Tech-
invite
3GPP
specs
Glossaries
IETF
RFCs
Groups
SIP
ABNFs
full Table of Contents for
TS 33.179
PDF version: 13.5.0
1…
8…
B…
B
[N] OpenID connect profile for MCPTT
B.0
General
B.1
MCPTT tokens
B.2
MCPTT client registration
B.3
Obtaining tokens
B.4
Refreshing an access token
B.5
Using the token to access MCPTT resource servers
B.6
Token validation
C
OpenID connect detailed flow
C.1
Detailed flow for MCPTT user authentication and registration using OpenID Connect
D
[N] KMS provisioning messages to support MCPTT
D.1
General aspects
D.2
KMS requests
D.3
KMS responses
E
[N] MIKEY message formats for media security
E.1
General aspects
E.2
MIKEY message structure for GMK distribution
E.3
MIKEY message structure for PCK distribution
E.4
MIKEY message structure for CSK distribution
E.5
MIKEY general extension payload to support 'SAKKE-to-self'
E.6
MIKEY general extension payload to encapsulate parameters associated with a GMK
E.7
Hiding identities within MIKEY messages
F
[N] Key derivation and hash functions
F.1
KDF interface and input parameter construction
F.2
Hash Functions
G
Change history
B
(Normative) OpenID connect profile for MCPTT
PDF-p. 59
B.0
General
B.1
MCPTT tokens
B.1.1
ID token
B.1.1.0
General
B.1.1.1
Standard claims
B.1.1.2
MCPTT claims
B.1.2
Access token
PDF-p. 60
B.1.2.0
Introduction
B.1.2.1
Standard claims
B.1.2.2
MCPTT claims
B.2
MCPTT client registration
B.3
Obtaining tokens
B.3.0
General
B.3.1
Native MCPTT client
PDF-p. 61
B.3.1.0
General
B.3.1.1
Authentication Request
B.3.1.2
Authentication response
PDF-p. 62
B.3.1.3
Token request
PDF-p. 63
B.3.1.4
Token Response
B.4
Refreshing an access token
PDF-p. 64
B.4.0
General
B.4.1
Access token request
B.4.2
Access token response
PDF-p. 65
B.5
Using the token to access MCPTT resource servers
B.6
Token validation
PDF-p. 66
B.6.1
ID token validation
B.6.2
Access token validation
C
OpenID connect detailed flow
PDF-p. 67
C.1
Detailed flow for MCPTT user authentication and registration using OpenID Connect
D
(Normative) KMS provisioning messages to support MCPTT
PDF-p. 69
D.1
General aspects
D.2
KMS requests
D.3
KMS responses
PDF-p. 70
D.3.0
General
D.3.1
KMS certificates
D.3.1.1
Description
D.3.1.2
Fields
PDF-p. 71
D.3.1.3
User IDs
D.3.2
User Key Provision
D.3.2.1
Description
D.3.2.2
Fields
PDF-p. 72
D.3.3
Example KMS response XML
D.3.3.1
Example KMSInit XML
D.3.3.2
Example KMSKeyProv XML
PDF-p. 73
D.3.3.3
Example KMSCertCache XML
PDF-p. 75
D.3.4
KMS Response XML schema
PDF-p. 77
D.3.4.1
Base XML schema
D.3.4.2
Security Extension to KMS response XML schema
PDF-p. 79
E
(Normative) MIKEY message formats for media security
PDF-p. 81
E.1
General aspects
E.1.0
Introduction
E.1.1
MIKEY common fields
E.2
MIKEY message structure for GMK distribution
E.3
MIKEY message structure for PCK distribution
PDF-p. 82
E.4
MIKEY message structure for CSK distribution
PDF-p. 83
E.5
MIKEY general extension payload to support 'SAKKE-to-self'
E.6
MIKEY general extension payload to encapsulate parameters associated with a GMK
PDF-p. 84
E.6.1
General
E.6.2
Void
E.6.3
MCPTT group ID
E.6.4
Activation time
PDF-p. 85
E.6.5
Text
E.6.6
Reserved
E.6.7
Void
E.6.8
Cryptography
E.6.9
Status
PDF-p. 86
E.6.10
Expiry time
PDF-p. 87
E.6.11
Key Type
E.7
Hiding identities within MIKEY messages
F
(Normative) Key derivation and hash functions
PDF-p. 88
F.1
KDF interface and input parameter construction
F.1.1
General
F.1.2
FC value allocations
F.1.3
Calculation of the User Salt for GUK-ID generation
F.1.4
Calculation of keys for application data protection
F.2
Hash Functions
PDF-p. 89
F.2.1
Generation of MIKEY-SAKKE UID
G
Change history
PDF-p. 90