SlideShare ist ein Scribd-Unternehmen logo
1 von 12
© 2019 Verizon.
Development of 5G
IAM Architecture
Transitioning to a User Centric
View
Bjorn Hjelm
May 16, 2019
© 2019 Verizon.
Why, What and How
2
© 2019 Verizon. 3
5G Currencies / Capabilities
© 2019 Verizon.
5G Core Network Key Principles and Concepts
4
Service-based interactions between Control Plane Network Functions (NF)
where authorized NFs can access any other NF services.
Separation between Control Plane and User Plane allowing for independent
scalability, evolution and flexible deployments.
Modularization of functions to enable flexible network slicing and support for
capability exposure.
1
2
3
© 2019 Verizon.
5G Core Network redefined as
Service-Based Architecture
(SBA)
5
UE (R)AN UPF
AF
AMF SMF
PCF UDM
DNN6
NRFNEF
N3
N2 N4
AUSF
Nausf Namf Nsmf
NpcfNnrfNnef Nudm Naf
NSSF
Nnssf
SBA entities
User Plane entities
1 3GPP TS 23.501, “System Architecture for the 5G System,” v.15.5.0, March 2019.
5G System Architecture1
© 2019 Verizon. 6
Study on a Layer for User Centric
Identifiers and Authentication followed
by User Identities and Authentication
(UIA) that introduce normative
requirements and study on the Usage
of User Identifiers in the 5G System
for architecture development.
Developed use cases focused on IoT
and generated requirements for a
service- and layer- agnostic Identity
as an Abstraction Layer in 5G as part
of the input to 3GPP.
Defined a 5G Vision around business
context based on use cases, business
models and value creation with a
user-centric view and the identity of
the entity.
Development of 5G IAM Requirements
© 2019 Verizon. 7
Identity as an Abstraction Layer in 5G
Service-
and Layer-
agnostic
Identity
An identity that bridges between network access technologies.
5G IAM architecture need to abstract from domain related identifiers and network technologies.
An identity that bridges between different services offered by one
provider.
An identity that bridges between operators and other identity
providers, providing a global identity business proposition.
© 2019 Verizon.
Basic Concept and Relations of 5G Identity
Management
Relationship between User, Identities, Identifiers and Attributes2
A user is an entity in the context of identity
management.
The identity can dependent on the role of the
entity in the system.
A user can have several user identities
(professional, private, etc.).
A user identity is associated with some pieces
of information generally referred to as
attributes where identifiers are one special
form of attribute.
Attributes that are not identifiers may be
associated with one or more identities.
2 3GPP TR 22.904, “Study on user centric identifiers and authentication,” v.16.1.0, Sep. 2018.
© 2019 Verizon.
5G User Centric Authentication Layer2
2 3GPP TR 22.904, “Study on user centric identifiers and authentication,” v.16.1.0, Sep. 2018.
Shall exist on top of the existing
subscription authentication.
Shall not replace existing subscription
credentials.
Shall support various authentication
mechanisms and interactions with
authentication system.
Identity relationship management supports
a service- and layer-agnostic identity of
the user.
© 2019 Verizon.
In addition...
10
Authorization of 5G Network Function (NF) service access1 and 3rd-
party Application Functions (AF)3 are based on OAuth 2.0 framework.
Identity management and user authentication for 3GPP Mission
Critical (MC) services is based on OpenID Connect and OAuth 2.0.4
1 3GPP TS 23.501, “System Architecture for the 5G System,” v.15.5.0, March 2019.
3 3GPP TS 33.501, “Security architecture and procedures for 5G system,” v.15.4.0, Mar. 2019.
4 3GPP TS 33.180, “Security of the mission critical service,” v.14.6.0, Mar. 2019.
© 2019 Verizon.
Summary
11
The 5G Vision focus on business context based on use cases, business models
and value creation with a user-centric view.
The concept of User Identity in a 5G system has been defined and agreed upon
within 3GPP with architecture work in development.
Some of the basic building blocks to support 5G User Centric Authentication
Layer already exist.
1
2
3
© 2019 Verizon.

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

OpenID Foundation MODRNA WG Update
OpenID Foundation MODRNA WG UpdateOpenID Foundation MODRNA WG Update
OpenID Foundation MODRNA WG Update
 
MODRNA WG Overview - October 2020
MODRNA WG Overview - October 2020MODRNA WG Overview - October 2020
MODRNA WG Overview - October 2020
 
MODRNA WG Update - April 2021
MODRNA WG Update - April 2021MODRNA WG Update - April 2021
MODRNA WG Update - April 2021
 
FIDO, Federation and the Internet of Things
 FIDO, Federation and the Internet of Things FIDO, Federation and the Internet of Things
FIDO, Federation and the Internet of Things
 
OpenID Foundation Workshop at EIC 2018 - MODRNA Working Group Update
OpenID Foundation Workshop at EIC 2018 - MODRNA Working Group UpdateOpenID Foundation Workshop at EIC 2018 - MODRNA Working Group Update
OpenID Foundation Workshop at EIC 2018 - MODRNA Working Group Update
 
OpenID Foundation iGov Working Group Update - October 22, 2018
OpenID Foundation iGov Working Group Update - October 22, 2018OpenID Foundation iGov Working Group Update - October 22, 2018
OpenID Foundation iGov Working Group Update - October 22, 2018
 
FIDO & Strong Authentication Technology Landscape
FIDO & Strong Authentication Technology LandscapeFIDO & Strong Authentication Technology Landscape
FIDO & Strong Authentication Technology Landscape
 
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO Alliance
 
FIDO & GSMA Mobile Connect
FIDO & GSMA Mobile ConnectFIDO & GSMA Mobile Connect
FIDO & GSMA Mobile Connect
 
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance OverviewFIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
 
FIDO Masterclass
FIDO MasterclassFIDO Masterclass
FIDO Masterclass
 
FIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDO
 
OpenID Foundation MODRNA WG Update
OpenID Foundation MODRNA WG UpdateOpenID Foundation MODRNA WG Update
OpenID Foundation MODRNA WG Update
 
FIDO, Strong Authentication and elD in Germany
FIDO, Strong Authentication and elD in GermanyFIDO, Strong Authentication and elD in Germany
FIDO, Strong Authentication and elD in Germany
 
Authenticate 2021: Welcome Address
Authenticate 2021: Welcome AddressAuthenticate 2021: Welcome Address
Authenticate 2021: Welcome Address
 
Mobile Connect and the FIDO standards
Mobile Connect and the FIDO standardsMobile Connect and the FIDO standards
Mobile Connect and the FIDO standards
 
FIDO and Adaptive Authentication
FIDO and Adaptive AuthenticationFIDO and Adaptive Authentication
FIDO and Adaptive Authentication
 
FIDO Authentication in a Mobile Network
FIDO Authentication in a Mobile NetworkFIDO Authentication in a Mobile Network
FIDO Authentication in a Mobile Network
 
2018 12-07 tokyo-seminar Brett McDowell
2018 12-07 tokyo-seminar Brett McDowell2018 12-07 tokyo-seminar Brett McDowell
2018 12-07 tokyo-seminar Brett McDowell
 

Ähnlich wie Development of 5G IAM Architecture

5 g network-slicing-report-from-vertical-industry-requirements-to-network-sli...
5 g network-slicing-report-from-vertical-industry-requirements-to-network-sli...5 g network-slicing-report-from-vertical-industry-requirements-to-network-sli...
5 g network-slicing-report-from-vertical-industry-requirements-to-network-sli...
Chung Ngo Kim
 

Ähnlich wie Development of 5G IAM Architecture (20)

Architecture for Mobile Data Offload over Wi-Fi Access Networks
Architecture for Mobile Data Offload over Wi-Fi Access NetworksArchitecture for Mobile Data Offload over Wi-Fi Access Networks
Architecture for Mobile Data Offload over Wi-Fi Access Networks
 
White paper 5g-user-registration-for-dual-access--dual-connectivity-march2019
White paper 5g-user-registration-for-dual-access--dual-connectivity-march2019White paper 5g-user-registration-for-dual-access--dual-connectivity-march2019
White paper 5g-user-registration-for-dual-access--dual-connectivity-march2019
 
Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGen
Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGenUnderstanding the Risks: Exploring 5G Vulnerabilities with SecurityGen
Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGen
 
Securing the 5G growth story with NFVi.pdf
Securing the 5G growth story with NFVi.pdfSecuring the 5G growth story with NFVi.pdf
Securing the 5G growth story with NFVi.pdf
 
Securing the 5G growth story with NFVi (1).pdf
Securing the 5G growth story with NFVi (1).pdfSecuring the 5G growth story with NFVi (1).pdf
Securing the 5G growth story with NFVi (1).pdf
 
An analysis of the security needs
An analysis of the security needsAn analysis of the security needs
An analysis of the security needs
 
Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)
Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)
Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
Security issues in grid computing
Security issues in grid computingSecurity issues in grid computing
Security issues in grid computing
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
What are
What areWhat are
What are
 
Secure final
Secure finalSecure final
Secure final
 
710201940
710201940710201940
710201940
 
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network SecuritySECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
 
Security course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislationSecurity course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislation
 
Navigating the Unseen Risks: Exploring 5G Vulnerabilities
Navigating the Unseen Risks: Exploring 5G VulnerabilitiesNavigating the Unseen Risks: Exploring 5G Vulnerabilities
Navigating the Unseen Risks: Exploring 5G Vulnerabilities
 
Unveiling SecurityGen's Advanced 5G Security Services
Unveiling SecurityGen's Advanced 5G Security ServicesUnveiling SecurityGen's Advanced 5G Security Services
Unveiling SecurityGen's Advanced 5G Security Services
 
How do the 802.11u and HotSpot 2.0 work?
How do the 802.11u and HotSpot 2.0 work?How do the 802.11u and HotSpot 2.0 work?
How do the 802.11u and HotSpot 2.0 work?
 
5 g network-slicing-report-from-vertical-industry-requirements-to-network-sli...
5 g network-slicing-report-from-vertical-industry-requirements-to-network-sli...5 g network-slicing-report-from-vertical-industry-requirements-to-network-sli...
5 g network-slicing-report-from-vertical-industry-requirements-to-network-sli...
 

Mehr von Bjorn Hjelm

Mehr von Bjorn Hjelm (17)

MODRNA WG Update - Oct 2023
MODRNA WG Update - Oct 2023MODRNA WG Update - Oct 2023
MODRNA WG Update - Oct 2023
 
MODRNA WG Update - Apr 2023
MODRNA WG Update - Apr 2023MODRNA WG Update - Apr 2023
MODRNA WG Update - Apr 2023
 
MODRNA WG Update - Nov 2022
MODRNA WG Update - Nov 2022MODRNA WG Update - Nov 2022
MODRNA WG Update - Nov 2022
 
MODRNA WG update - OpenID Foundation Workshop at EIC 2022
MODRNA WG update - OpenID Foundation Workshop at EIC 2022MODRNA WG update - OpenID Foundation Workshop at EIC 2022
MODRNA WG update - OpenID Foundation Workshop at EIC 2022
 
MODRNA WG Update - Apr. 2022
MODRNA WG Update - Apr. 2022MODRNA WG Update - Apr. 2022
MODRNA WG Update - Apr. 2022
 
OpenID Foundation MODRNA WG Overview (Apr. 2019)
OpenID Foundation MODRNA WG Overview (Apr. 2019)OpenID Foundation MODRNA WG Overview (Apr. 2019)
OpenID Foundation MODRNA WG Overview (Apr. 2019)
 
Mobile Network Operators and Identity – Crossing the Chasm
Mobile Network Operators and Identity – Crossing the ChasmMobile Network Operators and Identity – Crossing the Chasm
Mobile Network Operators and Identity – Crossing the Chasm
 
NSTIC Panel on Mobile-based Identity and Access Management
NSTIC Panel on Mobile-based Identity and Access ManagementNSTIC Panel on Mobile-based Identity and Access Management
NSTIC Panel on Mobile-based Identity and Access Management
 
IIW 27 Wednesday Session 3
IIW 27 Wednesday Session 3IIW 27 Wednesday Session 3
IIW 27 Wednesday Session 3
 
OpenID Foundation MODRNA WG Update
OpenID Foundation MODRNA WG UpdateOpenID Foundation MODRNA WG Update
OpenID Foundation MODRNA WG Update
 
OpenID Foundation MODRNA WG overview at EIC 2018
OpenID Foundation MODRNA WG overview at EIC 2018OpenID Foundation MODRNA WG overview at EIC 2018
OpenID Foundation MODRNA WG overview at EIC 2018
 
Integration of FIDO and Mobile Connect to deliver authentication globally wor...
Integration of FIDO and Mobile Connect to deliver authentication globally wor...Integration of FIDO and Mobile Connect to deliver authentication globally wor...
Integration of FIDO and Mobile Connect to deliver authentication globally wor...
 
FIDO and Mobile Connect
FIDO and Mobile ConnectFIDO and Mobile Connect
FIDO and Mobile Connect
 
OpenID Foundation MODRNA WG Update
OpenID Foundation MODRNA WG UpdateOpenID Foundation MODRNA WG Update
OpenID Foundation MODRNA WG Update
 
OpenID Foundation Workshop at EIC2017
OpenID Foundation Workshop at EIC2017OpenID Foundation Workshop at EIC2017
OpenID Foundation Workshop at EIC2017
 
OpenID Foundation MODRNA WG
OpenID Foundation MODRNA WGOpenID Foundation MODRNA WG
OpenID Foundation MODRNA WG
 
OpenID Foundation MODRNA WG
OpenID Foundation MODRNA WGOpenID Foundation MODRNA WG
OpenID Foundation MODRNA WG
 

Kürzlich hochgeladen

Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Cara Menggugurkan Kandungan 087776558899
 

Kürzlich hochgeladen (6)

Android Application Components with Implementation & Examples
Android Application Components with Implementation & ExamplesAndroid Application Components with Implementation & Examples
Android Application Components with Implementation & Examples
 
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
 
Mobile Application Development-Components and Layouts
Mobile Application Development-Components and LayoutsMobile Application Development-Components and Layouts
Mobile Application Development-Components and Layouts
 
Mobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s ToolsMobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s Tools
 
Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...
Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...
Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...
 
Mobile App Penetration Testing Bsides312
Mobile App Penetration Testing Bsides312Mobile App Penetration Testing Bsides312
Mobile App Penetration Testing Bsides312
 

Development of 5G IAM Architecture

  • 1. © 2019 Verizon. Development of 5G IAM Architecture Transitioning to a User Centric View Bjorn Hjelm May 16, 2019
  • 2. © 2019 Verizon. Why, What and How 2
  • 3. © 2019 Verizon. 3 5G Currencies / Capabilities
  • 4. © 2019 Verizon. 5G Core Network Key Principles and Concepts 4 Service-based interactions between Control Plane Network Functions (NF) where authorized NFs can access any other NF services. Separation between Control Plane and User Plane allowing for independent scalability, evolution and flexible deployments. Modularization of functions to enable flexible network slicing and support for capability exposure. 1 2 3
  • 5. © 2019 Verizon. 5G Core Network redefined as Service-Based Architecture (SBA) 5 UE (R)AN UPF AF AMF SMF PCF UDM DNN6 NRFNEF N3 N2 N4 AUSF Nausf Namf Nsmf NpcfNnrfNnef Nudm Naf NSSF Nnssf SBA entities User Plane entities 1 3GPP TS 23.501, “System Architecture for the 5G System,” v.15.5.0, March 2019. 5G System Architecture1
  • 6. © 2019 Verizon. 6 Study on a Layer for User Centric Identifiers and Authentication followed by User Identities and Authentication (UIA) that introduce normative requirements and study on the Usage of User Identifiers in the 5G System for architecture development. Developed use cases focused on IoT and generated requirements for a service- and layer- agnostic Identity as an Abstraction Layer in 5G as part of the input to 3GPP. Defined a 5G Vision around business context based on use cases, business models and value creation with a user-centric view and the identity of the entity. Development of 5G IAM Requirements
  • 7. © 2019 Verizon. 7 Identity as an Abstraction Layer in 5G Service- and Layer- agnostic Identity An identity that bridges between network access technologies. 5G IAM architecture need to abstract from domain related identifiers and network technologies. An identity that bridges between different services offered by one provider. An identity that bridges between operators and other identity providers, providing a global identity business proposition.
  • 8. © 2019 Verizon. Basic Concept and Relations of 5G Identity Management Relationship between User, Identities, Identifiers and Attributes2 A user is an entity in the context of identity management. The identity can dependent on the role of the entity in the system. A user can have several user identities (professional, private, etc.). A user identity is associated with some pieces of information generally referred to as attributes where identifiers are one special form of attribute. Attributes that are not identifiers may be associated with one or more identities. 2 3GPP TR 22.904, “Study on user centric identifiers and authentication,” v.16.1.0, Sep. 2018.
  • 9. © 2019 Verizon. 5G User Centric Authentication Layer2 2 3GPP TR 22.904, “Study on user centric identifiers and authentication,” v.16.1.0, Sep. 2018. Shall exist on top of the existing subscription authentication. Shall not replace existing subscription credentials. Shall support various authentication mechanisms and interactions with authentication system. Identity relationship management supports a service- and layer-agnostic identity of the user.
  • 10. © 2019 Verizon. In addition... 10 Authorization of 5G Network Function (NF) service access1 and 3rd- party Application Functions (AF)3 are based on OAuth 2.0 framework. Identity management and user authentication for 3GPP Mission Critical (MC) services is based on OpenID Connect and OAuth 2.0.4 1 3GPP TS 23.501, “System Architecture for the 5G System,” v.15.5.0, March 2019. 3 3GPP TS 33.501, “Security architecture and procedures for 5G system,” v.15.4.0, Mar. 2019. 4 3GPP TS 33.180, “Security of the mission critical service,” v.14.6.0, Mar. 2019.
  • 11. © 2019 Verizon. Summary 11 The 5G Vision focus on business context based on use cases, business models and value creation with a user-centric view. The concept of User Identity in a 5G system has been defined and agreed upon within 3GPP with architecture work in development. Some of the basic building blocks to support 5G User Centric Authentication Layer already exist. 1 2 3