Hello list,sorry for the longer email...I just noticed that Keycloak is currently not listed as acertified OpenID Connect implementation under:As it turns out one can run the tests oneself by creating a test profile as described here:The OpenID Connect test can be configured here:I just gave the test a spin by running a Keycloak Application instance(Version 1.9.1.Final - as I had that running) embedded in a Spring Boot Appon Cloud Foundry which I exposed to the op.certification.openid.net test server.... it works and was a quick way to get Keycloak exposed to the test - and yes I knowthis is of course not a prod environment ;-)The results looked not bad.Note that you need to execute each step manually by clicking on it...First run got me 23 green (+2 manually verified) out of 41 tests overall,rest was 9 yellow and 6 red.You can find a screenshot of the overall test results here:I think those tests are a great way to close gaps between specification and implementationand help to make Keycloak more compatible.I also have the logs with the detailed request / response pairs with failed tests andexplanations.Please ping me if you want to have those for investigation (~600 kb text).Some of the tests like ("Scope requesting all claims [Basic, Implicit, Hybrid] (OP-scope-All)")were yellow because the some claim information was missing in the user info like:['nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'phone_number', 'phone_number_verified'].The red tests like "IDToken has kid [Basic, Implicit, Hybrid] (OP-IDToken-kid)" mostly failed due tomissing values in the response e.g."[verify-signed-idtoken-has-kid]status: ERRORdescription: Verifies that the header of a signed IDToken includes a kid claim.info: Signed ID Token has no kid: header={u'alg': u'RS256'}"If you want to try it out yourself here are the settings I used for theOpenID Connect Test Application:--------------------Provider configuration:"Does the OP have a .well-known/openid-configuration endpoint?"yes"What is the issuer path for this configuration information?""Do the provider support dynamic client registration?"no (I know keycloak supports that but I couldn't get that working)"Redirect uris""Client id"openid-cert"Client secret"4692ca28-daad-4d76-aa82-0991e518d931Required info"Which subject type do you want to use by default?"public"Which response type should be used by default?"code"Select supported features"JWT signed with algorithm other than "none"Encrypted JWTTest specific request parameters:"Login hint""UI locales"en de"Claims locales"en de"Acr values"2 1"Webfinger url""Webfinger email"E.g. bob@example.comFor testing purposes I created a new realm "test" with an additionalclient "openid-cert" with "confidential" access type andthe valid redirect url provided by the op.certification.openid.net test server.I also created a user "tester" for the login tests.Cheers,Thomas
_______________________________________________
keycloak-dev mailing list
keycloak-dev@lists.jboss.org
https://lists.jboss.org/mailman/listinfo/keycloak-dev