N21 authentication requirements n211 authentication

Info icon This preview shows pages 5–7. Sign up to view the full content.

View Full Document Right Arrow Icon
N.2.1 Authentication Requirements ............................................................................................................................ N.2.1.1 Authentication Requirements for Registrations ........................................................................................... N.2.1.2 Authentication Requirements for Non-registration Messages ..................................................................... N.2.2 Authentication failures ....................................................................................................................................... N.2.2.1 User Authentication failure .......................................................................................................................... N.2.2.2 Network authentication failure ..................................................................................................................... N.2.2.3 Incomplete Authentication ........................................................................................................................... N.2.3 SIP Digest synchronization failure .................................................................................................................... N.2.4 Network Initiated authentications ...................................................................................................................... N.2.5 Support for dynamic password change .............................................................................................................. Annex O (normative): Enhancements to the access security to enable TLS .................................. O.1 TLS ....................................................................................................................................................... O.1.1 TLS Access Security .......................................................................................................................................... O.1.2 Confidentiality protection .................................................................................................................................. O.1.3 Integrity protection ............................................................................................................................................ O.1.4 TLS integrity protection indicator ..................................................................................................................... O.2 TLS Session set-up procedure .............................................................................................................. O.2.1 TLS Profile for TLS based access security ........................................................................................................ O.2.2 TLS session set-up during registration .............................................................................................................. O.2.3 TLS session set-up prior to Initial registration .................................................................................................. O.3 Error cases in the set-up of TLS sessions .............................................................................................. O.3.1 Error cases related to TLS ................................................................................................................................. O.3.1.0 General ......................................................................................................................................................... O.3.1.1 User authentication failure ........................................................................................................................... O.3.1.2 Network authentication failure ..................................................................................................................... O.3.1.3 Synchronisation failure ................................................................................................................................ O.3.1.4 Incomplete authentication ............................................................................................................................ O.3.2 Error cases related to the Security-Set-Up ......................................................................................................... O.4 Management of TLS sessions ............................................................................................................... O.4.1 Management of TLS sessions at the UE ............................................................................................................ O.4.2 Management of TLS sessions at the P-CSCF .................................................................................................... O.4.3 Authenticated re-registration ............................................................................................................................. O.5 TLS Certificate Profile and Validation .................................................................................................. O.5.1 TLS Certificate .................................................................................................................................................. O.5.2 Certificate validation ......................................................................................................................................... O.5.3 Certificate Revocation ....................................................................................................................................... 3GPP 3GPP TS 33.203 V12.67.0 (2014-0609) 5 Release 12
Image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Annex P (normative): Co-existence of authentication schemes IMS AKA, GPRS-IMS- Bundled Authentication, NASS-IMS-bundled authentication, SIP Digest and Trusted Node Authentication .................................................... P.1 Scope of this Annex .............................................................................................................................. P.2 Requirements on co-existence of authentication schemes .................................................................... P.3 P - CSCF procedure selection ................................................................................................................. P.4 Determination of requested authentication scheme in S - CSCF ............................................................ P.4.1 Stepwise approach ............................................................................................................................................. P.4.2 Mechanisms for performing steps 1 to 3 in P.4.1 .............................................................................................. P.5 Co-existence of PANI-aware and other P - CSCFs ................................................................................. P.6 Considerations on the Cx interface ....................................................................................................... Annex Q (informative): Usage of the authentication mechanisms for non-registration messages in Annexes N and O ...................................................................... Q.1 General ................................................................................................................................................. Q.2 Assertion of identities by the P-CSCF .................................................................................................. Q.3 Strengths and boundary conditions for the use of authentication mechanisms for non-registration messages ............................................................................................................................................... Annex R (normative): NASS-IMS-bundled authentication ............................................................. R.1 Overview .............................................................................................................................................. R.2 Use Cases and Limitations .................................................................................................................... R.3 Detailed description .............................................................................................................................. Annex S (Normative): Application to 3GPP2 Access ....................................................................... S.1 Introduction .......................................................................................................................................... S.2 Application of clause 4 ......................................................................................................................... S.3 Application of clauses 5 through 9 ....................................................................................................... S.4 3GPP2 AKA Credentials ....................................................................................................................... S.4.1 Realisations of 3GPP2 AKA Credentials ........................................................................................................... S.5 Network Domain Security for IMS ....................................................................................................... S.5.1 General ............................................................................................................................................................... S.5.2 Inter-domain Domain Security .......................................................................................................................... S.5.3 Intra-domain Domain Security .......................................................................................................................... S.5.4 Profiles of Network Domain Security Methods ................................................................................................ S.5.4.1 General ......................................................................................................................................................... S.5.4.2 Support of IPsec ESP ................................................................................................................................... S.5.4.2.1 General ................................................................................................................................................... S.5.4.2.2 Support of ESP authentication and encryption .......................................................................................
Image of page 6
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern