmgk0yTU.AtjXtz5Q_V7Nq185JCEf9_Gt7QEYV5e44IPz0vg-1_c&expires_in=3599&scope=openid&state=M9zLvwMo9CelSRPg&token_type=bearer
4.167 response {'scope': 'openid', 'code': 'n-zYm3hQ7no4lQiPOftA280en6Vjf-RAg7Mgmgk0yTU.AtjXtz5Q_V7Nq185JCEf9_Gt7QEYV5e44IPz0vg-1_c', 'access_token': 's762vKbzAri0CX3YFmgFMP2n-TxXQUGP7vu_0_WO4-s._S9Oqm2cYyfLuSX76stJHEnuJw463-YmVsZvsF_9kiA', 'state': 'M9zLvwMo9CelSRPg', 'expires_in': 3599, 'token_type': 'bearer'}
4.167 AuthorizationResponse {
"access_token": "s762vKbzAri0CX3YFmgFMP2n-TxXQUGP7vu_0_WO4-s._S9Oqm2cYyfLuSX76stJHEnuJw463-YmVsZvsF_9kiA",
"code": "n-zYm3hQ7no4lQiPOftA280en6Vjf-RAg7Mgmgk0yTU.AtjXtz5Q_V7Nq185JCEf9_Gt7QEYV5e44IPz0vg-1_c",
"expires_in": 3599,
"scope": "openid",
"state": "M9zLvwMo9CelSRPg",
"token_type": "bearer"
}
4.168 phase <--<-- 4 --- AccessToken -->-->
4.168 --> request op_args: {'state': 'M9zLvwMo9CelSRPg', 'authn_method': 'client_secret_basic'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
4.168 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'M9zLvwMo9CelSRPg', 'code': 'n-zYm3hQ7no4lQiPOftA280en6Vjf-RAg7Mgmgk0yTU.AtjXtz5Q_V7Nq185JCEf9_Gt7QEYV5e44IPz0vg-1_c', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'e5df08d9-323b-4692-89da-04145b4e188a'}, 'state': 'M9zLvwMo9CelSRPg', 'authn_method': 'client_secret_basic'}
4.168 AccessTokenRequest {
"code": "n-zYm3hQ7no4lQiPOftA280en6Vjf-RAg7Mgmgk0yTU.AtjXtz5Q_V7Nq185JCEf9_Gt7QEYV5e44IPz0vg-1_c",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "M9zLvwMo9CelSRPg"
}
4.168 request_url https://oidc-certification.ory.sh:8443/oauth2/token
4.168 request_http_args {'headers': {'Authorization': 'Basic ZTVkZjA4ZDktMzIzYi00NjkyLTg5ZGEtMDQxNDViNGUxODhhOklUNGJYMGZ6NExtcg==', 'Content-Type': 'application/x-www-form-urlencoded'}}
4.168 request code=n-zYm3hQ7no4lQiPOftA280en6Vjf-RAg7Mgmgk0yTU.AtjXtz5Q_V7Nq185JCEf9_Gt7QEYV5e44IPz0vg-1_c&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=M9zLvwMo9CelSRPg
4.533 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
4.534 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiWi10MnFiMmxySFU2RlNpd3pObFczUSIsImF1ZCI6WyJlNWRmMDhkOS0zMjNiLTQ2OTItODlkYS0wNDE0NWI0ZTE4OGEiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiJGOGVlLWtETEtrb1JXUGZkUnVEOHFBIiwiZXhwIjoxNTI5NzU1NjM3LCJpYXQiOjE1Mjk3NTIwMzgsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjEzY2U3Y2VhLTgyM2EtNDFkMC1hNzk3LTIxYWQ5Y2I0M2E1MyIsIm5vbmNlIjoidmFrVkFRZENJWVE1MUtWcCIsInJhdCI6MTUyOTc1MjAzNCwic3ViIjoiZm9vQGJhci5jb20ifQ.Fu0AKdgjTfoUa1HFrtyjW1vil_zEjSgtOkh2mbZyNY4Bdjl6PT9SI626uld2c2bw0uK8u4ufJtodpzigyqzBVLN-L7WqFbgAo0VN0KzPuCOCiO7hDNPi_yWGaA28jop8mZrQEF1Fbo16-H8MomVkkrc3ACMtKv3V9FqFoyNKpkq9gej0Of0jwPUOjJWI1o-IwOhLWjmWqvtlNtkMehJkgWVCbDnUonPIKNIbJFc1jZpxhmZv6YHTUOZ8SVQ1_41fXtbhAjQL4DPvms7AszHOD6NURgI6u3DOy6fWKbvW_TWUnjo0N36quFzOkg7SyyiwstKjmmtSb2jS-aVv260pxePO8vD9wlkDehhnyU6IQIs2zvalf50EB-65Y4VzEUvi3w863fyKyTfUQdMiKnsgYu0UMP5zPPR8cPXvBLy0HLOgBwKmguHBdzU7Hb-pdRsaX1hVQe_dqjtr59pUXJGRPUon_g2xO6g1A3BgAPMEBry0aLoM8bpd7SqZFmDDFNTOOocNBK5Vkzjx2Ks0PGeih67Hm87eJmC1zF2nD8U9Qkv-Styrow6uYJ6ELmiV4D5eg39ro5PaAASHQ2_5xzKr7XurNKjZdqbXOIkgDKbtH8StnUu1HCTTuZRSxU6g1Tmv3xBvNr0x28TUDz3sY1ZcUrT7UKdcZqWD0OGQysFUH0c', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'VIkKR-VJuwTkaDeDIPJkekh5R4uZYJuNKeutJoaekM8.WMOa4fwDzRPh9h7_crOSyNEW8uTWnPxIQEqlOO4iAO4', 'scope': 'openid'}
4.669 AccessTokenResponse {
"access_token": "VIkKR-VJuwTkaDeDIPJkekh5R4uZYJuNKeutJoaekM8.WMOa4fwDzRPh9h7_crOSyNEW8uTWnPxIQEqlOO4iAO4",
"expires_in": 3599,
"id_token": {
"at_hash": "Z-t2qb2lrHU6FSiwzNlW3Q",
"aud": [
"e5df08d9-323b-4692-89da-04145b4e188a"
],
"auth_time": 1529751824,
"c_hash": "F8ee-kDLKkoRWPfdRuD8qA",
"exp": 1529755637,
"iat": 1529752038,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "13ce7cea-823a-41d0-a797-21ad9cb43a53",
"nonce": "vakVAQdCIYQ51KVp",
"rat": 1529752034,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
4.67 phase <--<-- 5 --- Done -->-->
4.67 end
4.67 assertion VerifyResponse
4.67 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.67 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-ClientAuth-SecretPost-Dynamic.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-ClientAuth-SecretPost-Dynamic
Test description: Access token request with client_secret_post authentication
Timestamp: 2018-06-23T11:07:22Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Registration -->-->
0.074 register kwargs:{'application_name': 'OIC test tool', 'token_endpoint_auth_method': 'client_secret_post', 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'response_types': ['code token'], 'url': 'https://oidc-certification.ory.sh:8443/clients', 'application_type': 'web'}
0.075 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#WBVlXK2EdRUcbG1x"
],
"response_types": [
"code token"
],
"token_endpoint_auth_method": "client_secret_post"
}
0.231 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.232 RegistrationResponse {
"client_id": "0d638862-42df-47f5-b588-d62db83f0a7f",
"client_secret": "DTmxnBU1BaI4",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "0d638862-42df-47f5-b588-d62db83f0a7f",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#WBVlXK2EdRUcbG1x"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_post",
"userinfo_signed_response_alg": "none"
}
0.232 phase <--<-- 3 --- AsyncAuthn -->-->
0.232 AuthorizationRequest {
"client_id": "0d638862-42df-47f5-b588-d62db83f0a7f",
"nonce": "xcFLWZG6URAUH2kt",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "qIpEz2Wxk76jubfJ"
}
0.232 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=0d638862-42df-47f5-b588-d62db83f0a7f&state=qIpEz2Wxk76jubfJ&response_type=code+token&nonce=xcFLWZG6URAUH2kt
0.232 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=0d638862-42df-47f5-b588-d62db83f0a7f&state=qIpEz2Wxk76jubfJ&response_type=code+token&nonce=xcFLWZG6URAUH2kt
2.895 http args {}
3.068 response URL with fragment
3.068 response access_token=7bO0mCN_wppSMROjKh_4eJaSank4LKgEVG8tGLkM98k.vitGmgr2WL6JpC65oYv6KLSJNOEwjQIHcagt3TtKlPM&code=emXbUX86qmB70a1N-d1vQz7Dw3kAQzdOav13R_7G71U.DuOt6Kt2GStkF03MORYPQ3ofNxKzt2WLqbKZawMEhRU&expires_in=3599&scope=openid&state=qIpEz2Wxk76jubfJ&token_type=bearer
3.069 response {'scope': 'openid', 'code': 'emXbUX86qmB70a1N-d1vQz7Dw3kAQzdOav13R_7G71U.DuOt6Kt2GStkF03MORYPQ3ofNxKzt2WLqbKZawMEhRU', 'access_token': '7bO0mCN_wppSMROjKh_4eJaSank4LKgEVG8tGLkM98k.vitGmgr2WL6JpC65oYv6KLSJNOEwjQIHcagt3TtKlPM', 'state': 'qIpEz2Wxk76jubfJ', 'expires_in': 3599, 'token_type': 'bearer'}
3.069 AuthorizationResponse {
"access_token": "7bO0mCN_wppSMROjKh_4eJaSank4LKgEVG8tGLkM98k.vitGmgr2WL6JpC65oYv6KLSJNOEwjQIHcagt3TtKlPM",
"code": "emXbUX86qmB70a1N-d1vQz7Dw3kAQzdOav13R_7G71U.DuOt6Kt2GStkF03MORYPQ3ofNxKzt2WLqbKZawMEhRU",
"expires_in": 3599,
"scope": "openid",
"state": "qIpEz2Wxk76jubfJ",
"token_type": "bearer"
}
3.069 phase <--<-- 4 --- AccessToken -->-->
3.069 --> request op_args: {'state': 'qIpEz2Wxk76jubfJ', 'authn_method': 'client_secret_post'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.069 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'qIpEz2Wxk76jubfJ', 'code': 'emXbUX86qmB70a1N-d1vQz7Dw3kAQzdOav13R_7G71U.DuOt6Kt2GStkF03MORYPQ3ofNxKzt2WLqbKZawMEhRU', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '0d638862-42df-47f5-b588-d62db83f0a7f'}, 'state': 'qIpEz2Wxk76jubfJ', 'authn_method': 'client_secret_post'}
3.069 AccessTokenRequest {
"client_id": "0d638862-42df-47f5-b588-d62db83f0a7f",
"client_secret": "DTmxnBU1BaI4",
"code": "emXbUX86qmB70a1N-d1vQz7Dw3kAQzdOav13R_7G71U.DuOt6Kt2GStkF03MORYPQ3ofNxKzt2WLqbKZawMEhRU",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "qIpEz2Wxk76jubfJ"
}
3.07 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.07 request_http_args {'headers': {'Content-Type': 'application/x-www-form-urlencoded'}}
3.07 request code=emXbUX86qmB70a1N-d1vQz7Dw3kAQzdOav13R_7G71U.DuOt6Kt2GStkF03MORYPQ3ofNxKzt2WLqbKZawMEhRU&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=0d638862-42df-47f5-b588-d62db83f0a7f&grant_type=authorization_code&state=qIpEz2Wxk76jubfJ&client_secret=DTmxnBU1BaI4
3.288 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.289 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiUGNhcFUxQ3ZYd09FbHlHOTRqU0dOUSIsImF1ZCI6WyIwZDYzODg2Mi00MmRmLTQ3ZjUtYjU4OC1kNjJkYjgzZjBhN2YiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiI2cWNha09SajZJMmU4ckljNVVGdWtRIiwiZXhwIjoxNTI5NzU1NjQyLCJpYXQiOjE1Mjk3NTIwNDIsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjNjODJjZWM5LTYyMWEtNDhmNi1hNmEwLTUwZmUzMTYzMjJhZiIsIm5vbmNlIjoieGNGTFdaRzZVUkFVSDJrdCIsInJhdCI6MTUyOTc1MjAzOSwic3ViIjoiZm9vQGJhci5jb20ifQ.m-8ow1mgD9v0SDUR95Asadr6wmXupPuebaUV2zWBhrjKe32a1cvAHVy4OejVH6_D_TQ_G13JkfRKMG-I_7F9LX5ViyXhrRFfhXM8LTrXMNzJAZlrOUDs_PbVmUh5z_Xczjc82_I01hjfvcTOufpG6REZsI-5gdvVfAnfr13lHyCIGnzdk0lyaThkbsf0ZF7Lh1dL2qGWQOKeef6cZ4zECwvNZWbQkDTt8fwWSqdsyzpLl9eaXYD-S2JpflS_H3e5NjHG0rxXA80Ab-AWVYanDTIIlcS6QBMoG_owtk6K8sS6EBKijaqxsbVbQoNrdtG_RvQRXVZqJ61IfiOKwcaDfXvPu7S2O4iX1JVQwTrTqmcoZuejWGxYKrY_aqc8j3bzVOwUqu6hgMiId7hbh7JF-lablxc99FgNGi4S6KyqamEsX-R9IgS-KJgbnYFMuH5czo9-wTURz2E8M4YRmR2vg6nO5PCU4eISXwWygcDPv6H97Yl_UVYwFtJJzYdbvQeRRcwGFOFU6z7EZ2rjcWJjRopzWCd3TdLyGCTfsRcKfqqbl7_a9EuV2-l1x-fPC_pxpps6hhkckRba_wWOLITTg-XG19iLgzG7B7cNRQsQOHJAmt672Lj1e8eY0N4LBAuooF-Mf2YDQLPSXiGrB-hB0y3k4KzcW5Lu8Z-kxD4sl_U', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'fB22VZ0sovnXFOXXDwKdIGjxlH3V3ERLm7mZ2OtsBlQ.QKgbgEGqpmQmxGO6ZxbGPhJ7xWy4YpoJt3q0TkA9D08', 'scope': 'openid'}
3.373 AccessTokenResponse {
"access_token": "fB22VZ0sovnXFOXXDwKdIGjxlH3V3ERLm7mZ2OtsBlQ.QKgbgEGqpmQmxGO6ZxbGPhJ7xWy4YpoJt3q0TkA9D08",
"expires_in": 3599,
"id_token": {
"at_hash": "PcapU1CvXwOElyG94jSGNQ",
"aud": [
"0d638862-42df-47f5-b588-d62db83f0a7f"
],
"auth_time": 1529751824,
"c_hash": "6qcakORj6I2e8rIc5UFukQ",
"exp": 1529755642,
"iat": 1529752042,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "3c82cec9-621a-48f6-a6a0-50fe316322af",
"nonce": "xcFLWZG6URAUH2kt",
"rat": 1529752039,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.373 phase <--<-- 5 --- Done -->-->
3.373 end
3.374 assertion VerifyResponse
3.374 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.374 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-Discovery-claims_supported.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Discovery-claims_supported
Test description: Verify that claims_supported is published
Timestamp: 2018-06-23T11:06:28Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Done -->-->
0.075 end
0.075 assertion CheckHTTPResponse
0.075 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.076 assertion CheckHasClaimsSupported
0.076 condition providerinfo-has-claims_supported: status=OK [Check that the claims_supported discovery metadata value is in the provider_info]
0.076 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
providerinfo-has-claims_supported: status=OK [Check that the claims_supported discovery metadata value is in the provider_info]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-Discovery-Config.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Discovery-Config
Test description: Publishes openid-configuration discovery information
Timestamp: 2018-06-23T11:06:25Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.113 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.115 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.115 phase <--<-- 2 --- Done -->-->
0.115 end
0.115 assertion CheckHTTPResponse
0.115 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.116 assertion VerifyIdTokenSigningAlgorithmIsSupported
0.116 condition verify-id_token_signing-algorithm-is-supported: status=OK [Verify that required algorithms in id_token_signing_alg_values_supported]
0.116 assertion VerifyHTTPSUsage
0.116 condition verify-https-usage: status=OK [Verify that specific endpoints uses https]
0.116 assertion VerifyOPEndpointsUseHTTPS
0.116 condition verify-op-endpoints-use-https: status=OK [Verify that all OP endpoints uses https]
0.116 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-id_token_signing-algorithm-is-supported: status=OK [Verify that required algorithms in id_token_signing_alg_values_supported]
verify-https-usage: status=OK [Verify that specific endpoints uses https]
verify-op-endpoints-use-https: status=OK [Verify that all OP endpoints uses https]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-Discovery-JWKs.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Discovery-JWKs
Test description: Keys in OP JWKs well formed
Timestamp: 2018-06-23T11:06:27Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.075 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.076 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.076 phase <--<-- 2 --- Done -->-->
0.076 end
0.077 assertion CheckHTTPResponse
0.077 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.077 assertion VerifyBase64URL
0.176 http response url:https://oidc-certification.ory.sh:8443/.well-known/jwks.json status_code:200
0.177 condition verify-base64url: status=OK [Verifies that the base64 encoded parts of a JWK is in fact base64url encoded and not just base64 encoded]
0.177 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-base64url: status=OK [Verifies that the base64 encoded parts of a JWK is in fact base64url encoded and not just base64 encoded]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-Discovery-jwks_uri.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Discovery-jwks_uri
Test description: Verify that jwks_uri is published
Timestamp: 2018-06-23T11:06:29Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.074 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Done -->-->
0.076 end
0.076 assertion CheckHTTPResponse
0.076 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.076 assertion BareKeys
0.158 http response url:https://oidc-certification.ory.sh:8443/.well-known/jwks.json status_code:200
0.158 jwks {'keys': [{'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': 'spxcDzycfjLukN1KJCopwI6s4bPjlQbA-fDA0qn4ntd-nCPieqq6KdXkpCtthr0jPhg6_NKHpL9CWTqJBCyaVvtgZbw1Q2saRXIyCxnYMlw8akMnYLtSsDVrJRmQMH5NTASnIbx0G_J6pZ6OvQ30c2q8xRkOOwgtGn6E85oNrdf_wbuklksIERzxsoZKpjamgxOKZsssz0x6v0mm0RFOTEPD20eOVUqRPhskBtY7W-swCavX5YVy7PYd14dJ7iiHNn4npe2XZLIwSC-zWts7z_N7RChaQYQCQk6e5q19G6DJMSYZOhsg98P8j4XpfD3m7uutGjSYURIVI2XYFv7EWTwGR_RD8QljM6f5s_JPy3A6_BE6zMgi95D6QB5NJUbQ615hBgYprf6lW-vTc6psER_4NjChA_F10eYFEkroDTO014qhGPm9xe--krH4vksfLwnv-_AsUJUg8nMiDmldrvMU4s8JMlEjTYy99zzhXgqQTRU_w_2C4-UKb0PZQi5IeKPqMygtGs7nqgN_rv1lpcWJ2YZ6VEFPnsSnHU7pMxBA04GeSAs6614FMATjWJW5o080_AFnggQRcHouSFTClvP5dUVC_OGJPFbRblHHPlJibXebdTJRX5jxB6o7KQjw7ua3dW3CfGoizS3iLJgQYENJLMDwUY1rjg37Kwm8JE0', 'alg': 'RS256', 'kid': 'public:5198db5b-878c-4635-a538-e627f98de93e'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': '1Kpv-wv6THhBggBy2793qierg_NDRod7pAT__caxzRd6OF9FmHgzklU2d03RqHris7y0freA7RGhmIZEAyPe-C4-O-hhjw3Afk3rp_UaG1wMbgVKStujOdrcobrO6_hLOoSY7lITA-BYqFl9R5DmBoCw9_C5DEsHYL82c_FD03qVBE2rB6rHLaE03j0coHbZn1yB-RzbQqABkafhxWIUADdQ_YqxE588UzjEDRyxm_QviKoUsfSjlu0R9OMwBeX3uHnUP8tkscmMVOctAktPqzxGlfzaorgvfVWDaSUzYvGHxUdkcloUwqrAeCW_MKRmUcUblYQV_xI7QGjXQK4scTWlt4bthHiZ5fYcWt2CFozBi9V9MjKdDejDuLDDPdGlgNLVAnbUp8OqB3w8eFUycni70qp5KrUa1ooG6Bzs4qxuAD7I7D-9NS9VVhRGDBynUtgUHlBWX908ndXNfrZGnfHUyiSyZGNwy2c6xXbH_F7N09Zu9jTDFQazj85B9fVVXZ-63kfCXeuRhRm5oqYoGCLSgs71f3qnqipu2zPukehGWRt3zqf8NWyNOJxnkwW_D9111MpcrRAyhn3cOzHML6rN4nTA-sdq-9bJNMaxr-WJtawuxQtwVMmQCRHOXuFxP0ZPSVjH0zq2Y3paujalyMGpDIJlvTcP4TT3pmnpJ80', 'alg': 'RS256', 'kid': 'public:e272a755-7ae2-490e-82f5-62e0678641b0'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': '16vFo3VXLypUERl1fqAWJEysIgKnJ15eEnc-5LOiFx7jK2L0zDKtj7q6ySr6rdwmgFjaV1vfG-VKmLHPMD_YuazQeb86blkDnUfNQvHfNID0g-U2G-xeLCqfdl54jzx5NAhMV6BVCUTOwsiUt3dgBaNWGJENo4gU0KGr0S2xEU38sJGUz3zROL6gOmUwqlSAk3YClnhyYYof0tj4j0dW7mXK7MaQ4CRAhq5rJq_VRrMCc4JiD7kAN104V5BmNU409uF4InE2Stugw8RSH4hXeBFp-dXtzQi6qmBLsnHd16_WEce76IxvthFnePqa3XMNg9G4-AJ36RVbH4IhMioQgvgHWGXR276pH1Vyga7V0dSakg8ohSD2vBD5OmlYquJ6krJ3uWUCez59YUeNEgOexn5XaBL0ZEnTQ-zNNHX39QZz9QaU2lftGhknRufg68bmshLWgXJexJS1ht1vFccFcmvpnYEnCTwKzo0kjlcY7IiBpWgJ1f4r1PTIKuh8CluNkitsbABcVx3-FOAhA4CMrQovAaNL_jfp6wKBA9Qy0W9LkESVsRQWFUSpQu_z4pJMOVfjbwJOsquxKwXphI2h1VczR-Hh8rTX7D2GL_4-GyG2nHfpF3jVq7raKnyGxJA8ZIK9kPh0JlQhR2FcBhFOWjvusFjoZ09Po6XtvWlP82E', 'alg': 'RS256', 'kid': 'public:0acf6c64-4d55-4888-abb9-b2a3f661ee7f'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': '0vvbIEitFVzY4o12elAZbZvpja5xTm5AOh9wi2UEiPEL6aKxAUn1ywpUaLyWKuEXdeuykHyybniLaThik7Gf-6xKk6S9IK9tjbbwfRqHVkn_Xkyul0ohFI3iTcjvFq5FPGr5vEhSB6eckdngUpzb-7S_Kt8yunkdhYTmkuAr2AXSbQcmCbOJXOsvkc5LOwpjmFIWrtBAHwILJ5cHjzIHtkK2QKMJRlknD8b4kmQ3x6vfxA7mtXREUXdQFn7ssnOVPzriPQp4kIi_TMczSmRLlX1PeeOeDGpTnYywQbsAfdBGZ20WdZlwP3lRUUJoKv1GpBU51GKm2xhHtyrzOkiRKE8pH_PD05gh1G9qXbFtBOoHMBWEaCxoxyJcW8_9iLXBPoC-Jhm47VO5T9hPlaISzDY6EUmgYktejS_mx_bR7emBcbtFUccYSVVqT3EZqAFuQlsPsvj8AT9NmEiVncB2Cy4z7ofLX_Wai_VFPCf7AEfmDZ8mzFZQfVGct74Q9KybwXm8YDq0TSszQGuqT0gtvU9In7CPSOytrVDbdk8Peyeg-Wn_ACMRh5T23wUbQ0jy0Wi9kBwIzN-dUpKu3uL6EZ3PmPSZItQHeAxpQbRZJ1vrrd2y-b6EGun3G9rlnOZ3L4_L4-NOKLt4VGPie7sphlND1pc4ZipaXBjZ9uC3bS8', 'alg': 'RS256', 'kid': 'public:490968e8-c6e5-441e-b42e-5053d6c67af2'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': '0WN9e_V2wEp33JZoN7zQ9J4E4Iz0l-dlx6GqIKdepcMjON3PKZHWFML1e0ZKAkuG2ZJRKoX1LaSNZT0NI9N6_wVAT9aNv53sHBJVC4Bww1zKHEvQseGwJbG0lZZHjDXaxCBPte9yQnquIRRp9Ab-uBeziRoaFQ02OV3LBMBSZ79AzFvZ4yTqpUS_xp-Ylfcmh5wXEppd6hoxs9h1tttPTPbnMLte3S_zxCZI4TQi8d1yBi39OvfZxtABQQbgqYPxiYehNdYbfmZ2CAmVlsTxByS3X-ANBe2nmLsOLgXTyVFZfvEZkzY7OgEwwq5zog5pScXJ-TGlj0guZd8nClHEV-GHvXonjb2hZB63dFEiUVMNh5cOblZX034GnlOkzYfAH8UZ_cvOqONHbvplzONuaYSSRMPRaZwj-0fpElhFNHwr1v1pqbE1i9XOxU_c-eSMr4XAm1VsWG3zJKymjoJmaDcW3AEawi3btL1N2tE3p27cHtcdFjcv5birnxMtPI9Vu806U0_WiGtH_kaWxz64Xk3A_yB-lIBQwXe61JME-K81wLLcHE9qoqpF5iUK4mDqMmI_DVIazUlVUzxY0-1iFkV790V95dBxeYFgXKX02g8NyxfnyzUDC12qUKKejJFbG5LPHaMUXWJIQ2ntwBX_XzeF4pGh0u0vYmfxAmfHWN0', 'alg': 'RS256', 'kid': 'public:a09f73cf-d685-4c5c-9312-60a13e57646f'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': 's_BEnyG0xHYDibtz9a4tE1IW8490BQ_z526Lg2d0PWRtHfcqKmPG0pd0DizPuLY2j1NAY4cCXLwNWMJ3Cp1TqddaMl08hElvNbilcTyQr96RQg9MnrWeR1EqpdXEzTjcx06DFDokvzs89YQVZTDzSh_-xY_m_0VkcFQ0RpDTBn1B0dkMh78dbTJVVSGXYSBgMpcKrGlrgDaPIRX7qp_SdvjNtkPStG_wCPkzd_IJAaTAHGrlyj27dyhOC6EqQjpZRhQvT-w7GalbObncCFox3hRiC8wbI9Toi5p7vEuJJ6yksaqtIwgbtPXXUChNTqwQgIc1RE8RVuhI8ExaT6FfStIVLq9Tow6Hd9mopdX_ydEHHbnbvSC0cCRPg8_G8zTk0ihFpiHE1yEDXBQSs6pZIQ8KZF2RG35j75Jh4ngsDyPbC7PmjE93SG25AkX0WZwoB3g8f6q2r4dZqNtemRX1lMDo0FUQyYcOU5mnOiW3E5oNs3g-VH5ISOiaSUSLX6AIxDfdk6Wj5t7FZUo4EcIwTnE3PI-0HxnLJaErwbYEX0hO1BuhfF7zYHxDjc085U7OyN0abZWbuVUMtIMRgq-4ASlM9fTECg3sMmOfTEJV9nrJZaSCxKvVWma9A01bvBPB6Qn92Gj1XNZ0E1RBLUp1V3iXLcS7MGJh7bAAk5kwKCM', 'alg': 'RS256', 'kid': 'public:8e8dab73-c9fe-42ef-9a7b-1e217abba9a9'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': '3cQ2ihjoElfFVnnkleo6ioUvZrkDfddEKOMCaemXP7umEhr8TC9_L3BKYbJqtE15jvkJiqT1vlHgTOKD5wWCFhFSmEa9PAWlt9Hw6BWddFEsiijR113yvj4eT0qfjseMYyiKst0kBxiTRmQdIzllY2Y2UU1IYIkaAP009nZSR7a5IrPYFydZ6SRARk9kZI90fmgRnzUuQKcv7C9HbkUqs7qiApfA17ACpnuKQP5p5lGL41t5ZnU1-5FvmmO6NnwtRZif34HL6WYuksi2RleLAKoHGh_l6P6ygP5v3ucHH0TmdLVBAHMmlLW4BKdVnWa2HEQCKIBiXJztu8EpYCVpZ_ThCaZLagcUM6VCD4nqvsXzQB7pnsBjq75tbo2jlqrGQJE9ekfGVyw7XDN45IkJFLgfVJ2anpyK4NeIAbkB7ZCYSXbR96_EC6h0uZSMHtPYVNIvbRCK6ysCdlDuDsWiQ01tP-lp90eWj1d7ZYlaYNws12OauBfgLyn0NZvjIz5EYXbOO_Hi0P5U6znS1Um-lU0nB1Gsj685Io-KLzN0shOqkfDP8Xcjfx_3EEg0aEPJWqCjiP9K6veNI896ZrIrH6Sd0V_o4TIzpSJimZlMZrTWS6dUm2j6q1WQOE2Z5JlDMC90yTGUC8MNt2AdMB0Z78Mf71rdSrpXpWLMh7rz_7k', 'alg': 'RS256', 'kid': 'public:6a09d4a3-a298-47bc-8bbd-50b64f653f2d'}]}
0.158 condition bare-keys: status=OK [Dynamic OPs MUST publish their public keys as bare JWK keys]
0.158 assertion CheckHasJwksURI
0.158 condition providerinfo-has-jwks_uri: status=OK [Check that the jwks_uri discovery metadata value is in the provider_info]
0.158 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
bare-keys: status=OK [Dynamic OPs MUST publish their public keys as bare JWK keys]
providerinfo-has-jwks_uri: status=OK [Check that the jwks_uri discovery metadata value is in the provider_info]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-display-page.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-display-page
Test description: Request with display=page
Timestamp: 2018-06-23T11:08:42Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.395 phase <--<-- 1 --- Webfinger -->-->
1.395 not expected to do WebFinger
1.395 phase <--<-- 2 --- Discovery -->-->
1.395 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.47 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.472 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.472 phase <--<-- 3 --- Registration -->-->
1.472 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.472 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#6ddkOZx5W5xtXGMF"
],
"response_types": [
"code token"
]
}
1.629 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.63 RegistrationResponse {
"client_id": "c6c8f1ae-dc09-4301-a75e-8c909e7d0c9a",
"client_secret": "2DVvdhhNAYF6",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "c6c8f1ae-dc09-4301-a75e-8c909e7d0c9a",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#6ddkOZx5W5xtXGMF"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.63 phase <--<-- 4 --- AsyncAuthn -->-->
1.63 AuthorizationRequest {
"client_id": "c6c8f1ae-dc09-4301-a75e-8c909e7d0c9a",
"display": "page",
"nonce": "52sUvDRGPENOMrz8",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "SLzthiGlOeD1cP9U"
}
1.63 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=c6c8f1ae-dc09-4301-a75e-8c909e7d0c9a&state=SLzthiGlOeD1cP9U&response_type=code+token&nonce=52sUvDRGPENOMrz8&display=page
1.631 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=c6c8f1ae-dc09-4301-a75e-8c909e7d0c9a&state=SLzthiGlOeD1cP9U&response_type=code+token&nonce=52sUvDRGPENOMrz8&display=page
4.123 http args {}
4.288 response URL with fragment
4.288 response access_token=ckRSRmD3Jd9sMHpdUm_h2Nd20HmA8iHygCu2hgX1LCA.f6BCkWZF0eXLO_WwPj6j-IaQmsOxprejJGzigurUyPM&code=sW_QpOZdUgxt4kht9Q-UpI9iwHNe7XUbxtXGLlTU1m4.v4gFwof9u04CQAaI2K3IjzvRUxqb-S1nI8GmUxNf_JY&expires_in=3599&scope=openid&state=SLzthiGlOeD1cP9U&token_type=bearer
4.288 response {'scope': 'openid', 'code': 'sW_QpOZdUgxt4kht9Q-UpI9iwHNe7XUbxtXGLlTU1m4.v4gFwof9u04CQAaI2K3IjzvRUxqb-S1nI8GmUxNf_JY', 'access_token': 'ckRSRmD3Jd9sMHpdUm_h2Nd20HmA8iHygCu2hgX1LCA.f6BCkWZF0eXLO_WwPj6j-IaQmsOxprejJGzigurUyPM', 'state': 'SLzthiGlOeD1cP9U', 'expires_in': 3599, 'token_type': 'bearer'}
4.289 AuthorizationResponse {
"access_token": "ckRSRmD3Jd9sMHpdUm_h2Nd20HmA8iHygCu2hgX1LCA.f6BCkWZF0eXLO_WwPj6j-IaQmsOxprejJGzigurUyPM",
"code": "sW_QpOZdUgxt4kht9Q-UpI9iwHNe7XUbxtXGLlTU1m4.v4gFwof9u04CQAaI2K3IjzvRUxqb-S1nI8GmUxNf_JY",
"expires_in": 3599,
"scope": "openid",
"state": "SLzthiGlOeD1cP9U",
"token_type": "bearer"
}
4.289 phase <--<-- 5 --- Done -->-->
4.289 end
4.289 assertion VerifyResponse
4.289 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.289 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-display-popup.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-display-popup
Test description: Request with display=popup
Timestamp: 2018-06-23T11:08:49Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.324 phase <--<-- 1 --- Webfinger -->-->
1.324 not expected to do WebFinger
1.324 phase <--<-- 2 --- Discovery -->-->
1.325 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.434 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.435 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.435 phase <--<-- 3 --- Registration -->-->
1.435 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.436 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#14au77Sdb8zanByU"
],
"response_types": [
"code token"
]
}
1.595 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.596 RegistrationResponse {
"client_id": "412c5f9c-62ec-4368-9443-38ac3db74cb2",
"client_secret": "UO3Hq1gkT1KA",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "412c5f9c-62ec-4368-9443-38ac3db74cb2",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#14au77Sdb8zanByU"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.596 phase <--<-- 4 --- AsyncAuthn -->-->
1.597 AuthorizationRequest {
"client_id": "412c5f9c-62ec-4368-9443-38ac3db74cb2",
"display": "popup",
"nonce": "MGKvdTxxejWg0M4X",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "rWSlhmvA5MCrt8iL"
}
1.597 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=412c5f9c-62ec-4368-9443-38ac3db74cb2&state=rWSlhmvA5MCrt8iL&response_type=code+token&nonce=MGKvdTxxejWg0M4X&display=popup
1.597 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=412c5f9c-62ec-4368-9443-38ac3db74cb2&state=rWSlhmvA5MCrt8iL&response_type=code+token&nonce=MGKvdTxxejWg0M4X&display=popup
4.81 http args {}
4.98 response URL with fragment
4.98 response access_token=zGHkXQWpMDAQMJSlQeHu8TOb4HHC5KoG9IsRFlMhRHw.O9-3m7Hx9T5A2_Wv0lMplyp6lqqEbh24c9YzLbBFiLk&code=Btl-KgeYkM2nw9UOdWg7AmQyFPTfzB2jvk83NWbTMzw.WXTlyv4woDr8845MFs1Bno4FX3D4TqYN4-mhDAl2fj0&expires_in=3599&scope=openid&state=rWSlhmvA5MCrt8iL&token_type=bearer
4.98 response {'scope': 'openid', 'code': 'Btl-KgeYkM2nw9UOdWg7AmQyFPTfzB2jvk83NWbTMzw.WXTlyv4woDr8845MFs1Bno4FX3D4TqYN4-mhDAl2fj0', 'access_token': 'zGHkXQWpMDAQMJSlQeHu8TOb4HHC5KoG9IsRFlMhRHw.O9-3m7Hx9T5A2_Wv0lMplyp6lqqEbh24c9YzLbBFiLk', 'state': 'rWSlhmvA5MCrt8iL', 'expires_in': 3599, 'token_type': 'bearer'}
4.981 AuthorizationResponse {
"access_token": "zGHkXQWpMDAQMJSlQeHu8TOb4HHC5KoG9IsRFlMhRHw.O9-3m7Hx9T5A2_Wv0lMplyp6lqqEbh24c9YzLbBFiLk",
"code": "Btl-KgeYkM2nw9UOdWg7AmQyFPTfzB2jvk83NWbTMzw.WXTlyv4woDr8845MFs1Bno4FX3D4TqYN4-mhDAl2fj0",
"expires_in": 3599,
"scope": "openid",
"state": "rWSlhmvA5MCrt8iL",
"token_type": "bearer"
}
4.981 phase <--<-- 5 --- Done -->-->
4.981 end
4.981 assertion VerifyResponse
4.981 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.981 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-IDToken-C-Signature.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-IDToken-C-Signature
Test description: Does the OP sign the ID Token and with what
Timestamp: 2018-06-23T11:07:03Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.15 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.152 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.152 phase <--<-- 2 --- Registration -->-->
0.152 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.152 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#03incLZEP10iIW1e"
],
"response_types": [
"code token"
]
}
0.344 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.345 RegistrationResponse {
"client_id": "e597126c-ce10-45b6-b1c9-4d85c05f1408",
"client_secret": "Sh-eR5qx7sgH",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "e597126c-ce10-45b6-b1c9-4d85c05f1408",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#03incLZEP10iIW1e"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.345 phase <--<-- 3 --- AsyncAuthn -->-->
0.346 AuthorizationRequest {
"client_id": "e597126c-ce10-45b6-b1c9-4d85c05f1408",
"nonce": "UEcTaZYjyJOCnEsz",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "0qRjyljdpGsq77jb"
}
0.346 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=e597126c-ce10-45b6-b1c9-4d85c05f1408&state=0qRjyljdpGsq77jb&response_type=code+token&nonce=UEcTaZYjyJOCnEsz
0.346 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=e597126c-ce10-45b6-b1c9-4d85c05f1408&state=0qRjyljdpGsq77jb&response_type=code+token&nonce=UEcTaZYjyJOCnEsz
2.932 http args {}
3.093 response URL with fragment
3.094 response access_token=69gDbz51b2vJndGtdClBBg6RXkgtkfhv9LfQh8-2h8w.VMCGnnlZM36T0iNNMuDsbkuaIjycmraVF31SheZqnpc&code=MXuWQ2I_pq9NEi2x1GoyQYMLsHa-R0zxL_g19CR_gfA.cu7hKNwvVbd4hosB_CXL1MqSD5CXL4Es7eZu16rdhDY&expires_in=3599&scope=openid&state=0qRjyljdpGsq77jb&token_type=bearer
3.094 response {'scope': 'openid', 'code': 'MXuWQ2I_pq9NEi2x1GoyQYMLsHa-R0zxL_g19CR_gfA.cu7hKNwvVbd4hosB_CXL1MqSD5CXL4Es7eZu16rdhDY', 'access_token': '69gDbz51b2vJndGtdClBBg6RXkgtkfhv9LfQh8-2h8w.VMCGnnlZM36T0iNNMuDsbkuaIjycmraVF31SheZqnpc', 'state': '0qRjyljdpGsq77jb', 'expires_in': 3599, 'token_type': 'bearer'}
3.094 AuthorizationResponse {
"access_token": "69gDbz51b2vJndGtdClBBg6RXkgtkfhv9LfQh8-2h8w.VMCGnnlZM36T0iNNMuDsbkuaIjycmraVF31SheZqnpc",
"code": "MXuWQ2I_pq9NEi2x1GoyQYMLsHa-R0zxL_g19CR_gfA.cu7hKNwvVbd4hosB_CXL1MqSD5CXL4Es7eZu16rdhDY",
"expires_in": 3599,
"scope": "openid",
"state": "0qRjyljdpGsq77jb",
"token_type": "bearer"
}
3.094 phase <--<-- 4 --- AccessToken -->-->
3.095 --> request op_args: {'state': '0qRjyljdpGsq77jb'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.095 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': '0qRjyljdpGsq77jb', 'code': 'MXuWQ2I_pq9NEi2x1GoyQYMLsHa-R0zxL_g19CR_gfA.cu7hKNwvVbd4hosB_CXL1MqSD5CXL4Es7eZu16rdhDY', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'e597126c-ce10-45b6-b1c9-4d85c05f1408'}, 'state': '0qRjyljdpGsq77jb'}
3.095 AccessTokenRequest {
"code": "MXuWQ2I_pq9NEi2x1GoyQYMLsHa-R0zxL_g19CR_gfA.cu7hKNwvVbd4hosB_CXL1MqSD5CXL4Es7eZu16rdhDY",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "0qRjyljdpGsq77jb"
}
3.095 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.095 request_http_args {'headers': {'Authorization': 'Basic ZTU5NzEyNmMtY2UxMC00NWI2LWIxYzktNGQ4NWMwNWYxNDA4OlNoLWVSNXF4N3NnSA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
3.095 request code=MXuWQ2I_pq9NEi2x1GoyQYMLsHa-R0zxL_g19CR_gfA.cu7hKNwvVbd4hosB_CXL1MqSD5CXL4Es7eZu16rdhDY&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=0qRjyljdpGsq77jb
3.315 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.316 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiYWlXODR6SXRWemN0dTdhUXVYem5yQSIsImF1ZCI6WyJlNTk3MTI2Yy1jZTEwLTQ1YjYtYjFjOS00ZDg1YzA1ZjE0MDgiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiJaWmVWRDVsT1VKbndnQno4WFN4M19RIiwiZXhwIjoxNTI5NzU1NjIyLCJpYXQiOjE1Mjk3NTIwMjIsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImNmMzEwNTk4LTQ0ZjItNGIxZi1iNWI0LTgwMjcwOWY1M2JhZSIsIm5vbmNlIjoiVUVjVGFaWWp5Sk9DbkVzeiIsInJhdCI6MTUyOTc1MjAyMCwic3ViIjoiZm9vQGJhci5jb20ifQ.As7bIZn1zVPg_lOWyD-nYEm_HsNuhKM7FQik9IZV0TJxEYT510hoAnteMyOIqcIfWlVARb1HSG8Rb8EvQjKs6xDs0EFTqzzz3eQMWLAQT2kKhi7woiQ_QiaUJqNR6wCJ7vPSj5J1WgtGSzDwRvsi7ghx-1cqxChMzYUhksSbiCtR87b-4H5EUpEcoMEc0rcab4GEXtW6xuJI2AYuA6RoHLJttTMT2jL6Zh6o3b1beQWh4Z_ht1E23497Ozzt2GFfB2DcujJkDefTONKFrbV5WcVusg1dQoiSjY4bXHGVoNSD9HIlEQwBGvKkQtyBZYzv-TjNjYPve6E8Bme9d4n9FQ_AHepPxMQrwjSC6b8lzOidiF83KmeqXvqwd0xQycIVuhjoFoK98povNf2nrlOs-oC-QO7qzBC5KQilHOnGzfWF7z_FpEdza1aShoCc3vsCSMAy01KHPiZK5wtDOOqckB3oER2cEVL1VGa2Dz0jd8DnxZjuDnG1v-ON1fO0EQb0gl9Bsr0WsBIZtrdeKu28dzgR4QLkio1MTwvvgBQ8GQWMSDIRhKi7LBDtemyYukzvYJH-KHM9kK9hIvvrr2KY8mK4vdI6QeY2wVBhb0UewwDKeE4K5S7QvPuEC_0nEn5v8pXsW5y7NY4_ST049GlDXsSpPwMt6WzlUtlERoHEVUA', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'Vv_bjZxGzA1b8f2EtkOtUImY5pmnGDy_FhS95bLZ0Kg.EiamaRquwiN5Vruxx51oMbj2MtC6U7Zq7vwBFy6gvAk', 'scope': 'openid'}
3.397 AccessTokenResponse {
"access_token": "Vv_bjZxGzA1b8f2EtkOtUImY5pmnGDy_FhS95bLZ0Kg.EiamaRquwiN5Vruxx51oMbj2MtC6U7Zq7vwBFy6gvAk",
"expires_in": 3599,
"id_token": {
"at_hash": "aiW84zItVzctu7aQuXznrA",
"aud": [
"e597126c-ce10-45b6-b1c9-4d85c05f1408"
],
"auth_time": 1529751824,
"c_hash": "ZZeVD5lOUJnwgBz8XSx3_Q",
"exp": 1529755622,
"iat": 1529752022,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "cf310598-44f2-4b1f-b5b4-802709f53bae",
"nonce": "UEcTaZYjyJOCnEsz",
"rat": 1529752020,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.397 phase <--<-- 5 --- Done -->-->
3.397 end
3.398 assertion VerifyResponse
3.398 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.398 assertion IsIDTokenSigned
3.398 condition is-idtoken-signed: status=OK [Checks if the id_token is signed]
3.398 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
is-idtoken-signed: status=OK [Checks if the id_token is signed]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-IDToken-kid.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-IDToken-kid
Test description: IDToken has kid [Basic, Implicit, Hybrid]
Timestamp: 2018-06-23T11:07:12Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.112 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.114 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.114 phase <--<-- 2 --- Registration -->-->
0.114 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.114 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#fUmLwk3dEITj0bjx"
],
"response_types": [
"code token"
]
}
0.27 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.271 RegistrationResponse {
"client_id": "866043b5-676d-439c-bcdd-4f4db990f0ad",
"client_secret": "6Q7N5wLdVAa-",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "866043b5-676d-439c-bcdd-4f4db990f0ad",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#fUmLwk3dEITj0bjx"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.271 phase <--<-- 3 --- AsyncAuthn -->-->
0.272 AuthorizationRequest {
"client_id": "866043b5-676d-439c-bcdd-4f4db990f0ad",
"nonce": "NoXQVip3NmJ5xYMD",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "VmUy3Nlm8MidMzIA"
}
0.272 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=866043b5-676d-439c-bcdd-4f4db990f0ad&state=VmUy3Nlm8MidMzIA&response_type=code+token&nonce=NoXQVip3NmJ5xYMD
0.272 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=866043b5-676d-439c-bcdd-4f4db990f0ad&state=VmUy3Nlm8MidMzIA&response_type=code+token&nonce=NoXQVip3NmJ5xYMD
2.575 http args {}
2.768 response URL with fragment
2.769 response access_token=bqHNExI6Mo0HAGHr8qLZTd08UhJ48L-PsJFoiEcNKIQ.J71zLdOWCO_-wDDVuefLNmP8FwYut9PTd_DS9q5ToFs&code=x0Spy4o5CrPDp0LmcWH1EOIKbolx7hxIoeozMjtZc_k.qX05RZtBvYYLVQVVig8JfjWWQtohk9vkMDs-dOniNJc&expires_in=3599&scope=openid&state=VmUy3Nlm8MidMzIA&token_type=bearer
2.769 response {'scope': 'openid', 'code': 'x0Spy4o5CrPDp0LmcWH1EOIKbolx7hxIoeozMjtZc_k.qX05RZtBvYYLVQVVig8JfjWWQtohk9vkMDs-dOniNJc', 'access_token': 'bqHNExI6Mo0HAGHr8qLZTd08UhJ48L-PsJFoiEcNKIQ.J71zLdOWCO_-wDDVuefLNmP8FwYut9PTd_DS9q5ToFs', 'state': 'VmUy3Nlm8MidMzIA', 'expires_in': 3599, 'token_type': 'bearer'}
2.77 AuthorizationResponse {
"access_token": "bqHNExI6Mo0HAGHr8qLZTd08UhJ48L-PsJFoiEcNKIQ.J71zLdOWCO_-wDDVuefLNmP8FwYut9PTd_DS9q5ToFs",
"code": "x0Spy4o5CrPDp0LmcWH1EOIKbolx7hxIoeozMjtZc_k.qX05RZtBvYYLVQVVig8JfjWWQtohk9vkMDs-dOniNJc",
"expires_in": 3599,
"scope": "openid",
"state": "VmUy3Nlm8MidMzIA",
"token_type": "bearer"
}
2.77 phase <--<-- 4 --- AccessToken -->-->
2.77 --> request op_args: {'state': 'VmUy3Nlm8MidMzIA'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.77 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'VmUy3Nlm8MidMzIA', 'code': 'x0Spy4o5CrPDp0LmcWH1EOIKbolx7hxIoeozMjtZc_k.qX05RZtBvYYLVQVVig8JfjWWQtohk9vkMDs-dOniNJc', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '866043b5-676d-439c-bcdd-4f4db990f0ad'}, 'state': 'VmUy3Nlm8MidMzIA'}
2.77 AccessTokenRequest {
"code": "x0Spy4o5CrPDp0LmcWH1EOIKbolx7hxIoeozMjtZc_k.qX05RZtBvYYLVQVVig8JfjWWQtohk9vkMDs-dOniNJc",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "VmUy3Nlm8MidMzIA"
}
2.77 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.77 request_http_args {'headers': {'Authorization': 'Basic ODY2MDQzYjUtNjc2ZC00MzljLWJjZGQtNGY0ZGI5OTBmMGFkOjZRN041d0xkVkFhLQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.77 request code=x0Spy4o5CrPDp0LmcWH1EOIKbolx7hxIoeozMjtZc_k.qX05RZtBvYYLVQVVig8JfjWWQtohk9vkMDs-dOniNJc&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=VmUy3Nlm8MidMzIA
2.983 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.984 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiVkFydkVlZmRPeW10SWxrZ01wbHFndyIsImF1ZCI6WyI4NjYwNDNiNS02NzZkLTQzOWMtYmNkZC00ZjRkYjk5MGYwYWQiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiItdDE3TW9nV0REQ0o2ek41cUkyOUpRIiwiZXhwIjoxNTI5NzU1NjMxLCJpYXQiOjE1Mjk3NTIwMzIsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImVkZTc2MWViLWM3NGYtNGMzYy1hY2I0LTkwYTMzNzUzNzRjNSIsIm5vbmNlIjoiTm9YUVZpcDNObUo1eFlNRCIsInJhdCI6MTUyOTc1MjAyOSwic3ViIjoiZm9vQGJhci5jb20ifQ.aXH5kC3x754ViwCHtBLQ_Zhstap4FZpaP3OHVUJ4IhOxgGDhUNYk1vGi9VrAgjmTxZDLrwaVB0_D4KshohCNL7bRvE-4wMLZEVCGwvv_wr6pweV9wAIGCDhQtQY5DKpNvib_NtXwQ9fnH2Bf3xk5POH9qZrVtyGA7YfBLtn9brLgEqMH20IKsvUKWJQP8FYObEKn9Ry6ZE51uGlPTWCWH-1mw3N2jPVR7l7X6Yt6U7jz9wYfwWIRFdl_Um8eba2eOHCaxAPUucIFKVcjDJvyZGZDW9fdcEnFGnVeRda0boEMIdY62EZ5r1rZ3pQ6FIGjJzOeLTax5jlRxCjw_VnY-iEXhvrJA4jq-MLo2GJSy7KAGzKb43fVD_kx2e7A-XN6PyCDTRC4NkUIy63YjonHpgFbobI0k0FXNMAAXedK2LKcGxQPeejEE9n2H1US7LMiTwbHW1_2yrANTpVltZcDX5VXUjq0uJjriydkjDYX1Il9iPXpeksp4OhgDlx0L3nECynLUGRhdl93jmx-kqWm_NpuHH5Y8Yz-f2UDJcTdpt9uCenNcloIUWeA2vn1RPa1vfh01AMHmrrBYa1D1zNsHQ0dL_1aRdNZpEmxX7MjnRWNs41Bv2zE2Gloh0xF1H7grS_dhXwO5OBstBDu22a6j5VGo9nPwAMKOwCs6gcQ6EI', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'XiCSCm7Ydou4dCL93_5ErtnJ8O-Y0e1Rha0Zb4-DhuE.KS23SYnKn4Vt0-rWHw3v5hT9umJBpDGjYufMdWmGZ1A', 'scope': 'openid'}
3.102 AccessTokenResponse {
"access_token": "XiCSCm7Ydou4dCL93_5ErtnJ8O-Y0e1Rha0Zb4-DhuE.KS23SYnKn4Vt0-rWHw3v5hT9umJBpDGjYufMdWmGZ1A",
"expires_in": 3599,
"id_token": {
"at_hash": "VArvEefdOymtIlkgMplqgw",
"aud": [
"866043b5-676d-439c-bcdd-4f4db990f0ad"
],
"auth_time": 1529751824,
"c_hash": "-t17MogWDDCJ6zN5qI29JQ",
"exp": 1529755631,
"iat": 1529752032,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "ede761eb-c74f-4c3c-acb4-90a3375374c5",
"nonce": "NoXQVip3NmJ5xYMD",
"rat": 1529752029,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.102 phase <--<-- 5 --- Done -->-->
3.102 end
3.102 assertion VerifySignedIdTokenHasKID
3.102 condition verify-signed-idtoken-has-kid: status=OK [Verifies that the header of a signed IDToken includes a kid claim.]
3.103 assertion VerifyResponse
3.103 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.103 condition Done: status=OK
============================================================
Conditions
verify-signed-idtoken-has-kid: status=OK [Verifies that the header of a signed IDToken includes a kid claim.]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-IDToken-RS256.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-IDToken-RS256
Test description: Asymmetric ID Token signature with RS256
Timestamp: 2018-06-23T11:07:08Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.075 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.077 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.077 phase <--<-- 2 --- Registration -->-->
0.077 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'id_token_signed_response_alg': 'RS256', 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.077 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id_token_signed_response_alg": "RS256",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#h8ySopkYJFw2Dw72"
],
"response_types": [
"code token"
]
}
0.235 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.236 RegistrationResponse {
"client_id": "eec0912e-ca3d-45d5-94a7-9b2d09fba475",
"client_secret": "BdTMFPstUJnR",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "eec0912e-ca3d-45d5-94a7-9b2d09fba475",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#h8ySopkYJFw2Dw72"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.236 phase <--<-- 3 --- AsyncAuthn -->-->
0.237 AuthorizationRequest {
"client_id": "eec0912e-ca3d-45d5-94a7-9b2d09fba475",
"nonce": "KAxCPVjj04OwwiWm",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "k1o9v2Qbg6vwc4BM"
}
0.237 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=eec0912e-ca3d-45d5-94a7-9b2d09fba475&state=k1o9v2Qbg6vwc4BM&response_type=code+token&nonce=KAxCPVjj04OwwiWm
0.237 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=eec0912e-ca3d-45d5-94a7-9b2d09fba475&state=k1o9v2Qbg6vwc4BM&response_type=code+token&nonce=KAxCPVjj04OwwiWm
2.668 http args {}
2.832 response URL with fragment
2.832 response access_token=7EAGurHSfQVP4z_u7qD_BctMr21fy1Tcy-UFebX5qjU.Kn_Kg_Sv86csNLKCKcH5WrGJSyf4pJKNPfqAdrYE9DY&code=Y6FMmy8BL0316zZUsjXXTz3KBa3A9uPTp5kgNoyaU4c.1p3CxIHumdtkJKfIGb3_4fepzqnf7Yrem9_gnrMD5dI&expires_in=3599&scope=openid&state=k1o9v2Qbg6vwc4BM&token_type=bearer
2.833 response {'scope': 'openid', 'code': 'Y6FMmy8BL0316zZUsjXXTz3KBa3A9uPTp5kgNoyaU4c.1p3CxIHumdtkJKfIGb3_4fepzqnf7Yrem9_gnrMD5dI', 'access_token': '7EAGurHSfQVP4z_u7qD_BctMr21fy1Tcy-UFebX5qjU.Kn_Kg_Sv86csNLKCKcH5WrGJSyf4pJKNPfqAdrYE9DY', 'state': 'k1o9v2Qbg6vwc4BM', 'expires_in': 3599, 'token_type': 'bearer'}
2.833 AuthorizationResponse {
"access_token": "7EAGurHSfQVP4z_u7qD_BctMr21fy1Tcy-UFebX5qjU.Kn_Kg_Sv86csNLKCKcH5WrGJSyf4pJKNPfqAdrYE9DY",
"code": "Y6FMmy8BL0316zZUsjXXTz3KBa3A9uPTp5kgNoyaU4c.1p3CxIHumdtkJKfIGb3_4fepzqnf7Yrem9_gnrMD5dI",
"expires_in": 3599,
"scope": "openid",
"state": "k1o9v2Qbg6vwc4BM",
"token_type": "bearer"
}
2.833 phase <--<-- 4 --- AccessToken -->-->
2.833 --> request op_args: {'state': 'k1o9v2Qbg6vwc4BM'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.833 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'k1o9v2Qbg6vwc4BM', 'code': 'Y6FMmy8BL0316zZUsjXXTz3KBa3A9uPTp5kgNoyaU4c.1p3CxIHumdtkJKfIGb3_4fepzqnf7Yrem9_gnrMD5dI', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'eec0912e-ca3d-45d5-94a7-9b2d09fba475'}, 'state': 'k1o9v2Qbg6vwc4BM'}
2.833 AccessTokenRequest {
"code": "Y6FMmy8BL0316zZUsjXXTz3KBa3A9uPTp5kgNoyaU4c.1p3CxIHumdtkJKfIGb3_4fepzqnf7Yrem9_gnrMD5dI",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "k1o9v2Qbg6vwc4BM"
}
2.833 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.833 request_http_args {'headers': {'Authorization': 'Basic ZWVjMDkxMmUtY2EzZC00NWQ1LTk0YTctOWIyZDA5ZmJhNDc1OkJkVE1GUHN0VUpuUg==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.833 request code=Y6FMmy8BL0316zZUsjXXTz3KBa3A9uPTp5kgNoyaU4c.1p3CxIHumdtkJKfIGb3_4fepzqnf7Yrem9_gnrMD5dI&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=k1o9v2Qbg6vwc4BM
3.058 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.059 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiSDUtZjJOZl8wT0JKN0J4X2xycEtMdyIsImF1ZCI6WyJlZWMwOTEyZS1jYTNkLTQ1ZDUtOTRhNy05YjJkMDlmYmE0NzUiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiJ0U2FlZ0xRNUFlOG9Ia1VzeFE4a1NnIiwiZXhwIjoxNTI5NzU1NjI3LCJpYXQiOjE1Mjk3NTIwMjcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjNhZjY2MDlkLWVhZjktNGM0My1hYTgyLWEwMmEwNjIzMTBjYyIsIm5vbmNlIjoiS0F4Q1BWamowNE93d2lXbSIsInJhdCI6MTUyOTc1MjAyNSwic3ViIjoiZm9vQGJhci5jb20ifQ.ThjMVyfgYnCtT0NShizGrpRu1GBYxiPqHJ5BaOOO3W8GbxP8jQ8AfduE9QdFnwVY-9VX9JEitF37dbp66686CKeMuXypUkI8Q-DDhE-1UgudI-G2SjUTIqwIt4XJh3XzmSZaAogGPdCAktjkwlQEPibzG6vmXgndXscX0FGrow6rM0G-fXOLaGIgze_P783K6RDAJzEVHIICclNlSUgYNYN2nwCCYocBq1Gvtk9w_Kus0j4f4QfAV65OXTyzDLhKslcVKPU7B6m1d_tbI_IOzagDnHg_BIU16a3Z7aKQZMHEObA2Iu_jqL9sACKVxwgJ8QFED5dnwjxd_JWDpmU3p-5xdHwBH_r3JnDdmkWP6JRsqjShxr2pw1k5Bb2ttc3yIpDUmZ4DgPqpOnbxSlL_o265f-QYB2LjOoxMDdeBR-b7uQjEBPxz0bd08fA2q56C56Mpqo_eb6UrdHK3a0kiR2jLXoorXor3Br733Yhk1SnfshQiLdp281r3ShhR1k6QXsD2JByxwcQtkMt3C3rnNgOhDyVcw7LR0FtFKdxzeDRk1h2SQR2wNnt1ctmtd8Ii5fgKxfR2_tl5At8M7dDZMHqmx5mebgVt0bZQOdzRJKPc__PS-CxIE2YRop8kHWQYYTKmhmXvb1LwS9_2WJ1Trn24hcHhA4beiuaIOoGHmYE', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'rk4LVQnDGdc5nKPAJzl3UHWc7CvH1xBx-KQACGTRL6o.IqpdTJMHBDIz32rey604bhCMm6TH5Ex75NupgYslPb0', 'scope': 'openid'}
3.143 AccessTokenResponse {
"access_token": "rk4LVQnDGdc5nKPAJzl3UHWc7CvH1xBx-KQACGTRL6o.IqpdTJMHBDIz32rey604bhCMm6TH5Ex75NupgYslPb0",
"expires_in": 3599,
"id_token": {
"at_hash": "H5-f2Nf_0OBJ7Bx_lrpKLw",
"aud": [
"eec0912e-ca3d-45d5-94a7-9b2d09fba475"
],
"auth_time": 1529751824,
"c_hash": "tSaegLQ5Ae8oHkUsxQ8kSg",
"exp": 1529755627,
"iat": 1529752027,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "3af6609d-eaf9-4c43-aa82-a02a062310cc",
"nonce": "KAxCPVjj04OwwiWm",
"rat": 1529752025,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.143 phase <--<-- 5 --- Done -->-->
3.143 end
3.144 assertion VerifyResponse
3.144 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.144 assertion VerifySignedIdToken
3.144 condition verify-idtoken-is-signed: status=OK [Verifies that an ID Token is signed]
3.144 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-idtoken-is-signed: status=OK [Verifies that an ID Token is signed]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-nonce-noncode.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-nonce-noncode
Test description: Request with nonce, verifies it was returned in ID Token [Implicit, Hybrid]
Timestamp: 2018-06-23T11:09:31Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.079 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.081 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.081 phase <--<-- 2 --- Registration -->-->
0.081 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.081 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#UeKVOtLjrfWqweFu"
],
"response_types": [
"code token"
]
}
0.235 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.236 RegistrationResponse {
"client_id": "6d7ad1a2-3641-4a1c-b763-d3d474cb46da",
"client_secret": "WN8zQ75Kvm_K",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "6d7ad1a2-3641-4a1c-b763-d3d474cb46da",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#UeKVOtLjrfWqweFu"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.236 phase <--<-- 3 --- AsyncAuthn -->-->
0.236 AuthorizationRequest {
"client_id": "6d7ad1a2-3641-4a1c-b763-d3d474cb46da",
"nonce": "IeQLF1N3sKy81Zs0",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "sJ73SXCnQINan2ib"
}
0.237 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=6d7ad1a2-3641-4a1c-b763-d3d474cb46da&state=sJ73SXCnQINan2ib&response_type=code+token&nonce=IeQLF1N3sKy81Zs0
0.237 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=6d7ad1a2-3641-4a1c-b763-d3d474cb46da&state=sJ73SXCnQINan2ib&response_type=code+token&nonce=IeQLF1N3sKy81Zs0
34.611 http args {}
34.773 response URL with fragment
34.774 response access_token=DEdGHhgsH-y8L4wwNJGFrkYENdqVCGPqSqGfwAtFOro.yER_dwjalTAG-LBvMfWkm74zunnGJq4qP_CEEL7P-Ts&code=Y9HyRBMLfZd3xmY2fd-wtNj3L9GLMF2A7hc9NgEO9SI.d9SwnmCj_Wyj_9s4aUWRe501EblFXSY7kdR1V0NJWSg&expires_in=3599&scope=openid&state=sJ73SXCnQINan2ib&token_type=bearer
34.774 response {'scope': 'openid', 'code': 'Y9HyRBMLfZd3xmY2fd-wtNj3L9GLMF2A7hc9NgEO9SI.d9SwnmCj_Wyj_9s4aUWRe501EblFXSY7kdR1V0NJWSg', 'access_token': 'DEdGHhgsH-y8L4wwNJGFrkYENdqVCGPqSqGfwAtFOro.yER_dwjalTAG-LBvMfWkm74zunnGJq4qP_CEEL7P-Ts', 'state': 'sJ73SXCnQINan2ib', 'expires_in': 3599, 'token_type': 'bearer'}
34.775 AuthorizationResponse {
"access_token": "DEdGHhgsH-y8L4wwNJGFrkYENdqVCGPqSqGfwAtFOro.yER_dwjalTAG-LBvMfWkm74zunnGJq4qP_CEEL7P-Ts",
"code": "Y9HyRBMLfZd3xmY2fd-wtNj3L9GLMF2A7hc9NgEO9SI.d9SwnmCj_Wyj_9s4aUWRe501EblFXSY7kdR1V0NJWSg",
"expires_in": 3599,
"scope": "openid",
"state": "sJ73SXCnQINan2ib",
"token_type": "bearer"
}
34.775 phase <--<-- 4 --- AccessToken -->-->
34.775 --> request op_args: {'state': 'sJ73SXCnQINan2ib'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
34.775 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'sJ73SXCnQINan2ib', 'code': 'Y9HyRBMLfZd3xmY2fd-wtNj3L9GLMF2A7hc9NgEO9SI.d9SwnmCj_Wyj_9s4aUWRe501EblFXSY7kdR1V0NJWSg', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '6d7ad1a2-3641-4a1c-b763-d3d474cb46da'}, 'state': 'sJ73SXCnQINan2ib'}
34.775 AccessTokenRequest {
"code": "Y9HyRBMLfZd3xmY2fd-wtNj3L9GLMF2A7hc9NgEO9SI.d9SwnmCj_Wyj_9s4aUWRe501EblFXSY7kdR1V0NJWSg",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "sJ73SXCnQINan2ib"
}
34.775 request_url https://oidc-certification.ory.sh:8443/oauth2/token
34.775 request_http_args {'headers': {'Authorization': 'Basic NmQ3YWQxYTItMzY0MS00YTFjLWI3NjMtZDNkNDc0Y2I0NmRhOldOOHpRNzVLdm1fSw==', 'Content-Type': 'application/x-www-form-urlencoded'}}
34.775 request code=Y9HyRBMLfZd3xmY2fd-wtNj3L9GLMF2A7hc9NgEO9SI.d9SwnmCj_Wyj_9s4aUWRe501EblFXSY7kdR1V0NJWSg&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=sJ73SXCnQINan2ib
35.009 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
35.01 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoidGVqajFrdzR6WjBDSHdTLW8wSFlvZyIsImF1ZCI6WyI2ZDdhZDFhMi0zNjQxLTRhMWMtYjc2My1kM2Q0NzRjYjQ2ZGEiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiJkVnZjZ1ZoRTEtSDl6LWxiNThWTWxBIiwiZXhwIjoxNTI5NzU1NzcwLCJpYXQiOjE1Mjk3NTIxNzEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjZhMzM3ZTI1LTA3NzctNGVjMS05MDYzLTI3MGEzOWU5NmJjZSIsIm5vbmNlIjoiSWVRTEYxTjNzS3k4MVpzMCIsInJhdCI6MTUyOTc1MjEzNiwic3ViIjoiZm9vQGJhci5jb20ifQ.h1DEmXH7F65nTly7dIyK76f_MKbzY05Y0noqVhTOQlvMaCo9KkyIcYUp3rtNRmMFvcV2hJGFNKBwUvIg5LGZyjKoTGNLkmeIL6aMgysal3BAMwp2l-guFtsNpgoN5VM0-gMYsTBvsif1_UJm-qi13zjd807x1LCvxks44Uy-SHMyhWyQtcC5gvEf5aBUSlk53u1CiwZaYt9QT8RA6FvQ51Sy_BhxUAqxjZ_xXsuHu2So6trzqjAq0sxInLysKwSL13f1jThTV0PAppIK1K-VCVxNFjbhPobyGY2UvgFwTMpfixuJoAWOgKN_9v6cyEGqXv4EuPsL0Vg99RXtMagNqRNuOIXooBZIyGbGmWsP66ueN9L43d5uz8SCqvzpgEfPeaRqjG27EAL8UtHDCk4c_bGEu4n9VHtqRx7OoClR2b4lX-wQLnmU_hIDtTKlft_fIf2wvTL38Kie_EnowiauNOdvrKteYEmWDE4xPUCBn5NPKA8Rz55VoikyGH8yjiR--nOJETvFOWKz2N8TTnkBJwChHMtH3IAgeP3Qq4sxQopdskpmbI1RlRo7pOsAAteVW-kix30DAKRYP74J_VqqanawnZ9kqJpi98NIxUchcFaXQDDsEjowVhyO96iIZ1tmE4EHjueB8M7IKZVED8mLsAFXysgn2w3EOdYMZbnERrY', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'AdD7cAZiciUGy7tsI9KR6kXocmewXYXayd3c44UnIqA.IOZBOS0PFmGopeli4DpQuiLcHTPEdDVfxC78IIM3aBI', 'scope': 'openid'}
35.091 AccessTokenResponse {
"access_token": "AdD7cAZiciUGy7tsI9KR6kXocmewXYXayd3c44UnIqA.IOZBOS0PFmGopeli4DpQuiLcHTPEdDVfxC78IIM3aBI",
"expires_in": 3599,
"id_token": {
"at_hash": "tejj1kw4zZ0CHwS-o0HYog",
"aud": [
"6d7ad1a2-3641-4a1c-b763-d3d474cb46da"
],
"auth_time": 1529751824,
"c_hash": "dVvcgVhE1-H9z-lb58VMlA",
"exp": 1529755770,
"iat": 1529752171,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "6a337e25-0777-4ec1-9063-270a39e96bce",
"nonce": "IeQLF1N3sKy81Zs0",
"rat": 1529752136,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
35.091 phase <--<-- 5 --- Done -->-->
35.091 end
35.092 assertion VerifyResponse
35.092 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
35.092 assertion CheckIdTokenNonce
35.092 condition check-idtoken-nonce: status=OK [Verify that the nonce in the IDToken is the same that's included in the Authorization Request.]
35.092 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
check-idtoken-nonce: status=OK [Verify that the nonce in the IDToken is the same that's included in the Authorization Request.]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-nonce-NoReq-noncode.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-nonce-NoReq-noncode
Test description: Reject requests without nonce unless using the code flow
Timestamp: 2018-06-23T11:08:54Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Note -->-->
1.141 phase <--<-- 3 --- Registration -->-->
1.142 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.142 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#yjVhIEqXD51ydehK"
],
"response_types": [
"code token"
]
}
1.297 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.298 RegistrationResponse {
"client_id": "77db7959-4cf4-4434-a4b3-63c228d5d2d3",
"client_secret": ".XHzi-XBjr2m",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "77db7959-4cf4-4434-a4b3-63c228d5d2d3",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#yjVhIEqXD51ydehK"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.298 phase <--<-- 4 --- AsyncAuthn -->-->
1.298 AuthorizationRequest {
"client_id": "77db7959-4cf4-4434-a4b3-63c228d5d2d3",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "75AkgMVNwY4v0iB9"
}
1.298 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?state=75AkgMVNwY4v0iB9&scope=openid&response_type=code+token&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=77db7959-4cf4-4434-a4b3-63c228d5d2d3
1.298 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?state=75AkgMVNwY4v0iB9&scope=openid&response_type=code+token&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=77db7959-4cf4-4434-a4b3-63c228d5d2d3
4.111 http args {}
4.323 response URL with fragment
4.323 response error=invalid_request&error_debug=Parameter+nonce+must+be+set+when+using+the+hybrid+flow&error_description=The+request+is+missing+a+required+parameter%252C+includes+an+invalid+parameter+value%252C+includes+a+parameter+more+than+once%252C+or+is+otherwise+malformed&error_hint=Make+sure+that+the+various+parameters+are+correct%252C+be+aware+of+case+sensitivity+and+trim+your+parameters.+Make+sure+that+the+client+you+are+using+has+exactly+whitelisted+the+redirect_uri+you+specified.&state=75AkgMVNwY4v0iB9
4.324 response {'error_debug': 'Parameter nonce must be set when using the hybrid flow', 'error_description': 'The request is missing a required parameter%2C includes an invalid parameter value%2C includes a parameter more than once%2C or is otherwise malformed', 'state': '75AkgMVNwY4v0iB9', 'error': 'invalid_request', 'error_hint': 'Make sure that the various parameters are correct%2C be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.'}
4.324 AuthorizationErrorResponse {
"error": "invalid_request",
"error_debug": "Parameter nonce must be set when using the hybrid flow",
"error_description": "The request is missing a required parameter%2C includes an invalid parameter value%2C includes a parameter more than once%2C or is otherwise malformed",
"error_hint": "Make sure that the various parameters are correct%2C be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.",
"state": "75AkgMVNwY4v0iB9"
}
4.324 AuthorizationErrorResponse {
"error": "invalid_request",
"error_debug": "Parameter nonce must be set when using the hybrid flow",
"error_description": "The request is missing a required parameter%2C includes an invalid parameter value%2C includes a parameter more than once%2C or is otherwise malformed",
"error_hint": "Make sure that the various parameters are correct%2C be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.",
"state": "75AkgMVNwY4v0iB9"
}
4.324 phase <--<-- 5 --- Done -->-->
4.324 end
4.325 assertion VerifyResponse
4.325 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.325 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-OAuth-2nd-30s.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-OAuth-2nd-30s
Test description: Trying to use authorization code twice with 30 seconds in between uses must result in an error
Timestamp: 2018-06-23T11:13:52Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.252 phase <--<-- 1 --- Webfinger -->-->
1.252 not expected to do WebFinger
1.252 phase <--<-- 2 --- Discovery -->-->
1.252 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.36 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.361 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.361 phase <--<-- 3 --- Registration -->-->
1.362 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.362 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#kb6WL7hKEbvVio6r"
],
"response_types": [
"code token"
]
}
1.519 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.52 RegistrationResponse {
"client_id": "cef74664-dc43-432c-a3d2-6c6fb7513308",
"client_secret": "APB88CzhP.QF",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "cef74664-dc43-432c-a3d2-6c6fb7513308",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#kb6WL7hKEbvVio6r"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.52 phase <--<-- 4 --- AsyncAuthn -->-->
1.521 AuthorizationRequest {
"client_id": "cef74664-dc43-432c-a3d2-6c6fb7513308",
"nonce": "RaeLXcfjTaIsmeIg",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "zf92pM1RToLEe9KS"
}
1.521 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=cef74664-dc43-432c-a3d2-6c6fb7513308&state=zf92pM1RToLEe9KS&response_type=code+token&nonce=RaeLXcfjTaIsmeIg
1.521 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=cef74664-dc43-432c-a3d2-6c6fb7513308&state=zf92pM1RToLEe9KS&response_type=code+token&nonce=RaeLXcfjTaIsmeIg
4.603 http args {}
4.771 response URL with fragment
4.771 response access_token=RereK80v103elsUvzT7LXHul3RDmDhZ1pIbxJ6fomGs.wxrMoFyTmugjNRm_1n7BP8HvZS9s0NFj3jgeSSy9n_s&code=9Ck4767MTXSfcN_bEKGwgtC8myCtMuSUXvaZksa1Z5I.CpkrBguCSNOpbbBrEyTjtJVhrilPcl3cZik9ZW8zBV4&expires_in=3599&scope=openid&state=zf92pM1RToLEe9KS&token_type=bearer
4.772 response {'scope': 'openid', 'code': '9Ck4767MTXSfcN_bEKGwgtC8myCtMuSUXvaZksa1Z5I.CpkrBguCSNOpbbBrEyTjtJVhrilPcl3cZik9ZW8zBV4', 'access_token': 'RereK80v103elsUvzT7LXHul3RDmDhZ1pIbxJ6fomGs.wxrMoFyTmugjNRm_1n7BP8HvZS9s0NFj3jgeSSy9n_s', 'state': 'zf92pM1RToLEe9KS', 'expires_in': 3599, 'token_type': 'bearer'}
4.772 AuthorizationResponse {
"access_token": "RereK80v103elsUvzT7LXHul3RDmDhZ1pIbxJ6fomGs.wxrMoFyTmugjNRm_1n7BP8HvZS9s0NFj3jgeSSy9n_s",
"code": "9Ck4767MTXSfcN_bEKGwgtC8myCtMuSUXvaZksa1Z5I.CpkrBguCSNOpbbBrEyTjtJVhrilPcl3cZik9ZW8zBV4",
"expires_in": 3599,
"scope": "openid",
"state": "zf92pM1RToLEe9KS",
"token_type": "bearer"
}
4.772 phase <--<-- 5 --- AccessToken -->-->
4.773 --> request op_args: {'state': 'zf92pM1RToLEe9KS'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
4.773 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'zf92pM1RToLEe9KS', 'code': '9Ck4767MTXSfcN_bEKGwgtC8myCtMuSUXvaZksa1Z5I.CpkrBguCSNOpbbBrEyTjtJVhrilPcl3cZik9ZW8zBV4', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'cef74664-dc43-432c-a3d2-6c6fb7513308'}, 'state': 'zf92pM1RToLEe9KS'}
4.773 AccessTokenRequest {
"code": "9Ck4767MTXSfcN_bEKGwgtC8myCtMuSUXvaZksa1Z5I.CpkrBguCSNOpbbBrEyTjtJVhrilPcl3cZik9ZW8zBV4",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "zf92pM1RToLEe9KS"
}
4.773 request_url https://oidc-certification.ory.sh:8443/oauth2/token
4.773 request_http_args {'headers': {'Authorization': 'Basic Y2VmNzQ2NjQtZGM0My00MzJjLWEzZDItNmM2ZmI3NTEzMzA4OkFQQjg4Q3poUC5RRg==', 'Content-Type': 'application/x-www-form-urlencoded'}}
4.773 request code=9Ck4767MTXSfcN_bEKGwgtC8myCtMuSUXvaZksa1Z5I.CpkrBguCSNOpbbBrEyTjtJVhrilPcl3cZik9ZW8zBV4&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=zf92pM1RToLEe9KS
5.039 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
5.04 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoibUFXVzJtNGxnVWxXQ0ctRXFobHVkZyIsImF1ZCI6WyJjZWY3NDY2NC1kYzQzLTQzMmMtYTNkMi02YzZmYjc1MTMzMDgiXSwiYXV0aF90aW1lIjoxNTI5NzUyMzcxLCJjX2hhc2giOiJjcndSQ2hLSE1mVE9RaHRneHRkNEJnIiwiZXhwIjoxNTI5NzU2MDAxLCJpYXQiOjE1Mjk3NTI0MDIsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjhiOTJmNjY5LTEzYWMtNDFhOS1iY2FlLTA4NDk2YTNjMjcxMiIsIm5vbmNlIjoiUmFlTFhjZmpUYUlzbWVJZyIsInJhdCI6MTUyOTc1MjM5OCwic3ViIjoiZm9vQGJhci5jb20ifQ.YOfjjcNkpuBO8RMLv1kYSNblPu9KyNdeamMKDxsmaHMGtSROtWT7PTG4uKp2zw5TduFIFC-z5Gc41oNwdq4mY21OP1M4VK3o0ThBe7jGEcmP42RgWDuShTmJ2kyO40DYVpB4wCsCPjeKBezgLcBlqLHvXic3sMoFLgrSvzzVj4indEbIGFJ0RhVeGdNPZ1s3w6YoWHUSt0xZnhhbC4OvmidWAQJvFkD5Q5MeKCImnkslofArULTdskRhf9kwCLU1Q6-nvRBnO8wXw-o0Wea9jy9EDU7zz0oRUy3tEgJMgoKa_wltDj-2Z-8iYMW_S7qYTjX7JrEAuj8uGfHCbMbBvpbSqzqjc76MVyQKd3FDAqsmWqLzLj5Csuv004H8MHvsqa7DGKOhpODgXU9OL1l_c2lHqylr7-NVgrtFkc8EiIq3iIzhqwDUcb-ZWT_RE67Dqb1hiOFBj3wOCj7Zv1zZuFeeT5K2fPdFHEdoickhl1UtMvvuzF4haoCkOmc_Alx-H6-ZtvrGov6E_BK_JiUsoSmdDiPXzzr0npX1TePXIDfS_AcoHZzkwlCp2X_TIuwwYfyFlry2nCgeSl3JVPo97Us27i9VUS4mLUJROvenDxnA1_ebmBC0LXU49VnhCTKBZ3G4z5o8tmC8AVKD4_G178Mm5_ReZ0hEmo0dKY0msr8', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'zx1RrBlt-Ye-nqkJvz76ojOHOHGuF-5j01rWB3H2-4U.uYMdKxk25XjXuDaQim2it91DBYYC6Tz8jn_UdSqC7Y0', 'scope': 'openid'}
5.119 AccessTokenResponse {
"access_token": "zx1RrBlt-Ye-nqkJvz76ojOHOHGuF-5j01rWB3H2-4U.uYMdKxk25XjXuDaQim2it91DBYYC6Tz8jn_UdSqC7Y0",
"expires_in": 3599,
"id_token": {
"at_hash": "mAWW2m4lgUlWCG-Eqhludg",
"aud": [
"cef74664-dc43-432c-a3d2-6c6fb7513308"
],
"auth_time": 1529752371,
"c_hash": "crwRChKHMfTOQhtgxtd4Bg",
"exp": 1529756001,
"iat": 1529752402,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "8b92f669-13ac-41a9-bcae-08496a3c2712",
"nonce": "RaeLXcfjTaIsmeIg",
"rat": 1529752398,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
5.119 phase <--<-- 6 --- TimeDelay -->-->
35.149 phase <--<-- 7 --- AccessToken -->-->
35.149 --> request op_args: {'state': 'zf92pM1RToLEe9KS'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
35.149 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'zf92pM1RToLEe9KS', 'code': '9Ck4767MTXSfcN_bEKGwgtC8myCtMuSUXvaZksa1Z5I.CpkrBguCSNOpbbBrEyTjtJVhrilPcl3cZik9ZW8zBV4', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'cef74664-dc43-432c-a3d2-6c6fb7513308'}, 'state': 'zf92pM1RToLEe9KS'}
35.149 AccessTokenRequest {
"code": "9Ck4767MTXSfcN_bEKGwgtC8myCtMuSUXvaZksa1Z5I.CpkrBguCSNOpbbBrEyTjtJVhrilPcl3cZik9ZW8zBV4",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "zf92pM1RToLEe9KS"
}
35.149 request_url https://oidc-certification.ory.sh:8443/oauth2/token
35.149 request_http_args {'headers': {'Authorization': 'Basic Y2VmNzQ2NjQtZGM0My00MzJjLWEzZDItNmM2ZmI3NTEzMzA4OkFQQjg4Q3poUC5RRg==', 'Content-Type': 'application/x-www-form-urlencoded'}}
35.149 request code=9Ck4767MTXSfcN_bEKGwgtC8myCtMuSUXvaZksa1Z5I.CpkrBguCSNOpbbBrEyTjtJVhrilPcl3cZik9ZW8zBV4&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=zf92pM1RToLEe9KS
35.363 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:400 message:{"error":"invalid_grant","error_description":"The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client","status_code":400,"error_debug":"The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found."}
35.363 response {'error_debug': 'The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found.', 'error_description': 'The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client', 'error': 'invalid_grant', 'status_code': 400}
35.363 event Got expected error
35.364 TokenErrorResponse {
"error": "invalid_grant",
"error_debug": "The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found.",
"error_description": "The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client",
"status_code": 400
}
35.364 phase <--<-- 8 --- Done -->-->
35.364 end
35.364 assertion VerifyResponse
35.364 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
35.364 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-OAuth-2nd-Revokes.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-OAuth-2nd-Revokes
Test description: Trying to use authorization code twice should result in revoking previously issued access tokens
Timestamp: 2018-06-23T11:14:00Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.001 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.083 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.084 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.084 phase <--<-- 2 --- Registration -->-->
0.084 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.085 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#TO9u8AB4TvCRTg8S"
],
"response_types": [
"code token"
]
}
0.242 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.243 RegistrationResponse {
"client_id": "0a335476-15b2-4b37-9c97-874e06d02837",
"client_secret": "vkyAwLiSg5Qm",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "0a335476-15b2-4b37-9c97-874e06d02837",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#TO9u8AB4TvCRTg8S"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.243 phase <--<-- 3 --- Note -->-->
1.362 phase <--<-- 4 --- AsyncAuthn -->-->
1.363 AuthorizationRequest {
"client_id": "0a335476-15b2-4b37-9c97-874e06d02837",
"nonce": "xuTCpTR2l1MbpyAp",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "qYwZo4ytMEDViTvb"
}
1.363 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=0a335476-15b2-4b37-9c97-874e06d02837&state=qYwZo4ytMEDViTvb&response_type=code+token&nonce=xuTCpTR2l1MbpyAp
1.363 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=0a335476-15b2-4b37-9c97-874e06d02837&state=qYwZo4ytMEDViTvb&response_type=code+token&nonce=xuTCpTR2l1MbpyAp
5.556 http args {}
5.721 response URL with fragment
5.721 response access_token=Ps5IZDxvWzylOq5MLH1hrDItBkY2gJ_YY3JuVCpu2o0.mKNHY6voLebyXgVf3i94CRo4YMk0eEevoYsbNWEEOF0&code=LULXxF4WvDIwGvfDKFIVe1a5IX76JQbXXXfgWwl7_Qo.fqu6AFFkSq1HIVTwHWFdelKcAh1mnOJ3CI0nFQv5L30&expires_in=3599&scope=openid&state=qYwZo4ytMEDViTvb&token_type=bearer
5.722 response {'scope': 'openid', 'code': 'LULXxF4WvDIwGvfDKFIVe1a5IX76JQbXXXfgWwl7_Qo.fqu6AFFkSq1HIVTwHWFdelKcAh1mnOJ3CI0nFQv5L30', 'access_token': 'Ps5IZDxvWzylOq5MLH1hrDItBkY2gJ_YY3JuVCpu2o0.mKNHY6voLebyXgVf3i94CRo4YMk0eEevoYsbNWEEOF0', 'state': 'qYwZo4ytMEDViTvb', 'expires_in': 3599, 'token_type': 'bearer'}
5.722 AuthorizationResponse {
"access_token": "Ps5IZDxvWzylOq5MLH1hrDItBkY2gJ_YY3JuVCpu2o0.mKNHY6voLebyXgVf3i94CRo4YMk0eEevoYsbNWEEOF0",
"code": "LULXxF4WvDIwGvfDKFIVe1a5IX76JQbXXXfgWwl7_Qo.fqu6AFFkSq1HIVTwHWFdelKcAh1mnOJ3CI0nFQv5L30",
"expires_in": 3599,
"scope": "openid",
"state": "qYwZo4ytMEDViTvb",
"token_type": "bearer"
}
5.722 phase <--<-- 5 --- AccessToken -->-->
5.722 --> request op_args: {'state': 'qYwZo4ytMEDViTvb'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
5.722 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'qYwZo4ytMEDViTvb', 'code': 'LULXxF4WvDIwGvfDKFIVe1a5IX76JQbXXXfgWwl7_Qo.fqu6AFFkSq1HIVTwHWFdelKcAh1mnOJ3CI0nFQv5L30', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '0a335476-15b2-4b37-9c97-874e06d02837'}, 'state': 'qYwZo4ytMEDViTvb'}
5.722 AccessTokenRequest {
"code": "LULXxF4WvDIwGvfDKFIVe1a5IX76JQbXXXfgWwl7_Qo.fqu6AFFkSq1HIVTwHWFdelKcAh1mnOJ3CI0nFQv5L30",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "qYwZo4ytMEDViTvb"
}
5.723 request_url https://oidc-certification.ory.sh:8443/oauth2/token
5.723 request_http_args {'headers': {'Authorization': 'Basic MGEzMzU0NzYtMTViMi00YjM3LTljOTctODc0ZTA2ZDAyODM3OnZreUF3TGlTZzVRbQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
5.723 request code=LULXxF4WvDIwGvfDKFIVe1a5IX76JQbXXXfgWwl7_Qo.fqu6AFFkSq1HIVTwHWFdelKcAh1mnOJ3CI0nFQv5L30&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=qYwZo4ytMEDViTvb
5.946 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
5.947 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiN19aLXRfV0RsNkkwMmw1THF3amtfUSIsImF1ZCI6WyIwYTMzNTQ3Ni0xNWIyLTRiMzctOWM5Ny04NzRlMDZkMDI4MzciXSwiYXV0aF90aW1lIjoxNTI5NzUyMzcxLCJjX2hhc2giOiJnRHFnMWxuajV2SWFFNV9OaWRLZHhBIiwiZXhwIjoxNTI5NzU2MDM5LCJpYXQiOjE1Mjk3NTI0NDAsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImExN2YxODc1LWU3NTEtNDI0NC05ODcyLTY5N2QxNGYzMjc2YyIsIm5vbmNlIjoieHVUQ3BUUjJsMU1icHlBcCIsInJhdCI6MTUyOTc1MjQzNiwic3ViIjoiZm9vQGJhci5jb20ifQ.IeEkSyPgq2zgbfgiSpqdWIfM7Go5TkeDdfXLM5btDPDS0I-cK78fEyCB58cs-oGjFmxKQz0aVvWfvK57PDTYYx8IQILnXhIRqxXsI7gT4BM_0sl70if13FshWiJQIkEaQcrVxca8EWOk7q5pgQmRxC056_Hz4kdvmlrhS7AhIpbq6___4D-A6MldNIKx1Bia12U8pcdCXlQazRYituHDxn1nVhDUhzQ8Gv6O0sIBsSNayVqjIsr-O7m7MiWi_mdB2mKjtXodI7EUzOtmSvjb3otz71N8QQvR6Q8CRvgiULcu3UchJ_83RIjYhPFDAcRV9Gxe7TN93FG6h2H71gZZKZupXkwl2IHCeT-5EBw2VDm-5_v7JukGKZ57jNUhJmKt7mp7pKus1QNw-5KVLF8a1hL72XiR1KM_Tej58-CmUIeor7luUIeT9oWUTxnGgf43NIu_Rdk1qJtGQdhCtXiqunyQx_kdMmfbTlu1D9_aAEPtNH6R9p8_u71fgXWFpq_Fx5T6wnqFeV3JTJA1TO_ij81DkyA9D0EtLVpLMfXvy6KjUAeEwdVvXBr626_TIR413RInrN_ZJxXZngcETgSeNPhG-u2qS2C5n6w0mhJ_STRD2YrmMQcl2-rs4AYb3B9TZEuL7FQ8Bu_xmV0e-19T4toVDi2v3H8noWLdnoLoiNo', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': '5jNbpI04MgkXaCaAUVeqRLTj6GFs_ZyCrJuXNrFlMnU.qDfHOomlBCkWmovNMqsY5Li93ey5t1TNuMFGRWYxfV8', 'scope': 'openid'}
6.034 AccessTokenResponse {
"access_token": "5jNbpI04MgkXaCaAUVeqRLTj6GFs_ZyCrJuXNrFlMnU.qDfHOomlBCkWmovNMqsY5Li93ey5t1TNuMFGRWYxfV8",
"expires_in": 3599,
"id_token": {
"at_hash": "7_Z-t_WDl6I02l5Lqwjk_Q",
"aud": [
"0a335476-15b2-4b37-9c97-874e06d02837"
],
"auth_time": 1529752371,
"c_hash": "gDqg1lnj5vIaE5_NidKdxA",
"exp": 1529756039,
"iat": 1529752440,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "a17f1875-e751-4244-9872-697d14f3276c",
"nonce": "xuTCpTR2l1MbpyAp",
"rat": 1529752436,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
6.034 phase <--<-- 6 --- AccessToken -->-->
6.034 --> request op_args: {'state': 'qYwZo4ytMEDViTvb'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
6.034 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'qYwZo4ytMEDViTvb', 'code': 'LULXxF4WvDIwGvfDKFIVe1a5IX76JQbXXXfgWwl7_Qo.fqu6AFFkSq1HIVTwHWFdelKcAh1mnOJ3CI0nFQv5L30', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '0a335476-15b2-4b37-9c97-874e06d02837'}, 'state': 'qYwZo4ytMEDViTvb'}
6.035 AccessTokenRequest {
"code": "LULXxF4WvDIwGvfDKFIVe1a5IX76JQbXXXfgWwl7_Qo.fqu6AFFkSq1HIVTwHWFdelKcAh1mnOJ3CI0nFQv5L30",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "qYwZo4ytMEDViTvb"
}
6.035 request_url https://oidc-certification.ory.sh:8443/oauth2/token
6.035 request_http_args {'headers': {'Authorization': 'Basic MGEzMzU0NzYtMTViMi00YjM3LTljOTctODc0ZTA2ZDAyODM3OnZreUF3TGlTZzVRbQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
6.035 request code=LULXxF4WvDIwGvfDKFIVe1a5IX76JQbXXXfgWwl7_Qo.fqu6AFFkSq1HIVTwHWFdelKcAh1mnOJ3CI0nFQv5L30&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=qYwZo4ytMEDViTvb
6.194 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:400 message:{"error":"invalid_grant","error_description":"The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client","status_code":400,"error_debug":"The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found."}
6.195 response {'error_debug': 'The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found.', 'error_description': 'The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client', 'error': 'invalid_grant', 'status_code': 400}
6.195 event Got expected error
6.195 TokenErrorResponse {
"error": "invalid_grant",
"error_debug": "The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found.",
"error_description": "The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client",
"status_code": 400
}
6.195 phase <--<-- 7 --- UserInfo -->-->
6.196 do_user_info_request kwargs:{'state': 'qYwZo4ytMEDViTvb', 'method': 'GET', 'authn_method': 'bearer_header'}
6.196 request {'body': None}
6.196 request_url https://oidc-certification.ory.sh:8443/userinfo
6.196 request_http_args {'headers': {'Authorization': 'Bearer 5jNbpI04MgkXaCaAUVeqRLTj6GFs_ZyCrJuXNrFlMnU.qDfHOomlBCkWmovNMqsY5Li93ey5t1TNuMFGRWYxfV8'}}
6.301 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:401 message:{"error":"request_unauthorized","error_description":"The request could not be authorized","error_hint":"Check that you provided valid credentials in the right format.","status_code":401,"error_debug":"A validator returned an error"}
6.301 event Expected error not received: got request_unauthorized
6.302 ErrorResponse {
"error": "request_unauthorized",
"error_debug": "A validator returned an error",
"error_description": "The request could not be authorized",
"error_hint": "Check that you provided valid credentials in the right format.",
"status_code": 401
}
6.302 ErrorResponse {
"error": "request_unauthorized",
"error_debug": "A validator returned an error",
"error_description": "The request could not be authorized",
"error_hint": "Check that you provided valid credentials in the right format.",
"status_code": 401
}
6.302 phase <--<-- 8 --- Done -->-->
6.302 end
6.302 assertion VerifyResponse
6.303 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
6.303 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-OAuth-2nd.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-OAuth-2nd
Test description: Trying to use authorization code twice should result in an error
Timestamp: 2018-06-23T11:13:14Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Registration -->-->
0.074 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.075 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#NHcINjpjqJb2NAAC"
],
"response_types": [
"code token"
]
}
0.23 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.231 RegistrationResponse {
"client_id": "067e554b-8c35-498f-b62a-89fd2714734c",
"client_secret": "LTVaLgmZ.sx1",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "067e554b-8c35-498f-b62a-89fd2714734c",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#NHcINjpjqJb2NAAC"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.231 phase <--<-- 3 --- Note -->-->
1.396 phase <--<-- 4 --- AsyncAuthn -->-->
1.397 AuthorizationRequest {
"client_id": "067e554b-8c35-498f-b62a-89fd2714734c",
"nonce": "Lbm6TxMWupcBULhy",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "5kOSP1Szu9sSUcww"
}
1.397 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=067e554b-8c35-498f-b62a-89fd2714734c&state=5kOSP1Szu9sSUcww&response_type=code+token&nonce=Lbm6TxMWupcBULhy
1.397 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=067e554b-8c35-498f-b62a-89fd2714734c&state=5kOSP1Szu9sSUcww&response_type=code+token&nonce=Lbm6TxMWupcBULhy
4.733 http args {}
4.912 response URL with fragment
4.912 response access_token=V_PZr89J7ppQZPgzy6bwqZ48Bv19RwH9lYgvSIRypq0.Mm5uq9Gnb6WCdZunKHvq7pOx6ct5NVgSdv_bLALGsHA&code=J5ECtZMNR8RNPhDSn-2mCIYCdYBLK8cNpST0uuT7qDM.jO3CmvR0C1ryUEhrbJl29J3sN5WmMDs2vv1ExYfKBCk&expires_in=3599&scope=openid&state=5kOSP1Szu9sSUcww&token_type=bearer
4.912 response {'scope': 'openid', 'code': 'J5ECtZMNR8RNPhDSn-2mCIYCdYBLK8cNpST0uuT7qDM.jO3CmvR0C1ryUEhrbJl29J3sN5WmMDs2vv1ExYfKBCk', 'access_token': 'V_PZr89J7ppQZPgzy6bwqZ48Bv19RwH9lYgvSIRypq0.Mm5uq9Gnb6WCdZunKHvq7pOx6ct5NVgSdv_bLALGsHA', 'state': '5kOSP1Szu9sSUcww', 'expires_in': 3599, 'token_type': 'bearer'}
4.913 AuthorizationResponse {
"access_token": "V_PZr89J7ppQZPgzy6bwqZ48Bv19RwH9lYgvSIRypq0.Mm5uq9Gnb6WCdZunKHvq7pOx6ct5NVgSdv_bLALGsHA",
"code": "J5ECtZMNR8RNPhDSn-2mCIYCdYBLK8cNpST0uuT7qDM.jO3CmvR0C1ryUEhrbJl29J3sN5WmMDs2vv1ExYfKBCk",
"expires_in": 3599,
"scope": "openid",
"state": "5kOSP1Szu9sSUcww",
"token_type": "bearer"
}
4.913 phase <--<-- 5 --- AccessToken -->-->
4.913 --> request op_args: {'state': '5kOSP1Szu9sSUcww'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
4.913 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': '5kOSP1Szu9sSUcww', 'code': 'J5ECtZMNR8RNPhDSn-2mCIYCdYBLK8cNpST0uuT7qDM.jO3CmvR0C1ryUEhrbJl29J3sN5WmMDs2vv1ExYfKBCk', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '067e554b-8c35-498f-b62a-89fd2714734c'}, 'state': '5kOSP1Szu9sSUcww'}
4.913 AccessTokenRequest {
"code": "J5ECtZMNR8RNPhDSn-2mCIYCdYBLK8cNpST0uuT7qDM.jO3CmvR0C1ryUEhrbJl29J3sN5WmMDs2vv1ExYfKBCk",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "5kOSP1Szu9sSUcww"
}
4.913 request_url https://oidc-certification.ory.sh:8443/oauth2/token
4.913 request_http_args {'headers': {'Authorization': 'Basic MDY3ZTU1NGItOGMzNS00OThmLWI2MmEtODlmZDI3MTQ3MzRjOkxUVmFMZ21aLnN4MQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
4.913 request code=J5ECtZMNR8RNPhDSn-2mCIYCdYBLK8cNpST0uuT7qDM.jO3CmvR0C1ryUEhrbJl29J3sN5WmMDs2vv1ExYfKBCk&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=5kOSP1Szu9sSUcww
5.129 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
5.13 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiRWJJVHA0VWQzLWxraFBXSmVnRmJSQSIsImF1ZCI6WyIwNjdlNTU0Yi04YzM1LTQ5OGYtYjYyYS04OWZkMjcxNDczNGMiXSwiYXV0aF90aW1lIjoxNTI5NzUyMzcxLCJjX2hhc2giOiJadWlJdThpZFdLTVVkUU1kM0lrM013IiwiZXhwIjoxNTI5NzU1OTkzLCJpYXQiOjE1Mjk3NTIzOTMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImJjYzViMDI1LTk4YmUtNDdiOS04MTNiLThkNjcyMGJkZjVjZSIsIm5vbmNlIjoiTGJtNlR4TVd1cGNCVUxoeSIsInJhdCI6MTUyOTc1MjM5MCwic3ViIjoiZm9vQGJhci5jb20ifQ.h0xvCaBMHTd6WiWBsbFRHHWr6pXWOQZkPIXzBIF-2CM2zHVmFhzl-pJ4ZUNI1Tbg8Wz_9MAPkypecEIT0LYTV1Kz5xDIoaNXYzV4jB9Zv26fZ1esxu2MyYecmYK7uM5Cah8LRHvblBPVoZkMNq0vyc6S_JJi1F3xWevvhisul24NjOKTv3rgAMIPjADgQQ0we3oQ8d5Inhq5-uHU57XiLJJ8HhcXVp9pKNrYTpMk7lFZDK4OZw6NR6H-sKn9-xwWFrf3PvV1YWEflmABRGVROKIGYEDLDOpaerT2LCoFN28idRdV2hFTJ-y8pcVLX3SJ_agV0PiY-fUBqz9MtQWitmLh8JioG2i-jNpCz9cE4hKYrP6CZaVuTF8yXCQm7GvY_jG1jDCAtsttUOaajSwlIfdRHENZy-kbFX_AFolMG4RAc1bCzdWPvZJdSRjF8XVJyD0VQCI1eU6c2BIsN1i0ebX7zmcD2Q_MCEhxEmpxvYb6ZWOlMi4O9Og1d8_NCrBLtylIa4wGRJCnlL3g9x9jD6E1oBsMxZVp3FEi2JqBNnTxY6NJFQT9-g3Ms5hIaRNT3GGk8XUMSWUWNba9qinnE_Kqb1tsqF3MesfAM1qLQja9RmYFsXJ9kQwVZPRvc38lQT8vq74_dz_sS1v4-vOlN-ZF4_7FWAfn6XAavzTAXSg', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'GJUAp7cW1YoX7rsW84qgM7f0wSmSTsQDEAT0Z4teO1s.VQq5_R7uBMfxPPz_XfE8fzRdsSywqPez_NHHfZ8QgwQ', 'scope': 'openid'}
5.22 AccessTokenResponse {
"access_token": "GJUAp7cW1YoX7rsW84qgM7f0wSmSTsQDEAT0Z4teO1s.VQq5_R7uBMfxPPz_XfE8fzRdsSywqPez_NHHfZ8QgwQ",
"expires_in": 3599,
"id_token": {
"at_hash": "EbITp4Ud3-lkhPWJegFbRA",
"aud": [
"067e554b-8c35-498f-b62a-89fd2714734c"
],
"auth_time": 1529752371,
"c_hash": "ZuiIu8idWKMUdQMd3Ik3Mw",
"exp": 1529755993,
"iat": 1529752393,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "bcc5b025-98be-47b9-813b-8d6720bdf5ce",
"nonce": "Lbm6TxMWupcBULhy",
"rat": 1529752390,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
5.221 phase <--<-- 6 --- AccessToken -->-->
5.221 --> request op_args: {'state': '5kOSP1Szu9sSUcww'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
5.221 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': '5kOSP1Szu9sSUcww', 'code': 'J5ECtZMNR8RNPhDSn-2mCIYCdYBLK8cNpST0uuT7qDM.jO3CmvR0C1ryUEhrbJl29J3sN5WmMDs2vv1ExYfKBCk', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '067e554b-8c35-498f-b62a-89fd2714734c'}, 'state': '5kOSP1Szu9sSUcww'}
5.221 AccessTokenRequest {
"code": "J5ECtZMNR8RNPhDSn-2mCIYCdYBLK8cNpST0uuT7qDM.jO3CmvR0C1ryUEhrbJl29J3sN5WmMDs2vv1ExYfKBCk",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "5kOSP1Szu9sSUcww"
}
5.221 request_url https://oidc-certification.ory.sh:8443/oauth2/token
5.221 request_http_args {'headers': {'Authorization': 'Basic MDY3ZTU1NGItOGMzNS00OThmLWI2MmEtODlmZDI3MTQ3MzRjOkxUVmFMZ21aLnN4MQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
5.221 request code=J5ECtZMNR8RNPhDSn-2mCIYCdYBLK8cNpST0uuT7qDM.jO3CmvR0C1ryUEhrbJl29J3sN5WmMDs2vv1ExYfKBCk&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=5kOSP1Szu9sSUcww
5.389 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:400 message:{"error":"invalid_grant","error_description":"The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client","status_code":400,"error_debug":"The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found."}
5.389 response {'error_debug': 'The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found.', 'error_description': 'The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client', 'error': 'invalid_grant', 'status_code': 400}
5.389 event Got expected error
5.389 TokenErrorResponse {
"error": "invalid_grant",
"error_debug": "The authorization code has already been used.Additionally, an error occurred during processing the refresh token revocation: Not found.",
"error_description": "The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client",
"status_code": 400
}
5.39 phase <--<-- 7 --- Done -->-->
5.39 end
5.39 assertion VerifyResponse
5.39 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
5.39 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-prompt-login.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-prompt-login
Test description: Request with prompt=login
Timestamp: 2018-06-23T11:09:43Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.074 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Registration -->-->
0.075 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.076 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#apXOC3OsrsDK4AdK"
],
"response_types": [
"code token"
]
}
0.265 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.266 RegistrationResponse {
"client_id": "46129dfb-46de-4ce5-b4b3-2fc9bb0d277a",
"client_secret": "XvyjqE-MZ1vS",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "46129dfb-46de-4ce5-b4b3-2fc9bb0d277a",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#apXOC3OsrsDK4AdK"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.266 phase <--<-- 3 --- AsyncAuthn -->-->
0.267 AuthorizationRequest {
"client_id": "46129dfb-46de-4ce5-b4b3-2fc9bb0d277a",
"nonce": "iOLag6g7ApsPGGIC",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "OxJonVCISKJ4sXea"
}
0.267 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=46129dfb-46de-4ce5-b4b3-2fc9bb0d277a&state=OxJonVCISKJ4sXea&response_type=code+token&nonce=iOLag6g7ApsPGGIC
0.267 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=46129dfb-46de-4ce5-b4b3-2fc9bb0d277a&state=OxJonVCISKJ4sXea&response_type=code+token&nonce=iOLag6g7ApsPGGIC
3.102 http args {}
3.267 response URL with fragment
3.267 response access_token=TgJaoA1C4IMLuilHPMxJyY010vTUhsI42YVJD0RcK4c.SNBvg6Jh7g-0LYSRetKDiv9nM5eI7ygEJAt1q6FnwVI&code=hyQrdNXgUqzRupJeArU1QnhlbRvHze82lU1unLgt-f4.0cSlW7ILAfGe1SPHroXbMDjOPngPA3ZZ4QU5EUwqn4s&expires_in=3599&scope=openid&state=OxJonVCISKJ4sXea&token_type=bearer
3.267 response {'scope': 'openid', 'code': 'hyQrdNXgUqzRupJeArU1QnhlbRvHze82lU1unLgt-f4.0cSlW7ILAfGe1SPHroXbMDjOPngPA3ZZ4QU5EUwqn4s', 'access_token': 'TgJaoA1C4IMLuilHPMxJyY010vTUhsI42YVJD0RcK4c.SNBvg6Jh7g-0LYSRetKDiv9nM5eI7ygEJAt1q6FnwVI', 'state': 'OxJonVCISKJ4sXea', 'expires_in': 3599, 'token_type': 'bearer'}
3.268 AuthorizationResponse {
"access_token": "TgJaoA1C4IMLuilHPMxJyY010vTUhsI42YVJD0RcK4c.SNBvg6Jh7g-0LYSRetKDiv9nM5eI7ygEJAt1q6FnwVI",
"code": "hyQrdNXgUqzRupJeArU1QnhlbRvHze82lU1unLgt-f4.0cSlW7ILAfGe1SPHroXbMDjOPngPA3ZZ4QU5EUwqn4s",
"expires_in": 3599,
"scope": "openid",
"state": "OxJonVCISKJ4sXea",
"token_type": "bearer"
}
3.268 phase <--<-- 4 --- AccessToken -->-->
3.268 --> request op_args: {'state': 'OxJonVCISKJ4sXea'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.268 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'OxJonVCISKJ4sXea', 'code': 'hyQrdNXgUqzRupJeArU1QnhlbRvHze82lU1unLgt-f4.0cSlW7ILAfGe1SPHroXbMDjOPngPA3ZZ4QU5EUwqn4s', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '46129dfb-46de-4ce5-b4b3-2fc9bb0d277a'}, 'state': 'OxJonVCISKJ4sXea'}
3.269 AccessTokenRequest {
"code": "hyQrdNXgUqzRupJeArU1QnhlbRvHze82lU1unLgt-f4.0cSlW7ILAfGe1SPHroXbMDjOPngPA3ZZ4QU5EUwqn4s",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "OxJonVCISKJ4sXea"
}
3.269 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.269 request_http_args {'headers': {'Authorization': 'Basic NDYxMjlkZmItNDZkZS00Y2U1LWI0YjMtMmZjOWJiMGQyNzdhOlh2eWpxRS1NWjF2Uw==', 'Content-Type': 'application/x-www-form-urlencoded'}}
3.269 request code=hyQrdNXgUqzRupJeArU1QnhlbRvHze82lU1unLgt-f4.0cSlW7ILAfGe1SPHroXbMDjOPngPA3ZZ4QU5EUwqn4s&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=OxJonVCISKJ4sXea
3.493 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.494 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiQll0Nmgtampub25NNnVxbkFUSHpXZyIsImF1ZCI6WyI0NjEyOWRmYi00NmRlLTRjZTUtYjRiMy0yZmM5YmIwZDI3N2EiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiJGYXU1SC1nQUZ0SGxRREpFOU9SRERBIiwiZXhwIjoxNTI5NzU1Nzc1LCJpYXQiOjE1Mjk3NTIxNzYsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjY1ZDMwNWY5LTgzYjEtNDBhNi1hMzUwLTViYWQyMzA2ZGUyNCIsIm5vbmNlIjoiaU9MYWc2ZzdBcHNQR0dJQyIsInJhdCI6MTUyOTc1MjE3Mywic3ViIjoiZm9vQGJhci5jb20ifQ.iHYA-WUzduyd2acTVNm6-7SYyM0jLRFtC7vg1EwnqxpOkXjBBNk_2ufC6ApJgpG76Rwr_oCSyCTLwM7zc8DftlrsX33OK3-VQymY7yKu3woxRMK3fKhIIo9w41H28Ww1BPRDORb0WQeagHtD9x_cAkrRNTRr9DbFPyk4BO2IEmlLt6gF-aUDctuh8Lu5iab_Lwv9ShSmg1z4WHrgkFwaankPpGwrSCh_kH5v9JsQoM6rSpzj3qUpSs4VZVbBmCtjX7jh1ptIgGbzqRkgtd8tqu4v1jHp2Ca6MLs0hjfGLgyRx_NXgCOvWPAu3jwqlRhrcWVFztpjH-OhD9PBWqc5ayDFEK6_E95J3DsrqhlZBLaZPS1cetF0twpwV_ixFta4GYAnoxRgRQpf4LE9-0d2D7Jn_nLxzBFVUUsbhYwVPT0zEsPgz2tP_BZPZYEh_c282aXhbQxv-eNLVCeTWhpNqak6V6Z5kPnAh6hJk88dN1HapAY7nQb5xerlCKVVZVj4v6BTNG_bsXsNxRbBvRgtgRba0wKeaW-HoKg_vJAg8n7L1cxVqf_p24kKZl4z9P4JotwO2nUtRvyphz1mc_QoxXN477qPcY-fsCaNu_bS_aXfZE-YtAQMqRSy5LY6UmQ4tqNNUYIbQzW9J3p1zV5r0xqY-QiI8_RpQ6ehNqZcUh4', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'zuI4-to027AyzbpRYXE94xcvjIaNgROr9NnyqdVQrZk.qY06G82A45RCtVIEOMta15weQOrP_yHaNtK2impXru4', 'scope': 'openid'}
3.578 AccessTokenResponse {
"access_token": "zuI4-to027AyzbpRYXE94xcvjIaNgROr9NnyqdVQrZk.qY06G82A45RCtVIEOMta15weQOrP_yHaNtK2impXru4",
"expires_in": 3599,
"id_token": {
"at_hash": "BYt6h-jjnonM6uqnATHzWg",
"aud": [
"46129dfb-46de-4ce5-b4b3-2fc9bb0d277a"
],
"auth_time": 1529751824,
"c_hash": "Fau5H-gAFtHlQDJE9ORDDA",
"exp": 1529755775,
"iat": 1529752176,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "65d305f9-83b1-40a6-a350-5bad2306de24",
"nonce": "iOLag6g7ApsPGGIC",
"rat": 1529752173,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.578 phase <--<-- 5 --- Note -->-->
5.202 phase <--<-- 6 --- AsyncAuthn -->-->
5.203 AuthorizationRequest {
"client_id": "46129dfb-46de-4ce5-b4b3-2fc9bb0d277a",
"nonce": "m9WEakyAVyeDBYe2",
"prompt": [
"login"
],
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "erD64EP0yuZD53Mr"
}
5.203 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=login&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=46129dfb-46de-4ce5-b4b3-2fc9bb0d277a&state=erD64EP0yuZD53Mr&response_type=code+token&nonce=m9WEakyAVyeDBYe2
5.203 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=login&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=46129dfb-46de-4ce5-b4b3-2fc9bb0d277a&state=erD64EP0yuZD53Mr&response_type=code+token&nonce=m9WEakyAVyeDBYe2
10.247 http args {}
10.412 response URL with fragment
10.412 response access_token=u1MSz7I4ZGlyzo6b8QM7GJBa5eZlB1DC1N86xSL2Sk4.ZxnXCbq_Oo0MvUmeMilHE-kJNAvlFijYR_awdq47Ciw&code=K-JATHbuFAeRJyqSuZJtwkUwsmi05mvCuzVwQUdfUGU.Bl2Ts0YiPZeuPwuLQarNbnilJzLpFDanDPYeBhyrgEo&expires_in=3599&scope=openid&state=erD64EP0yuZD53Mr&token_type=bearer
10.413 response {'scope': 'openid', 'code': 'K-JATHbuFAeRJyqSuZJtwkUwsmi05mvCuzVwQUdfUGU.Bl2Ts0YiPZeuPwuLQarNbnilJzLpFDanDPYeBhyrgEo', 'access_token': 'u1MSz7I4ZGlyzo6b8QM7GJBa5eZlB1DC1N86xSL2Sk4.ZxnXCbq_Oo0MvUmeMilHE-kJNAvlFijYR_awdq47Ciw', 'state': 'erD64EP0yuZD53Mr', 'expires_in': 3599, 'token_type': 'bearer'}
10.413 AuthorizationResponse {
"access_token": "u1MSz7I4ZGlyzo6b8QM7GJBa5eZlB1DC1N86xSL2Sk4.ZxnXCbq_Oo0MvUmeMilHE-kJNAvlFijYR_awdq47Ciw",
"code": "K-JATHbuFAeRJyqSuZJtwkUwsmi05mvCuzVwQUdfUGU.Bl2Ts0YiPZeuPwuLQarNbnilJzLpFDanDPYeBhyrgEo",
"expires_in": 3599,
"scope": "openid",
"state": "erD64EP0yuZD53Mr",
"token_type": "bearer"
}
10.413 phase <--<-- 7 --- AccessToken -->-->
10.414 --> request op_args: {'state': 'erD64EP0yuZD53Mr'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
10.414 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'erD64EP0yuZD53Mr', 'code': 'K-JATHbuFAeRJyqSuZJtwkUwsmi05mvCuzVwQUdfUGU.Bl2Ts0YiPZeuPwuLQarNbnilJzLpFDanDPYeBhyrgEo', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '46129dfb-46de-4ce5-b4b3-2fc9bb0d277a'}, 'state': 'erD64EP0yuZD53Mr'}
10.414 AccessTokenRequest {
"code": "K-JATHbuFAeRJyqSuZJtwkUwsmi05mvCuzVwQUdfUGU.Bl2Ts0YiPZeuPwuLQarNbnilJzLpFDanDPYeBhyrgEo",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "erD64EP0yuZD53Mr"
}
10.414 request_url https://oidc-certification.ory.sh:8443/oauth2/token
10.414 request_http_args {'headers': {'Authorization': 'Basic NDYxMjlkZmItNDZkZS00Y2U1LWI0YjMtMmZjOWJiMGQyNzdhOlh2eWpxRS1NWjF2Uw==', 'Content-Type': 'application/x-www-form-urlencoded'}}
10.414 request code=K-JATHbuFAeRJyqSuZJtwkUwsmi05mvCuzVwQUdfUGU.Bl2Ts0YiPZeuPwuLQarNbnilJzLpFDanDPYeBhyrgEo&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=erD64EP0yuZD53Mr
10.629 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
10.631 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoieG1UMlNIZ0d0MDlzNm14ZnVSckhnUSIsImF1ZCI6WyI0NjEyOWRmYi00NmRlLTRjZTUtYjRiMy0yZmM5YmIwZDI3N2EiXSwiYXV0aF90aW1lIjoxNTI5NzUyMTgwLCJjX2hhc2giOiJ0VTJBbDFvZlRFbWoxcWhqcjlHZU93IiwiZXhwIjoxNTI5NzU1NzgyLCJpYXQiOjE1Mjk3NTIxODMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImJmOGQ1ZWJhLWRkZWQtNDhiMi1iNWMzLWQ1MjkxYmY2OTFlMyIsIm5vbmNlIjoibTlXRWFreUFWeWVEQlllMiIsInJhdCI6MTUyOTc1MjE3OCwic3ViIjoiZm9vQGJhci5jb20ifQ.oszdUgDh87_vssed3cxeMyY1MI1INzaM2m096WeRtGduR4kRWR48M8Le1WEbRNebs4zPwXc_AK5Z6Ptc-_aeJSsveSBaKiREW3l_eY0ids4LnCyY4hgn-wSxYI61uki25fbXBIUtzudCbF8E2iQGYMNaNtIENflhfggj8laceOhti3zvqIzGzYJ4e7ZpSTAFcra0JKiy-7e3Xj_k7emPCZRgknApZNvdSqh2Su9ZATWlP6Kw_nhj9Jq_f6cZYPxE-kZJq7B2kkt2aE8w3lGKdIPckyIkT5qxvdGTsxcQTgce62Auwo9HZCT857_OMYhzlgpUlKNJmptwkbKpcTKHXzUtOhoJLS76z4Ojaxcjl64OreUz3UD0pno7klClsB6s-N__lpJWl8ppRktf7vnbXXMCmKERCad0nrVMLfQ2uP-ILczUHDaMXx_xqli0fFLHtbOhsa8VrkTnOxHRMnBTKt8X4Ahxn6AYtBY602ifUsBz0GewZRUTI2f6oQVUBwGem_CckXt_aX0NrOa9wT8N8bp_A0jsd4NRAfmtIQiikHG6pZc1swC8S_xkansH3ZPLPKLtu41hEbFc_AcmcS0Axu3GIrHPeCS6VAOzsW222jd-zSvbRQk1IDMURpf5mn9883d0ZKIUCWg36Ru5wDlS942R5G-K9aBroph-kXdHiiY', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'qnjfvcCk1AN2abJCo01DuPgOH2kcOg64zB1fMH-yiPk.73vJqGoDhRwDnoCyvU5aaHHkAj-g1THxNv8O5QsIANE', 'scope': 'openid'}
10.634 AccessTokenResponse {
"access_token": "qnjfvcCk1AN2abJCo01DuPgOH2kcOg64zB1fMH-yiPk.73vJqGoDhRwDnoCyvU5aaHHkAj-g1THxNv8O5QsIANE",
"expires_in": 3599,
"id_token": {
"at_hash": "xmT2SHgGt09s6mxfuRrHgQ",
"aud": [
"46129dfb-46de-4ce5-b4b3-2fc9bb0d277a"
],
"auth_time": 1529752180,
"c_hash": "tU2Al1ofTEmj1qhjr9GeOw",
"exp": 1529755782,
"iat": 1529752183,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "bf8d5eba-dded-48b2-b5c3-d5291bf691e3",
"nonce": "m9WEakyAVyeDBYe2",
"rat": 1529752178,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
10.634 phase <--<-- 8 --- Done -->-->
10.634 end
10.635 assertion VerifyResponse
10.635 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
10.635 assertion MultipleSignOn
10.635 condition multiple-sign-on: status=OK [Verifies that multiple authentications was used in the flow]
10.635 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
multiple-sign-on: status=OK [Verifies that multiple authentications was used in the flow]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-prompt-none-LoggedIn.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-prompt-none-LoggedIn
Test description: Request with prompt=none when logged in [Basic, Implicit, Hybrid]
Timestamp: 2018-06-23T11:09:50Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.074 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Registration -->-->
0.076 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.076 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#QHz8PAN4mAwfTljs"
],
"response_types": [
"code token"
]
}
0.249 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.25 RegistrationResponse {
"client_id": "8616b2ed-eb41-423e-8d4e-080b94121381",
"client_secret": "Tr-~sK6hK9UM",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "8616b2ed-eb41-423e-8d4e-080b94121381",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#QHz8PAN4mAwfTljs"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.25 phase <--<-- 3 --- AsyncAuthn -->-->
0.251 AuthorizationRequest {
"client_id": "8616b2ed-eb41-423e-8d4e-080b94121381",
"nonce": "ptpOxE41QHnFN3jV",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "jHgw5n1ivdkZwNJs"
}
0.251 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=8616b2ed-eb41-423e-8d4e-080b94121381&state=jHgw5n1ivdkZwNJs&response_type=code+token&nonce=ptpOxE41QHnFN3jV
0.251 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=8616b2ed-eb41-423e-8d4e-080b94121381&state=jHgw5n1ivdkZwNJs&response_type=code+token&nonce=ptpOxE41QHnFN3jV
2.397 http args {}
2.562 response URL with fragment
2.562 response access_token=41aA7XZ4nFKZCWw_gA9y2MfJqd40gDBD8GsuPuTE9zg.bP6hjkp4cya44FEH2EenK5pZDc16wEs05Rizn4xwDss&code=NZeUWsP4nC1jZm0wx8-C2ZqIpLeldV4boPzWQDrPfNY.eoBxi7S3jNVlnYfrfImcO59VwtS9q0Hi8ssIlpm6P4M&expires_in=3599&scope=openid&state=jHgw5n1ivdkZwNJs&token_type=bearer
2.562 response {'scope': 'openid', 'code': 'NZeUWsP4nC1jZm0wx8-C2ZqIpLeldV4boPzWQDrPfNY.eoBxi7S3jNVlnYfrfImcO59VwtS9q0Hi8ssIlpm6P4M', 'access_token': '41aA7XZ4nFKZCWw_gA9y2MfJqd40gDBD8GsuPuTE9zg.bP6hjkp4cya44FEH2EenK5pZDc16wEs05Rizn4xwDss', 'state': 'jHgw5n1ivdkZwNJs', 'expires_in': 3599, 'token_type': 'bearer'}
2.562 AuthorizationResponse {
"access_token": "41aA7XZ4nFKZCWw_gA9y2MfJqd40gDBD8GsuPuTE9zg.bP6hjkp4cya44FEH2EenK5pZDc16wEs05Rizn4xwDss",
"code": "NZeUWsP4nC1jZm0wx8-C2ZqIpLeldV4boPzWQDrPfNY.eoBxi7S3jNVlnYfrfImcO59VwtS9q0Hi8ssIlpm6P4M",
"expires_in": 3599,
"scope": "openid",
"state": "jHgw5n1ivdkZwNJs",
"token_type": "bearer"
}
2.563 phase <--<-- 4 --- AccessToken -->-->
2.563 --> request op_args: {'state': 'jHgw5n1ivdkZwNJs'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.563 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'jHgw5n1ivdkZwNJs', 'code': 'NZeUWsP4nC1jZm0wx8-C2ZqIpLeldV4boPzWQDrPfNY.eoBxi7S3jNVlnYfrfImcO59VwtS9q0Hi8ssIlpm6P4M', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '8616b2ed-eb41-423e-8d4e-080b94121381'}, 'state': 'jHgw5n1ivdkZwNJs'}
2.563 AccessTokenRequest {
"code": "NZeUWsP4nC1jZm0wx8-C2ZqIpLeldV4boPzWQDrPfNY.eoBxi7S3jNVlnYfrfImcO59VwtS9q0Hi8ssIlpm6P4M",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "jHgw5n1ivdkZwNJs"
}
2.563 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.563 request_http_args {'headers': {'Authorization': 'Basic ODYxNmIyZWQtZWI0MS00MjNlLThkNGUtMDgwYjk0MTIxMzgxOlRyLSU3RXNLNmhLOVVN', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.563 request code=NZeUWsP4nC1jZm0wx8-C2ZqIpLeldV4boPzWQDrPfNY.eoBxi7S3jNVlnYfrfImcO59VwtS9q0Hi8ssIlpm6P4M&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=jHgw5n1ivdkZwNJs
2.775 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.776 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiR21MdVhBRUY0ZXlyS1RJM0dWQ3l4dyIsImF1ZCI6WyI4NjE2YjJlZC1lYjQxLTQyM2UtOGQ0ZS0wODBiOTQxMjEzODEiXSwiYXV0aF90aW1lIjoxNTI5NzUyMTgwLCJjX2hhc2giOiJ5YUppcGJ1VTBpV01XbUdHb0xRb1R3IiwiZXhwIjoxNTI5NzU1Nzg4LCJpYXQiOjE1Mjk3NTIxODgsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjExY2VlMGQxLTQ0YTYtNDkxMy1iMjFiLTE1ZGJiZDM5MTBiMSIsIm5vbmNlIjoicHRwT3hFNDFRSG5GTjNqViIsInJhdCI6MTUyOTc1MjE4Niwic3ViIjoiZm9vQGJhci5jb20ifQ.a4mzXh0v_5rwpF2I1V8-twU8GK3Vqa9BFaPZ9L1sraMD4rFiX6tSzKz0ezMa8TDmUtB8CsbQgrGbbkR6HzUn0GqWH81oIy34EgaEhYGXhDl8if7-dRFDEp2dzrZc10ZOsU38Yg5cjctZeAuUgfu84zaTlEuk3iR_DJO10do4gCWH88xgmNNCJngOfYkW_HQV4pL86T_y9IqrrKMDVqCZfVTqQA5xkYHbft-3lWAXNeK8xKBn-4jUZSt4fH4QjWYSUppnoWoSxVLOMIPXQ5D2gfHndPAaKTs9nCpZEeFC8n3S1Vkr6k0PML2-weEz-94z-HZygCmTT4mk-Nvth1flZm6ORlSFOri1XkEizsOlecM3A7naCQfsudj1OnpCA_G84-k1MEzb742BfYgbgeRhVD80AZcn0_tG9wt8qQpebi3YaTBcUI-wsOUtrUJn6jTTF-C599rEMc_WeEcsiGxY0H0VdCDfc6c_p6Z_mBR0vyodqvAm4HO_INyo0eE11lBmF5WcpqrGTjJtJNc7vLYvCeoYIDeP06205PAGycdhUoQXWXFfdl_k_ukamel-T5UNxwUmJB3lJtUVf2ahXMNhG5lRjwZSt7GRTHVOoiCjfw9MsuRA5CoGXyO9Ca5EYJ9P8fh6IzEqwmGtyFzKyjcQT66KXhMYUWKWzcd3oW6Luxs', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'wcaMkhqM_VIF9V59UB4zM5ULZZbf7Hiz20v-xHefn7g.D8Jo4Hh7DaRoOzOhhGKeS_SMQHCFpa2P2ALaQzpFg5A', 'scope': 'openid'}
2.854 AccessTokenResponse {
"access_token": "wcaMkhqM_VIF9V59UB4zM5ULZZbf7Hiz20v-xHefn7g.D8Jo4Hh7DaRoOzOhhGKeS_SMQHCFpa2P2ALaQzpFg5A",
"expires_in": 3599,
"id_token": {
"at_hash": "GmLuXAEF4eyrKTI3GVCyxw",
"aud": [
"8616b2ed-eb41-423e-8d4e-080b94121381"
],
"auth_time": 1529752180,
"c_hash": "yaJipbuU0iWMWmGGoLQoTw",
"exp": 1529755788,
"iat": 1529752188,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "11cee0d1-44a6-4913-b21b-15dbbd3910b1",
"nonce": "ptpOxE41QHnFN3jV",
"rat": 1529752186,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
2.854 phase <--<-- 5 --- AsyncAuthn -->-->
2.854 AuthorizationRequest {
"client_id": "8616b2ed-eb41-423e-8d4e-080b94121381",
"nonce": "P1s15HmhPqqo9Vqa",
"prompt": [
"none"
],
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "ksubE9NSygqtC2Pb"
}
2.854 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=8616b2ed-eb41-423e-8d4e-080b94121381&state=ksubE9NSygqtC2Pb&response_type=code+token&nonce=P1s15HmhPqqo9Vqa
2.854 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=8616b2ed-eb41-423e-8d4e-080b94121381&state=ksubE9NSygqtC2Pb&response_type=code+token&nonce=P1s15HmhPqqo9Vqa
3.726 http args {}
3.896 response URL with fragment
3.896 response access_token=xDBfhkgUhrtbLjYvrdRmE1rJW57AMUITr9usVut_m5w.zVE5l20JBIeHrNePMS3ekwzl9vWblMRLAhMB_FNRBSY&code=kuqq-BujRSOFqK8D-fvgqB-vl9Ae981SsVQsvDHdEws.ioBl-4Qpm4CZ1Eh_wdqH00mKPKB43EjnXpFXP_CnoQM&expires_in=3599&scope=openid&state=ksubE9NSygqtC2Pb&token_type=bearer
3.897 response {'scope': 'openid', 'code': 'kuqq-BujRSOFqK8D-fvgqB-vl9Ae981SsVQsvDHdEws.ioBl-4Qpm4CZ1Eh_wdqH00mKPKB43EjnXpFXP_CnoQM', 'access_token': 'xDBfhkgUhrtbLjYvrdRmE1rJW57AMUITr9usVut_m5w.zVE5l20JBIeHrNePMS3ekwzl9vWblMRLAhMB_FNRBSY', 'state': 'ksubE9NSygqtC2Pb', 'expires_in': 3599, 'token_type': 'bearer'}
3.897 AuthorizationResponse {
"access_token": "xDBfhkgUhrtbLjYvrdRmE1rJW57AMUITr9usVut_m5w.zVE5l20JBIeHrNePMS3ekwzl9vWblMRLAhMB_FNRBSY",
"code": "kuqq-BujRSOFqK8D-fvgqB-vl9Ae981SsVQsvDHdEws.ioBl-4Qpm4CZ1Eh_wdqH00mKPKB43EjnXpFXP_CnoQM",
"expires_in": 3599,
"scope": "openid",
"state": "ksubE9NSygqtC2Pb",
"token_type": "bearer"
}
3.897 phase <--<-- 6 --- AccessToken -->-->
3.898 --> request op_args: {'state': 'ksubE9NSygqtC2Pb'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.898 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'ksubE9NSygqtC2Pb', 'code': 'kuqq-BujRSOFqK8D-fvgqB-vl9Ae981SsVQsvDHdEws.ioBl-4Qpm4CZ1Eh_wdqH00mKPKB43EjnXpFXP_CnoQM', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '8616b2ed-eb41-423e-8d4e-080b94121381'}, 'state': 'ksubE9NSygqtC2Pb'}
3.898 AccessTokenRequest {
"code": "kuqq-BujRSOFqK8D-fvgqB-vl9Ae981SsVQsvDHdEws.ioBl-4Qpm4CZ1Eh_wdqH00mKPKB43EjnXpFXP_CnoQM",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "ksubE9NSygqtC2Pb"
}
3.898 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.898 request_http_args {'headers': {'Authorization': 'Basic ODYxNmIyZWQtZWI0MS00MjNlLThkNGUtMDgwYjk0MTIxMzgxOlRyLSU3RXNLNmhLOVVN', 'Content-Type': 'application/x-www-form-urlencoded'}}
3.898 request code=kuqq-BujRSOFqK8D-fvgqB-vl9Ae981SsVQsvDHdEws.ioBl-4Qpm4CZ1Eh_wdqH00mKPKB43EjnXpFXP_CnoQM&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=ksubE9NSygqtC2Pb
4.124 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
4.125 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiWGdqUnBianI2SkZEVlBsZ0gxTDloQSIsImF1ZCI6WyI4NjE2YjJlZC1lYjQxLTQyM2UtOGQ0ZS0wODBiOTQxMjEzODEiXSwiYXV0aF90aW1lIjoxNTI5NzUyMTgwLCJjX2hhc2giOiJpcFR1YVNmZVRjVjJlaVhPREZqNWZ3IiwiZXhwIjoxNTI5NzU1Nzg5LCJpYXQiOjE1Mjk3NTIxODksImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjY2ZDEwZDcxLTI1NmItNDVlNS1hMjAwLTc5ZjczYWE2ZTRjNyIsIm5vbmNlIjoiUDFzMTVIbWhQcXFvOVZxYSIsInJhdCI6MTUyOTc1MjE4OCwic3ViIjoiZm9vQGJhci5jb20ifQ.hmbYqaIgjCw6hZz1lzsQfH5OUVIyQEHtMBbzwmxUN9nGmXlEZQiZRHOi4KilqKzPxKtzFz_rauvVWH3pB2VO60Cp46nmUriayw5MQaQgd0Jzs9UgtcAUW2KZEV-cWJ8rG2Y5WBrw_audnPXp36WcpYSiveIHdTTRR_m3bhEziQQuXsBreZMfsJpSupoZWhzs7x23uXW8mDdm3oIXsIzbr4gAQLoFGHFUKb3e4btR0ytoPZdVmjxfz7J4ZcuSGb4_wKG_p7L6RsQh_1WfV9CDvCt9EdlvMocz8XNwavtEqtXrrgj-Lfb3QCP6ia7_1A6UNeH0RMv9Ycn1SgWafkr4KIZRgaB-4-8xME5f7Gl-PpHcvhFrB6bsMnHOXaxys1HM47BhQ4QbNjv5s-h8yLwOBVb2w22pIFBUHza2jixIYnyhicVeYitnSrMtR2ZkUShIrpOnXgEua-uqWSAnT4HI7sKtCs3s4RsqiDI19Z2pkexAxbj-Ooc1CRDPiLqBn1Po9bmab_X2vE6EMiAK9BxdnaGfZ4-PfKKVTN-Q70MhUXsnobkDwt0xBwRSTzTmxiknrwzLOcYb0lu_FHZ4ygAbkycWu6-ceemHVplF4aqa4YRa6w3_stu8S_jX15M_Qj2eBVp6D2tUPxCK9TEvECDYhaHyjdqW6zZobqCIERbzvJI', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'cwehpIVHPMzNBjR9469DA96PMZPdAwBq-UMzWuZ5knU.IzuPRzaKYY9BVcO0mBa3HEXyGvxnNKrVtw_A_Bb5kS4', 'scope': 'openid'}
4.128 AccessTokenResponse {
"access_token": "cwehpIVHPMzNBjR9469DA96PMZPdAwBq-UMzWuZ5knU.IzuPRzaKYY9BVcO0mBa3HEXyGvxnNKrVtw_A_Bb5kS4",
"expires_in": 3599,
"id_token": {
"at_hash": "XgjRpbjr6JFDVPlgH1L9hA",
"aud": [
"8616b2ed-eb41-423e-8d4e-080b94121381"
],
"auth_time": 1529752180,
"c_hash": "ipTuaSfeTcV2eiXODFj5fw",
"exp": 1529755789,
"iat": 1529752189,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "66d10d71-256b-45e5-a200-79f73aa6e4c7",
"nonce": "P1s15HmhPqqo9Vqa",
"rat": 1529752188,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
4.129 phase <--<-- 7 --- Done -->-->
4.129 end
4.129 assertion VerifyResponse
4.129 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.13 assertion SameAuthn
4.13 condition same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
4.13 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-prompt-none-NotLoggedIn.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-prompt-none-NotLoggedIn
Test description: Request with prompt=none when not logged in
Timestamp: 2018-06-23T11:10:00Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.319 phase <--<-- 1 --- Webfinger -->-->
1.32 not expected to do WebFinger
1.32 phase <--<-- 2 --- Discovery -->-->
1.32 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.427 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.429 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.429 phase <--<-- 3 --- Registration -->-->
1.429 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.429 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#R5N4FB4YvdyYPvg1"
],
"response_types": [
"code token"
]
}
1.594 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.595 RegistrationResponse {
"client_id": "8ba3a1af-39ee-401a-9eaf-bf2afb787334",
"client_secret": "DGQJ6KqrSXaD",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "8ba3a1af-39ee-401a-9eaf-bf2afb787334",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#R5N4FB4YvdyYPvg1"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.595 phase <--<-- 4 --- AsyncAuthn -->-->
1.596 AuthorizationRequest {
"client_id": "8ba3a1af-39ee-401a-9eaf-bf2afb787334",
"nonce": "lycmpiUZCLQi69Q6",
"prompt": [
"none"
],
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "X4W2AL2JjZTUAkRz"
}
1.596 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=8ba3a1af-39ee-401a-9eaf-bf2afb787334&state=X4W2AL2JjZTUAkRz&response_type=code+token&nonce=lycmpiUZCLQi69Q6
1.596 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=8ba3a1af-39ee-401a-9eaf-bf2afb787334&state=X4W2AL2JjZTUAkRz&response_type=code+token&nonce=lycmpiUZCLQi69Q6
1.986 http args {}
2.17 response URL with fragment
2.17 response error=login_required&error_debug=Prompt+%2522none%2522+was+requested%252C+but+no+existing+login+session+was+found&error_description=The+Authorization+Server+requires+End-User+authentication&state=X4W2AL2JjZTUAkRz
2.171 response {'error_debug': 'Prompt %22none%22 was requested%2C but no existing login session was found', 'error_description': 'The Authorization Server requires End-User authentication', 'state': 'X4W2AL2JjZTUAkRz', 'error': 'login_required'}
2.171 AuthorizationErrorResponse {
"error": "login_required",
"error_debug": "Prompt %22none%22 was requested%2C but no existing login session was found",
"error_description": "The Authorization Server requires End-User authentication",
"state": "X4W2AL2JjZTUAkRz"
}
2.171 AuthorizationErrorResponse {
"error": "login_required",
"error_debug": "Prompt %22none%22 was requested%2C but no existing login session was found",
"error_description": "The Authorization Server requires End-User authentication",
"state": "X4W2AL2JjZTUAkRz"
}
2.171 phase <--<-- 5 --- Done -->-->
2.171 end
2.172 assertion VerifyErrorMessage
2.172 condition verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
2.172 condition Done: status=OK
============================================================
Conditions
verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-redirect_uri-Missing.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-Missing
Test description: Reject request without redirect_uri when multiple registered
Timestamp: 2018-06-23T11:10:07Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.082 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.083 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.083 phase <--<-- 2 --- Registration -->-->
0.083 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb', 'https://op.certification.openid.net:61353/cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.083 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb",
"https://op.certification.openid.net:61353/cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#msWrcQUIcj1Rtxpv"
],
"response_types": [
"code token"
]
}
0.29 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.291 RegistrationResponse {
"client_id": "2049baf9-fb14-4025-b7fd-518edaa7c290",
"client_secret": "DfWTu-QypP3h",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "2049baf9-fb14-4025-b7fd-518edaa7c290",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb",
"https://op.certification.openid.net:61353/cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#msWrcQUIcj1Rtxpv"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.291 phase <--<-- 3 --- Note -->-->
============================================================
Conditions
============================================================
RESULT: PARTIAL RESULT |
Text | hydra/internal/certification/CT.F.T.T.s/OP-redirect_uri-NotReg.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-NotReg
Test description: Sent redirect_uri does not match a registered redirect_uri
Timestamp: 2018-06-23T11:10:11Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.112 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.113 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.113 phase <--<-- 2 --- Registration -->-->
0.113 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.114 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#OJVLW8A01ZidfGzS"
],
"response_types": [
"code token"
]
}
0.27 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.271 RegistrationResponse {
"client_id": "158a15ea-9292-4580-a32a-58b9d15253fe",
"client_secret": "qQstNct7Xwcg",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "158a15ea-9292-4580-a32a-58b9d15253fe",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#OJVLW8A01ZidfGzS"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.271 phase <--<-- 3 --- Note -->-->
============================================================
Conditions
============================================================
RESULT: PARTIAL RESULT |
Text | hydra/internal/certification/CT.F.T.T.s/OP-redirect_uri-Query-Added.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-Query-Added
Test description: Request with redirect_uri with query component when registered redirect_uri has no query component
Timestamp: 2018-06-23T11:10:14Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.074 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Registration -->-->
0.075 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.075 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#AW4aIvOzMRk7Kttx"
],
"response_types": [
"code token"
]
}
0.231 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.232 RegistrationResponse {
"client_id": "df6b1516-674e-45ee-bec9-bfe1191dcc79",
"client_secret": "j5LiuCwl-5lB",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "df6b1516-674e-45ee-bec9-bfe1191dcc79",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#AW4aIvOzMRk7Kttx"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.232 phase <--<-- 3 --- Note -->-->
============================================================
Conditions
============================================================
RESULT: PARTIAL RESULT |
Text | hydra/internal/certification/CT.F.T.T.s/OP-redirect_uri-Query-Mismatch.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-Query-Mismatch
Test description: Rejects redirect_uri when query parameter does not match what is registed
Timestamp: 2018-06-23T11:10:18Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.128 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.129 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.129 phase <--<-- 2 --- Registration -->-->
0.13 register kwargs:{'application_name': 'OIC test tool', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'redirect_uri': ['https://op.certification.openid.net:61353/authz_cb?foo=bar']}
0.13 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#NB1APxePYRhOjh9r"
],
"response_types": [
"code token"
]
}
0.294 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.295 RegistrationResponse {
"client_id": "3f1f3670-92b2-4d46-b6df-521cbd8223b1",
"client_secret": "gxcU9tLFj862",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "3f1f3670-92b2-4d46-b6df-521cbd8223b1",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#NB1APxePYRhOjh9r"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.295 phase <--<-- 3 --- Note -->-->
============================================================
Conditions
============================================================
RESULT: PARTIAL RESULT |
Text | hydra/internal/certification/CT.F.T.T.s/OP-redirect_uri-Query-OK.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-Query-OK
Test description: Request with a redirect_uri with a query component when a redirect_uri with the same query component is registered
Timestamp: 2018-06-23T11:10:23Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Registration -->-->
0.074 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb?foo=bar'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.075 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb?foo=bar"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#LTnmU7BNcenhVEXW"
],
"response_types": [
"code token"
]
}
0.263 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.264 RegistrationResponse {
"client_id": "618ca6bf-64b9-44f8-8b03-21918799226d",
"client_secret": "rg3eQ.AtUZgH",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "618ca6bf-64b9-44f8-8b03-21918799226d",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb?foo=bar"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#LTnmU7BNcenhVEXW"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.264 phase <--<-- 3 --- AsyncAuthn -->-->
0.265 AuthorizationRequest {
"client_id": "618ca6bf-64b9-44f8-8b03-21918799226d",
"nonce": "VoO5o83qN2ll7V1I",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb?foo=bar",
"response_type": "code token",
"scope": "openid",
"state": "QrOslzfc6AL19yfd"
}
0.265 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb%3Ffoo%3Dbar&client_id=618ca6bf-64b9-44f8-8b03-21918799226d&state=QrOslzfc6AL19yfd&response_type=code+token&nonce=VoO5o83qN2ll7V1I
0.265 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb%3Ffoo%3Dbar&client_id=618ca6bf-64b9-44f8-8b03-21918799226d&state=QrOslzfc6AL19yfd&response_type=code+token&nonce=VoO5o83qN2ll7V1I
2.696 http args {'foo': 'bar'}
2.857 response URL with fragment
2.858 response access_token=KwsY84KZ6XB9r-KKgFX369oVKYj5ny8UggEiub4O__0.tVulsPUeI3o46vKKSJVY5GK0o_600BGYYnQTUxnjbGc&code=ra_JS4fX04G8-wfglJUjy1daKqks-i-Xw1UqVHIB52M.EHRpRguWwoJJPU9wNLb3Mx4Cjpkq62AwH3V3vktAYK4&expires_in=3599&scope=openid&state=QrOslzfc6AL19yfd&token_type=bearer
2.858 response {'scope': 'openid', 'code': 'ra_JS4fX04G8-wfglJUjy1daKqks-i-Xw1UqVHIB52M.EHRpRguWwoJJPU9wNLb3Mx4Cjpkq62AwH3V3vktAYK4', 'access_token': 'KwsY84KZ6XB9r-KKgFX369oVKYj5ny8UggEiub4O__0.tVulsPUeI3o46vKKSJVY5GK0o_600BGYYnQTUxnjbGc', 'state': 'QrOslzfc6AL19yfd', 'expires_in': 3599, 'token_type': 'bearer'}
2.858 AuthorizationResponse {
"access_token": "KwsY84KZ6XB9r-KKgFX369oVKYj5ny8UggEiub4O__0.tVulsPUeI3o46vKKSJVY5GK0o_600BGYYnQTUxnjbGc",
"code": "ra_JS4fX04G8-wfglJUjy1daKqks-i-Xw1UqVHIB52M.EHRpRguWwoJJPU9wNLb3Mx4Cjpkq62AwH3V3vktAYK4",
"expires_in": 3599,
"scope": "openid",
"state": "QrOslzfc6AL19yfd",
"token_type": "bearer"
}
2.859 phase <--<-- 4 --- Done -->-->
2.859 end
2.859 assertion VerifyResponse
2.86 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.86 assertion CheckQueryPart
2.86 condition check-query-part: status=OK [Check that a query part send in the Authorization Request is returned in the Authorization response.]
2.86 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
check-query-part: status=OK [Check that a query part send in the Authorization Request is returned in the Authorization response.]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-redirect_uri-RegFrag.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-RegFrag
Test description: Reject registration where a redirect_uri has a fragment
Timestamp: 2018-06-23T11:10:24Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Registration -->-->
0.075 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb#foobar'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.075 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb#foobar"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#tnH7frFliJbD8ra6"
],
"response_types": [
"code token"
]
}
0.152 http response url:https://oidc-certification.ory.sh:8443/clients status_code:400 message:{"error":"invalid_request","error_description":"The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed","error_hint":"Redirect URIs must not contain fragments (#)","status_code":400}
0.153 ErrorResponse {
"error": "invalid_request",
"error_description": "The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed",
"error_hint": "Redirect URIs must not contain fragments (#)",
"status_code": 400
}
0.153 exception RegistrationError:{'error_description': 'The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed', 'status_code': 400, 'error': 'invalid_request', 'error_hint': 'Redirect URIs must not contain fragments (#)'}
0.153 event got expected exception RegistrationError
0.153 phase <--<-- 3 --- Done -->-->
0.153 end
0.153 assertion VerifyErrorMessage
0.153 condition verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
0.153 condition Done: status=OK
============================================================
Conditions
verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-Registration-Dynamic.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-Dynamic
Test description: Client registration request
Timestamp: 2018-06-23T11:06:30Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Registration -->-->
0.075 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.075 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#vm3vFJ5nwj4aMCVk"
],
"response_types": [
"code token"
]
}
0.268 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.269 RegistrationResponse {
"client_id": "cf931555-2216-46c8-95ad-abfa2a51f367",
"client_secret": "gIvZC~UX-7E7",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "cf931555-2216-46c8-95ad-abfa2a51f367",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#vm3vFJ5nwj4aMCVk"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.269 phase <--<-- 3 --- Done -->-->
0.269 end
0.27 assertion CheckHTTPResponse
0.27 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.27 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-Registration-Endpoint.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-Endpoint
Test description: Verify that registration_endpoint is published
Timestamp: 2018-06-23T11:06:31Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.071 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.073 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.073 phase <--<-- 2 --- Done -->-->
0.073 end
0.073 assertion VerifyOPHasRegistrationEndpoint
0.073 condition verify-op-has-registration-endpoint: status=OK [Verify that the OP has a registration endpoint]
0.073 condition Done: status=OK
============================================================
Conditions
verify-op-has-registration-endpoint: status=OK [Verify that the OP has a registration endpoint]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-Registration-jwks.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-jwks
Test description: Uses keys registered with jwks value
Timestamp: 2018-06-23T11:06:37Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.075 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.076 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.076 phase <--<-- 2 --- Registration -->-->
0.077 register kwargs:{'application_name': 'OIC test tool', 'jwks': {'keys': [{'use': 'enc', 'kty': 'RSA', 'n': 'pKXuY5tuT9ibmEcq4B6VRx3MafdSsajrOndAk5FjJFedlA6qSpdqDUr9wWUkNeO8h_efdLfg43CHXk3mH6Fp1t2gbHzBQ4-SzT3_X5tsdG2PPqvngem7f5NHO6Kefhq11Zk5q4-FyTL9FUQQW6ZANbrU7GifSAs82Ck20ciIvFdv7cPCphk_THMVv14aW5w0eKEXumgx4Bc7HrQFXQUHSze3dVAKg8hKHDIQOGUU0fkolEFmOC4Gb-G57RpBJryZxXqgdUdEG66xl1f37tqpYgaLViFDWDiI8S7BMVHEbGHN4-f_MD9f6gMduaxrL6a6SfyIW1So2VqtvlAyanesTw', 'e': 'AQAB', 'kid': 'gtH4v3Yr2QqLreBSz0ByQQ8vkf8eFo1KIit3s-3Bbww'}, {'use': 'sig', 'kty': 'RSA', 'n': '1Z8lhYNb0tHZsVrzIQs-JetNCLIBWeOHXblcirxQgFLt6z4Rr-9vxPbEsrmRmZbPuuoL8nGehqOK11LAgqa1QfCR4TKxr2srlbTv4A4Gyf-suhO_KKt0JWv2q9olREZcoIE4FCwK0vuWTqD5q4qL_uqt_kHltzhdkJ4LySdCRCbxG1kcEcXoPNIhZERttqbZTIQviJxJ2HqC7CbwocmZMnbMAzP52bVX86vLxosmI-pqkG1RG8jMTZMhvc2GmYe6CfleW7bRxS0078sWDM_iACSQVOqLk5rcW_C-a61EYzNNN7BMw-VxFSDtoGgNgb6XGM6FTf9fkdJjIRL2VZAt0Q', 'e': 'AQAB', 'kid': 'wt25OgyR_nzG3OoQ7daa2rL6-gMnFdfRzBjhUVPu8RQ'}, {'x': 'aruz0ufjUGuEQwg2Q3ewyy5DnEIWWmIEO5stN8MfUTA', 'use': 'sig', 'kty': 'EC', 'y': 'dZnZMUOQAvzOD6q1f11PEho4-aX7nWdmive8zdxUbrA', 'crv': 'P-256', 'kid': 'AZXCzT401BtqezIxAdHOEez1ApQUu3O5hjcfRFKxXtQ'}, {'x': 'AeI9gyN_hcFae8vO2HgaH7Fh-MVX1YXJdWg-T16g1kM', 'use': 'enc', 'kty': 'EC', 'y': '5ASt8rCvPWTKMAh6wvR8_-OEbl_9TTkkgAd7LXW8H48', 'crv': 'P-256', 'kid': 'CrXNdVSdrZ-lOToSPso6OlcZnP-Et4U9CzOIZOZPvLw'}]}, 'token_endpoint_auth_method': 'private_key_jwt', 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'grant_types': ['authorization_code', 'implicit'], 'response_types': ['code token'], 'url': 'https://oidc-certification.ory.sh:8443/clients', 'application_type': 'web'}
0.078 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks": {
"keys": [
{
"e": "AQAB",
"kid": "gtH4v3Yr2QqLreBSz0ByQQ8vkf8eFo1KIit3s-3Bbww",
"kty": "RSA",
"n": "pKXuY5tuT9ibmEcq4B6VRx3MafdSsajrOndAk5FjJFedlA6qSpdqDUr9wWUkNeO8h_efdLfg43CHXk3mH6Fp1t2gbHzBQ4-SzT3_X5tsdG2PPqvngem7f5NHO6Kefhq11Zk5q4-FyTL9FUQQW6ZANbrU7GifSAs82Ck20ciIvFdv7cPCphk_THMVv14aW5w0eKEXumgx4Bc7HrQFXQUHSze3dVAKg8hKHDIQOGUU0fkolEFmOC4Gb-G57RpBJryZxXqgdUdEG66xl1f37tqpYgaLViFDWDiI8S7BMVHEbGHN4-f_MD9f6gMduaxrL6a6SfyIW1So2VqtvlAyanesTw",
"use": "enc"
},
{
"e": "AQAB",
"kid": "wt25OgyR_nzG3OoQ7daa2rL6-gMnFdfRzBjhUVPu8RQ",
"kty": "RSA",
"n": "1Z8lhYNb0tHZsVrzIQs-JetNCLIBWeOHXblcirxQgFLt6z4Rr-9vxPbEsrmRmZbPuuoL8nGehqOK11LAgqa1QfCR4TKxr2srlbTv4A4Gyf-suhO_KKt0JWv2q9olREZcoIE4FCwK0vuWTqD5q4qL_uqt_kHltzhdkJ4LySdCRCbxG1kcEcXoPNIhZERttqbZTIQviJxJ2HqC7CbwocmZMnbMAzP52bVX86vLxosmI-pqkG1RG8jMTZMhvc2GmYe6CfleW7bRxS0078sWDM_iACSQVOqLk5rcW_C-a61EYzNNN7BMw-VxFSDtoGgNgb6XGM6FTf9fkdJjIRL2VZAt0Q",
"use": "sig"
},
{
"crv": "P-256",
"kid": "AZXCzT401BtqezIxAdHOEez1ApQUu3O5hjcfRFKxXtQ",
"kty": "EC",
"use": "sig",
"x": "aruz0ufjUGuEQwg2Q3ewyy5DnEIWWmIEO5stN8MfUTA",
"y": "dZnZMUOQAvzOD6q1f11PEho4-aX7nWdmive8zdxUbrA"
},
{
"crv": "P-256",
"kid": "CrXNdVSdrZ-lOToSPso6OlcZnP-Et4U9CzOIZOZPvLw",
"kty": "EC",
"use": "enc",
"x": "AeI9gyN_hcFae8vO2HgaH7Fh-MVX1YXJdWg-T16g1kM",
"y": "5ASt8rCvPWTKMAh6wvR8_-OEbl_9TTkkgAd7LXW8H48"
}
]
},
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#bM8OSfFM3LCukR0z"
],
"response_types": [
"code token"
],
"token_endpoint_auth_method": "private_key_jwt"
}
0.232 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.233 RegistrationResponse {
"client_id": "00b815c9-9f8b-40a7-8469-ce57e30605c9",
"client_secret": "IoYVxiPx4n8y",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "00b815c9-9f8b-40a7-8469-ce57e30605c9",
"jwks": {
"keys": [
{
"e": "AQAB",
"kid": "gtH4v3Yr2QqLreBSz0ByQQ8vkf8eFo1KIit3s-3Bbww",
"kty": "RSA",
"n": "pKXuY5tuT9ibmEcq4B6VRx3MafdSsajrOndAk5FjJFedlA6qSpdqDUr9wWUkNeO8h_efdLfg43CHXk3mH6Fp1t2gbHzBQ4-SzT3_X5tsdG2PPqvngem7f5NHO6Kefhq11Zk5q4-FyTL9FUQQW6ZANbrU7GifSAs82Ck20ciIvFdv7cPCphk_THMVv14aW5w0eKEXumgx4Bc7HrQFXQUHSze3dVAKg8hKHDIQOGUU0fkolEFmOC4Gb-G57RpBJryZxXqgdUdEG66xl1f37tqpYgaLViFDWDiI8S7BMVHEbGHN4-f_MD9f6gMduaxrL6a6SfyIW1So2VqtvlAyanesTw",
"use": "enc"
},
{
"e": "AQAB",
"kid": "wt25OgyR_nzG3OoQ7daa2rL6-gMnFdfRzBjhUVPu8RQ",
"kty": "RSA",
"n": "1Z8lhYNb0tHZsVrzIQs-JetNCLIBWeOHXblcirxQgFLt6z4Rr-9vxPbEsrmRmZbPuuoL8nGehqOK11LAgqa1QfCR4TKxr2srlbTv4A4Gyf-suhO_KKt0JWv2q9olREZcoIE4FCwK0vuWTqD5q4qL_uqt_kHltzhdkJ4LySdCRCbxG1kcEcXoPNIhZERttqbZTIQviJxJ2HqC7CbwocmZMnbMAzP52bVX86vLxosmI-pqkG1RG8jMTZMhvc2GmYe6CfleW7bRxS0078sWDM_iACSQVOqLk5rcW_C-a61EYzNNN7BMw-VxFSDtoGgNgb6XGM6FTf9fkdJjIRL2VZAt0Q",
"use": "sig"
},
{
"crv": "P-256",
"kid": "AZXCzT401BtqezIxAdHOEez1ApQUu3O5hjcfRFKxXtQ",
"kty": "EC",
"use": "sig",
"x": "aruz0ufjUGuEQwg2Q3ewyy5DnEIWWmIEO5stN8MfUTA",
"y": "dZnZMUOQAvzOD6q1f11PEho4-aX7nWdmive8zdxUbrA"
},
{
"crv": "P-256",
"kid": "CrXNdVSdrZ-lOToSPso6OlcZnP-Et4U9CzOIZOZPvLw",
"kty": "EC",
"use": "enc",
"x": "AeI9gyN_hcFae8vO2HgaH7Fh-MVX1YXJdWg-T16g1kM",
"y": "5ASt8rCvPWTKMAh6wvR8_-OEbl_9TTkkgAd7LXW8H48"
}
]
},
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#bM8OSfFM3LCukR0z"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "private_key_jwt",
"userinfo_signed_response_alg": "none"
}
0.233 phase <--<-- 3 --- AsyncAuthn -->-->
0.234 AuthorizationRequest {
"client_id": "00b815c9-9f8b-40a7-8469-ce57e30605c9",
"nonce": "mug4qP85Fw1nhFro",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "PROvBUYpKZvVylwO"
}
0.234 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=00b815c9-9f8b-40a7-8469-ce57e30605c9&state=PROvBUYpKZvVylwO&response_type=code+token&nonce=mug4qP85Fw1nhFro
0.234 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=00b815c9-9f8b-40a7-8469-ce57e30605c9&state=PROvBUYpKZvVylwO&response_type=code+token&nonce=mug4qP85Fw1nhFro
3.531 http args {}
3.697 response URL with fragment
3.698 response access_token=3D0JOpzLRt9-sLPXvqTrkNuGCJYL50lygwLShemWv_o.xHCP7Vy-cJDSkZ401l47i8wyHAWWaIc3-cxO2RTnnDs&code=OWCoxwdFVUhLJ2YOH5q1n3utxjnwsIauj2kjh25wlSI.UJwoPLAFzNAmTHS5Tq5PlqinIm1l2WBxjraI4zkYB9I&expires_in=3599&scope=openid&state=PROvBUYpKZvVylwO&token_type=bearer
3.698 response {'scope': 'openid', 'code': 'OWCoxwdFVUhLJ2YOH5q1n3utxjnwsIauj2kjh25wlSI.UJwoPLAFzNAmTHS5Tq5PlqinIm1l2WBxjraI4zkYB9I', 'access_token': '3D0JOpzLRt9-sLPXvqTrkNuGCJYL50lygwLShemWv_o.xHCP7Vy-cJDSkZ401l47i8wyHAWWaIc3-cxO2RTnnDs', 'state': 'PROvBUYpKZvVylwO', 'expires_in': 3599, 'token_type': 'bearer'}
3.698 AuthorizationResponse {
"access_token": "3D0JOpzLRt9-sLPXvqTrkNuGCJYL50lygwLShemWv_o.xHCP7Vy-cJDSkZ401l47i8wyHAWWaIc3-cxO2RTnnDs",
"code": "OWCoxwdFVUhLJ2YOH5q1n3utxjnwsIauj2kjh25wlSI.UJwoPLAFzNAmTHS5Tq5PlqinIm1l2WBxjraI4zkYB9I",
"expires_in": 3599,
"scope": "openid",
"state": "PROvBUYpKZvVylwO",
"token_type": "bearer"
}
3.699 phase <--<-- 4 --- AccessToken -->-->
3.699 --> request op_args: {'state': 'PROvBUYpKZvVylwO', 'authn_method': 'private_key_jwt'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.699 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'PROvBUYpKZvVylwO', 'code': 'OWCoxwdFVUhLJ2YOH5q1n3utxjnwsIauj2kjh25wlSI.UJwoPLAFzNAmTHS5Tq5PlqinIm1l2WBxjraI4zkYB9I', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '00b815c9-9f8b-40a7-8469-ce57e30605c9'}, 'state': 'PROvBUYpKZvVylwO', 'authn_method': 'private_key_jwt'}
3.699 AccessTokenRequest {
"client_assertion": "eyJhbGciOiJSUzI1NiIsImtpZCI6Ind0MjVPZ3lSX256RzNPb1E3ZGFhMnJMNi1nTW5GZGZSekJqaFVWUHU4UlEifQ.eyJpc3MiOiAiMDBiODE1YzktOWY4Yi00MGE3LTg0NjktY2U1N2UzMDYwNWM5IiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiMDBiODE1YzktOWY4Yi00MGE3LTg0NjktY2U1N2UzMDYwNWM5IiwgImlhdCI6IDE1Mjk3NTE5OTcsICJqdGkiOiAiY0gzcGliY3lhR1dCbkxXb1dvWWthWUxJbDVlTHJlRmwiLCAiZXhwIjogMTUyOTc1MjU5N30.0cE1IaDYVvNVxQAiuaTbbp9HNMXWoBhMF-ENw914yWPHm7XiGmizUh1un2c5KIh2uwNP8RuYaM3OueKkHn6EdPdxiuys6keSZv2dwWIyj0A4najU307QgzJRhhBZsWTOeZrQ2orIvRXuh0Jxrvi_LF403T9ZfhVsJzOefR0S7DPDi6E-B6VFCLEXJI2NLrRtKauCVGLLrb9SWvGvKZBiALaG1uOTv4NNnvfrjcf-l6E3pT3dPcDateWfvnwpVN5RrZfXTetoedK0hrI6CH4T8p0VE0NvALSGNnezUzzVCJQswycZeJ0hn8s-bj7WS5o7QD_ojjcUCOj-LRcLSli04g",
"client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer",
"code": "OWCoxwdFVUhLJ2YOH5q1n3utxjnwsIauj2kjh25wlSI.UJwoPLAFzNAmTHS5Tq5PlqinIm1l2WBxjraI4zkYB9I",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "PROvBUYpKZvVylwO"
}
3.702 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.702 request_http_args {'headers': {'Content-Type': 'application/x-www-form-urlencoded'}}
3.702 request code=OWCoxwdFVUhLJ2YOH5q1n3utxjnwsIauj2kjh25wlSI.UJwoPLAFzNAmTHS5Tq5PlqinIm1l2WBxjraI4zkYB9I&client_assertion_type=urn%3Aietf%3Aparams%3Aoauth%3Aclient-assertion-type%3Ajwt-bearer&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=PROvBUYpKZvVylwO&client_assertion=eyJhbGciOiJSUzI1NiIsImtpZCI6Ind0MjVPZ3lSX256RzNPb1E3ZGFhMnJMNi1nTW5GZGZSekJqaFVWUHU4UlEifQ.eyJpc3MiOiAiMDBiODE1YzktOWY4Yi00MGE3LTg0NjktY2U1N2UzMDYwNWM5IiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiMDBiODE1YzktOWY4Yi00MGE3LTg0NjktY2U1N2UzMDYwNWM5IiwgImlhdCI6IDE1Mjk3NTE5OTcsICJqdGkiOiAiY0gzcGliY3lhR1dCbkxXb1dvWWthWUxJbDVlTHJlRmwiLCAiZXhwIjogMTUyOTc1MjU5N30.0cE1IaDYVvNVxQAiuaTbbp9HNMXWoBhMF-ENw914yWPHm7XiGmizUh1un2c5KIh2uwNP8RuYaM3OueKkHn6EdPdxiuys6keSZv2dwWIyj0A4najU307QgzJRhhBZsWTOeZrQ2orIvRXuh0Jxrvi_LF403T9ZfhVsJzOefR0S7DPDi6E-B6VFCLEXJI2NLrRtKauCVGLLrb9SWvGvKZBiALaG1uOTv4NNnvfrjcf-l6E3pT3dPcDateWfvnwpVN5RrZfXTetoedK0hrI6CH4T8p0VE0NvALSGNnezUzzVCJQswycZeJ0hn8s-bj7WS5o7QD_ojjcUCOj-LRcLSli04g
3.835 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.836 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiMU9pZUJZeVBNbFIxNWxrQnpORWlqUSIsImF1ZCI6WyIwMGI4MTVjOS05ZjhiLTQwYTctODQ2OS1jZTU3ZTMwNjA1YzkiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiJIZmJwMnI2QWR1OGVBeUdGNEVtUHh3IiwiZXhwIjoxNTI5NzU1NTk3LCJpYXQiOjE1Mjk3NTE5OTcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImI0YjkwODhjLThkZWMtNDZmMC1hN2JhLWE2YzY2ODA1NTZkOSIsIm5vbmNlIjoibXVnNHFQODVGdzFuaEZybyIsInJhdCI6MTUyOTc1MTk5NCwic3ViIjoiZm9vQGJhci5jb20ifQ.Ck5D4YwmXct16P5zJtRZidZK8yU0hm4GPgpNLm3uD1bDgV2aG1-W5fBYJC76415wjy5eFVRgK-83htvuZQIoC09_RtDjRpInjHnQocX4XUuSWKlbFDJBmrEZEIiaKoVaFaqUqE8jpNiJ96K8VSG30fFwnN_jftEZD_wAgjq5flWoetcpExeS09DCeFgCzAAjVHdw2EU3vhytb3c_OqjaIwxn6Nfl0CUvzSfP9cFCFGaAvO6fGr4DpNIcu9EJobD3-OtA4Rp9-vdcuASmbc742f3JkhhT6wgWH5uXzVMd0yb5J61S-BySZCpHNtji-G2i3DelS1_WETDcCizyug5SWjZYwQWYiZM5UzWIItjbbAcmmCPphNWzvrz5dDODK3NXmTf9NGYvPvEo8Q2uDjeGEkcVSjueyMSFUGP617h8dKU5aT_RkmXer9RZuOLCwNcN78Ltz2poiJxBVahb77Yxr75PbHLHmE5LcDIxV3BP0OE7U4TdINTk4e0Xjf9zeV9u5E9aULYZ-334AwXoiBEdQKr8i3gq7p1ayZ08NY1ajBPOZdmrSm3LyQYj4v7Q3GFJcjhafn3LGNtHXUhVEWv22KjNd5Dun-VhD3mkN99gHc0vTnw9vCimGAJThqiTY79PZWno5TWoCOShuff61tcwZqfbx1Vo8MaEPXJcOlDBZso', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'jFqhHg-9i-ajJf_DP8ZVX8Fc0hj5GpGX28PErfGVLas.Va14m95ztFfe3eQ1JBVlRe3wuDAIqL6uqq3IBZB58RI', 'scope': 'openid'}
3.915 AccessTokenResponse {
"access_token": "jFqhHg-9i-ajJf_DP8ZVX8Fc0hj5GpGX28PErfGVLas.Va14m95ztFfe3eQ1JBVlRe3wuDAIqL6uqq3IBZB58RI",
"expires_in": 3599,
"id_token": {
"at_hash": "1OieBYyPMlR15lkBzNEijQ",
"aud": [
"00b815c9-9f8b-40a7-8469-ce57e30605c9"
],
"auth_time": 1529751824,
"c_hash": "Hfbp2r6Adu8eAyGF4EmPxw",
"exp": 1529755597,
"iat": 1529751997,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "b4b9088c-8dec-46f0-a7ba-a6c6680556d9",
"nonce": "mug4qP85Fw1nhFro",
"rat": 1529751994,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.915 phase <--<-- 5 --- Done -->-->
3.915 end
3.915 assertion VerifyResponse
3.915 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.915 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-Registration-jwks_uri.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-jwks_uri
Test description: Uses keys registered with jwks_uri value
Timestamp: 2018-06-23T11:06:41Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.081 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.083 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.083 phase <--<-- 2 --- Registration -->-->
0.083 register kwargs:{'application_name': 'OIC test tool', 'token_endpoint_auth_method': 'private_key_jwt', 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'response_types': ['code token'], 'url': 'https://oidc-certification.ory.sh:8443/clients', 'application_type': 'web'}
0.083 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#b3useWcsPceKDj2m"
],
"response_types": [
"code token"
],
"token_endpoint_auth_method": "private_key_jwt"
}
0.276 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.277 RegistrationResponse {
"client_id": "ae658ea8-ca6c-4ad6-97ad-2e84b481c273",
"client_secret": "JK3PTCfW0Hs6",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "ae658ea8-ca6c-4ad6-97ad-2e84b481c273",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#b3useWcsPceKDj2m"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "private_key_jwt",
"userinfo_signed_response_alg": "none"
}
0.277 phase <--<-- 3 --- AsyncAuthn -->-->
0.277 AuthorizationRequest {
"client_id": "ae658ea8-ca6c-4ad6-97ad-2e84b481c273",
"nonce": "l2A8pLihXmPIkgSR",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "KG18MI3TxjLnwMtU"
}
0.277 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=ae658ea8-ca6c-4ad6-97ad-2e84b481c273&state=KG18MI3TxjLnwMtU&response_type=code+token&nonce=l2A8pLihXmPIkgSR
0.277 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=ae658ea8-ca6c-4ad6-97ad-2e84b481c273&state=KG18MI3TxjLnwMtU&response_type=code+token&nonce=l2A8pLihXmPIkgSR
2.521 http args {}
2.683 response URL with fragment
2.683 response access_token=sb7G8-EPNwUbcv8Iy9spALnTBJxntWWq1W-ROo_nw3Y.LGciaeqTQMRVI5rpkeE8jT1plW-SmF1tiMqtu-dy6_4&code=95OPoLdh9cOGld0LpS7d-iYpR-HV5gwAwUl40EjoYY4.4rgwS8vx1VDZwvSXcR4U-EuFZ0GWNnQse3FSyVJ_vRs&expires_in=3599&scope=openid&state=KG18MI3TxjLnwMtU&token_type=bearer
2.684 response {'scope': 'openid', 'code': '95OPoLdh9cOGld0LpS7d-iYpR-HV5gwAwUl40EjoYY4.4rgwS8vx1VDZwvSXcR4U-EuFZ0GWNnQse3FSyVJ_vRs', 'access_token': 'sb7G8-EPNwUbcv8Iy9spALnTBJxntWWq1W-ROo_nw3Y.LGciaeqTQMRVI5rpkeE8jT1plW-SmF1tiMqtu-dy6_4', 'state': 'KG18MI3TxjLnwMtU', 'expires_in': 3599, 'token_type': 'bearer'}
2.684 AuthorizationResponse {
"access_token": "sb7G8-EPNwUbcv8Iy9spALnTBJxntWWq1W-ROo_nw3Y.LGciaeqTQMRVI5rpkeE8jT1plW-SmF1tiMqtu-dy6_4",
"code": "95OPoLdh9cOGld0LpS7d-iYpR-HV5gwAwUl40EjoYY4.4rgwS8vx1VDZwvSXcR4U-EuFZ0GWNnQse3FSyVJ_vRs",
"expires_in": 3599,
"scope": "openid",
"state": "KG18MI3TxjLnwMtU",
"token_type": "bearer"
}
2.684 phase <--<-- 4 --- AccessToken -->-->
2.684 --> request op_args: {'state': 'KG18MI3TxjLnwMtU', 'authn_method': 'private_key_jwt'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.684 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'KG18MI3TxjLnwMtU', 'code': '95OPoLdh9cOGld0LpS7d-iYpR-HV5gwAwUl40EjoYY4.4rgwS8vx1VDZwvSXcR4U-EuFZ0GWNnQse3FSyVJ_vRs', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'ae658ea8-ca6c-4ad6-97ad-2e84b481c273'}, 'state': 'KG18MI3TxjLnwMtU', 'authn_method': 'private_key_jwt'}
2.684 AccessTokenRequest {
"client_assertion": "eyJhbGciOiJSUzI1NiIsImtpZCI6Ind0MjVPZ3lSX256RzNPb1E3ZGFhMnJMNi1nTW5GZGZSekJqaFVWUHU4UlEifQ.eyJpc3MiOiAiYWU2NThlYTgtY2E2Yy00YWQ2LTk3YWQtMmU4NGI0ODFjMjczIiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiYWU2NThlYTgtY2E2Yy00YWQ2LTk3YWQtMmU4NGI0ODFjMjczIiwgImlhdCI6IDE1Mjk3NTIwMDEsICJqdGkiOiAiTE8xaUwxQnNwaWp6OUxlMndKQXJkNnpDREo4bU5GWTciLCAiZXhwIjogMTUyOTc1MjYwMX0.uZY9ajg3yT3xS0cjNruKmlnnR5-8GLCVmlngcJ04TfaLeoWKpYLal4qw3B6_rd9tFHqslLZSSvBnmifTp9A586mhRSGpIOnVG6mGIeByP-MK5lBVQcv8F3osZtoDjB99u7cTgmhi_OPVXQ_jI44KPPa-EZvdomoetlJ4nO3lFmZS1AHImQhiuLVcChu53dBl4t288QvV7c_NrvDafKhYI4IvcQ2bg940BAnaDx88TfD0qAvr0DTL08jT5HzoM8nG9ll6e6FzkrAkqWi3NtTyGUtLy_1vP2-wyz2N8gfrPhUtvmtIRNTiGTqRI0SMLWKyYoY6EIsn55cGwMD7xxWz4A",
"client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer",
"code": "95OPoLdh9cOGld0LpS7d-iYpR-HV5gwAwUl40EjoYY4.4rgwS8vx1VDZwvSXcR4U-EuFZ0GWNnQse3FSyVJ_vRs",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "KG18MI3TxjLnwMtU"
}
2.688 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.688 request_http_args {'headers': {'Content-Type': 'application/x-www-form-urlencoded'}}
2.688 request code=95OPoLdh9cOGld0LpS7d-iYpR-HV5gwAwUl40EjoYY4.4rgwS8vx1VDZwvSXcR4U-EuFZ0GWNnQse3FSyVJ_vRs&client_assertion_type=urn%3Aietf%3Aparams%3Aoauth%3Aclient-assertion-type%3Ajwt-bearer&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=KG18MI3TxjLnwMtU&client_assertion=eyJhbGciOiJSUzI1NiIsImtpZCI6Ind0MjVPZ3lSX256RzNPb1E3ZGFhMnJMNi1nTW5GZGZSekJqaFVWUHU4UlEifQ.eyJpc3MiOiAiYWU2NThlYTgtY2E2Yy00YWQ2LTk3YWQtMmU4NGI0ODFjMjczIiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiYWU2NThlYTgtY2E2Yy00YWQ2LTk3YWQtMmU4NGI0ODFjMjczIiwgImlhdCI6IDE1Mjk3NTIwMDEsICJqdGkiOiAiTE8xaUwxQnNwaWp6OUxlMndKQXJkNnpDREo4bU5GWTciLCAiZXhwIjogMTUyOTc1MjYwMX0.uZY9ajg3yT3xS0cjNruKmlnnR5-8GLCVmlngcJ04TfaLeoWKpYLal4qw3B6_rd9tFHqslLZSSvBnmifTp9A586mhRSGpIOnVG6mGIeByP-MK5lBVQcv8F3osZtoDjB99u7cTgmhi_OPVXQ_jI44KPPa-EZvdomoetlJ4nO3lFmZS1AHImQhiuLVcChu53dBl4t288QvV7c_NrvDafKhYI4IvcQ2bg940BAnaDx88TfD0qAvr0DTL08jT5HzoM8nG9ll6e6FzkrAkqWi3NtTyGUtLy_1vP2-wyz2N8gfrPhUtvmtIRNTiGTqRI0SMLWKyYoY6EIsn55cGwMD7xxWz4A
2.834 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.835 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiQzN4SER2bUI3RHIzSmVGTTFSTWxsdyIsImF1ZCI6WyJhZTY1OGVhOC1jYTZjLTRhZDYtOTdhZC0yZTg0YjQ4MWMyNzMiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiJVbC1zNl9xYkpObE5UTjJXdExOSWtnIiwiZXhwIjoxNTI5NzU1NjAxLCJpYXQiOjE1Mjk3NTIwMDEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjgzMDNhNmI1LTIxMTAtNGU0NC05MjMyLTg1ZDdmYjFlNzE2YyIsIm5vbmNlIjoibDJBOHBMaWhYbVBJa2dTUiIsInJhdCI6MTUyOTc1MTk5OSwic3ViIjoiZm9vQGJhci5jb20ifQ.UOH5xgwxm606iCtG_Tea7hyXu7z1xhmsiF0Y3Rc-gNqGSAHW-Gy35TKG66Ovb40ivDGnjsI5DEQEFOP2mhCmIS6c_ZeyfM0qZ1j5vF7-6XlT6gGeByn5bQT6SYlHkJiZ5hcNrWXHwMWGGl04gvbYVFzntgMjK45D1IHsZRaf7lvC28DQyWXxoCvzJYImeZocwkJygfRvh52wyFnJXdKwneJo2YyPMWI5K7_C6FQ7hrOvIGXtGyxRn1LDw6uJ7sIdctF6bfr26J-DprZqUw31avR7rNIyuAJPHb-CFTCVgnfAKv-D9y69LlcELckzeWzh6fI3k8PDfKekHw-J20Lp1tyczyKXZdhDIU7S6AQpsG1qn2d6_Od9VhtZ9EYbtlGUy8ydULH7ykxfjErkFQB2j2YmbMlUKF_zEV0QFjeMn49zbxfFyCc-MYA7TeUYHUQcgJnZxTPThWnoJt8oOoq1wsLqPWgaTBt9-yYk8ITRgonpO5xhPOoQJW2WdwQEuhtNmAPfTSek2NFI5MGBmY_6SU4U8VgV-1ItYZsY2iSdR75wZRUq9De0N3_-TlpJ0evagVed9bCsko5hTup8QB4YolQ8TvfQe8_T8Qj6oxhPSCD0uT_frZTjp2n1m7E0spl70zYU8HsULY6hFnLaGaRTt9WeR2TZY7kuzQet64_MCcc', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'pQCZT6QV09O3vHEmlx0l5wNoDxotO7b8T3LMp3N4Dmc.Y4JpgdZmGl9e3ZmZTpEqTqO7o2OivyUqHbtJo4vGP8Q', 'scope': 'openid'}
2.913 AccessTokenResponse {
"access_token": "pQCZT6QV09O3vHEmlx0l5wNoDxotO7b8T3LMp3N4Dmc.Y4JpgdZmGl9e3ZmZTpEqTqO7o2OivyUqHbtJo4vGP8Q",
"expires_in": 3599,
"id_token": {
"at_hash": "C3xHDvmB7Dr3JeFM1RMllw",
"aud": [
"ae658ea8-ca6c-4ad6-97ad-2e84b481c273"
],
"auth_time": 1529751824,
"c_hash": "Ul-s6_qbJNlNTN2WtLNIkg",
"exp": 1529755601,
"iat": 1529752001,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "8303a6b5-2110-4e44-9232-85d7fb1e716c",
"nonce": "l2A8pLihXmPIkgSR",
"rat": 1529751999,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
2.913 phase <--<-- 5 --- Done -->-->
2.914 end
2.914 assertion VerifyResponse
2.914 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.914 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-Registration-logo_uri.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-logo_uri
Test description: Registration with logo_uri
Timestamp: 2018-06-23T11:06:48Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.876 phase <--<-- 1 --- Webfinger -->-->
1.876 not expected to do WebFinger
1.876 phase <--<-- 2 --- Discovery -->-->
1.876 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.952 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.953 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.953 phase <--<-- 3 --- Registration -->-->
1.954 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'logo_uri': 'https://op.certification.openid.net:61353/static/logo.png'}
1.954 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"logo_uri": "https://op.certification.openid.net:61353/static/logo.png",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#NHT9RIfrnKzVfKD8"
],
"response_types": [
"code token"
]
}
2.113 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
2.114 RegistrationResponse {
"client_id": "04ccbb42-d222-4b1d-80b1-a0954aad2922",
"client_secret": "Xcxyix6eA9tx",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "04ccbb42-d222-4b1d-80b1-a0954aad2922",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"logo_uri": "https://op.certification.openid.net:61353/static/logo.png",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#NHT9RIfrnKzVfKD8"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
2.114 phase <--<-- 4 --- AsyncAuthn -->-->
2.114 AuthorizationRequest {
"client_id": "04ccbb42-d222-4b1d-80b1-a0954aad2922",
"nonce": "lu7LGkesORBOZnH1",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "zj9SOAP7Uf9zPTO0"
}
2.115 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=04ccbb42-d222-4b1d-80b1-a0954aad2922&state=zj9SOAP7Uf9zPTO0&response_type=code+token&nonce=lu7LGkesORBOZnH1
2.115 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=04ccbb42-d222-4b1d-80b1-a0954aad2922&state=zj9SOAP7Uf9zPTO0&response_type=code+token&nonce=lu7LGkesORBOZnH1
4.605 http args {}
4.816 response URL with fragment
4.816 response access_token=ikmMx7MxZRltKTrIMkHvn-IoafWdAb6sYI3Hm8_Dqe4.m9Bc8PN7ycXDdhIvmgo-yYlDK_zrxZU7AQuUU_EgO20&code=9rOpUja08gcmLc5NsFDpU19PWeyGpkSGGvhebMZh3is.Up18Ypf0hTpRwCcGBBeoY-M2W36yoLi8sA7Vq31qD_4&expires_in=3599&scope=openid&state=zj9SOAP7Uf9zPTO0&token_type=bearer
4.817 response {'scope': 'openid', 'code': '9rOpUja08gcmLc5NsFDpU19PWeyGpkSGGvhebMZh3is.Up18Ypf0hTpRwCcGBBeoY-M2W36yoLi8sA7Vq31qD_4', 'access_token': 'ikmMx7MxZRltKTrIMkHvn-IoafWdAb6sYI3Hm8_Dqe4.m9Bc8PN7ycXDdhIvmgo-yYlDK_zrxZU7AQuUU_EgO20', 'state': 'zj9SOAP7Uf9zPTO0', 'expires_in': 3599, 'token_type': 'bearer'}
4.817 AuthorizationResponse {
"access_token": "ikmMx7MxZRltKTrIMkHvn-IoafWdAb6sYI3Hm8_Dqe4.m9Bc8PN7ycXDdhIvmgo-yYlDK_zrxZU7AQuUU_EgO20",
"code": "9rOpUja08gcmLc5NsFDpU19PWeyGpkSGGvhebMZh3is.Up18Ypf0hTpRwCcGBBeoY-M2W36yoLi8sA7Vq31qD_4",
"expires_in": 3599,
"scope": "openid",
"state": "zj9SOAP7Uf9zPTO0",
"token_type": "bearer"
}
4.817 phase <--<-- 5 --- Done -->-->
4.817 end
4.818 assertion VerifyAuthnResponse
4.818 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
4.818 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-Registration-policy_uri.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-policy_uri
Test description: Registration with policy_uri
Timestamp: 2018-06-23T11:06:53Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.048 phase <--<-- 1 --- Webfinger -->-->
1.048 not expected to do WebFinger
1.048 phase <--<-- 2 --- Discovery -->-->
1.049 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.121 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.123 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.123 phase <--<-- 3 --- Registration -->-->
1.123 register kwargs:{'application_name': 'OIC test tool', 'policy_uri': 'https://op.certification.openid.net:61353/static/policy.html', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.123 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"policy_uri": "https://op.certification.openid.net:61353/static/policy.html",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#hfEHDDZZ1b6gDAfd"
],
"response_types": [
"code token"
]
}
1.281 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.282 RegistrationResponse {
"client_id": "bf9b1be8-13cf-490c-a5a2-d64d9b202ed4",
"client_secret": "BG4GsvYESIqt",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "bf9b1be8-13cf-490c-a5a2-d64d9b202ed4",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"policy_uri": "https://op.certification.openid.net:61353/static/policy.html",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#hfEHDDZZ1b6gDAfd"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.282 phase <--<-- 4 --- AsyncAuthn -->-->
1.283 AuthorizationRequest {
"client_id": "bf9b1be8-13cf-490c-a5a2-d64d9b202ed4",
"nonce": "zq6NTRsMVKVPYNPv",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "GiKQugcVSxAe6YOF"
}
1.283 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=bf9b1be8-13cf-490c-a5a2-d64d9b202ed4&state=GiKQugcVSxAe6YOF&response_type=code+token&nonce=zq6NTRsMVKVPYNPv
1.283 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=bf9b1be8-13cf-490c-a5a2-d64d9b202ed4&state=GiKQugcVSxAe6YOF&response_type=code+token&nonce=zq6NTRsMVKVPYNPv
3.773 http args {}
3.983 response URL with fragment
3.984 response access_token=PCzWm46XW0fQ79PiwgOlCEy-kuKRyfU4q6zrOZIlQ3o.-0KyptYMWid68nYu1dGSvRt1QzslNDeletsG5BjkL8w&code=eQCEPmffioMnVWneprpRPrs5yR1b3GfYbS7GAexfYqs.2X6DDK3-Z2SjztALgiGP5n-5uy79GSq1XOHz4N8rNto&expires_in=3599&scope=openid&state=GiKQugcVSxAe6YOF&token_type=bearer
3.984 response {'scope': 'openid', 'code': 'eQCEPmffioMnVWneprpRPrs5yR1b3GfYbS7GAexfYqs.2X6DDK3-Z2SjztALgiGP5n-5uy79GSq1XOHz4N8rNto', 'access_token': 'PCzWm46XW0fQ79PiwgOlCEy-kuKRyfU4q6zrOZIlQ3o.-0KyptYMWid68nYu1dGSvRt1QzslNDeletsG5BjkL8w', 'state': 'GiKQugcVSxAe6YOF', 'expires_in': 3599, 'token_type': 'bearer'}
3.984 AuthorizationResponse {
"access_token": "PCzWm46XW0fQ79PiwgOlCEy-kuKRyfU4q6zrOZIlQ3o.-0KyptYMWid68nYu1dGSvRt1QzslNDeletsG5BjkL8w",
"code": "eQCEPmffioMnVWneprpRPrs5yR1b3GfYbS7GAexfYqs.2X6DDK3-Z2SjztALgiGP5n-5uy79GSq1XOHz4N8rNto",
"expires_in": 3599,
"scope": "openid",
"state": "GiKQugcVSxAe6YOF",
"token_type": "bearer"
}
3.985 phase <--<-- 5 --- Done -->-->
3.985 end
3.985 assertion VerifyAuthnResponse
3.985 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
3.985 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-Registration-Sector-Bad.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-Sector-Bad
Test description: Incorrect registration of sector_identifier_uri
Timestamp: 2018-06-23T11:06:32Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.078 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.079 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.079 phase <--<-- 2 --- Registration -->-->
0.08 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'sector_identifier_uri': 'https://op.certification.openid.net:61353/export/siu.json', 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.08 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#6uhHkstboS9jvzvC"
],
"response_types": [
"code token"
],
"sector_identifier_uri": "https://op.certification.openid.net:61353/export/siu.json"
}
0.287 http response url:https://oidc-certification.ory.sh:8443/clients status_code:400 message:{"error":"invalid_request","error_description":"The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed","error_hint":"Make sure that the various parameters are correct, be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.","status_code":400,"error_debug":"Redirect URL \"https://op.certification.openid.net:61353/authz_cb\" does not match values from sector_identifier_uri."}
0.288 ErrorResponse {
"error": "invalid_request",
"error_debug": "Redirect URL \"https://op.certification.openid.net:61353/authz_cb\" does not match values from sector_identifier_uri.",
"error_description": "The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed",
"error_hint": "Make sure that the various parameters are correct, be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.",
"status_code": 400
}
0.288 exception RegistrationError:{'error_debug': 'Redirect URL "https://op.certification.openid.net:61353/authz_cb" does not match values from sector_identifier_uri.', 'error_description': 'The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed', 'status_code': 400, 'error': 'invalid_request', 'error_hint': 'Make sure that the various parameters are correct, be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.'}
0.288 event got expected exception RegistrationError
0.288 phase <--<-- 3 --- Done -->-->
0.288 end
0.289 condition Done: status=OK
============================================================
Conditions
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-Registration-tos_uri.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-tos_uri
Test description: Registration with tos_uri
Timestamp: 2018-06-23T11:06:58Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.129 phase <--<-- 1 --- Webfinger -->-->
1.129 not expected to do WebFinger
1.129 phase <--<-- 2 --- Discovery -->-->
1.129 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.204 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.205 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.205 phase <--<-- 3 --- Registration -->-->
1.206 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'tos_uri': 'https://op.certification.openid.net:61353/static/tos.html', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.206 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Zn4FC5mPZYbj1xWe"
],
"response_types": [
"code token"
],
"tos_uri": "https://op.certification.openid.net:61353/static/tos.html"
}
1.364 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.365 RegistrationResponse {
"client_id": "3c2d5d65-ac26-4b4a-96a6-8dad047122ce",
"client_secret": "Z~1zPi37agsQ",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "3c2d5d65-ac26-4b4a-96a6-8dad047122ce",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Zn4FC5mPZYbj1xWe"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"tos_uri": "https://op.certification.openid.net:61353/static/tos.html",
"userinfo_signed_response_alg": "none"
}
1.365 phase <--<-- 4 --- AsyncAuthn -->-->
1.365 AuthorizationRequest {
"client_id": "3c2d5d65-ac26-4b4a-96a6-8dad047122ce",
"nonce": "4Mki3Yw1Ku1zIu1r",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "uhOFO1y3KL5JzRcH"
}
1.365 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=3c2d5d65-ac26-4b4a-96a6-8dad047122ce&state=uhOFO1y3KL5JzRcH&response_type=code+token&nonce=4Mki3Yw1Ku1zIu1r
1.365 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=3c2d5d65-ac26-4b4a-96a6-8dad047122ce&state=uhOFO1y3KL5JzRcH&response_type=code+token&nonce=4Mki3Yw1Ku1zIu1r
3.198 http args {}
3.36 response URL with fragment
3.361 response access_token=J_qcyg9_qFcMCp6WTBHzAavmtM9ZMzUfxdG9F_I8K-M.z3Ksc7yj0tTL9P8Eh_ujh8mfnlVCxn65Smu9KI5SaGM&code=hqkK9bY3OlcevAruLdcajO1F_KcTCT1yX94_LvgJsd8.Y83YdFV7rbUWpcGwmIDJzo_ACakTu_hPAvmLECI9byQ&expires_in=3599&scope=openid&state=uhOFO1y3KL5JzRcH&token_type=bearer
3.361 response {'scope': 'openid', 'code': 'hqkK9bY3OlcevAruLdcajO1F_KcTCT1yX94_LvgJsd8.Y83YdFV7rbUWpcGwmIDJzo_ACakTu_hPAvmLECI9byQ', 'access_token': 'J_qcyg9_qFcMCp6WTBHzAavmtM9ZMzUfxdG9F_I8K-M.z3Ksc7yj0tTL9P8Eh_ujh8mfnlVCxn65Smu9KI5SaGM', 'state': 'uhOFO1y3KL5JzRcH', 'expires_in': 3599, 'token_type': 'bearer'}
3.361 AuthorizationResponse {
"access_token": "J_qcyg9_qFcMCp6WTBHzAavmtM9ZMzUfxdG9F_I8K-M.z3Ksc7yj0tTL9P8Eh_ujh8mfnlVCxn65Smu9KI5SaGM",
"code": "hqkK9bY3OlcevAruLdcajO1F_KcTCT1yX94_LvgJsd8.Y83YdFV7rbUWpcGwmIDJzo_ACakTu_hPAvmLECI9byQ",
"expires_in": 3599,
"scope": "openid",
"state": "uhOFO1y3KL5JzRcH",
"token_type": "bearer"
}
3.362 phase <--<-- 5 --- Done -->-->
3.362 end
3.362 assertion VerifyAuthnResponse
3.362 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
3.362 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-Req-acr_values.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-acr_values
Test description: Providing acr_values
Timestamp: 2018-06-23T11:11:18Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Registration -->-->
0.075 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.075 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#4etS93WUc1O9ZRj2"
],
"response_types": [
"code token"
]
}
0.263 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.264 RegistrationResponse {
"client_id": "b3b718f2-e6ff-4de3-8e0c-19edb28fc438",
"client_secret": "O77FOxVfaRed",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "b3b718f2-e6ff-4de3-8e0c-19edb28fc438",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#4etS93WUc1O9ZRj2"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.264 phase <--<-- 3 --- AsyncAuthn -->-->
0.265 AuthorizationRequest {
"acr_values": "1 2",
"client_id": "b3b718f2-e6ff-4de3-8e0c-19edb28fc438",
"nonce": "OlsnhuwrzcgQKa6x",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "FCQXkhvOU1VdPRNf"
}
0.265 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=b3b718f2-e6ff-4de3-8e0c-19edb28fc438&state=FCQXkhvOU1VdPRNf&acr_values=1+2&response_type=code+token&nonce=OlsnhuwrzcgQKa6x
0.265 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=b3b718f2-e6ff-4de3-8e0c-19edb28fc438&state=FCQXkhvOU1VdPRNf&acr_values=1+2&response_type=code+token&nonce=OlsnhuwrzcgQKa6x
2.429 http args {}
2.632 response URL with fragment
2.632 response access_token=uSRZF9O0_gkwwsrc-AdsOc48ZE6YKi8oIwbd9Kz1YqA.oW-4_VAfeeXnz1kX_HvY7htyJKTNWV0rsSDTzzhsm-8&code=8RTUX96jYKy7MnLbeqpt-h-zMBEMRnSnJCXEA3ETjUM.l_BMrtxpAbC2rBVpuUnx4ioYNUCCMgNUjMHPvFK68fo&expires_in=3599&scope=openid&state=FCQXkhvOU1VdPRNf&token_type=bearer
2.633 response {'scope': 'openid', 'code': '8RTUX96jYKy7MnLbeqpt-h-zMBEMRnSnJCXEA3ETjUM.l_BMrtxpAbC2rBVpuUnx4ioYNUCCMgNUjMHPvFK68fo', 'access_token': 'uSRZF9O0_gkwwsrc-AdsOc48ZE6YKi8oIwbd9Kz1YqA.oW-4_VAfeeXnz1kX_HvY7htyJKTNWV0rsSDTzzhsm-8', 'state': 'FCQXkhvOU1VdPRNf', 'expires_in': 3599, 'token_type': 'bearer'}
2.633 AuthorizationResponse {
"access_token": "uSRZF9O0_gkwwsrc-AdsOc48ZE6YKi8oIwbd9Kz1YqA.oW-4_VAfeeXnz1kX_HvY7htyJKTNWV0rsSDTzzhsm-8",
"code": "8RTUX96jYKy7MnLbeqpt-h-zMBEMRnSnJCXEA3ETjUM.l_BMrtxpAbC2rBVpuUnx4ioYNUCCMgNUjMHPvFK68fo",
"expires_in": 3599,
"scope": "openid",
"state": "FCQXkhvOU1VdPRNf",
"token_type": "bearer"
}
2.633 phase <--<-- 4 --- AccessToken -->-->
2.633 --> request op_args: {'state': 'FCQXkhvOU1VdPRNf'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.633 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'FCQXkhvOU1VdPRNf', 'code': '8RTUX96jYKy7MnLbeqpt-h-zMBEMRnSnJCXEA3ETjUM.l_BMrtxpAbC2rBVpuUnx4ioYNUCCMgNUjMHPvFK68fo', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'b3b718f2-e6ff-4de3-8e0c-19edb28fc438'}, 'state': 'FCQXkhvOU1VdPRNf'}
2.633 AccessTokenRequest {
"code": "8RTUX96jYKy7MnLbeqpt-h-zMBEMRnSnJCXEA3ETjUM.l_BMrtxpAbC2rBVpuUnx4ioYNUCCMgNUjMHPvFK68fo",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "FCQXkhvOU1VdPRNf"
}
2.633 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.633 request_http_args {'headers': {'Authorization': 'Basic YjNiNzE4ZjItZTZmZi00ZGUzLThlMGMtMTllZGIyOGZjNDM4Ok83N0ZPeFZmYVJlZA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.633 request code=8RTUX96jYKy7MnLbeqpt-h-zMBEMRnSnJCXEA3ETjUM.l_BMrtxpAbC2rBVpuUnx4ioYNUCCMgNUjMHPvFK68fo&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=FCQXkhvOU1VdPRNf
2.854 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.856 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhY3IiOiIwIiwiYXRfaGFzaCI6IlhFZGlmaXE3TzJPZkNpX3dvZkcwSFEiLCJhdWQiOlsiYjNiNzE4ZjItZTZmZi00ZGUzLThlMGMtMTllZGIyOGZjNDM4Il0sImF1dGhfdGltZSI6MTUyOTc1MjE4MCwiY19oYXNoIjoiR3Y0SkpNYjdTWnZ2Z2YwVm96aEI2USIsImV4cCI6MTUyOTc1NTg3NywiaWF0IjoxNTI5NzUyMjc4LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJiNjk3YmY4OS00MGM0LTRlNjItYjU2MS02OWQwZDU0M2E1NTQiLCJub25jZSI6Ik9sc25odXdyemNnUUthNngiLCJyYXQiOjE1Mjk3NTIyNzYsInN1YiI6ImZvb0BiYXIuY29tIn0.UD8vj0X_YmZEQ-IKFbiqVm-yBMYcKIXDW0CFD9j3UysqSSEtZW-rDU3TK3eNw1M1RnOOOokyLsH-ZRhChGHjFeNIDPb8XhwrhSmvOT-aZYznwMJIZlEnFsofVfgZZIP73zHqeKAz3T496Fisl67cTA8ecMdYmREbLTqhhJovQksYRFn6QbIp7oFM5io87CjssFwaB7DwMTCt6oeu0FjxpGSJ8EqPt7AoLLkKb9NgOzNPyI8w0TreHTjo9S5LB5msgm-lIFn3TXrExmzPF_WUj8aQvrw0gqgpQaT6OUp57eXUHW9KIJ11EJ2rKwLztTZgwKtN6vIJIZSUSADTB89K3rkN-M9OY-_jtZ_9eM0feHKdGFy6Yfbz0QNSmPIZLCYVdxhXwaBkVhppT-V8z_GfHRPI4BfrtAYPbX8rq7fYj65u5TwEKtivQlCblM0kseV_Kq1IXVkQNVQMs-FoPAFaXruf_AGsmFlgviN_hDut-i0sFxNljdjdIFJtqFwHi0Qfxc94tzXIHqUOrLtgXhXL7L_1Lb0ZLXMXKNxq--rpiy7tXnJzxQoXJE5TGhkkoBKm2niwfDBnOSeriuVOBParuw12LGaLXrzAcdYGrsXUkWF0rUzHAMgGBgBK-u0xIODS901X6x_8oZ8qXl6W8V7j5AJwJsUWgzQz-t1QGgfv54o', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'onhK5V488OeZUD8JPOmyF8W6IHmQYgzjR73RPdF4nyo.0wXwzAAcSwxcv_D24bY7zigBuREA8uWNEWa4-45dAO4', 'scope': 'openid'}
2.935 AccessTokenResponse {
"access_token": "onhK5V488OeZUD8JPOmyF8W6IHmQYgzjR73RPdF4nyo.0wXwzAAcSwxcv_D24bY7zigBuREA8uWNEWa4-45dAO4",
"expires_in": 3599,
"id_token": {
"acr": "0",
"at_hash": "XEdifiq7O2OfCi_wofG0HQ",
"aud": [
"b3b718f2-e6ff-4de3-8e0c-19edb28fc438"
],
"auth_time": 1529752180,
"c_hash": "Gv4JJMb7SZvvgf0VozhB6Q",
"exp": 1529755877,
"iat": 1529752278,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "b697bf89-40c4-4e62-b561-69d0d543a554",
"nonce": "OlsnhuwrzcgQKa6x",
"rat": 1529752276,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
2.935 phase <--<-- 5 --- Done -->-->
2.935 end
2.936 assertion VerifyResponse
2.936 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.936 assertion UsedAcrValue
2.937 condition used-acr-value: status=WARNING, message=Used acr value: 0, preferred: ['1', '2'] [The acr value in the ID Token]
2.937 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
used-acr-value: status=WARNING, message=Used acr value: 0, preferred: ['1', '2'] [The acr value in the ID Token]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
Used acr value: 0, preferred: ['1', '2'] |
Text | hydra/internal/certification/CT.F.T.T.s/OP-Req-claims_locales.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-claims_locales
Test description: Providing claims_locales
Timestamp: 2018-06-23T11:11:23Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.24 phase <--<-- 1 --- Webfinger -->-->
1.24 not expected to do WebFinger
1.24 phase <--<-- 2 --- Discovery -->-->
1.24 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.311 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.313 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.313 phase <--<-- 3 --- Registration -->-->
1.313 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.313 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Xp4kU3cjiqwAHmkS"
],
"response_types": [
"code token"
]
}
1.472 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.473 RegistrationResponse {
"client_id": "2c46c0e2-cd78-4671-b1d9-20cdd5372fc7",
"client_secret": "6sO6._kr1Mws",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "2c46c0e2-cd78-4671-b1d9-20cdd5372fc7",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Xp4kU3cjiqwAHmkS"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.473 phase <--<-- 4 --- AsyncAuthn -->-->
1.473 AuthorizationRequest {
"claims_locales": "se",
"client_id": "2c46c0e2-cd78-4671-b1d9-20cdd5372fc7",
"nonce": "6jVpzZRydg7OACU3",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "kvbdCBZOgjgR8H6V"
}
1.473 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=2c46c0e2-cd78-4671-b1d9-20cdd5372fc7&state=kvbdCBZOgjgR8H6V&response_type=code+token&nonce=6jVpzZRydg7OACU3&claims_locales=se
1.473 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=2c46c0e2-cd78-4671-b1d9-20cdd5372fc7&state=kvbdCBZOgjgR8H6V&response_type=code+token&nonce=6jVpzZRydg7OACU3&claims_locales=se
3.499 http args {}
3.701 response URL with fragment
3.701 response access_token=fDABN5I9jU5LPmylmSiPzLzn0IStQPlBmBBF-CdcFBQ.ne1hBRxrTLDK7tKSKEE4TywkikLr-ABes7VuiySeHmw&code=vEYo4i2295wc5LscsGKlNUcv0GhbkEu7cVTy6s9wwJo.TnfiqvFOrtke8X-TG39kyQMhdomzqOtCDIF1EFokT78&expires_in=3599&scope=openid&state=kvbdCBZOgjgR8H6V&token_type=bearer
3.701 response {'scope': 'openid', 'code': 'vEYo4i2295wc5LscsGKlNUcv0GhbkEu7cVTy6s9wwJo.TnfiqvFOrtke8X-TG39kyQMhdomzqOtCDIF1EFokT78', 'access_token': 'fDABN5I9jU5LPmylmSiPzLzn0IStQPlBmBBF-CdcFBQ.ne1hBRxrTLDK7tKSKEE4TywkikLr-ABes7VuiySeHmw', 'state': 'kvbdCBZOgjgR8H6V', 'expires_in': 3599, 'token_type': 'bearer'}
3.702 AuthorizationResponse {
"access_token": "fDABN5I9jU5LPmylmSiPzLzn0IStQPlBmBBF-CdcFBQ.ne1hBRxrTLDK7tKSKEE4TywkikLr-ABes7VuiySeHmw",
"code": "vEYo4i2295wc5LscsGKlNUcv0GhbkEu7cVTy6s9wwJo.TnfiqvFOrtke8X-TG39kyQMhdomzqOtCDIF1EFokT78",
"expires_in": 3599,
"scope": "openid",
"state": "kvbdCBZOgjgR8H6V",
"token_type": "bearer"
}
3.702 phase <--<-- 5 --- AccessToken -->-->
3.702 --> request op_args: {'state': 'kvbdCBZOgjgR8H6V'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.702 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'kvbdCBZOgjgR8H6V', 'code': 'vEYo4i2295wc5LscsGKlNUcv0GhbkEu7cVTy6s9wwJo.TnfiqvFOrtke8X-TG39kyQMhdomzqOtCDIF1EFokT78', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '2c46c0e2-cd78-4671-b1d9-20cdd5372fc7'}, 'state': 'kvbdCBZOgjgR8H6V'}
3.702 AccessTokenRequest {
"code": "vEYo4i2295wc5LscsGKlNUcv0GhbkEu7cVTy6s9wwJo.TnfiqvFOrtke8X-TG39kyQMhdomzqOtCDIF1EFokT78",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "kvbdCBZOgjgR8H6V"
}
3.702 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.702 request_http_args {'headers': {'Authorization': 'Basic MmM0NmMwZTItY2Q3OC00NjcxLWIxZDktMjBjZGQ1MzcyZmM3OjZzTzYuX2tyMU13cw==', 'Content-Type': 'application/x-www-form-urlencoded'}}
3.702 request code=vEYo4i2295wc5LscsGKlNUcv0GhbkEu7cVTy6s9wwJo.TnfiqvFOrtke8X-TG39kyQMhdomzqOtCDIF1EFokT78&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=kvbdCBZOgjgR8H6V
3.917 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.918 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiSFVkTnFSdG9tcV94Q2J2ZXN2T0hYUSIsImF1ZCI6WyIyYzQ2YzBlMi1jZDc4LTQ2NzEtYjFkOS0yMGNkZDUzNzJmYzciXSwiYXV0aF90aW1lIjoxNTI5NzUyMTgwLCJjX2hhc2giOiJtTlA0VGtIWFdwaTBtRDhTVFl4V1R3IiwiZXhwIjoxNTI5NzU1ODgzLCJpYXQiOjE1Mjk3NTIyODMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjQyMWZiY2U2LTAxNjMtNGYyNi04NWZiLWQ2NTM2MTM5MDMwMiIsIm5vbmNlIjoiNmpWcHpaUnlkZzdPQUNVMyIsInJhdCI6MTUyOTc1MjI4MSwic3ViIjoiZm9vQGJhci5jb20ifQ.N2P0i0-OwtlbcYgDrX5U_Fg2dSRqZwjx-xHkBwBkbvEp0HKp2KONu9LqcrJjGCi0H5t09BZzrffJ0hP20OI-QRK4cMpAN7bh_9XS7bikADVOXyKMi9i1H-AyJ5mUQPJ2lF0qHEpNd5ZELuRI0bap64K5Yg7wS4VBxX9ZFpjJdJqQ1CBYXNt5ilKW9Qqg_EVzVJshPpMhaiD2WKP96lVRZgNrdCHm7SULOJQbXenDxYqwOlLGw_D8Kb0wijmiidvG9CrTeDfdVtBIYOfmzEhgg2lFr_-RnIkI4hPjCJz93gPNb86Hm8KHdNxyxWngDEQ1Qz02QuIxFkLVXrcWMi6jz3dDlqjWft00ZlrdYoGtHmWIhzwTjAUpUql7EbgjTKKsI3-hzfycv1m32lq7iCd4ynSbmP8ApeBuCdXauaX_KfeT7sKrQrbVVQYKjxx7q4hwdeaPHSjXVhaNLFTOoHebYCLLx9gL5xIaiYFo06efEN8Rk-UFPQi08NiNfujw5ePd5753ZPkyyjIYBZLpAFWQH7z96uyW9a6aNpP0pxofQugpr-7uDkYKObMQBunhSIkaI05sRHgbk4oIfVGTANjLUKc-mL2lZkuYmuw4M2V3pdbURCAGf6aBbwHdn29dgm0bdgyh4CbV-C9Du5gX2mM-2FANcDI0MF_DsRWupQrgl8U', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'SP6szqNklDWi8DKD3N6L_01uC7gZmRefVclz2uexwOw.HUoqbEijBMKJE4y9F5JYok-eZQ-oMKy1YrA-EH1tXCI', 'scope': 'openid'}
4.019 AccessTokenResponse {
"access_token": "SP6szqNklDWi8DKD3N6L_01uC7gZmRefVclz2uexwOw.HUoqbEijBMKJE4y9F5JYok-eZQ-oMKy1YrA-EH1tXCI",
"expires_in": 3599,
"id_token": {
"at_hash": "HUdNqRtomq_xCbvesvOHXQ",
"aud": [
"2c46c0e2-cd78-4671-b1d9-20cdd5372fc7"
],
"auth_time": 1529752180,
"c_hash": "mNP4TkHXWpi0mD8STYxWTw",
"exp": 1529755883,
"iat": 1529752283,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "421fbce6-0163-4f26-85fb-d65361390302",
"nonce": "6jVpzZRydg7OACU3",
"rat": 1529752281,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
4.019 phase <--<-- 6 --- UserInfo -->-->
4.019 do_user_info_request kwargs:{'state': 'kvbdCBZOgjgR8H6V', 'method': 'GET', 'authn_method': 'bearer_header'}
4.019 request {'body': None}
4.019 request_url https://oidc-certification.ory.sh:8443/userinfo
4.019 request_http_args {'headers': {'Authorization': 'Bearer SP6szqNklDWi8DKD3N6L_01uC7gZmRefVclz2uexwOw.HUoqbEijBMKJE4y9F5JYok-eZQ-oMKy1YrA-EH1tXCI'}}
4.103 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
4.103 OpenIDSchema {
"sub": "[email protected]"
}
4.103 OpenIDSchema {
"sub": "[email protected]"
}
4.104 phase <--<-- 7 --- DisplayUserInfo -->-->
4.104 phase <--<-- 8 --- Done -->-->
4.104 end
4.104 assertion CheckHTTPResponse
4.104 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
4.104 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-Req-id_token_hint.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-id_token_hint
Test description: Using prompt=none with user hint through id_token_hint
Timestamp: 2018-06-23T11:11:38Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.098 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.099 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.099 phase <--<-- 2 --- Registration -->-->
0.099 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.1 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#FlQBfwSfBjr9sS7g"
],
"response_types": [
"code token"
]
}
0.26 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.261 RegistrationResponse {
"client_id": "0548df7e-a572-4d22-82c5-7956e17eeedb",
"client_secret": "zsol7Hd13k6S",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "0548df7e-a572-4d22-82c5-7956e17eeedb",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#FlQBfwSfBjr9sS7g"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.261 phase <--<-- 3 --- AsyncAuthn -->-->
0.262 AuthorizationRequest {
"client_id": "0548df7e-a572-4d22-82c5-7956e17eeedb",
"nonce": "gKKOrMFOjNYMEWew",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "DphsZnehedOLT5Oq"
}
0.262 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=0548df7e-a572-4d22-82c5-7956e17eeedb&state=DphsZnehedOLT5Oq&response_type=code+token&nonce=gKKOrMFOjNYMEWew
0.262 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=0548df7e-a572-4d22-82c5-7956e17eeedb&state=DphsZnehedOLT5Oq&response_type=code+token&nonce=gKKOrMFOjNYMEWew
3.191 http args {}
3.352 response URL with fragment
3.353 response access_token=m6jX7_4Up8yZLxb7Z8zcQGA6zb7oCTJ8nJqdOLKSf2A.0baIwCM1Bybj0N9NlUiBF696INJzGu2_hPfpQZZQt4w&code=9B4TIyDOncM1Q3a64_RuFKdk0eJLCQbYzGzRtQtehMU.JaEwuZcARP_mM09wqNJLR3q4IABYjhHmf2V0VJnbjHE&expires_in=3599&scope=openid&state=DphsZnehedOLT5Oq&token_type=bearer
3.353 response {'scope': 'openid', 'code': '9B4TIyDOncM1Q3a64_RuFKdk0eJLCQbYzGzRtQtehMU.JaEwuZcARP_mM09wqNJLR3q4IABYjhHmf2V0VJnbjHE', 'access_token': 'm6jX7_4Up8yZLxb7Z8zcQGA6zb7oCTJ8nJqdOLKSf2A.0baIwCM1Bybj0N9NlUiBF696INJzGu2_hPfpQZZQt4w', 'state': 'DphsZnehedOLT5Oq', 'expires_in': 3599, 'token_type': 'bearer'}
3.354 AuthorizationResponse {
"access_token": "m6jX7_4Up8yZLxb7Z8zcQGA6zb7oCTJ8nJqdOLKSf2A.0baIwCM1Bybj0N9NlUiBF696INJzGu2_hPfpQZZQt4w",
"code": "9B4TIyDOncM1Q3a64_RuFKdk0eJLCQbYzGzRtQtehMU.JaEwuZcARP_mM09wqNJLR3q4IABYjhHmf2V0VJnbjHE",
"expires_in": 3599,
"scope": "openid",
"state": "DphsZnehedOLT5Oq",
"token_type": "bearer"
}
3.354 phase <--<-- 4 --- AccessToken -->-->
3.354 --> request op_args: {'state': 'DphsZnehedOLT5Oq'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.354 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'DphsZnehedOLT5Oq', 'code': '9B4TIyDOncM1Q3a64_RuFKdk0eJLCQbYzGzRtQtehMU.JaEwuZcARP_mM09wqNJLR3q4IABYjhHmf2V0VJnbjHE', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '0548df7e-a572-4d22-82c5-7956e17eeedb'}, 'state': 'DphsZnehedOLT5Oq'}
3.354 AccessTokenRequest {
"code": "9B4TIyDOncM1Q3a64_RuFKdk0eJLCQbYzGzRtQtehMU.JaEwuZcARP_mM09wqNJLR3q4IABYjhHmf2V0VJnbjHE",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "DphsZnehedOLT5Oq"
}
3.354 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.354 request_http_args {'headers': {'Authorization': 'Basic MDU0OGRmN2UtYTU3Mi00ZDIyLTgyYzUtNzk1NmUxN2VlZWRiOnpzb2w3SGQxM2s2Uw==', 'Content-Type': 'application/x-www-form-urlencoded'}}
3.354 request code=9B4TIyDOncM1Q3a64_RuFKdk0eJLCQbYzGzRtQtehMU.JaEwuZcARP_mM09wqNJLR3q4IABYjhHmf2V0VJnbjHE&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=DphsZnehedOLT5Oq
3.566 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.567 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiUWMyNjRuTG40cVpwbjZZSjlsT2Z1USIsImF1ZCI6WyIwNTQ4ZGY3ZS1hNTcyLTRkMjItODJjNS03OTU2ZTE3ZWVlZGIiXSwiYXV0aF90aW1lIjoxNTI5NzUyMTgwLCJjX2hhc2giOiJyTF93Z0Y2aE45Y3BEOW04NUh3eHV3IiwiZXhwIjoxNTI5NzU1ODk2LCJpYXQiOjE1Mjk3NTIyOTcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6Ijc0ZDZlZTNhLTc1MTAtNGMyYS1iNGMwLTQ5ZGUyY2ZlNmFlNiIsIm5vbmNlIjoiZ0tLT3JNRk9qTllNRVdldyIsInJhdCI6MTUyOTc1MjI5NCwic3ViIjoiZm9vQGJhci5jb20ifQ.VdoM4L96Xew8hIdSbF5hfhKa7v8rIipSVov47aXJFUFtfxd1wvsj5S09374gHGNI4fopelWzDT2b0qX2bZQ6b8wlL2ihxUWaflJU00d2nPVO3P7gshtFMHrN7QPW4EGGe08YnqI6B8O0rT2CVfYF2UVcW9PlLTlrFMmjrPyhoDAJNK5Ow7vEZm-5J7G8Ho_Bua_tuUaBNV0R8Ohda8d9BT_in7CZ_JrsB7YbTOAwy2IRavHTyjmanezfHYdNI63B-SnG32KVb_gbERNYwIM-GY9JQoQOnjbzc4O71kSnQ14v6wMdg7moqIFsZiiJBCWN_ukug5UZxI0V0hq_FcUxenf_kBoIGWUIZh2AiX8u34A9m4rEpMfU56HYy2J7U-tmXRxKW_3GcAEFF7jPr_qabudhIm3uRwh97vyoFneEz1QxQGtimg1j12PU51vO_dpt2tGNDG1QRRveqUUiYuBCrzRGgQPvPozUfl-Ot6t2XdhxStAPmlyY-aoLEONekUOeMpBwS6giyGki0otVWIfPhJDmF2Qgef8_69NiuwDivg03eSxU6-qHCYOs0L7wLE_9Sg96fCBR0H9JzbnUNobM6qj_YvQFCccRXkKni9bbDfp-vGRlnC7jEx-Fb0QyvYOHZaTmph4MwPMcjBM3Ayt2uwI6xF6g_IAe0mLwFiB_5qw', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'xQqvFSCxuceHYVAw1EUHocqcTbMhbe5BSf2P-adM7P8.t5GChD6tSkVuPZ03K7ZqqDz2rM71LnaqFSqtYQKOOaQ', 'scope': 'openid'}
3.647 AccessTokenResponse {
"access_token": "xQqvFSCxuceHYVAw1EUHocqcTbMhbe5BSf2P-adM7P8.t5GChD6tSkVuPZ03K7ZqqDz2rM71LnaqFSqtYQKOOaQ",
"expires_in": 3599,
"id_token": {
"at_hash": "Qc264nLn4qZpn6YJ9lOfuQ",
"aud": [
"0548df7e-a572-4d22-82c5-7956e17eeedb"
],
"auth_time": 1529752180,
"c_hash": "rL_wgF6hN9cpD9m85Hwxuw",
"exp": 1529755896,
"iat": 1529752297,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "74d6ee3a-7510-4c2a-b4c0-49de2cfe6ae6",
"nonce": "gKKOrMFOjNYMEWew",
"rat": 1529752294,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.647 phase <--<-- 5 --- AsyncAuthn -->-->
3.648 AuthorizationRequest {
"client_id": "0548df7e-a572-4d22-82c5-7956e17eeedb",
"id_token_hint": "eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiUWMyNjRuTG40cVpwbjZZSjlsT2Z1USIsImF1ZCI6WyIwNTQ4ZGY3ZS1hNTcyLTRkMjItODJjNS03OTU2ZTE3ZWVlZGIiXSwiYXV0aF90aW1lIjoxNTI5NzUyMTgwLCJjX2hhc2giOiJyTF93Z0Y2aE45Y3BEOW04NUh3eHV3IiwiZXhwIjoxNTI5NzU1ODk2LCJpYXQiOjE1Mjk3NTIyOTcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6Ijc0ZDZlZTNhLTc1MTAtNGMyYS1iNGMwLTQ5ZGUyY2ZlNmFlNiIsIm5vbmNlIjoiZ0tLT3JNRk9qTllNRVdldyIsInJhdCI6MTUyOTc1MjI5NCwic3ViIjoiZm9vQGJhci5jb20ifQ.VdoM4L96Xew8hIdSbF5hfhKa7v8rIipSVov47aXJFUFtfxd1wvsj5S09374gHGNI4fopelWzDT2b0qX2bZQ6b8wlL2ihxUWaflJU00d2nPVO3P7gshtFMHrN7QPW4EGGe08YnqI6B8O0rT2CVfYF2UVcW9PlLTlrFMmjrPyhoDAJNK5Ow7vEZm-5J7G8Ho_Bua_tuUaBNV0R8Ohda8d9BT_in7CZ_JrsB7YbTOAwy2IRavHTyjmanezfHYdNI63B-SnG32KVb_gbERNYwIM-GY9JQoQOnjbzc4O71kSnQ14v6wMdg7moqIFsZiiJBCWN_ukug5UZxI0V0hq_FcUxenf_kBoIGWUIZh2AiX8u34A9m4rEpMfU56HYy2J7U-tmXRxKW_3GcAEFF7jPr_qabudhIm3uRwh97vyoFneEz1QxQGtimg1j12PU51vO_dpt2tGNDG1QRRveqUUiYuBCrzRGgQPvPozUfl-Ot6t2XdhxStAPmlyY-aoLEONekUOeMpBwS6giyGki0otVWIfPhJDmF2Qgef8_69NiuwDivg03eSxU6-qHCYOs0L7wLE_9Sg96fCBR0H9JzbnUNobM6qj_YvQFCccRXkKni9bbDfp-vGRlnC7jEx-Fb0QyvYOHZaTmph4MwPMcjBM3Ayt2uwI6xF6g_IAe0mLwFiB_5qw",
"nonce": "EKtmEA7RmKnrelfg",
"prompt": [
"none"
],
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "LTHgvz8QdDq0YfjV"
}
3.648 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=0548df7e-a572-4d22-82c5-7956e17eeedb&state=LTHgvz8QdDq0YfjV&id_token_hint=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiUWMyNjRuTG40cVpwbjZZSjlsT2Z1USIsImF1ZCI6WyIwNTQ4ZGY3ZS1hNTcyLTRkMjItODJjNS03OTU2ZTE3ZWVlZGIiXSwiYXV0aF90aW1lIjoxNTI5NzUyMTgwLCJjX2hhc2giOiJyTF93Z0Y2aE45Y3BEOW04NUh3eHV3IiwiZXhwIjoxNTI5NzU1ODk2LCJpYXQiOjE1Mjk3NTIyOTcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6Ijc0ZDZlZTNhLTc1MTAtNGMyYS1iNGMwLTQ5ZGUyY2ZlNmFlNiIsIm5vbmNlIjoiZ0tLT3JNRk9qTllNRVdldyIsInJhdCI6MTUyOTc1MjI5NCwic3ViIjoiZm9vQGJhci5jb20ifQ.VdoM4L96Xew8hIdSbF5hfhKa7v8rIipSVov47aXJFUFtfxd1wvsj5S09374gHGNI4fopelWzDT2b0qX2bZQ6b8wlL2ihxUWaflJU00d2nPVO3P7gshtFMHrN7QPW4EGGe08YnqI6B8O0rT2CVfYF2UVcW9PlLTlrFMmjrPyhoDAJNK5Ow7vEZm-5J7G8Ho_Bua_tuUaBNV0R8Ohda8d9BT_in7CZ_JrsB7YbTOAwy2IRavHTyjmanezfHYdNI63B-SnG32KVb_gbERNYwIM-GY9JQoQOnjbzc4O71kSnQ14v6wMdg7moqIFsZiiJBCWN_ukug5UZxI0V0hq_FcUxenf_kBoIGWUIZh2AiX8u34A9m4rEpMfU56HYy2J7U-tmXRxKW_3GcAEFF7jPr_qabudhIm3uRwh97vyoFneEz1QxQGtimg1j12PU51vO_dpt2tGNDG1QRRveqUUiYuBCrzRGgQPvPozUfl-Ot6t2XdhxStAPmlyY-aoLEONekUOeMpBwS6giyGki0otVWIfPhJDmF2Qgef8_69NiuwDivg03eSxU6-qHCYOs0L7wLE_9Sg96fCBR0H9JzbnUNobM6qj_YvQFCccRXkKni9bbDfp-vGRlnC7jEx-Fb0QyvYOHZaTmph4MwPMcjBM3Ayt2uwI6xF6g_IAe0mLwFiB_5qw&response_type=code+token&nonce=EKtmEA7RmKnrelfg
3.648 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=0548df7e-a572-4d22-82c5-7956e17eeedb&state=LTHgvz8QdDq0YfjV&id_token_hint=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiUWMyNjRuTG40cVpwbjZZSjlsT2Z1USIsImF1ZCI6WyIwNTQ4ZGY3ZS1hNTcyLTRkMjItODJjNS03OTU2ZTE3ZWVlZGIiXSwiYXV0aF90aW1lIjoxNTI5NzUyMTgwLCJjX2hhc2giOiJyTF93Z0Y2aE45Y3BEOW04NUh3eHV3IiwiZXhwIjoxNTI5NzU1ODk2LCJpYXQiOjE1Mjk3NTIyOTcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6Ijc0ZDZlZTNhLTc1MTAtNGMyYS1iNGMwLTQ5ZGUyY2ZlNmFlNiIsIm5vbmNlIjoiZ0tLT3JNRk9qTllNRVdldyIsInJhdCI6MTUyOTc1MjI5NCwic3ViIjoiZm9vQGJhci5jb20ifQ.VdoM4L96Xew8hIdSbF5hfhKa7v8rIipSVov47aXJFUFtfxd1wvsj5S09374gHGNI4fopelWzDT2b0qX2bZQ6b8wlL2ihxUWaflJU00d2nPVO3P7gshtFMHrN7QPW4EGGe08YnqI6B8O0rT2CVfYF2UVcW9PlLTlrFMmjrPyhoDAJNK5Ow7vEZm-5J7G8Ho_Bua_tuUaBNV0R8Ohda8d9BT_in7CZ_JrsB7YbTOAwy2IRavHTyjmanezfHYdNI63B-SnG32KVb_gbERNYwIM-GY9JQoQOnjbzc4O71kSnQ14v6wMdg7moqIFsZiiJBCWN_ukug5UZxI0V0hq_FcUxenf_kBoIGWUIZh2AiX8u34A9m4rEpMfU56HYy2J7U-tmXRxKW_3GcAEFF7jPr_qabudhIm3uRwh97vyoFneEz1QxQGtimg1j12PU51vO_dpt2tGNDG1QRRveqUUiYuBCrzRGgQPvPozUfl-Ot6t2XdhxStAPmlyY-aoLEONekUOeMpBwS6giyGki0otVWIfPhJDmF2Qgef8_69NiuwDivg03eSxU6-qHCYOs0L7wLE_9Sg96fCBR0H9JzbnUNobM6qj_YvQFCccRXkKni9bbDfp-vGRlnC7jEx-Fb0QyvYOHZaTmph4MwPMcjBM3Ayt2uwI6xF6g_IAe0mLwFiB_5qw&response_type=code+token&nonce=EKtmEA7RmKnrelfg
4.485 http args {}
4.63 response URL with fragment
4.631 response access_token=ep8oUbS08mDylbhYXdwebT-ZSI1QBnkA9t53Tq2JVqQ.kkVaNRxZRbdyMguLeHEvg_0JxcqHe4BEkBivzsJdgUg&code=NYr0cJ63ufyDwjUHW4peG5EnjiQILivYlpVYHE0fvQo.TcoDpou4W4LfooD3qukXx4t2GYZsP0E55MzaW0j3qnc&expires_in=3599&scope=openid&state=LTHgvz8QdDq0YfjV&token_type=bearer
4.631 response {'scope': 'openid', 'code': 'NYr0cJ63ufyDwjUHW4peG5EnjiQILivYlpVYHE0fvQo.TcoDpou4W4LfooD3qukXx4t2GYZsP0E55MzaW0j3qnc', 'access_token': 'ep8oUbS08mDylbhYXdwebT-ZSI1QBnkA9t53Tq2JVqQ.kkVaNRxZRbdyMguLeHEvg_0JxcqHe4BEkBivzsJdgUg', 'state': 'LTHgvz8QdDq0YfjV', 'expires_in': 3599, 'token_type': 'bearer'}
4.631 AuthorizationResponse {
"access_token": "ep8oUbS08mDylbhYXdwebT-ZSI1QBnkA9t53Tq2JVqQ.kkVaNRxZRbdyMguLeHEvg_0JxcqHe4BEkBivzsJdgUg",
"code": "NYr0cJ63ufyDwjUHW4peG5EnjiQILivYlpVYHE0fvQo.TcoDpou4W4LfooD3qukXx4t2GYZsP0E55MzaW0j3qnc",
"expires_in": 3599,
"scope": "openid",
"state": "LTHgvz8QdDq0YfjV",
"token_type": "bearer"
}
4.632 phase <--<-- 6 --- AccessToken -->-->
4.632 --> request op_args: {'state': 'LTHgvz8QdDq0YfjV'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
4.632 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'LTHgvz8QdDq0YfjV', 'code': 'NYr0cJ63ufyDwjUHW4peG5EnjiQILivYlpVYHE0fvQo.TcoDpou4W4LfooD3qukXx4t2GYZsP0E55MzaW0j3qnc', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '0548df7e-a572-4d22-82c5-7956e17eeedb'}, 'state': 'LTHgvz8QdDq0YfjV'}
4.632 AccessTokenRequest {
"code": "NYr0cJ63ufyDwjUHW4peG5EnjiQILivYlpVYHE0fvQo.TcoDpou4W4LfooD3qukXx4t2GYZsP0E55MzaW0j3qnc",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "LTHgvz8QdDq0YfjV"
}
4.632 request_url https://oidc-certification.ory.sh:8443/oauth2/token
4.632 request_http_args {'headers': {'Authorization': 'Basic MDU0OGRmN2UtYTU3Mi00ZDIyLTgyYzUtNzk1NmUxN2VlZWRiOnpzb2w3SGQxM2s2Uw==', 'Content-Type': 'application/x-www-form-urlencoded'}}
4.632 request code=NYr0cJ63ufyDwjUHW4peG5EnjiQILivYlpVYHE0fvQo.TcoDpou4W4LfooD3qukXx4t2GYZsP0E55MzaW0j3qnc&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=LTHgvz8QdDq0YfjV
4.853 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
4.854 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiaEJuUS1wNkNfV2ZTSmNPd0ItVG9jdyIsImF1ZCI6WyIwNTQ4ZGY3ZS1hNTcyLTRkMjItODJjNS03OTU2ZTE3ZWVlZGIiXSwiYXV0aF90aW1lIjoxNTI5NzUyMTgwLCJjX2hhc2giOiJPbEtnMXBSdXZ0NTJjQnpuLTM3MlF3IiwiZXhwIjoxNTI5NzU1ODk4LCJpYXQiOjE1Mjk3NTIyOTgsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjM1MDBhNmE1LTkyZDMtNDhhMC04ZjMwLTRjODFhZjhmZTc0YSIsIm5vbmNlIjoiRUt0bUVBN1JtS25yZWxmZyIsInJhdCI6MTUyOTc1MjI5Nywic3ViIjoiZm9vQGJhci5jb20ifQ.SBIzkWaiTOZ1wrNlhs-mE6vrUo7WmMGWDZFaACdJ2SLcY2rvOxvHWVKXjlg3UdP2QDP7AZZ_IdHH9L1D0mzUG1eKVFnZk6GkDwlk_70eB7Mt0nh0wSE6lCyOs2LpypQDrn1fDFPEPbl7RJb6vLi04r__hQay4ZmNmliwkY_usUMVNZNgwXi5cXF6JlgV6dmdT19fWm3y3kiOr_rMigRze5CogE5kFvtr8iJWYfcTGEByRrx0s2DMB6XFChwnfBQspCUASdutBKeN7feUWSoy0sJze_K5DeSJBnoDmoxxLAjYkSGmRcdDL0jlDWgkKDhp7P7cWjJkzWVR4auJP7rf-pmOlvPeHWm-WAxffv0pVGaEYtwLyGjUKuaUJmaeH4ewf5caQDZ8wXT8jK0kOzlLRAE5DLW8WBJTWztePH8bfokFon2yTPwJbwcNMnKuzV9PKpZEVgCVMZ5QbIZ8THjk78zC6LDecSZIriFh4wJ_OCrI1G7Hkl1STD6sciPu3VUesyoadUUnxmM-aVOA-1jFey7kauxhhcMZAwgwBn_iOiyeI_fVRYyaG5kVRWdbGNsxnhhgNTJZtKDl7clSjHONi1-yYyWFcI8l7RH_SYSC7vSlNJbUGMKkHH96jih5BNRV8t9XjSJ479lsyPc2t2T-BXIBSmKMugsKFWNDMRUOgR8', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'ct47I8bX3JyI4pM4kzJUQdZ68xR829dowPYf-jJA6lk.VXwu4fRhEypFOyoiFEe7rqsqgQVEvCCmWqR_XNfpTQ8', 'scope': 'openid'}
4.857 AccessTokenResponse {
"access_token": "ct47I8bX3JyI4pM4kzJUQdZ68xR829dowPYf-jJA6lk.VXwu4fRhEypFOyoiFEe7rqsqgQVEvCCmWqR_XNfpTQ8",
"expires_in": 3599,
"id_token": {
"at_hash": "hBnQ-p6C_WfSJcOwB-Tocw",
"aud": [
"0548df7e-a572-4d22-82c5-7956e17eeedb"
],
"auth_time": 1529752180,
"c_hash": "OlKg1pRuvt52cBzn-372Qw",
"exp": 1529755898,
"iat": 1529752298,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "3500a6a5-92d3-48a0-8f30-4c81af8fe74a",
"nonce": "EKtmEA7RmKnrelfg",
"rat": 1529752297,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
4.857 phase <--<-- 7 --- Done -->-->
4.857 end
4.858 assertion VerifyResponse
4.858 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.858 assertion SameAuthn
4.858 condition same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
4.858 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-Req-login_hint.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-login_hint
Test description: Providing login_hint
Timestamp: 2018-06-23T11:12:31Z
============================================================
Trace output
0.0 phase <--<-- 0 --- VerifyConfiguration -->-->
0.0 phase <--<-- 1 --- Note -->-->
47.686 phase <--<-- 2 --- Webfinger -->-->
47.686 not expected to do WebFinger
47.686 phase <--<-- 3 --- Discovery -->-->
47.686 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
47.809 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
47.81 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
47.81 phase <--<-- 4 --- Registration -->-->
47.81 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
47.811 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#ahC0t2jhBEOMCFq9"
],
"response_types": [
"code token"
]
}
47.968 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
47.969 RegistrationResponse {
"client_id": "951eda20-df5f-46c3-938f-878b289a5579",
"client_secret": "eH8HkRE_imLo",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "951eda20-df5f-46c3-938f-878b289a5579",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#ahC0t2jhBEOMCFq9"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
47.969 phase <--<-- 5 --- AsyncAuthn -->-->
47.97 AuthorizationRequest {
"client_id": "951eda20-df5f-46c3-938f-878b289a5579",
"login_hint": "[email protected]",
"nonce": "09sPr2CA1ZhdD5vn",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "xrnSHlTUyRUKkFnQ"
}
47.97 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=951eda20-df5f-46c3-938f-878b289a5579&state=xrnSHlTUyRUKkFnQ&response_type=code+token&nonce=09sPr2CA1ZhdD5vn&login_hint=foo%40bar.com
47.97 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=951eda20-df5f-46c3-938f-878b289a5579&state=xrnSHlTUyRUKkFnQ&response_type=code+token&nonce=09sPr2CA1ZhdD5vn&login_hint=foo%40bar.com
51.24 http args {}
51.402 response URL with fragment
51.403 response access_token=BS7quGhguh_RACXG5zRxDxZz6DOxVynS0HSQLIw7VLI.wtfacVTSRjaXCUXaVD-RvSR0kk4BpMGodDz8dY-mzfU&code=IpAc69-L-ct4vHUpixEiZNY-VgBTfobHkn6TRfPqeaA.nGRyYir1BKZAW-lLwhEyi-cYfqbKy5tmLzKZ8ZKwxvg&expires_in=3599&scope=openid&state=xrnSHlTUyRUKkFnQ&token_type=bearer
51.403 response {'scope': 'openid', 'code': 'IpAc69-L-ct4vHUpixEiZNY-VgBTfobHkn6TRfPqeaA.nGRyYir1BKZAW-lLwhEyi-cYfqbKy5tmLzKZ8ZKwxvg', 'access_token': 'BS7quGhguh_RACXG5zRxDxZz6DOxVynS0HSQLIw7VLI.wtfacVTSRjaXCUXaVD-RvSR0kk4BpMGodDz8dY-mzfU', 'state': 'xrnSHlTUyRUKkFnQ', 'expires_in': 3599, 'token_type': 'bearer'}
51.403 AuthorizationResponse {
"access_token": "BS7quGhguh_RACXG5zRxDxZz6DOxVynS0HSQLIw7VLI.wtfacVTSRjaXCUXaVD-RvSR0kk4BpMGodDz8dY-mzfU",
"code": "IpAc69-L-ct4vHUpixEiZNY-VgBTfobHkn6TRfPqeaA.nGRyYir1BKZAW-lLwhEyi-cYfqbKy5tmLzKZ8ZKwxvg",
"expires_in": 3599,
"scope": "openid",
"state": "xrnSHlTUyRUKkFnQ",
"token_type": "bearer"
}
51.404 phase <--<-- 6 --- Done -->-->
51.404 end
51.404 assertion VerifyAuthnResponse
51.404 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
51.404 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-Req-max_age=1.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-max_age=1
Test description: Requesting ID Token with max_age=1 seconds restriction
Timestamp: 2018-06-23T11:12:54Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.161 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.162 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.162 phase <--<-- 2 --- Registration -->-->
0.163 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.163 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#s9ZlOS7F3vVLykyD"
],
"response_types": [
"code token"
]
}
0.326 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.327 RegistrationResponse {
"client_id": "db9a45f4-7bc4-4efc-8d0a-e6670fb32982",
"client_secret": "AT.1Yc2v~6un",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "db9a45f4-7bc4-4efc-8d0a-e6670fb32982",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#s9ZlOS7F3vVLykyD"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.327 phase <--<-- 3 --- AsyncAuthn -->-->
0.328 AuthorizationRequest {
"client_id": "db9a45f4-7bc4-4efc-8d0a-e6670fb32982",
"nonce": "pFp9BnpnIDkYoMU1",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "ldjLmjyvb38loz24"
}
0.328 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=db9a45f4-7bc4-4efc-8d0a-e6670fb32982&state=ldjLmjyvb38loz24&response_type=code+token&nonce=pFp9BnpnIDkYoMU1
0.328 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=db9a45f4-7bc4-4efc-8d0a-e6670fb32982&state=ldjLmjyvb38loz24&response_type=code+token&nonce=pFp9BnpnIDkYoMU1
3.479 http args {}
3.642 response URL with fragment
3.642 response access_token=VSlcokdXxAQ33rWDDrU69CHUovFZ-z6cyfQbkduJW1k.jp5dB7kbOLe4uY_535iHHrck8cfj3QrzgX_Y9pYJFiA&code=Zf1NLPwsCqQrSbP2xXD2haSk6RvbmxEXK2y9AZ0CC48.wL8LJfCopk9mL3HwFdSfTbo26JRB7LMC6ntZu5kLvSw&expires_in=3599&scope=openid&state=ldjLmjyvb38loz24&token_type=bearer
3.642 response {'scope': 'openid', 'code': 'Zf1NLPwsCqQrSbP2xXD2haSk6RvbmxEXK2y9AZ0CC48.wL8LJfCopk9mL3HwFdSfTbo26JRB7LMC6ntZu5kLvSw', 'access_token': 'VSlcokdXxAQ33rWDDrU69CHUovFZ-z6cyfQbkduJW1k.jp5dB7kbOLe4uY_535iHHrck8cfj3QrzgX_Y9pYJFiA', 'state': 'ldjLmjyvb38loz24', 'expires_in': 3599, 'token_type': 'bearer'}
3.643 AuthorizationResponse {
"access_token": "VSlcokdXxAQ33rWDDrU69CHUovFZ-z6cyfQbkduJW1k.jp5dB7kbOLe4uY_535iHHrck8cfj3QrzgX_Y9pYJFiA",
"code": "Zf1NLPwsCqQrSbP2xXD2haSk6RvbmxEXK2y9AZ0CC48.wL8LJfCopk9mL3HwFdSfTbo26JRB7LMC6ntZu5kLvSw",
"expires_in": 3599,
"scope": "openid",
"state": "ldjLmjyvb38loz24",
"token_type": "bearer"
}
3.643 phase <--<-- 4 --- AccessToken -->-->
3.643 --> request op_args: {'state': 'ldjLmjyvb38loz24'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.643 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'ldjLmjyvb38loz24', 'code': 'Zf1NLPwsCqQrSbP2xXD2haSk6RvbmxEXK2y9AZ0CC48.wL8LJfCopk9mL3HwFdSfTbo26JRB7LMC6ntZu5kLvSw', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'db9a45f4-7bc4-4efc-8d0a-e6670fb32982'}, 'state': 'ldjLmjyvb38loz24'}
3.643 AccessTokenRequest {
"code": "Zf1NLPwsCqQrSbP2xXD2haSk6RvbmxEXK2y9AZ0CC48.wL8LJfCopk9mL3HwFdSfTbo26JRB7LMC6ntZu5kLvSw",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "ldjLmjyvb38loz24"
}
3.643 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.643 request_http_args {'headers': {'Authorization': 'Basic ZGI5YTQ1ZjQtN2JjNC00ZWZjLThkMGEtZTY2NzBmYjMyOTgyOkFULjFZYzJ2JTdFNnVu', 'Content-Type': 'application/x-www-form-urlencoded'}}
3.643 request code=Zf1NLPwsCqQrSbP2xXD2haSk6RvbmxEXK2y9AZ0CC48.wL8LJfCopk9mL3HwFdSfTbo26JRB7LMC6ntZu5kLvSw&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=ldjLmjyvb38loz24
3.906 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.907 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiNjJ3QlVwMU5NUURzdG0xVXR4OGVYQSIsImF1ZCI6WyJkYjlhNDVmNC03YmM0LTRlZmMtOGQwYS1lNjY3MGZiMzI5ODIiXSwiYXV0aF90aW1lIjoxNTI5NzUyMTgwLCJjX2hhc2giOiJjbjJfTHQzVlRqYUdfckNfTU4zeWhnIiwiZXhwIjoxNTI5NzU1OTY2LCJpYXQiOjE1Mjk3NTIzNjYsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjkxM2QzMjIwLTYxNWMtNGY3My04NDk0LTU1MDgyNGMyMWEzZSIsIm5vbmNlIjoicEZwOUJucG5JRGtZb01VMSIsInJhdCI6MTUyOTc1MjM2Mywic3ViIjoiZm9vQGJhci5jb20ifQ.dpyipHQyLhuLP-wsfnYVnwFTK42tIYToRPS93_MyeClMt2N_blkPGjT3JC4g9hcjk-U6VhYliwcHKwYtbQoEljcvrRIN3iCcpixi1W29f3R6KV4jcF9K1GnrudxyZ6Fici3h-tjsVuzLZgEvGueMrWg8EapUyuiq44cnYso9qAWL4Qx5vkj2mfFBabc9qWlpiyVnvWNhbByeJzUWKXg1WidgNlsbIRYilKOKfCYreulHqp4pC3Ii9voov93Czzpr8qx4XvsPrTYC4HLkLYPqqYMNefy7dGAKUtfsVNdAD25GJeuX7VofBzqZifk23jGdVfLaOBWAo8gl5oJKNB4xUP4-RdGMegWIbkR4Mpd9VkMN7b9zWhz_LW2Fmo7a8wmRuI6NfKTF_OctY9NOgbgd-6Yzb5Amf6fV31vwCgd-d4uMZjpft-qiaCxkmdxS6UA7WiLgmL6B-rdIYmwUXLDk7tfFOYASHGMxDAvZYR_jdEgtx1HRQR25URW4IxapiecGJxvhox7dxkbWOIXlYKrXPcDZFb2eoRU1DU3bnevKYEK-HH0dvD6Zl5B1aye-MUyPCzISc712NYEm6ozHRXL-Mk1w--N55paqs9A3_nv3nsxxPBTnnSlgquWibleFk5RCT5xisJuBAKt1ChE0a-aYymGhTSirlamZBkR1-AUbj2s', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'bIURbHGAMaM1y4YWSdPZqkOoYtPS_60M4sGP6GcUUiM.wUHWlUOeB-z53BRmXXHhno6WWD4Pvk-XmXoZSSL5QeU', 'scope': 'openid'}
4.023 AccessTokenResponse {
"access_token": "bIURbHGAMaM1y4YWSdPZqkOoYtPS_60M4sGP6GcUUiM.wUHWlUOeB-z53BRmXXHhno6WWD4Pvk-XmXoZSSL5QeU",
"expires_in": 3599,
"id_token": {
"at_hash": "62wBUp1NMQDstm1Utx8eXA",
"aud": [
"db9a45f4-7bc4-4efc-8d0a-e6670fb32982"
],
"auth_time": 1529752180,
"c_hash": "cn2_Lt3VTjaG_rC_MN3yhg",
"exp": 1529755966,
"iat": 1529752366,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "913d3220-615c-4f73-8494-550824c21a3e",
"nonce": "pFp9BnpnIDkYoMU1",
"rat": 1529752363,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
4.023 phase <--<-- 5 --- Note -->-->
5.56 phase <--<-- 6 --- Webfinger -->-->
5.561 not expected to do WebFinger
5.561 phase <--<-- 7 --- Discovery -->-->
5.561 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
5.634 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
5.635 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
5.635 phase <--<-- 8 --- Registration -->-->
5.635 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
5.636 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#1XqBToJzhWtTeugi"
],
"response_types": [
"code token"
]
}
5.829 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
5.83 RegistrationResponse {
"client_id": "c7f68612-5ccd-45de-90e9-eaaa17327512",
"client_secret": "B2.1KsZ_SDjP",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "c7f68612-5ccd-45de-90e9-eaaa17327512",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#1XqBToJzhWtTeugi"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
5.83 phase <--<-- 9 --- AsyncAuthn -->-->
5.831 AuthorizationRequest {
"client_id": "c7f68612-5ccd-45de-90e9-eaaa17327512",
"max_age": 1,
"nonce": "82r66Ba9gmwV3fEU",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "ZQQ7I1PGBvWbuTR2"
}
5.831 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?max_age=1&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=c7f68612-5ccd-45de-90e9-eaaa17327512&state=ZQQ7I1PGBvWbuTR2&response_type=code+token&nonce=82r66Ba9gmwV3fEU
5.831 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?max_age=1&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=c7f68612-5ccd-45de-90e9-eaaa17327512&state=ZQQ7I1PGBvWbuTR2&response_type=code+token&nonce=82r66Ba9gmwV3fEU
11.437 http args {}
11.602 response URL with fragment
11.602 response access_token=GaglfypfWM30QPNHrSs2m1OwjPWLwqRgk6KQ_D8tjrI.t_e77Vy505NhTGTQpahyAJpNfJO98SvK4ofOaL-xlHs&code=Jv_TtSgO9lew-aWfsLkdimZEJC5sNpYhfX7VFaDU7Fg.SqacRA3_-bl9vMlUlfFL8wl4cB8oqII4eybDtE3uSpg&expires_in=3599&scope=openid&state=ZQQ7I1PGBvWbuTR2&token_type=bearer
11.603 response {'scope': 'openid', 'code': 'Jv_TtSgO9lew-aWfsLkdimZEJC5sNpYhfX7VFaDU7Fg.SqacRA3_-bl9vMlUlfFL8wl4cB8oqII4eybDtE3uSpg', 'access_token': 'GaglfypfWM30QPNHrSs2m1OwjPWLwqRgk6KQ_D8tjrI.t_e77Vy505NhTGTQpahyAJpNfJO98SvK4ofOaL-xlHs', 'state': 'ZQQ7I1PGBvWbuTR2', 'expires_in': 3599, 'token_type': 'bearer'}
11.603 AuthorizationResponse {
"access_token": "GaglfypfWM30QPNHrSs2m1OwjPWLwqRgk6KQ_D8tjrI.t_e77Vy505NhTGTQpahyAJpNfJO98SvK4ofOaL-xlHs",
"code": "Jv_TtSgO9lew-aWfsLkdimZEJC5sNpYhfX7VFaDU7Fg.SqacRA3_-bl9vMlUlfFL8wl4cB8oqII4eybDtE3uSpg",
"expires_in": 3599,
"scope": "openid",
"state": "ZQQ7I1PGBvWbuTR2",
"token_type": "bearer"
}
11.603 phase <--<-- 10 --- AccessToken -->-->
11.603 --> request op_args: {'state': 'ZQQ7I1PGBvWbuTR2'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
11.603 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'ZQQ7I1PGBvWbuTR2', 'code': 'Jv_TtSgO9lew-aWfsLkdimZEJC5sNpYhfX7VFaDU7Fg.SqacRA3_-bl9vMlUlfFL8wl4cB8oqII4eybDtE3uSpg', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'c7f68612-5ccd-45de-90e9-eaaa17327512'}, 'state': 'ZQQ7I1PGBvWbuTR2'}
11.603 AccessTokenRequest {
"code": "Jv_TtSgO9lew-aWfsLkdimZEJC5sNpYhfX7VFaDU7Fg.SqacRA3_-bl9vMlUlfFL8wl4cB8oqII4eybDtE3uSpg",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "ZQQ7I1PGBvWbuTR2"
}
11.603 request_url https://oidc-certification.ory.sh:8443/oauth2/token
11.603 request_http_args {'headers': {'Authorization': 'Basic YzdmNjg2MTItNWNjZC00NWRlLTkwZTktZWFhYTE3MzI3NTEyOkIyLjFLc1pfU0RqUA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
11.603 request code=Jv_TtSgO9lew-aWfsLkdimZEJC5sNpYhfX7VFaDU7Fg.SqacRA3_-bl9vMlUlfFL8wl4cB8oqII4eybDtE3uSpg&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=ZQQ7I1PGBvWbuTR2
11.816 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
11.817 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiN0FOakpubVBoOVIwMEJrQllSaWNkUSIsImF1ZCI6WyJjN2Y2ODYxMi01Y2NkLTQ1ZGUtOTBlOS1lYWFhMTczMjc1MTIiXSwiYXV0aF90aW1lIjoxNTI5NzUyMzcxLCJjX2hhc2giOiJOTjMtQW1ERUk3SUpyNUhBX214OUt3IiwiZXhwIjoxNTI5NzU1OTc0LCJpYXQiOjE1Mjk3NTIzNzQsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjJlZjA5YjA2LTBmY2ItNDZjMi1iODNkLWQxZDgxYWZmZTZkMiIsIm5vbmNlIjoiODJyNjZCYTlnbXdWM2ZFVSIsInJhdCI6MTUyOTc1MjM2OCwic3ViIjoiZm9vQGJhci5jb20ifQ.ldRC1IbPN70RFJn89J7_LeFPjzx5Bq95OrMtbmRmjJu3WQ-w5ns3WLeg9SJzBA0D22F-MOIauPJe_dA_X5M1HNlBKSkoB2r0Iy6LXFxBvNzwf8e4hWmM7ZwiW-Jlw15q1-KDoOLVJLI5wYI9iuvnFaC0V3Jw_-uyE_qsTfprxPZM2XNoWd0-tgTy_L-Ri7VgnW2j_ZrR50Y6dDeGIXF6CJr9oRlBEQyvILqA1ivIfHlCgkZtwD_RvJC_Ecnjf7IhcfhVe84yP5M86vOXNnoMyZPpkDKwdJXx4h0r0d8VZ-h6X_ZTx3IYLE6YiSb2RIclYAy-ZKdPAf9Wb_eYR5K9OcxreJRvylqwgkhNNsYQPLhNJapQjTD97Dn5FAan5cfa71Gm2EwmZpFVTNnkXKfRL9FQ3iUZ4ZSywO5kBAxpesWutcphPRAvtBe2uY-yb00j6V1Z0brVrvFztgwxBQihbPBsbWcU05tQ_P2JDeiyKiEqu7b9mrXMva4PtMeRRT4lBHdq4oQ_X7NX_iVLwe832fSjZimYeEXaJiquSyq71ciQ4IJVIRN283FBh6Up1S5g04mkc0Vs5GMhnbTzY8X9_UvcI-laSuqWO7ORSTkGrqMaIfR2o6SD78EUoQt7LNXpbQL1ilvg-Cv8p1SZEHM3AjZNqGDbtLnyhTv6JnfFXKY', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': '8LBHDAAzuOOZlLQAZQtldK0X3iRBy-JjjHFnL9dnMAg.yr8E711A0bZasuscihSGIgjbUlK3I4fLrIAuyGNqx6U', 'scope': 'openid'}
11.821 AccessTokenResponse {
"access_token": "8LBHDAAzuOOZlLQAZQtldK0X3iRBy-JjjHFnL9dnMAg.yr8E711A0bZasuscihSGIgjbUlK3I4fLrIAuyGNqx6U",
"expires_in": 3599,
"id_token": {
"at_hash": "7ANjJnmPh9R00BkBYRicdQ",
"aud": [
"c7f68612-5ccd-45de-90e9-eaaa17327512"
],
"auth_time": 1529752371,
"c_hash": "NN3-AmDEI7IJr5HA_mx9Kw",
"exp": 1529755974,
"iat": 1529752374,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "2ef09b06-0fcb-46c2-b83d-d1d81affe6d2",
"nonce": "82r66Ba9gmwV3fEU",
"rat": 1529752368,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
11.821 phase <--<-- 11 --- Done -->-->
11.821 end
11.821 assertion AuthTimeCheck
11.821 condition auth_time-check: status=OK [Check that the auth_time returned in the ID Token is in the expected range.]
11.822 assertion VerifyResponse
11.822 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
11.822 assertion ClaimsCheck
11.822 condition claims-check: status=OK [Checks if specific claims is present or not]
11.822 assertion MultipleSignOn
11.822 condition multiple-sign-on: status=OK [Verifies that multiple authentications was used in the flow]
11.822 condition Done: status=OK
============================================================
Conditions
auth_time-check: status=OK [Check that the auth_time returned in the ID Token is in the expected range.]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
claims-check: status=OK [Checks if specific claims is present or not]
multiple-sign-on: status=OK [Verifies that multiple authentications was used in the flow]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-Req-max_age=10000.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-max_age=10000
Test description: Requesting ID Token with max_age=10000 seconds restriction
Timestamp: 2018-06-23T11:13:00Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.082 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.083 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.084 phase <--<-- 2 --- Registration -->-->
0.084 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.084 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Jx1OlyrrqFHhR8UC"
],
"response_types": [
"code token"
]
}
0.287 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.288 RegistrationResponse {
"client_id": "dc2b876e-8680-48e6-b9db-82ba670029d2",
"client_secret": "-B3-V~tupdsc",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "dc2b876e-8680-48e6-b9db-82ba670029d2",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#Jx1OlyrrqFHhR8UC"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.288 phase <--<-- 3 --- AsyncAuthn -->-->
0.289 AuthorizationRequest {
"client_id": "dc2b876e-8680-48e6-b9db-82ba670029d2",
"nonce": "xTZS2RwFP42nyeSM",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "NBBgojuSfzA6hmwS"
}
0.289 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=dc2b876e-8680-48e6-b9db-82ba670029d2&state=NBBgojuSfzA6hmwS&response_type=code+token&nonce=xTZS2RwFP42nyeSM
0.289 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=dc2b876e-8680-48e6-b9db-82ba670029d2&state=NBBgojuSfzA6hmwS&response_type=code+token&nonce=xTZS2RwFP42nyeSM
2.71 http args {}
2.872 response URL with fragment
2.873 response access_token=c0iAsG99EIBqdnOj2S0bh5-bcLG4c52pjMFhRmzWMys._PiwAEAvMxI8wrd7Rq0g-5v41psIOFyDXmANomo0TwY&code=iqK2RIBNItQm4uP2q1oOWoJQFLR3yDfS2dRY-g19zdk.ucgGfF5aM1Q1gXFRuaZHK_7FylKy5kHJZZc2kJyKyfE&expires_in=3599&scope=openid&state=NBBgojuSfzA6hmwS&token_type=bearer
2.873 response {'scope': 'openid', 'code': 'iqK2RIBNItQm4uP2q1oOWoJQFLR3yDfS2dRY-g19zdk.ucgGfF5aM1Q1gXFRuaZHK_7FylKy5kHJZZc2kJyKyfE', 'access_token': 'c0iAsG99EIBqdnOj2S0bh5-bcLG4c52pjMFhRmzWMys._PiwAEAvMxI8wrd7Rq0g-5v41psIOFyDXmANomo0TwY', 'state': 'NBBgojuSfzA6hmwS', 'expires_in': 3599, 'token_type': 'bearer'}
2.873 AuthorizationResponse {
"access_token": "c0iAsG99EIBqdnOj2S0bh5-bcLG4c52pjMFhRmzWMys._PiwAEAvMxI8wrd7Rq0g-5v41psIOFyDXmANomo0TwY",
"code": "iqK2RIBNItQm4uP2q1oOWoJQFLR3yDfS2dRY-g19zdk.ucgGfF5aM1Q1gXFRuaZHK_7FylKy5kHJZZc2kJyKyfE",
"expires_in": 3599,
"scope": "openid",
"state": "NBBgojuSfzA6hmwS",
"token_type": "bearer"
}
2.874 phase <--<-- 4 --- AccessToken -->-->
2.874 --> request op_args: {'state': 'NBBgojuSfzA6hmwS'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.874 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'NBBgojuSfzA6hmwS', 'code': 'iqK2RIBNItQm4uP2q1oOWoJQFLR3yDfS2dRY-g19zdk.ucgGfF5aM1Q1gXFRuaZHK_7FylKy5kHJZZc2kJyKyfE', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'dc2b876e-8680-48e6-b9db-82ba670029d2'}, 'state': 'NBBgojuSfzA6hmwS'}
2.874 AccessTokenRequest {
"code": "iqK2RIBNItQm4uP2q1oOWoJQFLR3yDfS2dRY-g19zdk.ucgGfF5aM1Q1gXFRuaZHK_7FylKy5kHJZZc2kJyKyfE",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "NBBgojuSfzA6hmwS"
}
2.874 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.874 request_http_args {'headers': {'Authorization': 'Basic ZGMyYjg3NmUtODY4MC00OGU2LWI5ZGItODJiYTY3MDAyOWQyOi1CMy1WJTdFdHVwZHNj', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.874 request code=iqK2RIBNItQm4uP2q1oOWoJQFLR3yDfS2dRY-g19zdk.ucgGfF5aM1Q1gXFRuaZHK_7FylKy5kHJZZc2kJyKyfE&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=NBBgojuSfzA6hmwS
3.124 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.125 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiQlQ5S0VOY3EzSVY5VWRtNFo2MUpjdyIsImF1ZCI6WyJkYzJiODc2ZS04NjgwLTQ4ZTYtYjlkYi04MmJhNjcwMDI5ZDIiXSwiYXV0aF90aW1lIjoxNTI5NzUyMzcxLCJjX2hhc2giOiJraGNaN1VEVkZqZWhjR1BiWVJPVVlnIiwiZXhwIjoxNTI5NzU1OTc4LCJpYXQiOjE1Mjk3NTIzNzksImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImFmMmVjZTNjLWYyMzQtNDk1Ni1iYTkwLWQ5NDdhYjU1OWMzMCIsIm5vbmNlIjoieFRaUzJSd0ZQNDJueWVTTSIsInJhdCI6MTUyOTc1MjM3Niwic3ViIjoiZm9vQGJhci5jb20ifQ.r0Fubk37ZozT_ELrOOvcAWQPS-LM0AJHDQNMVxptbQYznHRgOfCKH4p4By-Cz_bk-zkqtRF1JT-nLVqj9eVjQQ5xIBF0SAqOGe3sVShDBAat28PoGZmPpRFIFENNnZv8OwQQDCDYKjnDsdABdgtuyum7eVVrleHgA84Z-oV0n7ZdqdzKO6tekijMNoz7IV4-NolTh0iVqMmUz7KfX9ZBYFw4P0R6xQRwQtp4W1SQ-jyALQWFEdYVUagn5YAbJoFdJMRhxmSF9l7QjGCf-l4vDtnli6Q27xZa13mJqgdOCU6Pws9z-gqJJicEFszxdlSIcoTRHGfTxGQm1XVrf_E5ew3C8Y2PdH64KdM6gM3hR58s5wleCxb0VDRhsa8GkTugQzBYr6Kv0wh5eaXGs6kzw-F_rNUIH2urFU7sLOVL6CoUl4BT1qyLVMoxJpIebHrmPIgIXLw-LuQ9QqNThlbMBwk-uShSWsiEPbPUG2yxG1hbCEgyCmr7jTc-kuFodT7ubgbTkMldzFIXeVPkCRelAd8nEm8Xu91FjHujzV0nNreKgyl6fiHScPvEhDjiLSsK_JUlBGPt43flxdcHbF5gQMBFF4-AXGU7TWuRPQzeK3bTyucdtNHbS3ll0LXMUHtFsPnFwin_a9vNdAFFNZkzThjE0yVbPC488I8e1wZJ00g', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': '3r613cZpB0Z-pOCrADf5rZpoqdEZdQFO31hNsNvWjPU.4fij7Nd-Ky9Gp8Q1X6g98thifKX4KNZII9kAQpER3uw', 'scope': 'openid'}
3.205 AccessTokenResponse {
"access_token": "3r613cZpB0Z-pOCrADf5rZpoqdEZdQFO31hNsNvWjPU.4fij7Nd-Ky9Gp8Q1X6g98thifKX4KNZII9kAQpER3uw",
"expires_in": 3599,
"id_token": {
"at_hash": "BT9KENcq3IV9Udm4Z61Jcw",
"aud": [
"dc2b876e-8680-48e6-b9db-82ba670029d2"
],
"auth_time": 1529752371,
"c_hash": "khcZ7UDVFjehcGPbYROUYg",
"exp": 1529755978,
"iat": 1529752379,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "af2ece3c-f234-4956-ba90-d947ab559c30",
"nonce": "xTZS2RwFP42nyeSM",
"rat": 1529752376,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.205 phase <--<-- 5 --- AsyncAuthn -->-->
3.206 AuthorizationRequest {
"client_id": "dc2b876e-8680-48e6-b9db-82ba670029d2",
"max_age": 10000,
"nonce": "12VrTux4IV1Fo2PE",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "G6dGukDwhfsy7WW6"
}
3.206 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?max_age=10000&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=dc2b876e-8680-48e6-b9db-82ba670029d2&state=G6dGukDwhfsy7WW6&response_type=code+token&nonce=12VrTux4IV1Fo2PE
3.206 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?max_age=10000&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=dc2b876e-8680-48e6-b9db-82ba670029d2&state=G6dGukDwhfsy7WW6&response_type=code+token&nonce=12VrTux4IV1Fo2PE
4.078 http args {}
4.223 response URL with fragment
4.223 response access_token=_Ka9bUHPooAdHGRf16U-Z7d6J4yEaEGhvbdPNObpxJU.jAwMgHR0wOm7rdE35YLj3Ti74rA8N3mVlTdfXYDJ0gA&code=6YkIelHH_I971MKrjPQx-nLisuO8UWc60wiRAXkbYM0.OtcuhLClFHkVH1rC8aIKI5x5V_yGccoUwdZJrtT6ILs&expires_in=3599&scope=openid&state=G6dGukDwhfsy7WW6&token_type=bearer
4.223 response {'scope': 'openid', 'code': '6YkIelHH_I971MKrjPQx-nLisuO8UWc60wiRAXkbYM0.OtcuhLClFHkVH1rC8aIKI5x5V_yGccoUwdZJrtT6ILs', 'access_token': '_Ka9bUHPooAdHGRf16U-Z7d6J4yEaEGhvbdPNObpxJU.jAwMgHR0wOm7rdE35YLj3Ti74rA8N3mVlTdfXYDJ0gA', 'state': 'G6dGukDwhfsy7WW6', 'expires_in': 3599, 'token_type': 'bearer'}
4.224 AuthorizationResponse {
"access_token": "_Ka9bUHPooAdHGRf16U-Z7d6J4yEaEGhvbdPNObpxJU.jAwMgHR0wOm7rdE35YLj3Ti74rA8N3mVlTdfXYDJ0gA",
"code": "6YkIelHH_I971MKrjPQx-nLisuO8UWc60wiRAXkbYM0.OtcuhLClFHkVH1rC8aIKI5x5V_yGccoUwdZJrtT6ILs",
"expires_in": 3599,
"scope": "openid",
"state": "G6dGukDwhfsy7WW6",
"token_type": "bearer"
}
4.224 phase <--<-- 6 --- AccessToken -->-->
4.224 --> request op_args: {'state': 'G6dGukDwhfsy7WW6'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
4.224 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'G6dGukDwhfsy7WW6', 'code': '6YkIelHH_I971MKrjPQx-nLisuO8UWc60wiRAXkbYM0.OtcuhLClFHkVH1rC8aIKI5x5V_yGccoUwdZJrtT6ILs', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'dc2b876e-8680-48e6-b9db-82ba670029d2'}, 'state': 'G6dGukDwhfsy7WW6'}
4.224 AccessTokenRequest {
"code": "6YkIelHH_I971MKrjPQx-nLisuO8UWc60wiRAXkbYM0.OtcuhLClFHkVH1rC8aIKI5x5V_yGccoUwdZJrtT6ILs",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "G6dGukDwhfsy7WW6"
}
4.224 request_url https://oidc-certification.ory.sh:8443/oauth2/token
4.224 request_http_args {'headers': {'Authorization': 'Basic ZGMyYjg3NmUtODY4MC00OGU2LWI5ZGItODJiYTY3MDAyOWQyOi1CMy1WJTdFdHVwZHNj', 'Content-Type': 'application/x-www-form-urlencoded'}}
4.224 request code=6YkIelHH_I971MKrjPQx-nLisuO8UWc60wiRAXkbYM0.OtcuhLClFHkVH1rC8aIKI5x5V_yGccoUwdZJrtT6ILs&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=G6dGukDwhfsy7WW6
4.472 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
4.473 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoia2swdGZFYWt0N2UycnFMaGNiZEoxdyIsImF1ZCI6WyJkYzJiODc2ZS04NjgwLTQ4ZTYtYjlkYi04MmJhNjcwMDI5ZDIiXSwiYXV0aF90aW1lIjoxNTI5NzUyMzcxLCJjX2hhc2giOiJKbXYySzR2ajJ1VWJpQnBwdTY4bjdBIiwiZXhwIjoxNTI5NzU1OTgwLCJpYXQiOjE1Mjk3NTIzODAsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6Ijg0NzgyZDE4LTk3YWUtNDU0Mi04N2VjLTg3ZjBkNjZiMGFkOCIsIm5vbmNlIjoiMTJWclR1eDRJVjFGbzJQRSIsInJhdCI6MTUyOTc1MjM3OSwic3ViIjoiZm9vQGJhci5jb20ifQ.LD0aQvY3tLxMhgRnyOdJU6AdD54guCjDmJ2Nij1vJ4RW4U1l9l3uW1j76Khi6t9kv3Jnfd1xZiuBLbn4Y1lyieY5ISGorWxOrb1-6C4Q-ufA1TJw7xBAkwtguXtbDqxkSTrXgoWLhLr2QmU40ktQ-r4OGvJxXcNMRtXYSCeYmC0LPNND0O5V9KLHx0fVkpWYji8US7W1UhYBBP2klazVjL0vPZsbJPtvLJLZi3UwrV4rCSgXKt7w-vKWG_teAl3M2h4Ef4ZqH79AzJNEICUclAWdkI39OXqQ99Ej9JAmP-7PMv8zBCYhUz9kL4UDlmnJ6ucwSQw9j9_TVzWhNMMFyMJw01lWyb_e2CoaMg7l-MBUhDHC78VYsVprNHiQG8io51ABC25kPvOauBHIH1tWaYaEKoOVLEzTqHlr6_l-GqnkdsHjrUJYDn03Jbl0zqbxBPxN83v1guQVap0MWBO_EL63LEnWZfJEu9t6gQt9LptVJStSyKFrmRiUJw59DT1nVyDoEGpsQmqRL1ZMaXkyi7MhLV6c11bT9SiqFEK0_Grm0JUElX6ozLyqS3AYHN5olkEx513cTV-MhQFO5TDLkhjCCUrRVOHTHWAyVJmkhXaVi-55ewB-WLOKhOKYVP2hTONAMGvXfTQxWVhU03uUYHIExoQFKvqL20oH7wIPpVI', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'UOqvY8RiB_fWpSgHiWcIeky-rJlC-XlvB0p2BIZtQGQ.WRFD3RGh86oQRuFnKOlFeq5Mu9zVIHfNXAwL4iNQ2HE', 'scope': 'openid'}
4.477 AccessTokenResponse {
"access_token": "UOqvY8RiB_fWpSgHiWcIeky-rJlC-XlvB0p2BIZtQGQ.WRFD3RGh86oQRuFnKOlFeq5Mu9zVIHfNXAwL4iNQ2HE",
"expires_in": 3599,
"id_token": {
"at_hash": "kk0tfEakt7e2rqLhcbdJ1w",
"aud": [
"dc2b876e-8680-48e6-b9db-82ba670029d2"
],
"auth_time": 1529752371,
"c_hash": "Jmv2K4vj2uUbiBppu68n7A",
"exp": 1529755980,
"iat": 1529752380,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "84782d18-97ae-4542-87ec-87f0d66b0ad8",
"nonce": "12VrTux4IV1Fo2PE",
"rat": 1529752379,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
4.477 phase <--<-- 7 --- Done -->-->
4.477 end
4.477 assertion AuthTimeCheck
4.477 condition auth_time-check: status=OK [Check that the auth_time returned in the ID Token is in the expected range.]
4.478 assertion VerifyResponse
4.478 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.478 assertion SameAuthn
4.478 condition same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
4.478 assertion ClaimsCheck
4.478 condition claims-check: status=OK [Checks if specific claims is present or not]
4.479 condition Done: status=OK
============================================================
Conditions
auth_time-check: status=OK [Check that the auth_time returned in the ID Token is in the expected range.]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
claims-check: status=OK [Checks if specific claims is present or not]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-Req-NotUnderstood.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-NotUnderstood
Test description: Request with extra query component
Timestamp: 2018-06-23T11:11:14Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.077 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.078 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.078 phase <--<-- 2 --- Registration -->-->
0.078 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.079 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#0zxc3aBbCCpYPcQm"
],
"response_types": [
"code token"
]
}
0.234 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.235 RegistrationResponse {
"client_id": "68687fed-9612-41af-ba75-5edc498f6e17",
"client_secret": "TACkPebLu_Fa",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "68687fed-9612-41af-ba75-5edc498f6e17",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#0zxc3aBbCCpYPcQm"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.235 phase <--<-- 3 --- AsyncAuthn -->-->
0.236 AuthorizationRequest {
"client_id": "68687fed-9612-41af-ba75-5edc498f6e17",
"extra": "foobar",
"nonce": "2sxDCJYBI9PDOK1M",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "NgzbZjEKumwjEc7B"
}
0.236 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?extra=foobar&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=68687fed-9612-41af-ba75-5edc498f6e17&state=NgzbZjEKumwjEc7B&response_type=code+token&nonce=2sxDCJYBI9PDOK1M
0.236 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?extra=foobar&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=68687fed-9612-41af-ba75-5edc498f6e17&state=NgzbZjEKumwjEc7B&response_type=code+token&nonce=2sxDCJYBI9PDOK1M
2.817 http args {}
3.029 response URL with fragment
3.029 response access_token=RD90HxLQ1btCu5yOD2-U1p9u6txX-eMl9xNG_rNs6es.tStsH9XL6mkcOp9A8wqvPVp2_nCICKvLkafXa4jvgTU&code=eYkQiZVNofmc0bGjlCzNUqAy2YZXxTyUh2vMkQR9ox8.z3OGeWOG_qxiEG_6CZ0sFhgVG-3XmxlSZ8tSTHSiG9Q&expires_in=3599&scope=openid&state=NgzbZjEKumwjEc7B&token_type=bearer
3.029 response {'scope': 'openid', 'code': 'eYkQiZVNofmc0bGjlCzNUqAy2YZXxTyUh2vMkQR9ox8.z3OGeWOG_qxiEG_6CZ0sFhgVG-3XmxlSZ8tSTHSiG9Q', 'access_token': 'RD90HxLQ1btCu5yOD2-U1p9u6txX-eMl9xNG_rNs6es.tStsH9XL6mkcOp9A8wqvPVp2_nCICKvLkafXa4jvgTU', 'state': 'NgzbZjEKumwjEc7B', 'expires_in': 3599, 'token_type': 'bearer'}
3.03 AuthorizationResponse {
"access_token": "RD90HxLQ1btCu5yOD2-U1p9u6txX-eMl9xNG_rNs6es.tStsH9XL6mkcOp9A8wqvPVp2_nCICKvLkafXa4jvgTU",
"code": "eYkQiZVNofmc0bGjlCzNUqAy2YZXxTyUh2vMkQR9ox8.z3OGeWOG_qxiEG_6CZ0sFhgVG-3XmxlSZ8tSTHSiG9Q",
"expires_in": 3599,
"scope": "openid",
"state": "NgzbZjEKumwjEc7B",
"token_type": "bearer"
}
3.03 phase <--<-- 4 --- Done -->-->
3.03 end
3.03 assertion VerifyAuthnResponse
3.03 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
3.03 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-Req-ui_locales.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-ui_locales
Test description: Providing ui_locales
Timestamp: 2018-06-23T11:13:07Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.172 phase <--<-- 1 --- Webfinger -->-->
1.172 not expected to do WebFinger
1.173 phase <--<-- 2 --- Discovery -->-->
1.173 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.281 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.282 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.282 phase <--<-- 3 --- Registration -->-->
1.282 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.283 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#ZiyG3laB9C82yvIz"
],
"response_types": [
"code token"
]
}
1.441 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.442 RegistrationResponse {
"client_id": "1fe9bfc7-0a2c-429e-a7ce-38a4e184a374",
"client_secret": "kiC7_Bfwj7vS",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "1fe9bfc7-0a2c-429e-a7ce-38a4e184a374",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#ZiyG3laB9C82yvIz"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.442 phase <--<-- 4 --- AsyncAuthn -->-->
1.442 AuthorizationRequest {
"client_id": "1fe9bfc7-0a2c-429e-a7ce-38a4e184a374",
"nonce": "nVN4luXlnJLH499Y",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "G75f6KjpDwmXp8CW",
"ui_locales": "se"
}
1.443 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?ui_locales=se&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=1fe9bfc7-0a2c-429e-a7ce-38a4e184a374&state=G75f6KjpDwmXp8CW&response_type=code+token&nonce=nVN4luXlnJLH499Y
1.443 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?ui_locales=se&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=1fe9bfc7-0a2c-429e-a7ce-38a4e184a374&state=G75f6KjpDwmXp8CW&response_type=code+token&nonce=nVN4luXlnJLH499Y
5.069 http args {}
5.231 response URL with fragment
5.231 response access_token=Nx2FLU_xiQOurSzS59ekeCMQrBYXUUDF2S1vVmxP7NQ.AYoypUuNHr4MORpNzVCdYQ0i0yRkjUOv3trHu5Dox1U&code=FqTxCnPcMohzGftTWO3tw-efLNDZjfhVPWNfOi_W1DI.8Ht4PZgoK6JIUZm4IpnnRW3i9av8spBxoOUxmKjRTx8&expires_in=3599&scope=openid&state=G75f6KjpDwmXp8CW&token_type=bearer
5.232 response {'scope': 'openid', 'code': 'FqTxCnPcMohzGftTWO3tw-efLNDZjfhVPWNfOi_W1DI.8Ht4PZgoK6JIUZm4IpnnRW3i9av8spBxoOUxmKjRTx8', 'access_token': 'Nx2FLU_xiQOurSzS59ekeCMQrBYXUUDF2S1vVmxP7NQ.AYoypUuNHr4MORpNzVCdYQ0i0yRkjUOv3trHu5Dox1U', 'state': 'G75f6KjpDwmXp8CW', 'expires_in': 3599, 'token_type': 'bearer'}
5.232 AuthorizationResponse {
"access_token": "Nx2FLU_xiQOurSzS59ekeCMQrBYXUUDF2S1vVmxP7NQ.AYoypUuNHr4MORpNzVCdYQ0i0yRkjUOv3trHu5Dox1U",
"code": "FqTxCnPcMohzGftTWO3tw-efLNDZjfhVPWNfOi_W1DI.8Ht4PZgoK6JIUZm4IpnnRW3i9av8spBxoOUxmKjRTx8",
"expires_in": 3599,
"scope": "openid",
"state": "G75f6KjpDwmXp8CW",
"token_type": "bearer"
}
5.232 phase <--<-- 5 --- Done -->-->
5.232 end
5.233 assertion VerifyAuthnResponse
5.233 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
5.233 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-request-Unsigned.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-request-Unsigned
Test description: Support request request parameter with unsigned request
Timestamp: 2018-06-23T11:10:29Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.108 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.11 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.11 phase <--<-- 2 --- Registration -->-->
0.11 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'request_object_signing_alg': 'none'}
0.11 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "none",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#pQmtuWHoH825QBS1"
],
"response_types": [
"code token"
]
}
0.291 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.292 RegistrationResponse {
"client_id": "6beef9ea-edc6-41b8-9489-bba23c59c704",
"client_secret": "OPstLUZwxN3P",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "6beef9ea-edc6-41b8-9489-bba23c59c704",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "none",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#pQmtuWHoH825QBS1"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.292 phase <--<-- 3 --- AsyncAuthn -->-->
0.293 AuthorizationRequest {
"client_id": "6beef9ea-edc6-41b8-9489-bba23c59c704",
"nonce": "FljXgeAW8A9Ih7P6",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"request": "eyJhbGciOiJub25lIn0.eyJzY29wZSI6ICJvcGVuaWQiLCAicmVkaXJlY3RfdXJpIjogImh0dHBzOi8vb3AuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0OjYxMzUzL2F1dGh6X2NiIiwgImNsaWVudF9pZCI6ICI2YmVlZjllYS1lZGM2LTQxYjgtOTQ4OS1iYmEyM2M1OWM3MDQiLCAic3RhdGUiOiAiOUtjUWpvbFRSczlGOUo5OSIsICJyZXNwb25zZV90eXBlIjogImNvZGUgdG9rZW4iLCAibm9uY2UiOiAiRmxqWGdlQVc4QTlJaDdQNiJ9.",
"response_type": "code token",
"scope": "openid",
"state": "9KcQjolTRs9F9J99"
}
0.294 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=6beef9ea-edc6-41b8-9489-bba23c59c704&response_type=code+token&state=9KcQjolTRs9F9J99&request=eyJhbGciOiJub25lIn0.eyJzY29wZSI6ICJvcGVuaWQiLCAicmVkaXJlY3RfdXJpIjogImh0dHBzOi8vb3AuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0OjYxMzUzL2F1dGh6X2NiIiwgImNsaWVudF9pZCI6ICI2YmVlZjllYS1lZGM2LTQxYjgtOTQ4OS1iYmEyM2M1OWM3MDQiLCAic3RhdGUiOiAiOUtjUWpvbFRSczlGOUo5OSIsICJyZXNwb25zZV90eXBlIjogImNvZGUgdG9rZW4iLCAibm9uY2UiOiAiRmxqWGdlQVc4QTlJaDdQNiJ9.&nonce=FljXgeAW8A9Ih7P6
0.294 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=6beef9ea-edc6-41b8-9489-bba23c59c704&response_type=code+token&state=9KcQjolTRs9F9J99&request=eyJhbGciOiJub25lIn0.eyJzY29wZSI6ICJvcGVuaWQiLCAicmVkaXJlY3RfdXJpIjogImh0dHBzOi8vb3AuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0OjYxMzUzL2F1dGh6X2NiIiwgImNsaWVudF9pZCI6ICI2YmVlZjllYS1lZGM2LTQxYjgtOTQ4OS1iYmEyM2M1OWM3MDQiLCAic3RhdGUiOiAiOUtjUWpvbFRSczlGOUo5OSIsICJyZXNwb25zZV90eXBlIjogImNvZGUgdG9rZW4iLCAibm9uY2UiOiAiRmxqWGdlQVc4QTlJaDdQNiJ9.&nonce=FljXgeAW8A9Ih7P6
3.18 http args {}
3.342 response URL with fragment
3.343 response access_token=ei3volV4gKEZzjx4V0WrQgAAmPv8IZUdxpcfBoR8Dsw.lwJ1vNroQavtgmlh-9ubW6lDA2JwNsjUJFoMvWw6kOE&code=D_f5GDz8csVfQKyRjPk4G1sgZAb8gfhKc_4MGBuA3-I.lIREPJSFQ4Ec7T-Rx9yJ9ym2uqHIvgJwa79-M6ggFvM&expires_in=3599&scope=openid&state=9KcQjolTRs9F9J99&token_type=bearer
3.343 response {'scope': 'openid', 'code': 'D_f5GDz8csVfQKyRjPk4G1sgZAb8gfhKc_4MGBuA3-I.lIREPJSFQ4Ec7T-Rx9yJ9ym2uqHIvgJwa79-M6ggFvM', 'access_token': 'ei3volV4gKEZzjx4V0WrQgAAmPv8IZUdxpcfBoR8Dsw.lwJ1vNroQavtgmlh-9ubW6lDA2JwNsjUJFoMvWw6kOE', 'state': '9KcQjolTRs9F9J99', 'expires_in': 3599, 'token_type': 'bearer'}
3.343 AuthorizationResponse {
"access_token": "ei3volV4gKEZzjx4V0WrQgAAmPv8IZUdxpcfBoR8Dsw.lwJ1vNroQavtgmlh-9ubW6lDA2JwNsjUJFoMvWw6kOE",
"code": "D_f5GDz8csVfQKyRjPk4G1sgZAb8gfhKc_4MGBuA3-I.lIREPJSFQ4Ec7T-Rx9yJ9ym2uqHIvgJwa79-M6ggFvM",
"expires_in": 3599,
"scope": "openid",
"state": "9KcQjolTRs9F9J99",
"token_type": "bearer"
}
3.344 phase <--<-- 4 --- Done -->-->
3.344 end
3.344 assertion VerifyAuthnOrErrorResponse
3.344 condition authn-response-or-error: status=OK [Checks that the last response was a JSON encoded authentication or error message]
3.344 condition Done: status=OK
============================================================
Conditions
authn-response-or-error: status=OK [Checks that the last response was a JSON encoded authentication or error message]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-request_uri-Sig.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-request_uri-Sig
Test description: Support request_uri request parameter with signed request
Timestamp: 2018-06-23T11:10:36Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.098 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.1 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.1 phase <--<-- 2 --- Registration -->-->
0.1 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'request_object_signing_alg': 'RS256'}
0.1 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "RS256",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#h2tAmKmNtbE4nrmn"
],
"response_types": [
"code token"
]
}
0.254 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.255 RegistrationResponse {
"client_id": "8534fa6a-196b-4be0-8b6d-1da3fc1d3f74",
"client_secret": "9CPgyFjHjgXu",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "8534fa6a-196b-4be0-8b6d-1da3fc1d3f74",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "RS256",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#h2tAmKmNtbE4nrmn"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.255 phase <--<-- 3 --- AsyncAuthn -->-->
0.259 AuthorizationRequest {
"client_id": "8534fa6a-196b-4be0-8b6d-1da3fc1d3f74",
"nonce": "JEN4PRR0gzcU2vS7",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"request_uri": "https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#h2tAmKmNtbE4nrmn",
"response_type": "code token",
"scope": "openid",
"state": "Jar60VVZJBamNOLt"
}
0.259 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?request_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Frequests%2Fe3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9%23h2tAmKmNtbE4nrmn&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=8534fa6a-196b-4be0-8b6d-1da3fc1d3f74&state=Jar60VVZJBamNOLt&response_type=code+token&nonce=JEN4PRR0gzcU2vS7
0.26 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?request_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Frequests%2Fe3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9%23h2tAmKmNtbE4nrmn&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=8534fa6a-196b-4be0-8b6d-1da3fc1d3f74&state=Jar60VVZJBamNOLt&response_type=code+token&nonce=JEN4PRR0gzcU2vS7
4.12 http args {}
4.286 response URL with fragment
4.286 response access_token=1QOdyIPh4a8RMINcQxMOELfQvctByaWnXUXZtsVJvKU.RaRrrZEoraFjSEueATlhfdfwHaZ61Q57ZyuukI-DnwY&code=7MjG66jJ-hwVNZv-19LKPERoG9UYwE4HMDMrkJ0wWgg.FjJGyViKcUFPxyQvgmJJkRaaqyd0luW8-Pu0uidxjIM&expires_in=3599&scope=openid&state=Jar60VVZJBamNOLt&token_type=bearer
4.287 response {'scope': 'openid', 'code': '7MjG66jJ-hwVNZv-19LKPERoG9UYwE4HMDMrkJ0wWgg.FjJGyViKcUFPxyQvgmJJkRaaqyd0luW8-Pu0uidxjIM', 'access_token': '1QOdyIPh4a8RMINcQxMOELfQvctByaWnXUXZtsVJvKU.RaRrrZEoraFjSEueATlhfdfwHaZ61Q57ZyuukI-DnwY', 'state': 'Jar60VVZJBamNOLt', 'expires_in': 3599, 'token_type': 'bearer'}
4.287 AuthorizationResponse {
"access_token": "1QOdyIPh4a8RMINcQxMOELfQvctByaWnXUXZtsVJvKU.RaRrrZEoraFjSEueATlhfdfwHaZ61Q57ZyuukI-DnwY",
"code": "7MjG66jJ-hwVNZv-19LKPERoG9UYwE4HMDMrkJ0wWgg.FjJGyViKcUFPxyQvgmJJkRaaqyd0luW8-Pu0uidxjIM",
"expires_in": 3599,
"scope": "openid",
"state": "Jar60VVZJBamNOLt",
"token_type": "bearer"
}
4.287 phase <--<-- 4 --- Done -->-->
4.287 end
4.288 assertion VerifyAuthnOrErrorResponse
4.288 condition authn-response-or-error: status=OK [Checks that the last response was a JSON encoded authentication or error message]
4.288 condition Done: status=OK
============================================================
Conditions
authn-response-or-error: status=OK [Checks that the last response was a JSON encoded authentication or error message]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-request_uri-Unsigned.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-request_uri-Unsigned
Test description: Support request_uri request parameter with unsigned request
Timestamp: 2018-06-23T11:10:42Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.074 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Registration -->-->
0.076 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'request_object_signing_alg': 'none'}
0.076 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "none",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#rkbUFJmcrFB4kDug"
],
"response_types": [
"code token"
]
}
0.271 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.272 RegistrationResponse {
"client_id": "de28c848-5f77-45a6-8e4d-e02213ed1d3e",
"client_secret": "3fz6THG8YkNw",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "de28c848-5f77-45a6-8e4d-e02213ed1d3e",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "none",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#rkbUFJmcrFB4kDug"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.272 phase <--<-- 3 --- AsyncAuthn -->-->
0.274 AuthorizationRequest {
"client_id": "de28c848-5f77-45a6-8e4d-e02213ed1d3e",
"nonce": "mrTyKpFkj1qCmPaT",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"request_uri": "https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#rkbUFJmcrFB4kDug",
"response_type": "code token",
"scope": "openid",
"state": "EO9D6oMrFAI6XIDr"
}
0.274 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?request_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Frequests%2Fe3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9%23rkbUFJmcrFB4kDug&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=de28c848-5f77-45a6-8e4d-e02213ed1d3e&state=EO9D6oMrFAI6XIDr&response_type=code+token&nonce=mrTyKpFkj1qCmPaT
0.274 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?request_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Frequests%2Fe3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9%23rkbUFJmcrFB4kDug&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=de28c848-5f77-45a6-8e4d-e02213ed1d3e&state=EO9D6oMrFAI6XIDr&response_type=code+token&nonce=mrTyKpFkj1qCmPaT
4.674 http args {}
4.838 response URL with fragment
4.838 response access_token=0M8OF9EHeJC6mcEwY9MhCoNCZhlarw_b8sFxsJmYxew.un6TAUNjzTWT_R_uERkv0_722MLCDNi5KN30CLR8SUI&code=XZAzv-blQbY92tdy_AjE8kYVYwyy-LV91tRVwiaGeQ8.Xi9pW6-oTviiONx_ObxsA1o7W3virKH4RYHulSdAxdQ&expires_in=3599&scope=openid&state=EO9D6oMrFAI6XIDr&token_type=bearer
4.839 response {'scope': 'openid', 'code': 'XZAzv-blQbY92tdy_AjE8kYVYwyy-LV91tRVwiaGeQ8.Xi9pW6-oTviiONx_ObxsA1o7W3virKH4RYHulSdAxdQ', 'access_token': '0M8OF9EHeJC6mcEwY9MhCoNCZhlarw_b8sFxsJmYxew.un6TAUNjzTWT_R_uERkv0_722MLCDNi5KN30CLR8SUI', 'state': 'EO9D6oMrFAI6XIDr', 'expires_in': 3599, 'token_type': 'bearer'}
4.839 AuthorizationResponse {
"access_token": "0M8OF9EHeJC6mcEwY9MhCoNCZhlarw_b8sFxsJmYxew.un6TAUNjzTWT_R_uERkv0_722MLCDNi5KN30CLR8SUI",
"code": "XZAzv-blQbY92tdy_AjE8kYVYwyy-LV91tRVwiaGeQ8.Xi9pW6-oTviiONx_ObxsA1o7W3virKH4RYHulSdAxdQ",
"expires_in": 3599,
"scope": "openid",
"state": "EO9D6oMrFAI6XIDr",
"token_type": "bearer"
}
4.839 phase <--<-- 4 --- Done -->-->
4.839 end
4.84 assertion VerifyResponse
4.84 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.84 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-Response-code+token.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Response-code+token
Test description: Request with response_type=code token
Timestamp: 2018-06-23T11:06:24Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.072 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Registration -->-->
0.074 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.074 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#xLtILbgi3pdICxVA"
],
"response_types": [
"code token"
]
}
0.277 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.277 RegistrationResponse {
"client_id": "78b353b7-0441-42e7-a7c1-dd78e5c33715",
"client_secret": "rL2.deQ9iYEh",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "78b353b7-0441-42e7-a7c1-dd78e5c33715",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#xLtILbgi3pdICxVA"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.277 phase <--<-- 3 --- AsyncAuthn -->-->
0.278 AuthorizationRequest {
"client_id": "78b353b7-0441-42e7-a7c1-dd78e5c33715",
"nonce": "aG8nNcr8rAs9UKuF",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "E82yQ5pvicLKwDxL"
}
0.278 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=78b353b7-0441-42e7-a7c1-dd78e5c33715&state=E82yQ5pvicLKwDxL&response_type=code+token&nonce=aG8nNcr8rAs9UKuF
0.278 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=78b353b7-0441-42e7-a7c1-dd78e5c33715&state=E82yQ5pvicLKwDxL&response_type=code+token&nonce=aG8nNcr8rAs9UKuF
3.371 http args {}
3.563 response URL with fragment
3.563 response access_token=lwN8EJ8musMpRZCLIDmiNDxPl4z1uLc-N2-Vo4jqXI0.RGIyBOdCeHYZVkOhfZo7bdwbaeecLCxMvANgD-elEP4&code=o7VQmDDy5JZXlChwkJC7pf7vL5-3efnE0FrCVqxQp8E.usdZjDe-vUmGUHkt-BPKOaXaI_eCz2NT47PTqNVnbfk&expires_in=3599&scope=openid&state=E82yQ5pvicLKwDxL&token_type=bearer
3.564 response {'scope': 'openid', 'code': 'o7VQmDDy5JZXlChwkJC7pf7vL5-3efnE0FrCVqxQp8E.usdZjDe-vUmGUHkt-BPKOaXaI_eCz2NT47PTqNVnbfk', 'access_token': 'lwN8EJ8musMpRZCLIDmiNDxPl4z1uLc-N2-Vo4jqXI0.RGIyBOdCeHYZVkOhfZo7bdwbaeecLCxMvANgD-elEP4', 'state': 'E82yQ5pvicLKwDxL', 'expires_in': 3599, 'token_type': 'bearer'}
3.564 AuthorizationResponse {
"access_token": "lwN8EJ8musMpRZCLIDmiNDxPl4z1uLc-N2-Vo4jqXI0.RGIyBOdCeHYZVkOhfZo7bdwbaeecLCxMvANgD-elEP4",
"code": "o7VQmDDy5JZXlChwkJC7pf7vL5-3efnE0FrCVqxQp8E.usdZjDe-vUmGUHkt-BPKOaXaI_eCz2NT47PTqNVnbfk",
"expires_in": 3599,
"scope": "openid",
"state": "E82yQ5pvicLKwDxL",
"token_type": "bearer"
}
3.564 phase <--<-- 4 --- Done -->-->
3.564 end
3.565 assertion VerifyAuthnResponse
3.565 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
3.565 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-Response-Missing.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Response-Missing
Test description: Authorization request missing the response_type parameter
Timestamp: 2018-06-23T11:06:19Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.107 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.109 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.109 phase <--<-- 2 --- Registration -->-->
0.109 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.109 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#X0erYuCC0lTVuc7W"
],
"response_types": [
"code token"
]
}
0.308 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.309 RegistrationResponse {
"client_id": "39b5cf0b-fb7e-4238-af4d-8bf9a3d2416d",
"client_secret": "sq-nhSsiezmI",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "39b5cf0b-fb7e-4238-af4d-8bf9a3d2416d",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#X0erYuCC0lTVuc7W"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.309 phase <--<-- 3 --- Note -->-->
1.416 phase <--<-- 4 --- AsyncAuthn -->-->
1.417 AuthorizationRequest {
"client_id": "39b5cf0b-fb7e-4238-af4d-8bf9a3d2416d",
"nonce": "Sz8ZDZUIzi1tAxky",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"scope": "openid",
"state": "IVvvvIQUfM7XRzuO"
}
1.417 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?state=IVvvvIQUfM7XRzuO&scope=openid&nonce=Sz8ZDZUIzi1tAxky&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=39b5cf0b-fb7e-4238-af4d-8bf9a3d2416d
1.417 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?state=IVvvvIQUfM7XRzuO&scope=openid&nonce=Sz8ZDZUIzi1tAxky&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=39b5cf0b-fb7e-4238-af4d-8bf9a3d2416d
2.137 response Response URL with query part
2.137 response {'error_debug': 'The request is missing the response_type parameter', 'error_description': 'The authorization server does not support obtaining a token using this method', 'state': '', 'error': 'unsupported_response_type'}
2.138 response {'error_debug': 'The request is missing the response_type parameter', 'error_description': 'The authorization server does not support obtaining a token using this method', 'error': 'unsupported_response_type'}
2.138 AuthorizationErrorResponse {
"error": "unsupported_response_type",
"error_debug": "The request is missing the response_type parameter",
"error_description": "The authorization server does not support obtaining a token using this method"
}
2.138 AuthorizationErrorResponse {
"error": "unsupported_response_type",
"error_debug": "The request is missing the response_type parameter",
"error_description": "The authorization server does not support obtaining a token using this method"
}
2.138 phase <--<-- 5 --- Done -->-->
2.138 end
2.138 assertion VerifyErrorMessage
2.138 condition verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
2.138 condition Done: status=OK
============================================================
Conditions
verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-Rotation-OP-Sig.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Rotation-OP-Sig
Test description: Can rotate OP signing keys
Timestamp: 2018-06-23T11:14:10Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- FetchKeys -->-->
0.143 phase <--<-- 3 --- Note -->-->
7.295 phase <--<-- 4 --- Webfinger -->-->
7.295 not expected to do WebFinger
7.295 phase <--<-- 5 --- Discovery -->-->
7.295 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
7.416 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
7.417 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
7.417 phase <--<-- 6 --- FetchKeys -->-->
7.496 phase <--<-- 7 --- Done -->-->
7.496 end
7.497 assertion CheckHTTPResponse
7.497 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
7.497 assertion NewSigningKeys
7.498 condition new-signing-keys: status=OK [Verifies that two set of signing keys are not the same]
7.498 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
new-signing-keys: status=OK [Verifies that two set of signing keys are not the same]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-Rotation-RP-Sig.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Rotation-RP-Sig
Test description: Request access token, change RSA signing key and request another access token
Timestamp: 2018-06-23T11:14:15Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.075 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.076 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.076 phase <--<-- 2 --- Registration -->-->
0.076 register kwargs:{'application_name': 'OIC test tool', 'token_endpoint_auth_method': 'private_key_jwt', 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'refresh_token'], 'response_types': ['code token'], 'url': 'https://oidc-certification.ory.sh:8443/clients', 'application_type': 'web'}
0.076 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit",
"refresh_token"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#ZnwPLJk6WfZG1fJw"
],
"response_types": [
"code token"
],
"token_endpoint_auth_method": "private_key_jwt"
}
0.279 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.28 RegistrationResponse {
"client_id": "24f935b0-1cc1-45e7-baa6-744772c5ea32",
"client_secret": "sIe1S7VSV.SM",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit",
"refresh_token"
],
"id": "24f935b0-1cc1-45e7-baa6-744772c5ea32",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#ZnwPLJk6WfZG1fJw"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "private_key_jwt",
"userinfo_signed_response_alg": "none"
}
0.28 phase <--<-- 3 --- AsyncAuthn -->-->
0.28 AuthorizationRequest {
"client_id": "24f935b0-1cc1-45e7-baa6-744772c5ea32",
"nonce": "g0xUehWftdkuqpZA",
"prompt": [
"consent"
],
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid offline_access",
"state": "l7TJGQrQlcsJwmSg"
}
0.281 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=consent&scope=openid+offline_access&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=24f935b0-1cc1-45e7-baa6-744772c5ea32&state=l7TJGQrQlcsJwmSg&response_type=code+token&nonce=g0xUehWftdkuqpZA
0.281 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=consent&scope=openid+offline_access&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=24f935b0-1cc1-45e7-baa6-744772c5ea32&state=l7TJGQrQlcsJwmSg&response_type=code+token&nonce=g0xUehWftdkuqpZA
3.563 http args {}
3.728 response URL with fragment
3.729 response access_token=v-B2pcRJVjIpl9wi38BSRdRAy9MjlP3O0ZD0Jz75aq8.AK3mkQw_rKrPHqdsHxv2uzqdWty3HbkugL0nHSZ_TUY&code=DMEqFepa8HmxP13y3SqiA8MhOpGjH_bidx3WxLwfnjs.siXO4tx7D9ffL3fx5WLrPtkSHtNh3qjw2TyPfxymV1o&expires_in=3599&scope=openid%20offline_access&state=l7TJGQrQlcsJwmSg&token_type=bearer
3.729 response {'scope': 'openid offline_access', 'code': 'DMEqFepa8HmxP13y3SqiA8MhOpGjH_bidx3WxLwfnjs.siXO4tx7D9ffL3fx5WLrPtkSHtNh3qjw2TyPfxymV1o', 'access_token': 'v-B2pcRJVjIpl9wi38BSRdRAy9MjlP3O0ZD0Jz75aq8.AK3mkQw_rKrPHqdsHxv2uzqdWty3HbkugL0nHSZ_TUY', 'state': 'l7TJGQrQlcsJwmSg', 'expires_in': 3599, 'token_type': 'bearer'}
3.729 AuthorizationResponse {
"access_token": "v-B2pcRJVjIpl9wi38BSRdRAy9MjlP3O0ZD0Jz75aq8.AK3mkQw_rKrPHqdsHxv2uzqdWty3HbkugL0nHSZ_TUY",
"code": "DMEqFepa8HmxP13y3SqiA8MhOpGjH_bidx3WxLwfnjs.siXO4tx7D9ffL3fx5WLrPtkSHtNh3qjw2TyPfxymV1o",
"expires_in": 3599,
"scope": "openid offline_access",
"state": "l7TJGQrQlcsJwmSg",
"token_type": "bearer"
}
3.73 phase <--<-- 4 --- AccessToken -->-->
3.73 --> request op_args: {'state': 'l7TJGQrQlcsJwmSg', 'authn_method': 'private_key_jwt'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.73 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'l7TJGQrQlcsJwmSg', 'code': 'DMEqFepa8HmxP13y3SqiA8MhOpGjH_bidx3WxLwfnjs.siXO4tx7D9ffL3fx5WLrPtkSHtNh3qjw2TyPfxymV1o', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '24f935b0-1cc1-45e7-baa6-744772c5ea32'}, 'state': 'l7TJGQrQlcsJwmSg', 'authn_method': 'private_key_jwt'}
3.73 AccessTokenRequest {
"client_assertion": "eyJhbGciOiJSUzI1NiIsImtpZCI6Ind0MjVPZ3lSX256RzNPb1E3ZGFhMnJMNi1nTW5GZGZSekJqaFVWUHU4UlEifQ.eyJpc3MiOiAiMjRmOTM1YjAtMWNjMS00NWU3LWJhYTYtNzQ0NzcyYzVlYTMyIiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiMjRmOTM1YjAtMWNjMS00NWU3LWJhYTYtNzQ0NzcyYzVlYTMyIiwgImlhdCI6IDE1Mjk3NTI0NTUsICJqdGkiOiAiNUlHZTVjNUFMOUtkTjhhcXNoV3YzWlhrY0NoQVNBMGkiLCAiZXhwIjogMTUyOTc1MzA1NX0.wWCtKWhfKJusv1FFruyb6ZWKnnXBko31166q8cIONggfjuedMj7xuLu978t1t6n8rz7jrNcyJUuZs5hJ1v1n1Dr7qiSGIirtRSewWGcZU2ib80c8SczoapmIbDJJHztcK6sE6E5cGDKEE90pL_nh2-10b5KjEl2QdJBYhS19yIxQk06Ube5vSThWE9-DWBq_8ueHt8AJFIKy2R43v44A1TMfQHwfi6kN-JwnQIBVTEnJ9YEbRIHU4VHEK4BmTRuXZunp_VIG-IqUljWWfp2JCX4ZKzIQ8DYIaEAm_KM1OLbC5NrBMM5YfEygoWJItpTCpusWajAsFbjmEjSp-YkhJg",
"client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer",
"code": "DMEqFepa8HmxP13y3SqiA8MhOpGjH_bidx3WxLwfnjs.siXO4tx7D9ffL3fx5WLrPtkSHtNh3qjw2TyPfxymV1o",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "l7TJGQrQlcsJwmSg"
}
3.733 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.733 request_http_args {'headers': {'Content-Type': 'application/x-www-form-urlencoded'}}
3.733 request code=DMEqFepa8HmxP13y3SqiA8MhOpGjH_bidx3WxLwfnjs.siXO4tx7D9ffL3fx5WLrPtkSHtNh3qjw2TyPfxymV1o&client_assertion_type=urn%3Aietf%3Aparams%3Aoauth%3Aclient-assertion-type%3Ajwt-bearer&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=l7TJGQrQlcsJwmSg&client_assertion=eyJhbGciOiJSUzI1NiIsImtpZCI6Ind0MjVPZ3lSX256RzNPb1E3ZGFhMnJMNi1nTW5GZGZSekJqaFVWUHU4UlEifQ.eyJpc3MiOiAiMjRmOTM1YjAtMWNjMS00NWU3LWJhYTYtNzQ0NzcyYzVlYTMyIiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiMjRmOTM1YjAtMWNjMS00NWU3LWJhYTYtNzQ0NzcyYzVlYTMyIiwgImlhdCI6IDE1Mjk3NTI0NTUsICJqdGkiOiAiNUlHZTVjNUFMOUtkTjhhcXNoV3YzWlhrY0NoQVNBMGkiLCAiZXhwIjogMTUyOTc1MzA1NX0.wWCtKWhfKJusv1FFruyb6ZWKnnXBko31166q8cIONggfjuedMj7xuLu978t1t6n8rz7jrNcyJUuZs5hJ1v1n1Dr7qiSGIirtRSewWGcZU2ib80c8SczoapmIbDJJHztcK6sE6E5cGDKEE90pL_nh2-10b5KjEl2QdJBYhS19yIxQk06Ube5vSThWE9-DWBq_8ueHt8AJFIKy2R43v44A1TMfQHwfi6kN-JwnQIBVTEnJ9YEbRIHU4VHEK4BmTRuXZunp_VIG-IqUljWWfp2JCX4ZKzIQ8DYIaEAm_KM1OLbC5NrBMM5YfEygoWJItpTCpusWajAsFbjmEjSp-YkhJg
3.914 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.915 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplODdmZjk4Ny1lZTYzLTRmM2UtOGJmMy00MDk5YTYxNDhmNzgiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiVldtY2xndEc5cTBSOVNOUjBLUkJoZyIsImF1ZCI6WyIyNGY5MzViMC0xY2MxLTQ1ZTctYmFhNi03NDQ3NzJjNWVhMzIiXSwiYXV0aF90aW1lIjoxNTI5NzUyMzcxLCJjX2hhc2giOiJ3dFpDQkxmUFd2ZjJmNVl0c3FUeUtRIiwiZXhwIjoxNTI5NzU2MDU0LCJpYXQiOjE1Mjk3NTI0NTUsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjJiOWEwNjE2LTI2NzEtNGU1Ni04MmQ2LWJhNWRmODliMWY4ZSIsIm5vbmNlIjoiZzB4VWVoV2Z0ZGt1cXBaQSIsInJhdCI6MTUyOTc1MjQ1MSwic3ViIjoiZm9vQGJhci5jb20ifQ.aeYW4L6J4DOcrI3QjSnasXW-feF3TfLa8IvlD-swPl6u0n62wB23I9GXmdEtko1UkNgvjKrqAn_bHtouxvDYqyuVLNzwEkUoFzRF-Yg0e40fxxn_VxqiVd6I1Fql9fuJVAJtvLfR5xXjiMSXgBSO-0nnkqT89k7ekGTDn9BoMwqN5WwvdBL9pi-TVfFFxWceVbT1UZmFXMoj7QxGLNRQHyhDOpWGziADd_6fLO4Qtyzi-IdbkC60e13fNoxxz23ukc_bymhV_Q9ALhLtRkgOkcYT05knFntL4jmmAwIsb52yQ04VUJ3tm_MdiJM3roXQYx0YjUgLLI3SWWqJXjTfb7dvyuHI9vHIS9Wsx1bHAudzDJqafV63BT6p-ulFUjwNrkct6PcNFPsu0ii-1uZqKgN3KiLcuNbRQ1d5hnQQP-e8eKaC0Ks7GgPrFe3kZvpVNTA8T8oq1GhXnIDajn1czr1y5NZNnQxZz20Dy8dEJxZ81es0wzimaIbPcoF4zof8xOrhMh4y5BU4XPTO11lceBwvu2Ft4zgvC3DFE6xmf4Hwy9KeZv2Wowdr6iYVZWqX-y6WNBh3ecsEeLfML5_kptBzxkieUc23hfK_kCsQTDXXsHKMbAcvtWp36CKraiFaIJw8PlYQJvQsVsjuY5YJwQVJ536fbLMth_8W0JV8I_0', 'scope': 'openid offline_access', 'access_token': 'mjJzzI7Wwy_MDjRYbk6NTgVyzs_vndra2TnqEGmV4yI.1s0hMKCbRnIHMGdqQygvlq-UnmPS1KO0LbKXf4jRCUo', 'refresh_token': 'bvCRuzNLh--ABrmqEn2Qj3Vki2NrXLqVZEk5pVQx1rA.1echXA9AFbebKtqM9JG0w5ZJKbb5uVWiO2Blbar0JuY', 'token_type': 'bearer', 'expires_in': 3599}
3.996 AccessTokenResponse {
"access_token": "mjJzzI7Wwy_MDjRYbk6NTgVyzs_vndra2TnqEGmV4yI.1s0hMKCbRnIHMGdqQygvlq-UnmPS1KO0LbKXf4jRCUo",
"expires_in": 3599,
"id_token": {
"at_hash": "VWmclgtG9q0R9SNR0KRBhg",
"aud": [
"24f935b0-1cc1-45e7-baa6-744772c5ea32"
],
"auth_time": 1529752371,
"c_hash": "wtZCBLfPWvf2f5YtsqTyKQ",
"exp": 1529756054,
"iat": 1529752455,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "2b9a0616-2671-4e56-82d6-ba5df89b1f8e",
"nonce": "g0xUehWftdkuqpZA",
"rat": 1529752451,
"sub": "[email protected]"
},
"refresh_token": "bvCRuzNLh--ABrmqEn2Qj3Vki2NrXLqVZEk5pVQx1rA.1echXA9AFbebKtqM9JG0w5ZJKbb5uVWiO2Blbar0JuY",
"scope": "openid offline_access",
"token_type": "bearer"
}
3.996 phase <--<-- 5 --- RotateSigKeys -->-->
4.043 phase <--<-- 6 --- RefreshAccessToken -->-->
4.043 RefreshAccessTokenRequest {
"client_assertion": "eyJhbGciOiJSUzI1NiIsImtpZCI6IkJlYTFmMHRNOWFhRmpkTU5YSmk4RXJhbDhFR0dWdjducF9NVjdUdlJ0UFEifQ.eyJpc3MiOiAiMjRmOTM1YjAtMWNjMS00NWU3LWJhYTYtNzQ0NzcyYzVlYTMyIiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiMjRmOTM1YjAtMWNjMS00NWU3LWJhYTYtNzQ0NzcyYzVlYTMyIiwgImlhdCI6IDE1Mjk3NTI0NTUsICJqdGkiOiAiWFVXYnVKdU0yRlBGa3I1UUxtSUkyTExQVVBxQUZEOXciLCAiZXhwIjogMTUyOTc1MzA1NX0.mCddHD1bBT56_EG2Rj6dC-MovwXoFsX5uiGkvVmNs0LynVDnRzKZpG1RWxVP9WEadKaPZt9JoPTTaPtMYyD2b4Jd7s9zkU3l4gooRwsy_gjbCJeyqqfv3PoBY_-kiaM3mPiWXUZ2033wyy6blTcksAOHVCk4p8lPamuKmRxdPPcUm3FiW8PP465BwooAKhU0HVP-XlphTyRmc0n1G9yiNYM4rIRH-ZmR2taDuXtqJeV3mfhtDI0MVFOJM2uh7cFSRXegUbplzB2TVsxnyT6c47BqlAOQlx90ii7K4isAgizMcSHxXaiLTMT87iSdGobwuZb2uac3ZebANZSfuL529g",
"client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer",
"grant_type": "refresh_token",
"refresh_token": "bvCRuzNLh--ABrmqEn2Qj3Vki2NrXLqVZEk5pVQx1rA.1echXA9AFbebKtqM9JG0w5ZJKbb5uVWiO2Blbar0JuY",
"scope": "openid offline_access"
}
4.046 request {'client_assertion': 'eyJhbGciOiJSUzI1NiIsImtpZCI6IkJlYTFmMHRNOWFhRmpkTU5YSmk4RXJhbDhFR0dWdjducF9NVjdUdlJ0UFEifQ.eyJpc3MiOiAiMjRmOTM1YjAtMWNjMS00NWU3LWJhYTYtNzQ0NzcyYzVlYTMyIiwgImF1ZCI6IFsiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvb2F1dGgyL3Rva2VuIl0sICJzdWIiOiAiMjRmOTM1YjAtMWNjMS00NWU3LWJhYTYtNzQ0NzcyYzVlYTMyIiwgImlhdCI6IDE1Mjk3NTI0NTUsICJqdGkiOiAiWFVXYnVKdU0yRlBGa3I1UUxtSUkyTExQVVBxQUZEOXciLCAiZXhwIjogMTUyOTc1MzA1NX0.mCddHD1bBT56_EG2Rj6dC-MovwXoFsX5uiGkvVmNs0LynVDnRzKZpG1RWxVP9WEadKaPZt9JoPTTaPtMYyD2b4Jd7s9zkU3l4gooRwsy_gjbCJeyqqfv3PoBY_-kiaM3mPiWXUZ2033wyy6blTcksAOHVCk4p8lPamuKmRxdPPcUm3FiW8PP465BwooAKhU0HVP-XlphTyRmc0n1G9yiNYM4rIRH-ZmR2taDuXtqJeV3mfhtDI0MVFOJM2uh7cFSRXegUbplzB2TVsxnyT6c47BqlAOQlx90ii7K4isAgizMcSHxXaiLTMT87iSdGobwuZb2uac3ZebANZSfuL529g', 'scope': 'openid offline_access', 'grant_type': 'refresh_token', 'client_assertion_type': 'urn:ietf:params:oauth:client-assertion-type:jwt-bearer', 'refresh_token': 'bvCRuzNLh--ABrmqEn2Qj3Vki2NrXLqVZEk5pVQx1rA.1echXA9AFbebKtqM9JG0w5ZJKbb5uVWiO2Blbar0JuY'}
4.181 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
4.181 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
4.181 handle_response kwargs:{'r': <Response [200]>, 'csi': <oic.oic.message.RefreshAccessTokenRequest object at 0x7f2440219828>}
4.181 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplODdmZjk4Ny1lZTYzLTRmM2UtOGJmMy00MDk5YTYxNDhmNzgiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiVldtY2xndEc5cTBSOVNOUjBLUkJoZyIsImF1ZCI6WyIyNGY5MzViMC0xY2MxLTQ1ZTctYmFhNi03NDQ3NzJjNWVhMzIiXSwiYXV0aF90aW1lIjoxNTI5NzUyMzcxLCJjX2hhc2giOiJ3dFpDQkxmUFd2ZjJmNVl0c3FUeUtRIiwiZXhwIjoxNTI5NzU2MDU1LCJpYXQiOjE1Mjk3NTI0NTUsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjUxMGExYWUxLTNlZjUtNGRiZi1iMTYxLTUxYjYwMDgxODY4ZSIsIm5vbmNlIjoiIiwicmF0IjoxNTI5NzUyNDUxLCJzdWIiOiJmb29AYmFyLmNvbSJ9.lmwWwhT8tSnW8RksJgaNqpw34uOz4DwpOhEsaMsklexMZuIUN9x8URThBssURQIooiogqvFWDAtNQ6qaiGOw_dj2pvuk1yMEWAhzyQAhb_TVuxnaYeUEPFfZJpsEhb-bkqmSaG_DvsEeXRzKszgMVLTcv8Co5KxElSo898hwFQ-YZQAVa9Tbti3o3LsiT7MbG08IUhK1ugclCiAvEVid2IBRhXUfMQrpEIrjwtXiAXTvi9E7PxLptFAGbCM8fNTLh1asTw25TNW4uJz6vYU930fCydXrNO6rk_5nNxXJmWsQUIAvznhKR2LqgTuIzG2ggJcIWStrf9vLWi5aSuM_KFyrjwbGQciHMl4iD8WTIRTm4ZDB75ZT6WuY5lFM_Iyz-1Ns5YfIWcvG4Y82vfJeoMVvbATMQhJtflNcRKbZBbuQoF4lhyxcOSGEtakihHqRGnZpCXS7BO1P4yoFtHaAhk04lAJ6CNmIya-0AHQ0609f3Pjo8EKV9a1Oow71odBjmnxljhVEM1lHvr25OVHHJu7xOUI7VDeDu0LV63wcabPM-3xLajKrERl5Swp4LI_LfQI-sAdutlgpxElKjz00g_AbMrdx9s1_vyC4o8CVyCUPK2sCpyrkK1kWu8okrka1AvcVBkyuXD1FgvRyRd2gTByM7CL8owW6DRfOTD0EmQg', 'scope': 'openid offline_access', 'access_token': 'd6EkeamwEdI4HmSNiUwLarydu9bHThhAI-o8xK772zk.yUFf36pPwJhR9_WgOCJXlSGkcorV9hqAMglbYLS5EsA', 'refresh_token': 'xIQWvp6rkVx47sNA4XjHnbzSc61UUzDbhBa2FlqFLJA.rnGcfIxkYpM-FBiEQbbntJGl3IQZW3gATqrvUQrQnbQ', 'token_type': 'bearer', 'expires_in': 3599}
4.185 jws header {'typ': 'JWT', 'alg': 'RS256', 'kid': 'public:e87ff987-ee63-4f3e-8bf3-4099a6148f78'}
4.185 AccessTokenResponse {
"access_token": "d6EkeamwEdI4HmSNiUwLarydu9bHThhAI-o8xK772zk.yUFf36pPwJhR9_WgOCJXlSGkcorV9hqAMglbYLS5EsA",
"expires_in": 3599,
"id_token": {
"at_hash": "VWmclgtG9q0R9SNR0KRBhg",
"aud": [
"24f935b0-1cc1-45e7-baa6-744772c5ea32"
],
"auth_time": 1529752371,
"c_hash": "wtZCBLfPWvf2f5YtsqTyKQ",
"exp": 1529756055,
"iat": 1529752455,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "510a1ae1-3ef5-4dbf-b161-51b60081868e",
"rat": 1529752451,
"sub": "[email protected]"
},
"refresh_token": "xIQWvp6rkVx47sNA4XjHnbzSc61UUzDbhBa2FlqFLJA.rnGcfIxkYpM-FBiEQbbntJGl3IQZW3gATqrvUQrQnbQ",
"scope": "openid offline_access",
"token_type": "bearer"
}
4.185 phase <--<-- 7 --- Done -->-->
4.185 end
4.186 assertion CheckHTTPResponse
4.186 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
4.186 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-scope-address.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-scope-address
Test description: Scope requesting address claims
Timestamp: 2018-06-23T11:10:54Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.107 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.108 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.108 phase <--<-- 2 --- Registration -->-->
0.108 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.108 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#4mQlESh6H9jhI5CQ"
],
"response_types": [
"code token"
]
}
0.264 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.265 RegistrationResponse {
"client_id": "79d1666b-6b39-4f3d-b3e2-2ea11f8ab585",
"client_secret": "OV38la9FS1QU",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "79d1666b-6b39-4f3d-b3e2-2ea11f8ab585",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#4mQlESh6H9jhI5CQ"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.265 phase <--<-- 3 --- AsyncAuthn -->-->
0.266 condition Check support: status=WARNING, message=No support for: scopes_supported=['address']
0.266 AuthorizationRequest {
"client_id": "79d1666b-6b39-4f3d-b3e2-2ea11f8ab585",
"nonce": "x2cDZ4m96t9agPeo",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid address",
"state": "oMp4DvwhdVamni2R"
}
0.266 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+address&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=79d1666b-6b39-4f3d-b3e2-2ea11f8ab585&state=oMp4DvwhdVamni2R&response_type=code+token&nonce=x2cDZ4m96t9agPeo
0.266 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+address&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=79d1666b-6b39-4f3d-b3e2-2ea11f8ab585&state=oMp4DvwhdVamni2R&response_type=code+token&nonce=x2cDZ4m96t9agPeo
3.8 http args {}
3.967 response URL with fragment
3.968 response access_token=kEJ8qHtdObUjS0st9mHr9xgA_6Hk2uc7x5lLpoOvCXI.8XedPRVn3mzKYJAfVzKhaFKV6rjC5nitS4aCcRrYJ-c&code=lrELk7_W5ZVscX2Gebx4hS52ibE9HQfvIsGUQRCmgt4.kh4XL-ngL2pFIL4EAjIVZPxVFB0bjXne643CxDxsxSA&expires_in=3599&scope=openid%20address&state=oMp4DvwhdVamni2R&token_type=bearer
3.968 response {'scope': 'openid address', 'code': 'lrELk7_W5ZVscX2Gebx4hS52ibE9HQfvIsGUQRCmgt4.kh4XL-ngL2pFIL4EAjIVZPxVFB0bjXne643CxDxsxSA', 'access_token': 'kEJ8qHtdObUjS0st9mHr9xgA_6Hk2uc7x5lLpoOvCXI.8XedPRVn3mzKYJAfVzKhaFKV6rjC5nitS4aCcRrYJ-c', 'state': 'oMp4DvwhdVamni2R', 'expires_in': 3599, 'token_type': 'bearer'}
3.968 AuthorizationResponse {
"access_token": "kEJ8qHtdObUjS0st9mHr9xgA_6Hk2uc7x5lLpoOvCXI.8XedPRVn3mzKYJAfVzKhaFKV6rjC5nitS4aCcRrYJ-c",
"code": "lrELk7_W5ZVscX2Gebx4hS52ibE9HQfvIsGUQRCmgt4.kh4XL-ngL2pFIL4EAjIVZPxVFB0bjXne643CxDxsxSA",
"expires_in": 3599,
"scope": "openid address",
"state": "oMp4DvwhdVamni2R",
"token_type": "bearer"
}
3.969 phase <--<-- 4 --- AccessToken -->-->
3.969 --> request op_args: {'state': 'oMp4DvwhdVamni2R'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.969 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'oMp4DvwhdVamni2R', 'code': 'lrELk7_W5ZVscX2Gebx4hS52ibE9HQfvIsGUQRCmgt4.kh4XL-ngL2pFIL4EAjIVZPxVFB0bjXne643CxDxsxSA', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '79d1666b-6b39-4f3d-b3e2-2ea11f8ab585'}, 'state': 'oMp4DvwhdVamni2R'}
3.969 AccessTokenRequest {
"code": "lrELk7_W5ZVscX2Gebx4hS52ibE9HQfvIsGUQRCmgt4.kh4XL-ngL2pFIL4EAjIVZPxVFB0bjXne643CxDxsxSA",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "oMp4DvwhdVamni2R"
}
3.969 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.969 request_http_args {'headers': {'Authorization': 'Basic NzlkMTY2NmItNmIzOS00ZjNkLWIzZTItMmVhMTFmOGFiNTg1Ok9WMzhsYTlGUzFRVQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
3.969 request code=lrELk7_W5ZVscX2Gebx4hS52ibE9HQfvIsGUQRCmgt4.kh4XL-ngL2pFIL4EAjIVZPxVFB0bjXne643CxDxsxSA&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=oMp4DvwhdVamni2R
4.184 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
4.186 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiNllma2tDaUw1THg3cDdNaGx6VE5xdyIsImF1ZCI6WyI3OWQxNjY2Yi02YjM5LTRmM2QtYjNlMi0yZWExMWY4YWI1ODUiXSwiYXV0aF90aW1lIjoxNTI5NzUyMTgwLCJjX2hhc2giOiJvUHRWcHFHZUZyVWRsOE53cnExZDV3IiwiZXhwIjoxNTI5NzU1ODUzLCJpYXQiOjE1Mjk3NTIyNTQsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjA1MGJhYmFlLWQwZGMtNGIwNy1iNjQ5LWUzN2NkNTVkZjQ5MiIsIm5vbmNlIjoieDJjRFo0bTk2dDlhZ1BlbyIsInJhdCI6MTUyOTc1MjI1MCwic3ViIjoiZm9vQGJhci5jb20ifQ.bcw63IOjNuCO99YC-2CQ1RQZ2-qMU6-lR5HBgiN74rj3AznF7-QFk1vdhgJ1ZoADf1XOlV7FyerQjyB_uqdfUKrXPZk1p9aDAzdECrv_vza50xy7-0STzo-QDjIUnwEPkqP_sb-kMM57J-7lx2uPhNN6bO46D3VH10O4Lmk_RKy7Z7xiXBPXqwmJI0U2ve-alDMECIdVnSijiENZ-TckEqax_GvxwG6-W2bBd7RY8DvMgEPJoCQ78D5QaopVQPtoXkFQ7V8h6J3_niSu6QpsRoHqdzZE1pIaf18B-07jtmSoMoM8mxpMJKw4m8vk5JxAxP6ZyWJRpaM9XXIq83wXlqLcvWiUhQQ5XMeJNc8NW3mkLAC1DNJ9GzRKKYfD_SW5_OA_qTUENTub4GjIOejwgOmcemIrW5q8Yf5ej5dbuk7P9manMhJOSrgVEXkvLbqFJXl1go98BPT0YbpGVqRItWy3X3-5i_SWw1RuMlhNGbnWILNMCrIuom8UqjnsvHhfcvXyM1HPpfhJkg0VJU6A9jpRdtSNl2LsYiUPcwyuJLuFMA3yKlCFL8_Sm044PFg_4sC4-0ta7Azmn2HgEpzoTKEXarb_7Sz0ZV7O3d88WseXjcKY2oBB4iLthl1Crh-_AFcNReiasuwq3CMB10KG1r-qV4etu4gCmQnnk1yNKBc', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'oyZgKcwk0g84Bv_ITQQKFvdl8CAiI43mkIS1Eyvb_xc.umbJPcevQLTLClZR-VuTNmIoTrRjfKU9Sic8sQ1E_3M', 'scope': 'openid address'}
4.298 AccessTokenResponse {
"access_token": "oyZgKcwk0g84Bv_ITQQKFvdl8CAiI43mkIS1Eyvb_xc.umbJPcevQLTLClZR-VuTNmIoTrRjfKU9Sic8sQ1E_3M",
"expires_in": 3599,
"id_token": {
"at_hash": "6YfkkCiL5Lx7p7MhlzTNqw",
"aud": [
"79d1666b-6b39-4f3d-b3e2-2ea11f8ab585"
],
"auth_time": 1529752180,
"c_hash": "oPtVpqGeFrUdl8Nwrq1d5w",
"exp": 1529755853,
"iat": 1529752254,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "050babae-d0dc-4b07-b649-e37cd55df492",
"nonce": "x2cDZ4m96t9agPeo",
"rat": 1529752250,
"sub": "[email protected]"
},
"scope": "openid address",
"token_type": "bearer"
}
4.298 phase <--<-- 5 --- UserInfo -->-->
4.298 do_user_info_request kwargs:{'state': 'oMp4DvwhdVamni2R', 'method': 'GET', 'authn_method': 'bearer_header'}
4.299 request {'body': None}
4.299 request_url https://oidc-certification.ory.sh:8443/userinfo
4.299 request_http_args {'headers': {'Authorization': 'Bearer oyZgKcwk0g84Bv_ITQQKFvdl8CAiI43mkIS1Eyvb_xc.umbJPcevQLTLClZR-VuTNmIoTrRjfKU9Sic8sQ1E_3M'}}
4.383 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
4.384 OpenIDSchema {
"sub": "[email protected]"
}
4.384 OpenIDSchema {
"sub": "[email protected]"
}
4.384 phase <--<-- 6 --- Done -->-->
4.384 end
4.384 assertion CheckHTTPResponse
4.384 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
4.385 assertion VerifyResponse
4.385 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.385 assertion VerifyScopes
4.385 condition verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['address'] [Verifies that the claims corresponding to the requested scopes are returned]
4.385 condition Done: status=OK
============================================================
Conditions
Check support: status=WARNING, message=No support for: scopes_supported=['address']
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['address'] [Verifies that the claims corresponding to the requested scopes are returned]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
No support for: scopes_supported=['address']
The following claims were missing from the returned information: ['address'] |
Text | hydra/internal/certification/CT.F.T.T.s/OP-scope-All.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-scope-All
Test description: Scope requesting all claims
Timestamp: 2018-06-23T11:10:48Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.081 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.082 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.082 phase <--<-- 2 --- Registration -->-->
0.082 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.082 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#KxG8nkKoV2xfFr0w"
],
"response_types": [
"code token"
]
}
0.238 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.239 RegistrationResponse {
"client_id": "7a203f41-fe72-4346-bb4d-78a722560135",
"client_secret": "YANPUne85k8f",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "7a203f41-fe72-4346-bb4d-78a722560135",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#KxG8nkKoV2xfFr0w"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.239 phase <--<-- 3 --- AsyncAuthn -->-->
0.239 condition Check support: status=WARNING, message=No support for: scopes_supported=['profile', 'email', 'address', 'phone']
0.239 AuthorizationRequest {
"client_id": "7a203f41-fe72-4346-bb4d-78a722560135",
"nonce": "VyM2Ni0AYZN9ZXvC",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid profile email address phone",
"state": "DSrHDfJbxgUv4pFP"
}
0.239 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+profile+email+address+phone&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=7a203f41-fe72-4346-bb4d-78a722560135&state=DSrHDfJbxgUv4pFP&response_type=code+token&nonce=VyM2Ni0AYZN9ZXvC
0.24 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+profile+email+address+phone&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=7a203f41-fe72-4346-bb4d-78a722560135&state=DSrHDfJbxgUv4pFP&response_type=code+token&nonce=VyM2Ni0AYZN9ZXvC
4.435 http args {}
4.597 response URL with fragment
4.597 response access_token=pBBGytVvMsmFW517lTivmc4kwD-b6wFSTju9Z0p75A8.6RQTcNrpfBM0NaSO4wo4TT9hJ0E5dLCJ9mEMwyhuGII&code=0NHuh4TFFVYnrTQlR_dKvPQdK1LBegnEIEuqu5DaoVA.CFtDbF8ugawgZwLAUD2kp1uJxcKgMYlcpD4SDst4D0Q&expires_in=3599&scope=openid%20profile%20email%20address%20phone&state=DSrHDfJbxgUv4pFP&token_type=bearer
4.598 response {'scope': 'openid profile email address phone', 'code': '0NHuh4TFFVYnrTQlR_dKvPQdK1LBegnEIEuqu5DaoVA.CFtDbF8ugawgZwLAUD2kp1uJxcKgMYlcpD4SDst4D0Q', 'access_token': 'pBBGytVvMsmFW517lTivmc4kwD-b6wFSTju9Z0p75A8.6RQTcNrpfBM0NaSO4wo4TT9hJ0E5dLCJ9mEMwyhuGII', 'state': 'DSrHDfJbxgUv4pFP', 'expires_in': 3599, 'token_type': 'bearer'}
4.598 AuthorizationResponse {
"access_token": "pBBGytVvMsmFW517lTivmc4kwD-b6wFSTju9Z0p75A8.6RQTcNrpfBM0NaSO4wo4TT9hJ0E5dLCJ9mEMwyhuGII",
"code": "0NHuh4TFFVYnrTQlR_dKvPQdK1LBegnEIEuqu5DaoVA.CFtDbF8ugawgZwLAUD2kp1uJxcKgMYlcpD4SDst4D0Q",
"expires_in": 3599,
"scope": "openid profile email address phone",
"state": "DSrHDfJbxgUv4pFP",
"token_type": "bearer"
}
4.598 phase <--<-- 4 --- AccessToken -->-->
4.598 --> request op_args: {'state': 'DSrHDfJbxgUv4pFP'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
4.598 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'DSrHDfJbxgUv4pFP', 'code': '0NHuh4TFFVYnrTQlR_dKvPQdK1LBegnEIEuqu5DaoVA.CFtDbF8ugawgZwLAUD2kp1uJxcKgMYlcpD4SDst4D0Q', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '7a203f41-fe72-4346-bb4d-78a722560135'}, 'state': 'DSrHDfJbxgUv4pFP'}
4.598 AccessTokenRequest {
"code": "0NHuh4TFFVYnrTQlR_dKvPQdK1LBegnEIEuqu5DaoVA.CFtDbF8ugawgZwLAUD2kp1uJxcKgMYlcpD4SDst4D0Q",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "DSrHDfJbxgUv4pFP"
}
4.598 request_url https://oidc-certification.ory.sh:8443/oauth2/token
4.598 request_http_args {'headers': {'Authorization': 'Basic N2EyMDNmNDEtZmU3Mi00MzQ2LWJiNGQtNzhhNzIyNTYwMTM1OllBTlBVbmU4NWs4Zg==', 'Content-Type': 'application/x-www-form-urlencoded'}}
4.598 request code=0NHuh4TFFVYnrTQlR_dKvPQdK1LBegnEIEuqu5DaoVA.CFtDbF8ugawgZwLAUD2kp1uJxcKgMYlcpD4SDst4D0Q&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=DSrHDfJbxgUv4pFP
4.816 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
4.817 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiTElZWi14MENQNXdxYmM0N2toSUtDUSIsImF1ZCI6WyI3YTIwM2Y0MS1mZTcyLTQzNDYtYmI0ZC03OGE3MjI1NjAxMzUiXSwiYXV0aF90aW1lIjoxNTI5NzUyMTgwLCJjX2hhc2giOiJaVURLMURHcU94aFFpQzFKWWtQUFNnIiwiZXhwIjoxNTI5NzU1ODQ4LCJpYXQiOjE1Mjk3NTIyNDgsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImEzYjJjZTdkLTk0MjQtNDFkMS05YTEyLThjMWVkZTZkNzE1MyIsIm5vbmNlIjoiVnlNMk5pMEFZWk45Wlh2QyIsInJhdCI6MTUyOTc1MjI0NCwic3ViIjoiZm9vQGJhci5jb20ifQ.nLC0L5FENwiLCriTV3atfRczrc2LF8_PzojBgtlm6t0A5ibHxX4BjYKSo92D1hWuvkfxPILAqsUvhh4k2VznvXD8U1TJr88taCZSZ0MXx8knd7dRNzO-GmwrPWr4EluPuKhZdSQCER4j5tjKym1hQggiYMAa1zMoOHtLFBRiDfPka-FO2uLve1ItcAlcEk-5sS2Zbr5Lh61DYZhaL9fTfv7VVARDlhuVMe5IeIgvZP9Er-ww75SYpjKx1eN5Qe_Kq7tOIqaUHnxDTI3xlNsySeVKY1HnIf2J2FmuKenoSbOJaN59d313LlDQdw12U_2eCJ_u2VYzQuGN5zu13gbQSD5nLHBGV1v-o4pdrs29eSv4Mt2ZR6ESh12ZV3SHRV_k5ddoigyKH2Vth4vAtzfJAEeQTU5386VMwsIW_7lgvpsgJKa75lrLXYuMQenCQGyDXRCoqf2CxNgW9twpY7uzCtvXvYOeDLt-TkEezDjDySCsBcqkF_x42wRk9W1_eJQRILjt2V4R8Mwz91urN-Aw8f2AEbNlckE7_T6sHOSwutTnJotLarWaRYWWmCZ4uBzrmh4WlW1yhIrdqdv5UfLZkxG7FWPZE_TfeA0qxL-abB5LWCT2p1S0Z5RFGr4TDVffSSTRwE7zN8C-vI35tHiopyB1BpX7BFFYnYTpsQZBPrA', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'TWvz7KOD6jjgDW8xOn8GU0xGNOhoagpPJ5zgCG6XpI8.5GGHNP8bjCL-Qm6GmFGymdryVXlE5yHjzXpfvKl0z7g', 'scope': 'openid profile email address phone'}
4.896 AccessTokenResponse {
"access_token": "TWvz7KOD6jjgDW8xOn8GU0xGNOhoagpPJ5zgCG6XpI8.5GGHNP8bjCL-Qm6GmFGymdryVXlE5yHjzXpfvKl0z7g",
"expires_in": 3599,
"id_token": {
"at_hash": "LIYZ-x0CP5wqbc47khIKCQ",
"aud": [
"7a203f41-fe72-4346-bb4d-78a722560135"
],
"auth_time": 1529752180,
"c_hash": "ZUDK1DGqOxhQiC1JYkPPSg",
"exp": 1529755848,
"iat": 1529752248,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "a3b2ce7d-9424-41d1-9a12-8c1ede6d7153",
"nonce": "VyM2Ni0AYZN9ZXvC",
"rat": 1529752244,
"sub": "[email protected]"
},
"scope": "openid profile email address phone",
"token_type": "bearer"
}
4.896 phase <--<-- 5 --- UserInfo -->-->
4.896 do_user_info_request kwargs:{'state': 'DSrHDfJbxgUv4pFP', 'method': 'GET', 'authn_method': 'bearer_header'}
4.897 request {'body': None}
4.897 request_url https://oidc-certification.ory.sh:8443/userinfo
4.897 request_http_args {'headers': {'Authorization': 'Bearer TWvz7KOD6jjgDW8xOn8GU0xGNOhoagpPJ5zgCG6XpI8.5GGHNP8bjCL-Qm6GmFGymdryVXlE5yHjzXpfvKl0z7g'}}
5.014 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
5.015 OpenIDSchema {
"sub": "[email protected]"
}
5.015 OpenIDSchema {
"sub": "[email protected]"
}
5.015 phase <--<-- 6 --- Done -->-->
5.015 end
5.016 assertion CheckHTTPResponse
5.016 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
5.016 assertion VerifyResponse
5.016 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
5.016 assertion VerifyScopes
5.017 condition verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username', 'email', 'email_verified', 'address', 'phone_number', 'phone_number_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
5.017 condition Done: status=OK
============================================================
Conditions
Check support: status=WARNING, message=No support for: scopes_supported=['profile', 'email', 'address', 'phone']
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username', 'email', 'email_verified', 'address', 'phone_number', 'phone_number_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
No support for: scopes_supported=['profile', 'email', 'address', 'phone']
The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username', 'email', 'email_verified', 'address', 'phone_number', 'phone_number_verified'] |
Text | hydra/internal/certification/CT.F.T.T.s/OP-scope-email.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-scope-email
Test description: Scope requesting email claims
Timestamp: 2018-06-23T11:10:59Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.107 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.109 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.109 phase <--<-- 2 --- Registration -->-->
0.109 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.109 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#h0zetVQIrPOly50r"
],
"response_types": [
"code token"
]
}
0.267 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.268 RegistrationResponse {
"client_id": "9b8173ed-498e-4660-a5cb-b2858aac6d22",
"client_secret": "sESnug0mmad4",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "9b8173ed-498e-4660-a5cb-b2858aac6d22",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#h0zetVQIrPOly50r"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.268 phase <--<-- 3 --- AsyncAuthn -->-->
0.269 condition Check support: status=WARNING, message=No support for: scopes_supported=['email']
0.269 AuthorizationRequest {
"client_id": "9b8173ed-498e-4660-a5cb-b2858aac6d22",
"nonce": "aoN1acO8YjrM9V53",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid email",
"state": "AjdN1o6PmHlOEYyX"
}
0.269 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+email&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=9b8173ed-498e-4660-a5cb-b2858aac6d22&state=AjdN1o6PmHlOEYyX&response_type=code+token&nonce=aoN1acO8YjrM9V53
0.269 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+email&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=9b8173ed-498e-4660-a5cb-b2858aac6d22&state=AjdN1o6PmHlOEYyX&response_type=code+token&nonce=aoN1acO8YjrM9V53
3.32 http args {}
3.491 response URL with fragment
3.492 response access_token=Uq-Vyev6OdwRFHL9sop6hmhPxdl10nbkL2btfY7I6QE.rgus_vuMw3s6OcwI5UyILRaUi_mXNahK76Aij4IX7Rc&code=agwk7zQGm33X-NxhcjcMCRx3uqk2IwvYQ7c7jZR5WKQ.2CDI-yujQ6fLxYUCpOllv0wTuBTl2I365wncjGfldFk&expires_in=3599&scope=openid%20email&state=AjdN1o6PmHlOEYyX&token_type=bearer
3.492 response {'scope': 'openid email', 'code': 'agwk7zQGm33X-NxhcjcMCRx3uqk2IwvYQ7c7jZR5WKQ.2CDI-yujQ6fLxYUCpOllv0wTuBTl2I365wncjGfldFk', 'access_token': 'Uq-Vyev6OdwRFHL9sop6hmhPxdl10nbkL2btfY7I6QE.rgus_vuMw3s6OcwI5UyILRaUi_mXNahK76Aij4IX7Rc', 'state': 'AjdN1o6PmHlOEYyX', 'expires_in': 3599, 'token_type': 'bearer'}
3.492 AuthorizationResponse {
"access_token": "Uq-Vyev6OdwRFHL9sop6hmhPxdl10nbkL2btfY7I6QE.rgus_vuMw3s6OcwI5UyILRaUi_mXNahK76Aij4IX7Rc",
"code": "agwk7zQGm33X-NxhcjcMCRx3uqk2IwvYQ7c7jZR5WKQ.2CDI-yujQ6fLxYUCpOllv0wTuBTl2I365wncjGfldFk",
"expires_in": 3599,
"scope": "openid email",
"state": "AjdN1o6PmHlOEYyX",
"token_type": "bearer"
}
3.493 phase <--<-- 4 --- AccessToken -->-->
3.493 --> request op_args: {'state': 'AjdN1o6PmHlOEYyX'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.493 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'AjdN1o6PmHlOEYyX', 'code': 'agwk7zQGm33X-NxhcjcMCRx3uqk2IwvYQ7c7jZR5WKQ.2CDI-yujQ6fLxYUCpOllv0wTuBTl2I365wncjGfldFk', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '9b8173ed-498e-4660-a5cb-b2858aac6d22'}, 'state': 'AjdN1o6PmHlOEYyX'}
3.493 AccessTokenRequest {
"code": "agwk7zQGm33X-NxhcjcMCRx3uqk2IwvYQ7c7jZR5WKQ.2CDI-yujQ6fLxYUCpOllv0wTuBTl2I365wncjGfldFk",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "AjdN1o6PmHlOEYyX"
}
3.493 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.493 request_http_args {'headers': {'Authorization': 'Basic OWI4MTczZWQtNDk4ZS00NjYwLWE1Y2ItYjI4NThhYWM2ZDIyOnNFU251ZzBtbWFkNA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
3.493 request code=agwk7zQGm33X-NxhcjcMCRx3uqk2IwvYQ7c7jZR5WKQ.2CDI-yujQ6fLxYUCpOllv0wTuBTl2I365wncjGfldFk&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=AjdN1o6PmHlOEYyX
3.705 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.707 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiMG5JYV9sSXN3bGNEbFlkbWVnajBiZyIsImF1ZCI6WyI5YjgxNzNlZC00OThlLTQ2NjAtYTVjYi1iMjg1OGFhYzZkMjIiXSwiYXV0aF90aW1lIjoxNTI5NzUyMTgwLCJjX2hhc2giOiJPdnViZHMzTnc4Q1RvMDZiRlk1V1JRIiwiZXhwIjoxNTI5NzU1ODU4LCJpYXQiOjE1Mjk3NTIyNTksImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjI5N2M4OGJkLTMxMzEtNGM0ZC1hN2FiLTI0ZDYzNmVkYzVhNSIsIm5vbmNlIjoiYW9OMWFjTzhZanJNOVY1MyIsInJhdCI6MTUyOTc1MjI1NSwic3ViIjoiZm9vQGJhci5jb20ifQ.p5VeVL7k4BUj_0AsmRGXtg_J67-N07QQH0ns4nP924NXTvkRUf2nEy0G9JFkQC9HbuGLWAPlxCfAS9721RAq9Kdk_mzmBF0HlQ_TxZ7pJ1i7b_vabkTnsrSxGo_go_HrgmHJfshFwqoB5Jw08R1J9Jso2tccBIuUuTAn3YYwd_vXkyuSGpTpOgKMm-l9zEjfDOm1qI3haPqhEeZEsi5qnaSnk06tIeqZTuSFefKfpXdW0IlgQMVFHBYFw1rmwaZ87pKfwE1IgiCc9qaIYgJh1JcWDONEhJiXR4JPQbJzf9AgGK5plJNHyQQOGFPL_axx7ZbkNh1w1GxbwSmosvjrnO7M9knbkDpkdRgMUW4iuv4YXYb-47oM_EG2yUrFUGtzt46_oksni33ifrZLDy7KtPpwc7Yey6YUo6OddSBgBcV4FS1ruGtNJmFbDYdf7tLuC1NPArtRiyEht4tISsjf5Hbz4AdtCf7Duhvv0b0JPcl-o4vtQIqsK-6AmH7bUaQxBsor6HXNoAM4RDG0J2S_JkArj3qipINyce9VdAYp1RultAvrBEjp5XgABKkOPubhc09SM8_CH8yPoCGTrCHE-znQXwvg8RVD_QDkFBr1kREYi7ypVcnN-3Exv-439k46vo9Vgv_dessAfhd0vmZhtFAiBbwAd27OyC2aBWHkxag', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': '71eJ3DMGvnuMKRCK0UWjrwGOA3tPEozhhCyPeJeinZ4.Boa7mK4jFFSTqI_u-V5qnvKDBI7Lpk3dt8GYy7TnYMs', 'scope': 'openid email'}
3.787 AccessTokenResponse {
"access_token": "71eJ3DMGvnuMKRCK0UWjrwGOA3tPEozhhCyPeJeinZ4.Boa7mK4jFFSTqI_u-V5qnvKDBI7Lpk3dt8GYy7TnYMs",
"expires_in": 3599,
"id_token": {
"at_hash": "0nIa_lIswlcDlYdmegj0bg",
"aud": [
"9b8173ed-498e-4660-a5cb-b2858aac6d22"
],
"auth_time": 1529752180,
"c_hash": "Ovubds3Nw8CTo06bFY5WRQ",
"exp": 1529755858,
"iat": 1529752259,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "297c88bd-3131-4c4d-a7ab-24d636edc5a5",
"nonce": "aoN1acO8YjrM9V53",
"rat": 1529752255,
"sub": "[email protected]"
},
"scope": "openid email",
"token_type": "bearer"
}
3.787 phase <--<-- 5 --- UserInfo -->-->
3.787 do_user_info_request kwargs:{'state': 'AjdN1o6PmHlOEYyX', 'method': 'GET', 'authn_method': 'bearer_header'}
3.787 request {'body': None}
3.787 request_url https://oidc-certification.ory.sh:8443/userinfo
3.787 request_http_args {'headers': {'Authorization': 'Bearer 71eJ3DMGvnuMKRCK0UWjrwGOA3tPEozhhCyPeJeinZ4.Boa7mK4jFFSTqI_u-V5qnvKDBI7Lpk3dt8GYy7TnYMs'}}
3.858 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
3.859 OpenIDSchema {
"sub": "[email protected]"
}
3.859 OpenIDSchema {
"sub": "[email protected]"
}
3.859 phase <--<-- 6 --- Done -->-->
3.859 end
3.859 assertion CheckHTTPResponse
3.859 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
3.86 assertion VerifyResponse
3.86 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.86 assertion VerifyScopes
3.86 condition verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['email', 'email_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
3.86 condition Done: status=OK
============================================================
Conditions
Check support: status=WARNING, message=No support for: scopes_supported=['email']
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['email', 'email_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
No support for: scopes_supported=['email']
The following claims were missing from the returned information: ['email', 'email_verified'] |
Text | hydra/internal/certification/CT.F.T.T.s/OP-scope-phone.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-scope-phone
Test description: Scope requesting phone claims
Timestamp: 2018-06-23T11:11:04Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Registration -->-->
0.075 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.075 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#wrFk2ivysy3OvUOc"
],
"response_types": [
"code token"
]
}
0.233 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.234 RegistrationResponse {
"client_id": "c85a427b-7743-43e2-97ba-77f0b5ad87b5",
"client_secret": "8dgQSALrZgGQ",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "c85a427b-7743-43e2-97ba-77f0b5ad87b5",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#wrFk2ivysy3OvUOc"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.234 phase <--<-- 3 --- AsyncAuthn -->-->
0.234 condition Check support: status=WARNING, message=No support for: scopes_supported=['phone']
0.234 AuthorizationRequest {
"client_id": "c85a427b-7743-43e2-97ba-77f0b5ad87b5",
"nonce": "Y9GkrGpO3ZRyOMa8",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid phone",
"state": "M5KiwUVZ0oLxGfAn"
}
0.235 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+phone&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=c85a427b-7743-43e2-97ba-77f0b5ad87b5&state=M5KiwUVZ0oLxGfAn&response_type=code+token&nonce=Y9GkrGpO3ZRyOMa8
0.235 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+phone&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=c85a427b-7743-43e2-97ba-77f0b5ad87b5&state=M5KiwUVZ0oLxGfAn&response_type=code+token&nonce=Y9GkrGpO3ZRyOMa8
3.76 http args {}
3.925 response URL with fragment
3.925 response access_token=JZ4pLkyJ7u1BrDHUX_RZGb_CH59MpQaGoTThRVMtj1Q.PULJoWiqqWshIP0t5bFvyNTW_QOKSat1pTfxcBIXKEQ&code=uRNy08JYiORXuCasypMroiW8WatmJC-GVMrUb5FfcsY.OjquwJL_JSM3t3zYEOWj1_R7FnsBDc9ZXz9s9E13eE0&expires_in=3599&scope=openid%20phone&state=M5KiwUVZ0oLxGfAn&token_type=bearer
3.926 response {'scope': 'openid phone', 'code': 'uRNy08JYiORXuCasypMroiW8WatmJC-GVMrUb5FfcsY.OjquwJL_JSM3t3zYEOWj1_R7FnsBDc9ZXz9s9E13eE0', 'access_token': 'JZ4pLkyJ7u1BrDHUX_RZGb_CH59MpQaGoTThRVMtj1Q.PULJoWiqqWshIP0t5bFvyNTW_QOKSat1pTfxcBIXKEQ', 'state': 'M5KiwUVZ0oLxGfAn', 'expires_in': 3599, 'token_type': 'bearer'}
3.926 AuthorizationResponse {
"access_token": "JZ4pLkyJ7u1BrDHUX_RZGb_CH59MpQaGoTThRVMtj1Q.PULJoWiqqWshIP0t5bFvyNTW_QOKSat1pTfxcBIXKEQ",
"code": "uRNy08JYiORXuCasypMroiW8WatmJC-GVMrUb5FfcsY.OjquwJL_JSM3t3zYEOWj1_R7FnsBDc9ZXz9s9E13eE0",
"expires_in": 3599,
"scope": "openid phone",
"state": "M5KiwUVZ0oLxGfAn",
"token_type": "bearer"
}
3.926 phase <--<-- 4 --- AccessToken -->-->
3.926 --> request op_args: {'state': 'M5KiwUVZ0oLxGfAn'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.926 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'M5KiwUVZ0oLxGfAn', 'code': 'uRNy08JYiORXuCasypMroiW8WatmJC-GVMrUb5FfcsY.OjquwJL_JSM3t3zYEOWj1_R7FnsBDc9ZXz9s9E13eE0', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'c85a427b-7743-43e2-97ba-77f0b5ad87b5'}, 'state': 'M5KiwUVZ0oLxGfAn'}
3.927 AccessTokenRequest {
"code": "uRNy08JYiORXuCasypMroiW8WatmJC-GVMrUb5FfcsY.OjquwJL_JSM3t3zYEOWj1_R7FnsBDc9ZXz9s9E13eE0",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "M5KiwUVZ0oLxGfAn"
}
3.927 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.927 request_http_args {'headers': {'Authorization': 'Basic Yzg1YTQyN2ItNzc0My00M2UyLTk3YmEtNzdmMGI1YWQ4N2I1OjhkZ1FTQUxyWmdHUQ==', 'Content-Type': 'application/x-www-form-urlencoded'}}
3.927 request code=uRNy08JYiORXuCasypMroiW8WatmJC-GVMrUb5FfcsY.OjquwJL_JSM3t3zYEOWj1_R7FnsBDc9ZXz9s9E13eE0&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=M5KiwUVZ0oLxGfAn
4.143 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
4.144 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiTmdFSXU0RnIzNklvN1R2bGoyU2NSdyIsImF1ZCI6WyJjODVhNDI3Yi03NzQzLTQzZTItOTdiYS03N2YwYjVhZDg3YjUiXSwiYXV0aF90aW1lIjoxNTI5NzUyMTgwLCJjX2hhc2giOiJ1VjZ3MGo5S1RtTG93b2J4UzF1RDBBIiwiZXhwIjoxNTI5NzU1ODY0LCJpYXQiOjE1Mjk3NTIyNjQsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6Ijk0NDA2MzMyLThjZjktNGQwNi1hNDE3LWEwNTc5NjFiMjdjMyIsIm5vbmNlIjoiWTlHa3JHcE8zWlJ5T01hOCIsInJhdCI6MTUyOTc1MjI2MSwic3ViIjoiZm9vQGJhci5jb20ifQ.XxNNyGavlbp1oZhEsJGEUYpVUgKFZOo2I4ihJV_InYfDJE4q7l3dFV3KckGrKVruXOjWeOzNCYce4tD4otkv78wzr3N2i_VNaz17p9R84ATd5rLE09to8rQ4e40wjuEehLSx_tVFsKKFyVwhVKTGVxoCWdWblziN8mwJ2FStEjNMVhGElENyMCgEP3LHJCV_GRMcMuD9gpqZt6JX1Cw0Ht_OvKcc2ztkxq7oVsMgEIzvJrCpWpfZJZYKYKtdYwYTA35Uw2CBVXF1VsehECGzwdr_Qw5arz6ZPn6AjqIbbEZM35-wHSgZsyxhp6NpE4o8RQttH1PZ1WJIs8dgGRakvvbUWR0AYl3vEB3aAyA_ez1S6yQI1b4u7WnVxnFtDEX3VBlOJh5xqPFyK4-YdMMcDH2oKuJxunoJGtGHXG7HqMRx9_dqcCnfrd6D-Wm2M9UQYnSCs0U32eeAmCT_iCp2xxl1luEOXpBY75lSqVClk_RbC__1EaxZ29gocsfKuvecX-sHwPdoDtigNFm6j67qXlkrGPwdjxV35OyezBCyCF2K3rdzH_MTQr-9SEzJgM6-dWmKxcjz4XIzLXEY6v9AA_Pd4Q_dEK5nV_M62CqyL9Fjhgtz7PLZJcF_N5sBHPLIEi_cPwl0ed68eGOx3WjY2EU4asbpYE415RS64vZPRdw', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'iSkVeXC5xQT6Ba-U0Ah02K070-M9kPONrK9KCZp8v7U.NIhzAuggMIDOAxD89WRbxlFCbhUOu0x-9VhukFkG0II', 'scope': 'openid phone'}
4.223 AccessTokenResponse {
"access_token": "iSkVeXC5xQT6Ba-U0Ah02K070-M9kPONrK9KCZp8v7U.NIhzAuggMIDOAxD89WRbxlFCbhUOu0x-9VhukFkG0II",
"expires_in": 3599,
"id_token": {
"at_hash": "NgEIu4Fr36Io7Tvlj2ScRw",
"aud": [
"c85a427b-7743-43e2-97ba-77f0b5ad87b5"
],
"auth_time": 1529752180,
"c_hash": "uV6w0j9KTmLowobxS1uD0A",
"exp": 1529755864,
"iat": 1529752264,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "94406332-8cf9-4d06-a417-a057961b27c3",
"nonce": "Y9GkrGpO3ZRyOMa8",
"rat": 1529752261,
"sub": "[email protected]"
},
"scope": "openid phone",
"token_type": "bearer"
}
4.224 phase <--<-- 5 --- UserInfo -->-->
4.224 do_user_info_request kwargs:{'state': 'M5KiwUVZ0oLxGfAn', 'method': 'GET', 'authn_method': 'bearer_header'}
4.224 request {'body': None}
4.224 request_url https://oidc-certification.ory.sh:8443/userinfo
4.224 request_http_args {'headers': {'Authorization': 'Bearer iSkVeXC5xQT6Ba-U0Ah02K070-M9kPONrK9KCZp8v7U.NIhzAuggMIDOAxD89WRbxlFCbhUOu0x-9VhukFkG0II'}}
4.298 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
4.299 OpenIDSchema {
"sub": "[email protected]"
}
4.299 OpenIDSchema {
"sub": "[email protected]"
}
4.299 phase <--<-- 6 --- Done -->-->
4.299 end
4.299 assertion CheckHTTPResponse
4.299 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
4.3 assertion VerifyResponse
4.3 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.3 assertion VerifyScopes
4.3 condition verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['phone_number', 'phone_number_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
4.3 condition Done: status=OK
============================================================
Conditions
Check support: status=WARNING, message=No support for: scopes_supported=['phone']
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['phone_number', 'phone_number_verified'] [Verifies that the claims corresponding to the requested scopes are returned]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
No support for: scopes_supported=['phone']
The following claims were missing from the returned information: ['phone_number', 'phone_number_verified'] |
Text | hydra/internal/certification/CT.F.T.T.s/OP-scope-profile.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-scope-profile
Test description: Scope requesting profile claims
Timestamp: 2018-06-23T11:11:10Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.074 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.076 phase <--<-- 2 --- Registration -->-->
0.076 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.076 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#S7E7nBaxY8WnrXBZ"
],
"response_types": [
"code token"
]
}
0.232 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.233 RegistrationResponse {
"client_id": "22df820e-293a-47ff-8d16-3760d0089b12",
"client_secret": "2ikzpjLWcTZ2",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "22df820e-293a-47ff-8d16-3760d0089b12",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#S7E7nBaxY8WnrXBZ"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.233 phase <--<-- 3 --- AsyncAuthn -->-->
0.233 condition Check support: status=WARNING, message=No support for: scopes_supported=['profile']
0.233 AuthorizationRequest {
"client_id": "22df820e-293a-47ff-8d16-3760d0089b12",
"nonce": "VJ9D5Y0xZfSPiROl",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid profile",
"state": "x5eQEVSjrLBtEZcM"
}
0.233 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+profile&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=22df820e-293a-47ff-8d16-3760d0089b12&state=x5eQEVSjrLBtEZcM&response_type=code+token&nonce=VJ9D5Y0xZfSPiROl
0.233 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+profile&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=22df820e-293a-47ff-8d16-3760d0089b12&state=x5eQEVSjrLBtEZcM&response_type=code+token&nonce=VJ9D5Y0xZfSPiROl
3.237 http args {}
3.4 response URL with fragment
3.4 response access_token=DzqYMpL5m502shwBGZFZkHW_2VXONcsG1SPTLY4jBtA.IbAsDM6Buf1aieH-vKnx-2eUXE1-a3z-ljG3ecdQosw&code=_T3qKwUpPAagujRn41y-HJppPJQYlgxjywhkBhMB5u0.tPwD3fgOyoDOoiTSkcNwSrAMJ5UGYQDyX1ZXeXzdg2E&expires_in=3599&scope=openid%20profile&state=x5eQEVSjrLBtEZcM&token_type=bearer
3.4 response {'scope': 'openid profile', 'code': '_T3qKwUpPAagujRn41y-HJppPJQYlgxjywhkBhMB5u0.tPwD3fgOyoDOoiTSkcNwSrAMJ5UGYQDyX1ZXeXzdg2E', 'access_token': 'DzqYMpL5m502shwBGZFZkHW_2VXONcsG1SPTLY4jBtA.IbAsDM6Buf1aieH-vKnx-2eUXE1-a3z-ljG3ecdQosw', 'state': 'x5eQEVSjrLBtEZcM', 'expires_in': 3599, 'token_type': 'bearer'}
3.401 AuthorizationResponse {
"access_token": "DzqYMpL5m502shwBGZFZkHW_2VXONcsG1SPTLY4jBtA.IbAsDM6Buf1aieH-vKnx-2eUXE1-a3z-ljG3ecdQosw",
"code": "_T3qKwUpPAagujRn41y-HJppPJQYlgxjywhkBhMB5u0.tPwD3fgOyoDOoiTSkcNwSrAMJ5UGYQDyX1ZXeXzdg2E",
"expires_in": 3599,
"scope": "openid profile",
"state": "x5eQEVSjrLBtEZcM",
"token_type": "bearer"
}
3.401 phase <--<-- 4 --- AccessToken -->-->
3.401 --> request op_args: {'state': 'x5eQEVSjrLBtEZcM'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.401 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'x5eQEVSjrLBtEZcM', 'code': '_T3qKwUpPAagujRn41y-HJppPJQYlgxjywhkBhMB5u0.tPwD3fgOyoDOoiTSkcNwSrAMJ5UGYQDyX1ZXeXzdg2E', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '22df820e-293a-47ff-8d16-3760d0089b12'}, 'state': 'x5eQEVSjrLBtEZcM'}
3.401 AccessTokenRequest {
"code": "_T3qKwUpPAagujRn41y-HJppPJQYlgxjywhkBhMB5u0.tPwD3fgOyoDOoiTSkcNwSrAMJ5UGYQDyX1ZXeXzdg2E",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "x5eQEVSjrLBtEZcM"
}
3.401 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.401 request_http_args {'headers': {'Authorization': 'Basic MjJkZjgyMGUtMjkzYS00N2ZmLThkMTYtMzc2MGQwMDg5YjEyOjJpa3pwakxXY1RaMg==', 'Content-Type': 'application/x-www-form-urlencoded'}}
3.401 request code=_T3qKwUpPAagujRn41y-HJppPJQYlgxjywhkBhMB5u0.tPwD3fgOyoDOoiTSkcNwSrAMJ5UGYQDyX1ZXeXzdg2E&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=x5eQEVSjrLBtEZcM
3.637 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.638 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiUG50NmNtdndWdGFpMVVQQzhkbzFldyIsImF1ZCI6WyIyMmRmODIwZS0yOTNhLTQ3ZmYtOGQxNi0zNzYwZDAwODliMTIiXSwiYXV0aF90aW1lIjoxNTI5NzUyMTgwLCJjX2hhc2giOiI0c21wdkpUQUdiNG8tY2VodWxiZ0NRIiwiZXhwIjoxNTI5NzU1ODY5LCJpYXQiOjE1Mjk3NTIyNjksImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjIxNjQyOWRjLTE2MmUtNGRmYi05NzFmLTlhOWUwNTVmZGU1NSIsIm5vbmNlIjoiVko5RDVZMHhaZlNQaVJPbCIsInJhdCI6MTUyOTc1MjI2Niwic3ViIjoiZm9vQGJhci5jb20ifQ.W3mhqr6uQQ4u0Tn82k7YZzmsnXtVCFuksGt2WEJ-JL27N-2twLXMIEY39N9Y_XoXqjeO7pf9X4-81Lp8G1hfNAvbuCDv2RoNgpIxUWh4Ke7Wk9YJU6PPPPa_zJ8O_eaqls7TzH_vLhYqWkDAst4piVZ7ObnBzMxSAXOGUwLbQTF1RfMSpzUNBkUFzsrZfkKbZlvZMT0jFZb5w6aPp50dqcMsGcDfAiVTCLdsxVYGUvOfP0yfdc389sgbGgetnohoflev6K8-UzYTQKWmN1PThVif6UwKvheXeUqorGHEWGVdfM-yoCwY_2m_VDmy1IBdVDbqOmjvinVregkXPviGJS6ZJNtA62c7CsuoLhYp3j4RvibeAsAwkvi_I55YRdEsd3xsrrC7HbJ2YhY4I6qXky3_q-0poU51f5Ur7BIIyeN0LrEHgh-QtclmkeGEUPBThzvtRrFeGiQtnwldWec33bcaiJF1P6RozRmyvWBAGH7vsJ-0y5LtHpxKbuXoi8Ghb39rHIbyt3iztuDYNQh6fARmkx4Obzqa6wUGiuQbCCO-zWEGFw-Ur__LgkpvhnqJ8kUSKcm34EdxBJ5By4hIZTIU1CnFiDlbz7NWiivS1mjFll20TbBlC-kpkLlIJ9qTKl1AC-9b1w3_EFkohx7tKtvr7vF0loDIfpLJ5IY4bRE', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': '5PSc1dOewdOiIRlf_Rgu9LEssMT-UDA_htBwBou8CAc.5Vv9Y2mLINmrLwv4b4dt8ZxUzEi7wMpGDorLEGtpQ34', 'scope': 'openid profile'}
3.719 AccessTokenResponse {
"access_token": "5PSc1dOewdOiIRlf_Rgu9LEssMT-UDA_htBwBou8CAc.5Vv9Y2mLINmrLwv4b4dt8ZxUzEi7wMpGDorLEGtpQ34",
"expires_in": 3599,
"id_token": {
"at_hash": "Pnt6cmvwVtai1UPC8do1ew",
"aud": [
"22df820e-293a-47ff-8d16-3760d0089b12"
],
"auth_time": 1529752180,
"c_hash": "4smpvJTAGb4o-cehulbgCQ",
"exp": 1529755869,
"iat": 1529752269,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "216429dc-162e-4dfb-971f-9a9e055fde55",
"nonce": "VJ9D5Y0xZfSPiROl",
"rat": 1529752266,
"sub": "[email protected]"
},
"scope": "openid profile",
"token_type": "bearer"
}
3.719 phase <--<-- 5 --- UserInfo -->-->
3.72 do_user_info_request kwargs:{'state': 'x5eQEVSjrLBtEZcM', 'method': 'GET', 'authn_method': 'bearer_header'}
3.72 request {'body': None}
3.72 request_url https://oidc-certification.ory.sh:8443/userinfo
3.72 request_http_args {'headers': {'Authorization': 'Bearer 5PSc1dOewdOiIRlf_Rgu9LEssMT-UDA_htBwBou8CAc.5Vv9Y2mLINmrLwv4b4dt8ZxUzEi7wMpGDorLEGtpQ34'}}
3.8 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
3.801 OpenIDSchema {
"sub": "[email protected]"
}
3.801 OpenIDSchema {
"sub": "[email protected]"
}
3.801 phase <--<-- 6 --- Done -->-->
3.801 end
3.801 assertion CheckHTTPResponse
3.802 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
3.802 assertion VerifyResponse
3.802 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.802 assertion VerifyScopes
3.803 condition verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username'] [Verifies that the claims corresponding to the requested scopes are returned]
3.803 condition Done: status=OK
============================================================
Conditions
Check support: status=WARNING, message=No support for: scopes_supported=['profile']
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username'] [Verifies that the claims corresponding to the requested scopes are returned]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
No support for: scopes_supported=['profile']
The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username'] |
Text | hydra/internal/certification/CT.F.T.T.s/OP-UserInfo-Body.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-UserInfo-Body
Test description: UserInfo Endpoint access with POST and bearer body
Timestamp: 2018-06-23T11:08:04Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.08 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.081 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.082 phase <--<-- 2 --- Registration -->-->
0.082 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.082 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#UXgcwJIXPzKovtYO"
],
"response_types": [
"code token"
]
}
0.24 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.241 RegistrationResponse {
"client_id": "a5810084-2bd0-4044-bade-1bc5177c2bce",
"client_secret": "oAvqAqc5SURS",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "a5810084-2bd0-4044-bade-1bc5177c2bce",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#UXgcwJIXPzKovtYO"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.241 phase <--<-- 3 --- AsyncAuthn -->-->
0.241 AuthorizationRequest {
"client_id": "a5810084-2bd0-4044-bade-1bc5177c2bce",
"nonce": "oIbU1D0miFZcscuz",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "jr0Dj6EjOUUh7R1K"
}
0.242 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=a5810084-2bd0-4044-bade-1bc5177c2bce&state=jr0Dj6EjOUUh7R1K&response_type=code+token&nonce=oIbU1D0miFZcscuz
0.242 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=a5810084-2bd0-4044-bade-1bc5177c2bce&state=jr0Dj6EjOUUh7R1K&response_type=code+token&nonce=oIbU1D0miFZcscuz
38.682 http args {}
38.849 response URL with fragment
38.849 response access_token=VmH95yKDqRuqyG6SImNL3A__MtZySNtOx-Ol86pe6uc.TtXQBJVP7PQZ_r5atej3xOtThdzBF8QRiI9sr_JmnDY&code=L3bRpyVG0Uq4fJlkA0ccsKsxpItnBP4BxEPJDNCFUlI.gfncyMYYkdzdDTFwXB-zFiaAMqpcOvkpLaeXvK_glKg&expires_in=3599&scope=openid&state=jr0Dj6EjOUUh7R1K&token_type=bearer
38.85 response {'scope': 'openid', 'code': 'L3bRpyVG0Uq4fJlkA0ccsKsxpItnBP4BxEPJDNCFUlI.gfncyMYYkdzdDTFwXB-zFiaAMqpcOvkpLaeXvK_glKg', 'access_token': 'VmH95yKDqRuqyG6SImNL3A__MtZySNtOx-Ol86pe6uc.TtXQBJVP7PQZ_r5atej3xOtThdzBF8QRiI9sr_JmnDY', 'state': 'jr0Dj6EjOUUh7R1K', 'expires_in': 3599, 'token_type': 'bearer'}
38.85 AuthorizationResponse {
"access_token": "VmH95yKDqRuqyG6SImNL3A__MtZySNtOx-Ol86pe6uc.TtXQBJVP7PQZ_r5atej3xOtThdzBF8QRiI9sr_JmnDY",
"code": "L3bRpyVG0Uq4fJlkA0ccsKsxpItnBP4BxEPJDNCFUlI.gfncyMYYkdzdDTFwXB-zFiaAMqpcOvkpLaeXvK_glKg",
"expires_in": 3599,
"scope": "openid",
"state": "jr0Dj6EjOUUh7R1K",
"token_type": "bearer"
}
38.85 phase <--<-- 4 --- AccessToken -->-->
38.851 --> request op_args: {'state': 'jr0Dj6EjOUUh7R1K'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
38.851 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'jr0Dj6EjOUUh7R1K', 'code': 'L3bRpyVG0Uq4fJlkA0ccsKsxpItnBP4BxEPJDNCFUlI.gfncyMYYkdzdDTFwXB-zFiaAMqpcOvkpLaeXvK_glKg', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': 'a5810084-2bd0-4044-bade-1bc5177c2bce'}, 'state': 'jr0Dj6EjOUUh7R1K'}
38.851 AccessTokenRequest {
"code": "L3bRpyVG0Uq4fJlkA0ccsKsxpItnBP4BxEPJDNCFUlI.gfncyMYYkdzdDTFwXB-zFiaAMqpcOvkpLaeXvK_glKg",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "jr0Dj6EjOUUh7R1K"
}
38.851 request_url https://oidc-certification.ory.sh:8443/oauth2/token
38.851 request_http_args {'headers': {'Authorization': 'Basic YTU4MTAwODQtMmJkMC00MDQ0LWJhZGUtMWJjNTE3N2MyYmNlOm9BdnFBcWM1U1VSUw==', 'Content-Type': 'application/x-www-form-urlencoded'}}
38.851 request code=L3bRpyVG0Uq4fJlkA0ccsKsxpItnBP4BxEPJDNCFUlI.gfncyMYYkdzdDTFwXB-zFiaAMqpcOvkpLaeXvK_glKg&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=jr0Dj6EjOUUh7R1K
39.089 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
39.09 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiQ29LMmlFU2pxSl9rVF9UbnNWMmdOQSIsImF1ZCI6WyJhNTgxMDA4NC0yYmQwLTQwNDQtYmFkZS0xYmM1MTc3YzJiY2UiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiI2REhJS2FvZnFKNVlZcTVKeW8zRG93IiwiZXhwIjoxNTI5NzU1NjgzLCJpYXQiOjE1Mjk3NTIwODMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjY2ODg5YjYzLTJmYTktNDRmNi1hZTNhLWNjZWU4M2FlZDM0OCIsIm5vbmNlIjoib0liVTFEMG1pRlpjc2N1eiIsInJhdCI6MTUyOTc1MjA0NSwic3ViIjoiZm9vQGJhci5jb20ifQ.We2h2dt083Em1i_H3luywV2Q-VN1g9HYpI6pUkq9yImGb0mScSSwN_diXF1I8v1W5Ros1YhhJj6BK3JMd_ddS_AA7ZHy2so69TxEG9-2y3rJdWzJD7G9ghDfPImL0zGposDT8CQincNT0jKOsUXJArvBkUzQdVCtbDQ2limSefrNuLxn6ybU8_XTxX7kZbs8lMdo1a3Pi31SkX7qWaHR_mc6tkpfDyjP3Hs0GnnBkQKFRdr3yqtYTByxlhc6hd9xpKBnaTyGuAfuOmopPZ3ACx4gcwwq0U_lygiLvPAQOS2bzgYGJHDsPZ7K6mVHOlUpLxmh9wQHPn2J3V58TOD0zrPKm9Ax63TJp9tWgUKpvxLczLeEgTPjYqVd1YrcA-HIbZ-6H3FGXP-rXGOZblqI-6xJhyQpAGIzTBEHS-McgBYADyIlrCrnVhllqTiUCX862Td5s5e5iJn0S1l3azLFXDa_ZiJMoQxiUH-ZUxSFGRZ6pOUWp51KhbWRau082nS9184RAw1t9YdoWEUqFHnho18sQFAIxKAcl7awaemcR4a9HUaPD-2S5KfQ0AyKHz12gk0m55AKhX65YAvQI5dj_EdHRxlVtE8uuZLU46y9WE40i0zkGhhod5LMHbRetPGejICqBUhUmLBWqXPg9f8qpMNM0jxFyHbs4SwJd3woGtc', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'yqPT4I2FpstAtR1FBKilfh-6ypi_6ehIGI1DAz_eZ_A.WIHJvZv8Saw839DOlCCQAaUFyz2hS6EzUG2gQ_2va04', 'scope': 'openid'}
39.204 AccessTokenResponse {
"access_token": "yqPT4I2FpstAtR1FBKilfh-6ypi_6ehIGI1DAz_eZ_A.WIHJvZv8Saw839DOlCCQAaUFyz2hS6EzUG2gQ_2va04",
"expires_in": 3599,
"id_token": {
"at_hash": "CoK2iESjqJ_kT_TnsV2gNA",
"aud": [
"a5810084-2bd0-4044-bade-1bc5177c2bce"
],
"auth_time": 1529751824,
"c_hash": "6DHIKaofqJ5YYq5Jyo3Dow",
"exp": 1529755683,
"iat": 1529752083,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "66889b63-2fa9-44f6-ae3a-ccee83aed348",
"nonce": "oIbU1D0miFZcscuz",
"rat": 1529752045,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
39.204 phase <--<-- 5 --- UserInfo -->-->
39.204 do_user_info_request kwargs:{'state': 'jr0Dj6EjOUUh7R1K', 'method': 'POST', 'authn_method': 'token_in_message_body'}
39.204 request {'body': 'access_token=yqPT4I2FpstAtR1FBKilfh-6ypi_6ehIGI1DAz_eZ_A.WIHJvZv8Saw839DOlCCQAaUFyz2hS6EzUG2gQ_2va04'}
39.204 request_url https://oidc-certification.ory.sh:8443/userinfo
39.204 request_http_args {'headers': {'Content-Type': 'application/x-www-form-urlencoded'}}
39.313 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
39.314 OpenIDSchema {
"sub": "[email protected]"
}
39.314 OpenIDSchema {
"sub": "[email protected]"
}
39.314 phase <--<-- 6 --- Done -->-->
39.314 end
39.315 assertion VerifyResponse
39.315 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
39.315 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-UserInfo-Endpoint.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-UserInfo-Endpoint
Test description: UserInfo Endpoint access with GET and bearer header
Timestamp: 2018-06-23T11:08:22Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.001 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.072 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Registration -->-->
0.074 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.074 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#od6lD4Nmrk9NA8kF"
],
"response_types": [
"code token"
]
}
0.236 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.237 RegistrationResponse {
"client_id": "7f30c015-dd3c-4d1d-aef2-c5aa326774bc",
"client_secret": "_MmS~MUZKAsx",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "7f30c015-dd3c-4d1d-aef2-c5aa326774bc",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#od6lD4Nmrk9NA8kF"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.237 phase <--<-- 3 --- AsyncAuthn -->-->
0.238 AuthorizationRequest {
"client_id": "7f30c015-dd3c-4d1d-aef2-c5aa326774bc",
"nonce": "pYgmVPqw8hx7T5sE",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "iozT608I9ClYnIFy"
}
0.238 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=7f30c015-dd3c-4d1d-aef2-c5aa326774bc&state=iozT608I9ClYnIFy&response_type=code+token&nonce=pYgmVPqw8hx7T5sE
0.238 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=7f30c015-dd3c-4d1d-aef2-c5aa326774bc&state=iozT608I9ClYnIFy&response_type=code+token&nonce=pYgmVPqw8hx7T5sE
16.637 http args {}
16.821 response URL with fragment
16.822 response access_token=NjYrjNrD02y_S8_zm2JTvC47gWocx9OzBJ192HxKkaA.9cy7fuwUnUJTCkSeOg49HjQhUB_lIHDJWJ9QGDWB39E&code=jM9YojMf7VYjmpyWbQvE6j60isgbZ8v8BXkGAvEjhv0.xt4VAB4QQtOKhMdvvX1mNbvXOUMkp15pjC3uSPX9ZB8&expires_in=3599&scope=openid&state=iozT608I9ClYnIFy&token_type=bearer
16.822 response {'scope': 'openid', 'code': 'jM9YojMf7VYjmpyWbQvE6j60isgbZ8v8BXkGAvEjhv0.xt4VAB4QQtOKhMdvvX1mNbvXOUMkp15pjC3uSPX9ZB8', 'access_token': 'NjYrjNrD02y_S8_zm2JTvC47gWocx9OzBJ192HxKkaA.9cy7fuwUnUJTCkSeOg49HjQhUB_lIHDJWJ9QGDWB39E', 'state': 'iozT608I9ClYnIFy', 'expires_in': 3599, 'token_type': 'bearer'}
16.822 AuthorizationResponse {
"access_token": "NjYrjNrD02y_S8_zm2JTvC47gWocx9OzBJ192HxKkaA.9cy7fuwUnUJTCkSeOg49HjQhUB_lIHDJWJ9QGDWB39E",
"code": "jM9YojMf7VYjmpyWbQvE6j60isgbZ8v8BXkGAvEjhv0.xt4VAB4QQtOKhMdvvX1mNbvXOUMkp15pjC3uSPX9ZB8",
"expires_in": 3599,
"scope": "openid",
"state": "iozT608I9ClYnIFy",
"token_type": "bearer"
}
16.823 phase <--<-- 4 --- AccessToken -->-->
16.823 --> request op_args: {'state': 'iozT608I9ClYnIFy'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
16.823 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'iozT608I9ClYnIFy', 'code': 'jM9YojMf7VYjmpyWbQvE6j60isgbZ8v8BXkGAvEjhv0.xt4VAB4QQtOKhMdvvX1mNbvXOUMkp15pjC3uSPX9ZB8', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '7f30c015-dd3c-4d1d-aef2-c5aa326774bc'}, 'state': 'iozT608I9ClYnIFy'}
16.823 AccessTokenRequest {
"code": "jM9YojMf7VYjmpyWbQvE6j60isgbZ8v8BXkGAvEjhv0.xt4VAB4QQtOKhMdvvX1mNbvXOUMkp15pjC3uSPX9ZB8",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "iozT608I9ClYnIFy"
}
16.823 request_url https://oidc-certification.ory.sh:8443/oauth2/token
16.823 request_http_args {'headers': {'Authorization': 'Basic N2YzMGMwMTUtZGQzYy00ZDFkLWFlZjItYzVhYTMyNjc3NGJjOl9NbVMlN0VNVVpLQXN4', 'Content-Type': 'application/x-www-form-urlencoded'}}
16.823 request code=jM9YojMf7VYjmpyWbQvE6j60isgbZ8v8BXkGAvEjhv0.xt4VAB4QQtOKhMdvvX1mNbvXOUMkp15pjC3uSPX9ZB8&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=iozT608I9ClYnIFy
17.055 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
17.056 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiMU1saXpKNWRGTWtpMUFYYkRtbnBOUSIsImF1ZCI6WyI3ZjMwYzAxNS1kZDNjLTRkMWQtYWVmMi1jNWFhMzI2Nzc0YmMiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiJ0VXp4ck1EdzBFMlh5eERqa0NnNGJBIiwiZXhwIjoxNTI5NzU1NzAxLCJpYXQiOjE1Mjk3NTIxMDIsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjQ5YTYwMzdlLTIyMTAtNGYxZS1hMWRiLTIwZDIxOWQwYTk4YyIsIm5vbmNlIjoicFlnbVZQcXc4aHg3VDVzRSIsInJhdCI6MTUyOTc1MjA4NSwic3ViIjoiZm9vQGJhci5jb20ifQ.F2mylAksfo7Z444TIha2MpAagLXR0i0nRYAGxoqxQoCjkrDL84c2MsGuuoMNwA9-pArsVRxtEGTNkdQVmxXDf0bNJNCr7wV9GetYR02lJN899wrBWzJK7Ug61V8G7yMkJpWf-PG-5aKLKCbNoEYQxJBHoBRdIl4xe2-LqTJYNgg5ZeFe9v7RdqJ54rfiovdRsySviFkY1sG9IF6L_YeHNq0liwBgOvfcdFSGjHBEt8skLJPhSVnO-RT1nhlx3TElq4VUzeh86K2kut-2LMM1L5zV9HjW5TV0g1ZfAWRfyc5QGgrIXI4gHAVltSDkQblafBir2RCDT-Vms4M60bb9gC-QT4fvIytir8QIWkfRjsxkQTluKuoNxZRXjD366mtPWN9p-TqRVydMw1Y2kVUXbE1pGuta7IubZ9aYyuEedSZ7L3BCQtosZnBdSuWJLTFyxAG1iY7mIsLUEMf3SYErBVBPT8CarrPwqaoxZg4pP6Lu8gowlgRy_AUOgpl6spmxja4bPz7kP0QNP_a0aeYJKSAG78KUZEx0AOgDv5Z4036CcuWmSTberk6xZuXSB8AA8cAj9J9mpP_sAh05WF25e-H7uDEpJFwUOdOBFHWc7aasE7CXJ8UddfREj2aGsOnJTo-ulaSCgUbO9eMP5EnuY56gvmX_qht5QMsNN5j9lRw', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'YWIoU6LUh1G6XM41rgEYWKEcTPUfUhga28w9SLwf9hk.3La9YDd83S2x-ZI9-GYdsbhsDH16xCgxm7OCgwDfBgo', 'scope': 'openid'}
17.172 AccessTokenResponse {
"access_token": "YWIoU6LUh1G6XM41rgEYWKEcTPUfUhga28w9SLwf9hk.3La9YDd83S2x-ZI9-GYdsbhsDH16xCgxm7OCgwDfBgo",
"expires_in": 3599,
"id_token": {
"at_hash": "1MlizJ5dFMki1AXbDmnpNQ",
"aud": [
"7f30c015-dd3c-4d1d-aef2-c5aa326774bc"
],
"auth_time": 1529751824,
"c_hash": "tUzxrMDw0E2XyxDjkCg4bA",
"exp": 1529755701,
"iat": 1529752102,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "49a6037e-2210-4f1e-a1db-20d219d0a98c",
"nonce": "pYgmVPqw8hx7T5sE",
"rat": 1529752085,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
17.172 phase <--<-- 5 --- UserInfo -->-->
17.172 do_user_info_request kwargs:{'state': 'iozT608I9ClYnIFy', 'method': 'GET', 'authn_method': 'bearer_header'}
17.173 request {'body': None}
17.173 request_url https://oidc-certification.ory.sh:8443/userinfo
17.173 request_http_args {'headers': {'Authorization': 'Bearer YWIoU6LUh1G6XM41rgEYWKEcTPUfUhga28w9SLwf9hk.3La9YDd83S2x-ZI9-GYdsbhsDH16xCgxm7OCgwDfBgo'}}
17.257 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
17.258 OpenIDSchema {
"sub": "[email protected]"
}
17.258 OpenIDSchema {
"sub": "[email protected]"
}
17.258 phase <--<-- 6 --- Done -->-->
17.258 end
17.259 assertion VerifyResponse
17.259 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
17.259 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-UserInfo-Header.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-UserInfo-Header
Test description: UserInfo Endpoint access with POST and bearer header
Timestamp: 2018-06-23T11:08:27Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.076 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.077 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.077 phase <--<-- 2 --- Registration -->-->
0.077 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.078 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#rTWyARLTe5tp5l4M"
],
"response_types": [
"code token"
]
}
0.266 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.267 RegistrationResponse {
"client_id": "25254ff4-82c7-4afe-9ec0-6a3761e088cb",
"client_secret": "hxW-O.xp8zX0",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "25254ff4-82c7-4afe-9ec0-6a3761e088cb",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#rTWyARLTe5tp5l4M"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.267 phase <--<-- 3 --- AsyncAuthn -->-->
0.268 AuthorizationRequest {
"client_id": "25254ff4-82c7-4afe-9ec0-6a3761e088cb",
"nonce": "4LIs8YstAq2hJ4Oa",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "qMUX1EuDzDzwkkIp"
}
0.268 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=25254ff4-82c7-4afe-9ec0-6a3761e088cb&state=qMUX1EuDzDzwkkIp&response_type=code+token&nonce=4LIs8YstAq2hJ4Oa
0.268 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=25254ff4-82c7-4afe-9ec0-6a3761e088cb&state=qMUX1EuDzDzwkkIp&response_type=code+token&nonce=4LIs8YstAq2hJ4Oa
2.727 http args {}
2.893 response URL with fragment
2.893 response access_token=sOGMff3DpmeNWVZ_d7t4b2mSGjVoVHOrh0Xgg-bYjgk.4EVNzj-AQxFpgFmFVJoamvD-CCFPORFgb6kydlP4fk4&code=hpvNG1dKG5hgXBe0CDHYDDfwG6CeCz8jyeaGRxmIuFA.2y_So9KdsRrWWolnbwkvTgKuox3N5lVcjnXsgqMbSW0&expires_in=3599&scope=openid&state=qMUX1EuDzDzwkkIp&token_type=bearer
2.894 response {'scope': 'openid', 'code': 'hpvNG1dKG5hgXBe0CDHYDDfwG6CeCz8jyeaGRxmIuFA.2y_So9KdsRrWWolnbwkvTgKuox3N5lVcjnXsgqMbSW0', 'access_token': 'sOGMff3DpmeNWVZ_d7t4b2mSGjVoVHOrh0Xgg-bYjgk.4EVNzj-AQxFpgFmFVJoamvD-CCFPORFgb6kydlP4fk4', 'state': 'qMUX1EuDzDzwkkIp', 'expires_in': 3599, 'token_type': 'bearer'}
2.894 AuthorizationResponse {
"access_token": "sOGMff3DpmeNWVZ_d7t4b2mSGjVoVHOrh0Xgg-bYjgk.4EVNzj-AQxFpgFmFVJoamvD-CCFPORFgb6kydlP4fk4",
"code": "hpvNG1dKG5hgXBe0CDHYDDfwG6CeCz8jyeaGRxmIuFA.2y_So9KdsRrWWolnbwkvTgKuox3N5lVcjnXsgqMbSW0",
"expires_in": 3599,
"scope": "openid",
"state": "qMUX1EuDzDzwkkIp",
"token_type": "bearer"
}
2.894 phase <--<-- 4 --- AccessToken -->-->
2.894 --> request op_args: {'state': 'qMUX1EuDzDzwkkIp'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.894 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'qMUX1EuDzDzwkkIp', 'code': 'hpvNG1dKG5hgXBe0CDHYDDfwG6CeCz8jyeaGRxmIuFA.2y_So9KdsRrWWolnbwkvTgKuox3N5lVcjnXsgqMbSW0', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '25254ff4-82c7-4afe-9ec0-6a3761e088cb'}, 'state': 'qMUX1EuDzDzwkkIp'}
2.894 AccessTokenRequest {
"code": "hpvNG1dKG5hgXBe0CDHYDDfwG6CeCz8jyeaGRxmIuFA.2y_So9KdsRrWWolnbwkvTgKuox3N5lVcjnXsgqMbSW0",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "qMUX1EuDzDzwkkIp"
}
2.894 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.894 request_http_args {'headers': {'Authorization': 'Basic MjUyNTRmZjQtODJjNy00YWZlLTllYzAtNmEzNzYxZTA4OGNiOmh4Vy1PLnhwOHpYMA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.894 request code=hpvNG1dKG5hgXBe0CDHYDDfwG6CeCz8jyeaGRxmIuFA.2y_So9KdsRrWWolnbwkvTgKuox3N5lVcjnXsgqMbSW0&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=qMUX1EuDzDzwkkIp
3.145 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.147 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiX1lVN0VPX2ZmUGk5Qi1tcWY1ekZlQSIsImF1ZCI6WyIyNTI1NGZmNC04MmM3LTRhZmUtOWVjMC02YTM3NjFlMDg4Y2IiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiJsUEZMdUxXWFZ3Y3AtbWhZZ3BBUUtnIiwiZXhwIjoxNTI5NzU1NzA2LCJpYXQiOjE1Mjk3NTIxMDcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjY5MjIzMWQ3LTIzYjUtNDA2Ny04ODA1LTM3M2QxNmNlZmM5OSIsIm5vbmNlIjoiNExJczhZc3RBcTJoSjRPYSIsInJhdCI6MTUyOTc1MjEwNCwic3ViIjoiZm9vQGJhci5jb20ifQ.jPy39kjJDOFEZSEMrzL8Hu6IywfxQHcWf5j6pZmTnyPanYNG_vRo99ONe6w606GXUFswQnCpKFtBnYlNj3V3j_jKhW4zf9ITx1AdyF-IPHfT63jS7f59hbD1ePh5lXQx7vqJiYfKKzg7UplHp4DQmKyvSu8Lu4P7q3GMW2X3AXweBZ-7c1ShTupTrAvRApW0i3hG63tVL8ZHxqBwlHT-Y_jz31S64co3gWOzb_HD870X3W0j5MwMl0l1igU9z7CUD_mF4hGQQKo0tu1NHPXF55UvxhruBz3Y9IMj9vtfKEUPoYl7FlymXEbbqv2H4jBrUsMbExFOO8IjWOHyuKc82XtfvnWy_jzapICI0Mu2bKe8dAGMuyGzlAruVLoHootMFdtx_rLcMB9YWmkFBrfn6vMjTeLRl0j41lwUBDdaHVFrGIGpwdAaA2syb3cqSWCmce4oDa-VGlt1x5idA65QlQXq1JyZQY7hrMwBAfTdwaWe88JV-4HkGrldmhY8KkuKwmOnHWDdf5sC5E-lTZtOHzgLrIvnHR1FSnkMkovDiB-tDiwOMuYAWtKsRqBXI5FYh5S4R0TWEa5HNPec42Jg8p2TTKWtJrXOYitkHm7bxDkiIbaCI162NUIWrcpvx17ZDxNk0WO5IphqjA5xOgyYKUgjjBaahC-D1JXtd9Dt_aM', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'OOAmbH8bfsV_2UYHMV5F79ThrUexsV1_53ILW8CNN2E.ao-eyJxzyz2yNPcnJfRX9uiB9NrOMcsvHi_TcqOoI9U', 'scope': 'openid'}
3.262 AccessTokenResponse {
"access_token": "OOAmbH8bfsV_2UYHMV5F79ThrUexsV1_53ILW8CNN2E.ao-eyJxzyz2yNPcnJfRX9uiB9NrOMcsvHi_TcqOoI9U",
"expires_in": 3599,
"id_token": {
"at_hash": "_YU7EO_ffPi9B-mqf5zFeA",
"aud": [
"25254ff4-82c7-4afe-9ec0-6a3761e088cb"
],
"auth_time": 1529751824,
"c_hash": "lPFLuLWXVwcp-mhYgpAQKg",
"exp": 1529755706,
"iat": 1529752107,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "692231d7-23b5-4067-8805-373d16cefc99",
"nonce": "4LIs8YstAq2hJ4Oa",
"rat": 1529752104,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.262 phase <--<-- 5 --- UserInfo -->-->
3.262 do_user_info_request kwargs:{'state': 'qMUX1EuDzDzwkkIp', 'method': 'POST', 'behavior': 'use_authorization_header'}
3.262 request {'body': ''}
3.262 request_url https://oidc-certification.ory.sh:8443/userinfo
3.262 request_http_args {'headers': {'Authorization': 'Bearer OOAmbH8bfsV_2UYHMV5F79ThrUexsV1_53ILW8CNN2E.ao-eyJxzyz2yNPcnJfRX9uiB9NrOMcsvHi_TcqOoI9U', 'Content-Type': 'application/x-www-form-urlencoded'}}
3.346 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
3.347 OpenIDSchema {
"sub": "[email protected]"
}
3.347 OpenIDSchema {
"sub": "[email protected]"
}
3.347 phase <--<-- 6 --- Done -->-->
3.347 end
3.347 assertion VerifyResponse
3.347 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.347 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/CT.F.T.T.s/OP-UserInfo-RS256.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-UserInfo-RS256
Test description: RP registers userinfo_signed_response_alg to signal that it wants signed UserInfo returned
Timestamp: 2018-06-23T11:08:32Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.106 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.108 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.108 phase <--<-- 2 --- Registration -->-->
0.108 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'userinfo_signed_response_alg': 'RS256'}
0.108 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#rTtI7IgFbvw3XQ6r"
],
"response_types": [
"code token"
],
"userinfo_signed_response_alg": "RS256"
}
0.268 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.269 RegistrationResponse {
"client_id": "17f03a0d-90b0-4a4e-9040-1b076d98881e",
"client_secret": "g5-M~A9FBzkU",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "17f03a0d-90b0-4a4e-9040-1b076d98881e",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#rTtI7IgFbvw3XQ6r"
],
"response_types": [
"code token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "RS256"
}
0.269 phase <--<-- 3 --- AsyncAuthn -->-->
0.27 AuthorizationRequest {
"client_id": "17f03a0d-90b0-4a4e-9040-1b076d98881e",
"nonce": "4KG6LnQZNCHfEaA7",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code token",
"scope": "openid",
"state": "UQsYq7sjYQcSmfnj"
}
0.27 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=17f03a0d-90b0-4a4e-9040-1b076d98881e&state=UQsYq7sjYQcSmfnj&response_type=code+token&nonce=4KG6LnQZNCHfEaA7
0.27 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=17f03a0d-90b0-4a4e-9040-1b076d98881e&state=UQsYq7sjYQcSmfnj&response_type=code+token&nonce=4KG6LnQZNCHfEaA7
2.925 http args {}
3.138 response URL with fragment
3.139 response access_token=VD0pbbAcV2zqbr27nLQ0XzkI8sqRTRAJatA1UyMUFN0.Q5erxRWxh9FV_d4nYc8rQaRcEEacwXcS26QRDBRpPlM&code=wwgFB6YD5pPyVVcKlA0Re9GG4BqV77qqlNtU8JbyoUs.DKO4xcJ6eKEM9FTVPs5B3Fn0QcRHOkUCg5yRWPmHRs0&expires_in=3599&scope=openid&state=UQsYq7sjYQcSmfnj&token_type=bearer
3.139 response {'scope': 'openid', 'code': 'wwgFB6YD5pPyVVcKlA0Re9GG4BqV77qqlNtU8JbyoUs.DKO4xcJ6eKEM9FTVPs5B3Fn0QcRHOkUCg5yRWPmHRs0', 'access_token': 'VD0pbbAcV2zqbr27nLQ0XzkI8sqRTRAJatA1UyMUFN0.Q5erxRWxh9FV_d4nYc8rQaRcEEacwXcS26QRDBRpPlM', 'state': 'UQsYq7sjYQcSmfnj', 'expires_in': 3599, 'token_type': 'bearer'}
3.139 AuthorizationResponse {
"access_token": "VD0pbbAcV2zqbr27nLQ0XzkI8sqRTRAJatA1UyMUFN0.Q5erxRWxh9FV_d4nYc8rQaRcEEacwXcS26QRDBRpPlM",
"code": "wwgFB6YD5pPyVVcKlA0Re9GG4BqV77qqlNtU8JbyoUs.DKO4xcJ6eKEM9FTVPs5B3Fn0QcRHOkUCg5yRWPmHRs0",
"expires_in": 3599,
"scope": "openid",
"state": "UQsYq7sjYQcSmfnj",
"token_type": "bearer"
}
3.139 phase <--<-- 4 --- AccessToken -->-->
3.14 --> request op_args: {'state': 'UQsYq7sjYQcSmfnj'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.14 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'UQsYq7sjYQcSmfnj', 'code': 'wwgFB6YD5pPyVVcKlA0Re9GG4BqV77qqlNtU8JbyoUs.DKO4xcJ6eKEM9FTVPs5B3Fn0QcRHOkUCg5yRWPmHRs0', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '17f03a0d-90b0-4a4e-9040-1b076d98881e'}, 'state': 'UQsYq7sjYQcSmfnj'}
3.14 AccessTokenRequest {
"code": "wwgFB6YD5pPyVVcKlA0Re9GG4BqV77qqlNtU8JbyoUs.DKO4xcJ6eKEM9FTVPs5B3Fn0QcRHOkUCg5yRWPmHRs0",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "UQsYq7sjYQcSmfnj"
}
3.14 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.14 request_http_args {'headers': {'Authorization': 'Basic MTdmMDNhMGQtOTBiMC00YTRlLTkwNDAtMWIwNzZkOTg4ODFlOmc1LU0lN0VBOUZCemtV', 'Content-Type': 'application/x-www-form-urlencoded'}}
3.14 request code=wwgFB6YD5pPyVVcKlA0Re9GG4BqV77qqlNtU8JbyoUs.DKO4xcJ6eKEM9FTVPs5B3Fn0QcRHOkUCg5yRWPmHRs0&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=UQsYq7sjYQcSmfnj
3.369 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.37 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo1MTk4ZGI1Yi04NzhjLTQ2MzUtYTUzOC1lNjI3Zjk4ZGU5M2UiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoibzIxVk55SUtuV1E0TFctVjJycm52QSIsImF1ZCI6WyIxN2YwM2EwZC05MGIwLTRhNGUtOTA0MC0xYjA3NmQ5ODg4MWUiXSwiYXV0aF90aW1lIjoxNTI5NzUxODI0LCJjX2hhc2giOiJmSjVab1lub25EZ1pid0d3QzRxcDJnIiwiZXhwIjoxNTI5NzU1NzExLCJpYXQiOjE1Mjk3NTIxMTEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImZlNWNkMzllLTJhMTEtNDBlNi1iYTA5LWMwMDRiZjhkMTgyMCIsIm5vbmNlIjoiNEtHNkxuUVpOQ0hmRWFBNyIsInJhdCI6MTUyOTc1MjEwOCwic3ViIjoiZm9vQGJhci5jb20ifQ.ro1k10JfmDPrP5PT7-qexiCEjyLW_8rN5jeU61HyuWaY8E7dWBxIw3Oly_buUKNOlLtDgfCtAlNvaetQ7r3zXl9KH7JgV6Q3vMHDFL-B2wsgnrzBDh-3_v8EOcQ9POZwMWs64EIllF61MEElU54DcGBKIZh7RSeHZB8pZQqr8Y4quLASYunRwvpwt7xN9nx8SsOS2HQE4B8p-f2F0aFfCJx1tDrsfW6jV02SlUrhhEZlidohjz84Y5rFoOmz38_w-7ZvkpQC-pLT8QDOQMffeAUoQ_ZYGlAkndjeC7W16zxr8BVmx2lDeM-vaTq43-jfvRqH-_MkUg5Iw9KfoDWJdNNBlhebrON8UQuF-pIdBGU4ThONnYc74gcBlG7Ij0UYFx11hL3Ga6M-uRXBaYChT3qLO_SvDjNY-E-jIpow8363n4N1XeAL8FsCaNWKbMIrDAbvTtepX8Ch8_7f1kOqr2Xa6XIfcBrN5AzMeqEKbbc6C3B2xsSp5YC98xh520ydcnX_KXJShKFeZVHz2WG4Riqitd2TTqUho4IV0MAC3alqwYsDku2_yUESdwQlHYaV6cQ2OH0S43QxJ-Gx3EV1stft6jnq1ipsYEHkITXli8iTY35n7_2JnpF1UcuqaIL4ssl9bwhM4JsLs3oIDj_dPREkrD51UofhJ2M8unDsQnE', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'T4M4_HQqKusB_ISiMmV0SLEIq2N5-A9nXHJh7wX8zro.CNRv6imNp6mJ53laH10oSPGF7k9CPid8ealgsBbfteA', 'scope': 'openid'}
3.492 AccessTokenResponse {
"access_token": "T4M4_HQqKusB_ISiMmV0SLEIq2N5-A9nXHJh7wX8zro.CNRv6imNp6mJ53laH10oSPGF7k9CPid8ealgsBbfteA",
"expires_in": 3599,
"id_token": {
"at_hash": "o21VNyIKnWQ4LW-V2rrnvA",
"aud": [
"17f03a0d-90b0-4a4e-9040-1b076d98881e"
],
"auth_time": 1529751824,
"c_hash": "fJ5ZoYnonDgZbwGwC4qp2g",
"exp": 1529755711,
"iat": 1529752111,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "fe5cd39e-2a11-40e6-ba09-c004bf8d1820",
"nonce": "4KG6LnQZNCHfEaA7",
"rat": 1529752108,
"sub": "[email protected]"
},
"scope": "openid",
"token_type": "bearer"
}
3.492 phase <--<-- 5 --- UserInfo -->-->
3.492 do_user_info_request kwargs:{'state': 'UQsYq7sjYQcSmfnj', 'method': 'GET', 'authn_method': 'bearer_header', 'ctype': 'jwt'}
3.492 request {'body': None}
3.492 request_url https://oidc-certification.ory.sh:8443/userinfo
3.492 request_http_args {'headers': {'Authorization': 'Bearer T4M4_HQqKusB_ISiMmV0SLEIq2N5-A9nXHJh7wX8zro.CNRv6imNp6mJ53laH10oSPGF7k9CPid8ealgsBbfteA'}}
3.654 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
3.658 OpenIDSchema {
"aud": [
"17f03a0d-90b0-4a4e-9040-1b076d98881e"
],
"iss": "https://oidc-certification.ory.sh:8443/",
"sub": "[email protected]"
}
3.658 OpenIDSchema {
"aud": [
"17f03a0d-90b0-4a4e-9040-1b076d98881e"
],
"iss": "https://oidc-certification.ory.sh:8443/",
"sub": "[email protected]"
}
3.658 phase <--<-- 6 --- Done -->-->
3.658 end
3.659 assertion VerifyResponse
3.659 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.659 assertion CheckAsymSignedUserInfo
3.659 condition asym-signed-userinfo: status=OK [Verifies that the UserInfo was signed with a RSA key]
3.659 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
asym-signed-userinfo: status=OK [Verifies that the UserInfo was signed with a RSA key]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/I.F.T.T.s/OP-claims-essential.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-claims-essential
Test description: Claims request with essential name claim
Timestamp: 2018-06-23T11:27:35Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.076 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.077 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.077 phase <--<-- 2 --- Registration -->-->
0.078 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.078 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#qY0iNQBQtTcZ9O8v"
],
"response_types": [
"id_token"
]
}
0.236 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.237 RegistrationResponse {
"client_id": "e0ac5c96-42e5-4966-9fc4-80da2a77a836",
"client_secret": "V1hyCLSwAn89",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "e0ac5c96-42e5-4966-9fc4-80da2a77a836",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#qY0iNQBQtTcZ9O8v"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.237 phase <--<-- 3 --- AsyncAuthn -->-->
0.238 AuthorizationRequest {
"claims": {
"id_token": {
"name": {
"essential": true
}
}
},
"client_id": "e0ac5c96-42e5-4966-9fc4-80da2a77a836",
"nonce": "jrA4gEAMUV6cqyjU",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "vCvPsy9j4fk6nOhc"
}
0.238 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=e0ac5c96-42e5-4966-9fc4-80da2a77a836&claims=%7B%22id_token%22%3A+%7B%22name%22%3A+%7B%22essential%22%3A+true%7D%7D%7D&state=vCvPsy9j4fk6nOhc&response_type=id_token&nonce=jrA4gEAMUV6cqyjU
0.238 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=e0ac5c96-42e5-4966-9fc4-80da2a77a836&claims=%7B%22id_token%22%3A+%7B%22name%22%3A+%7B%22essential%22%3A+true%7D%7D%7D&state=vCvPsy9j4fk6nOhc&response_type=id_token&nonce=jrA4gEAMUV6cqyjU
2.838 http args {}
3.047 response URL with fragment
3.047 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZTBhYzVjOTYtNDJlNS00OTY2LTlmYzQtODBkYTJhNzdhODM2Il0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODU1LCJpYXQiOjE1Mjk3NTMyNTUsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6Ijk3MzIwY2ZmLTkwM2UtNDIzNC05M2FiLWM2NTlhMGNjMTcxOCIsIm5vbmNlIjoianJBNGdFQU1VVjZjcXlqVSIsInJhdCI6MTUyOTc1MzI1Miwic3ViIjoiZm9vQGJhci5jb20ifQ.Vt-sC3QA1dGf2WSta3e0lnUbXnTvb7ToqUDDLzlTLUlaPjoCxjyvHY1-fTqlm6qcXj7EH2NRnaAXzbzwPaqeph9e4pQbKi7rgpZSwDjJGGWcsTHUTNAELUKyKsUoMj1Bf4VYCXb-rQCWLnFfieagIICe1_cqh1c1GevgBOAH4DbEXgCzss2LQqQSjjD1UBJgqzwvmocvVpuUcMZQsGQmapJdGuAnKVLffWpU3SJcOcg93-8E-j3jiO62wgL3MWbT-dursSTBwrUijNc0zHKv5Q0r42GwOnWndvVsAtTJBqpEowxY4ggYH3GRQMKFXOuS88CnkEfIpVq1rwhxsMCcCiTusRfkkEP3BKKAIM3IvF_vBHraoHQra6sLggxRSnVL9IMdStwRpyoR0d79vXlznySFNhLkMeyWWrwhK00kheyZRZ7-h3GRU9tcdpVEY6DtteYvVDiOli2py28miLJPou5jPJZq_-Lm9De4t1pHzGGvXMbqIRmmA2aWGYFSfMbOOSh7CACYMAzHv6MfG0iKGF0R5GXl_2uS1TGelRDQ3BYxeA8v7cvhoB_O6uul7NWww79Nd73-wKTeOA1vaGhrrYsgr6Lsykye4k3fqfBV9RH80AqVYff1JLkj10o3kaqT9BjxQxdxOCIyGCXGvJI_fTv61F64Qhnc0Y_iC4YFK1Y&state=vCvPsy9j4fk6nOhc
3.047 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZTBhYzVjOTYtNDJlNS00OTY2LTlmYzQtODBkYTJhNzdhODM2Il0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODU1LCJpYXQiOjE1Mjk3NTMyNTUsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6Ijk3MzIwY2ZmLTkwM2UtNDIzNC05M2FiLWM2NTlhMGNjMTcxOCIsIm5vbmNlIjoianJBNGdFQU1VVjZjcXlqVSIsInJhdCI6MTUyOTc1MzI1Miwic3ViIjoiZm9vQGJhci5jb20ifQ.Vt-sC3QA1dGf2WSta3e0lnUbXnTvb7ToqUDDLzlTLUlaPjoCxjyvHY1-fTqlm6qcXj7EH2NRnaAXzbzwPaqeph9e4pQbKi7rgpZSwDjJGGWcsTHUTNAELUKyKsUoMj1Bf4VYCXb-rQCWLnFfieagIICe1_cqh1c1GevgBOAH4DbEXgCzss2LQqQSjjD1UBJgqzwvmocvVpuUcMZQsGQmapJdGuAnKVLffWpU3SJcOcg93-8E-j3jiO62wgL3MWbT-dursSTBwrUijNc0zHKv5Q0r42GwOnWndvVsAtTJBqpEowxY4ggYH3GRQMKFXOuS88CnkEfIpVq1rwhxsMCcCiTusRfkkEP3BKKAIM3IvF_vBHraoHQra6sLggxRSnVL9IMdStwRpyoR0d79vXlznySFNhLkMeyWWrwhK00kheyZRZ7-h3GRU9tcdpVEY6DtteYvVDiOli2py28miLJPou5jPJZq_-Lm9De4t1pHzGGvXMbqIRmmA2aWGYFSfMbOOSh7CACYMAzHv6MfG0iKGF0R5GXl_2uS1TGelRDQ3BYxeA8v7cvhoB_O6uul7NWww79Nd73-wKTeOA1vaGhrrYsgr6Lsykye4k3fqfBV9RH80AqVYff1JLkj10o3kaqT9BjxQxdxOCIyGCXGvJI_fTv61F64Qhnc0Y_iC4YFK1Y', 'state': 'vCvPsy9j4fk6nOhc'}
3.155 AuthorizationResponse {
"id_token": {
"aud": [
"e0ac5c96-42e5-4966-9fc4-80da2a77a836"
],
"auth_time": 1529753136,
"exp": 1529756855,
"iat": 1529753255,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "97320cff-903e-4234-93ab-c659a0cc1718",
"nonce": "jrA4gEAMUV6cqyjU",
"rat": 1529753252,
"sub": "[email protected]"
},
"state": "vCvPsy9j4fk6nOhc"
}
3.155 phase <--<-- 4 --- AccessToken -->-->
3.155 phase <--<-- 5 --- UserInfo -->-->
3.155 phase <--<-- 6 --- Done -->-->
3.155 end
3.155 assertion VerifyClaims
3.156 condition Done: status=OK
============================================================
Conditions
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/I.F.T.T.s/OP-Discovery-claims_supported.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Discovery-claims_supported
Test description: Verify that claims_supported is published
Timestamp: 2018-06-23T11:26:58Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.106 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.108 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.108 phase <--<-- 2 --- Done -->-->
0.108 end
0.108 assertion CheckHTTPResponse
0.109 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.109 assertion CheckHasClaimsSupported
0.109 condition providerinfo-has-claims_supported: status=OK [Check that the claims_supported discovery metadata value is in the provider_info]
0.109 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
providerinfo-has-claims_supported: status=OK [Check that the claims_supported discovery metadata value is in the provider_info]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/I.F.T.T.s/OP-Discovery-Config.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Discovery-Config
Test description: Publishes openid-configuration discovery information
Timestamp: 2018-06-23T11:26:55Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.108 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.109 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.109 phase <--<-- 2 --- Done -->-->
0.11 end
0.11 assertion CheckHTTPResponse
0.11 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.11 assertion VerifyIdTokenSigningAlgorithmIsSupported
0.11 condition verify-id_token_signing-algorithm-is-supported: status=OK [Verify that required algorithms in id_token_signing_alg_values_supported]
0.111 assertion VerifyHTTPSUsage
0.111 condition verify-https-usage: status=OK [Verify that specific endpoints uses https]
0.111 assertion VerifyOPEndpointsUseHTTPS
0.111 condition verify-op-endpoints-use-https: status=OK [Verify that all OP endpoints uses https]
0.111 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-id_token_signing-algorithm-is-supported: status=OK [Verify that required algorithms in id_token_signing_alg_values_supported]
verify-https-usage: status=OK [Verify that specific endpoints uses https]
verify-op-endpoints-use-https: status=OK [Verify that all OP endpoints uses https]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/I.F.T.T.s/OP-Discovery-JWKs.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Discovery-JWKs
Test description: Keys in OP JWKs well formed
Timestamp: 2018-06-23T11:26:57Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.113 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.114 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.114 phase <--<-- 2 --- Done -->-->
0.114 end
0.115 assertion CheckHTTPResponse
0.115 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.115 assertion VerifyBase64URL
0.182 http response url:https://oidc-certification.ory.sh:8443/.well-known/jwks.json status_code:200
0.184 condition verify-base64url: status=OK [Verifies that the base64 encoded parts of a JWK is in fact base64url encoded and not just base64 encoded]
0.184 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-base64url: status=OK [Verifies that the base64 encoded parts of a JWK is in fact base64url encoded and not just base64 encoded]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/I.F.T.T.s/OP-Discovery-jwks_uri.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Discovery-jwks_uri
Test description: Verify that jwks_uri is published
Timestamp: 2018-06-23T11:26:59Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.076 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.077 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.077 phase <--<-- 2 --- Done -->-->
0.077 end
0.078 assertion CheckHTTPResponse
0.078 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.078 assertion BareKeys
0.178 http response url:https://oidc-certification.ory.sh:8443/.well-known/jwks.json status_code:200
0.179 jwks {'keys': [{'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': 'vMfGr0V9ndTUZhWYdQg4LNJ-ef_K3DaRa9u_h3rdugU-ONPP6eK6D9Jj8z--awCQJR3IWlFvP1jwnEVIlSgyBDoj8jobIIPMPRfgY8pJeriuhxzriqrxAueuksE-mAsGE9t_5gGRKIWf1q2kS8TLrC8j3fyCBwkA7uriF6d5QpZxe34YihMaSaAf9dyGHYEvfTf7vhWZlKdfZUssePWQF0P7bvF309LUqffaBynPSlRzmwH3fTYlHn_dvBpXpyRYM35eTjrz36xpJrKgyumyW8gI2VU1RFImIDp4zRQRgzKBUF-qc_th5OSAp-BU3w1mx47pvhuJ44kedEvb9TZReIOzYfU8DbbspyDD90gf0b7B5d7sgd5vtMlGiooK_j-xpHclS1VkaWtTGeLFzbFuQHcgjoa908Dt3eQWYa-nNhco5z0CMZl_CKSU2qHjwxtKy0hZPrwP7XCDnQ6QQlghfyElYf4c6zkNgy_7zEUpBVsFd1qklmXsLxkN7emj6GCyYbL-Q51DF1bwwZPCQXQYO4bseYfEOgdXkXFq01b7jPzrakKUXw8USYjgU8K9G5eywzZWNER8o-p0OW1tafWLApWTSPrBFuvh0HCUcYT8K7RG0RPdLlrIeTftDt3XuefUNs03mNhYOaFevs4ifMX2oYTfwADL9fH3OlMrja42czs', 'alg': 'RS256', 'kid': 'public:05c2478d-63ed-47c8-ad92-75181a567fa0'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': 'wFhdHCpPOd_H73YRTAyD8XHLxrYoaWlBWInPL-XkcIEOig3_9SzLzf8fL4Kv-tUFJwsUt9EmiKNLvRczFQddW5tgzW-ZLA4RaGQ1rBGDlmVbLBq9D7z_2UkTFrLiz1KY9YRrraNENtmS2DFmBbuQXIOBaX_n9mjgOK2GsLLSPrpm3IV3C_YWov1XibNpFuMIfEw0OhpvFMiQRkdkpf5bgFuEx7LK-rbALl_bul15TSltegQsjQyJkKwyJ4L_PaFSBz5Zltmpm6zD8VgcHhMFuLOKoA4mm2MSrfUE-p2UUM1xN9MTICKFcY3Sx6PW4k1Lb88wu8huJ4yytWNVIXSRsR4YPuuP4KvNY3xpBHfeHGdC9m9qSC1KKMUbrYl7xOexvxY8f1WqD4_B6MG5ihPdgP5rENKDF77pXHEGqdek5KEb_u0XlLmnYXK2fkyLQWP24_x7-hGjIgE4F_zox9onWi-ki3lUhBYbL8AZcbjq3o9CgQF2aACmgv6hPZ8ngbboU4ZLGnPte2qCW1S3ryx2tMweBTpDwAE_Jg3ZHlK7R-SoGspw0MNCuE7vHwnaHmDI8gKFqOEYCGG-tgYnniOkD2_KJ4ZBM20KKV2V66ANnwZERMn6exh_sbGjU6S3c8t-SI2MeQjOD1PyS4itl5Dxz60P9krYR6OeMoego0hOjys', 'alg': 'RS256', 'kid': 'public:4ae49bf4-9da0-4a82-bcce-893c3729f22a'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': 'wF5o__54njdCumCJeSzYxnE6GCJ9JZtYfsNKKeOcf1jPL_hFt1M5uf47WKs1YSWJJhibDWg31mkf18j77sO_KLXh3GBUAfl9O8VZtmm519TPBsSAridq-XiRqXXB_etvrTCeCgIJBupwZn7k9-_4HyZvrwn_l_ik16UY70nLkropxXwn4Jj7-tB_ZzzNMl4l5lSueMyw3VuAcpglwhiX4bPrJd3OMc9DefD42e8UworVqKeArt0SEwx33QP9XU43d83dUlv4Ha1LgsX96KWcan3qn7hxxP1oRhgcPxXqFeoN8sHohCPvLMSISdaqtdMkBdcaZI8aVPHx8J2JxN4aTF0l3cy-t7JB54z6f-3pHeE_bUnj4ghgqZLeU967sS0Y1R6NBRxMnqDb7qEO5_saA1zRfxKaDSbAaFVRhgjvknSoqBx5qyYCCRGnfX3Ax5leL-bvo_M4wszbBAvxoeGY-hwn_s_Nz705kDHIzJfem_XURbv2LjjvdjgUXtRqZJkeTzc9_pXcsoEZX9Xm1gLbAsI2geHQNLI_z1KzWcLsz1uitYEpfndBBYBS3DoFFqo-13qk9WaqBJX9vA7MiFBVPmpWSsNAmYT_-6YxvO9P_OVNDPyLSbOSl1PMbaSK5-sPXw5n7mtkw2rkgPoquEqrmhPQnTVrf876qh571YJgfFs', 'alg': 'RS256', 'kid': 'public:e87ff987-ee63-4f3e-8bf3-4099a6148f78'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': 'spxcDzycfjLukN1KJCopwI6s4bPjlQbA-fDA0qn4ntd-nCPieqq6KdXkpCtthr0jPhg6_NKHpL9CWTqJBCyaVvtgZbw1Q2saRXIyCxnYMlw8akMnYLtSsDVrJRmQMH5NTASnIbx0G_J6pZ6OvQ30c2q8xRkOOwgtGn6E85oNrdf_wbuklksIERzxsoZKpjamgxOKZsssz0x6v0mm0RFOTEPD20eOVUqRPhskBtY7W-swCavX5YVy7PYd14dJ7iiHNn4npe2XZLIwSC-zWts7z_N7RChaQYQCQk6e5q19G6DJMSYZOhsg98P8j4XpfD3m7uutGjSYURIVI2XYFv7EWTwGR_RD8QljM6f5s_JPy3A6_BE6zMgi95D6QB5NJUbQ615hBgYprf6lW-vTc6psER_4NjChA_F10eYFEkroDTO014qhGPm9xe--krH4vksfLwnv-_AsUJUg8nMiDmldrvMU4s8JMlEjTYy99zzhXgqQTRU_w_2C4-UKb0PZQi5IeKPqMygtGs7nqgN_rv1lpcWJ2YZ6VEFPnsSnHU7pMxBA04GeSAs6614FMATjWJW5o080_AFnggQRcHouSFTClvP5dUVC_OGJPFbRblHHPlJibXebdTJRX5jxB6o7KQjw7ua3dW3CfGoizS3iLJgQYENJLMDwUY1rjg37Kwm8JE0', 'alg': 'RS256', 'kid': 'public:5198db5b-878c-4635-a538-e627f98de93e'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': '1Kpv-wv6THhBggBy2793qierg_NDRod7pAT__caxzRd6OF9FmHgzklU2d03RqHris7y0freA7RGhmIZEAyPe-C4-O-hhjw3Afk3rp_UaG1wMbgVKStujOdrcobrO6_hLOoSY7lITA-BYqFl9R5DmBoCw9_C5DEsHYL82c_FD03qVBE2rB6rHLaE03j0coHbZn1yB-RzbQqABkafhxWIUADdQ_YqxE588UzjEDRyxm_QviKoUsfSjlu0R9OMwBeX3uHnUP8tkscmMVOctAktPqzxGlfzaorgvfVWDaSUzYvGHxUdkcloUwqrAeCW_MKRmUcUblYQV_xI7QGjXQK4scTWlt4bthHiZ5fYcWt2CFozBi9V9MjKdDejDuLDDPdGlgNLVAnbUp8OqB3w8eFUycni70qp5KrUa1ooG6Bzs4qxuAD7I7D-9NS9VVhRGDBynUtgUHlBWX908ndXNfrZGnfHUyiSyZGNwy2c6xXbH_F7N09Zu9jTDFQazj85B9fVVXZ-63kfCXeuRhRm5oqYoGCLSgs71f3qnqipu2zPukehGWRt3zqf8NWyNOJxnkwW_D9111MpcrRAyhn3cOzHML6rN4nTA-sdq-9bJNMaxr-WJtawuxQtwVMmQCRHOXuFxP0ZPSVjH0zq2Y3paujalyMGpDIJlvTcP4TT3pmnpJ80', 'alg': 'RS256', 'kid': 'public:e272a755-7ae2-490e-82f5-62e0678641b0'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': '16vFo3VXLypUERl1fqAWJEysIgKnJ15eEnc-5LOiFx7jK2L0zDKtj7q6ySr6rdwmgFjaV1vfG-VKmLHPMD_YuazQeb86blkDnUfNQvHfNID0g-U2G-xeLCqfdl54jzx5NAhMV6BVCUTOwsiUt3dgBaNWGJENo4gU0KGr0S2xEU38sJGUz3zROL6gOmUwqlSAk3YClnhyYYof0tj4j0dW7mXK7MaQ4CRAhq5rJq_VRrMCc4JiD7kAN104V5BmNU409uF4InE2Stugw8RSH4hXeBFp-dXtzQi6qmBLsnHd16_WEce76IxvthFnePqa3XMNg9G4-AJ36RVbH4IhMioQgvgHWGXR276pH1Vyga7V0dSakg8ohSD2vBD5OmlYquJ6krJ3uWUCez59YUeNEgOexn5XaBL0ZEnTQ-zNNHX39QZz9QaU2lftGhknRufg68bmshLWgXJexJS1ht1vFccFcmvpnYEnCTwKzo0kjlcY7IiBpWgJ1f4r1PTIKuh8CluNkitsbABcVx3-FOAhA4CMrQovAaNL_jfp6wKBA9Qy0W9LkESVsRQWFUSpQu_z4pJMOVfjbwJOsquxKwXphI2h1VczR-Hh8rTX7D2GL_4-GyG2nHfpF3jVq7raKnyGxJA8ZIK9kPh0JlQhR2FcBhFOWjvusFjoZ09Po6XtvWlP82E', 'alg': 'RS256', 'kid': 'public:0acf6c64-4d55-4888-abb9-b2a3f661ee7f'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': '0vvbIEitFVzY4o12elAZbZvpja5xTm5AOh9wi2UEiPEL6aKxAUn1ywpUaLyWKuEXdeuykHyybniLaThik7Gf-6xKk6S9IK9tjbbwfRqHVkn_Xkyul0ohFI3iTcjvFq5FPGr5vEhSB6eckdngUpzb-7S_Kt8yunkdhYTmkuAr2AXSbQcmCbOJXOsvkc5LOwpjmFIWrtBAHwILJ5cHjzIHtkK2QKMJRlknD8b4kmQ3x6vfxA7mtXREUXdQFn7ssnOVPzriPQp4kIi_TMczSmRLlX1PeeOeDGpTnYywQbsAfdBGZ20WdZlwP3lRUUJoKv1GpBU51GKm2xhHtyrzOkiRKE8pH_PD05gh1G9qXbFtBOoHMBWEaCxoxyJcW8_9iLXBPoC-Jhm47VO5T9hPlaISzDY6EUmgYktejS_mx_bR7emBcbtFUccYSVVqT3EZqAFuQlsPsvj8AT9NmEiVncB2Cy4z7ofLX_Wai_VFPCf7AEfmDZ8mzFZQfVGct74Q9KybwXm8YDq0TSszQGuqT0gtvU9In7CPSOytrVDbdk8Peyeg-Wn_ACMRh5T23wUbQ0jy0Wi9kBwIzN-dUpKu3uL6EZ3PmPSZItQHeAxpQbRZJ1vrrd2y-b6EGun3G9rlnOZ3L4_L4-NOKLt4VGPie7sphlND1pc4ZipaXBjZ9uC3bS8', 'alg': 'RS256', 'kid': 'public:490968e8-c6e5-441e-b42e-5053d6c67af2'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': '0WN9e_V2wEp33JZoN7zQ9J4E4Iz0l-dlx6GqIKdepcMjON3PKZHWFML1e0ZKAkuG2ZJRKoX1LaSNZT0NI9N6_wVAT9aNv53sHBJVC4Bww1zKHEvQseGwJbG0lZZHjDXaxCBPte9yQnquIRRp9Ab-uBeziRoaFQ02OV3LBMBSZ79AzFvZ4yTqpUS_xp-Ylfcmh5wXEppd6hoxs9h1tttPTPbnMLte3S_zxCZI4TQi8d1yBi39OvfZxtABQQbgqYPxiYehNdYbfmZ2CAmVlsTxByS3X-ANBe2nmLsOLgXTyVFZfvEZkzY7OgEwwq5zog5pScXJ-TGlj0guZd8nClHEV-GHvXonjb2hZB63dFEiUVMNh5cOblZX034GnlOkzYfAH8UZ_cvOqONHbvplzONuaYSSRMPRaZwj-0fpElhFNHwr1v1pqbE1i9XOxU_c-eSMr4XAm1VsWG3zJKymjoJmaDcW3AEawi3btL1N2tE3p27cHtcdFjcv5birnxMtPI9Vu806U0_WiGtH_kaWxz64Xk3A_yB-lIBQwXe61JME-K81wLLcHE9qoqpF5iUK4mDqMmI_DVIazUlVUzxY0-1iFkV790V95dBxeYFgXKX02g8NyxfnyzUDC12qUKKejJFbG5LPHaMUXWJIQ2ntwBX_XzeF4pGh0u0vYmfxAmfHWN0', 'alg': 'RS256', 'kid': 'public:a09f73cf-d685-4c5c-9312-60a13e57646f'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': 's_BEnyG0xHYDibtz9a4tE1IW8490BQ_z526Lg2d0PWRtHfcqKmPG0pd0DizPuLY2j1NAY4cCXLwNWMJ3Cp1TqddaMl08hElvNbilcTyQr96RQg9MnrWeR1EqpdXEzTjcx06DFDokvzs89YQVZTDzSh_-xY_m_0VkcFQ0RpDTBn1B0dkMh78dbTJVVSGXYSBgMpcKrGlrgDaPIRX7qp_SdvjNtkPStG_wCPkzd_IJAaTAHGrlyj27dyhOC6EqQjpZRhQvT-w7GalbObncCFox3hRiC8wbI9Toi5p7vEuJJ6yksaqtIwgbtPXXUChNTqwQgIc1RE8RVuhI8ExaT6FfStIVLq9Tow6Hd9mopdX_ydEHHbnbvSC0cCRPg8_G8zTk0ihFpiHE1yEDXBQSs6pZIQ8KZF2RG35j75Jh4ngsDyPbC7PmjE93SG25AkX0WZwoB3g8f6q2r4dZqNtemRX1lMDo0FUQyYcOU5mnOiW3E5oNs3g-VH5ISOiaSUSLX6AIxDfdk6Wj5t7FZUo4EcIwTnE3PI-0HxnLJaErwbYEX0hO1BuhfF7zYHxDjc085U7OyN0abZWbuVUMtIMRgq-4ASlM9fTECg3sMmOfTEJV9nrJZaSCxKvVWma9A01bvBPB6Qn92Gj1XNZ0E1RBLUp1V3iXLcS7MGJh7bAAk5kwKCM', 'alg': 'RS256', 'kid': 'public:8e8dab73-c9fe-42ef-9a7b-1e217abba9a9'}, {'use': 'sig', 'kty': 'RSA', 'e': 'AQAB', 'n': '3cQ2ihjoElfFVnnkleo6ioUvZrkDfddEKOMCaemXP7umEhr8TC9_L3BKYbJqtE15jvkJiqT1vlHgTOKD5wWCFhFSmEa9PAWlt9Hw6BWddFEsiijR113yvj4eT0qfjseMYyiKst0kBxiTRmQdIzllY2Y2UU1IYIkaAP009nZSR7a5IrPYFydZ6SRARk9kZI90fmgRnzUuQKcv7C9HbkUqs7qiApfA17ACpnuKQP5p5lGL41t5ZnU1-5FvmmO6NnwtRZif34HL6WYuksi2RleLAKoHGh_l6P6ygP5v3ucHH0TmdLVBAHMmlLW4BKdVnWa2HEQCKIBiXJztu8EpYCVpZ_ThCaZLagcUM6VCD4nqvsXzQB7pnsBjq75tbo2jlqrGQJE9ekfGVyw7XDN45IkJFLgfVJ2anpyK4NeIAbkB7ZCYSXbR96_EC6h0uZSMHtPYVNIvbRCK6ysCdlDuDsWiQ01tP-lp90eWj1d7ZYlaYNws12OauBfgLyn0NZvjIz5EYXbOO_Hi0P5U6znS1Um-lU0nB1Gsj685Io-KLzN0shOqkfDP8Xcjfx_3EEg0aEPJWqCjiP9K6veNI896ZrIrH6Sd0V_o4TIzpSJimZlMZrTWS6dUm2j6q1WQOE2Z5JlDMC90yTGUC8MNt2AdMB0Z78Mf71rdSrpXpWLMh7rz_7k', 'alg': 'RS256', 'kid': 'public:6a09d4a3-a298-47bc-8bbd-50b64f653f2d'}]}
0.179 condition bare-keys: status=OK [Dynamic OPs MUST publish their public keys as bare JWK keys]
0.179 assertion CheckHasJwksURI
0.179 condition providerinfo-has-jwks_uri: status=OK [Check that the jwks_uri discovery metadata value is in the provider_info]
0.179 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
bare-keys: status=OK [Dynamic OPs MUST publish their public keys as bare JWK keys]
providerinfo-has-jwks_uri: status=OK [Check that the jwks_uri discovery metadata value is in the provider_info]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/I.F.T.T.s/OP-display-page.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-display-page
Test description: Request with display=page
Timestamp: 2018-06-23T11:27:41Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.074 phase <--<-- 1 --- Webfinger -->-->
1.074 not expected to do WebFinger
1.074 phase <--<-- 2 --- Discovery -->-->
1.074 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.149 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.151 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.151 phase <--<-- 3 --- Registration -->-->
1.151 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.151 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#RXtzDHWjjugMGHTA"
],
"response_types": [
"id_token"
]
}
1.312 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.313 RegistrationResponse {
"client_id": "51097748-f027-4017-ba45-8588829e7ca7",
"client_secret": "UHnJJ3Vrt_Xu",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "51097748-f027-4017-ba45-8588829e7ca7",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#RXtzDHWjjugMGHTA"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.313 phase <--<-- 4 --- AsyncAuthn -->-->
1.313 AuthorizationRequest {
"client_id": "51097748-f027-4017-ba45-8588829e7ca7",
"display": "page",
"nonce": "KM3S5sJIjy40ELre",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "DYFCxtUg8DrY6mEX"
}
1.314 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=51097748-f027-4017-ba45-8588829e7ca7&state=DYFCxtUg8DrY6mEX&response_type=id_token&nonce=KM3S5sJIjy40ELre&display=page
1.314 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=51097748-f027-4017-ba45-8588829e7ca7&state=DYFCxtUg8DrY6mEX&response_type=id_token&nonce=KM3S5sJIjy40ELre&display=page
3.823 http args {}
4.034 response URL with fragment
4.034 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNTEwOTc3NDgtZjAyNy00MDE3LWJhNDUtODU4ODgyOWU3Y2E3Il0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODYwLCJpYXQiOjE1Mjk3NTMyNjAsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImE4NGM3ZDMyLTc5OWEtNGY2Yi05Njc1LTk0NDI4ZDU3YjRlNyIsIm5vbmNlIjoiS00zUzVzSklqeTQwRUxyZSIsInJhdCI6MTUyOTc1MzI1OCwic3ViIjoiZm9vQGJhci5jb20ifQ.NJI8zemvoiv4g3MQYVMzuepf01mLS9zJCxzXP4tO_37RngslRK-RIx-D6-PqKhW1-VIza7PvqNKfSp7rm39ChNayqc9KYKGBEhFKtzn4PqJgqRiMZ3M6_THXx3p-O5f_yvugXL1uKT5zkRWuC4fioTCqnW-ktlXU7RYhf8DxH8i-FleO1f41qiMKS3Jecc07-SKBP9GWaGyiOHOZLuGgdAbuy2MzTLmUOaU_MZTqn0v2QZNtSh3xarZ9bpAnekh-Mhb2jxspBrFggds6XA5ARsG8u-FEfY0-_yWCfHTA0hTd_Gpuo444hlLfK2brQiRNFmaWMNZmHU8CciagR7cbObFY7Vk1A7j1OIC2G_vcmayRI0SRVX2YMV6gOK2K2XntWhAUVqbgb59MzGpI6krhYtPKEyXKUBj9H7OxousUGcRLWJg5Tixf9AWBaKAHKvJImlSfi64icK0qeKALDFBFWS8IaepnYSo073lNtE2oY9jsYYyNmmmHg6sUi97R1BGu2yyarpf5q97Gc7BM_j1XpJbvrvLk-q-XBAkxKIB02izIOe-mtih0w2lTB5RiYB4pzR6xoonlyedQNBL2Qkg6KWrQRdjxu-M5qr87B5ZD0DTwR8ufXhUDltwwyCWTD5WlSkJwyTUUyamj-Mv4cgQM0YgdZCmVvkCvGu0SEWe2yK4&state=DYFCxtUg8DrY6mEX
4.034 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNTEwOTc3NDgtZjAyNy00MDE3LWJhNDUtODU4ODgyOWU3Y2E3Il0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODYwLCJpYXQiOjE1Mjk3NTMyNjAsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImE4NGM3ZDMyLTc5OWEtNGY2Yi05Njc1LTk0NDI4ZDU3YjRlNyIsIm5vbmNlIjoiS00zUzVzSklqeTQwRUxyZSIsInJhdCI6MTUyOTc1MzI1OCwic3ViIjoiZm9vQGJhci5jb20ifQ.NJI8zemvoiv4g3MQYVMzuepf01mLS9zJCxzXP4tO_37RngslRK-RIx-D6-PqKhW1-VIza7PvqNKfSp7rm39ChNayqc9KYKGBEhFKtzn4PqJgqRiMZ3M6_THXx3p-O5f_yvugXL1uKT5zkRWuC4fioTCqnW-ktlXU7RYhf8DxH8i-FleO1f41qiMKS3Jecc07-SKBP9GWaGyiOHOZLuGgdAbuy2MzTLmUOaU_MZTqn0v2QZNtSh3xarZ9bpAnekh-Mhb2jxspBrFggds6XA5ARsG8u-FEfY0-_yWCfHTA0hTd_Gpuo444hlLfK2brQiRNFmaWMNZmHU8CciagR7cbObFY7Vk1A7j1OIC2G_vcmayRI0SRVX2YMV6gOK2K2XntWhAUVqbgb59MzGpI6krhYtPKEyXKUBj9H7OxousUGcRLWJg5Tixf9AWBaKAHKvJImlSfi64icK0qeKALDFBFWS8IaepnYSo073lNtE2oY9jsYYyNmmmHg6sUi97R1BGu2yyarpf5q97Gc7BM_j1XpJbvrvLk-q-XBAkxKIB02izIOe-mtih0w2lTB5RiYB4pzR6xoonlyedQNBL2Qkg6KWrQRdjxu-M5qr87B5ZD0DTwR8ufXhUDltwwyCWTD5WlSkJwyTUUyamj-Mv4cgQM0YgdZCmVvkCvGu0SEWe2yK4', 'state': 'DYFCxtUg8DrY6mEX'}
4.126 AuthorizationResponse {
"id_token": {
"aud": [
"51097748-f027-4017-ba45-8588829e7ca7"
],
"auth_time": 1529753136,
"exp": 1529756860,
"iat": 1529753260,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "a84c7d32-799a-4f6b-9675-94428d57b4e7",
"nonce": "KM3S5sJIjy40ELre",
"rat": 1529753258,
"sub": "[email protected]"
},
"state": "DYFCxtUg8DrY6mEX"
}
4.126 phase <--<-- 5 --- Done -->-->
4.126 end
4.127 assertion VerifyResponse
4.127 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.127 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/I.F.T.T.s/OP-display-popup.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-display-popup
Test description: Request with display=popup
Timestamp: 2018-06-23T11:27:47Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.466 phase <--<-- 1 --- Webfinger -->-->
1.466 not expected to do WebFinger
1.466 phase <--<-- 2 --- Discovery -->-->
1.466 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.561 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.563 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.563 phase <--<-- 3 --- Registration -->-->
1.563 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.563 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#VsKzM39eonsgNweI"
],
"response_types": [
"id_token"
]
}
1.723 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.724 RegistrationResponse {
"client_id": "4578d270-468d-41cf-8057-96db32b42fc0",
"client_secret": "UwfWV7ukLIBy",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "4578d270-468d-41cf-8057-96db32b42fc0",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#VsKzM39eonsgNweI"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.724 phase <--<-- 4 --- AsyncAuthn -->-->
1.724 AuthorizationRequest {
"client_id": "4578d270-468d-41cf-8057-96db32b42fc0",
"display": "popup",
"nonce": "RrWeMPfuwt0ZTMU8",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "jjV6HkftTFiZllwE"
}
1.724 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=4578d270-468d-41cf-8057-96db32b42fc0&state=jjV6HkftTFiZllwE&response_type=id_token&nonce=RrWeMPfuwt0ZTMU8&display=popup
1.725 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=4578d270-468d-41cf-8057-96db32b42fc0&state=jjV6HkftTFiZllwE&response_type=id_token&nonce=RrWeMPfuwt0ZTMU8&display=popup
4.465 http args {}
4.634 response URL with fragment
4.635 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNDU3OGQyNzAtNDY4ZC00MWNmLTgwNTctOTZkYjMyYjQyZmMwIl0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODY3LCJpYXQiOjE1Mjk3NTMyNjcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjUwNTg2ODY5LTQ4NmItNDg4ZS05ZjJlLTljMzc2OTE5ZjU4MyIsIm5vbmNlIjoiUnJXZU1QZnV3dDBaVE1VOCIsInJhdCI6MTUyOTc1MzI2NCwic3ViIjoiZm9vQGJhci5jb20ifQ.FKt2f_tszRIDmGdUYyx9qsaQK05vsu42xEGR94flzEY65P_F35gdrfoiAE4u3LrMGV-WLFm7Cix5W6c6LFiNz1WVxSAnF1QrbR60dx6r_Jc7MxkElS6nZe0mw2J27BDQxUMaK71pq6IhYz6u3B2TZUXYlITSYFupMPGp4aXGjxeaGmqMGzA6JpOS8xR-IB7JX3K5WhckzHSoXb-WRRwU5_gFs24sTDpImyTNdYw3sTlyOq-NirRKcC6M_wG8U4jOnHPJ4MR5DTnJSoclmIf_l2KBIm3XUIaViapjlYxANt888IIEE_C6-0AWri3XMtXaK3OYZjbwTj6hJiS7-E4Gek2VSC6aH7GIb83bPXOibateTNhfr_jmoNuRg3wTrlCy-lrNBRRam3R4ajkZoeub3D6_JbHWcFPBGp6GAlHgMA48vu1OrrjU7maU-Xzl4WpVvMY-zgvCe9e49wX4ump5bONK6-aZxVrX_7KhgwsF0us0Ik-BVncB1DSGYbH5EAaE8PTpi7hyRXulB5pnYI1tOqBLFZkfwgBMXePcZa61vettwoghHZSVvtp7lhfxb-gwd_TaeLtzDqaM0tarLf1pwDBLy3W5jFwxx87f0F_a1zn_XaUt7vTtbPg_xsSUweJ1ebpm8nabievcb3qhb0gRFJIfSi6QX7d0QtgtsX-qjHI&state=jjV6HkftTFiZllwE
4.635 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNDU3OGQyNzAtNDY4ZC00MWNmLTgwNTctOTZkYjMyYjQyZmMwIl0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODY3LCJpYXQiOjE1Mjk3NTMyNjcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjUwNTg2ODY5LTQ4NmItNDg4ZS05ZjJlLTljMzc2OTE5ZjU4MyIsIm5vbmNlIjoiUnJXZU1QZnV3dDBaVE1VOCIsInJhdCI6MTUyOTc1MzI2NCwic3ViIjoiZm9vQGJhci5jb20ifQ.FKt2f_tszRIDmGdUYyx9qsaQK05vsu42xEGR94flzEY65P_F35gdrfoiAE4u3LrMGV-WLFm7Cix5W6c6LFiNz1WVxSAnF1QrbR60dx6r_Jc7MxkElS6nZe0mw2J27BDQxUMaK71pq6IhYz6u3B2TZUXYlITSYFupMPGp4aXGjxeaGmqMGzA6JpOS8xR-IB7JX3K5WhckzHSoXb-WRRwU5_gFs24sTDpImyTNdYw3sTlyOq-NirRKcC6M_wG8U4jOnHPJ4MR5DTnJSoclmIf_l2KBIm3XUIaViapjlYxANt888IIEE_C6-0AWri3XMtXaK3OYZjbwTj6hJiS7-E4Gek2VSC6aH7GIb83bPXOibateTNhfr_jmoNuRg3wTrlCy-lrNBRRam3R4ajkZoeub3D6_JbHWcFPBGp6GAlHgMA48vu1OrrjU7maU-Xzl4WpVvMY-zgvCe9e49wX4ump5bONK6-aZxVrX_7KhgwsF0us0Ik-BVncB1DSGYbH5EAaE8PTpi7hyRXulB5pnYI1tOqBLFZkfwgBMXePcZa61vettwoghHZSVvtp7lhfxb-gwd_TaeLtzDqaM0tarLf1pwDBLy3W5jFwxx87f0F_a1zn_XaUt7vTtbPg_xsSUweJ1ebpm8nabievcb3qhb0gRFJIfSi6QX7d0QtgtsX-qjHI', 'state': 'jjV6HkftTFiZllwE'}
4.72 AuthorizationResponse {
"id_token": {
"aud": [
"4578d270-468d-41cf-8057-96db32b42fc0"
],
"auth_time": 1529753136,
"exp": 1529756867,
"iat": 1529753267,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "50586869-486b-488e-9f2e-9c376919f583",
"nonce": "RrWeMPfuwt0ZTMU8",
"rat": 1529753264,
"sub": "[email protected]"
},
"state": "jjV6HkftTFiZllwE"
}
4.72 phase <--<-- 5 --- Done -->-->
4.72 end
4.72 assertion VerifyResponse
4.72 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.72 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/I.F.T.T.s/OP-IDToken-C-Signature.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-IDToken-C-Signature
Test description: Does the OP sign the ID Token and with what
Timestamp: 2018-06-23T11:27:23Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Registration -->-->
0.074 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.074 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#7TZRzTkxBMg2El4J"
],
"response_types": [
"id_token"
]
}
0.276 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.277 RegistrationResponse {
"client_id": "080a936c-3a62-468a-aed3-f9d63363e1b5",
"client_secret": "UTAoHi0M7sid",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "080a936c-3a62-468a-aed3-f9d63363e1b5",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#7TZRzTkxBMg2El4J"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.277 phase <--<-- 3 --- AsyncAuthn -->-->
0.278 AuthorizationRequest {
"client_id": "080a936c-3a62-468a-aed3-f9d63363e1b5",
"nonce": "zJDpC75FiJnuuzNN",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "Z90VwTNosGIB7lR3"
}
0.278 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=080a936c-3a62-468a-aed3-f9d63363e1b5&state=Z90VwTNosGIB7lR3&response_type=id_token&nonce=zJDpC75FiJnuuzNN
0.278 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=080a936c-3a62-468a-aed3-f9d63363e1b5&state=Z90VwTNosGIB7lR3&response_type=id_token&nonce=zJDpC75FiJnuuzNN
2.346 http args {}
2.53 response URL with fragment
2.531 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMDgwYTkzNmMtM2E2Mi00NjhhLWFlZDMtZjlkNjMzNjNlMWI1Il0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODQzLCJpYXQiOjE1Mjk3NTMyNDMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjRlMzM1OThlLTIyYWItNGVhNy1hNjBiLTE0NDg2NGYxNTlkMyIsIm5vbmNlIjoiekpEcEM3NUZpSm51dXpOTiIsInJhdCI6MTUyOTc1MzI0MSwic3ViIjoiZm9vQGJhci5jb20ifQ.FRxNNp-QtcKEjGjN2NonWPcfPsl5Zm-n31VqfcG0HKrcVXSg32MW_bVoepXryvp5F-nv_eCMuVz7qJ4NC7dlgF01BODczk-X8P1J3C-GZh0mee-TqqwjkfwWiiffiiEw-zTTzsXbr0oLMNw_RFLW1KqJtLaofWC9dhqWmUmaPKSO4bV5DyNACSoY89EWYmOS17XE6axSx2tufsCJPSwjPIPsZ2dMV6LXeJHb_05d_E8fTMnqMJ9rL2wNwRwfgf4aYRjuyhg3sjN61DXERi0PSfeUFxQa08SvC8yv15FxUMWxjpDVvvWM_rV7ybxTUOgaSQ44qzZ-HkvSc4P4VT35mzPwHuZtc2NtF6e6Vvf2dEFlPvSJ_-LJGyWdEYukYj0cvhItG54e__na1pYI6drmhzj5BYbvvKVYqJ0RCuqaCOllRSU1QsOKaqZcTC17LgdGQK3zwqBmKRRizeablvo4bNlTNOsQNbEAVC0hStdemsbFu1yldorBq2LCpSSe_ZAou9B3jbLmMTDyf1h0fJnUHTwT90l0NGWa4EoRdk-DLgJiIBs8ym6dQAOPGwiCB-cAMWZ9_jod1G89SvnhhqRofCBGeaSWGmIbTMBZgEVRYvSbqgzy8dG1J91ySjkOb2pmV34ZCQUyo3dC63miKcdpoD0vj5ND62adoyCFI5XXm5E&state=Z90VwTNosGIB7lR3
2.531 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMDgwYTkzNmMtM2E2Mi00NjhhLWFlZDMtZjlkNjMzNjNlMWI1Il0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODQzLCJpYXQiOjE1Mjk3NTMyNDMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjRlMzM1OThlLTIyYWItNGVhNy1hNjBiLTE0NDg2NGYxNTlkMyIsIm5vbmNlIjoiekpEcEM3NUZpSm51dXpOTiIsInJhdCI6MTUyOTc1MzI0MSwic3ViIjoiZm9vQGJhci5jb20ifQ.FRxNNp-QtcKEjGjN2NonWPcfPsl5Zm-n31VqfcG0HKrcVXSg32MW_bVoepXryvp5F-nv_eCMuVz7qJ4NC7dlgF01BODczk-X8P1J3C-GZh0mee-TqqwjkfwWiiffiiEw-zTTzsXbr0oLMNw_RFLW1KqJtLaofWC9dhqWmUmaPKSO4bV5DyNACSoY89EWYmOS17XE6axSx2tufsCJPSwjPIPsZ2dMV6LXeJHb_05d_E8fTMnqMJ9rL2wNwRwfgf4aYRjuyhg3sjN61DXERi0PSfeUFxQa08SvC8yv15FxUMWxjpDVvvWM_rV7ybxTUOgaSQ44qzZ-HkvSc4P4VT35mzPwHuZtc2NtF6e6Vvf2dEFlPvSJ_-LJGyWdEYukYj0cvhItG54e__na1pYI6drmhzj5BYbvvKVYqJ0RCuqaCOllRSU1QsOKaqZcTC17LgdGQK3zwqBmKRRizeablvo4bNlTNOsQNbEAVC0hStdemsbFu1yldorBq2LCpSSe_ZAou9B3jbLmMTDyf1h0fJnUHTwT90l0NGWa4EoRdk-DLgJiIBs8ym6dQAOPGwiCB-cAMWZ9_jod1G89SvnhhqRofCBGeaSWGmIbTMBZgEVRYvSbqgzy8dG1J91ySjkOb2pmV34ZCQUyo3dC63miKcdpoD0vj5ND62adoyCFI5XXm5E', 'state': 'Z90VwTNosGIB7lR3'}
2.611 AuthorizationResponse {
"id_token": {
"aud": [
"080a936c-3a62-468a-aed3-f9d63363e1b5"
],
"auth_time": 1529753136,
"exp": 1529756843,
"iat": 1529753243,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "4e33598e-22ab-4ea7-a60b-144864f159d3",
"nonce": "zJDpC75FiJnuuzNN",
"rat": 1529753241,
"sub": "[email protected]"
},
"state": "Z90VwTNosGIB7lR3"
}
2.612 phase <--<-- 4 --- AccessToken -->-->
2.612 phase <--<-- 5 --- Done -->-->
2.612 end
2.612 assertion VerifyResponse
2.612 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.613 assertion IsIDTokenSigned
2.613 condition is-idtoken-signed: status=OK [Checks if the id_token is signed]
2.613 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
is-idtoken-signed: status=OK [Checks if the id_token is signed]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/I.F.T.T.s/OP-IDToken-kid.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-IDToken-kid
Test description: IDToken has kid [Basic, Implicit, Hybrid]
Timestamp: 2018-06-23T11:27:31Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.069 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.07 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.071 phase <--<-- 2 --- Registration -->-->
0.071 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.071 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#g0ViUCvhj5tF5Yrw"
],
"response_types": [
"id_token"
]
}
0.228 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.229 RegistrationResponse {
"client_id": "68197139-9629-476b-bd5e-d07813fab440",
"client_secret": "I.gpXcTKggBq",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "68197139-9629-476b-bd5e-d07813fab440",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#g0ViUCvhj5tF5Yrw"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.229 phase <--<-- 3 --- AsyncAuthn -->-->
0.23 AuthorizationRequest {
"client_id": "68197139-9629-476b-bd5e-d07813fab440",
"nonce": "bnt29kABZT8zfEr8",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "oS5phYIjWtMnhlIn"
}
0.23 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=68197139-9629-476b-bd5e-d07813fab440&state=oS5phYIjWtMnhlIn&response_type=id_token&nonce=bnt29kABZT8zfEr8
0.23 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=68197139-9629-476b-bd5e-d07813fab440&state=oS5phYIjWtMnhlIn&response_type=id_token&nonce=bnt29kABZT8zfEr8
2.505 http args {}
2.676 response URL with fragment
2.676 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNjgxOTcxMzktOTYyOS00NzZiLWJkNWUtZDA3ODEzZmFiNDQwIl0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODUwLCJpYXQiOjE1Mjk3NTMyNTAsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImE4ZDE2NzRjLTVjNzktNGJiNS05Y2M2LWY2ODZiNTVmZmJlMiIsIm5vbmNlIjoiYm50MjlrQUJaVDh6ZkVyOCIsInJhdCI6MTUyOTc1MzI0OCwic3ViIjoiZm9vQGJhci5jb20ifQ.LaVDzjm5XUAkSbFQwNNb7iv8xi7gTz5p454P08fdW_ZoUwTBJr2Mkux_XCKKxOI4B6LNZlep8lXfzz8tM6P7rUFB-enoxxkf6xEq8s9hM0Yv5Bb9UvEWKmmeZ6Idkcd7Odbb4xsovg0dAEzkvel2rW9u6L-Ml3aI04iJjijP_E61VhJ1GbSN7OzSKLadSh-hb4iFdXci39_DkTcJSFlhEaFL9l5bI2cn2KAnUF08lSFzVxz-406XyHClJq-zJoeJDDlm9lDCL5U8TzD4chCyWD_uO9wiOO7ir0etCkxxmz4Pb_yeD2vTew_vBhhzrQy-uwPbOTu4cF9O-TrWUoSNPOVR1C6urRdxMQomGK-LwUYFh67fw9NFB-X2Qvn49n4ocY7t3mm_ubFUgjvmrh8By0Xro__OD_Z5a3Y5iQMozonTLL1ihg2TMb91DGdhN2GwHrr2X4i6NnNqhDx-DvHWeFaul7tCrUZExnDsDbkQkZhg0GNv6OgvhtYmcwkDF526pCQ8WskMBodlvOW0_euCBJY3KELl_1It4Twr42nRdmBpzUBfHIau35o9atWvOYLvjwyFFo5iJiJ9Sr6Um5erDVL5GHJFwTta28wqvTPZu9tkUn8vUjpspRNLi141a-U-NDCejKRuB8rNrO8uGmgXluZbo4TXrcIOWucS0JVpLeU&state=oS5phYIjWtMnhlIn
2.677 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNjgxOTcxMzktOTYyOS00NzZiLWJkNWUtZDA3ODEzZmFiNDQwIl0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODUwLCJpYXQiOjE1Mjk3NTMyNTAsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImE4ZDE2NzRjLTVjNzktNGJiNS05Y2M2LWY2ODZiNTVmZmJlMiIsIm5vbmNlIjoiYm50MjlrQUJaVDh6ZkVyOCIsInJhdCI6MTUyOTc1MzI0OCwic3ViIjoiZm9vQGJhci5jb20ifQ.LaVDzjm5XUAkSbFQwNNb7iv8xi7gTz5p454P08fdW_ZoUwTBJr2Mkux_XCKKxOI4B6LNZlep8lXfzz8tM6P7rUFB-enoxxkf6xEq8s9hM0Yv5Bb9UvEWKmmeZ6Idkcd7Odbb4xsovg0dAEzkvel2rW9u6L-Ml3aI04iJjijP_E61VhJ1GbSN7OzSKLadSh-hb4iFdXci39_DkTcJSFlhEaFL9l5bI2cn2KAnUF08lSFzVxz-406XyHClJq-zJoeJDDlm9lDCL5U8TzD4chCyWD_uO9wiOO7ir0etCkxxmz4Pb_yeD2vTew_vBhhzrQy-uwPbOTu4cF9O-TrWUoSNPOVR1C6urRdxMQomGK-LwUYFh67fw9NFB-X2Qvn49n4ocY7t3mm_ubFUgjvmrh8By0Xro__OD_Z5a3Y5iQMozonTLL1ihg2TMb91DGdhN2GwHrr2X4i6NnNqhDx-DvHWeFaul7tCrUZExnDsDbkQkZhg0GNv6OgvhtYmcwkDF526pCQ8WskMBodlvOW0_euCBJY3KELl_1It4Twr42nRdmBpzUBfHIau35o9atWvOYLvjwyFFo5iJiJ9Sr6Um5erDVL5GHJFwTta28wqvTPZu9tkUn8vUjpspRNLi141a-U-NDCejKRuB8rNrO8uGmgXluZbo4TXrcIOWucS0JVpLeU', 'state': 'oS5phYIjWtMnhlIn'}
2.758 AuthorizationResponse {
"id_token": {
"aud": [
"68197139-9629-476b-bd5e-d07813fab440"
],
"auth_time": 1529753136,
"exp": 1529756850,
"iat": 1529753250,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "a8d1674c-5c79-4bb5-9cc6-f686b55ffbe2",
"nonce": "bnt29kABZT8zfEr8",
"rat": 1529753248,
"sub": "[email protected]"
},
"state": "oS5phYIjWtMnhlIn"
}
2.758 phase <--<-- 4 --- AccessToken -->-->
2.758 phase <--<-- 5 --- Done -->-->
2.758 end
2.758 assertion VerifySignedIdTokenHasKID
2.759 condition verify-signed-idtoken-has-kid: status=OK [Verifies that the header of a signed IDToken includes a kid claim.]
2.759 assertion VerifyResponse
2.759 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.759 condition Done: status=OK
============================================================
Conditions
verify-signed-idtoken-has-kid: status=OK [Verifies that the header of a signed IDToken includes a kid claim.]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/I.F.T.T.s/OP-IDToken-RS256.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-IDToken-RS256
Test description: Asymmetric ID Token signature with RS256
Timestamp: 2018-06-23T11:27:27Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.072 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Registration -->-->
0.074 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'id_token_signed_response_alg': 'RS256', 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.074 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id_token_signed_response_alg": "RS256",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#3f59vUTe64XKUVmp"
],
"response_types": [
"id_token"
]
}
0.266 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.267 RegistrationResponse {
"client_id": "9e423a6d-943e-490c-8207-988c05938638",
"client_secret": "BugeQLach7XY",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "9e423a6d-943e-490c-8207-988c05938638",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#3f59vUTe64XKUVmp"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.267 phase <--<-- 3 --- AsyncAuthn -->-->
0.268 AuthorizationRequest {
"client_id": "9e423a6d-943e-490c-8207-988c05938638",
"nonce": "RU2IFAAdjdSsAG22",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "QVDUaF72pZLG8o5E"
}
0.268 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=9e423a6d-943e-490c-8207-988c05938638&state=QVDUaF72pZLG8o5E&response_type=id_token&nonce=RU2IFAAdjdSsAG22
0.268 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=9e423a6d-943e-490c-8207-988c05938638&state=QVDUaF72pZLG8o5E&response_type=id_token&nonce=RU2IFAAdjdSsAG22
2.193 http args {}
2.365 response URL with fragment
2.365 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiOWU0MjNhNmQtOTQzZS00OTBjLTgyMDctOTg4YzA1OTM4NjM4Il0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODQ3LCJpYXQiOjE1Mjk3NTMyNDcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjQ4YjlhNmFiLWMyODEtNDM0Yy1hNWNmLTMxYjc3MjkzOGNjMyIsIm5vbmNlIjoiUlUySUZBQWRqZFNzQUcyMiIsInJhdCI6MTUyOTc1MzI0NSwic3ViIjoiZm9vQGJhci5jb20ifQ.j0t-d4nhI8k-CGoUEKFfKTFC4Ga38rXO1nHNoz7Mt9eterRM2fC7CUHhuGeCeVlfS3V007dwelqRG1VqW_v77tDY_N94Ymt8l1mxcWqjhKNmuJouMvsBoReNvO9uBwGZKL_7YpQbuFRir7oXcIkLvVfArPlzZFGdTvRFxeKGsMOjf1yOyg42smFxbb8k8sEUAWzuZ-SHI9OAJFJTwFFa4AuaqoNNv5bKV_1ySSaMoDlEw3cxXQ0BOZd7t-CtRm5ZlsRBs6MCkB9IgqJYVLgf7Vhifn30MepWFjwnJY64EwZFYqoqjygWfYox6mJMjm-53oEUZuHkSNN7D72Vt_YtNDI4JAnWs-44iaags9eVk3z6SQPDBFRkrY5q4mGpcEzqf0PVXnfGwGd9ybVpyyrJ7WH-uVshlcbgbXxOZ3BNcvzkskaJL2qmYsyf_6_QSOhRaNtKR_e-sCCjaYRmpsffJ6APdIhuvyVZwf-AY_pmsFcHtruDmULtpdcGSQThcGrOpwe0nLwiuAsXTTw-HcTX7Ea69wwHzE-U0sDKaaBmNHjbIBSJhNPgbkoOtx1JfV102LEYoWEyHitxL2mzt1E8vi2abQIq_VWX1604O7gP5ES0XwT5XU7lTzfJHo6y1MnwTzqDCQPF8iqTMllFwo8h2hPSSRMVQQxExgNu_G-AbEE&state=QVDUaF72pZLG8o5E
2.365 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiOWU0MjNhNmQtOTQzZS00OTBjLTgyMDctOTg4YzA1OTM4NjM4Il0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODQ3LCJpYXQiOjE1Mjk3NTMyNDcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjQ4YjlhNmFiLWMyODEtNDM0Yy1hNWNmLTMxYjc3MjkzOGNjMyIsIm5vbmNlIjoiUlUySUZBQWRqZFNzQUcyMiIsInJhdCI6MTUyOTc1MzI0NSwic3ViIjoiZm9vQGJhci5jb20ifQ.j0t-d4nhI8k-CGoUEKFfKTFC4Ga38rXO1nHNoz7Mt9eterRM2fC7CUHhuGeCeVlfS3V007dwelqRG1VqW_v77tDY_N94Ymt8l1mxcWqjhKNmuJouMvsBoReNvO9uBwGZKL_7YpQbuFRir7oXcIkLvVfArPlzZFGdTvRFxeKGsMOjf1yOyg42smFxbb8k8sEUAWzuZ-SHI9OAJFJTwFFa4AuaqoNNv5bKV_1ySSaMoDlEw3cxXQ0BOZd7t-CtRm5ZlsRBs6MCkB9IgqJYVLgf7Vhifn30MepWFjwnJY64EwZFYqoqjygWfYox6mJMjm-53oEUZuHkSNN7D72Vt_YtNDI4JAnWs-44iaags9eVk3z6SQPDBFRkrY5q4mGpcEzqf0PVXnfGwGd9ybVpyyrJ7WH-uVshlcbgbXxOZ3BNcvzkskaJL2qmYsyf_6_QSOhRaNtKR_e-sCCjaYRmpsffJ6APdIhuvyVZwf-AY_pmsFcHtruDmULtpdcGSQThcGrOpwe0nLwiuAsXTTw-HcTX7Ea69wwHzE-U0sDKaaBmNHjbIBSJhNPgbkoOtx1JfV102LEYoWEyHitxL2mzt1E8vi2abQIq_VWX1604O7gP5ES0XwT5XU7lTzfJHo6y1MnwTzqDCQPF8iqTMllFwo8h2hPSSRMVQQxExgNu_G-AbEE', 'state': 'QVDUaF72pZLG8o5E'}
2.456 AuthorizationResponse {
"id_token": {
"aud": [
"9e423a6d-943e-490c-8207-988c05938638"
],
"auth_time": 1529753136,
"exp": 1529756847,
"iat": 1529753247,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "48b9a6ab-c281-434c-a5cf-31b772938cc3",
"nonce": "RU2IFAAdjdSsAG22",
"rat": 1529753245,
"sub": "[email protected]"
},
"state": "QVDUaF72pZLG8o5E"
}
2.456 phase <--<-- 4 --- AccessToken -->-->
2.456 phase <--<-- 5 --- Done -->-->
2.456 end
2.457 assertion VerifyResponse
2.457 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.457 assertion VerifySignedIdToken
2.457 condition verify-idtoken-is-signed: status=OK [Verifies that an ID Token is signed]
2.457 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-idtoken-is-signed: status=OK [Verifies that an ID Token is signed]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/I.F.T.T.s/OP-nonce-noncode.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-nonce-noncode
Test description: Request with nonce, verifies it was returned in ID Token [Implicit, Hybrid]
Timestamp: 2018-06-23T11:27:57Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.114 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.115 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.115 phase <--<-- 2 --- Registration -->-->
0.115 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.116 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#jfMQN53pPWreCiSE"
],
"response_types": [
"id_token"
]
}
0.272 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.273 RegistrationResponse {
"client_id": "6c7f57c7-695a-4963-8455-2e013ca8ca54",
"client_secret": "d6dII5njj3Wi",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "6c7f57c7-695a-4963-8455-2e013ca8ca54",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#jfMQN53pPWreCiSE"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.273 phase <--<-- 3 --- AsyncAuthn -->-->
0.274 AuthorizationRequest {
"client_id": "6c7f57c7-695a-4963-8455-2e013ca8ca54",
"nonce": "lSChZpbwZ3eqChYb",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "oRvATxqAZueTGZlz"
}
0.274 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=6c7f57c7-695a-4963-8455-2e013ca8ca54&state=oRvATxqAZueTGZlz&response_type=id_token&nonce=lSChZpbwZ3eqChYb
0.274 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=6c7f57c7-695a-4963-8455-2e013ca8ca54&state=oRvATxqAZueTGZlz&response_type=id_token&nonce=lSChZpbwZ3eqChYb
2.445 http args {}
2.663 response URL with fragment
2.663 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNmM3ZjU3YzctNjk1YS00OTYzLTg0NTUtMmUwMTNjYThjYTU0Il0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODc2LCJpYXQiOjE1Mjk3NTMyNzYsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjVmNTE4NGE1LWM5OTgtNGU0My04ZjQ2LWU2MjQyZWRkNmU2OCIsIm5vbmNlIjoibFNDaFpwYndaM2VxQ2hZYiIsInJhdCI6MTUyOTc1MzI3NSwic3ViIjoiZm9vQGJhci5jb20ifQ.JAyLpgLrWAuWU4j8H35ZtaJiy7Hy-AkSocV9X9WdzRyUSixwqbyYCF2nX_UUS4WTWRYh4RstQyHVjvkMU0OLnf4VuCcM71wk4_yxnWxxBYeu8YIZa9hBLm6lyQNbHjwxSs0BOubq9-nYaqs_GOm-0cJ43mvjF5olw7vyOSSebRtp2RwPjEJknb-9ls3CCKXbZUpEaCSbpZJViSOAV2heGiI8FXz0VYWAa6cN-7AhTc-FCNUN5DaZ0boXAhNXLsTVuIpgN0Ma7XP5xp2HR42JGBooB8XP4jv5iaHZJnv6WG0Kw2xeaKKtpmEBlZAugMMPj-N_o0BCmg8ZhuGhvNnwi0v9u0_bpi48i5O-wjS64-7WCmysq1JywOv_jLYJnCSN1Q1Bej6qhzzvKNFMGSv-xk9ThF64YMx-as9Kuj1xr4-Jw1GT0TcowkcY7njN16nhGLpMFUcFJeC7R_-pQwMJGc8cgUeG60Rmw6G14klRymStc-p6Mpsie6VGcNyzIjmEN2LmF3QI7GvyDyvxyXkQk9a5cg8R510KDbLefXsiIhq6fssfDF9j9JtKExTgYOKQ5v90U2Imt6quCkOi40Yu0uiFuevAyuihhcaJUcbuBmgZO747xQhN6OCDj1nTi0S3SDLYcL0orlSPBEW-f9mm_V4AulUho8P9RysjkWzgNKU&state=oRvATxqAZueTGZlz
2.663 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNmM3ZjU3YzctNjk1YS00OTYzLTg0NTUtMmUwMTNjYThjYTU0Il0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODc2LCJpYXQiOjE1Mjk3NTMyNzYsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjVmNTE4NGE1LWM5OTgtNGU0My04ZjQ2LWU2MjQyZWRkNmU2OCIsIm5vbmNlIjoibFNDaFpwYndaM2VxQ2hZYiIsInJhdCI6MTUyOTc1MzI3NSwic3ViIjoiZm9vQGJhci5jb20ifQ.JAyLpgLrWAuWU4j8H35ZtaJiy7Hy-AkSocV9X9WdzRyUSixwqbyYCF2nX_UUS4WTWRYh4RstQyHVjvkMU0OLnf4VuCcM71wk4_yxnWxxBYeu8YIZa9hBLm6lyQNbHjwxSs0BOubq9-nYaqs_GOm-0cJ43mvjF5olw7vyOSSebRtp2RwPjEJknb-9ls3CCKXbZUpEaCSbpZJViSOAV2heGiI8FXz0VYWAa6cN-7AhTc-FCNUN5DaZ0boXAhNXLsTVuIpgN0Ma7XP5xp2HR42JGBooB8XP4jv5iaHZJnv6WG0Kw2xeaKKtpmEBlZAugMMPj-N_o0BCmg8ZhuGhvNnwi0v9u0_bpi48i5O-wjS64-7WCmysq1JywOv_jLYJnCSN1Q1Bej6qhzzvKNFMGSv-xk9ThF64YMx-as9Kuj1xr4-Jw1GT0TcowkcY7njN16nhGLpMFUcFJeC7R_-pQwMJGc8cgUeG60Rmw6G14klRymStc-p6Mpsie6VGcNyzIjmEN2LmF3QI7GvyDyvxyXkQk9a5cg8R510KDbLefXsiIhq6fssfDF9j9JtKExTgYOKQ5v90U2Imt6quCkOi40Yu0uiFuevAyuihhcaJUcbuBmgZO747xQhN6OCDj1nTi0S3SDLYcL0orlSPBEW-f9mm_V4AulUho8P9RysjkWzgNKU', 'state': 'oRvATxqAZueTGZlz'}
2.745 AuthorizationResponse {
"id_token": {
"aud": [
"6c7f57c7-695a-4963-8455-2e013ca8ca54"
],
"auth_time": 1529753136,
"exp": 1529756876,
"iat": 1529753276,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "5f5184a5-c998-4e43-8f46-e6242edd6e68",
"nonce": "lSChZpbwZ3eqChYb",
"rat": 1529753275,
"sub": "[email protected]"
},
"state": "oRvATxqAZueTGZlz"
}
2.745 phase <--<-- 4 --- AccessToken -->-->
2.745 phase <--<-- 5 --- Done -->-->
2.745 end
2.746 assertion VerifyResponse
2.746 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.746 assertion CheckIdTokenNonce
2.746 condition check-idtoken-nonce: status=OK [Verify that the nonce in the IDToken is the same that's included in the Authorization Request.]
2.746 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
check-idtoken-nonce: status=OK [Verify that the nonce in the IDToken is the same that's included in the Authorization Request.]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/I.F.T.T.s/OP-nonce-NoReq-noncode.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-nonce-NoReq-noncode
Test description: Reject requests without nonce unless using the code flow
Timestamp: 2018-06-23T11:27:53Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.107 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.108 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.108 phase <--<-- 2 --- Note -->-->
1.135 phase <--<-- 3 --- Registration -->-->
1.135 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.135 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#9ncfy7X8MW0M1NhQ"
],
"response_types": [
"id_token"
]
}
1.294 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.295 RegistrationResponse {
"client_id": "116536fa-946b-4353-a177-1d91598edb7a",
"client_secret": "txBMlXgmdNLC",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "116536fa-946b-4353-a177-1d91598edb7a",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#9ncfy7X8MW0M1NhQ"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.295 phase <--<-- 4 --- AsyncAuthn -->-->
1.296 AuthorizationRequest {
"client_id": "116536fa-946b-4353-a177-1d91598edb7a",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "jbly23LFhnPgawEy"
}
1.296 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?state=jbly23LFhnPgawEy&scope=openid&response_type=id_token&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=116536fa-946b-4353-a177-1d91598edb7a
1.296 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?state=jbly23LFhnPgawEy&scope=openid&response_type=id_token&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=116536fa-946b-4353-a177-1d91598edb7a
4.116 http args {}
4.285 response URL with fragment
4.285 response error=invalid_request&error_debug=Parameter+nonce+must+be+set+when+using+the+implicit+flow&error_description=The+request+is+missing+a+required+parameter%252C+includes+an+invalid+parameter+value%252C+includes+a+parameter+more+than+once%252C+or+is+otherwise+malformed&error_hint=Make+sure+that+the+various+parameters+are+correct%252C+be+aware+of+case+sensitivity+and+trim+your+parameters.+Make+sure+that+the+client+you+are+using+has+exactly+whitelisted+the+redirect_uri+you+specified.&state=jbly23LFhnPgawEy
4.285 response {'error_debug': 'Parameter nonce must be set when using the implicit flow', 'error_description': 'The request is missing a required parameter%2C includes an invalid parameter value%2C includes a parameter more than once%2C or is otherwise malformed', 'state': 'jbly23LFhnPgawEy', 'error': 'invalid_request', 'error_hint': 'Make sure that the various parameters are correct%2C be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.'}
4.286 AuthorizationErrorResponse {
"error": "invalid_request",
"error_debug": "Parameter nonce must be set when using the implicit flow",
"error_description": "The request is missing a required parameter%2C includes an invalid parameter value%2C includes a parameter more than once%2C or is otherwise malformed",
"error_hint": "Make sure that the various parameters are correct%2C be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.",
"state": "jbly23LFhnPgawEy"
}
4.286 AuthorizationErrorResponse {
"error": "invalid_request",
"error_debug": "Parameter nonce must be set when using the implicit flow",
"error_description": "The request is missing a required parameter%2C includes an invalid parameter value%2C includes a parameter more than once%2C or is otherwise malformed",
"error_hint": "Make sure that the various parameters are correct%2C be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.",
"state": "jbly23LFhnPgawEy"
}
4.286 phase <--<-- 5 --- Done -->-->
4.286 end
4.286 assertion VerifyResponse
4.286 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.286 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/I.F.T.T.s/OP-prompt-login.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-prompt-login
Test description: Request with prompt=login
Timestamp: 2018-06-23T11:28:06Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.083 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.084 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.085 phase <--<-- 2 --- Registration -->-->
0.085 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.085 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#wV5UX6AmILhdAdRS"
],
"response_types": [
"id_token"
]
}
0.241 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.242 RegistrationResponse {
"client_id": "5d8e8dee-199a-4c18-9770-a4de00297eaa",
"client_secret": "mDZh4Ha-6Q-E",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "5d8e8dee-199a-4c18-9770-a4de00297eaa",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#wV5UX6AmILhdAdRS"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.242 phase <--<-- 3 --- AsyncAuthn -->-->
0.243 AuthorizationRequest {
"client_id": "5d8e8dee-199a-4c18-9770-a4de00297eaa",
"nonce": "bh35XzxKBe0i9q52",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "q63Q8gHumf5VASnx"
}
0.243 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=5d8e8dee-199a-4c18-9770-a4de00297eaa&state=q63Q8gHumf5VASnx&response_type=id_token&nonce=bh35XzxKBe0i9q52
0.243 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=5d8e8dee-199a-4c18-9770-a4de00297eaa&state=q63Q8gHumf5VASnx&response_type=id_token&nonce=bh35XzxKBe0i9q52
3.084 http args {}
3.285 response URL with fragment
3.285 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNWQ4ZThkZWUtMTk5YS00YzE4LTk3NzAtYTRkZTAwMjk3ZWFhIl0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODgxLCJpYXQiOjE1Mjk3NTMyODEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImY5NGRiZTRhLTI3MjYtNDc1Yy1hZWM0LTM0ZjM1M2I5YTM2MSIsIm5vbmNlIjoiYmgzNVh6eEtCZTBpOXE1MiIsInJhdCI6MTUyOTc1MzI3OSwic3ViIjoiZm9vQGJhci5jb20ifQ.MGXP0mg310E3QEyc0i7ELxEW3YMYTI3zsIal36olhkXtU7RxRpDz9UnIzWMS3roJAqaibYhGhHGU0fz6GG9ktN3pmKCsrB5zfPYckiNmFaYax6AIpVi13LwnCC3QwwvJWaMiF28-poY4CC6Kc4wIuRE43e5dd0VtfDEaecLLLgoNGIuq9y1R-xvJ3LQHcDZvu3f2aQdF664ybXZEl80aSuXkRHFHz1j9DfQPUxHGsEO7KhwJXBZz_05YKP7_0FRCjKVNriXTJJpYRgplX-68aYyDlTc2wwlOIGEO9AEgyfQhJo2rC0y0I044T3p-H7eGPkePiTORjYL5UzW7qEP5YiC3tMr-Kaf2e98ilWwksAl9eDHayLnYgXmyJu6PpFV6HlMeebmfAXrIWCP-ujIPniy5M2t51s9GrwsjAnO9zP_7eNvP9xa6YLX4GNuSHOg3mxzwR-lV7SYGxRzrxk01kIUEFwcNGYWzoygBdqmHxkuFMlgtZbH1xWPsaP043rTGT9Iinjceo2Sz7mNztHmqCi8UnypBUed2_8Lyb7se0sjz9bKq2ZuRX-15t9_-KQpv8DIWrfbfi_RDx_UIi_JPxJYkRWWoZRaCgK033z_xLqolYjn04TCFHUlWC_mwCFJXWvhR_S1lIWcN7wBe-MVfIPUrcpDwH38uLdtInYUwY00&state=q63Q8gHumf5VASnx
3.285 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNWQ4ZThkZWUtMTk5YS00YzE4LTk3NzAtYTRkZTAwMjk3ZWFhIl0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODgxLCJpYXQiOjE1Mjk3NTMyODEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImY5NGRiZTRhLTI3MjYtNDc1Yy1hZWM0LTM0ZjM1M2I5YTM2MSIsIm5vbmNlIjoiYmgzNVh6eEtCZTBpOXE1MiIsInJhdCI6MTUyOTc1MzI3OSwic3ViIjoiZm9vQGJhci5jb20ifQ.MGXP0mg310E3QEyc0i7ELxEW3YMYTI3zsIal36olhkXtU7RxRpDz9UnIzWMS3roJAqaibYhGhHGU0fz6GG9ktN3pmKCsrB5zfPYckiNmFaYax6AIpVi13LwnCC3QwwvJWaMiF28-poY4CC6Kc4wIuRE43e5dd0VtfDEaecLLLgoNGIuq9y1R-xvJ3LQHcDZvu3f2aQdF664ybXZEl80aSuXkRHFHz1j9DfQPUxHGsEO7KhwJXBZz_05YKP7_0FRCjKVNriXTJJpYRgplX-68aYyDlTc2wwlOIGEO9AEgyfQhJo2rC0y0I044T3p-H7eGPkePiTORjYL5UzW7qEP5YiC3tMr-Kaf2e98ilWwksAl9eDHayLnYgXmyJu6PpFV6HlMeebmfAXrIWCP-ujIPniy5M2t51s9GrwsjAnO9zP_7eNvP9xa6YLX4GNuSHOg3mxzwR-lV7SYGxRzrxk01kIUEFwcNGYWzoygBdqmHxkuFMlgtZbH1xWPsaP043rTGT9Iinjceo2Sz7mNztHmqCi8UnypBUed2_8Lyb7se0sjz9bKq2ZuRX-15t9_-KQpv8DIWrfbfi_RDx_UIi_JPxJYkRWWoZRaCgK033z_xLqolYjn04TCFHUlWC_mwCFJXWvhR_S1lIWcN7wBe-MVfIPUrcpDwH38uLdtInYUwY00', 'state': 'q63Q8gHumf5VASnx'}
3.38 AuthorizationResponse {
"id_token": {
"aud": [
"5d8e8dee-199a-4c18-9770-a4de00297eaa"
],
"auth_time": 1529753136,
"exp": 1529756881,
"iat": 1529753281,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "f94dbe4a-2726-475c-aec4-34f353b9a361",
"nonce": "bh35XzxKBe0i9q52",
"rat": 1529753279,
"sub": "[email protected]"
},
"state": "q63Q8gHumf5VASnx"
}
3.38 phase <--<-- 4 --- AccessToken -->-->
3.38 phase <--<-- 5 --- Note -->-->
4.62 phase <--<-- 6 --- AsyncAuthn -->-->
4.621 AuthorizationRequest {
"client_id": "5d8e8dee-199a-4c18-9770-a4de00297eaa",
"nonce": "8NH7tfCZCMAk8Uuh",
"prompt": [
"login"
],
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "Oi62iUjKaj9lVmHZ"
}
4.621 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=login&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=5d8e8dee-199a-4c18-9770-a4de00297eaa&state=Oi62iUjKaj9lVmHZ&response_type=id_token&nonce=8NH7tfCZCMAk8Uuh
4.621 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=login&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=5d8e8dee-199a-4c18-9770-a4de00297eaa&state=Oi62iUjKaj9lVmHZ&response_type=id_token&nonce=8NH7tfCZCMAk8Uuh
7.854 http args {}
8.072 response URL with fragment
8.073 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNWQ4ZThkZWUtMTk5YS00YzE4LTk3NzAtYTRkZTAwMjk3ZWFhIl0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2ODg2LCJpYXQiOjE1Mjk3NTMyODYsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImEzZThiN2NjLTVlYjMtNDkwOS05NGYyLTViMjM3Y2I0OWQwZSIsIm5vbmNlIjoiOE5IN3RmQ1pDTUFrOFV1aCIsInJhdCI6MTUyOTc1MzI4Mywic3ViIjoiZm9vQGJhci5jb20ifQ.OFVq2z7cpHknZ1yT_fihl5tKWX860IDHy3NzXufsHQtttDaEYVCBsjTyBX1pMLTQ23ikWOrkIR1lfLozt9xbi7hcAPNEinnLydD4YLOk4Jai4qqWoaKUim2XVK0PwhcZVCNlfPPsDh2rw8lJucr2rfqxRq1oMTMeK6BXk98KBP4oZA1rmQiOMINR4l8zGWRAYjneb5SORTbTmxuqU2aYer5XnQSP7xxJMLhBI8AOGWi3jUC5H4lOJDwQqQDqzMddnGI52bpSGzjhcDIJpAZG1dLqPz2ZLLc7gSEMEFxtkjPoZR77FCCNDqr38mtO-1VVsfPQguiBSLnyKuf4ggFR8FmQJGdLCNf_XDvHZfvkl4MU3bIg52fcq0Qyh7ZJVSaayZeeaq91t8CfsjBFAEsi-14UEbuoSEsLLdqOoD1ADn0m5oNZ5YKFgtPaHPNll-DI40EV014EXl8nQVI5Nzhdecf7LTtuSsXDYOcuAoi30dpDJqbQr1jrFn6fsddSevMYAVjGuMLB-dvXGWxJPY0x0FsfofgC4f7Ez6M42xRbbnVnmwqRThNybV_1forr4cSiZ3PncQq8bjABjgXwFSRmbcsIYP66-93CgCeaW6B7luDcbuCtivx_4FotKBkaf6VFrnr9Wj7Iu_qwtu5sJJKreR0aUSf1vS7_NK8D9x-kC8E&state=Oi62iUjKaj9lVmHZ
8.073 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNWQ4ZThkZWUtMTk5YS00YzE4LTk3NzAtYTRkZTAwMjk3ZWFhIl0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2ODg2LCJpYXQiOjE1Mjk3NTMyODYsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImEzZThiN2NjLTVlYjMtNDkwOS05NGYyLTViMjM3Y2I0OWQwZSIsIm5vbmNlIjoiOE5IN3RmQ1pDTUFrOFV1aCIsInJhdCI6MTUyOTc1MzI4Mywic3ViIjoiZm9vQGJhci5jb20ifQ.OFVq2z7cpHknZ1yT_fihl5tKWX860IDHy3NzXufsHQtttDaEYVCBsjTyBX1pMLTQ23ikWOrkIR1lfLozt9xbi7hcAPNEinnLydD4YLOk4Jai4qqWoaKUim2XVK0PwhcZVCNlfPPsDh2rw8lJucr2rfqxRq1oMTMeK6BXk98KBP4oZA1rmQiOMINR4l8zGWRAYjneb5SORTbTmxuqU2aYer5XnQSP7xxJMLhBI8AOGWi3jUC5H4lOJDwQqQDqzMddnGI52bpSGzjhcDIJpAZG1dLqPz2ZLLc7gSEMEFxtkjPoZR77FCCNDqr38mtO-1VVsfPQguiBSLnyKuf4ggFR8FmQJGdLCNf_XDvHZfvkl4MU3bIg52fcq0Qyh7ZJVSaayZeeaq91t8CfsjBFAEsi-14UEbuoSEsLLdqOoD1ADn0m5oNZ5YKFgtPaHPNll-DI40EV014EXl8nQVI5Nzhdecf7LTtuSsXDYOcuAoi30dpDJqbQr1jrFn6fsddSevMYAVjGuMLB-dvXGWxJPY0x0FsfofgC4f7Ez6M42xRbbnVnmwqRThNybV_1forr4cSiZ3PncQq8bjABjgXwFSRmbcsIYP66-93CgCeaW6B7luDcbuCtivx_4FotKBkaf6VFrnr9Wj7Iu_qwtu5sJJKreR0aUSf1vS7_NK8D9x-kC8E', 'state': 'Oi62iUjKaj9lVmHZ'}
8.076 AuthorizationResponse {
"id_token": {
"aud": [
"5d8e8dee-199a-4c18-9770-a4de00297eaa"
],
"auth_time": 1529753285,
"exp": 1529756886,
"iat": 1529753286,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "a3e8b7cc-5eb3-4909-94f2-5b237cb49d0e",
"nonce": "8NH7tfCZCMAk8Uuh",
"rat": 1529753283,
"sub": "[email protected]"
},
"state": "Oi62iUjKaj9lVmHZ"
}
8.077 phase <--<-- 7 --- AccessToken -->-->
8.077 phase <--<-- 8 --- Done -->-->
8.077 end
8.077 assertion VerifyResponse
8.077 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
8.078 assertion MultipleSignOn
8.078 condition multiple-sign-on: status=OK [Verifies that multiple authentications was used in the flow]
8.078 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
multiple-sign-on: status=OK [Verifies that multiple authentications was used in the flow]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/I.F.T.T.s/OP-prompt-none-LoggedIn.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-prompt-none-LoggedIn
Test description: Request with prompt=none when logged in [Basic, Implicit, Hybrid]
Timestamp: 2018-06-23T11:28:13Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.076 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.077 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.077 phase <--<-- 2 --- Registration -->-->
0.077 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.078 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#keYVPGE2rh7Il4Jq"
],
"response_types": [
"id_token"
]
}
0.234 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.235 RegistrationResponse {
"client_id": "a2e474ae-8bc0-41e8-9e5b-754fb1e17cd7",
"client_secret": "kef6Bp-5Tfap",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "a2e474ae-8bc0-41e8-9e5b-754fb1e17cd7",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#keYVPGE2rh7Il4Jq"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.235 phase <--<-- 3 --- AsyncAuthn -->-->
0.235 AuthorizationRequest {
"client_id": "a2e474ae-8bc0-41e8-9e5b-754fb1e17cd7",
"nonce": "dyaFrRmNRQ5OUjh0",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "jZyVoiKv0puunL5l"
}
0.236 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=a2e474ae-8bc0-41e8-9e5b-754fb1e17cd7&state=jZyVoiKv0puunL5l&response_type=id_token&nonce=dyaFrRmNRQ5OUjh0
0.236 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=a2e474ae-8bc0-41e8-9e5b-754fb1e17cd7&state=jZyVoiKv0puunL5l&response_type=id_token&nonce=dyaFrRmNRQ5OUjh0
3.1 http args {}
3.314 response URL with fragment
3.314 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYTJlNDc0YWUtOGJjMC00MWU4LTllNWItNzU0ZmIxZTE3Y2Q3Il0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2ODkxLCJpYXQiOjE1Mjk3NTMyOTEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImI4OWI3ZTc5LTdkYTItNDM5ZC04YWMzLWIyMzY1NjM4MWE0OCIsIm5vbmNlIjoiZHlhRnJSbU5SUTVPVWpoMCIsInJhdCI6MTUyOTc1MzI4OSwic3ViIjoiZm9vQGJhci5jb20ifQ.hQ8bFPjR7dV6MUIT0t7tUHjsGUhJwd5KRH4jU0cU1ljoNiuMGAbkz56CIAGn25uidN3BvNn4Teb-zEcIF8oEI4NIP2LNxQMEoG6O6SzKDcLX80wsh_Ank4h5KxExnu3Q-sARtZnqAsU_S7jcD-yGVpcI3IeVGoDqJA_FV1WFfy38_jre5csSVXhCw7p1QL5RPU9y1T_jXydXw1nLVKTUld2S21qGn8cER-MgwPm4dCX56Qz-FFtEAxptS9h7KnwI9TfHtaCeaFOrMJ95181dy7H8ayqnTsiV6TfEytsJsaBmClLdvnGNOZ2df74RokIRG9B7C4gLXW15BhVKbzmcsJMjpIxetb2jTZfzYmFrBO4h3m5_HmtkuHZixEAjXuMdsn8yMtl7ZewnKFzOvB23bt-MrxPt-OTzBEjl2vZnDU3LXIRd1ZsEJOO9aBMakb7xsWubFRhanzI2rL03XNw-Hz2fMNYWIxaj71bEkm2QutYNzayiPo0bye-ZYREecI0z_qQSdiCVqZf8gMuUT0WaOFR-BGI3DzVUaQhzIQDqOPyReIbdgRzGsxMnwtzsLzkcENZuDngSvUYDQ7JG0ecXzFa6is5KwpxCcOHN36Y_JbCgh88W-raL3Z0fEbmgg3HpaW7-MMB9ZCtHp2shKYe9np07FuS_ojBsM4NQ00x-SXo&state=jZyVoiKv0puunL5l
3.314 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYTJlNDc0YWUtOGJjMC00MWU4LTllNWItNzU0ZmIxZTE3Y2Q3Il0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2ODkxLCJpYXQiOjE1Mjk3NTMyOTEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImI4OWI3ZTc5LTdkYTItNDM5ZC04YWMzLWIyMzY1NjM4MWE0OCIsIm5vbmNlIjoiZHlhRnJSbU5SUTVPVWpoMCIsInJhdCI6MTUyOTc1MzI4OSwic3ViIjoiZm9vQGJhci5jb20ifQ.hQ8bFPjR7dV6MUIT0t7tUHjsGUhJwd5KRH4jU0cU1ljoNiuMGAbkz56CIAGn25uidN3BvNn4Teb-zEcIF8oEI4NIP2LNxQMEoG6O6SzKDcLX80wsh_Ank4h5KxExnu3Q-sARtZnqAsU_S7jcD-yGVpcI3IeVGoDqJA_FV1WFfy38_jre5csSVXhCw7p1QL5RPU9y1T_jXydXw1nLVKTUld2S21qGn8cER-MgwPm4dCX56Qz-FFtEAxptS9h7KnwI9TfHtaCeaFOrMJ95181dy7H8ayqnTsiV6TfEytsJsaBmClLdvnGNOZ2df74RokIRG9B7C4gLXW15BhVKbzmcsJMjpIxetb2jTZfzYmFrBO4h3m5_HmtkuHZixEAjXuMdsn8yMtl7ZewnKFzOvB23bt-MrxPt-OTzBEjl2vZnDU3LXIRd1ZsEJOO9aBMakb7xsWubFRhanzI2rL03XNw-Hz2fMNYWIxaj71bEkm2QutYNzayiPo0bye-ZYREecI0z_qQSdiCVqZf8gMuUT0WaOFR-BGI3DzVUaQhzIQDqOPyReIbdgRzGsxMnwtzsLzkcENZuDngSvUYDQ7JG0ecXzFa6is5KwpxCcOHN36Y_JbCgh88W-raL3Z0fEbmgg3HpaW7-MMB9ZCtHp2shKYe9np07FuS_ojBsM4NQ00x-SXo', 'state': 'jZyVoiKv0puunL5l'}
3.41 AuthorizationResponse {
"id_token": {
"aud": [
"a2e474ae-8bc0-41e8-9e5b-754fb1e17cd7"
],
"auth_time": 1529753285,
"exp": 1529756891,
"iat": 1529753291,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "b89b7e79-7da2-439d-8ac3-b23656381a48",
"nonce": "dyaFrRmNRQ5OUjh0",
"rat": 1529753289,
"sub": "[email protected]"
},
"state": "jZyVoiKv0puunL5l"
}
3.41 phase <--<-- 4 --- AccessToken -->-->
3.41 phase <--<-- 5 --- AsyncAuthn -->-->
3.411 AuthorizationRequest {
"client_id": "a2e474ae-8bc0-41e8-9e5b-754fb1e17cd7",
"nonce": "GBWUgE1RMnERXM9C",
"prompt": [
"none"
],
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "Z0XkShIap0l0WnrQ"
}
3.411 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=a2e474ae-8bc0-41e8-9e5b-754fb1e17cd7&state=Z0XkShIap0l0WnrQ&response_type=id_token&nonce=GBWUgE1RMnERXM9C
3.411 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=a2e474ae-8bc0-41e8-9e5b-754fb1e17cd7&state=Z0XkShIap0l0WnrQ&response_type=id_token&nonce=GBWUgE1RMnERXM9C
4.563 http args {}
4.753 response URL with fragment
4.753 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYTJlNDc0YWUtOGJjMC00MWU4LTllNWItNzU0ZmIxZTE3Y2Q3Il0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2ODkzLCJpYXQiOjE1Mjk3NTMyOTMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImYwZmIxNjhjLTQ3NWQtNGI5NS04ZDhjLTZiNGE2MzJhYjk1ZSIsIm5vbmNlIjoiR0JXVWdFMVJNbkVSWE05QyIsInJhdCI6MTUyOTc1MzI5Miwic3ViIjoiZm9vQGJhci5jb20ifQ.T8dmx09S9lovB6NUac2TMOC4w1MThhzGTV8rp2NFeLwCX1rsGtYlRmpsMyYQIq_KfUcgaHRHvlLWRK9JCLfk3YOCW165c1-7zTB3rtjDjJIoghddLPW7nmC-p9-sg1WtLtFroa-oYQR5habXw8JMT1XczSUvcraDF8mn2LnY2670CtSQaPb8hzpZlFRTyn2ybfr522zkNRGuDtTUCQ3Kkf_OHo1ihIAY9DnHd_yuwaPNu2LgfdvoP5AeJ3bgNA5hYvy0G7z5lzjDtNzhWsaK8YhluLNo4gXGQw8bp5sAnBf1iaupKfNxCx2aB2I9qE9WqBfTn9u4a_9TpvTksVP10x70SoY2r4wy7ntU_JYWVYwmtcd5FCab8R26UPjjcJSHLVFuYld29XmTzi3LncM1R9CBbEfQGxlSeoqYhsJaFURgEldMyIjEJpg7ts6go5igaD3RrSm1Vn0JG3u_-QD2pehHViNdir8FvquD3b64tBWNlOaUwL-rmyl4Z2420eJhH5sP5DnTKIeuCikHFUE0RqlW9M3xzNRw_ShG4nn277-aQLVPnEkz64_2pdCpfDZ1NAtlMKOnFKlsVkGvPF464Tf73ZZZY2-Z-Vr3XYn_S5RjOS86am7NzOS34lcRsFnO0KklUUfp9OUOstniawlqvYiDdqnU1LFG_eV0V_7xoUw&state=Z0XkShIap0l0WnrQ
4.753 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYTJlNDc0YWUtOGJjMC00MWU4LTllNWItNzU0ZmIxZTE3Y2Q3Il0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2ODkzLCJpYXQiOjE1Mjk3NTMyOTMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImYwZmIxNjhjLTQ3NWQtNGI5NS04ZDhjLTZiNGE2MzJhYjk1ZSIsIm5vbmNlIjoiR0JXVWdFMVJNbkVSWE05QyIsInJhdCI6MTUyOTc1MzI5Miwic3ViIjoiZm9vQGJhci5jb20ifQ.T8dmx09S9lovB6NUac2TMOC4w1MThhzGTV8rp2NFeLwCX1rsGtYlRmpsMyYQIq_KfUcgaHRHvlLWRK9JCLfk3YOCW165c1-7zTB3rtjDjJIoghddLPW7nmC-p9-sg1WtLtFroa-oYQR5habXw8JMT1XczSUvcraDF8mn2LnY2670CtSQaPb8hzpZlFRTyn2ybfr522zkNRGuDtTUCQ3Kkf_OHo1ihIAY9DnHd_yuwaPNu2LgfdvoP5AeJ3bgNA5hYvy0G7z5lzjDtNzhWsaK8YhluLNo4gXGQw8bp5sAnBf1iaupKfNxCx2aB2I9qE9WqBfTn9u4a_9TpvTksVP10x70SoY2r4wy7ntU_JYWVYwmtcd5FCab8R26UPjjcJSHLVFuYld29XmTzi3LncM1R9CBbEfQGxlSeoqYhsJaFURgEldMyIjEJpg7ts6go5igaD3RrSm1Vn0JG3u_-QD2pehHViNdir8FvquD3b64tBWNlOaUwL-rmyl4Z2420eJhH5sP5DnTKIeuCikHFUE0RqlW9M3xzNRw_ShG4nn277-aQLVPnEkz64_2pdCpfDZ1NAtlMKOnFKlsVkGvPF464Tf73ZZZY2-Z-Vr3XYn_S5RjOS86am7NzOS34lcRsFnO0KklUUfp9OUOstniawlqvYiDdqnU1LFG_eV0V_7xoUw', 'state': 'Z0XkShIap0l0WnrQ'}
4.757 AuthorizationResponse {
"id_token": {
"aud": [
"a2e474ae-8bc0-41e8-9e5b-754fb1e17cd7"
],
"auth_time": 1529753285,
"exp": 1529756893,
"iat": 1529753293,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "f0fb168c-475d-4b95-8d8c-6b4a632ab95e",
"nonce": "GBWUgE1RMnERXM9C",
"rat": 1529753292,
"sub": "[email protected]"
},
"state": "Z0XkShIap0l0WnrQ"
}
4.757 phase <--<-- 6 --- AccessToken -->-->
4.757 phase <--<-- 7 --- Done -->-->
4.757 end
4.758 assertion VerifyResponse
4.758 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.758 assertion SameAuthn
4.758 condition same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
4.758 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/I.F.T.T.s/OP-prompt-none-NotLoggedIn.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-prompt-none-NotLoggedIn
Test description: Request with prompt=none when not logged in
Timestamp: 2018-06-23T11:28:24Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.775 phase <--<-- 1 --- Webfinger -->-->
1.775 not expected to do WebFinger
1.775 phase <--<-- 2 --- Discovery -->-->
1.776 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.858 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.86 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.86 phase <--<-- 3 --- Registration -->-->
1.86 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.86 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#vwfMQfEj5lDgJzQp"
],
"response_types": [
"id_token"
]
}
2.015 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
2.016 RegistrationResponse {
"client_id": "fe215734-4d32-4246-ba54-776d76e636fa",
"client_secret": "r~hhZn-jPj~D",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "fe215734-4d32-4246-ba54-776d76e636fa",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#vwfMQfEj5lDgJzQp"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
2.016 phase <--<-- 4 --- AsyncAuthn -->-->
2.017 AuthorizationRequest {
"client_id": "fe215734-4d32-4246-ba54-776d76e636fa",
"nonce": "okBftjQHtpTfl80W",
"prompt": [
"none"
],
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "SsiBgfXm8MQcD1Nh"
}
2.017 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=fe215734-4d32-4246-ba54-776d76e636fa&state=SsiBgfXm8MQcD1Nh&response_type=id_token&nonce=okBftjQHtpTfl80W
2.017 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=fe215734-4d32-4246-ba54-776d76e636fa&state=SsiBgfXm8MQcD1Nh&response_type=id_token&nonce=okBftjQHtpTfl80W
2.372 http args {}
2.576 response URL with fragment
2.577 response error=login_required&error_debug=Prompt+%2522none%2522+was+requested%252C+but+no+existing+login+session+was+found&error_description=The+Authorization+Server+requires+End-User+authentication&state=SsiBgfXm8MQcD1Nh
2.577 response {'error_debug': 'Prompt %22none%22 was requested%2C but no existing login session was found', 'error_description': 'The Authorization Server requires End-User authentication', 'state': 'SsiBgfXm8MQcD1Nh', 'error': 'login_required'}
2.577 AuthorizationErrorResponse {
"error": "login_required",
"error_debug": "Prompt %22none%22 was requested%2C but no existing login session was found",
"error_description": "The Authorization Server requires End-User authentication",
"state": "SsiBgfXm8MQcD1Nh"
}
2.577 AuthorizationErrorResponse {
"error": "login_required",
"error_debug": "Prompt %22none%22 was requested%2C but no existing login session was found",
"error_description": "The Authorization Server requires End-User authentication",
"state": "SsiBgfXm8MQcD1Nh"
}
2.578 phase <--<-- 5 --- Done -->-->
2.578 end
2.578 assertion VerifyErrorMessage
2.578 condition verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
2.578 condition Done: status=OK
============================================================
Conditions
verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/I.F.T.T.s/OP-redirect_uri-Missing.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-Missing
Test description: Reject request without redirect_uri when multiple registered
Timestamp: 2018-06-23T11:28:34Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.082 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.083 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.084 phase <--<-- 2 --- Registration -->-->
0.084 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb', 'https://op.certification.openid.net:61353/cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.084 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb",
"https://op.certification.openid.net:61353/cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#skPQSqMl8N64N4NA"
],
"response_types": [
"id_token"
]
}
0.243 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.244 RegistrationResponse {
"client_id": "f50dd4d4-d2de-49da-bf8b-cda63737b498",
"client_secret": "G2.fU3cua9rY",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "f50dd4d4-d2de-49da-bf8b-cda63737b498",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb",
"https://op.certification.openid.net:61353/cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#skPQSqMl8N64N4NA"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.244 phase <--<-- 3 --- Note -->-->
============================================================
Conditions
============================================================
RESULT: PARTIAL RESULT |
Text | hydra/internal/certification/I.F.T.T.s/OP-redirect_uri-NotReg.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-NotReg
Test description: Sent redirect_uri does not match a registered redirect_uri
Timestamp: 2018-06-23T11:28:37Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.074 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.076 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.076 phase <--<-- 2 --- Registration -->-->
0.076 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.076 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#7WYT4hJnkpLPGLx0"
],
"response_types": [
"id_token"
]
}
0.282 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.283 RegistrationResponse {
"client_id": "f2248d9f-1149-4b83-bc84-a451076eb410",
"client_secret": "4xeSK1Sm-OKa",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "f2248d9f-1149-4b83-bc84-a451076eb410",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#7WYT4hJnkpLPGLx0"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.283 phase <--<-- 3 --- Note -->-->
============================================================
Conditions
============================================================
RESULT: PARTIAL RESULT |
Text | hydra/internal/certification/I.F.T.T.s/OP-redirect_uri-Query-Added.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-Query-Added
Test description: Request with redirect_uri with query component when registered redirect_uri has no query component
Timestamp: 2018-06-23T11:28:48Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.092 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.093 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.093 phase <--<-- 2 --- Registration -->-->
0.093 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.093 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#e0BI4jpM2zMv2ZmL"
],
"response_types": [
"id_token"
]
}
0.249 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.25 RegistrationResponse {
"client_id": "d2496162-aff8-486c-a9d1-374d3e73fa3a",
"client_secret": "_8QErLmVqlhm",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "d2496162-aff8-486c-a9d1-374d3e73fa3a",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#e0BI4jpM2zMv2ZmL"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.25 phase <--<-- 3 --- Note -->-->
============================================================
Conditions
============================================================
RESULT: PARTIAL RESULT |
Text | hydra/internal/certification/I.F.T.T.s/OP-redirect_uri-Query-Mismatch.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-Query-Mismatch
Test description: Rejects redirect_uri when query parameter does not match what is registed
Timestamp: 2018-06-23T11:28:51Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.079 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.08 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.08 phase <--<-- 2 --- Registration -->-->
0.08 register kwargs:{'application_name': 'OIC test tool', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'redirect_uri': ['https://op.certification.openid.net:61353/authz_cb?foo=bar']}
0.081 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#9jkQsZoejhh95VxB"
],
"response_types": [
"id_token"
]
}
0.283 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.284 RegistrationResponse {
"client_id": "6849593a-90ea-4d53-9507-c0beca40add9",
"client_secret": "kzTM9UvkYz9P",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "6849593a-90ea-4d53-9507-c0beca40add9",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#9jkQsZoejhh95VxB"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.284 phase <--<-- 3 --- Note -->-->
============================================================
Conditions
============================================================
RESULT: PARTIAL RESULT |
Text | hydra/internal/certification/I.F.T.T.s/OP-redirect_uri-Query-OK.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-Query-OK
Test description: Request with a redirect_uri with a query component when a redirect_uri with the same query component is registered
Timestamp: 2018-06-23T11:28:56Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.081 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.083 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.083 phase <--<-- 2 --- Registration -->-->
0.083 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb?foo=bar'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.083 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb?foo=bar"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#9RHtaIv7JmbMCIIr"
],
"response_types": [
"id_token"
]
}
0.239 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.24 RegistrationResponse {
"client_id": "e8fc3075-3b6c-4df0-8ec8-1ad25934d9d0",
"client_secret": "opKHhzsU-XXY",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "e8fc3075-3b6c-4df0-8ec8-1ad25934d9d0",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb?foo=bar"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#9RHtaIv7JmbMCIIr"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.24 phase <--<-- 3 --- AsyncAuthn -->-->
0.241 AuthorizationRequest {
"client_id": "e8fc3075-3b6c-4df0-8ec8-1ad25934d9d0",
"nonce": "T2JJyIRFNMpEloX9",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb?foo=bar",
"response_type": "id_token",
"scope": "openid",
"state": "DDnISWJTEcFlXmNG"
}
0.241 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb%3Ffoo%3Dbar&client_id=e8fc3075-3b6c-4df0-8ec8-1ad25934d9d0&state=DDnISWJTEcFlXmNG&response_type=id_token&nonce=T2JJyIRFNMpEloX9
0.241 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb%3Ffoo%3Dbar&client_id=e8fc3075-3b6c-4df0-8ec8-1ad25934d9d0&state=DDnISWJTEcFlXmNG&response_type=id_token&nonce=T2JJyIRFNMpEloX9
3.419 http args {'foo': 'bar'}
3.592 response URL with fragment
3.592 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZThmYzMwNzUtM2I2Yy00ZGYwLThlYzgtMWFkMjU5MzRkOWQwIl0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTM2LCJpYXQiOjE1Mjk3NTMzMzYsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjM1NWQxYzZjLTkwN2QtNGQzNi1iZTM4LTA2OTgwZDk5OTAzMyIsIm5vbmNlIjoiVDJKSnlJUkZOTXBFbG9YOSIsInJhdCI6MTUyOTc1MzMzMywic3ViIjoiZm9vQGJhci5jb20ifQ.dL0u0alIeaRzue0UxvOmY2GGD5n_S1rdDwuIWmUkXxl9UmUBxv9G8dyzdZy0aUTnhQJKFOqpDYKN8sHgNMpuPqH0i-nNI_S_bx278yqJJwZ9Difs_Cf-vNw4YcEcUaUfeH_yhNCCJVXBUsvU67QY47ZH2HCYP7g0w4uXqVnwwbDJgHxnN4SbofRze0sIsYnsO8uI5SV_h0eMQxndDat17B4xZpZVVK9Dzc2UZtq8PUTuJgw_MAy94YcCkQSVSjt44S8dXevU8IP2dSt6FFj-5SuDa7vM7OPcccC9KJ8unTwEPlw_EyXqDVYiMoR8gtjdyn9idwku-Un77TTx_WSNRep48KvCet5amPlH4V_3fMpuUoQegvvbAE3ENofctgL1DHv_2F9JZ4sBaB3WDmxOSf2JoE94WY9w6pwiEFwNafiCFlGUACsY2lx1NIOb2tYcst-k21-ivIa2HaJoHX2v05HL1vX_1Qu_5hspI12v2T9m3i4U89z2WVq8QutCSNewygbcmVAGNTKli_eoAtJxF5G_8b5cpa-ifAZL3Idd9juLUrgswSJdahXYoj88Iy8NlHtCWuV63rdPZG0l8nM8sMvW9bLcBVCtBBy8AD4Zlnol_zONyzCfoqxtMrNzUaa6l3dlqFMbAsJlqHVHmOyUHeHU8DE-eOOundOCJBW3VsI&state=DDnISWJTEcFlXmNG
3.593 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZThmYzMwNzUtM2I2Yy00ZGYwLThlYzgtMWFkMjU5MzRkOWQwIl0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTM2LCJpYXQiOjE1Mjk3NTMzMzYsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjM1NWQxYzZjLTkwN2QtNGQzNi1iZTM4LTA2OTgwZDk5OTAzMyIsIm5vbmNlIjoiVDJKSnlJUkZOTXBFbG9YOSIsInJhdCI6MTUyOTc1MzMzMywic3ViIjoiZm9vQGJhci5jb20ifQ.dL0u0alIeaRzue0UxvOmY2GGD5n_S1rdDwuIWmUkXxl9UmUBxv9G8dyzdZy0aUTnhQJKFOqpDYKN8sHgNMpuPqH0i-nNI_S_bx278yqJJwZ9Difs_Cf-vNw4YcEcUaUfeH_yhNCCJVXBUsvU67QY47ZH2HCYP7g0w4uXqVnwwbDJgHxnN4SbofRze0sIsYnsO8uI5SV_h0eMQxndDat17B4xZpZVVK9Dzc2UZtq8PUTuJgw_MAy94YcCkQSVSjt44S8dXevU8IP2dSt6FFj-5SuDa7vM7OPcccC9KJ8unTwEPlw_EyXqDVYiMoR8gtjdyn9idwku-Un77TTx_WSNRep48KvCet5amPlH4V_3fMpuUoQegvvbAE3ENofctgL1DHv_2F9JZ4sBaB3WDmxOSf2JoE94WY9w6pwiEFwNafiCFlGUACsY2lx1NIOb2tYcst-k21-ivIa2HaJoHX2v05HL1vX_1Qu_5hspI12v2T9m3i4U89z2WVq8QutCSNewygbcmVAGNTKli_eoAtJxF5G_8b5cpa-ifAZL3Idd9juLUrgswSJdahXYoj88Iy8NlHtCWuV63rdPZG0l8nM8sMvW9bLcBVCtBBy8AD4Zlnol_zONyzCfoqxtMrNzUaa6l3dlqFMbAsJlqHVHmOyUHeHU8DE-eOOundOCJBW3VsI', 'state': 'DDnISWJTEcFlXmNG'}
3.681 AuthorizationResponse {
"id_token": {
"aud": [
"e8fc3075-3b6c-4df0-8ec8-1ad25934d9d0"
],
"auth_time": 1529753285,
"exp": 1529756936,
"iat": 1529753336,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "355d1c6c-907d-4d36-be38-06980d999033",
"nonce": "T2JJyIRFNMpEloX9",
"rat": 1529753333,
"sub": "[email protected]"
},
"state": "DDnISWJTEcFlXmNG"
}
3.681 phase <--<-- 4 --- Done -->-->
3.681 end
3.682 assertion VerifyResponse
3.682 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.682 assertion CheckQueryPart
3.682 condition check-query-part: status=OK [Check that a query part send in the Authorization Request is returned in the Authorization response.]
3.682 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
check-query-part: status=OK [Check that a query part send in the Authorization Request is returned in the Authorization response.]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/I.F.T.T.s/OP-redirect_uri-RegFrag.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-redirect_uri-RegFrag
Test description: Reject registration where a redirect_uri has a fragment
Timestamp: 2018-06-23T11:28:58Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.001 phase <--<-- 1 --- Discovery -->-->
0.001 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Registration -->-->
0.075 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb#foobar'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.075 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb#foobar"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#s9hMCI8H4YGxdNGk"
],
"response_types": [
"id_token"
]
}
0.183 http response url:https://oidc-certification.ory.sh:8443/clients status_code:400 message:{"error":"invalid_request","error_description":"The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed","error_hint":"Redirect URIs must not contain fragments (#)","status_code":400}
0.183 ErrorResponse {
"error": "invalid_request",
"error_description": "The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed",
"error_hint": "Redirect URIs must not contain fragments (#)",
"status_code": 400
}
0.183 exception RegistrationError:{'error_description': 'The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed', 'status_code': 400, 'error': 'invalid_request', 'error_hint': 'Redirect URIs must not contain fragments (#)'}
0.183 event got expected exception RegistrationError
0.184 phase <--<-- 3 --- Done -->-->
0.184 end
0.184 assertion VerifyErrorMessage
0.184 condition verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
0.184 condition Done: status=OK
============================================================
Conditions
verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/I.F.T.T.s/OP-Registration-Dynamic.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-Dynamic
Test description: Client registration request
Timestamp: 2018-06-23T11:27:00Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.088 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.09 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.09 phase <--<-- 2 --- Registration -->-->
0.09 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.09 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#zbrFNxSPgMX1iqWC"
],
"response_types": [
"id_token"
]
}
0.249 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.249 RegistrationResponse {
"client_id": "26e6c86b-2453-4819-a7a1-a3449436b059",
"client_secret": "Fci0YbLUz0aE",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "26e6c86b-2453-4819-a7a1-a3449436b059",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#zbrFNxSPgMX1iqWC"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.25 phase <--<-- 3 --- Done -->-->
0.25 end
0.25 assertion CheckHTTPResponse
0.25 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.25 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/I.F.T.T.s/OP-Registration-Endpoint.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-Endpoint
Test description: Verify that registration_endpoint is published
Timestamp: 2018-06-23T11:27:01Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.075 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.076 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.076 phase <--<-- 2 --- Done -->-->
0.076 end
0.076 assertion VerifyOPHasRegistrationEndpoint
0.076 condition verify-op-has-registration-endpoint: status=OK [Verify that the OP has a registration endpoint]
0.076 condition Done: status=OK
============================================================
Conditions
verify-op-has-registration-endpoint: status=OK [Verify that the OP has a registration endpoint]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/I.F.T.T.s/OP-Registration-logo_uri.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-logo_uri
Test description: Registration with logo_uri
Timestamp: 2018-06-23T11:27:08Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.352 phase <--<-- 1 --- Webfinger -->-->
1.352 not expected to do WebFinger
1.352 phase <--<-- 2 --- Discovery -->-->
1.352 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.48 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.481 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.481 phase <--<-- 3 --- Registration -->-->
1.481 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'logo_uri': 'https://op.certification.openid.net:61353/static/logo.png'}
1.482 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"logo_uri": "https://op.certification.openid.net:61353/static/logo.png",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#eAsB2gJ7Ol2ZxVhF"
],
"response_types": [
"id_token"
]
}
1.641 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.642 RegistrationResponse {
"client_id": "4034ce6b-b298-4152-9726-9eaadf0bebec",
"client_secret": "aFYB1ALLgpto",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "4034ce6b-b298-4152-9726-9eaadf0bebec",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"logo_uri": "https://op.certification.openid.net:61353/static/logo.png",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#eAsB2gJ7Ol2ZxVhF"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.642 phase <--<-- 4 --- AsyncAuthn -->-->
1.642 AuthorizationRequest {
"client_id": "4034ce6b-b298-4152-9726-9eaadf0bebec",
"nonce": "UmVbFc02d3W3l3vo",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "2mWYQyqZuIDCVnrR"
}
1.643 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=4034ce6b-b298-4152-9726-9eaadf0bebec&state=2mWYQyqZuIDCVnrR&response_type=id_token&nonce=UmVbFc02d3W3l3vo
1.643 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=4034ce6b-b298-4152-9726-9eaadf0bebec&state=2mWYQyqZuIDCVnrR&response_type=id_token&nonce=UmVbFc02d3W3l3vo
3.849 http args {}
4.046 response URL with fragment
4.046 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNDAzNGNlNmItYjI5OC00MTUyLTk3MjYtOWVhYWRmMGJlYmVjIl0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODI3LCJpYXQiOjE1Mjk3NTMyMjcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjYzOTk1YzQ4LTIxZmItNDVlYy1iZmQ5LWY2MjA4MTI1MjRlMiIsIm5vbmNlIjoiVW1WYkZjMDJkM1czbDN2byIsInJhdCI6MTUyOTc1MzIyNSwic3ViIjoiZm9vQGJhci5jb20ifQ.aD4272wdBdtvf7U9sm0-2gEP6zqlsc8M8ugip5-ae8z70Kr1vn6PntbkSgKAvEx5LEAUzPfIUnoLf-z-g91NtrAbr3fAFXjcP67zNcUQaYwExe_6ZQuD-9_cWqDJ0IvmYev-63yIcrebG-wp2UADRwfqEp9eGUiIczTvo1Uo4AotaCnd8ZsIBpXD8hGEldc8PKixfLnqVyKQsK63IGmpHMSVbK0_l_TYYCjLPlUiQnZylDyRqHBhUFG4AA3JMKSQYfuO6LGw16VQIk3_yvIYagsAILSxWNyP4eJ4hu7oMH43Sm6XAyb8tFvZvdsC4cWDN8TEVOnPYZ_8IlwYaSvv8Hky-GUnAi5RVmAFriH8mGjFxbMVFkCDjbrpmSun2vLLTBEfBF9iBQZ2fRU5IIPbQzp5bzSNWEW-0huoQgn0-SS660_zQRl0d88XEtnjUdpxRo76Trs2dn0owOshZxfWyNEMn0hkfFKTrnB2y5dAJbrwt8TL-fGk0PzLrpXshMO7BSuDTOpch4ggxm9sL_PoYUwwLuJYBH3-uVnKN5DtAktRwcnOcA28C3tKV44EOCL_zZrXBOzK42xOvmQehI2wVy8jTRAfKt-Rwx6eWElvVEaz1WlQHl2Wo2IPnlKeQ-Z8LuZZ0dsUmetqKLfd6fdKEGQPWVv-1nVReCigXFXhzFs&state=2mWYQyqZuIDCVnrR
4.047 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNDAzNGNlNmItYjI5OC00MTUyLTk3MjYtOWVhYWRmMGJlYmVjIl0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODI3LCJpYXQiOjE1Mjk3NTMyMjcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjYzOTk1YzQ4LTIxZmItNDVlYy1iZmQ5LWY2MjA4MTI1MjRlMiIsIm5vbmNlIjoiVW1WYkZjMDJkM1czbDN2byIsInJhdCI6MTUyOTc1MzIyNSwic3ViIjoiZm9vQGJhci5jb20ifQ.aD4272wdBdtvf7U9sm0-2gEP6zqlsc8M8ugip5-ae8z70Kr1vn6PntbkSgKAvEx5LEAUzPfIUnoLf-z-g91NtrAbr3fAFXjcP67zNcUQaYwExe_6ZQuD-9_cWqDJ0IvmYev-63yIcrebG-wp2UADRwfqEp9eGUiIczTvo1Uo4AotaCnd8ZsIBpXD8hGEldc8PKixfLnqVyKQsK63IGmpHMSVbK0_l_TYYCjLPlUiQnZylDyRqHBhUFG4AA3JMKSQYfuO6LGw16VQIk3_yvIYagsAILSxWNyP4eJ4hu7oMH43Sm6XAyb8tFvZvdsC4cWDN8TEVOnPYZ_8IlwYaSvv8Hky-GUnAi5RVmAFriH8mGjFxbMVFkCDjbrpmSun2vLLTBEfBF9iBQZ2fRU5IIPbQzp5bzSNWEW-0huoQgn0-SS660_zQRl0d88XEtnjUdpxRo76Trs2dn0owOshZxfWyNEMn0hkfFKTrnB2y5dAJbrwt8TL-fGk0PzLrpXshMO7BSuDTOpch4ggxm9sL_PoYUwwLuJYBH3-uVnKN5DtAktRwcnOcA28C3tKV44EOCL_zZrXBOzK42xOvmQehI2wVy8jTRAfKt-Rwx6eWElvVEaz1WlQHl2Wo2IPnlKeQ-Z8LuZZ0dsUmetqKLfd6fdKEGQPWVv-1nVReCigXFXhzFs', 'state': '2mWYQyqZuIDCVnrR'}
4.133 AuthorizationResponse {
"id_token": {
"aud": [
"4034ce6b-b298-4152-9726-9eaadf0bebec"
],
"auth_time": 1529753136,
"exp": 1529756827,
"iat": 1529753227,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "63995c48-21fb-45ec-bfd9-f620812524e2",
"nonce": "UmVbFc02d3W3l3vo",
"rat": 1529753225,
"sub": "[email protected]"
},
"state": "2mWYQyqZuIDCVnrR"
}
4.133 phase <--<-- 5 --- Done -->-->
4.134 end
4.134 assertion VerifyAuthnResponse
4.134 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
4.134 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/I.F.T.T.s/OP-Registration-policy_uri.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-policy_uri
Test description: Registration with policy_uri
Timestamp: 2018-06-23T11:27:13Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
0.99 phase <--<-- 1 --- Webfinger -->-->
0.99 not expected to do WebFinger
0.99 phase <--<-- 2 --- Discovery -->-->
0.99 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.065 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.067 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.067 phase <--<-- 3 --- Registration -->-->
1.067 register kwargs:{'application_name': 'OIC test tool', 'policy_uri': 'https://op.certification.openid.net:61353/static/policy.html', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.067 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"policy_uri": "https://op.certification.openid.net:61353/static/policy.html",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#U9xLTrHtq372wUTA"
],
"response_types": [
"id_token"
]
}
1.256 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.257 RegistrationResponse {
"client_id": "c8b7f7fa-9322-431c-95d0-70f0c689343c",
"client_secret": "T7kISiPlG5DT",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "c8b7f7fa-9322-431c-95d0-70f0c689343c",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"policy_uri": "https://op.certification.openid.net:61353/static/policy.html",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#U9xLTrHtq372wUTA"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.257 phase <--<-- 4 --- AsyncAuthn -->-->
1.257 AuthorizationRequest {
"client_id": "c8b7f7fa-9322-431c-95d0-70f0c689343c",
"nonce": "jWNEXypomelHmRyv",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "W0XLn0WL33ENJPd8"
}
1.258 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=c8b7f7fa-9322-431c-95d0-70f0c689343c&state=W0XLn0WL33ENJPd8&response_type=id_token&nonce=jWNEXypomelHmRyv
1.258 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=c8b7f7fa-9322-431c-95d0-70f0c689343c&state=W0XLn0WL33ENJPd8&response_type=id_token&nonce=jWNEXypomelHmRyv
3.699 http args {}
3.869 response URL with fragment
3.87 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYzhiN2Y3ZmEtOTMyMi00MzFjLTk1ZDAtNzBmMGM2ODkzNDNjIl0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODMzLCJpYXQiOjE1Mjk3NTMyMzMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjRiMjM5YjM2LWI3NzctNDlmOS1hZTMwLTRhM2JlODVmYWM2MiIsIm5vbmNlIjoialdORVh5cG9tZWxIbVJ5diIsInJhdCI6MTUyOTc1MzIzMCwic3ViIjoiZm9vQGJhci5jb20ifQ.RfzfRlzV_uQcpQlVwNJ3q-5eWpGWopQOssHQTuczBh8OylZWR_jRYO6F_XQaChB4Q23P60y8-QShe9A0Vz50kUfOvRL6QHSyMYdwOY1KUwVLBTp9ajEDs3SLkBi5-1P8OTv7eHPu-TvERvjzGZ_wOxoobIKo4VXLRgiRYwkKAASpz2ySPxkZKv92RpyH-UB9KQCHLGvAPBm4f-5ELNoNygFArWM2zlP63wnWZDtPRhooIDNMBns33sKtFptqC0iRNOJB11O8Iov1A-2eMD8StGzCAxK19OKiWus9O4Wy5c-dopAr27gpFXMQEbU-Of5sILheUNy6vuZmab10JO-fx1nDziacJ4T4pT1H-oJYzR8-wvvV1BWw8u9ZCPwkKARhuUp-ZstaQ7QkvTvipoMLL1zXley52YKQTMGgxdqqIBc80sbacg--KbAjOxZgsYAeVgNrjyzXwRtxIOFMZKJC1tWYJToEUCFYtSGVjDnU3y7M_iTmhlvAoyhlJm4zO7raz2UShhDjX65-EbJPWe_J46-JK5HDAA7QaBgJY802OuhQP1lT8xOi_6NqrKuG9QePcjMqFR0EZlMg4mueV3ljIheJo_mOxU55IbrVccNw0PeYPnl0bxZG5PpAGFfdvRGLma5yji7s4lrrkc3ntjMNNZrROiF-ArnuprVBUJVxveM&state=W0XLn0WL33ENJPd8
3.87 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYzhiN2Y3ZmEtOTMyMi00MzFjLTk1ZDAtNzBmMGM2ODkzNDNjIl0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODMzLCJpYXQiOjE1Mjk3NTMyMzMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjRiMjM5YjM2LWI3NzctNDlmOS1hZTMwLTRhM2JlODVmYWM2MiIsIm5vbmNlIjoialdORVh5cG9tZWxIbVJ5diIsInJhdCI6MTUyOTc1MzIzMCwic3ViIjoiZm9vQGJhci5jb20ifQ.RfzfRlzV_uQcpQlVwNJ3q-5eWpGWopQOssHQTuczBh8OylZWR_jRYO6F_XQaChB4Q23P60y8-QShe9A0Vz50kUfOvRL6QHSyMYdwOY1KUwVLBTp9ajEDs3SLkBi5-1P8OTv7eHPu-TvERvjzGZ_wOxoobIKo4VXLRgiRYwkKAASpz2ySPxkZKv92RpyH-UB9KQCHLGvAPBm4f-5ELNoNygFArWM2zlP63wnWZDtPRhooIDNMBns33sKtFptqC0iRNOJB11O8Iov1A-2eMD8StGzCAxK19OKiWus9O4Wy5c-dopAr27gpFXMQEbU-Of5sILheUNy6vuZmab10JO-fx1nDziacJ4T4pT1H-oJYzR8-wvvV1BWw8u9ZCPwkKARhuUp-ZstaQ7QkvTvipoMLL1zXley52YKQTMGgxdqqIBc80sbacg--KbAjOxZgsYAeVgNrjyzXwRtxIOFMZKJC1tWYJToEUCFYtSGVjDnU3y7M_iTmhlvAoyhlJm4zO7raz2UShhDjX65-EbJPWe_J46-JK5HDAA7QaBgJY802OuhQP1lT8xOi_6NqrKuG9QePcjMqFR0EZlMg4mueV3ljIheJo_mOxU55IbrVccNw0PeYPnl0bxZG5PpAGFfdvRGLma5yji7s4lrrkc3ntjMNNZrROiF-ArnuprVBUJVxveM', 'state': 'W0XLn0WL33ENJPd8'}
3.953 AuthorizationResponse {
"id_token": {
"aud": [
"c8b7f7fa-9322-431c-95d0-70f0c689343c"
],
"auth_time": 1529753136,
"exp": 1529756833,
"iat": 1529753233,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "4b239b36-b777-49f9-ae30-4a3be85fac62",
"nonce": "jWNEXypomelHmRyv",
"rat": 1529753230,
"sub": "[email protected]"
},
"state": "W0XLn0WL33ENJPd8"
}
3.953 phase <--<-- 5 --- Done -->-->
3.953 end
3.954 assertion VerifyAuthnResponse
3.954 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
3.954 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/I.F.T.T.s/OP-Registration-Sector-Bad.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-Sector-Bad
Test description: Incorrect registration of sector_identifier_uri
Timestamp: 2018-06-23T11:27:02Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.108 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.109 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.109 phase <--<-- 2 --- Registration -->-->
0.11 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'sector_identifier_uri': 'https://op.certification.openid.net:61353/export/siu.json', 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.11 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#17iLbzPCPFY2UkLz"
],
"response_types": [
"id_token"
],
"sector_identifier_uri": "https://op.certification.openid.net:61353/export/siu.json"
}
0.327 http response url:https://oidc-certification.ory.sh:8443/clients status_code:400 message:{"error":"invalid_request","error_description":"The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed","error_hint":"Make sure that the various parameters are correct, be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.","status_code":400,"error_debug":"Redirect URL \"https://op.certification.openid.net:61353/authz_cb\" does not match values from sector_identifier_uri."}
0.327 ErrorResponse {
"error": "invalid_request",
"error_debug": "Redirect URL \"https://op.certification.openid.net:61353/authz_cb\" does not match values from sector_identifier_uri.",
"error_description": "The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed",
"error_hint": "Make sure that the various parameters are correct, be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.",
"status_code": 400
}
0.328 exception RegistrationError:{'error_debug': 'Redirect URL "https://op.certification.openid.net:61353/authz_cb" does not match values from sector_identifier_uri.', 'error_description': 'The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed', 'status_code': 400, 'error': 'invalid_request', 'error_hint': 'Make sure that the various parameters are correct, be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.'}
0.328 event got expected exception RegistrationError
0.328 phase <--<-- 3 --- Done -->-->
0.328 end
0.328 condition Done: status=OK
============================================================
Conditions
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/I.F.T.T.s/OP-Registration-tos_uri.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Registration-tos_uri
Test description: Registration with tos_uri
Timestamp: 2018-06-23T11:27:19Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.594 phase <--<-- 1 --- Webfinger -->-->
1.595 not expected to do WebFinger
1.595 phase <--<-- 2 --- Discovery -->-->
1.595 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.708 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.709 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.709 phase <--<-- 3 --- Registration -->-->
1.709 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'tos_uri': 'https://op.certification.openid.net:61353/static/tos.html', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.71 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#N9ykU5l9adMGbSbA"
],
"response_types": [
"id_token"
],
"tos_uri": "https://op.certification.openid.net:61353/static/tos.html"
}
1.864 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.865 RegistrationResponse {
"client_id": "4ac92663-2547-4661-976d-f2aa2c6d8059",
"client_secret": "lqbnPdYiAPjX",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "4ac92663-2547-4661-976d-f2aa2c6d8059",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#N9ykU5l9adMGbSbA"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"tos_uri": "https://op.certification.openid.net:61353/static/tos.html",
"userinfo_signed_response_alg": "none"
}
1.865 phase <--<-- 4 --- AsyncAuthn -->-->
1.866 AuthorizationRequest {
"client_id": "4ac92663-2547-4661-976d-f2aa2c6d8059",
"nonce": "yGmMqghpluqW1AYU",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "OOG78CudGb4aOV91"
}
1.866 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=4ac92663-2547-4661-976d-f2aa2c6d8059&state=OOG78CudGb4aOV91&response_type=id_token&nonce=yGmMqghpluqW1AYU
1.866 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=4ac92663-2547-4661-976d-f2aa2c6d8059&state=OOG78CudGb4aOV91&response_type=id_token&nonce=yGmMqghpluqW1AYU
4.631 http args {}
4.803 response URL with fragment
4.803 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNGFjOTI2NjMtMjU0Ny00NjYxLTk3NmQtZjJhYTJjNmQ4MDU5Il0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODM5LCJpYXQiOjE1Mjk3NTMyMzksImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjU2MDU3Y2VjLWZlMTYtNDhmMy04OWE4LWU2M2UyNjJhZjZmYyIsIm5vbmNlIjoieUdtTXFnaHBsdXFXMUFZVSIsInJhdCI6MTUyOTc1MzIzNywic3ViIjoiZm9vQGJhci5jb20ifQ.jyEX4QvUpZFtxFdtwXVeHHKXqbnFMU8K8CoU0QFp3MgfpgC6wLTlvJUoDd0bNc7_BGTQS2F8jIv7nx93Q_X1HVLtq_gN4ZvAIh31CjvHeyWMzqOXKscMNPU3Ewdn71hXZ_RzsUJcyiNQtDx-mo8tHvppt1z55sLMJiXGg-JPbXRfiB--W7OwvNPpU-Rz7S0tEOIpgrJc2PHF79WMq8YgHf3N7Nnen8fMJAhHk9iKavF8-d6IswQqrRQRFmHh4d3rz2Dvo1OFgRROLyFQXmGCP1_efnTuDtQWkQNfnH9EMgnwpxGeJOJzSA01vU72-f4Z45Dfnq0NwMu6RhpQ4Un7CykaQehF1dNeVZ9j5Dr8BYX8V1O7S-O9UPV1gxWsBKgCHBK8kyyv_p8gEtocjlD9TON1AWLoDVMuQ8YygAeFdbLDxb4zxOe0QpHNH_jmcmBhPdOyrG-FlrP-O6-5FyIGgt7J5VhvPpuSo1CXdVtYYH3Ik_WTolyIG1_EkummbGzA5RIezX9zKPr9cpoQmhlENwflKk7LssggGgCjZ4hNUquPGY9U4SbSGM6hA8No_06RxrcCArBLH3-JB6-6V2hxIdSQFPyA9DMiFnX6Ayv0ZciRfDmNMdDfj9hbgKu8Fr3NafWMsX-S67uuYS7O9rMXLgLLmpRNbXcL-xptU6nEiL8&state=OOG78CudGb4aOV91
4.804 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNGFjOTI2NjMtMjU0Ny00NjYxLTk3NmQtZjJhYTJjNmQ4MDU5Il0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODM5LCJpYXQiOjE1Mjk3NTMyMzksImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjU2MDU3Y2VjLWZlMTYtNDhmMy04OWE4LWU2M2UyNjJhZjZmYyIsIm5vbmNlIjoieUdtTXFnaHBsdXFXMUFZVSIsInJhdCI6MTUyOTc1MzIzNywic3ViIjoiZm9vQGJhci5jb20ifQ.jyEX4QvUpZFtxFdtwXVeHHKXqbnFMU8K8CoU0QFp3MgfpgC6wLTlvJUoDd0bNc7_BGTQS2F8jIv7nx93Q_X1HVLtq_gN4ZvAIh31CjvHeyWMzqOXKscMNPU3Ewdn71hXZ_RzsUJcyiNQtDx-mo8tHvppt1z55sLMJiXGg-JPbXRfiB--W7OwvNPpU-Rz7S0tEOIpgrJc2PHF79WMq8YgHf3N7Nnen8fMJAhHk9iKavF8-d6IswQqrRQRFmHh4d3rz2Dvo1OFgRROLyFQXmGCP1_efnTuDtQWkQNfnH9EMgnwpxGeJOJzSA01vU72-f4Z45Dfnq0NwMu6RhpQ4Un7CykaQehF1dNeVZ9j5Dr8BYX8V1O7S-O9UPV1gxWsBKgCHBK8kyyv_p8gEtocjlD9TON1AWLoDVMuQ8YygAeFdbLDxb4zxOe0QpHNH_jmcmBhPdOyrG-FlrP-O6-5FyIGgt7J5VhvPpuSo1CXdVtYYH3Ik_WTolyIG1_EkummbGzA5RIezX9zKPr9cpoQmhlENwflKk7LssggGgCjZ4hNUquPGY9U4SbSGM6hA8No_06RxrcCArBLH3-JB6-6V2hxIdSQFPyA9DMiFnX6Ayv0ZciRfDmNMdDfj9hbgKu8Fr3NafWMsX-S67uuYS7O9rMXLgLLmpRNbXcL-xptU6nEiL8', 'state': 'OOG78CudGb4aOV91'}
4.919 AuthorizationResponse {
"id_token": {
"aud": [
"4ac92663-2547-4661-976d-f2aa2c6d8059"
],
"auth_time": 1529753136,
"exp": 1529756839,
"iat": 1529753239,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "56057cec-fe16-48f3-89a8-e63e262af6fc",
"nonce": "yGmMqghpluqW1AYU",
"rat": 1529753237,
"sub": "[email protected]"
},
"state": "OOG78CudGb4aOV91"
}
4.919 phase <--<-- 5 --- Done -->-->
4.919 end
4.92 assertion VerifyAuthnResponse
4.92 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
4.92 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/I.F.T.T.s/OP-Req-acr_values.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-acr_values
Test description: Providing acr_values
Timestamp: 2018-06-23T11:29:48Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.075 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.076 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.076 phase <--<-- 2 --- Registration -->-->
0.077 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.077 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#qDK9QUsXDiQrcEuo"
],
"response_types": [
"id_token"
]
}
0.233 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.234 RegistrationResponse {
"client_id": "cd153016-0b5e-474e-93d7-fcc9599e486f",
"client_secret": "OQOQOFsdY19O",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "cd153016-0b5e-474e-93d7-fcc9599e486f",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#qDK9QUsXDiQrcEuo"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.234 phase <--<-- 3 --- AsyncAuthn -->-->
0.235 AuthorizationRequest {
"acr_values": "1 2",
"client_id": "cd153016-0b5e-474e-93d7-fcc9599e486f",
"nonce": "r80gT4uBXdjhtLMy",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "Bdtv4p8SF7u0VR85"
}
0.235 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=cd153016-0b5e-474e-93d7-fcc9599e486f&state=Bdtv4p8SF7u0VR85&acr_values=1+2&response_type=id_token&nonce=r80gT4uBXdjhtLMy
0.235 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=cd153016-0b5e-474e-93d7-fcc9599e486f&state=Bdtv4p8SF7u0VR85&acr_values=1+2&response_type=id_token&nonce=r80gT4uBXdjhtLMy
9.396 http args {}
9.566 response URL with fragment
9.566 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhY3IiOiIwIiwiYXVkIjpbImNkMTUzMDE2LTBiNWUtNDc0ZS05M2Q3LWZjYzk1OTllNDg2ZiJdLCJhdXRoX3RpbWUiOjE1Mjk3NTMyODUsImV4cCI6MTUyOTc1Njk4OCwiaWF0IjoxNTI5NzUzMzg4LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJiYjM2YTBjOC03OGE0LTRlYmYtYjY5Ny1jNzkwNGNlMmUwNGIiLCJub25jZSI6InI4MGdUNHVCWGRqaHRMTXkiLCJyYXQiOjE1Mjk3NTMzODAsInN1YiI6ImZvb0BiYXIuY29tIn0.S_elmG86S8xHe6HCILsLr3IBtqxc6OdcroH-lrw65E0ANRT-mBemcD0XerxzDWRsoT8m08GMpgf4oXeDhNfNEfxio3I3G31ngYPPaZO6XIprRTfHsAg4Vx_jP67TsTrlhZt167c_QjE4lxsRfm7iCrNqg52_hm4zHkmcL8r2yDrVcjEKWbjcfzzu2PFnQM7spISD4p69obxem9CFH1AvSShh7PctdsvGjn587w6Em4r_cPA7nnnp3wNjyBix9aYCK1nr2vr8sqmZzQj9TzviQ-LcqQfcwTnY8VSx10VIKdH2yMLIVdCwfsrjFjFEsiKm4ozS1MKEs4cWHA6k31f72sucDieLbF4g6eZ5ezPrtTQ6hRr3VM1mnplYUQH0zQK44cfrpBbWe9Epbu5ogiAO3RYHWZs3ln1E8kD6LmELDHMXrfNt6xb-obg-XNzB39pHhzCDYEiGmKpsc1SK3fE2Un8LyIY8KLmJb-Xk9NikHx-Kcd_RpKCCZVDMME_CrvDoZCHZJCpt0bm-E-p2yaPNEu2R6-_qiQxQzuj1LIlIBJmrD4Ev_gwz-nga01WAq78s9vA0YT1ekRyL2wJz_jlqmvusxr2DIsqOGAr7s9FpX98MJV0HxpFWMvh3q09UsX4P7mTXqVLhsf7PbV3mAK4qN-IiXCXAPVMBJkelM15QZwk&state=Bdtv4p8SF7u0VR85
9.566 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhY3IiOiIwIiwiYXVkIjpbImNkMTUzMDE2LTBiNWUtNDc0ZS05M2Q3LWZjYzk1OTllNDg2ZiJdLCJhdXRoX3RpbWUiOjE1Mjk3NTMyODUsImV4cCI6MTUyOTc1Njk4OCwiaWF0IjoxNTI5NzUzMzg4LCJpc3MiOiJodHRwczovL29pZGMtY2VydGlmaWNhdGlvbi5vcnkuc2g6ODQ0My8iLCJqdGkiOiJiYjM2YTBjOC03OGE0LTRlYmYtYjY5Ny1jNzkwNGNlMmUwNGIiLCJub25jZSI6InI4MGdUNHVCWGRqaHRMTXkiLCJyYXQiOjE1Mjk3NTMzODAsInN1YiI6ImZvb0BiYXIuY29tIn0.S_elmG86S8xHe6HCILsLr3IBtqxc6OdcroH-lrw65E0ANRT-mBemcD0XerxzDWRsoT8m08GMpgf4oXeDhNfNEfxio3I3G31ngYPPaZO6XIprRTfHsAg4Vx_jP67TsTrlhZt167c_QjE4lxsRfm7iCrNqg52_hm4zHkmcL8r2yDrVcjEKWbjcfzzu2PFnQM7spISD4p69obxem9CFH1AvSShh7PctdsvGjn587w6Em4r_cPA7nnnp3wNjyBix9aYCK1nr2vr8sqmZzQj9TzviQ-LcqQfcwTnY8VSx10VIKdH2yMLIVdCwfsrjFjFEsiKm4ozS1MKEs4cWHA6k31f72sucDieLbF4g6eZ5ezPrtTQ6hRr3VM1mnplYUQH0zQK44cfrpBbWe9Epbu5ogiAO3RYHWZs3ln1E8kD6LmELDHMXrfNt6xb-obg-XNzB39pHhzCDYEiGmKpsc1SK3fE2Un8LyIY8KLmJb-Xk9NikHx-Kcd_RpKCCZVDMME_CrvDoZCHZJCpt0bm-E-p2yaPNEu2R6-_qiQxQzuj1LIlIBJmrD4Ev_gwz-nga01WAq78s9vA0YT1ekRyL2wJz_jlqmvusxr2DIsqOGAr7s9FpX98MJV0HxpFWMvh3q09UsX4P7mTXqVLhsf7PbV3mAK4qN-IiXCXAPVMBJkelM15QZwk', 'state': 'Bdtv4p8SF7u0VR85'}
9.666 AuthorizationResponse {
"id_token": {
"acr": "0",
"aud": [
"cd153016-0b5e-474e-93d7-fcc9599e486f"
],
"auth_time": 1529753285,
"exp": 1529756988,
"iat": 1529753388,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "bb36a0c8-78a4-4ebf-b697-c7904ce2e04b",
"nonce": "r80gT4uBXdjhtLMy",
"rat": 1529753380,
"sub": "[email protected]"
},
"state": "Bdtv4p8SF7u0VR85"
}
9.666 phase <--<-- 4 --- AccessToken -->-->
9.666 phase <--<-- 5 --- Done -->-->
9.666 end
9.667 assertion VerifyResponse
9.667 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
9.667 assertion UsedAcrValue
9.667 condition used-acr-value: status=WARNING, message=Used acr value: 0, preferred: ['1', '2'] [The acr value in the ID Token]
9.667 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
used-acr-value: status=WARNING, message=Used acr value: 0, preferred: ['1', '2'] [The acr value in the ID Token]
Done: status=OK
============================================================
RESULT: WARNING
Warnings:
Used acr value: 0, preferred: ['1', '2'] |
Text | hydra/internal/certification/I.F.T.T.s/OP-Req-claims_locales.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-claims_locales
Test description: Providing claims_locales
Timestamp: 2018-06-23T11:29:53Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.074 phase <--<-- 1 --- Webfinger -->-->
1.074 not expected to do WebFinger
1.074 phase <--<-- 2 --- Discovery -->-->
1.074 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.149 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.151 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.151 phase <--<-- 3 --- Registration -->-->
1.151 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.151 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#3MXmzXaxMUp6lg7g"
],
"response_types": [
"id_token"
]
}
1.309 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.309 RegistrationResponse {
"client_id": "0840b78b-fc5d-472d-8870-8fe5fa1c3b55",
"client_secret": "W-YuXB4YjCqZ",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "0840b78b-fc5d-472d-8870-8fe5fa1c3b55",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#3MXmzXaxMUp6lg7g"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.31 phase <--<-- 4 --- AsyncAuthn -->-->
1.31 AuthorizationRequest {
"claims_locales": "se",
"client_id": "0840b78b-fc5d-472d-8870-8fe5fa1c3b55",
"nonce": "cc2krWFpfo62JqYQ",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "gKHZGMkbBWZXQSQD"
}
1.31 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=0840b78b-fc5d-472d-8870-8fe5fa1c3b55&state=gKHZGMkbBWZXQSQD&response_type=id_token&nonce=cc2krWFpfo62JqYQ&claims_locales=se
1.31 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=0840b78b-fc5d-472d-8870-8fe5fa1c3b55&state=gKHZGMkbBWZXQSQD&response_type=id_token&nonce=cc2krWFpfo62JqYQ&claims_locales=se
3.707 http args {}
3.876 response URL with fragment
3.876 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMDg0MGI3OGItZmM1ZC00NzJkLTg4NzAtOGZlNWZhMWMzYjU1Il0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTkzLCJpYXQiOjE1Mjk3NTMzOTMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImQwZTliYjIyLTI5NTUtNDRjMi1iM2VhLTg1NjRkNjcxOTJkOCIsIm5vbmNlIjoiY2Mya3JXRnBmbzYySnFZUSIsInJhdCI6MTUyOTc1MzM5MSwic3ViIjoiZm9vQGJhci5jb20ifQ.XBuRIKY-lJMqET8AVczaG0uOA6nl8YLWrxGfQjZPtKICKKhkvqMwEqttBP_-bpPD3KWgz5gZlV6xWeElnMYGbt2KH0mneotvHMieHbpQB9YONI7uTqH0Rbw_z7SW9iZfbqQf8oSFwIDvyYKr37sLxsM7wQAORWiny8FNPomae362qlEkDP1nkD1V96P1P9-fE0y4Dzgsu0GYiSu_X7wpRo28YhSEtZApzMWgfRgDf__yP3cSpWTRKfhPVnj0wMqqtULIkUwy1zNwDhM3nV69pCGUpMcceYUuy2OCLbCwkFr9vC5I_Fydd8yQ0RtZyT8D8ngvw-QP67lAQX0i8CqOVijs7F0AEcIupW-i4Ww7lvBzpg15xZezVfbwduFIMT1xa2_dUXu7hDAe9YykXZMzEkgG5AOWz7IOJskt5pAt1vbTaBY6OS_9hTvSmYty-Uulf8vU6PG_v4G9F2toZsjFj7o2d74EVkTl5JiTDqfGcKG5BZgYGG7qzOAgak5WfD4U9IJvZUHAFUxtlclMZli_HfL1Dr0-3naGlcWOD2ZEiyCGRDvUBDJa9LMqMGg2vDEq5JWMGdCOzOK1k_WEpYWG7LL966810u4b5XSVBAxXye5YecJsE7Ne4gVGYLeTV1NRod1r9GbwGr_9NxYPsdlh0RymFE1mMEZI3TPAB56qhRw&state=gKHZGMkbBWZXQSQD
3.877 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMDg0MGI3OGItZmM1ZC00NzJkLTg4NzAtOGZlNWZhMWMzYjU1Il0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTkzLCJpYXQiOjE1Mjk3NTMzOTMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImQwZTliYjIyLTI5NTUtNDRjMi1iM2VhLTg1NjRkNjcxOTJkOCIsIm5vbmNlIjoiY2Mya3JXRnBmbzYySnFZUSIsInJhdCI6MTUyOTc1MzM5MSwic3ViIjoiZm9vQGJhci5jb20ifQ.XBuRIKY-lJMqET8AVczaG0uOA6nl8YLWrxGfQjZPtKICKKhkvqMwEqttBP_-bpPD3KWgz5gZlV6xWeElnMYGbt2KH0mneotvHMieHbpQB9YONI7uTqH0Rbw_z7SW9iZfbqQf8oSFwIDvyYKr37sLxsM7wQAORWiny8FNPomae362qlEkDP1nkD1V96P1P9-fE0y4Dzgsu0GYiSu_X7wpRo28YhSEtZApzMWgfRgDf__yP3cSpWTRKfhPVnj0wMqqtULIkUwy1zNwDhM3nV69pCGUpMcceYUuy2OCLbCwkFr9vC5I_Fydd8yQ0RtZyT8D8ngvw-QP67lAQX0i8CqOVijs7F0AEcIupW-i4Ww7lvBzpg15xZezVfbwduFIMT1xa2_dUXu7hDAe9YykXZMzEkgG5AOWz7IOJskt5pAt1vbTaBY6OS_9hTvSmYty-Uulf8vU6PG_v4G9F2toZsjFj7o2d74EVkTl5JiTDqfGcKG5BZgYGG7qzOAgak5WfD4U9IJvZUHAFUxtlclMZli_HfL1Dr0-3naGlcWOD2ZEiyCGRDvUBDJa9LMqMGg2vDEq5JWMGdCOzOK1k_WEpYWG7LL966810u4b5XSVBAxXye5YecJsE7Ne4gVGYLeTV1NRod1r9GbwGr_9NxYPsdlh0RymFE1mMEZI3TPAB56qhRw', 'state': 'gKHZGMkbBWZXQSQD'}
3.957 AuthorizationResponse {
"id_token": {
"aud": [
"0840b78b-fc5d-472d-8870-8fe5fa1c3b55"
],
"auth_time": 1529753285,
"exp": 1529756993,
"iat": 1529753393,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "d0e9bb22-2955-44c2-b3ea-8564d67192d8",
"nonce": "cc2krWFpfo62JqYQ",
"rat": 1529753391,
"sub": "[email protected]"
},
"state": "gKHZGMkbBWZXQSQD"
}
3.957 phase <--<-- 5 --- AccessToken -->-->
3.957 phase <--<-- 6 --- UserInfo -->-->
3.957 phase <--<-- 7 --- DisplayUserInfo -->-->
3.957 phase <--<-- 8 --- Done -->-->
3.957 end
3.958 assertion CheckHTTPResponse
3.958 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
3.958 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/I.F.T.T.s/OP-Req-id_token_hint.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-id_token_hint
Test description: Using prompt=none with user hint through id_token_hint
Timestamp: 2018-06-23T11:29:58Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.109 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.111 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.111 phase <--<-- 2 --- Registration -->-->
0.111 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.111 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#cqH3AiT1GrFItzaz"
],
"response_types": [
"id_token"
]
}
0.267 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.268 RegistrationResponse {
"client_id": "1f9bbb8d-defe-4eed-b71c-6d13c64fd6a0",
"client_secret": "hCmZUmRpWK4M",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "1f9bbb8d-defe-4eed-b71c-6d13c64fd6a0",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#cqH3AiT1GrFItzaz"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.268 phase <--<-- 3 --- AsyncAuthn -->-->
0.268 AuthorizationRequest {
"client_id": "1f9bbb8d-defe-4eed-b71c-6d13c64fd6a0",
"nonce": "uTYiNzNl2Ann5W5e",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "q17ASFGh2mPGxhcv"
}
0.268 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=1f9bbb8d-defe-4eed-b71c-6d13c64fd6a0&state=q17ASFGh2mPGxhcv&response_type=id_token&nonce=uTYiNzNl2Ann5W5e
0.268 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=1f9bbb8d-defe-4eed-b71c-6d13c64fd6a0&state=q17ASFGh2mPGxhcv&response_type=id_token&nonce=uTYiNzNl2Ann5W5e
2.359 http args {}
2.571 response URL with fragment
2.572 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMWY5YmJiOGQtZGVmZS00ZWVkLWI3MWMtNmQxM2M2NGZkNmEwIl0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTk3LCJpYXQiOjE1Mjk3NTMzOTcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjM2YmU0Y2JiLWIzMWEtNDhkNy1iMDk4LWFkYzM3YTM1OTc3ZCIsIm5vbmNlIjoidVRZaU56TmwyQW5uNVc1ZSIsInJhdCI6MTUyOTc1MzM5NSwic3ViIjoiZm9vQGJhci5jb20ifQ.OtG1MSljW6FFSvHRZsa-peKlqlmCkhE2paJruVAvgoaBuYf1mR4lQnrpQiMdU57k55ngkyZXDFMkj6bU_gtMepTtkSNayGf4yO0fgV2xr6ywAUfQcceGVVbaSEYGPRkOD16BKIcM6-Z9XoTre6FyWFDbOiQyK6LVmzARW4dKHrUNGg1RJ_OmBbi-Nd6GbEyUvhU3MfNjF67StKkNz164WHNXf7kBuwVobIPDjwM2Q7cBDvjk_TYhOjpLiE5Z-GFx0Lf1mcn2i_k6GwKCBAd_6kaB-cM-At9vpsdCgWFoVpgMM6SPUE4ZQ7aPu23XtNzYhMrhTxO7khIqJaddbKmSBpv93Q0thFnq3YXW61FGjg4VpW7MaWhMqFIF68c48kJwAARC3wItNhYL0aTedFodQQxi7uCjcoAPw0EJ_tVQptjj6VL9-WjmWY8jnNTQU9XWYA6wM5PyPJmbHb40YuM36TM4VjURobcPcqKixYh6Ce1tjTZ2BwfHuaCikWieKkZNXGtdn7NFU5fm0iLx4y_mWepq6FVngIDrQYP8aOggnplCk8G6sAXskL1ve7jx6Tc1idVdNVcEhMX4l5o_YtP41ByEhVWIkCTOLB713elDSO2ltge75W_f9Gwd5xJybBTZCKi049Eh0IKz4pOOzauwBJNk9qbnzUI3_33bbl4q2WQ&state=q17ASFGh2mPGxhcv
2.572 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMWY5YmJiOGQtZGVmZS00ZWVkLWI3MWMtNmQxM2M2NGZkNmEwIl0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTk3LCJpYXQiOjE1Mjk3NTMzOTcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjM2YmU0Y2JiLWIzMWEtNDhkNy1iMDk4LWFkYzM3YTM1OTc3ZCIsIm5vbmNlIjoidVRZaU56TmwyQW5uNVc1ZSIsInJhdCI6MTUyOTc1MzM5NSwic3ViIjoiZm9vQGJhci5jb20ifQ.OtG1MSljW6FFSvHRZsa-peKlqlmCkhE2paJruVAvgoaBuYf1mR4lQnrpQiMdU57k55ngkyZXDFMkj6bU_gtMepTtkSNayGf4yO0fgV2xr6ywAUfQcceGVVbaSEYGPRkOD16BKIcM6-Z9XoTre6FyWFDbOiQyK6LVmzARW4dKHrUNGg1RJ_OmBbi-Nd6GbEyUvhU3MfNjF67StKkNz164WHNXf7kBuwVobIPDjwM2Q7cBDvjk_TYhOjpLiE5Z-GFx0Lf1mcn2i_k6GwKCBAd_6kaB-cM-At9vpsdCgWFoVpgMM6SPUE4ZQ7aPu23XtNzYhMrhTxO7khIqJaddbKmSBpv93Q0thFnq3YXW61FGjg4VpW7MaWhMqFIF68c48kJwAARC3wItNhYL0aTedFodQQxi7uCjcoAPw0EJ_tVQptjj6VL9-WjmWY8jnNTQU9XWYA6wM5PyPJmbHb40YuM36TM4VjURobcPcqKixYh6Ce1tjTZ2BwfHuaCikWieKkZNXGtdn7NFU5fm0iLx4y_mWepq6FVngIDrQYP8aOggnplCk8G6sAXskL1ve7jx6Tc1idVdNVcEhMX4l5o_YtP41ByEhVWIkCTOLB713elDSO2ltge75W_f9Gwd5xJybBTZCKi049Eh0IKz4pOOzauwBJNk9qbnzUI3_33bbl4q2WQ', 'state': 'q17ASFGh2mPGxhcv'}
2.655 AuthorizationResponse {
"id_token": {
"aud": [
"1f9bbb8d-defe-4eed-b71c-6d13c64fd6a0"
],
"auth_time": 1529753285,
"exp": 1529756997,
"iat": 1529753397,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "36be4cbb-b31a-48d7-b098-adc37a35977d",
"nonce": "uTYiNzNl2Ann5W5e",
"rat": 1529753395,
"sub": "[email protected]"
},
"state": "q17ASFGh2mPGxhcv"
}
2.655 phase <--<-- 4 --- AccessToken -->-->
2.655 phase <--<-- 5 --- AsyncAuthn -->-->
2.656 AuthorizationRequest {
"client_id": "1f9bbb8d-defe-4eed-b71c-6d13c64fd6a0",
"id_token_hint": "eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMWY5YmJiOGQtZGVmZS00ZWVkLWI3MWMtNmQxM2M2NGZkNmEwIl0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTk3LCJpYXQiOjE1Mjk3NTMzOTcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjM2YmU0Y2JiLWIzMWEtNDhkNy1iMDk4LWFkYzM3YTM1OTc3ZCIsIm5vbmNlIjoidVRZaU56TmwyQW5uNVc1ZSIsInJhdCI6MTUyOTc1MzM5NSwic3ViIjoiZm9vQGJhci5jb20ifQ.OtG1MSljW6FFSvHRZsa-peKlqlmCkhE2paJruVAvgoaBuYf1mR4lQnrpQiMdU57k55ngkyZXDFMkj6bU_gtMepTtkSNayGf4yO0fgV2xr6ywAUfQcceGVVbaSEYGPRkOD16BKIcM6-Z9XoTre6FyWFDbOiQyK6LVmzARW4dKHrUNGg1RJ_OmBbi-Nd6GbEyUvhU3MfNjF67StKkNz164WHNXf7kBuwVobIPDjwM2Q7cBDvjk_TYhOjpLiE5Z-GFx0Lf1mcn2i_k6GwKCBAd_6kaB-cM-At9vpsdCgWFoVpgMM6SPUE4ZQ7aPu23XtNzYhMrhTxO7khIqJaddbKmSBpv93Q0thFnq3YXW61FGjg4VpW7MaWhMqFIF68c48kJwAARC3wItNhYL0aTedFodQQxi7uCjcoAPw0EJ_tVQptjj6VL9-WjmWY8jnNTQU9XWYA6wM5PyPJmbHb40YuM36TM4VjURobcPcqKixYh6Ce1tjTZ2BwfHuaCikWieKkZNXGtdn7NFU5fm0iLx4y_mWepq6FVngIDrQYP8aOggnplCk8G6sAXskL1ve7jx6Tc1idVdNVcEhMX4l5o_YtP41ByEhVWIkCTOLB713elDSO2ltge75W_f9Gwd5xJybBTZCKi049Eh0IKz4pOOzauwBJNk9qbnzUI3_33bbl4q2WQ",
"nonce": "TKLsI4OV39q78kdu",
"prompt": [
"none"
],
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "R4siYJqTinyTqTtc"
}
2.656 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=1f9bbb8d-defe-4eed-b71c-6d13c64fd6a0&state=R4siYJqTinyTqTtc&id_token_hint=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMWY5YmJiOGQtZGVmZS00ZWVkLWI3MWMtNmQxM2M2NGZkNmEwIl0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTk3LCJpYXQiOjE1Mjk3NTMzOTcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjM2YmU0Y2JiLWIzMWEtNDhkNy1iMDk4LWFkYzM3YTM1OTc3ZCIsIm5vbmNlIjoidVRZaU56TmwyQW5uNVc1ZSIsInJhdCI6MTUyOTc1MzM5NSwic3ViIjoiZm9vQGJhci5jb20ifQ.OtG1MSljW6FFSvHRZsa-peKlqlmCkhE2paJruVAvgoaBuYf1mR4lQnrpQiMdU57k55ngkyZXDFMkj6bU_gtMepTtkSNayGf4yO0fgV2xr6ywAUfQcceGVVbaSEYGPRkOD16BKIcM6-Z9XoTre6FyWFDbOiQyK6LVmzARW4dKHrUNGg1RJ_OmBbi-Nd6GbEyUvhU3MfNjF67StKkNz164WHNXf7kBuwVobIPDjwM2Q7cBDvjk_TYhOjpLiE5Z-GFx0Lf1mcn2i_k6GwKCBAd_6kaB-cM-At9vpsdCgWFoVpgMM6SPUE4ZQ7aPu23XtNzYhMrhTxO7khIqJaddbKmSBpv93Q0thFnq3YXW61FGjg4VpW7MaWhMqFIF68c48kJwAARC3wItNhYL0aTedFodQQxi7uCjcoAPw0EJ_tVQptjj6VL9-WjmWY8jnNTQU9XWYA6wM5PyPJmbHb40YuM36TM4VjURobcPcqKixYh6Ce1tjTZ2BwfHuaCikWieKkZNXGtdn7NFU5fm0iLx4y_mWepq6FVngIDrQYP8aOggnplCk8G6sAXskL1ve7jx6Tc1idVdNVcEhMX4l5o_YtP41ByEhVWIkCTOLB713elDSO2ltge75W_f9Gwd5xJybBTZCKi049Eh0IKz4pOOzauwBJNk9qbnzUI3_33bbl4q2WQ&response_type=id_token&nonce=TKLsI4OV39q78kdu
2.656 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?prompt=none&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=1f9bbb8d-defe-4eed-b71c-6d13c64fd6a0&state=R4siYJqTinyTqTtc&id_token_hint=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMWY5YmJiOGQtZGVmZS00ZWVkLWI3MWMtNmQxM2M2NGZkNmEwIl0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTk3LCJpYXQiOjE1Mjk3NTMzOTcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjM2YmU0Y2JiLWIzMWEtNDhkNy1iMDk4LWFkYzM3YTM1OTc3ZCIsIm5vbmNlIjoidVRZaU56TmwyQW5uNVc1ZSIsInJhdCI6MTUyOTc1MzM5NSwic3ViIjoiZm9vQGJhci5jb20ifQ.OtG1MSljW6FFSvHRZsa-peKlqlmCkhE2paJruVAvgoaBuYf1mR4lQnrpQiMdU57k55ngkyZXDFMkj6bU_gtMepTtkSNayGf4yO0fgV2xr6ywAUfQcceGVVbaSEYGPRkOD16BKIcM6-Z9XoTre6FyWFDbOiQyK6LVmzARW4dKHrUNGg1RJ_OmBbi-Nd6GbEyUvhU3MfNjF67StKkNz164WHNXf7kBuwVobIPDjwM2Q7cBDvjk_TYhOjpLiE5Z-GFx0Lf1mcn2i_k6GwKCBAd_6kaB-cM-At9vpsdCgWFoVpgMM6SPUE4ZQ7aPu23XtNzYhMrhTxO7khIqJaddbKmSBpv93Q0thFnq3YXW61FGjg4VpW7MaWhMqFIF68c48kJwAARC3wItNhYL0aTedFodQQxi7uCjcoAPw0EJ_tVQptjj6VL9-WjmWY8jnNTQU9XWYA6wM5PyPJmbHb40YuM36TM4VjURobcPcqKixYh6Ce1tjTZ2BwfHuaCikWieKkZNXGtdn7NFU5fm0iLx4y_mWepq6FVngIDrQYP8aOggnplCk8G6sAXskL1ve7jx6Tc1idVdNVcEhMX4l5o_YtP41ByEhVWIkCTOLB713elDSO2ltge75W_f9Gwd5xJybBTZCKi049Eh0IKz4pOOzauwBJNk9qbnzUI3_33bbl4q2WQ&response_type=id_token&nonce=TKLsI4OV39q78kdu
3.615 http args {}
3.828 response URL with fragment
3.828 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMWY5YmJiOGQtZGVmZS00ZWVkLWI3MWMtNmQxM2M2NGZkNmEwIl0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTk4LCJpYXQiOjE1Mjk3NTMzOTgsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImZlNThhNjY4LWE2YjYtNDFkOS1iZWMwLWU3ODczYzM1NWI1ZiIsIm5vbmNlIjoiVEtMc0k0T1YzOXE3OGtkdSIsInJhdCI6MTUyOTc1MzM5Nywic3ViIjoiZm9vQGJhci5jb20ifQ.IfhGaIUDXbNa2SPENqMDw9qq14YFyHFwOo-J0bNx0P2eYUajMzpIlPw3yGegRhD-OhlxvDBiAOx_u958u7hFPgWgRSrNsTBDu0shw8VRE_mHgQSd8uxZvxY4O8U1ThOIVnOE8IQsYqSdLaWYMUam4lEDKri3YCDmx8LTmqOTxjS8c8QP04-MImiSnf4pMQdgKGd2-qxSrtyaQ35B9Ii7qvhKGxJI4xE-K7e-kqUe5JPASAKtgO5NuHN8P3-CVtVaIGyM-tzVIOsRh1AAOudSFwCLLkZ_hSfO7sEusJ4ECF4bHP1T_nweIVWywRjqKbZyo_q7cvgjAO_z4eIIYu7ZPi2szf8vxa7-8TT_MNuu8xNR-i15ve2r8ANnsJtNqL16m6nOST6lXPdUhCRz3bLZrRH_m49OX1PbIfh0RFJbj0BWA23V7Dgy6NIs6jS7wCDhBNzO3MK1axyVMY6P2TvLleeqFSsASJvfRJ-e_18DzrPbwsQh-IU4PC2_A_Ba-72UKRydKC6HTwaSV3ahOu6zAXxPhvk4cXNzZKLhSvQHq-fKL7F3rDwpufku5EoVVIXzXMoF_7Katv1_oLO0OAc5ZI1n_O1yt41GZpuTMmnn8SOI8R9ZUTJExGPtbc_T53dDoWTZ1_PSlREFmgERZjaRe7pLzWTVPWFBS3ZFax__xuQ&state=R4siYJqTinyTqTtc
3.829 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMWY5YmJiOGQtZGVmZS00ZWVkLWI3MWMtNmQxM2M2NGZkNmEwIl0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTk4LCJpYXQiOjE1Mjk3NTMzOTgsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImZlNThhNjY4LWE2YjYtNDFkOS1iZWMwLWU3ODczYzM1NWI1ZiIsIm5vbmNlIjoiVEtMc0k0T1YzOXE3OGtkdSIsInJhdCI6MTUyOTc1MzM5Nywic3ViIjoiZm9vQGJhci5jb20ifQ.IfhGaIUDXbNa2SPENqMDw9qq14YFyHFwOo-J0bNx0P2eYUajMzpIlPw3yGegRhD-OhlxvDBiAOx_u958u7hFPgWgRSrNsTBDu0shw8VRE_mHgQSd8uxZvxY4O8U1ThOIVnOE8IQsYqSdLaWYMUam4lEDKri3YCDmx8LTmqOTxjS8c8QP04-MImiSnf4pMQdgKGd2-qxSrtyaQ35B9Ii7qvhKGxJI4xE-K7e-kqUe5JPASAKtgO5NuHN8P3-CVtVaIGyM-tzVIOsRh1AAOudSFwCLLkZ_hSfO7sEusJ4ECF4bHP1T_nweIVWywRjqKbZyo_q7cvgjAO_z4eIIYu7ZPi2szf8vxa7-8TT_MNuu8xNR-i15ve2r8ANnsJtNqL16m6nOST6lXPdUhCRz3bLZrRH_m49OX1PbIfh0RFJbj0BWA23V7Dgy6NIs6jS7wCDhBNzO3MK1axyVMY6P2TvLleeqFSsASJvfRJ-e_18DzrPbwsQh-IU4PC2_A_Ba-72UKRydKC6HTwaSV3ahOu6zAXxPhvk4cXNzZKLhSvQHq-fKL7F3rDwpufku5EoVVIXzXMoF_7Katv1_oLO0OAc5ZI1n_O1yt41GZpuTMmnn8SOI8R9ZUTJExGPtbc_T53dDoWTZ1_PSlREFmgERZjaRe7pLzWTVPWFBS3ZFax__xuQ', 'state': 'R4siYJqTinyTqTtc'}
3.832 AuthorizationResponse {
"id_token": {
"aud": [
"1f9bbb8d-defe-4eed-b71c-6d13c64fd6a0"
],
"auth_time": 1529753285,
"exp": 1529756998,
"iat": 1529753398,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "fe58a668-a6b6-41d9-bec0-e7873c355b5f",
"nonce": "TKLsI4OV39q78kdu",
"rat": 1529753397,
"sub": "[email protected]"
},
"state": "R4siYJqTinyTqTtc"
}
3.832 phase <--<-- 6 --- AccessToken -->-->
3.833 phase <--<-- 7 --- Done -->-->
3.833 end
3.833 assertion VerifyResponse
3.833 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.833 assertion SameAuthn
3.834 condition same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
3.834 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/I.F.T.T.s/OP-Req-login_hint.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-login_hint
Test description: Providing login_hint
Timestamp: 2018-06-23T11:30:05Z
============================================================
Trace output
0.0 phase <--<-- 0 --- VerifyConfiguration -->-->
0.0 phase <--<-- 1 --- Note -->-->
1.35 phase <--<-- 2 --- Webfinger -->-->
1.351 not expected to do WebFinger
1.351 phase <--<-- 3 --- Discovery -->-->
1.351 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.426 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.428 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.428 phase <--<-- 4 --- Registration -->-->
1.428 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.428 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#CHKyD3trWj3Lunq6"
],
"response_types": [
"id_token"
]
}
1.592 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.593 RegistrationResponse {
"client_id": "3fea58d3-9f75-4c2f-8f4a-eca8b3c839f9",
"client_secret": "kNqCf8pQikfY",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "3fea58d3-9f75-4c2f-8f4a-eca8b3c839f9",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#CHKyD3trWj3Lunq6"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.593 phase <--<-- 5 --- AsyncAuthn -->-->
1.594 AuthorizationRequest {
"client_id": "3fea58d3-9f75-4c2f-8f4a-eca8b3c839f9",
"login_hint": "[email protected]",
"nonce": "nY94usd7XlCMCaEM",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "EH3iZQKez1ZJoaYt"
}
1.594 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=3fea58d3-9f75-4c2f-8f4a-eca8b3c839f9&state=EH3iZQKez1ZJoaYt&response_type=id_token&nonce=nY94usd7XlCMCaEM&login_hint=foo%40bar.com
1.594 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=3fea58d3-9f75-4c2f-8f4a-eca8b3c839f9&state=EH3iZQKez1ZJoaYt&response_type=id_token&nonce=nY94usd7XlCMCaEM&login_hint=foo%40bar.com
4.263 http args {}
4.429 response URL with fragment
4.43 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiM2ZlYTU4ZDMtOWY3NS00YzJmLThmNGEtZWNhOGIzYzgzOWY5Il0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU3MDA1LCJpYXQiOjE1Mjk3NTM0MDUsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjdmMDgxYWZhLWQ1NjYtNDI5MC04ZmM2LTBjNDQ2NjhiZWIwZiIsIm5vbmNlIjoiblk5NHVzZDdYbENNQ2FFTSIsInJhdCI6MTUyOTc1MzQwMiwic3ViIjoiZm9vQGJhci5jb20ifQ.Pc97eDjzFkQkcI3Li-rQJiL5yXYmLV9ulRf2UxKRAyugDg8KLxuB8zINF55Ct7LK--5Px-CaFbuI5KT0p2ugm05kwT0hoMZWmoRTCfbOhGeFSZxCxsSAWHmHfIumzthpwjQ73ROJkI3pNzrTDSYYntveq2Tboxt6R9HbtcGXtUt53pNEu632m4kX17C7X47MaRISCRxgTSt36COU7WHi52Z9VGHwXTs33WNBf3wI1uiyLEY8n-XFd8XdTT1yBgAOVCmv9gu26porFThvtyeE7SQWNthcjVAHPOjg8lNyacCpYbrRYkT3VBruvm3jcbqk4HpWxEB8NWsEluB4nMgFA-BWHb43C_RpdiRV8eBBDapFJaZSiwiflSO1g9Xa6JzCD8FHy3os5bW59Ga4jkBG8Upovh3ejbijGPl_Ea_j47W-Gv3OgQ47X9iShmO00uvf_4G3Ek7WtH8c-8mpeZHFP-RDxPafqskMAeMhaFvmtqQN-E2NxHrTJZueNfALB-jg04FA6XfeBVCgYFSIe5ZduOUjD2RzQVLW_TpnPt5rrBhApnhU7SMwYWSR8rxNqQEnyP6VgtUOzSfxcNYfbGaKWGB2Dt5kOVma966ysUkposFhi2Zq-ITORkgV3eHRif_VOpFS4Togk0IMVVOmhI6HMytwRPFTkRB4JAWu9TA4n-Q&state=EH3iZQKez1ZJoaYt
4.43 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiM2ZlYTU4ZDMtOWY3NS00YzJmLThmNGEtZWNhOGIzYzgzOWY5Il0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU3MDA1LCJpYXQiOjE1Mjk3NTM0MDUsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjdmMDgxYWZhLWQ1NjYtNDI5MC04ZmM2LTBjNDQ2NjhiZWIwZiIsIm5vbmNlIjoiblk5NHVzZDdYbENNQ2FFTSIsInJhdCI6MTUyOTc1MzQwMiwic3ViIjoiZm9vQGJhci5jb20ifQ.Pc97eDjzFkQkcI3Li-rQJiL5yXYmLV9ulRf2UxKRAyugDg8KLxuB8zINF55Ct7LK--5Px-CaFbuI5KT0p2ugm05kwT0hoMZWmoRTCfbOhGeFSZxCxsSAWHmHfIumzthpwjQ73ROJkI3pNzrTDSYYntveq2Tboxt6R9HbtcGXtUt53pNEu632m4kX17C7X47MaRISCRxgTSt36COU7WHi52Z9VGHwXTs33WNBf3wI1uiyLEY8n-XFd8XdTT1yBgAOVCmv9gu26porFThvtyeE7SQWNthcjVAHPOjg8lNyacCpYbrRYkT3VBruvm3jcbqk4HpWxEB8NWsEluB4nMgFA-BWHb43C_RpdiRV8eBBDapFJaZSiwiflSO1g9Xa6JzCD8FHy3os5bW59Ga4jkBG8Upovh3ejbijGPl_Ea_j47W-Gv3OgQ47X9iShmO00uvf_4G3Ek7WtH8c-8mpeZHFP-RDxPafqskMAeMhaFvmtqQN-E2NxHrTJZueNfALB-jg04FA6XfeBVCgYFSIe5ZduOUjD2RzQVLW_TpnPt5rrBhApnhU7SMwYWSR8rxNqQEnyP6VgtUOzSfxcNYfbGaKWGB2Dt5kOVma966ysUkposFhi2Zq-ITORkgV3eHRif_VOpFS4Togk0IMVVOmhI6HMytwRPFTkRB4JAWu9TA4n-Q', 'state': 'EH3iZQKez1ZJoaYt'}
4.514 AuthorizationResponse {
"id_token": {
"aud": [
"3fea58d3-9f75-4c2f-8f4a-eca8b3c839f9"
],
"auth_time": 1529753285,
"exp": 1529757005,
"iat": 1529753405,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "7f081afa-d566-4290-8fc6-0c44668beb0f",
"nonce": "nY94usd7XlCMCaEM",
"rat": 1529753402,
"sub": "[email protected]"
},
"state": "EH3iZQKez1ZJoaYt"
}
4.514 phase <--<-- 6 --- Done -->-->
4.514 end
4.515 assertion VerifyAuthnResponse
4.515 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
4.515 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/I.F.T.T.s/OP-Req-max_age=1.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-max_age=1
Test description: Requesting ID Token with max_age=1 seconds restriction
Timestamp: 2018-06-23T11:30:17Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.001 phase <--<-- 1 --- Discovery -->-->
0.001 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.12 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.121 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.121 phase <--<-- 2 --- Registration -->-->
0.121 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.121 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#S2gOoy6mf2fC6SHg"
],
"response_types": [
"id_token"
]
}
0.276 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.277 RegistrationResponse {
"client_id": "b3df4c71-3898-42cd-9591-1acd47a57e54",
"client_secret": "OkwvzZtu0GNq",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "b3df4c71-3898-42cd-9591-1acd47a57e54",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#S2gOoy6mf2fC6SHg"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.277 phase <--<-- 3 --- AsyncAuthn -->-->
0.278 AuthorizationRequest {
"client_id": "b3df4c71-3898-42cd-9591-1acd47a57e54",
"nonce": "IhUEFjk0V16sWpmL",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "BUH8pXRZrbAsEcpt"
}
0.278 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=b3df4c71-3898-42cd-9591-1acd47a57e54&state=BUH8pXRZrbAsEcpt&response_type=id_token&nonce=IhUEFjk0V16sWpmL
0.278 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=b3df4c71-3898-42cd-9591-1acd47a57e54&state=BUH8pXRZrbAsEcpt&response_type=id_token&nonce=IhUEFjk0V16sWpmL
2.59 http args {}
2.758 response URL with fragment
2.759 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYjNkZjRjNzEtMzg5OC00MmNkLTk1OTEtMWFjZDQ3YTU3ZTU0Il0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU3MDA5LCJpYXQiOjE1Mjk3NTM0MDksImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImJjZTNkYTVjLWVjNjQtNGFjOS1iNDlmLTRmNmYwNDA1OTQyMiIsIm5vbmNlIjoiSWhVRUZqazBWMTZzV3BtTCIsInJhdCI6MTUyOTc1MzQwNywic3ViIjoiZm9vQGJhci5jb20ifQ.QE_01o9ppxIlsbc4nSljqMaWfsTlKE9J6UfYZEKnVBvdP2t3CZ-2LWHA2R5jmJTKRytClqAWWrljco4dg-qtltHMka6koLgNnoS4ADMjnL_5n-X-3MSvyS-qEakSJIG734ZkU_lZn9Ap6WQnbHStF1HTYqsdGXO59EufwJDgq1U40yUn61lQgx_A9_0Cys_7ofNDoOwmXEXGsGujql3_qZpwtwsz0WEZJ1spwPat9Rnd0LJPDCV1SdWgy0XT3ZIed4sKpiikLy2d3f5bDfPqu6HexT73dKcQofjNPHVWkBkQYJtO2283Upr8bksaj0UIep8YydNNYYtdGWKr0fPT1cpQGBcgthO_H_SeM0Dj_CklTvp1gQyxt8FzBMzKwdowg34pXZ-rEm8oBfMcDn29q1httDOp3npwPcHmEBN0pClUgVkH6LM_VgzGlaIJAEKeK_-18RvrDBvOms6jPYoUHljB7ydJJEz4WnowZ4Q9PFAIQJ1PMqvrj8fdsW3ESbKymWRPeIJXO0ZQKr_ydos5zqYvMQXZTIqRFy4og5lTLI76fDALhFpcpiL2_IgpzUSgrD1dcMzUSDRGVtNrkN28uKFREPjpvD1gk6B7PQBv_4rFqXBpkfSwpBaxqA5oUlEdVCmDOkaAf-9VgeEiBqg3r_sQw09kiwAT3FUFVvqC7nk&state=BUH8pXRZrbAsEcpt
2.759 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiYjNkZjRjNzEtMzg5OC00MmNkLTk1OTEtMWFjZDQ3YTU3ZTU0Il0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU3MDA5LCJpYXQiOjE1Mjk3NTM0MDksImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImJjZTNkYTVjLWVjNjQtNGFjOS1iNDlmLTRmNmYwNDA1OTQyMiIsIm5vbmNlIjoiSWhVRUZqazBWMTZzV3BtTCIsInJhdCI6MTUyOTc1MzQwNywic3ViIjoiZm9vQGJhci5jb20ifQ.QE_01o9ppxIlsbc4nSljqMaWfsTlKE9J6UfYZEKnVBvdP2t3CZ-2LWHA2R5jmJTKRytClqAWWrljco4dg-qtltHMka6koLgNnoS4ADMjnL_5n-X-3MSvyS-qEakSJIG734ZkU_lZn9Ap6WQnbHStF1HTYqsdGXO59EufwJDgq1U40yUn61lQgx_A9_0Cys_7ofNDoOwmXEXGsGujql3_qZpwtwsz0WEZJ1spwPat9Rnd0LJPDCV1SdWgy0XT3ZIed4sKpiikLy2d3f5bDfPqu6HexT73dKcQofjNPHVWkBkQYJtO2283Upr8bksaj0UIep8YydNNYYtdGWKr0fPT1cpQGBcgthO_H_SeM0Dj_CklTvp1gQyxt8FzBMzKwdowg34pXZ-rEm8oBfMcDn29q1httDOp3npwPcHmEBN0pClUgVkH6LM_VgzGlaIJAEKeK_-18RvrDBvOms6jPYoUHljB7ydJJEz4WnowZ4Q9PFAIQJ1PMqvrj8fdsW3ESbKymWRPeIJXO0ZQKr_ydos5zqYvMQXZTIqRFy4og5lTLI76fDALhFpcpiL2_IgpzUSgrD1dcMzUSDRGVtNrkN28uKFREPjpvD1gk6B7PQBv_4rFqXBpkfSwpBaxqA5oUlEdVCmDOkaAf-9VgeEiBqg3r_sQw09kiwAT3FUFVvqC7nk', 'state': 'BUH8pXRZrbAsEcpt'}
2.84 AuthorizationResponse {
"id_token": {
"aud": [
"b3df4c71-3898-42cd-9591-1acd47a57e54"
],
"auth_time": 1529753285,
"exp": 1529757009,
"iat": 1529753409,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "bce3da5c-ec64-4ac9-b49f-4f6f04059422",
"nonce": "IhUEFjk0V16sWpmL",
"rat": 1529753407,
"sub": "[email protected]"
},
"state": "BUH8pXRZrbAsEcpt"
}
2.84 phase <--<-- 4 --- AccessToken -->-->
2.841 phase <--<-- 5 --- Note -->-->
4.15 phase <--<-- 6 --- Webfinger -->-->
4.15 not expected to do WebFinger
4.15 phase <--<-- 7 --- Discovery -->-->
4.15 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
4.456 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
4.457 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
4.457 phase <--<-- 8 --- Registration -->-->
4.457 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
4.458 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#ADtymy9NTcvprsd4"
],
"response_types": [
"id_token"
]
}
4.622 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
4.623 RegistrationResponse {
"client_id": "77bafc37-7c29-436e-979e-a24cacf4befb",
"client_secret": "S_-XXC0uCccT",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "77bafc37-7c29-436e-979e-a24cacf4befb",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#ADtymy9NTcvprsd4"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
4.623 phase <--<-- 9 --- AsyncAuthn -->-->
4.623 AuthorizationRequest {
"client_id": "77bafc37-7c29-436e-979e-a24cacf4befb",
"max_age": 1,
"nonce": "DPMogWlNSUuo5G4Y",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "72KCwf0G4nmJ71tU"
}
4.624 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?max_age=1&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=77bafc37-7c29-436e-979e-a24cacf4befb&state=72KCwf0G4nmJ71tU&response_type=id_token&nonce=DPMogWlNSUuo5G4Y
4.624 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?max_age=1&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=77bafc37-7c29-436e-979e-a24cacf4befb&state=72KCwf0G4nmJ71tU&response_type=id_token&nonce=DPMogWlNSUuo5G4Y
10.594 http args {}
10.762 response URL with fragment
10.763 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNzdiYWZjMzctN2MyOS00MzZlLTk3OWUtYTI0Y2FjZjRiZWZiIl0sImF1dGhfdGltZSI6MTUyOTc1MzQxNCwiZXhwIjoxNTI5NzU3MDE3LCJpYXQiOjE1Mjk3NTM0MTcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjJhYzE4MzRkLTVlYjYtNDZlYS1iNGI1LWViNmY2MDUwZTIzZCIsIm5vbmNlIjoiRFBNb2dXbE5TVXVvNUc0WSIsInJhdCI6MTUyOTc1MzQxMSwic3ViIjoiZm9vQGJhci5jb20ifQ.tQNjX7uYZS7gt9x592Eh7bcxFStEEjuS2Iv-yEzKY0q0gYq35WctblHkO1R5Od0XMWvje9O7gR9mzVsdQUjSoa-BBf-hmKj6FyZvAJoGBhwXbcU1fCCAFEQ3Qxha93-G4PGUDe6GR-XiKWfc5ruW78eeFLVBAaSyBha13kHOx-8bN73sKA9Myv_klLaH0cZIf7dAbRJjz4ZvVocY9v_1cFg1hr_m3TDRm4pKO3logiS3gIkhcMq6Wclc7ZEik-E8HVsOJz8y2qZRKkg2IDr9PYTvn2ttl35GFtSWYiCm2XLuI6uMqpxrCkMSkgEI7Q8ACtcxUHK-IZdZWyhgGfjzQHVuoARaIPW3DWnuHkfWFgFC_I-oj3jHnfjpiMmAgQMWDPNrRLUu69ngn07MzIiQeiNVBWVkdMom9Hv5ZmF12HYy_9DH7vyZ0SU-gsjUeP6yB0IcO7q8gz8CEtRUwPjqURFjWcW8xRqCEhjRsQ3SgAIM7j8_L5DttkQo-kVYugg-8onyEfLxuN3GVuAcZ5QPLT10G7k1Wfyuk_jKUAtwAZe12EjE7r3jcTGgd0Ge1AJXHJ8UIM87MbAiaNUrFrNR8ku0p9tr65bB08Glnj1qSDDYJK9lbsmDnbYv0AAzFtNfu5ruFJmmxoNSA0cYRP3UUSkHoaW_86kc2DaMqp4PRf8&state=72KCwf0G4nmJ71tU
10.763 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNzdiYWZjMzctN2MyOS00MzZlLTk3OWUtYTI0Y2FjZjRiZWZiIl0sImF1dGhfdGltZSI6MTUyOTc1MzQxNCwiZXhwIjoxNTI5NzU3MDE3LCJpYXQiOjE1Mjk3NTM0MTcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjJhYzE4MzRkLTVlYjYtNDZlYS1iNGI1LWViNmY2MDUwZTIzZCIsIm5vbmNlIjoiRFBNb2dXbE5TVXVvNUc0WSIsInJhdCI6MTUyOTc1MzQxMSwic3ViIjoiZm9vQGJhci5jb20ifQ.tQNjX7uYZS7gt9x592Eh7bcxFStEEjuS2Iv-yEzKY0q0gYq35WctblHkO1R5Od0XMWvje9O7gR9mzVsdQUjSoa-BBf-hmKj6FyZvAJoGBhwXbcU1fCCAFEQ3Qxha93-G4PGUDe6GR-XiKWfc5ruW78eeFLVBAaSyBha13kHOx-8bN73sKA9Myv_klLaH0cZIf7dAbRJjz4ZvVocY9v_1cFg1hr_m3TDRm4pKO3logiS3gIkhcMq6Wclc7ZEik-E8HVsOJz8y2qZRKkg2IDr9PYTvn2ttl35GFtSWYiCm2XLuI6uMqpxrCkMSkgEI7Q8ACtcxUHK-IZdZWyhgGfjzQHVuoARaIPW3DWnuHkfWFgFC_I-oj3jHnfjpiMmAgQMWDPNrRLUu69ngn07MzIiQeiNVBWVkdMom9Hv5ZmF12HYy_9DH7vyZ0SU-gsjUeP6yB0IcO7q8gz8CEtRUwPjqURFjWcW8xRqCEhjRsQ3SgAIM7j8_L5DttkQo-kVYugg-8onyEfLxuN3GVuAcZ5QPLT10G7k1Wfyuk_jKUAtwAZe12EjE7r3jcTGgd0Ge1AJXHJ8UIM87MbAiaNUrFrNR8ku0p9tr65bB08Glnj1qSDDYJK9lbsmDnbYv0AAzFtNfu5ruFJmmxoNSA0cYRP3UUSkHoaW_86kc2DaMqp4PRf8', 'state': '72KCwf0G4nmJ71tU'}
10.766 AuthorizationResponse {
"id_token": {
"aud": [
"77bafc37-7c29-436e-979e-a24cacf4befb"
],
"auth_time": 1529753414,
"exp": 1529757017,
"iat": 1529753417,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "2ac1834d-5eb6-46ea-b4b5-eb6f6050e23d",
"nonce": "DPMogWlNSUuo5G4Y",
"rat": 1529753411,
"sub": "[email protected]"
},
"state": "72KCwf0G4nmJ71tU"
}
10.767 phase <--<-- 10 --- AccessToken -->-->
10.767 phase <--<-- 11 --- Done -->-->
10.767 end
10.767 assertion AuthTimeCheck
10.767 condition auth_time-check: status=OK [Check that the auth_time returned in the ID Token is in the expected range.]
10.768 assertion VerifyResponse
10.768 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
10.768 assertion ClaimsCheck
10.768 condition claims-check: status=OK [Checks if specific claims is present or not]
10.769 assertion MultipleSignOn
10.769 condition multiple-sign-on: status=OK [Verifies that multiple authentications was used in the flow]
10.769 condition Done: status=OK
============================================================
Conditions
auth_time-check: status=OK [Check that the auth_time returned in the ID Token is in the expected range.]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
claims-check: status=OK [Checks if specific claims is present or not]
multiple-sign-on: status=OK [Verifies that multiple authentications was used in the flow]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/I.F.T.T.s/OP-Req-max_age=10000.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-max_age=10000
Test description: Requesting ID Token with max_age=10000 seconds restriction
Timestamp: 2018-06-23T11:30:23Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.084 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.085 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.085 phase <--<-- 2 --- Registration -->-->
0.085 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.086 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#X7wVXJDD4XCjHqI9"
],
"response_types": [
"id_token"
]
}
0.241 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.242 RegistrationResponse {
"client_id": "d93fcd38-9333-4af2-a146-706de067980f",
"client_secret": "xIeavEm~9.cu",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "d93fcd38-9333-4af2-a146-706de067980f",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#X7wVXJDD4XCjHqI9"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.242 phase <--<-- 3 --- AsyncAuthn -->-->
0.242 AuthorizationRequest {
"client_id": "d93fcd38-9333-4af2-a146-706de067980f",
"nonce": "yNBCcMfHnBMlyia0",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "5KeF3wNMSUgRmzdD"
}
0.243 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=d93fcd38-9333-4af2-a146-706de067980f&state=5KeF3wNMSUgRmzdD&response_type=id_token&nonce=yNBCcMfHnBMlyia0
0.243 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=d93fcd38-9333-4af2-a146-706de067980f&state=5KeF3wNMSUgRmzdD&response_type=id_token&nonce=yNBCcMfHnBMlyia0
2.599 http args {}
2.805 response URL with fragment
2.805 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZDkzZmNkMzgtOTMzMy00YWYyLWExNDYtNzA2ZGUwNjc5ODBmIl0sImF1dGhfdGltZSI6MTUyOTc1MzQxNCwiZXhwIjoxNTI5NzU3MDIxLCJpYXQiOjE1Mjk3NTM0MjEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImNlZDhiZjlhLTU2OTItNGViNi1hYzg5LTRiZTZmOTFiNzA0YyIsIm5vbmNlIjoieU5CQ2NNZkhuQk1seWlhMCIsInJhdCI6MTUyOTc1MzQxOSwic3ViIjoiZm9vQGJhci5jb20ifQ.hKol9yGZN04e8pI1TuhmVRpN6ovc3IGrSwjac50DRfJlrwLsFh4ayfdWaUZsgRAYIYerldhBHUCxy98mWYr-SgJZ5t5jI8M-l441OvSnoOvyuY2oNqafe7d7uokaEMToc6Jrg8leT0GxN-8eh0FMAbLvCaM4lvUwSbh3ziEmB3bzwJy812pKZYZ_PLXP41czPeQokEc5b4axV4ub83oa8O05_k599r2zBUH9Zd1gtNb_t-P0-ZrcR0a9Y8HYRzAyvBoNy9qkeQdj8311FMKSwEU41oQwF3DtaLPfLfnKAg1oPffirm1M52oPVLyGZKpf-0tv4H-_KI-9gWSUD4CMDXr1dHZsX1avIHSw92_ja1uPpVqgessYQnraO2-ZsyMvL7al9keX_G0XdDfbh9WC-u_IdmVcL71oJ4h89yfKqPtgYZFHCe2IQqUKM2GFdfK3yr03J2CbbHK0Q3hfsQnEcjVuuWuJUJrdGG5dXfe5P14qjUCigZHBj7exriPF5sIohWzWxJOhT1h4KKtjlZdOrXxr6l-nDTg8PsU2FF_GMpd7DgXK_kw4V7sXyMYkBG9lgPhrYUmwOs6nM7F4ZOocnbQapT175kAKqZgLwY1tCeIvFWn28jHTNFU0GvvkzS22AlQtskce_OVc3uKozE5PPk6d1NH-a3kBBm6J78uexdg&state=5KeF3wNMSUgRmzdD
2.806 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZDkzZmNkMzgtOTMzMy00YWYyLWExNDYtNzA2ZGUwNjc5ODBmIl0sImF1dGhfdGltZSI6MTUyOTc1MzQxNCwiZXhwIjoxNTI5NzU3MDIxLCJpYXQiOjE1Mjk3NTM0MjEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImNlZDhiZjlhLTU2OTItNGViNi1hYzg5LTRiZTZmOTFiNzA0YyIsIm5vbmNlIjoieU5CQ2NNZkhuQk1seWlhMCIsInJhdCI6MTUyOTc1MzQxOSwic3ViIjoiZm9vQGJhci5jb20ifQ.hKol9yGZN04e8pI1TuhmVRpN6ovc3IGrSwjac50DRfJlrwLsFh4ayfdWaUZsgRAYIYerldhBHUCxy98mWYr-SgJZ5t5jI8M-l441OvSnoOvyuY2oNqafe7d7uokaEMToc6Jrg8leT0GxN-8eh0FMAbLvCaM4lvUwSbh3ziEmB3bzwJy812pKZYZ_PLXP41czPeQokEc5b4axV4ub83oa8O05_k599r2zBUH9Zd1gtNb_t-P0-ZrcR0a9Y8HYRzAyvBoNy9qkeQdj8311FMKSwEU41oQwF3DtaLPfLfnKAg1oPffirm1M52oPVLyGZKpf-0tv4H-_KI-9gWSUD4CMDXr1dHZsX1avIHSw92_ja1uPpVqgessYQnraO2-ZsyMvL7al9keX_G0XdDfbh9WC-u_IdmVcL71oJ4h89yfKqPtgYZFHCe2IQqUKM2GFdfK3yr03J2CbbHK0Q3hfsQnEcjVuuWuJUJrdGG5dXfe5P14qjUCigZHBj7exriPF5sIohWzWxJOhT1h4KKtjlZdOrXxr6l-nDTg8PsU2FF_GMpd7DgXK_kw4V7sXyMYkBG9lgPhrYUmwOs6nM7F4ZOocnbQapT175kAKqZgLwY1tCeIvFWn28jHTNFU0GvvkzS22AlQtskce_OVc3uKozE5PPk6d1NH-a3kBBm6J78uexdg', 'state': '5KeF3wNMSUgRmzdD'}
2.925 AuthorizationResponse {
"id_token": {
"aud": [
"d93fcd38-9333-4af2-a146-706de067980f"
],
"auth_time": 1529753414,
"exp": 1529757021,
"iat": 1529753421,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "ced8bf9a-5692-4eb6-ac89-4be6f91b704c",
"nonce": "yNBCcMfHnBMlyia0",
"rat": 1529753419,
"sub": "[email protected]"
},
"state": "5KeF3wNMSUgRmzdD"
}
2.925 phase <--<-- 4 --- AccessToken -->-->
2.926 phase <--<-- 5 --- AsyncAuthn -->-->
2.926 AuthorizationRequest {
"client_id": "d93fcd38-9333-4af2-a146-706de067980f",
"max_age": 10000,
"nonce": "o2WTfATrVZ49dvLW",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "WRpNzRqUYRIuUO94"
}
2.926 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?max_age=10000&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=d93fcd38-9333-4af2-a146-706de067980f&state=WRpNzRqUYRIuUO94&response_type=id_token&nonce=o2WTfATrVZ49dvLW
2.926 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?max_age=10000&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=d93fcd38-9333-4af2-a146-706de067980f&state=WRpNzRqUYRIuUO94&response_type=id_token&nonce=o2WTfATrVZ49dvLW
4.354 http args {}
4.534 response URL with fragment
4.534 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZDkzZmNkMzgtOTMzMy00YWYyLWExNDYtNzA2ZGUwNjc5ODBmIl0sImF1dGhfdGltZSI6MTUyOTc1MzQxNCwiZXhwIjoxNTI5NzU3MDIzLCJpYXQiOjE1Mjk3NTM0MjMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjBlYzllYmMyLWY1NjQtNDVmMi05OWUzLWU5ODcyNGRiZTI0YiIsIm5vbmNlIjoibzJXVGZBVHJWWjQ5ZHZMVyIsInJhdCI6MTUyOTc1MzQyMiwic3ViIjoiZm9vQGJhci5jb20ifQ.hs-1amxk9bHk3OZ-tsz3-41eD-HEMiuBmhI6vBFKi13bfr27ztW75odSHAdUhBoSBaKt5tbUwPsfR_lVBQ5E28ExRA4KCToELNrt6jfCorIVxsikqgr7TRMGqEXvwCZqXG-eKzWKma1nuR5jEx_7jDjCKUZuqgDSgPFVB2qzINQJiJKL1P-6rFaFOnL5phvL0Rz91kZGCw0-7v6moDb4KL0cPXcp784GmPMVOeXNjGyzex6-cM9GAJfPAIVkc-6eSnhc4f7xUOH2m607BLqPm-ue5xniyYJat00mbO528kWMshmv-51ZB-3Owg2kaD83hL_fXW_suDqHrLvi6jNL9RjP3-s43pH4DXUrrNNeyHwv7PUdrmXa9B6x8U30KKI21RkiA3xj0iNHqN08b-zpB_dWZey_gqU1UfHDeZRQ_ZTpTkvNqIamQVHtomGquwnbdIlXiDenbpOUghBCfmbSXgCA-0TD6gUTD1jvbvfZ-IVVWg2pllAnIlTFuNvqrUpCfe6OhSG-q-zWMzMHdzc5QIzTGh04D4A7pndodKuFwV5FmT62ltu-wOLKivzWk1KmgGaTIEGmvuAfbN1iQYutLlRlCJGIwaKfY5B_WyWruxmr6i0ZQEmK09Wnpdb2WveGArb_5wzC80EFA1LuFefg1TAsSCrwPjZnCY9AYsbic20&state=WRpNzRqUYRIuUO94
4.535 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZDkzZmNkMzgtOTMzMy00YWYyLWExNDYtNzA2ZGUwNjc5ODBmIl0sImF1dGhfdGltZSI6MTUyOTc1MzQxNCwiZXhwIjoxNTI5NzU3MDIzLCJpYXQiOjE1Mjk3NTM0MjMsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjBlYzllYmMyLWY1NjQtNDVmMi05OWUzLWU5ODcyNGRiZTI0YiIsIm5vbmNlIjoibzJXVGZBVHJWWjQ5ZHZMVyIsInJhdCI6MTUyOTc1MzQyMiwic3ViIjoiZm9vQGJhci5jb20ifQ.hs-1amxk9bHk3OZ-tsz3-41eD-HEMiuBmhI6vBFKi13bfr27ztW75odSHAdUhBoSBaKt5tbUwPsfR_lVBQ5E28ExRA4KCToELNrt6jfCorIVxsikqgr7TRMGqEXvwCZqXG-eKzWKma1nuR5jEx_7jDjCKUZuqgDSgPFVB2qzINQJiJKL1P-6rFaFOnL5phvL0Rz91kZGCw0-7v6moDb4KL0cPXcp784GmPMVOeXNjGyzex6-cM9GAJfPAIVkc-6eSnhc4f7xUOH2m607BLqPm-ue5xniyYJat00mbO528kWMshmv-51ZB-3Owg2kaD83hL_fXW_suDqHrLvi6jNL9RjP3-s43pH4DXUrrNNeyHwv7PUdrmXa9B6x8U30KKI21RkiA3xj0iNHqN08b-zpB_dWZey_gqU1UfHDeZRQ_ZTpTkvNqIamQVHtomGquwnbdIlXiDenbpOUghBCfmbSXgCA-0TD6gUTD1jvbvfZ-IVVWg2pllAnIlTFuNvqrUpCfe6OhSG-q-zWMzMHdzc5QIzTGh04D4A7pndodKuFwV5FmT62ltu-wOLKivzWk1KmgGaTIEGmvuAfbN1iQYutLlRlCJGIwaKfY5B_WyWruxmr6i0ZQEmK09Wnpdb2WveGArb_5wzC80EFA1LuFefg1TAsSCrwPjZnCY9AYsbic20', 'state': 'WRpNzRqUYRIuUO94'}
4.538 AuthorizationResponse {
"id_token": {
"aud": [
"d93fcd38-9333-4af2-a146-706de067980f"
],
"auth_time": 1529753414,
"exp": 1529757023,
"iat": 1529753423,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "0ec9ebc2-f564-45f2-99e3-e98724dbe24b",
"nonce": "o2WTfATrVZ49dvLW",
"rat": 1529753422,
"sub": "[email protected]"
},
"state": "WRpNzRqUYRIuUO94"
}
4.538 phase <--<-- 6 --- AccessToken -->-->
4.538 phase <--<-- 7 --- Done -->-->
4.538 end
4.539 assertion AuthTimeCheck
4.539 condition auth_time-check: status=OK [Check that the auth_time returned in the ID Token is in the expected range.]
4.539 assertion VerifyResponse
4.539 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4.54 assertion SameAuthn
4.54 condition same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
4.54 assertion ClaimsCheck
4.54 condition claims-check: status=OK [Checks if specific claims is present or not]
4.54 condition Done: status=OK
============================================================
Conditions
auth_time-check: status=OK [Check that the auth_time returned in the ID Token is in the expected range.]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
same-authn: status=OK [Verifies that the same authentication was used twice in the flow.]
claims-check: status=OK [Checks if specific claims is present or not]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/I.F.T.T.s/OP-Req-NotUnderstood.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-NotUnderstood
Test description: Request with extra query component
Timestamp: 2018-06-23T11:29:37Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.077 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.078 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.079 phase <--<-- 2 --- Registration -->-->
0.079 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.079 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#0DuikWdP5OmelY9p"
],
"response_types": [
"id_token"
]
}
0.257 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.258 RegistrationResponse {
"client_id": "f874e5fe-71c0-4506-9450-9ecc8b59f61f",
"client_secret": "zeM2inh-fcVr",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "f874e5fe-71c0-4506-9450-9ecc8b59f61f",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#0DuikWdP5OmelY9p"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.259 phase <--<-- 3 --- AsyncAuthn -->-->
0.259 AuthorizationRequest {
"client_id": "f874e5fe-71c0-4506-9450-9ecc8b59f61f",
"extra": "foobar",
"nonce": "9lrETMbAPjMZSB5Y",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "cIGXH5gu8WuWbbyD"
}
0.259 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?extra=foobar&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=f874e5fe-71c0-4506-9450-9ecc8b59f61f&state=cIGXH5gu8WuWbbyD&response_type=id_token&nonce=9lrETMbAPjMZSB5Y
0.259 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?extra=foobar&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=f874e5fe-71c0-4506-9450-9ecc8b59f61f&state=cIGXH5gu8WuWbbyD&response_type=id_token&nonce=9lrETMbAPjMZSB5Y
2.598 http args {}
2.788 response URL with fragment
2.788 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZjg3NGU1ZmUtNzFjMC00NTA2LTk0NTAtOWVjYzhiNTlmNjFmIl0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTc3LCJpYXQiOjE1Mjk3NTMzNzcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjBlZmI2MjUwLTFhODUtNGRmNC1hN2I2LTdiNTBkNzkyOGE3MCIsIm5vbmNlIjoiOWxyRVRNYkFQak1aU0I1WSIsInJhdCI6MTUyOTc1MzM3NSwic3ViIjoiZm9vQGJhci5jb20ifQ.guGbaCVWpAjxxr17512Y4vHyiyCLUoioJqHAd80sz0oikDxnDqWzHCC9Bxg9SIlVP0lzjykBuGYjeDQEBqPzMtkvwzVHQbMYycUApYgpxNZ6qRrr95qWb8WEo92b_rt8vO50-X0bGQWpiraBc2VuN0dbX92i9hu074d0hNVwmPrCOVzEJDmCpKRKyNMQ0a85RXr4tqT6hieXYgVZrRIBjCik30BeA3vM4Syw2Ab7NuHe7yYZmaolffH2cCC0oLG1Ftl7XqRzhT8qT1lHW7-yQs7Le3YAJW4xdC30QLKp1-4sXFfPtltu013ouGlM8A42sPMvDrI-BR6jIGtR4SHO6wI8qTvVafelMlvcFFqmg2CilAfkgutRKfLuuvGg5Q1_9quWlfZH6mhAAKt5kt9oR2BzSNI1Ot_C_TC_H4729wj1_cPiQ9SrVudsSpx5b09TXzPKkdpe7zoGjeQ5Luqezo-NERS4TuhkRswMfmsxk1NGSWQ-anWBIZZImq6qnZSlwpVKcLTOLe-VzvNW5-MDk2dH7eDhg4Y4LD94A4MAtdwcrtn5DY9OsQQNafhpoyk8AwNpmJ7JqjnKVIqjlHC-bp0txp8CyuuAtnYrG6cCqtVGSAvQsMp_BN4o4O9JTg_rmwuLPWO2lFB06noyyI0KwMHr3ayPdSJaIX6TTgm-4Sw&state=cIGXH5gu8WuWbbyD
2.788 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZjg3NGU1ZmUtNzFjMC00NTA2LTk0NTAtOWVjYzhiNTlmNjFmIl0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTc3LCJpYXQiOjE1Mjk3NTMzNzcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjBlZmI2MjUwLTFhODUtNGRmNC1hN2I2LTdiNTBkNzkyOGE3MCIsIm5vbmNlIjoiOWxyRVRNYkFQak1aU0I1WSIsInJhdCI6MTUyOTc1MzM3NSwic3ViIjoiZm9vQGJhci5jb20ifQ.guGbaCVWpAjxxr17512Y4vHyiyCLUoioJqHAd80sz0oikDxnDqWzHCC9Bxg9SIlVP0lzjykBuGYjeDQEBqPzMtkvwzVHQbMYycUApYgpxNZ6qRrr95qWb8WEo92b_rt8vO50-X0bGQWpiraBc2VuN0dbX92i9hu074d0hNVwmPrCOVzEJDmCpKRKyNMQ0a85RXr4tqT6hieXYgVZrRIBjCik30BeA3vM4Syw2Ab7NuHe7yYZmaolffH2cCC0oLG1Ftl7XqRzhT8qT1lHW7-yQs7Le3YAJW4xdC30QLKp1-4sXFfPtltu013ouGlM8A42sPMvDrI-BR6jIGtR4SHO6wI8qTvVafelMlvcFFqmg2CilAfkgutRKfLuuvGg5Q1_9quWlfZH6mhAAKt5kt9oR2BzSNI1Ot_C_TC_H4729wj1_cPiQ9SrVudsSpx5b09TXzPKkdpe7zoGjeQ5Luqezo-NERS4TuhkRswMfmsxk1NGSWQ-anWBIZZImq6qnZSlwpVKcLTOLe-VzvNW5-MDk2dH7eDhg4Y4LD94A4MAtdwcrtn5DY9OsQQNafhpoyk8AwNpmJ7JqjnKVIqjlHC-bp0txp8CyuuAtnYrG6cCqtVGSAvQsMp_BN4o4O9JTg_rmwuLPWO2lFB06noyyI0KwMHr3ayPdSJaIX6TTgm-4Sw', 'state': 'cIGXH5gu8WuWbbyD'}
2.87 AuthorizationResponse {
"id_token": {
"aud": [
"f874e5fe-71c0-4506-9450-9ecc8b59f61f"
],
"auth_time": 1529753285,
"exp": 1529756977,
"iat": 1529753377,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "0efb6250-1a85-4df4-a7b6-7b50d7928a70",
"nonce": "9lrETMbAPjMZSB5Y",
"rat": 1529753375,
"sub": "[email protected]"
},
"state": "cIGXH5gu8WuWbbyD"
}
2.871 phase <--<-- 4 --- Done -->-->
2.871 end
2.871 assertion VerifyAuthnResponse
2.871 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
2.871 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/I.F.T.T.s/OP-Req-ui_locales.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Req-ui_locales
Test description: Providing ui_locales
Timestamp: 2018-06-23T11:30:29Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Note -->-->
1.339 phase <--<-- 1 --- Webfinger -->-->
1.339 not expected to do WebFinger
1.339 phase <--<-- 2 --- Discovery -->-->
1.34 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
1.414 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
1.415 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
1.415 phase <--<-- 3 --- Registration -->-->
1.415 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
1.415 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#iqA7LLbvAbBrCifI"
],
"response_types": [
"id_token"
]
}
1.574 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
1.575 RegistrationResponse {
"client_id": "8a1f018d-0736-4777-a31c-e6863b1aad06",
"client_secret": "~~E8o16kj4M3",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "8a1f018d-0736-4777-a31c-e6863b1aad06",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#iqA7LLbvAbBrCifI"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
1.575 phase <--<-- 4 --- AsyncAuthn -->-->
1.575 AuthorizationRequest {
"client_id": "8a1f018d-0736-4777-a31c-e6863b1aad06",
"nonce": "zFEENkQ7u46b7FUQ",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "ghQaB79F1Dpi61XV",
"ui_locales": "se"
}
1.576 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?ui_locales=se&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=8a1f018d-0736-4777-a31c-e6863b1aad06&state=ghQaB79F1Dpi61XV&response_type=id_token&nonce=zFEENkQ7u46b7FUQ
1.576 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?ui_locales=se&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=8a1f018d-0736-4777-a31c-e6863b1aad06&state=ghQaB79F1Dpi61XV&response_type=id_token&nonce=zFEENkQ7u46b7FUQ
3.769 http args {}
3.939 response URL with fragment
3.939 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiOGExZjAxOGQtMDczNi00Nzc3LWEzMWMtZTY4NjNiMWFhZDA2Il0sImF1dGhfdGltZSI6MTUyOTc1MzQxNCwiZXhwIjoxNTI5NzU3MDI4LCJpYXQiOjE1Mjk3NTM0MjgsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImYxOGM5YzEwLTZlMGItNDM1ZC04ODAyLWI3NDRmNDViM2M4ZCIsIm5vbmNlIjoiekZFRU5rUTd1NDZiN0ZVUSIsInJhdCI6MTUyOTc1MzQyNiwic3ViIjoiZm9vQGJhci5jb20ifQ.MLrjAHJFkXRvb9G3LvfaK2cKu2i7Sp1yuFdk2KgQRMzOKdmJQ0y4CVEUo_qK0hnbq3qK8syw690e-pLUCUKH9XQKSbHOrepfmPmLr-E4zyE3coo6f3YflfKjQ3EiGdSWARYA8vOLa1TFonvVwtyPCRU05YZwUp0cG59U_4DLPDPpN6ChESiaDPhFqUD5Ds7kWbsucLW_zs8H_V1LADkC3qjRszHpatjpLejU0Xumaq_3JmgfSFsrCbOx2TLuF3uF4cDy9QhZ1ppQfCbxk9qbyRmju9rFPx9Fm7bDUCoROnNq0rLWuAGspVQ-k81uMlU21_7itqBcdQ4dRhG3SnuFzHDcjxuPD7eVPF1ghRLn0BFccEu4GJyPud3kvGkWxXSsgmh9L5P-5PWcaUorCxwHwWKDM4XaAcbetzU9UsvBVrjP1_Iwok-EMm5PBTC3jLBfOr-8H5fueNgNTPZE6GW2jsvQC3Hf0YuMkbETvINd-TbvNVG1WVj77SYogzELgKfHrsOUIk2sIcDqqe6-fcS5zv_OKz7PrBBWReQZUU4r_bG8dEIvThIUd88hhH1RFlOXneDGNqEi0Y71l267JS9Yrgp6f0JH-ewJJY9bVWpcSUJetOa0EF6JcsTERJOUToiqGM7b6HHWMBxm6krEn6I5ylBlGZWhn2bZIqOVhyH804A&state=ghQaB79F1Dpi61XV
3.939 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiOGExZjAxOGQtMDczNi00Nzc3LWEzMWMtZTY4NjNiMWFhZDA2Il0sImF1dGhfdGltZSI6MTUyOTc1MzQxNCwiZXhwIjoxNTI5NzU3MDI4LCJpYXQiOjE1Mjk3NTM0MjgsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImYxOGM5YzEwLTZlMGItNDM1ZC04ODAyLWI3NDRmNDViM2M4ZCIsIm5vbmNlIjoiekZFRU5rUTd1NDZiN0ZVUSIsInJhdCI6MTUyOTc1MzQyNiwic3ViIjoiZm9vQGJhci5jb20ifQ.MLrjAHJFkXRvb9G3LvfaK2cKu2i7Sp1yuFdk2KgQRMzOKdmJQ0y4CVEUo_qK0hnbq3qK8syw690e-pLUCUKH9XQKSbHOrepfmPmLr-E4zyE3coo6f3YflfKjQ3EiGdSWARYA8vOLa1TFonvVwtyPCRU05YZwUp0cG59U_4DLPDPpN6ChESiaDPhFqUD5Ds7kWbsucLW_zs8H_V1LADkC3qjRszHpatjpLejU0Xumaq_3JmgfSFsrCbOx2TLuF3uF4cDy9QhZ1ppQfCbxk9qbyRmju9rFPx9Fm7bDUCoROnNq0rLWuAGspVQ-k81uMlU21_7itqBcdQ4dRhG3SnuFzHDcjxuPD7eVPF1ghRLn0BFccEu4GJyPud3kvGkWxXSsgmh9L5P-5PWcaUorCxwHwWKDM4XaAcbetzU9UsvBVrjP1_Iwok-EMm5PBTC3jLBfOr-8H5fueNgNTPZE6GW2jsvQC3Hf0YuMkbETvINd-TbvNVG1WVj77SYogzELgKfHrsOUIk2sIcDqqe6-fcS5zv_OKz7PrBBWReQZUU4r_bG8dEIvThIUd88hhH1RFlOXneDGNqEi0Y71l267JS9Yrgp6f0JH-ewJJY9bVWpcSUJetOa0EF6JcsTERJOUToiqGM7b6HHWMBxm6krEn6I5ylBlGZWhn2bZIqOVhyH804A', 'state': 'ghQaB79F1Dpi61XV'}
4.057 AuthorizationResponse {
"id_token": {
"aud": [
"8a1f018d-0736-4777-a31c-e6863b1aad06"
],
"auth_time": 1529753414,
"exp": 1529757028,
"iat": 1529753428,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "f18c9c10-6e0b-435d-8802-b744f45b3c8d",
"nonce": "zFEENkQ7u46b7FUQ",
"rat": 1529753426,
"sub": "[email protected]"
},
"state": "ghQaB79F1Dpi61XV"
}
4.057 phase <--<-- 5 --- Done -->-->
4.057 end
4.057 assertion VerifyAuthnResponse
4.057 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
4.058 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/I.F.T.T.s/OP-request-Unsigned.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-request-Unsigned
Test description: Support request request parameter with unsigned request
Timestamp: 2018-06-23T11:29:03Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.074 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.075 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.075 phase <--<-- 2 --- Registration -->-->
0.076 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'request_object_signing_alg': 'none'}
0.076 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "none",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#0ckDfLlAM3qUCZ9r"
],
"response_types": [
"id_token"
]
}
0.25 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.251 RegistrationResponse {
"client_id": "cbe8c563-34fd-4650-89da-4b80ada2faae",
"client_secret": "ZK~rCxnYcTUu",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "cbe8c563-34fd-4650-89da-4b80ada2faae",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "none",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#0ckDfLlAM3qUCZ9r"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.251 phase <--<-- 3 --- AsyncAuthn -->-->
0.252 AuthorizationRequest {
"client_id": "cbe8c563-34fd-4650-89da-4b80ada2faae",
"nonce": "iN2lT3uQKDh3j5zT",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"request": "eyJhbGciOiJub25lIn0.eyJzY29wZSI6ICJvcGVuaWQiLCAicmVkaXJlY3RfdXJpIjogImh0dHBzOi8vb3AuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0OjYxMzUzL2F1dGh6X2NiIiwgImNsaWVudF9pZCI6ICJjYmU4YzU2My0zNGZkLTQ2NTAtODlkYS00YjgwYWRhMmZhYWUiLCAic3RhdGUiOiAiOG5xTlFROGRPR3VHd2cwZyIsICJyZXNwb25zZV90eXBlIjogImlkX3Rva2VuIiwgIm5vbmNlIjogImlOMmxUM3VRS0RoM2o1elQifQ.",
"response_type": "id_token",
"scope": "openid",
"state": "8nqNQQ8dOGuGwg0g"
}
0.253 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=cbe8c563-34fd-4650-89da-4b80ada2faae&response_type=id_token&state=8nqNQQ8dOGuGwg0g&request=eyJhbGciOiJub25lIn0.eyJzY29wZSI6ICJvcGVuaWQiLCAicmVkaXJlY3RfdXJpIjogImh0dHBzOi8vb3AuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0OjYxMzUzL2F1dGh6X2NiIiwgImNsaWVudF9pZCI6ICJjYmU4YzU2My0zNGZkLTQ2NTAtODlkYS00YjgwYWRhMmZhYWUiLCAic3RhdGUiOiAiOG5xTlFROGRPR3VHd2cwZyIsICJyZXNwb25zZV90eXBlIjogImlkX3Rva2VuIiwgIm5vbmNlIjogImlOMmxUM3VRS0RoM2o1elQifQ.&nonce=iN2lT3uQKDh3j5zT
0.253 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=cbe8c563-34fd-4650-89da-4b80ada2faae&response_type=id_token&state=8nqNQQ8dOGuGwg0g&request=eyJhbGciOiJub25lIn0.eyJzY29wZSI6ICJvcGVuaWQiLCAicmVkaXJlY3RfdXJpIjogImh0dHBzOi8vb3AuY2VydGlmaWNhdGlvbi5vcGVuaWQubmV0OjYxMzUzL2F1dGh6X2NiIiwgImNsaWVudF9pZCI6ICJjYmU4YzU2My0zNGZkLTQ2NTAtODlkYS00YjgwYWRhMmZhYWUiLCAic3RhdGUiOiAiOG5xTlFROGRPR3VHd2cwZyIsICJyZXNwb25zZV90eXBlIjogImlkX3Rva2VuIiwgIm5vbmNlIjogImlOMmxUM3VRS0RoM2o1elQifQ.&nonce=iN2lT3uQKDh3j5zT
2.791 http args {}
3.006 response URL with fragment
3.006 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiY2JlOGM1NjMtMzRmZC00NjUwLTg5ZGEtNGI4MGFkYTJmYWFlIl0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTQyLCJpYXQiOjE1Mjk3NTMzNDIsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImZkMzU2MDZjLTc4YjEtNDMxZC04YjMwLTliNzVlNDFmN2YzOCIsIm5vbmNlIjoiaU4ybFQzdVFLRGgzajV6VCIsInJhdCI6MTUyOTc1MzM0MCwic3ViIjoiZm9vQGJhci5jb20ifQ.VHippiEH_d1e1o1WfXIDpK9ILolLFO-So_LvxzfMH5mGeX6oDwhGm9zDPXWaKaeKoPQHNmk2EmK-egdC76jEhS9yEJQNOWSz3SJ4Gc5tXIzvEehFxdBn1oi-TmvxxsWRMuGMs9XDd_x64RycaikOz-NYcclPEdVzx4rDvBhMVJzRkha4ki5Kcv-P_hAlwPIcvpFAy_X7ThPZxLnFor9hYfMgEZ-tZ__BwqrLly9FZU47rKgYuRbO7qG39YGN2y2S9l5V64oQX3kdXpvzzWOG7FCp2SombK0o6il2xz-zC6AZou2TWVO6PyNmmwFuKx1TVqvbB3IhqDvmzMZA_HBpUCWclWdW-R6euvV66QQm0gNgKaRhqEeycfnNuKLCPCHFawh1gYOeF6p3pXC1ajbPvLgAxVdX4rLPkGDup8gPdB6INnkrWz4EhFJNRaJ_q-vnmygDhZDIY8Qkf5NYKBxGsyDVGLBxkR202hYM-JB1b653Nf6OUj2qfnwde0UD4MZNV94-BERv8kAd_ZcwKSrFBE7pBEgCexY1xQ1tWiUBzKb0hGNqF5cWPPvINbUCx2Vm8PAmEfmNXZXfOyfWfHL-m5cLR1f4uUeXp_c46xreD5Aff7_pKRmok24HwVxNpRLub3no14VU_F6e52vf40UeAO-Vkh5EdfELREOIqzPGSsQ&state=8nqNQQ8dOGuGwg0g
3.006 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiY2JlOGM1NjMtMzRmZC00NjUwLTg5ZGEtNGI4MGFkYTJmYWFlIl0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTQyLCJpYXQiOjE1Mjk3NTMzNDIsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImZkMzU2MDZjLTc4YjEtNDMxZC04YjMwLTliNzVlNDFmN2YzOCIsIm5vbmNlIjoiaU4ybFQzdVFLRGgzajV6VCIsInJhdCI6MTUyOTc1MzM0MCwic3ViIjoiZm9vQGJhci5jb20ifQ.VHippiEH_d1e1o1WfXIDpK9ILolLFO-So_LvxzfMH5mGeX6oDwhGm9zDPXWaKaeKoPQHNmk2EmK-egdC76jEhS9yEJQNOWSz3SJ4Gc5tXIzvEehFxdBn1oi-TmvxxsWRMuGMs9XDd_x64RycaikOz-NYcclPEdVzx4rDvBhMVJzRkha4ki5Kcv-P_hAlwPIcvpFAy_X7ThPZxLnFor9hYfMgEZ-tZ__BwqrLly9FZU47rKgYuRbO7qG39YGN2y2S9l5V64oQX3kdXpvzzWOG7FCp2SombK0o6il2xz-zC6AZou2TWVO6PyNmmwFuKx1TVqvbB3IhqDvmzMZA_HBpUCWclWdW-R6euvV66QQm0gNgKaRhqEeycfnNuKLCPCHFawh1gYOeF6p3pXC1ajbPvLgAxVdX4rLPkGDup8gPdB6INnkrWz4EhFJNRaJ_q-vnmygDhZDIY8Qkf5NYKBxGsyDVGLBxkR202hYM-JB1b653Nf6OUj2qfnwde0UD4MZNV94-BERv8kAd_ZcwKSrFBE7pBEgCexY1xQ1tWiUBzKb0hGNqF5cWPPvINbUCx2Vm8PAmEfmNXZXfOyfWfHL-m5cLR1f4uUeXp_c46xreD5Aff7_pKRmok24HwVxNpRLub3no14VU_F6e52vf40UeAO-Vkh5EdfELREOIqzPGSsQ', 'state': '8nqNQQ8dOGuGwg0g'}
3.088 AuthorizationResponse {
"id_token": {
"aud": [
"cbe8c563-34fd-4650-89da-4b80ada2faae"
],
"auth_time": 1529753285,
"exp": 1529756942,
"iat": 1529753342,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "fd35606c-78b1-431d-8b30-9b75e41f7f38",
"nonce": "iN2lT3uQKDh3j5zT",
"rat": 1529753340,
"sub": "[email protected]"
},
"state": "8nqNQQ8dOGuGwg0g"
}
3.088 phase <--<-- 4 --- Done -->-->
3.088 end
3.089 assertion VerifyAuthnOrErrorResponse
3.089 condition authn-response-or-error: status=OK [Checks that the last response was a JSON encoded authentication or error message]
3.089 condition Done: status=OK
============================================================
Conditions
authn-response-or-error: status=OK [Checks that the last response was a JSON encoded authentication or error message]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/I.F.T.T.s/OP-request_uri-Sig.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-request_uri-Sig
Test description: Support request_uri request parameter with signed request
Timestamp: 2018-06-23T11:29:07Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.114 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.115 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.115 phase <--<-- 2 --- Registration -->-->
0.115 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'request_object_signing_alg': 'RS256'}
0.116 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "RS256",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#2wYfiTH1XUlJQN0c"
],
"response_types": [
"id_token"
]
}
0.28 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.281 RegistrationResponse {
"client_id": "79deb0a8-c9be-4c97-9e93-75345cbfe09f",
"client_secret": "vmPEgHPFcZw8",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "79deb0a8-c9be-4c97-9e93-75345cbfe09f",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "RS256",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#2wYfiTH1XUlJQN0c"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.281 phase <--<-- 3 --- AsyncAuthn -->-->
0.284 AuthorizationRequest {
"client_id": "79deb0a8-c9be-4c97-9e93-75345cbfe09f",
"nonce": "ZhQi2rLhkOwngbG9",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"request_uri": "https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#2wYfiTH1XUlJQN0c",
"response_type": "id_token",
"scope": "openid",
"state": "1MfbJpMFqwE20YkP"
}
0.285 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?request_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Frequests%2Fe3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9%232wYfiTH1XUlJQN0c&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=79deb0a8-c9be-4c97-9e93-75345cbfe09f&state=1MfbJpMFqwE20YkP&response_type=id_token&nonce=ZhQi2rLhkOwngbG9
0.285 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?request_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Frequests%2Fe3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9%232wYfiTH1XUlJQN0c&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=79deb0a8-c9be-4c97-9e93-75345cbfe09f&state=1MfbJpMFqwE20YkP&response_type=id_token&nonce=ZhQi2rLhkOwngbG9
2.815 http args {}
3.03 response URL with fragment
3.03 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNzlkZWIwYTgtYzliZS00Yzk3LTllOTMtNzUzNDVjYmZlMDlmIl0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTQ3LCJpYXQiOjE1Mjk3NTMzNDcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjY0NTdmMmZhLTUxODQtNGE1ZS04ZGIwLTQzMmZiMDM2N2I4OSIsIm5vbmNlIjoiWmhRaTJyTGhrT3duZ2JHOSIsInJhdCI6MTUyOTc1MzM0NSwic3ViIjoiZm9vQGJhci5jb20ifQ.mcY-oIBXvnVm-qNe3OscohC8DfqahLRj-_lmp6ONdiyD5kjy0ASVRKkHaGToXqY36-a27AmeB6_4ks-I1_lv2yGDHjkigDtMlflqBHncrVI-FBNDcgr0bXL2kJ8qGwb7aQ7LHqptofIVXVYn9zPkjxpjuI3kzU3dZhcLd8W_7JI2szgMSoj9moMmUA9gg3bVz4rO9Y3QjFT26amjnXFtgqcp-en69L3E9na49L6sW5o3ftku85VsFysllwsVCifvRyrYF48_poNgtN_zQ8iKHMswB28cMrpUuZ5RR9Gotut646_IbOSHHW7hVN0kEXHCX01veMTj1Kg510VutH7ybO7YN5lS2SQvRTA_6q6-a5BM5MikxhK9q4Egi6vYmGjGsKprPIrSNirVtOQQ28rJYQaepHShRwfYPjKnwIyWO1WDv5k1mccNSoSc2vDY8nLiFT6_C1qpc1TkfnhnhVmX9tI3VXrOwQJdh-66XjpV2x5o9wu_d5m8v_8IN2NrGClg9GSsVpkK5XC_1FcUp0IKPW3YXwX0azF_w1n9zYIUWjiilhjvrkEGX0jtQNaQ1ZdEdmoHSLVxwq2eC92SevNh6K0TO2yMb5kg9f1nALdq9uXxbyQ7XI2Yigs4hAytRNWf0LK_ueJO8x0TSyt5IIRhbOjdJX_RiHeYxhpbjXxcqk4&state=1MfbJpMFqwE20YkP
3.031 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNzlkZWIwYTgtYzliZS00Yzk3LTllOTMtNzUzNDVjYmZlMDlmIl0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTQ3LCJpYXQiOjE1Mjk3NTMzNDcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjY0NTdmMmZhLTUxODQtNGE1ZS04ZGIwLTQzMmZiMDM2N2I4OSIsIm5vbmNlIjoiWmhRaTJyTGhrT3duZ2JHOSIsInJhdCI6MTUyOTc1MzM0NSwic3ViIjoiZm9vQGJhci5jb20ifQ.mcY-oIBXvnVm-qNe3OscohC8DfqahLRj-_lmp6ONdiyD5kjy0ASVRKkHaGToXqY36-a27AmeB6_4ks-I1_lv2yGDHjkigDtMlflqBHncrVI-FBNDcgr0bXL2kJ8qGwb7aQ7LHqptofIVXVYn9zPkjxpjuI3kzU3dZhcLd8W_7JI2szgMSoj9moMmUA9gg3bVz4rO9Y3QjFT26amjnXFtgqcp-en69L3E9na49L6sW5o3ftku85VsFysllwsVCifvRyrYF48_poNgtN_zQ8iKHMswB28cMrpUuZ5RR9Gotut646_IbOSHHW7hVN0kEXHCX01veMTj1Kg510VutH7ybO7YN5lS2SQvRTA_6q6-a5BM5MikxhK9q4Egi6vYmGjGsKprPIrSNirVtOQQ28rJYQaepHShRwfYPjKnwIyWO1WDv5k1mccNSoSc2vDY8nLiFT6_C1qpc1TkfnhnhVmX9tI3VXrOwQJdh-66XjpV2x5o9wu_d5m8v_8IN2NrGClg9GSsVpkK5XC_1FcUp0IKPW3YXwX0azF_w1n9zYIUWjiilhjvrkEGX0jtQNaQ1ZdEdmoHSLVxwq2eC92SevNh6K0TO2yMb5kg9f1nALdq9uXxbyQ7XI2Yigs4hAytRNWf0LK_ueJO8x0TSyt5IIRhbOjdJX_RiHeYxhpbjXxcqk4', 'state': '1MfbJpMFqwE20YkP'}
3.114 AuthorizationResponse {
"id_token": {
"aud": [
"79deb0a8-c9be-4c97-9e93-75345cbfe09f"
],
"auth_time": 1529753285,
"exp": 1529756947,
"iat": 1529753347,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "6457f2fa-5184-4a5e-8db0-432fb0367b89",
"nonce": "ZhQi2rLhkOwngbG9",
"rat": 1529753345,
"sub": "[email protected]"
},
"state": "1MfbJpMFqwE20YkP"
}
3.114 phase <--<-- 4 --- Done -->-->
3.114 end
3.114 assertion VerifyAuthnOrErrorResponse
3.114 condition authn-response-or-error: status=OK [Checks that the last response was a JSON encoded authentication or error message]
3.114 condition Done: status=OK
============================================================
Conditions
authn-response-or-error: status=OK [Checks that the last response was a JSON encoded authentication or error message]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/I.F.T.T.s/OP-request_uri-Unsigned.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-request_uri-Unsigned
Test description: Support request_uri request parameter with unsigned request
Timestamp: 2018-06-23T11:29:12Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.073 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Registration -->-->
0.074 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients', 'request_object_signing_alg': 'none'}
0.074 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "none",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#6cKkT30n0qCXKm3d"
],
"response_types": [
"id_token"
]
}
0.231 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.231 RegistrationResponse {
"client_id": "65d246b1-6eb5-43e2-ad5e-f481f8eb7585",
"client_secret": "ZKd~pawuaklA",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "65d246b1-6eb5-43e2-ad5e-f481f8eb7585",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_object_signing_alg": "none",
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#6cKkT30n0qCXKm3d"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.232 phase <--<-- 3 --- AsyncAuthn -->-->
0.233 AuthorizationRequest {
"client_id": "65d246b1-6eb5-43e2-ad5e-f481f8eb7585",
"nonce": "E9VHQfhMyvbwM1xq",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"request_uri": "https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#6cKkT30n0qCXKm3d",
"response_type": "id_token",
"scope": "openid",
"state": "gCXWUqjbI6XP07Hi"
}
0.233 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?request_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Frequests%2Fe3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9%236cKkT30n0qCXKm3d&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=65d246b1-6eb5-43e2-ad5e-f481f8eb7585&state=gCXWUqjbI6XP07Hi&response_type=id_token&nonce=E9VHQfhMyvbwM1xq
0.233 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?request_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Frequests%2Fe3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9%236cKkT30n0qCXKm3d&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=65d246b1-6eb5-43e2-ad5e-f481f8eb7585&state=gCXWUqjbI6XP07Hi&response_type=id_token&nonce=E9VHQfhMyvbwM1xq
3.068 http args {}
3.239 response URL with fragment
3.24 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNjVkMjQ2YjEtNmViNS00M2UyLWFkNWUtZjQ4MWY4ZWI3NTg1Il0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTUxLCJpYXQiOjE1Mjk3NTMzNTEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImE0MGVkOWVjLWVhZDktNDJhYS04MGQxLTViNTU1NjRjNGQwMSIsIm5vbmNlIjoiRTlWSFFmaE15dmJ3TTF4cSIsInJhdCI6MTUyOTc1MzM0OSwic3ViIjoiZm9vQGJhci5jb20ifQ.Ac7Et293_H1ztW2uOwHYHWnz3lvSytmwspBfMwtakC6WtadduvJofCIX4MOMiE0Tfv6GI6B2iwHVBg30fSPLpHuufE3zoor3SyLa0V4UJzTOA5FmDixd0GODLHUcdbQz_ABGNBPd5ugUNLnxuZxM0Oud-HnJvU7GHOooL4Hiw_o5dA2y6gu2mpIoygnKek8xhgaxXY3w1ZZrCqubvVl8Wd0LZ3j-3lOVzAJY8Pr3KM_wbPa2HRgGb5i-cptbLcymvGmEoYL1TrRzztWl17ojAFZZMfgQRngJKO5UfzqR7nfZDVd5ELm1iP0pszO-aafuLrn0tuhI-WAUtD9Q8Tfyfk-bnjsuW6k2eoFfo_YGvnSBeKbcZ-FHJzsKJ6HddzScY7mtieml00sxO9J7tZvBNnLBTjAw8Lyx6FD2nc9wTifLDYnvmHL53esPe07o7lgDTmwdfN9OybpPwF8iEe3iJojR2lDObfNC1l2ZjmPxUw_dpw1hCGyOHMHgpg5YeWVp2_nHRmK15IYaMMIaoPmWY_1nCTsdxlBG9hpIysmBwVyvJvgl4QjVehzD7bkIl7VBfp1ZRDe8qLOxIi6T4ZhMvlF8N9rCQpqFYQB_O-U4a7sOeO5gns0an42aT_v5uAha6GfY0Pc06ceOipuLsqBctzaJWzzp6wc-uH7StP4eakk&state=gCXWUqjbI6XP07Hi
3.24 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiNjVkMjQ2YjEtNmViNS00M2UyLWFkNWUtZjQ4MWY4ZWI3NTg1Il0sImF1dGhfdGltZSI6MTUyOTc1MzI4NSwiZXhwIjoxNTI5NzU2OTUxLCJpYXQiOjE1Mjk3NTMzNTEsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImE0MGVkOWVjLWVhZDktNDJhYS04MGQxLTViNTU1NjRjNGQwMSIsIm5vbmNlIjoiRTlWSFFmaE15dmJ3TTF4cSIsInJhdCI6MTUyOTc1MzM0OSwic3ViIjoiZm9vQGJhci5jb20ifQ.Ac7Et293_H1ztW2uOwHYHWnz3lvSytmwspBfMwtakC6WtadduvJofCIX4MOMiE0Tfv6GI6B2iwHVBg30fSPLpHuufE3zoor3SyLa0V4UJzTOA5FmDixd0GODLHUcdbQz_ABGNBPd5ugUNLnxuZxM0Oud-HnJvU7GHOooL4Hiw_o5dA2y6gu2mpIoygnKek8xhgaxXY3w1ZZrCqubvVl8Wd0LZ3j-3lOVzAJY8Pr3KM_wbPa2HRgGb5i-cptbLcymvGmEoYL1TrRzztWl17ojAFZZMfgQRngJKO5UfzqR7nfZDVd5ELm1iP0pszO-aafuLrn0tuhI-WAUtD9Q8Tfyfk-bnjsuW6k2eoFfo_YGvnSBeKbcZ-FHJzsKJ6HddzScY7mtieml00sxO9J7tZvBNnLBTjAw8Lyx6FD2nc9wTifLDYnvmHL53esPe07o7lgDTmwdfN9OybpPwF8iEe3iJojR2lDObfNC1l2ZjmPxUw_dpw1hCGyOHMHgpg5YeWVp2_nHRmK15IYaMMIaoPmWY_1nCTsdxlBG9hpIysmBwVyvJvgl4QjVehzD7bkIl7VBfp1ZRDe8qLOxIi6T4ZhMvlF8N9rCQpqFYQB_O-U4a7sOeO5gns0an42aT_v5uAha6GfY0Pc06ceOipuLsqBctzaJWzzp6wc-uH7StP4eakk', 'state': 'gCXWUqjbI6XP07Hi'}
3.327 AuthorizationResponse {
"id_token": {
"aud": [
"65d246b1-6eb5-43e2-ad5e-f481f8eb7585"
],
"auth_time": 1529753285,
"exp": 1529756951,
"iat": 1529753351,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "a40ed9ec-ead9-42aa-80d1-5b55564c4d01",
"nonce": "E9VHQfhMyvbwM1xq",
"rat": 1529753349,
"sub": "[email protected]"
},
"state": "gCXWUqjbI6XP07Hi"
}
3.327 phase <--<-- 4 --- Done -->-->
3.327 end
3.328 assertion VerifyResponse
3.328 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.328 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/I.F.T.T.s/OP-Response-id_token.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Response-id_token
Test description: Request with response_type=id_token
Timestamp: 2018-06-23T11:26:54Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.078 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.079 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.08 phase <--<-- 2 --- Registration -->-->
0.08 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.08 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#1HfT3WM7iwIS5S3M"
],
"response_types": [
"id_token"
]
}
0.272 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.273 RegistrationResponse {
"client_id": "062adc82-0d5f-4a7e-af3b-f239387f6209",
"client_secret": "hVYH6i9bgIU0",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "062adc82-0d5f-4a7e-af3b-f239387f6209",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#1HfT3WM7iwIS5S3M"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.273 phase <--<-- 3 --- AsyncAuthn -->-->
0.274 AuthorizationRequest {
"client_id": "062adc82-0d5f-4a7e-af3b-f239387f6209",
"nonce": "1uxW1NUbuPLxErFI",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "3UyBEw51liIGjF9l"
}
0.274 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=062adc82-0d5f-4a7e-af3b-f239387f6209&state=3UyBEw51liIGjF9l&response_type=id_token&nonce=1uxW1NUbuPLxErFI
0.274 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=062adc82-0d5f-4a7e-af3b-f239387f6209&state=3UyBEw51liIGjF9l&response_type=id_token&nonce=1uxW1NUbuPLxErFI
6.102 http args {}
6.271 response URL with fragment
6.271 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMDYyYWRjODItMGQ1Zi00YTdlLWFmM2ItZjIzOTM4N2Y2MjA5Il0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODE0LCJpYXQiOjE1Mjk3NTMyMTQsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImVlODBlNTdmLWEzM2ItNGUyMC04NmM0LWExNDY5N2YyZjE0ZSIsIm5vbmNlIjoiMXV4VzFOVWJ1UEx4RXJGSSIsInJhdCI6MTUyOTc1MzIwOCwic3ViIjoiZm9vQGJhci5jb20ifQ.d8CjDLh3clByWP2_DeLh9Y07Q50FfpCPVfOJhbQ1NrSzLBkD7nByy940DuFI4mZn5_OHJ5G3ADeefohL6hZoH2nHOiUFnwWcItt-w4WSf3vtoz937R0ZTPfrxbOr7W4_2j7zaTL_lrNE9MQgK6oe86DaIjLq-2Qj4IpqDTltHowJgTmtbQavtvO2_QjufoKSw35mi6xQt3TEHU6pabDtIg5X1b3GWdCkeJRPUdxXmyQdDcyVLyiaI_DWmGymteujIbRPc9GxW2mbiPLmL14SPZhynJHMYk3lqwg14SFEtoko6uKLX9Qeu6m4MmBeUOCna5O3U0ZrtybqmI4k_d4XF-QAE3dT0HM78N1-wiAP2s9kHnSMzkq-Uz_otddFa7xKEf7xpS_uKp6u4IdOZ4uGdU2frqsWoe9qTmdGmclIPC6sYNCpNOrY618v_alV3pyUi_i6jp-LMQYwtbrFfkkqajJX7lueZgYnbuMwd-XsBCjwE2IsZgD1XofzGltFyJYfKA8R53vVF8FOMqAWkNVZpyAFMD6DMKLaMje783bQo0ZV0pkaNC_Dd95Czbd8HLEGA3WKDt1PnZ4rEoKbpcE31sny2kkzzXiDfxuiThqMaSKCon5miRFNtCLFjzGlkIv7J1N0xVdxjPeLCdUuwcpzVlEWr4aiG7YgEzgYg3_2Q_0&state=3UyBEw51liIGjF9l
6.271 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiMDYyYWRjODItMGQ1Zi00YTdlLWFmM2ItZjIzOTM4N2Y2MjA5Il0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODE0LCJpYXQiOjE1Mjk3NTMyMTQsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImVlODBlNTdmLWEzM2ItNGUyMC04NmM0LWExNDY5N2YyZjE0ZSIsIm5vbmNlIjoiMXV4VzFOVWJ1UEx4RXJGSSIsInJhdCI6MTUyOTc1MzIwOCwic3ViIjoiZm9vQGJhci5jb20ifQ.d8CjDLh3clByWP2_DeLh9Y07Q50FfpCPVfOJhbQ1NrSzLBkD7nByy940DuFI4mZn5_OHJ5G3ADeefohL6hZoH2nHOiUFnwWcItt-w4WSf3vtoz937R0ZTPfrxbOr7W4_2j7zaTL_lrNE9MQgK6oe86DaIjLq-2Qj4IpqDTltHowJgTmtbQavtvO2_QjufoKSw35mi6xQt3TEHU6pabDtIg5X1b3GWdCkeJRPUdxXmyQdDcyVLyiaI_DWmGymteujIbRPc9GxW2mbiPLmL14SPZhynJHMYk3lqwg14SFEtoko6uKLX9Qeu6m4MmBeUOCna5O3U0ZrtybqmI4k_d4XF-QAE3dT0HM78N1-wiAP2s9kHnSMzkq-Uz_otddFa7xKEf7xpS_uKp6u4IdOZ4uGdU2frqsWoe9qTmdGmclIPC6sYNCpNOrY618v_alV3pyUi_i6jp-LMQYwtbrFfkkqajJX7lueZgYnbuMwd-XsBCjwE2IsZgD1XofzGltFyJYfKA8R53vVF8FOMqAWkNVZpyAFMD6DMKLaMje783bQo0ZV0pkaNC_Dd95Czbd8HLEGA3WKDt1PnZ4rEoKbpcE31sny2kkzzXiDfxuiThqMaSKCon5miRFNtCLFjzGlkIv7J1N0xVdxjPeLCdUuwcpzVlEWr4aiG7YgEzgYg3_2Q_0', 'state': '3UyBEw51liIGjF9l'}
6.389 AuthorizationResponse {
"id_token": {
"aud": [
"062adc82-0d5f-4a7e-af3b-f239387f6209"
],
"auth_time": 1529753136,
"exp": 1529756814,
"iat": 1529753214,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "ee80e57f-a33b-4e20-86c4-a14697f2f14e",
"nonce": "1uxW1NUbuPLxErFI",
"rat": 1529753208,
"sub": "[email protected]"
},
"state": "3UyBEw51liIGjF9l"
}
6.389 phase <--<-- 4 --- Done -->-->
6.389 end
6.39 assertion VerifyAuthnResponse
6.39 condition verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
6.39 condition Done: status=OK
============================================================
Conditions
verify-authn-response: status=OK [Checks that the last response was a JSON encoded authentication message]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/I.F.T.T.s/OP-Response-Missing.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Response-Missing
Test description: Authorization request missing the response_type parameter
Timestamp: 2018-06-23T11:26:46Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.094 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.096 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.096 phase <--<-- 2 --- Registration -->-->
0.096 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['[email protected]'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.096 RegistrationRequest {
"application_type": "web",
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#xDgnCRhOzo8HyBQP"
],
"response_types": [
"id_token"
]
}
0.273 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.274 RegistrationResponse {
"client_id": "245fadf4-c6fa-4e7a-8c5f-202b4cd5cfb3",
"client_secret": "oAfgzd3nde6L",
"client_secret_expires_at": 0,
"contacts": [
"[email protected]"
],
"grant_types": [
"implicit"
],
"id": "245fadf4-c6fa-4e7a-8c5f-202b4cd5cfb3",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#xDgnCRhOzo8HyBQP"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.274 phase <--<-- 3 --- Note -->-->
2.635 phase <--<-- 4 --- AsyncAuthn -->-->
2.635 AuthorizationRequest {
"client_id": "245fadf4-c6fa-4e7a-8c5f-202b4cd5cfb3",
"nonce": "em14nMtjLm4bu9jx",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"scope": "openid",
"state": "6r6DUdRl8bt9rxrQ"
}
2.636 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?state=6r6DUdRl8bt9rxrQ&scope=openid&nonce=em14nMtjLm4bu9jx&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=245fadf4-c6fa-4e7a-8c5f-202b4cd5cfb3
2.636 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?state=6r6DUdRl8bt9rxrQ&scope=openid&nonce=em14nMtjLm4bu9jx&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=245fadf4-c6fa-4e7a-8c5f-202b4cd5cfb3
2.913 response Response URL with query part
2.913 response {'error_debug': 'The request is missing the response_type parameter', 'error_description': 'The authorization server does not support obtaining a token using this method', 'state': '', 'error': 'unsupported_response_type'}
2.913 response {'error_debug': 'The request is missing the response_type parameter', 'error_description': 'The authorization server does not support obtaining a token using this method', 'error': 'unsupported_response_type'}
2.914 AuthorizationErrorResponse {
"error": "unsupported_response_type",
"error_debug": "The request is missing the response_type parameter",
"error_description": "The authorization server does not support obtaining a token using this method"
}
2.914 AuthorizationErrorResponse {
"error": "unsupported_response_type",
"error_debug": "The request is missing the response_type parameter",
"error_description": "The authorization server does not support obtaining a token using this method"
}
2.914 phase <--<-- 5 --- Done -->-->
2.914 end
2.914 assertion VerifyErrorMessage
2.914 condition verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
2.914 condition Done: status=OK
============================================================
Conditions
verify-error-response: status=OK [Checks that the last response was a JSON encoded error message]
Done: status=OK
============================================================
RESULT: PASSED |
Text | hydra/internal/certification/I.F.T.T.s/OP-Rotation-OP-Sig.txt | Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-Rotation-OP-Sig
Test description: Can rotate OP signing keys
Timestamp: 2018-06-23T11:30:38Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.075 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.076 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.076 phase <--<-- 2 --- FetchKeys -->-->
0.149 phase <--<-- 3 --- Note -->-->
6.637 phase <--<-- 4 --- Webfinger -->-->
6.637 not expected to do WebFinger
6.637 phase <--<-- 5 --- Discovery -->-->
6.637 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
7.667 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
7.668 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
7.668 phase <--<-- 6 --- FetchKeys -->-->
7.741 phase <--<-- 7 --- Done -->-->
7.741 end
7.742 assertion CheckHTTPResponse
7.742 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
7.742 assertion NewSigningKeys
7.742 condition new-signing-keys: status=OK [Verifies that two set of signing keys are not the same]
7.742 condition Done: status=OK
============================================================
Conditions
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
new-signing-keys: status=OK [Verifies that two set of signing keys are not the same]
Done: status=OK
============================================================
RESULT: PASSED |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.