Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 28.817
Word version: 17.0.0
1…
5…
5
Use cases for access control for management service
6
Potential requirements for access control for management service
7
Possible solutions for access control for management service
8
Conclusions and recommendations
$
Change history
5
Use cases for access control for management service
p. 10
5.1
use case - MnS is accessed by a digital portal of the operator
p. 10
5.1.1
Description
p. 10
5.1.2
Issue and gaps
p. 10
5.2
Use case - MnS is accessed by an external consumer of the 3GPP management system
p. 11
5.2.1
Description
p. 11
5.2.2
Issue and gaps
p. 11
5.3
Use case - MnS is accessed by a consumer in the same domain of the 3GPP management system
p. 12
5.3.1
Description
p. 12
5.3.2
Issue and gaps
p. 12
5.4
Use case - MnS is accessed by a consumer in the different domain of the 3GPP management system
p. 12
5.4.1
Description
p. 12
5.4.2
Issue and gaps
p. 13
5.5
Use case - trust relationship between MnS producer and consumer
p. 13
5.5.1
Description
p. 13
5.5.2
Issue and gaps
p. 14
5.6
use case - granular access control for internal consumer
p. 14
5.6.1
Description
p. 14
5.6.2
Issue and gaps
p. 15
5.7
use case - integrate with existing AAA system of operator
p. 15
5.7.1
Description
p. 15
5.7.2
Issue and gaps
p. 16
6
Potential requirements for access control for management service
p. 16
7
Possible solutions for access control for management service
p. 19
7.1
Possible solution to support access control on management service
p. 19
7.1.1
Enhance Service Based Management Architecture (SBMA) to support authentication capability (update clause 4 of TS 28.533 [3])
p. 19
7.1.2
Enhance Service Based Management Architecture (SBMA) to support authorization administrative/decision capabilities (update clause 4 of TS 28.533 [3])
p. 20
7.1.3
Enhance Service Based Management Architecture (SBMA) to support audit capabilities (update clause 4 of TS 28.533 [3])
p. 21
7.1.4
Enhance Request-response communication paradigm to support authentication and authorization (update clause 5 of TS 28.533[3])
p. 22
7.1.5
Enhance NRM and operations to support authentication, authorization and audit capability
p. 24
8
Conclusions and recommendations
p. 24
$
Change history
p. 25