Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 32.376
Word version: 18.0.0
0…
2…
2
References
3
Definitions and abbreviations
4
Solution Set definitions
A
CORBA Solution Set
B
File integrity solution
$
Change History
2
References
p. 6
3
Definitions and abbreviations
p. 7
3.1
Definitions
p. 7
3.2
Abbreviations
p. 7
4
Solution Set definitions
p. 7
A
(Normative) CORBA Solution Set
p. 8
A.1
Architectural features
p. 8
A.1.1
Principles of IRP Security Services
p. 8
A.1.2
Request Interceptor
p. 9
A.1.2.1
Client-side Interceptor
p. 10
A.1.2.2
Server-side Interceptor
p. 10
A.1.2.3
Request Interceptor Security Attributes
p. 11
A.1.3
Security Attributes Service Protocol
p. 11
A.1.3.1
Security Attribute Service context element
p. 11
A.1.3.2
CORBA Security Service
p. 12
A.2
Mapping
p. 12
A.2.1
RI Solution Mapping
p. 12
A.2.1.1
Security Attribute Mapping
p. 12
A.2.2
SAS Solution Mapping
p. 13
A.2.2.1
Security Attribute Mapping
p. 13
A.3
Itf-N Security Service Behaviour
p. 14
A.3.1
Request Interceptor Solution
p. 14
A.3.1.1
Authentication
p. 14
A.3.1.2
Authorization
p. 14
A.3.1.3
Activity Log
p. 14
A.3.2
Security Attributes Service Solution
p. 15
A.3.2.1
Authentication
p. 15
A.3.2.2
Authorization
p. 15
A.3.2.3
Activity Log
p. 15
A.4
Solution Set definitions
p. 16
A.4.1
IDL definition structure
p. 16
A.4.2
IDL specification "SecurityServiceConstDefs.idl"
p. 17
A.4.3
IDL specification file "SecurityServiceSystem.idl"
p. 18
A.5
Authentication mechanism
p. 19
A.5.1
Basic authentication
p. 19
A.5.2
Digest authentication
p. 19
A.5.3
Kerberos and SPKM
p. 19
A.5.4
OMG CORBA CSIv2 Conformance Level 0 of Security
p. 19
A.6
Use of OMG specified security service
p. 20
A.6.1
General
p. 20
A.6.2
Authentication
p. 20
A.6.2.1
Transport Layer based method
p. 20
A.6.2.2
Client Authentication layer based method
p. 21
A.6.3
Authorization and Access Control
p. 21
A.6.4
(Message) Integrity and Confidentiality Protection
p. 22
A.6.5
Quotation from OMG CORBA CSIv2 3 Conformance Levels of Security
p. 22
B
(Normative) File integrity solution
p. 25
B.1
Architectural features
p. 25
B.1.1
Principles of IRP Security Services
p. 25
B.1.2
XML Signature Recommendation
p. 26
B.2
Mapping
p. 26
B.2.1
File integrity solution Mapping
p. 26
B.2.1.1
Security Attribute Mapping
p. 26
B.2.1.2
Operation Mapping
p. 26
B.3
Itf-N Security Service Behaviour
p. 27
B.3.1
File integrity solution
p. 27
$
Change History
p. 28