Test Summary

Test Results

Expand All Collapse All
All times are UTC
2025-04-28 07:53:33 INFO
TEST-RUNNER
Test instance U7IsbrZLj1ueniz created
baseUrl
https://www.certification.openid.net/test/a/ArconCI
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code",
  "request_type": "plain_http_request",
  "response_mode": "default",
  "client_registration": "static_client"
}
alias
ArconCI
description
Conformance testing of Arcon Converged Identity as a Relaying Party using the OpenID Connect Core: Basic Certification Profile
planId
BFj2iiVzbPPzd
config
{
  "alias": "ArconCI",
  "description": "Conformance testing of Arcon Converged Identity as a Relaying Party using the OpenID Connect Core: Basic Certification Profile",
  "client": {
    "client_id": "0oaka2gpoymlyinwZ5d7",
    "client_secret": "_SDHPKKxtbQ55rPvFJV3DIHNI9VKAfbCJptzJhzV5EibdtvYJlXNP6vSlPC-ZDKJ",
    "redirect_uri": "https://oidc.arconnet.com/api/Oidc/callback",
    "initiate_login_uri": "https://oidc.arconnet.com/api/Oidc/initiate-login"
  },
  "publish": "everything"
}
baseMtlsUrl
https://mtls-www.certification.openid.net/test-mtls/a/ArconCI
testName
oidcc-client-test-scope-userinfo-claims
2025-04-28 07:53:33 SUCCESS
OIDCCGenerateServerConfiguration
Generated default server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/ArconCI/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/ArconCI/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/ArconCI/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/ArconCI/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/ArconCI/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/ArconCI/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post",
    "client_secret_jwt",
    "private_key_jwt"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "HS256",
    "HS384",
    "HS512",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA",
    "Ed25519",
    "Ed448"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "preferred_username",
    "gender",
    "birthdate",
    "address",
    "zoneinfo",
    "locale",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified",
    "website",
    "profile",
    "updated_at",
    "txn"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA",
    "Ed25519",
    "Ed448"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "RSA-OAEP-384",
    "RSA-OAEP-512",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA",
    "Ed25519",
    "Ed448"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "RSA-OAEP-384",
    "RSA-OAEP-512",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA",
    "Ed25519",
    "Ed448"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "RSA-OAEP-384",
    "RSA-OAEP-512",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2025-04-28 07:53:33
SetTokenEndpointAuthMethodsSupportedToClientSecretBasicOnly
Changed token_endpoint_auth_methods_supported to client_secret_basic only in server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/ArconCI/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/ArconCI/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/ArconCI/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/ArconCI/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/ArconCI/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/ArconCI/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "HS256",
    "HS384",
    "HS512",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA",
    "Ed25519",
    "Ed448"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "preferred_username",
    "gender",
    "birthdate",
    "address",
    "zoneinfo",
    "locale",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified",
    "website",
    "profile",
    "updated_at",
    "txn"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA",
    "Ed25519",
    "Ed448"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "RSA-OAEP-384",
    "RSA-OAEP-512",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA",
    "Ed25519",
    "Ed448"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "RSA-OAEP-384",
    "RSA-OAEP-512",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA",
    "Ed25519",
    "Ed448"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "RSA-OAEP-384",
    "RSA-OAEP-512",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2025-04-28 07:53:34
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "z9bDKMMK-f_awyOPwSsgxI3Dpe7GUEBGG1ASTECQP2g1QR4gwVqjFJDQ--F-yV1tfm84jZ4fDGwh5sjqIWFYAZ-R0_R50lWUGm8KPzDSzUQKzPX9_jYm09_JSAEs8K_DJmK-piPMDL2WLfACpeqN8hJff8uQeVVKOsp03Bv6xGE",
      "kty": "RSA",
      "q": "11t_pQtuVXaecLKhzLYHWehkA1hgeABZzOVgzm8Uz2Q7lVWh61lLSyJ8TGeoGtkjLRhuCJ_bR0mi4MTlqxRqxK8SjERBfkDiAHVIrPPdI4JjqKn5ByU3g-NCJOX4vJqAe4EPNhzYQdjkRptXD4aHzTb9p-Gvs5dQemUJBxzLsG8",
      "d": "AT4d2EuM-P1IZtwKyZx5eEtA8D92V82JhN4bLqkJAUrtnsabCL_6_eOnmJZ7RyzYdGlVnJRvRr387ylsPpYlv9b1OikjFn1phL2BFvn-aN25FuuksoSKrU4SmUm_65CYrFdfBEuMuz8JdqtbjQTzFQA5Ek7mojM-UVVEJg44WUxHuCCbZpRFZKugdCPjLSKSvaapnSj4mEC5a-V85XzQLA51orixAUvWkcGZpT_Lqw1xraoLH4IQVDmQtAPlig204ewa7gzJZ5LVWtDD_lJRursk7k93f79KsmtH2OXjnN4RnlMFktqCY-gR8YNkG-p_sZek3C_CC0VcnDZ9WDpfYQ",
      "e": "AQAB",
      "use": "sig",
      "kid": "40b7f388-a257-4b11-8cf4-884d48841021",
      "qi": "xx1IEOlWiIMnpjJRBIYEd3g2Z2OHFmjQYwfuLag4qmm6UHpv-_lSo4ydaCkE3Kb7NcJlGHlrwSu13zOK9PmK141VY5YWHweM8a8Vzh-wtnaYSNqgyesLdnnhpX5pweXeHseYu1r9td7WOW6lJfK4hsH9YVvRpcMi6CP3brhMAWo",
      "dp": "nqemmrso6eZxrHy9BAxUGzbMnyJCqIgn_DmHfkXa10xJOsgw4Oi7jLtvjJd6HWUAbH-igBiwQt9Ykb_VWl3gvHx-6Xm6dOF3CSayf8JZaPAD_qnZlfDoetxd3mVnVOQW6HqAZnr1DNS8i5ynqNgAO0XjOL7ALp745yAdTNje-IE",
      "dq": "qi_9xKEu9U0DUs5n_Q3Q62UyPE6IFe05CiovAZRZHrf4OkBs8D8luF-tWPgFqgn0uXt34UrrEAAKPpR7Z2KAKaStBLogA7UkpPYKk9s35Arz1ONWECaCI7DhoaU3l1yFspRAQCQ1ZnwPkhjKiVNoWG1fsV8x6bvndoIHy14fPfM",
      "n": "rtem4CTQXPIfF4YbXlLMzGGQyJeLtQfA8F2eMsMVk2BUeiMmKF1y1f8Cr14vJ_457b88w19HMWnvmBWoddTsKvG1KU2XmtUspDBFrAjFO4xmlLf8yndLLENQPrCeEVJgOc_UykDeUoyyij8DEq_aINSAvk57y8xOrOXsO9_fs2gqJhL20MRHEZeJ1xZxql9JViVfdE4uF6hnblzjZcxdNAkvWk4L5W10t0gV6ete2XfUOKEDXid2YFMqzXbUy2Y_hwx8GfRy-rMSfnoTQLFhv1W80EY3hzjmRAiMhm2aZB359v_vu_8COXRx4aBmladqJbUG69Bg1sO0wWOn3ajWDw"
    },
    {
      "kty": "EC",
      "d": "bNkvGrJJfbaC1Dl-L8YxwybUBvAu_kdWiibG_BXM3gs",
      "use": "sig",
      "crv": "P-256",
      "kid": "ba1b042a-dc47-4448-9ceb-f199cc8b86ef",
      "x": "LKNCuEoKq_AiPs-rGw1unHawViDODoqoLGSjo1Y8OXg",
      "y": "cpAbis-jAjNKy-hvW11m33XMLPqEakVgXFZEBEfX8ds"
    },
    {
      "kty": "EC",
      "d": "lBk0eYnTiNJD2ExoUNOdy-rKjP9fQo3DfRAp6NqgVIQ",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "08bcf10e-9656-4cb2-bbc5-6b30e2021224",
      "x": "2nOfn-IJTYUcwda_R836TBrsYkXv_ql_5OrCZd64PQY",
      "y": "8BKAQXWV31IgVlRStC7FvoJI3GKq1mJEIevqP44asSo"
    },
    {
      "kty": "OKP",
      "d": "N7v52oEs-CDF7zvmNmGVusGxgw7C48Ac1AIba-CnFnY",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "16018ad4-f7fe-4a32-a8fb-7307922b180e",
      "x": "GM2orQqrW7TVjT6schLEekJzVfHTqlfvFQZchYoGk3I"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "1ZTlRoGzmzR1lfM8PnKtoKl-cxoBRkJ51qo4Q4y2jdnW1qw5qkXs2-gAeHgvlnH9Hw9hWHS62J3RaEGfbhyp0wDsD4nkdhYELIHp7yIB4N_OT431MIp28GmAWPcfnvnd8mo2MteQvKcsA_abXmSGY5eOFrA5AAWwwsJUIt_N_xc",
      "kty": "RSA",
      "q": "zBz6f2a2Ro2OynGym76vpOxkUhONfSBicJ3KsFkYb1SHa31ryPp7Hw7nHwhMHDvjM7Z6GeD7L67KwCCA3fn03BsaVCyTDwrxWqtxBV8zJmnjv65qVZdhVowHFdV14j80tu-VIeUoiy2R4JZO3joGHcLyIb4FCtWIjoUhLc3lN4M",
      "d": "FSBAA2PkYO-LaycwCdheXJKDzy2pfKtiZYc1F13BDaigRC5Ggs-24_NX50lgILl69DR0E47m0Ut0pzmlBPu1-F4bR16ePPxVDNSgKJZ_VYhkLSz7MpvPyZ5gTgX7S_VWDidYwNFUu2Q_KFm9D4m52LSSTHTN8KD4oBfGAzlPnrZsxoro70T27HPKLVsE815wcLlHTB8hSRcRWF1iSXcvY8Ogddjfh7ANVvdT41-lcTpfNPo7FQ2eR0JI84bn8vxKuekVS8G0Ly_ruys3tDFCsOFt5QEuI45D6xKNL0W6NC5RgF0R-K7VdTJjefhk24QZbwK1P_uRDCXODzFd92NRvQ",
      "e": "AQAB",
      "use": "enc",
      "kid": "eb417dfb-9441-4a2c-aed5-418b07063038",
      "qi": "y15a4VQgw-awYqnIBDnxhII6Q_yrrRHbNFuhpwWxm3TartXxF4kzRlIFKHU3qBjuVM6XE1iwNDJLfZtcqAd5BNGBVJwrdyxaPu4t72DRqUJNaQSbPIrUAGpgDCgj4jlT67y_Fcw2eDdWVzapnKAdao8l5xn4FPyUebQmoDB6H9A",
      "dp": "Sxo5aQqQooHW2yyVwYvHvBf9q_G4AwG7IB3o_O_M_aJdJk2XVWWTPVyeVb5FVYytqi9ZVqZtUWBlU1jH_As-OEE5wNkHKfLh8tiX7wuxR2bLgDP1xOTbn_wpMp9rUhag0e5BMq2UapIKKzabOZz1mK2hPB8pW_WkS0fUGBNEt28",
      "alg": "RSA-OAEP",
      "dq": "n6w7udZb2S17-pqfIn81YEsc36g0EyJ2X6rQmMvZ9Z2mokvnOb3Y-x7pZrlS8PNYdWfWdNAvL8oJCetjZELZbiY1nouQL0BcNpXPQGiM1wwXAigrPvHBT7cTA92M7oSLdGBPxchCwz3O1GZBJE834ahTSlogD62jufojTnW3Tok",
      "n": "qkrT-vWHTghtvmZu7giiSvIa8XfEH0M3ZLbqyQou-ywhx4ziXOow65fg2QHBXW4_N03Vk6xnPdwPqPVQBz54ApA4beLvhRJWSkHWyksVZtFGTAEPsvj4SeprIaXMvLtuo8wzbxlwFcchd_D4_2Jwx3O0VmoEz2b4d1PPsDYpy2dJf6ckmFFkGzX3qZoWoO9lp6gZniXRvZ4AFO5ZaDi_1RJO7gqWgNNyR6XdAV2srqWn3KAojyT7bX1cDC7epYP8BITmfovA-24MG5LyDRelvCpHx3mECQZY3WddukbazPaAi0dDlFnr279_ssTQdWTZ3fQBpNsnMjfH-YKDYsp5xQ"
    },
    {
      "kty": "EC",
      "d": "aBzro8p6vOADYOvePzNBMB7Ar4xeojxbNb_qxEk_jfw",
      "use": "enc",
      "crv": "P-256",
      "kid": "a29a355e-99f9-4157-a907-bbbc2ba5d5fe",
      "x": "Qjdne5YS8wBDeJRFRBifUfsvimmH3GnJLdH4yIAcbPs",
      "y": "9YUCnlY_twA7Aj6mpBo8D6JptdHjfwWWLaWQSg93vKw",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "40b7f388-a257-4b11-8cf4-884d48841021",
      "n": "rtem4CTQXPIfF4YbXlLMzGGQyJeLtQfA8F2eMsMVk2BUeiMmKF1y1f8Cr14vJ_457b88w19HMWnvmBWoddTsKvG1KU2XmtUspDBFrAjFO4xmlLf8yndLLENQPrCeEVJgOc_UykDeUoyyij8DEq_aINSAvk57y8xOrOXsO9_fs2gqJhL20MRHEZeJ1xZxql9JViVfdE4uF6hnblzjZcxdNAkvWk4L5W10t0gV6ete2XfUOKEDXid2YFMqzXbUy2Y_hwx8GfRy-rMSfnoTQLFhv1W80EY3hzjmRAiMhm2aZB359v_vu_8COXRx4aBmladqJbUG69Bg1sO0wWOn3ajWDw"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "3f46ff60-1bb5-44d1-80bc-cf98dce599c6",
      "n": "tiQ6j2EmNGQ2lsRe3EfaZAXWXIPTCrmofcU1CcvFqN7UOWA9v7G-qi1kSHvs5I16VGKDP4OpX6kxMl-OLS4ztiru8fdSgtjEohgi3dIVoVaLxwOffTu7QDD1Lz4m8xt8ozB8UMwPpm9OnILvlHvT5lXh0QCjOA7PaukwGk-RpemdKVVatWKsdkaWvBNMg59YXnBRFSnhSz70mLXB8A4KwXpLX2PKMjfdcemxl_Szh84auutZY3dTah9oFBllZz5RL7F-eaVPhlZ4oWPKSNRge4zq4rOzQCrbKIbowb0xLbv40pmpR3kKY29T6OAg4rVzaY4AnC8QaYSNl8h_P1JiwQ"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "ba1b042a-dc47-4448-9ceb-f199cc8b86ef",
      "x": "LKNCuEoKq_AiPs-rGw1unHawViDODoqoLGSjo1Y8OXg",
      "y": "cpAbis-jAjNKy-hvW11m33XMLPqEakVgXFZEBEfX8ds"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "e44cd504-ad75-45c7-8881-34feaa8d6522",
      "x": "0umnYgqCchfzUS8qExeRNTjINPApE43uX7eRNwH6adM",
      "y": "Y96Cf4pXlwN_Frc7JzOxfPW0Wh_UKwFMSHlPNGinaEs"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "08bcf10e-9656-4cb2-bbc5-6b30e2021224",
      "x": "2nOfn-IJTYUcwda_R836TBrsYkXv_ql_5OrCZd64PQY",
      "y": "8BKAQXWV31IgVlRStC7FvoJI3GKq1mJEIevqP44asSo"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "16018ad4-f7fe-4a32-a8fb-7307922b180e",
      "x": "GM2orQqrW7TVjT6schLEekJzVfHTqlfvFQZchYoGk3I"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "eb417dfb-9441-4a2c-aed5-418b07063038",
      "alg": "RSA-OAEP",
      "n": "qkrT-vWHTghtvmZu7giiSvIa8XfEH0M3ZLbqyQou-ywhx4ziXOow65fg2QHBXW4_N03Vk6xnPdwPqPVQBz54ApA4beLvhRJWSkHWyksVZtFGTAEPsvj4SeprIaXMvLtuo8wzbxlwFcchd_D4_2Jwx3O0VmoEz2b4d1PPsDYpy2dJf6ckmFFkGzX3qZoWoO9lp6gZniXRvZ4AFO5ZaDi_1RJO7gqWgNNyR6XdAV2srqWn3KAojyT7bX1cDC7epYP8BITmfovA-24MG5LyDRelvCpHx3mECQZY3WddukbazPaAi0dDlFnr279_ssTQdWTZ3fQBpNsnMjfH-YKDYsp5xQ"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "a29a355e-99f9-4157-a907-bbbc2ba5d5fe",
      "x": "Qjdne5YS8wBDeJRFRBifUfsvimmH3GnJLdH4yIAcbPs",
      "y": "9YUCnlY_twA7Aj6mpBo8D6JptdHjfwWWLaWQSg93vKw",
      "alg": "ECDH-ES"
    }
  ]
}
2025-04-28 07:53:34 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2025-04-28 07:53:34 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2025-04-28 07:53:34 SUCCESS
OIDCCLoadUserInfo
Added user information
user_info
{
  "sub": "user-subject-1234531",
  "name": "Demo T. User",
  "given_name": "Demo",
  "family_name": "User",
  "middle_name": "Theresa",
  "nickname": "Dee",
  "preferred_username": "d.tu",
  "gender": "female",
  "birthdate": "2000-02-03",
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "zoneinfo": "America/Los_Angeles",
  "locale": "en-US",
  "phone_number": "+1 555 5550000",
  "phone_number_verified": false,
  "email": "user@example.com",
  "email_verified": false,
  "website": "https://openid.net/",
  "profile": "https://example.com/user",
  "updated_at": 1580000000,
  "txn": "2c6fb585-d51b-465a-9dca-b8cd22a11451"
}
2025-04-28 07:53:34 SUCCESS
OIDCCGetStaticClientConfigurationForRPTests
Found a static client object
client_id
0oaka2gpoymlyinwZ5d7
client_secret
_SDHPKKxtbQ55rPvFJV3DIHNI9VKAfbCJptzJhzV5EibdtvYJlXNP6vSlPC-ZDKJ
initiate_login_uri
https://oidc.arconnet.com/api/Oidc/initiate-login
redirect_uris
[
  "https://oidc.arconnet.com/api/Oidc/callback"
]
2025-04-28 07:53:34 SUCCESS
EnsureClientDoesNotHaveBothJwksAndJwksUri
Client does not have both jwks and jwks_uri set
client
{
  "client_id": "0oaka2gpoymlyinwZ5d7",
  "client_secret": "_SDHPKKxtbQ55rPvFJV3DIHNI9VKAfbCJptzJhzV5EibdtvYJlXNP6vSlPC-ZDKJ",
  "initiate_login_uri": "https://oidc.arconnet.com/api/Oidc/initiate-login",
  "redirect_uris": [
    "https://oidc.arconnet.com/api/Oidc/callback"
  ]
}
2025-04-28 07:53:34 INFO
FetchClientKeys
Skipped evaluation due to missing required element: client jwks_uri
path
jwks_uri
mapped
object
client
2025-04-28 07:53:34 SUCCESS
ValidateClientGrantTypes
grant_types match response_types
grant_types
[
  "authorization_code"
]
response_types
[
  "code"
]
2025-04-28 07:53:34 SUCCESS
OIDCCValidateClientRedirectUris
Valid redirect_uri(s) provided in registration request
redirect_uris
[
  "https://oidc.arconnet.com/api/Oidc/callback"
]
2025-04-28 07:53:34 SUCCESS
ValidateClientLogoUris
Client does not contain any logo_uri
2025-04-28 07:53:34 SUCCESS
ValidateClientUris
Client does not contain any client_uri
2025-04-28 07:53:34 SUCCESS
ValidateClientPolicyUris
Client does not contain any policy_uri
2025-04-28 07:53:34 SUCCESS
ValidateClientTosUris
Client does not contain any tos_uri
2025-04-28 07:53:34 SUCCESS
ValidateClientSubjectType
A subject_type was not provided
2025-04-28 07:53:34 INFO
ValidateIdTokenSignedResponseAlg
Skipped evaluation due to missing required element: client id_token_signed_response_alg
path
id_token_signed_response_alg
mapped
object
client
2025-04-28 07:53:34 SUCCESS
EnsureIdTokenEncryptedResponseAlgIsSetIfEncIsSet
id_token_encrypted_response_enc is not set
2025-04-28 07:53:34 INFO
ValidateUserinfoSignedResponseAlg
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2025-04-28 07:53:34 SUCCESS
EnsureUserinfoEncryptedResponseAlgIsSetIfEncIsSet
userinfo_encrypted_response_enc is not set
2025-04-28 07:53:34 INFO
ValidateRequestObjectSigningAlg
Skipped evaluation due to missing required element: client request_object_signing_alg
path
request_object_signing_alg
mapped
object
client
2025-04-28 07:53:34 SUCCESS
EnsureRequestObjectEncryptionAlgIsSetIfEncIsSet
request_object_encryption_enc is not set
2025-04-28 07:53:34 INFO
ValidateTokenEndpointAuthSigningAlg
Skipped evaluation due to missing required element: client token_endpoint_auth_signing_alg
path
token_endpoint_auth_signing_alg
mapped
object
client
2025-04-28 07:53:34 SUCCESS
ValidateDefaultMaxAge
default_max_age is not set
2025-04-28 07:53:34 INFO
ValidateRequireAuthTime
Skipped evaluation due to missing required element: client require_auth_time
path
require_auth_time
mapped
object
client
2025-04-28 07:53:34 INFO
ValidateDefaultAcrValues
Skipped evaluation due to missing required element: client default_acr_values
path
default_acr_values
mapped
object
client
2025-04-28 07:53:34 SUCCESS
ValidateInitiateLoginUri
initiate_login_uri is valid
initiate_login_uri
https://oidc.arconnet.com/api/Oidc/initiate-login
2025-04-28 07:53:34 INFO
ValidateRequestUris
Skipped evaluation due to missing required element: client request_uris
path
request_uris
mapped
object
client
2025-04-28 07:53:34 SUCCESS
OIDCCExtractServerSigningAlg
Using the default algorithm for the first key in server jwks
signing_algorithm
RS256
2025-04-28 07:53:34
SetClientIdTokenSignedResponseAlgToServerSigningAlg
Set id_token_signed_response_alg for the registered client
id_token_signed_response_alg
RS256
2025-04-28 07:53:34
oidcc-client-test-scope-userinfo-claims
Setup Done
2025-04-28 07:53:40 INCOMING
oidcc-client-test-scope-userinfo-claims
Incoming HTTP request to /test/a/ArconCI/authorize
incoming_headers
{
  "host": "www.certification.openid.net",
  "upgrade-insecure-requests": "1",
  "user-agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/135.0.0.0 Safari/537.36",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/avif,image/webp,image/apng,*/*;q\u003d0.8,application/signed-exchange;v\u003db3;q\u003d0.7",
  "sec-fetch-site": "none",
  "sec-fetch-mode": "navigate",
  "sec-fetch-user": "?1",
  "sec-fetch-dest": "document",
  "sec-ch-ua": "\"Google Chrome\";v\u003d\"135\", \"Not-A.Brand\";v\u003d\"8\", \"Chromium\";v\u003d\"135\"",
  "sec-ch-ua-mobile": "?0",
  "sec-ch-ua-platform": "\"Windows\"",
  "accept-encoding": "gzip, deflate, br, zstd",
  "accept-language": "en-US,en;q\u003d0.9",
  "cookie": "_gid\u003dGA1.2.1265047192.1745825002; _ga\u003dGA1.2.1650576532.1738752960; JSESSIONID\u003dAD623538DCDCDE27055B97879A488FDA; _ga_NF8HNLNJJE\u003dGS1.1.1745825002.5.1.1745825607.0.0.0",
  "connection": "close"
}
incoming_path
/test/a/ArconCI/authorize
incoming_body_form_params
incoming_method
GET
incoming_tls_version
TLSv1.2
incoming_tls_cert
incoming_query_string_params
{
  "response_type": "code",
  "client_id": "0oaka2gpoymlyinwZ5d7",
  "redirect_uri": "https://oidc.arconnet.com/api/Oidc/callback",
  "scope": "openid email",
  "state": "c48c732b-b4ab-4b23-b2b4-9aae0d366b2a",
  "nonce": "48f423d8-d5ec-4368-903c-6f665d9a22df"
}
incoming_body
incoming_tls_chain
[
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL"
]
incoming_body_json_parse_error
incoming_tls_cipher
ECDHE-RSA-AES128-GCM-SHA256
incoming_body_json
Authorization endpoint
2025-04-28 07:53:40 SUCCESS
EnsureRequestDoesNotContainRequestObject
Request does not contain a request parameter
2025-04-28 07:53:40 SUCCESS
EnsureAuthorizationHttpRequestContainsOpenIDScope
Found 'openid' in scope http request parameter
actual
[
  "openid",
  "email"
]
expected
openid
2025-04-28 07:53:40 SUCCESS
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
effective_authorization_endpoint_request
{
  "response_type": "code",
  "client_id": "0oaka2gpoymlyinwZ5d7",
  "redirect_uri": "https://oidc.arconnet.com/api/Oidc/callback",
  "scope": "openid email",
  "state": "c48c732b-b4ab-4b23-b2b4-9aae0d366b2a",
  "nonce": "48f423d8-d5ec-4368-903c-6f665d9a22df"
}
2025-04-28 07:53:40 SUCCESS
ExtractRequestedScopes
Requested scopes
scope
openid email
2025-04-28 07:53:40 SUCCESS
ExtractNonceFromAuthorizationRequest
Extracted nonce
nonce
48f423d8-d5ec-4368-903c-6f665d9a22df
2025-04-28 07:53:40 INFO
EnsureAuthorizationRequestContainsPkceCodeChallenge
Skipped evaluation due to missing required element: effective_authorization_endpoint_request code_challenge
path
code_challenge
mapped
object
effective_authorization_endpoint_request
2025-04-28 07:53:40 SUCCESS
EnsureResponseTypeIsCode
Response type is expected value
expected
code
2025-04-28 07:53:40 SUCCESS
EnsureMatchingClientId
Client ID matched
client_id
0oaka2gpoymlyinwZ5d7
2025-04-28 07:53:40 SUCCESS
EnsureValidRedirectUriForAuthorizationEndpointRequest
redirect_uri is one of the allowed redirect uris
actual
https://oidc.arconnet.com/api/Oidc/callback
expected
[
  "https://oidc.arconnet.com/api/Oidc/callback"
]
2025-04-28 07:53:40 SUCCESS
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
actual
[
  "openid",
  "email"
]
expected
openid
2025-04-28 07:53:40 SUCCESS
DisallowMaxAgeEqualsZeroAndPromptNone
The client did not send max_age=0 and prompt=none parameters as expected
2025-04-28 07:53:40 SUCCESS
EnsureScopeContainsAtLeastOneOfProfileEmailPhoneAddress
Found at least one of profile, email, phone and address scopes in request
actual
[
  "openid",
  "email"
]
2025-04-28 07:53:40 INFO
CheckForUnexpectedClaimsInRequestObject
Skipped evaluation due to missing required element: authorization_request_object claims
path
claims
mapped
object
authorization_request_object
2025-04-28 07:53:40 INFO
CheckForUnexpectedClaimsInClaimsParameter
Skipped evaluation due to missing required element: authorization_request_object claims.claims
path
claims.claims
mapped
object
authorization_request_object
2025-04-28 07:53:40 INFO
CheckForUnexpectedOpenIdClaims
Skipped evaluation due to missing required element: authorization_request_object claims.claims
path
claims.claims
mapped
object
authorization_request_object
2025-04-28 07:53:40 INFO
CheckRequestObjectClaimsParameterValues
Skipped evaluation due to missing required element: authorization_request_object claims.claims
path
claims.claims
mapped
object
authorization_request_object
2025-04-28 07:53:40 INFO
CheckRequestObjectClaimsParameterMemberValues
Skipped evaluation due to missing required element: authorization_request_object claims.claims
path
claims.claims
mapped
object
authorization_request_object
2025-04-28 07:53:40 SUCCESS
CreateAuthorizationCode
Created authorization code
authorization_code
xuCTWv7lekkqkp0IS9b61kYviACTQVIh
2025-04-28 07:53:40 SUCCESS
CalculateCHash
Successful c_hash encoding
c_hash
PvhN1PjxQTasLtGFgLaHZA
2025-04-28 07:53:40 SUCCESS
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
params
{
  "redirect_uri": "https://oidc.arconnet.com/api/Oidc/callback",
  "state": "c48c732b-b4ab-4b23-b2b4-9aae0d366b2a"
}
2025-04-28 07:53:40 SUCCESS
AddCodeToAuthorizationEndpointResponseParams
Added code to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://oidc.arconnet.com/api/Oidc/callback",
  "state": "c48c732b-b4ab-4b23-b2b4-9aae0d366b2a",
  "code": "xuCTWv7lekkqkp0IS9b61kYviACTQVIh"
}
2025-04-28 07:53:40
SendAuthorizationResponseWithResponseModeQuery
Redirecting back to client
uri
https://oidc.arconnet.com/api/Oidc/callback?state=c48c732b-b4ab-4b23-b2b4-9aae0d366b2a&code=xuCTWv7lekkqkp0IS9b61kYviACTQVIh
2025-04-28 07:53:40 OUTGOING
oidcc-client-test-scope-userinfo-claims
Response to HTTP request to test instance U7IsbrZLj1ueniz
outgoing
org.springframework.web.servlet.view.RedirectView: [RedirectView]; URL [https://oidc.arconnet.com/api/Oidc/callback?state=c48c732b-b4ab-4b23-b2b4-9aae0d366b2a&code=xuCTWv7lekkqkp0IS9b61kYviACTQVIh]
outgoing_path
authorize
2025-04-28 07:53:41 INCOMING
oidcc-client-test-scope-userinfo-claims
Incoming HTTP request to /test/a/ArconCI/token
incoming_headers
{
  "host": "www.certification.openid.net",
  "authorization": "Basic MG9ha2EyZ3BveW1seWlud1o1ZDc6X1NESFBLS3h0YlE1NXJQdkZKVjNESUhOSTlWS0FmYkNKcHR6Smh6VjVFaWJkdHZZSmxYTlA2dlNsUEMtWkRLSg\u003d\u003d",
  "traceparent": "00-ec0956195bbe5a4d95f2fe539e56b345-7762f83a759d1ffc-00",
  "content-type": "application/x-www-form-urlencoded",
  "content-length": "136",
  "connection": "close"
}
incoming_path
/test/a/ArconCI/token
incoming_body_form_params
{
  "grant_type": "authorization_code",
  "code": "xuCTWv7lekkqkp0IS9b61kYviACTQVIh",
  "redirect_uri": "https://oidc.arconnet.com/api/Oidc/callback"
}
incoming_method
POST
incoming_tls_version
TLSv1.2
incoming_tls_cert
incoming_query_string_params
{}
incoming_body
grant_type=authorization_code&code=xuCTWv7lekkqkp0IS9b61kYviACTQVIh&redirect_uri=https%3A%2F%2Foidc.arconnet.com%2Fapi%2FOidc%2Fcallback
incoming_tls_chain
[
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL"
]
incoming_body_json_parse_error
incoming_tls_cipher
ECDHE-RSA-AES256-GCM-SHA384
incoming_body_json
Token endpoint
2025-04-28 07:53:41
CheckClientIdMatchesOnTokenRequestIfPresent
client_id not present, nothing to check
2025-04-28 07:53:41 SUCCESS
ExtractClientCredentialsFromBasicAuthorizationHeader
Extracted client authentication
client_id
0oaka2gpoymlyinwZ5d7
client_secret
_SDHPKKxtbQ55rPvFJV3DIHNI9VKAfbCJptzJhzV5EibdtvYJlXNP6vSlPC-ZDKJ
method
client_secret_basic
2025-04-28 07:53:41 SUCCESS
ValidateClientIdAndSecret
Client id and secret match
2025-04-28 07:53:41 SUCCESS
ValidateAuthorizationCode
Found authorization code
authorization_code
xuCTWv7lekkqkp0IS9b61kYviACTQVIh
2025-04-28 07:53:41 SUCCESS
ValidateRedirectUriForTokenEndpointRequest
redirect_uri is the same as the one used in the authorization request
actual
https://oidc.arconnet.com/api/Oidc/callback
2025-04-28 07:53:41 SUCCESS
GenerateBearerAccessToken
Generated access token
access_token
9FXSHg224Hi1uR8ATMNt45ogd5lky8WPIqMpREJdw9kByOwbV4
2025-04-28 07:53:41 SUCCESS
CalculateAtHash
Successful at_hash encoding
at_hash
27lBAvTkio6okh114yLP-g
2025-04-28 07:53:41 SUCCESS
GenerateIdTokenClaims
Created ID Token Claims
iss
https://www.certification.openid.net/test/a/ArconCI/
sub
user-subject-1234531
aud
0oaka2gpoymlyinwZ5d7
nonce
48f423d8-d5ec-4368-903c-6f665d9a22df
iat
1745826821
exp
1745827121
2025-04-28 07:53:41 SUCCESS
AddAtHashToIdTokenClaims
Added at_hash to ID token claims
at_hash
27lBAvTkio6okh114yLP-g
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/a/ArconCI/",
  "sub": "user-subject-1234531",
  "aud": "0oaka2gpoymlyinwZ5d7",
  "nonce": "48f423d8-d5ec-4368-903c-6f665d9a22df",
  "iat": 1745826821,
  "exp": 1745827121,
  "at_hash": "27lBAvTkio6okh114yLP-g"
}
2025-04-28 07:53:41 INFO
AddAuthTimeToIdTokenClaims
Skipped evaluation due to missing required element: effective_authorization_endpoint_request max_age
path
max_age
mapped
object
effective_authorization_endpoint_request
2025-04-28 07:53:41 SUCCESS
OIDCCSignIdToken
Signed the ID token
id_token
eyJraWQiOiI0MGI3ZjM4OC1hMjU3LTRiMTEtOGNmNC04ODRkNDg4NDEwMjEiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiMjdsQkF2VGtpbzZva2gxMTR5TFAtZyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiMG9ha2EyZ3BveW1seWlud1o1ZDciLCJpc3MiOiJodHRwczovL3d3dy5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXQvdGVzdC9hL0FyY29uQ0kvIiwiZXhwIjoxNzQ1ODI3MTIxLCJub25jZSI6IjQ4ZjQyM2Q4LWQ1ZWMtNDM2OC05MDNjLTZmNjY1ZDlhMjJkZiIsImlhdCI6MTc0NTgyNjgyMX0.OcL4x56b_8st8mgU52r7VywBeiD9eymFwQyv7njnGLb5OAxwSj-NkChSQPkzScJfwlgZjEzB8VXqeyqtX0vho8ZJfVzhP4eyWKZF-_zAJmX_u-_3UYbn49pe2j1YQkDOcryYlFNHaaVVvxZTYgaAQixW_cblFGxUbScTc4m8PwLnbr23Wnx6D_CarqPrIP6iQ7J4vTR1bK9q0BR_kNbBmWsCy0eXGRwfr7Ag77XQTehKyItT6ny8LaXRNlsBJh9mF92cS-YhxGcASJTyyXg7_TMA2670ko02TFCUf9QzksY8GkWhCesunj-F9HZCsmJD4Q3k61p9mYfywQhttrTtOg
key
{"p":"z9bDKMMK-f_awyOPwSsgxI3Dpe7GUEBGG1ASTECQP2g1QR4gwVqjFJDQ--F-yV1tfm84jZ4fDGwh5sjqIWFYAZ-R0_R50lWUGm8KPzDSzUQKzPX9_jYm09_JSAEs8K_DJmK-piPMDL2WLfACpeqN8hJff8uQeVVKOsp03Bv6xGE","kty":"RSA","q":"11t_pQtuVXaecLKhzLYHWehkA1hgeABZzOVgzm8Uz2Q7lVWh61lLSyJ8TGeoGtkjLRhuCJ_bR0mi4MTlqxRqxK8SjERBfkDiAHVIrPPdI4JjqKn5ByU3g-NCJOX4vJqAe4EPNhzYQdjkRptXD4aHzTb9p-Gvs5dQemUJBxzLsG8","d":"AT4d2EuM-P1IZtwKyZx5eEtA8D92V82JhN4bLqkJAUrtnsabCL_6_eOnmJZ7RyzYdGlVnJRvRr387ylsPpYlv9b1OikjFn1phL2BFvn-aN25FuuksoSKrU4SmUm_65CYrFdfBEuMuz8JdqtbjQTzFQA5Ek7mojM-UVVEJg44WUxHuCCbZpRFZKugdCPjLSKSvaapnSj4mEC5a-V85XzQLA51orixAUvWkcGZpT_Lqw1xraoLH4IQVDmQtAPlig204ewa7gzJZ5LVWtDD_lJRursk7k93f79KsmtH2OXjnN4RnlMFktqCY-gR8YNkG-p_sZek3C_CC0VcnDZ9WDpfYQ","e":"AQAB","use":"sig","kid":"40b7f388-a257-4b11-8cf4-884d48841021","qi":"xx1IEOlWiIMnpjJRBIYEd3g2Z2OHFmjQYwfuLag4qmm6UHpv-_lSo4ydaCkE3Kb7NcJlGHlrwSu13zOK9PmK141VY5YWHweM8a8Vzh-wtnaYSNqgyesLdnnhpX5pweXeHseYu1r9td7WOW6lJfK4hsH9YVvRpcMi6CP3brhMAWo","dp":"nqemmrso6eZxrHy9BAxUGzbMnyJCqIgn_DmHfkXa10xJOsgw4Oi7jLtvjJd6HWUAbH-igBiwQt9Ykb_VWl3gvHx-6Xm6dOF3CSayf8JZaPAD_qnZlfDoetxd3mVnVOQW6HqAZnr1DNS8i5ynqNgAO0XjOL7ALp745yAdTNje-IE","dq":"qi_9xKEu9U0DUs5n_Q3Q62UyPE6IFe05CiovAZRZHrf4OkBs8D8luF-tWPgFqgn0uXt34UrrEAAKPpR7Z2KAKaStBLogA7UkpPYKk9s35Arz1ONWECaCI7DhoaU3l1yFspRAQCQ1ZnwPkhjKiVNoWG1fsV8x6bvndoIHy14fPfM","n":"rtem4CTQXPIfF4YbXlLMzGGQyJeLtQfA8F2eMsMVk2BUeiMmKF1y1f8Cr14vJ_457b88w19HMWnvmBWoddTsKvG1KU2XmtUspDBFrAjFO4xmlLf8yndLLENQPrCeEVJgOc_UykDeUoyyij8DEq_aINSAvk57y8xOrOXsO9_fs2gqJhL20MRHEZeJ1xZxql9JViVfdE4uF6hnblzjZcxdNAkvWk4L5W10t0gV6ete2XfUOKEDXid2YFMqzXbUy2Y_hwx8GfRy-rMSfnoTQLFhv1W80EY3hzjmRAiMhm2aZB359v_vu_8COXRx4aBmladqJbUG69Bg1sO0wWOn3ajWDw"}
algorithm
RS256
2025-04-28 07:53:41 INFO
EncryptIdToken
Skipped evaluation due to missing required element: client id_token_encrypted_response_alg
path
id_token_encrypted_response_alg
mapped
object
client
2025-04-28 07:53:41 SUCCESS
CreateTokenEndpointResponse
Created token endpoint response
access_token
9FXSHg224Hi1uR8ATMNt45ogd5lky8WPIqMpREJdw9kByOwbV4
token_type
Bearer
id_token
eyJraWQiOiI0MGI3ZjM4OC1hMjU3LTRiMTEtOGNmNC04ODRkNDg4NDEwMjEiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiMjdsQkF2VGtpbzZva2gxMTR5TFAtZyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiMG9ha2EyZ3BveW1seWlud1o1ZDciLCJpc3MiOiJodHRwczovL3d3dy5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXQvdGVzdC9hL0FyY29uQ0kvIiwiZXhwIjoxNzQ1ODI3MTIxLCJub25jZSI6IjQ4ZjQyM2Q4LWQ1ZWMtNDM2OC05MDNjLTZmNjY1ZDlhMjJkZiIsImlhdCI6MTc0NTgyNjgyMX0.OcL4x56b_8st8mgU52r7VywBeiD9eymFwQyv7njnGLb5OAxwSj-NkChSQPkzScJfwlgZjEzB8VXqeyqtX0vho8ZJfVzhP4eyWKZF-_zAJmX_u-_3UYbn49pe2j1YQkDOcryYlFNHaaVVvxZTYgaAQixW_cblFGxUbScTc4m8PwLnbr23Wnx6D_CarqPrIP6iQ7J4vTR1bK9q0BR_kNbBmWsCy0eXGRwfr7Ag77XQTehKyItT6ny8LaXRNlsBJh9mF92cS-YhxGcASJTyyXg7_TMA2670ko02TFCUf9QzksY8GkWhCesunj-F9HZCsmJD4Q3k61p9mYfywQhttrTtOg
scope
openid email
2025-04-28 07:53:41 OUTGOING
oidcc-client-test-scope-userinfo-claims
Response to HTTP request to test instance U7IsbrZLj1ueniz
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "access_token": "9FXSHg224Hi1uR8ATMNt45ogd5lky8WPIqMpREJdw9kByOwbV4",
  "token_type": "Bearer",
  "id_token": "eyJraWQiOiI0MGI3ZjM4OC1hMjU3LTRiMTEtOGNmNC04ODRkNDg4NDEwMjEiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiMjdsQkF2VGtpbzZva2gxMTR5TFAtZyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiMG9ha2EyZ3BveW1seWlud1o1ZDciLCJpc3MiOiJodHRwczovL3d3dy5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXQvdGVzdC9hL0FyY29uQ0kvIiwiZXhwIjoxNzQ1ODI3MTIxLCJub25jZSI6IjQ4ZjQyM2Q4LWQ1ZWMtNDM2OC05MDNjLTZmNjY1ZDlhMjJkZiIsImlhdCI6MTc0NTgyNjgyMX0.OcL4x56b_8st8mgU52r7VywBeiD9eymFwQyv7njnGLb5OAxwSj-NkChSQPkzScJfwlgZjEzB8VXqeyqtX0vho8ZJfVzhP4eyWKZF-_zAJmX_u-_3UYbn49pe2j1YQkDOcryYlFNHaaVVvxZTYgaAQixW_cblFGxUbScTc4m8PwLnbr23Wnx6D_CarqPrIP6iQ7J4vTR1bK9q0BR_kNbBmWsCy0eXGRwfr7Ag77XQTehKyItT6ny8LaXRNlsBJh9mF92cS-YhxGcASJTyyXg7_TMA2670ko02TFCUf9QzksY8GkWhCesunj-F9HZCsmJD4Q3k61p9mYfywQhttrTtOg",
  "scope": "openid email"
}
outgoing_path
token
2025-04-28 07:53:41 INCOMING
oidcc-client-test-scope-userinfo-claims
Incoming HTTP request to /test/a/ArconCI/jwks
incoming_headers
{
  "host": "www.certification.openid.net",
  "traceparent": "00-ec0956195bbe5a4d95f2fe539e56b345-8015e90ec2a71aeb-00",
  "cookie": "JSESSIONID\u003dB9A3D2F764DFDFB953C0C7313FC1797B",
  "connection": "close"
}
incoming_path
/test/a/ArconCI/jwks
incoming_body_form_params
incoming_method
GET
incoming_tls_version
TLSv1.2
incoming_tls_cert
incoming_query_string_params
{}
incoming_body
incoming_tls_chain
[
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL"
]
incoming_body_json_parse_error
incoming_tls_cipher
ECDHE-RSA-AES256-GCM-SHA384
incoming_body_json
Jwks endpoint
2025-04-28 07:53:41 OUTGOING
oidcc-client-test-scope-userinfo-claims
Response to HTTP request to test instance U7IsbrZLj1ueniz
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "40b7f388-a257-4b11-8cf4-884d48841021",
      "n": "rtem4CTQXPIfF4YbXlLMzGGQyJeLtQfA8F2eMsMVk2BUeiMmKF1y1f8Cr14vJ_457b88w19HMWnvmBWoddTsKvG1KU2XmtUspDBFrAjFO4xmlLf8yndLLENQPrCeEVJgOc_UykDeUoyyij8DEq_aINSAvk57y8xOrOXsO9_fs2gqJhL20MRHEZeJ1xZxql9JViVfdE4uF6hnblzjZcxdNAkvWk4L5W10t0gV6ete2XfUOKEDXid2YFMqzXbUy2Y_hwx8GfRy-rMSfnoTQLFhv1W80EY3hzjmRAiMhm2aZB359v_vu_8COXRx4aBmladqJbUG69Bg1sO0wWOn3ajWDw"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "3f46ff60-1bb5-44d1-80bc-cf98dce599c6",
      "n": "tiQ6j2EmNGQ2lsRe3EfaZAXWXIPTCrmofcU1CcvFqN7UOWA9v7G-qi1kSHvs5I16VGKDP4OpX6kxMl-OLS4ztiru8fdSgtjEohgi3dIVoVaLxwOffTu7QDD1Lz4m8xt8ozB8UMwPpm9OnILvlHvT5lXh0QCjOA7PaukwGk-RpemdKVVatWKsdkaWvBNMg59YXnBRFSnhSz70mLXB8A4KwXpLX2PKMjfdcemxl_Szh84auutZY3dTah9oFBllZz5RL7F-eaVPhlZ4oWPKSNRge4zq4rOzQCrbKIbowb0xLbv40pmpR3kKY29T6OAg4rVzaY4AnC8QaYSNl8h_P1JiwQ"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "ba1b042a-dc47-4448-9ceb-f199cc8b86ef",
      "x": "LKNCuEoKq_AiPs-rGw1unHawViDODoqoLGSjo1Y8OXg",
      "y": "cpAbis-jAjNKy-hvW11m33XMLPqEakVgXFZEBEfX8ds"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "e44cd504-ad75-45c7-8881-34feaa8d6522",
      "x": "0umnYgqCchfzUS8qExeRNTjINPApE43uX7eRNwH6adM",
      "y": "Y96Cf4pXlwN_Frc7JzOxfPW0Wh_UKwFMSHlPNGinaEs"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "08bcf10e-9656-4cb2-bbc5-6b30e2021224",
      "x": "2nOfn-IJTYUcwda_R836TBrsYkXv_ql_5OrCZd64PQY",
      "y": "8BKAQXWV31IgVlRStC7FvoJI3GKq1mJEIevqP44asSo"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "16018ad4-f7fe-4a32-a8fb-7307922b180e",
      "x": "GM2orQqrW7TVjT6schLEekJzVfHTqlfvFQZchYoGk3I"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "eb417dfb-9441-4a2c-aed5-418b07063038",
      "alg": "RSA-OAEP",
      "n": "qkrT-vWHTghtvmZu7giiSvIa8XfEH0M3ZLbqyQou-ywhx4ziXOow65fg2QHBXW4_N03Vk6xnPdwPqPVQBz54ApA4beLvhRJWSkHWyksVZtFGTAEPsvj4SeprIaXMvLtuo8wzbxlwFcchd_D4_2Jwx3O0VmoEz2b4d1PPsDYpy2dJf6ckmFFkGzX3qZoWoO9lp6gZniXRvZ4AFO5ZaDi_1RJO7gqWgNNyR6XdAV2srqWn3KAojyT7bX1cDC7epYP8BITmfovA-24MG5LyDRelvCpHx3mECQZY3WddukbazPaAi0dDlFnr279_ssTQdWTZ3fQBpNsnMjfH-YKDYsp5xQ"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "a29a355e-99f9-4157-a907-bbbc2ba5d5fe",
      "x": "Qjdne5YS8wBDeJRFRBifUfsvimmH3GnJLdH4yIAcbPs",
      "y": "9YUCnlY_twA7Aj6mpBo8D6JptdHjfwWWLaWQSg93vKw",
      "alg": "ECDH-ES"
    }
  ]
}
outgoing_path
jwks
2025-04-28 07:53:42 INCOMING
oidcc-client-test-scope-userinfo-claims
Incoming HTTP request to /test/a/ArconCI/userinfo
incoming_headers
{
  "host": "www.certification.openid.net",
  "authorization": "Bearer 9FXSHg224Hi1uR8ATMNt45ogd5lky8WPIqMpREJdw9kByOwbV4",
  "traceparent": "00-ec0956195bbe5a4d95f2fe539e56b345-e8ab5a6799938c73-00",
  "cookie": "JSESSIONID\u003dB9A3D2F764DFDFB953C0C7313FC1797B",
  "connection": "close"
}
incoming_path
/test/a/ArconCI/userinfo
incoming_body_form_params
incoming_method
GET
incoming_tls_version
TLSv1.2
incoming_tls_cert
incoming_query_string_params
{}
incoming_body
incoming_tls_chain
[
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL",
  "CONFORMANCE_SUITE_JSON_NULL"
]
incoming_body_json_parse_error
incoming_tls_cipher
ECDHE-RSA-AES256-GCM-SHA384
incoming_body_json
Userinfo endpoint
2025-04-28 07:53:42 SUCCESS
OIDCCExtractBearerAccessTokenFromRequest
Found access token on incoming request
access_token
9FXSHg224Hi1uR8ATMNt45ogd5lky8WPIqMpREJdw9kByOwbV4
2025-04-28 07:53:42 SUCCESS
RequireBearerAccessToken
Found access token in request
actual
9FXSHg224Hi1uR8ATMNt45ogd5lky8WPIqMpREJdw9kByOwbV4
2025-04-28 07:53:42 SUCCESS
FilterUserInfoForScopes
User info endpoint output
sub
user-subject-1234531
email
user@example.com
email_verified
false
2025-04-28 07:53:42
ClearAccessTokenFromRequest
Removed incoming access token from environment
2025-04-28 07:53:42 INFO
AddIssAndAudToUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2025-04-28 07:53:42 INFO
SignUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2025-04-28 07:53:42 INFO
EncryptUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_encrypted_response_alg
path
userinfo_encrypted_response_alg
mapped
object
client
2025-04-28 07:53:42 OUTGOING
oidcc-client-test-scope-userinfo-claims
Response to HTTP request to test instance U7IsbrZLj1ueniz
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "sub": "user-subject-1234531",
  "email": "user@example.com",
  "email_verified": false
}
outgoing_path
userinfo
2025-04-28 07:53:42 FINISHED
oidcc-client-test-scope-userinfo-claims
Test has run to completion
testmodule_result
PASSED
Test Results