Tech-invite   3GPPspecs   RFCs   Search in Tech-invite

Gen21222324252627282931323334353637384‑5x
FsNEsRPsSBIsIDs Ti+
Top   in Index   Prev   Next

TS 33.222 (SA3)
Generic Authentication Architecture (GAA) –
Access to Network Application Functions using HTTPS

use "3GPP‑Page" to get the Word version
use "ETSI‑search" to get the PDF version
for a better overview, the Table of Contents (ToC) is reproduced
V15.0.0 (PDF)  2018/06  35 p.
V14.0.0  2017/03  37 p.
V13.0.0  2016/01  37 p.
V12.3.0  2013/12  38 p.
V11.3.0  2013/12  25 p.
V10.0.1  2011/12  24 p.
V9.1.0  2010/06  24 p.
V8.0.0  2008/06  24 p.
V7.3.0  2007/12  24 p.
V6.6.0  2006/03  22 p.

Rapporteur:  Mr. Lehtovirta, Vesa

A number of services might be accessed over HTTP. For the Presence Service, it shall be possible to manage the data on the Presence Server over the Ut reference point, which is based on HTTP. Other services like conferencing, messaging, push, etc. might be accessed using HTTP.
Access to services over HTTP can be done in a secure manner. ThiS TS describes how the access over HTTP can be secured using TLS in the Generic Authentication Architecture.
This TS specifies secure access methods to Network Application Functions (NAF) using HTTP over TLS in the Generic Authentication Architecture (GAA), and provides Stage 2 security requirements, principles and procedures for the access. ThiS TS describes both direct access to an Application Server (AS) and access to an Application Server through an Authentication Proxy (AP).

full Table of Contents for  TS 33.222  Word version:   15.0.0

 

Here   Top

 

1  ScopeWord-p. 6
2  References
3  Definitions, symbols and abbreviationsWord-p. 7
4  Overview of the Security Architecture
5  Authentication schemesWord-p. 9
6  Use of Authentication ProxyWord-p. 16
A  Technical Solutions for Access to Application Servers via Authentication Proxy and HTTPSWord-p. 21
B  Guidance on Certificate-based mutual authentication between UE and application serverWord-p. 22
C  Considerations for GBA security using a web browser and Javascript [R12]Word-p. 23
D (Normative)  Security measures for usage of GBA with a web browser [R12]Word-p. 27
E  Change historyWord-p. 34

Up   Top