7.1.1 IpAuthentication

29.1983GPPOpen Service Architecture (OSA) Application Programming Interface (API) - Part 1Release 1999TS

.

Figure 7-1: State Transition Diagram for Authentication

7.1.1.1 Idle state

When the application has requested the IpInitial interface for initiateAuthentication, an object implementing the IpAuthentication interface is created. The application now has to provide it’s authentication capabilities by invoking the SelectAuthMethod method.

7.1.1.2 Init Authentication state

In this state the Framework selects the preferred authentication mechanism within the capability of the application. When a proper mechanism is found, the Framework can decide that the application doesn’t have to be authenticated (one way authentication) or that the application has to be authenticated. In case no mechanism can be found the error code P_INVALID_AUTH_CAPABILITY) is returned and the Authentication object is destroyed. This implies that the application has to re-initiate the authentication by calling once more the initiateAuthentication method on the IpInitial interface.

7.1.1.3 Wait For Application Result state

When entering this state, the Framework requests the application to authenticate itself by invoking the Authenticate method on the application. In case the application requests the Framework to authenticate itself by invoking Authenticate on the IpAuthentication interface, the Framework provides the correct response to the challenge of the application. When the Framework responds to the Authenticate request, the response is analysed and in case the response is valid a transition to the state Application Authenticated is made. In case the response is not valid, the Authentication object is destroyed. This implicates that the application has to re-initiate the authentication by calling once more the initiateAuthentication method on the IpInitial interface.

7.1.1.4 Application Authenticated state

In this state the application is considered authenticated and is now allowed to request access to the IpAccess interface. In case the application requests the Framework to authenticate itself by invoking Authenticate on the IpAuthentication interface, the Framework provides the correct response to the challenge of the application.