BSS/OSS Academy
8.215 min read

TM Forum ODA Architecture

TM Forum Open Digital Architecture (ODA)

The Open Digital Architecture (ODA) is TM Forum's blueprint for how modern telcos should structure their IT systems. It is not a product or a platform — it is a reference architecture that defines what components a telco needs, what APIs they expose, and how they interact. ODA exists because the industry recognised that without a shared architectural language, every telco transformation was reinventing the wheel.

ODA matters because it provides the only industry-wide, vendor-neutral standard for decomposing BSS/OSS into interoperable components. Whether you are selecting vendors, defining integration contracts, or planning a transformation roadmap, ODA is the shared vocabulary that makes collaboration possible.

ODA Canvas — Lifecycle Mgmt · API Gateway · Identity · Event Bus · ObservabilityEngagementDigital ChannelWeb · MobileRetail ChannelPOS · StoreContact CentreAgent DesktopPartner APIMVNO · WholesaleMarketingCampaignsCore Commerce (BSS)Product CatalogTMFC001 · TMF620Product OrderingTMFC002 · TMF622Product InventoryTMFC005 · TMF637Customer MgmtTMFC020 · TMF629Sales / CPQTMFC025 · TMF648Billing & RevenueTMFC010 · TMF678TMF622Commercial LifecycleProduction (OSS)Service CatalogTMFC030 · TMF633SOMTMFC031 · TMF641Service InventoryTMFC033 · TMF638ROMTMFC041 · TMF652Resource InventoryTMFC043 · TMF639PartyParty MgmtTMF632Party RoleTMF669AgreementTMF651BFF / Experience APITMF622 → TMF641TMF632TMF Open APIsTMF620 · TMF622 · TMF629 · TMF632 · TMF633 · TMF637 · TMF638 · TMF639 · TMF641 · TMF652 · TMF678Network & Infrastructure Layer — Physical/Logical Resources · SDN/NFV · Cloud

TM Forum ODA Component Architecture — Functional domains with key components and API integration

Figure 8.2 — TM Forum ODA Component Architecture with functional domains

What ODA Defines

ODA is a multi-layered framework that defines three interconnected concerns: what components a telco needs, how they communicate, and how they are managed. These three concerns map to the three pillars of ODA.

The Three Pillars of ODA
1. ODA Components — standardised, reusable functional blocks that implement specific business capabilities (e.g., Product Catalog Management, Service Order Management). 2. ODA Canvas — the runtime environment that hosts, manages, and connects ODA Components. Think of it as the "operating system" for telco IT. 3. ODA APIs — the TMF Open APIs that define how components communicate. Each component exposes and consumes specific APIs.

ODA vs Traditional BSS/OSS Architecture

ODA vs Traditional Architecture

AspectTraditional BSS/OSSODA-Based Architecture
Component boundariesVendor-defined, varies by productStandardised by TM Forum, vendor-neutral
IntegrationCustom point-to-point, proprietary APIsTMF Open APIs, standardised event notifications
Vendor portabilityExtremely difficult — deep couplingPossible — components are replaceable if they conform to ODA specs
Architecture documentationVendor-specific, often incompleteStandardised component specifications with clear responsibilities
Deployment modelOn-premise, vendor-specific infrastructureCloud-native, container-based, Kubernetes-aligned
Lifecycle managementManual upgrades, vendor-driven timelinesCanvas manages component lifecycle, continuous deployment

ODA Functional Domains

ODA organises BSS/OSS capabilities into functional domains — logical groupings of related components. Each domain owns specific business capabilities and data entities. Understanding these domains is essential for mapping vendor products to ODA architecture.

Core Commerce Management

Core Commerce Management Domain
The Core Commerce domain covers the commercial lifecycle: product catalog management, customer management, order capture, quoting, billing, and revenue management. This is the BSS heartland. Key components include Product Catalog Management, Customer Management, Product Ordering, and Revenue Management.

Core Commerce Components

ComponentODA IDKey APIs ExposedResponsibility
Product Catalog ManagementTMFC001TMF620 (Product Catalog)Defines what can be sold: offerings, specifications, pricing, rules, lifecycle
Customer ManagementTMFC020TMF629 (Customer Mgmt), TMF632 (Party)Manages customer lifecycle: creation, updates, identity, accounts
Product OrderingTMFC002TMF622 (Product Ordering)Captures, validates, and orchestrates commercial orders
Product InventoryTMFC005TMF637 (Product Inventory)Tracks what each customer currently has: active subscriptions and services
Billing & Revenue MgmtTMFC010TMF678 (Customer Bill)Calculates charges, produces invoices, manages payments and collections
Sales ManagementTMFC025TMF648 (Quote Mgmt)Manages sales pipeline, quoting, contract management

Production Management

Production Management Domain
The Production domain covers the technical lifecycle: service design, fulfilment orchestration, service and resource inventory, activation, and assurance. This is the OSS heartland. Key components include Service Catalog, Service Order Management (SOM), Resource Order Management (ROM), and Inventory systems.

Production Components

ComponentODA IDKey APIs ExposedResponsibility
Service Catalog ManagementTMFC030TMF633 (Service Catalog)Defines service specifications: CFS and RFS, decomposition rules, service templates
Service Order ManagementTMFC031TMF641 (Service Ordering)Orchestrates service-level fulfilment: CFS instantiation, RFS coordination
Service InventoryTMFC033TMF638 (Service Inventory)Tracks active service instances: state, configuration, relationships
Resource Catalog ManagementTMFC040TMF634 (Resource Catalog)Defines resource specifications: device types, logical resource templates
Resource Order ManagementTMFC041TMF652 (Resource Ordering)Orchestrates resource provisioning: allocation, configuration, activation
Resource InventoryTMFC043TMF639 (Resource Inventory)Tracks physical and logical resources: state, capacity, topology

Party Management

Party Management Domain
The Party domain manages all party-related data: individuals, organisations, roles, and relationships. It provides the identity foundation for the entire architecture. Customers, partners, employees, and suppliers are all "parties" in the TM Forum SID model.
  • Party Management (TMFC020) — individual and organisation lifecycle, identity, contact details
  • Party Role Management — customer, partner, supplier, employee roles assigned to parties
  • Agreement Management — contracts, SLAs, partnership agreements linked to parties
  • Party Privacy Management — GDPR and privacy compliance for party data

Engagement Management

Engagement Management Domain
The Engagement domain handles all channel interactions: digital self-service, retail, contact centre, chatbot, partner portals, and API-based partner engagement. This domain owns the "experience layer" — how external users interact with the telco's systems. It is where BFF (Backend for Frontend) patterns live.
  • Digital Channel Management — self-service web and mobile applications
  • Contact Centre Management — agent desktop, knowledge base, interaction history
  • Partner Channel Management — wholesale and partner API gateways, partner portals
  • Marketing Management — campaign management, next-best-offer, promotions

The ODA Canvas

The ODA Canvas is the runtime environment that hosts and manages ODA Components. Think of it as the "platform" that provides cross-cutting services — things that every component needs but should not build individually.

If ODA Components are apps, the ODA Canvas is the smartphone operating system. The Canvas provides the runtime, the app store (component deployment), security (authentication), and communication (inter-component messaging). Components focus on their business logic; the Canvas handles everything else.

The Canvas provides these cross-cutting capabilities to all hosted components:

  • Component Lifecycle Management — deploy, upgrade, rollback, scale, and retire components
  • API Gateway & Routing — route API calls to the correct component instance, handle versioning
  • Identity & Access Management — authenticate users, enforce role-based access, manage OAuth tokens
  • Event Management — publish/subscribe event bus for inter-component communication (TMF688)
  • Observability — distributed tracing, logging, metrics, health checks for all components
  • Secret & Configuration Management — securely store and inject configuration and credentials

In practice, the ODA Canvas maps to a Kubernetes-based platform with additional telco-specific operators. TM Forum has released a reference implementation of the Canvas based on Kubernetes, Istio (service mesh), and custom Kubernetes operators that understand ODA Component specifications. The Canvas operators watch for ODA Component Custom Resources (CRDs), provision the necessary infrastructure (database, message queues, API routes), and manage the component lifecycle declaratively.

Key Canvas Kubernetes operators include: (1) Component Operator — reconciles ODA Component CRDs, manages deployments. (2) API Operator — exposes component APIs through the gateway, handles versioning. (3) Security Operator — integrates with identity providers, enforces mTLS. (4) Event Operator — connects components to the event backbone (Kafka, NATS).

ODA Component Specifications

Each ODA Component is formally specified in a Component Specification document maintained by TM Forum. These specifications define exactly what a component must do, what APIs it exposes, what APIs it consumes, and what events it publishes and subscribes to.

Anatomy of a Component Specification

ODA Component Specification Elements

ElementPurposeExample (Product Catalog Mgmt)
Component Name & IDUnique identifier for the componentTMFC001 — Product Catalog Management
Functional BlockWhich ODA domain this component belongs toCore Commerce Management
Core FunctionPrimary business capabilityManage product offerings, specifications, and pricing rules
Exposed APIsTMF APIs the component must expose to other componentsTMF620 (Product Catalog), TMF637 (Product Inventory)
Consumed APIsTMF APIs the component calls from other componentsTMF633 (Service Catalog), TMF632 (Party Management)
Published EventsEvents the component emits when state changesProductOfferingCreateEvent, ProductOfferingStateChangeEvent
Subscribed EventsEvents the component listens to from other componentsServiceCatalogChangeEvent (to validate product-service links)
Management APIsAPIs for component lifecycle (health, metrics)Health check, readiness probe, metrics endpoint
Example: Product Ordering Component (TMFC002)
The Product Ordering component (TMFC002) exposes TMF622 (Product Ordering API) and consumes TMF620 (Product Catalog) to validate orders against available offerings. It publishes ProductOrderCreateEvent and ProductOrderStateChangeEvent. It subscribes to ProductOfferingStateChangeEvent to handle catalog changes affecting pending orders. It consumes TMF632 (Party Management) to resolve customer references. This specification defines the complete integration contract.

Mapping ODA to BSS/OSS Systems

ODA defines abstract components, but real deployments use vendor products. The mapping between ODA components and vendor products is many-to-many: one vendor product may implement multiple ODA components, and one ODA component may be split across multiple vendor products.

A single vendor product often implements multiple ODA components. This is normal and expected — vendors bundle related functionality.

Vendor ProductODA Components Covered
Cerillion Enterprise BSSTMFC001 (Catalog), TMFC002 (Ordering), TMFC005 (Product Inventory), TMFC010 (Billing), TMFC020 (Customer)
Comarch BSS SuiteTMFC001 (Catalog), TMFC002 (Ordering), TMFC005 (Product Inventory), TMFC010 (Billing), TMFC020 (Customer)
Ericsson Catalog ManagerTMFC001 (Product Catalog), TMFC030 (Service Catalog), TMFC040 (Resource Catalog)

ODA Compliance & Certification

TM Forum runs a formal ODA compliance and certification programme. Vendors submit their products for assessment against ODA Component specifications. This certification provides operators with confidence that vendor products will interoperate at the API level.

Levels of ODA Compliance

ODA Certification Levels

LevelRequirementWhat It Means
Level 1 — Self-AssessmentVendor self-declares TMF API conformanceLowest bar — vendor claims compliance, no independent verification
Level 2 — API ConformanceAPIs pass TM Forum CTK (Conformance Test Kit) automated testingAPIs conform to TMF spec. Does not validate behaviour or component scope.
Level 3 — Component ConformanceFull component assessment against ODA Component specificationHighest bar — component covers specified functionality, APIs, events, and behaviour
ODA Certification Is Not a Silver Bullet
ODA certification tests API conformance and component scope — it does not test performance, scalability, operational maturity, or real-world interoperability with other certified components. Two ODA-certified products from different vendors may both pass certification individually but still require significant integration effort to work together. Treat certification as a starting point, not a guarantee.

ODA-Certified Vendors (Selected)

Several vendors have achieved ODA certification for specific components. The TM Forum maintains a public directory of certified components. Notable examples include:

  • Ericsson — multiple components certified, strong alignment with ODA Canvas reference implementation
  • Tecnotree — early adopter of ODA certification, several commerce components certified
  • Amdocs — selected components certified, ongoing certification programme
  • Netcracker — SOM and inventory components undergoing certification
  • Comarch — catalog and ordering components in certification pipeline

ODA in Practice: Realistic Expectations

ODA is a powerful architectural framework, but it is important to set realistic expectations about where the industry stands today. Full ODA adoption is still aspirational for most operators.

Even without full ODA adoption, the framework provides immediate value: (1) a shared vocabulary for discussing BSS/OSS architecture with vendors, (2) a component map for understanding what functional blocks you need, and (3) standardised APIs (TMF Open APIs) that reduce custom integration effort.

  • ODA Canvas — reference implementation exists but production-grade Canvas deployments are rare. Most operators use Kubernetes + custom integration.
  • Event standardisation — TMF688 defines event management, but standardised event schemas across all components are still evolving.
  • Cross-vendor interoperability — API conformance is tested per-component, not across multi-vendor deployments. Real interop still requires integration effort.
  • Non-functional requirements — ODA specs focus on functional scope. Performance, security, and operational concerns are left to implementation.

A pragmatic ODA adoption strategy for a Tier-1 operator: (1) Use ODA Component specs as the reference model for architecture decomposition — even if you do not use the Canvas. (2) Require vendors to expose TMF Open APIs as a contractual obligation, even for monolithic products. (3) Adopt the ODA Canvas incrementally — start with API gateway and event bus capabilities, then add lifecycle management. (4) Use ODA certification as a vendor evaluation criterion, not a pass/fail gate. (5) Invest in an integration team that understands ODA APIs and can mediate between vendors.

ODA Component Source-of-Record Map

Source-of-Record by ODA Component

EntitySystem of RecordSystem of EngagementSystem of ReferenceNotes
Product OfferingTMFC001 — Product Catalog MgmtCPQ, Sales PortalCOM, Billing, Digital ChannelsAll offering definitions originate here; consumers cache read-only copies
Customer / PartyTMFC020 — Customer MgmtCRM UI, Self-ServiceOrdering, Billing, Service MgmtGolden record for customer identity; MDM integration common
Commercial OrderTMFC002 — Product OrderingDigital Channels, Retail POSBilling, CRM, AnalyticsOwns order lifecycle from capture through completion
Product SubscriptionTMFC005 — Product InventorySelf-Service, CRMBilling, AnalyticsWhat the customer currently has; updated by order completion
Service Specification (CFS/RFS)TMFC030 — Service Catalog MgmtService Design UISOM, Product CatalogDefines how services decompose; referenced during fulfillment
Service InstanceTMFC033 — Service InventoryService Management UIProduct Inventory, Billing, AssuranceActive CFS/RFS instances; created by SOM, managed over lifecycle
Resource InstanceTMFC043 — Resource InventoryNOC Tools, NMSService Inventory, Capacity PlanningPhysical and logical resources; updated by ROM and network discovery

ODA and eTOM Alignment

ODA components map to eTOM process areas. Each component implements specific eTOM L2/L3 processes. This mapping ensures that ODA is not just a technology architecture — it is anchored in business process reality.

ODA Component to eTOM Process Mapping

ODA ComponenteTOM L1 Process AreaeTOM L2 Processes
TMFC001 — Product CatalogStrategy & Commit (Product)Product Lifecycle Management, Product Offering Management
TMFC002 — Product OrderingFulfilmentOrder Handling, Order Validation, Order Tracking
TMFC010 — BillingBilling & Revenue MgmtBill Calculation, Bill Production, Collections
TMFC020 — Customer MgmtCustomer Relationship MgmtCustomer Data Management, Customer Interaction
TMFC031 — SOMFulfilmentService Configuration & Activation, Service Provisioning
TMFC041 — ROMFulfilmentResource Provisioning, Resource Configuration

Section 8.2 Key Takeaways

  • ODA is TM Forum's reference architecture for decomposing BSS/OSS into standardised, interoperable components
  • The three ODA pillars are: Components (what), Canvas (runtime), and APIs (how they communicate)
  • ODA defines four main functional domains: Core Commerce, Production, Party, and Engagement
  • Each ODA Component has a formal specification defining exposed APIs, consumed APIs, published events, and subscribed events
  • The ODA Canvas is the runtime platform — think "Kubernetes for telco IT" with component lifecycle management
  • ODA certification has three levels; certification tests conformance, not real-world interoperability
  • Most real deployments are hybrid: one BSS vendor for commerce, one OSS vendor for production, specialist vendors for gaps
  • Pragmatic ODA adoption starts with using the component model as a reference and requiring TMF APIs from vendors