Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 33.220
Word version: 18.3.0
1…
4…
4.4…
4.5…
5…
B…
D…
I…
J…
M…
N…
N
Support of SBA in GBA
N.1
General
N.2
GAA/GBA SBA Services
N.3
SBI Capable NF Discovery and Selection
O
GBA Ua protocol based on DTLS
O.1
General
O.2
Shared key-based mutual authentication between UE and NAF
P
Ua security protocol: Object Security for Constrained RESTful Environments (OSCORE)
P.1
General
P.2
Requirements
P.3
OSCORE as a GBA Ua protocol
$
Change history
N
(Normative) Support of SBA in GBA
|R17|
p. 93
N.1
General
p. 93
N.1.1
Overview
p. 93
N.1.2
Architectural Support
p. 93
N.1.3
Reference point to support SBA in GBA
p. 94
N.1.4
Service based interface to support SBA in GBA
p. 94
N.2
GAA/GBA SBA Services
p. 94
N.2.1
HSS Services
p. 94
N.2.1.1
General
p. 94
N.2.1.2
Nhss_GbaSubscriberDataManagement (GbaSDM) service
p. 95
N.2.1.2.1
General
p. 95
N.2.1.2.2
Nhss_GbaSDM_Get service operation
p. 95
N.2.1.2.3
Nhss_GbaSDM_Subscribe service operation
p. 95
N.2.1.2.4
Nhss_GbaSDM_Unsubscribe service operation
p. 96
N.2.1.2.5
Nhss_GbaSDM_Notification service operation
p. 96
N.2.1.3
Nhss_GbaUEAuthentication service
p. 96
N.2.1.3.1
Nhss_GbaUEAuthentication_Get service operation
p. 96
N.2.2
UDM Services
p. 96
N.2.2.1
General
p. 96
N.2.2.2
Nudm_UEAuthentication Service
p. 97
N.2.2.2.1
Nudm_UEAuthentication_GetGbaAv service operation
p. 97
N.2.3
BSF Services
p. 97
N.2.3.1
General
p. 97
N.2.3.2
Nbsp_Gba service
p. 97
N.2.3.2.1
General
p. 97
N.2.3.2.2
Nbsp_Gba_BootstrapInfo service operation
p. 97
N.2.4
Mapping of Zh, Zn operations and terminology to SBI services
p. 98
N.2.4.1
General
p. 98
N.2.4.2
Mapping of Zh messages to HSS SBI services
p. 98
N.2.4.3
Mapping of Zn messages to BSF SBI services
p. 98
N.2.4.4
Mapping of Zh messages to UDM SBI services
p. 98
N.3
SBI Capable NF Discovery and Selection
p. 98
N.3.1
General
p. 98
N.3.2
SBI Capable HSS Discovery and Selection
p. 99
N.3.3
SBI Capable BSF Discovery and Selection
p. 99
N.3.4
UDM Discovery and Selection
p. 99
O
(Normative) GBA Ua protocol based on DTLS
|R18|
p. 100
O.1
General
p. 100
O.1.1
Requirement on the UE
p. 100
O.1.2
Requirement on the NAF
p. 100
O.2
Shared key-based mutual authentication between UE and NAF
p. 100
O.2.1
General
p. 100
O.2.2
Procedures for DTLS 1.3
p. 100
P
(Normative) Ua security protocol: Object Security for Constrained RESTful Environments (OSCORE)
|R18|
p. 101
P.1
General
p. 101
P.2
Requirements
p. 101
P.2.1
General
p. 101
P.2.2
Requirements on the UE
p. 101
P.2.3
Requirements on the NAF
p. 102
P.2.4
Requirements on the OSCORE
p. 102
P.3
OSCORE as a GBA Ua protocol
p. 102
P.3.1
General
p. 102
P.3.2
Procedures
p. 102
P.3.3
OSCORE Security context
p. 104
P.3.4
Refresh of OSCORE key material
p. 104
P.3.5
OSCORE Ua protocol payload encoding
p. 105
$
Change history
p. 107