ATIS - 1000030
Authentication and Authorization Requirements for Next Generation Network (NGN)
Organization: | ATIS |
Publication Date: | 1 November 2008 |
Status: | inactive |
Page Count: | 67 |
scope:
This standard provides authentication and authorization requirements for Next Generation Network (NGN) based on ATIS-1000018, ATIS NGN Architecture [ATIS-1000018] and Recommendation Y.2012, Functional Requirements and Architecture of the NGN Release 1 [Y.2012]. This includes requirements for authentication and authorization across the User-to- Network Interface (UNI), the Network-to-Network Interface (NNI) and the Application-to- Network Interface (ANI) as well as any entities internally with a network that may require authentication and authorization. This standard is based on and is aligned with ITU-T Recommendation Y.2702, Authentication and Authorization Requirements for NGN Release 1 [Y.2702]. The scope of this standard includes:
Authentication and Authorization of User for Network Access (e.g., authentication and authorization of an end user device, a home network gateway, or an enterprise gateway to obtain access or attachment to the network)
Service Provider Authentication and Authorization of User for Access to Service/application (e.g., authentication and authorization of an user, a device or a combined user/device where the authentication and authorization apply to NGN service/application access)
User Authentication and Authorization of Network (e.g., user authenticating the identity of the connected NGN network or of the service provider)
User Peer-to-Peer Authentication and Authorization (e.g., authentication and authorization of the called user (or terminating entity), authentication and authorization of the originating entity, or data origin authentication as network functions)
Mutual Network Authentication and Authorization (e.g., authentication and authorization across NNI interface at the transport level, or service/application level)
Authentication and Authorization of Service/Application Provider
Use of 3rd Party Authentication and Authorization Service.
Authentication of Objects (e.g., application process, message content and data content identifiers).
The items above include authentication of flows of the signalling, bearer and management traffic as applicable.
Document History



