B.3 Procedures

24.5473GPPIdentity management - Service Enabler Architecture Layer for Verticals (SEAL)Protocol specificationRelease 17TS

B.3.1 CoAP client

The CoAP client in the UE shall support the client role defined in IETF RFC 7252 [17].

If the communication is via proxies, the CoAP client in the UE:

a) shall be configured with a home CoAP proxy FQDN parameter;

b) shall be configured with a home CoAP proxy port parameter; and

c) may be configured with one of the following (D)TLS tunnel authentication method along with its parameters as specified in 3GPP TS 33.434 [7]:

1) one-way authentication of the CoAP proxy based on the server certificate;

2) mutual authentication based on certificates, along with (D)TLS tunnel authentication based on X.509 certificate; and

3) mutual authentication based on pre-shared key, along with (D)TLS tunnel authentication based on pre-shared key.

B.3.2 CoAP proxy

B.3.2.1 General

The CoAP proxy shall support CoAP-to-CoAP, CoAP-to-HTTP proxy and HTTP-to-CoAP roles defined in IETF RFC 7252 [17].

CoAP proxy shall support UDP transport in IETF RFC 7252 [17] and shall support TCP transport defined in IETF RFC 8323 [18].

B.3.2.2 CoAP request method from CoAP client in UE

The CoAP proxy shall support the server role defined in IETF RFC 7252 [17].

The CoAP proxy may support datagram transport layer security (DTLS) or transport layer security (TLS) as specified in clause 6 of 3GPP TS 33.434 [7].

The CoAP proxy is configured with the following CoAP proxy parameters:

a) an FQDN of an CoAP proxy for UEs; and

b) a port of an CoAP proxy for UEs.

The CoAP proxy may support establishing transport connections on the FQDN of CoAP proxy for UEs and the port of CoAP proxy for UEs. The CoAP proxy shall support establishing a (D)TLS tunnel via each such transport connection as specified in 3GPP TS 33.434 [7]. When establishing the (D)TLS tunnel, the CoAP proxy shall act as the (D)TLS server.

B.3.2.3 CoAP request method from CoAP client in network entity within trust domain

The CoAP proxy is configured with the following parameters:

a) a FQDN of an CoAP proxy for trusted entities; and

b) a port of an CoAP proxy for trusted entities.

Upon receiving an CoAP request method via a transport connection established on the FQDN of CoAP proxy for UEs and the port of CoAP proxy for UEs, if the transport connection is between network elements within trusted domain as specified in 3GPP TS 33.434 [7], then:

a) if the CoAP request contains a CoAP URI identifying a resource in a partner’s VAL service provider, the CoAP proxy shall forward the CoAP request according to the CoAP URI; and

b) if an CoAP request contains CoAP URI identifying a resource in own VAL service provider, the CoAP proxy shall act as reverse proxy for the CoAP request and shall forward the CoAP request according to VAL service provider’s policy.

B.4.2 CoAP server

The CoAP server shall support the server role defined in IETF RFC 7252 [17].

Upon reception of an ACE-OAuth Token Provisioning Request message containing an access token, the CoAP server:

a) shall verify the integrity of the access token; and

b) shall verify that the key included in the access token belongs to the authenticated requesting party.

Upon reception of a resource request, the CoAP server:

a) shall verify that the requesting party is authorized according to the access token as specified in the corresponding ACE-OAuth profile; the DTLS profile of ACE-OAUTH [20] or the OSCORE profile of ACE-OAUTH [21].

Annex C (informative):
Change history

Change history

Date

Meeting

TDoc

CR

Rev

Cat

Subject/Comment

New version

2019-10

CT1#120

C1-196093

Draft skeleton provided by the rapporteur.

0.0.0

2019-10

CT1#120

Implementing the following p-CRs agreed by CT1:
C1-196850, C1-196865, C1-196866, C1-196867

0.1.0

2019-11

CT1#121

Implementing the following p-CRs agreed by CT1:
C1-198600, C1-198601, C1-198602, C1-198603

0.2.0

2019-12

CT-86

CP-193154

Presentation for information at TSG CT

1.0.0

2020-03

CT1#122-e

Implementing the following p-CRs agreed by CT1:
C1-200450, C1-200609, C1-200611, C1-200612, C1-200818,

C1-201003

1.1.0

2020-03

CT-87e

CP-200171

Presentation for approval at TSG CT

2.0.0

2020-03

CT-87e

Version 16.0.0 created after approval

16.0.0

2020-06

CT-88e

CP-201129

0001

F

Updates to User Authentication Client (SIM-C) procedure

16.1.0

2020-06

CT-88e

CP-201129

0002

F

Updates to User Authentication Server (SIM-S) procedure

16.1.0

2020-06

CT-88e

CP-201129

0003

3

F

Updates to Token Exchange Client (SIM-C) procedure

16.1.0

2020-06

CT-88e

CP-201129

0004

3

F

Updates to Token Exchange Server (SIM-S) procedure

16.1.0

2020-06

CT-88e

CP-201129

0005

1

F

draft-ietf-oauth-token-exchange has been published as RFC8693

16.1.0

2020-09

CT-89e

CP-202163

0006

1

F

Correcting a reference

16.2.0

2021-12

CT-94e

CP-213031

0007

B

Reference update for HTTP/1.1 protocol

17.0.0

2021-12

CT-94e

CP-213052

0008

1

B

SEAL IM FE requirements

17.0.0

2021-12

CT-94e

CP-213052

0009

B

Token endpoint reference for CoAP support

17.0.0

2021-12

CT-94e

CP-213052

0010

1

B

Addition of CoAP user authentication procedure

17.0.0

2021-12

CT-94e

CP-213052

0011

1

B

Addition of CoAP entities annex

17.0.0

2022-03

CT-95e

CP-220255

0012

F

Correction of CR implementation issues

17.1.0

2022-06

CT-96

CP-221217

0013

F

Resolve Editor’s note on CoAP security

17.2.0