Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TS 33.535
Authentication and Key Management for Applications (AKMA)
based on 3GPP credentials in the 5G System (5GS)

V19.0.0 (PDF)  2025/09  42 p.
V18.8.0  2025/06  41 p.
V17.12.0  2025/06  28 p.
V16.2.0  2020/12  22 p.
Rapporteur:
Miss Huang, Xiaoting
China Mobile Com. Corporation

essential Table of Contents for  TS 33.535  Word version:  19.0.0

each title links to the equivalent title in the CONTENT
Here   Top

Up   Top

List of Figures and Tables

Figure 4.1-1Fundamental Network Model for AKMA
Figure 4.1-2AKMA Architecture in reference point representation for (a) internal AFs of HPLMN and (b) external AFs
Figure 4.7.1-1Environment and reference points of AP when AP is internal
Figure 4.7.1-2Environment and reference points of AP when AP is external
Figure 4.7.3-1Environment and reference points of AP for TLS tunnels when AP is internal
Figure 4.7.3-2Environment and reference points of AP for TLS tunnels when AP is external
Figure 5.1-1AKMA Key Hierarchy
Figure 6.1-1Deriving KAKMA after primary authentication
Figure 6.2-1KAF generation from KAKMA
Figure 6.3-1AKMA Application Key request via NEF
Figure 6.5-1Initiation of AKMA
Figure 6.6.1-1AAnF AKMA context removal procedure
Figure 6.8.1-1AAnF notification to internal AF about AKMA service disable
Figure 6.8.2-1AAnF notification to external AF about AKMA service disable via NEF
Table 7.1.1-1List of AAnF Services
Table 7.3.1-1List of NEF Services
Figure D.3.4-1OSCORE key refresh

Top