[OpenID-Specs-eKYC-IDA] Conformance tests
Edmund Jay
edmund.jay at oidf.org
Tue Nov 19 22:59:39 UTC 2024
Hi WG members,
Here is a list of the current conformance suite tests :
ekyc-server-happypath Request only one claim, selected from the list of claims_in_verified_claims_supported without requesting any other verification element and expect a happy path flow.
ekyc-server-happypath-emptyobject Request only one claim, selected from the list of claims_in_verified_claims_supported, without requesting any other verification element and expect a happy path flow. Uses empty objects instead of 'null' when requesting claim.
ekyc-server-happypath-essentialfalse Request only one claim, selected from the list of claims_in_verified_claims_supported, without requesting any other verification element and expect a happy path flow. Uses {\"essential\": false} instead of null when request the claim.
ekyc-server-unknown-claim-omitted This test requests one known claim, selected from the list of claims_in_verified_claims_supported, and one random claim name (unknown to the OP) and expects a happy path flow. The unknown claim must be omitted from responses.
ekyc-server-unknown-essential-claim-omitted This test requests one known claim, selected from the list of claims_in_verified_claims_supported, and one random claim name (unknown to the OP), marked as essential, and expects a happy path flow. The unknown claim must be omitted from responses.
ekyc-server-unknown-claim-specialchars-omitted This test requests one known claim, selected from the list of claims_in_verified_claims_supported, and one random claim name (unknown to the OP), with special chars in its name, and expects a happy path flow. The unknown claim must be omitted from responses.
ekyc-server-one-claim-with-random-value-omitted This test requests one known claim, selected from the list of claims_in_verified_claims_supported, but with a random value (a UUID) that cannot be fullfilled and expects the authorization to succeed. The verified_claims must be omitted from responses completely as the value cannot be fulfilled.
ekyc-server-long-purpose-invalid-request This test requests one known claim, selected from the list of claims_in_verified_claims_supported, with a purpose longer than 300 characters. The authentication request MUST fail and the OP return an error invalid_request to the RP.
ekyc-server-short-purpose-invalid-request This test requests one known claim, selected from the list of claims_in_verified_claims_supported, with a purpose which is only 2 characters long. As per section 6.1 of the spec, the authentication request MUST fail and the OP return an error invalid_request to the RP.
ekyc-server-request-only-in-idtoken Request only one claim, selected from the list of claims_in_verified_claims_supported, only in id_token, without requesting any other verification element and expect a happy path flow. verified_claims must not be included in userinfo responses.
ekyc-server-request-only-in-userinfo Request only one claim, selected from the list of claims_in_verified_claims_supported, only in userinfo, without requesting any other verification element and expect a happy path flow.verified_claims must not be included in id_tokens.
ekyc-server-testuserprovidedrequest This test uses the verified_claims request provided in verified_claims_request field and expects a happy path flow, i.e the request must succeed.
ekyc-server-testbasedonuserinfo-defaults This test builds the verified_claims request using the userinfo data provided in test configuration and expects a happy path flow, i.e the request must succeed, and returned data must match the provided userinfo. This test will be skipped if userinfo data is not provided.
ekyc-server-test-userinfo-notfoundinop This test builds the verified_claims request using the userinfo data provided in test configuration and expects a happy path flow, i.e the request must succeed, and returned data must match the provided userinfo. This test will be skipped if userinfo data is not provided in configuration.
Of these tests, it looks like ekyc-server-long-purpose-invalid-request and ekyc-server-short-purpose-invalid-request are no longer relevant.
Some of the more advanced things like trust frameworks, evidences and documents are not tested.
Mark has mentioned testing eKYC as part of other protocols like FAPI.
I'm currently updating the conformance suite from ID3 -> Final and as part of the that , please think about what other parts of the specs you would like to be tested.
Edmund
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-ekyc-ida/attachments/20241119/63fb1c4f/attachment-0001.htm>
More information about the Openid-specs-ekyc-ida
mailing list