Figure 1 | NDS architecture for IP-based protocols |
Figure 2 | Trust validation path in the context of NDS/IP |
Figure 2a | Trust validation path in the context of TLS |
Figure 3 | Certificate Hierarchy |
Table 6.1.3c.3-1 | NF TLS Client and Server Certificate Profile |
Table 6.1.3c.3-2 | NF OAuth 2.0 Access Token and CCA Token Certificate Profile |
Figure 4 | Repositories for NDS/IP to support Za interface |
Figure 5 | Repositories for TLS case |
Figure 6 | Repositories for NDS/IP to support Zb interface |
Figure 7 | Overview of the security architecture |
Figure 10.2.2-1 | Initial trust general schema |
Figure 10.2.3-1 | Procedure for set up of initial trust |
Table D.1 | |
Figure 8 | Example message flow for initial base station enrolment |