Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 23.700-32
Word version: 19.0.0
1…
5…
5
Key Issues
6
Solutions
7
Overall Evaluation
8
Conclusions
$
Change history
5
Key Issues
p. 12
5.1
Key Issue #1: Identifying the Human User of a Subscription
p. 12
5.1.1
Description
p. 12
5.2
Key Issue #2: Authentication and Authorization of Users and Restrictions on Users
p. 13
5.2.1
Description
p. 13
5.3
Key Issue #3: Exposure of User Identity Profile Information
p. 13
5.3.1
Description
p. 13
5.4
Key Issue #4: Identifying non-3GPP Devices Connecting behind a UE or 5G-RG
p. 13
5.4.1
Description
p. 13
6
Solutions
p. 15
6.0
Mapping of Solutions to Key Issues
p. 15
6.1
Solution #1: Identifying traffic corresponding to a human user during PDU session establishment
p. 15
6.1.1
Key Issue mapping
p. 15
6.1.2
Description
p. 15
6.1.3
Procedures
p. 17
6.1.4
Impacts on services, entities and interfaces
p. 19
6.2
Solution #2: Support of User Identification in 5GS
p. 19
6.2.1
Key Issue mapping
p. 19
6.2.2
Description
p. 20
6.2.3
Procedures
p. 21
6.2.3.1
PDU Session Establishment procedure for specific user identifier
p. 21
6.2.3.2
User State
p. 22
6.2.3.3
Linking and Unlinking
p. 23
6.2.4
Impacts on services, entities and interfaces
p. 23
6.3
Solution #3: Identifying the Human User of UE based on User Identity Profile stored in the UDM
p. 24
6.3.1
Key Issue mapping
p. 24
6.3.2
Description
p. 24
6.3.3
Procedures
p. 25
6.3.3.1
Procedures for provisioning of User Identity Profile
p. 25
6.3.3.2
Procedures for Activation of User Identifier
p. 26
6.3.4
Impacts on services, entities and interfaces
p. 27
6.4
Solution #4: Registration for a UE and a user
p. 27
6.4.1
Key Issue mapping
p. 27
6.4.2
Functional Description
p. 28
6.4.3
Procedures
p. 28
6.4.4
Impacts on existing services, entities and interfaces
p. 29
6.5
Solution #5: Authenticating a Human User and User Profile Storage in the UDM
p. 29
6.5.1
Key Issue mapping
p. 29
6.5.2
Description
p. 29
6.5.3
Procedures
p. 30
6.5.3.1
User Identity authenticated by Secondary authentication procedure
p. 30
6.5.3.2
User Identity authenticated by AUSF/UDM
p. 31
6.5.3.3
User Identity authorized without authentication procedure
p. 33
6.5.4
Impacts on services, entities and interfaces
p. 34
6.6
Solution #6: Support of SMS over NAS for the active User Identifier
p. 34
6.6.1
Key Issue mapping
p. 34
6.6.2
Description
p. 34
6.6.3
Procedures
p. 35
6.6.4
Impacts on services, entities and interfaces
p. 36
6.7
Solution #7: Solution for linking User identifier with a UE subscription via the authenticated UE channel
p. 37
6.7.1
Key Issue mapping
p. 37
6.7.2
Description
p. 37
6.7.2.1
Overall scenario
p. 37
6.7.3
Procedure
p. 38
6.7.4
Impacts on services, entities and interfaces
p. 39
6.8
Solution #8: User specific authentication
p. 39
6.8.1
Key Issue mapping
p. 39
6.8.2
Functional Description
p. 39
6.8.3
Procedures
p. 40
6.8.4
Impacts on existing services, entities and interfaces
p. 40
6.9
Solution #9: Solution for AMF based User ID authentication
p. 41
6.9.1
Key Issue mapping
p. 41
6.9.2
Description
p. 41
6.9.3
Procedures
p. 42
6.9.4
Impacts on services, entities and interfaces
p. 43
6.10
Solution #10: Unique User Identifier for a Human User and how it is used in 3GPP procedures to associate the Human User with a UE
p. 43
6.10.1
Introduction
p. 43
6.10.2
Functional Description
p. 43
6.10.3
Procedures
p. 45
6.10.3.1
Registration procedure
p. 45
6.10.3.2
Registration procedure supporting SMS over NAS
p. 47
6.10.3.3
Further procedures
p. 48
6.10.4
Impacts on services, entities, and interfaces
p. 48
6.11
Solution #11: Exposing user authentication result to 3rd parties
p. 49
6.11.1
Key Issue mapping
p. 49
6.11.2
Description
p. 49
6.11.2.1
Scenario and use cases
p. 49
6.11.2.2
Entities
p. 50
6.11.2.3
Solution summary
p. 50
6.11.3
Procedures
p. 50
6.11.4
Impacts on services, entities and interfaces
p. 52
6.12
Solution #12: User Identity Profile Server based control
p. 52
6.12.1
Key Issue mapping
p. 52
6.12.2
Description
p. 52
6.12.2.1
User Identity Profile
p. 52
6.12.2.2
Architecture
p. 52
6.12.2.3
Authentication and Authorization
p. 53
6.12.3
Procedures
p. 53
6.12.4
Impacts on services, entities and interfaces
p. 53
6.13
Solution #13: Authentication & Authorization of Users in 5GC in Control or User Plane
p. 54
6.13.1
Description
p. 54
6.13.2
Procedures
p. 54
6.13.3
Impacts on Existing Nodes and Functionality
p. 56
6.14
Solution #14: Restriction on the usage of user identifier
p. 57
6.14.1
Description
p. 57
6.14.2
Procedures
p. 58
6.14.3
Impacts on Existing Nodes and Functionality
p. 60
6.15
Solution #15: User Identity profile information verification and authentication results exposure
p. 60
6.15.1
Key Issue mapping
p. 60
6.15.2
Description
p. 60
6.15.3
Procedures
p. 61
6.15.3.1
Verification of User Identifier associated with a subscription
p. 61
6.15.3.2
Exposure of Authentication Results
p. 62
6.15.4
Impacts on services, entities and interfaces
p. 63
6.16
Solution #16: Exposure services for User Identifiers
p. 63
6.16.1
Key Issue mapping
p. 63
6.16.2
Description
p. 63
6.16.3
Procedures
p. 64
6.16.3.1
Exposure of User Identifier profile details
p. 64
6.16.3.2
Exposure of Authentication and Authorization historical Results
p. 65
6.16.4
Impacts on services, entities, and interfaces
p. 66
6.17
Solution #17: Identifying the User of UE based on User Identity Profile stored in the UDM
p. 66
6.17.1
Key Issue mapping
p. 66
6.17.2
Functional Description
p. 67
6.17.3
Procedures
p. 69
6.17.3.1
AF provisioning
p. 69
6.17.3.2
User identifier activation.
p. 70
6.17.3.3
Notifying the PDU session
p. 70
6.17.4
Impacts on existing services, entities and interfaces
p. 71
6.18
Solution #18: Supporting user identifier of human in 5G system with User Profile Server
p. 72
6.18.1
Key Issue mapping
p. 72
6.18.2
Description
p. 72
6.18.3
Procedures
p. 73
6.18.4
Impacts on services, entities and interfaces
p. 74
6.19
Solution #19: User Profile creation within an operator's realm
p. 74
6.19.1
Key Issue mapping
p. 74
6.19.2
Description
p. 74
6.19.3
Procedures
p. 75
6.19.4
Impacts on services, entities and interfaces
p. 78
6.20
Solution #20: Policy Enhancement for user ID
p. 78
6.20.1
Key Issue mapping
p. 78
6.20.2
Description
p. 78
6.20.3
Procedure of Policy enhance for user ID
p. 78
6.20.3.1
Procedure 1: URSP rule enhancement procedure
p. 78
6.20.3.2
Procedure 2: SM policy generation based on user ID
p. 79
6.20.4
Impacts on services, entities and interfaces
p. 79
6.21
Solution #21: Transition of states when different User(s) or UE Subscription uses the UE for Network Access.
p. 79
6.21.1
Key Issue mapping
p. 79
6.21.2
Description
p. 80
6.21.3
Procedures
p. 80
6.21.3.1
Access by different User Identities (or UE Subscription)
p. 80
6.21.4
Impacts on services, entities, and interfaces
p. 81
6.22
Solution #22: Solution for Unlinking User Identifier with UE
p. 81
6.22.1
Key Issue mapping
p. 81
6.22.2
Description
p. 81
6.22.3
Procedures
p. 82
6.22.3.1
General
p. 82
6.22.3.2
Procedure for Activation of new user ID with UE
p. 82
6.22.3.3
Procedure for current user ID deactivation of User ID from a UE
p. 83
6.22.4
Impacts on services, entities and interfaces
p. 83
6.23
Solution #23: AF based human User Identity management
p. 84
6.23.1
Key Issue mapping
p. 84
6.23.2
Description
p. 84
6.23.3
Procedures
p. 85
6.23.3.1
Creation/Modification/Deletion of human user identity
p. 85
6.23.3.2
Activation/Deactivation of User Identity with UE
p. 86
6.23.4
Impacts on services, entities and interfaces
p. 87
6.24
Solution #24: UID ↔ SUPI association
p. 87
6.24.1
Key Issue mapping
p. 87
6.24.2
Description
p. 87
6.24.2.1
general
p. 87
6.24.2.2
Sort of virtual SUPI
p. 87
6.24.3
Procedures
p. 88
6.24.3.1
Association of SUPIs
p. 88
6.24.4
Impacts on services, entities and interfaces
p. 89
6.25
Solution #25: Format of Operator Assigned and 3rd Party Assigned User Identifiers
p. 90
6.25.1
Key Issue mapping
p. 90
6.25.2
Description
p. 90
6.25.3
Procedures
p. 90
6.25.4
Impacts on services, entities and interfaces
p. 90
6.26
Solution #26: User identity profile influence on AM, SM and UE policy
p. 91
6.26.1
Key Issue mapping
p. 91
6.26.2
Description
p. 91
6.26.3
Procedures
p. 92
6.26.3.1
Procedure for influencing the AM and UE policy by the user profile information
p. 92
6.26.3.2
Procedure for influencing the SM policy by the user profile information
p. 94
6.26.3.3
Procedure for exposure of user identity profile information
p. 94
6.26.4
Impacts on services, entities and interfaces
p. 94
6.27
Solution #27: Configuration and Usage of User Identifiers
p. 95
6.27.1
Key Issue mapping
p. 95
6.27.2
Description
p. 95
6.27.3
Procedures
p. 95
6.27.4
Impacts on services, entities and interfaces
p. 97
6.28
Solution #28: Handling and notifying the UE when the UE is associated with a User Identifier.
p. 97
6.28.1
Introduction
p. 97
6.28.2
Description
p. 97
6.28.3
Procedures
p. 98
6.28.3.1
Illustration for SMS
p. 98
6.28.4
Impacts on services, entities, and interfaces
p. 98
6.29
Solution #29: User profile exposure check
p. 99
6.29.1
Key Issue mapping
p. 99
6.29.2
Description
p. 99
6.29.3
Procedures
p. 99
6.29.4
Impacts on existing services, entities and interfaces
p. 99
6.30
Solution #30: Identifying non-3GPP devices behind a UE or 5G-RG via Server control
p. 100
6.30.1
Key Issue mapping
p. 100
6.30.2
Description
p. 100
6.30.2.0
General
p. 100
6.30.2.1
Device Information Profile
p. 100
6.30.2.3
Architecture
p. 100
6.30.2.4
Solution Description
p. 101
6.30.2.5
Authentication and Authorization
p. 101
6.30.3
Procedures
p. 102
6.30.4
Impacts
p. 103
6.31
Solution #31: UE/5G-RG-initiated PDU Modification to support differentiated QoS for device behind UE/5G-RG
p. 104
6.31.1
Key Issue mapping
p. 104
6.31.2
Description
p. 104
6.31.3
Procedures
p. 106
6.31.3.1
Procedures for provisioning of non-3GPP device information
p. 106
6.31.3.2
Procedures for policy control for non-3GPP devices
p. 107
6.31.4
Impacts on services, entities and interfaces
p. 108
6.32
Solution #32: Non-3GPP Devices Behind UE or 5G-RG support
p. 108
6.32.1
Key Issue mapping
p. 108
6.32.2
Description
p. 108
6.32.3
Procedures
p. 110
6.32.3.1
Identification
p. 110
6.32.3.2
Maximum Number of Simultaneously Active N3DBU ID
p. 111
6.32.3.3
Policy Aspects
p. 111
6.32.4
Impacts on services, entities and interfaces
p. 114
6.33
Solution #33: Number of the active non-3gpp devices restriction
p. 115
6.33.1
Key Issue mapping
p. 115
6.33.2
Description
p. 115
6.33.3
Procedures
p. 116
6.33.4
Impacts on existing services, entities and interfaces
p. 117
6.34
Solution #34: Identifying non-3GPP Devices based on non-3GPP Device Report from the UE/5G-RG
p. 117
6.34.1
Key Issue mapping
p. 117
6.34.2
Description
p. 117
6.34.3
Procedures
p. 118
6.34.3.1
Procedures for provisioning of Device Identity Profile
p. 118
6.34.3.2
Procedures for authorization of UE/5G-RG supporting non-3GPP devices and non-3GPP device policy provisioning
p. 119
6.34.3.3
Procedures for providing service to non-3GPP device
p. 120
6.34.4
Impacts on services, entities and interfaces
p. 121
7
Overall Evaluation
p. 121
8
Conclusions
p. 121
8.1
Key Issue #1: Identifying the Human User of a Subscription
p. 121
8.2
Key Issue #2: Authentication and Authorization of Users and Restrictions on Users
p. 121
8.3
Key Issue #3: Exposure of User Identity Profile Information
p. 122
8.4
Key Issue #4: Identifying non-3GPP Devices Connecting behind a UE or 5G-RG
p. 122
$
Change history
p. 123