diff --git a/src/main/java/org/olat/login/oauth/spi/OpenIdConnectApi.java b/src/main/java/org/olat/login/oauth/spi/OpenIdConnectApi.java index bdb0bd5457e82d2d18c0493009ba761b71219601..77017acbaba527296e4bdbd9f0526268bfa67c8a 100644 --- a/src/main/java/org/olat/login/oauth/spi/OpenIdConnectApi.java +++ b/src/main/java/org/olat/login/oauth/spi/OpenIdConnectApi.java @@ -103,21 +103,21 @@ public class OpenIdConnectApi extends DefaultApi20 { if(!oauthModule.getOpenIdConnectIFIssuer().equals(idJson.get("iss")) || !oauthModule.getOpenIdConnectIFIssuer().equals(accessJson.get("iss"))) { allOk &= false; - log.error("iss don't match issuer"); + log.info("iss don't match issuer"); } if(!getApiKey().equals(idJson.get("aud"))) { allOk &= false; - log.error("aud don't match application key"); + log.info("aud don't match application key"); } if(!oVerifier.getState().equals(oVerifier.getSessionState())) { allOk &= false; - log.error("state doesn't match session state"); + log.info("state doesn't match session state"); } if(!oVerifier.getSessionNonce().equals(idJson.get("nonce"))) { allOk &= false; - log.error("session nonce don't match verifier nonce"); + log.info("session nonce don't match verifier nonce"); } return allOk ? new OAuth2AccessToken(idToken, oVerifier.getState()) : null; diff --git a/src/main/java/org/olat/login/oauth/spi/OpenIdConnectFullConfigurableApi.java b/src/main/java/org/olat/login/oauth/spi/OpenIdConnectFullConfigurableApi.java index c20e6cb592d1432b0c315d345c6d71e3b0e86e02..37bd356eeb49e84958d94506fd2d9f37c50bba94 100644 --- a/src/main/java/org/olat/login/oauth/spi/OpenIdConnectFullConfigurableApi.java +++ b/src/main/java/org/olat/login/oauth/spi/OpenIdConnectFullConfigurableApi.java @@ -100,22 +100,22 @@ public class OpenIdConnectFullConfigurableApi extends DefaultApi20 { if(!provider.getIssuer().equals(idJson.get("iss")) || !provider.getIssuer().equals(accessJson.get("iss"))) { allOk &= false; - log.error("iss don't match issuer"); + log.info("iss don't match issuer"); } if(!provider.getAppKey().equals(idJson.get("aud"))) { allOk &= false; - log.error("aud don't match application key"); + log.info("aud don't match application key"); } if(!oVerifier.getState().equals(oVerifier.getSessionState())) { allOk &= false; - log.error("state doesn't match session state"); + log.info("state doesn't match session state"); } if(!oVerifier.getSessionNonce().equals(idJson.get("nonce"))) { allOk &= false; - log.error("session nonce don't match verifier nonce"); + log.info("session nonce don't match verifier nonce"); } return allOk ? new OAuth2AccessToken(idToken, oVerifier.getState()) : null; } catch (JSONException e) {