internal/certification/CIT.F.T.T.s/OP-nonce-noncode.txt
Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-nonce-noncode
Test description: Request with nonce, verifies it was returned in ID Token [Implicit, Hybrid]
Timestamp: 2018-06-23T11:01:28Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.152 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.153 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.153 phase <--<-- 2 --- Registration -->-->
0.153 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['code id_token token'], 'contacts': ['roland@example.com'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['authorization_code', 'implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.154 RegistrationRequest {
"application_type": "web",
"contacts": [
"roland@example.com"
],
"grant_types": [
"authorization_code",
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#NcEyN6ptlVjODiRA"
],
"response_types": [
"code id_token token"
]
}
0.314 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.315 RegistrationResponse {
"client_id": "51c36dfd-b11c-45e9-879f-bbcff638b941",
"client_secret": "Cgz5SCNDpL9W",
"client_secret_expires_at": 0,
"contacts": [
"roland@example.com"
],
"grant_types": [
"authorization_code",
"implicit"
],
"id": "51c36dfd-b11c-45e9-879f-bbcff638b941",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#NcEyN6ptlVjODiRA"
],
"response_types": [
"code id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.315 phase <--<-- 3 --- AsyncAuthn -->-->
0.315 AuthorizationRequest {
"client_id": "51c36dfd-b11c-45e9-879f-bbcff638b941",
"nonce": "cYZuYYRsGbNAHjd5",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "code id_token token",
"scope": "openid",
"state": "PJnq1XY8VwfdyOFM"
}
0.316 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=51c36dfd-b11c-45e9-879f-bbcff638b941&state=PJnq1XY8VwfdyOFM&response_type=code+id_token+token&nonce=cYZuYYRsGbNAHjd5
0.316 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=51c36dfd-b11c-45e9-879f-bbcff638b941&state=PJnq1XY8VwfdyOFM&response_type=code+id_token+token&nonce=cYZuYYRsGbNAHjd5
2.293 http args {}
2.464 response URL with fragment
2.464 response access_token=dWzqn2SCDksUM9s6pGcGSEvRLCEUcAb8pKTNZTwXVq0.E7Ydpk_hper3i0OaoiJZnFh1zCLvweRW3S7kazC-PpU&code=zbtmly9LKOyQms-JRXnCeroF-wKN6KKTwtjHXBcruTY.YiMSpu4pR93GnC2VNh9FI0kxv9kX4vOQ_Z27YB-WAKU&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiX2daU3dxaTJHcnJwM2RheWlKMUFpZyIsImF1ZCI6WyI1MWMzNmRmZC1iMTFjLTQ1ZTktODc5Zi1iYmNmZjYzOGI5NDEiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJDZmgxUHF1c2dJS0JLc3Z3bnFocXl3IiwiZXhwIjoxNTI5NzU1Mjg3LCJpYXQiOjE1Mjk3NTE2ODcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjIyOWUzODU0LTQ1NGQtNDdjZi1iZGUwLTkzNWFhOWQ2NjJmMiIsIm5vbmNlIjoiY1ladVlZUnNHYk5BSGpkNSIsInJhdCI6MTUyOTc1MTY4Niwic3ViIjoiZm9vQGJhci5jb20ifQ.tY1h80uo9sf8KzJ09JMIoKOdDjsC8R41Mezr3Kou4tLz85L8waE_0ctPKEckQkfem-k3wvRUv1uZp20rlNybrjGjqYYR4QvgXQT1pb-qRCuEehfLeU_yi7V1d7srkoj9l5mPWRxqR5lQ57QDKtg0IakAtDn2lrdvkVwcyi2fAXXjN8lgii7D99zWXk9yNvQU_vU6aNln8-aTBuTVP_qEPqxymNEC3heMe_iqMx8m8-exBEVigUI-qcUCkk_TzQGyEv_TDWJoEI0fryMVpdPTR1FQzDWRr-QGBKr8ZKRSW3bGKdW7zuEAMWmroI5sVWhH08TRmhBWzlwZ3B4C8gYLv5UmD2w3ssC-YHJXysxxaerPmI1WD9ES2f5m0U6IJyld5U5KjsQHFiZ67YPFz291Z7ocTq5fKJpxmeSl2clW9sKoLFVqxnM6JkXZeE_Z_5owIfxf4quj05__rR_15YuH5Jkw-8lztq75VxVkSnGQ1c3b30_jfmCeCLxHE8c3Zglmlg7Z8XD0raf4AUtUJ28MPv1ji8fPlJpDz2FNEW5t-kqre49LQkdVLqUTyeC6c7ABcDTLp4fM0EU5_hwxYVrfBS_Yl_TCYSOwMOWneg-uN6MGRk4t4D6g1pAXkyoV2wbIGnJEz8zQknzbi2oExPxm51VnOw15uuJ4f_rTFC9L3oE&scope=openid&state=PJnq1XY8VwfdyOFM&token_type=bearer
2.464 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiX2daU3dxaTJHcnJwM2RheWlKMUFpZyIsImF1ZCI6WyI1MWMzNmRmZC1iMTFjLTQ1ZTktODc5Zi1iYmNmZjYzOGI5NDEiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJDZmgxUHF1c2dJS0JLc3Z3bnFocXl3IiwiZXhwIjoxNTI5NzU1Mjg3LCJpYXQiOjE1Mjk3NTE2ODcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjIyOWUzODU0LTQ1NGQtNDdjZi1iZGUwLTkzNWFhOWQ2NjJmMiIsIm5vbmNlIjoiY1ladVlZUnNHYk5BSGpkNSIsInJhdCI6MTUyOTc1MTY4Niwic3ViIjoiZm9vQGJhci5jb20ifQ.tY1h80uo9sf8KzJ09JMIoKOdDjsC8R41Mezr3Kou4tLz85L8waE_0ctPKEckQkfem-k3wvRUv1uZp20rlNybrjGjqYYR4QvgXQT1pb-qRCuEehfLeU_yi7V1d7srkoj9l5mPWRxqR5lQ57QDKtg0IakAtDn2lrdvkVwcyi2fAXXjN8lgii7D99zWXk9yNvQU_vU6aNln8-aTBuTVP_qEPqxymNEC3heMe_iqMx8m8-exBEVigUI-qcUCkk_TzQGyEv_TDWJoEI0fryMVpdPTR1FQzDWRr-QGBKr8ZKRSW3bGKdW7zuEAMWmroI5sVWhH08TRmhBWzlwZ3B4C8gYLv5UmD2w3ssC-YHJXysxxaerPmI1WD9ES2f5m0U6IJyld5U5KjsQHFiZ67YPFz291Z7ocTq5fKJpxmeSl2clW9sKoLFVqxnM6JkXZeE_Z_5owIfxf4quj05__rR_15YuH5Jkw-8lztq75VxVkSnGQ1c3b30_jfmCeCLxHE8c3Zglmlg7Z8XD0raf4AUtUJ28MPv1ji8fPlJpDz2FNEW5t-kqre49LQkdVLqUTyeC6c7ABcDTLp4fM0EU5_hwxYVrfBS_Yl_TCYSOwMOWneg-uN6MGRk4t4D6g1pAXkyoV2wbIGnJEz8zQknzbi2oExPxm51VnOw15uuJ4f_rTFC9L3oE', 'scope': 'openid', 'code': 'zbtmly9LKOyQms-JRXnCeroF-wKN6KKTwtjHXBcruTY.YiMSpu4pR93GnC2VNh9FI0kxv9kX4vOQ_Z27YB-WAKU', 'access_token': 'dWzqn2SCDksUM9s6pGcGSEvRLCEUcAb8pKTNZTwXVq0.E7Ydpk_hper3i0OaoiJZnFh1zCLvweRW3S7kazC-PpU', 'state': 'PJnq1XY8VwfdyOFM', 'expires_in': 3599, 'token_type': 'bearer'}
2.55 AuthorizationResponse {
"access_token": "dWzqn2SCDksUM9s6pGcGSEvRLCEUcAb8pKTNZTwXVq0.E7Ydpk_hper3i0OaoiJZnFh1zCLvweRW3S7kazC-PpU",
"code": "zbtmly9LKOyQms-JRXnCeroF-wKN6KKTwtjHXBcruTY.YiMSpu4pR93GnC2VNh9FI0kxv9kX4vOQ_Z27YB-WAKU",
"expires_in": 3599,
"id_token": {
"at_hash": "_gZSwqi2Grrp3dayiJ1Aig",
"aud": [
"51c36dfd-b11c-45e9-879f-bbcff638b941"
],
"auth_time": 1529751409,
"c_hash": "Cfh1PqusgIKBKsvwnqhqyw",
"exp": 1529755287,
"iat": 1529751687,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "229e3854-454d-47cf-bde0-935aa9d662f2",
"nonce": "cYZuYYRsGbNAHjd5",
"rat": 1529751686,
"sub": "foo@bar.com"
},
"scope": "openid",
"state": "PJnq1XY8VwfdyOFM",
"token_type": "bearer"
}
2.551 phase <--<-- 4 --- AccessToken -->-->
2.551 --> request op_args: {'state': 'PJnq1XY8VwfdyOFM'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb'}
2.551 do_access_token_request kwargs:{'request_args': {'grant_type': 'authorization_code', 'state': 'PJnq1XY8VwfdyOFM', 'code': 'zbtmly9LKOyQms-JRXnCeroF-wKN6KKTwtjHXBcruTY.YiMSpu4pR93GnC2VNh9FI0kxv9kX4vOQ_Z27YB-WAKU', 'redirect_uri': 'https://op.certification.openid.net:61353/authz_cb', 'client_id': '51c36dfd-b11c-45e9-879f-bbcff638b941'}, 'state': 'PJnq1XY8VwfdyOFM'}
2.551 AccessTokenRequest {
"code": "zbtmly9LKOyQms-JRXnCeroF-wKN6KKTwtjHXBcruTY.YiMSpu4pR93GnC2VNh9FI0kxv9kX4vOQ_Z27YB-WAKU",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"state": "PJnq1XY8VwfdyOFM"
}
2.551 request_url https://oidc-certification.ory.sh:8443/oauth2/token
2.551 request_http_args {'headers': {'Authorization': 'Basic NTFjMzZkZmQtYjExYy00NWU5LTg3OWYtYmJjZmY2MzhiOTQxOkNnejVTQ05EcEw5Vw==', 'Content-Type': 'application/x-www-form-urlencoded'}}
2.551 request code=zbtmly9LKOyQms-JRXnCeroF-wKN6KKTwtjHXBcruTY.YiMSpu4pR93GnC2VNh9FI0kxv9kX4vOQ_Z27YB-WAKU&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&grant_type=authorization_code&state=PJnq1XY8VwfdyOFM
2.785 http response url:https://oidc-certification.ory.sh:8443/oauth2/token status_code:200
2.787 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzplMjcyYTc1NS03YWUyLTQ5MGUtODJmNS02MmUwNjc4NjQxYjAiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoiX2daU3dxaTJHcnJwM2RheWlKMUFpZyIsImF1ZCI6WyI1MWMzNmRmZC1iMTFjLTQ1ZTktODc5Zi1iYmNmZjYzOGI5NDEiXSwiYXV0aF90aW1lIjoxNTI5NzUxNDA5LCJjX2hhc2giOiJDZmgxUHF1c2dJS0JLc3Z3bnFocXl3IiwiZXhwIjoxNTI5NzU1Mjg3LCJpYXQiOjE1Mjk3NTE2ODgsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjIyZTYzOTk1LWRkYjktNGIyNC1iZmFiLTIzZDkzMzFjZjc5ZCIsIm5vbmNlIjoiY1ladVlZUnNHYk5BSGpkNSIsInJhdCI6MTUyOTc1MTY4Niwic3ViIjoiZm9vQGJhci5jb20ifQ.xLr9bQjia7E0UczvBNLG22hr8FtnW5mqRGXyAmahqTgnGNegDCebSxdBg6h4ZhjfBqb0H-kQ4xmQ70NzX6rR4kGDK0oyjUfUrw_UJtcF7N4OLlLS7f-YYj_mqH6bz7z6StJZY1nq_LyFmX4ygm1FU9baz2CtKhtxgeUjNinw053XgLFPlH7ob0kdtvcVcDOOT3Svg1R4pjk5LY7Hsd4HI6NWVjLh4LtHVNSHqEkRHis_t9OQ1-YtoT-aZek8Pu8sceZAZGA_IdCxRQfTVTKnoAQ1dqqgzzhYHmjl4cWy68gLILo7dgEHMA_VOhRy4-T94A6NTjNay1BRNrHZLYVwRqk_VDve7jAEOry2nCSi6NSgzHeVR9ttK6_syAgn96nbBgH_5WT9VLVbMr0y8mD6lGkagTzqUXal0pH__2pcWGAkYjRnbvxnuLgAoe13XiO7_BTf3VxLv7qP4D6mh_VPIrHERnSV6tc3y6uYbd4K_e3IJwgOon6yyZdpxCi6naW4ZtdLLKoxkq_SIY9AESJ2rZfedAKuVj9Tv2WhwAEa_-6s3R3ZfVTchN2HUCyTeo4VwRaL2O8k4nBzmDYwJjqEoO3GB8BfobGMpgNoMrhPvLm10C_llM2BJ5CZ_nPHrEBqSihDCGEGaZGGhW1vNrVAxbs61XBr6oRQUgsMsIinb6Q', 'token_type': 'bearer', 'expires_in': 3599, 'access_token': '-zA4yL5qyKsG73vSBsvdckcn2jtSXOjcyAyuNE-ceMQ.NKlGzwt9_s19flwPrMPFm1JJPyP0OpjL5o09RhLyugU', 'scope': 'openid'}
2.79 AccessTokenResponse {
"access_token": "-zA4yL5qyKsG73vSBsvdckcn2jtSXOjcyAyuNE-ceMQ.NKlGzwt9_s19flwPrMPFm1JJPyP0OpjL5o09RhLyugU",
"expires_in": 3599,
"id_token": {
"at_hash": "_gZSwqi2Grrp3dayiJ1Aig",
"aud": [
"51c36dfd-b11c-45e9-879f-bbcff638b941"
],
"auth_time": 1529751409,
"c_hash": "Cfh1PqusgIKBKsvwnqhqyw",
"exp": 1529755287,
"iat": 1529751688,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "22e63995-ddb9-4b24-bfab-23d9331cf79d",
"nonce": "cYZuYYRsGbNAHjd5",
"rat": 1529751686,
"sub": "foo@bar.com"
},
"scope": "openid",
"token_type": "bearer"
}
2.79 phase <--<-- 5 --- Done -->-->
2.79 end
2.791 assertion VerifyResponse
2.791 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.791 assertion CheckIdTokenNonce
2.791 condition check-idtoken-nonce: status=OK [Verify that the nonce in the IDToken is the same that's included in the Authorization Request.]
2.791 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
check-idtoken-nonce: status=OK [Verify that the nonce in the IDToken is the same that's included in the Authorization Request.]
Done: status=OK
============================================================
RESULT: PASSED