Roman is a QA engineer of ISSART . He has 3 years of experience in IT and 2 years of experience in software testing. His primary activities in software testing are performance testing and security testing.

Become a JMeter and Continuous Testing Pro

Start Learning
Slack

Test Your Website Performance NOW!

arrow Please enter a URL with http(s)
Nov 13 2017

OpenID Connect - How to Load Test with JMeter

In this article we will describe how to load test one of the relatively new technologies - OpenID Connect, with Apache JMeter™. OpenID Connect is an add-on for OAuth 2.0, and it defines how OAuth 2.0 should authenticate users. We can explain it with the following expression: Authentication(OpenID) + OAuth 2.0 = OpenID Connect.

 

With the help of OpenID, some services, for example Disqus, can understand that the user who visited, is a certain Ivan from Google. At the next authentication, Disqus will be able to recognize him again and understand that this is the same Ivan from last time. OAuth also allows you to grant rights to perform actions that Disqus can execute on Google on behalf of Ivan. In this case, after authorization, Ivan does not need to carry out any actions at all. For example, Disqus will be able to independently extract files from Ivan's Google Drive.

 

So, OpenID Connect is a collection of the best of OpenID and OAuth 2.0, allowing users to both identify themselves and provide services with personal information, as well as access server resources belonging to an authoritative source.

 

How OpenID Works

 

First we need to learn a few definitions:

  • OP - OpenID Provider, a server that is capable of authenticating the user and providing claims to a Relying Party (RP)
  • RP - Relying Party, a client application requiring user authentication and claims from an OpenID Provider.
  • Claims - part of the information about a user or organization
  • Endpoint - a protected resource that, when presented with an access token by the user, authorizes access
  • Token - a JSON “identity card” that contains claims

 

The OpenID Connect protocol, in general, follows the steps below.

  1. The RP (Client) sends a request to the OP (OpenID Provider).
  2. The OP authenticates the End-User and obtains authorization.
  3. The OP responds with an ID Token and usually an Access Token.
  4. The RP can send a request with the Access Token to the UserInfo Endpoint.
  5. The UserInfo Endpoint returns Claims about the End-User.

 

The actions during steps 1-3 may differ and depend on the authentication flow. There are 3 types of flows:

  • Authorization Code Flow
  • Implicit Flow
  • Hybrid Flow

 

The Authorization Code Flow is designed for clients who can hide the implementation of authorization from the user, for example, in the backend of the application. An Implicit Flow is designed for clients who cannot, for example, a single page application written in JavaScript. A Hybrid Flow is a combination of these two types. Below we will look at each of them in more detail, and for the first two we will develop a script that will be authenticated using OIDC.

 

For this blog post, we will use Okta as an OP. Okta provides services for secure identity management and single sign-on to any application. As an RP, we will use the application that Okta provides to familiarize users with the flows.

 

The application allows you to generate various flows by forming various authorization requests. It looks like this:

 

load testing openid connect

 

Implicit Flow Implementation

 

1. Let’s configure the application as follows:

 

jmeter, openid connect

 

  • The parameter that signals that this is an Implicit flow is the response type with the id_token and token values. The request for these parameters is typical for this particular flow. The first one is used for authentication, the second one is to get the access to EndPoints. It is not mandatory, but without it we will not be able to access protected resources.
  • The scope parameter specifies the claims that we want to receive after the authorization has been successfully completed.
  • The openid value is mandatory and it indicates the use of OIDC.
  • All the other values are optional and can be added/deleted by the OP. In this example, we request the user's email from the OP and the profile details.

 

Also, as you can see in the screenshot above, the request has a few more unknown parameters.

  • redirect_uri contains the address to which the OP should send its response about the result of the authorization
  • nonce - the value of this parameter must return to the ID Token and it is intended to prevent the client from being attacked
  • state - this parameter is also intended to prevent attacks, in this case, CSRF. It is returned with the token.

 

You can find a list of all the parameters used in Okta, right here. You can also see the list of parameters in the OIDC documentation.

 

The URL you see at the bottom of the page is the button that you often see - 'Sign in with', for example, Sign in with Google or Facebook. In our case, this is the 'Sign in with Okta' button, but without graphic design.

 

2. Follow this link, and an authorization window will open in a new tab in our OP.

 

performance testing openid connect

 

If we look at the processed requests in Chrome’s Developers Tools, we will see that after following the link, there was a redirect to the authorization page.

 

performance testing open id connect with jmeter

 

3. By putting in the username and password, we will get authorized as one of the users, who was created earlier on the OP website. After that, we return to the RP with the received data from the OP. The data is passed as parameters of the GET request. As you can see, we got the ID Token, Access Token, state, and scope.

 

how to load test open id connect



Both tokens are JWT. Therefore, the next stage of authorization is the validation of these tokens. In this application, the authorization is organized as a separate step, but it is usually invisible to the user.

 

4. Let’s validate both tokens.

 

open id connect load testing guide

 

As you can see, both tokens have been decoded correctly. You can also notice that the values of the state and nonce parameters remain unchanged, which indicates the validity of the received data.

 

Earlier in the scope we mentioned that we needed to return the information about the profile and email to the id token. And, as you could see in the screenshot above, it is there.

 

5. Since we requested an Access Token, we can now access resources from different Endpoints. In our example, the UserInfo Endpoint is defined on the server. We will make a request to this resource.

 

open id connect, jmeter, easy guide

 

If we look at the request sent, which is shown below, we will see that an Access Token is passed to the specified address as a parameter.

 

a guide to load testing openid connect

 

This is the response we got as a JSON file, with information about our user.

 

open id connect explanation

 

Now that we have covered all the OIDC steps when using Implicit flow, we will transfer all of these actions to the JMeter script.

 

Load Testing the Implicit Flow with JMeter

 

1. First, we will use the same data for requests as in the case study above. The authorization script will contain 7 HTTP Request samplers: going to the main page, clicking on the 'Login as' button, log in to the OP website, receiving tokens, token ID validation, Access token validation and access to the resource using the Access token.

 

The initial configuration of the script looks as follows:

 

explanation, jmeter, open id connection

 

2. Going to the login page is a regular GET request with the corresponding parameters. We will take the same parameters as in the demonstration above.

 

load testing user authentication

 

3. Add a Regex Extractor, because after going to the page, the URL will contain the key we will need to perform the request to receive both tokens.

 

user authnetication testing on jmeter

 

4. The request body for authorization on the OP is JSON, as you can see in the screenshot below.

 

jmeter authentication testing

 

Therefore, in order for the request to be processed successfully, it is necessary to add a Header Config to the request and specify the Content-Type: json/application.

 

open source authentication testing

 

As you can see below, in response to this request, we also get JSON. It contains the sessionToken, which we need in order to get the two tokens.

 

openidconnect, jmeter

 

5. Extract it by using the JSON Extractor.

 

jmeter, load testing, authentication testing

 

6. The request to receive tokens is a regular GET request with the appropriate parameters.

 

openid - Options for performing load testing with identity tokens

 

Tokens can be extracted from the URL of the sub-sample request to our resource. For example, in our case, it is the third sub-request.

 

How to Load Test OpenId connect Secured Websites

 

7. Extract tokens with the help of the Regex Extractor.

 

Invoking the Authorization Endpoint for OpenID Connect

 

8. Send your tokens for validation. The request body and response are JSON files, as you can see in the screenshots below. The validation will look like a POST-request to a certain address with the token in the body of the request. A decrypted token or an error message will come as a response.

 

Using OpenID Connect

 

9. Make a request to the UserInfo Endpoint. As a parameter, we will pass the access_token as a JSON.

 

jmeter open id connect load testing

 

10. In response, we will also get JSON with the user information. We already have information about the user from the UserInfo Endpoint, therefore the authorization can be considered successful. If you need to get this info you can use the Regex Extractor and if you need to check the availability of certain information in the response, use the Response Assertion.

 

Now let's move on to the next flow implementation.
 

Authorization Code Flow Implementation

 

In this flow, we will not request the id_token or token, but a one-time authorization code, which we will then exchange for these tokens.

 

1. Configure the request as follows:

 

open id connect load testing performance testing

 

We will set response type as the code, thus indicating that we need the authorization code. The rest of the request does not differ from the request in the Implicit flow.

 

2. Follow this link, and an authorization window will open in a new tab in our OP.  We authorize and we are thrown to the application window, where we see the Auth code and state.

 

How to Load Test OpenId connect Secured Websites

 

If we look at the requests being processed, we will see how the OP performs a redirect to the RP, passing the code and state in the parameters.

 

jmeter, openid connect

 

3. Send a request to receive an id token and access token. We will get the same picture as in the implicit flow.

 

performance testing user authentication

 

If you look at the requests, you can see we are sending 2 parameters by the POST request to /exchange_tokens, and receiving the tokens in the parameters of the get-request to our redirect_url.

 

jmeter, openid connect

 

You already know which actions will follow, so let’s proceed to modifying the script for this case.

 

Load Testing the Authorization Code Flow with JMeter

 

Since the build is similar to the previous flow, we will take the test we created and adjust it.

 

1. First of all, we will replace the value of the response type parameter with the code, in the sampler that is responsible for the transition to the OP page.

 

open source, open id connect

 

2. Where we used to get tokens, we will now get the code. Let’s change the name of the sampler and replace the regular expression to an expression that extracts the code from the page. In our case, it is “code=(.*)&state=(.*)”.

 

user authentication performance testing guides

 

3. Now, add the HTTP Request sampler that will be responsible for getting tokens by using the code.

 

jmeter authentication load testing

 

It is also necessary to replace the regular expression to extract the tokens, because the response structure has changed. For Okta, it looks like “state=(.*)&access_token=(.*)&token_type=(.*)&id_token=(.*)”.

 

jmeter load testing openid connect

 

4. Now you can run the script and look at the result of your work. As you can see in the screenshot below, we have successfully validated both tokens and got the information from the Endpoint.

 

jmeter load testing, open id connect

 

Conclusion

 

In this article, we have studied passing the authorization through OpenID Connect using the example of one of the OpenId providers. Do not forget that the URL and the parameters you send may be different from those we have studied, so use the Developer Console in the browser to specify this information.

 

Learn more advanced JMeter from our free JMeter Academy.

 

Click here to subscribe to our newsletter.

 

Run your JMeter tests in the cloud with BlazeMeter. Request a demo to learn how, or put your URL or JMX file in the box below and your test will start in minutes.

     
arrow Please enter a URL with http(s)

Interested in writing for our Blog?Send us a pitch!