Tech-invite3GPPspaceIETF RFCsSIP
Quick21222324252627282931323334353637384‑5x

Content for  TS 29.228  Word version:  16.1.0

Top   Top   Up   Prev   Next
1…   5…   A…

 

5  General Architecture

6  Procedure Descriptions

6.1  Location management proceduresWord‑p. 13

6.2  User data handling proceduresWord‑p. 30

6.3  Authentication proceduresWord‑p. 33

6.3.1  Detailed behaviourWord‑p. 36

6.4  User identity to HSS resolutionWord‑p. 37

6.5  Implicit registrationWord‑p. 38

6.6  Download of the Relevant User Profile and Charging Information and Allowed WAF and/or WWSF Identities

6.7  S-CSCF Assignment

7  Information element contentsWord‑p. 43

7.1  Visited Network Identifier

7.2  Public User Identity

7.2a  Public Service Identity |R6|

7.2b  Wildcarded Public Identity |R7|

7.2cVoid

7.3  Private User Identity

7.3a  Private Service Identity |R6|

7.4  S-CSCF Name

7.4a  AS Name |R6|

7.5  S-CSCF CapabilitiesWord‑p. 44

7.6  Result

7.7  User Profile

7.8  Server Assignment Type

7.9  Authentication Data

7.10  Number Authentication Items

7.11  Reason for de-registration

7.12  Charging information

7.13  Routing information

7.14  Type of authorization

7.15Void

7.16  User Data Already AvailableWord‑p. 47

7.17  Associated Private Identities |R6|

7.18  Originating-Request |R7|

7.19  User Authorization Request Flags |R7|

7.20  Loose-Route Indication |R7|

7.21  S-CSCF Restoration Information |R8|

7.22  Associated Registered Private Identities |R8|

7.23  Multiple Registration Indication |R8|

7.24  Session-Priority |R8|

7.25  Identities with Emergency Registration |R8|

7.26  Priviledged-Sender Indication |R10|Word‑p. 48

7.27  LIA Flags |R11|

7.28  Server Assignment Request Flags |R12|

7.29  Allowed WAF and/or WWSF Identities |R12|

7.30  RTR Flags |R15|

8  Error handling procedures

9  Protocol version identification

10  Operational Aspects


Up   Top   ToC