The security for the SEAL-UU, SEAL-C, SEAL-S and SEAL-E interfaces in this clause also applies to the corresponding SEALDD interfaces (i.e. SEALDD-UU, SEALDD-C, SEALDD-S and SEALDD-E) as specified in
TS 23.433.
As defined in
TS 23.434, the SEAL-X1 reference point, exists between the key management server and the group management server and uses HTTP-1 as defined in
TS 23.434 for the transport and routing of security related information to the group management server. The SEAL-X1 shall be protected using HTTPS as defined in
RFC 6749,
RFC 6750 and
OpenID Connect 1.0 [5]. The profile for TLS implementation and usage shall follow the provisions given in
TS 33.310,
Annex E.
The SEAL-X2 reference point enables the group management server to interact with the location management server as defined in
TS 23.434. The SEAL-X2 shall be protected using HTTPS as defined in
[3],
[4] and
[5] . The profile for TLS implementation and usage shall follow the provisions given in
TS 33.310,
Annex E.
IM-UU reference point is used between the identity management client and the identity management server. The security mechanism of SEAL-UU shall also be used for IM-UU.
The security established between the identity management server and the identity management client should be end-to-end. When this is not possible, then all sensitive material transferred between the identity management server and identity management client should be end-to-end protected with a mechanism that is out of scope of this document.
The KM-UU reference point is used between the Key Management Client and Key Management Server. The security mechanism of SEAL-UU shall also be used for KM-UU.
The KM-S reference point is a direct HTTP connection used between the VAL server and the key management server and shall be protected with the same mechanism used for the SEAL-S reference point.
The security established between the KM Server and the KM client should be end-to-end. When this is not possible, then all client related material transferred between the KM server and KM client should be end-to-end protected with a mechanism that is out of scope of the present document.
A SEAL client interacts with a SEAL server over the generic SEAL-UU reference point as defined in
TS 23.434.. This interface shall be protected using HTTPS as defined in
[3],
[4] and
[5] when using HTTP. The profile for TLS implementation and usage shall follow the provisions given in
TS 33.310,
Annex E. When using CoAP
[18], the SEAL-UU between the SEAL client and the SEAL server shall be protected as defined in
[19] (e.g., DTLS, TLS or OSCORE) with the additional security enhancements specified in
[22]. When (D)TLS is used with CoAP, the (D)TLS and certificate profiling shall follow
TS 33.210 and
TS 33.310. When OSCORE is used with CoAP, the mandatory to implement provisions given by
RFC 8613 shall be followed.
The VAL client interacts with VAL server over VAL-UU reference point as defined in
TS 23.434.
The VAL client interacts with a SEAL client over the SEAL-C reference point as defined in
TS 23.434. This reference point resides fully within the UE and therefore, security of this interface is left to the manufacturer and is out of scope for the present document.
The VAL server interacts with SEAL server over SEAL-S reference point as defined in
TS 23.434. The protection of this interface shall be supported according to NDS/IP as specified in
TS 33.210.
When CAPIF is not used, then TLS and OAuth 2.0
[3] shall be supported. When TLS is used, mutual authentication based on client and server certificates shall be performed between the SEAL server and VAL server using TLS. Certificate based authentication shall follow the profiles given in
clause 6.1.3a of TS 33.310. The identities in the end entity certificates shall be used for authentication and policy checks. The structure of the PKI used for the certificate is out of scope of the present document. TLS shall be used to provide integrity protection, replay protection and confidentiality protection for the interface between the SEAL server and the VAL server. Security profiles for TLS implementation and usage shall follow the provisions given in
clause 6.2 of TS 33.210. After the authentication, the SEAL server determines whether the VAL server is authorized to send requests to the SEAL server. The SEAL server shall authorize the requests from VAL server using OAuth-based authorization mechanism, the specific authorization mechanisms shall follow the provisions given in
RFC 6749.
When CAPIF is used as specified in
TS 23.434, the security mechanism for CAPIF specified in
TS 33.122 shall be followed. CAPIF core function shall choose the appropriate CAPIF-2e security method as defined in the
clause 6.5.2 of TS 33.122 for mutual authentication and protection of the SEAL server - VAL server interface. Before invoking the API exposed by the SEAL server, the VAL server as API invoker shall negotiate the security method (TLS-PSK, PKI or TLS with OAuth token) with CAPIF core function and ensure the SEAL server has information to authenticate the VAL server.
A SEAL server interacts with another SEAL server over SEAL-E reference point as defined in
TS 23.434. The protection of this interface shall be supported according to NDS/IP as specified in
TS 33.210.