Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 24.109
Word version: 18.0.0
1…
4…
A…
4
Generic Bootstrapping Architecture; Ub interface
4A
Generic Bootstrapping Achitecture Push; Upa
5
Network application function; Ua interface
6
PKI portal, Ua interface
7
Authentication Proxy
4
Generic Bootstrapping Architecture; Ub interface
p. 10
4.1
Introduction
p. 10
4.2
Bootstrapping procedure
p. 11
4.3
User authentication failure
p. 12
4.4
Network authentication failure
p. 12
4.5
Synchronization failure
p. 13
4A
Generic Bootstrapping Achitecture Push; Upa
|R8|
p. 13
4A.1
Introduction
p. 13
4A.2
Bootstrapping procedure
p. 13
4A.3
User authentication failure
p. 14
4A.4
Network authentication failure
p. 14
4A.5
Synchronization failure
p. 14
5
Network application function; Ua interface
p. 14
5.1
Introduction
p. 14
5.2
HTTP Digest authentication
p. 15
5.2.1
General
p. 15
5.2.2
Authentication procedure
p. 15
5.2.2.1
General
p. 15
5.2.3
Authentication failures
p. 16
5.2.4
Bootstrapping required indication
p. 16
5.2.5
Bootstrapping renegotiation indication
p. 16
5.2.6
Integrity protection
p. 17
5.3
UE and NAF authentication using HTTPS
p. 17
5.3.1
General
p. 17
5.3.2
Shared key-based UE authentication with certificate-based NAF authentication
p. 17
5.3.2.1
Authentication procedure
p. 17
5.3.2.2
Authentication failures
p. 18
5.3.2.3
Bootstrapping required indication
p. 18
5.3.2.4
Bootstrapping renegotiation indication
p. 18
5.3.3
Shared key-based mutual authentication between UE and NAF
p. 18
5.3.3.1
Authentication procedure
p. 18
5.3.3.1.1
General
|R17|
p. 18
5.3.3.1.2
Authentication procedure using TLS 1.2
|R17|
p. 18
5.3.3.1.3
Authentication procedure using TLS 1.3
|R17|
p. 19
5.3.3.2
Authentication failures
p. 21
5.3.3.3
Bootstrapping required indication
p. 21
5.3.3.4
Bootstrapping renegotiation indication
p. 21
5.3.4
Certificate based mutual authentication between UE and application server
p. 21
5.3.5
Integrity protection
p. 21
6
PKI portal, Ua interface
p. 22
6.1
Introduction
p. 22
6.2
Subscriber certificate enrolment
p. 22
6.2.1
Enrolment procedure
p. 22
6.2.2
WIM specific authentication code for key generation
p. 24
6.2.3
WIM specific authentication code for proof of key origin
p. 24
6.2.4
Error situations
p. 25
6.3
CA certificate delivery
p. 25
6.3.1
CA certificate delivery procedure
p. 26
6.3.2
Error situations
p. 26
7
Authentication Proxy
p. 27
7.1
Introduction
p. 27
7.2
Authentication
p. 27
7.3
Authorization
p. 28