CONTENTS

 

 1     Scope 
 2     References 
 3     Definitions  
        3.1     Definitions from [ITU-T X.800]     
        3.2     Definitions from [ITU-T X.810]     
        3.3     Definitions from [ITU-T X.811]     
        3.4     Definitions from [ITU-T Y.2701]   
        3.5     Terms defined in this Recommendation       
 4     Abbreviations and acronyms        
 5     Reference models
        5.1     ITU-T X.811 authentication framework     
        5.2     Authentication threats         
        5.3     Authentication assurance    
        5.4     Authorization and privilege management     
        5.5     End-to-end reference architectural model   
        5.6     Relationship with NGN architecture specified in [ITU-T Y.2012]   
 6     General Requirements      
 7     Authentication and authorization of user for network access          
        7.1     Description
        7.2     General reference model    
        7.3     Requirements         
 8     Service NGN provider authentication and authorization of user for access to service/application     
        8.1     Description
        8.2     Requirements         
 9     User authentication and authorization of NGN providers   
        9.1     Description
        9.2     Objectives and requirements          
10     NGN provider supported user peer-to-peer authentication and authorization        
11     Mutual network authentication and authorization  
       11.1     Description           
       11.2     Mutual network authentication requirements          
12     NGN provider authentication and authorization of 3rd party service/application provider  
       12.1     Description           
       12.2     Requirements        
13     Use of 3rd party authentication and authorization service  
       13.1     Description           
       13.2     Requirements        
14     Authentication and authorization of objects          
       14.1     Description           
       14.2     Requirements        
Appendix I      
        I.1        Use of [b-ITU-T X.1141], Security Assertion Markup Language (SAML 2.0)     
        I.2        Service/application authentication procedures       
        I.3        Service/application authentication – Call flow examples     
        I.4        Security of service/application authentication procedures and mechanisms 
Appendix II – ETS authentication and authorization     
       II.1     Overview
       II.2     ETS user authentication and authorization    
       II.3     NGN provider authentication and authorization for ETS      
       II.4     ETS authentication and authorization use case examples      
Appendix III – 3GPP Generic bootstrapping architecture     
Appendix IV – Identity management (IdM) call flow examples     
       IV.1     Overview 
       IV.2     Call flow examples
Bibliography