You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Application endpoint registration allows application developers to register
10
-
one or more Application Endpoints, and retrieve, update,and delete those registrations.
11
-
This information can we used for various usecases like optimal end point discovery to help end users connect to the most most optimal instance of the application. Addtionally the information can be used to also monitor the different instance to take decisions from a lifecycle mangement perspective.
9
+
Application endpoint registration allows application developers to
10
+
register one or more Application Endpoints, and retrieve, update,and
11
+
delete those egistrations.
12
+
13
+
This information can we used for various usecases like optimal end
14
+
point discovery to help end users connect to the most most optimal
15
+
instance of the application. Addtionally the information can be used
16
+
to also monitor the different instance to take decisions from a lifecycle
17
+
mangement perspective.
12
18
13
19
### Authorization and authentication
14
20
15
-
The "Camara Security and Interoperability Profile" provides details on how a client requests an access token. Please refer to Identify and Consent Management (https://github.com/camaraproject/IdentityAndConsentManagement/) for the released version of the Profile.
21
+
The "Camara Security and Interoperability Profile" provides details on
22
+
how a client requests an access token. Please refer to Identify and
Which specific authorization flows are to be used will be determined during onboarding process, happening between the API Client and the Telco Operator exposing the API, taking into account the declared purpose for accessing the API, while also being subject to the prevailing legal framework dictated by local legislation.
27
+
Which specific authorization flows are to be used will be determined
28
+
during onboarding process, happening between the API Client and the
29
+
Telco Operator exposing the API, taking into account the declared
30
+
purpose for accessing the API, while also being subject to the prevailing
31
+
legal framework dictated by local legislation.
18
32
19
-
It is important to remark that in cases where personal user data is processed by the API, and users can exercise their rights through mechanisms such as opt-in and/or opt-out, the use of 3-legged access tokens becomes mandatory. This measure ensures that the API remains in strict compliance with user privacy preferences and regulatory obligations, upholding the principles of transparency and user-centric data control.
33
+
It is important to remark that in cases where personal user data
34
+
is processed by the API, and users can exercise their rights through
35
+
mechanisms such as opt-in and/or opt-out, the use of 3-legged access
36
+
tokens becomes mandatory. This measure ensures that the API remains in
37
+
strict compliance with user privacy preferences and regulatory obligations,
38
+
upholding the principles of transparency and user-centric data control.
20
39
21
40
x-camara-commonalities: 0.4.0
22
41
@@ -141,9 +160,9 @@ paths:
141
160
components:
142
161
securitySchemes:
143
162
openId:
144
-
description: OpenID Provider Configuration Information
0 commit comments