Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 33.700-32  Word version:  19.0.0

Top   Top   Up   Prev   None
1…   5…

 

5  Key issuesp. 9

6  Solutionsp. 11

6.0  Mapping of Solutions to Key Issuesp. 11

6.1  Solution #1: User authentication and authorization of human userp. 11

6.2  Solution #2: User Authentication and Authorization via AMFp. 12

6.3  Solution #3: User Authentication and Authorization over NASp. 14

6.4  Solution #4: Security protection of human user privacyp. 16

6.5  Solution #5: User authentication and authorizationp. 19

6.6  Solution #6: Human User authentication of through NAS procedurep. 20

6.7  Solution #7: Authentication and Authorization of Human User IDp. 22

6.8  Solution #8: User authentication with preconfigured credentialp. 24

6.11  Solution #11: Re-using existing mechanisms for user privacyp. 31

6.12  Solution #12: authorization of non-3GPP devices behind 5G-RGp. 32

6.13  Solution #13: Authentication and Authorization procedure of N3D behind gateway UE or 5G-RGp. 33

6.14  Solution #14: Authentication and authorization of non-3GPP devicesp. 37

6.15  Solution #15: Authentication of user behind the UEp. 37

6.16  Solution #16: User Authentication and Authorizationp. 40

6.17  Solution #17: Solution for exposure privacy issuep. 44

6.18  Solution #18: User privacy during the connection with 5GCp. 47

6.19  Solution #19: User privacy protectionp. 48

6.20  Solution #20: privacy protection for user ID over the airp. 50

6.21  Solution #21: A&A of non-3GPP devices behind UE or 5G-RG based on secondary authenticationp. 50

6.22  Solution #22: User authentication with credentials derived by AUSFp. 51

6.23  Solution #23: User Authentication with EAP-PSKp. 56

6.24  Solution #24: User ID privacy protection based on EAP-TLS protocol using pseudonym mechanismp. 58

6.25  Solution #25: User Authentication with Certificate Generated by an authorized UEp. 60

6.26  Solution #26: User authentication with credentials derived by UIMFp. 61

6.27  Solution #27: User privacy protection for UIP exposure based on RNAAp. 67

7  Conclusionsp. 67

$  Change historyp. 69


Up   Top