D.2 LI for Registration and Deregistration
33.1273GPPLawful Interception (LI) architecture and functionsRelease 18TS
D.2.1 Background
RCS Registration is usually handled by the IMS automatically when a user that is authorised RCS Services registers to the IMS with a UE that supports RCS Services.
D.2.2 Architecture
The figure 7.13.2-1 without the CC-POI in the RCS Server provides the architecture for LI for capability discovery.
In a normal deployment, the S-CSCF, a Presence Server or Messaging Server may perform the function of the RCS Server in figure 7.13.2-1.