�1���
�Scope�
�2��� �References�
�3��� �Definitions��
������ �3.1��� �Definitions from
[ITU-T X.800]�����
������ �3.2��� �Definitions from
[ITU-T X.810]�����
������ �3.3��� �Definitions from
[ITU-T X.811]�����
������ �3.4��� �Definitions from
[ITU-T Y.2701]���
������ �3.5��� �Terms defined in this
Recommendation�������
�4��� �Abbreviations and acronyms��������
�5��� �Reference models
������ �5.1��� �ITU-T X.811
authentication framework�����
������ �5.2��� �Authentication threats���������
������ �5.3��� �Authentication
assurance����
������ �5.4��� �Authorization and
privilege management�����
������ �5.5��� �End-to-end reference
architectural model���
������ �5.6��� �Relationship with NGN
architecture specified in [ITU-T Y.2012]���
�6��� �General Requirements������
�7��� �Authentication and
authorization of user for network access����������
������ �7.1��� �Description
������ �7.2��� �General reference
model����
������ �7.3��� �Requirements���������
�8��� �Service NGN provider
authentication and authorization of user for access to service/application��� �
������ �8.1��� �Description
������ �8.2��� �Requirements���������
�9��� �User authentication and
authorization of NGN providers���
������ �9.1��� �Description
������ �9.2��� �Objectives and
requirements����������
10��� �NGN provider supported user
peer-to-peer authentication and authorization��������
11��� �Mutual network authentication
and authorization��
����� �11.1��� �Description�����������
����� �11.2��� �Mutual network
authentication requirements����������
12��� �NGN provider authentication and
authorization of 3rd party service/application provider��
����� �12.1��� �Description�����������
����� �12.2��� �Requirements��������
13��� �Use of 3rd party authentication
and authorization service��
����� �13.1��� �Description�����������
����� �13.2��� �Requirements��������
14��� �Authentication and
authorization of objects����������
����� �14.1��� �Description�����������
����� �14.2��� �Requirements��������
Appendix I �����
������ �I.1��� ��� Use of [b-ITU-T
X.1141], Security Assertion Markup Language (SAML 2.0)�����
������ �I.2��� ��� Service/application
authentication procedures�������
������ �I.3��� ��� Service/application
authentication � Call flow examples�����
������ �I.4��� ��� Security of
service/application authentication procedures and mechanisms�
Appendix II � ETS authentication and authorization��� �
����� �II.1��� �Overview
����� �II.2��� �ETS user
authentication and authorization����
����� �II.3��� �NGN provider
authentication and authorization for ETS������
����� �II.4��� �ETS authentication and
authorization use case examples������
Appendix III � 3GPP Generic bootstrapping architecture��� �
Appendix IV � Identity management (IdM) call flow examples��� �
����� �IV.1��� �Overview�
����� �IV.2��� �Call flow examples
Bibliography��� �