Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 33.839  Word version:  17.1.0

Top   Top   Up   Prev   None
1…   4…   6…

 

6  Proposed solutionsp. 20

6.0  Mapping of Solutions to Key Issuesp. 20

6.1  Solution #1: DNS request protectionp. 21

6.2  Solution #2: Authentication between EEC and ECS based on primary authenticationp. 22

6.3  Solution #3: Authentication/Authorization framework for Edge Enabler Client and Serversp. 24

6.4  Solution #4: Authentication/Authorization framework for Edge Enabler Client and Serversp. 26

6.5  Solution #5: Authentication and Authorization between the Edge Enabler Client and the Edge Enabler Serverp. 29

6.6  Solution #6: Authentication and Authorization between the Edge Enabler Client and the Edge Enabler Serverp. 30

6.7  Solution #7: Authentication and Authorization with the Edge Data Networkp. 32

6.8  Solution #8: Authentication between EEC and EESp. 36

6.9  Solution #9: Authentication and authorization between EEC and ECS based on AKMAp. 37

6.10  Solution #10: Authentication and Authorization between the Edge Enabler Client and the Edge Configuration Serverp. 39

6.11  Solution #11: Authentication between EEC and ECSp. 40

6.12  Solution #12: Onboarding and authentication/authorization framework for Edge Enabler Server and Edge Configuration Serverp. 42

6.13  Solution #13: Transport security for EDGE-1-9 interfacesp. 44

6.14  Solution #14: Protection of Network Information Provisioning to Local AF directlyp. 45

6.15  Solution #15: Network capability re-exposure via Edge Enabler Serverp. 47

6.16  Solution #16: EEC authentication and authorization framework with ECS and EESp. 48

6.17  Solution #17: EEC/EES/ECS authentication and transport protection with TLSp. 50

6.18  Solution #18: Authentication and Authorization Framework for EDGE-4 interfaces using Primary authentication and proxy interfacep. 53

6.19  Solution #19: Authentication/authorization between UE and Edge Data Network based on the secondary authenticationp. 55

6.20  Solution #20: Authentication and authorization in EES capability exposure based on CAPIFp. 56

6.21  Solution #21: security for the interface between the SMF and LDNSRp. 57

6.22  Solution #22: Authorization during Edge Data Network changep. 58

6.23  Solution #23: Authentication and Authorization between EEC and ECS/EESp. 60

6.24  Solution #24: Using TLS with AKMA to protect edge interfacesp. 61

6.25  Solution #25: Practical authorization during Edge Data Network changep. 62

6.26  Solution #26: GBA-based solution for EEC authentication and authorization framework with ECS and EESp. 64

6.27  Solution #27: Using TLS with Edge Security Service to protect edge interfacesp. 67

6.28  Solution #28: Authentication between EEC and ECS based on AKMAp. 70

6.29  Solution #29: Using TLS with GBA to protect edge interfacesp. 72

6.30  Solution #30: An AKMA-based solution for authentication and interface protection between EEC and EES/ECSp. 73

6.31  Solution #31: Enhancing TLS with GBA for usage with Edgep. 75

7  Conclusionsp. 75

$  Change historyp. 78


Up   Top