diff --git a/src/main/java/org/olat/login/oauth/spi/OpenIdConnectApi.java b/src/main/java/org/olat/login/oauth/spi/OpenIdConnectApi.java
index bdb0bd5457e82d2d18c0493009ba761b71219601..77017acbaba527296e4bdbd9f0526268bfa67c8a 100644
--- a/src/main/java/org/olat/login/oauth/spi/OpenIdConnectApi.java
+++ b/src/main/java/org/olat/login/oauth/spi/OpenIdConnectApi.java
@@ -103,21 +103,21 @@ public class OpenIdConnectApi extends DefaultApi20 {
 				if(!oauthModule.getOpenIdConnectIFIssuer().equals(idJson.get("iss"))
 						|| !oauthModule.getOpenIdConnectIFIssuer().equals(accessJson.get("iss"))) {
 					allOk &= false;
-					log.error("iss don't match issuer");
+					log.info("iss don't match issuer");
 				}
 				
 				if(!getApiKey().equals(idJson.get("aud"))) {
 					allOk &= false;
-					log.error("aud don't match application key");
+					log.info("aud don't match application key");
 				}
 				if(!oVerifier.getState().equals(oVerifier.getSessionState())) {
 					allOk &= false;
-					log.error("state doesn't match session state");
+					log.info("state doesn't match session state");
 				}
 				
 				if(!oVerifier.getSessionNonce().equals(idJson.get("nonce"))) {
 					allOk &= false;
-					log.error("session nonce don't match verifier nonce");
+					log.info("session nonce don't match verifier nonce");
 				}
 				
 				return allOk ? new OAuth2AccessToken(idToken, oVerifier.getState()) : null;
diff --git a/src/main/java/org/olat/login/oauth/spi/OpenIdConnectFullConfigurableApi.java b/src/main/java/org/olat/login/oauth/spi/OpenIdConnectFullConfigurableApi.java
index c20e6cb592d1432b0c315d345c6d71e3b0e86e02..37bd356eeb49e84958d94506fd2d9f37c50bba94 100644
--- a/src/main/java/org/olat/login/oauth/spi/OpenIdConnectFullConfigurableApi.java
+++ b/src/main/java/org/olat/login/oauth/spi/OpenIdConnectFullConfigurableApi.java
@@ -100,22 +100,22 @@ public class OpenIdConnectFullConfigurableApi extends DefaultApi20 {
 				if(!provider.getIssuer().equals(idJson.get("iss"))
 						|| !provider.getIssuer().equals(accessJson.get("iss"))) {
 					allOk &= false;
-					log.error("iss don't match issuer");
+					log.info("iss don't match issuer");
 				}
 				
 				if(!provider.getAppKey().equals(idJson.get("aud"))) {
 					allOk &= false;
-					log.error("aud don't match application key");
+					log.info("aud don't match application key");
 				}
 
 				if(!oVerifier.getState().equals(oVerifier.getSessionState())) {
 					allOk &= false;
-					log.error("state doesn't match session state");
+					log.info("state doesn't match session state");
 				}
 				
 				if(!oVerifier.getSessionNonce().equals(idJson.get("nonce"))) {
 					allOk &= false;
-					log.error("session nonce don't match verifier nonce");
+					log.info("session nonce don't match verifier nonce");
 				}
 				return allOk ? new OAuth2AccessToken(idToken, oVerifier.getState()) : null;
 			} catch (JSONException e) {