Slide title In CAPITALS 50 pt Slide subtitle 32 pt Authentication/Authorization for possible deployments Relevant scenarios for CAFE.

Slides:



Advertisements
Similar presentations
Slide title In CAPITALS 50 pt Slide subtitle 32 pt IMS service composition IPTComm 08, Heidelberg
Advertisements

Slide title In CAPITALS 50 pt Slide subtitle 32 pt Addressing & Invocation of IMS-attached Services Ioannis Fikouras, Roman Levenshteyn, Salvatore Loreto,
Slide title In CAPITALS 50 pt Slide subtitle 32 pt European R&D.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Infrastructure ENUM David Seaton Director Product Marketing Ericsson.
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential Slide title :32-35pt Color: R153 G0 B0 Corporate Font : FrutigerNext LT Medium Font to be used by customers.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Phone-controlled Delivery of NGN Services into Residential Environments Dr. Andreas Fasbender Ericsson.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt G3X Series Fixed Wireless Terminals for GSM/EDGE Networks.
The Telecom Initiative and WTO Non Tariff Barriers proposals Update May 2009 Per Döfnäs Telefonaktiebolaget LM Ericsson.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Converged SAE / NGN Architecture The ScaleNet Architecture R. Keller, A. Schieder, Ericsson.
Full Service Broadband an Ericsson View of the Future Michael Martinsson Marketing Director Business Unit Networks Ericsson AB.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Ericsson satsning på Public Safety - National Security HIØ Personalseminar – 9. mai 06 - Ed.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt WATT WIDE AREA TINY TAGS.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Elements for successful partnership between Enterprise and University Ericsson in Croatia case EUPIDE.
1 Analysis of NGMN Requirements REQ 6: Substitution of Monitoring Probes by Infrastructure Inherent Trace Functionality.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Proactive fault management in mobile core network Niko Isotalo Instructor: Ira Antikainen Supervisor:
Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt BSNL 3G Network Parameters affecting Data Speed
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Consumers’ Awareness of, Attitudes Towards and Adoption of Mobile Phone Security Stewart Kowalski, Ericsson.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt KPI Reporting and Analysis Templates Naren Mohan
Slide title 40 pt Slide subtitle 24 pt Slide title 40 pt Slide subtitle 24 pt Broadband Issues Perspective Mike Furby Systems Engineering Manager Redback.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Open Source Business Models for Mobile Media Gateway Node Manager.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Improved project management practices as a key to the successful IS implementation Željka Požgaj*, Hrvoje.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt E2E IMS Interoperability Test Environment Ali Soujeh Senior Specialist, Interoperability Ericsson.
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential Security Level: Slide title :40-47pt Slide subtitle :26-30pt Color::white Corporate Font : FrutigerNext.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Bitstream and Hybrid Model VQEG Meeting, Kyoto, March 2008 Jörgen Gustafsson and Martin Pettersson.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Service requirements from 3GPP TS SDO Emergency Services Coordination Workshop (ESW06) Columbia.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Developing a Testing Process for Remote Usage of Multimedia Messaging Centre Master´s Thesis Presentation.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt ESPA in WCDMA.
1 Analysis of NGMN Requirements REQ 10: Automatic Inventory.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt SEND Certificate Profile draft-krishnan-cgaext-send-cert-eku-02 Suresh Krishnan Ana Kukec Khaja Ahmed.
Slide title :40-47pt Slide subtitle :26-30pt Color::white Corporate Font : FrutigerNext LT Medium Font to be used by customers and partners.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt “42” ICT in Ireland Life After the Tiger David Cleary
Slide title In CAPITALS 50 pt Slide subtitle 32 pt WTO Information Technology Symposium: Convergence and the impact of Globalization Ulf Pehrsson VP Government.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt The Development of Courseware for Smartphones Judy Nix Ericsson Education Ireland.
HUAWEI TECHNOLOGIES CO., LTD. Public document Security Level: Slide title :40-47pt Slide subtitle :26-30pt Color::white Corporate Font : FrutigerNext LT.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Simple DNA draft-krishnan-dna-simple-03 Suresh Krishnan Greg Daley.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Model based development for the RUNES component middleware platform Gabor Batori
Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets.
Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Cost Control in Service Composition Environments NGMAST 2008 Jörg Niemöller, Raphaël Quinet, Roman Levenshteyn.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Static Call Admission Control and Dimensioning of Media Gateways in IP based Mobile Core Networks Mika.
Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Configuration Aware Distributed System Design in Erlang Gabor Batori, Zoltan Theisz, Domonkos Asztalos.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Performance of Signalling Compression in the Third Generation Mobile Network Jouni Mäenpää S
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Dynamic and Persistent Scheduling for Voice over IP Traffic in the Long-Term Evolution Uplink Master’s.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt RTSP 2.0 TLS handling Magnus Westerlund draft-ietf-mmusic-rfc2326bis-12.
1 Analysis of NGMN Requirements REQ 7: eNodeB Plug & Play Self Commissioning.
Ericsson Tower Tube. Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24.
Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets.
HUAWEI TECHNOLOGIES CO., LTD. Slide title :40-47pt Slide subtitle :26-30pt Color::white Corporate Font : FrutigerNext LT Medium Font to be used by customers.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Risk-based regression testing in a telecommunication system node Master’s thesis presentation
Slide title In CAPITALS 50 pt Slide subtitle 32 pt ANALYSING EFFECTS OF MALFUNCTIONS ON THE PERFORMANCE OF UMTS RADIO ACCESS NETWORKS Author: Antti Keintola.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Ericsson IMS CANTO 2005, St. Kitts Antonio Gómez Business Unit Systems.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Verification of a GPRS Charging System in a Simulated Test Environment Author: Kirsi Koskenheimo Supervisor:
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Ambient Networks Media Delivery in the 3GPP Framework Author: Outi Koski Supervisor: Heikki Hämmäinen.
Which is more safer?. Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt SEND Certificate Profile draft-krishnan-cgaext-send-cert-eku-01 Suresh Krishnan Ana Kukec Khaja Ahmed.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Some Background about 3GPP SA4’s RTSP extensions Thorsten Lohmar.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt DNA wg IETF71.
Security Level: HUAWEI TECHNOLOGIES CO., LTD. Slide title :40-47pt Slide subtitle :26-30pt Color::white Corporate Font : FrutigerNext LT.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Guidelines for Firewall Administrators Mobile IPv6 Suresh Krishnan, Niklas Steinleitner, Ying Qiu, Gabor.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Capacity Management in WCDMA.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Improvement of Software Delivery Process in the Telecommunications Industry Xian Sun
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Guidelines for Firewall Vendors Mobile IPv6 Suresh Krishnan, Yaron Sheffer, Niklas Steinleitner, Gabor.
HUAWEI TECHNOLOGIES CO., LTD.Huawei Confidential Page 1 Slide title :32-35pt Color: R153 G0 B0 Corporate Font : FrutigerNext LT Medium Font to be used.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Flow Distribution Rule Language for Multi-Access Nodes draft-larsson-mext-flow-distribution-rules-01.
Security Level: Slide title :40-47pt Slide subtitle :26-30pt Color::white Corporate Font : FrutigerNext LT Medium Font to be used by customers.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Multi-component KPI:s ETSI/STQ_Mobile(08)18TD10.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt ITU Joint Regional Conference in Alexandria Building secure societies Mr. Kent Halling, Senior Advisor.
Presentation transcript:

Slide title In CAPITALS 50 pt Slide subtitle 32 pt Authentication/Authorization for possible deployments Relevant scenarios for CAFE

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt © Ericsson AB 2009CAFFE deployment scenarios Legenda  Mobile terminal: it means that the Java EE CAFE application is used.  Laptop terminal: it means that in this case the REST CAFE application is used.

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt © Ericsson AB 2009CAFFE deployment scenarios Operator B Internet CP/SP Operator A domain CP/SP App 3 NNI CP/SP UNI App 2 Sailfin App 4 Sailfin App 1 IMS Auth Proprietary Auth IMS Auth IMS SIP/XCAP

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt © Ericsson AB 2009CAFFE deployment scenarios Explanation of the previous slide 1.The user is a subscriber of Operator A, so he is registered with IMS credential and it is using SIP signaling and XCAP. The application is provided also by operator A. 2.The user is a subscriber of Operator B and he is registered with IMS credential. Then via secure connection he can use the application that resides in Operator A (due to operators agreements) The others scenarios are depicted better in the following slides.

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt © Ericsson AB 2009CAFFE deployment scenarios Internet CP/SP Operator A domain CP/SP App 3 CP/SP Sailfin App 4 Sailfin App 1 IMS Auth Proprietary Auth IMS Auth IMS IMS user ID user ID from Service Provider Proprietary Auth user ID from Service Provider http The APP in CAFE needs to map the proprietary authentication to an IMS authentication. SIP SIP/http

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt © Ericsson AB 2009CAFFE deployment scenarios Explanation of the scenarios 3.The Application resides in the Operator domain and it is a trusted application. The web user is a subscriber of Operator A so it will register with the IMS credentials. 4.The Application is provided by a Service Provider but it is deployed in the operator domain. The Application is trusted, but the Service Provider offers the service to all users, also non IMS users. In this case the Service Provider needs to have a proprietary authentication. Then the Application will use IMS credential for the operator and it would need to map it. 5.The Application is on the Service Provider Domain and it is not trusted. The user cannot use the IMS credentials directly, the Application will map the user to an IMS authenticated user internally. 6.This situation is the same as 3, the only difference is that Sailfin is also on the Service Provider domain.

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt © Ericsson AB 2009CAFFE deployment scenarios Assumption  Charging is not described in the slides. The Application created on CAFE can choose how to charge.  If an Application needs to have a mapping between proprietary authentication and IMS authentication, it can choose how to perform the registration in the IMS network. For example, the Application can request one single IMS user in the operator domain and map it to all users of the Service Provider or it can create a new IMS user for each user of the Application.

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt © Ericsson AB 2009CAFFE deployment scenarios