internal/certification/I.F.T.T.s/OP-IDToken-RS256.txt
Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-IDToken-RS256
Test description: Asymmetric ID Token signature with RS256
Timestamp: 2018-06-23T11:27:27Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.072 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.074 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.074 phase <--<-- 2 --- Registration -->-->
0.074 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token'], 'contacts': ['roland@example.com'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'id_token_signed_response_alg': 'RS256', 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.074 RegistrationRequest {
"application_type": "web",
"contacts": [
"roland@example.com"
],
"grant_types": [
"implicit"
],
"id_token_signed_response_alg": "RS256",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#3f59vUTe64XKUVmp"
],
"response_types": [
"id_token"
]
}
0.266 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.267 RegistrationResponse {
"client_id": "9e423a6d-943e-490c-8207-988c05938638",
"client_secret": "BugeQLach7XY",
"client_secret_expires_at": 0,
"contacts": [
"roland@example.com"
],
"grant_types": [
"implicit"
],
"id": "9e423a6d-943e-490c-8207-988c05938638",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#3f59vUTe64XKUVmp"
],
"response_types": [
"id_token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.267 phase <--<-- 3 --- AsyncAuthn -->-->
0.268 AuthorizationRequest {
"client_id": "9e423a6d-943e-490c-8207-988c05938638",
"nonce": "RU2IFAAdjdSsAG22",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token",
"scope": "openid",
"state": "QVDUaF72pZLG8o5E"
}
0.268 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=9e423a6d-943e-490c-8207-988c05938638&state=QVDUaF72pZLG8o5E&response_type=id_token&nonce=RU2IFAAdjdSsAG22
0.268 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=9e423a6d-943e-490c-8207-988c05938638&state=QVDUaF72pZLG8o5E&response_type=id_token&nonce=RU2IFAAdjdSsAG22
2.193 http args {}
2.365 response URL with fragment
2.365 response id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiOWU0MjNhNmQtOTQzZS00OTBjLTgyMDctOTg4YzA1OTM4NjM4Il0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODQ3LCJpYXQiOjE1Mjk3NTMyNDcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjQ4YjlhNmFiLWMyODEtNDM0Yy1hNWNmLTMxYjc3MjkzOGNjMyIsIm5vbmNlIjoiUlUySUZBQWRqZFNzQUcyMiIsInJhdCI6MTUyOTc1MzI0NSwic3ViIjoiZm9vQGJhci5jb20ifQ.j0t-d4nhI8k-CGoUEKFfKTFC4Ga38rXO1nHNoz7Mt9eterRM2fC7CUHhuGeCeVlfS3V007dwelqRG1VqW_v77tDY_N94Ymt8l1mxcWqjhKNmuJouMvsBoReNvO9uBwGZKL_7YpQbuFRir7oXcIkLvVfArPlzZFGdTvRFxeKGsMOjf1yOyg42smFxbb8k8sEUAWzuZ-SHI9OAJFJTwFFa4AuaqoNNv5bKV_1ySSaMoDlEw3cxXQ0BOZd7t-CtRm5ZlsRBs6MCkB9IgqJYVLgf7Vhifn30MepWFjwnJY64EwZFYqoqjygWfYox6mJMjm-53oEUZuHkSNN7D72Vt_YtNDI4JAnWs-44iaags9eVk3z6SQPDBFRkrY5q4mGpcEzqf0PVXnfGwGd9ybVpyyrJ7WH-uVshlcbgbXxOZ3BNcvzkskaJL2qmYsyf_6_QSOhRaNtKR_e-sCCjaYRmpsffJ6APdIhuvyVZwf-AY_pmsFcHtruDmULtpdcGSQThcGrOpwe0nLwiuAsXTTw-HcTX7Ea69wwHzE-U0sDKaaBmNHjbIBSJhNPgbkoOtx1JfV102LEYoWEyHitxL2mzt1E8vi2abQIq_VWX1604O7gP5ES0XwT5XU7lTzfJHo6y1MnwTzqDCQPF8iqTMllFwo8h2hPSSRMVQQxExgNu_G-AbEE&state=QVDUaF72pZLG8o5E
2.365 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzowNWMyNDc4ZC02M2VkLTQ3YzgtYWQ5Mi03NTE4MWE1NjdmYTAiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiOWU0MjNhNmQtOTQzZS00OTBjLTgyMDctOTg4YzA1OTM4NjM4Il0sImF1dGhfdGltZSI6MTUyOTc1MzEzNiwiZXhwIjoxNTI5NzU2ODQ3LCJpYXQiOjE1Mjk3NTMyNDcsImlzcyI6Imh0dHBzOi8vb2lkYy1jZXJ0aWZpY2F0aW9uLm9yeS5zaDo4NDQzLyIsImp0aSI6IjQ4YjlhNmFiLWMyODEtNDM0Yy1hNWNmLTMxYjc3MjkzOGNjMyIsIm5vbmNlIjoiUlUySUZBQWRqZFNzQUcyMiIsInJhdCI6MTUyOTc1MzI0NSwic3ViIjoiZm9vQGJhci5jb20ifQ.j0t-d4nhI8k-CGoUEKFfKTFC4Ga38rXO1nHNoz7Mt9eterRM2fC7CUHhuGeCeVlfS3V007dwelqRG1VqW_v77tDY_N94Ymt8l1mxcWqjhKNmuJouMvsBoReNvO9uBwGZKL_7YpQbuFRir7oXcIkLvVfArPlzZFGdTvRFxeKGsMOjf1yOyg42smFxbb8k8sEUAWzuZ-SHI9OAJFJTwFFa4AuaqoNNv5bKV_1ySSaMoDlEw3cxXQ0BOZd7t-CtRm5ZlsRBs6MCkB9IgqJYVLgf7Vhifn30MepWFjwnJY64EwZFYqoqjygWfYox6mJMjm-53oEUZuHkSNN7D72Vt_YtNDI4JAnWs-44iaags9eVk3z6SQPDBFRkrY5q4mGpcEzqf0PVXnfGwGd9ybVpyyrJ7WH-uVshlcbgbXxOZ3BNcvzkskaJL2qmYsyf_6_QSOhRaNtKR_e-sCCjaYRmpsffJ6APdIhuvyVZwf-AY_pmsFcHtruDmULtpdcGSQThcGrOpwe0nLwiuAsXTTw-HcTX7Ea69wwHzE-U0sDKaaBmNHjbIBSJhNPgbkoOtx1JfV102LEYoWEyHitxL2mzt1E8vi2abQIq_VWX1604O7gP5ES0XwT5XU7lTzfJHo6y1MnwTzqDCQPF8iqTMllFwo8h2hPSSRMVQQxExgNu_G-AbEE', 'state': 'QVDUaF72pZLG8o5E'}
2.456 AuthorizationResponse {
"id_token": {
"aud": [
"9e423a6d-943e-490c-8207-988c05938638"
],
"auth_time": 1529753136,
"exp": 1529756847,
"iat": 1529753247,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "48b9a6ab-c281-434c-a5cf-31b772938cc3",
"nonce": "RU2IFAAdjdSsAG22",
"rat": 1529753245,
"sub": "foo@bar.com"
},
"state": "QVDUaF72pZLG8o5E"
}
2.456 phase <--<-- 4 --- AccessToken -->-->
2.456 phase <--<-- 5 --- Done -->-->
2.456 end
2.457 assertion VerifyResponse
2.457 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.457 assertion VerifySignedIdToken
2.457 condition verify-idtoken-is-signed: status=OK [Verifies that an ID Token is signed]
2.457 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-idtoken-is-signed: status=OK [Verifies that an ID Token is signed]
Done: status=OK
============================================================
RESULT: PASSED