internal/certification/CIT.F.T.T.s/OP-IDToken-C-Signature.txt
Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-IDToken-C-Signature
Test description: Does the OP sign the ID Token and with what
Timestamp: 2018-06-23T11:00:06Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.072 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.073 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.073 phase <--<-- 2 --- Registration -->-->
0.073 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['roland@example.com'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.074 RegistrationRequest {
"application_type": "web",
"contacts": [
"roland@example.com"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#WPzFB0DUWRcrjkWg"
],
"response_types": [
"code id_token token"
]
}
0.238 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.239 RegistrationResponse {
"client_id": "224be9ae-66f5-4a1b-91b5-194be505415a",
"client_secret": "e.tKFXdjZADh",
"client_secret_expires_at": 0,
"contacts": [
"roland@example.com"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "224be9ae-66f5-4a1b-91b5-194be505415a",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#WPzFB0DUWRcrjkWg"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.239 phase <--<-- 3 --- AsyncAuthn -->-->
0.239 AuthorizationRequest {
"client_id": "224be9ae-66f5-4a1b-91b5-194be505415a",
"nonce": "pvE8oIrrzZiL5PZJ",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid",
"state": "6X0SKTezgza1TxJX"
}
0.24 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=224be9ae-66f5-4a1b-91b5-194be505415a&state=6X0SKTezgza1TxJX&response_type=code+id_token+token&nonce=pvE8oIrrzZiL5PZJ
0.24 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=224be9ae-66f5-4a1b-91b5-194be505415a&state=6X0SKTezgza1TxJX&response_type=code+id_token+token&nonce=pvE8oIrrzZiL5PZJ
2.944 http args {}
3.139 response URL with fragment
3.139 response access_token=0xRJOtBgHd0qn7dSRi8TDycpenXgVmE941psl8Ok028.SrcF0Qh6_cPQSCMeDv8BBg-LO0IXLWnTmuOQi5vptQs&code=gN4dvizSNQiYuZcCqm0grZT8zUyFNdzEiT481h8zmEc.SSxQpb1mKW8HGgqCdoAnRu7us2UaYkAhvdFtaF3KlTM&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoialg3SWY5YWwxdGNIcDJqZERRdE5zZyIsImF1ZCI6WyIyMjRiZTlhZS02NmY1LTRhMWItOTFiNS0xOTRiZTUwNTQxNWEiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiIxZktzMXR5bXUwMmhIemQxa2RlZWhRIiwiZXhwIjoxNTI5NzU1MjA1LCJpYXQiOjE1Mjk3NTE2MDUsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjA3MTUzYThiLTE0NzAtNDliMi1hYTNjLTE4OTY2MTIyOTZlYiIsIm5vbmNlIjoicHZFOG9JcnJ6WmlMNVBaSiIsInJhdCI6MTUyOTc1MTYwMywic3ViIjoiZm9vQGJhci5jb20ifQ.rrObZK3jc1j5OSm4UDbCUSem8JOnF4fPYM36jQzSgd6P1X8AY67NN5yhjSZQboaaM3nJYrxoP-y_JmOGp_fb_NW6Q7cxCUnpNf6P7IweJcv_Ji-Yvu3BmAOwKO_ab7axlCt4wjGQyWMv82cr2DngVHXfhDdQzypMfcSHtEYA0dIpnJHQwb5l39cu2BLErLf-z-SrM-GATEzDy7iGETtl245uUs2FHbi8l_ClmdUKlFqfiRQXAmD8vGE2U8AKLwaSg6F7aWdMcsbDuhLeQqS6I9H2Q5zyOfyy-J5qOKptBDa_DyIJBNqXo4yeDtLnOgET_dgSpkQrVh73Y2ky5E7TTqCT2V1OKI_uWiqBe3O1mHyXByruNvlnDuZzY6K9ziU_hvO0nF_HgwkNmKtnnCFwIc3hIy1Tvq4AMt0M2PZVlVHIpHCtPmhf3CFRJLw-zKemXlzJPTlPxSbMVeT7wQkho6WwxyjodrjDbKeOYdH2k1mEQHA45u8cKNL5fr7LtOqbTpjbLrKpVlI9bO4urzv0c3nXXLEgBtBc4lxq2T48_XeOaoGOc58-hNxtIsGcFsTYclUWXzO2FENXu-lULrnRsgnBBqn1XN0N3Y3Z2BkarsRkNejl3sZNiF7xQgp14YcFva1KITbXWQfpsT1iXokd-0InuUlzGYrbUmfnNxj3YUQ&scope=openid&state=6X0SKTezgza1TxJX&token_type=bearer
3.14 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoialg3SWY5YWwxdGNIcDJqZERRdE5zZyIsImF1ZCI6WyIyMjRiZTlhZS02NmY1LTRhMWItOTFiNS0xOTRiZTUwNTQxNWEiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiIxZktzMXR5bXUwMmhIemQxa2RlZWhRIiwiZXhwIjoxNTI5NzU1MjA1LCJpYXQiOjE1Mjk3NTE2MDUsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjA3MTUzYThiLTE0NzAtNDliMi1hYTNjLTE4OTY2MTIyOTZlYiIsIm5vbmNlIjoicHZFOG9JcnJ6WmlMNVBaSiIsInJhdCI6MTUyOTc1MTYwMywic3ViIjoiZm9vQGJhci5jb20ifQ.rrObZK3jc1j5OSm4UDbCUSem8JOnF4fPYM36jQzSgd6P1X8AY67NN5yhjSZQboaaM3nJYrxoP-y_JmOGp_fb_NW6Q7cxCUnpNf6P7IweJcv_Ji-Yvu3BmAOwKO_ab7axlCt4wjGQyWMv82cr2DngVHXfhDdQzypMfcSHtEYA0dIpnJHQwb5l39cu2BLErLf-z-SrM-GATEzDy7iGETtl245uUs2FHbi8l_ClmdUKlFqfiRQXAmD8vGE2U8AKLwaSg6F7aWdMcsbDuhLeQqS6I9H2Q5zyOfyy-J5qOKptBDa_DyIJBNqXo4yeDtLnOgET_dgSpkQrVh73Y2ky5E7TTqCT2V1OKI_uWiqBe3O1mHyXByruNvlnDuZzY6K9ziU_hvO0nF_HgwkNmKtnnCFwIc3hIy1Tvq4AMt0M2PZVlVHIpHCtPmhf3CFRJLw-zKemXlzJPTlPxSbMVeT7wQkho6WwxyjodrjDbKeOYdH2k1mEQHA45u8cKNL5fr7LtOqbTpjbLrKpVlI9bO4urzv0c3nXXLEgBtBc4lxq2T48_XeOaoGOc58-hNxtIsGcFsTYclUWXzO2FENXu-lULrnRsgnBBqn1XN0N3Y3Z2BkarsRkNejl3sZNiF7xQgp14YcFva1KITbXWQfpsT1iXokd-0InuUlzGYrbUmfnNxj3YUQ', 'scope': 'openid', 'code': 'gN4dvizSNQiYuZcCqm0grZT8zUyFNdzEiT481h8zmEc.SSxQpb1mKW8HGgqCdoAnRu7us2UaYkAhvdFtaF3KlTM', 'access_token': '0xRJOtBgHd0qn7dSRi8TDycpenXgVmE941psl8Ok028.SrcF0Qh6_cPQSCMeDv8BBg-LO0IXLWnTmuOQi5vptQs', 'state': '6X0SKTezgza1TxJX', 'expires_in': 3599, 'token_type': 'bearer'}
3.439 AuthorizationResponse {
"access_token": "0xRJOtBgHd0qn7dSRi8TDycpenXgVmE941psl8Ok028.SrcF0Qh6_cPQSCMeDv8BBg-LO0IXLWnTmuOQi5vptQs",
"code": "gN4dvizSNQiYuZcCqm0grZT8zUyFNdzEiT481h8zmEc.SSxQpb1mKW8HGgqCdoAnRu7us2UaYkAhvdFtaF3KlTM",
"expires_in": 3599,
"id_token": {
"at_hash": "jX7If9al1tcHp2jdDQtNsg",
"aud": [
"224be9ae-66f5-4a1b-91b5-194be505415a"
],
"auth_time": 1529751409,
"c_hash": "1fKs1tymu02hHzd1kdeehQ",
"exp": 1529755205,
"iat": 1529751605,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "07153a8b-1470-49b2-aa3c-1896612296eb",
"nonce": "pvE8oIrrzZiL5PZJ",
"rat": 1529751603,
"sub": "foo@bar.com"
},
"scope": "openid",
"state": "6X0SKTezgza1TxJX",
"token_type": "bearer"
}
3.44 phase <--<-- 4 --- AccessToken -->-->
3.44 --> request op_args: {'state': '6X0SKTezgza1TxJX'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
3.44 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': '6X0SKTezgza1TxJX', 'code': 'gN4dvizSNQiYuZcCqm0grZT8zUyFNdzEiT481h8zmEc.SSxQpb1mKW8HGgqCdoAnRu7us2UaYkAhvdFtaF3KlTM', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '224be9ae-66f5-4a1b-91b5-194be505415a'}, 'state': '6X0SKTezgza1TxJX'}
3.44 AccessTokenRequest {
"code": "gN4dvizSNQiYuZcCqm0grZT8zUyFNdzEiT481h8zmEc.SSxQpb1mKW8HGgqCdoAnRu7us2UaYkAhvdFtaF3KlTM",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "6X0SKTezgza1TxJX"
}
3.44 request_url https://oidc-certification.ory.sh:8443/oauth2/token
3.44 request_http_args {'headers': {'Authorization': 'Basic MjI0YmU5YWUtNjZmNS00YTFiLTkxYjUtMTk0YmU1MDU0MTVhOmUudEtGWGRqWkFEaA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
3.44 request code=gN4dvizSNQiYuZcCqm0grZT8zUyFNdzEiT481h8zmEc.SSxQpb1mKW8HGgqCdoAnRu7us2UaYkAhvdFtaF3KlTM&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=6X0SKTezgza1TxJX
3.656 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
3.657 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoialg3SWY5YWwxdGNIcDJqZERRdE5zZyIsImF1ZCI6WyIyMjRiZTlhZS02NmY1LTRhMWItOTFiNS0xOTRiZTUwNTQxNWEiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiIxZktzMXR5bXUwMmhIemQxa2RlZWhRIiwiZXhwIjoxNTI5NzU1MjA1LCJpYXQiOjE1Mjk3NTE2MDYsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6ImE0ZjkxYjNmLWUxOWUtNGEyZC1hODg3LTU2NzVjYWM4OTlmOCIsIm5vbmNlIjoicHZFOG9JcnJ6WmlMNVBaSiIsInJhdCI6MTUyOTc1MTYwMywic3ViIjoiZm9vQGJhci5jb20ifQ.A-7vfiMFoDiX5GdeZJPE7GtM05CNANd33-fhIM8Y5E2ulNtd831m0RKZcrCnc_9xNUbw3ljwx1OB3fiBUtK3zbLcwJ45fp_LyUdZRVWrXzz4hDoYFZEl4rQMZg1FotFtb2F7xLmFUKM8sdFoWnEBdUkUvoXkDaVu30z-jIRsGmdPXGivHL5mkE7gNBHptXPPsIyoevtpyQaiJ0tOfWrP-6FUchYguPn5FrZGZvlK6QaRdWhr2CVKmVwNI3krnTM3LqYSfq4L9Yrb72QdmYQmP6nf2J1plpgQKxX6pkA7ymbEtPb6WrXa8ZnT3SG2o1-4BI5ZVf9A0FrmuFBvkdMgppnEK_E1Z1Nej0gHxSgm-SLNwTcijNrq53dRkif6i9xYk-MNYD5B5Bv3L1h4mxRYoV7cXEYhAscv5Hrq10VWY_IG6Esxc9YKg75QqA4e3oHm8Cuz5px0Me5WQsLO5IO_uaO3a--cyU1Y9jF8CJMp2rgZTBXNkuehMROIFGym2rSuTZkKpIvNPuijWJNFKg_FyipGkYPanMwe9ETk9FxpHUjmjLs7oD2wNxBtHM1QYIj8tRhLiWpE4KmbUEvFi7u6zA7RPYvCS0u-z9kJZAv9MIGDgx8NXOXkWTI7OyqFMR9YOb98U34j2PibDD_Y0sTluTuP7Odhij_-44qcz-ga5LM', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': 'Tmzwl9W99sQoDz0ZQlTEARmfUQE-MeJKLLIy2eyVX4Y.htJRfOkE3Yhoo3Nbw5YpN6bYCQpCeiTA1RHbxKN6bnU', 'scope': 'openid'}
3.661 AccessTokenResponse {
"access_token": "Tmzwl9W99sQoDz0ZQlTEARmfUQE-MeJKLLIy2eyVX4Y.htJRfOkE3Yhoo3Nbw5YpN6bYCQpCeiTA1RHbxKN6bnU",
"expires_in": 3599,
"id_token": {
"at_hash": "jX7If9al1tcHp2jdDQtNsg",
"aud": [
"224be9ae-66f5-4a1b-91b5-194be505415a"
],
"auth_time": 1529751409,
"c_hash": "1fKs1tymu02hHzd1kdeehQ",
"exp": 1529755205,
"iat": 1529751606,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "a4f91b3f-e19e-4a2d-a887-5675cac899f8",
"nonce": "pvE8oIrrzZiL5PZJ",
"rat": 1529751603,
"sub": "foo@bar.com"
},
"scope": "openid",
"token_type": "bearer"
}
3.661 phase <--<-- 5 --- Done -->-->
3.661 end
3.661 assertion VerifyResponse
3.661 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.662 assertion IsIDTokenSigned
3.662 condition is-idtoken-signed: status=OK [Checks if the id_token is signed]
3.662 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
is-idtoken-signed: status=OK [Checks if the id_token is signed]
Done: status=OK
============================================================
RESULT: PASSED