J.2 Usage scenarios
33.2203GPPGeneric Authentication Architecture (GAA)Generic Bootstrapping Architecture (GBA)TS
Four different scenarios can be identified how the local policy enforcement in the BSF will work:
1) A NAF does not use USSs (i.e. it does not request a USS from the BSF), and the BSF does not have a local policy for this NAF.
2) A NAF does not use USSs (i.e. it does not request a USS from the BSF), and the BSF does have a local policy for this NAF.
3) A NAF does use USSs (i.e., it requests one or more USSs from the BSF), and the BSF does not have a local policy for this NAF.
4) A NAF does use USSs (i.e., it request one or more USSs from the BSF), and the BSF does have a local policy for this NAF.
The steps executed in each of these scenarios are described in more detail in the following subclauses.
In all scenarios the NAF has received B-TID from the UE over the Ua reference point before the following steps are executed. The steps describe only the procedures that are related to the local policy enforcement in the BSF with respect to USS existence. Also transfer of other information elements not related to this access control is not mentioned (e.g. key lifetime, private subscriber identity).
J.2.1 Scenario 1: NAF does not use USSs, BSF does not have local policy for NAF
In this scenario, the NAF does not use USSs and the BSF does not have a local policy for this NAF.
1. The NAF requests the NAF specific shared key(s) from the BSF. It does not include any GSIDs in the request.
2. The BSF locates the subscriber information in its local memory using the B-TID.
3. The BSF checks whether a local policy exists for the NAF – in this scenario there is no local policy, i.e. for this particular NAF, the BSF does not require any USSs (identified by GSIDs) to be present in subscriber’s GUSS.
4. The BSF derives the NAF specific shared key(s), and sends them to the NAF in the response.
5. The NAF receives the response with the NAF specific shared key(s).
After receiving the NAF specific shared key(s), the NAF may perform access control to the service according to its own policies and continues to communicate with the UE.
J.2.2 Scenario 2: NAF does not use USSs, BSF does have local policy for NAF
In this scenario, the NAF does not use USSs and the BSF does have a local policy for this NAF.
1. The NAF requests the NAF specific shared key(s) from the BSF. It does not include any GSIDs in the request.
2. The BSF locates the subscriber information in its local memory using the B-TID.
3. The BSF checks whether a local policy exists for the NAF – in this scenario there is a local policy for this NAF, i.e. for this particular NAF, the BSF does not require any USSs (identified by GSIDs) to be present in subscriber’s GUSS.
The BSF checks whether all the required USSs identified by GSIDs are present in subscriber’s GUSS: If yes, the BSF continues from step 4. If not, the BSF the BSF sends an error message to the NAF.
NOTE: As specified in clause 4.4.6, it is not required that the NAF requests the USSs over the Zn reference point, which the BSF requires to be present in the GUSS for particular NAF, rather it is sufficient that the BSF checks the presence of the USSs locally.
4. The BSF derives the NAF specific shared key(s), and sends them to the NAF in the response.
5. The NAF receives the response with the NAF specific shared key(s).
After receiving the NAF specific shared key(s), the NAF may perform access control to the service according to its own policies and continues to communicate with the UE.
If the NAF received the "not authorized" error message, it may indicate this to the UE over Ua reference point. In any case, the GAA based security setup will fail between the UE and the NAF since the NAF did not get the NAF specific shared key(s).
J.2.3 Scenario 3: NAF does use USSs, BSF does not have local policy for NAF
In this scenario, the NAF does use USSs and the BSF does not have a local policy for this NAF.
1. The NAF requests the NAF specific shared key(s) from the BSF. It includes the GSIDs it needs in the request.
2. The BSF locates the subscriber information in its local memory using the B-TID.
3. The BSF checks whether a local policy exists for the NAF – in this scenario there is no local policy, i.e. BSF does not require USSs identified by GSIDs to be present in subscriber’s GUSS.
4. The BSF derives the NAF specific shared key(s), and sends them and the USSs identified by the GSIDs to the NAF in the response. If a particular USS is not found in subscriber’s GUSS, or the NAF is not authorized to receive a particular USS, these USSs are omitted from the response.
5. The NAF receives the response with the NAF specific shared key(s), and those requested USSs that were available (i.e., found in subscriber’s GUSS and allowed by the BSF to be received by the NAF).
After receiving the NAF specific shared key(s) and the available USSs, the NAF may perform access control to the service according to its own policies (e.g. USS required or not, authorization flags required) and continue to communicate with the UE.
J.2.4 Scenario 4: NAF does use USSs, BSF does have local policy for NAF
In this scenario, the NAF does use USSs and the BSF does have a local policy for this NAF.
1. The NAF requests the NAF specific shared key(s) from the BSF. It includes the GSIDs it needs in the request.
2. The BSF locates the subscriber information in its local memory using the B-TID.
3. The BSF checks whether a local policy exists for the NAF – in this scenario there is a local policy for this NAF, i.e., one or more USSs identified by GSIDs shall be present in subscriber’s GUSS.
The BSF checks whether all the required USSs identified by GSIDs are present in subscriber’s GUSS: If yes, the BSF continues from step 4. If not, the BSF the BSF sends an error message to the NAF.
4. The BSF derives the NAF specific shared key(s), and sends them and the USSs identified by the GSIDs to the NAF in the response. If a particular USS is not found in subscriber’s GUSS, or the NAF is not authorized to receive a particular USS, these USSs are omitted from the response.
5. The NAF receives the response with the NAF specific shared key(s), and those requested USSs that were available (i.e., found in subscriber’s GUSS and allowed by the BSF to be received by the NAF).
After receiving the NAF specific shared key(s) and the available USSs, the NAF may perform access control to the service according to its own policies (e.g. USS required or not, authorization flags required) and continue to communicate with the UE.
If the NAF received the "not authorized" error message, it may indicate this to the UE over Ua reference point. In any case, the GAA based security setup will fail between the UE and the NAF since the NAF did not get the NAF specific shared key(s).
Annex K (informative):
Interoperator GBA-usage examples
This Annex gives examples how interoperator GBA is set up and operated.