Tech-invite3GPPspecsGlossariesIETFRFCsGroupsSIPABNFsWorld Map


 
 
Here   Top   Up   Prev   Next
5GS – General Registration – 10 of 25
Signalling flow for TS 23.502 General Register - Authentication/Security


Step 9a, verbatim
Upon request from the AMF, the AUSF shall execute authentication of the UE. The authentication is performed as described in TS 33.501 [15]. The AUSF selects a UDM as described in TS 23.501 [2], clause 6.3.8 and gets the authentication data from UDM.
Once the UE has been authenticated the AUSF provides relevant security related information to the AMF. In case the AMF provided a SUCI to AUSF, the AUSF shall return the SUPI to AMF only after the authentication is successful.
After successful authentication in new AMF, which is triggered by the integrity check failure in old AMF at step 5, the new AMF invokes step 4 above again and indicates that the UE is validated (i.e. through the reason parameter as specified in clause 5.2.2.2.2).
The AMF decides if the Registration Request needs to be rerouted as described in clause 4.2.2.2.3, where the initial AMF refers to the AMF.
Step 9b, verbatim
The NAS security initiation is performed as described in TS 33.501 [15].
Step 9c, verbatim
Upon completion of NAS security function setup, the AMF initiates NGAP procedure to provide the 5G-AN with security context as specified in TS 38.413 [10] if the 5G-AN had requested for UE Context or if there is a need for AMF to provide this.
Step 9d, verbatim
The 5G-AN stores the security context and acknowledges to the AMF. The 5G-AN uses the security context to protect the messages exchanged with the UE as described in TS 33.501 [15].