Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 33.203
Word version: 18.1.0
1…
4
5…
6…
7…
8…
G…
M…
N…
O…
P…
T…
X…
P
Co-existence of authentication schemes IMS AKA, GPRS-IMS-Bundled Authentication, NASS-IMS-bundled authentication, SIP Digest and Trusted Node Authentication
P.1
Scope of this Annex
P.2
Requirements on co-existence of authentication schemes
P.3
P-CSCF procedure selection
P.4
Determination of requested authentication scheme in S-CSCF
P.5
Co-existence of PANI-aware and other P-CSCFs
P.6
Considerations on the Cx interface
Q
Usage of the authentication mechanisms for non-registration messages in Annexes N and O
Q.1
General
Q.2
Assertion of identities by the P-CSCF
Q.3
Strengths and boundary conditions for the use of authentication mechanisms for non-registration messages
R
NASS-IMS-bundled authentication
R.1
Overview
R.2
Use Cases and Limitations
R.3
Detailed description
S
Application to 3GPP2 Access
S.1
Introduction
S.2
Application of clause 4
S.3
Application of clauses 5 through 9
S.4
3GPP2 AKA Credentials
S.5
Network Domain Security for IMS
...
P
(Normative) Co-existence of authentication schemes IMS AKA, GPRS-IMS-Bundled Authentication, NASS-IMS-bundled authentication, SIP Digest and Trusted Node Authentication
|R8|
p. 83
P.1
Scope of this Annex
p. 83
P.2
Requirements on co-existence of authentication schemes
p. 83
P.3
P-CSCF procedure selection
p. 83
P.4
Determination of requested authentication scheme in S-CSCF
p. 85
P.4.1
Stepwise approach
p. 85
P.4.2
Mechanisms for performing steps 1 to 3 in P.4.1
p. 85
P.5
Co-existence of PANI-aware and other P-CSCFs
p. 87
P.6
Considerations on the Cx interface
p. 87
Q
Usage of the authentication mechanisms for non-registration messages in Annexes N and O
|R8|
p. 88
Q.1
General
p. 88
Q.2
Assertion of identities by the P-CSCF
p. 88
Q.3
Strengths and boundary conditions for the use of authentication mechanisms for non-registration messages
p. 89
R
(Normative) NASS-IMS-bundled authentication
|R8|
p. 91
R.1
Overview
p. 91
R.2
Use Cases and Limitations
p. 91
R.3
Detailed description
p. 91
S
(Normative) Application to 3GPP2 Access
|R8|
p. 94
S.1
Introduction
p. 94
S.2
Application of clause 4
p. 94
S.3
Application of clauses 5 through 9
p. 95
S.4
3GPP2 AKA Credentials
p. 96
S.4.1
Realisations of 3GPP2 AKA Credentials
p. 96
S.5
Network Domain Security for IMS
p. 96
S.5.1
General
p. 96
S.5.2
Inter-domain Domain Security
p. 96
S.5.3
Intra-domain Domain Security
p. 97
S.5.4
Profiles of Network Domain Security Methods
p. 97
S.5.4.1
General
p. 97
S.5.4.2
Support of IPsec ESP
p. 97
S.5.4.2.1
General
p. 97
S.5.4.2.2
Support of ESP authentication and encryption
p. 97
S.5.4.3
Support of TLS
p. 98