Tech-invite3GPPspaceIETF RFCsSIP
Quick21222324252627282931323334353637384‑5x

Content for  TS 33.203  Word version:  17.0.0

Top   Top   Up   Prev   None
1…   4   5…   6…   7…   8…   G…   M…   N…   O…   P…   T…   X…

 

X (Normative)  Security for WebRTC IMS Client access to IMS |R12|Word‑p. 121

X.1  IntroductionWord‑p. 121

X.2  Authentication of WebRTC IMS Client with IMS subscription re-using existing IMS authentication mechanismsWord‑p. 121

X.2.0  GeneralWord‑p. 121

X.2.1  General requirementsWord‑p. 121

X.2.2  Solution 1.1: Use of SIP Digest credentialsWord‑p. 121

X.2.2.1  GeneralWord‑p. 121

X.2.2.2  RequirementsWord‑p. 122

X.2.2.3  ProceduresWord‑p. 122

X.2.3  Solution 1.2: Use of IMS AKAWord‑p. 123

X.2.3.1  GeneralWord‑p. 123

X.2.3.2  RequirementsWord‑p. 124

X.2.3.3  ProceduresWord‑p. 124

X.3  Authentication of WebRTC IMS Client with IMS subscription using web credentialsWord‑p. 125

X.3.0  GeneralWord‑p. 125

X.3.1  General requirementsWord‑p. 126

X.3.2  Solution 2.1Word‑p. 126

X.3.2.1  GeneralWord‑p. 126

X.3.2.2  RequirementsWord‑p. 126

X.3.2.3  ProceduresWord‑p. 126

X.4  Assignment of IMS identities to WebRTC IMS Client from pool of IMS subscriptions held by WWSFWord‑p. 131

X.4.0  GeneralWord‑p. 131

X.4.1  General requirementsWord‑p. 131

X.4.2  Solution 3.1Word‑p. 132

X.4.2.1  GeneralWord‑p. 132

X.4.2.2  RequirementsWord‑p. 132

X.4.2.3  ProceduresWord‑p. 132

X.5  TURN credential provisioning and authentication (informative) |R13|Word‑p. 136

$  Change historyWord‑p. 142


Up   Top