internal/certification/IT.F.T.T.s/OP-nonce-noncode.txt
Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-nonce-noncode
Test description: Request with nonce, verifies it was returned in ID Token [Implicit, Hybrid]
Timestamp: 2018-06-23T11:23:21Z
============================================================
Trace output
0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.07 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.072 ProviderConfigurationResponse {
"authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
"claims_parameter_supported": false,
"claims_supported": [
"sub"
],
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"refresh_token"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"issuer": "https://oidc-certification.ory.sh:8443/",
"jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
"registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": true,
"response_modes_supported": [
"query",
"fragment"
],
"response_types_supported": [
"code",
"code id_token",
"id_token",
"token id_token",
"token",
"token id_token code"
],
"scopes_supported": [
"offline",
"openid"
],
"subject_types_supported": [
"pairwise",
"public"
],
"token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
"token_endpoint_auth_methods_supported": [
"client_secret_post",
"client_secret_basic",
"private_key_jwt",
"none"
],
"userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
"userinfo_signing_alg_values_supported": [
"none",
"RS256"
],
"version": "3.0"
}
0.072 phase <--<-- 2 --- Registration -->-->
0.072 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['roland@example.com'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.072 RegistrationRequest {
"application_type": "web",
"contacts": [
"roland@example.com"
],
"grant_types": [
"implicit"
],
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61353/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#PbgCX9iEQSOLOUAH"
],
"response_types": [
"id_token token"
]
}
0.235 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.236 RegistrationResponse {
"client_id": "466c4db2-b4d8-4eb7-a1ee-763eca4d3947",
"client_secret": "OXBYQwHx~E6q",
"client_secret_expires_at": 0,
"contacts": [
"roland@example.com"
],
"grant_types": [
"implicit"
],
"id": "466c4db2-b4d8-4eb7-a1ee-763eca4d3947",
"jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
"public": false,
"redirect_uris": [
"https://op.certification.openid.net:61353/authz_cb"
],
"request_uris": [
"https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#PbgCX9iEQSOLOUAH"
],
"response_types": [
"id_token token"
],
"scope": "openid offline offline_access profile email address phone",
"token_endpoint_auth_method": "client_secret_basic",
"userinfo_signed_response_alg": "none"
}
0.236 phase <--<-- 3 --- AsyncAuthn -->-->
0.237 AuthorizationRequest {
"client_id": "466c4db2-b4d8-4eb7-a1ee-763eca4d3947",
"nonce": "XSjQVny0GBwKqmoc",
"redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
"response_type": "id_token token",
"scope": "openid",
"state": "9LhxUOaMb0hly6Lq"
}
0.237 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=466c4db2-b4d8-4eb7-a1ee-763eca4d3947&state=9LhxUOaMb0hly6Lq&response_type=id_token+token&nonce=XSjQVny0GBwKqmoc
0.237 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=466c4db2-b4d8-4eb7-a1ee-763eca4d3947&state=9LhxUOaMb0hly6Lq&response_type=id_token+token&nonce=XSjQVny0GBwKqmoc
2.711 http args {}
2.884 response URL with fragment
2.884 response access_token=SmDLMPmShDimnCreK5tuJSqdtST64cjBh13oCgXzzUE.mf7VJJAamUwy702f69rDRkI3zVAFj40fGSda88bQVMM&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoid2Y4MlRXUkQwRXJ2T0hRWUhjTENkZyIsImF1ZCI6WyI0NjZjNGRiMi1iNGQ4LTRlYjctYTFlZS03NjNlY2E0ZDM5NDciXSwiYXV0aF90aW1lIjoxNTI5NzUyODIwLCJleHAiOjE1Mjk3NTY2MDAsImlhdCI6MTUyOTc1MzAwMCwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiNWE2Nzg5MGItMjFhNi00OTlmLThiNDctMjM4YjE4M2NmOTMxIiwibm9uY2UiOiJYU2pRVm55MEdCd0txbW9jIiwicmF0IjoxNTI5NzUyOTk4LCJzdWIiOiJmb29AYmFyLmNvbSJ9.TrSai9Ylz2cuN5IgPgUVh0MUHINSSHCw5toWZ1BV0Jyp_yBNQ3ZUCMfHVpoTq8nwV2s5rXZ3OD6aMdN8GimLc7rb0nBjyWO60i6WJP6le4cHGfCLIz6fcl4PZGRNyZHIoulXDVb2gfd0YUMCoFIhGDZrCH-fqGikFlN3qvu7wecWrxCMDCFbhRmO4kBp4I76adLdtEWfn0LVw-n6Yj6ORgNrVowRjllasDdFAkcOzz2vd7Eb4soEp9SUA-4XDVMGDJ_og9wDcoRrmBIMbYGt4iwt1Rv24D9lcT5KoUuN9k15cnkZeqn5e4g800LTL-2qXMEAGITsUGjUxjgus1J7jWhJTWbjccGECp6KntBuUPNFiI6KZCzuvvCwYJRyR_9U_UR1Yrt9OOtip5_vL6tjQgVgMv3nCVGATcV7oAdVVQ56dk__TY79ZWbj97BnSKZjHGlnKLtN3sH2ctU6O5FXh9sTw-hV4wPhUqeBxb1BNnfWWWtbsiC1LDM5-dJEKi1uHKycBHFeGzUXM1p_cCD_58a8yzD0hxqdBRNr4mM55uYCv2jtD49wRqOyKmOI5wfMbHa_2zF00zq7TQKayd0CZ9ek-lwvLYWsnfrGijetWJc9ihZv7egnsCRtfsoGWrd8Mv_OKMlLyDSaV5VMbMarux2Pei7do6fXU2mHSeqGywk&scope=openid&state=9LhxUOaMb0hly6Lq&token_type=bearer
2.885 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoid2Y4MlRXUkQwRXJ2T0hRWUhjTENkZyIsImF1ZCI6WyI0NjZjNGRiMi1iNGQ4LTRlYjctYTFlZS03NjNlY2E0ZDM5NDciXSwiYXV0aF90aW1lIjoxNTI5NzUyODIwLCJleHAiOjE1Mjk3NTY2MDAsImlhdCI6MTUyOTc1MzAwMCwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiNWE2Nzg5MGItMjFhNi00OTlmLThiNDctMjM4YjE4M2NmOTMxIiwibm9uY2UiOiJYU2pRVm55MEdCd0txbW9jIiwicmF0IjoxNTI5NzUyOTk4LCJzdWIiOiJmb29AYmFyLmNvbSJ9.TrSai9Ylz2cuN5IgPgUVh0MUHINSSHCw5toWZ1BV0Jyp_yBNQ3ZUCMfHVpoTq8nwV2s5rXZ3OD6aMdN8GimLc7rb0nBjyWO60i6WJP6le4cHGfCLIz6fcl4PZGRNyZHIoulXDVb2gfd0YUMCoFIhGDZrCH-fqGikFlN3qvu7wecWrxCMDCFbhRmO4kBp4I76adLdtEWfn0LVw-n6Yj6ORgNrVowRjllasDdFAkcOzz2vd7Eb4soEp9SUA-4XDVMGDJ_og9wDcoRrmBIMbYGt4iwt1Rv24D9lcT5KoUuN9k15cnkZeqn5e4g800LTL-2qXMEAGITsUGjUxjgus1J7jWhJTWbjccGECp6KntBuUPNFiI6KZCzuvvCwYJRyR_9U_UR1Yrt9OOtip5_vL6tjQgVgMv3nCVGATcV7oAdVVQ56dk__TY79ZWbj97BnSKZjHGlnKLtN3sH2ctU6O5FXh9sTw-hV4wPhUqeBxb1BNnfWWWtbsiC1LDM5-dJEKi1uHKycBHFeGzUXM1p_cCD_58a8yzD0hxqdBRNr4mM55uYCv2jtD49wRqOyKmOI5wfMbHa_2zF00zq7TQKayd0CZ9ek-lwvLYWsnfrGijetWJc9ihZv7egnsCRtfsoGWrd8Mv_OKMlLyDSaV5VMbMarux2Pei7do6fXU2mHSeqGywk', 'scope': 'openid', 'access_token': 'SmDLMPmShDimnCreK5tuJSqdtST64cjBh13oCgXzzUE.mf7VJJAamUwy702f69rDRkI3zVAFj40fGSda88bQVMM', 'state': '9LhxUOaMb0hly6Lq', 'expires_in': 3599, 'token_type': 'bearer'}
2.974 AuthorizationResponse {
"access_token": "SmDLMPmShDimnCreK5tuJSqdtST64cjBh13oCgXzzUE.mf7VJJAamUwy702f69rDRkI3zVAFj40fGSda88bQVMM",
"expires_in": 3599,
"id_token": {
"at_hash": "wf82TWRD0ErvOHQYHcLCdg",
"aud": [
"466c4db2-b4d8-4eb7-a1ee-763eca4d3947"
],
"auth_time": 1529752820,
"exp": 1529756600,
"iat": 1529753000,
"iss": "https://oidc-certification.ory.sh:8443/",
"jti": "5a67890b-21a6-499f-8b47-238b183cf931",
"nonce": "XSjQVny0GBwKqmoc",
"rat": 1529752998,
"sub": "foo@bar.com"
},
"scope": "openid",
"state": "9LhxUOaMb0hly6Lq",
"token_type": "bearer"
}
2.974 phase <--<-- 4 --- AccessToken -->-->
2.974 phase <--<-- 5 --- Done -->-->
2.974 end
2.974 assertion VerifyResponse
2.974 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2.975 assertion CheckIdTokenNonce
2.975 condition check-idtoken-nonce: status=OK [Verify that the nonce in the IDToken is the same that's included in the Authorization Request.]
2.975 condition Done: status=OK
============================================================
Conditions
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
check-idtoken-nonce: status=OK [Verify that the nonce in the IDToken is the same that's included in the Authorization Request.]
Done: status=OK
============================================================
RESULT: PASSED