Tech-invite3GPPspaceIETF RFCsSIP
Quick21222324252627282931323334353637384‑5x

Content for  TR 33.855  Word version:  16.1.0

Top   Top   Up   Prev   Next
1…   4…   6…

 

4  Key IssuesWord‑p. 13

4.1  General SBA Key IssuesWord‑p. 13

4.1.1  Key Issue #1: Confidentiality protection of signalling messagesWord‑p. 13

4.1.2  Key Issue #2: Integrity protection of signalling messages while allowing for modificationsWord‑p. 14

4.1.3  Key Issue #3: Replay protection of signalling messagesWord‑p. 14

4.1.4  Key Issue #4: NF-NF AuthenticationWord‑p. 15

4.1.5  Key Issue #5: NF-NF AuthorizationWord‑p. 15

4.1.6  Key Issue #6: NF-NRF AuthenticationWord‑p. 16

4.1.7  Key Issue #7: NF-NRF AuthorizationWord‑p. 16

4.1.8  Key Issue #8: NRF-NRF AuthenticationWord‑p. 17

4.1.9  Key Issue #9: NRF-NRF AuthorizationWord‑p. 17

4.1.10  Key Issue #20: Protection of SeCoP interfacesWord‑p. 17

4.1.11  Key Issue #21: Secure message transport via the SeCoPWord‑p. 19

4.1.12  Key Issue #22: Authorization of NF service access in Indirect CommunicationWord‑p. 19

4.1.13  Key Issue #23: NF to NF authentication and authorization in Indirect communicationWord‑p. 20

4.1.14  Key Issue #24: Service access authorization based on NF SetWord‑p. 20

4.1.15  Key Issue #25: Indirect communication in roaming scenariosWord‑p. 21

4.1.16  Key Issue #26: Protection of N9 interfaceWord‑p. 21

4.1.17  Key Issue #27: Support of a UP gateway function on the N9 interfaceWord‑p. 22

4.1.18  Key Issue #28: Service access authorization in the delegated "Subscribe-Notify" scenariosWord‑p. 23

4.1.19  Key Issue #29: Resource level authorization of NF consumersWord‑p. 23

4.1.20  Key Issue #30: Service access authorization for non-delegated subscribe-notifyWord‑p. 24

4.2  SEPP-/N32-specific Key IssuesWord‑p. 24

4.2.1  Key Issue #10: Termination points of N32 securityWord‑p. 24

4.2.2  Key Issue #11: Local provisioning of SEPP protection policiesWord‑p. 25

4.2.3  Key Issue #12: Provisioning of SEPP protection policies over N32Word‑p. 25

4.2.4  Key Issue #13: SEPP session setupWord‑p. 26

4.2.5  Key Issue #14: Application of ciphering and integrity protection to JSON object using JOSEWord‑p. 26

4.2.6  Key Issue #15: Malicious messages received on the N32 interfaceWord‑p. 27

4.2.7  Key Issue #16: N32 error signallingWord‑p. 29

4.2.8  Key Issue #17: Modifications by authorized intermediaries on N32Word‑p. 30

4.2.9  Key Issue #18: Inter-PLMN routing and TLSWord‑p. 30

4.2.10  Key Issue #19: Configurational error handling by the SEPPWord‑p. 31

5Void


Up   Top   ToC