| Figure 5.1-1 | CAPIF functional security model |
| Figure 5.2-1 | CAPIF supporting RNAA functional security model |
| Figure 6.1-1 | Security procedure for API invoker onboarding |
| Figure 6.3.1-1 | Selection of security method to be used in CAPIF-2/2e reference point |
| Figure 6.5.2.1-1 | CAPIF-2e interface authentication and protection using TLS-PSK |
| Figure 6.5.2.2-1 | CAPIF-2e interface authentication and protection using certificate based mutual authentication |
| Figure 6.5.2.3-1 | CAPIF-2e interface authentication and protection using Access Tokens |
| Figure 6.5.3.4-1 | Procedure for revoking resource owner authorization |
| Figure 6.8-1 | Security procedure for API invoker offboarding |
| Figure 6.14-1 | Authorization for nested API invocation |
| Figure B.1-1 | Onboarding security flow |
| Figure B.2-1 | CAPIF-1e authentication |
| Figure B.2-2 | CAPIF-2e authentication and authorization |
| Table C.2.2-1 | Access token standard claims |
| Table C.2.2-2 | Access token customized claims |
| Figure C.3.1-1 | Requesting an access token |
| Table C.3.2-1 | Access token request message parameters |
| Table C.3.3-1 | Access token response message parameters |