Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 29.857
Word version: 19.0.0
1…
5…
5
General Requirements
6
Key Issues
7
Solutions
8
Evaluations
9
Conclusions
$
Change history
5
General Requirements
p. 8
6
Key Issues
p. 8
6.1
Key Issue #1: Excessive Data Exposure over SBI
p. 8
6.1.1
Description of Use-case
p. 8
6.1.2
Key Issue Definition
p. 9
6.2
Key Issue #2: Access to dis-allowed Data
p. 9
6.2.1
Description of Use-case
p. 9
6.2.2
Key Issue Definition
p. 11
6.3
Key Issue #3: Access to dis-allowed Resource Segments
p. 11
6.3.0
General
p. 11
6.3.1
Description of Use-case
p. 11
6.3.2
Key Issue Definition
p. 11
7
Solutions
p. 11
7.1
Solution#1: Access-Token to include authorization to Monitored URIs
p. 11
7.1.1
Description
p. 11
7.1.2
Example Flows
p. 12
7.1.3
Impacts on services, entities and interfaces
p. 15
7.1.4
Pros
p. 16
7.1.5
Cons
p. 16
7.2
Solution#2: Restricted Service or Service Instances
p. 16
7.2.1
Description
p. 16
7.2.2
Example Flows
p. 16
7.2.3
Impacts on services, entities and interfaces
p. 18
7.2.4
Pros
p. 18
7.2.5
Cons
p. 18
7.3
Solution #3: Access-Token to include authorization to Monitored URIs
p. 18
7.3.1
Description
p. 18
7.3.2
Impacts on services, entities and interfaces
p. 19
7.3.3
Pros
p. 20
7.3.4
Cons
p. 20
7.4
Solution #4: Including Requester Information in Request
p. 20
7.4.1
Description
p. 20
7.4.2
Impacts on services, entities and interfaces
p. 21
7.4.3
Pros
p. 21
7.4.4
Cons
p. 21
7.5
Solution #5: Using JSON Batch Requests
p. 21
7.5.1
Description
p. 21
7.5.2
Impacts on services, entities and interfaces
p. 23
7.5.3
Pros
p. 23
7.5.4
Cons
p. 23
7.6
Solution#6: Configurable Resource Content Filters in Producers
p. 23
7.6.1
Description
p. 23
7.6.2
Examples
p. 25
7.6.3
Impacts on services, entities and interfaces
p. 27
7.6.4
Pros
p. 28
7.6.5
Cons
p. 28
7.7
Solution#7: Subset of data requested by the consumer
p. 28
7.7.1
Description
p. 28
7.7.2
Examples
p. 29
7.7.3
Impacts on services, entities and interfaces
p. 29
7.7.4
Pros
p. 29
7.7.5
Cons
p. 29
7.8
Solution#8: Service scenario indication based NF discovery
p. 29
7.8.1
Description
p. 29
7.8.2
Example solution for BSF discovery
p. 30
7.8.3
Example Flows for BSF discovery
p. 30
7.8.4
Impacts on services, entities and interfaces
p. 31
7.8.5
Pros
p. 32
7.8.6
Cons
p. 32
8
Evaluations
p. 32
8.1
Evaluation of Solutions for Key Issue#1
p. 32
8.2
Evaluation of Solutions for Key Issue#2
p. 33
8.3
Evaluation of Solutions for Key Issue#3
p. 33
9
Conclusions
p. 33
9.1
Conclusion of Solutions for Key Issue#1
p. 33
9.2
Conclusion of Solutions for Key Issue#2
p. 33
9.3
Conclusion of Solutions for Key Issue#3
p. 33
$
Change history
p. 34