Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
TS 32.373
Telecommunication Management –
Security services for Integration Reference Point (IRP);
Common Object Request Broker Architecture (CORBA) solution
3GPP‑Page
ETSI‑search
ToC
↓
V9.0.0 (PDF)
2009/12 25 p.
V8.0.0
2008/12 25 p.
V7.0.0
2007/03 25 p.
Rapporteur:
Mr. Zhang, Kai
full Table of Contents for
TS 32.373
PDF version: 9.0.0
1
Scope
p. 6
2
References
p. 6
3
Definitions and abbreviations
p. 6
3.1
Definitions
p. 6
3.2
Abbreviations
p. 7
4
Architectural features
p. 7
4.1
Principles of IRP Security Services
p. 7
4.2
Request Interceptor
p. 8
4.2.1
Client-side Interceptor
p. 9
4.2.2
Server-side Interceptor
p. 9
4.2.3
Request Interceptor Security Attributes
p. 10
4.3
Security Attributes Service Protocol
p. 10
4.3.1
Security Attribute Service context element
p. 10
4.3.2
CORBA Security Service
p. 11
5
Mapping
p. 11
5.1
RI Solution Mapping
p. 11
5.1.1
Security Attribute Mapping
p. 11
5.2
SAS Solution Mapping
p. 12
5.2.1
Security Attribute Mapping
p. 12
6
Itf-N Security Service Behaviour
p. 13
6.1
Request Interceptor Solution
p. 13
6.1.1
Authentication
p. 13
6.1.2
Authorization
p. 13
6.1.3
Activity Log
p. 13
6.2
Security Attributes Service Solution
p. 14
6.2.1
Authentication
p. 14
6.2.2
Authorization
p. 14
6.2.3
Activity Log
p. 14
A
(Normative) IDL specifications
p. 15
A.1
IDL specification (file name "SecurityServiceConstDefs.idl")
p. 15
A.2
IDL specification (file name "SecurityServiceSystem.idl")
p. 16
B
Authentication mechanism
p. 17
B.1
Basic authentication
p. 17
B.2
Digest authentication
p. 17
B.3
Kerberos and SPKM
p. 17
B.4
OMG CORBA CSIv2 Conformance Level 0 of Security
p. 17
C
(Normative) Use of OMG specified security service
p. 18
C.1
General
p. 18
C.2
Authentication
p. 18
C.2.1
Transport Layer based method
p. 18
C.2.2
Client Authentication layer based method
p. 19
C.3
Authorization and Access Control
p. 20
C.4
(Message) Integrity and Confidentiality Protection
p. 20
C.5
Quotation from OMG CORBA CSIv2 3 Conformance Levels of Security
p. 20
D
Change history
p. 23