Tech-
invite
3GPP
space
IETF
RFCs
SIP
Quick
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 33.203
Word version: 17.0.0
1…
4
5…
6…
7…
8…
G…
M…
N…
O…
P…
T…
X…
P
Co-existence of authentication schemes IMS AKA, GPRS-IMS-Bundled Authentication, NASS-IMS-bundled authentication, SIP Digest and Trusted Node Authentication
P.1
Scope of this Annex
P.2
Requirements on co-existence of authentication schemes
P.3
P CSCF procedure selection
P.4
Determination of requested authentication scheme in S CSCF
P.5
Co-existence of PANI-aware and other P CSCFs
P.6
Considerations on the Cx interface
Q
Usage of the authentication mechanisms for non-registration messages in Annexes N and O
Q.1
General
Q.2
Assertion of identities by the P-CSCF
Q.3
Strengths and boundary conditions for the use of authentication mechanisms for non-registration messages
R
NASS-IMS-bundled authentication
R.1
Overview
R.2
Use Cases and Limitations
R.3
Detailed description
S
Application to 3GPP2 Access
S.1
Introduction
S.2
Application of clause 4
S.3
Application of clauses 5 through 9
S.4
3GPP2 AKA Credentials
S.5
Network Domain Security for IMS
...
P
(Normative) Co-existence of authentication schemes IMS AKA, GPRS-IMS-Bundled Authentication, NASS-IMS-bundled authentication, SIP Digest and Trusted Node Authentication
|R8|
Word‑p. 83
P.1
Scope of this Annex
Word‑p. 83
P.2
Requirements on co-existence of authentication schemes
Word‑p. 83
P.3
P CSCF procedure selection
Word‑p. 83
P.4
Determination of requested authentication scheme in S CSCF
Word‑p. 85
P.4.1
Stepwise approach
Word‑p. 85
P.4.2
Mechanisms for performing steps 1 to 3 in P.4.1
Word‑p. 85
P.5
Co-existence of PANI-aware and other P CSCFs
Word‑p. 87
P.6
Considerations on the Cx interface
Word‑p. 87
Q
Usage of the authentication mechanisms for non-registration messages in Annexes N and O
|R8|
Word‑p. 88
Q.1
General
Word‑p. 88
Q.2
Assertion of identities by the P-CSCF
Word‑p. 88
Q.3
Strengths and boundary conditions for the use of authentication mechanisms for non-registration messages
Word‑p. 89
R
(Normative) NASS-IMS-bundled authentication
|R8|
Word‑p. 91
R.1
Overview
Word‑p. 91
R.2
Use Cases and Limitations
Word‑p. 91
R.3
Detailed description
Word‑p. 91
S
(Normative) Application to 3GPP2 Access
|R8|
Word‑p. 94
S.1
Introduction
Word‑p. 94
S.2
Application of clause 4
Word‑p. 94
S.3
Application of clauses 5 through 9
Word‑p. 95
S.4
3GPP2 AKA Credentials
Word‑p. 96
S.4.1
Realisations of 3GPP2 AKA Credentials
Word‑p. 96
S.5
Network Domain Security for IMS
Word‑p. 96
S.5.1
General
Word‑p. 96
S.5.2
Inter-domain Domain Security
Word‑p. 96
S.5.3
Intra-domain Domain Security
Word‑p. 97
S.5.4
Profiles of Network Domain Security Methods
Word‑p. 97
S.5.4.1
General
Word‑p. 97
S.5.4.2
Support of IPsec ESP
Word‑p. 97
S.5.4.2.1
General
Word‑p. 97
S.5.4.2.2
Support of ESP authentication and encryption
Word‑p. 97
S.5.4.3
Support of TLS
Word‑p. 98