| 6.0 | Mapping of solutions to key issues p. 19
|
| 6.1 | Solution #1: Security protection mechanism for CAPIF-8 reference point p. 20
|
| 6.2 | Solution #2: CAPIF-8 reference point security p. 20
| 6.2.1 | Introduction p. 20
|
| 6.2.2 | Solution details p. 21
| 6.2.2.1 | Mutual authentication p. 21
|
| 6.2.2.2 | Protection of messages between ROF -AZF/CCF p. 21
|
|
| 6.2.3 | Evaluation p. 21
|
|
| 6.3 | Solution #3: Security procedures for CAPIF-8 reference points p. 21
|
| 6.4 | Solution #4: resource owner authorized revocation p. 22
|
| 6.5 | Solution #5: Security of resource owner authorization management and CAPIF-8 p. 23
|
| 6.6 | Solution #6: Security procedures for resource owner authorization management p. 25
| 6.6.1 | Introduction p. 25
|
| 6.6.2 | Solution details p. 25
| 6.6.2.1 | Security procedure for obtaining resource owner authorization p. 25
|
| 6.6.2.2 | Security procedure for authorizing the API invoker in RNAA p. 26
|
| 6.6.2.3 | Security procedure for revoking resource owner authorization p. 27
|
|
| 6.6.3 | Evaluation p. 27
|
|
| 6.7 | Solution #7: RO permission/ management p. 27
| 6.7.1 | Introduction p. 27
|
| 6.7.2 | Solution details p. 28
| 6.7.2.0 | General p. 28
|
| 6.7.2.1 | Notifications for permissions / wakeup p. 28
|
|
| 6.7.3 | Evaluation p. 30
|
|
| 6.8 | Solution #8: Resource owner triggered revocation procedure p. 30
|
| 6.9 | Solution #9: Resource owner authentication and authorization mechanism p. 32
|
| 6.10 | Solution #10: resource-level and/or API-level authorization and revocation p. 33
| 6.10.1 | Introduction p. 33
|
| 6.10.2 | Solution details p. 33
| 6.10.2.1 | Service operation/resource level authorization p. 33
|
| 6.10.2.2 | Service operation/resource level revocation p. 34
|
|
| 6.10.3 | Evaluation p. 34
|
|
| 6.11 | Solution #11: Client initiated backchannel authorization (CIBA) p. 34
|
| 6.12 | Solution #12: Security method retrieval in CAPIF interconnect p. 35
|
| 6.13 | Solution #13: Requesting security information from another CCF in order to authenticate using TLS-PSK in CAPIF interconnect p. 37
|
| 6.14 | Solution #14: Authentication aspect in CAPIF interconnect when API invoker has not included CCF information p. 39
|
| 6.15 | Solution #15: Authorization token request handling in CAPIF interconnect p. 41
|
| 6.16 | Solution #16: Mapping an API invoker authorization request to the correct CCF in CAPIF interconnect p. 44
|
| 6.17 | Solution #17: Security procedures for CAPIF interconnection p. 46
| 6.17.1 | Introduction p. 46
|
| 6.17.2 | Solution details p. 46
| 6.17.2.1 | Security procedure for API invoker authentication and authorization using Method 3 in CAPIF interconnection p. 46
|
| 6.17.2.2 | Security procedure for API invoker offboarding in CAPIF interconnection p. 48
|
|
| 6.17.3 | Evaluation p. 48
|
|
| 6.18 | Solution #18: API invoker authentication mechanism in CAPIF interconnection scenarios p. 49
| 6.18.1 | Introduction p. 49
|
| 6.18.2 | Solution details p. 49
| 6.18.2.1 | TLS-PSK based authentication mechanism for CCF interconnection scenarios p. 49
|
| 6.18.2.2 | TLS-PKI based authentication mechanism for CCF interconnection scenarios p. 50
|
|
| 6.18.3 | Evaluation p. 50
|
|
| 6.19 | Solution #19: API invoker authorization mechanism in CAPIF interconnection scenarios p. 51
|
| 6.20 | Solution #20: Security method negotiation mechanism in CAPIF interconnection scenarios p. 53
|
| 6.21 | Solution #21: Solution for CAPIF interconnection security p. 55
|
| 6.22 | Solution #22: CAPIF interconnection p. 60
|
| 6.23 | Solution #23: Security protection mechanism for CAPIF-6 and CAPIF-6e reference points p. 62
|
| 6.24 | Solution #24: Security procedure for CAPIF interconnection p. 62
| 6.24.1 | Introduction p. 62
|
| 6.24.2 | Solution details p. 63
| 6.24.2.1 | Security method negotiation in CAPIF interconnection p. 63
|
| 6.24.2.2 | Authentication and authorization p. 64
| 6.24.2.2.1 | Authentication and authorization with security method TLS-PSK or PKI p. 64
|
| 6.24.2.2.2 | Authentication and authorization with security method TLS with OAuth token p. 65
|
|
|
| 6.24.3 | Evaluation p. 67
|
|
| 6.25 | Solution #25: Backend based solution for UE-deployed API invoker accessing resources not owned by that UE p. 67
|
| 6.26 | Solution #26: Nested API invocation p. 69
|
| 6.27 | Solution #27: Authorization for nested API invocation p. 71
|
| 6.28 | Solution #28: Authenticating multiple API invokers of the same RO p. 73
|
| 6.29 | Solution #29: Enhancing authorization through finer level access token granularity. p. 75
|
| 6.30 | Solution #30: Authentication of the origin API invoker in nested API invocation p. 77
|
| 6.31 | Solution#31: Authorization mechanism for nested API invocation p. 79
|
| 6.32 | Solution #32: Validation of correct GPSI in API invoker information p. 81
|
| 6.33 | Solution #33: Onboarding of API Invoker residing in UE p. 81
|
| 6.34 | Solution #34: UE-deployed API invoker accessing resources not owned by that UE p. 83
| 6.34.1 | Introduction p. 83
|
| 6.34.2 | Solution details p. 83
| 6.34.2.1 | Obtaining resource owner authorization and authorization revocation information p. 83
|
| 6.34.2.2 | UE-deployed API invoker accessing resources not owned by that UE p. 84
|
|
| 6.34.3 | Solution evaluation p. 85
|
|
| 6.35 | Solution #35: Onboarding of UE-hosted API invoker p. 86
|
| 6.36 | Solution #36: Reusing existing mechanism to enable cross-UE authorization p. 87
|
| 6.37 | Solution #37: Enabling mTLS between ROF and CCF using AKMA p. 88
|
| 6.38 | Solution #38: Renewal of onboarding p. 90
|
| 6.39 | Solution #39: ROF certificate generation p. 93
|