| Figure 4.1-1 | Fundamental Network Model for AKMA |
| Figure 4.1-2 | AKMA Architecture in reference point representation for (a) internal AFs of HPLMN and (b) external AFs |
| Figure 4.7.1-1 | Environment and reference points of AP when AP is internal |
| Figure 4.7.1-2 | Environment and reference points of AP when AP is external |
| Figure 4.7.3-1 | Environment and reference points of AP for TLS tunnels when AP is internal |
| Figure 4.7.3-2 | Environment and reference points of AP for TLS tunnels when AP is external |
| Figure 5.1-1 | AKMA Key Hierarchy |
| Figure 6.1-1 | Deriving KAKMA after primary authentication |
| Figure 6.2-1 | KAF generation from KAKMA |
| Figure 6.3-1 | AKMA Application Key request via NEF |
| Figure 6.5-1 | Initiation of AKMA |
| Figure 6.6.1-1 | AAnF AKMA context removal procedure |
| Figure 6.8.1-1 | AAnF notification to internal AF about AKMA service disable |
| Figure 6.8.2-1 | AAnF notification to external AF about AKMA service disable via NEF |
| Table 7.1.1-1 | List of AAnF Services |
| Table 7.3.1-1 | List of NEF Services |
| Figure D.3.4-1 | OSCORE key refresh |