Tech-
invite
3GPP
space
IETF
RFCs
SIP
Quick
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 33.203
Word version: 17.0.0
1…
4
5…
6…
7…
8…
G…
M…
N…
O…
P…
T…
X…
X
Security for WebRTC IMS Client access to IMS
X.1
Introduction
X.2
Authentication of WebRTC IMS Client with IMS subscription re-using existing IMS authentication mechanisms
X.3
Authentication of WebRTC IMS Client with IMS subscription using web credentials
X.4
Assignment of IMS identities to WebRTC IMS Client from pool of IMS subscriptions held by WWSF
X.5
TURN credential provisioning and authentication (informative)
$
Change history
X
(Normative) Security for WebRTC IMS Client access to IMS
|R12|
Word‑p. 121
X.1
Introduction
Word‑p. 121
X.2
Authentication of WebRTC IMS Client with IMS subscription re-using existing IMS authentication mechanisms
Word‑p. 121
X.2.0
General
Word‑p. 121
X.2.1
General requirements
Word‑p. 121
X.2.2
Solution 1.1: Use of SIP Digest credentials
Word‑p. 121
X.2.2.1
General
Word‑p. 121
X.2.2.2
Requirements
Word‑p. 122
X.2.2.3
Procedures
Word‑p. 122
X.2.3
Solution 1.2: Use of IMS AKA
Word‑p. 123
X.2.3.1
General
Word‑p. 123
X.2.3.2
Requirements
Word‑p. 124
X.2.3.3
Procedures
Word‑p. 124
X.3
Authentication of WebRTC IMS Client with IMS subscription using web credentials
Word‑p. 125
X.3.0
General
Word‑p. 125
X.3.1
General requirements
Word‑p. 126
X.3.2
Solution 2.1
Word‑p. 126
X.3.2.1
General
Word‑p. 126
X.3.2.2
Requirements
Word‑p. 126
X.3.2.3
Procedures
Word‑p. 126
X.4
Assignment of IMS identities to WebRTC IMS Client from pool of IMS subscriptions held by WWSF
Word‑p. 131
X.4.0
General
Word‑p. 131
X.4.1
General requirements
Word‑p. 131
X.4.2
Solution 3.1
Word‑p. 132
X.4.2.1
General
Word‑p. 132
X.4.2.2
Requirements
Word‑p. 132
X.4.2.3
Procedures
Word‑p. 132
X.5
TURN credential provisioning and authentication (informative)
|R13|
Word‑p. 136
X.5.1
Introduction
Word‑p. 136
X.5.2
Solution 1: TURN credential provisioning and authentication using eP-CSCF
Word‑p. 137
X.5.2.1
Overview
Word‑p. 137
X.5.2.2
Procedures
Word‑p. 137
X.5.3
Solution 2: TURN credential provisioning and authentication using OAuth Access token
Word‑p. 138
X.5.3.1
Overview
Word‑p. 138
X.5.3.2
Procedures
Word‑p. 139
$
Change history
Word‑p. 142