Figure 5.1-1 | CAPIF functional security model |
Figure 5.2-1 | CAPIF supporting RNAA functional security model |
Figure 6.1-1 | Security procedure for API invoker onboarding |
Figure 6.3.1-1 | Selection of security method to be used in CAPIF-2/2e reference point |
Figure 6.5.2.1-1 | CAPIF-2e interface authentication and protection using TLS-PSK |
Figure 6.5.2.2-1 | CAPIF-2e interface authentication and protection using certificate based mutual authentication |
Figure 6.5.2.3-1 | CAPIF-2e interface authentication and protection using Access Tokens |
Figure 6.8-1 | Security procedure for API invoker offboarding |
Figure B.1-1 | Onboarding security flow |
Figure B.2-1 | CAPIF-1e authentication |
Figure B.2-2 | CAPIF-2e authentication and authorization |
Table C.2.2-1 | Access token standard claims |
Table C.2.2-2 | Access token customized claims |
Figure C.3.1-1 | Requesting an access token |
Table C.3.2-1 | Access token request message parameters |
Table C.3.3-1 | Access token response message parameters |