5 Mapping
32.3733GPPCommon Object Request Broker Architecture (CORBA) solutionSecurity services for Integration Reference Point (IRP)Telecommunication managementTS
5.1 RI Solution Mapping
RI Solution can be alternatively used to provide Authentication, Authorization and Activity Log Security Service for Itf-N.
5.1.1 Security Attribute Mapping
In Request Interceptor Solution scenario, Security Attributes are attached to operation request transferred between IRPManager and IRPAgent within CORBA ORB layer.
Table 5.1.1: Mapping from IS Security Attribute to RI Solution Equivalents
IS IOC in 3GPP TS 32.372 [5] | RI Solution IOC | Qualifier |
Credential | interface Credential (see note) | M |
NOTE: interface Credential contains auth_data of CORBA Any type, detailed content is authentication mechanism specific. A list of authentication mechanisms are recommended in Annex B. |
Table 5.1.2: Mapping from IS Security Exception to RI Solution Equivalents
IS IOC in 3GPP TS 32.372 [5] | RI Solution IOC | Qualifier |
There is no corresponding IS parameter | exception AuthenticationException (see note 1) | M |
There is no corresponding IS parameter | exception AuthorizationException (see note 2) | M |
NOTE 1: See details in clause 6.1.1. NOTE 2: See details in clause 6.1.2. |
5.2 SAS Solution Mapping
SAS Solution can be alternatively used to provide Authentication, Authorization and Activity Log Security Service for Itf-N.
5.2.1 Security Attribute Mapping
In Security Attribute Service protocol Solution scenario, Security Attributes are attached to operation request transferred between IRPManager and IRPAgent within CORBA ORB layer.
Table 5.2.1: Mapping from IS Security Attribute to SAS Solution Equivalents
IS IOC in 3GPP TS 32.372 [5] | SAS Solution IOC | Qualifier |
Credential | SAS ServiceContext (see note) | M |
NOTE: SAS Service Context are defined in clause 24.3 of OMG CORBA Specification [6]. |