Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TS 33.535  Word version:  18.4.0

Top   Top   None   None   Next
1…   4…   4.6…   5…   6…   7…   A…   B…   C…   D…

 

1  Scopep. 7

The present document specifies the security features and mechanisms to support authentication and key management aspects for applications based on subscription credential(s) in 5G system as defined in TS 33.501.

2  Referencesp. 7

The following documents contain provisions which, through reference in this text, constitute provisions of the present document.
  • References are either specific (identified by date of publication, edition number, version number, etc.) or non-specific.
  • For a specific reference, subsequent revisions do not apply.
  • For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document.
[1]
TR 21.905: "Vocabulary for 3GPP Specifications".
[2]
TS 33.501: "Security architecture and procedures for 5G system".
[3]
TS 23.501: "System Architecture for the 5G System".
[4]
TS 33.220: "Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA)".
[5]
TS 23.222: "Common API Framework for 3GPP Northbound APIs".
[6]
RFC 7542:  "The Network Access Identifier".
[7]
TS 33.222: "Generic Authentication Architecture (GAA); Access to network application functions using HypertextTransfer Protocol over Transport Layer Security (HTTPS)".
[8]  Void
[9]
TS 23.003: "Numbering, addressing and identification".
[10]
RFC 9110:  "HTTP Semantics".
[11]
TS 29.503: "5G System; Unified Data Management Services".
[12]
RFC 9147:  "The Datagram Transport Layer Security (DTLS) Protocol Version 1.3"
[13]
TS 33.210: "3G Security; Network Domain Security; IP network layer security".
[14]
RFC 8613:  "Object Security for Constrained RESTful Environments (OSCORE)".
[15]
RFC 8949:  "Concise Binary Object Representation (CBOR)".
[16]
RFC 5869:  "HMAC-based Extract-and-Expand Key Derivation Function (HKDF)".
[17]
TS 23.502: "Procedures for the 5G System".
Up

3  Definitions of terms, symbols and abbreviationsp. 7

3.1  Termsp. 7

For the purposes of the present document, the terms given in TR 21.905 and the following apply. A term defined in the present document takes precedence over the definition of the same term, if any, in TR 21.905.
AKMA subscription data:
The data in the home operator's network indicating whether or not the subscriber is allowed to use AKMA.
AKMA context:
A set of parameters stored in AAnF, including SUPI, GPSI, KAKMA, A-KID and KAF expiration time.
Up

3.2  Symbolsp. 8

Void.

3.3  Abbreviationsp. 8

For the purposes of the present document, the abbreviations given in TR 21.905 and the following apply. An abbreviation defined in the present document takes precedence over the definition of the same abbreviation, if any, in TR 21.905.
A-KID
AKMA Key IDentifier
A-TID
AKMA Temporary UE IDentifier
AAnF
AKMA Anchor Function
AF
Application Function
AF_ID
AF Identifier
AKMA
Authentication and Key Management for Applications
AMF
Access and Mobility Management Function
AUSF
AUthentication Server Function
CBOR
Concise Binary Object Representation
CoAP
Constrained Application Protocol
KAF
AKMA Application Key
KAKMA
AKMA Anchor Key
KDF
Key Derivation Function
NEF
Network Exposure Function
OSCORE
Object Security for Constrained RESTful Environments
RID
Routing InDicator
UDM
Unified Data Management
Up

Up   Top   ToC