Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 29.503
Word version: 18.6.0
1…
5…
5.3…
5.4…
6…
6.2…
6.3…
6.4…
6.5…
A…
6.3
Nudm_UEAuthentication Service API
6.3.1
API URI
6.3.2
Usage of HTTP
6.3.3
Resources
6.3.4
Custom Operations without associated resources
6.3.5
Notifications
6.3.6
Data Model
6.3.7
Error Handling
6.3.8
Feature Negotiation
6.3.9
Security
6.3.10
HTTP redirection
...
6.3
Nudm_UEAuthentication Service API
p. 345
6.3.1
API URI
p. 345
6.3.2
Usage of HTTP
p. 345
6.3.2.1
General
p. 345
6.3.2.2
HTTP standard headers
p. 345
6.3.2.2.1
General
p. 345
6.3.2.2.2
Content type
p. 345
6.3.2.3
HTTP custom headers
p. 346
6.3.2.3.1
General
p. 346
6.3.3
Resources
p. 346
6.3.3.1
Overview
p. 346
6.3.3.2
Resource: SecurityInformation (Custom operation)
p. 348
6.3.3.2.1
Description
p. 348
6.3.3.2.2
Resource Definition
p. 349
6.3.3.2.3
Resource Standard Methods
p. 349
6.3.3.2.4
Resource Custom Operations
p. 349
6.3.3.3
Resource: AuthEvents (Collection)
p. 350
6.3.3.3.1
Description
p. 350
6.3.3.3.2
Resource Definition
p. 350
6.3.3.3.3
Resource Standard Methods
p. 350
6.3.3.4
Resource: SecurityInformationForRg
|R16|
p. 351
6.3.3.4.1
Description
p. 351
6.3.3.4.2
Resource Definition
p. 351
6.3.3.4.3
Resource Standard Methods
p. 352
6.3.3.5
Resource: HssSecurityInformation (Custom operation)
|R16|
p. 352
6.3.3.5.1
Description
p. 352
6.3.3.5.2
Resource Definition
p. 352
6.3.3.5.3
Resource Standard Methods
p. 353
6.3.3.5.4
Resource Custom Operations
p. 353
6.3.3.6
Resource: Individual AuthEvent
|R16|
p. 354
6.3.3.6.1
Resource Definition
p. 354
6.3.3.6.2
Resource Standard Methods
p. 354
6.3.3.7
Resource: GbaSecurityInformation (Custom operation)
|R17|
p. 355
6.3.3.7.1
Description
p. 355
6.3.3.7.2
Resource Definition
p. 355
6.3.3.7.3
Resource Standard Methods
p. 355
6.3.3.7.4
Resource Custom Operations
p. 355
6.3.3.8
Resource: ProSeSecurityInformation (Custom operation)
|R17|
p. 356
6.3.3.8.1
Description
p. 356
6.3.3.8.2
Resource Definition
p. 356
6.3.3.8.3
Resource Standard Methods
p. 356
6.3.3.8.4
Resource Custom Operations
p. 357
6.3.3.8.4.1
Overview
p. 357
6.3.3.8.4.2
Operation: generate-av
p. 357
6.3.4
Custom Operations without associated resources
p. 357
6.3.5
Notifications
p. 358
6.3.5.1
General
|R17|
p. 358
6.3.5.2
Data Restoration Notification
|R17|
p. 358
6.3.6
Data Model
p. 359
6.3.6.1
General
p. 359
6.3.6.2
Structured data types
p. 361
6.3.6.2.1
Introduction
p. 361
6.3.6.2.2
Type: AuthenticationInfoRequest
p. 362
6.3.6.2.3
Type: AuthenticationInfoResult
p. 363
6.3.6.2.4
Type: AvEapAkaPrime
p. 364
6.3.6.2.5
Type: Av5GHeAka
p. 364
6.3.6.2.6
Type: ResynchronizationInfo
p. 364
6.3.6.2.7
Type: AuthEvent
p. 365
6.3.6.2.8
Type: AuthenticationVector
p. 365
6.3.6.2.9
Type: RgAuthCtx
|R16|
p. 366
6.3.6.2.10
Type: HssAuthenticationInfoRequest
|R16|
p. 366
6.3.6.2.11
Type: HssAuthenticationInfoResult
|R16|
p. 366
6.3.6.2.12
Type: HssAuthenticationVectors
|R16|
p. 366
6.3.6.2.13
Type: AvEpsAka
|R16|
p. 367
6.3.6.2.14
Type: AvImsGbaEapAka
|R16|
p. 367
6.3.6.2.15
Type: GbaAuthenticationInfoRequest
|R17|
p. 367
6.3.6.2.16
Type: GbaAuthenticationInfoResult
|R17|
p. 367
6.3.6.2.17
Type: ProSeAuthenticationInfoRequest
|R17|
p. 367
6.3.6.2.18
Type: ProSeAuthenticationInfoResult
|R17|
p. 368
6.3.6.2.19
Type: ProSeAuthenticationVectors
|R17|
p. 368
6.3.6.3
Simple data types and enumerations
p. 368
6.3.6.3.1
Introduction
p. 368
6.3.6.3.2
Simple data types
p. 368
6.3.6.3.3
Enumeration: AuthType
p. 369
6.3.6.3.4
Enumeration: AvType
p. 369
6.3.6.3.5
Enumeration: HssAuthType
|R16|
p. 369
6.3.6.3.6
Enumeration: HssAvType
|R16|
p. 369
6.3.6.3.7
Enumeration: HssAuthTypeInUri
|R16|
p. 370
6.3.6.3.8
Enumeration: AccessNetworkId
|R16|
p. 370
6.3.6.3.9
Enumeration: NodeType
|R16|
p. 370
6.3.6.3.10
Enumeration: GbaAuthType
|R17|
p. 370
6.3.7
Error Handling
p. 370
6.3.7.1
General
p. 370
6.3.7.2
Protocol Errors
p. 371
6.3.7.3
Application Errors
p. 371
6.3.8
Feature Negotiation
p. 371
6.3.9
Security
p. 371
6.3.10
HTTP redirection
|R18|
p. 372