Example of oauth 20 identical to 61 62 case of waf

Info icon This preview shows pages 143–146. Sign up to view the full content.

View Full Document Right Arrow Icon
Example of OAuth 2.0 : Identical to 6.1. 6.2 Case of WAF located in third party domain : In this case, in addition to step 6.1, the HSS further includes a list, if available, of identities of the authorization entity allowed for this IMS subscription. If the S-CSCF received an identity of the authorization entity from the eP- CSCF, the S-CSCF checks whether it is contained in this list. The S-CSCF further checks whether the identity of the authorization entity received from the eP-CSCF, if any, is not barred. If the performed checks are positive, or no checks need to be performed, the S-CSCF proceeds with the next step; otherwise, it rejects the registration. NOTE 10: The S-CSCF can obtain information about barred authorization entities from the HSS or via OAM. Barring may be useful in isolating the effects of security breaches in third party domains. 7. 200 (OK) response (S-CSCF to eP-CSCF) 7.1 General : The S-CSCF sends a 200 (OK) response to the eP-CSCF (via I-CSCF) indicating that registration was successful. When TLS is used between WIC and eP-CSCF, then, similar to the registration procedure for SIP Digest with TLS, the eP-CSCF associates the IMPI and all successfully registered IMPUs with the TLS Session ID when the 200 (OK) is received. Example of OAuth 2.0 : Identical to 7.1. 8. 200 (OK) response (eP-CSCF to WebRTC IMS Client) 8.1 General : An example realisation of this step is as follows: The eP-CSCF forwards the 200 (OK) response to the WebRTC IMS Client indicating that Registration was successful. Example of OAuth 2.0 : Identical to 8.1. 3GPP 3GPP TS 33.203 V12.67.0 (2014-0609) 143 Release 12
Image of page 143

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Annex Y (informative): Change history 3GPP 3GPP TS 33.203 V12.67.0 (2014-0609) 144 Release 12
Image of page 144
Change history Date TSG # TSG Doc. CR R ev C at Subject/Comment Old New WI 2002-03 SP-15 SP-020116 - Approved at TSG SA #15 and placed under change control 2.0.0 5.0.0 2002-03 SP-15 SP-020174 001 F Correction of references to obsolete SIP RFC 2543bis IETF internet draft 5.0.0 5.1.0 2002-03 SP-15 SP-020175 002 F Removal of reference to non Operator IMS provision 5.0.0 5.1.0 2002-06 SP-16 SP-020346 003 F ISIM related parameters 5.1.0 5.2.0 2002-06 SP-16 SP-020347 004 F Reference of HTTP Digest AKA in TS 33.203 5.1.0 5.2.0 2002-06 SP-16 SP-020348 005 D Clean-up of section 6.1.1 5.1.0 5.2.0 2002-06 SP-16 SP-020349 006 F Integrity protection indicator 5.1.0 5.2.0 2002-06 SP-16 SP-020350 007 F UE and P-CSCF Behaviour on an Incomplete Authentication 5.1.0 5.2.0 2002-06 SP-16 SP-020351 008 C Requested Changes for SIP integrity 5.1.0 5.2.0 2002-06 SP-16 SP-020352 009 F Clean-up of 7.3 5.1.0 5.2.0 2002-06 SP-16 SP-020386 010 1 C Security association handling in IMS when the UE changes IP address 5.1.0 5.2.0 2002-06 SP-16 SP-020354 011 D Remove Annexes that describes Extended HTTP Digest solution 5.1.0 5.2.0 2002-09 SP-17 SP-020583 012 F SA handling when the UE changes IP address 5.2.0 5.3.0 2002-09 SP-17 SP-020583 013 F Removal of some editor notes in TS 33.203 5.2.0 5.3.0 2002-09 SP-17 SP-020583 014 F Correction to S-CSCF behaviour on Network Authentication Failure 5.2.0 5.3.0 2002-09 SP-17 SP-020583 015 F Correcting the network behaviour in response to an incorrect AUT-S 5.2.0 5.3.0 2002-09 SP-17 SP-020583 016 F Mitigating reflection attacks in IMS 5.2.0 5.3.0 2002-09 SP-17 SP-020583 017 F Protect port number to be assigned by UE in re- registration 5.2.0 5.3.0 2002-09 SP-17 SP-020583 018 F One SA for both TCP and UDP sockets 5.2.0 5.3.0 2002-09 SP-17 SP-020583 019 F Correction of authentication vector distribution
Image of page 145

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 146
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern