Reply LS on external data channel content access
Source: SA6
Meeting:
TSGS4_135_India
Agenda Item:
5.2
| Agenda item description | Other 3GPP groups |
|---|---|
| Doc type | LS in |
| For action | Information |
| Original LS | S6-255643 |
| download_url | Download Original |
| Cc | SA1, SA2, SA3, SA4, CT |
| To | SA |
| For | Information |
| Type | LS in |
| Contact | Andrijana Brekalo |
| Uploaded | 2026-01-21T15:21:08.113000 |
| Contact ID | 91743 |
| TDoc Status | noted |
| Reservation date | 21/01/2026 15:01:44 |
| Agenda item sort order | 7 |
Review Comments
1) Technical Accuracy
1.1 Mischaracterization / ambiguity of CAPIF scope vs. IMS use case
1.2 “Third-party API providers in non-3GPP systems” phrasing is questionable
1.3 Security claim lacks specificity
2) Completeness
2.1 The reply does not actually answer the “plan to define procedures and architecture” question
2.2 Missing references to IMS-specific enablers and relevant specs
2.3 Missing analysis of what “interworking” means in this context
The reply does not clarify whether “interworking” refers to:
- Network-side retrieval of external content and injection into an IMS session (e.g., via an application server), or
- UE-side retrieval (UE calls public API directly) with IMS only carrying the resulting content, or
- Hybrid (network provides authorization/attestation; UE fetches content).
These are materially different architectures with different standardization needs.
2.4 Missing discussion of trust domain and “public API” realities
3) Impact Assessment
3.1 Minimal immediate spec impact (as written)
3.2 Risk of misdirection / scope creep
3.3 Potential implementation impact if CAPIF is later mandated
4) Feasibility
4.1 Feasibility depends on architecture choice (not provided)
4.2 Practical coupling to IMS session is non-trivial
5) Weaknesses
5.1 Non-committal and lacks actionable guidance
5.2 No gap analysis
5.3 Conflation risk: “external content access” vs “API exposure”
6) Suggestions (Constructive)
6.1 Provide a clearer, direct answer on “plans”
6.2 Add a short gap analysis and scope statement
Include 3–5 bullets clarifying:
- What “interworking” is assumed to mean (network-side vs UE-side vs hybrid).
- What aspects are potentially standardizable (security, authorization, discovery, session binding).
- What is likely out of scope (e.g., standardizing arbitrary public API schemas/content).
6.3 Clarify CAPIF applicability and limitations
If CAPIF is mentioned, add precise positioning:
- CAPIF can be a reference for secure API onboarding/discovery/authorization.
- CAPIF does not define IMS SIP/media procedures; additional work would be required for session coupling.
- Identify what additional specs/functions would be needed (e.g., an IMS AS acting as API invoker; mapping of IMS identity to API authorization context).
6.4 Add concrete references and alignment points
6.5 Propose next steps for SA coordination
Bottom line
The reply is technically not wrong in pointing to CAPIF as a potentially relevant security/API framework, but it is too vague, does not answer the “plan” question, and lacks the necessary scope clarification and gap analysis to be useful. Adding explicit boundaries, references, and a concrete next-step proposal would significantly improve the contribution’s value and reduce the risk of misinterpretation.