Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 33.855  Word version:  16.1.0

Top   Top   Up   Prev   None
1…   4…   6…

 

6  Solutionsp. 32

6.1  Solution #1: Authorization of NF service accessp. 32

6.2  Solution #2: Application layer protection based on JSON Object Signing and Encryption (JOSE)p. 34

6.3  Solution #3: NF service registration processp. 40

6.4  Solution #4: Authorization of NF service accessp. 40

6.5  Solution #5: Using mediation services with end-to-end encryptionp. 44

6.6  Solution #6: Policies for protection on the N32 interfacep. 48

6.7  Solution #7: Signaling based provisioning of message protection policy in partner SEPPsp. 49

6.8  Solution #8: Inter PLMN routing and TLS: Solution Optionsp. 50

6.9  Solution #9: N32 message anti-spoofing within the SEPPp. 52

6.10  Solution #10: Mitigation against fraudulent registration attack between SEPPsp. 52

6.11  Solution #11: Security policy provisioning for SEPPp. 53

6.12  Solution #12: End-to-end data protection in hop-by-hop network communication linksp. 53

6.13  Solution #13: Content and structure of protection policiesp. 55

6.14  Solution #14: Provisioning and negotiation of protection policiesp. 57

6.15  Solution #15: Service access authorization in the delegated "Subscribe-Notify" interaction scenariosp. 58

6.16  Solution #16: OAuth 2.0 based authorization for Indirect communication without Delegated Discovery (Model C)p. 61

6.17  Solution #17: Protection of SeCoP interfacesp. 61

6.18  Solution #18: Support NDS/IP on the inter-PLMN N9 interfacep. 62

6.19  Solution #19: Service access authorization based on NF Set in non-roaming scenariop. 63

6.20  Solution #20: UP Gateway function on the inter-PLMN N9 interfacep. 66

6.21  Solution #21: OAuth 2.0 based authorization for Indirect communication with Delegated Discovery (Model D)p. 68

6.22  Solution #22: Authentication and authorization between Network Functions for Indirect Communication modelsp. 71

6.23  Solution #23: Token-based authorization for Scenario D using stateless SeCoPp. 71

6.24  Solution #24: Token-based authorization for Scenario C using stateless SeCoPp. 73

6.25  Solution #25: NF service consumer verification during service access authorization in the direct communication scenariop. 75

6.26  Solution #26: OAuth 2.0 based resource level authorization of NF service consumersp. 79

6.27  Solution #27: Policy based authorization for Indirect communication between Network functionsp. 80

6.28  Solution #28: Authorization between Network Functions in Scenario Dp. 82

6.29  Solution #29: Telescopic FQDN for the SeCoPp. 82

6.30  Solution #30: Token-based authorization for NF Sets / NF Service Sets by existing methodsp. 83

6.31  Solution #31: Service access authorization based on of a NF Set in roaming scenariop. 83

6.32  Solution #32: OAuth 2.0 based resource level authorization of NF service consumersp. 85

6.33  Solution #33: NF service consumer verification during service access authorization in indirect communication scenariop. 89

6.34  Solution #34: Security of indirect communication in roaming scenariosp. 94

6.35  Solution #35: Service access authorization in the non-delegated "Subscribe-Notify" interaction scenariosp. 95

7  Conclusionsp. 97

AVoid

B  Options for integrity protection on the N32 interfacep. 100

C  Deployment options for the UP gatewayp. 101

$  Change historyp. 103


Up   Top