Investigates security & privacy impacts of CAPIF procedures: resource owner auth, interconnection security, nested API invocation, multi-invoker auth.
View the full specification with interactive table of contents, version history, and AI analysis.
Read Full Specification →