ITU-T Y.2702 PDF

ITU-T Y.2702 PDF

Name:
ITU-T Y.2702 PDF

Published Date:
09/01/2008

Status:
[ Active ]

Description:

Authentication and authorization requirements for NGN release 1

Publisher:
International Telecommunication Union-T

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
$16.8
Need Help?

This Recommendation provides authentication and authorization requirements for next generation networks (NGN) based on [ITU-T Y.2012]. This includes requirements for authentication and authorization across the user-to-network interface (UNI), the network-to-network interface (NNI) and the application-to-network interface (ANI) as well as any entities internally with a network that may require authentication and authorization. The scope of this Recommendation includes:

1) Authentication and authorization of user for network access (e.g., authentication and authorization of an end user device, a home network gateway, or an enterprise gateway to obtain access or attachment to the network)

2) Service provider authentication and authorization of user for access to service/application (e.g., authentication and authorization of a user, a device or a combined user/device where the authentication and authorization apply to NGN service/application access)

3) User authentication and authorization of Network (e.g., user authenticating the identity of the connected NGN network or of the service provider)

4) User peer-to-peer authentication and authorization (e.g., authentication and authorization of the called user (or terminating entity), authentication and authorization of the originating entity, or data origin authentication as network functions)

5) Mutual network authentication and authorization (e.g., authentication and authorization across NNI interface at the transport level, or service/application level)

6) Authentication and authorization of service/application provider

7) Use of 3rd party authentication and authorization service

8) Authentication of objects (e.g., application process, message content and data content identifiers).

The items above include authentication of flows of the signalling, bearer and management traffic as applicable. In addition, this Recommendation also provides reference models for NGN authentication and authorization.

NOTE 1 – NGN authentication and authorization is viewed as part of the broader topic of NGN identity management (IdM). Specifically, the authentication and authorization functions and capabilities described in this Recommendation should be used to support identity assurance capabilities for NGN IdM.

NOTE 2 – In this Recommendation, the use of the term "user" is not intended to be restricted to a person. A user could be a person, groups, companies, or juridical entities.

NOTE 3 – Authentication of an entity is not intended to indicate positive validation of a person.


Edition : 08
File Size : 1 file
Number of Pages : 64
Published : 09/01/2008

History


Related products

ITU-T G.7041
Published Date: 12/01/2003
Generic framing procedure (GFP) SERIES G: TRANSMISSION SYSTEMS AND MEDIA, DIGITAL SYSTEMS AND NETWORKS Digital terminal equipments – General SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE AND INTERNET PROTOCOL ASPECTS Internet protocol aspects – Transport
$8.7
ITU-T Q.768
Published Date: 10/01/1995
SIGNALLING INTERFACE BETWEEN AN INTERNATIONAL SWITCHING CENTRE (ISC) AND AN ISDN SATELLITE SUBNETWORK
$16.8
ITU-T X.1332
Published Date: 03/01/2020
Security guidelines for smart metering services in smart grids
$9.9
ITU-T M.475 SPANISH
Published Date: 11/01/1988
ESTABLECIMIENTO Y AJUSTE DE CANALES MIXTOS ANALÓGICO/DIGITALES PARA SERVICIOS DE TELECOMUNICACIÓN INTERNACIONALES
$6

Best-Selling Products

TFF 100/107
Published Date: 2002
TEST
TFF 108
Published Date: 1993
TEST
TFF 109/510
Published Date: 1999
TEST
TFF 110
Published Date: 12/20/1986
TEST
TFF 110
Published Date: 2003
TEST
TFF 111
Published Date: 2002
TEST